'./mnt\x00', 0x0, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="1000000040000000030000002b00000005000000010000000000000000000000002000000020000010000000000000009f09c7", 0x33, 0x400}, {&(0x7f0000010100)="000000000000000000000000000000000000000000000000000000005178aedb0300000013000000230000002b0005", 0x2f, 0x7e0}, {&(0x7f0000010160)="ffff05000c000080ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff020000000c0001022e000000020000000c0002022e2e00000b000000dc03", 0x41e, 0xc00}, {&(0x7f00000105a0)='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\f', 0x19, 0x13e0}, {&(0x7f00000108c0)="ff07", 0x2, 0x4c00}, {&(0x7f0000010ce0)="00000000000000000000000000000000000000000000000000000000c99b0000ed410000000400009f09c75f9f09c75f9f09c75f00000000000003000200000000000800000000000af301000400000000000000000000000100000004", 0x5d, 0x8c60}], 0x0, &(0x7f0000010f60)) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) getdents64(r0, &(0x7f0000000040)=""/4, 0x4) [ 1533.309864] EXT4-fs error (device loop7): ext4_readdir:262: inode #2: block 4: comm syz-executor.7: path /syzkaller-testdir823765038/syzkaller.a3rO6g/294/mnt: bad entry in directory: rec_len is smaller than minimal - offset=0, inode=0, rec_len=0, size=1024 fake=0 [ 1533.332290] EXT4-fs (loop1): ext4_check_descriptors: Inode table for group 0 not in group (block 0)! [ 1533.333434] loop0: detected capacity change from 0 to 140 [ 1533.333927] EXT4-fs (loop1): group descriptors corrupted! [ 1533.339091] loop6: detected capacity change from 0 to 140 [ 1533.342353] EXT4-fs error (device loop0): ext4_ext_check_inode:523: inode #2: comm syz-executor.0: pblk 0 bad header/extent: invalid eh_max - magic f30a, entries 1, max 0(0), depth 0(0) [ 1533.346136] EXT4-fs (loop0): get root inode failed [ 1533.346547] EXT4-fs (loop0): mount failed [ 1533.348357] loop5: detected capacity change from 0 to 272 [ 1533.353820] EXT4-fs (loop5): mounting ext2 file system using the ext4 subsystem [ 1533.354429] EXT4-fs (loop5): bad geometry: block count 128 exceeds size of device (68 blocks) [ 1533.358903] loop3: detected capacity change from 0 to 140 [ 1533.370268] EXT4-fs (loop6): ext4_check_descriptors: Block bitmap for group 0 not in group (block 0)! [ 1533.371903] EXT4-fs (loop6): group descriptors corrupted! [ 1533.375885] loop4: detected capacity change from 0 to 140 [ 1533.403574] EXT4-fs (loop3): ext4_check_descriptors: Block bitmap for group 0 not in group (block 0)! [ 1533.405084] EXT4-fs (loop3): group descriptors corrupted! 03:58:52 executing program 5: creat(&(0x7f00000003c0)='./file0\x00', 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext2\x00', &(0x7f0000000100)='./file0\x00', 0x11151, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}], 0x0, &(0x7f0000013c00)=ANY=[]) [ 1533.421230] EXT4-fs (loop4): VFS: Can't find ext4 filesystem 03:58:52 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="1000000040000000030000002b00000005000000010000000000000000000000002000000020000010000000000000009f09c75f0000ffff53ef", 0x3a, 0x400}, {&(0x7f0000010080)="000000000000000000000000ede2de4df49d4f87b54a3176cfd4eb4f010040000c000000000000009f09c75f", 0x2c, 0x4e0}, {&(0x7f00000100c0)="01000000000000000000000000000000000000000401000012", 0x19, 0x560}, {&(0x7f00000100e0)="00000000000000000000000000000000000000000104", 0x16, 0x640}, {&(0x7f0000010100)="000000000000000000000000000000000000000000000000000000005178aedb0300000013000000230000002b0005000200040000000000907306c205002a9c00000000000000000000000000000000000000000000000091ecd11b", 0x5c, 0x7e0}, {&(0x7f0000010ce0)="00000000000000000000000000000000000000000000000000000000c99b0000ed410000000400009f09c75f9f09c75f9f09c75f00000000000003000200000000000800000000000af301", 0x4b, 0x8c60}], 0x0, &(0x7f0000010f60)) 03:58:52 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="1000000040000000030000002b00000005000000010000000000000000000000002000000020000010000000000000009f09c75f0000ffff53ef", 0x3a, 0x400}, {&(0x7f0000010080)="000000000000000000000000ede2de4df49d4f87b54a3176cfd4eb4f010040000c000000000000009f09c75f", 0x2c, 0x4e0}, {&(0x7f00000100c0)="01000000000000000000000000000000000000000401000012", 0x19, 0x560}, {&(0x7f0000010100)="000000000000000000000000000000000000000000000000000000005178aedb0300000013000000", 0x28, 0x7e0}, {&(0x7f0000010ce0)="00000000000000000000000000000000000000000000000000000000c99b0000ed410000000400009f09c75f9f09c75f9f09c75f00000000000003000200000000000800000000000af3010004000000000000000000000001", 0x59, 0x8c60}], 0x0, &(0x7f0000010f60)) [ 1533.481578] loop5: detected capacity change from 0 to 272 [ 1533.483671] EXT4-fs (loop5): mounting ext2 file system using the ext4 subsystem [ 1533.484291] EXT4-fs (loop5): bad geometry: block count 128 exceeds size of device (68 blocks) 03:58:52 executing program 7: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="1000000040000000030000002b00000005000000010000000000000000000000002000000020000010000000000000009f09c75f0000ffff53ef", 0x3a, 0x400}, {&(0x7f0000010080)="000000000000000000000000ede2de4df49d4f87b54a3176cfd4eb4f010040000c000000000000009f09c75f", 0x2c, 0x4e0}, {&(0x7f00000100c0)="01000000000000000000000000000000000000000401000012", 0x19, 0x560}, {&(0x7f00000100e0)="00000000000000000000000000000000000000000104", 0x16, 0x640}, {&(0x7f0000010100)="000000000000000000000000000000000000000000000000000000005178aedb03000000", 0x24, 0x7e0}, {&(0x7f0000010ce0)="00000000000000000000000000000000000000000000000000000000c99b0000ed410000000400009f09c75f9f09c75f9f09c75f00000000000003000200000000000800000000000af301000400000000000000000000000100000004", 0x5d, 0x8c60}], 0x0, &(0x7f0000010f60)) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) getdents64(r0, &(0x7f0000000040)=""/4, 0x4) 03:58:52 executing program 4: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="1000000040000000030000002b00000005000000010000000000000000000000002000000020000010000000000000009f09c75f0000ff", 0x37, 0x400}, {&(0x7f0000010100)="000000000000000000000000000000000000000000000000000000005178aedb0300000013000000230000002b0005", 0x2f, 0x7e0}, {&(0x7f0000010160)="ffff05000c000080ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff020000000c0001022e000000020000000c0002022e2e00000b000000dc03", 0x41e, 0xc00}, {&(0x7f00000105a0)='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\f', 0x19, 0x13e0}, {&(0x7f00000108c0)="ff07", 0x2, 0x4c00}, {&(0x7f0000010ce0)="00000000000000000000000000000000000000000000000000000000c99b0000ed410000000400009f09c75f9f09c75f9f09c75f00000000000003000200000000000800000000000af301000400000000000000000000000100000004", 0x5d, 0x8c60}], 0x0, &(0x7f0000010f60)) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) getdents64(r0, &(0x7f0000000040)=""/4, 0x4) 03:58:52 executing program 6: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="1000000040000000030000002b00000005000000010000000000000000000000002000000020000010000000000000009f09c75f0000ffff53ef", 0x3a, 0x400}, {&(0x7f0000010080)="000000000000000000000000ede2de4df49d4f87b54a3176cfd4eb4f010040000c000000000000009f09c75f", 0x2c, 0x4e0}, {&(0x7f00000100c0)="01000000000000000000000000000000000000000401000012", 0x19, 0x560}, {&(0x7f00000100e0)="00000000000000000000000000000000000000000104", 0x16, 0x640}, {&(0x7f0000010100)='\x00'/23, 0x17, 0x7e0}, {&(0x7f0000010ce0)="00000000000000000000000000000000000000000000000000000000c99b0000ed410000000400009f09c75f9f09c75f9f09c75f00000000000003000200000000000800000000000af301000400000000000000000000000100000004", 0x5d, 0x8c60}], 0x0, &(0x7f0000010f60)) getdents64(r0, &(0x7f0000000040)=""/4, 0x4) [ 1533.510414] EXT4-fs (loop7): unmounting filesystem 00000000-0000-0000-0000-000000000000. 03:58:52 executing program 5: creat(&(0x7f00000003c0)='./file0\x00', 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext2\x00', &(0x7f0000000100)='./file0\x00', 0x1129e, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}], 0x0, &(0x7f0000013c00)=ANY=[]) [ 1533.556459] loop1: detected capacity change from 0 to 140 [ 1533.556566] loop6: detected capacity change from 0 to 140 [ 1533.562634] loop5: detected capacity change from 0 to 272 [ 1533.562890] loop0: detected capacity change from 0 to 140 [ 1533.564334] EXT4-fs (loop1): ext4_check_descriptors: Inode table for group 0 not in group (block 0)! [ 1533.565166] EXT4-fs (loop1): group descriptors corrupted! [ 1533.588741] EXT4-fs (loop5): mounting ext2 file system using the ext4 subsystem [ 1533.589997] EXT4-fs (loop5): bad geometry: block count 128 exceeds size of device (68 blocks) [ 1533.603339] loop4: detected capacity change from 0 to 140 [ 1533.623130] EXT4-fs error (device loop0): ext4_ext_check_inode:523: inode #2: comm syz-executor.0: pblk 0 bad header/extent: invalid eh_max - magic f30a, entries 1, max 0(0), depth 0(0) [ 1533.631638] EXT4-fs (loop4): VFS: Can't find ext4 filesystem [ 1533.632315] EXT4-fs (loop6): ext4_check_descriptors: Block bitmap for group 0 not in group (block 0)! [ 1533.633145] EXT4-fs (loop6): group descriptors corrupted! [ 1533.635318] loop7: detected capacity change from 0 to 140 [ 1533.641744] EXT4-fs (loop0): get root inode failed [ 1533.642798] EXT4-fs (loop0): mount failed [ 1533.665550] EXT4-fs (loop7): ext4_check_descriptors: Inode bitmap for group 0 not in group (block 0)! [ 1533.666909] EXT4-fs (loop7): group descriptors corrupted! 03:59:00 executing program 3: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="1000000040000000030000002b00000005000000010000000000000000000000002000000020000010000000000000009f09c75f0000ffff53ef", 0x3a, 0x400}, {&(0x7f0000010080)="000000000000000000000000ede2de4df49d4f87b54a3176cfd4eb4f010040000c000000000000009f09c75f", 0x2c, 0x4e0}, {&(0x7f00000100c0)="01000000000000000000000000000000000000000401000012", 0x19, 0x560}, {&(0x7f00000100e0)="00000000000000000000000000000000000000000104", 0x16, 0x640}, {&(0x7f0000010100)="000000000000000000000000000000000000000000000000000000005178aedb030000001300000023", 0x29}, {&(0x7f0000010ce0)="00000000000000000000000000000000000000000000000000000000c99b0000ed410000000400009f09c75f9f09c75f9f09c75f00000000000003000200000000000800000000000af301000400000000000000000000000100000004", 0x5d, 0x8c60}], 0x0, &(0x7f0000010f60)) getdents64(r0, &(0x7f0000000040)=""/4, 0x4) 03:59:00 executing program 6: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="1000000040000000030000002b00000005000000010000000000000000000000002000000020000010000000000000009f09c75f0000ffff53ef", 0x3a, 0x400}, {&(0x7f0000010080)="000000000000000000000000ede2de4df49d4f87b54a3176cfd4eb4f010040000c000000000000009f09c75f", 0x2c, 0x4e0}, {&(0x7f00000100c0)="01000000000000000000000000000000000000000401000012", 0x19, 0x560}, {&(0x7f00000100e0)="00000000000000000000000000000000000000000104", 0x16, 0x640}, {&(0x7f0000010100)='\x00'/23, 0x17, 0x7e0}, {&(0x7f0000010ce0)="00000000000000000000000000000000000000000000000000000000c99b0000ed410000000400009f09c75f9f09c75f9f09c75f00000000000003000200000000000800000000000af301000400000000000000000000000100000004", 0x5d, 0x8c60}], 0x0, &(0x7f0000010f60)) getdents64(r0, &(0x7f0000000040)=""/4, 0x4) 03:59:00 executing program 7: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="1000000040000000030000002b00000005000000010000000000000000000000002000000020000010000000000000009f09c75f0000ffff53ef", 0x3a, 0x400}, {&(0x7f0000010080)="000000000000000000000000ede2de4df49d4f87b54a3176cfd4eb4f010040000c000000000000009f09c75f", 0x2c, 0x4e0}, {&(0x7f00000100c0)="01000000000000000000000000000000000000000401000012", 0x19, 0x560}, {&(0x7f00000100e0)="00000000000000000000000000000000000000000104", 0x16, 0x640}, {&(0x7f0000010100)="000000000000000000000000000000000000000000000000000000005178aedb03000000", 0x24, 0x7e0}, {&(0x7f0000010ce0)="00000000000000000000000000000000000000000000000000000000c99b0000ed410000000400009f09c75f9f09c75f9f09c75f00000000000003000200000000000800000000000af301000400000000000000000000000100000004", 0x5d, 0x8c60}], 0x0, &(0x7f0000010f60)) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) getdents64(r0, &(0x7f0000000040)=""/4, 0x4) 03:59:00 executing program 4: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="1000000040000000030000002b00000005000000010000000000000000000000002000000020000010000000000000009f09c75f0000ff", 0x37, 0x400}, {&(0x7f0000010100)="000000000000000000000000000000000000000000000000000000005178aedb0300000013000000230000002b0005", 0x2f, 0x7e0}, {&(0x7f0000010160)="ffff05000c000080ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff020000000c0001022e000000020000000c0002022e2e00000b000000dc03", 0x41e, 0xc00}, {&(0x7f00000105a0)='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\f', 0x19, 0x13e0}, {&(0x7f00000108c0)="ff07", 0x2, 0x4c00}, {&(0x7f0000010ce0)="00000000000000000000000000000000000000000000000000000000c99b0000ed410000000400009f09c75f9f09c75f9f09c75f00000000000003000200000000000800000000000af301000400000000000000000000000100000004", 0x5d, 0x8c60}], 0x0, &(0x7f0000010f60)) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) getdents64(r0, &(0x7f0000000040)=""/4, 0x4) 03:59:00 executing program 5: creat(&(0x7f00000003c0)='./file0\x00', 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext2\x00', &(0x7f0000000100)='./file0\x00', 0x1129f, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}], 0x0, &(0x7f0000013c00)=ANY=[]) 03:59:00 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="1000000040000000030000002b00000005000000010000000000000000000000002000000020000010000000000000009f09c75f0000ffff53ef", 0x3a, 0x400}, {&(0x7f0000010080)="000000000000000000000000ede2de4df49d4f87b54a3176cfd4eb4f010040000c000000000000009f09c75f", 0x2c, 0x4e0}, {&(0x7f00000100c0)="01000000000000000000000000000000000000000401000012", 0x19, 0x560}, {&(0x7f00000100e0)="00000000000000000000000000000000000000000104", 0x16, 0x640}, {&(0x7f0000010100)="000000000000000000000000000000000000000000000000000000005178aedb0300000013000000230000002b0005000200040000000000907306c205002a9c00000000000000000000000000000000000000000000000091ecd11b", 0x5c, 0x7e0}, {&(0x7f0000010ce0)="00000000000000000000000000000000000000000000000000000000c99b0000ed410000000400009f09c75f9f09c75f9f09c75f00000000000003000200000000000800000000000af301", 0x4b, 0x8c60}], 0x0, &(0x7f0000010f60)) 03:59:00 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="1000000040000000030000002b00000005000000010000000000000000000000002000000020000010000000000000009f09c75f0000ffff53ef", 0x3a, 0x400}, {&(0x7f0000010080)="000000000000000000000000ede2de4df49d4f87b54a3176cfd4eb4f010040000c000000000000009f09c75f", 0x2c, 0x4e0}, {&(0x7f00000100c0)="01000000000000000000000000000000000000000401000012", 0x19, 0x560}, {&(0x7f0000010100)="000000000000000000000000000000000000000000000000000000005178aedb0300000013000000", 0x28, 0x7e0}, {&(0x7f0000010ce0)="00000000000000000000000000000000000000000000000000000000c99b0000ed410000000400009f09c75f9f09c75f9f09c75f00000000000003000200000000000800000000000af3010004000000000000000000000001", 0x59, 0x8c60}], 0x0, &(0x7f0000010f60)) 03:59:00 executing program 2: sendmsg$NL80211_CMD_UNEXPECTED_FRAME(0xffffffffffffffff, &(0x7f0000000400)={0x0, 0x0, &(0x7f0000000300)={&(0x7f00000002c0)={0x1c, 0x0, 0x1, 0x0, 0x0, {{}, {@val={0x8}, @void}}}, 0x1c}}, 0x0) sendmsg$NL80211_CMD_UPDATE_FT_IES(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000001c0)={0x24, 0x0, 0x1, 0x70bd2c, 0x0, {{}, {@val={0x8}, @void}}, [@NL80211_ATTR_MDID={0x6, 0xb1, 0xc116}]}, 0x24}, 0x1, 0x0, 0x0, 0x80}, 0xc000) r0 = creat(&(0x7f00000003c0)='./file1\x00', 0x0) sendmsg$netlink(0xffffffffffffffff, 0x0, 0x0) dup(0xffffffffffffffff) pwritev2(r0, &(0x7f0000000380)=[{&(0x7f0000000180)="bd", 0xfffffdef}], 0x1, 0x1200, 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) ioctl$FS_IOC_FSSETXATTR(r1, 0x401c5820, &(0x7f0000000200)={0x9}) syz_io_uring_setup(0x0, &(0x7f0000000000)={0x0, 0x0, 0x4, 0x2, 0x309}, &(0x7f0000ffc000/0x2000)=nil, &(0x7f0000ffb000/0x3000)=nil, 0x0, &(0x7f0000000240)=0x0) syz_io_uring_submit(0x0, r2, &(0x7f0000000280)=@IORING_OP_ASYNC_CANCEL={0xe, 0x3, 0x0, 0x0, 0x0, 0x12345}, 0x1ff) [ 1542.023745] loop1: detected capacity change from 0 to 140 [ 1542.027792] loop3: detected capacity change from 0 to 140 [ 1542.028662] EXT4-fs (loop1): ext4_check_descriptors: Inode table for group 0 not in group (block 0)! [ 1542.029489] EXT4-fs (loop1): group descriptors corrupted! [ 1542.036367] EXT4-fs (loop3): ext4_check_descriptors: Block bitmap for group 0 not in group (block 0)! [ 1542.037231] EXT4-fs (loop3): group descriptors corrupted! [ 1542.067136] loop5: detected capacity change from 0 to 272 [ 1542.082281] EXT4-fs (loop5): mounting ext2 file system using the ext4 subsystem [ 1542.083518] EXT4-fs (loop5): bad geometry: block count 128 exceeds size of device (68 blocks) [ 1542.084293] loop7: detected capacity change from 0 to 140 [ 1542.086042] loop4: detected capacity change from 0 to 140 [ 1542.089048] loop0: detected capacity change from 0 to 140 [ 1542.090194] loop6: detected capacity change from 0 to 140 03:59:01 executing program 3: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="1000000040000000030000002b00000005000000010000000000000000000000002000000020000010000000000000009f09c75f0000ffff53ef", 0x3a, 0x400}, {&(0x7f0000010080)="000000000000000000000000ede2de4df49d4f87b54a3176cfd4eb4f010040000c000000000000009f09c75f", 0x2c, 0x4e0}, {&(0x7f00000100c0)="01000000000000000000000000000000000000000401000012", 0x19, 0x560}, {&(0x7f00000100e0)="00000000000000000000000000000000000000000104", 0x16, 0x640}, {&(0x7f0000010100)="000000000000000000000000000000000000000000000000000000005178aedb030000001300000023", 0x29}, {&(0x7f0000010ce0)="00000000000000000000000000000000000000000000000000000000c99b0000ed410000000400009f09c75f9f09c75f9f09c75f00000000000003000200000000000800000000000af301000400000000000000000000000100000004", 0x5d, 0x8c60}], 0x0, &(0x7f0000010f60)) getdents64(r0, &(0x7f0000000040)=""/4, 0x4) [ 1542.106792] EXT4-fs (loop4): VFS: Can't find ext4 filesystem [ 1542.113631] EXT4-fs (loop7): ext4_check_descriptors: Inode bitmap for group 0 not in group (block 0)! [ 1542.113865] EXT4-fs (loop6): ext4_check_descriptors: Block bitmap for group 0 not in group (block 0)! [ 1542.114585] EXT4-fs (loop7): group descriptors corrupted! [ 1542.115932] EXT4-fs (loop6): group descriptors corrupted! [ 1542.118578] EXT4-fs error (device loop0): ext4_ext_check_inode:523: inode #2: comm syz-executor.0: pblk 0 bad header/extent: invalid eh_max - magic f30a, entries 1, max 0(0), depth 0(0) [ 1542.124812] loop5: detected capacity change from 0 to 272 [ 1542.131693] EXT4-fs (loop0): get root inode failed [ 1542.132274] EXT4-fs (loop0): mount failed [ 1542.150942] loop3: detected capacity change from 0 to 140 [ 1542.193509] EXT4-fs (loop3): ext4_check_descriptors: Block bitmap for group 0 not in group (block 0)! [ 1542.195149] EXT4-fs (loop3): group descriptors corrupted! 03:59:11 executing program 7: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="1000000040000000030000002b00000005000000010000000000000000000000002000000020000010000000000000009f09c75f0000ffff53ef", 0x3a, 0x400}, {&(0x7f0000010080)="000000000000000000000000ede2de4df49d4f87b54a3176cfd4eb4f010040000c000000000000009f09c75f", 0x2c, 0x4e0}, {&(0x7f00000100c0)="01000000000000000000000000000000000000000401000012", 0x19, 0x560}, {&(0x7f00000100e0)="00000000000000000000000000000000000000000104", 0x16, 0x640}, {&(0x7f0000010100)="000000000000000000000000000000000000000000000000000000005178aedb03000000", 0x24, 0x7e0}, {&(0x7f0000010ce0)="00000000000000000000000000000000000000000000000000000000c99b0000ed410000000400009f09c75f9f09c75f9f09c75f00000000000003000200000000000800000000000af301000400000000000000000000000100000004", 0x5d, 0x8c60}], 0x0, &(0x7f0000010f60)) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) getdents64(r0, &(0x7f0000000040)=""/4, 0x4) 03:59:11 executing program 2: sendmsg$NL80211_CMD_UNEXPECTED_FRAME(0xffffffffffffffff, &(0x7f0000000400)={0x0, 0x0, &(0x7f0000000300)={&(0x7f00000002c0)={0x1c, 0x0, 0x1, 0x0, 0x0, {{}, {@val={0x8}, @void}}}, 0x1c}}, 0x0) sendmsg$NL80211_CMD_UPDATE_FT_IES(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000001c0)={0x24, 0x0, 0x1, 0x70bd2c, 0x0, {{}, {@val={0x8}, @void}}, [@NL80211_ATTR_MDID={0x6, 0xb1, 0xc116}]}, 0x24}, 0x1, 0x0, 0x0, 0x80}, 0xc000) r0 = creat(&(0x7f00000003c0)='./file1\x00', 0x0) sendmsg$netlink(0xffffffffffffffff, 0x0, 0x0) dup(0xffffffffffffffff) pwritev2(r0, &(0x7f0000000380)=[{&(0x7f0000000180)="bd", 0xfffffdef}], 0x1, 0x1200, 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) ioctl$FS_IOC_FSSETXATTR(r1, 0x401c5820, &(0x7f0000000200)={0x9}) syz_io_uring_setup(0x0, &(0x7f0000000000)={0x0, 0x0, 0x4, 0x2, 0x309}, &(0x7f0000ffc000/0x2000)=nil, &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000000080), 0x0) syz_io_uring_submit(0x0, 0x0, &(0x7f0000000280)=@IORING_OP_ASYNC_CANCEL={0xe, 0x3, 0x0, 0x0, 0x0, 0x12345}, 0x1ff) 03:59:11 executing program 3: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="1000000040000000030000002b00000005000000010000000000000000000000002000000020000010000000000000009f09c75f0000ffff53ef", 0x3a, 0x400}, {&(0x7f0000010080)="000000000000000000000000ede2de4df49d4f87b54a3176cfd4eb4f010040000c000000000000009f09c75f", 0x2c, 0x4e0}, {&(0x7f00000100c0)="01000000000000000000000000000000000000000401000012", 0x19, 0x560}, {&(0x7f0000010100)="000000000000000000000000000000000000000000000000000000005178aedb030000001300000023", 0x29, 0x7e0}, {&(0x7f0000010ce0)="00000000000000000000000000000000000000000000000000000000c99b0000ed410000000400009f09c75f9f09c75f9f09c75f00000000000003000200000000000800000000000af301000400000000000000000000000100000004", 0x5d, 0x8c60}], 0x0, &(0x7f0000010f60)) getdents64(r0, &(0x7f0000000040)=""/4, 0x4) 03:59:11 executing program 5: creat(&(0x7f00000003c0)='./file0\x00', 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext2\x00', &(0x7f0000000100)='./file0\x00', 0x114c5, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}], 0x0, &(0x7f0000013c00)=ANY=[]) 03:59:11 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="1000000040000000030000002b00000005000000010000000000000000000000002000000020000010000000000000009f09c75f0000ffff53ef", 0x3a, 0x400}, {&(0x7f0000010080)="000000000000000000000000ede2de4df49d4f87b54a3176cfd4eb4f010040000c000000000000009f09c75f", 0x2c, 0x4e0}, {&(0x7f00000100c0)="01000000000000000000000000000000000000000401000012", 0x19, 0x560}, {&(0x7f00000100e0)="00000000000000000000000000000000000000000104", 0x16, 0x640}, {&(0x7f0000010100)="000000000000000000000000000000000000000000000000000000005178aedb0300000013000000230000002b0005000200040000000000907306c205002a9c00000000000000000000000000000000000000000000000091ecd11b", 0x5c, 0x7e0}, {&(0x7f0000010ce0)="00000000000000000000000000000000000000000000000000000000c99b0000ed410000000400009f09c75f9f09c75f9f09c75f00000000000003000200000000000800000000000af30100", 0x4c, 0x8c60}], 0x0, &(0x7f0000010f60)) 03:59:11 executing program 6: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="1000000040000000030000002b00000005000000010000000000000000000000002000000020000010000000000000009f09c75f0000ffff53ef", 0x3a, 0x400}, {&(0x7f0000010080)="000000000000000000000000ede2de4df49d4f87b54a3176cfd4eb4f010040000c000000000000009f09c75f", 0x2c, 0x4e0}, {&(0x7f00000100c0)="01000000000000000000000000000000000000000401000012", 0x19, 0x560}, {&(0x7f00000100e0)="00000000000000000000000000000000000000000104", 0x16, 0x640}, {&(0x7f0000010100)='\x00'/23, 0x17, 0x7e0}, {&(0x7f0000010ce0)="00000000000000000000000000000000000000000000000000000000c99b0000ed410000000400009f09c75f9f09c75f9f09c75f00000000000003000200000000000800000000000af301000400000000000000000000000100000004", 0x5d, 0x8c60}], 0x0, &(0x7f0000010f60)) getdents64(r0, &(0x7f0000000040)=""/4, 0x4) 03:59:11 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="1000000040000000030000002b00000005000000010000000000000000000000002000000020000010000000000000009f09c75f0000ffff53ef", 0x3a, 0x400}, {&(0x7f0000010080)="000000000000000000000000ede2de4df49d4f87b54a3176cfd4eb4f010040000c000000000000009f09c75f", 0x2c, 0x4e0}, {&(0x7f00000100c0)="01000000000000000000000000000000000000000401000012", 0x19, 0x560}, {&(0x7f0000010100)="000000000000000000000000000000000000000000000000000000005178aedb030000001300000023", 0x29}, {&(0x7f0000010ce0)="00000000000000000000000000000000000000000000000000000000c99b0000ed410000000400009f09c75f9f09c75f9f09c75f00000000000003000200000000000800000000000af3010004000000000000000000000001", 0x59, 0x8c60}], 0x0, &(0x7f0000010f60)) 03:59:11 executing program 4: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="1000000040000000030000002b00000005000000010000000000000000000000002000000020000010000000000000009f09c75f0000ff", 0x37, 0x400}, {&(0x7f0000010100)="000000000000000000000000000000000000000000000000000000005178aedb0300000013000000230000002b0005", 0x2f, 0x7e0}, {&(0x7f0000010160)="ffff05000c000080ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff020000000c0001022e000000020000000c0002022e2e00000b000000dc03", 0x41e, 0xc00}, {&(0x7f00000105a0)='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\f', 0x19, 0x13e0}, {&(0x7f00000108c0)="ff07", 0x2, 0x4c00}, {&(0x7f0000010ce0)="00000000000000000000000000000000000000000000000000000000c99b0000ed410000000400009f09c75f9f09c75f9f09c75f00000000000003000200000000000800000000000af301000400000000000000000000000100000004", 0x5d, 0x8c60}], 0x0, &(0x7f0000010f60)) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) getdents64(r0, &(0x7f0000000040)=""/4, 0x4) [ 1552.319847] loop1: detected capacity change from 0 to 140 [ 1552.324742] EXT4-fs (loop1): ext4_check_descriptors: Block bitmap for group 0 not in group (block 0)! [ 1552.326367] EXT4-fs (loop1): group descriptors corrupted! [ 1552.344862] loop7: detected capacity change from 0 to 140 [ 1552.376150] EXT4-fs (loop7): ext4_check_descriptors: Inode bitmap for group 0 not in group (block 0)! [ 1552.377803] EXT4-fs (loop7): group descriptors corrupted! [ 1552.382149] loop4: detected capacity change from 0 to 140 [ 1552.384090] loop3: detected capacity change from 0 to 140 [ 1552.385716] loop0: detected capacity change from 0 to 140 [ 1552.385717] loop6: detected capacity change from 0 to 140 [ 1552.395757] EXT4-fs (loop4): VFS: Can't find ext4 filesystem [ 1552.407743] loop5: detected capacity change from 0 to 272 [ 1552.408248] EXT4-fs error (device loop0): ext4_ext_check_inode:523: inode #2: comm syz-executor.0: pblk 0 bad header/extent: invalid eh_max - magic f30a, entries 1, max 0(0), depth 0(0) [ 1552.415494] EXT4-fs (loop3): warning: mounting unchecked fs, running e2fsck is recommended [ 1552.421790] EXT4-fs (loop0): get root inode failed [ 1552.422674] EXT4-fs (loop0): mount failed [ 1552.424304] EXT4-fs (loop6): ext4_check_descriptors: Block bitmap for group 0 not in group (block 0)! [ 1552.426039] EXT4-fs (loop6): group descriptors corrupted! [ 1552.427999] EXT4-fs (loop5): mounting ext2 file system using the ext4 subsystem [ 1552.429359] EXT4-fs (loop5): bad geometry: block count 128 exceeds size of device (68 blocks) 03:59:11 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="1000000040000000030000002b00000005000000010000000000000000000000002000000020000010000000000000009f09c75f0000ffff53ef", 0x3a, 0x400}, {&(0x7f0000010080)="000000000000000000000000ede2de4df49d4f87b54a3176cfd4eb4f010040000c000000000000009f09c75f", 0x2c, 0x4e0}, {&(0x7f00000100c0)="01000000000000000000000000000000000000000401000012", 0x19, 0x560}, {&(0x7f0000010100)="000000000000000000000000000000000000000000000000000000005178aedb030000001300000023", 0x29}, {&(0x7f0000010ce0)="00000000000000000000000000000000000000000000000000000000c99b0000ed410000000400009f09c75f9f09c75f9f09c75f00000000000003000200000000000800000000000af3010004000000000000000000000001", 0x59, 0x8c60}], 0x0, &(0x7f0000010f60)) [ 1552.438430] EXT4-fs (loop3): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: none. [ 1552.466615] EXT4-fs error (device loop3): ext4_readdir:262: inode #2: block 4: comm syz-executor.3: path /syzkaller-testdir621642535/syzkaller.Ms8KeX/301/mnt: bad entry in directory: rec_len is smaller than minimal - offset=0, inode=0, rec_len=0, size=1024 fake=0 03:59:11 executing program 7: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="1000000040000000030000002b00000005000000010000000000000000000000002000000020000010000000000000009f09c75f0000ffff53ef", 0x3a, 0x400}, {&(0x7f0000010080)="000000000000000000000000ede2de4df49d4f87b54a3176cfd4eb4f010040000c000000000000009f09c75f", 0x2c, 0x4e0}, {&(0x7f00000100c0)="01000000000000000000000000000000000000000401000012", 0x19, 0x560}, {&(0x7f00000100e0)="00000000000000000000000000000000000000000104", 0x16, 0x640}, {&(0x7f0000010100)="000000000000000000000000000000000000000000000000000000005178aedb03000000130000", 0x27, 0x7e0}, {&(0x7f0000010ce0)="00000000000000000000000000000000000000000000000000000000c99b0000ed410000000400009f09c75f9f09c75f9f09c75f00000000000003000200000000000800000000000af301000400000000000000000000000100000004", 0x5d, 0x8c60}], 0x0, &(0x7f0000010f60)) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) getdents64(r0, &(0x7f0000000040)=""/4, 0x4) 03:59:11 executing program 4: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="1000000040000000030000002b00000005000000010000000000000000000000002000000020000010000000000000009f09c75f0000ffff53", 0x39, 0x400}, {&(0x7f0000010100)="000000000000000000000000000000000000000000000000000000005178aedb0300000013000000230000002b0005", 0x2f, 0x7e0}, {&(0x7f0000010160)="ffff05000c000080ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff020000000c0001022e000000020000000c0002022e2e00000b000000dc03", 0x41e, 0xc00}, {&(0x7f00000105a0)='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\f', 0x19, 0x13e0}, {&(0x7f00000108c0)="ff07", 0x2, 0x4c00}, {&(0x7f0000010ce0)="00000000000000000000000000000000000000000000000000000000c99b0000ed410000000400009f09c75f9f09c75f9f09c75f00000000000003000200000000000800000000000af301000400000000000000000000000100000004", 0x5d, 0x8c60}], 0x0, &(0x7f0000010f60)) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) getdents64(r0, &(0x7f0000000040)=""/4, 0x4) [ 1552.578230] loop1: detected capacity change from 0 to 140 03:59:11 executing program 6: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="1000000040000000030000002b00000005000000010000000000000000000000002000000020000010000000000000009f09c75f0000ffff53ef", 0x3a, 0x400}, {&(0x7f0000010080)="000000000000000000000000ede2de4df49d4f87b54a3176cfd4eb4f010040000c000000000000009f09c75f", 0x2c, 0x4e0}, {&(0x7f00000100c0)="01000000000000000000000000000000000000000401000012", 0x19, 0x560}, {&(0x7f00000100e0)="00000000000000000000000000000000000000000104", 0x16, 0x640}, {&(0x7f0000010100)="000000000000000000000000000000000000000000000000000000005178aedb030000", 0x23, 0x7e0}, {&(0x7f0000010ce0)="00000000000000000000000000000000000000000000000000000000c99b0000ed410000000400009f09c75f9f09c75f9f09c75f00000000000003000200000000000800000000000af301000400000000000000000000000100000004", 0x5d, 0x8c60}], 0x0, &(0x7f0000010f60)) getdents64(r0, &(0x7f0000000040)=""/4, 0x4) 03:59:11 executing program 5: creat(&(0x7f00000003c0)='./file0\x00', 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext2\x00', &(0x7f0000000100)='./file0\x00', 0x11591, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}], 0x0, &(0x7f0000013c00)=ANY=[]) 03:59:11 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="1000000040000000030000002b00000005000000010000000000000000000000002000000020000010000000000000009f09c75f0000ffff53ef", 0x3a, 0x400}, {&(0x7f0000010080)="000000000000000000000000ede2de4df49d4f87b54a3176cfd4eb4f010040000c000000000000009f09c75f", 0x2c, 0x4e0}, {&(0x7f00000100c0)="01000000000000000000000000000000000000000401000012", 0x19, 0x560}, {&(0x7f00000100e0)="00000000000000000000000000000000000000000104", 0x16, 0x640}, {&(0x7f0000010100)="000000000000000000000000000000000000000000000000000000005178aedb0300000013000000230000002b0005000200040000000000907306c205002a9c00000000000000000000000000000000000000000000000091ecd11b", 0x5c, 0x7e0}, {&(0x7f0000010ce0)="00000000000000000000000000000000000000000000000000000000c99b0000ed410000000400009f09c75f9f09c75f9f09c75f00000000000003000200000000000800000000000af30100", 0x4c, 0x8c60}], 0x0, &(0x7f0000010f60)) [ 1552.601227] EXT4-fs (loop1): ext4_check_descriptors: Block bitmap for group 0 not in group (block 0)! [ 1552.602902] EXT4-fs (loop1): group descriptors corrupted! 03:59:11 executing program 3: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="1000000040000000030000002b00000005000000010000000000000000000000002000000020000010000000000000009f09c75f0000ffff53ef", 0x3a, 0x400}, {&(0x7f0000010080)="000000000000000000000000ede2de4df49d4f87b54a3176cfd4eb4f010040000c000000000000009f09c75f", 0x2c, 0x4e0}, {&(0x7f00000100c0)="01000000000000000000000000000000000000000401000012", 0x19, 0x560}, {0x0, 0x0, 0x7e0}, {&(0x7f0000010ce0)="00000000000000000000000000000000000000000000000000000000c99b0000ed410000000400009f09c75f9f09c75f9f09c75f00000000000003000200000000000800000000000af301000400000000000000000000000100000004", 0x5d, 0x8c60}], 0x0, &(0x7f0000010f60)) getdents64(r0, &(0x7f0000000040)=""/4, 0x4) [ 1552.625994] EXT4-fs (loop3): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 1552.655571] loop7: detected capacity change from 0 to 140 [ 1552.678515] EXT4-fs (loop7): ext4_check_descriptors: Inode table for group 0 not in group (block 0)! [ 1552.680127] EXT4-fs (loop7): group descriptors corrupted! [ 1552.685404] loop4: detected capacity change from 0 to 140 [ 1552.689424] loop6: detected capacity change from 0 to 140 [ 1552.690658] loop0: detected capacity change from 0 to 140 [ 1552.708097] EXT4-fs (loop6): ext4_check_descriptors: Inode bitmap for group 0 not in group (block 0)! [ 1552.709788] EXT4-fs (loop6): group descriptors corrupted! [ 1552.722734] EXT4-fs error (device loop0): ext4_ext_check_inode:523: inode #2: comm syz-executor.0: pblk 0 bad header/extent: invalid eh_max - magic f30a, entries 1, max 0(0), depth 0(0) [ 1552.725640] EXT4-fs (loop4): VFS: Can't find ext4 filesystem [ 1552.745757] EXT4-fs (loop0): get root inode failed [ 1552.748856] EXT4-fs (loop0): mount failed [ 1552.757668] loop5: detected capacity change from 0 to 272 03:59:11 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="1000000040000000030000002b00000005000000010000000000000000000000002000000020000010000000000000009f09c75f0000ffff53ef", 0x3a, 0x400}, {&(0x7f0000010080)="000000000000000000000000ede2de4df49d4f87b54a3176cfd4eb4f010040000c000000000000009f09c75f", 0x2c, 0x4e0}, {&(0x7f00000100c0)="01000000000000000000000000000000000000000401000012", 0x19, 0x560}, {&(0x7f0000010100)="000000000000000000000000000000000000000000000000000000005178aedb030000001300000023", 0x29}, {&(0x7f0000010ce0)="00000000000000000000000000000000000000000000000000000000c99b0000ed410000000400009f09c75f9f09c75f9f09c75f00000000000003000200000000000800000000000af3010004000000000000000000000001", 0x59, 0x8c60}], 0x0, &(0x7f0000010f60)) [ 1552.784804] EXT4-fs (loop5): mounting ext2 file system using the ext4 subsystem [ 1552.785995] loop3: detected capacity change from 0 to 140 [ 1552.786927] EXT4-fs (loop5): bad geometry: block count 128 exceeds size of device (68 blocks) [ 1552.794438] EXT4-fs (loop3): ext4_check_descriptors: Block bitmap for group 0 not in group (block 0)! [ 1552.796439] EXT4-fs (loop3): group descriptors corrupted! 03:59:11 executing program 7: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="1000000040000000030000002b00000005000000010000000000000000000000002000000020000010000000000000009f09c75f0000ffff53ef", 0x3a, 0x400}, {&(0x7f0000010080)="000000000000000000000000ede2de4df49d4f87b54a3176cfd4eb4f010040000c000000000000009f09c75f", 0x2c, 0x4e0}, {&(0x7f00000100c0)="01000000000000000000000000000000000000000401000012", 0x19, 0x560}, {&(0x7f00000100e0)="00000000000000000000000000000000000000000104", 0x16, 0x640}, {&(0x7f0000010100)="000000000000000000000000000000000000000000000000000000005178aedb03000000130000", 0x27, 0x7e0}, {&(0x7f0000010ce0)="00000000000000000000000000000000000000000000000000000000c99b0000ed410000000400009f09c75f9f09c75f9f09c75f00000000000003000200000000000800000000000af301000400000000000000000000000100000004", 0x5d, 0x8c60}], 0x0, &(0x7f0000010f60)) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) getdents64(r0, &(0x7f0000000040)=""/4, 0x4) [ 1552.955056] loop1: detected capacity change from 0 to 140 [ 1552.968532] EXT4-fs (loop1): ext4_check_descriptors: Block bitmap for group 0 not in group (block 0)! [ 1552.970073] EXT4-fs (loop1): group descriptors corrupted! [ 1552.995604] loop7: detected capacity change from 0 to 140 [ 1553.000014] EXT4-fs (loop7): ext4_check_descriptors: Inode table for group 0 not in group (block 0)! [ 1553.001526] EXT4-fs (loop7): group descriptors corrupted! 03:59:20 executing program 3: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="1000000040000000030000002b00000005000000010000000000000000000000002000000020000010000000000000009f09c75f0000ffff53ef", 0x3a, 0x400}, {&(0x7f0000010080)="000000000000000000000000ede2de4df49d4f87b54a3176cfd4eb4f010040000c000000000000009f09c75f", 0x2c, 0x4e0}, {&(0x7f00000100c0)="01000000000000000000000000000000000000000401000012", 0x19, 0x560}, {0x0, 0x0, 0x7e0}, {&(0x7f0000010ce0)="00000000000000000000000000000000000000000000000000000000c99b0000ed410000000400009f09c75f9f09c75f9f09c75f00000000000003000200000000000800000000000af301000400000000000000000000000100000004", 0x5d, 0x8c60}], 0x0, &(0x7f0000010f60)) getdents64(r0, &(0x7f0000000040)=""/4, 0x4) 03:59:20 executing program 2: sendmsg$NL80211_CMD_UNEXPECTED_FRAME(0xffffffffffffffff, &(0x7f0000000400)={0x0, 0x0, &(0x7f0000000300)={&(0x7f00000002c0)={0x1c, 0x0, 0x1, 0x0, 0x0, {{}, {@val={0x8}, @void}}}, 0x1c}}, 0x0) sendmsg$NL80211_CMD_UPDATE_FT_IES(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000001c0)={0x24, 0x0, 0x1, 0x70bd2c, 0x0, {{}, {@val={0x8}, @void}}, [@NL80211_ATTR_MDID={0x6, 0xb1, 0xc116}]}, 0x24}, 0x1, 0x0, 0x0, 0x80}, 0xc000) r0 = creat(&(0x7f00000003c0)='./file1\x00', 0x0) sendmsg$netlink(0xffffffffffffffff, 0x0, 0x0) dup(0xffffffffffffffff) pwritev2(r0, &(0x7f0000000380)=[{&(0x7f0000000180)="bd", 0xfffffdef}], 0x1, 0x1200, 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) ioctl$FS_IOC_FSSETXATTR(r1, 0x401c5820, &(0x7f0000000200)={0x9}) syz_io_uring_setup(0x0, &(0x7f0000000000)={0x0, 0x0, 0x4, 0x2, 0x309}, &(0x7f0000ffc000/0x2000)=nil, &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000000080), 0x0) syz_io_uring_submit(0x0, 0x0, &(0x7f0000000280)=@IORING_OP_ASYNC_CANCEL={0xe, 0x3, 0x0, 0x0, 0x0, 0x12345}, 0x1ff) 03:59:20 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="1000000040000000030000002b00000005000000010000000000000000000000002000000020000010000000000000009f09c75f0000ffff53ef", 0x3a, 0x400}, {&(0x7f0000010080)="000000000000000000000000ede2de4df49d4f87b54a3176cfd4eb4f010040000c000000000000009f09c75f", 0x2c, 0x4e0}, {&(0x7f0000010100)="000000000000000000000000000000000000000000000000000000005178aedb030000001300000023", 0x29, 0x7e0}, {&(0x7f0000010ce0)="00000000000000000000000000000000000000000000000000000000c99b0000ed410000000400009f09c75f9f09c75f9f09c75f00000000000003000200000000000800000000000af3010004000000000000000000000001", 0x59, 0x8c60}], 0x0, &(0x7f0000010f60)) 03:59:20 executing program 4: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="1000000040000000030000002b00000005000000010000000000000000000000002000000020000010000000000000009f09c75f0000ffff53", 0x39, 0x400}, {&(0x7f0000010100)="000000000000000000000000000000000000000000000000000000005178aedb0300000013000000230000002b0005", 0x2f, 0x7e0}, {&(0x7f0000010160)="ffff05000c000080ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff020000000c0001022e000000020000000c0002022e2e00000b000000dc03", 0x41e, 0xc00}, {&(0x7f00000105a0)='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\f', 0x19, 0x13e0}, {&(0x7f00000108c0)="ff07", 0x2, 0x4c00}, {&(0x7f0000010ce0)="00000000000000000000000000000000000000000000000000000000c99b0000ed410000000400009f09c75f9f09c75f9f09c75f00000000000003000200000000000800000000000af301000400000000000000000000000100000004", 0x5d, 0x8c60}], 0x0, &(0x7f0000010f60)) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) getdents64(r0, &(0x7f0000000040)=""/4, 0x4) 03:59:20 executing program 5: creat(&(0x7f00000003c0)='./file0\x00', 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext2\x00', &(0x7f0000000100)='./file0\x00', 0x11596, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}], 0x0, &(0x7f0000013c00)=ANY=[]) 03:59:20 executing program 6: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="1000000040000000030000002b00000005000000010000000000000000000000002000000020000010000000000000009f09c75f0000ffff53ef", 0x3a, 0x400}, {&(0x7f0000010080)="000000000000000000000000ede2de4df49d4f87b54a3176cfd4eb4f010040000c000000000000009f09c75f", 0x2c, 0x4e0}, {&(0x7f00000100c0)="01000000000000000000000000000000000000000401000012", 0x19, 0x560}, {&(0x7f00000100e0)="00000000000000000000000000000000000000000104", 0x16, 0x640}, {&(0x7f0000010100)="000000000000000000000000000000000000000000000000000000005178aedb030000", 0x23, 0x7e0}, {&(0x7f0000010ce0)="00000000000000000000000000000000000000000000000000000000c99b0000ed410000000400009f09c75f9f09c75f9f09c75f00000000000003000200000000000800000000000af301000400000000000000000000000100000004", 0x5d, 0x8c60}], 0x0, &(0x7f0000010f60)) getdents64(r0, &(0x7f0000000040)=""/4, 0x4) 03:59:20 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="1000000040000000030000002b00000005000000010000000000000000000000002000000020000010000000000000009f09c75f0000ffff53ef", 0x3a, 0x400}, {&(0x7f0000010080)="000000000000000000000000ede2de4df49d4f87b54a3176cfd4eb4f010040000c000000000000009f09c75f", 0x2c, 0x4e0}, {&(0x7f00000100c0)="01000000000000000000000000000000000000000401000012", 0x19, 0x560}, {&(0x7f00000100e0)="00000000000000000000000000000000000000000104", 0x16, 0x640}, {&(0x7f0000010100)="000000000000000000000000000000000000000000000000000000005178aedb0300000013000000230000002b0005000200040000000000907306c205002a9c00000000000000000000000000000000000000000000000091ecd11b", 0x5c, 0x7e0}, {&(0x7f0000010ce0)="00000000000000000000000000000000000000000000000000000000c99b0000ed410000000400009f09c75f9f09c75f9f09c75f00000000000003000200000000000800000000000af30100", 0x4c, 0x8c60}], 0x0, &(0x7f0000010f60)) 03:59:20 executing program 7: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="1000000040000000030000002b00000005000000010000000000000000000000002000000020000010000000000000009f09c75f0000ffff53ef", 0x3a, 0x400}, {&(0x7f0000010080)="000000000000000000000000ede2de4df49d4f87b54a3176cfd4eb4f010040000c000000000000009f09c75f", 0x2c, 0x4e0}, {&(0x7f00000100c0)="01000000000000000000000000000000000000000401000012", 0x19, 0x560}, {&(0x7f00000100e0)="00000000000000000000000000000000000000000104", 0x16, 0x640}, {&(0x7f0000010100)="000000000000000000000000000000000000000000000000000000005178aedb03000000130000", 0x27, 0x7e0}, {&(0x7f0000010ce0)="00000000000000000000000000000000000000000000000000000000c99b0000ed410000000400009f09c75f9f09c75f9f09c75f00000000000003000200000000000800000000000af301000400000000000000000000000100000004", 0x5d, 0x8c60}], 0x0, &(0x7f0000010f60)) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) getdents64(r0, &(0x7f0000000040)=""/4, 0x4) [ 1561.808891] loop1: detected capacity change from 0 to 140 [ 1561.810753] loop4: detected capacity change from 0 to 140 [ 1561.826367] EXT4-fs (loop4): VFS: Can't find ext4 filesystem [ 1561.838066] EXT4-fs error (device loop1): ext4_ext_check_inode:523: inode #2: comm syz-executor.1: pblk 0 bad header/extent: invalid extent entries - magic f30a, entries 1, max 4(4), depth 0(0) [ 1561.863691] EXT4-fs (loop1): get root inode failed [ 1561.864506] EXT4-fs (loop1): mount failed [ 1561.880165] loop6: detected capacity change from 0 to 140 [ 1561.890301] loop3: detected capacity change from 0 to 140 [ 1561.891467] loop0: detected capacity change from 0 to 140 [ 1561.892611] EXT4-fs (loop6): ext4_check_descriptors: Inode bitmap for group 0 not in group (block 0)! [ 1561.893613] loop7: detected capacity change from 0 to 140 [ 1561.893979] EXT4-fs (loop6): group descriptors corrupted! [ 1561.910518] loop5: detected capacity change from 0 to 272 [ 1561.920235] EXT4-fs (loop3): ext4_check_descriptors: Block bitmap for group 0 not in group (block 0)! [ 1561.921922] EXT4-fs (loop3): group descriptors corrupted! [ 1561.932815] EXT4-fs (loop7): ext4_check_descriptors: Inode table for group 0 not in group (block 0)! [ 1561.934192] EXT4-fs (loop7): group descriptors corrupted! [ 1561.935078] EXT4-fs error (device loop0): ext4_ext_check_inode:523: inode #2: comm syz-executor.0: pblk 0 bad header/extent: invalid eh_max - magic f30a, entries 1, max 0(0), depth 0(0) [ 1561.940818] EXT4-fs (loop5): mounting ext2 file system using the ext4 subsystem [ 1561.941971] EXT4-fs (loop5): bad geometry: block count 128 exceeds size of device (68 blocks) [ 1561.976324] EXT4-fs (loop0): get root inode failed [ 1561.977430] EXT4-fs (loop0): mount failed 03:59:20 executing program 6: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="1000000040000000030000002b00000005000000010000000000000000000000002000000020000010000000000000009f09c75f0000ffff53ef", 0x3a, 0x400}, {&(0x7f0000010080)="000000000000000000000000ede2de4df49d4f87b54a3176cfd4eb4f010040000c000000000000009f09c75f", 0x2c, 0x4e0}, {&(0x7f00000100c0)="01000000000000000000000000000000000000000401000012", 0x19, 0x560}, {&(0x7f00000100e0)="00000000000000000000000000000000000000000104", 0x16, 0x640}, {&(0x7f0000010100)="000000000000000000000000000000000000000000000000000000005178aedb030000", 0x23, 0x7e0}, {&(0x7f0000010ce0)="00000000000000000000000000000000000000000000000000000000c99b0000ed410000000400009f09c75f9f09c75f9f09c75f00000000000003000200000000000800000000000af301000400000000000000000000000100000004", 0x5d, 0x8c60}], 0x0, &(0x7f0000010f60)) getdents64(r0, &(0x7f0000000040)=""/4, 0x4) 03:59:20 executing program 4: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="1000000040000000030000002b00000005000000010000000000000000000000002000000020000010000000000000009f09c75f0000ffff53", 0x39, 0x400}, {&(0x7f0000010100)="000000000000000000000000000000000000000000000000000000005178aedb0300000013000000230000002b0005", 0x2f, 0x7e0}, {&(0x7f0000010160)="ffff05000c000080ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff020000000c0001022e000000020000000c0002022e2e00000b000000dc03", 0x41e, 0xc00}, {&(0x7f00000105a0)='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\f', 0x19, 0x13e0}, {&(0x7f00000108c0)="ff07", 0x2, 0x4c00}, {&(0x7f0000010ce0)="00000000000000000000000000000000000000000000000000000000c99b0000ed410000000400009f09c75f9f09c75f9f09c75f00000000000003000200000000000800000000000af301000400000000000000000000000100000004", 0x5d, 0x8c60}], 0x0, &(0x7f0000010f60)) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) getdents64(r0, &(0x7f0000000040)=""/4, 0x4) 03:59:20 executing program 7: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="1000000040000000030000002b00000005000000010000000000000000000000002000000020000010000000000000009f09c75f0000ffff53ef", 0x3a, 0x400}, {&(0x7f0000010080)="000000000000000000000000ede2de4df49d4f87b54a3176cfd4eb4f010040000c000000000000009f09c75f", 0x2c, 0x4e0}, {&(0x7f00000100c0)="01000000000000000000000000000000000000000401000012", 0x19, 0x560}, {&(0x7f00000100e0)="00000000000000000000000000000000000000000104", 0x16, 0x640}, {&(0x7f0000010100)="000000000000000000000000000000000000000000000000000000005178aedb0300000013000000", 0x28, 0x7e0}, {&(0x7f0000010ce0)="00000000000000000000000000000000000000000000000000000000c99b0000ed410000000400009f09c75f9f09c75f9f09c75f00000000000003000200000000000800000000000af301000400000000000000000000000100000004", 0x5d, 0x8c60}], 0x0, &(0x7f0000010f60)) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) getdents64(r0, &(0x7f0000000040)=""/4, 0x4) 03:59:20 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="1000000040000000030000002b00000005000000010000000000000000000000002000000020000010000000000000009f09c75f0000ffff53ef", 0x3a, 0x400}, {&(0x7f0000010080)="000000000000000000000000ede2de4df49d4f87b54a3176cfd4eb4f010040000c000000000000009f09c75f", 0x2c, 0x4e0}, {0x0, 0x0, 0x7e0}, {&(0x7f0000010ce0)="00000000000000000000000000000000000000000000000000000000c99b0000ed410000000400009f09c75f9f09c75f9f09c75f00000000000003000200000000000800000000000af3010004000000000000000000000001", 0x59, 0x8c60}], 0x0, &(0x7f0000010f60)) 03:59:21 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="1000000040000000030000002b00000005000000010000000000000000000000002000000020000010000000000000009f09c75f0000ffff53ef", 0x3a, 0x400}, {&(0x7f0000010080)="000000000000000000000000ede2de4df49d4f87b54a3176cfd4eb4f010040000c000000000000009f09c75f", 0x2c, 0x4e0}, {&(0x7f00000100c0)="01000000000000000000000000000000000000000401000012", 0x19, 0x560}, {&(0x7f00000100e0)="00000000000000000000000000000000000000000104", 0x16, 0x640}, {&(0x7f0000010100)="000000000000000000000000000000000000000000000000000000005178aedb0300000013000000230000002b0005000200040000000000907306c205002a9c00000000000000000000000000000000000000000000000091ecd11b", 0x5c, 0x7e0}, {&(0x7f0000010ce0)="00000000000000000000000000000000000000000000000000000000c99b0000ed410000000400009f09c75f9f09c75f9f09c75f00000000000003000200000000000800000000000af3010004", 0x4d}], 0x0, &(0x7f0000010f60)) 03:59:21 executing program 5: creat(&(0x7f00000003c0)='./file0\x00', 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext2\x00', &(0x7f0000000100)='./file0\x00', 0x116f5, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}], 0x0, &(0x7f0000013c00)=ANY=[]) 03:59:21 executing program 3: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="1000000040000000030000002b00000005000000010000000000000000000000002000000020000010000000000000009f09c75f0000ffff53ef", 0x3a, 0x400}, {&(0x7f0000010080)="000000000000000000000000ede2de4df49d4f87b54a3176cfd4eb4f010040000c000000000000009f09c75f", 0x2c, 0x4e0}, {&(0x7f00000100c0)="01000000000000000000000000000000000000000401000012", 0x19, 0x560}, {0x0, 0x0, 0x7e0}, {&(0x7f0000010ce0)="00000000000000000000000000000000000000000000000000000000c99b0000ed410000000400009f09c75f9f09c75f9f09c75f00000000000003000200000000000800000000000af301000400000000000000000000000100000004", 0x5d, 0x8c60}], 0x0, &(0x7f0000010f60)) getdents64(r0, &(0x7f0000000040)=""/4, 0x4) [ 1562.138543] loop6: detected capacity change from 0 to 140 [ 1562.160559] EXT4-fs (loop6): ext4_check_descriptors: Inode bitmap for group 0 not in group (block 0)! [ 1562.161975] EXT4-fs (loop6): group descriptors corrupted! [ 1562.194725] loop0: detected capacity change from 0 to 7 [ 1562.195514] loop4: detected capacity change from 0 to 140 [ 1562.206336] loop7: detected capacity change from 0 to 140 [ 1562.208744] loop1: detected capacity change from 0 to 140 [ 1562.212379] EXT4-fs (loop0): bad geometry: block count 64 exceeds size of device (3 blocks) [ 1562.215865] loop5: detected capacity change from 0 to 272 [ 1562.217799] EXT4-fs (loop4): VFS: Can't find ext4 filesystem [ 1562.222860] EXT4-fs (loop7): ext4_check_descriptors: Inode table for group 0 not in group (block 0)! [ 1562.224362] EXT4-fs (loop7): group descriptors corrupted! [ 1562.230086] loop3: detected capacity change from 0 to 140 [ 1562.232350] EXT4-fs (loop5): mounting ext2 file system using the ext4 subsystem [ 1562.234013] EXT4-fs (loop5): bad geometry: block count 128 exceeds size of device (68 blocks) [ 1562.235564] EXT4-fs (loop1): ext4_check_descriptors: Block bitmap for group 0 not in group (block 0)! [ 1562.236955] EXT4-fs (loop1): group descriptors corrupted! [ 1562.254641] EXT4-fs (loop3): ext4_check_descriptors: Block bitmap for group 0 not in group (block 0)! [ 1562.256052] EXT4-fs (loop3): group descriptors corrupted! 03:59:21 executing program 6: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="1000000040000000030000002b00000005000000010000000000000000000000002000000020000010000000000000009f09c75f0000ffff53ef", 0x3a, 0x400}, {&(0x7f0000010080)="000000000000000000000000ede2de4df49d4f87b54a3176cfd4eb4f010040000c000000000000009f09c75f", 0x2c, 0x4e0}, {&(0x7f00000100c0)="01000000000000000000000000000000000000000401000012", 0x19, 0x560}, {&(0x7f00000100e0)="00000000000000000000000000000000000000000104", 0x16, 0x640}, {&(0x7f0000010100)="000000000000000000000000000000000000000000000000000000005178aedb030000001300000023", 0x29, 0x7e0}, {&(0x7f0000010ce0)="00000000000000000000000000000000000000000000000000000000c99b0000ed410000000400009f09c75f9f09c75f9f09c75f00000000000003000200000000000800000000000af301000400000000000000000000000100000004", 0x5d, 0x8c60}], 0x0, &(0x7f0000010f60)) getdents64(r0, &(0x7f0000000040)=""/4, 0x4) 03:59:21 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="1000000040000000030000002b00000005000000010000000000000000000000002000000020000010000000000000009f09c75f0000ffff53ef", 0x3a, 0x400}, {&(0x7f0000010080)="000000000000000000000000ede2de4df49d4f87b54a3176cfd4eb4f010040000c000000000000009f09c75f", 0x2c, 0x4e0}, {&(0x7f00000100c0)="01000000000000000000000000000000000000000401000012", 0x19, 0x560}, {&(0x7f00000100e0)="00000000000000000000000000000000000000000104", 0x16, 0x640}, {&(0x7f0000010100)="000000000000000000000000000000000000000000000000000000005178aedb0300000013000000230000002b0005000200040000000000907306c205002a9c00000000000000000000000000000000000000000000000091ecd11b", 0x5c, 0x7e0}, {&(0x7f0000010ce0)="00000000000000000000000000000000000000000000000000000000c99b0000ed410000000400009f09c75f9f09c75f9f09c75f00000000000003000200000000000800000000000af3010004", 0x4d}], 0x0, &(0x7f0000010f60)) [ 1562.396911] loop6: detected capacity change from 0 to 140 [ 1562.413208] EXT4-fs (loop6): warning: mounting unchecked fs, running e2fsck is recommended [ 1562.424859] loop0: detected capacity change from 0 to 7 [ 1562.424980] EXT4-fs (loop6): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: none. [ 1562.431539] EXT4-fs (loop0): bad geometry: block count 64 exceeds size of device (3 blocks) [ 1562.436320] EXT4-fs error (device loop6): ext4_readdir:262: inode #2: block 4: comm syz-executor.6: path /syzkaller-testdir823133109/syzkaller.UCZRXl/285/mnt: bad entry in directory: rec_len is smaller than minimal - offset=0, inode=0, rec_len=0, size=1024 fake=0 [ 1562.470167] EXT4-fs (loop6): unmounting filesystem 00000000-0000-0000-0000-000000000000. 03:59:32 executing program 2: sendmsg$NL80211_CMD_UNEXPECTED_FRAME(0xffffffffffffffff, &(0x7f0000000400)={0x0, 0x0, &(0x7f0000000300)={&(0x7f00000002c0)={0x1c, 0x0, 0x1, 0x0, 0x0, {{}, {@val={0x8}, @void}}}, 0x1c}}, 0x0) sendmsg$NL80211_CMD_UPDATE_FT_IES(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000001c0)={0x24, 0x0, 0x1, 0x70bd2c, 0x0, {{}, {@val={0x8}, @void}}, [@NL80211_ATTR_MDID={0x6, 0xb1, 0xc116}]}, 0x24}, 0x1, 0x0, 0x0, 0x80}, 0xc000) r0 = creat(&(0x7f00000003c0)='./file1\x00', 0x0) sendmsg$netlink(0xffffffffffffffff, 0x0, 0x0) dup(0xffffffffffffffff) pwritev2(r0, &(0x7f0000000380)=[{&(0x7f0000000180)="bd", 0xfffffdef}], 0x1, 0x1200, 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) ioctl$FS_IOC_FSSETXATTR(r1, 0x401c5820, &(0x7f0000000200)={0x9}) syz_io_uring_setup(0x0, &(0x7f0000000000)={0x0, 0x0, 0x4, 0x2, 0x309}, &(0x7f0000ffc000/0x2000)=nil, &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000000080), 0x0) syz_io_uring_submit(0x0, 0x0, &(0x7f0000000280)=@IORING_OP_ASYNC_CANCEL={0xe, 0x3, 0x0, 0x0, 0x0, 0x12345}, 0x1ff) 03:59:32 executing program 5: creat(&(0x7f00000003c0)='./file0\x00', 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext2\x00', &(0x7f0000000100)='./file0\x00', 0x11a68, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}], 0x0, &(0x7f0000013c00)=ANY=[]) 03:59:32 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="1000000040000000030000002b00000005000000010000000000000000000000002000000020000010000000000000009f09c75f0000ffff53ef", 0x3a, 0x400}, {&(0x7f0000010080)="000000000000000000000000ede2de4df49d4f87b54a3176cfd4eb4f010040000c000000000000009f09c75f", 0x2c, 0x4e0}, {&(0x7f00000100c0)="01000000000000000000000000000000000000000401000012", 0x19, 0x560}, {&(0x7f00000100e0)="00000000000000000000000000000000000000000104", 0x16, 0x640}, {&(0x7f0000010100)="000000000000000000000000000000000000000000000000000000005178aedb0300000013000000230000002b0005000200040000000000907306c205002a9c00000000000000000000000000000000000000000000000091ecd11b", 0x5c, 0x7e0}, {&(0x7f0000010ce0)="00000000000000000000000000000000000000000000000000000000c99b0000ed410000000400009f09c75f9f09c75f9f09c75f00000000000003000200000000000800000000000af3010004", 0x4d}], 0x0, &(0x7f0000010f60)) 03:59:32 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="1000000040000000030000002b00000005000000010000000000000000000000002000000020000010000000000000009f09c75f0000ffff53ef", 0x3a, 0x400}, {&(0x7f0000010080)="000000000000000000000000ede2de4df49d4f87b54a3176cfd4eb4f010040000c000000000000009f09c75f", 0x2c, 0x4e0}, {0x0, 0x0, 0x7e0}, {&(0x7f0000010ce0)="00000000000000000000000000000000000000000000000000000000c99b0000ed410000000400009f09c75f9f09c75f9f09c75f00000000000003000200000000000800000000000af3010004000000000000000000000001", 0x59, 0x8c60}], 0x0, &(0x7f0000010f60)) 03:59:32 executing program 3: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="1000000040000000030000002b00000005000000010000000000000000000000002000000020000010000000000000009f09c75f0000ffff53ef", 0x3a, 0x400}, {&(0x7f0000010080)="000000000000000000000000ede2de4df49d4f87b54a3176cfd4eb4f010040000c000000000000009f09c75f", 0x2c, 0x4e0}, {&(0x7f00000100c0)="01000000000000000000000000000000000000000401000012", 0x19, 0x560}, {&(0x7f0000010100), 0x0, 0x7e0}, {&(0x7f0000010ce0)="00000000000000000000000000000000000000000000000000000000c99b0000ed410000000400009f09c75f9f09c75f9f09c75f00000000000003000200000000000800000000000af301000400000000000000000000000100000004", 0x5d, 0x8c60}], 0x0, &(0x7f0000010f60)) getdents64(r0, &(0x7f0000000040)=""/4, 0x4) 03:59:32 executing program 6: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="1000000040000000030000002b00000005000000010000000000000000000000002000000020000010000000000000009f09c75f0000ffff53ef", 0x3a, 0x400}, {&(0x7f0000010080)="000000000000000000000000ede2de4df49d4f87b54a3176cfd4eb4f010040000c000000000000009f09c75f", 0x2c, 0x4e0}, {&(0x7f00000100c0)="01000000000000000000000000000000000000000401000012", 0x19, 0x560}, {&(0x7f00000100e0)="00000000000000000000000000000000000000000104", 0x16, 0x640}, {&(0x7f0000010100)="000000000000000000000000000000000000000000000000000000005178aedb03000000", 0x24, 0x7e0}, {&(0x7f0000010ce0)="00000000000000000000000000000000000000000000000000000000c99b0000ed410000000400009f09c75f9f09c75f9f09c75f00000000000003000200000000000800000000000af301000400000000000000000000000100000004", 0x5d, 0x8c60}], 0x0, &(0x7f0000010f60)) getdents64(r0, &(0x7f0000000040)=""/4, 0x4) 03:59:32 executing program 4: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="1000000040000000030000002b00000005000000010000000000000000000000002000000020000010000000000000009f09c75f0000ffff53ef", 0x3a}, {&(0x7f0000010100)="000000000000000000000000000000000000000000000000000000005178aedb0300000013000000230000002b0005", 0x2f, 0x7e0}, {&(0x7f0000010160)="ffff05000c000080ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff020000000c0001022e000000020000000c0002022e2e00000b000000dc03", 0x41e, 0xc00}, {&(0x7f00000105a0)='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\f', 0x19, 0x13e0}, {&(0x7f00000108c0)="ff07", 0x2, 0x4c00}, {&(0x7f0000010ce0)="00000000000000000000000000000000000000000000000000000000c99b0000ed410000000400009f09c75f9f09c75f9f09c75f00000000000003000200000000000800000000000af301000400000000000000000000000100000004", 0x5d, 0x8c60}], 0x0, &(0x7f0000010f60)) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) getdents64(r0, &(0x7f0000000040)=""/4, 0x4) 03:59:32 executing program 7: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="1000000040000000030000002b00000005000000010000000000000000000000002000000020000010000000000000009f09c75f0000ffff53ef", 0x3a, 0x400}, {&(0x7f0000010080)="000000000000000000000000ede2de4df49d4f87b54a3176cfd4eb4f010040000c000000000000009f09c75f", 0x2c, 0x4e0}, {&(0x7f00000100c0)="01000000000000000000000000000000000000000401000012", 0x19, 0x560}, {&(0x7f00000100e0)="00000000000000000000000000000000000000000104", 0x16, 0x640}, {&(0x7f0000010100)="000000000000000000000000000000000000000000000000000000005178aedb0300000013000000", 0x28, 0x7e0}, {&(0x7f0000010ce0)="00000000000000000000000000000000000000000000000000000000c99b0000ed410000000400009f09c75f9f09c75f9f09c75f00000000000003000200000000000800000000000af301000400000000000000000000000100000004", 0x5d, 0x8c60}], 0x0, &(0x7f0000010f60)) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) getdents64(r0, &(0x7f0000000040)=""/4, 0x4) [ 1573.288276] loop1: detected capacity change from 0 to 140 [ 1573.292996] loop3: detected capacity change from 0 to 140 [ 1573.296782] loop5: detected capacity change from 0 to 272 [ 1573.306359] EXT4-fs (loop1): ext4_check_descriptors: Block bitmap for group 0 not in group (block 0)! [ 1573.307884] EXT4-fs (loop1): group descriptors corrupted! [ 1573.309859] loop7: detected capacity change from 0 to 140 [ 1573.313185] EXT4-fs (loop5): mounting ext2 file system using the ext4 subsystem [ 1573.314356] EXT4-fs (loop5): bad geometry: block count 128 exceeds size of device (68 blocks) [ 1573.314541] EXT4-fs (loop3): ext4_check_descriptors: Block bitmap for group 0 not in group (block 0)! [ 1573.316989] EXT4-fs (loop3): group descriptors corrupted! [ 1573.321880] loop0: detected capacity change from 0 to 7 [ 1573.326563] loop4: detected capacity change from 0 to 140 [ 1573.336168] EXT4-fs (loop7): ext4_check_descriptors: Inode table for group 0 not in group (block 0)! [ 1573.337658] EXT4-fs (loop7): group descriptors corrupted! [ 1573.341868] loop6: detected capacity change from 0 to 140 [ 1573.343806] EXT4-fs (loop0): bad geometry: block count 64 exceeds size of device (3 blocks) [ 1573.350608] EXT4-fs (loop4): VFS: Can't find ext4 filesystem [ 1573.353586] loop5: detected capacity change from 0 to 272 [ 1573.360623] EXT4-fs (loop6): ext4_check_descriptors: Inode bitmap for group 0 not in group (block 0)! [ 1573.362031] EXT4-fs (loop6): group descriptors corrupted! 03:59:32 executing program 3: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="1000000040000000030000002b00000005000000010000000000000000000000002000000020000010000000000000009f09c75f0000ffff53ef", 0x3a, 0x400}, {&(0x7f0000010080)="000000000000000000000000ede2de4df49d4f87b54a3176cfd4eb4f010040000c000000000000009f09c75f", 0x2c, 0x4e0}, {&(0x7f00000100c0)="01000000000000000000000000000000000000000401000012", 0x19, 0x560}, {&(0x7f0000010100), 0x0, 0x7e0}, {&(0x7f0000010ce0)="00000000000000000000000000000000000000000000000000000000c99b0000ed410000000400009f09c75f9f09c75f9f09c75f00000000000003000200000000000800000000000af301000400000000000000000000000100000004", 0x5d, 0x8c60}], 0x0, &(0x7f0000010f60)) getdents64(r0, &(0x7f0000000040)=""/4, 0x4) 03:59:32 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="1000000040000000030000002b00000005000000010000000000000000000000002000000020000010000000000000009f09c75f0000ffff53ef", 0x3a, 0x400}, {&(0x7f0000010080)="000000000000000000000000ede2de4df49d4f87b54a3176cfd4eb4f010040000c000000000000009f09c75f", 0x2c, 0x4e0}, {0x0, 0x0, 0x7e0}, {&(0x7f0000010ce0)="00000000000000000000000000000000000000000000000000000000c99b0000ed410000000400009f09c75f9f09c75f9f09c75f00000000000003000200000000000800000000000af3010004000000000000000000000001", 0x59, 0x8c60}], 0x0, &(0x7f0000010f60)) 03:59:32 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="1000000040000000030000002b00000005000000010000000000000000000000002000000020000010000000000000009f09c75f0000ffff53ef", 0x3a, 0x400}, {&(0x7f0000010080)="000000000000000000000000ede2de4df49d4f87b54a3176cfd4eb4f010040000c000000000000009f09c75f", 0x2c, 0x4e0}, {&(0x7f00000100c0)="01000000000000000000000000000000000000000401000012", 0x19, 0x560}, {&(0x7f00000100e0)="00000000000000000000000000000000000000000104", 0x16, 0x640}, {&(0x7f0000010ce0)="00000000000000000000000000000000000000000000000000000000c99b0000ed410000000400009f09c75f9f09c75f9f09c75f00000000000003000200000000000800000000000af3010004", 0x4d, 0x8c60}], 0x0, &(0x7f0000010f60)) 03:59:32 executing program 5: creat(&(0x7f00000003c0)='./file0\x00', 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext2\x00', &(0x7f0000000100)='./file0\x00', 0x11a6a, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}], 0x0, &(0x7f0000013c00)=ANY=[]) 03:59:32 executing program 7: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="1000000040000000030000002b00000005000000010000000000000000000000002000000020000010000000000000009f09c75f0000ffff53ef", 0x3a, 0x400}, {&(0x7f0000010080)="000000000000000000000000ede2de4df49d4f87b54a3176cfd4eb4f010040000c000000000000009f09c75f", 0x2c, 0x4e0}, {&(0x7f00000100c0)="01000000000000000000000000000000000000000401000012", 0x19, 0x560}, {&(0x7f00000100e0)="00000000000000000000000000000000000000000104", 0x16, 0x640}, {&(0x7f0000010100)="000000000000000000000000000000000000000000000000000000005178aedb0300000013000000", 0x28, 0x7e0}, {&(0x7f0000010ce0)="00000000000000000000000000000000000000000000000000000000c99b0000ed410000000400009f09c75f9f09c75f9f09c75f00000000000003000200000000000800000000000af301000400000000000000000000000100000004", 0x5d, 0x8c60}], 0x0, &(0x7f0000010f60)) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) getdents64(r0, &(0x7f0000000040)=""/4, 0x4) 03:59:32 executing program 4: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="1000000040000000030000002b00000005000000010000000000000000000000002000000020000010000000000000009f09c75f0000ffff53ef", 0x3a}, {&(0x7f0000010100)="000000000000000000000000000000000000000000000000000000005178aedb0300000013000000230000002b0005", 0x2f, 0x7e0}, {&(0x7f0000010160)="ffff05000c000080ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff020000000c0001022e000000020000000c0002022e2e00000b000000dc03", 0x41e, 0xc00}, {&(0x7f00000105a0)='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\f', 0x19, 0x13e0}, {&(0x7f00000108c0)="ff07", 0x2, 0x4c00}, {&(0x7f0000010ce0)="00000000000000000000000000000000000000000000000000000000c99b0000ed410000000400009f09c75f9f09c75f9f09c75f00000000000003000200000000000800000000000af301000400000000000000000000000100000004", 0x5d, 0x8c60}], 0x0, &(0x7f0000010f60)) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) getdents64(r0, &(0x7f0000000040)=""/4, 0x4) 03:59:32 executing program 6: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="1000000040000000030000002b00000005000000010000000000000000000000002000000020000010000000000000009f09c75f0000ffff53ef", 0x3a, 0x400}, {&(0x7f0000010080)="000000000000000000000000ede2de4df49d4f87b54a3176cfd4eb4f010040000c000000000000009f09c75f", 0x2c, 0x4e0}, {&(0x7f00000100c0)="01000000000000000000000000000000000000000401000012", 0x19, 0x560}, {&(0x7f00000100e0)="00000000000000000000000000000000000000000104", 0x16, 0x640}, {&(0x7f0000010100)="000000000000000000000000000000000000000000000000000000005178aedb03000000", 0x24, 0x7e0}, {&(0x7f0000010ce0)="00000000000000000000000000000000000000000000000000000000c99b0000ed410000000400009f09c75f9f09c75f9f09c75f00000000000003000200000000000800000000000af301000400000000000000000000000100000004", 0x5d, 0x8c60}], 0x0, &(0x7f0000010f60)) getdents64(r0, &(0x7f0000000040)=""/4, 0x4) [ 1573.507050] loop1: detected capacity change from 0 to 140 [ 1573.523671] EXT4-fs (loop1): ext4_check_descriptors: Block bitmap for group 0 not in group (block 0)! [ 1573.525179] EXT4-fs (loop1): group descriptors corrupted! [ 1573.530481] loop3: detected capacity change from 0 to 140 [ 1573.551303] EXT4-fs (loop3): ext4_check_descriptors: Block bitmap for group 0 not in group (block 0)! [ 1573.552739] EXT4-fs (loop3): group descriptors corrupted! [ 1573.572558] loop7: detected capacity change from 0 to 140 [ 1573.583188] loop0: detected capacity change from 0 to 140 [ 1573.583370] loop5: detected capacity change from 0 to 272 [ 1573.586386] loop4: detected capacity change from 0 to 140 [ 1573.588329] loop6: detected capacity change from 0 to 140 [ 1573.588730] EXT4-fs (loop7): ext4_check_descriptors: Inode table for group 0 not in group (block 0)! [ 1573.591091] EXT4-fs (loop7): group descriptors corrupted! [ 1573.601651] EXT4-fs (loop5): mounting ext2 file system using the ext4 subsystem [ 1573.602807] EXT4-fs (loop5): bad geometry: block count 128 exceeds size of device (68 blocks) 03:59:32 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="1000000040000000030000002b00000005000000010000000000000000000000002000000020000010000000000000009f09c75f0000ffff53ef", 0x3a, 0x400}, {&(0x7f0000010080)="000000000000000000000000ede2de4df49d4f87b54a3176cfd4eb4f010040000c000000000000009f09c75f", 0x2c, 0x4e0}, {&(0x7f0000010100), 0x0, 0x7e0}, {&(0x7f0000010ce0)="00000000000000000000000000000000000000000000000000000000c99b0000ed410000000400009f09c75f9f09c75f9f09c75f00000000000003000200000000000800000000000af3010004000000000000000000000001", 0x59, 0x8c60}], 0x0, &(0x7f0000010f60)) [ 1573.610032] EXT4-fs (loop4): VFS: Can't find ext4 filesystem [ 1573.620079] EXT4-fs (loop6): ext4_check_descriptors: Inode bitmap for group 0 not in group (block 0)! [ 1573.621538] EXT4-fs (loop6): group descriptors corrupted! [ 1573.626726] EXT4-fs (loop0): ext4_check_descriptors: Block bitmap for group 0 not in group (block 0)! [ 1573.628188] EXT4-fs (loop0): group descriptors corrupted! [ 1573.735014] loop1: detected capacity change from 0 to 140 [ 1573.769565] EXT4-fs (loop1): ext4_check_descriptors: Block bitmap for group 0 not in group (block 0)! [ 1573.771043] EXT4-fs (loop1): group descriptors corrupted! 03:59:40 executing program 2: sendmsg$NL80211_CMD_UNEXPECTED_FRAME(0xffffffffffffffff, &(0x7f0000000400)={0x0, 0x0, &(0x7f0000000300)={&(0x7f00000002c0)={0x1c, 0x0, 0x1, 0x0, 0x0, {{}, {@val={0x8}, @void}}}, 0x1c}}, 0x0) sendmsg$NL80211_CMD_UPDATE_FT_IES(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000001c0)={0x24, 0x0, 0x1, 0x70bd2c, 0x0, {{}, {@val={0x8}, @void}}, [@NL80211_ATTR_MDID={0x6, 0xb1, 0xc116}]}, 0x24}, 0x1, 0x0, 0x0, 0x80}, 0xc000) r0 = creat(&(0x7f00000003c0)='./file1\x00', 0x0) sendmsg$netlink(0xffffffffffffffff, 0x0, 0x0) dup(0xffffffffffffffff) pwritev2(r0, &(0x7f0000000380)=[{&(0x7f0000000180)="bd", 0xfffffdef}], 0x1, 0x1200, 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) ioctl$FS_IOC_FSSETXATTR(r1, 0x401c5820, &(0x7f0000000200)={0x9}) syz_io_uring_setup(0x0, &(0x7f0000000000)={0x0, 0x0, 0x4, 0x2, 0x309}, &(0x7f0000ffc000/0x2000)=nil, &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000000080), &(0x7f0000000240)) syz_io_uring_submit(0x0, 0x0, &(0x7f0000000280)=@IORING_OP_ASYNC_CANCEL={0xe, 0x3, 0x0, 0x0, 0x0, 0x12345}, 0x1ff) 03:59:40 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="1000000040000000030000002b00000005000000010000000000000000000000002000000020000010000000000000009f09c75f0000ffff53ef", 0x3a, 0x400}, {&(0x7f0000010080)="000000000000000000000000ede2de4df49d4f87b54a3176cfd4eb4f010040000c000000000000009f09c75f", 0x2c, 0x4e0}, {&(0x7f0000010100), 0x0, 0x7e0}, {&(0x7f0000010ce0)="00000000000000000000000000000000000000000000000000000000c99b0000ed410000000400009f09c75f9f09c75f9f09c75f00000000000003000200000000000800000000000af3010004000000000000000000000001", 0x59, 0x8c60}], 0x0, &(0x7f0000010f60)) 03:59:40 executing program 3: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="1000000040000000030000002b00000005000000010000000000000000000000002000000020000010000000000000009f09c75f0000ffff53ef", 0x3a, 0x400}, {&(0x7f0000010080)="000000000000000000000000ede2de4df49d4f87b54a3176cfd4eb4f010040000c000000000000009f09c75f", 0x2c, 0x4e0}, {&(0x7f00000100c0)="01000000000000000000000000000000000000000401000012", 0x19, 0x560}, {&(0x7f0000010100), 0x0, 0x7e0}, {&(0x7f0000010ce0)="00000000000000000000000000000000000000000000000000000000c99b0000ed410000000400009f09c75f9f09c75f9f09c75f00000000000003000200000000000800000000000af301000400000000000000000000000100000004", 0x5d, 0x8c60}], 0x0, &(0x7f0000010f60)) getdents64(r0, &(0x7f0000000040)=""/4, 0x4) 03:59:40 executing program 5: creat(&(0x7f00000003c0)='./file0\x00', 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext2\x00', &(0x7f0000000100)='./file0\x00', 0x11d0c, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}], 0x0, &(0x7f0000013c00)=ANY=[]) 03:59:40 executing program 7: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="1000000040000000030000002b00000005000000010000000000000000000000002000000020000010000000000000009f09c75f0000ffff53ef", 0x3a, 0x400}, {&(0x7f0000010080)="000000000000000000000000ede2de4df49d4f87b54a3176cfd4eb4f010040000c000000000000009f09c75f", 0x2c, 0x4e0}, {&(0x7f00000100c0)="01000000000000000000000000000000000000000401000012", 0x19, 0x560}, {&(0x7f00000100e0)="00000000000000000000000000000000000000000104", 0x16, 0x640}, {&(0x7f0000010100)="000000000000000000000000000000000000000000000000000000005178aedb030000001300000023", 0x29}, {&(0x7f0000010ce0)="00000000000000000000000000000000000000000000000000000000c99b0000ed410000000400009f09c75f9f09c75f9f09c75f00000000000003000200000000000800000000000af301000400000000000000000000000100000004", 0x5d, 0x8c60}], 0x0, &(0x7f0000010f60)) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) getdents64(r0, &(0x7f0000000040)=""/4, 0x4) 03:59:40 executing program 6: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="1000000040000000030000002b00000005000000010000000000000000000000002000000020000010000000000000009f09c75f0000ffff53ef", 0x3a, 0x400}, {&(0x7f0000010080)="000000000000000000000000ede2de4df49d4f87b54a3176cfd4eb4f010040000c000000000000009f09c75f", 0x2c, 0x4e0}, {&(0x7f00000100c0)="01000000000000000000000000000000000000000401000012", 0x19, 0x560}, {&(0x7f00000100e0)="00000000000000000000000000000000000000000104", 0x16, 0x640}, {&(0x7f0000010100)="000000000000000000000000000000000000000000000000000000005178aedb03000000", 0x24, 0x7e0}, {&(0x7f0000010ce0)="00000000000000000000000000000000000000000000000000000000c99b0000ed410000000400009f09c75f9f09c75f9f09c75f00000000000003000200000000000800000000000af301000400000000000000000000000100000004", 0x5d, 0x8c60}], 0x0, &(0x7f0000010f60)) getdents64(r0, &(0x7f0000000040)=""/4, 0x4) 03:59:40 executing program 4: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="1000000040000000030000002b00000005000000010000000000000000000000002000000020000010000000000000009f09c75f0000ffff53ef", 0x3a}, {&(0x7f0000010100)="000000000000000000000000000000000000000000000000000000005178aedb0300000013000000230000002b0005", 0x2f, 0x7e0}, {&(0x7f0000010160)="ffff05000c000080ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff020000000c0001022e000000020000000c0002022e2e00000b000000dc03", 0x41e, 0xc00}, {&(0x7f00000105a0)='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\f', 0x19, 0x13e0}, {&(0x7f00000108c0)="ff07", 0x2, 0x4c00}, {&(0x7f0000010ce0)="00000000000000000000000000000000000000000000000000000000c99b0000ed410000000400009f09c75f9f09c75f9f09c75f00000000000003000200000000000800000000000af301000400000000000000000000000100000004", 0x5d, 0x8c60}], 0x0, &(0x7f0000010f60)) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) getdents64(r0, &(0x7f0000000040)=""/4, 0x4) 03:59:40 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="1000000040000000030000002b00000005000000010000000000000000000000002000000020000010000000000000009f09c75f0000ffff53ef", 0x3a, 0x400}, {&(0x7f0000010080)="000000000000000000000000ede2de4df49d4f87b54a3176cfd4eb4f010040000c000000000000009f09c75f", 0x2c, 0x4e0}, {&(0x7f00000100c0)="01000000000000000000000000000000000000000401000012", 0x19, 0x560}, {&(0x7f00000100e0)="00000000000000000000000000000000000000000104", 0x16, 0x640}, {&(0x7f0000010ce0)="00000000000000000000000000000000000000000000000000000000c99b0000ed410000000400009f09c75f9f09c75f9f09c75f00000000000003000200000000000800000000000af3010004", 0x4d, 0x8c60}], 0x0, &(0x7f0000010f60)) [ 1581.923118] loop7: detected capacity change from 0 to 140 [ 1581.924165] loop1: detected capacity change from 0 to 140 [ 1581.928964] loop4: detected capacity change from 0 to 140 [ 1581.933925] EXT4-fs (loop1): ext4_check_descriptors: Block bitmap for group 0 not in group (block 0)! [ 1581.934696] EXT4-fs (loop1): group descriptors corrupted! [ 1581.936077] EXT4-fs (loop7): ext4_check_descriptors: Block bitmap for group 0 not in group (block 0)! [ 1581.936808] EXT4-fs (loop7): group descriptors corrupted! [ 1581.944470] EXT4-fs (loop4): VFS: Can't find ext4 filesystem [ 1581.972486] loop5: detected capacity change from 0 to 272 [ 1581.979775] loop3: detected capacity change from 0 to 140 03:59:40 executing program 7: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="1000000040000000030000002b00000005000000010000000000000000000000002000000020000010000000000000009f09c75f0000ffff53ef", 0x3a, 0x400}, {&(0x7f0000010080)="000000000000000000000000ede2de4df49d4f87b54a3176cfd4eb4f010040000c000000000000009f09c75f", 0x2c, 0x4e0}, {&(0x7f00000100c0)="01000000000000000000000000000000000000000401000012", 0x19, 0x560}, {&(0x7f00000100e0)="00000000000000000000000000000000000000000104", 0x16, 0x640}, {&(0x7f0000010100)="000000000000000000000000000000000000000000000000000000005178aedb030000001300000023", 0x29}, {&(0x7f0000010ce0)="00000000000000000000000000000000000000000000000000000000c99b0000ed410000000400009f09c75f9f09c75f9f09c75f00000000000003000200000000000800000000000af301000400000000000000000000000100000004", 0x5d, 0x8c60}], 0x0, &(0x7f0000010f60)) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) getdents64(r0, &(0x7f0000000040)=""/4, 0x4) [ 1581.982467] loop0: detected capacity change from 0 to 140 03:59:40 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="1000000040000000030000002b00000005000000010000000000000000000000002000000020000010000000000000009f09c75f0000ffff53ef", 0x3a, 0x400}, {&(0x7f0000010080)="000000000000000000000000ede2de4df49d4f87b54a3176cfd4eb4f010040000c000000000000009f09c75f", 0x2c, 0x4e0}, {&(0x7f0000010100), 0x0, 0x7e0}, {&(0x7f0000010ce0)="00000000000000000000000000000000000000000000000000000000c99b0000ed410000000400009f09c75f9f09c75f9f09c75f00000000000003000200000000000800000000000af3010004000000000000000000000001", 0x59, 0x8c60}], 0x0, &(0x7f0000010f60)) [ 1581.989844] loop6: detected capacity change from 0 to 140 [ 1581.990605] EXT4-fs (loop5): mounting ext2 file system using the ext4 subsystem [ 1581.991348] EXT4-fs (loop5): bad geometry: block count 128 exceeds size of device (68 blocks) [ 1581.994793] EXT4-fs (loop3): ext4_check_descriptors: Block bitmap for group 0 not in group (block 0)! [ 1581.996363] EXT4-fs (loop3): group descriptors corrupted! [ 1581.998500] EXT4-fs (loop0): ext4_check_descriptors: Block bitmap for group 0 not in group (block 0)! [ 1582.000060] EXT4-fs (loop0): group descriptors corrupted! [ 1582.009197] EXT4-fs (loop6): ext4_check_descriptors: Inode bitmap for group 0 not in group (block 0)! [ 1582.010098] EXT4-fs (loop6): group descriptors corrupted! 03:59:40 executing program 4: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="1000000040000000030000002b00000005000000010000000000000000000000002000000020000010000000000000009f09c75f0000ffff53ef", 0x3a, 0x400}, {&(0x7f0000010100)="000000000000000000000000000000000000000000000000000000005178aedb0300000013000000230000002b0005", 0x2f, 0x7e0}, {&(0x7f0000010160)="ffff05000c000080ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff020000000c0001022e000000020000000c0002022e2e00000b000000dc03", 0x41e, 0xc00}, {&(0x7f00000105a0)='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\f', 0x19, 0x13e0}, {&(0x7f00000108c0)="ff07", 0x2, 0x4c00}, {&(0x7f0000010ce0)="00000000000000000000000000000000000000000000000000000000c99b0000ed410000000400009f09c75f9f09c75f9f09c75f00000000000003000200000000000800000000000af301000400000000000000000000000100000004", 0x5d, 0x8c60}], 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) getdents64(r0, &(0x7f0000000040)=""/4, 0x4) [ 1582.024685] loop1: detected capacity change from 0 to 140 [ 1582.029556] EXT4-fs (loop1): ext4_check_descriptors: Block bitmap for group 0 not in group (block 0)! [ 1582.030384] EXT4-fs (loop1): group descriptors corrupted! [ 1582.054820] loop7: detected capacity change from 0 to 140 [ 1582.063134] EXT4-fs (loop7): ext4_check_descriptors: Block bitmap for group 0 not in group (block 0)! [ 1582.063879] EXT4-fs (loop7): group descriptors corrupted! 03:59:40 executing program 6: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="1000000040000000030000002b00000005000000010000000000000000000000002000000020000010000000000000009f09c75f0000ffff53ef", 0x3a, 0x400}, {&(0x7f0000010080)="000000000000000000000000ede2de4df49d4f87b54a3176cfd4eb4f010040000c000000000000009f09c75f", 0x2c, 0x4e0}, {&(0x7f00000100c0)="01000000000000000000000000000000000000000401000012", 0x19, 0x560}, {&(0x7f00000100e0)="00000000000000000000000000000000000000000104", 0x16, 0x640}, {&(0x7f0000010100)="000000000000000000000000000000000000000000000000000000005178aedb03000000130000", 0x27, 0x7e0}, {&(0x7f0000010ce0)="00000000000000000000000000000000000000000000000000000000c99b0000ed410000000400009f09c75f9f09c75f9f09c75f00000000000003000200000000000800000000000af301000400000000000000000000000100000004", 0x5d, 0x8c60}], 0x0, &(0x7f0000010f60)) getdents64(r0, &(0x7f0000000040)=""/4, 0x4) 03:59:40 executing program 5: creat(&(0x7f00000003c0)='./file0\x00', 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext2\x00', &(0x7f0000000100)='./file0\x00', 0x20000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}], 0x0, &(0x7f0000013c00)=ANY=[]) 03:59:40 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="1000000040000000030000002b00000005000000010000000000000000000000002000000020000010000000000000009f09c75f0000ffff53ef", 0x3a, 0x400}, {&(0x7f0000010080)="000000000000000000000000ede2de4df49d4f87b54a3176cfd4eb4f010040000c000000000000009f09c75f", 0x2c, 0x4e0}, {&(0x7f0000010100)='\x00'/21, 0x15, 0x7e0}, {&(0x7f0000010ce0)="00000000000000000000000000000000000000000000000000000000c99b0000ed410000000400009f09c75f9f09c75f9f09c75f00000000000003000200000000000800000000000af3010004000000000000000000000001", 0x59, 0x8c60}], 0x0, &(0x7f0000010f60)) 03:59:41 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="1000000040000000030000002b00000005000000010000000000000000000000002000000020000010000000000000009f09c75f0000ffff53ef", 0x3a, 0x400}, {&(0x7f0000010080)="000000000000000000000000ede2de4df49d4f87b54a3176cfd4eb4f010040000c000000000000009f09c75f", 0x2c, 0x4e0}, {&(0x7f00000100c0)="01000000000000000000000000000000000000000401000012", 0x19, 0x560}, {&(0x7f00000100e0)="00000000000000000000000000000000000000000104", 0x16, 0x640}, {&(0x7f0000010ce0)="00000000000000000000000000000000000000000000000000000000c99b0000ed410000000400009f09c75f9f09c75f9f09c75f00000000000003000200000000000800000000000af3010004", 0x4d, 0x8c60}], 0x0, &(0x7f0000010f60)) 03:59:41 executing program 3: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="1000000040000000030000002b00000005000000010000000000000000000000002000000020000010000000000000009f09c75f0000ffff53ef", 0x3a, 0x400}, {&(0x7f0000010080)="000000000000000000000000ede2de4df49d4f87b54a3176cfd4eb4f010040000c000000000000009f09c75f", 0x2c, 0x4e0}, {&(0x7f00000100c0)="01000000000000000000000000000000000000000401000012", 0x19, 0x560}, {&(0x7f0000010100)='\x00'/21, 0x15, 0x7e0}, {&(0x7f0000010ce0)="00000000000000000000000000000000000000000000000000000000c99b0000ed410000000400009f09c75f9f09c75f9f09c75f00000000000003000200000000000800000000000af301000400000000000000000000000100000004", 0x5d, 0x8c60}], 0x0, &(0x7f0000010f60)) getdents64(r0, &(0x7f0000000040)=""/4, 0x4) [ 1582.120379] loop1: detected capacity change from 0 to 140 [ 1582.130908] loop5: detected capacity change from 0 to 272 [ 1582.133873] EXT4-fs (loop1): ext4_check_descriptors: Block bitmap for group 0 not in group (block 0)! [ 1582.135863] EXT4-fs (loop1): group descriptors corrupted! [ 1582.144071] EXT4-fs (loop5): mounting ext2 file system using the ext4 subsystem [ 1582.144678] EXT4-fs (loop5): bad geometry: block count 128 exceeds size of device (68 blocks) [ 1582.162090] loop4: detected capacity change from 0 to 140 [ 1582.170709] loop6: detected capacity change from 0 to 140 [ 1582.191288] EXT4-fs (loop6): ext4_check_descriptors: Inode table for group 0 not in group (block 0)! [ 1582.192720] EXT4-fs (loop6): group descriptors corrupted! [ 1582.212102] loop0: detected capacity change from 0 to 140 [ 1582.223495] loop3: detected capacity change from 0 to 140 [ 1582.225604] EXT4-fs (loop0): ext4_check_descriptors: Block bitmap for group 0 not in group (block 0)! [ 1582.227045] EXT4-fs (loop0): group descriptors corrupted! [ 1582.242350] EXT4-fs (loop3): ext4_check_descriptors: Block bitmap for group 0 not in group (block 0)! [ 1582.243119] EXT4-fs (loop3): group descriptors corrupted! 03:59:51 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="1000000040000000030000002b00000005000000010000000000000000000000002000000020000010000000000000009f09c75f0000ffff53ef", 0x3a, 0x400}, {&(0x7f0000010080)="000000000000000000000000ede2de4df49d4f87b54a3176cfd4eb4f010040000c000000000000009f09c75f", 0x2c, 0x4e0}, {&(0x7f0000010100)='\x00'/21, 0x15, 0x7e0}, {&(0x7f0000010ce0)="00000000000000000000000000000000000000000000000000000000c99b0000ed410000000400009f09c75f9f09c75f9f09c75f00000000000003000200000000000800000000000af3010004000000000000000000000001", 0x59, 0x8c60}], 0x0, &(0x7f0000010f60)) 03:59:51 executing program 5: creat(&(0x7f00000003c0)='./file0\x00', 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext2\x00', &(0x7f0000000100)='./file0\x00', 0x30000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}], 0x0, &(0x7f0000013c00)=ANY=[]) 03:59:51 executing program 2: sendmsg$NL80211_CMD_UNEXPECTED_FRAME(0xffffffffffffffff, &(0x7f0000000400)={0x0, 0x0, &(0x7f0000000300)={&(0x7f00000002c0)={0x1c, 0x0, 0x1, 0x0, 0x0, {{}, {@val={0x8}, @void}}}, 0x1c}}, 0x0) sendmsg$NL80211_CMD_UPDATE_FT_IES(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000001c0)={0x24, 0x0, 0x1, 0x70bd2c, 0x0, {{}, {@val={0x8}, @void}}, [@NL80211_ATTR_MDID={0x6, 0xb1, 0xc116}]}, 0x24}, 0x1, 0x0, 0x0, 0x80}, 0xc000) r0 = creat(&(0x7f00000003c0)='./file1\x00', 0x0) sendmsg$netlink(0xffffffffffffffff, 0x0, 0x0) dup(0xffffffffffffffff) pwritev2(r0, &(0x7f0000000380)=[{&(0x7f0000000180)="bd", 0xfffffdef}], 0x1, 0x1200, 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) ioctl$FS_IOC_FSSETXATTR(r1, 0x401c5820, &(0x7f0000000200)={0x9}) syz_io_uring_setup(0x0, &(0x7f0000000000)={0x0, 0x0, 0x4, 0x2, 0x309}, &(0x7f0000ffc000/0x2000)=nil, &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000000080), &(0x7f0000000240)) syz_io_uring_submit(0x0, 0x0, &(0x7f0000000280)=@IORING_OP_ASYNC_CANCEL={0xe, 0x3, 0x0, 0x0, 0x0, 0x12345}, 0x1ff) 03:59:51 executing program 3: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="1000000040000000030000002b00000005000000010000000000000000000000002000000020000010000000000000009f09c75f0000ffff53ef", 0x3a, 0x400}, {&(0x7f0000010080)="000000000000000000000000ede2de4df49d4f87b54a3176cfd4eb4f010040000c000000000000009f09c75f", 0x2c, 0x4e0}, {&(0x7f00000100c0)="01000000000000000000000000000000000000000401000012", 0x19, 0x560}, {&(0x7f0000010100)='\x00'/21, 0x15, 0x7e0}, {&(0x7f0000010ce0)="00000000000000000000000000000000000000000000000000000000c99b0000ed410000000400009f09c75f9f09c75f9f09c75f00000000000003000200000000000800000000000af301000400000000000000000000000100000004", 0x5d, 0x8c60}], 0x0, &(0x7f0000010f60)) getdents64(r0, &(0x7f0000000040)=""/4, 0x4) 03:59:51 executing program 4: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="1000000040000000030000002b00000005000000010000000000000000000000002000000020000010000000000000009f09c75f0000ffff53ef", 0x3a, 0x400}, {&(0x7f0000010100)="000000000000000000000000000000000000000000000000000000005178aedb0300000013000000230000002b0005", 0x2f, 0x7e0}, {&(0x7f0000010160)="ffff05000c000080ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff020000000c0001022e000000020000000c0002022e2e00000b000000dc03", 0x41e, 0xc00}, {&(0x7f00000105a0)='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\f', 0x19, 0x13e0}, {&(0x7f00000108c0)="ff07", 0x2, 0x4c00}, {&(0x7f0000010ce0)="00000000000000000000000000000000000000000000000000000000c99b0000ed410000000400009f09c75f9f09c75f9f09c75f00000000000003000200000000000800000000000af301000400000000000000000000000100000004", 0x5d, 0x8c60}], 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) getdents64(r0, &(0x7f0000000040)=""/4, 0x4) 03:59:51 executing program 6: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="1000000040000000030000002b00000005000000010000000000000000000000002000000020000010000000000000009f09c75f0000ffff53ef", 0x3a, 0x400}, {&(0x7f0000010080)="000000000000000000000000ede2de4df49d4f87b54a3176cfd4eb4f010040000c000000000000009f09c75f", 0x2c, 0x4e0}, {&(0x7f00000100c0)="01000000000000000000000000000000000000000401000012", 0x19, 0x560}, {&(0x7f00000100e0)="00000000000000000000000000000000000000000104", 0x16, 0x640}, {&(0x7f0000010100)="000000000000000000000000000000000000000000000000000000005178aedb03000000130000", 0x27, 0x7e0}, {&(0x7f0000010ce0)="00000000000000000000000000000000000000000000000000000000c99b0000ed410000000400009f09c75f9f09c75f9f09c75f00000000000003000200000000000800000000000af301000400000000000000000000000100000004", 0x5d, 0x8c60}], 0x0, &(0x7f0000010f60)) getdents64(r0, &(0x7f0000000040)=""/4, 0x4) 03:59:51 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="1000000040000000030000002b00000005000000010000000000000000000000002000000020000010000000000000009f09c75f0000ffff53ef", 0x3a, 0x400}, {&(0x7f0000010080)="000000000000000000000000ede2de4df49d4f87b54a3176cfd4eb4f010040000c000000000000009f09c75f", 0x2c, 0x4e0}, {&(0x7f00000100c0)="01000000000000000000000000000000000000000401000012", 0x19, 0x560}, {&(0x7f00000100e0)="00000000000000000000000000000000000000000104", 0x16, 0x640}, {0x0, 0x0, 0x7e0}, {&(0x7f0000010ce0)="00000000000000000000000000000000000000000000000000000000c99b0000ed410000000400009f09c75f9f09c75f9f09c75f00000000000003000200000000000800000000000af3010004", 0x4d, 0x8c60}], 0x0, &(0x7f0000010f60)) 03:59:51 executing program 7: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="1000000040000000030000002b00000005000000010000000000000000000000002000000020000010000000000000009f09c75f0000ffff53ef", 0x3a, 0x400}, {&(0x7f0000010080)="000000000000000000000000ede2de4df49d4f87b54a3176cfd4eb4f010040000c000000000000009f09c75f", 0x2c, 0x4e0}, {&(0x7f00000100c0)="01000000000000000000000000000000000000000401000012", 0x19, 0x560}, {&(0x7f00000100e0)="00000000000000000000000000000000000000000104", 0x16, 0x640}, {&(0x7f0000010100)="000000000000000000000000000000000000000000000000000000005178aedb030000001300000023", 0x29}, {&(0x7f0000010ce0)="00000000000000000000000000000000000000000000000000000000c99b0000ed410000000400009f09c75f9f09c75f9f09c75f00000000000003000200000000000800000000000af301000400000000000000000000000100000004", 0x5d, 0x8c60}], 0x0, &(0x7f0000010f60)) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) getdents64(r0, &(0x7f0000000040)=""/4, 0x4) [ 1593.097379] loop5: detected capacity change from 0 to 384 [ 1593.104412] EXT4-fs (loop5): mounting ext2 file system using the ext4 subsystem [ 1593.105044] EXT4-fs (loop5): bad geometry: block count 128 exceeds size of device (96 blocks) [ 1593.106269] loop1: detected capacity change from 0 to 140 [ 1593.106483] loop7: detected capacity change from 0 to 140 [ 1593.116458] EXT4-fs (loop7): ext4_check_descriptors: Block bitmap for group 0 not in group (block 0)! [ 1593.117229] EXT4-fs (loop7): group descriptors corrupted! [ 1593.118382] loop5: detected capacity change from 0 to 384 [ 1593.134901] loop0: detected capacity change from 0 to 140 [ 1593.146299] EXT4-fs (loop0): ext4_check_descriptors: Block bitmap for group 0 not in group (block 0)! [ 1593.147134] EXT4-fs (loop0): group descriptors corrupted! [ 1593.151931] loop3: detected capacity change from 0 to 140 [ 1593.154801] EXT4-fs (loop1): ext4_check_descriptors: Block bitmap for group 0 not in group (block 0)! [ 1593.156293] EXT4-fs (loop1): group descriptors corrupted! [ 1593.159446] loop6: detected capacity change from 0 to 140 03:59:52 executing program 5: creat(&(0x7f00000003c0)='./file0\x00', 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext2\x00', &(0x7f0000000100)='./file0\x00', 0x40002, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}], 0x0, &(0x7f0000013c00)=ANY=[]) [ 1593.165478] loop4: detected capacity change from 0 to 140 [ 1593.169471] EXT4-fs (loop3): ext4_check_descriptors: Block bitmap for group 0 not in group (block 0)! [ 1593.170972] EXT4-fs (loop3): group descriptors corrupted! [ 1593.175199] EXT4-fs (loop6): ext4_check_descriptors: Inode table for group 0 not in group (block 0)! [ 1593.176815] EXT4-fs (loop6): group descriptors corrupted! 03:59:52 executing program 7: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="1000000040000000030000002b00000005000000010000000000000000000000002000000020000010000000000000009f09c75f0000ffff53ef", 0x3a, 0x400}, {&(0x7f0000010080)="000000000000000000000000ede2de4df49d4f87b54a3176cfd4eb4f010040000c000000000000009f09c75f", 0x2c, 0x4e0}, {&(0x7f00000100c0)="01000000000000000000000000000000000000000401000012", 0x19, 0x560}, {&(0x7f0000010100)="000000000000000000000000000000000000000000000000000000005178aedb030000001300000023", 0x29, 0x7e0}, {&(0x7f0000010ce0)="00000000000000000000000000000000000000000000000000000000c99b0000ed410000000400009f09c75f9f09c75f9f09c75f00000000000003000200000000000800000000000af301000400000000000000000000000100000004", 0x5d, 0x8c60}], 0x0, &(0x7f0000010f60)) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) getdents64(r0, &(0x7f0000000040)=""/4, 0x4) 03:59:52 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="1000000040000000030000002b00000005000000010000000000000000000000002000000020000010000000000000009f09c75f0000ffff53ef", 0x3a, 0x400}, {&(0x7f0000010080)="000000000000000000000000ede2de4df49d4f87b54a3176cfd4eb4f010040000c000000000000009f09c75f", 0x2c, 0x4e0}, {&(0x7f00000100c0)="01000000000000000000000000000000000000000401000012", 0x19, 0x560}, {&(0x7f00000100e0)="00000000000000000000000000000000000000000104", 0x16, 0x640}, {0x0, 0x0, 0x7e0}, {&(0x7f0000010ce0)="00000000000000000000000000000000000000000000000000000000c99b0000ed410000000400009f09c75f9f09c75f9f09c75f00000000000003000200000000000800000000000af3010004", 0x4d, 0x8c60}], 0x0, &(0x7f0000010f60)) [ 1593.232535] loop7: detected capacity change from 0 to 140 03:59:52 executing program 4: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="1000000040000000030000002b00000005000000010000000000000000000000002000000020000010000000000000009f09c75f0000ffff53ef", 0x3a, 0x400}, {&(0x7f0000010100)="000000000000000000000000000000000000000000000000000000005178aedb0300000013000000230000002b0005", 0x2f, 0x7e0}, {&(0x7f0000010160)="ffff05000c000080ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff020000000c0001022e000000020000000c0002022e2e00000b000000dc03", 0x41e, 0xc00}, {&(0x7f00000105a0)='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\f', 0x19, 0x13e0}, {&(0x7f00000108c0)="ff07", 0x2, 0x4c00}, {&(0x7f0000010ce0)="00000000000000000000000000000000000000000000000000000000c99b0000ed410000000400009f09c75f9f09c75f9f09c75f00000000000003000200000000000800000000000af301000400000000000000000000000100000004", 0x5d, 0x8c60}], 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) getdents64(r0, &(0x7f0000000040)=""/4, 0x4) [ 1593.235861] loop5: detected capacity change from 0 to 512 [ 1593.240153] EXT4-fs (loop7): warning: mounting unchecked fs, running e2fsck is recommended [ 1593.246892] EXT4-fs (loop7): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: none. [ 1593.252287] EXT4-fs error (device loop7): ext4_readdir:262: inode #2: block 4: comm syz-executor.7: path /syzkaller-testdir823765038/syzkaller.a3rO6g/307/mnt: bad entry in directory: rec_len is smaller than minimal - offset=0, inode=0, rec_len=0, size=1024 fake=0 [ 1593.275496] EXT4-fs (loop7): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 1593.309296] loop0: detected capacity change from 0 to 140 [ 1593.311181] EXT4-fs (loop5): mounting ext2 file system using the ext4 subsystem 03:59:52 executing program 3: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="1000000040000000030000002b00000005000000010000000000000000000000002000000020000010000000000000009f09c75f0000ffff53ef", 0x3a, 0x400}, {&(0x7f0000010080)="000000000000000000000000ede2de4df49d4f87b54a3176cfd4eb4f010040000c000000000000009f09c75f", 0x2c, 0x4e0}, {&(0x7f00000100c0)="01000000000000000000000000000000000000000401000012", 0x19, 0x560}, {&(0x7f0000010100)='\x00'/21, 0x15, 0x7e0}, {&(0x7f0000010ce0)="00000000000000000000000000000000000000000000000000000000c99b0000ed410000000400009f09c75f9f09c75f9f09c75f00000000000003000200000000000800000000000af301000400000000000000000000000100000004", 0x5d, 0x8c60}], 0x0, &(0x7f0000010f60)) getdents64(r0, &(0x7f0000000040)=""/4, 0x4) 03:59:52 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="1000000040000000030000002b00000005000000010000000000000000000000002000000020000010000000000000009f09c75f0000ffff53ef", 0x3a, 0x400}, {&(0x7f0000010080)="000000000000000000000000ede2de4df49d4f87b54a3176cfd4eb4f010040000c000000000000009f09c75f", 0x2c, 0x4e0}, {&(0x7f0000010100)='\x00'/21, 0x15, 0x7e0}, {&(0x7f0000010ce0)="00000000000000000000000000000000000000000000000000000000c99b0000ed410000000400009f09c75f9f09c75f9f09c75f00000000000003000200000000000800000000000af3010004000000000000000000000001", 0x59, 0x8c60}], 0x0, &(0x7f0000010f60)) 03:59:52 executing program 7: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="1000000040000000030000002b00000005000000010000000000000000000000002000000020000010000000000000009f09c75f0000ffff53ef", 0x3a, 0x400}, {&(0x7f0000010080)="000000000000000000000000ede2de4df49d4f87b54a3176cfd4eb4f010040000c000000000000009f09c75f", 0x2c, 0x4e0}, {&(0x7f00000100c0)="01000000000000000000000000000000000000000401000012", 0x19, 0x560}, {0x0, 0x0, 0x7e0}, {&(0x7f0000010ce0)="00000000000000000000000000000000000000000000000000000000c99b0000ed410000000400009f09c75f9f09c75f9f09c75f00000000000003000200000000000800000000000af301000400000000000000000000000100000004", 0x5d, 0x8c60}], 0x0, &(0x7f0000010f60)) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) getdents64(r0, &(0x7f0000000040)=""/4, 0x4) 03:59:52 executing program 6: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="1000000040000000030000002b00000005000000010000000000000000000000002000000020000010000000000000009f09c75f0000ffff53ef", 0x3a, 0x400}, {&(0x7f0000010080)="000000000000000000000000ede2de4df49d4f87b54a3176cfd4eb4f010040000c000000000000009f09c75f", 0x2c, 0x4e0}, {&(0x7f00000100c0)="01000000000000000000000000000000000000000401000012", 0x19, 0x560}, {&(0x7f00000100e0)="00000000000000000000000000000000000000000104", 0x16, 0x640}, {&(0x7f0000010100)="000000000000000000000000000000000000000000000000000000005178aedb03000000130000", 0x27, 0x7e0}, {&(0x7f0000010ce0)="00000000000000000000000000000000000000000000000000000000c99b0000ed410000000400009f09c75f9f09c75f9f09c75f00000000000003000200000000000800000000000af301000400000000000000000000000100000004", 0x5d, 0x8c60}], 0x0, &(0x7f0000010f60)) getdents64(r0, &(0x7f0000000040)=""/4, 0x4) [ 1593.319431] EXT4-fs (loop0): ext4_check_descriptors: Block bitmap for group 0 not in group (block 0)! [ 1593.320262] EXT4-fs (loop0): group descriptors corrupted! [ 1593.328544] loop1: detected capacity change from 0 to 140 [ 1593.334523] EXT4-fs (loop5): warning: mounting unchecked fs, running e2fsck is recommended [ 1593.342624] loop7: detected capacity change from 0 to 140 [ 1593.342709] EXT4-fs (loop1): ext4_check_descriptors: Block bitmap for group 0 not in group (block 0)! [ 1593.344666] EXT4-fs (loop1): group descriptors corrupted! [ 1593.352188] EXT4-fs (loop5): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: none. [ 1593.387367] EXT4-fs (loop5): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 1593.411677] loop3: detected capacity change from 0 to 140 [ 1593.415884] EXT4-fs (loop3): ext4_check_descriptors: Block bitmap for group 0 not in group (block 0)! [ 1593.416664] EXT4-fs (loop3): group descriptors corrupted! 03:59:52 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="1000000040000000030000002b00000005000000010000000000000000000000002000000020000010000000000000009f09c75f0000ffff53ef", 0x3a, 0x400}, {&(0x7f0000010080)="000000000000000000000000ede2de4df49d4f87b54a3176cfd4eb4f010040000c000000000000009f09c75f", 0x2c, 0x4e0}, {&(0x7f00000100c0)="01000000000000000000000000000000000000000401000012", 0x19, 0x560}, {&(0x7f00000100e0)="00000000000000000000000000000000000000000104", 0x16, 0x640}, {0x0, 0x0, 0x7e0}, {&(0x7f0000010ce0)="00000000000000000000000000000000000000000000000000000000c99b0000ed410000000400009f09c75f9f09c75f9f09c75f00000000000003000200000000000800000000000af3010004", 0x4d, 0x8c60}], 0x0, &(0x7f0000010f60)) 03:59:52 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="1000000040000000030000002b00000005000000010000000000000000000000002000000020000010000000000000009f09c75f0000ffff53ef", 0x3a, 0x400}, {&(0x7f0000010080)="000000000000000000000000ede2de4df49d4f87b54a3176cfd4eb4f010040000c000000000000009f09c75f", 0x2c, 0x4e0}, {&(0x7f0000010100)="000000000000000000000000000000000000000000000000000000005178ae", 0x1f, 0x7e0}, {&(0x7f0000010ce0)="00000000000000000000000000000000000000000000000000000000c99b0000ed410000000400009f09c75f9f09c75f9f09c75f00000000000003000200000000000800000000000af3010004000000000000000000000001", 0x59, 0x8c60}], 0x0, &(0x7f0000010f60)) [ 1593.428163] EXT4-fs (loop7): ext4_check_descriptors: Block bitmap for group 0 not in group (block 0)! [ 1593.428904] EXT4-fs (loop7): group descriptors corrupted! [ 1593.429970] loop6: detected capacity change from 0 to 140 [ 1593.430706] loop5: detected capacity change from 0 to 512 [ 1593.438635] loop4: detected capacity change from 0 to 140 [ 1593.449365] EXT4-fs (loop6): ext4_check_descriptors: Inode table for group 0 not in group (block 0)! [ 1593.450191] EXT4-fs (loop6): group descriptors corrupted! [ 1593.489319] loop1: detected capacity change from 0 to 140 [ 1593.515302] EXT4-fs (loop1): ext4_check_descriptors: Block bitmap for group 0 not in group (block 0)! [ 1593.516090] EXT4-fs (loop1): group descriptors corrupted! [ 1593.523292] loop0: detected capacity change from 0 to 140 [ 1593.525715] EXT4-fs (loop0): ext4_check_descriptors: Block bitmap for group 0 not in group (block 0)! [ 1593.526491] EXT4-fs (loop0): group descriptors corrupted! 04:00:01 executing program 3: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="1000000040000000030000002b00000005000000010000000000000000000000002000000020000010000000000000009f09c75f0000ffff53ef", 0x3a, 0x400}, {&(0x7f0000010080)="000000000000000000000000ede2de4df49d4f87b54a3176cfd4eb4f010040000c000000000000009f09c75f", 0x2c, 0x4e0}, {&(0x7f00000100c0)="01000000000000000000000000000000000000000401000012", 0x19, 0x560}, {&(0x7f0000010100)="000000000000000000000000000000000000000000000000000000005178ae", 0x1f, 0x7e0}, {&(0x7f0000010ce0)="00000000000000000000000000000000000000000000000000000000c99b0000ed410000000400009f09c75f9f09c75f9f09c75f00000000000003000200000000000800000000000af301000400000000000000000000000100000004", 0x5d, 0x8c60}], 0x0, &(0x7f0000010f60)) getdents64(r0, &(0x7f0000000040)=""/4, 0x4) 04:00:01 executing program 7: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="1000000040000000030000002b00000005000000010000000000000000000000002000000020000010000000000000009f09c75f0000ffff53ef", 0x3a, 0x400}, {&(0x7f0000010080)="000000000000000000000000ede2de4df49d4f87b54a3176cfd4eb4f010040000c000000000000009f09c75f", 0x2c, 0x4e0}, {&(0x7f00000100c0)="01000000000000000000000000000000000000000401000012", 0x19, 0x560}, {0x0, 0x0, 0x7e0}, {&(0x7f0000010ce0)="00000000000000000000000000000000000000000000000000000000c99b0000ed410000000400009f09c75f9f09c75f9f09c75f00000000000003000200000000000800000000000af301000400000000000000000000000100000004", 0x5d, 0x8c60}], 0x0, &(0x7f0000010f60)) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) getdents64(r0, &(0x7f0000000040)=""/4, 0x4) 04:00:01 executing program 2: sendmsg$NL80211_CMD_UNEXPECTED_FRAME(0xffffffffffffffff, &(0x7f0000000400)={0x0, 0x0, &(0x7f0000000300)={&(0x7f00000002c0)={0x1c, 0x0, 0x1, 0x0, 0x0, {{}, {@val={0x8}, @void}}}, 0x1c}}, 0x0) sendmsg$NL80211_CMD_UPDATE_FT_IES(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000001c0)={0x24, 0x0, 0x1, 0x70bd2c, 0x0, {{}, {@val={0x8}, @void}}, [@NL80211_ATTR_MDID={0x6, 0xb1, 0xc116}]}, 0x24}, 0x1, 0x0, 0x0, 0x80}, 0xc000) r0 = creat(&(0x7f00000003c0)='./file1\x00', 0x0) sendmsg$netlink(0xffffffffffffffff, 0x0, 0x0) dup(0xffffffffffffffff) pwritev2(r0, &(0x7f0000000380)=[{&(0x7f0000000180)="bd", 0xfffffdef}], 0x1, 0x1200, 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) ioctl$FS_IOC_FSSETXATTR(r1, 0x401c5820, &(0x7f0000000200)={0x9}) syz_io_uring_setup(0x0, &(0x7f0000000000)={0x0, 0x0, 0x4, 0x2, 0x309}, &(0x7f0000ffc000/0x2000)=nil, &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000000080), &(0x7f0000000240)) syz_io_uring_submit(0x0, 0x0, 0x0, 0x1ff) 04:00:01 executing program 4: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="1000000040000000030000002b00000005000000010000000000000000000000002000000020000010000000000000009f09c75f0000ffff53ef", 0x3a, 0x400}, {&(0x7f0000010100)="000000000000000000000000000000000000000000000000000000005178aedb0300000013000000230000002b0005", 0x2f, 0x7e0}, {&(0x7f0000010160)="ffff05000c000080ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff020000000c0001022e000000020000000c0002022e2e00000b000000dc03", 0x41e, 0xc00}, {&(0x7f00000105a0)='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\f', 0x19, 0x13e0}, {&(0x7f00000108c0)="ff07", 0x2, 0x4c00}, {&(0x7f0000010ce0)="00000000000000000000000000000000000000000000000000000000c99b0000ed410000000400009f09c75f9f09c75f9f09c75f00000000000003000200000000000800000000000af301000400000000000000000000000100000004", 0x5d, 0x8c60}], 0x0, &(0x7f0000010f60)) mkdirat(0xffffffffffffff9c, 0x0, 0x0) getdents64(r0, &(0x7f0000000040)=""/4, 0x4) 04:00:01 executing program 6: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="1000000040000000030000002b00000005000000010000000000000000000000002000000020000010000000000000009f09c75f0000ffff53ef", 0x3a, 0x400}, {&(0x7f0000010080)="000000000000000000000000ede2de4df49d4f87b54a3176cfd4eb4f010040000c000000000000009f09c75f", 0x2c, 0x4e0}, {&(0x7f00000100c0)="01000000000000000000000000000000000000000401000012", 0x19, 0x560}, {&(0x7f00000100e0)="00000000000000000000000000000000000000000104", 0x16, 0x640}, {&(0x7f0000010100)="000000000000000000000000000000000000000000000000000000005178aedb0300000013000000", 0x28, 0x7e0}, {&(0x7f0000010ce0)="00000000000000000000000000000000000000000000000000000000c99b0000ed410000000400009f09c75f9f09c75f9f09c75f00000000000003000200000000000800000000000af301000400000000000000000000000100000004", 0x5d, 0x8c60}], 0x0, &(0x7f0000010f60)) getdents64(r0, &(0x7f0000000040)=""/4, 0x4) 04:00:01 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="1000000040000000030000002b00000005000000010000000000000000000000002000000020000010000000000000009f09c75f0000ffff53ef", 0x3a, 0x400}, {&(0x7f0000010080)="000000000000000000000000ede2de4df49d4f87b54a3176cfd4eb4f010040000c000000000000009f09c75f", 0x2c, 0x4e0}, {&(0x7f0000010100)="000000000000000000000000000000000000000000000000000000005178ae", 0x1f, 0x7e0}, {&(0x7f0000010ce0)="00000000000000000000000000000000000000000000000000000000c99b0000ed410000000400009f09c75f9f09c75f9f09c75f00000000000003000200000000000800000000000af3010004000000000000000000000001", 0x59, 0x8c60}], 0x0, &(0x7f0000010f60)) 04:00:01 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="1000000040000000030000002b00000005000000010000000000000000000000002000000020000010000000000000009f09c75f0000ffff53ef", 0x3a, 0x400}, {&(0x7f0000010080)="000000000000000000000000ede2de4df49d4f87b54a3176cfd4eb4f010040000c000000000000009f09c75f", 0x2c, 0x4e0}, {&(0x7f00000100c0)="01000000000000000000000000000000000000000401000012", 0x19, 0x560}, {&(0x7f00000100e0)="00000000000000000000000000000000000000000104", 0x16, 0x640}, {&(0x7f0000010100), 0x0, 0x7e0}, {&(0x7f0000010ce0)="00000000000000000000000000000000000000000000000000000000c99b0000ed410000000400009f09c75f9f09c75f9f09c75f00000000000003000200000000000800000000000af3010004", 0x4d, 0x8c60}], 0x0, &(0x7f0000010f60)) 04:00:01 executing program 5: creat(&(0x7f00000003c0)='./file0\x00', 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext2\x00', &(0x7f0000000100)='./file0\x00', 0x40003, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}], 0x0, &(0x7f0000013c00)=ANY=[]) [ 1602.241834] loop4: detected capacity change from 0 to 140 [ 1602.259118] EXT4-fs (loop4): warning: mounting unchecked fs, running e2fsck is recommended [ 1602.262557] loop5: detected capacity change from 0 to 512 [ 1602.266300] EXT4-fs (loop4): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: none. [ 1602.268609] EXT4-fs (loop5): mounting ext2 file system using the ext4 subsystem [ 1602.277156] EXT4-fs (loop5): warning: mounting unchecked fs, running e2fsck is recommended [ 1602.283800] EXT4-fs (loop5): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: none. [ 1602.291523] EXT4-fs (loop5): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 1602.314473] EXT4-fs (loop4): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 1602.325696] loop3: detected capacity change from 0 to 140 04:00:01 executing program 4: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="1000000040000000030000002b00000005000000010000000000000000000000002000000020000010000000000000009f09c75f0000ffff53ef", 0x3a, 0x400}, {&(0x7f0000010100)="000000000000000000000000000000000000000000000000000000005178aedb0300000013000000230000002b0005", 0x2f, 0x7e0}, {&(0x7f0000010160)="ffff05000c000080ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff020000000c0001022e000000020000000c0002022e2e00000b000000dc03", 0x41e, 0xc00}, {&(0x7f00000105a0)='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\f', 0x19, 0x13e0}, {&(0x7f00000108c0)="ff07", 0x2, 0x4c00}, {&(0x7f0000010ce0)="00000000000000000000000000000000000000000000000000000000c99b0000ed410000000400009f09c75f9f09c75f9f09c75f00000000000003000200000000000800000000000af301000400000000000000000000000100000004", 0x5d, 0x8c60}], 0x0, &(0x7f0000010f60)) mkdirat(0xffffffffffffff9c, 0x0, 0x0) getdents64(r0, &(0x7f0000000040)=""/4, 0x4) [ 1602.327270] loop0: detected capacity change from 0 to 140 [ 1602.333647] loop7: detected capacity change from 0 to 140 [ 1602.340718] loop1: detected capacity change from 0 to 140 04:00:01 executing program 5: creat(&(0x7f00000003c0)='./file0\x00', 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext2\x00', &(0x7f0000000100)='./file0\x00', 0x40004, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}], 0x0, &(0x7f0000013c00)=ANY=[]) [ 1602.349699] loop6: detected capacity change from 0 to 140 [ 1602.353343] EXT4-fs (loop0): ext4_check_descriptors: Block bitmap for group 0 not in group (block 0)! [ 1602.354560] EXT4-fs (loop0): group descriptors corrupted! [ 1602.356009] EXT4-fs (loop7): ext4_check_descriptors: Block bitmap for group 0 not in group (block 0)! [ 1602.357195] EXT4-fs (loop3): ext4_check_descriptors: Block bitmap for group 0 not in group (block 0)! [ 1602.357570] EXT4-fs (loop7): group descriptors corrupted! [ 1602.358185] EXT4-fs (loop3): group descriptors corrupted! [ 1602.361104] EXT4-fs (loop1): ext4_check_descriptors: Block bitmap for group 0 not in group (block 0)! [ 1602.361865] EXT4-fs (loop1): group descriptors corrupted! [ 1602.371588] EXT4-fs (loop6): ext4_check_descriptors: Inode table for group 0 not in group (block 0)! [ 1602.373026] EXT4-fs (loop6): group descriptors corrupted! [ 1602.385556] loop4: detected capacity change from 0 to 140 [ 1602.399650] EXT4-fs (loop4): warning: mounting unchecked fs, running e2fsck is recommended [ 1602.414331] EXT4-fs (loop4): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: none. 04:00:01 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="1000000040000000030000002b00000005000000010000000000000000000000002000000020000010000000000000009f09c75f0000ffff53ef", 0x3a, 0x400}, {&(0x7f0000010080)="000000000000000000000000ede2de4df49d4f87b54a3176cfd4eb4f010040000c000000000000009f09c75f", 0x2c, 0x4e0}, {&(0x7f00000100c0)="01000000000000000000000000000000000000000401000012", 0x19, 0x560}, {&(0x7f00000100e0)="00000000000000000000000000000000000000000104", 0x16, 0x640}, {&(0x7f0000010100), 0x0, 0x7e0}, {&(0x7f0000010ce0)="00000000000000000000000000000000000000000000000000000000c99b0000ed410000000400009f09c75f9f09c75f9f09c75f00000000000003000200000000000800000000000af3010004", 0x4d, 0x8c60}], 0x0, &(0x7f0000010f60)) 04:00:01 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="1000000040000000030000002b00000005000000010000000000000000000000002000000020000010000000000000009f09c75f0000ffff53ef", 0x3a, 0x400}, {&(0x7f0000010080)="000000000000000000000000ede2de4df49d4f87b54a3176cfd4eb4f010040000c000000000000009f09c75f", 0x2c, 0x4e0}, {&(0x7f0000010100)="000000000000000000000000000000000000000000000000000000005178ae", 0x1f, 0x7e0}, {&(0x7f0000010ce0)="00000000000000000000000000000000000000000000000000000000c99b0000ed410000000400009f09c75f9f09c75f9f09c75f00000000000003000200000000000800000000000af3010004000000000000000000000001", 0x59, 0x8c60}], 0x0, &(0x7f0000010f60)) [ 1602.444892] EXT4-fs (loop4): unmounting filesystem 00000000-0000-0000-0000-000000000000. 04:00:01 executing program 3: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="1000000040000000030000002b00000005000000010000000000000000000000002000000020000010000000000000009f09c75f0000ffff53ef", 0x3a, 0x400}, {&(0x7f0000010080)="000000000000000000000000ede2de4df49d4f87b54a3176cfd4eb4f010040000c000000000000009f09c75f", 0x2c, 0x4e0}, {&(0x7f00000100c0)="01000000000000000000000000000000000000000401000012", 0x19, 0x560}, {&(0x7f0000010100)="000000000000000000000000000000000000000000000000000000005178ae", 0x1f, 0x7e0}, {&(0x7f0000010ce0)="00000000000000000000000000000000000000000000000000000000c99b0000ed410000000400009f09c75f9f09c75f9f09c75f00000000000003000200000000000800000000000af301000400000000000000000000000100000004", 0x5d, 0x8c60}], 0x0, &(0x7f0000010f60)) getdents64(r0, &(0x7f0000000040)=""/4, 0x4) 04:00:01 executing program 4: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="1000000040000000030000002b00000005000000010000000000000000000000002000000020000010000000000000009f09c75f0000ffff53ef", 0x3a, 0x400}, {&(0x7f0000010100)="000000000000000000000000000000000000000000000000000000005178aedb0300000013000000230000002b0005", 0x2f, 0x7e0}, {&(0x7f0000010160)="ffff05000c000080ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff020000000c0001022e000000020000000c0002022e2e00000b000000dc03", 0x41e, 0xc00}, {&(0x7f00000105a0)='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\f', 0x19, 0x13e0}, {&(0x7f00000108c0)="ff07", 0x2, 0x4c00}, {&(0x7f0000010ce0)="00000000000000000000000000000000000000000000000000000000c99b0000ed410000000400009f09c75f9f09c75f9f09c75f00000000000003000200000000000800000000000af301000400000000000000000000000100000004", 0x5d, 0x8c60}], 0x0, &(0x7f0000010f60)) mkdirat(0xffffffffffffff9c, 0x0, 0x0) getdents64(r0, &(0x7f0000000040)=""/4, 0x4) [ 1602.504590] loop5: detected capacity change from 0 to 512 04:00:01 executing program 6: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="1000000040000000030000002b00000005000000010000000000000000000000002000000020000010000000000000009f09c75f0000ffff53ef", 0x3a, 0x400}, {&(0x7f0000010080)="000000000000000000000000ede2de4df49d4f87b54a3176cfd4eb4f010040000c000000000000009f09c75f", 0x2c, 0x4e0}, {&(0x7f00000100c0)="01000000000000000000000000000000000000000401000012", 0x19, 0x560}, {&(0x7f00000100e0)="00000000000000000000000000000000000000000104", 0x16, 0x640}, {&(0x7f0000010100)="000000000000000000000000000000000000000000000000000000005178aedb0300000013000000", 0x28, 0x7e0}, {&(0x7f0000010ce0)="00000000000000000000000000000000000000000000000000000000c99b0000ed410000000400009f09c75f9f09c75f9f09c75f00000000000003000200000000000800000000000af301000400000000000000000000000100000004", 0x5d, 0x8c60}], 0x0, &(0x7f0000010f60)) getdents64(r0, &(0x7f0000000040)=""/4, 0x4) 04:00:01 executing program 7: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="1000000040000000030000002b00000005000000010000000000000000000000002000000020000010000000000000009f09c75f0000ffff53ef", 0x3a, 0x400}, {&(0x7f0000010080)="000000000000000000000000ede2de4df49d4f87b54a3176cfd4eb4f010040000c000000000000009f09c75f", 0x2c, 0x4e0}, {&(0x7f00000100c0)="01000000000000000000000000000000000000000401000012", 0x19, 0x560}, {0x0, 0x0, 0x7e0}, {&(0x7f0000010ce0)="00000000000000000000000000000000000000000000000000000000c99b0000ed410000000400009f09c75f9f09c75f9f09c75f00000000000003000200000000000800000000000af301000400000000000000000000000100000004", 0x5d, 0x8c60}], 0x0, &(0x7f0000010f60)) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) getdents64(r0, &(0x7f0000000040)=""/4, 0x4) [ 1602.527980] EXT4-fs (loop5): mounting ext2 file system using the ext4 subsystem 04:00:01 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="1000000040000000030000002b00000005000000010000000000000000000000002000000020000010000000000000009f09c75f0000ffff53ef", 0x3a, 0x400}, {&(0x7f0000010100)="000000000000000000000000000000000000000000000000000000005178aedb0300000013000000230000002b0005", 0x2f, 0x7e0}, {&(0x7f0000010160)="ffff05000c000080ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff020000000c0001022e000000020000000c0002022e2e00000b000000dc03", 0x41e, 0xc00}, {&(0x7f00000105a0)='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\f', 0x19, 0x13e0}, {&(0x7f00000108c0)="ff07", 0x2, 0x4c00}, {&(0x7f0000010ce0)="00000000000000000000000000000000000000000000000000000000c99b0000ed410000000400009f09c75f9f09c75f9f09c75f00000000000003000200000000000800000000000af301000400000000000000000000000100000004", 0x5d, 0x8c60}], 0x0, &(0x7f0000010f60)) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) getdents64(0xffffffffffffffff, &(0x7f0000000040)=""/4, 0x4) [ 1602.534542] EXT4-fs (loop5): warning: mounting unchecked fs, running e2fsck is recommended [ 1602.552880] EXT4-fs (loop5): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: none. [ 1602.562334] EXT4-fs (loop5): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 1602.584592] loop1: detected capacity change from 0 to 140 [ 1602.589591] loop0: detected capacity change from 0 to 140 [ 1602.593482] loop3: detected capacity change from 0 to 140 [ 1602.605058] EXT4-fs (loop3): ext4_check_descriptors: Block bitmap for group 0 not in group (block 0)! [ 1602.605482] loop4: detected capacity change from 0 to 140 [ 1602.605889] EXT4-fs (loop3): group descriptors corrupted! [ 1602.614137] EXT4-fs (loop0): ext4_check_descriptors: Block bitmap for group 0 not in group (block 0)! [ 1602.616533] EXT4-fs (loop0): group descriptors corrupted! [ 1602.619970] EXT4-fs (loop1): ext4_check_descriptors: Block bitmap for group 0 not in group (block 0)! [ 1602.620765] EXT4-fs (loop1): group descriptors corrupted! [ 1602.623328] loop6: detected capacity change from 0 to 140 [ 1602.641077] EXT4-fs (loop4): warning: mounting unchecked fs, running e2fsck is recommended [ 1602.643577] EXT4-fs (loop6): ext4_check_descriptors: Inode table for group 0 not in group (block 0)! [ 1602.643718] loop7: detected capacity change from 0 to 140 [ 1602.645424] EXT4-fs (loop6): group descriptors corrupted! 04:00:01 executing program 5: creat(&(0x7f00000003c0)='./file0\x00', 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext2\x00', &(0x7f0000000100)='./file0\x00', 0x40005, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}], 0x0, &(0x7f0000013c00)=ANY=[]) [ 1602.663614] EXT4-fs (loop4): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: none. [ 1602.681101] EXT4-fs warning (device loop4): ext4_update_dynamic_rev:1134: updating to rev 1 because of new feature flag, running e2fsck is recommended [ 1602.701020] EXT4-fs (loop7): ext4_check_descriptors: Block bitmap for group 0 not in group (block 0)! [ 1602.701780] EXT4-fs (loop7): group descriptors corrupted! [ 1602.740690] loop5: detected capacity change from 0 to 512 [ 1602.760089] EXT4-fs (loop4): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 1602.762473] EXT4-fs (loop5): mounting ext2 file system using the ext4 subsystem [ 1602.779499] EXT4-fs (loop5): warning: mounting unchecked fs, running e2fsck is recommended [ 1602.797925] EXT4-fs (loop5): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: none. [ 1602.817746] EXT4-fs (loop5): unmounting filesystem 00000000-0000-0000-0000-000000000000. 04:00:10 executing program 6: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="1000000040000000030000002b00000005000000010000000000000000000000002000000020000010000000000000009f09c75f0000ffff53ef", 0x3a, 0x400}, {&(0x7f0000010080)="000000000000000000000000ede2de4df49d4f87b54a3176cfd4eb4f010040000c000000000000009f09c75f", 0x2c, 0x4e0}, {&(0x7f00000100c0)="01000000000000000000000000000000000000000401000012", 0x19, 0x560}, {&(0x7f00000100e0)="00000000000000000000000000000000000000000104", 0x16, 0x640}, {&(0x7f0000010100)="000000000000000000000000000000000000000000000000000000005178aedb0300000013000000", 0x28, 0x7e0}, {&(0x7f0000010ce0)="00000000000000000000000000000000000000000000000000000000c99b0000ed410000000400009f09c75f9f09c75f9f09c75f00000000000003000200000000000800000000000af301000400000000000000000000000100000004", 0x5d, 0x8c60}], 0x0, &(0x7f0000010f60)) getdents64(r0, &(0x7f0000000040)=""/4, 0x4) 04:00:10 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="1000000040000000030000002b00000005000000010000000000000000000000002000000020000010000000000000009f09c75f0000ffff53ef", 0x3a, 0x400}, {&(0x7f0000010080)="000000000000000000000000ede2de4df49d4f87b54a3176cfd4eb4f010040000c000000000000009f09c75f", 0x2c, 0x4e0}, {&(0x7f0000010100)="000000000000000000000000000000000000000000000000000000005178aedb03000000", 0x24, 0x7e0}, {&(0x7f0000010ce0)="00000000000000000000000000000000000000000000000000000000c99b0000ed410000000400009f09c75f9f09c75f9f09c75f00000000000003000200000000000800000000000af3010004000000000000000000000001", 0x59, 0x8c60}], 0x0, &(0x7f0000010f60)) 04:00:10 executing program 3: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="1000000040000000030000002b00000005000000010000000000000000000000002000000020000010000000000000009f09c75f0000ffff53ef", 0x3a, 0x400}, {&(0x7f0000010080)="000000000000000000000000ede2de4df49d4f87b54a3176cfd4eb4f010040000c000000000000009f09c75f", 0x2c, 0x4e0}, {&(0x7f00000100c0)="01000000000000000000000000000000000000000401000012", 0x19, 0x560}, {&(0x7f0000010100)="000000000000000000000000000000000000000000000000000000005178ae", 0x1f, 0x7e0}, {&(0x7f0000010ce0)="00000000000000000000000000000000000000000000000000000000c99b0000ed410000000400009f09c75f9f09c75f9f09c75f00000000000003000200000000000800000000000af301000400000000000000000000000100000004", 0x5d, 0x8c60}], 0x0, &(0x7f0000010f60)) getdents64(r0, &(0x7f0000000040)=""/4, 0x4) 04:00:10 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="1000000040000000030000002b00000005000000010000000000000000000000002000000020000010000000000000009f09c75f0000ffff53ef", 0x3a, 0x400}, {&(0x7f0000010080)="000000000000000000000000ede2de4df49d4f87b54a3176cfd4eb4f010040000c000000000000009f09c75f", 0x2c, 0x4e0}, {&(0x7f00000100c0)="01000000000000000000000000000000000000000401000012", 0x19, 0x560}, {&(0x7f00000100e0)="00000000000000000000000000000000000000000104", 0x16, 0x640}, {&(0x7f0000010100), 0x0, 0x7e0}, {&(0x7f0000010ce0)="00000000000000000000000000000000000000000000000000000000c99b0000ed410000000400009f09c75f9f09c75f9f09c75f00000000000003000200000000000800000000000af3010004", 0x4d, 0x8c60}], 0x0, &(0x7f0000010f60)) 04:00:10 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="1000000040000000030000002b00000005000000010000000000000000000000002000000020000010000000000000009f09c75f0000ffff53ef", 0x3a, 0x400}, {&(0x7f0000010100)="000000000000000000000000000000000000000000000000000000005178aedb0300000013000000230000002b0005", 0x2f, 0x7e0}, {&(0x7f0000010160)="ffff05000c000080ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff020000000c0001022e000000020000000c0002022e2e00000b000000dc03", 0x41e, 0xc00}, {&(0x7f00000105a0)='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\f', 0x19, 0x13e0}, {&(0x7f00000108c0)="ff07", 0x2, 0x4c00}, {&(0x7f0000010ce0)="00000000000000000000000000000000000000000000000000000000c99b0000ed410000000400009f09c75f9f09c75f9f09c75f00000000000003000200000000000800000000000af301000400000000000000000000000100000004", 0x5d, 0x8c60}], 0x0, &(0x7f0000010f60)) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) getdents64(0xffffffffffffffff, &(0x7f0000000040)=""/4, 0x4) 04:00:10 executing program 2: sendmsg$NL80211_CMD_UNEXPECTED_FRAME(0xffffffffffffffff, &(0x7f0000000400)={0x0, 0x0, &(0x7f0000000300)={&(0x7f00000002c0)={0x1c, 0x0, 0x1, 0x0, 0x0, {{}, {@val={0x8}, @void}}}, 0x1c}}, 0x0) sendmsg$NL80211_CMD_UPDATE_FT_IES(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000001c0)={0x24, 0x0, 0x1, 0x70bd2c, 0x0, {{}, {@val={0x8}, @void}}, [@NL80211_ATTR_MDID={0x6, 0xb1, 0xc116}]}, 0x24}, 0x1, 0x0, 0x0, 0x80}, 0xc000) r0 = creat(&(0x7f00000003c0)='./file1\x00', 0x0) sendmsg$netlink(0xffffffffffffffff, 0x0, 0x0) dup(0xffffffffffffffff) pwritev2(r0, &(0x7f0000000380)=[{&(0x7f0000000180)="bd", 0xfffffdef}], 0x1, 0x1200, 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) ioctl$FS_IOC_FSSETXATTR(r1, 0x401c5820, &(0x7f0000000200)={0x9}) syz_io_uring_setup(0x0, &(0x7f0000000000)={0x0, 0x0, 0x4, 0x2, 0x309}, &(0x7f0000ffc000/0x2000)=nil, &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000000080), &(0x7f0000000240)) syz_io_uring_submit(0x0, 0x0, 0x0, 0x1ff) 04:00:10 executing program 5: creat(&(0x7f00000003c0)='./file0\x00', 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext2\x00', &(0x7f0000000100)='./file0\x00', 0x40006, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}], 0x0, &(0x7f0000013c00)=ANY=[]) 04:00:10 executing program 7: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="1000000040000000030000002b00000005000000010000000000000000000000002000000020000010000000000000009f09c75f0000ffff53ef", 0x3a, 0x400}, {&(0x7f0000010080)="000000000000000000000000ede2de4df49d4f87b54a3176cfd4eb4f010040000c000000000000009f09c75f", 0x2c, 0x4e0}, {&(0x7f00000100c0)="01000000000000000000000000000000000000000401000012", 0x19, 0x560}, {&(0x7f0000010100), 0x0, 0x7e0}, {&(0x7f0000010ce0)="00000000000000000000000000000000000000000000000000000000c99b0000ed410000000400009f09c75f9f09c75f9f09c75f00000000000003000200000000000800000000000af301000400000000000000000000000100000004", 0x5d, 0x8c60}], 0x0, &(0x7f0000010f60)) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) getdents64(r0, &(0x7f0000000040)=""/4, 0x4) [ 1611.812988] loop0: detected capacity change from 0 to 140 [ 1611.814826] loop4: detected capacity change from 0 to 140 [ 1611.821600] EXT4-fs (loop0): ext4_check_descriptors: Block bitmap for group 0 not in group (block 0)! [ 1611.822455] EXT4-fs (loop0): group descriptors corrupted! [ 1611.823620] loop6: detected capacity change from 0 to 140 [ 1611.824582] loop3: detected capacity change from 0 to 140 [ 1611.834114] EXT4-fs (loop4): warning: mounting unchecked fs, running e2fsck is recommended [ 1611.835909] EXT4-fs (loop3): ext4_check_descriptors: Block bitmap for group 0 not in group (block 0)! [ 1611.836973] EXT4-fs (loop3): group descriptors corrupted! [ 1611.840384] loop1: detected capacity change from 0 to 140 [ 1611.842170] EXT4-fs (loop6): ext4_check_descriptors: Inode table for group 0 not in group (block 0)! [ 1611.842545] loop5: detected capacity change from 0 to 512 [ 1611.843633] EXT4-fs (loop6): group descriptors corrupted! [ 1611.849854] loop7: detected capacity change from 0 to 140 [ 1611.853842] EXT4-fs (loop4): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: none. [ 1611.857488] EXT4-fs (loop5): mounting ext2 file system using the ext4 subsystem [ 1611.860454] EXT4-fs (loop1): ext4_check_descriptors: Inode bitmap for group 0 not in group (block 0)! [ 1611.861300] EXT4-fs (loop1): group descriptors corrupted! [ 1611.862399] EXT4-fs (loop7): ext4_check_descriptors: Block bitmap for group 0 not in group (block 0)! [ 1611.863828] EXT4-fs (loop7): group descriptors corrupted! [ 1611.865630] EXT4-fs (loop5): warning: mounting unchecked fs, running e2fsck is recommended [ 1611.871783] EXT4-fs warning (device loop4): ext4_update_dynamic_rev:1134: updating to rev 1 because of new feature flag, running e2fsck is recommended [ 1611.877062] EXT4-fs (loop5): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: none. [ 1611.902204] EXT4-fs (loop5): unmounting filesystem 00000000-0000-0000-0000-000000000000. 04:00:10 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="1000000040000000030000002b00000005000000010000000000000000000000002000000020000010000000000000009f09c75f0000ffff53ef", 0x3a, 0x400}, {&(0x7f0000010080)="000000000000000000000000ede2de4df49d4f87b54a3176cfd4eb4f010040000c000000000000009f09c75f", 0x2c, 0x4e0}, {&(0x7f00000100c0)="01000000000000000000000000000000000000000401000012", 0x19, 0x560}, {&(0x7f00000100e0)="00000000000000000000000000000000000000000104", 0x16, 0x640}, {&(0x7f0000010100)="000000000000000000000000000000000000000000000000000000005178aedb0300000013000000230000002b00", 0x2e, 0x7e0}, {&(0x7f0000010ce0)="00000000000000000000000000000000000000000000000000000000c99b0000ed410000000400009f09c75f9f09c75f9f09c75f00000000000003000200000000000800000000000af3010004", 0x4d, 0x8c60}], 0x0, &(0x7f0000010f60)) 04:00:10 executing program 6: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="1000000040000000030000002b00000005000000010000000000000000000000002000000020000010000000000000009f09c75f0000ffff53ef", 0x3a, 0x400}, {&(0x7f0000010080)="000000000000000000000000ede2de4df49d4f87b54a3176cfd4eb4f010040000c000000000000009f09c75f", 0x2c, 0x4e0}, {&(0x7f00000100c0)="01000000000000000000000000000000000000000401000012", 0x19, 0x560}, {&(0x7f00000100e0)="00000000000000000000000000000000000000000104", 0x16, 0x640}, {&(0x7f0000010100)="000000000000000000000000000000000000000000000000000000005178aedb030000001300000023", 0x29}, {&(0x7f0000010ce0)="00000000000000000000000000000000000000000000000000000000c99b0000ed410000000400009f09c75f9f09c75f9f09c75f00000000000003000200000000000800000000000af301000400000000000000000000000100000004", 0x5d, 0x8c60}], 0x0, &(0x7f0000010f60)) getdents64(r0, &(0x7f0000000040)=""/4, 0x4) 04:00:10 executing program 3: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="1000000040000000030000002b00000005000000010000000000000000000000002000000020000010000000000000009f09c75f0000ffff53ef", 0x3a, 0x400}, {&(0x7f0000010080)="000000000000000000000000ede2de4df49d4f87b54a3176cfd4eb4f010040000c000000000000009f09c75f", 0x2c, 0x4e0}, {&(0x7f00000100c0)="01000000000000000000000000000000000000000401000012", 0x19, 0x560}, {&(0x7f0000010100)="000000000000000000000000000000000000000000000000000000005178aedb03000000", 0x24, 0x7e0}, {&(0x7f0000010ce0)="00000000000000000000000000000000000000000000000000000000c99b0000ed410000000400009f09c75f9f09c75f9f09c75f00000000000003000200000000000800000000000af301000400000000000000000000000100000004", 0x5d, 0x8c60}], 0x0, &(0x7f0000010f60)) getdents64(r0, &(0x7f0000000040)=""/4, 0x4) [ 1611.956744] loop3: detected capacity change from 0 to 140 [ 1611.962899] EXT4-fs (loop3): ext4_check_descriptors: Inode bitmap for group 0 not in group (block 0)! [ 1611.964585] EXT4-fs (loop3): group descriptors corrupted! 04:00:10 executing program 7: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="1000000040000000030000002b00000005000000010000000000000000000000002000000020000010000000000000009f09c75f0000ffff53ef", 0x3a, 0x400}, {&(0x7f0000010080)="000000000000000000000000ede2de4df49d4f87b54a3176cfd4eb4f010040000c000000000000009f09c75f", 0x2c, 0x4e0}, {&(0x7f00000100c0)="01000000000000000000000000000000000000000401000012", 0x19, 0x560}, {&(0x7f0000010100), 0x0, 0x7e0}, {&(0x7f0000010ce0)="00000000000000000000000000000000000000000000000000000000c99b0000ed410000000400009f09c75f9f09c75f9f09c75f00000000000003000200000000000800000000000af301000400000000000000000000000100000004", 0x5d, 0x8c60}], 0x0, &(0x7f0000010f60)) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) getdents64(r0, &(0x7f0000000040)=""/4, 0x4) [ 1611.966766] loop6: detected capacity change from 0 to 140 04:00:10 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="1000000040000000030000002b00000005000000010000000000000000000000002000000020000010000000000000009f09c75f0000ffff53ef", 0x3a, 0x400}, {&(0x7f0000010080)="000000000000000000000000ede2de4df49d4f87b54a3176cfd4eb4f010040000c000000000000009f09c75f", 0x2c, 0x4e0}, {&(0x7f0000010100)="000000000000000000000000000000000000000000000000000000005178aedb03000000", 0x24, 0x7e0}, {&(0x7f0000010ce0)="00000000000000000000000000000000000000000000000000000000c99b0000ed410000000400009f09c75f9f09c75f9f09c75f00000000000003000200000000000800000000000af3010004000000000000000000000001", 0x59, 0x8c60}], 0x0, &(0x7f0000010f60)) 04:00:10 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="1000000040000000030000002b00000005000000010000000000000000000000002000000020000010000000000000009f09c75f0000ffff53ef", 0x3a, 0x400}, {&(0x7f0000010100)="000000000000000000000000000000000000000000000000000000005178aedb0300000013000000230000002b0005", 0x2f, 0x7e0}, {&(0x7f0000010160)="ffff05000c000080ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff020000000c0001022e000000020000000c0002022e2e00000b000000dc03", 0x41e, 0xc00}, {&(0x7f00000105a0)='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\f', 0x19, 0x13e0}, {&(0x7f00000108c0)="ff07", 0x2, 0x4c00}, {&(0x7f0000010ce0)="00000000000000000000000000000000000000000000000000000000c99b0000ed410000000400009f09c75f9f09c75f9f09c75f00000000000003000200000000000800000000000af301000400000000000000000000000100000004", 0x5d, 0x8c60}], 0x0, &(0x7f0000010f60)) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) getdents64(0xffffffffffffffff, &(0x7f0000000040)=""/4, 0x4) [ 1611.986985] EXT4-fs (loop6): ext4_check_descriptors: Block bitmap for group 0 not in group (block 0)! [ 1611.987654] EXT4-fs (loop4): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 1611.988400] EXT4-fs (loop6): group descriptors corrupted! 04:00:10 executing program 3: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="1000000040000000030000002b00000005000000010000000000000000000000002000000020000010000000000000009f09c75f0000ffff53ef", 0x3a, 0x400}, {&(0x7f0000010080)="000000000000000000000000ede2de4df49d4f87b54a3176cfd4eb4f010040000c000000000000009f09c75f", 0x2c, 0x4e0}, {&(0x7f00000100c0)="01000000000000000000000000000000000000000401000012", 0x19, 0x560}, {&(0x7f0000010100)="000000000000000000000000000000000000000000000000000000005178aedb03000000", 0x24, 0x7e0}, {&(0x7f0000010ce0)="00000000000000000000000000000000000000000000000000000000c99b0000ed410000000400009f09c75f9f09c75f9f09c75f00000000000003000200000000000800000000000af301000400000000000000000000000100000004", 0x5d, 0x8c60}], 0x0, &(0x7f0000010f60)) getdents64(r0, &(0x7f0000000040)=""/4, 0x4) [ 1612.041456] loop1: detected capacity change from 0 to 140 04:00:10 executing program 5: creat(&(0x7f00000003c0)='./file0\x00', 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext2\x00', &(0x7f0000000100)='./file0\x00', 0x40007, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}], 0x0, &(0x7f0000013c00)=ANY=[]) [ 1612.053423] loop0: detected capacity change from 0 to 140 [ 1612.056241] EXT4-fs (loop1): ext4_check_descriptors: Inode bitmap for group 0 not in group (block 0)! [ 1612.057093] EXT4-fs (loop1): group descriptors corrupted! [ 1612.072274] EXT4-fs error (device loop0): ext4_ext_check_inode:523: inode #2: comm syz-executor.0: pblk 0 bad header/extent: invalid extent entries - magic f30a, entries 1, max 4(4), depth 0(0) [ 1612.075431] loop7: detected capacity change from 0 to 140 [ 1612.079468] loop5: detected capacity change from 0 to 512 [ 1612.082517] EXT4-fs (loop0): get root inode failed [ 1612.082921] EXT4-fs (loop0): mount failed [ 1612.091987] EXT4-fs (loop5): mounting ext2 file system using the ext4 subsystem [ 1612.096568] EXT4-fs (loop7): ext4_check_descriptors: Block bitmap for group 0 not in group (block 0)! [ 1612.098122] EXT4-fs (loop7): group descriptors corrupted! [ 1612.100260] loop3: detected capacity change from 0 to 140 [ 1612.104611] EXT4-fs (loop5): warning: mounting unchecked fs, running e2fsck is recommended [ 1612.119755] EXT4-fs (loop5): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: none. [ 1612.122840] EXT4-fs (loop3): ext4_check_descriptors: Inode bitmap for group 0 not in group (block 0)! [ 1612.123609] EXT4-fs (loop3): group descriptors corrupted! [ 1612.170604] EXT4-fs (loop5): unmounting filesystem 00000000-0000-0000-0000-000000000000. 04:00:19 executing program 6: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="1000000040000000030000002b00000005000000010000000000000000000000002000000020000010000000000000009f09c75f0000ffff53ef", 0x3a, 0x400}, {&(0x7f0000010080)="000000000000000000000000ede2de4df49d4f87b54a3176cfd4eb4f010040000c000000000000009f09c75f", 0x2c, 0x4e0}, {&(0x7f00000100c0)="01000000000000000000000000000000000000000401000012", 0x19, 0x560}, {&(0x7f00000100e0)="00000000000000000000000000000000000000000104", 0x16, 0x640}, {&(0x7f0000010100)="000000000000000000000000000000000000000000000000000000005178aedb030000001300000023", 0x29}, {&(0x7f0000010ce0)="00000000000000000000000000000000000000000000000000000000c99b0000ed410000000400009f09c75f9f09c75f9f09c75f00000000000003000200000000000800000000000af301000400000000000000000000000100000004", 0x5d, 0x8c60}], 0x0, &(0x7f0000010f60)) getdents64(r0, &(0x7f0000000040)=""/4, 0x4) 04:00:19 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="1000000040000000030000002b00000005000000010000000000000000000000002000000020000010000000000000009f09c75f0000ffff53ef", 0x3a, 0x400}, {&(0x7f0000010080)="000000000000000000000000ede2de4df49d4f87b54a3176cfd4eb4f010040000c000000000000009f09c75f", 0x2c, 0x4e0}, {&(0x7f0000010100)="000000000000000000000000000000000000000000000000000000005178aedb03000000", 0x24, 0x7e0}, {&(0x7f0000010ce0)="00000000000000000000000000000000000000000000000000000000c99b0000ed410000000400009f09c75f9f09c75f9f09c75f00000000000003000200000000000800000000000af3010004000000000000000000000001", 0x59, 0x8c60}], 0x0, &(0x7f0000010f60)) 04:00:19 executing program 2: sendmsg$NL80211_CMD_UNEXPECTED_FRAME(0xffffffffffffffff, &(0x7f0000000400)={0x0, 0x0, &(0x7f0000000300)={&(0x7f00000002c0)={0x1c, 0x0, 0x1, 0x0, 0x0, {{}, {@val={0x8}, @void}}}, 0x1c}}, 0x0) sendmsg$NL80211_CMD_UPDATE_FT_IES(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000001c0)={0x24, 0x0, 0x1, 0x70bd2c, 0x0, {{}, {@val={0x8}, @void}}, [@NL80211_ATTR_MDID={0x6, 0xb1, 0xc116}]}, 0x24}, 0x1, 0x0, 0x0, 0x80}, 0xc000) r0 = creat(&(0x7f00000003c0)='./file1\x00', 0x0) sendmsg$netlink(0xffffffffffffffff, 0x0, 0x0) dup(0xffffffffffffffff) pwritev2(r0, &(0x7f0000000380)=[{&(0x7f0000000180)="bd", 0xfffffdef}], 0x1, 0x1200, 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) ioctl$FS_IOC_FSSETXATTR(r1, 0x401c5820, &(0x7f0000000200)={0x9}) syz_io_uring_setup(0x0, &(0x7f0000000000)={0x0, 0x0, 0x4, 0x2, 0x309}, &(0x7f0000ffc000/0x2000)=nil, &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000000080), &(0x7f0000000240)) syz_io_uring_submit(0x0, 0x0, 0x0, 0x1ff) 04:00:19 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="1000000040000000030000002b00000005000000010000000000000000000000002000000020000010000000000000009f09c75f0000ffff53ef", 0x3a, 0x400}, {&(0x7f0000010080)="000000000000000000000000ede2de4df49d4f87b54a3176cfd4eb4f010040000c000000000000009f09c75f", 0x2c, 0x4e0}, {&(0x7f00000100c0)="01000000000000000000000000000000000000000401000012", 0x19, 0x560}, {&(0x7f00000100e0)="00000000000000000000000000000000000000000104", 0x16, 0x640}, {&(0x7f0000010100), 0x0, 0x7e0}, {&(0x7f0000010ce0)="00000000000000000000000000000000000000000000000000000000c99b0000ed410000000400009f09c75f9f09c75f9f09c75f00000000000003000200000000000800000000000af3010004", 0x4d, 0x8c60}], 0x0, &(0x7f0000010f60)) 04:00:19 executing program 3: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="1000000040000000030000002b00000005000000010000000000000000000000002000000020000010000000000000009f09c75f0000ffff53ef", 0x3a, 0x400}, {&(0x7f0000010080)="000000000000000000000000ede2de4df49d4f87b54a3176cfd4eb4f010040000c000000000000009f09c75f", 0x2c, 0x4e0}, {&(0x7f00000100c0)="01000000000000000000000000000000000000000401000012", 0x19, 0x560}, {&(0x7f0000010100)="000000000000000000000000000000000000000000000000000000005178aedb03000000", 0x24, 0x7e0}, {&(0x7f0000010ce0)="00000000000000000000000000000000000000000000000000000000c99b0000ed410000000400009f09c75f9f09c75f9f09c75f00000000000003000200000000000800000000000af301000400000000000000000000000100000004", 0x5d, 0x8c60}], 0x0, &(0x7f0000010f60)) getdents64(r0, &(0x7f0000000040)=""/4, 0x4) 04:00:19 executing program 4: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="1000000040000000030000002b00000005000000010000000000000000000000002000000020000010000000000000009f09c75f0000ffff53ef", 0x3a, 0x400}, {&(0x7f0000010100)="000000000000000000000000000000000000000000000000000000005178aedb0300000013000000230000002b0005", 0x2f, 0x7e0}, {&(0x7f0000010160)="ffff05000c000080ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff020000000c0001022e000000020000000c0002022e2e00000b000000dc03", 0x41e, 0xc00}, {&(0x7f00000105a0)='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\f', 0x19, 0x13e0}, {&(0x7f00000108c0)="ff07", 0x2, 0x4c00}, {&(0x7f0000010ce0)="00000000000000000000000000000000000000000000000000000000c99b0000ed410000000400009f09c75f9f09c75f9f09c75f00000000000003000200000000000800000000000af301000400000000000000000000000100000004", 0x5d, 0x8c60}], 0x0, &(0x7f0000010f60)) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) getdents64(r0, 0x0, 0x0) 04:00:19 executing program 5: creat(&(0x7f00000003c0)='./file0\x00', 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext2\x00', &(0x7f0000000100)='./file0\x00', 0x40008, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}], 0x0, &(0x7f0000013c00)=ANY=[]) 04:00:19 executing program 7: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="1000000040000000030000002b00000005000000010000000000000000000000002000000020000010000000000000009f09c75f0000ffff53ef", 0x3a, 0x400}, {&(0x7f0000010080)="000000000000000000000000ede2de4df49d4f87b54a3176cfd4eb4f010040000c000000000000009f09c75f", 0x2c, 0x4e0}, {&(0x7f00000100c0)="01000000000000000000000000000000000000000401000012", 0x19, 0x560}, {&(0x7f0000010100), 0x0, 0x7e0}, {&(0x7f0000010ce0)="00000000000000000000000000000000000000000000000000000000c99b0000ed410000000400009f09c75f9f09c75f9f09c75f00000000000003000200000000000800000000000af301000400000000000000000000000100000004", 0x5d, 0x8c60}], 0x0, &(0x7f0000010f60)) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) getdents64(r0, &(0x7f0000000040)=""/4, 0x4) [ 1620.343236] loop5: detected capacity change from 0 to 512 [ 1620.347162] EXT4-fs (loop5): mounting ext2 file system using the ext4 subsystem [ 1620.351148] EXT4-fs (loop5): warning: mounting unchecked fs, running e2fsck is recommended [ 1620.356731] EXT4-fs (loop5): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: none. [ 1620.361224] EXT4-fs (loop5): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 1620.395558] loop1: detected capacity change from 0 to 140 [ 1620.398100] loop6: detected capacity change from 0 to 140 [ 1620.401605] loop0: detected capacity change from 0 to 140 [ 1620.403153] loop3: detected capacity change from 0 to 140 [ 1620.405498] loop7: detected capacity change from 0 to 140 [ 1620.409802] loop4: detected capacity change from 0 to 140 [ 1620.413834] EXT4-fs (loop1): ext4_check_descriptors: Inode bitmap for group 0 not in group (block 0)! [ 1620.415266] EXT4-fs (loop1): group descriptors corrupted! [ 1620.417810] EXT4-fs (loop6): ext4_check_descriptors: Block bitmap for group 0 not in group (block 0)! [ 1620.419359] EXT4-fs (loop6): group descriptors corrupted! [ 1620.420290] EXT4-fs (loop0): ext4_check_descriptors: Block bitmap for group 0 not in group (block 0)! [ 1620.421575] EXT4-fs (loop0): group descriptors corrupted! [ 1620.422009] EXT4-fs (loop3): ext4_check_descriptors: Inode bitmap for group 0 not in group (block 0)! [ 1620.423740] EXT4-fs (loop3): group descriptors corrupted! [ 1620.427154] EXT4-fs (loop7): ext4_check_descriptors: Block bitmap for group 0 not in group (block 0)! [ 1620.429070] EXT4-fs (loop7): group descriptors corrupted! [ 1620.457233] EXT4-fs (loop4): warning: mounting unchecked fs, running e2fsck is recommended [ 1620.487778] EXT4-fs (loop4): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: none. 04:00:19 executing program 5: creat(&(0x7f00000003c0)='./file0\x00', 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext2\x00', &(0x7f0000000100)='./file0\x00', 0x40009, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}], 0x0, &(0x7f0000013c00)=ANY=[]) [ 1620.511127] EXT4-fs warning (device loop4): ext4_update_dynamic_rev:1134: updating to rev 1 because of new feature flag, running e2fsck is recommended 04:00:19 executing program 7: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="1000000040000000030000002b00000005000000010000000000000000000000002000000020000010000000000000009f09c75f0000ffff53ef", 0x3a, 0x400}, {&(0x7f0000010080)="000000000000000000000000ede2de4df49d4f87b54a3176cfd4eb4f010040000c000000000000009f09c75f", 0x2c, 0x4e0}, {&(0x7f00000100c0)="01000000000000000000000000000000000000000401000012", 0x19, 0x560}, {&(0x7f0000010100)='\x00'/21, 0x15, 0x7e0}, {&(0x7f0000010ce0)="00000000000000000000000000000000000000000000000000000000c99b0000ed410000000400009f09c75f9f09c75f9f09c75f00000000000003000200000000000800000000000af301000400000000000000000000000100000004", 0x5d, 0x8c60}], 0x0, &(0x7f0000010f60)) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) getdents64(r0, &(0x7f0000000040)=""/4, 0x4) 04:00:19 executing program 6: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="1000000040000000030000002b00000005000000010000000000000000000000002000000020000010000000000000009f09c75f0000ffff53ef", 0x3a, 0x400}, {&(0x7f0000010080)="000000000000000000000000ede2de4df49d4f87b54a3176cfd4eb4f010040000c000000000000009f09c75f", 0x2c, 0x4e0}, {&(0x7f00000100c0)="01000000000000000000000000000000000000000401000012", 0x19, 0x560}, {&(0x7f00000100e0)="00000000000000000000000000000000000000000104", 0x16, 0x640}, {&(0x7f0000010100)="000000000000000000000000000000000000000000000000000000005178aedb030000001300000023", 0x29}, {&(0x7f0000010ce0)="00000000000000000000000000000000000000000000000000000000c99b0000ed410000000400009f09c75f9f09c75f9f09c75f00000000000003000200000000000800000000000af301000400000000000000000000000100000004", 0x5d, 0x8c60}], 0x0, &(0x7f0000010f60)) getdents64(r0, &(0x7f0000000040)=""/4, 0x4) 04:00:19 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="1000000040000000030000002b00000005000000010000000000000000000000002000000020000010000000000000009f09c75f0000ffff53ef", 0x3a, 0x400}, {&(0x7f0000010080)="000000000000000000000000ede2de4df49d4f87b54a3176cfd4eb4f010040000c000000000000009f09c75f", 0x2c, 0x4e0}, {&(0x7f0000010100)="000000000000000000000000000000000000000000000000000000005178aedb03000000130000", 0x27, 0x7e0}, {&(0x7f0000010ce0)="00000000000000000000000000000000000000000000000000000000c99b0000ed410000000400009f09c75f9f09c75f9f09c75f00000000000003000200000000000800000000000af3010004000000000000000000000001", 0x59, 0x8c60}], 0x0, &(0x7f0000010f60)) [ 1620.557322] loop5: detected capacity change from 0 to 512 [ 1620.565448] EXT4-fs (loop5): mounting ext2 file system using the ext4 subsystem [ 1620.571834] EXT4-fs (loop5): warning: mounting unchecked fs, running e2fsck is recommended [ 1620.580860] EXT4-fs (loop5): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: none. [ 1620.584216] EXT4-fs (loop4): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 1620.592768] EXT4-fs (loop5): unmounting filesystem 00000000-0000-0000-0000-000000000000. 04:00:19 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="1000000040000000030000002b00000005000000010000000000000000000000002000000020000010000000000000009f09c75f0000ffff53ef", 0x3a, 0x400}, {&(0x7f0000010080)="000000000000000000000000ede2de4df49d4f87b54a3176cfd4eb4f010040000c000000000000009f09c75f", 0x2c, 0x4e0}, {&(0x7f00000100c0)="01000000000000000000000000000000000000000401000012", 0x19, 0x560}, {&(0x7f00000100e0)="00000000000000000000000000000000000000000104", 0x16, 0x640}, {&(0x7f0000010100), 0x0, 0x7e0}, {&(0x7f0000010ce0)="00000000000000000000000000000000000000000000000000000000c99b0000ed410000000400009f09c75f9f09c75f9f09c75f00000000000003000200000000000800000000000af3010004", 0x4d, 0x8c60}], 0x0, &(0x7f0000010f60)) 04:00:19 executing program 3: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="1000000040000000030000002b00000005000000010000000000000000000000002000000020000010000000000000009f09c75f0000ffff53ef", 0x3a, 0x400}, {&(0x7f0000010080)="000000000000000000000000ede2de4df49d4f87b54a3176cfd4eb4f010040000c000000000000009f09c75f", 0x2c, 0x4e0}, {&(0x7f00000100c0)="01000000000000000000000000000000000000000401000012", 0x19, 0x560}, {&(0x7f0000010100)="000000000000000000000000000000000000000000000000000000005178aedb03000000130000", 0x27, 0x7e0}, {&(0x7f0000010ce0)="00000000000000000000000000000000000000000000000000000000c99b0000ed410000000400009f09c75f9f09c75f9f09c75f00000000000003000200000000000800000000000af301000400000000000000000000000100000004", 0x5d, 0x8c60}], 0x0, &(0x7f0000010f60)) getdents64(r0, &(0x7f0000000040)=""/4, 0x4) [ 1620.676316] loop1: detected capacity change from 0 to 140 [ 1620.677502] loop6: detected capacity change from 0 to 140 [ 1620.681326] loop0: detected capacity change from 0 to 140 [ 1620.690123] EXT4-fs (loop6): ext4_check_descriptors: Block bitmap for group 0 not in group (block 0)! [ 1620.690413] loop7: detected capacity change from 0 to 140 [ 1620.691666] EXT4-fs (loop6): group descriptors corrupted! [ 1620.693667] EXT4-fs (loop1): ext4_check_descriptors: Inode table for group 0 not in group (block 0)! [ 1620.696162] EXT4-fs (loop1): group descriptors corrupted! [ 1620.697791] EXT4-fs (loop0): ext4_check_descriptors: Block bitmap for group 0 not in group (block 0)! [ 1620.699178] EXT4-fs (loop0): group descriptors corrupted! 04:00:19 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="1000000040000000030000002b00000005000000010000000000000000000000002000000020000010000000000000009f09c75f0000ffff53ef", 0x3a, 0x400}, {&(0x7f0000010080)="000000000000000000000000ede2de4df49d4f87b54a3176cfd4eb4f010040000c000000000000009f09c75f", 0x2c, 0x4e0}, {&(0x7f00000100c0)="01000000000000000000000000000000000000000401000012", 0x19, 0x560}, {&(0x7f00000100e0)="00000000000000000000000000000000000000000104", 0x16, 0x640}, {&(0x7f0000010100)="000000000000000000000000000000000000000000000000000000005178aedb0300000013000000230000002b0005000200040000000000907306c205002a9c00000000000000000000000000000000000000000000000091ecd11b", 0x5c, 0x7e0}, {0x0, 0x0, 0x8c60}], 0x0, &(0x7f0000010f60)) [ 1620.722783] loop3: detected capacity change from 0 to 140 [ 1620.726270] EXT4-fs (loop7): ext4_check_descriptors: Block bitmap for group 0 not in group (block 0)! [ 1620.727783] EXT4-fs (loop7): group descriptors corrupted! [ 1620.748345] EXT4-fs (loop3): ext4_check_descriptors: Inode table for group 0 not in group (block 0)! [ 1620.750188] EXT4-fs (loop3): group descriptors corrupted! [ 1620.763434] loop4: detected capacity change from 0 to 140 [ 1620.806016] EXT4-fs error (device loop4): __ext4_fill_super:5513: inode #2: comm syz-executor.4: iget: special inode unallocated [ 1620.814408] EXT4-fs (loop4): get root inode failed [ 1620.815196] EXT4-fs (loop4): mount failed 04:00:31 executing program 2: sendmsg$NL80211_CMD_UNEXPECTED_FRAME(0xffffffffffffffff, &(0x7f0000000400)={0x0, 0x0, &(0x7f0000000300)={&(0x7f00000002c0)={0x1c, 0x0, 0x1, 0x0, 0x0, {{}, {@val={0x8}, @void}}}, 0x1c}}, 0x0) sendmsg$NL80211_CMD_UPDATE_FT_IES(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000001c0)={0x24, 0x0, 0x1, 0x70bd2c, 0x0, {{}, {@val={0x8}, @void}}, [@NL80211_ATTR_MDID={0x6, 0xb1, 0xc116}]}, 0x24}, 0x1, 0x0, 0x0, 0x80}, 0xc000) r0 = creat(&(0x7f00000003c0)='./file1\x00', 0x0) sendmsg$netlink(0xffffffffffffffff, 0x0, 0x0) dup(0xffffffffffffffff) pwritev2(r0, &(0x7f0000000380)=[{&(0x7f0000000180)="bd", 0xfffffdef}], 0x1, 0x1200, 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) ioctl$FS_IOC_FSSETXATTR(r1, 0x401c5820, &(0x7f0000000200)={0x9}) syz_io_uring_setup(0x0, &(0x7f0000000000)={0x0, 0x0, 0x4, 0x2, 0x309}, &(0x7f0000ffc000/0x2000)=nil, &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000000080), &(0x7f0000000240)) syz_io_uring_submit(0x0, 0x0, &(0x7f0000000280)=@IORING_OP_ASYNC_CANCEL={0xe, 0x0, 0x0, 0x0, 0x0, 0x12345}, 0x1ff) 04:00:31 executing program 4: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="1000000040000000030000002b00000005000000010000000000000000000000002000000020000010000000000000009f09c75f0000ffff53ef", 0x3a, 0x400}, {&(0x7f0000010080)="000000000000000000000000ede2de4df49d4f87b54a3176cfd4eb4f010040000c000000000000009f09c75f", 0x2c, 0x4e0}, {&(0x7f00000100c0)="01000000000000000000000000000000000000000401000012", 0x19, 0x560}, {&(0x7f00000100e0)="00000000000000000000000000000000000000000104", 0x16, 0x640}, {&(0x7f0000010100)="000000000000000000000000000000000000000000000000000000005178aedb0300000013000000230000002b0005000200040000000000907306c205002a9c00000000000000000000000000000000000000000000000091ecd11b", 0x5c, 0x7e0}, {&(0x7f0000010ce0)="00000000000000000000000000000000000000000000000000000000c99b0000ed410000000400009f09c75f9f09c7", 0x2f, 0x8c60}], 0x0, &(0x7f0000010f60)) getdents64(r0, &(0x7f0000000040)=""/4, 0x4) 04:00:31 executing program 5: creat(&(0x7f00000003c0)='./file0\x00', 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext2\x00', &(0x7f0000000100)='./file0\x00', 0x4000a, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}], 0x0, &(0x7f0000013c00)=ANY=[]) 04:00:31 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="1000000040000000030000002b00000005000000010000000000000000000000002000000020000010000000000000009f09c75f0000ffff53ef", 0x3a, 0x400}, {&(0x7f0000010080)="000000000000000000000000ede2de4df49d4f87b54a3176cfd4eb4f010040000c000000000000009f09c75f", 0x2c, 0x4e0}, {&(0x7f0000010100)="000000000000000000000000000000000000000000000000000000005178aedb03000000130000", 0x27, 0x7e0}, {&(0x7f0000010ce0)="00000000000000000000000000000000000000000000000000000000c99b0000ed410000000400009f09c75f9f09c75f9f09c75f00000000000003000200000000000800000000000af3010004000000000000000000000001", 0x59, 0x8c60}], 0x0, &(0x7f0000010f60)) 04:00:31 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="1000000040000000030000002b00000005000000010000000000000000000000002000000020000010000000000000009f09c75f0000ffff53ef", 0x3a, 0x400}, {&(0x7f0000010080)="000000000000000000000000ede2de4df49d4f87b54a3176cfd4eb4f010040000c000000000000009f09c75f", 0x2c, 0x4e0}, {&(0x7f00000100c0)="01000000000000000000000000000000000000000401000012", 0x19, 0x560}, {&(0x7f00000100e0)="00000000000000000000000000000000000000000104", 0x16, 0x640}, {&(0x7f0000010100), 0x0, 0x7e0}, {&(0x7f0000010ce0)="00000000000000000000000000000000000000000000000000000000c99b0000ed410000000400009f09c75f9f09c75f9f09c75f00000000000003000200000000000800000000000af3010004", 0x4d, 0x8c60}], 0x0, &(0x7f0000010f60)) 04:00:31 executing program 6: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="1000000040000000030000002b00000005000000010000000000000000000000002000000020000010000000000000009f09c75f0000ffff53ef", 0x3a, 0x400}, {&(0x7f0000010080)="000000000000000000000000ede2de4df49d4f87b54a3176cfd4eb4f010040000c000000000000009f09c75f", 0x2c, 0x4e0}, {&(0x7f00000100c0)="01000000000000000000000000000000000000000401000012", 0x19, 0x560}, {&(0x7f0000010100)="000000000000000000000000000000000000000000000000000000005178aedb030000001300000023", 0x29, 0x7e0}, {&(0x7f0000010ce0)="00000000000000000000000000000000000000000000000000000000c99b0000ed410000000400009f09c75f9f09c75f9f09c75f00000000000003000200000000000800000000000af301000400000000000000000000000100000004", 0x5d, 0x8c60}], 0x0, &(0x7f0000010f60)) getdents64(r0, &(0x7f0000000040)=""/4, 0x4) 04:00:31 executing program 3: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="1000000040000000030000002b00000005000000010000000000000000000000002000000020000010000000000000009f09c75f0000ffff53ef", 0x3a, 0x400}, {&(0x7f0000010080)="000000000000000000000000ede2de4df49d4f87b54a3176cfd4eb4f010040000c000000000000009f09c75f", 0x2c, 0x4e0}, {&(0x7f00000100c0)="01000000000000000000000000000000000000000401000012", 0x19, 0x560}, {&(0x7f0000010100)="000000000000000000000000000000000000000000000000000000005178aedb03000000130000", 0x27, 0x7e0}, {&(0x7f0000010ce0)="00000000000000000000000000000000000000000000000000000000c99b0000ed410000000400009f09c75f9f09c75f9f09c75f00000000000003000200000000000800000000000af301000400000000000000000000000100000004", 0x5d, 0x8c60}], 0x0, &(0x7f0000010f60)) getdents64(r0, &(0x7f0000000040)=""/4, 0x4) 04:00:31 executing program 7: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="1000000040000000030000002b00000005000000010000000000000000000000002000000020000010000000000000009f09c75f0000ffff53ef", 0x3a, 0x400}, {&(0x7f0000010080)="000000000000000000000000ede2de4df49d4f87b54a3176cfd4eb4f010040000c000000000000009f09c75f", 0x2c, 0x4e0}, {&(0x7f00000100c0)="01000000000000000000000000000000000000000401000012", 0x19, 0x560}, {&(0x7f0000010100)='\x00'/21, 0x15, 0x7e0}, {&(0x7f0000010ce0)="00000000000000000000000000000000000000000000000000000000c99b0000ed410000000400009f09c75f9f09c75f9f09c75f00000000000003000200000000000800000000000af301000400000000000000000000000100000004", 0x5d, 0x8c60}], 0x0, &(0x7f0000010f60)) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) getdents64(r0, &(0x7f0000000040)=""/4, 0x4) [ 1632.623684] loop6: detected capacity change from 0 to 140 [ 1632.626481] loop4: detected capacity change from 0 to 140 [ 1632.630202] loop7: detected capacity change from 0 to 140 [ 1632.636432] EXT4-fs (loop7): ext4_check_descriptors: Block bitmap for group 0 not in group (block 0)! [ 1632.637334] EXT4-fs (loop7): group descriptors corrupted! [ 1632.639485] loop3: detected capacity change from 0 to 140 [ 1632.644662] EXT4-fs (loop3): ext4_check_descriptors: Inode table for group 0 not in group (block 0)! [ 1632.645437] EXT4-fs (loop3): group descriptors corrupted! [ 1632.651273] EXT4-fs (loop6): warning: mounting unchecked fs, running e2fsck is recommended [ 1632.653902] EXT4-fs error (device loop4): __ext4_fill_super:5513: inode #2: comm syz-executor.4: iget: special inode unallocated [ 1632.658226] loop0: detected capacity change from 0 to 140 [ 1632.659211] loop1: detected capacity change from 0 to 140 [ 1632.661129] EXT4-fs (loop4): get root inode failed [ 1632.661628] EXT4-fs (loop4): mount failed [ 1632.664742] EXT4-fs (loop6): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: none. [ 1632.666021] loop5: detected capacity change from 0 to 512 [ 1632.673787] EXT4-fs (loop1): ext4_check_descriptors: Inode table for group 0 not in group (block 0)! [ 1632.674818] EXT4-fs (loop1): group descriptors corrupted! [ 1632.680328] EXT4-fs (loop0): ext4_check_descriptors: Block bitmap for group 0 not in group (block 0)! [ 1632.681410] EXT4-fs (loop0): group descriptors corrupted! [ 1632.686018] EXT4-fs error (device loop6): ext4_readdir:262: inode #2: block 4: comm syz-executor.6: path /syzkaller-testdir823133109/syzkaller.UCZRXl/298/mnt: bad entry in directory: rec_len is smaller than minimal - offset=0, inode=0, rec_len=0, size=1024 fake=0 [ 1632.692467] EXT4-fs (loop5): mounting ext2 file system using the ext4 subsystem 04:00:31 executing program 7: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="1000000040000000030000002b00000005000000010000000000000000000000002000000020000010000000000000009f09c75f0000ffff53ef", 0x3a, 0x400}, {&(0x7f0000010080)="000000000000000000000000ede2de4df49d4f87b54a3176cfd4eb4f010040000c000000000000009f09c75f", 0x2c, 0x4e0}, {&(0x7f00000100c0)="01000000000000000000000000000000000000000401000012", 0x19, 0x560}, {&(0x7f0000010100)='\x00'/21, 0x15, 0x7e0}, {&(0x7f0000010ce0)="00000000000000000000000000000000000000000000000000000000c99b0000ed410000000400009f09c75f9f09c75f9f09c75f00000000000003000200000000000800000000000af301000400000000000000000000000100000004", 0x5d, 0x8c60}], 0x0, &(0x7f0000010f60)) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) getdents64(r0, &(0x7f0000000040)=""/4, 0x4) [ 1632.710203] EXT4-fs (loop5): warning: mounting unchecked fs, running e2fsck is recommended [ 1632.718262] EXT4-fs (loop5): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: none. [ 1632.731556] EXT4-fs (loop5): unmounting filesystem 00000000-0000-0000-0000-000000000000. 04:00:31 executing program 3: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="1000000040000000030000002b00000005000000010000000000000000000000002000000020000010000000000000009f09c75f0000ffff53ef", 0x3a, 0x400}, {&(0x7f0000010080)="000000000000000000000000ede2de4df49d4f87b54a3176cfd4eb4f010040000c000000000000009f09c75f", 0x2c, 0x4e0}, {&(0x7f00000100c0)="01000000000000000000000000000000000000000401000012", 0x19, 0x560}, {&(0x7f0000010100)="000000000000000000000000000000000000000000000000000000005178aedb03000000130000", 0x27, 0x7e0}, {&(0x7f0000010ce0)="00000000000000000000000000000000000000000000000000000000c99b0000ed410000000400009f09c75f9f09c75f9f09c75f00000000000003000200000000000800000000000af301000400000000000000000000000100000004", 0x5d, 0x8c60}], 0x0, &(0x7f0000010f60)) getdents64(r0, &(0x7f0000000040)=""/4, 0x4) [ 1632.742333] loop7: detected capacity change from 0 to 140 [ 1632.744410] EXT4-fs (loop7): ext4_check_descriptors: Block bitmap for group 0 not in group (block 0)! [ 1632.745269] EXT4-fs (loop7): group descriptors corrupted! 04:00:31 executing program 7: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="1000000040000000030000002b00000005000000010000000000000000000000002000000020000010000000000000009f09c75f0000ffff53ef", 0x3a, 0x400}, {&(0x7f0000010080)="000000000000000000000000ede2de4df49d4f87b54a3176cfd4eb4f010040000c000000000000009f09c75f", 0x2c, 0x4e0}, {&(0x7f00000100c0)="01000000000000000000000000000000000000000401000012", 0x19, 0x560}, {&(0x7f0000010100)="000000000000000000000000000000000000000000000000000000005178ae", 0x1f, 0x7e0}, {&(0x7f0000010ce0)="00000000000000000000000000000000000000000000000000000000c99b0000ed410000000400009f09c75f9f09c75f9f09c75f00000000000003000200000000000800000000000af301000400000000000000000000000100000004", 0x5d, 0x8c60}], 0x0, &(0x7f0000010f60)) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) getdents64(r0, &(0x7f0000000040)=""/4, 0x4) 04:00:31 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="1000000040000000030000002b00000005000000010000000000000000000000002000000020000010000000000000009f09c75f0000ffff53ef", 0x3a, 0x400}, {&(0x7f0000010080)="000000000000000000000000ede2de4df49d4f87b54a3176cfd4eb4f010040000c000000000000009f09c75f", 0x2c, 0x4e0}, {&(0x7f0000010100)="000000000000000000000000000000000000000000000000000000005178aedb03000000130000", 0x27, 0x7e0}, {&(0x7f0000010ce0)="00000000000000000000000000000000000000000000000000000000c99b0000ed410000000400009f09c75f9f09c75f9f09c75f00000000000003000200000000000800000000000af3010004000000000000000000000001", 0x59, 0x8c60}], 0x0, &(0x7f0000010f60)) 04:00:31 executing program 6: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="1000000040000000030000002b00000005000000010000000000000000000000002000000020000010000000000000009f09c75f0000ffff53ef", 0x3a, 0x400}, {&(0x7f0000010080)="000000000000000000000000ede2de4df49d4f87b54a3176cfd4eb4f010040000c000000000000009f09c75f", 0x2c, 0x4e0}, {&(0x7f00000100c0)="01000000000000000000000000000000000000000401000012", 0x19, 0x560}, {0x0, 0x0, 0x7e0}, {&(0x7f0000010ce0)="00000000000000000000000000000000000000000000000000000000c99b0000ed410000000400009f09c75f9f09c75f9f09c75f00000000000003000200000000000800000000000af301000400000000000000000000000100000004", 0x5d, 0x8c60}], 0x0, &(0x7f0000010f60)) getdents64(r0, &(0x7f0000000040)=""/4, 0x4) 04:00:31 executing program 4: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="1000000040000000030000002b00000005000000010000000000000000000000002000000020000010000000000000009f09c75f0000ffff53ef", 0x3a, 0x400}, {&(0x7f0000010080)="000000000000000000000000ede2de4df49d4f87b54a3176cfd4eb4f010040000c000000000000009f09c75f", 0x2c, 0x4e0}, {&(0x7f00000100c0)="01000000000000000000000000000000000000000401000012", 0x19, 0x560}, {&(0x7f00000100e0)="00000000000000000000000000000000000000000104", 0x16, 0x640}, {&(0x7f0000010100)="000000000000000000000000000000000000000000000000000000005178aedb0300000013000000230000002b0005000200040000000000907306c205002a9c00000000000000000000000000000000000000000000000091ecd11b", 0x5c, 0x7e0}, {&(0x7f0000010ce0)="00000000000000000000000000000000000000000000000000000000c99b0000ed410000000400009f09c75f9f09c75f9f09c75f00000000000003000200000000000800000000000af301000400"/88, 0x58, 0x8c60}], 0x0, &(0x7f0000010f60)) getdents64(r0, &(0x7f0000000040)=""/4, 0x4) [ 1632.801054] EXT4-fs (loop6): unmounting filesystem 00000000-0000-0000-0000-000000000000. 04:00:31 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="1000000040000000030000002b00000005000000010000000000000000000000002000000020000010000000000000009f09c75f0000ffff53ef", 0x3a, 0x400}, {&(0x7f0000010080)="000000000000000000000000ede2de4df49d4f87b54a3176cfd4eb4f010040000c000000000000009f09c75f", 0x2c, 0x4e0}, {&(0x7f00000100c0)="01000000000000000000000000000000000000000401000012", 0x19, 0x560}, {&(0x7f00000100e0)="00000000000000000000000000000000000000000104", 0x16, 0x640}, {&(0x7f0000010100)='\x00'/23, 0x17, 0x7e0}, {&(0x7f0000010ce0)="00000000000000000000000000000000000000000000000000000000c99b0000ed410000000400009f09c75f9f09c75f9f09c75f00000000000003000200000000000800000000000af3010004", 0x4d, 0x8c60}], 0x0, &(0x7f0000010f60)) 04:00:31 executing program 5: creat(&(0x7f00000003c0)='./file0\x00', 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext2\x00', &(0x7f0000000100)='./file0\x00', 0x4000b, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}], 0x0, &(0x7f0000013c00)=ANY=[]) [ 1632.877199] loop3: detected capacity change from 0 to 140 [ 1632.886762] loop0: detected capacity change from 0 to 140 [ 1632.888044] loop7: detected capacity change from 0 to 140 [ 1632.895865] EXT4-fs (loop0): ext4_check_descriptors: Block bitmap for group 0 not in group (block 0)! [ 1632.896762] EXT4-fs (loop0): group descriptors corrupted! [ 1632.900663] loop4: detected capacity change from 0 to 140 [ 1632.904656] EXT4-fs (loop3): ext4_check_descriptors: Inode table for group 0 not in group (block 0)! [ 1632.906275] EXT4-fs (loop3): group descriptors corrupted! [ 1632.916103] EXT4-fs (loop7): ext4_check_descriptors: Block bitmap for group 0 not in group (block 0)! [ 1632.917610] EXT4-fs (loop7): group descriptors corrupted! [ 1632.923508] EXT4-fs error (device loop4): ext4_ext_check_inode:523: inode #2: comm syz-executor.4: pblk 0 bad header/extent: invalid extent entries - magic f30a, entries 1, max 4(4), depth 0(0) [ 1632.946299] EXT4-fs (loop4): get root inode failed [ 1632.946673] loop1: detected capacity change from 0 to 140 [ 1632.947095] EXT4-fs (loop4): mount failed [ 1632.958535] loop6: detected capacity change from 0 to 140 [ 1632.967006] EXT4-fs (loop1): ext4_check_descriptors: Inode table for group 0 not in group (block 0)! [ 1632.968510] EXT4-fs (loop1): group descriptors corrupted! [ 1632.972723] loop5: detected capacity change from 0 to 512 [ 1632.978497] EXT4-fs (loop6): ext4_check_descriptors: Block bitmap for group 0 not in group (block 0)! [ 1632.980213] EXT4-fs (loop6): group descriptors corrupted! [ 1632.984108] EXT4-fs (loop5): mounting ext2 file system using the ext4 subsystem [ 1633.027406] EXT4-fs (loop5): warning: mounting unchecked fs, running e2fsck is recommended [ 1633.082274] EXT4-fs (loop5): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: none. [ 1633.117582] EXT4-fs (loop5): unmounting filesystem 00000000-0000-0000-0000-000000000000. 04:00:40 executing program 7: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="1000000040000000030000002b00000005000000010000000000000000000000002000000020000010000000000000009f09c75f0000ffff53ef", 0x3a, 0x400}, {&(0x7f0000010080)="000000000000000000000000ede2de4df49d4f87b54a3176cfd4eb4f010040000c000000000000009f09c75f", 0x2c, 0x4e0}, {&(0x7f00000100c0)="01000000000000000000000000000000000000000401000012", 0x19, 0x560}, {&(0x7f0000010100)="000000000000000000000000000000000000000000000000000000005178ae", 0x1f, 0x7e0}, {&(0x7f0000010ce0)="00000000000000000000000000000000000000000000000000000000c99b0000ed410000000400009f09c75f9f09c75f9f09c75f00000000000003000200000000000800000000000af301000400000000000000000000000100000004", 0x5d, 0x8c60}], 0x0, &(0x7f0000010f60)) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) getdents64(r0, &(0x7f0000000040)=""/4, 0x4) 04:00:40 executing program 3: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="1000000040000000030000002b00000005000000010000000000000000000000002000000020000010000000000000009f09c75f0000ffff53ef", 0x3a, 0x400}, {&(0x7f0000010080)="000000000000000000000000ede2de4df49d4f87b54a3176cfd4eb4f010040000c000000000000009f09c75f", 0x2c, 0x4e0}, {&(0x7f00000100c0)="01000000000000000000000000000000000000000401000012", 0x19, 0x560}, {&(0x7f0000010100)="000000000000000000000000000000000000000000000000000000005178aedb0300000013000000", 0x28, 0x7e0}, {&(0x7f0000010ce0)="00000000000000000000000000000000000000000000000000000000c99b0000ed410000000400009f09c75f9f09c75f9f09c75f00000000000003000200000000000800000000000af301000400000000000000000000000100000004", 0x5d, 0x8c60}], 0x0, &(0x7f0000010f60)) getdents64(r0, &(0x7f0000000040)=""/4, 0x4) 04:00:40 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="1000000040000000030000002b00000005000000010000000000000000000000002000000020000010000000000000009f09c75f0000ffff53ef", 0x3a, 0x400}, {&(0x7f0000010080)="000000000000000000000000ede2de4df49d4f87b54a3176cfd4eb4f010040000c000000000000009f09c75f", 0x2c, 0x4e0}, {&(0x7f00000100c0)="01000000000000000000000000000000000000000401000012", 0x19, 0x560}, {&(0x7f00000100e0)="00000000000000000000000000000000000000000104", 0x16, 0x640}, {&(0x7f0000010100)='\x00'/23, 0x17, 0x7e0}, {&(0x7f0000010ce0)="00000000000000000000000000000000000000000000000000000000c99b0000ed410000000400009f09c75f9f09c75f9f09c75f00000000000003000200000000000800000000000af3010004", 0x4d, 0x8c60}], 0x0, &(0x7f0000010f60)) 04:00:40 executing program 2: sendmsg$NL80211_CMD_UNEXPECTED_FRAME(0xffffffffffffffff, &(0x7f0000000400)={0x0, 0x0, &(0x7f0000000300)={&(0x7f00000002c0)={0x1c, 0x0, 0x1, 0x0, 0x0, {{}, {@val={0x8}, @void}}}, 0x1c}}, 0x0) sendmsg$NL80211_CMD_UPDATE_FT_IES(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000001c0)={0x24, 0x0, 0x1, 0x70bd2c, 0x0, {{}, {@val={0x8}, @void}}, [@NL80211_ATTR_MDID={0x6, 0xb1, 0xc116}]}, 0x24}, 0x1, 0x0, 0x0, 0x80}, 0xc000) r0 = creat(&(0x7f00000003c0)='./file1\x00', 0x0) sendmsg$netlink(0xffffffffffffffff, 0x0, 0x0) dup(0xffffffffffffffff) pwritev2(r0, &(0x7f0000000380)=[{&(0x7f0000000180)="bd", 0xfffffdef}], 0x1, 0x1200, 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) ioctl$FS_IOC_FSSETXATTR(r1, 0x401c5820, &(0x7f0000000200)={0x9}) syz_io_uring_setup(0x0, &(0x7f0000000000)={0x0, 0x0, 0x4, 0x2, 0x309}, &(0x7f0000ffc000/0x2000)=nil, &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000000080), &(0x7f0000000240)) syz_io_uring_submit(0x0, 0x0, &(0x7f0000000280)=@IORING_OP_ASYNC_CANCEL={0xe, 0x0, 0x0, 0x0, 0x0, 0x12345}, 0x1ff) 04:00:40 executing program 5: creat(&(0x7f00000003c0)='./file0\x00', 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext2\x00', &(0x7f0000000100)='./file0\x00', 0x4000c, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}], 0x0, &(0x7f0000013c00)=ANY=[]) 04:00:40 executing program 4: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="1000000040000000030000002b00000005000000010000000000000000000000002000000020000010000000000000009f09c75f0000ffff53ef", 0x3a, 0x400}, {&(0x7f0000010080)="000000000000000000000000ede2de4df49d4f87b54a3176cfd4eb4f010040000c000000000000009f09c75f", 0x2c, 0x4e0}, {&(0x7f00000100c0)="01000000000000000000000000000000000000000401000012", 0x19, 0x560}, {&(0x7f00000100e0)="00000000000000000000000000000000000000000104", 0x16, 0x640}, {&(0x7f0000010100)="000000000000000000000000000000000000000000000000000000005178aedb0300000013000000230000002b0005000200040000000000907306c205002a9c00000000000000000000000000000000000000000000000091ecd11b", 0x5c, 0x7e0}, {&(0x7f0000010ce0)="00000000000000000000000000000000000000000000000000000000c99b0000ed410000000400009f09c75f9f09c75f9f09c75f00000000000003000200000000000800000000000af301000400"/88, 0x58, 0x8c60}], 0x0, &(0x7f0000010f60)) getdents64(r0, &(0x7f0000000040)=""/4, 0x4) 04:00:40 executing program 6: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="1000000040000000030000002b00000005000000010000000000000000000000002000000020000010000000000000009f09c75f0000ffff53ef", 0x3a, 0x400}, {&(0x7f0000010080)="000000000000000000000000ede2de4df49d4f87b54a3176cfd4eb4f010040000c000000000000009f09c75f", 0x2c, 0x4e0}, {&(0x7f00000100c0)="01000000000000000000000000000000000000000401000012", 0x19, 0x560}, {0x0, 0x0, 0x7e0}, {&(0x7f0000010ce0)="00000000000000000000000000000000000000000000000000000000c99b0000ed410000000400009f09c75f9f09c75f9f09c75f00000000000003000200000000000800000000000af301000400000000000000000000000100000004", 0x5d, 0x8c60}], 0x0, &(0x7f0000010f60)) getdents64(r0, &(0x7f0000000040)=""/4, 0x4) 04:00:40 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="1000000040000000030000002b00000005000000010000000000000000000000002000000020000010000000000000009f09c75f0000ffff53ef", 0x3a, 0x400}, {&(0x7f0000010080)="000000000000000000000000ede2de4df49d4f87b54a3176cfd4eb4f010040000c000000000000009f09c75f", 0x2c, 0x4e0}, {&(0x7f0000010100)="000000000000000000000000000000000000000000000000000000005178aedb0300000013000000", 0x28, 0x7e0}, {&(0x7f0000010ce0)="00000000000000000000000000000000000000000000000000000000c99b0000ed410000000400009f09c75f9f09c75f9f09c75f00000000000003000200000000000800000000000af3010004000000000000000000000001", 0x59, 0x8c60}], 0x0, &(0x7f0000010f60)) [ 1641.915134] loop1: detected capacity change from 0 to 140 [ 1641.919445] loop5: detected capacity change from 0 to 512 [ 1641.924133] loop0: detected capacity change from 0 to 140 [ 1641.927298] EXT4-fs (loop1): ext4_check_descriptors: Inode table for group 0 not in group (block 0)! [ 1641.928071] EXT4-fs (loop1): group descriptors corrupted! [ 1641.928485] loop7: detected capacity change from 0 to 140 [ 1641.930045] EXT4-fs (loop5): mounting ext2 file system using the ext4 subsystem [ 1641.935386] EXT4-fs (loop5): warning: mounting unchecked fs, running e2fsck is recommended [ 1641.943770] loop4: detected capacity change from 0 to 140 [ 1641.946812] EXT4-fs (loop5): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: none. [ 1641.952656] loop3: detected capacity change from 0 to 140 [ 1641.954108] EXT4-fs (loop5): unmounting filesystem 00000000-0000-0000-0000-000000000000. 04:00:40 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="1000000040000000030000002b00000005000000010000000000000000000000002000000020000010000000000000009f09c75f0000ffff53ef", 0x3a, 0x400}, {&(0x7f0000010080)="000000000000000000000000ede2de4df49d4f87b54a3176cfd4eb4f010040000c000000000000009f09c75f", 0x2c, 0x4e0}, {&(0x7f0000010100)="000000000000000000000000000000000000000000000000000000005178aedb0300000013000000", 0x28, 0x7e0}, {&(0x7f0000010ce0)="00000000000000000000000000000000000000000000000000000000c99b0000ed410000000400009f09c75f9f09c75f9f09c75f00000000000003000200000000000800000000000af3010004000000000000000000000001", 0x59, 0x8c60}], 0x0, &(0x7f0000010f60)) [ 1641.968008] EXT4-fs (loop0): ext4_check_descriptors: Block bitmap for group 0 not in group (block 0)! [ 1641.969876] EXT4-fs (loop0): group descriptors corrupted! [ 1641.971270] EXT4-fs (loop7): ext4_check_descriptors: Block bitmap for group 0 not in group (block 0)! [ 1641.972926] EXT4-fs (loop7): group descriptors corrupted! [ 1641.989517] loop6: detected capacity change from 0 to 140 [ 1641.994907] EXT4-fs (loop6): ext4_check_descriptors: Block bitmap for group 0 not in group (block 0)! [ 1641.995630] EXT4-fs (loop6): group descriptors corrupted! [ 1642.009427] EXT4-fs error (device loop4): ext4_ext_check_inode:523: inode #2: comm syz-executor.4: pblk 0 bad header/extent: invalid extent entries - magic f30a, entries 1, max 4(4), depth 0(0) [ 1642.012434] EXT4-fs (loop3): ext4_check_descriptors: Inode table for group 0 not in group (block 0)! [ 1642.014025] EXT4-fs (loop3): group descriptors corrupted! 04:00:40 executing program 5: creat(&(0x7f00000003c0)='./file0\x00', 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext2\x00', &(0x7f0000000100)='./file0\x00', 0x4000d, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}], 0x0, &(0x7f0000013c00)=ANY=[]) [ 1642.034397] EXT4-fs (loop4): get root inode failed [ 1642.035246] EXT4-fs (loop4): mount failed 04:00:40 executing program 6: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="1000000040000000030000002b00000005000000010000000000000000000000002000000020000010000000000000009f09c75f0000ffff53ef", 0x3a, 0x400}, {&(0x7f0000010080)="000000000000000000000000ede2de4df49d4f87b54a3176cfd4eb4f010040000c000000000000009f09c75f", 0x2c, 0x4e0}, {&(0x7f00000100c0)="01000000000000000000000000000000000000000401000012", 0x19, 0x560}, {0x0, 0x0, 0x7e0}, {&(0x7f0000010ce0)="00000000000000000000000000000000000000000000000000000000c99b0000ed410000000400009f09c75f9f09c75f9f09c75f00000000000003000200000000000800000000000af301000400000000000000000000000100000004", 0x5d, 0x8c60}], 0x0, &(0x7f0000010f60)) getdents64(r0, &(0x7f0000000040)=""/4, 0x4) [ 1642.090400] loop1: detected capacity change from 0 to 140 [ 1642.104609] EXT4-fs (loop1): ext4_check_descriptors: Inode table for group 0 not in group (block 0)! [ 1642.105418] EXT4-fs (loop1): group descriptors corrupted! 04:00:41 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="1000000040000000030000002b00000005000000010000000000000000000000002000000020000010000000000000009f09c75f0000ffff53ef", 0x3a, 0x400}, {&(0x7f0000010080)="000000000000000000000000ede2de4df49d4f87b54a3176cfd4eb4f010040000c000000000000009f09c75f", 0x2c, 0x4e0}, {&(0x7f00000100c0)="01000000000000000000000000000000000000000401000012", 0x19, 0x560}, {&(0x7f00000100e0)="00000000000000000000000000000000000000000104", 0x16, 0x640}, {&(0x7f0000010100)='\x00'/23, 0x17, 0x7e0}, {&(0x7f0000010ce0)="00000000000000000000000000000000000000000000000000000000c99b0000ed410000000400009f09c75f9f09c75f9f09c75f00000000000003000200000000000800000000000af3010004", 0x4d, 0x8c60}], 0x0, &(0x7f0000010f60)) 04:00:41 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="1000000040000000030000002b00000005000000010000000000000000000000002000000020000010000000000000009f09c75f0000ffff53ef", 0x3a, 0x400}, {&(0x7f0000010080)="000000000000000000000000ede2de4df49d4f87b54a3176cfd4eb4f010040000c000000000000009f09c75f", 0x2c, 0x4e0}, {&(0x7f0000010100)="000000000000000000000000000000000000000000000000000000005178aedb0300000013000000", 0x28, 0x7e0}, {&(0x7f0000010ce0)="00000000000000000000000000000000000000000000000000000000c99b0000ed410000000400009f09c75f9f09c75f9f09c75f00000000000003000200000000000800000000000af3010004000000000000000000000001", 0x59, 0x8c60}], 0x0, &(0x7f0000010f60)) 04:00:41 executing program 7: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="1000000040000000030000002b00000005000000010000000000000000000000002000000020000010000000000000009f09c75f0000ffff53ef", 0x3a, 0x400}, {&(0x7f0000010080)="000000000000000000000000ede2de4df49d4f87b54a3176cfd4eb4f010040000c000000000000009f09c75f", 0x2c, 0x4e0}, {&(0x7f00000100c0)="01000000000000000000000000000000000000000401000012", 0x19, 0x560}, {&(0x7f0000010100)="000000000000000000000000000000000000000000000000000000005178ae", 0x1f, 0x7e0}, {&(0x7f0000010ce0)="00000000000000000000000000000000000000000000000000000000c99b0000ed410000000400009f09c75f9f09c75f9f09c75f00000000000003000200000000000800000000000af301000400000000000000000000000100000004", 0x5d, 0x8c60}], 0x0, &(0x7f0000010f60)) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) getdents64(r0, &(0x7f0000000040)=""/4, 0x4) 04:00:41 executing program 3: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="1000000040000000030000002b00000005000000010000000000000000000000002000000020000010000000000000009f09c75f0000ffff53ef", 0x3a, 0x400}, {&(0x7f0000010080)="000000000000000000000000ede2de4df49d4f87b54a3176cfd4eb4f010040000c000000000000009f09c75f", 0x2c, 0x4e0}, {&(0x7f00000100c0)="01000000000000000000000000000000000000000401000012", 0x19, 0x560}, {&(0x7f0000010100)="000000000000000000000000000000000000000000000000000000005178aedb0300000013000000", 0x28, 0x7e0}, {&(0x7f0000010ce0)="00000000000000000000000000000000000000000000000000000000c99b0000ed410000000400009f09c75f9f09c75f9f09c75f00000000000003000200000000000800000000000af301000400000000000000000000000100000004", 0x5d, 0x8c60}], 0x0, &(0x7f0000010f60)) getdents64(r0, &(0x7f0000000040)=""/4, 0x4) [ 1642.219273] loop0: detected capacity change from 0 to 140 [ 1642.219373] loop5: detected capacity change from 0 to 512 [ 1642.222592] loop6: detected capacity change from 0 to 140 04:00:41 executing program 4: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="1000000040000000030000002b00000005000000010000000000000000000000002000000020000010000000000000009f09c75f0000ffff53ef", 0x3a, 0x400}, {&(0x7f0000010080)="000000000000000000000000ede2de4df49d4f87b54a3176cfd4eb4f010040000c000000000000009f09c75f", 0x2c, 0x4e0}, {&(0x7f00000100c0)="01000000000000000000000000000000000000000401000012", 0x19, 0x560}, {&(0x7f00000100e0)="00000000000000000000000000000000000000000104", 0x16, 0x640}, {&(0x7f0000010100)="000000000000000000000000000000000000000000000000000000005178aedb0300000013000000230000002b0005000200040000000000907306c205002a9c00000000000000000000000000000000000000000000000091ecd11b", 0x5c, 0x7e0}, {&(0x7f0000010ce0)="00000000000000000000000000000000000000000000000000000000c99b0000ed410000000400009f09c75f9f09c75f9f09c75f00000000000003000200000000000800000000000af301000400"/88, 0x58, 0x8c60}], 0x0, &(0x7f0000010f60)) getdents64(r0, &(0x7f0000000040)=""/4, 0x4) [ 1642.227829] EXT4-fs (loop0): ext4_check_descriptors: Block bitmap for group 0 not in group (block 0)! [ 1642.228652] EXT4-fs (loop0): group descriptors corrupted! [ 1642.249852] loop7: detected capacity change from 0 to 140 [ 1642.253446] EXT4-fs (loop7): ext4_check_descriptors: Block bitmap for group 0 not in group (block 0)! [ 1642.254345] EXT4-fs (loop7): group descriptors corrupted! [ 1642.257065] EXT4-fs (loop5): mounting ext2 file system using the ext4 subsystem [ 1642.272099] loop1: detected capacity change from 0 to 140 [ 1642.274447] EXT4-fs (loop5): warning: mounting unchecked fs, running e2fsck is recommended [ 1642.278551] EXT4-fs (loop6): ext4_check_descriptors: Block bitmap for group 0 not in group (block 0)! [ 1642.279627] EXT4-fs (loop6): group descriptors corrupted! [ 1642.289284] EXT4-fs (loop1): ext4_check_descriptors: Inode table for group 0 not in group (block 0)! [ 1642.290132] EXT4-fs (loop1): group descriptors corrupted! [ 1642.291738] EXT4-fs (loop5): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: none. 04:00:41 executing program 7: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="1000000040000000030000002b00000005000000010000000000000000000000002000000020000010000000000000009f09c75f0000ffff53ef", 0x3a, 0x400}, {&(0x7f0000010080)="000000000000000000000000ede2de4df49d4f87b54a3176cfd4eb4f010040000c000000000000009f09c75f", 0x2c, 0x4e0}, {&(0x7f00000100c0)="01000000000000000000000000000000000000000401000012", 0x19, 0x560}, {&(0x7f0000010100)="000000000000000000000000000000000000000000000000000000005178aedb03000000", 0x24, 0x7e0}, {&(0x7f0000010ce0)="00000000000000000000000000000000000000000000000000000000c99b0000ed410000000400009f09c75f9f09c75f9f09c75f00000000000003000200000000000800000000000af301000400000000000000000000000100000004", 0x5d, 0x8c60}], 0x0, &(0x7f0000010f60)) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) getdents64(r0, &(0x7f0000000040)=""/4, 0x4) [ 1642.308083] loop3: detected capacity change from 0 to 140 [ 1642.320978] EXT4-fs (loop5): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 1642.331925] EXT4-fs (loop3): ext4_check_descriptors: Inode table for group 0 not in group (block 0)! [ 1642.332750] EXT4-fs (loop3): group descriptors corrupted! [ 1642.363267] loop4: detected capacity change from 0 to 140 04:00:41 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="1000000040000000030000002b00000005000000010000000000000000000000002000000020000010000000000000009f09c75f0000ffff53ef", 0x3a, 0x400}, {&(0x7f0000010080)="000000000000000000000000ede2de4df49d4f87b54a3176cfd4eb4f010040000c000000000000009f09c75f", 0x2c, 0x4e0}, {&(0x7f00000100c0)="01000000000000000000000000000000000000000401000012", 0x19, 0x560}, {&(0x7f00000100e0)="00000000000000000000000000000000000000000104", 0x16, 0x640}, {&(0x7f0000010100)="000000000000000000000000000000000000000000000000000000005178aedb030000", 0x23, 0x7e0}, {&(0x7f0000010ce0)="00000000000000000000000000000000000000000000000000000000c99b0000ed410000000400009f09c75f9f09c75f9f09c75f00000000000003000200000000000800000000000af3010004", 0x4d, 0x8c60}], 0x0, &(0x7f0000010f60)) 04:00:41 executing program 6: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="1000000040000000030000002b00000005000000010000000000000000000000002000000020000010000000000000009f09c75f0000ffff53ef", 0x3a, 0x400}, {&(0x7f0000010080)="000000000000000000000000ede2de4df49d4f87b54a3176cfd4eb4f010040000c000000000000009f09c75f", 0x2c, 0x4e0}, {&(0x7f00000100c0)="01000000000000000000000000000000000000000401000012", 0x19, 0x560}, {&(0x7f0000010100), 0x0, 0x7e0}, {&(0x7f0000010ce0)="00000000000000000000000000000000000000000000000000000000c99b0000ed410000000400009f09c75f9f09c75f9f09c75f00000000000003000200000000000800000000000af301000400000000000000000000000100000004", 0x5d, 0x8c60}], 0x0, &(0x7f0000010f60)) getdents64(r0, &(0x7f0000000040)=""/4, 0x4) [ 1642.389990] EXT4-fs error (device loop4): ext4_ext_check_inode:523: inode #2: comm syz-executor.4: pblk 0 bad header/extent: invalid extent entries - magic f30a, entries 1, max 4(4), depth 0(0) [ 1642.399172] EXT4-fs (loop4): get root inode failed [ 1642.399626] EXT4-fs (loop4): mount failed [ 1642.419983] loop7: detected capacity change from 0 to 140 [ 1642.440178] EXT4-fs (loop7): ext4_check_descriptors: Inode bitmap for group 0 not in group (block 0)! [ 1642.441967] EXT4-fs (loop7): group descriptors corrupted! [ 1642.446461] loop0: detected capacity change from 0 to 140 [ 1642.478247] EXT4-fs (loop0): ext4_check_descriptors: Inode bitmap for group 0 not in group (block 0)! [ 1642.479979] EXT4-fs (loop0): group descriptors corrupted! [ 1642.492667] loop6: detected capacity change from 0 to 140 [ 1642.497739] EXT4-fs (loop6): ext4_check_descriptors: Block bitmap for group 0 not in group (block 0)! [ 1642.498531] EXT4-fs (loop6): group descriptors corrupted! 04:00:50 executing program 3: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="1000000040000000030000002b00000005000000010000000000000000000000002000000020000010000000000000009f09c75f0000ffff53ef", 0x3a, 0x400}, {&(0x7f0000010080)="000000000000000000000000ede2de4df49d4f87b54a3176cfd4eb4f010040000c000000000000009f09c75f", 0x2c, 0x4e0}, {&(0x7f00000100c0)="01000000000000000000000000000000000000000401000012", 0x19, 0x560}, {&(0x7f0000010100)="000000000000000000000000000000000000000000000000000000005178aedb0300000013000000", 0x28, 0x7e0}, {&(0x7f0000010ce0)="00000000000000000000000000000000000000000000000000000000c99b0000ed410000000400009f09c75f9f09c75f9f09c75f00000000000003000200000000000800000000000af301000400000000000000000000000100000004", 0x5d, 0x8c60}], 0x0, &(0x7f0000010f60)) getdents64(r0, &(0x7f0000000040)=""/4, 0x4) 04:00:50 executing program 5: creat(&(0x7f00000003c0)='./file0\x00', 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext2\x00', &(0x7f0000000100)='./file0\x00', 0x4000e, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}], 0x0, &(0x7f0000013c00)=ANY=[]) 04:00:50 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="1000000040000000030000002b00000005000000010000000000000000000000002000000020000010000000000000009f09c75f0000ffff53ef", 0x3a, 0x400}, {&(0x7f0000010080)="000000000000000000000000ede2de4df49d4f87b54a3176cfd4eb4f010040000c000000000000009f09c75f", 0x2c, 0x4e0}, {&(0x7f0000010100)="000000000000000000000000000000000000000000000000000000005178aedb030000001300000023", 0x29}, {&(0x7f0000010ce0)="00000000000000000000000000000000000000000000000000000000c99b0000ed410000000400009f09c75f9f09c75f9f09c75f00000000000003000200000000000800000000000af3010004000000000000000000000001", 0x59, 0x8c60}], 0x0, &(0x7f0000010f60)) 04:00:50 executing program 2: sendmsg$NL80211_CMD_UNEXPECTED_FRAME(0xffffffffffffffff, &(0x7f0000000400)={0x0, 0x0, &(0x7f0000000300)={&(0x7f00000002c0)={0x1c, 0x0, 0x1, 0x0, 0x0, {{}, {@val={0x8}, @void}}}, 0x1c}}, 0x0) sendmsg$NL80211_CMD_UPDATE_FT_IES(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000001c0)={0x24, 0x0, 0x1, 0x70bd2c, 0x0, {{}, {@val={0x8}, @void}}, [@NL80211_ATTR_MDID={0x6, 0xb1, 0xc116}]}, 0x24}, 0x1, 0x0, 0x0, 0x80}, 0xc000) r0 = creat(&(0x7f00000003c0)='./file1\x00', 0x0) sendmsg$netlink(0xffffffffffffffff, 0x0, 0x0) dup(0xffffffffffffffff) pwritev2(r0, &(0x7f0000000380)=[{&(0x7f0000000180)="bd", 0xfffffdef}], 0x1, 0x1200, 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) ioctl$FS_IOC_FSSETXATTR(r1, 0x401c5820, &(0x7f0000000200)={0x9}) syz_io_uring_setup(0x0, &(0x7f0000000000)={0x0, 0x0, 0x4, 0x2, 0x309}, &(0x7f0000ffc000/0x2000)=nil, &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000000080), &(0x7f0000000240)) syz_io_uring_submit(0x0, 0x0, &(0x7f0000000280)=@IORING_OP_ASYNC_CANCEL, 0x1ff) 04:00:50 executing program 7: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="1000000040000000030000002b00000005000000010000000000000000000000002000000020000010000000000000009f09c75f0000ffff53ef", 0x3a, 0x400}, {&(0x7f0000010080)="000000000000000000000000ede2de4df49d4f87b54a3176cfd4eb4f010040000c000000000000009f09c75f", 0x2c, 0x4e0}, {&(0x7f00000100c0)="01000000000000000000000000000000000000000401000012", 0x19, 0x560}, {&(0x7f0000010100)="000000000000000000000000000000000000000000000000000000005178aedb03000000", 0x24, 0x7e0}, {&(0x7f0000010ce0)="00000000000000000000000000000000000000000000000000000000c99b0000ed410000000400009f09c75f9f09c75f9f09c75f00000000000003000200000000000800000000000af301000400000000000000000000000100000004", 0x5d, 0x8c60}], 0x0, &(0x7f0000010f60)) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) getdents64(r0, &(0x7f0000000040)=""/4, 0x4) 04:00:50 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="1000000040000000030000002b00000005000000010000000000000000000000002000000020000010000000000000009f09c75f0000ffff53ef", 0x3a, 0x400}, {&(0x7f0000010080)="000000000000000000000000ede2de4df49d4f87b54a3176cfd4eb4f010040000c000000000000009f09c75f", 0x2c, 0x4e0}, {&(0x7f00000100c0)="01000000000000000000000000000000000000000401000012", 0x19, 0x560}, {&(0x7f00000100e0)="00000000000000000000000000000000000000000104", 0x16, 0x640}, {&(0x7f0000010100)="000000000000000000000000000000000000000000000000000000005178aedb0300000013000000230000002b0005000200040000000000907306c205002a9c00000000000000000000000000000000000000000000000091ecd11b", 0x5c, 0x7e0}, {&(0x7f0000010ce0)="00000000000000000000000000000000000000000000000000000000c99b0000ed410000000400009f09c75f9f09c75f9f09c75f00000000000003000200000000000800000000000af301000400"/88, 0x58, 0x8c60}], 0x0, &(0x7f0000010f60)) 04:00:50 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="1000000040000000030000002b00000005000000010000000000000000000000002000000020000010000000000000009f09c75f0000ffff53ef", 0x3a, 0x400}, {&(0x7f0000010080)="000000000000000000000000ede2de4df49d4f87b54a3176cfd4eb4f010040000c000000000000009f09c75f", 0x2c, 0x4e0}, {&(0x7f00000100c0)="01000000000000000000000000000000000000000401000012", 0x19, 0x560}, {&(0x7f00000100e0)="00000000000000000000000000000000000000000104", 0x16, 0x640}, {&(0x7f0000010100)="000000000000000000000000000000000000000000000000000000005178aedb030000", 0x23, 0x7e0}, {&(0x7f0000010ce0)="00000000000000000000000000000000000000000000000000000000c99b0000ed410000000400009f09c75f9f09c75f9f09c75f00000000000003000200000000000800000000000af3010004", 0x4d, 0x8c60}], 0x0, &(0x7f0000010f60)) 04:00:50 executing program 6: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="1000000040000000030000002b00000005000000010000000000000000000000002000000020000010000000000000009f09c75f0000ffff53ef", 0x3a, 0x400}, {&(0x7f0000010080)="000000000000000000000000ede2de4df49d4f87b54a3176cfd4eb4f010040000c000000000000009f09c75f", 0x2c, 0x4e0}, {&(0x7f00000100c0)="01000000000000000000000000000000000000000401000012", 0x19, 0x560}, {&(0x7f0000010100), 0x0, 0x7e0}, {&(0x7f0000010ce0)="00000000000000000000000000000000000000000000000000000000c99b0000ed410000000400009f09c75f9f09c75f9f09c75f00000000000003000200000000000800000000000af301000400000000000000000000000100000004", 0x5d, 0x8c60}], 0x0, &(0x7f0000010f60)) getdents64(r0, &(0x7f0000000040)=""/4, 0x4) [ 1651.871533] loop4: detected capacity change from 0 to 140 [ 1651.875761] loop3: detected capacity change from 0 to 140 [ 1651.880552] EXT4-fs error (device loop4): ext4_ext_check_inode:523: inode #2: comm syz-executor.4: pblk 0 bad header/extent: invalid extent entries - magic f30a, entries 1, max 4(4), depth 0(0) [ 1651.884906] loop5: detected capacity change from 0 to 512 [ 1651.885619] EXT4-fs (loop3): ext4_check_descriptors: Inode table for group 0 not in group (block 0)! [ 1651.886252] loop1: detected capacity change from 0 to 140 [ 1651.886394] EXT4-fs (loop3): group descriptors corrupted! [ 1651.889553] EXT4-fs (loop4): get root inode failed [ 1651.890061] EXT4-fs (loop4): mount failed [ 1651.897433] loop6: detected capacity change from 0 to 140 [ 1651.904167] EXT4-fs (loop1): ext4_check_descriptors: Block bitmap for group 0 not in group (block 0)! [ 1651.904922] EXT4-fs (loop1): group descriptors corrupted! [ 1651.906808] loop7: detected capacity change from 0 to 140 [ 1651.909539] EXT4-fs (loop5): mounting ext2 file system using the ext4 subsystem [ 1651.911059] EXT4-fs (loop6): ext4_check_descriptors: Block bitmap for group 0 not in group (block 0)! [ 1651.911809] EXT4-fs (loop6): group descriptors corrupted! [ 1651.920114] EXT4-fs (loop5): warning: mounting unchecked fs, running e2fsck is recommended [ 1651.922404] loop0: detected capacity change from 0 to 140 [ 1651.923458] EXT4-fs (loop7): ext4_check_descriptors: Inode bitmap for group 0 not in group (block 0)! [ 1651.924250] EXT4-fs (loop7): group descriptors corrupted! [ 1651.942332] EXT4-fs (loop5): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: none. [ 1651.949360] EXT4-fs (loop0): ext4_check_descriptors: Inode bitmap for group 0 not in group (block 0)! [ 1651.951064] EXT4-fs (loop0): group descriptors corrupted! [ 1651.960096] EXT4-fs (loop5): unmounting filesystem 00000000-0000-0000-0000-000000000000. 04:00:50 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="1000000040000000030000002b00000005000000010000000000000000000000002000000020000010000000000000009f09c75f0000ffff53ef", 0x3a, 0x400}, {&(0x7f0000010080)="000000000000000000000000ede2de4df49d4f87b54a3176cfd4eb4f010040000c000000000000009f09c75f", 0x2c, 0x4e0}, {&(0x7f0000010100)="000000000000000000000000000000000000000000000000000000005178aedb030000001300000023", 0x29}, {&(0x7f0000010ce0)="00000000000000000000000000000000000000000000000000000000c99b0000ed410000000400009f09c75f9f09c75f9f09c75f00000000000003000200000000000800000000000af3010004000000000000000000000001", 0x59, 0x8c60}], 0x0, &(0x7f0000010f60)) 04:00:50 executing program 4: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="1000000040000000030000002b00000005000000010000000000000000000000002000000020000010000000000000009f09c75f0000ffff53ef", 0x3a, 0x400}, {&(0x7f0000010080)="000000000000000000000000ede2de4df49d4f87b54a3176cfd4eb4f010040000c000000000000009f09c75f", 0x2c, 0x4e0}, {&(0x7f00000100c0)="01000000000000000000000000000000000000000401000012", 0x19, 0x560}, {&(0x7f00000100e0)="00000000000000000000000000000000000000000104", 0x16, 0x640}, {&(0x7f0000010100)="000000000000000000000000000000000000000000000000000000005178aedb0300000013000000230000002b0005000200040000000000907306c205002a9c00000000000000000000000000000000000000000000000091ecd11b", 0x5c, 0x7e0}, {&(0x7f0000010ce0)="00000000000000000000000000000000000000000000000000000000c99b0000ed410000000400009f09c75f9f09c75f9f09c75f00000000000003000200000000000800000000000af301000400"/88, 0x58, 0x8c60}], 0x0, &(0x7f0000010f60)) 04:00:50 executing program 3: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="1000000040000000030000002b00000005000000010000000000000000000000002000000020000010000000000000009f09c75f0000ffff53ef", 0x3a, 0x400}, {&(0x7f0000010080)="000000000000000000000000ede2de4df49d4f87b54a3176cfd4eb4f010040000c000000000000009f09c75f", 0x2c, 0x4e0}, {&(0x7f00000100c0)="01000000000000000000000000000000000000000401000012", 0x19, 0x560}, {&(0x7f0000010100)="000000000000000000000000000000000000000000000000000000005178aedb030000001300000023", 0x29}, {&(0x7f0000010ce0)="00000000000000000000000000000000000000000000000000000000c99b0000ed410000000400009f09c75f9f09c75f9f09c75f00000000000003000200000000000800000000000af301000400000000000000000000000100000004", 0x5d, 0x8c60}], 0x0, &(0x7f0000010f60)) getdents64(r0, &(0x7f0000000040)=""/4, 0x4) 04:00:50 executing program 7: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="1000000040000000030000002b00000005000000010000000000000000000000002000000020000010000000000000009f09c75f0000ffff53ef", 0x3a, 0x400}, {&(0x7f0000010080)="000000000000000000000000ede2de4df49d4f87b54a3176cfd4eb4f010040000c000000000000009f09c75f", 0x2c, 0x4e0}, {&(0x7f00000100c0)="01000000000000000000000000000000000000000401000012", 0x19, 0x560}, {&(0x7f0000010100)="000000000000000000000000000000000000000000000000000000005178aedb03000000", 0x24, 0x7e0}, {&(0x7f0000010ce0)="00000000000000000000000000000000000000000000000000000000c99b0000ed410000000400009f09c75f9f09c75f9f09c75f00000000000003000200000000000800000000000af301000400000000000000000000000100000004", 0x5d, 0x8c60}], 0x0, &(0x7f0000010f60)) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) getdents64(r0, &(0x7f0000000040)=""/4, 0x4) [ 1652.041255] loop7: detected capacity change from 0 to 140 [ 1652.045701] EXT4-fs (loop7): ext4_check_descriptors: Inode bitmap for group 0 not in group (block 0)! [ 1652.046487] EXT4-fs (loop7): group descriptors corrupted! [ 1652.047642] loop4: detected capacity change from 0 to 140 [ 1652.052278] loop3: detected capacity change from 0 to 140 [ 1652.083155] EXT4-fs (loop3): ext4_check_descriptors: Block bitmap for group 0 not in group (block 0)! [ 1652.084110] EXT4-fs (loop3): group descriptors corrupted! [ 1652.124510] loop1: detected capacity change from 0 to 140 [ 1652.133379] EXT4-fs (loop1): ext4_check_descriptors: Block bitmap for group 0 not in group (block 0)! [ 1652.134953] EXT4-fs (loop1): group descriptors corrupted! 04:01:01 executing program 2: sendmsg$NL80211_CMD_UNEXPECTED_FRAME(0xffffffffffffffff, &(0x7f0000000400)={0x0, 0x0, &(0x7f0000000300)={&(0x7f00000002c0)={0x1c, 0x0, 0x1, 0x0, 0x0, {{}, {@val={0x8}, @void}}}, 0x1c}}, 0x0) sendmsg$NL80211_CMD_UPDATE_FT_IES(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000001c0)={0x24, 0x0, 0x1, 0x70bd2c, 0x0, {{}, {@val={0x8}, @void}}, [@NL80211_ATTR_MDID={0x6, 0xb1, 0xc116}]}, 0x24}, 0x1, 0x0, 0x0, 0x80}, 0xc000) r0 = creat(&(0x7f00000003c0)='./file1\x00', 0x0) sendmsg$netlink(0xffffffffffffffff, 0x0, 0x0) dup(0xffffffffffffffff) pwritev2(r0, &(0x7f0000000380)=[{&(0x7f0000000180)="bd", 0xfffffdef}], 0x1, 0x1200, 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) ioctl$FS_IOC_FSSETXATTR(r1, 0x401c5820, &(0x7f0000000200)={0x9}) syz_io_uring_setup(0x0, &(0x7f0000000000)={0x0, 0x0, 0x4, 0x2, 0x309}, &(0x7f0000ffc000/0x2000)=nil, &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000000080), &(0x7f0000000240)) syz_io_uring_submit(0x0, 0x0, &(0x7f0000000280)=@IORING_OP_ASYNC_CANCEL, 0x1ff) 04:01:01 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="1000000040000000030000002b00000005000000010000000000000000000000002000000020000010000000000000009f09c75f0000ffff53ef", 0x3a, 0x400}, {&(0x7f0000010080)="000000000000000000000000ede2de4df49d4f87b54a3176cfd4eb4f010040000c000000000000009f09c75f", 0x2c, 0x4e0}, {&(0x7f0000010100)="000000000000000000000000000000000000000000000000000000005178aedb030000001300000023", 0x29}, {&(0x7f0000010ce0)="00000000000000000000000000000000000000000000000000000000c99b0000ed410000000400009f09c75f9f09c75f9f09c75f00000000000003000200000000000800000000000af3010004000000000000000000000001", 0x59, 0x8c60}], 0x0, &(0x7f0000010f60)) 04:01:01 executing program 7: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="1000000040000000030000002b00000005000000010000000000000000000000002000000020000010000000000000009f09c75f0000ffff53ef", 0x3a, 0x400}, {&(0x7f0000010080)="000000000000000000000000ede2de4df49d4f87b54a3176cfd4eb4f010040000c000000000000009f09c75f", 0x2c, 0x4e0}, {&(0x7f00000100c0)="01000000000000000000000000000000000000000401000012", 0x19, 0x560}, {&(0x7f0000010100)="000000000000000000000000000000000000000000000000000000005178aedb03000000130000", 0x27, 0x7e0}, {&(0x7f0000010ce0)="00000000000000000000000000000000000000000000000000000000c99b0000ed410000000400009f09c75f9f09c75f9f09c75f00000000000003000200000000000800000000000af301000400000000000000000000000100000004", 0x5d, 0x8c60}], 0x0, &(0x7f0000010f60)) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) getdents64(r0, &(0x7f0000000040)=""/4, 0x4) 04:01:01 executing program 6: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="1000000040000000030000002b00000005000000010000000000000000000000002000000020000010000000000000009f09c75f0000ffff53ef", 0x3a, 0x400}, {&(0x7f0000010080)="000000000000000000000000ede2de4df49d4f87b54a3176cfd4eb4f010040000c000000000000009f09c75f", 0x2c, 0x4e0}, {&(0x7f00000100c0)="01000000000000000000000000000000000000000401000012", 0x19, 0x560}, {&(0x7f0000010100), 0x0, 0x7e0}, {&(0x7f0000010ce0)="00000000000000000000000000000000000000000000000000000000c99b0000ed410000000400009f09c75f9f09c75f9f09c75f00000000000003000200000000000800000000000af301000400000000000000000000000100000004", 0x5d, 0x8c60}], 0x0, &(0x7f0000010f60)) getdents64(r0, &(0x7f0000000040)=""/4, 0x4) 04:01:01 executing program 5: creat(&(0x7f00000003c0)='./file0\x00', 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext2\x00', &(0x7f0000000100)='./file0\x00', 0x40010, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}], 0x0, &(0x7f0000013c00)=ANY=[]) 04:01:01 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="1000000040000000030000002b00000005000000010000000000000000000000002000000020000010000000000000009f09c75f0000ffff53ef", 0x3a, 0x400}, {&(0x7f0000010080)="000000000000000000000000ede2de4df49d4f87b54a3176cfd4eb4f010040000c000000000000009f09c75f", 0x2c, 0x4e0}, {&(0x7f00000100c0)="01000000000000000000000000000000000000000401000012", 0x19, 0x560}, {&(0x7f00000100e0)="00000000000000000000000000000000000000000104", 0x16, 0x640}, {&(0x7f0000010100)="000000000000000000000000000000000000000000000000000000005178aedb030000", 0x23, 0x7e0}, {&(0x7f0000010ce0)="00000000000000000000000000000000000000000000000000000000c99b0000ed410000000400009f09c75f9f09c75f9f09c75f00000000000003000200000000000800000000000af3010004", 0x4d, 0x8c60}], 0x0, &(0x7f0000010f60)) 04:01:01 executing program 4: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="1000000040000000030000002b00000005000000010000000000000000000000002000000020000010000000000000009f09c75f0000ffff53ef", 0x3a, 0x400}, {&(0x7f0000010080)="000000000000000000000000ede2de4df49d4f87b54a3176cfd4eb4f010040000c000000000000009f09c75f", 0x2c, 0x4e0}, {&(0x7f00000100c0)="01000000000000000000000000000000000000000401000012", 0x19, 0x560}, {&(0x7f00000100e0)="00000000000000000000000000000000000000000104", 0x16, 0x640}, {&(0x7f0000010100)="000000000000000000000000000000000000000000000000000000005178aedb0300000013000000230000002b0005000200040000000000907306c205002a9c00000000000000000000000000000000000000000000000091ecd11b", 0x5c, 0x7e0}, {&(0x7f0000010ce0)="00000000000000000000000000000000000000000000000000000000c99b0000ed410000000400009f09c75f9f09c75f9f09c75f00000000000003000200000000000800000000000af301000400"/88, 0x58, 0x8c60}], 0x0, &(0x7f0000010f60)) 04:01:01 executing program 3: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="1000000040000000030000002b00000005000000010000000000000000000000002000000020000010000000000000009f09c75f0000ffff53ef", 0x3a, 0x400}, {&(0x7f0000010080)="000000000000000000000000ede2de4df49d4f87b54a3176cfd4eb4f010040000c000000000000009f09c75f", 0x2c, 0x4e0}, {&(0x7f00000100c0)="01000000000000000000000000000000000000000401000012", 0x19, 0x560}, {&(0x7f0000010100)="000000000000000000000000000000000000000000000000000000005178aedb030000001300000023", 0x29}, {&(0x7f0000010ce0)="00000000000000000000000000000000000000000000000000000000c99b0000ed410000000400009f09c75f9f09c75f9f09c75f00000000000003000200000000000800000000000af301000400000000000000000000000100000004", 0x5d, 0x8c60}], 0x0, &(0x7f0000010f60)) getdents64(r0, &(0x7f0000000040)=""/4, 0x4) [ 1662.671876] loop1: detected capacity change from 0 to 140 [ 1662.673419] loop6: detected capacity change from 0 to 140 [ 1662.688717] EXT4-fs (loop6): ext4_check_descriptors: Block bitmap for group 0 not in group (block 0)! [ 1662.690334] EXT4-fs (loop6): group descriptors corrupted! [ 1662.693122] EXT4-fs (loop1): ext4_check_descriptors: Block bitmap for group 0 not in group (block 0)! [ 1662.694675] EXT4-fs (loop1): group descriptors corrupted! [ 1662.702476] loop0: detected capacity change from 0 to 140 [ 1662.708708] loop4: detected capacity change from 0 to 140 [ 1662.713315] loop7: detected capacity change from 0 to 140 [ 1662.715715] loop3: detected capacity change from 0 to 140 [ 1662.731600] EXT4-fs (loop0): ext4_check_descriptors: Inode bitmap for group 0 not in group (block 0)! [ 1662.732995] EXT4-fs (loop0): group descriptors corrupted! [ 1662.735315] EXT4-fs (loop7): ext4_check_descriptors: Inode table for group 0 not in group (block 0)! [ 1662.735473] loop5: detected capacity change from 0 to 512 [ 1662.736762] EXT4-fs (loop7): group descriptors corrupted! [ 1662.748632] EXT4-fs (loop3): ext4_check_descriptors: Block bitmap for group 0 not in group (block 0)! [ 1662.750254] EXT4-fs (loop3): group descriptors corrupted! [ 1662.763648] EXT4-fs (loop5): mounting ext2 file system using the ext4 subsystem [ 1662.796762] EXT4-fs (loop5): warning: mounting unchecked fs, running e2fsck is recommended 04:01:01 executing program 4: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="1000000040000000030000002b00000005000000010000000000000000000000002000000020000010000000000000009f09c75f0000ffff53ef", 0x3a, 0x400}, {&(0x7f0000010080)="000000000000000000000000ede2de4df49d4f87b54a3176cfd4eb4f010040000c000000000000009f09c75f", 0x2c, 0x4e0}, {&(0x7f00000100c0)="01000000000000000000000000000000000000000401000012", 0x19, 0x560}, {&(0x7f00000100e0)="00000000000000000000000000000000000000000104", 0x16, 0x640}, {&(0x7f0000010100)="000000000000000000000000000000000000000000000000000000005178aedb0300000013000000230000002b0005000200040000000000907306c205002a9c00000000000000000000000000000000000000000000000091ecd11b", 0x5c, 0x7e0}, {&(0x7f0000010ce0)="00000000000000000000000000000000000000000000000000000000c99b0000ed410000000400009f09c75f9f09c75f9f09c75f00000000000003000200000000000800000000000af301000400"/88, 0x58, 0x8c60}], 0x0, &(0x7f0000010f60)) 04:01:01 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="1000000040000000030000002b00000005000000010000000000000000000000002000000020000010000000000000009f09c75f0000ffff53ef", 0x3a, 0x400}, {&(0x7f0000010100)="000000000000000000000000000000000000000000000000000000005178aedb030000001300000023", 0x29, 0x7e0}, {&(0x7f0000010ce0)="00000000000000000000000000000000000000000000000000000000c99b0000ed410000000400009f09c75f9f09c75f9f09c75f00000000000003000200000000000800000000000af3010004000000000000000000000001", 0x59, 0x8c60}], 0x0, &(0x7f0000010f60)) 04:01:01 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="1000000040000000030000002b00000005000000010000000000000000000000002000000020000010000000000000009f09c75f0000ffff53ef", 0x3a, 0x400}, {&(0x7f0000010080)="000000000000000000000000ede2de4df49d4f87b54a3176cfd4eb4f010040000c000000000000009f09c75f", 0x2c, 0x4e0}, {&(0x7f00000100c0)="01000000000000000000000000000000000000000401000012", 0x19, 0x560}, {&(0x7f00000100e0)="00000000000000000000000000000000000000000104", 0x16, 0x640}, {&(0x7f0000010100)="000000000000000000000000000000000000000000000000000000005178aedb030000001300000023", 0x29, 0x7e0}, {&(0x7f0000010ce0)="00000000000000000000000000000000000000000000000000000000c99b0000ed410000000400009f09c75f9f09c75f9f09c75f00000000000003000200000000000800000000000af3010004", 0x4d, 0x8c60}], 0x0, &(0x7f0000010f60)) 04:01:01 executing program 6: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="1000000040000000030000002b00000005000000010000000000000000000000002000000020000010000000000000009f09c75f0000ffff53ef", 0x3a, 0x400}, {&(0x7f0000010080)="000000000000000000000000ede2de4df49d4f87b54a3176cfd4eb4f010040000c000000000000009f09c75f", 0x2c, 0x4e0}, {&(0x7f00000100c0)="01000000000000000000000000000000000000000401000012", 0x19, 0x560}, {&(0x7f0000010100)='\x00'/21, 0x15, 0x7e0}, {&(0x7f0000010ce0)="00000000000000000000000000000000000000000000000000000000c99b0000ed410000000400009f09c75f9f09c75f9f09c75f00000000000003000200000000000800000000000af301000400000000000000000000000100000004", 0x5d, 0x8c60}], 0x0, &(0x7f0000010f60)) getdents64(r0, &(0x7f0000000040)=""/4, 0x4) 04:01:01 executing program 7: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="1000000040000000030000002b00000005000000010000000000000000000000002000000020000010000000000000009f09c75f0000ffff53ef", 0x3a, 0x400}, {&(0x7f0000010080)="000000000000000000000000ede2de4df49d4f87b54a3176cfd4eb4f010040000c000000000000009f09c75f", 0x2c, 0x4e0}, {&(0x7f00000100c0)="01000000000000000000000000000000000000000401000012", 0x19, 0x560}, {&(0x7f0000010100)="000000000000000000000000000000000000000000000000000000005178aedb03000000130000", 0x27, 0x7e0}, {&(0x7f0000010ce0)="00000000000000000000000000000000000000000000000000000000c99b0000ed410000000400009f09c75f9f09c75f9f09c75f00000000000003000200000000000800000000000af301000400000000000000000000000100000004", 0x5d, 0x8c60}], 0x0, &(0x7f0000010f60)) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) getdents64(r0, &(0x7f0000000040)=""/4, 0x4) [ 1662.858074] EXT4-fs (loop5): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: none. [ 1662.913388] EXT4-fs (loop5): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 1662.922770] loop7: detected capacity change from 0 to 140 [ 1662.938650] EXT4-fs (loop7): ext4_check_descriptors: Inode table for group 0 not in group (block 0)! [ 1662.940298] EXT4-fs (loop7): group descriptors corrupted! 04:01:01 executing program 3: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="1000000040000000030000002b00000005000000010000000000000000000000002000000020000010000000000000009f09c75f0000ffff53ef", 0x3a, 0x400}, {&(0x7f0000010080)="000000000000000000000000ede2de4df49d4f87b54a3176cfd4eb4f010040000c000000000000009f09c75f", 0x2c, 0x4e0}, {&(0x7f00000100c0)="01000000000000000000000000000000000000000401000012", 0x19, 0x560}, {&(0x7f0000010100)="000000000000000000000000000000000000000000000000000000005178aedb030000001300000023", 0x29}, {&(0x7f0000010ce0)="00000000000000000000000000000000000000000000000000000000c99b0000ed410000000400009f09c75f9f09c75f9f09c75f00000000000003000200000000000800000000000af301000400000000000000000000000100000004", 0x5d, 0x8c60}], 0x0, &(0x7f0000010f60)) getdents64(r0, &(0x7f0000000040)=""/4, 0x4) [ 1662.987439] loop4: detected capacity change from 0 to 140 [ 1662.998676] loop1: detected capacity change from 0 to 140 [ 1663.008381] loop6: detected capacity change from 0 to 140 [ 1663.022111] loop0: detected capacity change from 0 to 140 [ 1663.027469] EXT4-fs (loop6): ext4_check_descriptors: Block bitmap for group 0 not in group (block 0)! [ 1663.028877] EXT4-fs (loop6): group descriptors corrupted! [ 1663.040831] EXT4-fs error (device loop1): ext4_ext_check_inode:523: inode #2: comm syz-executor.1: pblk 0 bad header/extent: invalid extent entries - magic f30a, entries 1, max 4(4), depth 0(0) 04:01:01 executing program 5: creat(&(0x7f00000003c0)='./file0\x00', 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext2\x00', &(0x7f0000000100)='./file0\x00', 0x40011, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}], 0x0, &(0x7f0000013c00)=ANY=[]) [ 1663.054023] EXT4-fs (loop1): get root inode failed [ 1663.054773] EXT4-fs (loop1): mount failed [ 1663.070520] EXT4-fs error (device loop0): ext4_ext_check_inode:523: inode #2: comm syz-executor.0: pblk 0 bad header/extent: invalid extent entries - magic f30a, entries 1, max 4(4), depth 0(0) [ 1663.079863] EXT4-fs (loop0): get root inode failed [ 1663.080777] EXT4-fs (loop0): mount failed 04:01:01 executing program 7: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="1000000040000000030000002b00000005000000010000000000000000000000002000000020000010000000000000009f09c75f0000ffff53ef", 0x3a, 0x400}, {&(0x7f0000010080)="000000000000000000000000ede2de4df49d4f87b54a3176cfd4eb4f010040000c000000000000009f09c75f", 0x2c, 0x4e0}, {&(0x7f00000100c0)="01000000000000000000000000000000000000000401000012", 0x19, 0x560}, {&(0x7f0000010100)="000000000000000000000000000000000000000000000000000000005178aedb03000000130000", 0x27, 0x7e0}, {&(0x7f0000010ce0)="00000000000000000000000000000000000000000000000000000000c99b0000ed410000000400009f09c75f9f09c75f9f09c75f00000000000003000200000000000800000000000af301000400000000000000000000000100000004", 0x5d, 0x8c60}], 0x0, &(0x7f0000010f60)) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) getdents64(r0, &(0x7f0000000040)=""/4, 0x4) [ 1663.116324] loop3: detected capacity change from 0 to 140 [ 1663.154438] EXT4-fs (loop3): ext4_check_descriptors: Block bitmap for group 0 not in group (block 0)! [ 1663.155894] EXT4-fs (loop3): group descriptors corrupted! [ 1663.191658] loop5: detected capacity change from 0 to 512 [ 1663.228722] EXT4-fs (loop5): mounting ext2 file system using the ext4 subsystem [ 1663.242720] loop7: detected capacity change from 0 to 140 [ 1663.246351] EXT4-fs (loop5): warning: mounting unchecked fs, running e2fsck is recommended [ 1663.251271] EXT4-fs (loop7): ext4_check_descriptors: Inode table for group 0 not in group (block 0)! [ 1663.252980] EXT4-fs (loop7): group descriptors corrupted! [ 1663.263301] EXT4-fs (loop5): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: none. [ 1663.279323] EXT4-fs (loop5): unmounting filesystem 00000000-0000-0000-0000-000000000000. 04:01:14 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', 0x0, 0x0, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="1000000040000000030000002b00000005000000010000000000000000000000002000000020000010000000000000009f09c75f0000ffff53ef", 0x3a, 0x400}, {&(0x7f0000010080)="000000000000000000000000ede2de4df49d4f87b54a3176cfd4eb4f010040000c000000000000009f09c75f", 0x2c, 0x4e0}, {&(0x7f00000100c0)="01000000000000000000000000000000000000000401000012", 0x19, 0x560}, {&(0x7f00000100e0)="00000000000000000000000000000000000000000104", 0x16, 0x640}, {&(0x7f0000010100)="000000000000000000000000000000000000000000000000000000005178aedb0300000013000000230000002b0005000200040000000000907306c205002a9c00000000000000000000000000000000000000000000000091ecd11b", 0x5c, 0x7e0}, {&(0x7f0000010ce0)="00000000000000000000000000000000000000000000000000000000c99b0000ed410000000400009f09c75f9f09c75f9f09c75f00000000000003000200000000000800000000000af301000400"/88, 0x58, 0x8c60}], 0x0, &(0x7f0000010f60)) 04:01:14 executing program 6: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="1000000040000000030000002b00000005000000010000000000000000000000002000000020000010000000000000009f09c75f0000ffff53ef", 0x3a, 0x400}, {&(0x7f0000010080)="000000000000000000000000ede2de4df49d4f87b54a3176cfd4eb4f010040000c000000000000009f09c75f", 0x2c, 0x4e0}, {&(0x7f00000100c0)="01000000000000000000000000000000000000000401000012", 0x19, 0x560}, {&(0x7f0000010100)='\x00'/21, 0x15, 0x7e0}, {&(0x7f0000010ce0)="00000000000000000000000000000000000000000000000000000000c99b0000ed410000000400009f09c75f9f09c75f9f09c75f00000000000003000200000000000800000000000af301000400000000000000000000000100000004", 0x5d, 0x8c60}], 0x0, &(0x7f0000010f60)) getdents64(r0, &(0x7f0000000040)=""/4, 0x4) 04:01:14 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="1000000040000000030000002b00000005000000010000000000000000000000002000000020000010000000000000009f09c75f0000ffff53ef", 0x3a, 0x400}, {&(0x7f0000010080)="000000000000000000000000ede2de4df49d4f87b54a3176cfd4eb4f010040000c000000000000009f09c75f", 0x2c, 0x4e0}, {&(0x7f00000100c0)="01000000000000000000000000000000000000000401000012", 0x19, 0x560}, {&(0x7f00000100e0)="00000000000000000000000000000000000000000104", 0x16, 0x640}, {&(0x7f0000010100)="000000000000000000000000000000000000000000000000000000005178aedb03000000", 0x24, 0x7e0}, {&(0x7f0000010ce0)="00000000000000000000000000000000000000000000000000000000c99b0000ed410000000400009f09c75f9f09c75f9f09c75f00000000000003000200000000000800000000000af3010004", 0x4d, 0x8c60}], 0x0, &(0x7f0000010f60)) 04:01:14 executing program 3: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="1000000040000000030000002b00000005000000010000000000000000000000002000000020000010000000000000009f09c75f0000ffff53ef", 0x3a, 0x400}, {&(0x7f0000010080)="000000000000000000000000ede2de4df49d4f87b54a3176cfd4eb4f010040000c000000000000009f09c75f", 0x2c, 0x4e0}, {&(0x7f0000010100)="000000000000000000000000000000000000000000000000000000005178aedb030000001300000023", 0x29, 0x7e0}, {&(0x7f0000010ce0)="00000000000000000000000000000000000000000000000000000000c99b0000ed410000000400009f09c75f9f09c75f9f09c75f00000000000003000200000000000800000000000af301000400000000000000000000000100000004", 0x5d, 0x8c60}], 0x0, &(0x7f0000010f60)) getdents64(r0, &(0x7f0000000040)=""/4, 0x4) 04:01:14 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="1000000040000000030000002b00000005000000010000000000000000000000002000000020000010000000000000009f09c75f0000ffff53ef", 0x3a, 0x400}, {0x0, 0x0, 0x7e0}, {&(0x7f0000010ce0)="00000000000000000000000000000000000000000000000000000000c99b0000ed410000000400009f09c75f9f09c75f9f09c75f00000000000003000200000000000800000000000af3010004000000000000000000000001", 0x59, 0x8c60}], 0x0, &(0x7f0000010f60)) 04:01:14 executing program 2: sendmsg$NL80211_CMD_UNEXPECTED_FRAME(0xffffffffffffffff, &(0x7f0000000400)={0x0, 0x0, &(0x7f0000000300)={&(0x7f00000002c0)={0x1c, 0x0, 0x1, 0x0, 0x0, {{}, {@val={0x8}, @void}}}, 0x1c}}, 0x0) sendmsg$NL80211_CMD_UPDATE_FT_IES(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000001c0)={0x24, 0x0, 0x1, 0x70bd2c, 0x0, {{}, {@val={0x8}, @void}}, [@NL80211_ATTR_MDID={0x6, 0xb1, 0xc116}]}, 0x24}, 0x1, 0x0, 0x0, 0x80}, 0xc000) r0 = creat(&(0x7f00000003c0)='./file1\x00', 0x0) sendmsg$netlink(0xffffffffffffffff, 0x0, 0x0) dup(0xffffffffffffffff) pwritev2(r0, &(0x7f0000000380)=[{&(0x7f0000000180)="bd", 0xfffffdef}], 0x1, 0x1200, 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) ioctl$FS_IOC_FSSETXATTR(r1, 0x401c5820, &(0x7f0000000200)={0x9}) syz_io_uring_setup(0x0, &(0x7f0000000000)={0x0, 0x0, 0x4, 0x2, 0x309}, &(0x7f0000ffc000/0x2000)=nil, &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000000080), &(0x7f0000000240)) syz_io_uring_submit(0x0, 0x0, &(0x7f0000000280)=@IORING_OP_ASYNC_CANCEL, 0x1ff) 04:01:14 executing program 5: creat(&(0x7f00000003c0)='./file0\x00', 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext2\x00', &(0x7f0000000100)='./file0\x00', 0x40012, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}], 0x0, &(0x7f0000013c00)=ANY=[]) 04:01:14 executing program 7: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="1000000040000000030000002b00000005000000010000000000000000000000002000000020000010000000000000009f09c75f0000ffff53ef", 0x3a, 0x400}, {&(0x7f0000010080)="000000000000000000000000ede2de4df49d4f87b54a3176cfd4eb4f010040000c000000000000009f09c75f", 0x2c, 0x4e0}, {&(0x7f00000100c0)="01000000000000000000000000000000000000000401000012", 0x19, 0x560}, {&(0x7f0000010100)="000000000000000000000000000000000000000000000000000000005178aedb0300000013000000", 0x28, 0x7e0}, {&(0x7f0000010ce0)="00000000000000000000000000000000000000000000000000000000c99b0000ed410000000400009f09c75f9f09c75f9f09c75f00000000000003000200000000000800000000000af301000400000000000000000000000100000004", 0x5d, 0x8c60}], 0x0, &(0x7f0000010f60)) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) getdents64(r0, &(0x7f0000000040)=""/4, 0x4) [ 1675.512873] loop1: detected capacity change from 0 to 140 [ 1675.513837] loop5: detected capacity change from 0 to 512 [ 1675.533003] loop6: detected capacity change from 0 to 140 [ 1675.535443] EXT4-fs (loop5): mounting ext2 file system using the ext4 subsystem [ 1675.537776] EXT4-fs (loop1): ext4_check_descriptors: Block bitmap for group 0 not in group (block 0)! [ 1675.538602] loop3: detected capacity change from 0 to 140 [ 1675.539114] EXT4-fs (loop1): group descriptors corrupted! [ 1675.542716] loop4: detected capacity change from 0 to 140 [ 1675.546845] EXT4-fs (loop5): warning: mounting unchecked fs, running e2fsck is recommended [ 1675.548532] loop7: detected capacity change from 0 to 140 [ 1675.548898] EXT4-fs (loop6): ext4_check_descriptors: Block bitmap for group 0 not in group (block 0)! [ 1675.551003] EXT4-fs (loop6): group descriptors corrupted! [ 1675.561265] loop0: detected capacity change from 0 to 140 [ 1675.571146] EXT4-fs (loop5): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: none. [ 1675.571659] EXT4-fs (loop3): warning: mounting unchecked fs, running e2fsck is recommended [ 1675.577099] EXT4-fs (loop7): ext4_check_descriptors: Inode table for group 0 not in group (block 0)! [ 1675.578670] EXT4-fs (loop7): group descriptors corrupted! [ 1675.584462] EXT4-fs (loop0): ext4_check_descriptors: Inode bitmap for group 0 not in group (block 0)! [ 1675.586034] EXT4-fs (loop0): group descriptors corrupted! [ 1675.586377] EXT4-fs (loop5): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 1675.618525] EXT4-fs (loop3): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: none. [ 1675.655676] EXT4-fs error (device loop3): ext4_readdir:262: inode #2: block 4: comm syz-executor.3: path /syzkaller-testdir621642535/syzkaller.Ms8KeX/326/mnt: bad entry in directory: rec_len is smaller than minimal - offset=0, inode=0, rec_len=0, size=1024 fake=0 04:01:14 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="1000000040000000030000002b00000005000000010000000000000000000000002000000020000010000000000000009f09c75f0000ffff53ef", 0x3a, 0x400}, {0x0, 0x0, 0x7e0}, {&(0x7f0000010ce0)="00000000000000000000000000000000000000000000000000000000c99b0000ed410000000400009f09c75f9f09c75f9f09c75f00000000000003000200000000000800000000000af3010004000000000000000000000001", 0x59, 0x8c60}], 0x0, &(0x7f0000010f60)) 04:01:14 executing program 6: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="1000000040000000030000002b00000005000000010000000000000000000000002000000020000010000000000000009f09c75f0000ffff53ef", 0x3a, 0x400}, {&(0x7f0000010080)="000000000000000000000000ede2de4df49d4f87b54a3176cfd4eb4f010040000c000000000000009f09c75f", 0x2c, 0x4e0}, {&(0x7f00000100c0)="01000000000000000000000000000000000000000401000012", 0x19, 0x560}, {&(0x7f0000010100)='\x00'/21, 0x15, 0x7e0}, {&(0x7f0000010ce0)="00000000000000000000000000000000000000000000000000000000c99b0000ed410000000400009f09c75f9f09c75f9f09c75f00000000000003000200000000000800000000000af301000400000000000000000000000100000004", 0x5d, 0x8c60}], 0x0, &(0x7f0000010f60)) getdents64(r0, &(0x7f0000000040)=""/4, 0x4) 04:01:14 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', 0x0, 0x0, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="1000000040000000030000002b00000005000000010000000000000000000000002000000020000010000000000000009f09c75f0000ffff53ef", 0x3a, 0x400}, {&(0x7f0000010080)="000000000000000000000000ede2de4df49d4f87b54a3176cfd4eb4f010040000c000000000000009f09c75f", 0x2c, 0x4e0}, {&(0x7f00000100c0)="01000000000000000000000000000000000000000401000012", 0x19, 0x560}, {&(0x7f00000100e0)="00000000000000000000000000000000000000000104", 0x16, 0x640}, {&(0x7f0000010100)="000000000000000000000000000000000000000000000000000000005178aedb0300000013000000230000002b0005000200040000000000907306c205002a9c00000000000000000000000000000000000000000000000091ecd11b", 0x5c, 0x7e0}, {&(0x7f0000010ce0)="00000000000000000000000000000000000000000000000000000000c99b0000ed410000000400009f09c75f9f09c75f9f09c75f00000000000003000200000000000800000000000af301000400"/88, 0x58, 0x8c60}], 0x0, &(0x7f0000010f60)) [ 1675.731489] loop1: detected capacity change from 0 to 140 [ 1675.750401] EXT4-fs (loop1): ext4_check_descriptors: Block bitmap for group 0 not in group (block 0)! [ 1675.751729] EXT4-fs (loop1): group descriptors corrupted! 04:01:14 executing program 5: creat(&(0x7f00000003c0)='./file0\x00', 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext2\x00', &(0x7f0000000100)='./file0\x00', 0x40013, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}], 0x0, &(0x7f0000013c00)=ANY=[]) 04:01:14 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="1000000040000000030000002b00000005000000010000000000000000000000002000000020000010000000000000009f09c75f0000ffff53ef", 0x3a, 0x400}, {&(0x7f0000010080)="000000000000000000000000ede2de4df49d4f87b54a3176cfd4eb4f010040000c000000000000009f09c75f", 0x2c, 0x4e0}, {&(0x7f00000100c0)="01000000000000000000000000000000000000000401000012", 0x19, 0x560}, {&(0x7f00000100e0)="00000000000000000000000000000000000000000104", 0x16, 0x640}, {&(0x7f0000010100)="000000000000000000000000000000000000000000000000000000005178aedb03000000", 0x24, 0x7e0}, {&(0x7f0000010ce0)="00000000000000000000000000000000000000000000000000000000c99b0000ed410000000400009f09c75f9f09c75f9f09c75f00000000000003000200000000000800000000000af3010004", 0x4d, 0x8c60}], 0x0, &(0x7f0000010f60)) [ 1675.775327] EXT4-fs (loop3): unmounting filesystem 00000000-0000-0000-0000-000000000000. 04:01:14 executing program 7: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="1000000040000000030000002b00000005000000010000000000000000000000002000000020000010000000000000009f09c75f0000ffff53ef", 0x3a, 0x400}, {&(0x7f0000010080)="000000000000000000000000ede2de4df49d4f87b54a3176cfd4eb4f010040000c000000000000009f09c75f", 0x2c, 0x4e0}, {&(0x7f00000100c0)="01000000000000000000000000000000000000000401000012", 0x19, 0x560}, {&(0x7f0000010100)="000000000000000000000000000000000000000000000000000000005178aedb0300000013000000", 0x28, 0x7e0}, {&(0x7f0000010ce0)="00000000000000000000000000000000000000000000000000000000c99b0000ed410000000400009f09c75f9f09c75f9f09c75f00000000000003000200000000000800000000000af301000400000000000000000000000100000004", 0x5d, 0x8c60}], 0x0, &(0x7f0000010f60)) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) getdents64(r0, &(0x7f0000000040)=""/4, 0x4) [ 1675.821111] loop4: detected capacity change from 0 to 140 [ 1675.823395] loop6: detected capacity change from 0 to 140 04:01:14 executing program 3: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="1000000040000000030000002b00000005000000010000000000000000000000002000000020000010000000000000009f09c75f0000ffff53ef", 0x3a, 0x400}, {&(0x7f0000010080)="000000000000000000000000ede2de4df49d4f87b54a3176cfd4eb4f010040000c000000000000009f09c75f", 0x2c, 0x4e0}, {0x0, 0x0, 0x7e0}, {&(0x7f0000010ce0)="00000000000000000000000000000000000000000000000000000000c99b0000ed410000000400009f09c75f9f09c75f9f09c75f00000000000003000200000000000800000000000af301000400000000000000000000000100000004", 0x5d, 0x8c60}], 0x0, &(0x7f0000010f60)) getdents64(r0, &(0x7f0000000040)=""/4, 0x4) [ 1675.866720] EXT4-fs (loop6): ext4_check_descriptors: Block bitmap for group 0 not in group (block 0)! [ 1675.868589] EXT4-fs (loop6): group descriptors corrupted! [ 1675.877282] loop5: detected capacity change from 0 to 512 [ 1675.895546] EXT4-fs (loop5): mounting ext2 file system using the ext4 subsystem 04:01:14 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="1000000040000000030000002b00000005000000010000000000000000000000002000000020000010000000000000009f09c75f0000ffff53ef", 0x3a, 0x400}, {0x0, 0x0, 0x7e0}, {&(0x7f0000010ce0)="00000000000000000000000000000000000000000000000000000000c99b0000ed410000000400009f09c75f9f09c75f9f09c75f00000000000003000200000000000800000000000af3010004000000000000000000000001", 0x59, 0x8c60}], 0x0, &(0x7f0000010f60)) [ 1675.916781] loop0: detected capacity change from 0 to 140 [ 1675.920008] EXT4-fs (loop0): ext4_check_descriptors: Inode bitmap for group 0 not in group (block 0)! [ 1675.921124] EXT4-fs (loop0): group descriptors corrupted! [ 1675.930909] EXT4-fs (loop5): warning: mounting unchecked fs, running e2fsck is recommended [ 1675.946622] loop7: detected capacity change from 0 to 140 [ 1675.965449] loop3: detected capacity change from 0 to 140 [ 1675.975029] EXT4-fs (loop7): ext4_check_descriptors: Inode table for group 0 not in group (block 0)! [ 1675.976798] EXT4-fs (loop7): group descriptors corrupted! 04:01:14 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="1000000040000000030000002b00000005000000010000000000000000000000002000000020000010000000000000009f09c75f0000ffff53ef", 0x3a, 0x400}, {&(0x7f0000010080)="000000000000000000000000ede2de4df49d4f87b54a3176cfd4eb4f010040000c000000000000009f09c75f", 0x2c, 0x4e0}, {&(0x7f00000100c0)="01000000000000000000000000000000000000000401000012", 0x19, 0x560}, {&(0x7f00000100e0)="00000000000000000000000000000000000000000104", 0x16, 0x640}, {&(0x7f0000010100)="000000000000000000000000000000000000000000000000000000005178aedb03000000", 0x24, 0x7e0}, {&(0x7f0000010ce0)="00000000000000000000000000000000000000000000000000000000c99b0000ed410000000400009f09c75f9f09c75f9f09c75f00000000000003000200000000000800000000000af3010004", 0x4d, 0x8c60}], 0x0, &(0x7f0000010f60)) [ 1675.983514] EXT4-fs (loop5): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: none. [ 1675.992852] EXT4-fs (loop3): ext4_check_descriptors: Block bitmap for group 0 not in group (block 0)! [ 1675.994264] EXT4-fs (loop3): group descriptors corrupted! [ 1676.024463] EXT4-fs (loop5): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 1676.058735] loop0: detected capacity change from 0 to 140 [ 1676.069831] loop1: detected capacity change from 0 to 140 [ 1676.086322] EXT4-fs (loop1): ext4_check_descriptors: Block bitmap for group 0 not in group (block 0)! [ 1676.087977] EXT4-fs (loop1): group descriptors corrupted! [ 1676.094286] EXT4-fs (loop0): ext4_check_descriptors: Inode bitmap for group 0 not in group (block 0)! [ 1676.095896] EXT4-fs (loop0): group descriptors corrupted! 04:01:24 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', 0x0, 0x0, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="1000000040000000030000002b00000005000000010000000000000000000000002000000020000010000000000000009f09c75f0000ffff53ef", 0x3a, 0x400}, {&(0x7f0000010080)="000000000000000000000000ede2de4df49d4f87b54a3176cfd4eb4f010040000c000000000000009f09c75f", 0x2c, 0x4e0}, {&(0x7f00000100c0)="01000000000000000000000000000000000000000401000012", 0x19, 0x560}, {&(0x7f00000100e0)="00000000000000000000000000000000000000000104", 0x16, 0x640}, {&(0x7f0000010100)="000000000000000000000000000000000000000000000000000000005178aedb0300000013000000230000002b0005000200040000000000907306c205002a9c00000000000000000000000000000000000000000000000091ecd11b", 0x5c, 0x7e0}, {&(0x7f0000010ce0)="00000000000000000000000000000000000000000000000000000000c99b0000ed410000000400009f09c75f9f09c75f9f09c75f00000000000003000200000000000800000000000af301000400"/88, 0x58, 0x8c60}], 0x0, &(0x7f0000010f60)) 04:01:24 executing program 3: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="1000000040000000030000002b00000005000000010000000000000000000000002000000020000010000000000000009f09c75f0000ffff53ef", 0x3a, 0x400}, {&(0x7f0000010080)="000000000000000000000000ede2de4df49d4f87b54a3176cfd4eb4f010040000c000000000000009f09c75f", 0x2c, 0x4e0}, {0x0, 0x0, 0x7e0}, {&(0x7f0000010ce0)="00000000000000000000000000000000000000000000000000000000c99b0000ed410000000400009f09c75f9f09c75f9f09c75f00000000000003000200000000000800000000000af301000400000000000000000000000100000004", 0x5d, 0x8c60}], 0x0, &(0x7f0000010f60)) getdents64(r0, &(0x7f0000000040)=""/4, 0x4) 04:01:24 executing program 2: sendmsg$NL80211_CMD_UNEXPECTED_FRAME(0xffffffffffffffff, &(0x7f0000000400)={0x0, 0x0, &(0x7f0000000300)={&(0x7f00000002c0)={0x1c, 0x0, 0x1, 0x0, 0x0, {{}, {@val={0x8}, @void}}}, 0x1c}}, 0x0) sendmsg$NL80211_CMD_UPDATE_FT_IES(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000001c0)={0x24, 0x0, 0x1, 0x70bd2c, 0x0, {{}, {@val={0x8}, @void}}, [@NL80211_ATTR_MDID={0x6, 0xb1, 0xc116}]}, 0x24}, 0x1, 0x0, 0x0, 0x80}, 0xc000) r0 = creat(&(0x7f00000003c0)='./file1\x00', 0x0) sendmsg$netlink(0xffffffffffffffff, 0x0, 0x0) dup(0xffffffffffffffff) pwritev2(r0, &(0x7f0000000380)=[{&(0x7f0000000180)="bd", 0xfffffdef}], 0x1, 0x1200, 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) ioctl$FS_IOC_FSSETXATTR(r1, 0x401c5820, &(0x7f0000000200)={0x9}) syz_io_uring_setup(0x0, &(0x7f0000000000)={0x0, 0x0, 0x4, 0x2, 0x309}, &(0x7f0000ffc000/0x2000)=nil, &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000000080), &(0x7f0000000240)) syz_io_uring_submit(0x0, 0x0, &(0x7f0000000280)=@IORING_OP_ASYNC_CANCEL={0xe, 0x0, 0x0, 0x0, 0x0, 0x12345}, 0x0) 04:01:24 executing program 7: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="1000000040000000030000002b00000005000000010000000000000000000000002000000020000010000000000000009f09c75f0000ffff53ef", 0x3a, 0x400}, {&(0x7f0000010080)="000000000000000000000000ede2de4df49d4f87b54a3176cfd4eb4f010040000c000000000000009f09c75f", 0x2c, 0x4e0}, {&(0x7f00000100c0)="01000000000000000000000000000000000000000401000012", 0x19, 0x560}, {&(0x7f0000010100)="000000000000000000000000000000000000000000000000000000005178aedb0300000013000000", 0x28, 0x7e0}, {&(0x7f0000010ce0)="00000000000000000000000000000000000000000000000000000000c99b0000ed410000000400009f09c75f9f09c75f9f09c75f00000000000003000200000000000800000000000af301000400000000000000000000000100000004", 0x5d, 0x8c60}], 0x0, &(0x7f0000010f60)) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) getdents64(r0, &(0x7f0000000040)=""/4, 0x4) 04:01:24 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="1000000040000000030000002b00000005000000010000000000000000000000002000000020000010000000000000009f09c75f0000ffff53ef", 0x3a, 0x400}, {&(0x7f0000010080)="000000000000000000000000ede2de4df49d4f87b54a3176cfd4eb4f010040000c000000000000009f09c75f", 0x2c, 0x4e0}, {&(0x7f00000100c0)="01000000000000000000000000000000000000000401000012", 0x19, 0x560}, {&(0x7f00000100e0)="00000000000000000000000000000000000000000104", 0x16, 0x640}, {&(0x7f0000010100)="000000000000000000000000000000000000000000000000000000005178aedb03000000130000", 0x27, 0x7e0}, {&(0x7f0000010ce0)="00000000000000000000000000000000000000000000000000000000c99b0000ed410000000400009f09c75f9f09c75f9f09c75f00000000000003000200000000000800000000000af3010004", 0x4d, 0x8c60}], 0x0, &(0x7f0000010f60)) 04:01:24 executing program 5: creat(&(0x7f00000003c0)='./file0\x00', 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext2\x00', &(0x7f0000000100)='./file0\x00', 0x40022, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}], 0x0, &(0x7f0000013c00)=ANY=[]) 04:01:24 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="1000000040000000030000002b00000005000000010000000000000000000000002000000020000010000000000000009f09c75f0000ffff53ef", 0x3a, 0x400}, {&(0x7f0000010100), 0x0, 0x7e0}, {&(0x7f0000010ce0)="00000000000000000000000000000000000000000000000000000000c99b0000ed410000000400009f09c75f9f09c75f9f09c75f00000000000003000200000000000800000000000af3010004000000000000000000000001", 0x59, 0x8c60}], 0x0, &(0x7f0000010f60)) 04:01:24 executing program 6: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="1000000040000000030000002b00000005000000010000000000000000000000002000000020000010000000000000009f09c75f0000ffff53ef", 0x3a, 0x400}, {&(0x7f0000010080)="000000000000000000000000ede2de4df49d4f87b54a3176cfd4eb4f010040000c000000000000009f09c75f", 0x2c, 0x4e0}, {&(0x7f00000100c0)="01000000000000000000000000000000000000000401000012", 0x19, 0x560}, {&(0x7f0000010100)="000000000000000000000000000000000000000000000000000000005178ae", 0x1f, 0x7e0}, {&(0x7f0000010ce0)="00000000000000000000000000000000000000000000000000000000c99b0000ed410000000400009f09c75f9f09c75f9f09c75f00000000000003000200000000000800000000000af301000400000000000000000000000100000004", 0x5d, 0x8c60}], 0x0, &(0x7f0000010f60)) getdents64(r0, &(0x7f0000000040)=""/4, 0x4) [ 1686.105218] loop4: detected capacity change from 0 to 140 [ 1686.115236] loop5: detected capacity change from 0 to 512 [ 1686.125675] loop1: detected capacity change from 0 to 140 [ 1686.131727] loop7: detected capacity change from 0 to 140 [ 1686.133210] EXT4-fs (loop5): mounting ext2 file system using the ext4 subsystem [ 1686.143419] loop3: detected capacity change from 0 to 140 [ 1686.145620] EXT4-fs (loop5): warning: mounting unchecked fs, running e2fsck is recommended [ 1686.146781] loop6: detected capacity change from 0 to 140 [ 1686.146878] EXT4-fs (loop1): ext4_check_descriptors: Block bitmap for group 0 not in group (block 0)! [ 1686.148762] loop0: detected capacity change from 0 to 140 [ 1686.149024] EXT4-fs (loop1): group descriptors corrupted! [ 1686.160478] EXT4-fs (loop7): ext4_check_descriptors: Inode table for group 0 not in group (block 0)! [ 1686.162354] EXT4-fs (loop7): group descriptors corrupted! [ 1686.165159] EXT4-fs (loop0): ext4_check_descriptors: Inode table for group 0 not in group (block 0)! [ 1686.166701] EXT4-fs (loop0): group descriptors corrupted! [ 1686.171328] EXT4-fs (loop3): ext4_check_descriptors: Block bitmap for group 0 not in group (block 0)! [ 1686.172764] EXT4-fs (loop3): group descriptors corrupted! [ 1686.172775] EXT4-fs (loop5): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: none. [ 1686.194245] EXT4-fs (loop5): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 1686.217296] EXT4-fs (loop6): ext4_check_descriptors: Block bitmap for group 0 not in group (block 0)! [ 1686.219026] EXT4-fs (loop6): group descriptors corrupted! 04:01:25 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000010f60)) 04:01:25 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="1000000040000000030000002b00000005000000010000000000000000000000002000000020000010000000000000009f09c75f0000ffff53ef", 0x3a, 0x400}, {&(0x7f0000010100), 0x0, 0x7e0}, {&(0x7f0000010ce0)="00000000000000000000000000000000000000000000000000000000c99b0000ed410000000400009f09c75f9f09c75f9f09c75f00000000000003000200000000000800000000000af3010004000000000000000000000001", 0x59, 0x8c60}], 0x0, &(0x7f0000010f60)) 04:01:25 executing program 3: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="1000000040000000030000002b00000005000000010000000000000000000000002000000020000010000000000000009f09c75f0000ffff53ef", 0x3a, 0x400}, {&(0x7f0000010080)="000000000000000000000000ede2de4df49d4f87b54a3176cfd4eb4f010040000c000000000000009f09c75f", 0x2c, 0x4e0}, {0x0, 0x0, 0x7e0}, {&(0x7f0000010ce0)="00000000000000000000000000000000000000000000000000000000c99b0000ed410000000400009f09c75f9f09c75f9f09c75f00000000000003000200000000000800000000000af301000400000000000000000000000100000004", 0x5d, 0x8c60}], 0x0, &(0x7f0000010f60)) getdents64(r0, &(0x7f0000000040)=""/4, 0x4) 04:01:25 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="1000000040000000030000002b00000005000000010000000000000000000000002000000020000010000000000000009f09c75f0000ffff53ef", 0x3a, 0x400}, {&(0x7f0000010080)="000000000000000000000000ede2de4df49d4f87b54a3176cfd4eb4f010040000c000000000000009f09c75f", 0x2c, 0x4e0}, {&(0x7f00000100c0)="01000000000000000000000000000000000000000401000012", 0x19, 0x560}, {&(0x7f00000100e0)="00000000000000000000000000000000000000000104", 0x16, 0x640}, {&(0x7f0000010100)="000000000000000000000000000000000000000000000000000000005178aedb03000000130000", 0x27, 0x7e0}, {&(0x7f0000010ce0)="00000000000000000000000000000000000000000000000000000000c99b0000ed410000000400009f09c75f9f09c75f9f09c75f00000000000003000200000000000800000000000af3010004", 0x4d, 0x8c60}], 0x0, &(0x7f0000010f60)) [ 1686.340319] No source specified 04:01:25 executing program 7: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="1000000040000000030000002b00000005000000010000000000000000000000002000000020000010000000000000009f09c75f0000ffff53ef", 0x3a, 0x400}, {&(0x7f0000010080)="000000000000000000000000ede2de4df49d4f87b54a3176cfd4eb4f010040000c000000000000009f09c75f", 0x2c, 0x4e0}, {&(0x7f00000100c0)="01000000000000000000000000000000000000000401000012", 0x19, 0x560}, {&(0x7f0000010100)="000000000000000000000000000000000000000000000000000000005178aedb030000001300000023", 0x29}, {&(0x7f0000010ce0)="00000000000000000000000000000000000000000000000000000000c99b0000ed410000000400009f09c75f9f09c75f9f09c75f00000000000003000200000000000800000000000af301000400000000000000000000000100000004", 0x5d, 0x8c60}], 0x0, &(0x7f0000010f60)) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) getdents64(r0, &(0x7f0000000040)=""/4, 0x4) 04:01:25 executing program 5: creat(&(0x7f00000003c0)='./file0\x00', 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext2\x00', &(0x7f0000000100)='./file0\x00', 0x40023, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}], 0x0, &(0x7f0000013c00)=ANY=[]) 04:01:25 executing program 6: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="1000000040000000030000002b00000005000000010000000000000000000000002000000020000010000000000000009f09c75f0000ffff53ef", 0x3a, 0x400}, {&(0x7f0000010080)="000000000000000000000000ede2de4df49d4f87b54a3176cfd4eb4f010040000c000000000000009f09c75f", 0x2c, 0x4e0}, {&(0x7f00000100c0)="01000000000000000000000000000000000000000401000012", 0x19, 0x560}, {&(0x7f0000010100)="000000000000000000000000000000000000000000000000000000005178ae", 0x1f, 0x7e0}, {&(0x7f0000010ce0)="00000000000000000000000000000000000000000000000000000000c99b0000ed410000000400009f09c75f9f09c75f9f09c75f00000000000003000200000000000800000000000af301000400000000000000000000000100000004", 0x5d, 0x8c60}], 0x0, &(0x7f0000010f60)) getdents64(r0, &(0x7f0000000040)=""/4, 0x4) [ 1686.405032] loop0: detected capacity change from 0 to 140 [ 1686.422329] EXT4-fs (loop0): ext4_check_descriptors: Inode table for group 0 not in group (block 0)! [ 1686.423698] EXT4-fs (loop0): group descriptors corrupted! 04:01:25 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000010f60)) [ 1686.501395] loop6: detected capacity change from 0 to 140 [ 1686.520832] loop5: detected capacity change from 0 to 512 [ 1686.524027] EXT4-fs (loop6): ext4_check_descriptors: Block bitmap for group 0 not in group (block 0)! [ 1686.525357] EXT4-fs (loop6): group descriptors corrupted! [ 1686.531821] loop7: detected capacity change from 0 to 140 [ 1686.536368] No source specified [ 1686.537638] EXT4-fs (loop5): mounting ext2 file system using the ext4 subsystem [ 1686.549277] EXT4-fs (loop7): ext4_check_descriptors: Block bitmap for group 0 not in group (block 0)! [ 1686.550617] EXT4-fs (loop7): group descriptors corrupted! [ 1686.551641] EXT4-fs (loop5): warning: mounting unchecked fs, running e2fsck is recommended [ 1686.569743] EXT4-fs (loop5): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: none. 04:01:25 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="1000000040000000030000002b00000005000000010000000000000000000000002000000020000010000000000000009f09c75f0000ffff53ef", 0x3a, 0x400}, {&(0x7f0000010080)="000000000000000000000000ede2de4df49d4f87b54a3176cfd4eb4f010040000c000000000000009f09c75f", 0x2c, 0x4e0}, {&(0x7f00000100c0)="01000000000000000000000000000000000000000401000012", 0x19, 0x560}, {&(0x7f00000100e0)="00000000000000000000000000000000000000000104", 0x16, 0x640}, {&(0x7f0000010100)="000000000000000000000000000000000000000000000000000000005178aedb03000000130000", 0x27, 0x7e0}, {&(0x7f0000010ce0)="00000000000000000000000000000000000000000000000000000000c99b0000ed410000000400009f09c75f9f09c75f9f09c75f00000000000003000200000000000800000000000af3010004", 0x4d, 0x8c60}], 0x0, &(0x7f0000010f60)) [ 1686.597343] EXT4-fs (loop5): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 1686.598116] loop3: detected capacity change from 0 to 140 [ 1686.608992] EXT4-fs (loop3): ext4_check_descriptors: Block bitmap for group 0 not in group (block 0)! [ 1686.610518] EXT4-fs (loop3): group descriptors corrupted! [ 1686.630634] loop1: detected capacity change from 0 to 140 04:01:25 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000010f60)) [ 1686.652129] EXT4-fs (loop1): ext4_check_descriptors: Block bitmap for group 0 not in group (block 0)! [ 1686.653614] EXT4-fs (loop1): group descriptors corrupted! [ 1686.700844] loop0: detected capacity change from 0 to 140 [ 1686.720665] EXT4-fs (loop0): ext4_check_descriptors: Inode table for group 0 not in group (block 0)! [ 1686.721895] EXT4-fs (loop0): group descriptors corrupted! [ 1686.734846] No source specified 04:01:36 executing program 3: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="1000000040000000030000002b00000005000000010000000000000000000000002000000020000010000000000000009f09c75f0000ffff53ef", 0x3a, 0x400}, {&(0x7f0000010080)="000000000000000000000000ede2de4df49d4f87b54a3176cfd4eb4f010040000c000000000000009f09c75f", 0x2c, 0x4e0}, {&(0x7f0000010100), 0x0, 0x7e0}, {&(0x7f0000010ce0)="00000000000000000000000000000000000000000000000000000000c99b0000ed410000000400009f09c75f9f09c75f9f09c75f00000000000003000200000000000800000000000af301000400000000000000000000000100000004", 0x5d, 0x8c60}], 0x0, &(0x7f0000010f60)) getdents64(r0, &(0x7f0000000040)=""/4, 0x4) 04:01:36 executing program 2: sendmsg$NL80211_CMD_UNEXPECTED_FRAME(0xffffffffffffffff, &(0x7f0000000400)={0x0, 0x0, &(0x7f0000000300)={&(0x7f00000002c0)={0x1c, 0x0, 0x1, 0x0, 0x0, {{}, {@val={0x8}, @void}}}, 0x1c}}, 0x0) sendmsg$NL80211_CMD_UPDATE_FT_IES(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000001c0)={0x24, 0x0, 0x1, 0x70bd2c, 0x0, {{}, {@val={0x8}, @void}}, [@NL80211_ATTR_MDID={0x6, 0xb1, 0xc116}]}, 0x24}, 0x1, 0x0, 0x0, 0x80}, 0xc000) r0 = creat(&(0x7f00000003c0)='./file1\x00', 0x0) sendmsg$netlink(0xffffffffffffffff, 0x0, 0x0) dup(0xffffffffffffffff) pwritev2(r0, &(0x7f0000000380)=[{&(0x7f0000000180)="bd", 0xfffffdef}], 0x1, 0x1200, 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) ioctl$FS_IOC_FSSETXATTR(r1, 0x401c5820, &(0x7f0000000200)={0x9}) syz_io_uring_setup(0x0, &(0x7f0000000000)={0x0, 0x0, 0x4, 0x2, 0x309}, &(0x7f0000ffc000/0x2000)=nil, &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000000080), &(0x7f0000000240)) syz_io_uring_submit(0x0, 0x0, &(0x7f0000000280)=@IORING_OP_ASYNC_CANCEL={0xe, 0x0, 0x0, 0x0, 0x0, 0x12345}, 0x0) 04:01:36 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="1000000040000000030000002b00000005000000010000000000000000000000002000000020000010000000000000009f09c75f0000ffff53ef", 0x3a, 0x400}, {&(0x7f0000010080)="000000000000000000000000ede2de4df49d4f87b54a3176cfd4eb4f010040000c000000000000009f09c75f", 0x2c, 0x4e0}, {&(0x7f00000100c0)="01000000000000000000000000000000000000000401000012", 0x19, 0x560}, {&(0x7f00000100e0)="00000000000000000000000000000000000000000104", 0x16, 0x640}, {&(0x7f0000010100)="000000000000000000000000000000000000000000000000000000005178aedb0300000013000000230000002b0005000200040000000000907306c205002a9c00000000000000000000000000000000000000000000000091ecd11b", 0x5c, 0x7e0}], 0x0, &(0x7f0000010f60)) 04:01:36 executing program 5: creat(&(0x7f00000003c0)='./file0\x00', 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext2\x00', &(0x7f0000000100)='./file0\x00', 0x40024, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}], 0x0, &(0x7f0000013c00)=ANY=[]) 04:01:36 executing program 7: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="1000000040000000030000002b00000005000000010000000000000000000000002000000020000010000000000000009f09c75f0000ffff53ef", 0x3a, 0x400}, {&(0x7f0000010080)="000000000000000000000000ede2de4df49d4f87b54a3176cfd4eb4f010040000c000000000000009f09c75f", 0x2c, 0x4e0}, {&(0x7f00000100c0)="01000000000000000000000000000000000000000401000012", 0x19, 0x560}, {&(0x7f0000010100)="000000000000000000000000000000000000000000000000000000005178aedb030000001300000023", 0x29}, {&(0x7f0000010ce0)="00000000000000000000000000000000000000000000000000000000c99b0000ed410000000400009f09c75f9f09c75f9f09c75f00000000000003000200000000000800000000000af301000400000000000000000000000100000004", 0x5d, 0x8c60}], 0x0, &(0x7f0000010f60)) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) getdents64(r0, &(0x7f0000000040)=""/4, 0x4) 04:01:36 executing program 6: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="1000000040000000030000002b00000005000000010000000000000000000000002000000020000010000000000000009f09c75f0000ffff53ef", 0x3a, 0x400}, {&(0x7f0000010080)="000000000000000000000000ede2de4df49d4f87b54a3176cfd4eb4f010040000c000000000000009f09c75f", 0x2c, 0x4e0}, {&(0x7f00000100c0)="01000000000000000000000000000000000000000401000012", 0x19, 0x560}, {&(0x7f0000010100)="000000000000000000000000000000000000000000000000000000005178ae", 0x1f, 0x7e0}, {&(0x7f0000010ce0)="00000000000000000000000000000000000000000000000000000000c99b0000ed410000000400009f09c75f9f09c75f9f09c75f00000000000003000200000000000800000000000af301000400000000000000000000000100000004", 0x5d, 0x8c60}], 0x0, &(0x7f0000010f60)) getdents64(r0, &(0x7f0000000040)=""/4, 0x4) 04:01:36 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="1000000040000000030000002b00000005000000010000000000000000000000002000000020000010000000000000009f09c75f0000ffff53ef", 0x3a, 0x400}, {&(0x7f0000010080)="000000000000000000000000ede2de4df49d4f87b54a3176cfd4eb4f010040000c000000000000009f09c75f", 0x2c, 0x4e0}, {&(0x7f00000100c0)="01000000000000000000000000000000000000000401000012", 0x19, 0x560}, {&(0x7f00000100e0)="00000000000000000000000000000000000000000104", 0x16, 0x640}, {&(0x7f0000010100)="000000000000000000000000000000000000000000000000000000005178aedb0300000013000000", 0x28, 0x7e0}, {&(0x7f0000010ce0)="00000000000000000000000000000000000000000000000000000000c99b0000ed410000000400009f09c75f9f09c75f9f09c75f00000000000003000200000000000800000000000af3010004", 0x4d, 0x8c60}], 0x0, &(0x7f0000010f60)) 04:01:36 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="1000000040000000030000002b00000005000000010000000000000000000000002000000020000010000000000000009f09c75f0000ffff53ef", 0x3a, 0x400}, {&(0x7f0000010100), 0x0, 0x7e0}, {&(0x7f0000010ce0)="00000000000000000000000000000000000000000000000000000000c99b0000ed410000000400009f09c75f9f09c75f9f09c75f00000000000003000200000000000800000000000af3010004000000000000000000000001", 0x59, 0x8c60}], 0x0, &(0x7f0000010f60)) [ 1697.676271] loop4: detected capacity change from 0 to 7 [ 1697.686488] EXT4-fs (loop4): bad geometry: block count 64 exceeds size of device (3 blocks) [ 1697.743991] loop7: detected capacity change from 0 to 140 [ 1697.750796] loop1: detected capacity change from 0 to 140 [ 1697.752220] loop3: detected capacity change from 0 to 140 04:01:36 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="1000000040000000030000002b00000005000000010000000000000000000000002000000020000010000000000000009f09c75f0000ffff53ef", 0x3a, 0x400}, {&(0x7f0000010080)="000000000000000000000000ede2de4df49d4f87b54a3176cfd4eb4f010040000c000000000000009f09c75f", 0x2c, 0x4e0}, {&(0x7f00000100c0)="01000000000000000000000000000000000000000401000012", 0x19, 0x560}, {&(0x7f00000100e0)="00000000000000000000000000000000000000000104", 0x16, 0x640}, {&(0x7f0000010100)="000000000000000000000000000000000000000000000000000000005178aedb0300000013000000230000002b0005000200040000000000907306c205002a9c00000000000000000000000000000000000000000000000091ecd11b", 0x5c, 0x7e0}], 0x0, &(0x7f0000010f60)) [ 1697.762593] EXT4-fs (loop3): ext4_check_descriptors: Block bitmap for group 0 not in group (block 0)! [ 1697.763468] loop0: detected capacity change from 0 to 140 [ 1697.764069] EXT4-fs (loop3): group descriptors corrupted! [ 1697.765351] loop5: detected capacity change from 0 to 512 [ 1697.767052] EXT4-fs (loop1): ext4_check_descriptors: Block bitmap for group 0 not in group (block 0)! [ 1697.768473] EXT4-fs (loop1): group descriptors corrupted! [ 1697.770272] EXT4-fs (loop7): ext4_check_descriptors: Block bitmap for group 0 not in group (block 0)! [ 1697.771687] EXT4-fs (loop7): group descriptors corrupted! [ 1697.777151] EXT4-fs (loop5): mounting ext2 file system using the ext4 subsystem [ 1697.792313] EXT4-fs (loop5): warning: mounting unchecked fs, running e2fsck is recommended [ 1697.796308] EXT4-fs (loop0): ext4_check_descriptors: Inode table for group 0 not in group (block 0)! [ 1697.797794] EXT4-fs (loop0): group descriptors corrupted! [ 1697.801018] loop6: detected capacity change from 0 to 140 [ 1697.816623] EXT4-fs (loop6): ext4_check_descriptors: Block bitmap for group 0 not in group (block 0)! [ 1697.818070] EXT4-fs (loop6): group descriptors corrupted! [ 1697.827039] EXT4-fs (loop5): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: none. [ 1697.840279] loop4: detected capacity change from 0 to 7 [ 1697.867971] EXT4-fs (loop5): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 1697.878988] EXT4-fs (loop4): bad geometry: block count 64 exceeds size of device (3 blocks) 04:01:45 executing program 7: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="1000000040000000030000002b00000005000000010000000000000000000000002000000020000010000000000000009f09c75f0000ffff53ef", 0x3a, 0x400}, {&(0x7f0000010080)="000000000000000000000000ede2de4df49d4f87b54a3176cfd4eb4f010040000c000000000000009f09c75f", 0x2c, 0x4e0}, {&(0x7f00000100c0)="01000000000000000000000000000000000000000401000012", 0x19, 0x560}, {&(0x7f0000010100)="000000000000000000000000000000000000000000000000000000005178aedb030000001300000023", 0x29}, {&(0x7f0000010ce0)="00000000000000000000000000000000000000000000000000000000c99b0000ed410000000400009f09c75f9f09c75f9f09c75f00000000000003000200000000000800000000000af301000400000000000000000000000100000004", 0x5d, 0x8c60}], 0x0, &(0x7f0000010f60)) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) getdents64(r0, &(0x7f0000000040)=""/4, 0x4) 04:01:45 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="1000000040000000030000002b00000005000000010000000000000000000000002000000020000010000000000000009f09c75f0000ffff53ef", 0x3a, 0x400}, {&(0x7f0000010100)='\x00'/21, 0x15, 0x7e0}, {&(0x7f0000010ce0)="00000000000000000000000000000000000000000000000000000000c99b0000ed410000000400009f09c75f9f09c75f9f09c75f00000000000003000200000000000800000000000af3010004000000000000000000000001", 0x59, 0x8c60}], 0x0, &(0x7f0000010f60)) 04:01:45 executing program 6: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="1000000040000000030000002b00000005000000010000000000000000000000002000000020000010000000000000009f09c75f0000ffff53ef", 0x3a, 0x400}, {&(0x7f0000010080)="000000000000000000000000ede2de4df49d4f87b54a3176cfd4eb4f010040000c000000000000009f09c75f", 0x2c, 0x4e0}, {&(0x7f00000100c0)="01000000000000000000000000000000000000000401000012", 0x19, 0x560}, {&(0x7f0000010100)="000000000000000000000000000000000000000000000000000000005178aedb03000000", 0x24, 0x7e0}, {&(0x7f0000010ce0)="00000000000000000000000000000000000000000000000000000000c99b0000ed410000000400009f09c75f9f09c75f9f09c75f00000000000003000200000000000800000000000af301000400000000000000000000000100000004", 0x5d, 0x8c60}], 0x0, &(0x7f0000010f60)) getdents64(r0, &(0x7f0000000040)=""/4, 0x4) 04:01:45 executing program 3: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="1000000040000000030000002b00000005000000010000000000000000000000002000000020000010000000000000009f09c75f0000ffff53ef", 0x3a, 0x400}, {&(0x7f0000010080)="000000000000000000000000ede2de4df49d4f87b54a3176cfd4eb4f010040000c000000000000009f09c75f", 0x2c, 0x4e0}, {&(0x7f0000010100), 0x0, 0x7e0}, {&(0x7f0000010ce0)="00000000000000000000000000000000000000000000000000000000c99b0000ed410000000400009f09c75f9f09c75f9f09c75f00000000000003000200000000000800000000000af301000400000000000000000000000100000004", 0x5d, 0x8c60}], 0x0, &(0x7f0000010f60)) getdents64(r0, &(0x7f0000000040)=""/4, 0x4) 04:01:45 executing program 2: sendmsg$NL80211_CMD_UNEXPECTED_FRAME(0xffffffffffffffff, &(0x7f0000000400)={0x0, 0x0, &(0x7f0000000300)={&(0x7f00000002c0)={0x1c, 0x0, 0x1, 0x0, 0x0, {{}, {@val={0x8}, @void}}}, 0x1c}}, 0x0) sendmsg$NL80211_CMD_UPDATE_FT_IES(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000001c0)={0x24, 0x0, 0x1, 0x70bd2c, 0x0, {{}, {@val={0x8}, @void}}, [@NL80211_ATTR_MDID={0x6, 0xb1, 0xc116}]}, 0x24}, 0x1, 0x0, 0x0, 0x80}, 0xc000) r0 = creat(&(0x7f00000003c0)='./file1\x00', 0x0) sendmsg$netlink(0xffffffffffffffff, 0x0, 0x0) dup(0xffffffffffffffff) pwritev2(r0, &(0x7f0000000380)=[{&(0x7f0000000180)="bd", 0xfffffdef}], 0x1, 0x1200, 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) ioctl$FS_IOC_FSSETXATTR(r1, 0x401c5820, &(0x7f0000000200)={0x9}) syz_io_uring_setup(0x0, &(0x7f0000000000)={0x0, 0x0, 0x4, 0x2, 0x309}, &(0x7f0000ffc000/0x2000)=nil, &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000000080), &(0x7f0000000240)) syz_io_uring_submit(0x0, 0x0, &(0x7f0000000280)=@IORING_OP_ASYNC_CANCEL={0xe, 0x0, 0x0, 0x0, 0x0, 0x12345}, 0x0) 04:01:45 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="1000000040000000030000002b00000005000000010000000000000000000000002000000020000010000000000000009f09c75f0000ffff53ef", 0x3a, 0x400}, {&(0x7f0000010080)="000000000000000000000000ede2de4df49d4f87b54a3176cfd4eb4f010040000c000000000000009f09c75f", 0x2c, 0x4e0}, {&(0x7f00000100c0)="01000000000000000000000000000000000000000401000012", 0x19, 0x560}, {&(0x7f00000100e0)="00000000000000000000000000000000000000000104", 0x16, 0x640}, {&(0x7f0000010100)="000000000000000000000000000000000000000000000000000000005178aedb0300000013000000230000002b0005000200040000000000907306c205002a9c00000000000000000000000000000000000000000000000091ecd11b", 0x5c, 0x7e0}], 0x0, &(0x7f0000010f60)) 04:01:45 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="1000000040000000030000002b00000005000000010000000000000000000000002000000020000010000000000000009f09c75f0000ffff53ef", 0x3a, 0x400}, {&(0x7f0000010080)="000000000000000000000000ede2de4df49d4f87b54a3176cfd4eb4f010040000c000000000000009f09c75f", 0x2c, 0x4e0}, {&(0x7f00000100c0)="01000000000000000000000000000000000000000401000012", 0x19, 0x560}, {&(0x7f00000100e0)="00000000000000000000000000000000000000000104", 0x16, 0x640}, {&(0x7f0000010100)="000000000000000000000000000000000000000000000000000000005178aedb0300000013000000", 0x28, 0x7e0}, {&(0x7f0000010ce0)="00000000000000000000000000000000000000000000000000000000c99b0000ed410000000400009f09c75f9f09c75f9f09c75f00000000000003000200000000000800000000000af3010004", 0x4d, 0x8c60}], 0x0, &(0x7f0000010f60)) 04:01:45 executing program 5: creat(&(0x7f00000003c0)='./file0\x00', 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext2\x00', &(0x7f0000000100)='./file0\x00', 0x40025, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}], 0x0, &(0x7f0000013c00)=ANY=[]) [ 1706.479914] loop5: detected capacity change from 0 to 512 [ 1706.488300] EXT4-fs (loop5): mounting ext2 file system using the ext4 subsystem [ 1706.495238] EXT4-fs (loop5): warning: mounting unchecked fs, running e2fsck is recommended [ 1706.503178] EXT4-fs (loop5): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: none. [ 1706.510291] EXT4-fs (loop5): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 1706.515793] loop1: detected capacity change from 0 to 140 [ 1706.521712] loop7: detected capacity change from 0 to 140 [ 1706.526973] loop3: detected capacity change from 0 to 140 [ 1706.548118] loop0: detected capacity change from 0 to 140 [ 1706.560104] EXT4-fs (loop0): ext4_check_descriptors: Inode table for group 0 not in group (block 0)! [ 1706.560859] EXT4-fs (loop0): group descriptors corrupted! [ 1706.561499] EXT4-fs (loop7): ext4_check_descriptors: Block bitmap for group 0 not in group (block 0)! [ 1706.563192] EXT4-fs (loop7): group descriptors corrupted! [ 1706.566464] loop6: detected capacity change from 0 to 140 [ 1706.568923] EXT4-fs (loop3): ext4_check_descriptors: Block bitmap for group 0 not in group (block 0)! [ 1706.570457] EXT4-fs (loop3): group descriptors corrupted! [ 1706.575831] loop4: detected capacity change from 0 to 7 [ 1706.579289] EXT4-fs (loop6): ext4_check_descriptors: Inode bitmap for group 0 not in group (block 0)! [ 1706.580064] EXT4-fs (loop6): group descriptors corrupted! [ 1706.581468] EXT4-fs (loop1): ext4_check_descriptors: Block bitmap for group 0 not in group (block 0)! [ 1706.582976] EXT4-fs (loop1): group descriptors corrupted! [ 1706.591141] EXT4-fs (loop4): bad geometry: block count 64 exceeds size of device (3 blocks) 04:01:45 executing program 5: creat(&(0x7f00000003c0)='./file0\x00', 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext2\x00', &(0x7f0000000100)='./file0\x00', 0x40027, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}], 0x0, &(0x7f0000013c00)=ANY=[]) 04:01:45 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="1000000040000000030000002b00000005000000010000000000000000000000002000000020000010000000000000009f09c75f0000ffff53ef", 0x3a, 0x400}, {&(0x7f0000010080)="000000000000000000000000ede2de4df49d4f87b54a3176cfd4eb4f010040000c000000000000009f09c75f", 0x2c, 0x4e0}, {&(0x7f00000100c0)="01000000000000000000000000000000000000000401000012", 0x19, 0x560}, {&(0x7f00000100e0)="00000000000000000000000000000000000000000104", 0x16, 0x640}, {&(0x7f0000010100)="000000000000000000000000000000000000000000000000000000005178aedb0300000013000000", 0x28, 0x7e0}, {&(0x7f0000010ce0)="00000000000000000000000000000000000000000000000000000000c99b0000ed410000000400009f09c75f9f09c75f9f09c75f00000000000003000200000000000800000000000af3010004", 0x4d, 0x8c60}], 0x0, &(0x7f0000010f60)) 04:01:45 executing program 7: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="1000000040000000030000002b00000005000000010000000000000000000000002000000020000010000000000000009f09c75f0000ffff53ef", 0x3a, 0x400}, {&(0x7f0000010080)="000000000000000000000000ede2de4df49d4f87b54a3176cfd4eb4f010040000c000000000000009f09c75f", 0x2c, 0x4e0}, {&(0x7f0000010100)="000000000000000000000000000000000000000000000000000000005178aedb030000001300000023", 0x29, 0x7e0}, {&(0x7f0000010ce0)="00000000000000000000000000000000000000000000000000000000c99b0000ed410000000400009f09c75f9f09c75f9f09c75f00000000000003000200000000000800000000000af301000400000000000000000000000100000004", 0x5d, 0x8c60}], 0x0, &(0x7f0000010f60)) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) getdents64(r0, &(0x7f0000000040)=""/4, 0x4) 04:01:45 executing program 6: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="1000000040000000030000002b00000005000000010000000000000000000000002000000020000010000000000000009f09c75f0000ffff53ef", 0x3a, 0x400}, {&(0x7f0000010080)="000000000000000000000000ede2de4df49d4f87b54a3176cfd4eb4f010040000c000000000000009f09c75f", 0x2c, 0x4e0}, {&(0x7f00000100c0)="01000000000000000000000000000000000000000401000012", 0x19, 0x560}, {&(0x7f0000010100)="000000000000000000000000000000000000000000000000000000005178aedb03000000", 0x24, 0x7e0}, {&(0x7f0000010ce0)="00000000000000000000000000000000000000000000000000000000c99b0000ed410000000400009f09c75f9f09c75f9f09c75f00000000000003000200000000000800000000000af301000400000000000000000000000100000004", 0x5d, 0x8c60}], 0x0, &(0x7f0000010f60)) getdents64(r0, &(0x7f0000000040)=""/4, 0x4) 04:01:45 executing program 3: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="1000000040000000030000002b00000005000000010000000000000000000000002000000020000010000000000000009f09c75f0000ffff53ef", 0x3a, 0x400}, {&(0x7f0000010080)="000000000000000000000000ede2de4df49d4f87b54a3176cfd4eb4f010040000c000000000000009f09c75f", 0x2c, 0x4e0}, {&(0x7f0000010100), 0x0, 0x7e0}, {&(0x7f0000010ce0)="00000000000000000000000000000000000000000000000000000000c99b0000ed410000000400009f09c75f9f09c75f9f09c75f00000000000003000200000000000800000000000af301000400000000000000000000000100000004", 0x5d, 0x8c60}], 0x0, &(0x7f0000010f60)) getdents64(r0, &(0x7f0000000040)=""/4, 0x4) 04:01:45 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="1000000040000000030000002b00000005000000010000000000000000000000002000000020000010000000000000009f09c75f0000ffff53ef", 0x3a, 0x400}, {&(0x7f0000010080)="000000000000000000000000ede2de4df49d4f87b54a3176cfd4eb4f010040000c000000000000009f09c75f", 0x2c, 0x4e0}, {&(0x7f00000100c0)="01000000000000000000000000000000000000000401000012", 0x19, 0x560}, {&(0x7f00000100e0)="00000000000000000000000000000000000000000104", 0x16, 0x640}, {&(0x7f0000010100)="000000000000000000000000000000000000000000000000000000005178aedb0300000013000000230000002b0005000200040000000000907306c205002a9c00000000000000000000000000000000000000000000000091ecd11b", 0x5c, 0x7e0}, {0x0, 0x0, 0x8c60}], 0x0, &(0x7f0000010f60)) 04:01:45 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="1000000040000000030000002b00000005000000010000000000000000000000002000000020000010000000000000009f09c75f0000ffff53ef", 0x3a, 0x400}, {&(0x7f0000010100)='\x00'/21, 0x15, 0x7e0}, {&(0x7f0000010ce0)="00000000000000000000000000000000000000000000000000000000c99b0000ed410000000400009f09c75f9f09c75f9f09c75f00000000000003000200000000000800000000000af3010004000000000000000000000001", 0x59, 0x8c60}], 0x0, &(0x7f0000010f60)) [ 1706.717737] loop0: detected capacity change from 0 to 140 [ 1706.725600] EXT4-fs (loop0): ext4_check_descriptors: Inode table for group 0 not in group (block 0)! [ 1706.726373] EXT4-fs (loop0): group descriptors corrupted! [ 1706.732516] loop7: detected capacity change from 0 to 140 [ 1706.748643] EXT4-fs (loop7): warning: mounting unchecked fs, running e2fsck is recommended [ 1706.766088] EXT4-fs (loop7): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: none. [ 1706.777721] EXT4-fs error (device loop7): ext4_readdir:262: inode #2: block 4: comm syz-executor.7: path /syzkaller-testdir823765038/syzkaller.a3rO6g/332/mnt: bad entry in directory: rec_len is smaller than minimal - offset=0, inode=0, rec_len=0, size=1024 fake=0 04:01:45 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="1000000040000000030000002b00000005000000010000000000000000000000002000000020000010000000000000009f09c75f0000ffff53ef", 0x3a, 0x400}, {&(0x7f0000010080)="000000000000000000000000ede2de4df49d4f87b54a3176cfd4eb4f010040000c000000000000009f09c75f", 0x2c, 0x4e0}, {&(0x7f00000100c0)="01000000000000000000000000000000000000000401000012", 0x19, 0x560}, {&(0x7f00000100e0)="00000000000000000000000000000000000000000104", 0x16, 0x640}, {&(0x7f0000010100)="000000000000000000000000000000000000000000000000000000005178aedb030000001300000023", 0x29}, {&(0x7f0000010ce0)="00000000000000000000000000000000000000000000000000000000c99b0000ed410000000400009f09c75f9f09c75f9f09c75f00000000000003000200000000000800000000000af3010004", 0x4d, 0x8c60}], 0x0, &(0x7f0000010f60)) [ 1706.791531] loop6: detected capacity change from 0 to 140 [ 1706.808905] loop1: detected capacity change from 0 to 140 [ 1706.829681] EXT4-fs (loop6): ext4_check_descriptors: Inode bitmap for group 0 not in group (block 0)! [ 1706.831193] EXT4-fs (loop6): group descriptors corrupted! [ 1706.847352] loop3: detected capacity change from 0 to 140 [ 1706.853143] EXT4-fs (loop1): ext4_check_descriptors: Block bitmap for group 0 not in group (block 0)! [ 1706.854612] EXT4-fs (loop1): group descriptors corrupted! [ 1706.863899] loop4: detected capacity change from 0 to 140 04:01:45 executing program 5: creat(&(0x7f00000003c0)='./file0\x00', 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext2\x00', &(0x7f0000000100)='./file0\x00', 0x4002e, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}], 0x0, &(0x7f0000013c00)=ANY=[]) [ 1706.906456] EXT4-fs (loop3): ext4_check_descriptors: Block bitmap for group 0 not in group (block 0)! 04:01:45 executing program 7: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="1000000040000000030000002b00000005000000010000000000000000000000002000000020000010000000000000009f09c75f0000ffff53ef", 0x3a, 0x400}, {&(0x7f0000010080)="000000000000000000000000ede2de4df49d4f87b54a3176cfd4eb4f010040000c000000000000009f09c75f", 0x2c, 0x4e0}, {0x0, 0x0, 0x7e0}, {&(0x7f0000010ce0)="00000000000000000000000000000000000000000000000000000000c99b0000ed410000000400009f09c75f9f09c75f9f09c75f00000000000003000200000000000800000000000af301000400000000000000000000000100000004", 0x5d, 0x8c60}], 0x0, &(0x7f0000010f60)) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) getdents64(r0, &(0x7f0000000040)=""/4, 0x4) [ 1706.908081] EXT4-fs (loop3): group descriptors corrupted! [ 1706.915589] loop0: detected capacity change from 0 to 140 [ 1706.920076] EXT4-fs error (device loop4): __ext4_fill_super:5513: inode #2: comm syz-executor.4: iget: special inode unallocated [ 1706.924413] EXT4-fs (loop0): ext4_check_descriptors: Block bitmap for group 0 not in group (block 0)! [ 1706.925277] EXT4-fs (loop0): group descriptors corrupted! 04:01:45 executing program 6: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="1000000040000000030000002b00000005000000010000000000000000000000002000000020000010000000000000009f09c75f0000ffff53ef", 0x3a, 0x400}, {&(0x7f0000010080)="000000000000000000000000ede2de4df49d4f87b54a3176cfd4eb4f010040000c000000000000009f09c75f", 0x2c, 0x4e0}, {&(0x7f00000100c0)="01000000000000000000000000000000000000000401000012", 0x19, 0x560}, {&(0x7f0000010100)="000000000000000000000000000000000000000000000000000000005178aedb03000000", 0x24, 0x7e0}, {&(0x7f0000010ce0)="00000000000000000000000000000000000000000000000000000000c99b0000ed410000000400009f09c75f9f09c75f9f09c75f00000000000003000200000000000800000000000af301000400000000000000000000000100000004", 0x5d, 0x8c60}], 0x0, &(0x7f0000010f60)) getdents64(r0, &(0x7f0000000040)=""/4, 0x4) [ 1706.937777] EXT4-fs (loop4): get root inode failed [ 1706.938612] EXT4-fs (loop4): mount failed [ 1706.942917] EXT4-fs (loop7): unmounting filesystem 00000000-0000-0000-0000-000000000000. 04:01:45 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="1000000040000000030000002b00000005000000010000000000000000000000002000000020000010000000000000009f09c75f0000ffff53ef", 0x3a, 0x400}, {&(0x7f0000010080)="000000000000000000000000ede2de4df49d4f87b54a3176cfd4eb4f010040000c000000000000009f09c75f", 0x2c, 0x4e0}, {&(0x7f00000100c0)="01000000000000000000000000000000000000000401000012", 0x19, 0x560}, {&(0x7f00000100e0)="00000000000000000000000000000000000000000104", 0x16, 0x640}, {&(0x7f0000010100)="000000000000000000000000000000000000000000000000000000005178aedb030000001300000023", 0x29}, {&(0x7f0000010ce0)="00000000000000000000000000000000000000000000000000000000c99b0000ed410000000400009f09c75f9f09c75f9f09c75f00000000000003000200000000000800000000000af3010004", 0x4d, 0x8c60}], 0x0, &(0x7f0000010f60)) [ 1707.038534] loop5: detected capacity change from 0 to 512 [ 1707.041350] loop0: detected capacity change from 0 to 140 [ 1707.049268] EXT4-fs (loop5): mounting ext2 file system using the ext4 subsystem [ 1707.065903] EXT4-fs (loop0): ext4_check_descriptors: Block bitmap for group 0 not in group (block 0)! [ 1707.066680] EXT4-fs (loop0): group descriptors corrupted! [ 1707.071584] EXT4-fs (loop5): warning: mounting unchecked fs, running e2fsck is recommended [ 1707.072726] loop6: detected capacity change from 0 to 140 [ 1707.078584] loop7: detected capacity change from 0 to 140 [ 1707.083918] EXT4-fs (loop5): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: none. [ 1707.090417] EXT4-fs (loop7): ext4_check_descriptors: Block bitmap for group 0 not in group (block 0)! [ 1707.091459] EXT4-fs (loop5): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 1707.092175] EXT4-fs (loop7): group descriptors corrupted! [ 1707.109925] EXT4-fs (loop6): ext4_check_descriptors: Inode bitmap for group 0 not in group (block 0)! [ 1707.111510] EXT4-fs (loop6): group descriptors corrupted! 04:01:54 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="1000000040000000030000002b00000005000000010000000000000000000000002000000020000010000000000000009f09c75f0000ffff53ef", 0x3a, 0x400}, {&(0x7f0000010080)="000000000000000000000000ede2de4df49d4f87b54a3176cfd4eb4f010040000c000000000000009f09c75f", 0x2c, 0x4e0}, {&(0x7f00000100c0)="01000000000000000000000000000000000000000401000012", 0x19, 0x560}, {&(0x7f00000100e0)="00000000000000000000000000000000000000000104", 0x16, 0x640}, {&(0x7f0000010100)="000000000000000000000000000000000000000000000000000000005178aedb0300000013000000230000002b0005000200040000000000907306c205002a9c00000000000000000000000000000000000000000000000091ecd11b", 0x5c, 0x7e0}, {0x0, 0x0, 0x8c60}], 0x0, &(0x7f0000010f60)) 04:01:54 executing program 3: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="1000000040000000030000002b00000005000000010000000000000000000000002000000020000010000000000000009f09c75f0000ffff53ef", 0x3a, 0x400}, {&(0x7f0000010080)="000000000000000000000000ede2de4df49d4f87b54a3176cfd4eb4f010040000c000000000000009f09c75f", 0x2c, 0x4e0}, {&(0x7f0000010100)='\x00'/21, 0x15, 0x7e0}, {&(0x7f0000010ce0)="00000000000000000000000000000000000000000000000000000000c99b0000ed410000000400009f09c75f9f09c75f9f09c75f00000000000003000200000000000800000000000af301000400000000000000000000000100000004", 0x5d, 0x8c60}], 0x0, &(0x7f0000010f60)) getdents64(r0, &(0x7f0000000040)=""/4, 0x4) 04:01:54 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="1000000040000000030000002b00000005000000010000000000000000000000002000000020000010000000000000009f09c75f0000ffff53ef", 0x3a, 0x400}, {&(0x7f0000010100)='\x00'/21, 0x15, 0x7e0}, {&(0x7f0000010ce0)="00000000000000000000000000000000000000000000000000000000c99b0000ed410000000400009f09c75f9f09c75f9f09c75f00000000000003000200000000000800000000000af3010004000000000000000000000001", 0x59, 0x8c60}], 0x0, &(0x7f0000010f60)) 04:01:54 executing program 6: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="1000000040000000030000002b00000005000000010000000000000000000000002000000020000010000000000000009f09c75f0000ffff53ef", 0x3a, 0x400}, {&(0x7f0000010080)="000000000000000000000000ede2de4df49d4f87b54a3176cfd4eb4f010040000c000000000000009f09c75f", 0x2c, 0x4e0}, {&(0x7f00000100c0)="01000000000000000000000000000000000000000401000012", 0x19, 0x560}, {&(0x7f0000010100)="000000000000000000000000000000000000000000000000000000005178aedb03000000130000", 0x27, 0x7e0}, {&(0x7f0000010ce0)="00000000000000000000000000000000000000000000000000000000c99b0000ed410000000400009f09c75f9f09c75f9f09c75f00000000000003000200000000000800000000000af301000400000000000000000000000100000004", 0x5d, 0x8c60}], 0x0, &(0x7f0000010f60)) getdents64(r0, &(0x7f0000000040)=""/4, 0x4) 04:01:54 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="1000000040000000030000002b00000005000000010000000000000000000000002000000020000010000000000000009f09c75f0000ffff53ef", 0x3a, 0x400}, {&(0x7f0000010080)="000000000000000000000000ede2de4df49d4f87b54a3176cfd4eb4f010040000c000000000000009f09c75f", 0x2c, 0x4e0}, {&(0x7f00000100c0)="01000000000000000000000000000000000000000401000012", 0x19, 0x560}, {&(0x7f00000100e0)="00000000000000000000000000000000000000000104", 0x16, 0x640}, {&(0x7f0000010100)="000000000000000000000000000000000000000000000000000000005178aedb030000001300000023", 0x29}, {&(0x7f0000010ce0)="00000000000000000000000000000000000000000000000000000000c99b0000ed410000000400009f09c75f9f09c75f9f09c75f00000000000003000200000000000800000000000af3010004", 0x4d, 0x8c60}], 0x0, &(0x7f0000010f60)) 04:01:54 executing program 5: creat(&(0x7f00000003c0)='./file0\x00', 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext2\x00', &(0x7f0000000100)='./file0\x00', 0x40043, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}], 0x0, &(0x7f0000013c00)=ANY=[]) 04:01:54 executing program 7: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="1000000040000000030000002b00000005000000010000000000000000000000002000000020000010000000000000009f09c75f0000ffff53ef", 0x3a, 0x400}, {&(0x7f0000010080)="000000000000000000000000ede2de4df49d4f87b54a3176cfd4eb4f010040000c000000000000009f09c75f", 0x2c, 0x4e0}, {0x0, 0x0, 0x7e0}, {&(0x7f0000010ce0)="00000000000000000000000000000000000000000000000000000000c99b0000ed410000000400009f09c75f9f09c75f9f09c75f00000000000003000200000000000800000000000af301000400000000000000000000000100000004", 0x5d, 0x8c60}], 0x0, &(0x7f0000010f60)) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) getdents64(r0, &(0x7f0000000040)=""/4, 0x4) 04:01:54 executing program 2: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="1000000040000000030000002b00000005000000010000000000000000000000002000000020000010000000000000009f09c75f0000ffff53ef", 0x3a, 0x400}, {&(0x7f0000010100)="000000000000000000000000000000000000000000000000000000005178aedb0300000013000000230000002b0005", 0x2f, 0x7e0}, {&(0x7f0000010160)="ffff05000c000080ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff020000000c0001022e000000020000000c0002022e2e00000b000000dc03", 0x41e, 0xc00}, {&(0x7f00000105a0)='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\f', 0x19, 0x13e0}, {&(0x7f00000108c0)="ff07", 0x2, 0x4c00}, {&(0x7f0000010ce0)="00000000000000000000000000000000000000000000000000000000c99b0000ed410000000400009f09c75f9f09c75f9f09c75f00000000000003000200000000000800000000000af301000400000000000000000000000100000004", 0x5d, 0x8c60}], 0x0, &(0x7f0000010f60)) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) getdents64(r0, &(0x7f0000000040)=""/4, 0x4) [ 1715.359985] loop1: detected capacity change from 0 to 140 [ 1715.360703] loop0: detected capacity change from 0 to 140 [ 1715.362321] loop4: detected capacity change from 0 to 140 [ 1715.363496] loop6: detected capacity change from 0 to 140 [ 1715.372606] EXT4-fs (loop1): ext4_check_descriptors: Block bitmap for group 0 not in group (block 0)! [ 1715.373461] EXT4-fs (loop1): group descriptors corrupted! [ 1715.375217] EXT4-fs (loop0): ext4_check_descriptors: Block bitmap for group 0 not in group (block 0)! [ 1715.375980] EXT4-fs (loop0): group descriptors corrupted! [ 1715.376708] EXT4-fs (loop6): ext4_check_descriptors: Inode table for group 0 not in group (block 0)! [ 1715.377553] EXT4-fs (loop6): group descriptors corrupted! [ 1715.378089] loop7: detected capacity change from 0 to 140 [ 1715.380559] EXT4-fs error (device loop4): __ext4_fill_super:5513: inode #2: comm syz-executor.4: iget: special inode unallocated [ 1715.389209] EXT4-fs (loop4): get root inode failed [ 1715.389635] EXT4-fs (loop4): mount failed [ 1715.393748] loop5: detected capacity change from 0 to 512 [ 1715.396561] loop3: detected capacity change from 0 to 140 [ 1715.405915] EXT4-fs (loop5): mounting ext2 file system using the ext4 subsystem [ 1715.410475] EXT4-fs (loop7): ext4_check_descriptors: Block bitmap for group 0 not in group (block 0)! [ 1715.411304] EXT4-fs (loop7): group descriptors corrupted! [ 1715.420968] EXT4-fs (loop3): ext4_check_descriptors: Block bitmap for group 0 not in group (block 0)! [ 1715.421719] EXT4-fs (loop3): group descriptors corrupted! [ 1715.425238] EXT4-fs (loop5): warning: mounting unchecked fs, running e2fsck is recommended [ 1715.443902] EXT4-fs (loop5): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: none. [ 1715.492490] EXT4-fs (loop5): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 1715.504845] loop3: detected capacity change from 0 to 140 [ 1715.507666] EXT4-fs (loop3): ext4_check_descriptors: Block bitmap for group 0 not in group (block 0)! [ 1715.508418] EXT4-fs (loop3): group descriptors corrupted! 04:01:54 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="1000000040000000030000002b00000005000000010000000000000000000000002000000020000010000000000000009f09c75f0000ffff53ef", 0x3a, 0x400}, {&(0x7f0000010080)="000000000000000000000000ede2de4df49d4f87b54a3176cfd4eb4f010040000c000000000000009f09c75f", 0x2c, 0x4e0}, {&(0x7f00000100c0)="01000000000000000000000000000000000000000401000012", 0x19, 0x560}, {&(0x7f0000010100)="000000000000000000000000000000000000000000000000000000005178aedb030000001300000023", 0x29, 0x7e0}, {&(0x7f0000010ce0)="00000000000000000000000000000000000000000000000000000000c99b0000ed410000000400009f09c75f9f09c75f9f09c75f00000000000003000200000000000800000000000af3010004", 0x4d, 0x8c60}], 0x0, &(0x7f0000010f60)) 04:01:54 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="1000000040000000030000002b00000005000000010000000000000000000000002000000020000010000000000000009f09c75f0000ffff53ef", 0x3a, 0x400}, {&(0x7f0000010100)="000000000000000000000000000000000000000000000000000000005178ae", 0x1f, 0x7e0}, {&(0x7f0000010ce0)="00000000000000000000000000000000000000000000000000000000c99b0000ed410000000400009f09c75f9f09c75f9f09c75f00000000000003000200000000000800000000000af3010004000000000000000000000001", 0x59, 0x8c60}], 0x0, &(0x7f0000010f60)) 04:01:54 executing program 2: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="1000000040000000030000002b00000005000000010000000000000000000000002000000020000010000000000000009f09c75f0000ffff53ef", 0x3a, 0x400}, {&(0x7f0000010100)="000000000000000000000000000000000000000000000000000000005178aedb0300000013000000230000002b0005", 0x2f, 0x7e0}, {&(0x7f0000010160)="ffff05000c000080ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff020000000c0001022e000000020000000c0002022e2e00000b000000dc03", 0x41e, 0xc00}, {&(0x7f00000105a0)='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\f', 0x19, 0x13e0}, {&(0x7f00000108c0)="ff07", 0x2, 0x4c00}, {&(0x7f0000010ce0)="00000000000000000000000000000000000000000000000000000000c99b0000ed410000000400009f09c75f9f09c75f9f09c75f00000000000003000200000000000800000000000af301000400000000000000000000000100000004", 0x5d, 0x8c60}], 0x0, &(0x7f0000010f60)) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) getdents64(r0, &(0x7f0000000040)=""/4, 0x4) 04:01:54 executing program 6: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="1000000040000000030000002b00000005000000010000000000000000000000002000000020000010000000000000009f09c75f0000ffff53ef", 0x3a, 0x400}, {&(0x7f0000010080)="000000000000000000000000ede2de4df49d4f87b54a3176cfd4eb4f010040000c000000000000009f09c75f", 0x2c, 0x4e0}, {&(0x7f00000100c0)="01000000000000000000000000000000000000000401000012", 0x19, 0x560}, {&(0x7f0000010100)="000000000000000000000000000000000000000000000000000000005178aedb03000000130000", 0x27, 0x7e0}, {&(0x7f0000010ce0)="00000000000000000000000000000000000000000000000000000000c99b0000ed410000000400009f09c75f9f09c75f9f09c75f00000000000003000200000000000800000000000af301000400000000000000000000000100000004", 0x5d, 0x8c60}], 0x0, &(0x7f0000010f60)) getdents64(r0, &(0x7f0000000040)=""/4, 0x4) 04:01:54 executing program 3: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="1000000040000000030000002b00000005000000010000000000000000000000002000000020000010000000000000009f09c75f0000ffff53ef", 0x3a, 0x400}, {&(0x7f0000010080)="000000000000000000000000ede2de4df49d4f87b54a3176cfd4eb4f010040000c000000000000009f09c75f", 0x2c, 0x4e0}, {&(0x7f0000010100)='\x00'/21, 0x15, 0x7e0}, {&(0x7f0000010ce0)="00000000000000000000000000000000000000000000000000000000c99b0000ed410000000400009f09c75f9f09c75f9f09c75f00000000000003000200000000000800000000000af301000400000000000000000000000100000004", 0x5d, 0x8c60}], 0x0, &(0x7f0000010f60)) getdents64(r0, &(0x7f0000000040)=""/4, 0x4) 04:01:54 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="1000000040000000030000002b00000005000000010000000000000000000000002000000020000010000000000000009f09c75f0000ffff53ef", 0x3a, 0x400}, {&(0x7f0000010080)="000000000000000000000000ede2de4df49d4f87b54a3176cfd4eb4f010040000c000000000000009f09c75f", 0x2c, 0x4e0}, {&(0x7f00000100c0)="01000000000000000000000000000000000000000401000012", 0x19, 0x560}, {&(0x7f00000100e0)="00000000000000000000000000000000000000000104", 0x16, 0x640}, {&(0x7f0000010100)="000000000000000000000000000000000000000000000000000000005178aedb0300000013000000230000002b0005000200040000000000907306c205002a9c00000000000000000000000000000000000000000000000091ecd11b", 0x5c, 0x7e0}, {0x0, 0x0, 0x8c60}], 0x0, &(0x7f0000010f60)) 04:01:54 executing program 3: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="1000000040000000030000002b00000005000000010000000000000000000000002000000020000010000000000000009f09c75f0000ffff53ef", 0x3a, 0x400}, {&(0x7f0000010080)="000000000000000000000000ede2de4df49d4f87b54a3176cfd4eb4f010040000c000000000000009f09c75f", 0x2c, 0x4e0}, {&(0x7f0000010100)='\x00'/21, 0x15, 0x7e0}, {&(0x7f0000010ce0)="00000000000000000000000000000000000000000000000000000000c99b0000ed410000000400009f09c75f9f09c75f9f09c75f00000000000003000200000000000800000000000af301000400000000000000000000000100000004", 0x5d, 0x8c60}], 0x0, &(0x7f0000010f60)) getdents64(r0, &(0x7f0000000040)=""/4, 0x4) 04:01:54 executing program 7: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="1000000040000000030000002b00000005000000010000000000000000000000002000000020000010000000000000009f09c75f0000ffff53ef", 0x3a, 0x400}, {&(0x7f0000010080)="000000000000000000000000ede2de4df49d4f87b54a3176cfd4eb4f010040000c000000000000009f09c75f", 0x2c, 0x4e0}, {0x0, 0x0, 0x7e0}, {&(0x7f0000010ce0)="00000000000000000000000000000000000000000000000000000000c99b0000ed410000000400009f09c75f9f09c75f9f09c75f00000000000003000200000000000800000000000af301000400000000000000000000000100000004", 0x5d, 0x8c60}], 0x0, &(0x7f0000010f60)) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) getdents64(r0, &(0x7f0000000040)=""/4, 0x4) [ 1715.584437] loop1: detected capacity change from 0 to 140 [ 1715.593213] loop6: detected capacity change from 0 to 140 [ 1715.606753] EXT4-fs (loop1): ext4_check_descriptors: Block bitmap for group 0 not in group (block 0)! [ 1715.607731] EXT4-fs (loop1): group descriptors corrupted! [ 1715.610503] loop0: detected capacity change from 0 to 140 04:01:54 executing program 5: creat(&(0x7f00000003c0)='./file0\x00', 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext2\x00', &(0x7f0000000100)='./file0\x00', 0x40050, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}], 0x0, &(0x7f0000013c00)=ANY=[]) [ 1715.616769] loop4: detected capacity change from 0 to 140 [ 1715.639245] loop7: detected capacity change from 0 to 140 04:01:54 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="1000000040000000030000002b00000005000000010000000000000000000000002000000020000010000000000000009f09c75f0000ffff53ef", 0x3a, 0x400}, {&(0x7f0000010100)="000000000000000000000000000000000000000000000000000000005178ae", 0x1f, 0x7e0}, {&(0x7f0000010ce0)="00000000000000000000000000000000000000000000000000000000c99b0000ed410000000400009f09c75f9f09c75f9f09c75f00000000000003000200000000000800000000000af3010004000000000000000000000001", 0x59, 0x8c60}], 0x0, &(0x7f0000010f60)) [ 1715.654217] EXT4-fs (loop6): ext4_check_descriptors: Inode table for group 0 not in group (block 0)! [ 1715.656086] loop5: detected capacity change from 0 to 512 [ 1715.657235] EXT4-fs (loop6): group descriptors corrupted! [ 1715.658821] EXT4-fs (loop5): mounting ext2 file system using the ext4 subsystem [ 1715.662946] EXT4-fs (loop5): warning: mounting unchecked fs, running e2fsck is recommended [ 1715.669599] loop3: detected capacity change from 0 to 140 [ 1715.671514] EXT4-fs error (device loop0): ext4_ext_check_inode:523: inode #2: comm syz-executor.0: pblk 0 bad header/extent: invalid extent entries - magic f30a, entries 1, max 4(4), depth 0(0) [ 1715.677332] EXT4-fs (loop7): ext4_check_descriptors: Block bitmap for group 0 not in group (block 0)! [ 1715.678755] EXT4-fs (loop7): group descriptors corrupted! [ 1715.680835] EXT4-fs error (device loop4): __ext4_fill_super:5513: inode #2: comm syz-executor.4: iget: special inode unallocated [ 1715.686622] EXT4-fs (loop5): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: none. [ 1715.686971] EXT4-fs (loop0): get root inode failed [ 1715.688276] EXT4-fs (loop0): mount failed [ 1715.690329] EXT4-fs (loop4): get root inode failed [ 1715.691097] EXT4-fs (loop4): mount failed [ 1715.691583] EXT4-fs (loop5): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 1715.701926] EXT4-fs (loop3): ext4_check_descriptors: Block bitmap for group 0 not in group (block 0)! [ 1715.703629] EXT4-fs (loop3): group descriptors corrupted! [ 1715.795258] loop1: detected capacity change from 0 to 140 [ 1715.810746] EXT4-fs (loop1): ext4_check_descriptors: Block bitmap for group 0 not in group (block 0)! [ 1715.812134] EXT4-fs (loop1): group descriptors corrupted! 04:02:04 executing program 2: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="1000000040000000030000002b00000005000000010000000000000000000000002000000020000010000000000000009f09c75f0000ffff53ef", 0x3a, 0x400}, {&(0x7f0000010100)="000000000000000000000000000000000000000000000000000000005178aedb0300000013000000230000002b0005", 0x2f, 0x7e0}, {&(0x7f0000010160)="ffff05000c000080ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff020000000c0001022e000000020000000c0002022e2e00000b000000dc03", 0x41e, 0xc00}, {&(0x7f00000105a0)='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\f', 0x19, 0x13e0}, {&(0x7f00000108c0)="ff07", 0x2, 0x4c00}, {&(0x7f0000010ce0)="00000000000000000000000000000000000000000000000000000000c99b0000ed410000000400009f09c75f9f09c75f9f09c75f00000000000003000200000000000800000000000af301000400000000000000000000000100000004", 0x5d, 0x8c60}], 0x0, &(0x7f0000010f60)) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) getdents64(r0, &(0x7f0000000040)=""/4, 0x4) 04:02:04 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="1000000040000000030000002b00000005000000010000000000000000000000002000000020000010000000000000009f09c75f0000ffff53ef", 0x3a, 0x400}, {&(0x7f0000010100)="000000000000000000000000000000000000000000000000000000005178ae", 0x1f, 0x7e0}, {&(0x7f0000010ce0)="00000000000000000000000000000000000000000000000000000000c99b0000ed410000000400009f09c75f9f09c75f9f09c75f00000000000003000200000000000800000000000af3010004000000000000000000000001", 0x59, 0x8c60}], 0x0, &(0x7f0000010f60)) 04:02:04 executing program 3: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="1000000040000000030000002b00000005000000010000000000000000000000002000000020000010000000000000009f09c75f0000ffff53ef", 0x3a, 0x400}, {&(0x7f0000010080)="000000000000000000000000ede2de4df49d4f87b54a3176cfd4eb4f010040000c000000000000009f09c75f", 0x2c, 0x4e0}, {&(0x7f0000010100)="000000000000000000000000000000000000000000000000000000005178ae", 0x1f, 0x7e0}, {&(0x7f0000010ce0)="00000000000000000000000000000000000000000000000000000000c99b0000ed410000000400009f09c75f9f09c75f9f09c75f00000000000003000200000000000800000000000af301000400000000000000000000000100000004", 0x5d, 0x8c60}], 0x0, &(0x7f0000010f60)) getdents64(r0, &(0x7f0000000040)=""/4, 0x4) 04:02:04 executing program 5: creat(&(0x7f00000003c0)='./file0\x00', 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext2\x00', &(0x7f0000000100)='./file0\x00', 0x40053, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}], 0x0, &(0x7f0000013c00)=ANY=[]) 04:02:04 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="1000000040000000030000002b00000005000000010000000000000000000000002000000020000010000000000000009f09c75f0000ffff53ef", 0x3a, 0x400}, {&(0x7f0000010080)="000000000000000000000000ede2de4df49d4f87b54a3176cfd4eb4f010040000c000000000000009f09c75f", 0x2c, 0x4e0}, {&(0x7f00000100c0)="01000000000000000000000000000000000000000401000012", 0x19, 0x560}, {&(0x7f00000100e0)="00000000000000000000000000000000000000000104", 0x16, 0x640}, {&(0x7f0000010100)="000000000000000000000000000000000000000000000000000000005178aedb0300000013000000230000002b0005000200040000000000907306c205002a9c00000000000000000000000000000000000000000000000091ecd11b", 0x5c, 0x7e0}, {&(0x7f0000010ce0), 0x0, 0x8c60}], 0x0, &(0x7f0000010f60)) 04:02:04 executing program 7: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="1000000040000000030000002b00000005000000010000000000000000000000002000000020000010000000000000009f09c75f0000ffff53ef", 0x3a, 0x400}, {&(0x7f0000010080)="000000000000000000000000ede2de4df49d4f87b54a3176cfd4eb4f010040000c000000000000009f09c75f", 0x2c, 0x4e0}, {&(0x7f0000010100), 0x0, 0x7e0}, {&(0x7f0000010ce0)="00000000000000000000000000000000000000000000000000000000c99b0000ed410000000400009f09c75f9f09c75f9f09c75f00000000000003000200000000000800000000000af301000400000000000000000000000100000004", 0x5d, 0x8c60}], 0x0, &(0x7f0000010f60)) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) getdents64(r0, &(0x7f0000000040)=""/4, 0x4) 04:02:04 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="1000000040000000030000002b00000005000000010000000000000000000000002000000020000010000000000000009f09c75f0000ffff53ef", 0x3a, 0x400}, {&(0x7f0000010080)="000000000000000000000000ede2de4df49d4f87b54a3176cfd4eb4f010040000c000000000000009f09c75f", 0x2c, 0x4e0}, {&(0x7f00000100c0)="01000000000000000000000000000000000000000401000012", 0x19, 0x560}, {0x0, 0x0, 0x7e0}, {&(0x7f0000010ce0)="00000000000000000000000000000000000000000000000000000000c99b0000ed410000000400009f09c75f9f09c75f9f09c75f00000000000003000200000000000800000000000af3010004", 0x4d, 0x8c60}], 0x0, &(0x7f0000010f60)) 04:02:04 executing program 6: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="1000000040000000030000002b00000005000000010000000000000000000000002000000020000010000000000000009f09c75f0000ffff53ef", 0x3a, 0x400}, {&(0x7f0000010080)="000000000000000000000000ede2de4df49d4f87b54a3176cfd4eb4f010040000c000000000000009f09c75f", 0x2c, 0x4e0}, {&(0x7f00000100c0)="01000000000000000000000000000000000000000401000012", 0x19, 0x560}, {&(0x7f0000010100)="000000000000000000000000000000000000000000000000000000005178aedb03000000130000", 0x27, 0x7e0}, {&(0x7f0000010ce0)="00000000000000000000000000000000000000000000000000000000c99b0000ed410000000400009f09c75f9f09c75f9f09c75f00000000000003000200000000000800000000000af301000400000000000000000000000100000004", 0x5d, 0x8c60}], 0x0, &(0x7f0000010f60)) getdents64(r0, &(0x7f0000000040)=""/4, 0x4) [ 1725.614163] loop7: detected capacity change from 0 to 140 [ 1725.624433] EXT4-fs (loop7): ext4_check_descriptors: Block bitmap for group 0 not in group (block 0)! [ 1725.625815] EXT4-fs (loop7): group descriptors corrupted! [ 1725.626843] loop4: detected capacity change from 0 to 140 [ 1725.628097] loop5: detected capacity change from 0 to 512 [ 1725.636163] EXT4-fs (loop5): mounting ext2 file system using the ext4 subsystem [ 1725.650267] loop3: detected capacity change from 0 to 140 [ 1725.651368] EXT4-fs (loop5): warning: mounting unchecked fs, running e2fsck is recommended [ 1725.654044] EXT4-fs error (device loop4): __ext4_fill_super:5513: inode #2: comm syz-executor.4: iget: special inode unallocated [ 1725.664799] EXT4-fs (loop3): ext4_check_descriptors: Block bitmap for group 0 not in group (block 0)! [ 1725.664913] loop6: detected capacity change from 0 to 140 [ 1725.666293] EXT4-fs (loop3): group descriptors corrupted! [ 1725.668502] loop1: detected capacity change from 0 to 140 [ 1725.675228] loop0: detected capacity change from 0 to 140 [ 1725.676398] EXT4-fs (loop4): get root inode failed [ 1725.677235] EXT4-fs (loop4): mount failed [ 1725.678470] EXT4-fs (loop5): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: none. [ 1725.708581] EXT4-fs (loop5): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 1725.722059] EXT4-fs (loop6): ext4_check_descriptors: Inode table for group 0 not in group (block 0)! [ 1725.723434] EXT4-fs (loop6): group descriptors corrupted! [ 1725.735062] EXT4-fs (loop1): ext4_check_descriptors: Block bitmap for group 0 not in group (block 0)! [ 1725.736438] EXT4-fs (loop1): group descriptors corrupted! [ 1725.744682] EXT4-fs (loop0): ext4_check_descriptors: Block bitmap for group 0 not in group (block 0)! [ 1725.746040] EXT4-fs (loop0): group descriptors corrupted! 04:02:04 executing program 3: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="1000000040000000030000002b00000005000000010000000000000000000000002000000020000010000000000000009f09c75f0000ffff53ef", 0x3a, 0x400}, {&(0x7f0000010080)="000000000000000000000000ede2de4df49d4f87b54a3176cfd4eb4f010040000c000000000000009f09c75f", 0x2c, 0x4e0}, {&(0x7f0000010100)="000000000000000000000000000000000000000000000000000000005178ae", 0x1f, 0x7e0}, {&(0x7f0000010ce0)="00000000000000000000000000000000000000000000000000000000c99b0000ed410000000400009f09c75f9f09c75f9f09c75f00000000000003000200000000000800000000000af301000400000000000000000000000100000004", 0x5d, 0x8c60}], 0x0, &(0x7f0000010f60)) getdents64(r0, &(0x7f0000000040)=""/4, 0x4) 04:02:04 executing program 7: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="1000000040000000030000002b00000005000000010000000000000000000000002000000020000010000000000000009f09c75f0000ffff53ef", 0x3a, 0x400}, {&(0x7f0000010080)="000000000000000000000000ede2de4df49d4f87b54a3176cfd4eb4f010040000c000000000000009f09c75f", 0x2c, 0x4e0}, {&(0x7f0000010100), 0x0, 0x7e0}, {&(0x7f0000010ce0)="00000000000000000000000000000000000000000000000000000000c99b0000ed410000000400009f09c75f9f09c75f9f09c75f00000000000003000200000000000800000000000af301000400000000000000000000000100000004", 0x5d, 0x8c60}], 0x0, &(0x7f0000010f60)) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) getdents64(r0, &(0x7f0000000040)=""/4, 0x4) 04:02:04 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="1000000040000000030000002b00000005000000010000000000000000000000002000000020000010000000000000009f09c75f0000ffff53ef", 0x3a, 0x400}, {&(0x7f0000010080)="000000000000000000000000ede2de4df49d4f87b54a3176cfd4eb4f010040000c000000000000009f09c75f", 0x2c, 0x4e0}, {&(0x7f00000100c0)="01000000000000000000000000000000000000000401000012", 0x19, 0x560}, {&(0x7f00000100e0)="00000000000000000000000000000000000000000104", 0x16, 0x640}, {&(0x7f0000010100)="000000000000000000000000000000000000000000000000000000005178aedb0300000013000000230000002b0005000200040000000000907306c205002a9c00000000000000000000000000000000000000000000000091ecd11b", 0x5c, 0x7e0}, {&(0x7f0000010ce0), 0x0, 0x8c60}], 0x0, &(0x7f0000010f60)) [ 1725.859553] loop3: detected capacity change from 0 to 140 [ 1725.873494] loop7: detected capacity change from 0 to 140 [ 1725.893913] EXT4-fs (loop3): ext4_check_descriptors: Block bitmap for group 0 not in group (block 0)! [ 1725.895290] EXT4-fs (loop3): group descriptors corrupted! 04:02:04 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="1000000040000000030000002b00000005000000010000000000000000000000002000000020000010000000000000009f09c75f0000ffff53ef", 0x3a, 0x400}, {&(0x7f0000010080)="000000000000000000000000ede2de4df49d4f87b54a3176cfd4eb4f010040000c000000000000009f09c75f", 0x2c, 0x4e0}, {&(0x7f00000100c0)="01000000000000000000000000000000000000000401000012", 0x19, 0x560}, {0x0, 0x0, 0x7e0}, {&(0x7f0000010ce0)="00000000000000000000000000000000000000000000000000000000c99b0000ed410000000400009f09c75f9f09c75f9f09c75f00000000000003000200000000000800000000000af3010004", 0x4d, 0x8c60}], 0x0, &(0x7f0000010f60)) 04:02:04 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x8, &(0x7f0000000200)=[{&(0x7f0000010000)="1000000040000000030000002b00000005000000010000000000000000000000002000000020000010000000000000009f09c75f0000ffff53ef", 0x3a, 0x400}, {&(0x7f0000010080)="000000000000000000000000ede2de4df49d4f87b54a3176cfd4eb4f010040000c000000000000009f09c75f", 0x2c, 0x4e0}, {&(0x7f00000100c0)="01000000000000000000000000000000000000000401000012", 0x19, 0x560}, {&(0x7f00000100e0)="00000000000000000000000000000000000000000104", 0x16, 0x640}, {&(0x7f0000010100)="000000000000000000000000000000000000000000000000000000005178aedb0300000013000000230000002b0005000200040000000000907306c205002a9c00000000000000000000000000000000000000000000000091ecd11b", 0x5c, 0x7e0}, {&(0x7f00000105a0)='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\f', 0x19, 0x13e0}, {&(0x7f00000108c0)="ff07", 0x2, 0x4c00}, {&(0x7f0000010ce0)="00000000000000000000000000000000000000000000000000000000c99b0000ed410000000400009f09c75f9f09c75f9f09c75f00000000000003000200000000000800000000000af301", 0x4b, 0x8c60}], 0x0, &(0x7f0000010f60)) 04:02:04 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="1000000040000000030000002b00000005000000010000000000000000000000002000000020000010000000000000009f09c75f0000ffff53ef", 0x3a, 0x400}, {&(0x7f0000010100)="000000000000000000000000000000000000000000000000000000005178aedb03000000", 0x24, 0x7e0}, {&(0x7f0000010ce0)="00000000000000000000000000000000000000000000000000000000c99b0000ed410000000400009f09c75f9f09c75f9f09c75f00000000000003000200000000000800000000000af3010004000000000000000000000001", 0x59, 0x8c60}], 0x0, &(0x7f0000010f60)) [ 1725.932673] EXT4-fs (loop7): ext4_check_descriptors: Block bitmap for group 0 not in group (block 0)! [ 1725.934245] EXT4-fs (loop7): group descriptors corrupted! 04:02:04 executing program 6: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="1000000040000000030000002b00000005000000010000000000000000000000002000000020000010000000000000009f09c75f0000ffff53ef", 0x3a, 0x400}, {&(0x7f0000010080)="000000000000000000000000ede2de4df49d4f87b54a3176cfd4eb4f010040000c000000000000009f09c75f", 0x2c, 0x4e0}, {&(0x7f00000100c0)="01000000000000000000000000000000000000000401000012", 0x19, 0x560}, {&(0x7f0000010100)="000000000000000000000000000000000000000000000000000000005178aedb0300000013000000", 0x28, 0x7e0}, {&(0x7f0000010ce0)="00000000000000000000000000000000000000000000000000000000c99b0000ed410000000400009f09c75f9f09c75f9f09c75f00000000000003000200000000000800000000000af301000400000000000000000000000100000004", 0x5d, 0x8c60}], 0x0, &(0x7f0000010f60)) getdents64(r0, &(0x7f0000000040)=""/4, 0x4) 04:02:04 executing program 5: creat(&(0x7f00000003c0)='./file0\x00', 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext2\x00', &(0x7f0000000100)='./file0\x00', 0x4005c, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}], 0x0, &(0x7f0000013c00)=ANY=[]) 04:02:04 executing program 7: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="1000000040000000030000002b00000005000000010000000000000000000000002000000020000010000000000000009f09c75f0000ffff53ef", 0x3a, 0x400}, {&(0x7f0000010080)="000000000000000000000000ede2de4df49d4f87b54a3176cfd4eb4f010040000c000000000000009f09c75f", 0x2c, 0x4e0}, {&(0x7f0000010100), 0x0, 0x7e0}, {&(0x7f0000010ce0)="00000000000000000000000000000000000000000000000000000000c99b0000ed410000000400009f09c75f9f09c75f9f09c75f00000000000003000200000000000800000000000af301000400000000000000000000000100000004", 0x5d, 0x8c60}], 0x0, &(0x7f0000010f60)) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) getdents64(r0, &(0x7f0000000040)=""/4, 0x4) [ 1726.011511] loop0: detected capacity change from 0 to 140 [ 1726.014652] loop4: detected capacity change from 0 to 140 [ 1726.027264] EXT4-fs (loop0): ext4_check_descriptors: Block bitmap for group 0 not in group (block 0)! [ 1726.028530] loop5: detected capacity change from 0 to 512 [ 1726.028832] EXT4-fs (loop0): group descriptors corrupted! [ 1726.033420] loop1: detected capacity change from 0 to 140 [ 1726.034209] EXT4-fs error (device loop4): __ext4_fill_super:5513: inode #2: comm syz-executor.4: iget: special inode unallocated [ 1726.036304] EXT4-fs (loop4): get root inode failed [ 1726.037072] EXT4-fs (loop4): mount failed [ 1726.050802] loop6: detected capacity change from 0 to 140 [ 1726.052465] EXT4-fs (loop5): mounting ext2 file system using the ext4 subsystem [ 1726.061790] EXT4-fs (loop6): ext4_check_descriptors: Inode table for group 0 not in group (block 0)! [ 1726.063243] EXT4-fs (loop6): group descriptors corrupted! [ 1726.066171] EXT4-fs (loop5): warning: mounting unchecked fs, running e2fsck is recommended [ 1726.078123] EXT4-fs (loop1): ext4_check_descriptors: Inode bitmap for group 0 not in group (block 0)! [ 1726.079985] EXT4-fs (loop1): group descriptors corrupted! [ 1726.084520] EXT4-fs (loop5): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: none. [ 1726.131216] EXT4-fs (loop5): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 1726.152774] loop7: detected capacity change from 0 to 140 [ 1726.164902] EXT4-fs (loop7): ext4_check_descriptors: Block bitmap for group 0 not in group (block 0)! [ 1726.166557] EXT4-fs (loop7): group descriptors corrupted! 04:02:15 executing program 5: creat(&(0x7f00000003c0)='./file0\x00', 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext2\x00', &(0x7f0000000100)='./file0\x00', 0x40060, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}], 0x0, &(0x7f0000013c00)=ANY=[]) 04:02:15 executing program 7: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="1000000040000000030000002b00000005000000010000000000000000000000002000000020000010000000000000009f09c75f0000ffff53ef", 0x3a, 0x400}, {&(0x7f0000010080)="000000000000000000000000ede2de4df49d4f87b54a3176cfd4eb4f010040000c000000000000009f09c75f", 0x2c, 0x4e0}, {&(0x7f0000010100)='\x00'/21, 0x15, 0x7e0}, {&(0x7f0000010ce0)="00000000000000000000000000000000000000000000000000000000c99b0000ed410000000400009f09c75f9f09c75f9f09c75f00000000000003000200000000000800000000000af301000400000000000000000000000100000004", 0x5d, 0x8c60}], 0x0, &(0x7f0000010f60)) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) getdents64(r0, &(0x7f0000000040)=""/4, 0x4) 04:02:15 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="1000000040000000030000002b00000005000000010000000000000000000000002000000020000010000000000000009f09c75f0000ffff53ef", 0x3a, 0x400}, {&(0x7f0000010100)="000000000000000000000000000000000000000000000000000000005178aedb03000000", 0x24, 0x7e0}, {&(0x7f0000010ce0)="00000000000000000000000000000000000000000000000000000000c99b0000ed410000000400009f09c75f9f09c75f9f09c75f00000000000003000200000000000800000000000af3010004000000000000000000000001", 0x59, 0x8c60}], 0x0, &(0x7f0000010f60)) 04:02:15 executing program 2: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="1000000040000000030000002b00000005000000010000000000000000000000002000000020000010000000000000009f09c75f0000ffff53ef", 0x3a, 0x400}, {&(0x7f0000010080)="000000000000000000000000ede2de4df49d4f87b54a3176cfd4eb4f010040000c000000000000009f09c75f", 0x2c, 0x4e0}, {&(0x7f00000100c0)="01000000000000000000000000000000000000000401000012", 0x19, 0x560}, {&(0x7f00000100e0)="00000000000000000000000000000000000000000104", 0x16, 0x640}, {&(0x7f0000010100)="000000000000000000000000000000000000000000000000000000005178aedb0300000013000000230000002b0005000200040000000000907306c205002a9c00000000000000000000000000000000000000000000000091ecd11b", 0x5c, 0x7e0}, {&(0x7f00000105a0)='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\f', 0x19, 0x13e0}, {0x0, 0x0, 0x8c60}], 0x0, &(0x7f0000010f60)) getdents64(r0, &(0x7f0000000040)=""/4, 0x4) 04:02:15 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="1000000040000000030000002b00000005000000010000000000000000000000002000000020000010000000000000009f09c75f0000ffff53ef", 0x3a, 0x400}, {&(0x7f0000010080)="000000000000000000000000ede2de4df49d4f87b54a3176cfd4eb4f010040000c000000000000009f09c75f", 0x2c, 0x4e0}, {&(0x7f00000100c0)="01000000000000000000000000000000000000000401000012", 0x19, 0x560}, {&(0x7f00000100e0)="00000000000000000000000000000000000000000104", 0x16, 0x640}, {&(0x7f0000010100)="000000000000000000000000000000000000000000000000000000005178aedb0300000013000000230000002b0005000200040000000000907306c205002a9c00000000000000000000000000000000000000000000000091ecd11b", 0x5c, 0x7e0}, {&(0x7f0000010ce0), 0x0, 0x8c60}], 0x0, &(0x7f0000010f60)) 04:02:15 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="1000000040000000030000002b00000005000000010000000000000000000000002000000020000010000000000000009f09c75f0000ffff53ef", 0x3a, 0x400}, {&(0x7f0000010080)="000000000000000000000000ede2de4df49d4f87b54a3176cfd4eb4f010040000c000000000000009f09c75f", 0x2c, 0x4e0}, {&(0x7f00000100c0)="01000000000000000000000000000000000000000401000012", 0x19, 0x560}, {0x0, 0x0, 0x7e0}, {&(0x7f0000010ce0)="00000000000000000000000000000000000000000000000000000000c99b0000ed410000000400009f09c75f9f09c75f9f09c75f00000000000003000200000000000800000000000af3010004", 0x4d, 0x8c60}], 0x0, &(0x7f0000010f60)) 04:02:15 executing program 6: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="1000000040000000030000002b00000005000000010000000000000000000000002000000020000010000000000000009f09c75f0000ffff53ef", 0x3a, 0x400}, {&(0x7f0000010080)="000000000000000000000000ede2de4df49d4f87b54a3176cfd4eb4f010040000c000000000000009f09c75f", 0x2c, 0x4e0}, {&(0x7f00000100c0)="01000000000000000000000000000000000000000401000012", 0x19, 0x560}, {&(0x7f0000010100)="000000000000000000000000000000000000000000000000000000005178aedb0300000013000000", 0x28, 0x7e0}, {&(0x7f0000010ce0)="00000000000000000000000000000000000000000000000000000000c99b0000ed410000000400009f09c75f9f09c75f9f09c75f00000000000003000200000000000800000000000af301000400000000000000000000000100000004", 0x5d, 0x8c60}], 0x0, &(0x7f0000010f60)) getdents64(r0, &(0x7f0000000040)=""/4, 0x4) 04:02:15 executing program 3: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="1000000040000000030000002b00000005000000010000000000000000000000002000000020000010000000000000009f09c75f0000ffff53ef", 0x3a, 0x400}, {&(0x7f0000010080)="000000000000000000000000ede2de4df49d4f87b54a3176cfd4eb4f010040000c000000000000009f09c75f", 0x2c, 0x4e0}, {&(0x7f0000010100)="000000000000000000000000000000000000000000000000000000005178ae", 0x1f, 0x7e0}, {&(0x7f0000010ce0)="00000000000000000000000000000000000000000000000000000000c99b0000ed410000000400009f09c75f9f09c75f9f09c75f00000000000003000200000000000800000000000af301000400000000000000000000000100000004", 0x5d, 0x8c60}], 0x0, &(0x7f0000010f60)) getdents64(r0, &(0x7f0000000040)=""/4, 0x4) [ 1736.910537] loop7: detected capacity change from 0 to 140 [ 1736.929810] EXT4-fs (loop7): ext4_check_descriptors: Block bitmap for group 0 not in group (block 0)! [ 1736.931358] EXT4-fs (loop7): group descriptors corrupted! [ 1736.940352] loop5: detected capacity change from 0 to 512 [ 1736.941542] loop0: detected capacity change from 0 to 140 [ 1736.943420] loop1: detected capacity change from 0 to 140 [ 1736.944903] loop3: detected capacity change from 0 to 140 [ 1736.945280] loop6: detected capacity change from 0 to 140 [ 1736.954836] loop4: detected capacity change from 0 to 140 [ 1736.957230] EXT4-fs (loop0): ext4_check_descriptors: Block bitmap for group 0 not in group (block 0)! [ 1736.958749] EXT4-fs (loop0): group descriptors corrupted! [ 1736.960666] EXT4-fs (loop1): ext4_check_descriptors: Inode bitmap for group 0 not in group (block 0)! [ 1736.962093] EXT4-fs (loop1): group descriptors corrupted! [ 1736.963053] EXT4-fs (loop5): mounting ext2 file system using the ext4 subsystem [ 1736.969308] EXT4-fs (loop6): ext4_check_descriptors: Inode table for group 0 not in group (block 0)! [ 1736.970763] EXT4-fs (loop6): group descriptors corrupted! [ 1736.972665] EXT4-fs (loop3): ext4_check_descriptors: Block bitmap for group 0 not in group (block 0)! [ 1736.974228] EXT4-fs (loop3): group descriptors corrupted! [ 1736.987049] EXT4-fs (loop5): warning: mounting unchecked fs, running e2fsck is recommended [ 1736.999211] EXT4-fs error (device loop4): __ext4_fill_super:5513: inode #2: comm syz-executor.4: iget: special inode unallocated [ 1737.022015] EXT4-fs (loop4): get root inode failed [ 1737.022211] EXT4-fs (loop5): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: none. [ 1737.022755] EXT4-fs (loop4): mount failed 04:02:15 executing program 2: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="1000000040000000030000002b00000005000000010000000000000000000000002000000020000010000000000000009f09c75f0000ffff53ef", 0x3a, 0x400}, {&(0x7f0000010080)="000000000000000000000000ede2de4df49d4f87b54a3176cfd4eb4f010040000c000000000000009f09c75f", 0x2c, 0x4e0}, {&(0x7f00000100c0)="01000000000000000000000000000000000000000401000012", 0x19, 0x560}, {&(0x7f00000100e0)="00000000000000000000000000000000000000000104", 0x16, 0x640}, {&(0x7f0000010100)="000000000000000000000000000000000000000000000000000000005178aedb0300000013000000230000002b0005000200040000000000907306c205002a9c00000000000000000000000000000000000000000000000091ecd11b", 0x5c, 0x7e0}, {&(0x7f00000105a0)='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\f', 0x19, 0x13e0}, {&(0x7f0000010ce0), 0x0, 0x8c60}], 0x0, &(0x7f0000010f60)) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) getdents64(r0, &(0x7f0000000040)=""/4, 0x4) 04:02:15 executing program 7: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="1000000040000000030000002b00000005000000010000000000000000000000002000000020000010000000000000009f09c75f0000ffff53ef", 0x3a, 0x400}, {&(0x7f0000010080)="000000000000000000000000ede2de4df49d4f87b54a3176cfd4eb4f010040000c000000000000009f09c75f", 0x2c, 0x4e0}, {&(0x7f0000010100)='\x00'/21, 0x15, 0x7e0}, {&(0x7f0000010ce0)="00000000000000000000000000000000000000000000000000000000c99b0000ed410000000400009f09c75f9f09c75f9f09c75f00000000000003000200000000000800000000000af301000400000000000000000000000100000004", 0x5d, 0x8c60}], 0x0, &(0x7f0000010f60)) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) getdents64(r0, &(0x7f0000000040)=""/4, 0x4) 04:02:15 executing program 6: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="1000000040000000030000002b00000005000000010000000000000000000000002000000020000010000000000000009f09c75f0000ffff53ef", 0x3a, 0x400}, {&(0x7f0000010080)="000000000000000000000000ede2de4df49d4f87b54a3176cfd4eb4f010040000c000000000000009f09c75f", 0x2c, 0x4e0}, {&(0x7f00000100c0)="01000000000000000000000000000000000000000401000012", 0x19, 0x560}, {&(0x7f0000010100)="000000000000000000000000000000000000000000000000000000005178aedb0300000013000000", 0x28, 0x7e0}, {&(0x7f0000010ce0)="00000000000000000000000000000000000000000000000000000000c99b0000ed410000000400009f09c75f9f09c75f9f09c75f00000000000003000200000000000800000000000af301000400000000000000000000000100000004", 0x5d, 0x8c60}], 0x0, &(0x7f0000010f60)) getdents64(r0, &(0x7f0000000040)=""/4, 0x4) [ 1737.075072] EXT4-fs (loop5): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 1737.174996] loop6: detected capacity change from 0 to 140 [ 1737.177218] loop7: detected capacity change from 0 to 140 [ 1737.194165] EXT4-fs (loop6): ext4_check_descriptors: Inode table for group 0 not in group (block 0)! [ 1737.195540] EXT4-fs (loop6): group descriptors corrupted! [ 1737.199002] EXT4-fs (loop7): ext4_check_descriptors: Block bitmap for group 0 not in group (block 0)! [ 1737.200452] EXT4-fs (loop7): group descriptors corrupted! 04:02:24 executing program 7: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="1000000040000000030000002b00000005000000010000000000000000000000002000000020000010000000000000009f09c75f0000ffff53ef", 0x3a, 0x400}, {&(0x7f0000010080)="000000000000000000000000ede2de4df49d4f87b54a3176cfd4eb4f010040000c000000000000009f09c75f", 0x2c, 0x4e0}, {&(0x7f0000010100)='\x00'/21, 0x15, 0x7e0}, {&(0x7f0000010ce0)="00000000000000000000000000000000000000000000000000000000c99b0000ed410000000400009f09c75f9f09c75f9f09c75f00000000000003000200000000000800000000000af301000400000000000000000000000100000004", 0x5d, 0x8c60}], 0x0, &(0x7f0000010f60)) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) getdents64(r0, &(0x7f0000000040)=""/4, 0x4) 04:02:24 executing program 2: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x8, &(0x7f0000000200)=[{&(0x7f0000010000)="1000000040000000030000002b00000005000000010000000000000000000000002000000020000010000000000000009f09c75f0000ffff53ef", 0x3a, 0x400}, {&(0x7f0000010080)="000000000000000000000000ede2de4df49d4f87b54a3176cfd4eb4f010040000c000000000000009f09c75f", 0x2c, 0x4e0}, {&(0x7f00000100c0)="01000000000000000000000000000000000000000401000012", 0x19, 0x560}, {&(0x7f00000100e0)="00000000000000000000000000000000000000000104", 0x16, 0x640}, {&(0x7f0000010100)="000000000000000000000000000000000000000000000000000000005178aedb0300000013000000230000002b0005000200040000000000907306c205002a9c00000000000000000000000000000000000000000000000091ecd11b", 0x5c, 0x7e0}, {&(0x7f00000105a0)='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\f', 0x19, 0x13e0}, {&(0x7f00000108c0)="ff07", 0x2, 0x4c00}, {&(0x7f0000010ce0)="00000000000000000000000000000000000000000000000000000000c99b0000ed410000000400009f09c75f9f09c75f9f09c75f00000000000003000200000000000800000000000af301000400000000000000000000000100000004", 0x5d}], 0x0, &(0x7f0000010f60)) getdents64(r0, &(0x7f0000000040)=""/4, 0x4) 04:02:24 executing program 3: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="1000000040000000030000002b00000005000000010000000000000000000000002000000020000010000000000000009f09c75f0000ffff53ef", 0x3a, 0x400}, {&(0x7f0000010080)="000000000000000000000000ede2de4df49d4f87b54a3176cfd4eb4f010040000c000000000000009f09c75f", 0x2c, 0x4e0}, {&(0x7f0000010100)="000000000000000000000000000000000000000000000000000000005178aedb03000000", 0x24, 0x7e0}, {&(0x7f0000010ce0)="00000000000000000000000000000000000000000000000000000000c99b0000ed410000000400009f09c75f9f09c75f9f09c75f00000000000003000200000000000800000000000af301000400000000000000000000000100000004", 0x5d, 0x8c60}], 0x0, &(0x7f0000010f60)) getdents64(r0, &(0x7f0000000040)=""/4, 0x4) 04:02:24 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="1000000040000000030000002b00000005000000010000000000000000000000002000000020000010000000000000009f09c75f0000ffff53ef", 0x3a, 0x400}, {&(0x7f0000010080)="000000000000000000000000ede2de4df49d4f87b54a3176cfd4eb4f010040000c000000000000009f09c75f", 0x2c, 0x4e0}, {&(0x7f00000100c0)="01000000000000000000000000000000000000000401000012", 0x19, 0x560}, {&(0x7f00000100e0)="00000000000000000000000000000000000000000104", 0x16, 0x640}, {&(0x7f0000010100)="000000000000000000000000000000000000000000000000000000005178aedb0300000013000000230000002b0005000200040000000000907306c205002a9c00000000000000000000000000000000000000000000000091ecd11b", 0x5c, 0x7e0}, {&(0x7f0000010ce0)="00000000000000000000000000000000000000000000000000000000c99b0000ed410000000400009f09c75f", 0x2c, 0x8c60}], 0x0, &(0x7f0000010f60)) 04:02:24 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="1000000040000000030000002b00000005000000010000000000000000000000002000000020000010000000000000009f09c75f0000ffff53ef", 0x3a, 0x400}, {&(0x7f0000010100)="000000000000000000000000000000000000000000000000000000005178aedb03000000", 0x24, 0x7e0}, {&(0x7f0000010ce0)="00000000000000000000000000000000000000000000000000000000c99b0000ed410000000400009f09c75f9f09c75f9f09c75f00000000000003000200000000000800000000000af3010004000000000000000000000001", 0x59, 0x8c60}], 0x0, &(0x7f0000010f60)) 04:02:24 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="1000000040000000030000002b00000005000000010000000000000000000000002000000020000010000000000000009f09c75f0000ffff53ef", 0x3a, 0x400}, {&(0x7f0000010080)="000000000000000000000000ede2de4df49d4f87b54a3176cfd4eb4f010040000c000000000000009f09c75f", 0x2c, 0x4e0}, {&(0x7f00000100c0)="01000000000000000000000000000000000000000401000012", 0x19, 0x560}, {&(0x7f0000010100), 0x0, 0x7e0}, {&(0x7f0000010ce0)="00000000000000000000000000000000000000000000000000000000c99b0000ed410000000400009f09c75f9f09c75f9f09c75f00000000000003000200000000000800000000000af3010004", 0x4d, 0x8c60}], 0x0, &(0x7f0000010f60)) 04:02:24 executing program 5: creat(&(0x7f00000003c0)='./file0\x00', 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext2\x00', &(0x7f0000000100)='./file0\x00', 0x4008c, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}], 0x0, &(0x7f0000013c00)=ANY=[]) 04:02:24 executing program 6: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="1000000040000000030000002b00000005000000010000000000000000000000002000000020000010000000000000009f09c75f0000ffff53ef", 0x3a, 0x400}, {&(0x7f0000010080)="000000000000000000000000ede2de4df49d4f87b54a3176cfd4eb4f010040000c000000000000009f09c75f", 0x2c, 0x4e0}, {&(0x7f00000100c0)="01000000000000000000000000000000000000000401000012", 0x19, 0x560}, {&(0x7f0000010100)="000000000000000000000000000000000000000000000000000000005178aedb030000001300000023", 0x29}, {&(0x7f0000010ce0)="00000000000000000000000000000000000000000000000000000000c99b0000ed410000000400009f09c75f9f09c75f9f09c75f00000000000003000200000000000800000000000af301000400000000000000000000000100000004", 0x5d, 0x8c60}], 0x0, &(0x7f0000010f60)) getdents64(r0, &(0x7f0000000040)=""/4, 0x4) [ 1746.088538] loop7: detected capacity change from 0 to 140 [ 1746.119249] EXT4-fs (loop7): ext4_check_descriptors: Block bitmap for group 0 not in group (block 0)! [ 1746.120656] EXT4-fs (loop7): group descriptors corrupted! [ 1746.143617] loop3: detected capacity change from 0 to 140 [ 1746.148339] loop1: detected capacity change from 0 to 140 [ 1746.150670] loop6: detected capacity change from 0 to 140 [ 1746.152887] loop5: detected capacity change from 0 to 512 [ 1746.158759] loop4: detected capacity change from 0 to 140 [ 1746.161499] EXT4-fs (loop3): ext4_check_descriptors: Inode bitmap for group 0 not in group (block 0)! [ 1746.162251] loop0: detected capacity change from 0 to 140 [ 1746.163033] EXT4-fs (loop3): group descriptors corrupted! [ 1746.167785] EXT4-fs (loop1): ext4_check_descriptors: Inode bitmap for group 0 not in group (block 0)! [ 1746.169204] EXT4-fs (loop1): group descriptors corrupted! [ 1746.170545] EXT4-fs (loop5): mounting ext2 file system using the ext4 subsystem [ 1746.179078] EXT4-fs (loop0): ext4_check_descriptors: Block bitmap for group 0 not in group (block 0)! [ 1746.182420] EXT4-fs (loop0): group descriptors corrupted! [ 1746.188849] EXT4-fs (loop5): warning: mounting unchecked fs, running e2fsck is recommended [ 1746.195228] EXT4-fs error (device loop4): __ext4_fill_super:5513: inode #2: comm syz-executor.4: iget: special inode unallocated [ 1746.195465] EXT4-fs (loop6): ext4_check_descriptors: Block bitmap for group 0 not in group (block 0)! [ 1746.198593] EXT4-fs (loop6): group descriptors corrupted! [ 1746.199582] EXT4-fs (loop4): get root inode failed [ 1746.200411] EXT4-fs (loop4): mount failed [ 1746.238052] EXT4-fs (loop5): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: none. 04:02:25 executing program 7: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="1000000040000000030000002b00000005000000010000000000000000000000002000000020000010000000000000009f09c75f0000ffff53ef", 0x3a, 0x400}, {&(0x7f0000010080)="000000000000000000000000ede2de4df49d4f87b54a3176cfd4eb4f010040000c000000000000009f09c75f", 0x2c, 0x4e0}, {&(0x7f0000010100)="000000000000000000000000000000000000000000000000000000005178ae", 0x1f, 0x7e0}, {&(0x7f0000010ce0)="00000000000000000000000000000000000000000000000000000000c99b0000ed410000000400009f09c75f9f09c75f9f09c75f00000000000003000200000000000800000000000af301000400000000000000000000000100000004", 0x5d, 0x8c60}], 0x0, &(0x7f0000010f60)) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) getdents64(r0, &(0x7f0000000040)=""/4, 0x4) 04:02:25 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="1000000040000000030000002b00000005000000010000000000000000000000002000000020000010000000000000009f09c75f0000ffff53ef", 0x3a, 0x400}, {&(0x7f0000010080)="000000000000000000000000ede2de4df49d4f87b54a3176cfd4eb4f010040000c000000000000009f09c75f", 0x2c, 0x4e0}, {&(0x7f00000100c0)="01000000000000000000000000000000000000000401000012", 0x19, 0x560}, {&(0x7f00000100e0)="00000000000000000000000000000000000000000104", 0x16, 0x640}, {&(0x7f0000010100)="000000000000000000000000000000000000000000000000000000005178aedb0300000013000000230000002b0005000200040000000000907306c205002a9c00000000000000000000000000000000000000000000000091ecd11b", 0x5c, 0x7e0}, {&(0x7f0000010ce0)="00000000000000000000000000000000000000000000000000000000c99b0000ed410000000400009f09c75f", 0x2c, 0x8c60}], 0x0, &(0x7f0000010f60)) [ 1746.258716] EXT4-fs (loop5): unmounting filesystem 00000000-0000-0000-0000-000000000000. 04:02:25 executing program 2: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x8, &(0x7f0000000200)=[{&(0x7f0000010000)="1000000040000000030000002b00000005000000010000000000000000000000002000000020000010000000000000009f09c75f0000ffff53ef", 0x3a, 0x400}, {&(0x7f0000010080)="000000000000000000000000ede2de4df49d4f87b54a3176cfd4eb4f010040000c000000000000009f09c75f", 0x2c, 0x4e0}, {&(0x7f00000100c0)="01000000000000000000000000000000000000000401000012", 0x19, 0x560}, {&(0x7f00000100e0)="00000000000000000000000000000000000000000104", 0x16, 0x640}, {&(0x7f0000010100)="000000000000000000000000000000000000000000000000000000005178aedb0300000013000000230000002b0005000200040000000000907306c205002a9c00000000000000000000000000000000000000000000000091ecd11b", 0x5c, 0x7e0}, {&(0x7f00000105a0)='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\f', 0x19, 0x13e0}, {&(0x7f00000108c0)="ff07", 0x2, 0x4c00}, {&(0x7f0000010ce0)="00000000000000000000000000000000000000000000000000000000c99b0000ed410000000400009f09c75f9f09c75f9f09c75f00000000000003000200000000000800000000000af301000400000000000000000000000100000004", 0x5d}], 0x0, &(0x7f0000010f60)) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) getdents64(r0, &(0x7f0000000040)=""/4, 0x4) 04:02:25 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="1000000040000000030000002b00000005000000010000000000000000000000002000000020000010000000000000009f09c75f0000ffff53ef", 0x3a, 0x400}, {&(0x7f0000010080)="000000000000000000000000ede2de4df49d4f87b54a3176cfd4eb4f010040000c000000000000009f09c75f", 0x2c, 0x4e0}, {&(0x7f00000100c0)="01000000000000000000000000000000000000000401000012", 0x19, 0x560}, {&(0x7f0000010100), 0x0, 0x7e0}, {&(0x7f0000010ce0)="00000000000000000000000000000000000000000000000000000000c99b0000ed410000000400009f09c75f9f09c75f9f09c75f00000000000003000200000000000800000000000af3010004", 0x4d, 0x8c60}], 0x0, &(0x7f0000010f60)) 04:02:25 executing program 3: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="1000000040000000030000002b00000005000000010000000000000000000000002000000020000010000000000000009f09c75f0000ffff53ef", 0x3a, 0x400}, {&(0x7f0000010080)="000000000000000000000000ede2de4df49d4f87b54a3176cfd4eb4f010040000c000000000000009f09c75f", 0x2c, 0x4e0}, {&(0x7f0000010100)="000000000000000000000000000000000000000000000000000000005178aedb03000000", 0x24, 0x7e0}, {&(0x7f0000010ce0)="00000000000000000000000000000000000000000000000000000000c99b0000ed410000000400009f09c75f9f09c75f9f09c75f00000000000003000200000000000800000000000af301000400000000000000000000000100000004", 0x5d, 0x8c60}], 0x0, &(0x7f0000010f60)) getdents64(r0, &(0x7f0000000040)=""/4, 0x4) 04:02:25 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="1000000040000000030000002b00000005000000010000000000000000000000002000000020000010000000000000009f09c75f0000ffff53ef", 0x3a, 0x400}, {&(0x7f0000010100)="000000000000000000000000000000000000000000000000000000005178aedb03000000130000", 0x27, 0x7e0}, {&(0x7f0000010ce0)="00000000000000000000000000000000000000000000000000000000c99b0000ed410000000400009f09c75f9f09c75f9f09c75f00000000000003000200000000000800000000000af3010004000000000000000000000001", 0x59, 0x8c60}], 0x0, &(0x7f0000010f60)) [ 1746.359157] loop4: detected capacity change from 0 to 140 04:02:25 executing program 6: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="1000000040000000030000002b00000005000000010000000000000000000000002000000020000010000000000000009f09c75f0000ffff53ef", 0x3a, 0x400}, {&(0x7f0000010080)="000000000000000000000000ede2de4df49d4f87b54a3176cfd4eb4f010040000c000000000000009f09c75f", 0x2c, 0x4e0}, {&(0x7f00000100c0)="01000000000000000000000000000000000000000401000012", 0x19, 0x560}, {&(0x7f0000010100)="000000000000000000000000000000000000000000000000000000005178aedb030000001300000023", 0x29}, {&(0x7f0000010ce0)="00000000000000000000000000000000000000000000000000000000c99b0000ed410000000400009f09c75f9f09c75f9f09c75f00000000000003000200000000000800000000000af301000400000000000000000000000100000004", 0x5d, 0x8c60}], 0x0, &(0x7f0000010f60)) getdents64(r0, &(0x7f0000000040)=""/4, 0x4) [ 1746.425874] loop7: detected capacity change from 0 to 140 [ 1746.433030] EXT4-fs error (device loop4): __ext4_fill_super:5513: inode #2: comm syz-executor.4: iget: special inode unallocated 04:02:25 executing program 5: creat(&(0x7f00000003c0)='./file0\x00', 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext2\x00', &(0x7f0000000100)='./file0\x00', 0x400b3, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}], 0x0, &(0x7f0000013c00)=ANY=[]) 04:02:25 executing program 2: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x8, &(0x7f0000000200)=[{&(0x7f0000010000)="1000000040000000030000002b00000005000000010000000000000000000000002000000020000010000000000000009f09c75f0000ffff53ef", 0x3a, 0x400}, {&(0x7f0000010080)="000000000000000000000000ede2de4df49d4f87b54a3176cfd4eb4f010040000c000000000000009f09c75f", 0x2c, 0x4e0}, {&(0x7f00000100c0)="01000000000000000000000000000000000000000401000012", 0x19, 0x560}, {&(0x7f00000100e0)="00000000000000000000000000000000000000000104", 0x16, 0x640}, {&(0x7f0000010100)="000000000000000000000000000000000000000000000000000000005178aedb0300000013000000230000002b0005000200040000000000907306c205002a9c00000000000000000000000000000000000000000000000091ecd11b", 0x5c, 0x7e0}, {&(0x7f00000105a0)='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\f', 0x19, 0x13e0}, {&(0x7f00000108c0)="ff07", 0x2, 0x4c00}, {&(0x7f0000010ce0)="00000000000000000000000000000000000000000000000000000000c99b0000ed410000000400009f09c75f9f09c75f9f09c75f00000000000003000200000000000800000000000af301000400000000000000000000000100000004", 0x5d}], 0x0, &(0x7f0000010f60)) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) getdents64(r0, &(0x7f0000000040)=""/4, 0x4) [ 1746.452876] EXT4-fs (loop7): ext4_check_descriptors: Block bitmap for group 0 not in group (block 0)! [ 1746.454276] EXT4-fs (loop7): group descriptors corrupted! [ 1746.456294] EXT4-fs (loop4): get root inode failed [ 1746.457094] EXT4-fs (loop4): mount failed [ 1746.468036] loop0: detected capacity change from 0 to 140 [ 1746.482293] EXT4-fs (loop0): ext4_check_descriptors: Block bitmap for group 0 not in group (block 0)! [ 1746.483715] EXT4-fs (loop0): group descriptors corrupted! [ 1746.516398] loop1: detected capacity change from 0 to 140 [ 1746.534261] EXT4-fs (loop1): ext4_check_descriptors: Inode table for group 0 not in group (block 0)! [ 1746.535896] EXT4-fs (loop1): group descriptors corrupted! [ 1746.543747] loop3: detected capacity change from 0 to 140 04:02:25 executing program 7: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="1000000040000000030000002b00000005000000010000000000000000000000002000000020000010000000000000009f09c75f0000ffff53ef", 0x3a, 0x400}, {&(0x7f0000010080)="000000000000000000000000ede2de4df49d4f87b54a3176cfd4eb4f010040000c000000000000009f09c75f", 0x2c, 0x4e0}, {&(0x7f0000010100)="000000000000000000000000000000000000000000000000000000005178ae", 0x1f, 0x7e0}, {&(0x7f0000010ce0)="00000000000000000000000000000000000000000000000000000000c99b0000ed410000000400009f09c75f9f09c75f9f09c75f00000000000003000200000000000800000000000af301000400000000000000000000000100000004", 0x5d, 0x8c60}], 0x0, &(0x7f0000010f60)) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) getdents64(r0, &(0x7f0000000040)=""/4, 0x4) [ 1746.582253] loop6: detected capacity change from 0 to 140 04:02:25 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="1000000040000000030000002b00000005000000010000000000000000000000002000000020000010000000000000009f09c75f0000ffff53ef", 0x3a, 0x400}, {&(0x7f0000010080)="000000000000000000000000ede2de4df49d4f87b54a3176cfd4eb4f010040000c000000000000009f09c75f", 0x2c, 0x4e0}, {&(0x7f00000100c0)="01000000000000000000000000000000000000000401000012", 0x19, 0x560}, {&(0x7f0000010100), 0x0, 0x7e0}, {&(0x7f0000010ce0)="00000000000000000000000000000000000000000000000000000000c99b0000ed410000000400009f09c75f9f09c75f9f09c75f00000000000003000200000000000800000000000af3010004", 0x4d, 0x8c60}], 0x0, &(0x7f0000010f60)) [ 1746.602274] EXT4-fs (loop3): ext4_check_descriptors: Inode bitmap for group 0 not in group (block 0)! [ 1746.603772] EXT4-fs (loop3): group descriptors corrupted! 04:02:25 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="1000000040000000030000002b00000005000000010000000000000000000000002000000020000010000000000000009f09c75f0000ffff53ef", 0x3a, 0x400}, {&(0x7f0000010080)="000000000000000000000000ede2de4df49d4f87b54a3176cfd4eb4f010040000c000000000000009f09c75f", 0x2c, 0x4e0}, {&(0x7f00000100c0)="01000000000000000000000000000000000000000401000012", 0x19, 0x560}, {&(0x7f00000100e0)="00000000000000000000000000000000000000000104", 0x16, 0x640}, {&(0x7f0000010100)="000000000000000000000000000000000000000000000000000000005178aedb0300000013000000230000002b0005000200040000000000907306c205002a9c00000000000000000000000000000000000000000000000091ecd11b", 0x5c, 0x7e0}, {&(0x7f0000010ce0)="00000000000000000000000000000000000000000000000000000000c99b0000ed410000000400009f09c75f", 0x2c, 0x8c60}], 0x0, &(0x7f0000010f60)) [ 1746.621982] EXT4-fs (loop6): ext4_check_descriptors: Block bitmap for group 0 not in group (block 0)! [ 1746.623376] EXT4-fs (loop6): group descriptors corrupted! [ 1746.625315] loop5: detected capacity change from 0 to 512 [ 1746.633050] loop7: detected capacity change from 0 to 140 [ 1746.635644] EXT4-fs (loop5): mounting ext2 file system using the ext4 subsystem [ 1746.650864] EXT4-fs (loop7): ext4_check_descriptors: Block bitmap for group 0 not in group (block 0)! [ 1746.652423] EXT4-fs (loop7): group descriptors corrupted! 04:02:25 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="1000000040000000030000002b00000005000000010000000000000000000000002000000020000010000000000000009f09c75f0000ffff53ef", 0x3a, 0x400}, {&(0x7f0000010100)="000000000000000000000000000000000000000000000000000000005178aedb03000000130000", 0x27, 0x7e0}, {&(0x7f0000010ce0)="00000000000000000000000000000000000000000000000000000000c99b0000ed410000000400009f09c75f9f09c75f9f09c75f00000000000003000200000000000800000000000af3010004000000000000000000000001", 0x59, 0x8c60}], 0x0, &(0x7f0000010f60)) [ 1746.720221] EXT4-fs (loop5): warning: mounting unchecked fs, running e2fsck is recommended [ 1746.744681] loop1: detected capacity change from 0 to 140 [ 1746.748554] EXT4-fs (loop1): ext4_check_descriptors: Inode table for group 0 not in group (block 0)! [ 1746.750119] EXT4-fs (loop1): group descriptors corrupted! [ 1746.772268] loop0: detected capacity change from 0 to 140 [ 1746.790607] EXT4-fs (loop5): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: none. [ 1746.790826] EXT4-fs (loop0): ext4_check_descriptors: Block bitmap for group 0 not in group (block 0)! [ 1746.793829] EXT4-fs (loop0): group descriptors corrupted! [ 1746.825492] EXT4-fs (loop5): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 1746.831013] loop4: detected capacity change from 0 to 140 [ 1746.861682] EXT4-fs error (device loop4): __ext4_fill_super:5513: inode #2: comm syz-executor.4: iget: special inode unallocated [ 1746.866449] loop5: detected capacity change from 0 to 512 [ 1746.869452] EXT4-fs (loop4): get root inode failed [ 1746.870286] EXT4-fs (loop4): mount failed 04:02:36 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="1000000040000000030000002b00000005000000010000000000000000000000002000000020000010000000000000009f09c75f0000ffff53ef", 0x3a, 0x400}, {&(0x7f0000010080)="000000000000000000000000ede2de4df49d4f87b54a3176cfd4eb4f010040000c000000000000009f09c75f", 0x2c, 0x4e0}, {&(0x7f00000100c0)="01000000000000000000000000000000000000000401000012", 0x19, 0x560}, {&(0x7f00000100e0)="00000000000000000000000000000000000000000104", 0x16, 0x640}, {&(0x7f0000010100)="000000000000000000000000000000000000000000000000000000005178aedb0300000013000000230000002b0005000200040000000000907306c205002a9c00000000000000000000000000000000000000000000000091ecd11b", 0x5c, 0x7e0}, {&(0x7f0000010ce0)="00000000000000000000000000000000000000000000000000000000c99b0000ed410000000400009f09c75f9f09c75f9f09c75f0000000000000300020000000000", 0x42, 0x8c60}], 0x0, &(0x7f0000010f60)) 04:02:36 executing program 5: creat(&(0x7f00000003c0)='./file0\x00', 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext2\x00', &(0x7f0000000100)='./file0\x00', 0x400f0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}], 0x0, &(0x7f0000013c00)=ANY=[]) 04:02:36 executing program 6: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="1000000040000000030000002b00000005000000010000000000000000000000002000000020000010000000000000009f09c75f0000ffff53ef", 0x3a, 0x400}, {&(0x7f0000010080)="000000000000000000000000ede2de4df49d4f87b54a3176cfd4eb4f010040000c000000000000009f09c75f", 0x2c, 0x4e0}, {&(0x7f00000100c0)="01000000000000000000000000000000000000000401000012", 0x19, 0x560}, {&(0x7f0000010100)="000000000000000000000000000000000000000000000000000000005178aedb030000001300000023", 0x29}, {&(0x7f0000010ce0)="00000000000000000000000000000000000000000000000000000000c99b0000ed410000000400009f09c75f9f09c75f9f09c75f00000000000003000200000000000800000000000af301000400000000000000000000000100000004", 0x5d, 0x8c60}], 0x0, &(0x7f0000010f60)) getdents64(r0, &(0x7f0000000040)=""/4, 0x4) 04:02:36 executing program 2: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x8, &(0x7f0000000200)=[{&(0x7f0000010000)="1000000040000000030000002b00000005000000010000000000000000000000002000000020000010000000000000009f09c75f0000ffff53ef", 0x3a, 0x400}, {&(0x7f0000010080)="000000000000000000000000ede2de4df49d4f87b54a3176cfd4eb4f010040000c000000000000009f09c75f", 0x2c, 0x4e0}, {&(0x7f00000100c0)="01000000000000000000000000000000000000000401000012", 0x19, 0x560}, {&(0x7f00000100e0)="00000000000000000000000000000000000000000104", 0x16, 0x640}, {&(0x7f0000010100)="000000000000000000000000000000000000000000000000000000005178aedb0300000013000000230000002b0005000200040000000000907306c205002a9c00000000000000000000000000000000000000000000000091ecd11b", 0x5c, 0x7e0}, {&(0x7f00000105a0)='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\f', 0x19, 0x13e0}, {&(0x7f00000108c0)="ff07", 0x2, 0x4c00}, {&(0x7f0000010ce0)="00000000000000000000000000000000000000000000000000000000c99b0000ed410000000400009f09c75f9f09c75f9f09c75f00000000000003000200000000000800000000000af301000400000000000000000000000100000004", 0x5d}], 0x0, &(0x7f0000010f60)) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) getdents64(r0, &(0x7f0000000040)=""/4, 0x4) 04:02:36 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="1000000040000000030000002b00000005000000010000000000000000000000002000000020000010000000000000009f09c75f0000ffff53ef", 0x3a, 0x400}, {&(0x7f0000010100)="000000000000000000000000000000000000000000000000000000005178aedb03000000130000", 0x27, 0x7e0}, {&(0x7f0000010ce0)="00000000000000000000000000000000000000000000000000000000c99b0000ed410000000400009f09c75f9f09c75f9f09c75f00000000000003000200000000000800000000000af3010004000000000000000000000001", 0x59, 0x8c60}], 0x0, &(0x7f0000010f60)) 04:02:36 executing program 7: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="1000000040000000030000002b00000005000000010000000000000000000000002000000020000010000000000000009f09c75f0000ffff53ef", 0x3a, 0x400}, {&(0x7f0000010080)="000000000000000000000000ede2de4df49d4f87b54a3176cfd4eb4f010040000c000000000000009f09c75f", 0x2c, 0x4e0}, {&(0x7f0000010100)="000000000000000000000000000000000000000000000000000000005178ae", 0x1f, 0x7e0}, {&(0x7f0000010ce0)="00000000000000000000000000000000000000000000000000000000c99b0000ed410000000400009f09c75f9f09c75f9f09c75f00000000000003000200000000000800000000000af301000400000000000000000000000100000004", 0x5d, 0x8c60}], 0x0, &(0x7f0000010f60)) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) getdents64(r0, &(0x7f0000000040)=""/4, 0x4) 04:02:36 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="1000000040000000030000002b00000005000000010000000000000000000000002000000020000010000000000000009f09c75f0000ffff53ef", 0x3a, 0x400}, {&(0x7f0000010080)="000000000000000000000000ede2de4df49d4f87b54a3176cfd4eb4f010040000c000000000000009f09c75f", 0x2c, 0x4e0}, {&(0x7f00000100c0)="01000000000000000000000000000000000000000401000012", 0x19, 0x560}, {&(0x7f0000010100)='\x00'/21, 0x15, 0x7e0}, {&(0x7f0000010ce0)="00000000000000000000000000000000000000000000000000000000c99b0000ed410000000400009f09c75f9f09c75f9f09c75f00000000000003000200000000000800000000000af3010004", 0x4d, 0x8c60}], 0x0, &(0x7f0000010f60)) 04:02:36 executing program 3: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="1000000040000000030000002b00000005000000010000000000000000000000002000000020000010000000000000009f09c75f0000ffff53ef", 0x3a, 0x400}, {&(0x7f0000010080)="000000000000000000000000ede2de4df49d4f87b54a3176cfd4eb4f010040000c000000000000009f09c75f", 0x2c, 0x4e0}, {&(0x7f0000010100)="000000000000000000000000000000000000000000000000000000005178aedb03000000", 0x24, 0x7e0}, {&(0x7f0000010ce0)="00000000000000000000000000000000000000000000000000000000c99b0000ed410000000400009f09c75f9f09c75f9f09c75f00000000000003000200000000000800000000000af301000400000000000000000000000100000004", 0x5d, 0x8c60}], 0x0, &(0x7f0000010f60)) getdents64(r0, &(0x7f0000000040)=""/4, 0x4) [ 1757.589813] loop6: detected capacity change from 0 to 140 [ 1757.590574] loop7: detected capacity change from 0 to 140 [ 1757.600774] EXT4-fs (loop7): ext4_check_descriptors: Block bitmap for group 0 not in group (block 0)! [ 1757.601630] EXT4-fs (loop7): group descriptors corrupted! [ 1757.603031] EXT4-fs (loop6): ext4_check_descriptors: Block bitmap for group 0 not in group (block 0)! [ 1757.603791] EXT4-fs (loop6): group descriptors corrupted! [ 1757.615836] loop3: detected capacity change from 0 to 140 [ 1757.622011] EXT4-fs (loop3): ext4_check_descriptors: Inode bitmap for group 0 not in group (block 0)! [ 1757.622777] EXT4-fs (loop3): group descriptors corrupted! [ 1757.628668] loop1: detected capacity change from 0 to 140 [ 1757.630366] loop5: detected capacity change from 0 to 512 [ 1757.630692] loop4: detected capacity change from 0 to 140 [ 1757.632499] loop0: detected capacity change from 0 to 140 04:02:36 executing program 2: sendmsg$NL80211_CMD_UNEXPECTED_FRAME(0xffffffffffffffff, &(0x7f0000000400)={0x0, 0x0, &(0x7f0000000300)={&(0x7f00000002c0)={0x1c, 0x0, 0x1, 0x0, 0x0, {{}, {@val={0x8}, @void}}}, 0x1c}}, 0x0) sendmsg$NL80211_CMD_UPDATE_FT_IES(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000001c0)={0x1c, 0x0, 0x1, 0x70bd2c, 0x0, {{}, {@val={0x8}, @void}}}, 0x1c}, 0x1, 0x0, 0x0, 0x80}, 0xc000) r0 = creat(&(0x7f00000003c0)='./file1\x00', 0x0) sendmsg$netlink(0xffffffffffffffff, &(0x7f0000002b80)={0x0, 0x0, 0x0}, 0x0) dup(0xffffffffffffffff) pwritev2(r0, &(0x7f0000000380)=[{&(0x7f0000000180)="bd", 0xfffffdef}], 0x1, 0x1200, 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) ioctl$FS_IOC_FSSETXATTR(r1, 0x401c5820, &(0x7f0000000200)={0x9}) syz_io_uring_setup(0x5ac7, &(0x7f0000000000)={0x0, 0xa761, 0x4, 0x2, 0x309, 0x0, r1}, &(0x7f0000ffc000/0x2000)=nil, &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000000080), &(0x7f0000000240)=0x0) syz_io_uring_submit(0x0, r2, &(0x7f0000000280)=@IORING_OP_ASYNC_CANCEL={0xe, 0x3, 0x0, 0x0, 0x0, 0x12345}, 0x1ff) [ 1757.644475] EXT4-fs (loop1): ext4_check_descriptors: Inode table for group 0 not in group (block 0)! [ 1757.645865] EXT4-fs (loop1): group descriptors corrupted! [ 1757.646754] EXT4-fs (loop0): ext4_check_descriptors: Block bitmap for group 0 not in group (block 0)! [ 1757.648139] EXT4-fs (loop0): group descriptors corrupted! [ 1757.651199] EXT4-fs (loop5): mounting ext2 file system using the ext4 subsystem [ 1757.665117] EXT4-fs (loop5): warning: mounting unchecked fs, running e2fsck is recommended [ 1757.668103] EXT4-fs (loop4): warning: mounting unchecked fs, running e2fsck is recommended 04:02:36 executing program 6: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="1000000040000000030000002b00000005000000010000000000000000000000002000000020000010000000000000009f09c75f0000ffff53ef", 0x3a, 0x400}, {&(0x7f0000010080)="000000000000000000000000ede2de4df49d4f87b54a3176cfd4eb4f010040000c000000000000009f09c75f", 0x2c, 0x4e0}, {&(0x7f0000010100)="000000000000000000000000000000000000000000000000000000005178aedb030000001300000023", 0x29, 0x7e0}, {&(0x7f0000010ce0)="00000000000000000000000000000000000000000000000000000000c99b0000ed410000000400009f09c75f9f09c75f9f09c75f00000000000003000200000000000800000000000af301000400000000000000000000000100000004", 0x5d, 0x8c60}], 0x0, &(0x7f0000010f60)) getdents64(r0, &(0x7f0000000040)=""/4, 0x4) [ 1757.688368] EXT4-fs (loop5): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: none. [ 1757.693124] EXT4-fs (loop4): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: none. 04:02:36 executing program 7: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="1000000040000000030000002b00000005000000010000000000000000000000002000000020000010000000000000009f09c75f0000ffff53ef", 0x3a, 0x400}, {&(0x7f0000010080)="000000000000000000000000ede2de4df49d4f87b54a3176cfd4eb4f010040000c000000000000009f09c75f", 0x2c, 0x4e0}, {&(0x7f0000010100)="000000000000000000000000000000000000000000000000000000005178aedb03000000", 0x24, 0x7e0}, {&(0x7f0000010ce0)="00000000000000000000000000000000000000000000000000000000c99b0000ed410000000400009f09c75f9f09c75f9f09c75f00000000000003000200000000000800000000000af301000400000000000000000000000100000004", 0x5d, 0x8c60}], 0x0, &(0x7f0000010f60)) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) getdents64(r0, &(0x7f0000000040)=""/4, 0x4) [ 1757.722755] EXT4-fs (loop5): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 1757.750084] loop7: detected capacity change from 0 to 140 [ 1757.765658] loop6: detected capacity change from 0 to 140 [ 1757.767516] EXT4-fs (loop7): ext4_check_descriptors: Inode bitmap for group 0 not in group (block 0)! [ 1757.768994] EXT4-fs (loop7): group descriptors corrupted! [ 1757.772586] EXT4-fs (loop4): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 1757.787360] EXT4-fs (loop6): warning: mounting unchecked fs, running e2fsck is recommended [ 1757.818396] EXT4-fs (loop6): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: none. [ 1757.834790] EXT4-fs error (device loop6): ext4_readdir:262: inode #2: block 4: comm syz-executor.6: path /syzkaller-testdir823133109/syzkaller.UCZRXl/323/mnt: bad entry in directory: rec_len is smaller than minimal - offset=0, inode=0, rec_len=0, size=1024 fake=0 [ 1757.893729] EXT4-fs (loop6): unmounting filesystem 00000000-0000-0000-0000-000000000000. 04:02:45 executing program 2: sendmsg$NL80211_CMD_UNEXPECTED_FRAME(0xffffffffffffffff, &(0x7f0000000400)={0x0, 0x0, &(0x7f0000000300)={&(0x7f00000002c0)={0x1c, 0x0, 0x1, 0x0, 0x0, {{}, {@val={0x8}, @void}}}, 0x1c}}, 0x0) sendmsg$NL80211_CMD_UPDATE_FT_IES(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000001c0)={0x24, 0x0, 0x1, 0x70bd2c, 0x0, {{}, {@val={0x8}, @void}}, [@NL80211_ATTR_MDID={0x6, 0xb1, 0xc116}]}, 0x24}, 0x1, 0x0, 0x0, 0x80}, 0xc000) r0 = creat(&(0x7f00000003c0)='./file1\x00', 0x0) sendmsg$netlink(0xffffffffffffffff, 0x0, 0x0) dup(0xffffffffffffffff) pwritev2(r0, &(0x7f0000000380)=[{&(0x7f0000000180)="bd", 0xfffffdef}], 0x1, 0x1200, 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) ioctl$FS_IOC_FSSETXATTR(r1, 0x401c5820, &(0x7f0000000200)={0x9}) (fail_nth: 1) syz_io_uring_setup(0x0, &(0x7f0000000000)={0x0, 0x0, 0x4, 0x2, 0x309}, &(0x7f0000ffc000/0x2000)=nil, &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000000080), &(0x7f0000000240)) syz_io_uring_submit(0x0, 0x0, &(0x7f0000000280)=@IORING_OP_ASYNC_CANCEL={0xe, 0x0, 0x0, 0x0, 0x0, 0x12345}, 0x1ff) 04:02:45 executing program 6: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="1000000040000000030000002b00000005000000010000000000000000000000002000000020000010000000000000009f09c75f0000ffff53ef", 0x3a, 0x400}, {&(0x7f0000010080)="000000000000000000000000ede2de4df49d4f87b54a3176cfd4eb4f010040000c000000000000009f09c75f", 0x2c, 0x4e0}, {0x0, 0x0, 0x7e0}, {&(0x7f0000010ce0)="00000000000000000000000000000000000000000000000000000000c99b0000ed410000000400009f09c75f9f09c75f9f09c75f00000000000003000200000000000800000000000af301000400000000000000000000000100000004", 0x5d, 0x8c60}], 0x0, &(0x7f0000010f60)) getdents64(r0, &(0x7f0000000040)=""/4, 0x4) 04:02:45 executing program 3: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="1000000040000000030000002b00000005000000010000000000000000000000002000000020000010000000000000009f09c75f0000ffff53ef", 0x3a, 0x400}, {&(0x7f0000010080)="000000000000000000000000ede2de4df49d4f87b54a3176cfd4eb4f010040000c000000000000009f09c75f", 0x2c, 0x4e0}, {&(0x7f0000010100)="000000000000000000000000000000000000000000000000000000005178aedb03000000130000", 0x27, 0x7e0}, {&(0x7f0000010ce0)="00000000000000000000000000000000000000000000000000000000c99b0000ed410000000400009f09c75f9f09c75f9f09c75f00000000000003000200000000000800000000000af301000400000000000000000000000100000004", 0x5d, 0x8c60}], 0x0, &(0x7f0000010f60)) getdents64(r0, &(0x7f0000000040)=""/4, 0x4) 04:02:45 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="1000000040000000030000002b00000005000000010000000000000000000000002000000020000010000000000000009f09c75f0000ffff53ef", 0x3a, 0x400}, {&(0x7f0000010080)="000000000000000000000000ede2de4df49d4f87b54a3176cfd4eb4f010040000c000000000000009f09c75f", 0x2c, 0x4e0}, {&(0x7f00000100c0)="01000000000000000000000000000000000000000401000012", 0x19, 0x560}, {&(0x7f00000100e0)="00000000000000000000000000000000000000000104", 0x16, 0x640}, {&(0x7f0000010100)="000000000000000000000000000000000000000000000000000000005178aedb0300000013000000230000002b0005000200040000000000907306c205002a9c00000000000000000000000000000000000000000000000091ecd11b", 0x5c, 0x7e0}, {&(0x7f0000010ce0)="00000000000000000000000000000000000000000000000000000000c99b0000ed410000000400009f09c75f9f09c75f9f09c75f0000000000000300020000000000", 0x42, 0x8c60}], 0x0, &(0x7f0000010f60)) 04:02:45 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="1000000040000000030000002b00000005000000010000000000000000000000002000000020000010000000000000009f09c75f0000ffff53ef", 0x3a, 0x400}, {&(0x7f0000010100)="000000000000000000000000000000000000000000000000000000005178aedb0300000013000000", 0x28, 0x7e0}, {&(0x7f0000010ce0)="00000000000000000000000000000000000000000000000000000000c99b0000ed410000000400009f09c75f9f09c75f9f09c75f00000000000003000200000000000800000000000af3010004000000000000000000000001", 0x59, 0x8c60}], 0x0, &(0x7f0000010f60)) 04:02:45 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="1000000040000000030000002b00000005000000010000000000000000000000002000000020000010000000000000009f09c75f0000ffff53ef", 0x3a, 0x400}, {&(0x7f0000010080)="000000000000000000000000ede2de4df49d4f87b54a3176cfd4eb4f010040000c000000000000009f09c75f", 0x2c, 0x4e0}, {&(0x7f00000100c0)="01000000000000000000000000000000000000000401000012", 0x19, 0x560}, {&(0x7f0000010100)='\x00'/21, 0x15, 0x7e0}, {&(0x7f0000010ce0)="00000000000000000000000000000000000000000000000000000000c99b0000ed410000000400009f09c75f9f09c75f9f09c75f00000000000003000200000000000800000000000af3010004", 0x4d, 0x8c60}], 0x0, &(0x7f0000010f60)) 04:02:45 executing program 5: creat(&(0x7f00000003c0)='./file0\x00', 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext2\x00', &(0x7f0000000100)='./file0\x00', 0x400f5, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}], 0x0, &(0x7f0000013c00)=ANY=[]) 04:02:45 executing program 7: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="1000000040000000030000002b00000005000000010000000000000000000000002000000020000010000000000000009f09c75f0000ffff53ef", 0x3a, 0x400}, {&(0x7f0000010080)="000000000000000000000000ede2de4df49d4f87b54a3176cfd4eb4f010040000c000000000000009f09c75f", 0x2c, 0x4e0}, {&(0x7f0000010100)="000000000000000000000000000000000000000000000000000000005178aedb03000000", 0x24, 0x7e0}, {&(0x7f0000010ce0)="00000000000000000000000000000000000000000000000000000000c99b0000ed410000000400009f09c75f9f09c75f9f09c75f00000000000003000200000000000800000000000af301000400000000000000000000000100000004", 0x5d, 0x8c60}], 0x0, &(0x7f0000010f60)) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) getdents64(r0, &(0x7f0000000040)=""/4, 0x4) [ 1766.390830] loop4: detected capacity change from 0 to 140 [ 1766.403563] EXT4-fs (loop4): warning: mounting unchecked fs, running e2fsck is recommended [ 1766.408137] loop5: detected capacity change from 0 to 512 [ 1766.412612] EXT4-fs (loop4): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: none. [ 1766.415594] loop6: detected capacity change from 0 to 140 [ 1766.426282] loop1: detected capacity change from 0 to 140 04:02:45 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="1000000040000000030000002b00000005000000010000000000000000000000002000000020000010000000000000009f09c75f0000ffff53ef", 0x3a, 0x400}, {&(0x7f0000010080)="000000000000000000000000ede2de4df49d4f87b54a3176cfd4eb4f010040000c000000000000009f09c75f", 0x2c, 0x4e0}, {&(0x7f00000100c0)="01000000000000000000000000000000000000000401000012", 0x19, 0x560}, {&(0x7f00000100e0)="00000000000000000000000000000000000000000104", 0x16, 0x640}, {&(0x7f0000010100)="000000000000000000000000000000000000000000000000000000005178aedb0300000013000000230000002b0005000200040000000000907306c205002a9c00000000000000000000000000000000000000000000000091ecd11b", 0x5c, 0x7e0}, {&(0x7f0000010ce0)="00000000000000000000000000000000000000000000000000000000c99b0000ed410000000400009f09c75f9f09c75f9f09c75f0000000000000300020000000000", 0x42, 0x8c60}], 0x0, &(0x7f0000010f60)) [ 1766.431502] EXT4-fs (loop4): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 1766.433208] loop3: detected capacity change from 0 to 140 [ 1766.441591] FAULT_INJECTION: forcing a failure. [ 1766.441591] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 1766.441659] EXT4-fs (loop5): mounting ext2 file system using the ext4 subsystem [ 1766.442663] CPU: 0 UID: 0 PID: 13134 Comm: syz-executor.2 Not tainted 6.18.0-rc5-next-20251111 #1 PREEMPT(voluntary) [ 1766.442682] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1766.442691] Call Trace: [ 1766.442696] [ 1766.442701] dump_stack_lvl+0xfa/0x120 [ 1766.442719] should_fail_ex+0x4d7/0x5e0 [ 1766.442735] _copy_from_user+0x30/0xd0 [ 1766.442748] ioctl_fssetxattr+0x10a/0x250 [ 1766.442768] ? __pfx_ioctl_fssetxattr+0x10/0x10 [ 1766.442786] ? get_pid_task+0x107/0x250 [ 1766.442802] ? proc_fail_nth_write+0x97/0x220 [ 1766.442817] ? find_held_lock+0x2b/0x80 [ 1766.442832] ? ksys_write+0x121/0x240 [ 1766.442845] ? lock_is_held_type+0x9e/0x120 [ 1766.442868] do_vfs_ioctl+0xbfe/0x1470 [ 1766.442885] ? __pfx_do_vfs_ioctl+0x10/0x10 [ 1766.442901] ? ioctl_has_perm.constprop.0.isra.0+0x32e/0x4e0 [ 1766.442923] ? __mutex_unlock_slowpath+0xd1/0x750 [ 1766.442949] ? __pfx_ioctl_has_perm.constprop.0.isra.0+0x10/0x10 [ 1766.442970] ? lockdep_stats_show+0x300/0xa40 [ 1766.442989] ? __fget_files+0x34/0x3b0 [ 1766.443009] ? find_held_lock+0x2b/0x80 [ 1766.443022] ? __fget_files+0x203/0x3b0 [ 1766.443041] ? lock_release+0xc8/0x290 [ 1766.443062] ? selinux_file_ioctl+0xb9/0x280 [ 1766.443085] __x64_sys_ioctl+0x116/0x210 [ 1766.443102] do_syscall_64+0xbf/0x430 [ 1766.443117] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 1766.443131] RIP: 0033:0x7f5179ba6b19 [ 1766.443141] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1766.443154] RSP: 002b:00007f51770fb188 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 1766.443166] RAX: ffffffffffffffda RBX: 00007f5179cba020 RCX: 00007f5179ba6b19 [ 1766.443175] RDX: 0000000020000200 RSI: 00000000401c5820 RDI: 0000000000000004 [ 1766.443184] RBP: 00007f51770fb1d0 R08: 0000000000000000 R09: 0000000000000000 [ 1766.443191] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1766.443199] R13: 00007ffef396ffef R14: 00007f51770fb300 R15: 0000000000022000 [ 1766.443215] [ 1766.444173] loop7: detected capacity change from 0 to 140 [ 1766.452291] EXT4-fs (loop1): ext4_check_descriptors: Inode table for group 0 not in group (block 0)! [ 1766.453966] EXT4-fs (loop6): ext4_check_descriptors: Block bitmap for group 0 not in group (block 0)! [ 1766.454462] EXT4-fs (loop1): group descriptors corrupted! [ 1766.456714] EXT4-fs (loop6): group descriptors corrupted! [ 1766.466362] loop0: detected capacity change from 0 to 140 [ 1766.468042] EXT4-fs (loop3): ext4_check_descriptors: Inode table for group 0 not in group (block 0)! [ 1766.469579] EXT4-fs (loop3): group descriptors corrupted! [ 1766.475221] EXT4-fs (loop5): warning: mounting unchecked fs, running e2fsck is recommended [ 1766.480014] EXT4-fs (loop0): ext4_check_descriptors: Block bitmap for group 0 not in group (block 0)! [ 1766.480782] EXT4-fs (loop0): group descriptors corrupted! [ 1766.496205] EXT4-fs (loop7): ext4_check_descriptors: Inode bitmap for group 0 not in group (block 0)! [ 1766.496999] EXT4-fs (loop7): group descriptors corrupted! 04:02:45 executing program 6: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="1000000040000000030000002b00000005000000010000000000000000000000002000000020000010000000000000009f09c75f0000ffff53ef", 0x3a, 0x400}, {&(0x7f0000010080)="000000000000000000000000ede2de4df49d4f87b54a3176cfd4eb4f010040000c000000000000009f09c75f", 0x2c, 0x4e0}, {0x0, 0x0, 0x7e0}, {&(0x7f0000010ce0)="00000000000000000000000000000000000000000000000000000000c99b0000ed410000000400009f09c75f9f09c75f9f09c75f00000000000003000200000000000800000000000af301000400000000000000000000000100000004", 0x5d, 0x8c60}], 0x0, &(0x7f0000010f60)) getdents64(r0, &(0x7f0000000040)=""/4, 0x4) [ 1766.516281] EXT4-fs (loop5): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: none. 04:02:45 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="1000000040000000030000002b00000005000000010000000000000000000000002000000020000010000000000000009f09c75f0000ffff53ef", 0x3a, 0x400}, {&(0x7f0000010080)="000000000000000000000000ede2de4df49d4f87b54a3176cfd4eb4f010040000c000000000000009f09c75f", 0x2c, 0x4e0}, {&(0x7f00000100c0)="01000000000000000000000000000000000000000401000012", 0x19, 0x560}, {&(0x7f0000010100)='\x00'/21, 0x15, 0x7e0}, {&(0x7f0000010ce0)="00000000000000000000000000000000000000000000000000000000c99b0000ed410000000400009f09c75f9f09c75f9f09c75f00000000000003000200000000000800000000000af3010004", 0x4d, 0x8c60}], 0x0, &(0x7f0000010f60)) [ 1766.522115] loop4: detected capacity change from 0 to 140 04:02:45 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="1000000040000000030000002b00000005000000010000000000000000000000002000000020000010000000000000009f09c75f0000ffff53ef", 0x3a, 0x400}, {&(0x7f0000010100)="000000000000000000000000000000000000000000000000000000005178aedb0300000013000000", 0x28, 0x7e0}, {&(0x7f0000010ce0)="00000000000000000000000000000000000000000000000000000000c99b0000ed410000000400009f09c75f9f09c75f9f09c75f00000000000003000200000000000800000000000af3010004000000000000000000000001", 0x59, 0x8c60}], 0x0, &(0x7f0000010f60)) [ 1766.534848] EXT4-fs (loop4): warning: mounting unchecked fs, running e2fsck is recommended [ 1766.540278] EXT4-fs (loop5): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 1766.542199] EXT4-fs (loop4): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: none. [ 1766.604778] loop1: detected capacity change from 0 to 140 04:02:45 executing program 3: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="1000000040000000030000002b00000005000000010000000000000000000000002000000020000010000000000000009f09c75f0000ffff53ef", 0x3a, 0x400}, {&(0x7f0000010080)="000000000000000000000000ede2de4df49d4f87b54a3176cfd4eb4f010040000c000000000000009f09c75f", 0x2c, 0x4e0}, {&(0x7f0000010100)="000000000000000000000000000000000000000000000000000000005178aedb03000000130000", 0x27, 0x7e0}, {&(0x7f0000010ce0)="00000000000000000000000000000000000000000000000000000000c99b0000ed410000000400009f09c75f9f09c75f9f09c75f00000000000003000200000000000800000000000af301000400000000000000000000000100000004", 0x5d, 0x8c60}], 0x0, &(0x7f0000010f60)) getdents64(r0, &(0x7f0000000040)=""/4, 0x4) [ 1766.635052] loop0: detected capacity change from 0 to 140 [ 1766.638574] EXT4-fs (loop1): ext4_check_descriptors: Inode table for group 0 not in group (block 0)! [ 1766.639514] EXT4-fs (loop1): group descriptors corrupted! 04:02:45 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="1000000040000000030000002b00000005000000010000000000000000000000002000000020000010000000000000009f09c75f0000ffff53ef", 0x3a, 0x400}, {&(0x7f0000010080)="000000000000000000000000ede2de4df49d4f87b54a3176cfd4eb4f010040000c000000000000009f09c75f", 0x2c, 0x4e0}, {&(0x7f00000100c0)="01000000000000000000000000000000000000000401000012", 0x19, 0x560}, {&(0x7f00000100e0)="00000000000000000000000000000000000000000104", 0x16, 0x640}, {&(0x7f0000010100)="000000000000000000000000000000000000000000000000000000005178aedb0300000013000000230000002b0005000200040000000000907306c205002a9c00000000000000000000000000000000000000000000000091ecd11b", 0x5c, 0x7e0}, {&(0x7f0000010ce0)="00000000000000000000000000000000000000000000000000000000c99b0000ed410000000400009f09c75f9f09c75f9f09c75f00000000000003000200000000000800000000000af3010004", 0x4d, 0x8c60}], 0x0, &(0x7f0000010f60)) 04:02:45 executing program 5: creat(&(0x7f00000003c0)='./file0\x00', 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext2\x00', &(0x7f0000000100)='./file0\x00', 0x400fe, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}], 0x0, &(0x7f0000013c00)=ANY=[]) [ 1766.642911] loop6: detected capacity change from 0 to 140 [ 1766.648839] EXT4-fs (loop4): unmounting filesystem 00000000-0000-0000-0000-000000000000. 04:02:45 executing program 7: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="1000000040000000030000002b00000005000000010000000000000000000000002000000020000010000000000000009f09c75f0000ffff53ef", 0x3a, 0x400}, {&(0x7f0000010080)="000000000000000000000000ede2de4df49d4f87b54a3176cfd4eb4f010040000c000000000000009f09c75f", 0x2c, 0x4e0}, {&(0x7f0000010100)="000000000000000000000000000000000000000000000000000000005178aedb03000000", 0x24, 0x7e0}, {&(0x7f0000010ce0)="00000000000000000000000000000000000000000000000000000000c99b0000ed410000000400009f09c75f9f09c75f9f09c75f00000000000003000200000000000800000000000af301000400000000000000000000000100000004", 0x5d, 0x8c60}], 0x0, &(0x7f0000010f60)) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) getdents64(r0, &(0x7f0000000040)=""/4, 0x4) [ 1766.653287] EXT4-fs (loop0): ext4_check_descriptors: Block bitmap for group 0 not in group (block 0)! [ 1766.654869] EXT4-fs (loop0): group descriptors corrupted! [ 1766.679154] EXT4-fs (loop6): ext4_check_descriptors: Block bitmap for group 0 not in group (block 0)! [ 1766.679911] EXT4-fs (loop6): group descriptors corrupted! [ 1766.711265] loop3: detected capacity change from 0 to 140 [ 1766.724009] EXT4-fs (loop3): ext4_check_descriptors: Inode table for group 0 not in group (block 0)! [ 1766.725495] EXT4-fs (loop3): group descriptors corrupted! [ 1766.730916] loop7: detected capacity change from 0 to 140 [ 1766.734848] loop4: detected capacity change from 0 to 140 [ 1766.744394] EXT4-fs error (device loop4): ext4_ext_check_inode:523: inode #2: comm syz-executor.4: pblk 0 bad header/extent: invalid extent entries - magic f30a, entries 1, max 4(4), depth 0(0) [ 1766.748353] EXT4-fs (loop4): get root inode failed [ 1766.748773] EXT4-fs (loop4): mount failed [ 1766.750262] EXT4-fs (loop7): ext4_check_descriptors: Inode bitmap for group 0 not in group (block 0)! [ 1766.751111] loop5: detected capacity change from 0 to 512 [ 1766.751842] EXT4-fs (loop7): group descriptors corrupted! [ 1766.773492] EXT4-fs (loop5): mounting ext2 file system using the ext4 subsystem [ 1766.787041] EXT4-fs (loop5): warning: mounting unchecked fs, running e2fsck is recommended [ 1766.795692] EXT4-fs (loop5): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: none. [ 1766.798335] EXT4-fs (loop5): unmounting filesystem 00000000-0000-0000-0000-000000000000. 04:02:55 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="1000000040000000030000002b00000005000000010000000000000000000000002000000020000010000000000000009f09c75f0000ffff53ef", 0x3a, 0x400}, {&(0x7f0000010080)="000000000000000000000000ede2de4df49d4f87b54a3176cfd4eb4f010040000c000000000000009f09c75f", 0x2c, 0x4e0}, {&(0x7f00000100c0)="01000000000000000000000000000000000000000401000012", 0x19, 0x560}, {&(0x7f0000010100)="000000000000000000000000000000000000000000000000000000005178ae", 0x1f, 0x7e0}, {&(0x7f0000010ce0)="00000000000000000000000000000000000000000000000000000000c99b0000ed410000000400009f09c75f9f09c75f9f09c75f00000000000003000200000000000800000000000af3010004", 0x4d, 0x8c60}], 0x0, &(0x7f0000010f60)) 04:02:55 executing program 2: sendmsg$NL80211_CMD_UNEXPECTED_FRAME(0xffffffffffffffff, &(0x7f0000000400)={0x0, 0x0, &(0x7f0000000300)={&(0x7f00000002c0)={0x1c, 0x0, 0x1, 0x0, 0x0, {{}, {@val={0x8}, @void}}}, 0x1c}}, 0x0) sendmsg$NL80211_CMD_UPDATE_FT_IES(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000001c0)={0x24, 0x0, 0x1, 0x70bd2c, 0x0, {{}, {@val={0x8}, @void}}, [@NL80211_ATTR_MDID={0x6, 0xb1, 0xc116}]}, 0x24}, 0x1, 0x0, 0x0, 0x80}, 0xc000) r0 = creat(&(0x7f00000003c0)='./file1\x00', 0x0) sendmsg$netlink(0xffffffffffffffff, 0x0, 0x0) dup(0xffffffffffffffff) pwritev2(r0, &(0x7f0000000380)=[{&(0x7f0000000180)="bd", 0xfffffdef}], 0x1, 0x1200, 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) ioctl$FS_IOC_FSSETXATTR(r1, 0x401c5820, &(0x7f0000000200)={0x9}) (fail_nth: 2) syz_io_uring_setup(0x0, &(0x7f0000000000)={0x0, 0x0, 0x4, 0x2, 0x309}, &(0x7f0000ffc000/0x2000)=nil, &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000000080), &(0x7f0000000240)) syz_io_uring_submit(0x0, 0x0, &(0x7f0000000280)=@IORING_OP_ASYNC_CANCEL={0xe, 0x0, 0x0, 0x0, 0x0, 0x12345}, 0x1ff) 04:02:55 executing program 5: creat(&(0x7f00000003c0)='./file0\x00', 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext2\x00', &(0x7f0000000100)='./file0\x00', 0x4010c, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}], 0x0, &(0x7f0000013c00)=ANY=[]) 04:02:55 executing program 6: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="1000000040000000030000002b00000005000000010000000000000000000000002000000020000010000000000000009f09c75f0000ffff53ef", 0x3a, 0x400}, {&(0x7f0000010080)="000000000000000000000000ede2de4df49d4f87b54a3176cfd4eb4f010040000c000000000000009f09c75f", 0x2c, 0x4e0}, {0x0, 0x0, 0x7e0}, {&(0x7f0000010ce0)="00000000000000000000000000000000000000000000000000000000c99b0000ed410000000400009f09c75f9f09c75f9f09c75f00000000000003000200000000000800000000000af301000400000000000000000000000100000004", 0x5d, 0x8c60}], 0x0, &(0x7f0000010f60)) getdents64(r0, &(0x7f0000000040)=""/4, 0x4) 04:02:55 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="1000000040000000030000002b00000005000000010000000000000000000000002000000020000010000000000000009f09c75f0000ffff53ef", 0x3a, 0x400}, {&(0x7f0000010100)="000000000000000000000000000000000000000000000000000000005178aedb0300000013000000", 0x28, 0x7e0}, {&(0x7f0000010ce0)="00000000000000000000000000000000000000000000000000000000c99b0000ed410000000400009f09c75f9f09c75f9f09c75f00000000000003000200000000000800000000000af3010004000000000000000000000001", 0x59, 0x8c60}], 0x0, &(0x7f0000010f60)) 04:02:55 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="1000000040000000030000002b00000005000000010000000000000000000000002000000020000010000000000000009f09c75f0000ffff53ef", 0x3a, 0x400}, {&(0x7f0000010080)="000000000000000000000000ede2de4df49d4f87b54a3176cfd4eb4f010040000c000000000000009f09c75f", 0x2c, 0x4e0}, {&(0x7f00000100c0)="01000000000000000000000000000000000000000401000012", 0x19, 0x560}, {&(0x7f00000100e0)="00000000000000000000000000000000000000000104", 0x16, 0x640}, {&(0x7f0000010100)="000000000000000000000000000000000000000000000000000000005178aedb0300000013000000230000002b0005000200040000000000907306c205002a9c00000000000000000000000000000000000000000000000091ecd11b", 0x5c, 0x7e0}, {&(0x7f0000010ce0)="00000000000000000000000000000000000000000000000000000000c99b0000ed410000000400009f09c75f9f09c75f9f09c75f0000000000000300020000000000", 0x42, 0x8c60}], 0x0, &(0x7f0000010f60)) 04:02:55 executing program 3: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="1000000040000000030000002b00000005000000010000000000000000000000002000000020000010000000000000009f09c75f0000ffff53ef", 0x3a, 0x400}, {&(0x7f0000010080)="000000000000000000000000ede2de4df49d4f87b54a3176cfd4eb4f010040000c000000000000009f09c75f", 0x2c, 0x4e0}, {&(0x7f0000010100)="000000000000000000000000000000000000000000000000000000005178aedb03000000130000", 0x27, 0x7e0}, {&(0x7f0000010ce0)="00000000000000000000000000000000000000000000000000000000c99b0000ed410000000400009f09c75f9f09c75f9f09c75f00000000000003000200000000000800000000000af301000400000000000000000000000100000004", 0x5d, 0x8c60}], 0x0, &(0x7f0000010f60)) getdents64(r0, &(0x7f0000000040)=""/4, 0x4) 04:02:55 executing program 7: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="1000000040000000030000002b00000005000000010000000000000000000000002000000020000010000000000000009f09c75f0000ffff53ef", 0x3a, 0x400}, {&(0x7f0000010080)="000000000000000000000000ede2de4df49d4f87b54a3176cfd4eb4f010040000c000000000000009f09c75f", 0x2c, 0x4e0}, {&(0x7f0000010100)="000000000000000000000000000000000000000000000000000000005178aedb03000000130000", 0x27, 0x7e0}, {&(0x7f0000010ce0)="00000000000000000000000000000000000000000000000000000000c99b0000ed410000000400009f09c75f9f09c75f9f09c75f00000000000003000200000000000800000000000af301000400000000000000000000000100000004", 0x5d, 0x8c60}], 0x0, &(0x7f0000010f60)) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) getdents64(r0, &(0x7f0000000040)=""/4, 0x4) [ 1776.281868] loop1: detected capacity change from 0 to 140 [ 1776.286968] loop7: detected capacity change from 0 to 140 [ 1776.290836] EXT4-fs (loop1): ext4_check_descriptors: Inode table for group 0 not in group (block 0)! [ 1776.291601] EXT4-fs (loop1): group descriptors corrupted! [ 1776.292618] EXT4-fs (loop7): ext4_check_descriptors: Inode table for group 0 not in group (block 0)! [ 1776.293447] EXT4-fs (loop7): group descriptors corrupted! 04:02:55 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="1000000040000000030000002b00000005000000010000000000000000000000002000000020000010000000000000009f09c75f0000ffff53ef", 0x3a, 0x400}, {&(0x7f0000010100)="000000000000000000000000000000000000000000000000000000005178aedb030000001300000023", 0x29}, {&(0x7f0000010ce0)="00000000000000000000000000000000000000000000000000000000c99b0000ed410000000400009f09c75f9f09c75f9f09c75f00000000000003000200000000000800000000000af3010004000000000000000000000001", 0x59, 0x8c60}], 0x0, &(0x7f0000010f60)) 04:02:55 executing program 7: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="1000000040000000030000002b00000005000000010000000000000000000000002000000020000010000000000000009f09c75f0000ffff53ef", 0x3a, 0x400}, {&(0x7f0000010080)="000000000000000000000000ede2de4df49d4f87b54a3176cfd4eb4f010040000c000000000000009f09c75f", 0x2c, 0x4e0}, {&(0x7f0000010100)="000000000000000000000000000000000000000000000000000000005178aedb03000000130000", 0x27, 0x7e0}, {&(0x7f0000010ce0)="00000000000000000000000000000000000000000000000000000000c99b0000ed410000000400009f09c75f9f09c75f9f09c75f00000000000003000200000000000800000000000af301000400000000000000000000000100000004", 0x5d, 0x8c60}], 0x0, &(0x7f0000010f60)) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) getdents64(r0, &(0x7f0000000040)=""/4, 0x4) [ 1776.326480] loop3: detected capacity change from 0 to 140 [ 1776.326606] loop4: detected capacity change from 0 to 140 [ 1776.339457] loop6: detected capacity change from 0 to 140 [ 1776.340236] EXT4-fs (loop3): ext4_check_descriptors: Inode table for group 0 not in group (block 0)! [ 1776.341006] EXT4-fs (loop3): group descriptors corrupted! [ 1776.347676] loop0: detected capacity change from 0 to 140 [ 1776.356152] EXT4-fs (loop4): warning: mounting unchecked fs, running e2fsck is recommended [ 1776.356394] EXT4-fs (loop6): ext4_check_descriptors: Block bitmap for group 0 not in group (block 0)! [ 1776.358369] EXT4-fs (loop6): group descriptors corrupted! [ 1776.359755] loop5: detected capacity change from 0 to 512 [ 1776.368709] EXT4-fs (loop4): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: none. [ 1776.378338] EXT4-fs (loop0): ext4_check_descriptors: Block bitmap for group 0 not in group (block 0)! [ 1776.380146] EXT4-fs (loop0): group descriptors corrupted! [ 1776.385125] EXT4-fs (loop5): mounting ext2 file system using the ext4 subsystem 04:02:55 executing program 3: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="1000000040000000030000002b00000005000000010000000000000000000000002000000020000010000000000000009f09c75f0000ffff53ef", 0x3a, 0x400}, {&(0x7f0000010080)="000000000000000000000000ede2de4df49d4f87b54a3176cfd4eb4f010040000c000000000000009f09c75f", 0x2c, 0x4e0}, {&(0x7f0000010100)="000000000000000000000000000000000000000000000000000000005178aedb0300000013000000", 0x28, 0x7e0}, {&(0x7f0000010ce0)="00000000000000000000000000000000000000000000000000000000c99b0000ed410000000400009f09c75f9f09c75f9f09c75f00000000000003000200000000000800000000000af301000400000000000000000000000100000004", 0x5d, 0x8c60}], 0x0, &(0x7f0000010f60)) getdents64(r0, &(0x7f0000000040)=""/4, 0x4) [ 1776.400130] EXT4-fs (loop5): warning: mounting unchecked fs, running e2fsck is recommended [ 1776.408685] loop1: detected capacity change from 0 to 140 [ 1776.413920] EXT4-fs (loop5): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: none. [ 1776.416399] EXT4-fs (loop5): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 1776.423628] loop7: detected capacity change from 0 to 140 [ 1776.426431] loop5: detected capacity change from 0 to 512 [ 1776.436660] EXT4-fs (loop7): ext4_check_descriptors: Inode table for group 0 not in group (block 0)! [ 1776.437420] EXT4-fs (loop7): group descriptors corrupted! [ 1776.445400] loop3: detected capacity change from 0 to 140 [ 1776.447040] EXT4-fs (loop1): ext4_check_descriptors: Block bitmap for group 0 not in group (block 0)! [ 1776.448472] EXT4-fs (loop3): ext4_check_descriptors: Inode table for group 0 not in group (block 0)! [ 1776.448703] EXT4-fs (loop1): group descriptors corrupted! [ 1776.449288] EXT4-fs (loop3): group descriptors corrupted! 04:02:55 executing program 6: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="1000000040000000030000002b00000005000000010000000000000000000000002000000020000010000000000000009f09c75f0000ffff53ef", 0x3a, 0x400}, {&(0x7f0000010080)="000000000000000000000000ede2de4df49d4f87b54a3176cfd4eb4f010040000c000000000000009f09c75f", 0x2c, 0x4e0}, {&(0x7f0000010100), 0x0, 0x7e0}, {&(0x7f0000010ce0)="00000000000000000000000000000000000000000000000000000000c99b0000ed410000000400009f09c75f9f09c75f9f09c75f00000000000003000200000000000800000000000af301000400000000000000000000000100000004", 0x5d, 0x8c60}], 0x0, &(0x7f0000010f60)) getdents64(r0, &(0x7f0000000040)=""/4, 0x4) [ 1776.519626] EXT4-fs error (device loop4): ext4_validate_block_bitmap:431: comm ext4lazyinit: bg 0: block 3: invalid block bitmap 04:02:55 executing program 5: creat(&(0x7f00000003c0)='./file0\x00', 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext2\x00', &(0x7f0000000100)='./file0\x00', 0x40111, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}], 0x0, &(0x7f0000013c00)=ANY=[]) 04:02:55 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="1000000040000000030000002b00000005000000010000000000000000000000002000000020000010000000000000009f09c75f0000ffff53ef", 0x3a, 0x400}, {&(0x7f0000010080)="000000000000000000000000ede2de4df49d4f87b54a3176cfd4eb4f010040000c000000000000009f09c75f", 0x2c, 0x4e0}, {&(0x7f00000100c0)="01000000000000000000000000000000000000000401000012", 0x19, 0x560}, {&(0x7f0000010100)="000000000000000000000000000000000000000000000000000000005178ae", 0x1f, 0x7e0}, {&(0x7f0000010ce0)="00000000000000000000000000000000000000000000000000000000c99b0000ed410000000400009f09c75f9f09c75f9f09c75f00000000000003000200000000000800000000000af3010004", 0x4d, 0x8c60}], 0x0, &(0x7f0000010f60)) 04:02:55 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="1000000040000000030000002b00000005000000010000000000000000000000002000000020000010000000000000009f09c75f0000ffff53ef", 0x3a, 0x400}, {&(0x7f0000010080)="000000000000000000000000ede2de4df49d4f87b54a3176cfd4eb4f010040000c000000000000009f09c75f", 0x2c, 0x4e0}, {&(0x7f00000100c0)="01000000000000000000000000000000000000000401000012", 0x19, 0x560}, {&(0x7f00000100e0)="00000000000000000000000000000000000000000104", 0x16, 0x640}, {&(0x7f0000010100)="000000000000000000000000000000000000000000000000000000005178aedb0300000013000000230000002b0005000200040000000000907306c205002a9c00000000000000000000000000000000000000000000000091ecd11b", 0x5c, 0x7e0}, {&(0x7f0000010ce0)="00000000000000000000000000000000000000000000000000000000c99b0000ed410000000400009f09c75f9f09c75f9f09c75f0000000000000300020000000000", 0x42, 0x8c60}], 0x0, &(0x7f0000010f60)) 04:02:55 executing program 3: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="1000000040000000030000002b00000005000000010000000000000000000000002000000020000010000000000000009f09c75f0000ffff53ef", 0x3a, 0x400}, {&(0x7f0000010080)="000000000000000000000000ede2de4df49d4f87b54a3176cfd4eb4f010040000c000000000000009f09c75f", 0x2c, 0x4e0}, {&(0x7f0000010100)="000000000000000000000000000000000000000000000000000000005178aedb0300000013000000", 0x28, 0x7e0}, {&(0x7f0000010ce0)="00000000000000000000000000000000000000000000000000000000c99b0000ed410000000400009f09c75f9f09c75f9f09c75f00000000000003000200000000000800000000000af301000400000000000000000000000100000004", 0x5d, 0x8c60}], 0x0, &(0x7f0000010f60)) getdents64(r0, &(0x7f0000000040)=""/4, 0x4) [ 1776.576347] EXT4-fs (loop4): unmounting filesystem 00000000-0000-0000-0000-000000000000. 04:02:55 executing program 7: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="1000000040000000030000002b00000005000000010000000000000000000000002000000020000010000000000000009f09c75f0000ffff53ef", 0x3a, 0x400}, {&(0x7f0000010080)="000000000000000000000000ede2de4df49d4f87b54a3176cfd4eb4f010040000c000000000000009f09c75f", 0x2c, 0x4e0}, {&(0x7f0000010100)="000000000000000000000000000000000000000000000000000000005178aedb03000000130000", 0x27, 0x7e0}, {&(0x7f0000010ce0)="00000000000000000000000000000000000000000000000000000000c99b0000ed410000000400009f09c75f9f09c75f9f09c75f00000000000003000200000000000800000000000af301000400000000000000000000000100000004", 0x5d, 0x8c60}], 0x0, &(0x7f0000010f60)) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) getdents64(r0, &(0x7f0000000040)=""/4, 0x4) [ 1776.613705] loop3: detected capacity change from 0 to 140 [ 1776.624220] loop6: detected capacity change from 0 to 140 [ 1776.626198] EXT4-fs (loop3): ext4_check_descriptors: Inode table for group 0 not in group (block 0)! [ 1776.626961] EXT4-fs (loop3): group descriptors corrupted! [ 1776.636680] EXT4-fs (loop6): ext4_check_descriptors: Block bitmap for group 0 not in group (block 0)! [ 1776.637447] EXT4-fs (loop6): group descriptors corrupted! [ 1776.649896] loop5: detected capacity change from 0 to 512 [ 1776.654908] loop4: detected capacity change from 0 to 140 [ 1776.670787] loop0: detected capacity change from 0 to 140 [ 1776.675704] EXT4-fs (loop0): ext4_check_descriptors: Block bitmap for group 0 not in group (block 0)! [ 1776.677252] EXT4-fs (loop0): group descriptors corrupted! [ 1776.681271] EXT4-fs (loop4): warning: mounting unchecked fs, running e2fsck is recommended [ 1776.684189] EXT4-fs (loop5): mounting ext2 file system using the ext4 subsystem [ 1776.702348] EXT4-fs (loop5): warning: mounting unchecked fs, running e2fsck is recommended [ 1776.705346] EXT4-fs (loop4): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: none. [ 1776.722456] loop7: detected capacity change from 0 to 140 [ 1776.741552] EXT4-fs (loop5): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: none. [ 1776.742577] EXT4-fs (loop7): ext4_check_descriptors: Inode table for group 0 not in group (block 0)! [ 1776.744119] EXT4-fs (loop7): group descriptors corrupted! [ 1776.760419] EXT4-fs (loop5): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 1776.790519] EXT4-fs (loop4): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 1776.931342] FAULT_INJECTION: forcing a failure. [ 1776.931342] name failslab, interval 1, probability 0, space 0, times 0 [ 1776.932514] CPU: 0 UID: 0 PID: 13190 Comm: syz-executor.2 Not tainted 6.18.0-rc5-next-20251111 #1 PREEMPT(voluntary) [ 1776.932532] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1776.932541] Call Trace: [ 1776.932546] [ 1776.932551] dump_stack_lvl+0xfa/0x120 [ 1776.932579] should_fail_ex+0x4d7/0x5e0 [ 1776.932595] ? ext4_init_io_end+0x27/0x180 [ 1776.932615] should_failslab+0xc2/0x120 [ 1776.932629] kmem_cache_alloc_noprof+0x80/0x690 [ 1776.932648] ? find_held_lock+0x2b/0x80 [ 1776.932665] ? ext4_init_io_end+0x27/0x180 [ 1776.932683] ext4_init_io_end+0x27/0x180 [ 1776.932702] ext4_do_writepages+0xb82/0x3880 [ 1776.932729] ? __pfx_ext4_do_writepages+0x10/0x10 [ 1776.932750] ? lock_is_held_type+0x9e/0x120 [ 1776.932773] ext4_writepages+0x369/0x7a0 [ 1776.932788] ? __pfx_ext4_writepages+0x10/0x10 [ 1776.932809] ? do_writepages+0x469/0x5c0 [ 1776.932826] ? lock_release+0xc8/0x290 [ 1776.932845] ? __pfx_ext4_writepages+0x10/0x10 [ 1776.932861] do_writepages+0x244/0x5c0 [ 1776.932880] filemap_writeback+0x223/0x2d0 [ 1776.932898] ? __pfx_filemap_writeback+0x10/0x10 [ 1776.932937] ? avc_has_perm_noaudit+0x150/0x3d0 [ 1776.932958] ? avc_has_perm+0x12b/0x1d0 [ 1776.932978] filemap_write_and_wait_range+0xa8/0x130 [ 1776.933000] ext4_fileattr_set+0xa64/0x1810 [ 1776.933021] ? __pfx_ext4_fileattr_set+0x10/0x10 [ 1776.933038] ? selinux_inode_file_setattr+0x2ab/0x3b0 [ 1776.933052] ? __pfx_selinux_inode_file_setattr+0x10/0x10 [ 1776.933068] ? cap_capable+0x9c/0x240 [ 1776.933086] vfs_fileattr_set+0x748/0xb50 [ 1776.933105] ? __pfx_vfs_fileattr_set+0x10/0x10 [ 1776.933125] ? mnt_get_write_access_file+0x11f/0x180 [ 1776.933148] ioctl_fssetxattr+0x1f8/0x250 [ 1776.933165] ? __pfx_ioctl_fssetxattr+0x10/0x10 [ 1776.933185] ? proc_fail_nth_write+0x97/0x220 [ 1776.933201] ? ksys_write+0x121/0x240 [ 1776.933213] ? lock_is_held_type+0x9e/0x120 [ 1776.933235] do_vfs_ioctl+0xbfe/0x1470 [ 1776.933253] ? __pfx_do_vfs_ioctl+0x10/0x10 [ 1776.933268] ? ioctl_has_perm.constprop.0.isra.0+0x32e/0x4e0 [ 1776.933289] ? __mutex_unlock_slowpath+0xd1/0x750 [ 1776.933312] ? irqentry_exit+0x17b/0x650 [ 1776.933330] ? trace_irq_enable.constprop.0+0xc2/0x100 [ 1776.933352] ? irqentry_exit+0x17b/0x650 [ 1776.933370] ? trace_irq_disable.constprop.0+0xc2/0x100 [ 1776.933402] __x64_sys_ioctl+0x116/0x210 [ 1776.933419] do_syscall_64+0xbf/0x430 [ 1776.933434] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 1776.933448] RIP: 0033:0x7f5179ba6b19 [ 1776.933458] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1776.933471] RSP: 002b:00007f51770fb188 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 1776.933483] RAX: ffffffffffffffda RBX: 00007f5179cba020 RCX: 00007f5179ba6b19 [ 1776.933492] RDX: 0000000020000200 RSI: 00000000401c5820 RDI: 0000000000000004 [ 1776.933500] RBP: 00007f51770fb1d0 R08: 0000000000000000 R09: 0000000000000000 [ 1776.933508] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1776.933516] R13: 00007ffef396ffef R14: 00007f51770fb300 R15: 0000000000022000 [ 1776.933533] 04:03:04 executing program 2: sendmsg$NL80211_CMD_UNEXPECTED_FRAME(0xffffffffffffffff, &(0x7f0000000400)={0x0, 0x0, &(0x7f0000000300)={&(0x7f00000002c0)={0x1c, 0x0, 0x1, 0x0, 0x0, {{}, {@val={0x8}, @void}}}, 0x1c}}, 0x0) sendmsg$NL80211_CMD_UPDATE_FT_IES(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000001c0)={0x24, 0x0, 0x1, 0x70bd2c, 0x0, {{}, {@val={0x8}, @void}}, [@NL80211_ATTR_MDID={0x6, 0xb1, 0xc116}]}, 0x24}, 0x1, 0x0, 0x0, 0x80}, 0xc000) r0 = creat(&(0x7f00000003c0)='./file1\x00', 0x0) sendmsg$netlink(0xffffffffffffffff, 0x0, 0x0) dup(0xffffffffffffffff) pwritev2(r0, &(0x7f0000000380)=[{&(0x7f0000000180)="bd", 0xfffffdef}], 0x1, 0x1200, 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) ioctl$FS_IOC_FSSETXATTR(r1, 0x401c5820, &(0x7f0000000200)={0x9}) (fail_nth: 3) syz_io_uring_setup(0x0, &(0x7f0000000000)={0x0, 0x0, 0x4, 0x2, 0x309}, &(0x7f0000ffc000/0x2000)=nil, &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000000080), &(0x7f0000000240)) syz_io_uring_submit(0x0, 0x0, &(0x7f0000000280)=@IORING_OP_ASYNC_CANCEL={0xe, 0x0, 0x0, 0x0, 0x0, 0x12345}, 0x1ff) 04:03:04 executing program 5: creat(&(0x7f00000003c0)='./file0\x00', 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext2\x00', &(0x7f0000000100)='./file0\x00', 0x401be, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}], 0x0, &(0x7f0000013c00)=ANY=[]) 04:03:04 executing program 6: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="1000000040000000030000002b00000005000000010000000000000000000000002000000020000010000000000000009f09c75f0000ffff53ef", 0x3a, 0x400}, {&(0x7f0000010080)="000000000000000000000000ede2de4df49d4f87b54a3176cfd4eb4f010040000c000000000000009f09c75f", 0x2c, 0x4e0}, {&(0x7f0000010100), 0x0, 0x7e0}, {&(0x7f0000010ce0)="00000000000000000000000000000000000000000000000000000000c99b0000ed410000000400009f09c75f9f09c75f9f09c75f00000000000003000200000000000800000000000af301000400000000000000000000000100000004", 0x5d, 0x8c60}], 0x0, &(0x7f0000010f60)) getdents64(r0, &(0x7f0000000040)=""/4, 0x4) 04:03:04 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="1000000040000000030000002b00000005000000010000000000000000000000002000000020000010000000000000009f09c75f0000ffff53ef", 0x3a, 0x400}, {&(0x7f0000010100)="000000000000000000000000000000000000000000000000000000005178aedb030000001300000023", 0x29}, {&(0x7f0000010ce0)="00000000000000000000000000000000000000000000000000000000c99b0000ed410000000400009f09c75f9f09c75f9f09c75f00000000000003000200000000000800000000000af3010004000000000000000000000001", 0x59, 0x8c60}], 0x0, &(0x7f0000010f60)) 04:03:04 executing program 3: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="1000000040000000030000002b00000005000000010000000000000000000000002000000020000010000000000000009f09c75f0000ffff53ef", 0x3a, 0x400}, {&(0x7f0000010080)="000000000000000000000000ede2de4df49d4f87b54a3176cfd4eb4f010040000c000000000000009f09c75f", 0x2c, 0x4e0}, {&(0x7f0000010100)="000000000000000000000000000000000000000000000000000000005178aedb0300000013000000", 0x28, 0x7e0}, {&(0x7f0000010ce0)="00000000000000000000000000000000000000000000000000000000c99b0000ed410000000400009f09c75f9f09c75f9f09c75f00000000000003000200000000000800000000000af301000400000000000000000000000100000004", 0x5d, 0x8c60}], 0x0, &(0x7f0000010f60)) getdents64(r0, &(0x7f0000000040)=""/4, 0x4) 04:03:04 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="1000000040000000030000002b00000005000000010000000000000000000000002000000020000010000000000000009f09c75f0000ffff53ef", 0x3a, 0x400}, {&(0x7f0000010080)="000000000000000000000000ede2de4df49d4f87b54a3176cfd4eb4f010040000c000000000000009f09c75f", 0x2c, 0x4e0}, {&(0x7f00000100c0)="01000000000000000000000000000000000000000401000012", 0x19, 0x560}, {&(0x7f00000100e0)="00000000000000000000000000000000000000000104", 0x16, 0x640}, {&(0x7f0000010100)="000000000000000000000000000000000000000000000000000000005178aedb0300000013000000230000002b0005000200040000000000907306c205002a9c00000000000000000000000000000000000000000000000091ecd11b", 0x5c, 0x7e0}, {&(0x7f0000010ce0)="00000000000000000000000000000000000000000000000000000000c99b0000ed410000000400009f09c75f9f09c75f9f09c75f0000000000000300020000000000", 0x42, 0x8c60}], 0x0, &(0x7f0000010f60)) 04:03:04 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="1000000040000000030000002b00000005000000010000000000000000000000002000000020000010000000000000009f09c75f0000ffff53ef", 0x3a, 0x400}, {&(0x7f0000010080)="000000000000000000000000ede2de4df49d4f87b54a3176cfd4eb4f010040000c000000000000009f09c75f", 0x2c, 0x4e0}, {&(0x7f00000100c0)="01000000000000000000000000000000000000000401000012", 0x19, 0x560}, {&(0x7f0000010100)="000000000000000000000000000000000000000000000000000000005178ae", 0x1f, 0x7e0}, {&(0x7f0000010ce0)="00000000000000000000000000000000000000000000000000000000c99b0000ed410000000400009f09c75f9f09c75f9f09c75f00000000000003000200000000000800000000000af3010004", 0x4d, 0x8c60}], 0x0, &(0x7f0000010f60)) 04:03:04 executing program 7: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="1000000040000000030000002b00000005000000010000000000000000000000002000000020000010000000000000009f09c75f0000ffff53ef", 0x3a, 0x400}, {&(0x7f0000010080)="000000000000000000000000ede2de4df49d4f87b54a3176cfd4eb4f010040000c000000000000009f09c75f", 0x2c, 0x4e0}, {&(0x7f0000010100)="000000000000000000000000000000000000000000000000000000005178aedb0300000013000000", 0x28, 0x7e0}, {&(0x7f0000010ce0)="00000000000000000000000000000000000000000000000000000000c99b0000ed410000000400009f09c75f9f09c75f9f09c75f00000000000003000200000000000800000000000af301000400000000000000000000000100000004", 0x5d, 0x8c60}], 0x0, &(0x7f0000010f60)) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) getdents64(r0, &(0x7f0000000040)=""/4, 0x4) [ 1785.936560] loop3: detected capacity change from 0 to 140 [ 1785.943888] loop7: detected capacity change from 0 to 140 [ 1785.945494] EXT4-fs (loop3): ext4_check_descriptors: Inode table for group 0 not in group (block 0)! [ 1785.946337] EXT4-fs (loop3): group descriptors corrupted! [ 1785.950977] EXT4-fs (loop7): ext4_check_descriptors: Inode table for group 0 not in group (block 0)! [ 1785.951736] EXT4-fs (loop7): group descriptors corrupted! [ 1785.978350] loop1: detected capacity change from 0 to 140 [ 1785.982337] loop4: detected capacity change from 0 to 140 [ 1785.987635] loop6: detected capacity change from 0 to 140 [ 1785.988397] loop0: detected capacity change from 0 to 140 04:03:04 executing program 3: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="1000000040000000030000002b00000005000000010000000000000000000000002000000020000010000000000000009f09c75f0000ffff53ef", 0x3a, 0x400}, {&(0x7f0000010080)="000000000000000000000000ede2de4df49d4f87b54a3176cfd4eb4f010040000c000000000000009f09c75f", 0x2c, 0x4e0}, {&(0x7f0000010100)="000000000000000000000000000000000000000000000000000000005178aedb030000001300000023", 0x29}, {&(0x7f0000010ce0)="00000000000000000000000000000000000000000000000000000000c99b0000ed410000000400009f09c75f9f09c75f9f09c75f00000000000003000200000000000800000000000af301000400000000000000000000000100000004", 0x5d, 0x8c60}], 0x0, &(0x7f0000010f60)) getdents64(r0, &(0x7f0000000040)=""/4, 0x4) 04:03:04 executing program 7: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="1000000040000000030000002b00000005000000010000000000000000000000002000000020000010000000000000009f09c75f0000ffff53ef", 0x3a, 0x400}, {&(0x7f0000010080)="000000000000000000000000ede2de4df49d4f87b54a3176cfd4eb4f010040000c000000000000009f09c75f", 0x2c, 0x4e0}, {&(0x7f0000010100)="000000000000000000000000000000000000000000000000000000005178aedb0300000013000000", 0x28, 0x7e0}, {&(0x7f0000010ce0)="00000000000000000000000000000000000000000000000000000000c99b0000ed410000000400009f09c75f9f09c75f9f09c75f00000000000003000200000000000800000000000af301000400000000000000000000000100000004", 0x5d, 0x8c60}], 0x0, &(0x7f0000010f60)) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) getdents64(r0, &(0x7f0000000040)=""/4, 0x4) [ 1786.002037] EXT4-fs (loop4): warning: mounting unchecked fs, running e2fsck is recommended [ 1786.012800] loop5: detected capacity change from 0 to 512 [ 1786.023333] EXT4-fs (loop4): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: none. [ 1786.024700] EXT4-fs (loop0): ext4_check_descriptors: Block bitmap for group 0 not in group (block 0)! [ 1786.026280] EXT4-fs (loop0): group descriptors corrupted! [ 1786.029430] EXT4-fs (loop1): ext4_check_descriptors: Block bitmap for group 0 not in group (block 0)! [ 1786.031083] EXT4-fs (loop1): group descriptors corrupted! [ 1786.039350] EXT4-fs (loop6): ext4_check_descriptors: Block bitmap for group 0 not in group (block 0)! [ 1786.040905] EXT4-fs (loop6): group descriptors corrupted! [ 1786.046303] EXT4-fs (loop5): mounting ext2 file system using the ext4 subsystem [ 1786.059748] loop3: detected capacity change from 0 to 140 [ 1786.072860] EXT4-fs (loop5): warning: mounting unchecked fs, running e2fsck is recommended [ 1786.087977] loop7: detected capacity change from 0 to 140 [ 1786.092187] EXT4-fs (loop7): ext4_check_descriptors: Inode table for group 0 not in group (block 0)! [ 1786.092990] EXT4-fs (loop7): group descriptors corrupted! [ 1786.110006] EXT4-fs (loop3): ext4_check_descriptors: Block bitmap for group 0 not in group (block 0)! [ 1786.111672] EXT4-fs (loop3): group descriptors corrupted! [ 1786.112727] EXT4-fs (loop5): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: none. [ 1786.148832] EXT4-fs (loop5): unmounting filesystem 00000000-0000-0000-0000-000000000000. 04:03:05 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="1000000040000000030000002b00000005000000010000000000000000000000002000000020000010000000000000009f09c75f0000ffff53ef", 0x3a, 0x400}, {&(0x7f0000010080)="000000000000000000000000ede2de4df49d4f87b54a3176cfd4eb4f010040000c000000000000009f09c75f", 0x2c, 0x4e0}, {&(0x7f00000100c0)="01000000000000000000000000000000000000000401000012", 0x19, 0x560}, {&(0x7f00000100e0)="00000000000000000000000000000000000000000104", 0x16, 0x640}, {&(0x7f0000010100)="000000000000000000000000000000000000000000000000000000005178aedb0300000013000000230000002b0005000200040000000000907306c205002a9c00000000000000000000000000000000000000000000000091ecd11b", 0x5c, 0x7e0}, {&(0x7f0000010ce0)="00000000000000000000000000000000000000000000000000000000c99b0000ed410000000400009f09c75f9f09c75f9f09c75f0000000000000300020000000000080000000000", 0x48, 0x8c60}], 0x0, &(0x7f0000010f60)) 04:03:05 executing program 7: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="1000000040000000030000002b00000005000000010000000000000000000000002000000020000010000000000000009f09c75f0000ffff53ef", 0x3a, 0x400}, {&(0x7f0000010080)="000000000000000000000000ede2de4df49d4f87b54a3176cfd4eb4f010040000c000000000000009f09c75f", 0x2c, 0x4e0}, {&(0x7f0000010100)="000000000000000000000000000000000000000000000000000000005178aedb0300000013000000", 0x28, 0x7e0}, {&(0x7f0000010ce0)="00000000000000000000000000000000000000000000000000000000c99b0000ed410000000400009f09c75f9f09c75f9f09c75f00000000000003000200000000000800000000000af301000400000000000000000000000100000004", 0x5d, 0x8c60}], 0x0, &(0x7f0000010f60)) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) getdents64(r0, &(0x7f0000000040)=""/4, 0x4) [ 1786.189516] EXT4-fs (loop4): unmounting filesystem 00000000-0000-0000-0000-000000000000. 04:03:05 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="1000000040000000030000002b00000005000000010000000000000000000000002000000020000010000000000000009f09c75f0000ffff53ef", 0x3a, 0x400}, {&(0x7f0000010080)="000000000000000000000000ede2de4df49d4f87b54a3176cfd4eb4f010040000c000000000000009f09c75f", 0x2c, 0x4e0}, {&(0x7f00000100c0)="01000000000000000000000000000000000000000401000012", 0x19, 0x560}, {&(0x7f0000010100)="000000000000000000000000000000000000000000000000000000005178aedb03000000", 0x24, 0x7e0}, {&(0x7f0000010ce0)="00000000000000000000000000000000000000000000000000000000c99b0000ed410000000400009f09c75f9f09c75f9f09c75f00000000000003000200000000000800000000000af3010004", 0x4d, 0x8c60}], 0x0, &(0x7f0000010f60)) 04:03:05 executing program 6: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="1000000040000000030000002b00000005000000010000000000000000000000002000000020000010000000000000009f09c75f0000ffff53ef", 0x3a, 0x400}, {&(0x7f0000010080)="000000000000000000000000ede2de4df49d4f87b54a3176cfd4eb4f010040000c000000000000009f09c75f", 0x2c, 0x4e0}, {&(0x7f0000010100), 0x0, 0x7e0}, {&(0x7f0000010ce0)="00000000000000000000000000000000000000000000000000000000c99b0000ed410000000400009f09c75f9f09c75f9f09c75f00000000000003000200000000000800000000000af301000400000000000000000000000100000004", 0x5d, 0x8c60}], 0x0, &(0x7f0000010f60)) getdents64(r0, &(0x7f0000000040)=""/4, 0x4) 04:03:05 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="1000000040000000030000002b00000005000000010000000000000000000000002000000020000010000000000000009f09c75f0000ffff53ef", 0x3a, 0x400}, {&(0x7f0000010100)="000000000000000000000000000000000000000000000000000000005178aedb030000001300000023", 0x29}, {&(0x7f0000010ce0)="00000000000000000000000000000000000000000000000000000000c99b0000ed410000000400009f09c75f9f09c75f9f09c75f00000000000003000200000000000800000000000af3010004000000000000000000000001", 0x59, 0x8c60}], 0x0, &(0x7f0000010f60)) 04:03:05 executing program 5: creat(&(0x7f00000003c0)='./file0\x00', 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext2\x00', &(0x7f0000000100)='./file0\x00', 0x401d9, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}], 0x0, &(0x7f0000013c00)=ANY=[]) [ 1786.248485] loop7: detected capacity change from 0 to 140 [ 1786.257781] EXT4-fs (loop7): ext4_check_descriptors: Inode table for group 0 not in group (block 0)! [ 1786.258624] EXT4-fs (loop7): group descriptors corrupted! [ 1786.298602] loop6: detected capacity change from 0 to 140 [ 1786.305422] loop1: detected capacity change from 0 to 140 [ 1786.313830] EXT4-fs (loop6): ext4_check_descriptors: Block bitmap for group 0 not in group (block 0)! [ 1786.314817] EXT4-fs (loop6): group descriptors corrupted! [ 1786.319121] EXT4-fs (loop1): ext4_check_descriptors: Block bitmap for group 0 not in group (block 0)! [ 1786.319869] EXT4-fs (loop1): group descriptors corrupted! [ 1786.331383] loop0: detected capacity change from 0 to 140 [ 1786.332363] loop4: detected capacity change from 0 to 140 [ 1786.344332] EXT4-fs (loop0): ext4_check_descriptors: Inode bitmap for group 0 not in group (block 0)! [ 1786.345766] EXT4-fs (loop0): group descriptors corrupted! [ 1786.352076] EXT4-fs error (device loop4): ext4_ext_check_inode:523: inode #2: comm syz-executor.4: pblk 0 bad header/extent: invalid magic - magic 0, entries 0, max 0(0), depth 0(0) [ 1786.364384] EXT4-fs (loop4): get root inode failed [ 1786.365196] EXT4-fs (loop4): mount failed [ 1786.370841] loop5: detected capacity change from 0 to 512 [ 1786.385336] EXT4-fs (loop5): mounting ext2 file system using the ext4 subsystem [ 1786.404103] EXT4-fs (loop5): warning: mounting unchecked fs, running e2fsck is recommended [ 1786.426805] EXT4-fs (loop5): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: none. [ 1786.445443] EXT4-fs (loop5): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 1786.480127] loop5: detected capacity change from 0 to 512 04:03:14 executing program 2: sendmsg$NL80211_CMD_UNEXPECTED_FRAME(0xffffffffffffffff, &(0x7f0000000400)={0x0, 0x0, &(0x7f0000000300)={&(0x7f00000002c0)={0x1c, 0x0, 0x1, 0x0, 0x0, {{}, {@val={0x8}, @void}}}, 0x1c}}, 0x0) sendmsg$NL80211_CMD_UPDATE_FT_IES(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000001c0)={0x24, 0x0, 0x1, 0x70bd2c, 0x0, {{}, {@val={0x8}, @void}}, [@NL80211_ATTR_MDID={0x6, 0xb1, 0xc116}]}, 0x24}, 0x1, 0x0, 0x0, 0x80}, 0xc000) r0 = creat(&(0x7f00000003c0)='./file1\x00', 0x0) sendmsg$netlink(0xffffffffffffffff, 0x0, 0x0) dup(0xffffffffffffffff) pwritev2(r0, &(0x7f0000000380)=[{&(0x7f0000000180)="bd", 0xfffffdef}], 0x1, 0x1200, 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) ioctl$FS_IOC_FSSETXATTR(r1, 0x401c5820, &(0x7f0000000200)={0x9}) (fail_nth: 4) syz_io_uring_setup(0x0, &(0x7f0000000000)={0x0, 0x0, 0x4, 0x2, 0x309}, &(0x7f0000ffc000/0x2000)=nil, &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000000080), &(0x7f0000000240)) syz_io_uring_submit(0x0, 0x0, &(0x7f0000000280)=@IORING_OP_ASYNC_CANCEL={0xe, 0x0, 0x0, 0x0, 0x0, 0x12345}, 0x1ff) 04:03:14 executing program 7: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="1000000040000000030000002b00000005000000010000000000000000000000002000000020000010000000000000009f09c75f0000ffff53ef", 0x3a, 0x400}, {&(0x7f0000010080)="000000000000000000000000ede2de4df49d4f87b54a3176cfd4eb4f010040000c000000000000009f09c75f", 0x2c, 0x4e0}, {&(0x7f0000010100)="000000000000000000000000000000000000000000000000000000005178aedb030000001300000023", 0x29}, {&(0x7f0000010ce0)="00000000000000000000000000000000000000000000000000000000c99b0000ed410000000400009f09c75f9f09c75f9f09c75f00000000000003000200000000000800000000000af301000400000000000000000000000100000004", 0x5d, 0x8c60}], 0x0, &(0x7f0000010f60)) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) getdents64(r0, &(0x7f0000000040)=""/4, 0x4) 04:03:14 executing program 5: creat(&(0x7f00000003c0)='./file0\x00', 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext2\x00', &(0x7f0000000100)='./file0\x00', 0x401fc, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}], 0x0, &(0x7f0000013c00)=ANY=[]) 04:03:14 executing program 3: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="1000000040000000030000002b00000005000000010000000000000000000000002000000020000010000000000000009f09c75f0000ffff53ef", 0x3a, 0x400}, {&(0x7f0000010080)="000000000000000000000000ede2de4df49d4f87b54a3176cfd4eb4f010040000c000000000000009f09c75f", 0x2c, 0x4e0}, {&(0x7f0000010100)="000000000000000000000000000000000000000000000000000000005178aedb030000001300000023", 0x29}, {&(0x7f0000010ce0)="00000000000000000000000000000000000000000000000000000000c99b0000ed410000000400009f09c75f9f09c75f9f09c75f00000000000003000200000000000800000000000af301000400000000000000000000000100000004", 0x5d, 0x8c60}], 0x0, &(0x7f0000010f60)) getdents64(r0, &(0x7f0000000040)=""/4, 0x4) 04:03:14 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010100)="000000000000000000000000000000000000000000000000000000005178aedb030000001300000023", 0x29, 0x7e0}, {&(0x7f0000010ce0)="00000000000000000000000000000000000000000000000000000000c99b0000ed410000000400009f09c75f9f09c75f9f09c75f00000000000003000200000000000800000000000af3010004000000000000000000000001", 0x59, 0x8c60}], 0x0, &(0x7f0000010f60)) 04:03:14 executing program 6: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="1000000040000000030000002b00000005000000010000000000000000000000002000000020000010000000000000009f09c75f0000ffff53ef", 0x3a, 0x400}, {&(0x7f0000010080)="000000000000000000000000ede2de4df49d4f87b54a3176cfd4eb4f010040000c000000000000009f09c75f", 0x2c, 0x4e0}, {&(0x7f0000010100)='\x00'/21, 0x15, 0x7e0}, {&(0x7f0000010ce0)="00000000000000000000000000000000000000000000000000000000c99b0000ed410000000400009f09c75f9f09c75f9f09c75f00000000000003000200000000000800000000000af301000400000000000000000000000100000004", 0x5d, 0x8c60}], 0x0, &(0x7f0000010f60)) getdents64(r0, &(0x7f0000000040)=""/4, 0x4) 04:03:14 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="1000000040000000030000002b00000005000000010000000000000000000000002000000020000010000000000000009f09c75f0000ffff53ef", 0x3a, 0x400}, {&(0x7f0000010080)="000000000000000000000000ede2de4df49d4f87b54a3176cfd4eb4f010040000c000000000000009f09c75f", 0x2c, 0x4e0}, {&(0x7f00000100c0)="01000000000000000000000000000000000000000401000012", 0x19, 0x560}, {&(0x7f0000010100)="000000000000000000000000000000000000000000000000000000005178aedb03000000", 0x24, 0x7e0}, {&(0x7f0000010ce0)="00000000000000000000000000000000000000000000000000000000c99b0000ed410000000400009f09c75f9f09c75f9f09c75f00000000000003000200000000000800000000000af3010004", 0x4d, 0x8c60}], 0x0, &(0x7f0000010f60)) 04:03:14 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="1000000040000000030000002b00000005000000010000000000000000000000002000000020000010000000000000009f09c75f0000ffff53ef", 0x3a, 0x400}, {&(0x7f0000010080)="000000000000000000000000ede2de4df49d4f87b54a3176cfd4eb4f010040000c000000000000009f09c75f", 0x2c, 0x4e0}, {&(0x7f00000100c0)="01000000000000000000000000000000000000000401000012", 0x19, 0x560}, {&(0x7f00000100e0)="00000000000000000000000000000000000000000104", 0x16, 0x640}, {&(0x7f0000010100)="000000000000000000000000000000000000000000000000000000005178aedb0300000013000000230000002b0005000200040000000000907306c205002a9c00000000000000000000000000000000000000000000000091ecd11b", 0x5c, 0x7e0}, {&(0x7f0000010ce0)="00000000000000000000000000000000000000000000000000000000c99b0000ed410000000400009f09c75f9f09c75f9f09c75f0000000000000300020000000000080000000000", 0x48, 0x8c60}], 0x0, &(0x7f0000010f60)) [ 1795.529458] loop3: detected capacity change from 0 to 140 [ 1795.530211] loop0: detected capacity change from 0 to 140 [ 1795.535056] EXT4-fs (loop3): ext4_check_descriptors: Block bitmap for group 0 not in group (block 0)! [ 1795.535810] EXT4-fs (loop3): group descriptors corrupted! [ 1795.539127] EXT4-fs (loop0): ext4_check_descriptors: Inode bitmap for group 0 not in group (block 0)! [ 1795.539861] EXT4-fs (loop0): group descriptors corrupted! [ 1795.546061] loop5: detected capacity change from 0 to 512 [ 1795.550332] loop4: detected capacity change from 0 to 140 [ 1795.558581] loop7: detected capacity change from 0 to 140 [ 1795.560054] EXT4-fs (loop5): mounting ext2 file system using the ext4 subsystem [ 1795.565620] loop6: detected capacity change from 0 to 140 [ 1795.568774] EXT4-fs error (device loop4): ext4_ext_check_inode:523: inode #2: comm syz-executor.4: pblk 0 bad header/extent: invalid magic - magic 0, entries 0, max 0(0), depth 0(0) [ 1795.570496] EXT4-fs (loop5): warning: mounting unchecked fs, running e2fsck is recommended [ 1795.574733] EXT4-fs (loop4): get root inode failed [ 1795.576062] EXT4-fs (loop4): mount failed [ 1795.577517] EXT4-fs (loop5): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: none. [ 1795.581242] loop1: detected capacity change from 0 to 140 [ 1795.582916] EXT4-fs (loop5): unmounting filesystem 00000000-0000-0000-0000-000000000000. 04:03:14 executing program 3: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="1000000040000000030000002b00000005000000010000000000000000000000002000000020000010000000000000009f09c75f0000ffff53ef", 0x3a, 0x400}, {&(0x7f0000010080)="000000000000000000000000ede2de4df49d4f87b54a3176cfd4eb4f010040000c000000000000009f09c75f", 0x2c, 0x4e0}, {&(0x7f0000010100)="000000000000000000000000000000000000000000000000000000005178aedb030000001300000023", 0x29}, {&(0x7f0000010ce0)="00000000000000000000000000000000000000000000000000000000c99b0000ed410000000400009f09c75f9f09c75f9f09c75f00000000000003000200000000000800000000000af301000400000000000000000000000100000004", 0x5d, 0x8c60}], 0x0, &(0x7f0000010f60)) getdents64(r0, &(0x7f0000000040)=""/4, 0x4) 04:03:14 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="1000000040000000030000002b00000005000000010000000000000000000000002000000020000010000000000000009f09c75f0000ffff53ef", 0x3a, 0x400}, {&(0x7f0000010080)="000000000000000000000000ede2de4df49d4f87b54a3176cfd4eb4f010040000c000000000000009f09c75f", 0x2c, 0x4e0}, {&(0x7f00000100c0)="01000000000000000000000000000000000000000401000012", 0x19, 0x560}, {&(0x7f0000010100)="000000000000000000000000000000000000000000000000000000005178aedb03000000", 0x24, 0x7e0}, {&(0x7f0000010ce0)="00000000000000000000000000000000000000000000000000000000c99b0000ed410000000400009f09c75f9f09c75f9f09c75f00000000000003000200000000000800000000000af3010004", 0x4d, 0x8c60}], 0x0, &(0x7f0000010f60)) [ 1795.602321] EXT4-fs (loop7): ext4_check_descriptors: Block bitmap for group 0 not in group (block 0)! [ 1795.603371] EXT4-fs (loop7): group descriptors corrupted! [ 1795.605243] EXT4-fs (loop6): ext4_check_descriptors: Block bitmap for group 0 not in group (block 0)! [ 1795.606206] EXT4-fs (loop6): group descriptors corrupted! 04:03:14 executing program 5: creat(&(0x7f00000003c0)='./file0\x00', 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext2\x00', &(0x7f0000000100)='./file0\x00', 0x40260, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}], 0x0, &(0x7f0000013c00)=ANY=[]) [ 1795.632044] EXT4-fs (loop1): VFS: Can't find ext4 filesystem [ 1795.658756] loop0: detected capacity change from 0 to 140 [ 1795.667128] EXT4-fs (loop0): ext4_check_descriptors: Inode bitmap for group 0 not in group (block 0)! [ 1795.667875] EXT4-fs (loop0): group descriptors corrupted! [ 1795.672568] loop5: detected capacity change from 0 to 513 04:03:14 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="1000000040000000030000002b00000005000000010000000000000000000000002000000020000010000000000000009f09c75f0000ffff53ef", 0x3a, 0x400}, {&(0x7f0000010080)="000000000000000000000000ede2de4df49d4f87b54a3176cfd4eb4f010040000c000000000000009f09c75f", 0x2c, 0x4e0}, {&(0x7f00000100c0)="01000000000000000000000000000000000000000401000012", 0x19, 0x560}, {&(0x7f00000100e0)="00000000000000000000000000000000000000000104", 0x16, 0x640}, {&(0x7f0000010100)="000000000000000000000000000000000000000000000000000000005178aedb0300000013000000230000002b0005000200040000000000907306c205002a9c00000000000000000000000000000000000000000000000091ecd11b", 0x5c, 0x7e0}, {&(0x7f0000010ce0)="00000000000000000000000000000000000000000000000000000000c99b0000ed410000000400009f09c75f9f09c75f9f09c75f0000000000000300020000000000080000000000", 0x48, 0x8c60}], 0x0, &(0x7f0000010f60)) [ 1795.679381] loop3: detected capacity change from 0 to 140 [ 1795.688037] EXT4-fs (loop5): mounting ext2 file system using the ext4 subsystem [ 1795.688895] EXT4-fs (loop3): ext4_check_descriptors: Block bitmap for group 0 not in group (block 0)! [ 1795.689833] EXT4-fs (loop3): group descriptors corrupted! [ 1795.705817] EXT4-fs (loop5): warning: mounting unchecked fs, running e2fsck is recommended 04:03:14 executing program 6: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="1000000040000000030000002b00000005000000010000000000000000000000002000000020000010000000000000009f09c75f0000ffff53ef", 0x3a, 0x400}, {&(0x7f0000010080)="000000000000000000000000ede2de4df49d4f87b54a3176cfd4eb4f010040000c000000000000009f09c75f", 0x2c, 0x4e0}, {&(0x7f0000010100)='\x00'/21, 0x15, 0x7e0}, {&(0x7f0000010ce0)="00000000000000000000000000000000000000000000000000000000c99b0000ed410000000400009f09c75f9f09c75f9f09c75f00000000000003000200000000000800000000000af301000400000000000000000000000100000004", 0x5d, 0x8c60}], 0x0, &(0x7f0000010f60)) getdents64(r0, &(0x7f0000000040)=""/4, 0x4) 04:03:14 executing program 7: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="1000000040000000030000002b00000005000000010000000000000000000000002000000020000010000000000000009f09c75f0000ffff53ef", 0x3a, 0x400}, {&(0x7f0000010080)="000000000000000000000000ede2de4df49d4f87b54a3176cfd4eb4f010040000c000000000000009f09c75f", 0x2c, 0x4e0}, {&(0x7f0000010100)="000000000000000000000000000000000000000000000000000000005178aedb030000001300000023", 0x29}, {&(0x7f0000010ce0)="00000000000000000000000000000000000000000000000000000000c99b0000ed410000000400009f09c75f9f09c75f9f09c75f00000000000003000200000000000800000000000af301000400000000000000000000000100000004", 0x5d, 0x8c60}], 0x0, &(0x7f0000010f60)) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) getdents64(r0, &(0x7f0000000040)=""/4, 0x4) 04:03:14 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010100)="000000000000000000000000000000000000000000000000000000005178aedb030000001300000023", 0x29, 0x7e0}, {&(0x7f0000010ce0)="00000000000000000000000000000000000000000000000000000000c99b0000ed410000000400009f09c75f9f09c75f9f09c75f00000000000003000200000000000800000000000af3010004000000000000000000000001", 0x59, 0x8c60}], 0x0, &(0x7f0000010f60)) [ 1795.732545] EXT4-fs (loop5): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: none. 04:03:14 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="1000000040000000030000002b00000005000000010000000000000000000000002000000020000010000000000000009f09c75f0000ffff53ef", 0x3a, 0x400}, {&(0x7f0000010080)="000000000000000000000000ede2de4df49d4f87b54a3176cfd4eb4f010040000c000000000000009f09c75f", 0x2c, 0x4e0}, {&(0x7f00000100c0)="01000000000000000000000000000000000000000401000012", 0x19, 0x560}, {&(0x7f0000010100)="000000000000000000000000000000000000000000000000000000005178aedb03000000130000", 0x27, 0x7e0}, {&(0x7f0000010ce0)="00000000000000000000000000000000000000000000000000000000c99b0000ed410000000400009f09c75f9f09c75f9f09c75f00000000000003000200000000000800000000000af3010004", 0x4d, 0x8c60}], 0x0, &(0x7f0000010f60)) [ 1795.766259] EXT4-fs (loop5): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 1795.767006] loop4: detected capacity change from 0 to 140 [ 1795.772387] EXT4-fs error (device loop4): ext4_ext_check_inode:523: inode #2: comm syz-executor.4: pblk 0 bad header/extent: invalid magic - magic 0, entries 0, max 0(0), depth 0(0) [ 1795.776184] EXT4-fs (loop4): get root inode failed [ 1795.776713] EXT4-fs (loop4): mount failed [ 1795.784366] loop6: detected capacity change from 0 to 140 [ 1795.814411] EXT4-fs (loop6): ext4_check_descriptors: Block bitmap for group 0 not in group (block 0)! [ 1795.815231] EXT4-fs (loop6): group descriptors corrupted! [ 1795.815564] loop7: detected capacity change from 0 to 140 [ 1795.819259] EXT4-fs (loop7): ext4_check_descriptors: Block bitmap for group 0 not in group (block 0)! [ 1795.820097] EXT4-fs (loop7): group descriptors corrupted! [ 1795.821071] loop1: detected capacity change from 0 to 140 [ 1795.827330] EXT4-fs (loop1): VFS: Can't find ext4 filesystem [ 1795.843299] loop0: detected capacity change from 0 to 140 [ 1795.994983] EXT4-fs (loop0): ext4_check_descriptors: Inode table for group 0 not in group (block 0)! [ 1795.995739] EXT4-fs (loop0): group descriptors corrupted! [ 1796.078627] FAULT_INJECTION: forcing a failure. [ 1796.078627] name failslab, interval 1, probability 0, space 0, times 0 [ 1796.079559] CPU: 0 UID: 0 PID: 13291 Comm: syz-executor.2 Not tainted 6.18.0-rc5-next-20251111 #1 PREEMPT(voluntary) [ 1796.079576] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1796.079585] Call Trace: [ 1796.079589] [ 1796.079595] dump_stack_lvl+0xfa/0x120 [ 1796.079614] should_fail_ex+0x4d7/0x5e0 [ 1796.079630] ? ext4_init_io_end+0x27/0x180 [ 1796.079650] should_failslab+0xc2/0x120 [ 1796.079665] kmem_cache_alloc_noprof+0x80/0x690 [ 1796.079687] ? ext4_init_io_end+0x27/0x180 [ 1796.079705] ext4_init_io_end+0x27/0x180 [ 1796.079723] ext4_do_writepages+0xc87/0x3880 [ 1796.079752] ? __pfx_ext4_do_writepages+0x10/0x10 [ 1796.079772] ? lock_is_held_type+0x9e/0x120 [ 1796.079795] ext4_writepages+0x369/0x7a0 [ 1796.079811] ? __pfx_ext4_writepages+0x10/0x10 [ 1796.079832] ? do_writepages+0x469/0x5c0 [ 1796.079849] ? lock_release+0xc8/0x290 [ 1796.079870] ? __pfx_ext4_writepages+0x10/0x10 [ 1796.079886] do_writepages+0x244/0x5c0 [ 1796.079905] filemap_writeback+0x223/0x2d0 [ 1796.079927] ? __pfx_filemap_writeback+0x10/0x10 [ 1796.079963] ? avc_has_perm_noaudit+0x150/0x3d0 [ 1796.079983] ? avc_has_perm+0x12b/0x1d0 [ 1796.080000] filemap_write_and_wait_range+0xa8/0x130 [ 1796.080022] ext4_fileattr_set+0xa64/0x1810 [ 1796.080043] ? __pfx_ext4_fileattr_set+0x10/0x10 [ 1796.080059] ? selinux_inode_file_setattr+0x2ab/0x3b0 [ 1796.080074] ? __pfx_selinux_inode_file_setattr+0x10/0x10 [ 1796.080089] ? cap_capable+0x9c/0x240 [ 1796.080107] vfs_fileattr_set+0x748/0xb50 [ 1796.080128] ? __pfx_vfs_fileattr_set+0x10/0x10 [ 1796.080147] ? mnt_get_write_access_file+0x11f/0x180 [ 1796.080170] ioctl_fssetxattr+0x1f8/0x250 [ 1796.080188] ? __pfx_ioctl_fssetxattr+0x10/0x10 [ 1796.080207] ? proc_fail_nth_write+0x97/0x220 [ 1796.080223] ? ksys_write+0x121/0x240 [ 1796.080235] ? lock_is_held_type+0x9e/0x120 [ 1796.080258] do_vfs_ioctl+0xbfe/0x1470 [ 1796.080275] ? __pfx_do_vfs_ioctl+0x10/0x10 [ 1796.080291] ? ioctl_has_perm.constprop.0.isra.0+0x32e/0x4e0 [ 1796.080312] ? __mutex_unlock_slowpath+0xd1/0x750 [ 1796.080333] ? __pfx_ioctl_has_perm.constprop.0.isra.0+0x10/0x10 [ 1796.080355] ? lockdep_stats_show+0x300/0xa40 [ 1796.080374] ? __fget_files+0x34/0x3b0 [ 1796.080393] ? find_held_lock+0x2b/0x80 [ 1796.080407] ? __fget_files+0x203/0x3b0 [ 1796.080426] ? lock_release+0xc8/0x290 [ 1796.080448] ? selinux_file_ioctl+0xb9/0x280 [ 1796.080471] __x64_sys_ioctl+0x116/0x210 [ 1796.080489] do_syscall_64+0xbf/0x430 [ 1796.080503] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 1796.080517] RIP: 0033:0x7f5179ba6b19 [ 1796.080527] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1796.080540] RSP: 002b:00007f51770fb188 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 1796.080553] RAX: ffffffffffffffda RBX: 00007f5179cba020 RCX: 00007f5179ba6b19 [ 1796.080562] RDX: 0000000020000200 RSI: 00000000401c5820 RDI: 0000000000000004 [ 1796.080570] RBP: 00007f51770fb1d0 R08: 0000000000000000 R09: 0000000000000000 [ 1796.080578] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1796.080586] R13: 00007ffef396ffef R14: 00007f51770fb300 R15: 0000000000022000 [ 1796.080604] 04:03:23 executing program 2: sendmsg$NL80211_CMD_UNEXPECTED_FRAME(0xffffffffffffffff, &(0x7f0000000400)={0x0, 0x0, &(0x7f0000000300)={&(0x7f00000002c0)={0x1c, 0x0, 0x1, 0x0, 0x0, {{}, {@val={0x8}, @void}}}, 0x1c}}, 0x0) sendmsg$NL80211_CMD_UPDATE_FT_IES(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000001c0)={0x24, 0x0, 0x1, 0x70bd2c, 0x0, {{}, {@val={0x8}, @void}}, [@NL80211_ATTR_MDID={0x6, 0xb1, 0xc116}]}, 0x24}, 0x1, 0x0, 0x0, 0x80}, 0xc000) r0 = creat(&(0x7f00000003c0)='./file1\x00', 0x0) sendmsg$netlink(0xffffffffffffffff, 0x0, 0x0) dup(0xffffffffffffffff) pwritev2(r0, &(0x7f0000000380)=[{&(0x7f0000000180)="bd", 0xfffffdef}], 0x1, 0x1200, 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) ioctl$FS_IOC_FSSETXATTR(r1, 0x401c5820, &(0x7f0000000200)={0x9}) (fail_nth: 5) syz_io_uring_setup(0x0, &(0x7f0000000000)={0x0, 0x0, 0x4, 0x2, 0x309}, &(0x7f0000ffc000/0x2000)=nil, &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000000080), &(0x7f0000000240)) syz_io_uring_submit(0x0, 0x0, &(0x7f0000000280)=@IORING_OP_ASYNC_CANCEL={0xe, 0x0, 0x0, 0x0, 0x0, 0x12345}, 0x1ff) 04:03:23 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="1000000040000000030000002b00000005000000010000000000000000000000002000000020000010000000000000009f09c75f0000ffff53ef", 0x3a, 0x400}, {&(0x7f0000010080)="000000000000000000000000ede2de4df49d4f87b54a3176cfd4eb4f010040000c000000000000009f09c75f", 0x2c, 0x4e0}, {&(0x7f00000100c0)="01000000000000000000000000000000000000000401000012", 0x19, 0x560}, {&(0x7f0000010100)="000000000000000000000000000000000000000000000000000000005178aedb03000000130000", 0x27, 0x7e0}, {&(0x7f0000010ce0)="00000000000000000000000000000000000000000000000000000000c99b0000ed410000000400009f09c75f9f09c75f9f09c75f00000000000003000200000000000800000000000af3010004", 0x4d, 0x8c60}], 0x0, &(0x7f0000010f60)) 04:03:23 executing program 3: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="1000000040000000030000002b00000005000000010000000000000000000000002000000020000010000000000000009f09c75f0000ffff53ef", 0x3a, 0x400}, {&(0x7f0000010100)="000000000000000000000000000000000000000000000000000000005178aedb030000001300000023", 0x29, 0x7e0}, {&(0x7f0000010ce0)="00000000000000000000000000000000000000000000000000000000c99b0000ed410000000400009f09c75f9f09c75f9f09c75f00000000000003000200000000000800000000000af301000400000000000000000000000100000004", 0x5d, 0x8c60}], 0x0, &(0x7f0000010f60)) getdents64(r0, &(0x7f0000000040)=""/4, 0x4) 04:03:23 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010100)="000000000000000000000000000000000000000000000000000000005178aedb030000001300000023", 0x29, 0x7e0}, {&(0x7f0000010ce0)="00000000000000000000000000000000000000000000000000000000c99b0000ed410000000400009f09c75f9f09c75f9f09c75f00000000000003000200000000000800000000000af3010004000000000000000000000001", 0x59, 0x8c60}], 0x0, &(0x7f0000010f60)) 04:03:23 executing program 7: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="1000000040000000030000002b00000005000000010000000000000000000000002000000020000010000000000000009f09c75f0000ffff53ef", 0x3a, 0x400}, {&(0x7f0000010080)="000000000000000000000000ede2de4df49d4f87b54a3176cfd4eb4f010040000c000000000000009f09c75f", 0x2c, 0x4e0}, {&(0x7f0000010100)="000000000000000000000000000000000000000000000000000000005178aedb030000001300000023", 0x29}, {&(0x7f0000010ce0)="00000000000000000000000000000000000000000000000000000000c99b0000ed410000000400009f09c75f9f09c75f9f09c75f00000000000003000200000000000800000000000af301000400000000000000000000000100000004", 0x5d, 0x8c60}], 0x0, &(0x7f0000010f60)) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) getdents64(r0, &(0x7f0000000040)=""/4, 0x4) 04:03:23 executing program 6: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="1000000040000000030000002b00000005000000010000000000000000000000002000000020000010000000000000009f09c75f0000ffff53ef", 0x3a, 0x400}, {&(0x7f0000010080)="000000000000000000000000ede2de4df49d4f87b54a3176cfd4eb4f010040000c000000000000009f09c75f", 0x2c, 0x4e0}, {&(0x7f0000010100)='\x00'/21, 0x15, 0x7e0}, {&(0x7f0000010ce0)="00000000000000000000000000000000000000000000000000000000c99b0000ed410000000400009f09c75f9f09c75f9f09c75f00000000000003000200000000000800000000000af301000400000000000000000000000100000004", 0x5d, 0x8c60}], 0x0, &(0x7f0000010f60)) getdents64(r0, &(0x7f0000000040)=""/4, 0x4) 04:03:23 executing program 5: creat(&(0x7f00000003c0)='./file0\x00', 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext2\x00', &(0x7f0000000100)='./file0\x00', 0x4026a, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}], 0x0, &(0x7f0000013c00)=ANY=[]) 04:03:23 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="1000000040000000030000002b00000005000000010000000000000000000000002000000020000010000000000000009f09c75f0000ffff53ef", 0x3a, 0x400}, {&(0x7f0000010080)="000000000000000000000000ede2de4df49d4f87b54a3176cfd4eb4f010040000c000000000000009f09c75f", 0x2c, 0x4e0}, {&(0x7f00000100c0)="01000000000000000000000000000000000000000401000012", 0x19, 0x560}, {&(0x7f00000100e0)="00000000000000000000000000000000000000000104", 0x16, 0x640}, {&(0x7f0000010100)="000000000000000000000000000000000000000000000000000000005178aedb0300000013000000230000002b0005000200040000000000907306c205002a9c00000000000000000000000000000000000000000000000091ecd11b", 0x5c, 0x7e0}, {&(0x7f0000010ce0)="00000000000000000000000000000000000000000000000000000000c99b0000ed410000000400009f09c75f9f09c75f9f09c75f00000000000003000200000000000800000000000af301", 0x4b, 0x8c60}], 0x0, &(0x7f0000010f60)) [ 1804.866583] loop3: detected capacity change from 0 to 140 [ 1804.871266] loop7: detected capacity change from 0 to 140 [ 1804.876270] loop0: detected capacity change from 0 to 140 [ 1804.878353] loop6: detected capacity change from 0 to 140 [ 1804.881840] loop1: detected capacity change from 0 to 140 [ 1804.886211] EXT4-fs (loop7): ext4_check_descriptors: Block bitmap for group 0 not in group (block 0)! [ 1804.887087] EXT4-fs (loop7): group descriptors corrupted! [ 1804.888496] EXT4-fs (loop6): ext4_check_descriptors: Block bitmap for group 0 not in group (block 0)! [ 1804.889396] EXT4-fs (loop6): group descriptors corrupted! [ 1804.890132] EXT4-fs (loop0): ext4_check_descriptors: Inode table for group 0 not in group (block 0)! [ 1804.891103] EXT4-fs (loop0): group descriptors corrupted! [ 1804.893121] EXT4-fs (loop3): warning: mounting unchecked fs, running e2fsck is recommended [ 1804.894133] EXT4-fs (loop1): VFS: Can't find ext4 filesystem [ 1804.898488] loop4: detected capacity change from 0 to 140 [ 1804.898507] loop5: detected capacity change from 0 to 513 [ 1804.912436] EXT4-fs (loop5): mounting ext2 file system using the ext4 subsystem [ 1804.916202] EXT4-fs (loop3): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: none. [ 1804.925566] EXT4-fs error (device loop3): ext4_readdir:262: inode #2: block 4: comm syz-executor.3: path /syzkaller-testdir621642535/syzkaller.Ms8KeX/351/mnt: bad entry in directory: rec_len is smaller than minimal - offset=0, inode=0, rec_len=0, size=1024 fake=0 [ 1804.925787] EXT4-fs error (device loop4): ext4_ext_check_inode:523: inode #2: comm syz-executor.4: pblk 0 bad header/extent: invalid eh_max - magic f30a, entries 1, max 0(0), depth 0(0) [ 1804.936397] EXT4-fs (loop5): warning: mounting unchecked fs, running e2fsck is recommended [ 1804.956316] EXT4-fs (loop5): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: none. [ 1804.976056] EXT4-fs (loop4): get root inode failed [ 1804.976545] EXT4-fs (loop4): mount failed [ 1804.999851] EXT4-fs (loop5): unmounting filesystem 00000000-0000-0000-0000-000000000000. 04:03:23 executing program 6: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="1000000040000000030000002b00000005000000010000000000000000000000002000000020000010000000000000009f09c75f0000ffff53ef", 0x3a, 0x400}, {&(0x7f0000010080)="000000000000000000000000ede2de4df49d4f87b54a3176cfd4eb4f010040000c000000000000009f09c75f", 0x2c, 0x4e0}, {&(0x7f0000010100)="000000000000000000000000000000000000000000000000000000005178ae", 0x1f, 0x7e0}, {&(0x7f0000010ce0)="00000000000000000000000000000000000000000000000000000000c99b0000ed410000000400009f09c75f9f09c75f9f09c75f00000000000003000200000000000800000000000af301000400000000000000000000000100000004", 0x5d, 0x8c60}], 0x0, &(0x7f0000010f60)) getdents64(r0, &(0x7f0000000040)=""/4, 0x4) 04:03:23 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="1000000040000000030000002b00000005000000010000000000000000000000002000000020000010000000000000009f09c75f0000ffff53ef", 0x3a, 0x400}, {&(0x7f0000010080)="000000000000000000000000ede2de4df49d4f87b54a3176cfd4eb4f010040000c000000000000009f09c75f", 0x2c, 0x4e0}, {&(0x7f00000100c0)="01000000000000000000000000000000000000000401000012", 0x19, 0x560}, {&(0x7f0000010100)="000000000000000000000000000000000000000000000000000000005178aedb03000000130000", 0x27, 0x7e0}, {&(0x7f0000010ce0)="00000000000000000000000000000000000000000000000000000000c99b0000ed410000000400009f09c75f9f09c75f9f09c75f00000000000003000200000000000800000000000af3010004", 0x4d, 0x8c60}], 0x0, &(0x7f0000010f60)) 04:03:23 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x3, &(0x7f0000000200)=[{0x0, 0x0, 0x400}, {&(0x7f0000010100)="000000000000000000000000000000000000000000000000000000005178aedb030000001300000023", 0x29, 0x7e0}, {&(0x7f0000010ce0)="00000000000000000000000000000000000000000000000000000000c99b0000ed410000000400009f09c75f9f09c75f9f09c75f00000000000003000200000000000800000000000af3010004000000000000000000000001", 0x59, 0x8c60}], 0x0, &(0x7f0000010f60)) 04:03:23 executing program 7: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="1000000040000000030000002b00000005000000010000000000000000000000002000000020000010000000000000009f09c75f0000ffff53ef", 0x3a, 0x400}, {&(0x7f0000010100)="000000000000000000000000000000000000000000000000000000005178aedb030000001300000023", 0x29, 0x7e0}, {&(0x7f0000010ce0)="00000000000000000000000000000000000000000000000000000000c99b0000ed410000000400009f09c75f9f09c75f9f09c75f00000000000003000200000000000800000000000af301000400000000000000000000000100000004", 0x5d, 0x8c60}], 0x0, &(0x7f0000010f60)) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) getdents64(r0, &(0x7f0000000040)=""/4, 0x4) 04:03:23 executing program 3: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="1000000040000000030000002b00000005000000010000000000000000000000002000000020000010000000000000009f09c75f0000ffff53ef", 0x3a, 0x400}, {0x0, 0x0, 0x7e0}, {&(0x7f0000010ce0)="00000000000000000000000000000000000000000000000000000000c99b0000ed410000000400009f09c75f9f09c75f9f09c75f00000000000003000200000000000800000000000af301000400000000000000000000000100000004", 0x5d, 0x8c60}], 0x0, &(0x7f0000010f60)) getdents64(r0, &(0x7f0000000040)=""/4, 0x4) [ 1805.024715] EXT4-fs (loop3): unmounting filesystem 00000000-0000-0000-0000-000000000000. 04:03:23 executing program 5: creat(&(0x7f00000003c0)='./file0\x00', 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext2\x00', &(0x7f0000000100)='./file0\x00', 0x40298, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}], 0x0, &(0x7f0000013c00)=ANY=[]) 04:03:23 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="1000000040000000030000002b00000005000000010000000000000000000000002000000020000010000000000000009f09c75f0000ffff53ef", 0x3a, 0x400}, {&(0x7f0000010080)="000000000000000000000000ede2de4df49d4f87b54a3176cfd4eb4f010040000c000000000000009f09c75f", 0x2c, 0x4e0}, {&(0x7f00000100c0)="01000000000000000000000000000000000000000401000012", 0x19, 0x560}, {&(0x7f00000100e0)="00000000000000000000000000000000000000000104", 0x16, 0x640}, {&(0x7f0000010100)="000000000000000000000000000000000000000000000000000000005178aedb0300000013000000230000002b0005000200040000000000907306c205002a9c00000000000000000000000000000000000000000000000091ecd11b", 0x5c, 0x7e0}, {&(0x7f0000010ce0)="00000000000000000000000000000000000000000000000000000000c99b0000ed410000000400009f09c75f9f09c75f9f09c75f00000000000003000200000000000800000000000af301", 0x4b, 0x8c60}], 0x0, &(0x7f0000010f60)) [ 1805.084441] loop7: detected capacity change from 0 to 140 [ 1805.085511] loop0: detected capacity change from 0 to 140 [ 1805.087355] loop1: detected capacity change from 0 to 140 [ 1805.095196] EXT4-fs (loop1): VFS: Can't find ext4 filesystem [ 1805.095983] EXT4-fs (loop0): ext4_check_descriptors: Inode table for group 0 not in group (block 0)! [ 1805.096785] EXT4-fs (loop0): group descriptors corrupted! [ 1805.103508] loop6: detected capacity change from 0 to 140 [ 1805.114175] EXT4-fs (loop7): warning: mounting unchecked fs, running e2fsck is recommended [ 1805.123692] loop4: detected capacity change from 0 to 140 [ 1805.131256] EXT4-fs error (device loop4): ext4_ext_check_inode:523: inode #2: comm syz-executor.4: pblk 0 bad header/extent: invalid eh_max - magic f30a, entries 1, max 0(0), depth 0(0) [ 1805.134825] EXT4-fs (loop4): get root inode failed [ 1805.135632] EXT4-fs (loop4): mount failed [ 1805.136605] EXT4-fs (loop7): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: none. [ 1805.141415] EXT4-fs (loop6): ext4_check_descriptors: Block bitmap for group 0 not in group (block 0)! [ 1805.142240] EXT4-fs (loop6): group descriptors corrupted! 04:03:24 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x3, &(0x7f0000000200)=[{0x0, 0x0, 0x400}, {&(0x7f0000010100)="000000000000000000000000000000000000000000000000000000005178aedb030000001300000023", 0x29, 0x7e0}, {&(0x7f0000010ce0)="00000000000000000000000000000000000000000000000000000000c99b0000ed410000000400009f09c75f9f09c75f9f09c75f00000000000003000200000000000800000000000af3010004000000000000000000000001", 0x59, 0x8c60}], 0x0, &(0x7f0000010f60)) [ 1805.157556] loop5: detected capacity change from 0 to 513 [ 1805.160435] EXT4-fs error (device loop7): ext4_readdir:262: inode #2: block 4: comm syz-executor.7: path /syzkaller-testdir823765038/syzkaller.a3rO6g/357/mnt: bad entry in directory: rec_len is smaller than minimal - offset=0, inode=0, rec_len=0, size=1024 fake=0 [ 1805.167743] loop1: detected capacity change from 0 to 140 [ 1805.170527] EXT4-fs (loop1): VFS: Can't find ext4 filesystem [ 1805.190651] EXT4-fs (loop5): mounting ext2 file system using the ext4 subsystem [ 1805.205280] EXT4-fs (loop5): warning: mounting unchecked fs, running e2fsck is recommended [ 1805.283976] EXT4-fs (loop5): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: none. [ 1805.322199] EXT4-fs (loop5): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 1805.348427] EXT4-fs (loop7): unmounting filesystem 00000000-0000-0000-0000-000000000000. 04:03:33 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x3, &(0x7f0000000200)=[{0x0, 0x0, 0x400}, {&(0x7f0000010100)="000000000000000000000000000000000000000000000000000000005178aedb030000001300000023", 0x29, 0x7e0}, {&(0x7f0000010ce0)="00000000000000000000000000000000000000000000000000000000c99b0000ed410000000400009f09c75f9f09c75f9f09c75f00000000000003000200000000000800000000000af3010004000000000000000000000001", 0x59, 0x8c60}], 0x0, &(0x7f0000010f60)) 04:03:33 executing program 2: sendmsg$NL80211_CMD_UNEXPECTED_FRAME(0xffffffffffffffff, &(0x7f0000000400)={0x0, 0x0, &(0x7f0000000300)={&(0x7f00000002c0)={0x1c, 0x0, 0x1, 0x0, 0x0, {{}, {@val={0x8}, @void}}}, 0x1c}}, 0x0) sendmsg$NL80211_CMD_UPDATE_FT_IES(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000001c0)={0x24, 0x0, 0x1, 0x70bd2c, 0x0, {{}, {@val={0x8}, @void}}, [@NL80211_ATTR_MDID={0x6, 0xb1, 0xc116}]}, 0x24}, 0x1, 0x0, 0x0, 0x80}, 0xc000) r0 = creat(&(0x7f00000003c0)='./file1\x00', 0x0) sendmsg$netlink(0xffffffffffffffff, 0x0, 0x0) dup(0xffffffffffffffff) pwritev2(r0, &(0x7f0000000380)=[{&(0x7f0000000180)="bd", 0xfffffdef}], 0x1, 0x1200, 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) ioctl$FS_IOC_FSSETXATTR(r1, 0x401c5820, &(0x7f0000000200)={0x9}) syz_io_uring_setup(0x0, &(0x7f0000000000)={0x0, 0x0, 0x4, 0x2, 0x309}, &(0x7f0000ffc000/0x2000)=nil, &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000000080), &(0x7f0000000240)) syz_io_uring_submit(0x0, 0x0, &(0x7f0000000280)=@IORING_OP_ASYNC_CANCEL={0xe, 0x0, 0x0, 0x0, 0x0, 0x12345}, 0x1ff) 04:03:33 executing program 7: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="1000000040000000030000002b00000005000000010000000000000000000000002000000020000010000000000000009f09c75f0000ffff53ef", 0x3a, 0x400}, {0x0, 0x0, 0x7e0}, {&(0x7f0000010ce0)="00000000000000000000000000000000000000000000000000000000c99b0000ed410000000400009f09c75f9f09c75f9f09c75f00000000000003000200000000000800000000000af301000400000000000000000000000100000004", 0x5d, 0x8c60}], 0x0, &(0x7f0000010f60)) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) getdents64(r0, &(0x7f0000000040)=""/4, 0x4) 04:03:33 executing program 5: creat(&(0x7f00000003c0)='./file0\x00', 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext2\x00', &(0x7f0000000100)='./file0\x00', 0x40300, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}], 0x0, &(0x7f0000013c00)=ANY=[]) 04:03:33 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="1000000040000000030000002b00000005000000010000000000000000000000002000000020000010000000000000009f09c75f0000ffff53ef", 0x3a, 0x400}, {&(0x7f0000010080)="000000000000000000000000ede2de4df49d4f87b54a3176cfd4eb4f010040000c000000000000009f09c75f", 0x2c, 0x4e0}, {&(0x7f00000100c0)="01000000000000000000000000000000000000000401000012", 0x19, 0x560}, {&(0x7f0000010100)="000000000000000000000000000000000000000000000000000000005178aedb0300000013000000", 0x28, 0x7e0}, {&(0x7f0000010ce0)="00000000000000000000000000000000000000000000000000000000c99b0000ed410000000400009f09c75f9f09c75f9f09c75f00000000000003000200000000000800000000000af3010004", 0x4d, 0x8c60}], 0x0, &(0x7f0000010f60)) 04:03:33 executing program 6: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="1000000040000000030000002b00000005000000010000000000000000000000002000000020000010000000000000009f09c75f0000ffff53ef", 0x3a, 0x400}, {&(0x7f0000010080)="000000000000000000000000ede2de4df49d4f87b54a3176cfd4eb4f010040000c000000000000009f09c75f", 0x2c, 0x4e0}, {&(0x7f0000010100)="000000000000000000000000000000000000000000000000000000005178ae", 0x1f, 0x7e0}, {&(0x7f0000010ce0)="00000000000000000000000000000000000000000000000000000000c99b0000ed410000000400009f09c75f9f09c75f9f09c75f00000000000003000200000000000800000000000af301000400000000000000000000000100000004", 0x5d, 0x8c60}], 0x0, &(0x7f0000010f60)) getdents64(r0, &(0x7f0000000040)=""/4, 0x4) 04:03:33 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="1000000040000000030000002b00000005000000010000000000000000000000002000000020000010000000000000009f09c75f0000ffff53ef", 0x3a, 0x400}, {&(0x7f0000010080)="000000000000000000000000ede2de4df49d4f87b54a3176cfd4eb4f010040000c000000000000009f09c75f", 0x2c, 0x4e0}, {&(0x7f00000100c0)="01000000000000000000000000000000000000000401000012", 0x19, 0x560}, {&(0x7f00000100e0)="00000000000000000000000000000000000000000104", 0x16, 0x640}, {&(0x7f0000010100)="000000000000000000000000000000000000000000000000000000005178aedb0300000013000000230000002b0005000200040000000000907306c205002a9c00000000000000000000000000000000000000000000000091ecd11b", 0x5c, 0x7e0}, {&(0x7f0000010ce0)="00000000000000000000000000000000000000000000000000000000c99b0000ed410000000400009f09c75f9f09c75f9f09c75f00000000000003000200000000000800000000000af301", 0x4b, 0x8c60}], 0x0, &(0x7f0000010f60)) 04:03:33 executing program 3: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="1000000040000000030000002b00000005000000010000000000000000000000002000000020000010000000000000009f09c75f0000ffff53ef", 0x3a, 0x400}, {0x0, 0x0, 0x7e0}, {&(0x7f0000010ce0)="00000000000000000000000000000000000000000000000000000000c99b0000ed410000000400009f09c75f9f09c75f9f09c75f00000000000003000200000000000800000000000af301000400000000000000000000000100000004", 0x5d, 0x8c60}], 0x0, &(0x7f0000010f60)) getdents64(r0, &(0x7f0000000040)=""/4, 0x4) [ 1814.546899] loop1: detected capacity change from 0 to 140 [ 1814.547842] loop3: detected capacity change from 0 to 140 [ 1814.548862] loop6: detected capacity change from 0 to 140 [ 1814.553464] EXT4-fs (loop3): ext4_check_descriptors: Block bitmap for group 0 not in group (block 0)! [ 1814.554260] EXT4-fs (loop3): group descriptors corrupted! [ 1814.554993] EXT4-fs (loop6): ext4_check_descriptors: Block bitmap for group 0 not in group (block 0)! [ 1814.555734] EXT4-fs (loop6): group descriptors corrupted! [ 1814.557626] EXT4-fs (loop1): VFS: Can't find ext4 filesystem [ 1814.579573] loop0: detected capacity change from 0 to 140 04:03:33 executing program 3: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="1000000040000000030000002b00000005000000010000000000000000000000002000000020000010000000000000009f09c75f0000ffff53ef", 0x3a, 0x400}, {0x0, 0x0, 0x7e0}, {&(0x7f0000010ce0)="00000000000000000000000000000000000000000000000000000000c99b0000ed410000000400009f09c75f9f09c75f9f09c75f00000000000003000200000000000800000000000af301000400000000000000000000000100000004", 0x5d, 0x8c60}], 0x0, &(0x7f0000010f60)) getdents64(r0, &(0x7f0000000040)=""/4, 0x4) [ 1814.595079] EXT4-fs (loop0): ext4_check_descriptors: Inode table for group 0 not in group (block 0)! [ 1814.595829] EXT4-fs (loop0): group descriptors corrupted! [ 1814.600640] loop4: detected capacity change from 0 to 140 04:03:33 executing program 6: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="1000000040000000030000002b00000005000000010000000000000000000000002000000020000010000000000000009f09c75f0000ffff53ef", 0x3a, 0x400}, {&(0x7f0000010080)="000000000000000000000000ede2de4df49d4f87b54a3176cfd4eb4f010040000c000000000000009f09c75f", 0x2c, 0x4e0}, {&(0x7f0000010100)="000000000000000000000000000000000000000000000000000000005178ae", 0x1f, 0x7e0}, {&(0x7f0000010ce0)="00000000000000000000000000000000000000000000000000000000c99b0000ed410000000400009f09c75f9f09c75f9f09c75f00000000000003000200000000000800000000000af301000400000000000000000000000100000004", 0x5d, 0x8c60}], 0x0, &(0x7f0000010f60)) getdents64(r0, &(0x7f0000000040)=""/4, 0x4) [ 1814.603757] loop5: detected capacity change from 0 to 513 [ 1814.606341] loop7: detected capacity change from 0 to 140 04:03:33 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000), 0x0, 0x400}, {&(0x7f0000010100)="000000000000000000000000000000000000000000000000000000005178aedb030000001300000023", 0x29, 0x7e0}, {&(0x7f0000010ce0)="00000000000000000000000000000000000000000000000000000000c99b0000ed410000000400009f09c75f9f09c75f9f09c75f00000000000003000200000000000800000000000af3010004000000000000000000000001", 0x59, 0x8c60}], 0x0, &(0x7f0000010f60)) [ 1814.619821] EXT4-fs (loop5): mounting ext2 file system using the ext4 subsystem [ 1814.621360] EXT4-fs (loop7): ext4_check_descriptors: Block bitmap for group 0 not in group (block 0)! [ 1814.622917] EXT4-fs (loop7): group descriptors corrupted! [ 1814.625055] EXT4-fs error (device loop4): ext4_ext_check_inode:523: inode #2: comm syz-executor.4: pblk 0 bad header/extent: invalid eh_max - magic f30a, entries 1, max 0(0), depth 0(0) [ 1814.634253] EXT4-fs (loop5): warning: mounting unchecked fs, running e2fsck is recommended [ 1814.639181] EXT4-fs (loop4): get root inode failed [ 1814.639601] EXT4-fs (loop4): mount failed 04:03:33 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="1000000040000000030000002b00000005000000010000000000000000000000002000000020000010000000000000009f09c75f0000ffff53ef", 0x3a, 0x400}, {&(0x7f0000010080)="000000000000000000000000ede2de4df49d4f87b54a3176cfd4eb4f010040000c000000000000009f09c75f", 0x2c, 0x4e0}, {&(0x7f00000100c0)="01000000000000000000000000000000000000000401000012", 0x19, 0x560}, {&(0x7f0000010100)="000000000000000000000000000000000000000000000000000000005178aedb0300000013000000", 0x28, 0x7e0}, {&(0x7f0000010ce0)="00000000000000000000000000000000000000000000000000000000c99b0000ed410000000400009f09c75f9f09c75f9f09c75f00000000000003000200000000000800000000000af3010004", 0x4d, 0x8c60}], 0x0, &(0x7f0000010f60)) [ 1814.660237] loop3: detected capacity change from 0 to 140 [ 1814.664039] EXT4-fs (loop5): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: none. 04:03:33 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="1000000040000000030000002b00000005000000010000000000000000000000002000000020000010000000000000009f09c75f0000ffff53ef", 0x3a, 0x400}, {&(0x7f0000010080)="000000000000000000000000ede2de4df49d4f87b54a3176cfd4eb4f010040000c000000000000009f09c75f", 0x2c, 0x4e0}, {&(0x7f00000100c0)="01000000000000000000000000000000000000000401000012", 0x19, 0x560}, {&(0x7f00000100e0)="00000000000000000000000000000000000000000104", 0x16, 0x640}, {&(0x7f0000010100)="000000000000000000000000000000000000000000000000000000005178aedb0300000013000000230000002b0005000200040000000000907306c205002a9c00000000000000000000000000000000000000000000000091ecd11b", 0x5c, 0x7e0}, {&(0x7f0000010ce0)="00000000000000000000000000000000000000000000000000000000c99b0000ed410000000400009f09c75f9f09c75f9f09c75f00000000000003000200000000000800000000000af30100", 0x4c, 0x8c60}], 0x0, &(0x7f0000010f60)) [ 1814.708491] EXT4-fs (loop5): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 1814.712174] loop6: detected capacity change from 0 to 140 [ 1814.715130] EXT4-fs (loop6): ext4_check_descriptors: Block bitmap for group 0 not in group (block 0)! [ 1814.715897] EXT4-fs (loop6): group descriptors corrupted! [ 1814.735603] loop1: detected capacity change from 0 to 140 [ 1814.739029] EXT4-fs (loop3): ext4_check_descriptors: Block bitmap for group 0 not in group (block 0)! [ 1814.740647] EXT4-fs (loop3): group descriptors corrupted! [ 1814.741362] EXT4-fs (loop1): VFS: Can't find ext4 filesystem [ 1814.751252] loop0: detected capacity change from 0 to 140 [ 1814.765731] EXT4-fs (loop0): ext4_check_descriptors: Inode table for group 0 not in group (block 0)! [ 1814.766493] EXT4-fs (loop0): group descriptors corrupted! 04:03:33 executing program 7: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="1000000040000000030000002b00000005000000010000000000000000000000002000000020000010000000000000009f09c75f0000ffff53ef", 0x3a, 0x400}, {0x0, 0x0, 0x7e0}, {&(0x7f0000010ce0)="00000000000000000000000000000000000000000000000000000000c99b0000ed410000000400009f09c75f9f09c75f9f09c75f00000000000003000200000000000800000000000af301000400000000000000000000000100000004", 0x5d, 0x8c60}], 0x0, &(0x7f0000010f60)) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) getdents64(r0, &(0x7f0000000040)=""/4, 0x4) 04:03:33 executing program 6: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="1000000040000000030000002b00000005000000010000000000000000000000002000000020000010000000000000009f09c75f0000ffff53ef", 0x3a, 0x400}, {&(0x7f0000010080)="000000000000000000000000ede2de4df49d4f87b54a3176cfd4eb4f010040000c000000000000009f09c75f", 0x2c, 0x4e0}, {&(0x7f0000010100)="000000000000000000000000000000000000000000000000000000005178aedb03000000", 0x24, 0x7e0}, {&(0x7f0000010ce0)="00000000000000000000000000000000000000000000000000000000c99b0000ed410000000400009f09c75f9f09c75f9f09c75f00000000000003000200000000000800000000000af301000400000000000000000000000100000004", 0x5d, 0x8c60}], 0x0, &(0x7f0000010f60)) getdents64(r0, &(0x7f0000000040)=""/4, 0x4) 04:03:33 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000), 0x0, 0x400}, {&(0x7f0000010100)="000000000000000000000000000000000000000000000000000000005178aedb030000001300000023", 0x29, 0x7e0}, {&(0x7f0000010ce0)="00000000000000000000000000000000000000000000000000000000c99b0000ed410000000400009f09c75f9f09c75f9f09c75f00000000000003000200000000000800000000000af3010004000000000000000000000001", 0x59, 0x8c60}], 0x0, &(0x7f0000010f60)) 04:03:33 executing program 3: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="1000000040000000030000002b00000005000000010000000000000000000000002000000020000010000000000000009f09c75f0000ffff53ef", 0x3a, 0x400}, {&(0x7f0000010100), 0x0, 0x7e0}, {&(0x7f0000010ce0)="00000000000000000000000000000000000000000000000000000000c99b0000ed410000000400009f09c75f9f09c75f9f09c75f00000000000003000200000000000800000000000af301000400000000000000000000000100000004", 0x5d, 0x8c60}], 0x0, &(0x7f0000010f60)) getdents64(r0, &(0x7f0000000040)=""/4, 0x4) [ 1814.841467] loop4: detected capacity change from 0 to 140 [ 1814.854346] loop7: detected capacity change from 0 to 140 [ 1814.874728] EXT4-fs error (device loop4): ext4_ext_check_inode:523: inode #2: comm syz-executor.4: pblk 0 bad header/extent: invalid eh_max - magic f30a, entries 1, max 0(0), depth 0(0) [ 1814.882460] EXT4-fs (loop7): ext4_check_descriptors: Block bitmap for group 0 not in group (block 0)! [ 1814.883446] EXT4-fs (loop7): group descriptors corrupted! [ 1814.884352] EXT4-fs (loop4): get root inode failed [ 1814.885258] EXT4-fs (loop4): mount failed [ 1814.901706] loop6: detected capacity change from 0 to 140 [ 1814.908693] EXT4-fs (loop6): ext4_check_descriptors: Inode bitmap for group 0 not in group (block 0)! [ 1814.909558] EXT4-fs (loop6): group descriptors corrupted! [ 1814.911291] loop1: detected capacity change from 0 to 140 [ 1814.918089] EXT4-fs (loop1): VFS: Can't find ext4 filesystem 04:03:41 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="1000000040000000030000002b00000005000000010000000000000000000000002000000020000010000000000000009f09c75f0000ffff53ef", 0x3a, 0x400}, {&(0x7f0000010080)="000000000000000000000000ede2de4df49d4f87b54a3176cfd4eb4f010040000c000000000000009f09c75f", 0x2c, 0x4e0}, {&(0x7f00000100c0)="01000000000000000000000000000000000000000401000012", 0x19, 0x560}, {&(0x7f00000100e0)="00000000000000000000000000000000000000000104", 0x16, 0x640}, {&(0x7f0000010100)="000000000000000000000000000000000000000000000000000000005178aedb0300000013000000230000002b0005000200040000000000907306c205002a9c00000000000000000000000000000000000000000000000091ecd11b", 0x5c, 0x7e0}, {&(0x7f0000010ce0)="00000000000000000000000000000000000000000000000000000000c99b0000ed410000000400009f09c75f9f09c75f9f09c75f00000000000003000200000000000800000000000af30100", 0x4c, 0x8c60}], 0x0, &(0x7f0000010f60)) 04:03:41 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="1000000040000000030000002b00000005000000010000000000000000000000002000000020000010000000000000009f09c75f0000ffff53ef", 0x3a, 0x400}, {&(0x7f0000010080)="000000000000000000000000ede2de4df49d4f87b54a3176cfd4eb4f010040000c000000000000009f09c75f", 0x2c, 0x4e0}, {&(0x7f00000100c0)="01000000000000000000000000000000000000000401000012", 0x19, 0x560}, {&(0x7f0000010100)="000000000000000000000000000000000000000000000000000000005178aedb0300000013000000", 0x28, 0x7e0}, {&(0x7f0000010ce0)="00000000000000000000000000000000000000000000000000000000c99b0000ed410000000400009f09c75f9f09c75f9f09c75f00000000000003000200000000000800000000000af3010004", 0x4d, 0x8c60}], 0x0, &(0x7f0000010f60)) 04:03:41 executing program 5: creat(&(0x7f00000003c0)='./file0\x00', 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext2\x00', &(0x7f0000000100)='./file0\x00', 0x40410, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}], 0x0, &(0x7f0000013c00)=ANY=[]) 04:03:41 executing program 6: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="1000000040000000030000002b00000005000000010000000000000000000000002000000020000010000000000000009f09c75f0000ffff53ef", 0x3a, 0x400}, {&(0x7f0000010080)="000000000000000000000000ede2de4df49d4f87b54a3176cfd4eb4f010040000c000000000000009f09c75f", 0x2c, 0x4e0}, {&(0x7f0000010100)="000000000000000000000000000000000000000000000000000000005178aedb03000000", 0x24, 0x7e0}, {&(0x7f0000010ce0)="00000000000000000000000000000000000000000000000000000000c99b0000ed410000000400009f09c75f9f09c75f9f09c75f00000000000003000200000000000800000000000af301000400000000000000000000000100000004", 0x5d, 0x8c60}], 0x0, &(0x7f0000010f60)) getdents64(r0, &(0x7f0000000040)=""/4, 0x4) 04:03:41 executing program 7: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="1000000040000000030000002b00000005000000010000000000000000000000002000000020000010000000000000009f09c75f0000ffff53ef", 0x3a, 0x400}, {0x0, 0x0, 0x7e0}, {&(0x7f0000010ce0)="00000000000000000000000000000000000000000000000000000000c99b0000ed410000000400009f09c75f9f09c75f9f09c75f00000000000003000200000000000800000000000af301000400000000000000000000000100000004", 0x5d, 0x8c60}], 0x0, &(0x7f0000010f60)) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) getdents64(r0, &(0x7f0000000040)=""/4, 0x4) 04:03:41 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000), 0x0, 0x400}, {&(0x7f0000010100)="000000000000000000000000000000000000000000000000000000005178aedb030000001300000023", 0x29, 0x7e0}, {&(0x7f0000010ce0)="00000000000000000000000000000000000000000000000000000000c99b0000ed410000000400009f09c75f9f09c75f9f09c75f00000000000003000200000000000800000000000af3010004000000000000000000000001", 0x59, 0x8c60}], 0x0, &(0x7f0000010f60)) 04:03:41 executing program 3: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="1000000040000000030000002b00000005000000010000000000000000000000002000000020000010000000000000009f09c75f0000ffff53ef", 0x3a, 0x400}, {&(0x7f0000010100), 0x0, 0x7e0}, {&(0x7f0000010ce0)="00000000000000000000000000000000000000000000000000000000c99b0000ed410000000400009f09c75f9f09c75f9f09c75f00000000000003000200000000000800000000000af301000400000000000000000000000100000004", 0x5d, 0x8c60}], 0x0, &(0x7f0000010f60)) getdents64(r0, &(0x7f0000000040)=""/4, 0x4) 04:03:41 executing program 2: sendmsg$NL80211_CMD_UNEXPECTED_FRAME(0xffffffffffffffff, &(0x7f0000000400)={0x0, 0x0, &(0x7f0000000300)={&(0x7f00000002c0)={0x1c, 0x0, 0x1, 0x0, 0x0, {{}, {@val={0x8}, @void}}}, 0x1c}}, 0x0) sendmsg$NL80211_CMD_UPDATE_FT_IES(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000001c0)={0x24, 0x0, 0x1, 0x70bd2c, 0x0, {{}, {@val={0x8}, @void}}, [@NL80211_ATTR_MDID={0x6, 0xb1, 0xc116}]}, 0x24}, 0x1, 0x0, 0x0, 0x80}, 0xc000) r0 = creat(&(0x7f00000003c0)='./file1\x00', 0x0) sendmsg$netlink(0xffffffffffffffff, 0x0, 0x0) dup(0xffffffffffffffff) pwritev2(r0, &(0x7f0000000380)=[{&(0x7f0000000180)="bd", 0xfffffdef}], 0x1, 0x1200, 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) ioctl$FS_IOC_FSSETXATTR(r1, 0x2, &(0x7f0000000200)={0x9}) syz_io_uring_setup(0x0, &(0x7f0000000000)={0x0, 0x0, 0x4, 0x2, 0x309}, &(0x7f0000ffc000/0x2000)=nil, &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000000080), &(0x7f0000000240)) syz_io_uring_submit(0x0, 0x0, &(0x7f0000000280)=@IORING_OP_ASYNC_CANCEL={0xe, 0x0, 0x0, 0x0, 0x0, 0x12345}, 0x1ff) [ 1823.110269] loop7: detected capacity change from 0 to 140 [ 1823.112261] loop3: detected capacity change from 0 to 140 [ 1823.114082] loop5: detected capacity change from 0 to 514 [ 1823.118227] EXT4-fs (loop7): ext4_check_descriptors: Block bitmap for group 0 not in group (block 0)! [ 1823.119009] EXT4-fs (loop7): group descriptors corrupted! [ 1823.119585] EXT4-fs (loop5): mounting ext2 file system using the ext4 subsystem [ 1823.120873] EXT4-fs (loop3): ext4_check_descriptors: Block bitmap for group 0 not in group (block 0)! [ 1823.121622] EXT4-fs (loop3): group descriptors corrupted! [ 1823.126443] EXT4-fs (loop5): warning: mounting unchecked fs, running e2fsck is recommended [ 1823.131565] loop0: detected capacity change from 0 to 140 [ 1823.135285] EXT4-fs (loop5): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: none. [ 1823.135755] loop4: detected capacity change from 0 to 140 [ 1823.142549] EXT4-fs (loop5): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 1823.144771] loop1: detected capacity change from 0 to 140 [ 1823.147572] loop6: detected capacity change from 0 to 140 [ 1823.156143] EXT4-fs (loop0): ext4_check_descriptors: Inode table for group 0 not in group (block 0)! [ 1823.157541] EXT4-fs (loop0): group descriptors corrupted! [ 1823.167823] EXT4-fs (loop1): VFS: Can't find ext4 filesystem [ 1823.175070] EXT4-fs error (device loop4): ext4_ext_check_inode:523: inode #2: comm syz-executor.4: pblk 0 bad header/extent: invalid eh_max - magic f30a, entries 1, max 0(0), depth 0(0) 04:03:42 executing program 7: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="1000000040000000030000002b00000005000000010000000000000000000000002000000020000010000000000000009f09c75f0000ffff53ef", 0x3a, 0x400}, {&(0x7f0000010100), 0x0, 0x7e0}, {&(0x7f0000010ce0)="00000000000000000000000000000000000000000000000000000000c99b0000ed410000000400009f09c75f9f09c75f9f09c75f00000000000003000200000000000800000000000af301000400000000000000000000000100000004", 0x5d, 0x8c60}], 0x0, &(0x7f0000010f60)) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) getdents64(r0, &(0x7f0000000040)=""/4, 0x4) [ 1823.185709] EXT4-fs (loop6): ext4_check_descriptors: Inode bitmap for group 0 not in group (block 0)! [ 1823.188699] EXT4-fs (loop6): group descriptors corrupted! 04:03:42 executing program 3: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="1000000040000000030000002b00000005000000010000000000000000000000002000000020000010000000000000009f09c75f0000ffff53ef", 0x3a, 0x400}, {&(0x7f0000010100), 0x0, 0x7e0}, {&(0x7f0000010ce0)="00000000000000000000000000000000000000000000000000000000c99b0000ed410000000400009f09c75f9f09c75f9f09c75f00000000000003000200000000000800000000000af301000400000000000000000000000100000004", 0x5d, 0x8c60}], 0x0, &(0x7f0000010f60)) getdents64(r0, &(0x7f0000000040)=""/4, 0x4) 04:03:42 executing program 5: creat(&(0x7f00000003c0)='./file0\x00', 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext2\x00', &(0x7f0000000100)='./file0\x00', 0x404cc, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}], 0x0, &(0x7f0000013c00)=ANY=[]) [ 1823.201487] EXT4-fs (loop4): get root inode failed [ 1823.202272] EXT4-fs (loop4): mount failed [ 1823.209892] loop5: detected capacity change from 0 to 514 [ 1823.211809] EXT4-fs (loop5): mounting ext2 file system using the ext4 subsystem [ 1823.216613] EXT4-fs (loop5): warning: mounting unchecked fs, running e2fsck is recommended [ 1823.222286] EXT4-fs (loop5): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: none. [ 1823.224793] EXT4-fs (loop5): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 1823.231792] loop5: detected capacity change from 0 to 514 [ 1823.250327] loop3: detected capacity change from 0 to 140 [ 1823.256660] loop7: detected capacity change from 0 to 140 04:03:42 executing program 6: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="1000000040000000030000002b00000005000000010000000000000000000000002000000020000010000000000000009f09c75f0000ffff53ef", 0x3a, 0x400}, {&(0x7f0000010080)="000000000000000000000000ede2de4df49d4f87b54a3176cfd4eb4f010040000c000000000000009f09c75f", 0x2c, 0x4e0}, {&(0x7f0000010100)="000000000000000000000000000000000000000000000000000000005178aedb03000000", 0x24, 0x7e0}, {&(0x7f0000010ce0)="00000000000000000000000000000000000000000000000000000000c99b0000ed410000000400009f09c75f9f09c75f9f09c75f00000000000003000200000000000800000000000af301000400000000000000000000000100000004", 0x5d, 0x8c60}], 0x0, &(0x7f0000010f60)) getdents64(r0, &(0x7f0000000040)=""/4, 0x4) 04:03:42 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="1000000040000000030000002b00000005000000010000000000000000000000002000000020000010000000000000009f09c75f0000ffff53ef", 0x3a, 0x400}, {&(0x7f0000010080)="000000000000000000000000ede2de4df49d4f87b54a3176cfd4eb4f010040000c000000000000009f09c75f", 0x2c, 0x4e0}, {&(0x7f00000100c0)="01000000000000000000000000000000000000000401000012", 0x19, 0x560}, {&(0x7f0000010100)="000000000000000000000000000000000000000000000000000000005178aedb030000001300000023", 0x29}, {&(0x7f0000010ce0)="00000000000000000000000000000000000000000000000000000000c99b0000ed410000000400009f09c75f9f09c75f9f09c75f00000000000003000200000000000800000000000af3010004", 0x4d, 0x8c60}], 0x0, &(0x7f0000010f60)) [ 1823.267958] EXT4-fs (loop3): ext4_check_descriptors: Block bitmap for group 0 not in group (block 0)! [ 1823.268683] EXT4-fs (loop3): group descriptors corrupted! [ 1823.269992] EXT4-fs (loop7): ext4_check_descriptors: Block bitmap for group 0 not in group (block 0)! [ 1823.270719] EXT4-fs (loop7): group descriptors corrupted! [ 1823.365129] loop0: detected capacity change from 0 to 140 [ 1823.367491] EXT4-fs (loop0): ext4_check_descriptors: Block bitmap for group 0 not in group (block 0)! [ 1823.368857] EXT4-fs (loop0): group descriptors corrupted! [ 1823.377499] loop6: detected capacity change from 0 to 140 [ 1823.381614] EXT4-fs (loop6): ext4_check_descriptors: Inode bitmap for group 0 not in group (block 0)! [ 1823.382423] EXT4-fs (loop6): group descriptors corrupted! 04:03:52 executing program 3: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="1000000040000000030000002b00000005000000010000000000000000000000002000000020000010000000000000009f09c75f0000ffff53ef", 0x3a, 0x400}, {&(0x7f0000010100)='\x00'/21, 0x15, 0x7e0}, {&(0x7f0000010ce0)="00000000000000000000000000000000000000000000000000000000c99b0000ed410000000400009f09c75f9f09c75f9f09c75f00000000000003000200000000000800000000000af301000400000000000000000000000100000004", 0x5d, 0x8c60}], 0x0, &(0x7f0000010f60)) getdents64(r0, &(0x7f0000000040)=""/4, 0x4) 04:03:52 executing program 2: sendmsg$NL80211_CMD_UNEXPECTED_FRAME(0xffffffffffffffff, &(0x7f0000000400)={0x0, 0x0, &(0x7f0000000300)={&(0x7f00000002c0)={0x1c, 0x0, 0x1, 0x0, 0x0, {{}, {@val={0x8}, @void}}}, 0x1c}}, 0x0) sendmsg$NL80211_CMD_UPDATE_FT_IES(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000001c0)={0x24, 0x0, 0x1, 0x70bd2c, 0x0, {{}, {@val={0x8}, @void}}, [@NL80211_ATTR_MDID={0x6, 0xb1, 0xc116}]}, 0x24}, 0x1, 0x0, 0x0, 0x80}, 0xc000) r0 = creat(&(0x7f00000003c0)='./file1\x00', 0x0) sendmsg$netlink(0xffffffffffffffff, 0x0, 0x0) dup(0xffffffffffffffff) pwritev2(r0, &(0x7f0000000380)=[{&(0x7f0000000180)="bd", 0xfffffdef}], 0x1, 0x1200, 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) ioctl$FS_IOC_FSSETXATTR(r1, 0x4b47, &(0x7f0000000200)={0x9}) syz_io_uring_setup(0x0, &(0x7f0000000000)={0x0, 0x0, 0x4, 0x2, 0x309}, &(0x7f0000ffc000/0x2000)=nil, &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000000080), &(0x7f0000000240)) syz_io_uring_submit(0x0, 0x0, &(0x7f0000000280)=@IORING_OP_ASYNC_CANCEL={0xe, 0x0, 0x0, 0x0, 0x0, 0x12345}, 0x1ff) 04:03:52 executing program 6: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="1000000040000000030000002b00000005000000010000000000000000000000002000000020000010000000000000009f09c75f0000ffff53ef", 0x3a, 0x400}, {&(0x7f0000010080)="000000000000000000000000ede2de4df49d4f87b54a3176cfd4eb4f010040000c000000000000009f09c75f", 0x2c, 0x4e0}, {&(0x7f0000010100)="000000000000000000000000000000000000000000000000000000005178aedb03000000130000", 0x27, 0x7e0}, {&(0x7f0000010ce0)="00000000000000000000000000000000000000000000000000000000c99b0000ed410000000400009f09c75f9f09c75f9f09c75f00000000000003000200000000000800000000000af301000400000000000000000000000100000004", 0x5d, 0x8c60}], 0x0, &(0x7f0000010f60)) getdents64(r0, &(0x7f0000000040)=""/4, 0x4) 04:03:52 executing program 5: creat(&(0x7f00000003c0)='./file0\x00', 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext2\x00', &(0x7f0000000100)='./file0\x00', 0x404cd, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}], 0x0, &(0x7f0000013c00)=ANY=[]) 04:03:52 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="1000000040000000030000002b00000005000000010000000000000000", 0x1d, 0x400}, {&(0x7f0000010100)="000000000000000000000000000000000000000000000000000000005178aedb030000001300000023", 0x29, 0x7e0}, {&(0x7f0000010ce0)="00000000000000000000000000000000000000000000000000000000c99b0000ed410000000400009f09c75f9f09c75f9f09c75f00000000000003000200000000000800000000000af3010004000000000000000000000001", 0x59, 0x8c60}], 0x0, &(0x7f0000010f60)) 04:03:52 executing program 7: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="1000000040000000030000002b00000005000000010000000000000000000000002000000020000010000000000000009f09c75f0000ffff53ef", 0x3a, 0x400}, {&(0x7f0000010100), 0x0, 0x7e0}, {&(0x7f0000010ce0)="00000000000000000000000000000000000000000000000000000000c99b0000ed410000000400009f09c75f9f09c75f9f09c75f00000000000003000200000000000800000000000af301000400000000000000000000000100000004", 0x5d, 0x8c60}], 0x0, &(0x7f0000010f60)) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) getdents64(r0, &(0x7f0000000040)=""/4, 0x4) 04:03:52 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="1000000040000000030000002b00000005000000010000000000000000000000002000000020000010000000000000009f09c75f0000ffff53ef", 0x3a, 0x400}, {&(0x7f0000010080)="000000000000000000000000ede2de4df49d4f87b54a3176cfd4eb4f010040000c000000000000009f09c75f", 0x2c, 0x4e0}, {&(0x7f00000100c0)="01000000000000000000000000000000000000000401000012", 0x19, 0x560}, {&(0x7f0000010100)="000000000000000000000000000000000000000000000000000000005178aedb030000001300000023", 0x29}, {&(0x7f0000010ce0)="00000000000000000000000000000000000000000000000000000000c99b0000ed410000000400009f09c75f9f09c75f9f09c75f00000000000003000200000000000800000000000af3010004", 0x4d, 0x8c60}], 0x0, &(0x7f0000010f60)) 04:03:52 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="1000000040000000030000002b00000005000000010000000000000000000000002000000020000010000000000000009f09c75f0000ffff53ef", 0x3a, 0x400}, {&(0x7f0000010080)="000000000000000000000000ede2de4df49d4f87b54a3176cfd4eb4f010040000c000000000000009f09c75f", 0x2c, 0x4e0}, {&(0x7f00000100c0)="01000000000000000000000000000000000000000401000012", 0x19, 0x560}, {&(0x7f00000100e0)="00000000000000000000000000000000000000000104", 0x16, 0x640}, {&(0x7f0000010100)="000000000000000000000000000000000000000000000000000000005178aedb0300000013000000230000002b0005000200040000000000907306c205002a9c00000000000000000000000000000000000000000000000091ecd11b", 0x5c, 0x7e0}, {&(0x7f0000010ce0)="00000000000000000000000000000000000000000000000000000000c99b0000ed410000000400009f09c75f9f09c75f9f09c75f00000000000003000200000000000800000000000af30100", 0x4c, 0x8c60}], 0x0, &(0x7f0000010f60)) [ 1833.754902] loop1: detected capacity change from 0 to 140 [ 1833.760752] loop6: detected capacity change from 0 to 140 [ 1833.762438] EXT4-fs (loop1): VFS: Can't find ext4 filesystem [ 1833.766175] loop3: detected capacity change from 0 to 140 [ 1833.770131] EXT4-fs (loop6): ext4_check_descriptors: Inode table for group 0 not in group (block 0)! [ 1833.770867] EXT4-fs (loop6): group descriptors corrupted! [ 1833.771471] loop5: detected capacity change from 0 to 514 [ 1833.773779] EXT4-fs (loop3): ext4_check_descriptors: Block bitmap for group 0 not in group (block 0)! [ 1833.774685] EXT4-fs (loop3): group descriptors corrupted! [ 1833.776948] loop0: detected capacity change from 0 to 140 [ 1833.789527] EXT4-fs (loop0): ext4_check_descriptors: Block bitmap for group 0 not in group (block 0)! [ 1833.790306] EXT4-fs (loop0): group descriptors corrupted! [ 1833.792731] loop7: detected capacity change from 0 to 140 [ 1833.796649] EXT4-fs (loop5): mounting ext2 file system using the ext4 subsystem [ 1833.805381] EXT4-fs (loop7): ext4_check_descriptors: Block bitmap for group 0 not in group (block 0)! [ 1833.806956] EXT4-fs (loop7): group descriptors corrupted! 04:03:52 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="1000000040000000030000002b00000005000000010000000000000000", 0x1d, 0x400}, {&(0x7f0000010100)="000000000000000000000000000000000000000000000000000000005178aedb030000001300000023", 0x29, 0x7e0}, {&(0x7f0000010ce0)="00000000000000000000000000000000000000000000000000000000c99b0000ed410000000400009f09c75f9f09c75f9f09c75f00000000000003000200000000000800000000000af3010004000000000000000000000001", 0x59, 0x8c60}], 0x0, &(0x7f0000010f60)) [ 1833.816239] loop4: detected capacity change from 0 to 140 04:03:52 executing program 6: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="1000000040000000030000002b00000005000000010000000000000000000000002000000020000010000000000000009f09c75f0000ffff53ef", 0x3a, 0x400}, {&(0x7f0000010080)="000000000000000000000000ede2de4df49d4f87b54a3176cfd4eb4f010040000c000000000000009f09c75f", 0x2c, 0x4e0}, {&(0x7f0000010100)="000000000000000000000000000000000000000000000000000000005178aedb03000000130000", 0x27, 0x7e0}, {&(0x7f0000010ce0)="00000000000000000000000000000000000000000000000000000000c99b0000ed410000000400009f09c75f9f09c75f9f09c75f00000000000003000200000000000800000000000af301000400000000000000000000000100000004", 0x5d, 0x8c60}], 0x0, &(0x7f0000010f60)) getdents64(r0, &(0x7f0000000040)=""/4, 0x4) [ 1833.840738] EXT4-fs (loop5): warning: mounting unchecked fs, running e2fsck is recommended [ 1833.844605] loop1: detected capacity change from 0 to 140 [ 1833.847665] EXT4-fs (loop1): VFS: Can't find ext4 filesystem 04:03:52 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="1000000040000000030000002b00000005000000010000000000000000", 0x1d, 0x400}, {&(0x7f0000010100)="000000000000000000000000000000000000000000000000000000005178aedb030000001300000023", 0x29, 0x7e0}, {&(0x7f0000010ce0)="00000000000000000000000000000000000000000000000000000000c99b0000ed410000000400009f09c75f9f09c75f9f09c75f00000000000003000200000000000800000000000af3010004000000000000000000000001", 0x59, 0x8c60}], 0x0, &(0x7f0000010f60)) 04:03:52 executing program 3: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="1000000040000000030000002b00000005000000010000000000000000000000002000000020000010000000000000009f09c75f0000ffff53ef", 0x3a, 0x400}, {&(0x7f0000010100)='\x00'/21, 0x15, 0x7e0}, {&(0x7f0000010ce0)="00000000000000000000000000000000000000000000000000000000c99b0000ed410000000400009f09c75f9f09c75f9f09c75f00000000000003000200000000000800000000000af301000400000000000000000000000100000004", 0x5d, 0x8c60}], 0x0, &(0x7f0000010f60)) getdents64(r0, &(0x7f0000000040)=""/4, 0x4) [ 1833.879649] EXT4-fs error (device loop4): ext4_ext_check_inode:523: inode #2: comm syz-executor.4: pblk 0 bad header/extent: invalid eh_max - magic f30a, entries 1, max 0(0), depth 0(0) [ 1833.898586] EXT4-fs (loop5): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: none. [ 1833.901186] EXT4-fs (loop4): get root inode failed [ 1833.902090] EXT4-fs (loop4): mount failed [ 1833.928620] EXT4-fs (loop5): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 1833.934501] loop6: detected capacity change from 0 to 140 04:03:52 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="1000000040000000030000002b00000005000000010000000000000000000000002000000020000010000000000000009f09c75f0000ffff53ef", 0x3a, 0x400}, {&(0x7f0000010080)="000000000000000000000000ede2de4df49d4f87b54a3176cfd4eb4f010040000c000000000000009f09c75f", 0x2c, 0x4e0}, {&(0x7f00000100c0)="01000000000000000000000000000000000000000401000012", 0x19, 0x560}, {&(0x7f0000010100)="000000000000000000000000000000000000000000000000000000005178aedb030000001300000023", 0x29}, {&(0x7f0000010ce0)="00000000000000000000000000000000000000000000000000000000c99b0000ed410000000400009f09c75f9f09c75f9f09c75f00000000000003000200000000000800000000000af3010004", 0x4d, 0x8c60}], 0x0, &(0x7f0000010f60)) [ 1833.977357] EXT4-fs (loop6): ext4_check_descriptors: Inode table for group 0 not in group (block 0)! [ 1833.979280] EXT4-fs (loop6): group descriptors corrupted! 04:03:52 executing program 7: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="1000000040000000030000002b00000005000000010000000000000000000000002000000020000010000000000000009f09c75f0000ffff53ef", 0x3a, 0x400}, {&(0x7f0000010100), 0x0, 0x7e0}, {&(0x7f0000010ce0)="00000000000000000000000000000000000000000000000000000000c99b0000ed410000000400009f09c75f9f09c75f9f09c75f00000000000003000200000000000800000000000af301000400000000000000000000000100000004", 0x5d, 0x8c60}], 0x0, &(0x7f0000010f60)) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) getdents64(r0, &(0x7f0000000040)=""/4, 0x4) [ 1834.028153] loop3: detected capacity change from 0 to 140 [ 1834.031776] loop7: detected capacity change from 0 to 140 [ 1834.036426] EXT4-fs (loop7): ext4_check_descriptors: Block bitmap for group 0 not in group (block 0)! [ 1834.037425] EXT4-fs (loop7): group descriptors corrupted! 04:03:52 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="1000000040000000030000002b00000005000000010000000000000000000000002000000020000010000000000000009f09c75f0000ffff53ef", 0x3a, 0x400}, {&(0x7f0000010080)="000000000000000000000000ede2de4df49d4f87b54a3176cfd4eb4f010040000c000000000000009f09c75f", 0x2c, 0x4e0}, {&(0x7f00000100c0)="01000000000000000000000000000000000000000401000012", 0x19, 0x560}, {&(0x7f00000100e0)="00000000000000000000000000000000000000000104", 0x16, 0x640}, {&(0x7f0000010100)="000000000000000000000000000000000000000000000000000000005178aedb0300000013000000230000002b0005000200040000000000907306c205002a9c00000000000000000000000000000000000000000000000091ecd11b", 0x5c, 0x7e0}, {&(0x7f0000010ce0)="00000000000000000000000000000000000000000000000000000000c99b0000ed410000000400009f09c75f9f09c75f9f09c75f00000000000003000200000000000800000000000af3010004", 0x4d}], 0x0, &(0x7f0000010f60)) [ 1834.062381] EXT4-fs (loop3): ext4_check_descriptors: Block bitmap for group 0 not in group (block 0)! [ 1834.063281] EXT4-fs (loop3): group descriptors corrupted! [ 1834.071216] loop4: detected capacity change from 0 to 7 [ 1834.076087] EXT4-fs (loop4): bad geometry: block count 64 exceeds size of device (3 blocks) [ 1834.082513] loop0: detected capacity change from 0 to 140 [ 1834.087866] EXT4-fs (loop0): ext4_check_descriptors: Block bitmap for group 0 not in group (block 0)! [ 1834.088732] EXT4-fs (loop0): group descriptors corrupted! 04:04:01 executing program 7: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="1000000040000000030000002b00000005000000010000000000000000000000002000000020000010000000000000009f09c75f0000ffff53ef", 0x3a, 0x400}, {&(0x7f0000010100)='\x00'/21, 0x15, 0x7e0}, {&(0x7f0000010ce0)="00000000000000000000000000000000000000000000000000000000c99b0000ed410000000400009f09c75f9f09c75f9f09c75f00000000000003000200000000000800000000000af301000400000000000000000000000100000004", 0x5d, 0x8c60}], 0x0, &(0x7f0000010f60)) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) getdents64(r0, &(0x7f0000000040)=""/4, 0x4) 04:04:01 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="1000000040000000030000002b00000005000000010000000000000000000000002000000020000010000000000000009f09c75f0000ffff53ef", 0x3a, 0x400}, {&(0x7f0000010080)="000000000000000000000000ede2de4df49d4f87b54a3176cfd4eb4f010040000c000000000000009f09c75f", 0x2c, 0x4e0}, {&(0x7f0000010100)="000000000000000000000000000000000000000000000000000000005178aedb030000001300000023", 0x29, 0x7e0}, {&(0x7f0000010ce0)="00000000000000000000000000000000000000000000000000000000c99b0000ed410000000400009f09c75f9f09c75f9f09c75f00000000000003000200000000000800000000000af3010004", 0x4d, 0x8c60}], 0x0, &(0x7f0000010f60)) 04:04:01 executing program 2: sendmsg$NL80211_CMD_UNEXPECTED_FRAME(0xffffffffffffffff, &(0x7f0000000400)={0x0, 0x0, &(0x7f0000000300)={&(0x7f00000002c0)={0x1c, 0x0, 0x1, 0x0, 0x0, {{}, {@val={0x8}, @void}}}, 0x1c}}, 0x0) sendmsg$NL80211_CMD_UPDATE_FT_IES(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000001c0)={0x24, 0x0, 0x1, 0x70bd2c, 0x0, {{}, {@val={0x8}, @void}}, [@NL80211_ATTR_MDID={0x6, 0xb1, 0xc116}]}, 0x24}, 0x1, 0x0, 0x0, 0x80}, 0xc000) r0 = creat(&(0x7f00000003c0)='./file1\x00', 0x0) sendmsg$netlink(0xffffffffffffffff, 0x0, 0x0) dup(0xffffffffffffffff) pwritev2(r0, &(0x7f0000000380)=[{&(0x7f0000000180)="bd", 0xfffffdef}], 0x1, 0x1200, 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) ioctl$FS_IOC_FSSETXATTR(r1, 0x4b49, &(0x7f0000000200)={0x9}) syz_io_uring_setup(0x0, &(0x7f0000000000)={0x0, 0x0, 0x4, 0x2, 0x309}, &(0x7f0000ffc000/0x2000)=nil, &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000000080), &(0x7f0000000240)) syz_io_uring_submit(0x0, 0x0, &(0x7f0000000280)=@IORING_OP_ASYNC_CANCEL={0xe, 0x0, 0x0, 0x0, 0x0, 0x12345}, 0x1ff) 04:04:01 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="1000000040000000030000002b00000005000000010000000000000000000000002000000020000010000000000000009f09c75f0000ffff53ef", 0x3a, 0x400}, {&(0x7f0000010080)="000000000000000000000000ede2de4df49d4f87b54a3176cfd4eb4f010040000c000000000000009f09c75f", 0x2c, 0x4e0}, {&(0x7f00000100c0)="01000000000000000000000000000000000000000401000012", 0x19, 0x560}, {&(0x7f00000100e0)="00000000000000000000000000000000000000000104", 0x16, 0x640}, {&(0x7f0000010100)="000000000000000000000000000000000000000000000000000000005178aedb0300000013000000230000002b0005000200040000000000907306c205002a9c00000000000000000000000000000000000000000000000091ecd11b", 0x5c, 0x7e0}, {&(0x7f0000010ce0)="00000000000000000000000000000000000000000000000000000000c99b0000ed410000000400009f09c75f9f09c75f9f09c75f00000000000003000200000000000800000000000af3010004", 0x4d}], 0x0, &(0x7f0000010f60)) 04:04:01 executing program 5: creat(&(0x7f00000003c0)='./file0\x00', 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext2\x00', &(0x7f0000000100)='./file0\x00', 0x404ce, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}], 0x0, &(0x7f0000013c00)=ANY=[]) 04:04:01 executing program 6: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="1000000040000000030000002b00000005000000010000000000000000000000002000000020000010000000000000009f09c75f0000ffff53ef", 0x3a, 0x400}, {&(0x7f0000010080)="000000000000000000000000ede2de4df49d4f87b54a3176cfd4eb4f010040000c000000000000009f09c75f", 0x2c, 0x4e0}, {&(0x7f0000010100)="000000000000000000000000000000000000000000000000000000005178aedb03000000130000", 0x27, 0x7e0}, {&(0x7f0000010ce0)="00000000000000000000000000000000000000000000000000000000c99b0000ed410000000400009f09c75f9f09c75f9f09c75f00000000000003000200000000000800000000000af301000400000000000000000000000100000004", 0x5d, 0x8c60}], 0x0, &(0x7f0000010f60)) getdents64(r0, &(0x7f0000000040)=""/4, 0x4) 04:04:01 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="1000000040000000030000002b00000005000000010000000000000000000000002000000020000010000000", 0x2c, 0x400}, {&(0x7f0000010100)="000000000000000000000000000000000000000000000000000000005178aedb030000001300000023", 0x29, 0x7e0}, {&(0x7f0000010ce0)="00000000000000000000000000000000000000000000000000000000c99b0000ed410000000400009f09c75f9f09c75f9f09c75f00000000000003000200000000000800000000000af3010004000000000000000000000001", 0x59, 0x8c60}], 0x0, &(0x7f0000010f60)) 04:04:01 executing program 3: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="1000000040000000030000002b00000005000000010000000000000000000000002000000020000010000000000000009f09c75f0000ffff53ef", 0x3a, 0x400}, {&(0x7f0000010100)='\x00'/21, 0x15, 0x7e0}, {&(0x7f0000010ce0)="00000000000000000000000000000000000000000000000000000000c99b0000ed410000000400009f09c75f9f09c75f9f09c75f00000000000003000200000000000800000000000af301000400000000000000000000000100000004", 0x5d, 0x8c60}], 0x0, &(0x7f0000010f60)) getdents64(r0, &(0x7f0000000040)=""/4, 0x4) [ 1843.032675] loop7: detected capacity change from 0 to 140 [ 1843.034712] loop3: detected capacity change from 0 to 140 [ 1843.036350] loop1: detected capacity change from 0 to 140 [ 1843.041055] EXT4-fs (loop7): ext4_check_descriptors: Block bitmap for group 0 not in group (block 0)! [ 1843.041820] EXT4-fs (loop7): group descriptors corrupted! [ 1843.044240] EXT4-fs (loop3): ext4_check_descriptors: Block bitmap for group 0 not in group (block 0)! [ 1843.045097] EXT4-fs (loop3): group descriptors corrupted! [ 1843.045609] EXT4-fs (loop1): VFS: Can't find ext4 filesystem [ 1843.069429] loop0: detected capacity change from 0 to 140 [ 1843.076330] loop4: detected capacity change from 0 to 7 [ 1843.076716] loop5: detected capacity change from 0 to 514 [ 1843.079442] loop6: detected capacity change from 0 to 140 [ 1843.090901] EXT4-fs (loop5): mounting ext2 file system using the ext4 subsystem [ 1843.099019] EXT4-fs (loop4): bad geometry: block count 64 exceeds size of device (3 blocks) [ 1843.102533] EXT4-fs (loop6): ext4_check_descriptors: Inode table for group 0 not in group (block 0)! [ 1843.104214] EXT4-fs (loop6): group descriptors corrupted! 04:04:02 executing program 7: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="1000000040000000030000002b00000005000000010000000000000000000000002000000020000010000000000000009f09c75f0000ffff53ef", 0x3a, 0x400}, {&(0x7f0000010100)='\x00'/21, 0x15, 0x7e0}, {&(0x7f0000010ce0)="00000000000000000000000000000000000000000000000000000000c99b0000ed410000000400009f09c75f9f09c75f9f09c75f00000000000003000200000000000800000000000af301000400000000000000000000000100000004", 0x5d, 0x8c60}], 0x0, &(0x7f0000010f60)) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) getdents64(r0, &(0x7f0000000040)=""/4, 0x4) 04:04:02 executing program 3: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="1000000040000000030000002b00000005000000010000000000000000000000002000000020000010000000000000009f09c75f0000ffff53ef", 0x3a, 0x400}, {&(0x7f0000010100)="000000000000000000000000000000000000000000000000000000005178ae", 0x1f, 0x7e0}, {&(0x7f0000010ce0)="00000000000000000000000000000000000000000000000000000000c99b0000ed410000000400009f09c75f9f09c75f9f09c75f00000000000003000200000000000800000000000af301000400000000000000000000000100000004", 0x5d, 0x8c60}], 0x0, &(0x7f0000010f60)) getdents64(r0, &(0x7f0000000040)=""/4, 0x4) [ 1843.111928] EXT4-fs error (device loop0): ext4_ext_check_inode:523: inode #2: comm syz-executor.0: pblk 0 bad header/extent: invalid extent entries - magic f30a, entries 1, max 4(4), depth 0(0) 04:04:02 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="1000000040000000030000002b00000005000000010000000000000000000000002000000020000010000000", 0x2c, 0x400}, {&(0x7f0000010100)="000000000000000000000000000000000000000000000000000000005178aedb030000001300000023", 0x29, 0x7e0}, {&(0x7f0000010ce0)="00000000000000000000000000000000000000000000000000000000c99b0000ed410000000400009f09c75f9f09c75f9f09c75f00000000000003000200000000000800000000000af3010004000000000000000000000001", 0x59, 0x8c60}], 0x0, &(0x7f0000010f60)) [ 1843.117056] EXT4-fs (loop5): warning: mounting unchecked fs, running e2fsck is recommended [ 1843.133573] loop3: detected capacity change from 0 to 140 [ 1843.135824] EXT4-fs (loop3): ext4_check_descriptors: Block bitmap for group 0 not in group (block 0)! [ 1843.136675] EXT4-fs (loop3): group descriptors corrupted! [ 1843.142486] EXT4-fs (loop0): get root inode failed [ 1843.143462] EXT4-fs (loop0): mount failed [ 1843.166357] loop1: detected capacity change from 0 to 140 04:04:02 executing program 3: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="1000000040000000030000002b00000005000000010000000000000000000000002000000020000010000000000000009f09c75f0000ffff53ef", 0x3a, 0x400}, {&(0x7f0000010100)="000000000000000000000000000000000000000000000000000000005178ae", 0x1f, 0x7e0}, {&(0x7f0000010ce0)="00000000000000000000000000000000000000000000000000000000c99b0000ed410000000400009f09c75f9f09c75f9f09c75f00000000000003000200000000000800000000000af301000400000000000000000000000100000004", 0x5d, 0x8c60}], 0x0, &(0x7f0000010f60)) getdents64(r0, &(0x7f0000000040)=""/4, 0x4) [ 1843.168716] EXT4-fs (loop1): VFS: Can't find ext4 filesystem [ 1843.171247] EXT4-fs (loop5): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: none. [ 1843.184745] EXT4-fs (loop5): unmounting filesystem 00000000-0000-0000-0000-000000000000. 04:04:02 executing program 6: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="1000000040000000030000002b00000005000000010000000000000000000000002000000020000010000000000000009f09c75f0000ffff53ef", 0x3a, 0x400}, {&(0x7f0000010080)="000000000000000000000000ede2de4df49d4f87b54a3176cfd4eb4f010040000c000000000000009f09c75f", 0x2c, 0x4e0}, {&(0x7f0000010100)="000000000000000000000000000000000000000000000000000000005178aedb0300000013000000", 0x28, 0x7e0}, {&(0x7f0000010ce0)="00000000000000000000000000000000000000000000000000000000c99b0000ed410000000400009f09c75f9f09c75f9f09c75f00000000000003000200000000000800000000000af301000400000000000000000000000100000004", 0x5d, 0x8c60}], 0x0, &(0x7f0000010f60)) getdents64(r0, &(0x7f0000000040)=""/4, 0x4) 04:04:02 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="1000000040000000030000002b00000005000000010000000000000000000000002000000020000010000000000000009f09c75f0000ffff53ef", 0x3a, 0x400}, {&(0x7f0000010080)="000000000000000000000000ede2de4df49d4f87b54a3176cfd4eb4f010040000c000000000000009f09c75f", 0x2c, 0x4e0}, {&(0x7f00000100c0)="01000000000000000000000000000000000000000401000012", 0x19, 0x560}, {&(0x7f00000100e0)="00000000000000000000000000000000000000000104", 0x16, 0x640}, {&(0x7f0000010100)="000000000000000000000000000000000000000000000000000000005178aedb0300000013000000230000002b0005000200040000000000907306c205002a9c00000000000000000000000000000000000000000000000091ecd11b", 0x5c, 0x7e0}, {&(0x7f0000010ce0)="00000000000000000000000000000000000000000000000000000000c99b0000ed410000000400009f09c75f9f09c75f9f09c75f00000000000003000200000000000800000000000af3010004", 0x4d}], 0x0, &(0x7f0000010f60)) [ 1843.226184] loop7: detected capacity change from 0 to 140 04:04:02 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="1000000040000000030000002b00000005000000010000000000000000000000002000000020000010000000", 0x2c, 0x400}, {&(0x7f0000010100)="000000000000000000000000000000000000000000000000000000005178aedb030000001300000023", 0x29, 0x7e0}, {&(0x7f0000010ce0)="00000000000000000000000000000000000000000000000000000000c99b0000ed410000000400009f09c75f9f09c75f9f09c75f00000000000003000200000000000800000000000af3010004000000000000000000000001", 0x59, 0x8c60}], 0x0, &(0x7f0000010f60)) [ 1843.248152] EXT4-fs (loop7): ext4_check_descriptors: Block bitmap for group 0 not in group (block 0)! [ 1843.249078] EXT4-fs (loop7): group descriptors corrupted! 04:04:02 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="1000000040000000030000002b00000005000000010000000000000000000000002000000020000010000000000000009f09c75f0000ffff53ef", 0x3a, 0x400}, {&(0x7f0000010080)="000000000000000000000000ede2de4df49d4f87b54a3176cfd4eb4f010040000c000000000000009f09c75f", 0x2c, 0x4e0}, {0x0, 0x0, 0x7e0}, {&(0x7f0000010ce0)="00000000000000000000000000000000000000000000000000000000c99b0000ed410000000400009f09c75f9f09c75f9f09c75f00000000000003000200000000000800000000000af3010004", 0x4d, 0x8c60}], 0x0, &(0x7f0000010f60)) [ 1843.285780] loop3: detected capacity change from 0 to 140 04:04:02 executing program 5: creat(&(0x7f00000003c0)='./file0\x00', 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext2\x00', &(0x7f0000000100)='./file0\x00', 0x40500, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}], 0x0, &(0x7f0000013c00)=ANY=[]) [ 1843.312543] EXT4-fs (loop3): ext4_check_descriptors: Block bitmap for group 0 not in group (block 0)! [ 1843.313451] EXT4-fs (loop3): group descriptors corrupted! [ 1843.319195] loop4: detected capacity change from 0 to 7 [ 1843.342500] loop1: detected capacity change from 0 to 140 [ 1843.349765] EXT4-fs (loop1): VFS: Can't find ext4 filesystem [ 1843.364458] EXT4-fs (loop4): bad geometry: block count 64 exceeds size of device (3 blocks) [ 1843.373151] loop6: detected capacity change from 0 to 140 [ 1843.378648] loop0: detected capacity change from 0 to 140 [ 1843.384315] EXT4-fs (loop0): ext4_check_descriptors: Block bitmap for group 0 not in group (block 0)! [ 1843.386058] EXT4-fs (loop0): group descriptors corrupted! [ 1843.395163] EXT4-fs (loop6): ext4_check_descriptors: Inode table for group 0 not in group (block 0)! [ 1843.396085] EXT4-fs (loop6): group descriptors corrupted! [ 1843.406306] loop5: detected capacity change from 0 to 514 [ 1843.424990] EXT4-fs (loop5): mounting ext2 file system using the ext4 subsystem [ 1843.440040] EXT4-fs (loop5): warning: mounting unchecked fs, running e2fsck is recommended [ 1843.448720] EXT4-fs (loop5): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: none. [ 1843.458456] EXT4-fs (loop5): unmounting filesystem 00000000-0000-0000-0000-000000000000. 04:04:11 executing program 2: sendmsg$NL80211_CMD_UNEXPECTED_FRAME(0xffffffffffffffff, &(0x7f0000000400)={0x0, 0x0, &(0x7f0000000300)={&(0x7f00000002c0)={0x1c, 0x0, 0x1, 0x0, 0x0, {{}, {@val={0x8}, @void}}}, 0x1c}}, 0x0) sendmsg$NL80211_CMD_UPDATE_FT_IES(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000001c0)={0x24, 0x0, 0x1, 0x70bd2c, 0x0, {{}, {@val={0x8}, @void}}, [@NL80211_ATTR_MDID={0x6, 0xb1, 0xc116}]}, 0x24}, 0x1, 0x0, 0x0, 0x80}, 0xc000) r0 = creat(&(0x7f00000003c0)='./file1\x00', 0x0) sendmsg$netlink(0xffffffffffffffff, 0x0, 0x0) dup(0xffffffffffffffff) pwritev2(r0, &(0x7f0000000380)=[{&(0x7f0000000180)="bd", 0xfffffdef}], 0x1, 0x1200, 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) ioctl$FS_IOC_FSSETXATTR(r1, 0x541b, &(0x7f0000000200)={0x9}) syz_io_uring_setup(0x0, &(0x7f0000000000)={0x0, 0x0, 0x4, 0x2, 0x309}, &(0x7f0000ffc000/0x2000)=nil, &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000000080), &(0x7f0000000240)) syz_io_uring_submit(0x0, 0x0, &(0x7f0000000280)=@IORING_OP_ASYNC_CANCEL={0xe, 0x0, 0x0, 0x0, 0x0, 0x12345}, 0x1ff) 04:04:11 executing program 5: creat(&(0x7f00000003c0)='./file0\x00', 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext2\x00', &(0x7f0000000100)='./file0\x00', 0x4050c, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}], 0x0, &(0x7f0000013c00)=ANY=[]) 04:04:11 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="1000000040000000030000002b00000005000000010000000000000000000000002000000020000010000000000000009f09c75f0000ffff53ef", 0x3a, 0x400}, {&(0x7f0000010080)="000000000000000000000000ede2de4df49d4f87b54a3176cfd4eb4f010040000c000000000000009f09c75f", 0x2c, 0x4e0}, {&(0x7f00000100c0)="01000000000000000000000000000000000000000401000012", 0x19, 0x560}, {&(0x7f00000100e0)="00000000000000000000000000000000000000000104", 0x16, 0x640}, {&(0x7f0000010ce0)="00000000000000000000000000000000000000000000000000000000c99b0000ed410000000400009f09c75f9f09c75f9f09c75f00000000000003000200000000000800000000000af3010004", 0x4d, 0x8c60}], 0x0, &(0x7f0000010f60)) 04:04:11 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="1000000040000000030000002b00000005000000010000000000000000000000002000000020000010000000000000009f09c75f0000ffff53ef", 0x3a, 0x400}, {&(0x7f0000010080)="000000000000000000000000ede2de4df49d4f87b54a3176cfd4eb4f010040000c000000000000009f09c75f", 0x2c, 0x4e0}, {0x0, 0x0, 0x7e0}, {&(0x7f0000010ce0)="00000000000000000000000000000000000000000000000000000000c99b0000ed410000000400009f09c75f9f09c75f9f09c75f00000000000003000200000000000800000000000af3010004", 0x4d, 0x8c60}], 0x0, &(0x7f0000010f60)) 04:04:11 executing program 6: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="1000000040000000030000002b00000005000000010000000000000000000000002000000020000010000000000000009f09c75f0000ffff53ef", 0x3a, 0x400}, {&(0x7f0000010080)="000000000000000000000000ede2de4df49d4f87b54a3176cfd4eb4f010040000c000000000000009f09c75f", 0x2c, 0x4e0}, {&(0x7f0000010100)="000000000000000000000000000000000000000000000000000000005178aedb0300000013000000", 0x28, 0x7e0}, {&(0x7f0000010ce0)="00000000000000000000000000000000000000000000000000000000c99b0000ed410000000400009f09c75f9f09c75f9f09c75f00000000000003000200000000000800000000000af301000400000000000000000000000100000004", 0x5d, 0x8c60}], 0x0, &(0x7f0000010f60)) getdents64(r0, &(0x7f0000000040)=""/4, 0x4) 04:04:11 executing program 7: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="1000000040000000030000002b00000005000000010000000000000000000000002000000020000010000000000000009f09c75f0000ffff53ef", 0x3a, 0x400}, {&(0x7f0000010100)='\x00'/21, 0x15, 0x7e0}, {&(0x7f0000010ce0)="00000000000000000000000000000000000000000000000000000000c99b0000ed410000000400009f09c75f9f09c75f9f09c75f00000000000003000200000000000800000000000af301000400000000000000000000000100000004", 0x5d, 0x8c60}], 0x0, &(0x7f0000010f60)) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) getdents64(r0, &(0x7f0000000040)=""/4, 0x4) 04:04:11 executing program 3: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="1000000040000000030000002b00000005000000010000000000000000000000002000000020000010000000000000009f09c75f0000ffff53ef", 0x3a, 0x400}, {&(0x7f0000010100)="000000000000000000000000000000000000000000000000000000005178ae", 0x1f, 0x7e0}, {&(0x7f0000010ce0)="00000000000000000000000000000000000000000000000000000000c99b0000ed410000000400009f09c75f9f09c75f9f09c75f00000000000003000200000000000800000000000af301000400000000000000000000000100000004", 0x5d, 0x8c60}], 0x0, &(0x7f0000010f60)) getdents64(r0, &(0x7f0000000040)=""/4, 0x4) 04:04:12 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="1000000040000000030000002b00000005000000010000000000000000000000002000000020000010000000000000009f09c7", 0x33, 0x400}, {&(0x7f0000010100)="000000000000000000000000000000000000000000000000000000005178aedb030000001300000023", 0x29, 0x7e0}, {&(0x7f0000010ce0)="00000000000000000000000000000000000000000000000000000000c99b0000ed410000000400009f09c75f9f09c75f9f09c75f00000000000003000200000000000800000000000af3010004000000000000000000000001", 0x59, 0x8c60}], 0x0, &(0x7f0000010f60)) [ 1853.134407] loop0: detected capacity change from 0 to 140 [ 1853.135652] loop7: detected capacity change from 0 to 140 [ 1853.141687] loop6: detected capacity change from 0 to 140 [ 1853.147572] loop3: detected capacity change from 0 to 140 [ 1853.149713] EXT4-fs (loop7): ext4_check_descriptors: Block bitmap for group 0 not in group (block 0)! [ 1853.150181] loop4: detected capacity change from 0 to 140 [ 1853.151101] EXT4-fs (loop7): group descriptors corrupted! [ 1853.156119] loop1: detected capacity change from 0 to 140 [ 1853.156457] loop5: detected capacity change from 0 to 514 [ 1853.157396] EXT4-fs (loop0): ext4_check_descriptors: Block bitmap for group 0 not in group (block 0)! [ 1853.159189] EXT4-fs (loop0): group descriptors corrupted! [ 1853.165543] EXT4-fs (loop4): ext4_check_descriptors: Block bitmap for group 0 not in group (block 0)! [ 1853.167083] EXT4-fs (loop4): group descriptors corrupted! [ 1853.168157] EXT4-fs (loop1): VFS: Can't find ext4 filesystem [ 1853.168155] EXT4-fs (loop6): ext4_check_descriptors: Inode table for group 0 not in group (block 0)! [ 1853.168185] EXT4-fs (loop6): group descriptors corrupted! [ 1853.173828] EXT4-fs (loop3): ext4_check_descriptors: Block bitmap for group 0 not in group (block 0)! [ 1853.175252] EXT4-fs (loop3): group descriptors corrupted! [ 1853.177559] EXT4-fs (loop5): mounting ext2 file system using the ext4 subsystem [ 1853.203135] EXT4-fs (loop5): warning: mounting unchecked fs, running e2fsck is recommended [ 1853.238290] EXT4-fs (loop5): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: none. 04:04:12 executing program 7: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="1000000040000000030000002b00000005000000010000000000000000000000002000000020000010000000000000009f09c75f0000ffff53ef", 0x3a, 0x400}, {&(0x7f0000010100)="000000000000000000000000000000000000000000000000000000005178ae", 0x1f, 0x7e0}, {&(0x7f0000010ce0)="00000000000000000000000000000000000000000000000000000000c99b0000ed410000000400009f09c75f9f09c75f9f09c75f00000000000003000200000000000800000000000af301000400000000000000000000000100000004", 0x5d, 0x8c60}], 0x0, &(0x7f0000010f60)) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) getdents64(r0, &(0x7f0000000040)=""/4, 0x4) 04:04:12 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="1000000040000000030000002b00000005000000010000000000000000000000002000000020000010000000000000009f09c75f0000ffff53ef", 0x3a, 0x400}, {&(0x7f0000010080)="000000000000000000000000ede2de4df49d4f87b54a3176cfd4eb4f010040000c000000000000009f09c75f", 0x2c, 0x4e0}, {0x0, 0x0, 0x7e0}, {&(0x7f0000010ce0)="00000000000000000000000000000000000000000000000000000000c99b0000ed410000000400009f09c75f9f09c75f9f09c75f00000000000003000200000000000800000000000af3010004", 0x4d, 0x8c60}], 0x0, &(0x7f0000010f60)) [ 1853.268886] loop7: detected capacity change from 0 to 140 [ 1853.273339] EXT4-fs (loop7): ext4_check_descriptors: Block bitmap for group 0 not in group (block 0)! [ 1853.274724] EXT4-fs (loop7): group descriptors corrupted! 04:04:12 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="1000000040000000030000002b00000005000000010000000000000000000000002000000020000010000000000000009f09c7", 0x33, 0x400}, {&(0x7f0000010100)="000000000000000000000000000000000000000000000000000000005178aedb030000001300000023", 0x29, 0x7e0}, {&(0x7f0000010ce0)="00000000000000000000000000000000000000000000000000000000c99b0000ed410000000400009f09c75f9f09c75f9f09c75f00000000000003000200000000000800000000000af3010004000000000000000000000001", 0x59, 0x8c60}], 0x0, &(0x7f0000010f60)) [ 1853.305610] EXT4-fs (loop5): unmounting filesystem 00000000-0000-0000-0000-000000000000. 04:04:12 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="1000000040000000030000002b00000005000000010000000000000000000000002000000020000010000000000000009f09c75f0000ffff53ef", 0x3a, 0x400}, {&(0x7f0000010080)="000000000000000000000000ede2de4df49d4f87b54a3176cfd4eb4f010040000c000000000000009f09c75f", 0x2c, 0x4e0}, {&(0x7f00000100c0)="01000000000000000000000000000000000000000401000012", 0x19, 0x560}, {&(0x7f00000100e0)="00000000000000000000000000000000000000000104", 0x16, 0x640}, {&(0x7f0000010ce0)="00000000000000000000000000000000000000000000000000000000c99b0000ed410000000400009f09c75f9f09c75f9f09c75f00000000000003000200000000000800000000000af3010004", 0x4d, 0x8c60}], 0x0, &(0x7f0000010f60)) 04:04:12 executing program 3: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="1000000040000000030000002b00000005000000010000000000000000000000002000000020000010000000000000009f09c75f0000ffff53ef", 0x3a, 0x400}, {&(0x7f0000010100)="000000000000000000000000000000000000000000000000000000005178aedb03000000", 0x24, 0x7e0}, {&(0x7f0000010ce0)="00000000000000000000000000000000000000000000000000000000c99b0000ed410000000400009f09c75f9f09c75f9f09c75f00000000000003000200000000000800000000000af301000400000000000000000000000100000004", 0x5d, 0x8c60}], 0x0, &(0x7f0000010f60)) getdents64(r0, &(0x7f0000000040)=""/4, 0x4) 04:04:12 executing program 7: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="1000000040000000030000002b00000005000000010000000000000000000000002000000020000010000000000000009f09c75f0000ffff53ef", 0x3a, 0x400}, {&(0x7f0000010100)="000000000000000000000000000000000000000000000000000000005178ae", 0x1f, 0x7e0}, {&(0x7f0000010ce0)="00000000000000000000000000000000000000000000000000000000c99b0000ed410000000400009f09c75f9f09c75f9f09c75f00000000000003000200000000000800000000000af301000400000000000000000000000100000004", 0x5d, 0x8c60}], 0x0, &(0x7f0000010f60)) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) getdents64(r0, &(0x7f0000000040)=""/4, 0x4) [ 1853.342781] loop7: detected capacity change from 0 to 140 04:04:12 executing program 6: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="1000000040000000030000002b00000005000000010000000000000000000000002000000020000010000000000000009f09c75f0000ffff53ef", 0x3a, 0x400}, {&(0x7f0000010080)="000000000000000000000000ede2de4df49d4f87b54a3176cfd4eb4f010040000c000000000000009f09c75f", 0x2c, 0x4e0}, {&(0x7f0000010100)="000000000000000000000000000000000000000000000000000000005178aedb0300000013000000", 0x28, 0x7e0}, {&(0x7f0000010ce0)="00000000000000000000000000000000000000000000000000000000c99b0000ed410000000400009f09c75f9f09c75f9f09c75f00000000000003000200000000000800000000000af301000400000000000000000000000100000004", 0x5d, 0x8c60}], 0x0, &(0x7f0000010f60)) getdents64(r0, &(0x7f0000000040)=""/4, 0x4) [ 1853.348322] EXT4-fs (loop7): ext4_check_descriptors: Block bitmap for group 0 not in group (block 0)! [ 1853.349787] EXT4-fs (loop7): group descriptors corrupted! [ 1853.429695] loop1: detected capacity change from 0 to 140 [ 1853.433225] loop0: detected capacity change from 0 to 140 [ 1853.452029] EXT4-fs (loop1): VFS: Can't find ext4 filesystem [ 1853.459285] EXT4-fs (loop0): ext4_check_descriptors: Block bitmap for group 0 not in group (block 0)! [ 1853.460989] EXT4-fs (loop0): group descriptors corrupted! [ 1853.462863] loop6: detected capacity change from 0 to 140 [ 1853.462926] loop3: detected capacity change from 0 to 140 [ 1853.475838] loop4: detected capacity change from 0 to 140 [ 1853.480441] EXT4-fs (loop6): ext4_check_descriptors: Inode table for group 0 not in group (block 0)! [ 1853.481490] EXT4-fs (loop3): ext4_check_descriptors: Inode bitmap for group 0 not in group (block 0)! [ 1853.481872] EXT4-fs (loop6): group descriptors corrupted! [ 1853.483141] EXT4-fs (loop3): group descriptors corrupted! [ 1853.505491] EXT4-fs (loop4): ext4_check_descriptors: Block bitmap for group 0 not in group (block 0)! [ 1853.506857] EXT4-fs (loop4): group descriptors corrupted! 04:04:22 executing program 2: sendmsg$NL80211_CMD_UNEXPECTED_FRAME(0xffffffffffffffff, &(0x7f0000000400)={0x0, 0x0, &(0x7f0000000300)={&(0x7f00000002c0)={0x1c, 0x0, 0x1, 0x0, 0x0, {{}, {@val={0x8}, @void}}}, 0x1c}}, 0x0) sendmsg$NL80211_CMD_UPDATE_FT_IES(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000001c0)={0x24, 0x0, 0x1, 0x70bd2c, 0x0, {{}, {@val={0x8}, @void}}, [@NL80211_ATTR_MDID={0x6, 0xb1, 0xc116}]}, 0x24}, 0x1, 0x0, 0x0, 0x80}, 0xc000) r0 = creat(&(0x7f00000003c0)='./file1\x00', 0x0) sendmsg$netlink(0xffffffffffffffff, 0x0, 0x0) dup(0xffffffffffffffff) pwritev2(r0, &(0x7f0000000380)=[{&(0x7f0000000180)="bd", 0xfffffdef}], 0x1, 0x1200, 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) ioctl$FS_IOC_FSSETXATTR(r1, 0x5421, &(0x7f0000000200)={0x9}) syz_io_uring_setup(0x0, &(0x7f0000000000)={0x0, 0x0, 0x4, 0x2, 0x309}, &(0x7f0000ffc000/0x2000)=nil, &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000000080), &(0x7f0000000240)) syz_io_uring_submit(0x0, 0x0, &(0x7f0000000280)=@IORING_OP_ASYNC_CANCEL={0xe, 0x0, 0x0, 0x0, 0x0, 0x12345}, 0x1ff) 04:04:22 executing program 6: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="1000000040000000030000002b00000005000000010000000000000000000000002000000020000010000000000000009f09c75f0000ffff53ef", 0x3a, 0x400}, {&(0x7f0000010080)="000000000000000000000000ede2de4df49d4f87b54a3176cfd4eb4f010040000c000000000000009f09c75f", 0x2c, 0x4e0}, {&(0x7f0000010100)="000000000000000000000000000000000000000000000000000000005178aedb030000001300000023", 0x29}, {&(0x7f0000010ce0)="00000000000000000000000000000000000000000000000000000000c99b0000ed410000000400009f09c75f9f09c75f9f09c75f00000000000003000200000000000800000000000af301000400000000000000000000000100000004", 0x5d, 0x8c60}], 0x0, &(0x7f0000010f60)) getdents64(r0, &(0x7f0000000040)=""/4, 0x4) 04:04:22 executing program 5: creat(&(0x7f00000003c0)='./file0\x00', 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext2\x00', &(0x7f0000000100)='./file0\x00', 0x4050d, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}], 0x0, &(0x7f0000013c00)=ANY=[]) 04:04:22 executing program 3: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="1000000040000000030000002b00000005000000010000000000000000000000002000000020000010000000000000009f09c75f0000ffff53ef", 0x3a, 0x400}, {&(0x7f0000010100)="000000000000000000000000000000000000000000000000000000005178aedb03000000", 0x24, 0x7e0}, {&(0x7f0000010ce0)="00000000000000000000000000000000000000000000000000000000c99b0000ed410000000400009f09c75f9f09c75f9f09c75f00000000000003000200000000000800000000000af301000400000000000000000000000100000004", 0x5d, 0x8c60}], 0x0, &(0x7f0000010f60)) getdents64(r0, &(0x7f0000000040)=""/4, 0x4) 04:04:22 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="1000000040000000030000002b00000005000000010000000000000000000000002000000020000010000000000000009f09c7", 0x33, 0x400}, {&(0x7f0000010100)="000000000000000000000000000000000000000000000000000000005178aedb030000001300000023", 0x29, 0x7e0}, {&(0x7f0000010ce0)="00000000000000000000000000000000000000000000000000000000c99b0000ed410000000400009f09c75f9f09c75f9f09c75f00000000000003000200000000000800000000000af3010004000000000000000000000001", 0x59, 0x8c60}], 0x0, &(0x7f0000010f60)) 04:04:22 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="1000000040000000030000002b00000005000000010000000000000000000000002000000020000010000000000000009f09c75f0000ffff53ef", 0x3a, 0x400}, {&(0x7f0000010080)="000000000000000000000000ede2de4df49d4f87b54a3176cfd4eb4f010040000c000000000000009f09c75f", 0x2c, 0x4e0}, {&(0x7f0000010100), 0x0, 0x7e0}, {&(0x7f0000010ce0)="00000000000000000000000000000000000000000000000000000000c99b0000ed410000000400009f09c75f9f09c75f9f09c75f00000000000003000200000000000800000000000af3010004", 0x4d, 0x8c60}], 0x0, &(0x7f0000010f60)) 04:04:22 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="1000000040000000030000002b00000005000000010000000000000000000000002000000020000010000000000000009f09c75f0000ffff53ef", 0x3a, 0x400}, {&(0x7f0000010080)="000000000000000000000000ede2de4df49d4f87b54a3176cfd4eb4f010040000c000000000000009f09c75f", 0x2c, 0x4e0}, {&(0x7f00000100c0)="01000000000000000000000000000000000000000401000012", 0x19, 0x560}, {&(0x7f00000100e0)="00000000000000000000000000000000000000000104", 0x16, 0x640}, {&(0x7f0000010ce0)="00000000000000000000000000000000000000000000000000000000c99b0000ed410000000400009f09c75f9f09c75f9f09c75f00000000000003000200000000000800000000000af3010004", 0x4d, 0x8c60}], 0x0, &(0x7f0000010f60)) 04:04:22 executing program 7: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="1000000040000000030000002b00000005000000010000000000000000000000002000000020000010000000000000009f09c75f0000ffff53ef", 0x3a, 0x400}, {&(0x7f0000010100)="000000000000000000000000000000000000000000000000000000005178ae", 0x1f, 0x7e0}, {&(0x7f0000010ce0)="00000000000000000000000000000000000000000000000000000000c99b0000ed410000000400009f09c75f9f09c75f9f09c75f00000000000003000200000000000800000000000af301000400000000000000000000000100000004", 0x5d, 0x8c60}], 0x0, &(0x7f0000010f60)) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) getdents64(r0, &(0x7f0000000040)=""/4, 0x4) [ 1863.205264] loop6: detected capacity change from 0 to 140 [ 1863.214471] loop3: detected capacity change from 0 to 140 [ 1863.215662] loop0: detected capacity change from 0 to 140 [ 1863.217235] loop5: detected capacity change from 0 to 514 [ 1863.229136] EXT4-fs (loop3): ext4_check_descriptors: Inode bitmap for group 0 not in group (block 0)! [ 1863.229852] EXT4-fs (loop3): group descriptors corrupted! [ 1863.230897] EXT4-fs (loop5): mounting ext2 file system using the ext4 subsystem [ 1863.235168] EXT4-fs (loop0): ext4_check_descriptors: Block bitmap for group 0 not in group (block 0)! [ 1863.235858] EXT4-fs (loop0): group descriptors corrupted! [ 1863.236715] EXT4-fs (loop5): warning: mounting unchecked fs, running e2fsck is recommended [ 1863.240696] loop1: detected capacity change from 0 to 140 [ 1863.242655] EXT4-fs (loop6): ext4_check_descriptors: Block bitmap for group 0 not in group (block 0)! [ 1863.244142] EXT4-fs (loop6): group descriptors corrupted! [ 1863.246812] loop4: detected capacity change from 0 to 140 [ 1863.247834] EXT4-fs (loop5): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: none. [ 1863.250380] loop7: detected capacity change from 0 to 140 [ 1863.255747] EXT4-fs (loop5): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 1863.268097] EXT4-fs (loop1): VFS: Can't find ext4 filesystem [ 1863.269704] EXT4-fs (loop4): ext4_check_descriptors: Block bitmap for group 0 not in group (block 0)! [ 1863.271223] EXT4-fs (loop4): group descriptors corrupted! [ 1863.278600] EXT4-fs (loop7): ext4_check_descriptors: Block bitmap for group 0 not in group (block 0)! [ 1863.280202] EXT4-fs (loop7): group descriptors corrupted! 04:04:22 executing program 3: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="1000000040000000030000002b00000005000000010000000000000000000000002000000020000010000000000000009f09c75f0000ffff53ef", 0x3a, 0x400}, {&(0x7f0000010100)="000000000000000000000000000000000000000000000000000000005178aedb03000000", 0x24, 0x7e0}, {&(0x7f0000010ce0)="00000000000000000000000000000000000000000000000000000000c99b0000ed410000000400009f09c75f9f09c75f9f09c75f00000000000003000200000000000800000000000af301000400000000000000000000000100000004", 0x5d, 0x8c60}], 0x0, &(0x7f0000010f60)) getdents64(r0, &(0x7f0000000040)=""/4, 0x4) 04:04:22 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="1000000040000000030000002b00000005000000010000000000000000000000002000000020000010000000000000009f09c75f0000ffff53ef", 0x3a, 0x400}, {&(0x7f0000010080)="000000000000000000000000ede2de4df49d4f87b54a3176cfd4eb4f010040000c000000000000009f09c75f", 0x2c, 0x4e0}, {&(0x7f0000010100), 0x0, 0x7e0}, {&(0x7f0000010ce0)="00000000000000000000000000000000000000000000000000000000c99b0000ed410000000400009f09c75f9f09c75f9f09c75f00000000000003000200000000000800000000000af3010004", 0x4d, 0x8c60}], 0x0, &(0x7f0000010f60)) [ 1863.347909] loop0: detected capacity change from 0 to 140 [ 1863.354171] EXT4-fs (loop0): ext4_check_descriptors: Block bitmap for group 0 not in group (block 0)! [ 1863.354858] EXT4-fs (loop0): group descriptors corrupted! 04:04:22 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="1000000040000000030000002b00000005000000010000000000000000000000002000000020000010000000000000009f09c75f0000ff", 0x37, 0x400}, {&(0x7f0000010100)="000000000000000000000000000000000000000000000000000000005178aedb030000001300000023", 0x29, 0x7e0}, {&(0x7f0000010ce0)="00000000000000000000000000000000000000000000000000000000c99b0000ed410000000400009f09c75f9f09c75f9f09c75f00000000000003000200000000000800000000000af3010004000000000000000000000001", 0x59, 0x8c60}], 0x0, &(0x7f0000010f60)) 04:04:22 executing program 6: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="1000000040000000030000002b00000005000000010000000000000000000000002000000020000010000000000000009f09c75f0000ffff53ef", 0x3a, 0x400}, {&(0x7f0000010080)="000000000000000000000000ede2de4df49d4f87b54a3176cfd4eb4f010040000c000000000000009f09c75f", 0x2c, 0x4e0}, {&(0x7f0000010100)="000000000000000000000000000000000000000000000000000000005178aedb030000001300000023", 0x29}, {&(0x7f0000010ce0)="00000000000000000000000000000000000000000000000000000000c99b0000ed410000000400009f09c75f9f09c75f9f09c75f00000000000003000200000000000800000000000af301000400000000000000000000000100000004", 0x5d, 0x8c60}], 0x0, &(0x7f0000010f60)) getdents64(r0, &(0x7f0000000040)=""/4, 0x4) 04:04:22 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="1000000040000000030000002b00000005000000010000000000000000000000002000000020000010000000000000009f09c75f0000ffff53ef", 0x3a, 0x400}, {&(0x7f0000010080)="000000000000000000000000ede2de4df49d4f87b54a3176cfd4eb4f010040000c000000000000009f09c75f", 0x2c, 0x4e0}, {&(0x7f0000010100), 0x0, 0x7e0}, {&(0x7f0000010ce0)="00000000000000000000000000000000000000000000000000000000c99b0000ed410000000400009f09c75f9f09c75f9f09c75f00000000000003000200000000000800000000000af3010004", 0x4d, 0x8c60}], 0x0, &(0x7f0000010f60)) [ 1863.382391] loop3: detected capacity change from 0 to 140 04:04:22 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="1000000040000000030000002b00000005000000010000000000000000000000002000000020000010000000000000009f09c75f0000ffff53ef", 0x3a, 0x400}, {&(0x7f0000010080)="000000000000000000000000ede2de4df49d4f87b54a3176cfd4eb4f010040000c000000000000009f09c75f", 0x2c, 0x4e0}, {&(0x7f00000100c0)="01000000000000000000000000000000000000000401000012", 0x19, 0x560}, {&(0x7f00000100e0)="00000000000000000000000000000000000000000104", 0x16, 0x640}, {0x0, 0x0, 0x7e0}, {&(0x7f0000010ce0)="00000000000000000000000000000000000000000000000000000000c99b0000ed410000000400009f09c75f9f09c75f9f09c75f00000000000003000200000000000800000000000af3010004", 0x4d, 0x8c60}], 0x0, &(0x7f0000010f60)) [ 1863.392993] EXT4-fs (loop3): ext4_check_descriptors: Inode bitmap for group 0 not in group (block 0)! [ 1863.393915] EXT4-fs (loop3): group descriptors corrupted! [ 1863.413215] loop1: detected capacity change from 0 to 140 04:04:22 executing program 5: creat(&(0x7f00000003c0)='./file0\x00', 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext2\x00', &(0x7f0000000100)='./file0\x00', 0x40600, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}], 0x0, &(0x7f0000013c00)=ANY=[]) 04:04:22 executing program 7: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="1000000040000000030000002b00000005000000010000000000000000000000002000000020000010000000000000009f09c75f0000ffff53ef", 0x3a, 0x400}, {&(0x7f0000010100)="000000000000000000000000000000000000000000000000000000005178aedb03000000", 0x24, 0x7e0}, {&(0x7f0000010ce0)="00000000000000000000000000000000000000000000000000000000c99b0000ed410000000400009f09c75f9f09c75f9f09c75f00000000000003000200000000000800000000000af301000400000000000000000000000100000004", 0x5d, 0x8c60}], 0x0, &(0x7f0000010f60)) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) getdents64(r0, &(0x7f0000000040)=""/4, 0x4) [ 1863.422871] loop6: detected capacity change from 0 to 140 [ 1863.426388] EXT4-fs (loop1): VFS: Can't find ext4 filesystem [ 1863.442997] EXT4-fs (loop6): ext4_check_descriptors: Block bitmap for group 0 not in group (block 0)! [ 1863.443172] loop0: detected capacity change from 0 to 140 [ 1863.444498] EXT4-fs (loop6): group descriptors corrupted! [ 1863.462300] EXT4-fs (loop0): ext4_check_descriptors: Block bitmap for group 0 not in group (block 0)! [ 1863.463048] EXT4-fs (loop0): group descriptors corrupted! [ 1863.472523] loop5: detected capacity change from 0 to 515 [ 1863.479198] EXT4-fs (loop5): mounting ext2 file system using the ext4 subsystem [ 1863.481473] EXT4-fs (loop5): warning: mounting unchecked fs, running e2fsck is recommended [ 1863.487149] loop4: detected capacity change from 0 to 140 [ 1863.488438] EXT4-fs (loop5): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: none. [ 1863.495685] loop7: detected capacity change from 0 to 140 [ 1863.501123] EXT4-fs (loop5): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 1863.504407] EXT4-fs (loop7): ext4_check_descriptors: Inode bitmap for group 0 not in group (block 0)! [ 1863.505125] EXT4-fs (loop7): group descriptors corrupted! [ 1863.524443] loop5: detected capacity change from 0 to 515 [ 1863.533491] EXT4-fs (loop4): ext4_check_descriptors: Block bitmap for group 0 not in group (block 0)! [ 1863.534208] EXT4-fs (loop4): group descriptors corrupted! 04:04:32 executing program 3: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="1000000040000000030000002b00000005000000010000000000000000000000002000000020000010000000000000009f09c75f0000ffff53ef", 0x3a, 0x400}, {&(0x7f0000010100)="000000000000000000000000000000000000000000000000000000005178aedb03000000130000", 0x27, 0x7e0}, {&(0x7f0000010ce0)="00000000000000000000000000000000000000000000000000000000c99b0000ed410000000400009f09c75f9f09c75f9f09c75f00000000000003000200000000000800000000000af301000400000000000000000000000100000004", 0x5d, 0x8c60}], 0x0, &(0x7f0000010f60)) getdents64(r0, &(0x7f0000000040)=""/4, 0x4) 04:04:32 executing program 2: sendmsg$NL80211_CMD_UNEXPECTED_FRAME(0xffffffffffffffff, &(0x7f0000000400)={0x0, 0x0, &(0x7f0000000300)={&(0x7f00000002c0)={0x1c, 0x0, 0x1, 0x0, 0x0, {{}, {@val={0x8}, @void}}}, 0x1c}}, 0x0) sendmsg$NL80211_CMD_UPDATE_FT_IES(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000001c0)={0x24, 0x0, 0x1, 0x70bd2c, 0x0, {{}, {@val={0x8}, @void}}, [@NL80211_ATTR_MDID={0x6, 0xb1, 0xc116}]}, 0x24}, 0x1, 0x0, 0x0, 0x80}, 0xc000) r0 = creat(&(0x7f00000003c0)='./file1\x00', 0x0) sendmsg$netlink(0xffffffffffffffff, 0x0, 0x0) dup(0xffffffffffffffff) pwritev2(r0, &(0x7f0000000380)=[{&(0x7f0000000180)="bd", 0xfffffdef}], 0x1, 0x1200, 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) ioctl$FS_IOC_FSSETXATTR(r1, 0x5450, &(0x7f0000000200)={0x9}) syz_io_uring_setup(0x0, &(0x7f0000000000)={0x0, 0x0, 0x4, 0x2, 0x309}, &(0x7f0000ffc000/0x2000)=nil, &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000000080), &(0x7f0000000240)) syz_io_uring_submit(0x0, 0x0, &(0x7f0000000280)=@IORING_OP_ASYNC_CANCEL={0xe, 0x0, 0x0, 0x0, 0x0, 0x12345}, 0x1ff) 04:04:32 executing program 7: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="1000000040000000030000002b00000005000000010000000000000000000000002000000020000010000000000000009f09c75f0000ffff53ef", 0x3a, 0x400}, {&(0x7f0000010100)="000000000000000000000000000000000000000000000000000000005178aedb03000000", 0x24, 0x7e0}, {&(0x7f0000010ce0)="00000000000000000000000000000000000000000000000000000000c99b0000ed410000000400009f09c75f9f09c75f9f09c75f00000000000003000200000000000800000000000af301000400000000000000000000000100000004", 0x5d, 0x8c60}], 0x0, &(0x7f0000010f60)) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) getdents64(r0, &(0x7f0000000040)=""/4, 0x4) 04:04:32 executing program 6: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="1000000040000000030000002b00000005000000010000000000000000000000002000000020000010000000000000009f09c75f0000ffff53ef", 0x3a, 0x400}, {&(0x7f0000010080)="000000000000000000000000ede2de4df49d4f87b54a3176cfd4eb4f010040000c000000000000009f09c75f", 0x2c, 0x4e0}, {&(0x7f0000010100)="000000000000000000000000000000000000000000000000000000005178aedb030000001300000023", 0x29}, {&(0x7f0000010ce0)="00000000000000000000000000000000000000000000000000000000c99b0000ed410000000400009f09c75f9f09c75f9f09c75f00000000000003000200000000000800000000000af301000400000000000000000000000100000004", 0x5d, 0x8c60}], 0x0, &(0x7f0000010f60)) getdents64(r0, &(0x7f0000000040)=""/4, 0x4) 04:04:32 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="1000000040000000030000002b00000005000000010000000000000000000000002000000020000010000000000000009f09c75f0000ff", 0x37, 0x400}, {&(0x7f0000010100)="000000000000000000000000000000000000000000000000000000005178aedb030000001300000023", 0x29, 0x7e0}, {&(0x7f0000010ce0)="00000000000000000000000000000000000000000000000000000000c99b0000ed410000000400009f09c75f9f09c75f9f09c75f00000000000003000200000000000800000000000af3010004000000000000000000000001", 0x59, 0x8c60}], 0x0, &(0x7f0000010f60)) 04:04:32 executing program 5: creat(&(0x7f00000003c0)='./file0\x00', 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext2\x00', &(0x7f0000000100)='./file0\x00', 0x40633, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}], 0x0, &(0x7f0000013c00)=ANY=[]) 04:04:32 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="1000000040000000030000002b00000005000000010000000000000000000000002000000020000010000000000000009f09c75f0000ffff53ef", 0x3a, 0x400}, {&(0x7f0000010080)="000000000000000000000000ede2de4df49d4f87b54a3176cfd4eb4f010040000c000000000000009f09c75f", 0x2c, 0x4e0}, {&(0x7f0000010100)='\x00'/21, 0x15, 0x7e0}, {&(0x7f0000010ce0)="00000000000000000000000000000000000000000000000000000000c99b0000ed410000000400009f09c75f9f09c75f9f09c75f00000000000003000200000000000800000000000af3010004", 0x4d, 0x8c60}], 0x0, &(0x7f0000010f60)) 04:04:32 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="1000000040000000030000002b00000005000000010000000000000000000000002000000020000010000000000000009f09c75f0000ffff53ef", 0x3a, 0x400}, {&(0x7f0000010080)="000000000000000000000000ede2de4df49d4f87b54a3176cfd4eb4f010040000c000000000000009f09c75f", 0x2c, 0x4e0}, {&(0x7f00000100c0)="01000000000000000000000000000000000000000401000012", 0x19, 0x560}, {&(0x7f00000100e0)="00000000000000000000000000000000000000000104", 0x16, 0x640}, {0x0, 0x0, 0x7e0}, {&(0x7f0000010ce0)="00000000000000000000000000000000000000000000000000000000c99b0000ed410000000400009f09c75f9f09c75f9f09c75f00000000000003000200000000000800000000000af3010004", 0x4d, 0x8c60}], 0x0, &(0x7f0000010f60)) [ 1873.443354] loop6: detected capacity change from 0 to 140 [ 1873.444339] loop7: detected capacity change from 0 to 140 [ 1873.453544] EXT4-fs (loop7): ext4_check_descriptors: Inode bitmap for group 0 not in group (block 0)! [ 1873.455129] EXT4-fs (loop7): group descriptors corrupted! [ 1873.458448] EXT4-fs (loop6): ext4_check_descriptors: Block bitmap for group 0 not in group (block 0)! [ 1873.459866] EXT4-fs (loop6): group descriptors corrupted! [ 1873.488188] loop4: detected capacity change from 0 to 140 [ 1873.490477] loop5: detected capacity change from 0 to 515 [ 1873.491329] loop0: detected capacity change from 0 to 140 [ 1873.500699] loop1: detected capacity change from 0 to 140 [ 1873.501308] EXT4-fs (loop5): mounting ext2 file system using the ext4 subsystem [ 1873.506647] EXT4-fs (loop4): ext4_check_descriptors: Block bitmap for group 0 not in group (block 0)! [ 1873.508280] EXT4-fs (loop4): group descriptors corrupted! [ 1873.515574] EXT4-fs (loop0): ext4_check_descriptors: Block bitmap for group 0 not in group (block 0)! [ 1873.516462] EXT4-fs (loop5): warning: mounting unchecked fs, running e2fsck is recommended [ 1873.517025] EXT4-fs (loop0): group descriptors corrupted! [ 1873.522873] loop3: detected capacity change from 0 to 140 [ 1873.529434] EXT4-fs (loop1): VFS: Can't find ext4 filesystem [ 1873.537625] EXT4-fs (loop5): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: none. [ 1873.551767] EXT4-fs (loop5): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 1873.553472] EXT4-fs (loop3): ext4_check_descriptors: Inode table for group 0 not in group (block 0)! [ 1873.554991] EXT4-fs (loop3): group descriptors corrupted! 04:04:32 executing program 6: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="1000000040000000030000002b00000005000000010000000000000000000000002000000020000010000000000000009f09c75f0000ffff53ef", 0x3a, 0x400}, {&(0x7f0000010100)="000000000000000000000000000000000000000000000000000000005178aedb030000001300000023", 0x29, 0x7e0}, {&(0x7f0000010ce0)="00000000000000000000000000000000000000000000000000000000c99b0000ed410000000400009f09c75f9f09c75f9f09c75f00000000000003000200000000000800000000000af301000400000000000000000000000100000004", 0x5d, 0x8c60}], 0x0, &(0x7f0000010f60)) getdents64(r0, &(0x7f0000000040)=""/4, 0x4) 04:04:32 executing program 7: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="1000000040000000030000002b00000005000000010000000000000000000000002000000020000010000000000000009f09c75f0000ffff53ef", 0x3a, 0x400}, {&(0x7f0000010100)="000000000000000000000000000000000000000000000000000000005178aedb03000000", 0x24, 0x7e0}, {&(0x7f0000010ce0)="00000000000000000000000000000000000000000000000000000000c99b0000ed410000000400009f09c75f9f09c75f9f09c75f00000000000003000200000000000800000000000af301000400000000000000000000000100000004", 0x5d, 0x8c60}], 0x0, &(0x7f0000010f60)) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) getdents64(r0, &(0x7f0000000040)=""/4, 0x4) [ 1873.658524] loop6: detected capacity change from 0 to 140 04:04:32 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="1000000040000000030000002b00000005000000010000000000000000000000002000000020000010000000000000009f09c75f0000ffff53ef", 0x3a, 0x400}, {&(0x7f0000010080)="000000000000000000000000ede2de4df49d4f87b54a3176cfd4eb4f010040000c000000000000009f09c75f", 0x2c, 0x4e0}, {&(0x7f0000010100)='\x00'/21, 0x15, 0x7e0}, {&(0x7f0000010ce0)="00000000000000000000000000000000000000000000000000000000c99b0000ed410000000400009f09c75f9f09c75f9f09c75f00000000000003000200000000000800000000000af3010004", 0x4d, 0x8c60}], 0x0, &(0x7f0000010f60)) 04:04:32 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="1000000040000000030000002b00000005000000010000000000000000000000002000000020000010000000000000009f09c75f0000ffff53ef", 0x3a, 0x400}, {&(0x7f0000010080)="000000000000000000000000ede2de4df49d4f87b54a3176cfd4eb4f010040000c000000000000009f09c75f", 0x2c, 0x4e0}, {&(0x7f00000100c0)="01000000000000000000000000000000000000000401000012", 0x19, 0x560}, {&(0x7f00000100e0)="00000000000000000000000000000000000000000104", 0x16, 0x640}, {0x0, 0x0, 0x7e0}, {&(0x7f0000010ce0)="00000000000000000000000000000000000000000000000000000000c99b0000ed410000000400009f09c75f9f09c75f9f09c75f00000000000003000200000000000800000000000af3010004", 0x4d, 0x8c60}], 0x0, &(0x7f0000010f60)) [ 1873.676188] EXT4-fs (loop6): warning: mounting unchecked fs, running e2fsck is recommended [ 1873.683071] EXT4-fs (loop6): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: none. 04:04:32 executing program 3: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="1000000040000000030000002b00000005000000010000000000000000000000002000000020000010000000000000009f09c75f0000ffff53ef", 0x3a, 0x400}, {&(0x7f0000010100)="000000000000000000000000000000000000000000000000000000005178aedb03000000130000", 0x27, 0x7e0}, {&(0x7f0000010ce0)="00000000000000000000000000000000000000000000000000000000c99b0000ed410000000400009f09c75f9f09c75f9f09c75f00000000000003000200000000000800000000000af301000400000000000000000000000100000004", 0x5d, 0x8c60}], 0x0, &(0x7f0000010f60)) getdents64(r0, &(0x7f0000000040)=""/4, 0x4) 04:04:32 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="1000000040000000030000002b00000005000000010000000000000000000000002000000020000010000000000000009f09c75f0000ff", 0x37, 0x400}, {&(0x7f0000010100)="000000000000000000000000000000000000000000000000000000005178aedb030000001300000023", 0x29, 0x7e0}, {&(0x7f0000010ce0)="00000000000000000000000000000000000000000000000000000000c99b0000ed410000000400009f09c75f9f09c75f9f09c75f00000000000003000200000000000800000000000af3010004000000000000000000000001", 0x59, 0x8c60}], 0x0, &(0x7f0000010f60)) 04:04:32 executing program 5: creat(&(0x7f00000003c0)='./file0\x00', 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext2\x00', &(0x7f0000000100)='./file0\x00', 0x40700, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}], 0x0, &(0x7f0000013c00)=ANY=[]) [ 1873.687553] EXT4-fs error (device loop6): ext4_readdir:262: inode #2: block 4: comm syz-executor.6: path /syzkaller-testdir823133109/syzkaller.UCZRXl/348/mnt: bad entry in directory: rec_len is smaller than minimal - offset=0, inode=0, rec_len=0, size=1024 fake=0 [ 1873.730083] loop3: detected capacity change from 0 to 140 [ 1873.735731] EXT4-fs (loop3): ext4_check_descriptors: Inode table for group 0 not in group (block 0)! [ 1873.737153] EXT4-fs (loop3): group descriptors corrupted! [ 1873.742370] EXT4-fs (loop6): unmounting filesystem 00000000-0000-0000-0000-000000000000. 04:04:32 executing program 6: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="1000000040000000030000002b00000005000000010000000000000000000000002000000020000010000000000000009f09c75f0000ffff53ef", 0x3a, 0x400}, {0x0, 0x0, 0x7e0}, {&(0x7f0000010ce0)="00000000000000000000000000000000000000000000000000000000c99b0000ed410000000400009f09c75f9f09c75f9f09c75f00000000000003000200000000000800000000000af301000400000000000000000000000100000004", 0x5d, 0x8c60}], 0x0, &(0x7f0000010f60)) getdents64(r0, &(0x7f0000000040)=""/4, 0x4) [ 1873.812202] loop7: detected capacity change from 0 to 140 [ 1873.819501] loop4: detected capacity change from 0 to 140 [ 1873.846304] EXT4-fs (loop4): ext4_check_descriptors: Block bitmap for group 0 not in group (block 0)! [ 1873.847743] EXT4-fs (loop4): group descriptors corrupted! [ 1873.857842] EXT4-fs (loop7): ext4_check_descriptors: Inode bitmap for group 0 not in group (block 0)! [ 1873.859511] EXT4-fs (loop7): group descriptors corrupted! [ 1873.861870] loop0: detected capacity change from 0 to 140 [ 1873.864545] loop1: detected capacity change from 0 to 140 [ 1873.866972] loop5: detected capacity change from 0 to 515 [ 1873.901034] EXT4-fs (loop5): mounting ext2 file system using the ext4 subsystem [ 1873.906364] EXT4-fs (loop0): ext4_check_descriptors: Block bitmap for group 0 not in group (block 0)! [ 1873.908142] EXT4-fs (loop0): group descriptors corrupted! [ 1873.917483] EXT4-fs (loop1): VFS: Can't find ext4 filesystem [ 1873.920904] EXT4-fs (loop5): warning: mounting unchecked fs, running e2fsck is recommended [ 1873.923271] loop6: detected capacity change from 0 to 140 04:04:32 executing program 3: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="1000000040000000030000002b00000005000000010000000000000000000000002000000020000010000000000000009f09c75f0000ffff53ef", 0x3a, 0x400}, {&(0x7f0000010100)="000000000000000000000000000000000000000000000000000000005178aedb03000000130000", 0x27, 0x7e0}, {&(0x7f0000010ce0)="00000000000000000000000000000000000000000000000000000000c99b0000ed410000000400009f09c75f9f09c75f9f09c75f00000000000003000200000000000800000000000af301000400000000000000000000000100000004", 0x5d, 0x8c60}], 0x0, &(0x7f0000010f60)) getdents64(r0, &(0x7f0000000040)=""/4, 0x4) [ 1873.936575] EXT4-fs (loop5): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: none. [ 1873.949891] EXT4-fs (loop5): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 1874.010314] EXT4-fs (loop6): ext4_check_descriptors: Block bitmap for group 0 not in group (block 0)! [ 1874.011755] EXT4-fs (loop6): group descriptors corrupted! [ 1874.065822] loop3: detected capacity change from 0 to 140 [ 1874.081399] EXT4-fs (loop3): ext4_check_descriptors: Inode table for group 0 not in group (block 0)! [ 1874.082844] EXT4-fs (loop3): group descriptors corrupted! 04:04:43 executing program 2: sendmsg$NL80211_CMD_UNEXPECTED_FRAME(0xffffffffffffffff, &(0x7f0000000400)={0x0, 0x0, &(0x7f0000000300)={&(0x7f00000002c0)={0x1c, 0x0, 0x1, 0x0, 0x0, {{}, {@val={0x8}, @void}}}, 0x1c}}, 0x0) sendmsg$NL80211_CMD_UPDATE_FT_IES(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000001c0)={0x24, 0x0, 0x1, 0x70bd2c, 0x0, {{}, {@val={0x8}, @void}}, [@NL80211_ATTR_MDID={0x6, 0xb1, 0xc116}]}, 0x24}, 0x1, 0x0, 0x0, 0x80}, 0xc000) r0 = creat(&(0x7f00000003c0)='./file1\x00', 0x0) sendmsg$netlink(0xffffffffffffffff, 0x0, 0x0) dup(0xffffffffffffffff) pwritev2(r0, &(0x7f0000000380)=[{&(0x7f0000000180)="bd", 0xfffffdef}], 0x1, 0x1200, 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) ioctl$FS_IOC_FSSETXATTR(r1, 0x5451, &(0x7f0000000200)={0x9}) syz_io_uring_setup(0x0, &(0x7f0000000000)={0x0, 0x0, 0x4, 0x2, 0x309}, &(0x7f0000ffc000/0x2000)=nil, &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000000080), &(0x7f0000000240)) syz_io_uring_submit(0x0, 0x0, &(0x7f0000000280)=@IORING_OP_ASYNC_CANCEL={0xe, 0x0, 0x0, 0x0, 0x0, 0x12345}, 0x1ff) 04:04:43 executing program 6: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="1000000040000000030000002b00000005000000010000000000000000000000002000000020000010000000000000009f09c75f0000ffff53ef", 0x3a, 0x400}, {0x0, 0x0, 0x7e0}, {&(0x7f0000010ce0)="00000000000000000000000000000000000000000000000000000000c99b0000ed410000000400009f09c75f9f09c75f9f09c75f00000000000003000200000000000800000000000af301000400000000000000000000000100000004", 0x5d, 0x8c60}], 0x0, &(0x7f0000010f60)) getdents64(r0, &(0x7f0000000040)=""/4, 0x4) 04:04:43 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="1000000040000000030000002b00000005000000010000000000000000000000002000000020000010000000000000009f09c75f0000ffff53", 0x39, 0x400}, {&(0x7f0000010100)="000000000000000000000000000000000000000000000000000000005178aedb030000001300000023", 0x29, 0x7e0}, {&(0x7f0000010ce0)="00000000000000000000000000000000000000000000000000000000c99b0000ed410000000400009f09c75f9f09c75f9f09c75f00000000000003000200000000000800000000000af3010004000000000000000000000001", 0x59, 0x8c60}], 0x0, &(0x7f0000010f60)) 04:04:43 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="1000000040000000030000002b00000005000000010000000000000000000000002000000020000010000000000000009f09c75f0000ffff53ef", 0x3a, 0x400}, {&(0x7f0000010080)="000000000000000000000000ede2de4df49d4f87b54a3176cfd4eb4f010040000c000000000000009f09c75f", 0x2c, 0x4e0}, {&(0x7f0000010100)='\x00'/21, 0x15, 0x7e0}, {&(0x7f0000010ce0)="00000000000000000000000000000000000000000000000000000000c99b0000ed410000000400009f09c75f9f09c75f9f09c75f00000000000003000200000000000800000000000af3010004", 0x4d, 0x8c60}], 0x0, &(0x7f0000010f60)) 04:04:43 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="1000000040000000030000002b00000005000000010000000000000000000000002000000020000010000000000000009f09c75f0000ffff53ef", 0x3a, 0x400}, {&(0x7f0000010080)="000000000000000000000000ede2de4df49d4f87b54a3176cfd4eb4f010040000c000000000000009f09c75f", 0x2c, 0x4e0}, {&(0x7f00000100c0)="01000000000000000000000000000000000000000401000012", 0x19, 0x560}, {&(0x7f00000100e0)="00000000000000000000000000000000000000000104", 0x16, 0x640}, {&(0x7f0000010100), 0x0, 0x7e0}, {&(0x7f0000010ce0)="00000000000000000000000000000000000000000000000000000000c99b0000ed410000000400009f09c75f9f09c75f9f09c75f00000000000003000200000000000800000000000af3010004", 0x4d, 0x8c60}], 0x0, &(0x7f0000010f60)) 04:04:43 executing program 3: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="1000000040000000030000002b00000005000000010000000000000000000000002000000020000010000000000000009f09c75f0000ffff53ef", 0x3a, 0x400}, {&(0x7f0000010100)="000000000000000000000000000000000000000000000000000000005178aedb0300000013000000", 0x28, 0x7e0}, {&(0x7f0000010ce0)="00000000000000000000000000000000000000000000000000000000c99b0000ed410000000400009f09c75f9f09c75f9f09c75f00000000000003000200000000000800000000000af301000400000000000000000000000100000004", 0x5d, 0x8c60}], 0x0, &(0x7f0000010f60)) getdents64(r0, &(0x7f0000000040)=""/4, 0x4) 04:04:43 executing program 7: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="1000000040000000030000002b00000005000000010000000000000000000000002000000020000010000000000000009f09c75f0000ffff53ef", 0x3a, 0x400}, {&(0x7f0000010100)="000000000000000000000000000000000000000000000000000000005178aedb03000000130000", 0x27, 0x7e0}, {&(0x7f0000010ce0)="00000000000000000000000000000000000000000000000000000000c99b0000ed410000000400009f09c75f9f09c75f9f09c75f00000000000003000200000000000800000000000af301000400000000000000000000000100000004", 0x5d, 0x8c60}], 0x0, &(0x7f0000010f60)) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) getdents64(r0, &(0x7f0000000040)=""/4, 0x4) 04:04:43 executing program 5: creat(&(0x7f00000003c0)='./file0\x00', 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext2\x00', &(0x7f0000000100)='./file0\x00', 0x4079f, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}], 0x0, &(0x7f0000013c00)=ANY=[]) [ 1884.136803] loop1: detected capacity change from 0 to 140 [ 1884.138169] loop7: detected capacity change from 0 to 140 [ 1884.144974] EXT4-fs (loop1): VFS: Can't find ext4 filesystem [ 1884.145618] EXT4-fs (loop7): ext4_check_descriptors: Inode table for group 0 not in group (block 0)! [ 1884.146439] EXT4-fs (loop7): group descriptors corrupted! [ 1884.173052] loop6: detected capacity change from 0 to 140 [ 1884.175479] loop4: detected capacity change from 0 to 140 [ 1884.177351] loop3: detected capacity change from 0 to 140 [ 1884.178385] loop5: detected capacity change from 0 to 515 [ 1884.178649] loop0: detected capacity change from 0 to 140 [ 1884.188285] EXT4-fs (loop5): mounting ext2 file system using the ext4 subsystem [ 1884.192084] EXT4-fs (loop3): ext4_check_descriptors: Inode table for group 0 not in group (block 0)! [ 1884.193532] EXT4-fs (loop3): group descriptors corrupted! [ 1884.196038] EXT4-fs (loop6): ext4_check_descriptors: Block bitmap for group 0 not in group (block 0)! [ 1884.197528] EXT4-fs (loop0): ext4_check_descriptors: Block bitmap for group 0 not in group (block 0)! [ 1884.197543] EXT4-fs (loop0): group descriptors corrupted! [ 1884.198943] EXT4-fs (loop5): warning: mounting unchecked fs, running e2fsck is recommended [ 1884.199157] EXT4-fs (loop6): group descriptors corrupted! [ 1884.202369] EXT4-fs (loop4): ext4_check_descriptors: Block bitmap for group 0 not in group (block 0)! [ 1884.203996] EXT4-fs (loop4): group descriptors corrupted! 04:04:43 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="1000000040000000030000002b00000005000000010000000000000000000000002000000020000010000000000000009f09c75f0000ffff53", 0x39, 0x400}, {&(0x7f0000010100)="000000000000000000000000000000000000000000000000000000005178aedb030000001300000023", 0x29, 0x7e0}, {&(0x7f0000010ce0)="00000000000000000000000000000000000000000000000000000000c99b0000ed410000000400009f09c75f9f09c75f9f09c75f00000000000003000200000000000800000000000af3010004000000000000000000000001", 0x59, 0x8c60}], 0x0, &(0x7f0000010f60)) 04:04:43 executing program 7: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="1000000040000000030000002b00000005000000010000000000000000000000002000000020000010000000000000009f09c75f0000ffff53ef", 0x3a, 0x400}, {&(0x7f0000010100)="000000000000000000000000000000000000000000000000000000005178aedb03000000130000", 0x27, 0x7e0}, {&(0x7f0000010ce0)="00000000000000000000000000000000000000000000000000000000c99b0000ed410000000400009f09c75f9f09c75f9f09c75f00000000000003000200000000000800000000000af301000400000000000000000000000100000004", 0x5d, 0x8c60}], 0x0, &(0x7f0000010f60)) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) getdents64(r0, &(0x7f0000000040)=""/4, 0x4) [ 1884.238685] EXT4-fs (loop5): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: none. [ 1884.261394] EXT4-fs (loop5): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 1884.272718] loop1: detected capacity change from 0 to 140 [ 1884.279543] loop7: detected capacity change from 0 to 140 [ 1884.289614] EXT4-fs (loop7): ext4_check_descriptors: Inode table for group 0 not in group (block 0)! [ 1884.291130] EXT4-fs (loop7): group descriptors corrupted! 04:04:43 executing program 3: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="1000000040000000030000002b00000005000000010000000000000000000000002000000020000010000000000000009f09c75f0000ffff53ef", 0x3a, 0x400}, {&(0x7f0000010100)="000000000000000000000000000000000000000000000000000000005178aedb0300000013000000", 0x28, 0x7e0}, {&(0x7f0000010ce0)="00000000000000000000000000000000000000000000000000000000c99b0000ed410000000400009f09c75f9f09c75f9f09c75f00000000000003000200000000000800000000000af301000400000000000000000000000100000004", 0x5d, 0x8c60}], 0x0, &(0x7f0000010f60)) getdents64(r0, &(0x7f0000000040)=""/4, 0x4) 04:04:43 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="1000000040000000030000002b00000005000000010000000000000000000000002000000020000010000000000000009f09c75f0000ffff53ef", 0x3a, 0x400}, {&(0x7f0000010080)="000000000000000000000000ede2de4df49d4f87b54a3176cfd4eb4f010040000c000000000000009f09c75f", 0x2c, 0x4e0}, {&(0x7f00000100c0)="01000000000000000000000000000000000000000401000012", 0x19, 0x560}, {&(0x7f00000100e0)="00000000000000000000000000000000000000000104", 0x16, 0x640}, {&(0x7f0000010100), 0x0, 0x7e0}, {&(0x7f0000010ce0)="00000000000000000000000000000000000000000000000000000000c99b0000ed410000000400009f09c75f9f09c75f9f09c75f00000000000003000200000000000800000000000af3010004", 0x4d, 0x8c60}], 0x0, &(0x7f0000010f60)) 04:04:43 executing program 6: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="1000000040000000030000002b00000005000000010000000000000000000000002000000020000010000000000000009f09c75f0000ffff53ef", 0x3a, 0x400}, {0x0, 0x0, 0x7e0}, {&(0x7f0000010ce0)="00000000000000000000000000000000000000000000000000000000c99b0000ed410000000400009f09c75f9f09c75f9f09c75f00000000000003000200000000000800000000000af301000400000000000000000000000100000004", 0x5d, 0x8c60}], 0x0, &(0x7f0000010f60)) getdents64(r0, &(0x7f0000000040)=""/4, 0x4) [ 1884.302553] EXT4-fs (loop1): VFS: Can't find ext4 filesystem 04:04:43 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="1000000040000000030000002b00000005000000010000000000000000000000002000000020000010000000000000009f09c75f0000ffff53ef", 0x3a, 0x400}, {&(0x7f0000010080)="000000000000000000000000ede2de4df49d4f87b54a3176cfd4eb4f010040000c000000000000009f09c75f", 0x2c, 0x4e0}, {&(0x7f0000010100)="000000000000000000000000000000000000000000000000000000005178ae", 0x1f, 0x7e0}, {&(0x7f0000010ce0)="00000000000000000000000000000000000000000000000000000000c99b0000ed410000000400009f09c75f9f09c75f9f09c75f00000000000003000200000000000800000000000af3010004", 0x4d, 0x8c60}], 0x0, &(0x7f0000010f60)) 04:04:43 executing program 5: creat(&(0x7f00000003c0)='./file0\x00', 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext2\x00', &(0x7f0000000100)='./file0\x00', 0x40900, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}], 0x0, &(0x7f0000013c00)=ANY=[]) [ 1884.344853] loop4: detected capacity change from 0 to 140 04:04:43 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="1000000040000000030000002b00000005000000010000000000000000000000002000000020000010000000000000009f09c75f0000ffff53", 0x39, 0x400}, {&(0x7f0000010100)="000000000000000000000000000000000000000000000000000000005178aedb030000001300000023", 0x29, 0x7e0}, {&(0x7f0000010ce0)="00000000000000000000000000000000000000000000000000000000c99b0000ed410000000400009f09c75f9f09c75f9f09c75f00000000000003000200000000000800000000000af3010004000000000000000000000001", 0x59, 0x8c60}], 0x0, &(0x7f0000010f60)) [ 1884.354160] EXT4-fs (loop4): ext4_check_descriptors: Block bitmap for group 0 not in group (block 0)! [ 1884.356243] EXT4-fs (loop4): group descriptors corrupted! [ 1884.394317] loop6: detected capacity change from 0 to 140 [ 1884.399371] loop3: detected capacity change from 0 to 140 [ 1884.409691] loop0: detected capacity change from 0 to 140 [ 1884.412614] EXT4-fs (loop6): ext4_check_descriptors: Block bitmap for group 0 not in group (block 0)! [ 1884.413955] EXT4-fs (loop6): group descriptors corrupted! [ 1884.428502] EXT4-fs (loop3): ext4_check_descriptors: Inode table for group 0 not in group (block 0)! [ 1884.429833] EXT4-fs (loop3): group descriptors corrupted! [ 1884.439640] EXT4-fs (loop0): ext4_check_descriptors: Block bitmap for group 0 not in group (block 0)! [ 1884.440994] EXT4-fs (loop0): group descriptors corrupted! [ 1884.460324] loop1: detected capacity change from 0 to 140 [ 1884.474664] loop5: detected capacity change from 0 to 516 [ 1884.481253] EXT4-fs (loop1): VFS: Can't find ext4 filesystem [ 1884.493606] EXT4-fs (loop5): mounting ext2 file system using the ext4 subsystem [ 1884.506079] EXT4-fs (loop5): warning: mounting unchecked fs, running e2fsck is recommended [ 1884.548090] EXT4-fs (loop5): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: none. [ 1884.553381] EXT4-fs (loop5): unmounting filesystem 00000000-0000-0000-0000-000000000000. 04:04:53 executing program 7: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="1000000040000000030000002b00000005000000010000000000000000000000002000000020000010000000000000009f09c75f0000ffff53ef", 0x3a, 0x400}, {&(0x7f0000010100)="000000000000000000000000000000000000000000000000000000005178aedb03000000130000", 0x27, 0x7e0}, {&(0x7f0000010ce0)="00000000000000000000000000000000000000000000000000000000c99b0000ed410000000400009f09c75f9f09c75f9f09c75f00000000000003000200000000000800000000000af301000400000000000000000000000100000004", 0x5d, 0x8c60}], 0x0, &(0x7f0000010f60)) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) getdents64(r0, &(0x7f0000000040)=""/4, 0x4) 04:04:53 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="1000000040000000030000002b00000005000000010000000000000000000000002000000020000010000000000000009f09c75f0000ffff53ef", 0x3a, 0x400}, {&(0x7f0000010080)="000000000000000000000000ede2de4df49d4f87b54a3176cfd4eb4f010040000c000000000000009f09c75f", 0x2c, 0x4e0}, {&(0x7f0000010100)="000000000000000000000000000000000000000000000000000000005178ae", 0x1f, 0x7e0}, {&(0x7f0000010ce0)="00000000000000000000000000000000000000000000000000000000c99b0000ed410000000400009f09c75f9f09c75f9f09c75f00000000000003000200000000000800000000000af3010004", 0x4d, 0x8c60}], 0x0, &(0x7f0000010f60)) 04:04:53 executing program 2: sendmsg$NL80211_CMD_UNEXPECTED_FRAME(0xffffffffffffffff, &(0x7f0000000400)={0x0, 0x0, &(0x7f0000000300)={&(0x7f00000002c0)={0x1c, 0x0, 0x1, 0x0, 0x0, {{}, {@val={0x8}, @void}}}, 0x1c}}, 0x0) sendmsg$NL80211_CMD_UPDATE_FT_IES(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000001c0)={0x24, 0x0, 0x1, 0x70bd2c, 0x0, {{}, {@val={0x8}, @void}}, [@NL80211_ATTR_MDID={0x6, 0xb1, 0xc116}]}, 0x24}, 0x1, 0x0, 0x0, 0x80}, 0xc000) r0 = creat(&(0x7f00000003c0)='./file1\x00', 0x0) sendmsg$netlink(0xffffffffffffffff, 0x0, 0x0) dup(0xffffffffffffffff) pwritev2(r0, &(0x7f0000000380)=[{&(0x7f0000000180)="bd", 0xfffffdef}], 0x1, 0x1200, 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) ioctl$FS_IOC_FSSETXATTR(r1, 0x5452, &(0x7f0000000200)={0x9}) syz_io_uring_setup(0x0, &(0x7f0000000000)={0x0, 0x0, 0x4, 0x2, 0x309}, &(0x7f0000ffc000/0x2000)=nil, &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000000080), &(0x7f0000000240)) syz_io_uring_submit(0x0, 0x0, &(0x7f0000000280)=@IORING_OP_ASYNC_CANCEL={0xe, 0x0, 0x0, 0x0, 0x0, 0x12345}, 0x1ff) 04:04:53 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="1000000040000000030000002b00000005000000010000000000000000000000002000000020000010000000000000009f09c75f0000ffff53ef", 0x3a, 0x400}, {&(0x7f0000010080)="000000000000000000000000ede2de4df49d4f87b54a3176cfd4eb4f010040000c000000000000009f09c75f", 0x2c, 0x4e0}, {&(0x7f00000100c0)="01000000000000000000000000000000000000000401000012", 0x19, 0x560}, {&(0x7f00000100e0)="00000000000000000000000000000000000000000104", 0x16, 0x640}, {&(0x7f0000010100), 0x0, 0x7e0}, {&(0x7f0000010ce0)="00000000000000000000000000000000000000000000000000000000c99b0000ed410000000400009f09c75f9f09c75f9f09c75f00000000000003000200000000000800000000000af3010004", 0x4d, 0x8c60}], 0x0, &(0x7f0000010f60)) 04:04:53 executing program 6: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="1000000040000000030000002b00000005000000010000000000000000000000002000000020000010000000000000009f09c75f0000ffff53ef", 0x3a, 0x400}, {&(0x7f0000010100), 0x0, 0x7e0}, {&(0x7f0000010ce0)="00000000000000000000000000000000000000000000000000000000c99b0000ed410000000400009f09c75f9f09c75f9f09c75f00000000000003000200000000000800000000000af301000400000000000000000000000100000004", 0x5d, 0x8c60}], 0x0, &(0x7f0000010f60)) getdents64(r0, &(0x7f0000000040)=""/4, 0x4) 04:04:53 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="1000000040000000030000002b00000005000000010000000000000000000000002000000020000010000000000000009f09c75f0000ffff53ef", 0x3a}, {&(0x7f0000010100)="000000000000000000000000000000000000000000000000000000005178aedb030000001300000023", 0x29, 0x7e0}, {&(0x7f0000010ce0)="00000000000000000000000000000000000000000000000000000000c99b0000ed410000000400009f09c75f9f09c75f9f09c75f00000000000003000200000000000800000000000af3010004000000000000000000000001", 0x59, 0x8c60}], 0x0, &(0x7f0000010f60)) 04:04:53 executing program 5: creat(&(0x7f00000003c0)='./file0\x00', 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext2\x00', &(0x7f0000000100)='./file0\x00', 0x40a00, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}], 0x0, &(0x7f0000013c00)=ANY=[]) 04:04:53 executing program 3: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="1000000040000000030000002b00000005000000010000000000000000000000002000000020000010000000000000009f09c75f0000ffff53ef", 0x3a, 0x400}, {&(0x7f0000010100)="000000000000000000000000000000000000000000000000000000005178aedb0300000013000000", 0x28, 0x7e0}, {&(0x7f0000010ce0)="00000000000000000000000000000000000000000000000000000000c99b0000ed410000000400009f09c75f9f09c75f9f09c75f00000000000003000200000000000800000000000af301000400000000000000000000000100000004", 0x5d, 0x8c60}], 0x0, &(0x7f0000010f60)) getdents64(r0, &(0x7f0000000040)=""/4, 0x4) [ 1894.513884] loop3: detected capacity change from 0 to 140 [ 1894.515617] loop4: detected capacity change from 0 to 140 [ 1894.516801] loop1: detected capacity change from 0 to 140 [ 1894.519545] loop0: detected capacity change from 0 to 140 [ 1894.532335] loop5: detected capacity change from 0 to 517 [ 1894.533519] EXT4-fs (loop1): VFS: Can't find ext4 filesystem [ 1894.535653] loop6: detected capacity change from 0 to 140 [ 1894.536659] EXT4-fs (loop3): ext4_check_descriptors: Inode table for group 0 not in group (block 0)! [ 1894.538085] EXT4-fs (loop3): group descriptors corrupted! [ 1894.538568] loop7: detected capacity change from 0 to 140 [ 1894.540307] EXT4-fs (loop4): ext4_check_descriptors: Block bitmap for group 0 not in group (block 0)! [ 1894.541861] EXT4-fs (loop4): group descriptors corrupted! [ 1894.543423] EXT4-fs (loop0): ext4_check_descriptors: Block bitmap for group 0 not in group (block 0)! [ 1894.545089] EXT4-fs (loop0): group descriptors corrupted! [ 1894.549225] EXT4-fs (loop5): mounting ext2 file system using the ext4 subsystem [ 1894.554039] EXT4-fs (loop6): ext4_check_descriptors: Block bitmap for group 0 not in group (block 0)! [ 1894.555363] EXT4-fs (loop6): group descriptors corrupted! [ 1894.565430] EXT4-fs (loop7): ext4_check_descriptors: Inode table for group 0 not in group (block 0)! [ 1894.567043] EXT4-fs (loop7): group descriptors corrupted! [ 1894.571416] EXT4-fs (loop5): warning: mounting unchecked fs, running e2fsck is recommended [ 1894.598455] EXT4-fs (loop5): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: none. [ 1894.616595] EXT4-fs (loop5): unmounting filesystem 00000000-0000-0000-0000-000000000000. 04:04:53 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="1000000040000000030000002b00000005000000010000000000000000000000002000000020000010000000000000009f09c75f0000ffff53ef", 0x3a, 0x400}, {&(0x7f0000010080)="000000000000000000000000ede2de4df49d4f87b54a3176cfd4eb4f010040000c000000000000009f09c75f", 0x2c, 0x4e0}, {&(0x7f0000010100)="000000000000000000000000000000000000000000000000000000005178ae", 0x1f, 0x7e0}, {&(0x7f0000010ce0)="00000000000000000000000000000000000000000000000000000000c99b0000ed410000000400009f09c75f9f09c75f9f09c75f00000000000003000200000000000800000000000af3010004", 0x4d, 0x8c60}], 0x0, &(0x7f0000010f60)) [ 1894.650100] loop0: detected capacity change from 0 to 140 [ 1894.661976] EXT4-fs (loop0): ext4_check_descriptors: Block bitmap for group 0 not in group (block 0)! [ 1894.663301] EXT4-fs (loop0): group descriptors corrupted! 04:04:53 executing program 3: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="1000000040000000030000002b00000005000000010000000000000000000000002000000020000010000000000000009f09c75f0000ffff53ef", 0x3a, 0x400}, {&(0x7f0000010100)="000000000000000000000000000000000000000000000000000000005178aedb030000001300000023", 0x29}, {&(0x7f0000010ce0)="00000000000000000000000000000000000000000000000000000000c99b0000ed410000000400009f09c75f9f09c75f9f09c75f00000000000003000200000000000800000000000af301000400000000000000000000000100000004", 0x5d, 0x8c60}], 0x0, &(0x7f0000010f60)) getdents64(r0, &(0x7f0000000040)=""/4, 0x4) 04:04:53 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="1000000040000000030000002b00000005000000010000000000000000000000002000000020000010000000000000009f09c75f0000ffff53ef", 0x3a, 0x400}, {&(0x7f0000010080)="000000000000000000000000ede2de4df49d4f87b54a3176cfd4eb4f010040000c000000000000009f09c75f", 0x2c, 0x4e0}, {&(0x7f00000100c0)="01000000000000000000000000000000000000000401000012", 0x19, 0x560}, {&(0x7f00000100e0)="00000000000000000000000000000000000000000104", 0x16, 0x640}, {&(0x7f0000010100)="000000000000000000000000000000000000000000000000000000005178aedb0300000013000000230000002b00", 0x2e, 0x7e0}, {&(0x7f0000010ce0)="00000000000000000000000000000000000000000000000000000000c99b0000ed410000000400009f09c75f9f09c75f9f09c75f00000000000003000200000000000800000000000af3010004", 0x4d, 0x8c60}], 0x0, &(0x7f0000010f60)) 04:04:53 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="1000000040000000030000002b00000005000000010000000000000000000000002000000020000010000000000000009f09c75f0000ffff53ef", 0x3a}, {&(0x7f0000010100)="000000000000000000000000000000000000000000000000000000005178aedb030000001300000023", 0x29, 0x7e0}, {&(0x7f0000010ce0)="00000000000000000000000000000000000000000000000000000000c99b0000ed410000000400009f09c75f9f09c75f9f09c75f00000000000003000200000000000800000000000af3010004000000000000000000000001", 0x59, 0x8c60}], 0x0, &(0x7f0000010f60)) 04:04:53 executing program 6: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="1000000040000000030000002b00000005000000010000000000000000000000002000000020000010000000000000009f09c75f0000ffff53ef", 0x3a, 0x400}, {&(0x7f0000010100), 0x0, 0x7e0}, {&(0x7f0000010ce0)="00000000000000000000000000000000000000000000000000000000c99b0000ed410000000400009f09c75f9f09c75f9f09c75f00000000000003000200000000000800000000000af301000400000000000000000000000100000004", 0x5d, 0x8c60}], 0x0, &(0x7f0000010f60)) getdents64(r0, &(0x7f0000000040)=""/4, 0x4) 04:04:53 executing program 7: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="1000000040000000030000002b00000005000000010000000000000000000000002000000020000010000000000000009f09c75f0000ffff53ef", 0x3a, 0x400}, {&(0x7f0000010100)="000000000000000000000000000000000000000000000000000000005178aedb0300000013000000", 0x28, 0x7e0}, {&(0x7f0000010ce0)="00000000000000000000000000000000000000000000000000000000c99b0000ed410000000400009f09c75f9f09c75f9f09c75f00000000000003000200000000000800000000000af301000400000000000000000000000100000004", 0x5d, 0x8c60}], 0x0, &(0x7f0000010f60)) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) getdents64(r0, &(0x7f0000000040)=""/4, 0x4) [ 1894.785848] loop1: detected capacity change from 0 to 140 [ 1894.787803] loop7: detected capacity change from 0 to 140 [ 1894.789781] loop6: detected capacity change from 0 to 140 04:04:53 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="1000000040000000030000002b00000005000000010000000000000000000000002000000020000010000000000000009f09c75f0000ffff53ef", 0x3a, 0x400}, {&(0x7f0000010080)="000000000000000000000000ede2de4df49d4f87b54a3176cfd4eb4f010040000c000000000000009f09c75f", 0x2c, 0x4e0}, {&(0x7f0000010100)="000000000000000000000000000000000000000000000000000000005178aedb03000000", 0x24, 0x7e0}, {&(0x7f0000010ce0)="00000000000000000000000000000000000000000000000000000000c99b0000ed410000000400009f09c75f9f09c75f9f09c75f00000000000003000200000000000800000000000af3010004", 0x4d, 0x8c60}], 0x0, &(0x7f0000010f60)) [ 1894.804050] EXT4-fs (loop1): VFS: Can't find ext4 filesystem [ 1894.806649] EXT4-fs (loop7): ext4_check_descriptors: Inode table for group 0 not in group (block 0)! [ 1894.807991] EXT4-fs (loop7): group descriptors corrupted! [ 1894.808183] loop4: detected capacity change from 0 to 140 [ 1894.809087] EXT4-fs (loop6): ext4_check_descriptors: Block bitmap for group 0 not in group (block 0)! [ 1894.810963] EXT4-fs (loop6): group descriptors corrupted! [ 1894.824144] loop3: detected capacity change from 0 to 140 [ 1894.839005] EXT4-fs error (device loop4): ext4_ext_check_inode:523: inode #2: comm syz-executor.4: pblk 0 bad header/extent: invalid extent entries - magic f30a, entries 1, max 4(4), depth 0(0) 04:04:53 executing program 5: creat(&(0x7f00000003c0)='./file0\x00', 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext2\x00', &(0x7f0000000100)='./file0\x00', 0x40b00, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}], 0x0, &(0x7f0000013c00)=ANY=[]) [ 1894.860702] EXT4-fs (loop3): ext4_check_descriptors: Block bitmap for group 0 not in group (block 0)! [ 1894.862171] EXT4-fs (loop3): group descriptors corrupted! [ 1894.869120] EXT4-fs (loop4): get root inode failed [ 1894.869818] EXT4-fs (loop4): mount failed [ 1894.876324] loop0: detected capacity change from 0 to 140 04:04:53 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="1000000040000000030000002b00000005000000010000000000000000000000002000000020000010000000000000009f09c75f0000ffff53ef", 0x3a}, {&(0x7f0000010100)="000000000000000000000000000000000000000000000000000000005178aedb030000001300000023", 0x29, 0x7e0}, {&(0x7f0000010ce0)="00000000000000000000000000000000000000000000000000000000c99b0000ed410000000400009f09c75f9f09c75f9f09c75f00000000000003000200000000000800000000000af3010004000000000000000000000001", 0x59, 0x8c60}], 0x0, &(0x7f0000010f60)) [ 1894.936134] EXT4-fs (loop0): ext4_check_descriptors: Inode bitmap for group 0 not in group (block 0)! [ 1894.937741] EXT4-fs (loop0): group descriptors corrupted! 04:04:53 executing program 6: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="1000000040000000030000002b00000005000000010000000000000000000000002000000020000010000000000000009f09c75f0000ffff53ef", 0x3a, 0x400}, {&(0x7f0000010100), 0x0, 0x7e0}, {&(0x7f0000010ce0)="00000000000000000000000000000000000000000000000000000000c99b0000ed410000000400009f09c75f9f09c75f9f09c75f00000000000003000200000000000800000000000af301000400000000000000000000000100000004", 0x5d, 0x8c60}], 0x0, &(0x7f0000010f60)) getdents64(r0, &(0x7f0000000040)=""/4, 0x4) [ 1894.982732] loop5: detected capacity change from 0 to 517 [ 1894.986904] EXT4-fs (loop5): mounting ext2 file system using the ext4 subsystem [ 1894.994429] EXT4-fs (loop5): warning: mounting unchecked fs, running e2fsck is recommended [ 1895.003835] EXT4-fs (loop5): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: none. [ 1895.045693] EXT4-fs (loop5): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 1895.069345] loop6: detected capacity change from 0 to 140 [ 1895.111026] EXT4-fs (loop6): ext4_check_descriptors: Block bitmap for group 0 not in group (block 0)! [ 1895.112324] EXT4-fs (loop6): group descriptors corrupted! 04:05:03 executing program 2: sendmsg$NL80211_CMD_UNEXPECTED_FRAME(0xffffffffffffffff, &(0x7f0000000400)={0x0, 0x0, &(0x7f0000000300)={&(0x7f00000002c0)={0x1c, 0x0, 0x1, 0x0, 0x0, {{}, {@val={0x8}, @void}}}, 0x1c}}, 0x0) sendmsg$NL80211_CMD_UPDATE_FT_IES(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000001c0)={0x24, 0x0, 0x1, 0x70bd2c, 0x0, {{}, {@val={0x8}, @void}}, [@NL80211_ATTR_MDID={0x6, 0xb1, 0xc116}]}, 0x24}, 0x1, 0x0, 0x0, 0x80}, 0xc000) r0 = creat(&(0x7f00000003c0)='./file1\x00', 0x0) sendmsg$netlink(0xffffffffffffffff, 0x0, 0x0) dup(0xffffffffffffffff) pwritev2(r0, &(0x7f0000000380)=[{&(0x7f0000000180)="bd", 0xfffffdef}], 0x1, 0x1200, 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) ioctl$FS_IOC_FSSETXATTR(r1, 0x5460, &(0x7f0000000200)={0x9}) syz_io_uring_setup(0x0, &(0x7f0000000000)={0x0, 0x0, 0x4, 0x2, 0x309}, &(0x7f0000ffc000/0x2000)=nil, &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000000080), &(0x7f0000000240)) syz_io_uring_submit(0x0, 0x0, &(0x7f0000000280)=@IORING_OP_ASYNC_CANCEL={0xe, 0x0, 0x0, 0x0, 0x0, 0x12345}, 0x1ff) 04:05:03 executing program 6: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="1000000040000000030000002b00000005000000010000000000000000000000002000000020000010000000000000009f09c75f0000ffff53ef", 0x3a, 0x400}, {&(0x7f0000010100)='\x00'/21, 0x15, 0x7e0}, {&(0x7f0000010ce0)="00000000000000000000000000000000000000000000000000000000c99b0000ed410000000400009f09c75f9f09c75f9f09c75f00000000000003000200000000000800000000000af301000400000000000000000000000100000004", 0x5d, 0x8c60}], 0x0, &(0x7f0000010f60)) getdents64(r0, &(0x7f0000000040)=""/4, 0x4) 04:05:03 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="1000000040000000030000002b00000005000000010000000000000000000000002000000020000010000000000000009f09c75f0000ffff53ef", 0x3a, 0x400}, {&(0x7f0000010080)="000000000000000000000000ede2de4df49d4f87b54a3176cfd4eb4f010040000c000000000000009f09c75f", 0x2c, 0x4e0}, {&(0x7f0000010100)="000000000000000000000000000000000000000000000000000000005178aedb03000000", 0x24, 0x7e0}, {&(0x7f0000010ce0)="00000000000000000000000000000000000000000000000000000000c99b0000ed410000000400009f09c75f9f09c75f9f09c75f00000000000003000200000000000800000000000af3010004", 0x4d, 0x8c60}], 0x0, &(0x7f0000010f60)) 04:05:03 executing program 3: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="1000000040000000030000002b00000005000000010000000000000000000000002000000020000010000000000000009f09c75f0000ffff53ef", 0x3a, 0x400}, {&(0x7f0000010100)="000000000000000000000000000000000000000000000000000000005178aedb030000001300000023", 0x29}, {&(0x7f0000010ce0)="00000000000000000000000000000000000000000000000000000000c99b0000ed410000000400009f09c75f9f09c75f9f09c75f00000000000003000200000000000800000000000af301000400000000000000000000000100000004", 0x5d, 0x8c60}], 0x0, &(0x7f0000010f60)) getdents64(r0, &(0x7f0000000040)=""/4, 0x4) 04:05:03 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="1000000040000000030000002b00000005000000010000000000000000000000002000000020000010000000000000009f09c75f0000ffff53ef", 0x3a, 0x400}, {&(0x7f0000010080)="000000000000000000000000ede2de4df49d4f87b54a3176cfd4eb4f010040000c000000000000009f09c75f", 0x2c, 0x4e0}, {&(0x7f00000100c0)="01000000000000000000000000000000000000000401000012", 0x19, 0x560}, {&(0x7f00000100e0)="00000000000000000000000000000000000000000104", 0x16, 0x640}, {&(0x7f0000010100), 0x0, 0x7e0}, {&(0x7f0000010ce0)="00000000000000000000000000000000000000000000000000000000c99b0000ed410000000400009f09c75f9f09c75f9f09c75f00000000000003000200000000000800000000000af3010004", 0x4d, 0x8c60}], 0x0, &(0x7f0000010f60)) 04:05:03 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="1000000040000000030000002b00000005000000010000000000000000000000002000000020000010000000000000009f09c75f0000ffff53ef", 0x3a, 0x400}, {&(0x7f0000010100)="000000000000000000000000000000000000000000000000000000005178aedb030000001300000023", 0x29, 0x7e0}, {&(0x7f0000010ce0)="00000000000000000000000000000000000000000000000000000000c99b0000ed410000000400009f09c75f9f09c75f9f09c75f00000000000003000200000000000800000000000af3010004000000000000000000000001", 0x59, 0x8c60}], 0x0, 0x0) 04:05:03 executing program 5: creat(&(0x7f00000003c0)='./file0\x00', 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext2\x00', &(0x7f0000000100)='./file0\x00', 0x40c00, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}], 0x0, &(0x7f0000013c00)=ANY=[]) 04:05:03 executing program 7: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="1000000040000000030000002b00000005000000010000000000000000000000002000000020000010000000000000009f09c75f0000ffff53ef", 0x3a, 0x400}, {&(0x7f0000010100)="000000000000000000000000000000000000000000000000000000005178aedb0300000013000000", 0x28, 0x7e0}, {&(0x7f0000010ce0)="00000000000000000000000000000000000000000000000000000000c99b0000ed410000000400009f09c75f9f09c75f9f09c75f00000000000003000200000000000800000000000af301000400000000000000000000000100000004", 0x5d, 0x8c60}], 0x0, &(0x7f0000010f60)) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) getdents64(r0, &(0x7f0000000040)=""/4, 0x4) [ 1904.321471] loop1: detected capacity change from 0 to 140 [ 1904.322242] loop0: detected capacity change from 0 to 140 [ 1904.330812] EXT4-fs (loop0): ext4_check_descriptors: Inode bitmap for group 0 not in group (block 0)! [ 1904.331674] EXT4-fs (loop0): group descriptors corrupted! [ 1904.346899] loop7: detected capacity change from 0 to 140 [ 1904.356416] EXT4-fs (loop7): ext4_check_descriptors: Inode table for group 0 not in group (block 0)! [ 1904.357228] EXT4-fs (loop7): group descriptors corrupted! [ 1904.360387] loop5: detected capacity change from 0 to 518 04:05:03 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="1000000040000000030000002b00000005000000010000000000000000000000002000000020000010000000000000009f09c75f0000ffff53ef", 0x3a, 0x400}, {&(0x7f0000010100)="000000000000000000000000000000000000000000000000000000005178aedb030000001300000023", 0x29, 0x7e0}, {&(0x7f0000010ce0)="00000000000000000000000000000000000000000000000000000000c99b0000ed410000000400009f09c75f9f09c75f9f09c75f00000000000003000200000000000800000000000af3010004000000000000000000000001", 0x59, 0x8c60}], 0x0, 0x0) [ 1904.368463] EXT4-fs (loop5): mounting ext2 file system using the ext4 subsystem [ 1904.374608] loop4: detected capacity change from 0 to 140 [ 1904.378478] loop6: detected capacity change from 0 to 140 [ 1904.380294] loop3: detected capacity change from 0 to 140 [ 1904.380686] EXT4-fs (loop5): warning: mounting unchecked fs, running e2fsck is recommended 04:05:03 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="1000000040000000030000002b00000005000000010000000000000000000000002000000020000010000000000000009f09c75f0000ffff53ef", 0x3a, 0x400}, {&(0x7f0000010080)="000000000000000000000000ede2de4df49d4f87b54a3176cfd4eb4f010040000c000000000000009f09c75f", 0x2c, 0x4e0}, {&(0x7f0000010100)="000000000000000000000000000000000000000000000000000000005178aedb03000000", 0x24, 0x7e0}, {&(0x7f0000010ce0)="00000000000000000000000000000000000000000000000000000000c99b0000ed410000000400009f09c75f9f09c75f9f09c75f00000000000003000200000000000800000000000af3010004", 0x4d, 0x8c60}], 0x0, &(0x7f0000010f60)) [ 1904.402069] EXT4-fs (loop4): ext4_check_descriptors: Block bitmap for group 0 not in group (block 0)! [ 1904.403834] EXT4-fs (loop4): group descriptors corrupted! [ 1904.413005] EXT4-fs (loop3): ext4_check_descriptors: Block bitmap for group 0 not in group (block 0)! [ 1904.414536] EXT4-fs (loop3): group descriptors corrupted! [ 1904.415403] EXT4-fs (loop6): ext4_check_descriptors: Block bitmap for group 0 not in group (block 0)! [ 1904.416363] EXT4-fs (loop6): group descriptors corrupted! [ 1904.429637] EXT4-fs (loop5): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: none. 04:05:03 executing program 6: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="1000000040000000030000002b00000005000000010000000000000000000000002000000020000010000000000000009f09c75f0000ffff53ef", 0x3a, 0x400}, {&(0x7f0000010100)='\x00'/21, 0x15, 0x7e0}, {&(0x7f0000010ce0)="00000000000000000000000000000000000000000000000000000000c99b0000ed410000000400009f09c75f9f09c75f9f09c75f00000000000003000200000000000800000000000af301000400000000000000000000000100000004", 0x5d, 0x8c60}], 0x0, &(0x7f0000010f60)) getdents64(r0, &(0x7f0000000040)=""/4, 0x4) [ 1904.477430] EXT4-fs (loop5): unmounting filesystem 00000000-0000-0000-0000-000000000000. 04:05:03 executing program 7: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="1000000040000000030000002b00000005000000010000000000000000000000002000000020000010000000000000009f09c75f0000ffff53ef", 0x3a, 0x400}, {&(0x7f0000010100)="000000000000000000000000000000000000000000000000000000005178aedb0300000013000000", 0x28, 0x7e0}, {&(0x7f0000010ce0)="00000000000000000000000000000000000000000000000000000000c99b0000ed410000000400009f09c75f9f09c75f9f09c75f00000000000003000200000000000800000000000af301000400000000000000000000000100000004", 0x5d, 0x8c60}], 0x0, &(0x7f0000010f60)) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) getdents64(r0, &(0x7f0000000040)=""/4, 0x4) 04:05:03 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="1000000040000000030000002b00000005000000010000000000000000000000002000000020000010000000000000009f09c75f0000ffff53ef", 0x3a, 0x400}, {&(0x7f0000010080)="000000000000000000000000ede2de4df49d4f87b54a3176cfd4eb4f010040000c000000000000009f09c75f", 0x2c, 0x4e0}, {&(0x7f00000100c0)="01000000000000000000000000000000000000000401000012", 0x19, 0x560}, {&(0x7f00000100e0)="00000000000000000000000000000000000000000104", 0x16, 0x640}, {&(0x7f0000010100), 0x0, 0x7e0}, {&(0x7f0000010ce0)="00000000000000000000000000000000000000000000000000000000c99b0000ed410000000400009f09c75f9f09c75f9f09c75f00000000000003000200000000000800000000000af3010004", 0x4d, 0x8c60}], 0x0, &(0x7f0000010f60)) [ 1904.551616] loop0: detected capacity change from 0 to 140 [ 1904.554141] loop1: detected capacity change from 0 to 140 [ 1904.564869] EXT4-fs (loop0): ext4_check_descriptors: Inode bitmap for group 0 not in group (block 0)! [ 1904.565586] EXT4-fs (loop0): group descriptors corrupted! 04:05:03 executing program 3: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="1000000040000000030000002b00000005000000010000000000000000000000002000000020000010000000000000009f09c75f0000ffff53ef", 0x3a, 0x400}, {&(0x7f0000010100)="000000000000000000000000000000000000000000000000000000005178aedb030000001300000023", 0x29}, {&(0x7f0000010ce0)="00000000000000000000000000000000000000000000000000000000c99b0000ed410000000400009f09c75f9f09c75f9f09c75f00000000000003000200000000000800000000000af301000400000000000000000000000100000004", 0x5d, 0x8c60}], 0x0, &(0x7f0000010f60)) getdents64(r0, &(0x7f0000000040)=""/4, 0x4) 04:05:03 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="1000000040000000030000002b00000005000000010000000000000000000000002000000020000010000000000000009f09c75f0000ffff53ef", 0x3a, 0x400}, {&(0x7f0000010100)="000000000000000000000000000000000000000000000000000000005178aedb030000001300000023", 0x29, 0x7e0}, {&(0x7f0000010ce0)="00000000000000000000000000000000000000000000000000000000c99b0000ed410000000400009f09c75f9f09c75f9f09c75f00000000000003000200000000000800000000000af3010004000000000000000000000001", 0x59, 0x8c60}], 0x0, 0x0) 04:05:03 executing program 5: creat(&(0x7f00000003c0)='./file0\x00', 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext2\x00', &(0x7f0000000100)='./file0\x00', 0x40c01, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}], 0x0, &(0x7f0000013c00)=ANY=[]) [ 1904.626029] loop4: detected capacity change from 0 to 140 [ 1904.637359] loop6: detected capacity change from 0 to 140 [ 1904.650736] loop7: detected capacity change from 0 to 140 [ 1904.657424] EXT4-fs (loop6): ext4_check_descriptors: Block bitmap for group 0 not in group (block 0)! [ 1904.658969] EXT4-fs (loop6): group descriptors corrupted! [ 1904.659615] loop5: detected capacity change from 0 to 518 [ 1904.662875] loop1: detected capacity change from 0 to 140 [ 1904.664152] EXT4-fs (loop7): ext4_check_descriptors: Inode table for group 0 not in group (block 0)! [ 1904.665583] EXT4-fs (loop7): group descriptors corrupted! [ 1904.667793] EXT4-fs (loop5): mounting ext2 file system using the ext4 subsystem [ 1904.667901] EXT4-fs (loop4): ext4_check_descriptors: Block bitmap for group 0 not in group (block 0)! [ 1904.669738] EXT4-fs (loop4): group descriptors corrupted! [ 1904.674518] EXT4-fs (loop5): warning: mounting unchecked fs, running e2fsck is recommended [ 1904.677477] EXT4-fs (loop5): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: none. [ 1904.684755] EXT4-fs (loop5): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 1904.711381] loop3: detected capacity change from 0 to 140 [ 1904.735711] EXT4-fs (loop3): ext4_check_descriptors: Block bitmap for group 0 not in group (block 0)! [ 1904.736476] EXT4-fs (loop3): group descriptors corrupted! 04:05:14 executing program 1: creat(&(0x7f00000003c0)='./file0\x00', 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext2\x00', &(0x7f0000000100)='./file0\x00', 0x40b00, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}], 0x0, &(0x7f0000013c00)=ANY=[]) 04:05:14 executing program 2: sendmsg$NL80211_CMD_UNEXPECTED_FRAME(0xffffffffffffffff, &(0x7f0000000400)={0x0, 0x0, &(0x7f0000000300)={&(0x7f00000002c0)={0x1c, 0x0, 0x1, 0x0, 0x0, {{}, {@val={0x8}, @void}}}, 0x1c}}, 0x0) sendmsg$NL80211_CMD_UPDATE_FT_IES(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000001c0)={0x24, 0x0, 0x1, 0x70bd2c, 0x0, {{}, {@val={0x8}, @void}}, [@NL80211_ATTR_MDID={0x6, 0xb1, 0xc116}]}, 0x24}, 0x1, 0x0, 0x0, 0x80}, 0xc000) r0 = creat(&(0x7f00000003c0)='./file1\x00', 0x0) sendmsg$netlink(0xffffffffffffffff, 0x0, 0x0) dup(0xffffffffffffffff) pwritev2(r0, &(0x7f0000000380)=[{&(0x7f0000000180)="bd", 0xfffffdef}], 0x1, 0x1200, 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) ioctl$FS_IOC_FSSETXATTR(r1, 0x40049409, &(0x7f0000000200)={0x9}) syz_io_uring_setup(0x0, &(0x7f0000000000)={0x0, 0x0, 0x4, 0x2, 0x309}, &(0x7f0000ffc000/0x2000)=nil, &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000000080), &(0x7f0000000240)) syz_io_uring_submit(0x0, 0x0, &(0x7f0000000280)=@IORING_OP_ASYNC_CANCEL={0xe, 0x0, 0x0, 0x0, 0x0, 0x12345}, 0x1ff) 04:05:14 executing program 6: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="1000000040000000030000002b00000005000000010000000000000000000000002000000020000010000000000000009f09c75f0000ffff53ef", 0x3a, 0x400}, {&(0x7f0000010100)='\x00'/21, 0x15, 0x7e0}, {&(0x7f0000010ce0)="00000000000000000000000000000000000000000000000000000000c99b0000ed410000000400009f09c75f9f09c75f9f09c75f00000000000003000200000000000800000000000af301000400000000000000000000000100000004", 0x5d, 0x8c60}], 0x0, &(0x7f0000010f60)) getdents64(r0, &(0x7f0000000040)=""/4, 0x4) 04:05:14 executing program 7: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="1000000040000000030000002b00000005000000010000000000000000000000002000000020000010000000000000009f09c75f0000ffff53ef", 0x3a, 0x400}, {&(0x7f0000010100)="000000000000000000000000000000000000000000000000000000005178aedb030000001300000023", 0x29}, {&(0x7f0000010ce0)="00000000000000000000000000000000000000000000000000000000c99b0000ed410000000400009f09c75f9f09c75f9f09c75f00000000000003000200000000000800000000000af301000400000000000000000000000100000004", 0x5d, 0x8c60}], 0x0, &(0x7f0000010f60)) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) getdents64(r0, &(0x7f0000000040)=""/4, 0x4) 04:05:14 executing program 5: creat(&(0x7f00000003c0)='./file0\x00', 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext2\x00', &(0x7f0000000100)='./file0\x00', 0x40c05, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}], 0x0, &(0x7f0000013c00)=ANY=[]) 04:05:14 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="1000000040000000030000002b00000005000000010000000000000000000000002000000020000010000000000000009f09c75f0000ffff53ef", 0x3a, 0x400}, {&(0x7f0000010080)="000000000000000000000000ede2de4df49d4f87b54a3176cfd4eb4f010040000c000000000000009f09c75f", 0x2c, 0x4e0}, {&(0x7f00000100c0)="01000000000000000000000000000000000000000401000012", 0x19, 0x560}, {&(0x7f00000100e0)="00000000000000000000000000000000000000000104", 0x16, 0x640}, {&(0x7f0000010100), 0x0, 0x7e0}, {&(0x7f0000010ce0)="00000000000000000000000000000000000000000000000000000000c99b0000ed410000000400009f09c75f9f09c75f9f09c75f00000000000003000200000000000800000000000af3010004", 0x4d, 0x8c60}], 0x0, &(0x7f0000010f60)) 04:05:14 executing program 3: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010100)="000000000000000000000000000000000000000000000000000000005178aedb030000001300000023", 0x29, 0x7e0}, {&(0x7f0000010ce0)="00000000000000000000000000000000000000000000000000000000c99b0000ed410000000400009f09c75f9f09c75f9f09c75f00000000000003000200000000000800000000000af301000400000000000000000000000100000004", 0x5d, 0x8c60}], 0x0, &(0x7f0000010f60)) getdents64(r0, &(0x7f0000000040)=""/4, 0x4) 04:05:14 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="1000000040000000030000002b00000005000000010000000000000000000000002000000020000010000000000000009f09c75f0000ffff53ef", 0x3a, 0x400}, {&(0x7f0000010080)="000000000000000000000000ede2de4df49d4f87b54a3176cfd4eb4f010040000c000000000000009f09c75f", 0x2c, 0x4e0}, {&(0x7f0000010100)="000000000000000000000000000000000000000000000000000000005178aedb03000000130000", 0x27, 0x7e0}, {&(0x7f0000010ce0)="00000000000000000000000000000000000000000000000000000000c99b0000ed410000000400009f09c75f9f09c75f9f09c75f00000000000003000200000000000800000000000af3010004", 0x4d, 0x8c60}], 0x0, &(0x7f0000010f60)) [ 1915.198355] loop4: detected capacity change from 0 to 140 [ 1915.208085] EXT4-fs (loop4): ext4_check_descriptors: Block bitmap for group 0 not in group (block 0)! [ 1915.208876] EXT4-fs (loop4): group descriptors corrupted! [ 1915.211896] loop1: detected capacity change from 0 to 517 [ 1915.212270] loop6: detected capacity change from 0 to 140 [ 1915.215655] loop3: detected capacity change from 0 to 140 [ 1915.218438] loop5: detected capacity change from 0 to 518 [ 1915.220756] loop7: detected capacity change from 0 to 140 [ 1915.221255] loop0: detected capacity change from 0 to 140 [ 1915.227353] EXT4-fs (loop1): mounting ext2 file system using the ext4 subsystem [ 1915.231887] EXT4-fs (loop0): ext4_check_descriptors: Inode table for group 0 not in group (block 0)! [ 1915.232671] EXT4-fs (loop0): group descriptors corrupted! [ 1915.234058] EXT4-fs (loop6): ext4_check_descriptors: Block bitmap for group 0 not in group (block 0)! [ 1915.235502] EXT4-fs (loop6): group descriptors corrupted! [ 1915.236521] EXT4-fs (loop3): VFS: Can't find ext4 filesystem [ 1915.238179] EXT4-fs (loop1): warning: mounting unchecked fs, running e2fsck is recommended [ 1915.239139] EXT4-fs (loop7): ext4_check_descriptors: Block bitmap for group 0 not in group (block 0)! [ 1915.240516] EXT4-fs (loop7): group descriptors corrupted! [ 1915.244911] EXT4-fs (loop1): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: none. [ 1915.254480] EXT4-fs (loop5): mounting ext2 file system using the ext4 subsystem [ 1915.264364] EXT4-fs (loop1): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 1915.266299] EXT4-fs (loop5): warning: mounting unchecked fs, running e2fsck is recommended [ 1915.307796] EXT4-fs (loop5): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: none. [ 1915.312583] loop4: detected capacity change from 0 to 140 [ 1915.316218] EXT4-fs (loop4): ext4_check_descriptors: Block bitmap for group 0 not in group (block 0)! [ 1915.317010] EXT4-fs (loop4): group descriptors corrupted! 04:05:14 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="1000000040000000030000002b00000005000000010000000000000000000000002000000020000010000000000000009f09c75f0000ffff53ef", 0x3a, 0x400}, {&(0x7f0000010080)="000000000000000000000000ede2de4df49d4f87b54a3176cfd4eb4f010040000c000000000000009f09c75f", 0x2c, 0x4e0}, {&(0x7f00000100c0)="01000000000000000000000000000000000000000401000012", 0x19, 0x560}, {&(0x7f00000100e0)="00000000000000000000000000000000000000000104", 0x16, 0x640}, {&(0x7f0000010100)='\x00'/23, 0x17, 0x7e0}, {&(0x7f0000010ce0)="00000000000000000000000000000000000000000000000000000000c99b0000ed410000000400009f09c75f9f09c75f9f09c75f00000000000003000200000000000800000000000af3010004", 0x4d, 0x8c60}], 0x0, &(0x7f0000010f60)) 04:05:14 executing program 3: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010100)="000000000000000000000000000000000000000000000000000000005178aedb030000001300000023", 0x29, 0x7e0}, {&(0x7f0000010ce0)="00000000000000000000000000000000000000000000000000000000c99b0000ed410000000400009f09c75f9f09c75f9f09c75f00000000000003000200000000000800000000000af301000400000000000000000000000100000004", 0x5d, 0x8c60}], 0x0, &(0x7f0000010f60)) getdents64(r0, &(0x7f0000000040)=""/4, 0x4) 04:05:14 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="1000000040000000030000002b00000005000000010000000000000000000000002000000020000010000000000000009f09c75f0000ffff53ef", 0x3a, 0x400}, {&(0x7f0000010080)="000000000000000000000000ede2de4df49d4f87b54a3176cfd4eb4f010040000c000000000000009f09c75f", 0x2c, 0x4e0}, {&(0x7f00000100c0)="01000000000000000000000000000000000000000401000012", 0x19, 0x560}, {&(0x7f00000100e0)="00000000000000000000000000000000000000000104", 0x16, 0x640}, {&(0x7f0000010100)='\x00'/23, 0x17, 0x7e0}, {&(0x7f0000010ce0)="00000000000000000000000000000000000000000000000000000000c99b0000ed410000000400009f09c75f9f09c75f9f09c75f00000000000003000200000000000800000000000af3010004", 0x4d, 0x8c60}], 0x0, &(0x7f0000010f60)) 04:05:14 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="1000000040000000030000002b00000005000000010000000000000000000000002000000020000010000000000000009f09c75f0000ffff53ef", 0x3a, 0x400}, {&(0x7f0000010080)="000000000000000000000000ede2de4df49d4f87b54a3176cfd4eb4f010040000c000000000000009f09c75f", 0x2c, 0x4e0}, {&(0x7f0000010100)="000000000000000000000000000000000000000000000000000000005178aedb03000000130000", 0x27, 0x7e0}, {&(0x7f0000010ce0)="00000000000000000000000000000000000000000000000000000000c99b0000ed410000000400009f09c75f9f09c75f9f09c75f00000000000003000200000000000800000000000af3010004", 0x4d, 0x8c60}], 0x0, &(0x7f0000010f60)) [ 1915.365844] loop4: detected capacity change from 0 to 140 [ 1915.371305] EXT4-fs (loop4): ext4_check_descriptors: Block bitmap for group 0 not in group (block 0)! [ 1915.372107] EXT4-fs (loop4): group descriptors corrupted! 04:05:14 executing program 6: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="1000000040000000030000002b00000005000000010000000000000000000000002000000020000010000000000000009f09c75f0000ffff53ef", 0x3a, 0x400}, {&(0x7f0000010100)="000000000000000000000000000000000000000000000000000000005178ae", 0x1f, 0x7e0}, {&(0x7f0000010ce0)="00000000000000000000000000000000000000000000000000000000c99b0000ed410000000400009f09c75f9f09c75f9f09c75f00000000000003000200000000000800000000000af301000400000000000000000000000100000004", 0x5d, 0x8c60}], 0x0, &(0x7f0000010f60)) getdents64(r0, &(0x7f0000000040)=""/4, 0x4) [ 1915.377340] EXT4-fs (loop5): unmounting filesystem 00000000-0000-0000-0000-000000000000. 04:05:14 executing program 7: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="1000000040000000030000002b00000005000000010000000000000000000000002000000020000010000000000000009f09c75f0000ffff53ef", 0x3a, 0x400}, {&(0x7f0000010100)="000000000000000000000000000000000000000000000000000000005178aedb030000001300000023", 0x29}, {&(0x7f0000010ce0)="00000000000000000000000000000000000000000000000000000000c99b0000ed410000000400009f09c75f9f09c75f9f09c75f00000000000003000200000000000800000000000af301000400000000000000000000000100000004", 0x5d, 0x8c60}], 0x0, &(0x7f0000010f60)) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) getdents64(r0, &(0x7f0000000040)=""/4, 0x4) 04:05:14 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="1000000040000000030000002b00000005000000010000000000000000000000002000000020000010000000000000009f09c75f0000ffff53ef", 0x3a, 0x400}, {&(0x7f0000010100)="000000000000000000000000000000000000000000000000000000005178aedb030000001300000023", 0x29, 0x7e0}, {&(0x7f0000010ce0)="00000000000000000000000000000000000000000000000000000000c99b0000ed410000000400009f09c75f9f09c75f9f09c75f00000000000003000200000000000800000000000af3010004000000000000000000000001", 0x59, 0x8c60}], 0x0, &(0x7f0000010f60)) (fail_nth: 1) [ 1915.445896] loop6: detected capacity change from 0 to 140 [ 1915.461336] loop3: detected capacity change from 0 to 140 [ 1915.471205] EXT4-fs (loop6): ext4_check_descriptors: Block bitmap for group 0 not in group (block 0)! [ 1915.473453] EXT4-fs (loop6): group descriptors corrupted! [ 1915.473897] EXT4-fs (loop3): VFS: Can't find ext4 filesystem 04:05:14 executing program 5: creat(&(0x7f00000003c0)='./file0\x00', 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext2\x00', &(0x7f0000000100)='./file0\x00', 0x40d00, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}], 0x0, &(0x7f0000013c00)=ANY=[]) 04:05:14 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="1000000040000000030000002b00000005000000010000000000000000000000002000000020000010000000000000009f09c75f0000ffff53ef", 0x3a, 0x400}, {&(0x7f0000010080)="000000000000000000000000ede2de4df49d4f87b54a3176cfd4eb4f010040000c000000000000009f09c75f", 0x2c, 0x4e0}, {&(0x7f00000100c0)="01000000000000000000000000000000000000000401000012", 0x19, 0x560}, {&(0x7f00000100e0)="00000000000000000000000000000000000000000104", 0x16, 0x640}, {&(0x7f0000010100)='\x00'/23, 0x17, 0x7e0}, {&(0x7f0000010ce0)="00000000000000000000000000000000000000000000000000000000c99b0000ed410000000400009f09c75f9f09c75f9f09c75f00000000000003000200000000000800000000000af3010004", 0x4d, 0x8c60}], 0x0, &(0x7f0000010f60)) [ 1915.481275] loop7: detected capacity change from 0 to 140 [ 1915.485712] loop0: detected capacity change from 0 to 140 [ 1915.492488] EXT4-fs (loop7): ext4_check_descriptors: Block bitmap for group 0 not in group (block 0)! [ 1915.493876] EXT4-fs (loop7): group descriptors corrupted! [ 1915.507169] EXT4-fs (loop0): ext4_check_descriptors: Inode table for group 0 not in group (block 0)! [ 1915.508634] EXT4-fs (loop0): group descriptors corrupted! [ 1915.523365] loop5: detected capacity change from 0 to 518 [ 1915.526295] FAULT_INJECTION: forcing a failure. [ 1915.526295] name failslab, interval 1, probability 0, space 0, times 0 [ 1915.527916] CPU: 0 UID: 0 PID: 13888 Comm: syz-executor.1 Not tainted 6.18.0-rc5-next-20251111 #1 PREEMPT(voluntary) [ 1915.527950] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1915.527964] Call Trace: [ 1915.527972] [ 1915.527980] dump_stack_lvl+0xfa/0x120 [ 1915.528009] should_fail_ex+0x4d7/0x5e0 [ 1915.528035] should_failslab+0xc2/0x120 [ 1915.528059] __kmalloc_cache_noprof+0x81/0x6b0 [ 1915.528089] ? task_active_pid_ns+0xa9/0xd0 [ 1915.528113] ? alloc_name+0x41/0x110 [ 1915.528146] ? alloc_name+0x41/0x110 [ 1915.528175] alloc_name+0x41/0x110 [ 1915.528205] __x64_sys_memfd_create+0x130/0x280 [ 1915.528238] ? __pfx___x64_sys_memfd_create+0x10/0x10 [ 1915.528272] ? lockdep_hardirqs_on_prepare+0xdb/0x1a0 [ 1915.528311] do_syscall_64+0xbf/0x430 [ 1915.528336] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 1915.528359] RIP: 0033:0x7f52e79b4b19 [ 1915.528376] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1915.528397] RSP: 002b:00007f52e4f29f48 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 1915.528420] RAX: ffffffffffffffda RBX: 0000000020000200 RCX: 00007f52e79b4b19 [ 1915.528435] RDX: 00000000000118c0 RSI: 0000000000000000 RDI: 00007f52e7a0e0fb [ 1915.528449] RBP: 0000000000000003 R08: 0000000000008c60 R09: ffffffffffffffff [ 1915.528462] R10: 0000000000000003 R11: 0000000000000246 R12: 0000000008100000 [ 1915.528476] R13: 0000000020000100 R14: 00000000000118c0 R15: 0000000020010f60 [ 1915.528505] [ 1915.530345] loop4: detected capacity change from 0 to 140 [ 1915.579060] EXT4-fs (loop5): mounting ext2 file system using the ext4 subsystem [ 1915.586423] EXT4-fs (loop4): ext4_check_descriptors: Block bitmap for group 0 not in group (block 0)! [ 1915.587216] EXT4-fs (loop4): group descriptors corrupted! [ 1915.606864] EXT4-fs (loop5): warning: mounting unchecked fs, running e2fsck is recommended [ 1915.635742] EXT4-fs (loop5): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: none. [ 1915.645296] EXT4-fs (loop5): unmounting filesystem 00000000-0000-0000-0000-000000000000. 04:05:24 executing program 3: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010100)="000000000000000000000000000000000000000000000000000000005178aedb030000001300000023", 0x29, 0x7e0}, {&(0x7f0000010ce0)="00000000000000000000000000000000000000000000000000000000c99b0000ed410000000400009f09c75f9f09c75f9f09c75f00000000000003000200000000000800000000000af301000400000000000000000000000100000004", 0x5d, 0x8c60}], 0x0, &(0x7f0000010f60)) getdents64(r0, &(0x7f0000000040)=""/4, 0x4) 04:05:24 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="1000000040000000030000002b00000005000000010000000000000000000000002000000020000010000000000000009f09c75f0000ffff53ef", 0x3a, 0x400}, {&(0x7f0000010080)="000000000000000000000000ede2de4df49d4f87b54a3176cfd4eb4f010040000c000000000000009f09c75f", 0x2c, 0x4e0}, {&(0x7f0000010100)="000000000000000000000000000000000000000000000000000000005178aedb03000000130000", 0x27, 0x7e0}, {&(0x7f0000010ce0)="00000000000000000000000000000000000000000000000000000000c99b0000ed410000000400009f09c75f9f09c75f9f09c75f00000000000003000200000000000800000000000af3010004", 0x4d, 0x8c60}], 0x0, &(0x7f0000010f60)) 04:05:24 executing program 6: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="1000000040000000030000002b00000005000000010000000000000000000000002000000020000010000000000000009f09c75f0000ffff53ef", 0x3a, 0x400}, {&(0x7f0000010100)="000000000000000000000000000000000000000000000000000000005178ae", 0x1f, 0x7e0}, {&(0x7f0000010ce0)="00000000000000000000000000000000000000000000000000000000c99b0000ed410000000400009f09c75f9f09c75f9f09c75f00000000000003000200000000000800000000000af301000400000000000000000000000100000004", 0x5d, 0x8c60}], 0x0, &(0x7f0000010f60)) getdents64(r0, &(0x7f0000000040)=""/4, 0x4) 04:05:24 executing program 7: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="1000000040000000030000002b00000005000000010000000000000000000000002000000020000010000000000000009f09c75f0000ffff53ef", 0x3a, 0x400}, {&(0x7f0000010100)="000000000000000000000000000000000000000000000000000000005178aedb030000001300000023", 0x29}, {&(0x7f0000010ce0)="00000000000000000000000000000000000000000000000000000000c99b0000ed410000000400009f09c75f9f09c75f9f09c75f00000000000003000200000000000800000000000af301000400000000000000000000000100000004", 0x5d, 0x8c60}], 0x0, &(0x7f0000010f60)) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) getdents64(r0, &(0x7f0000000040)=""/4, 0x4) 04:05:24 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="1000000040000000030000002b00000005000000010000000000000000000000002000000020000010000000000000009f09c75f0000ffff53ef", 0x3a, 0x400}, {&(0x7f0000010100)="000000000000000000000000000000000000000000000000000000005178aedb030000001300000023", 0x29, 0x7e0}, {&(0x7f0000010ce0)="00000000000000000000000000000000000000000000000000000000c99b0000ed410000000400009f09c75f9f09c75f9f09c75f00000000000003000200000000000800000000000af3010004000000000000000000000001", 0x59, 0x8c60}], 0x0, &(0x7f0000010f60)) (fail_nth: 2) 04:05:24 executing program 2: sendmsg$NL80211_CMD_UNEXPECTED_FRAME(0xffffffffffffffff, &(0x7f0000000400)={0x0, 0x0, &(0x7f0000000300)={&(0x7f00000002c0)={0x1c, 0x0, 0x1, 0x0, 0x0, {{}, {@val={0x8}, @void}}}, 0x1c}}, 0x0) sendmsg$NL80211_CMD_UPDATE_FT_IES(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000001c0)={0x24, 0x0, 0x1, 0x70bd2c, 0x0, {{}, {@val={0x8}, @void}}, [@NL80211_ATTR_MDID={0x6, 0xb1, 0xc116}]}, 0x24}, 0x1, 0x0, 0x0, 0x80}, 0xc000) r0 = creat(&(0x7f00000003c0)='./file1\x00', 0x0) sendmsg$netlink(0xffffffffffffffff, 0x0, 0x0) dup(0xffffffffffffffff) pwritev2(r0, &(0x7f0000000380)=[{&(0x7f0000000180)="bd", 0xfffffdef}], 0x1, 0x1200, 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) ioctl$FS_IOC_FSSETXATTR(r1, 0x40086602, &(0x7f0000000200)={0x9}) syz_io_uring_setup(0x0, &(0x7f0000000000)={0x0, 0x0, 0x4, 0x2, 0x309}, &(0x7f0000ffc000/0x2000)=nil, &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000000080), &(0x7f0000000240)) syz_io_uring_submit(0x0, 0x0, &(0x7f0000000280)=@IORING_OP_ASYNC_CANCEL={0xe, 0x0, 0x0, 0x0, 0x0, 0x12345}, 0x1ff) 04:05:24 executing program 5: creat(&(0x7f00000003c0)='./file0\x00', 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext2\x00', &(0x7f0000000100)='./file0\x00', 0x40d05, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}], 0x0, &(0x7f0000013c00)=ANY=[]) 04:05:24 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="1000000040000000030000002b00000005000000010000000000000000000000002000000020000010000000000000009f09c75f0000ffff53ef", 0x3a, 0x400}, {&(0x7f0000010080)="000000000000000000000000ede2de4df49d4f87b54a3176cfd4eb4f010040000c000000000000009f09c75f", 0x2c, 0x4e0}, {&(0x7f00000100c0)="01000000000000000000000000000000000000000401000012", 0x19, 0x560}, {&(0x7f00000100e0)="00000000000000000000000000000000000000000104", 0x16, 0x640}, {&(0x7f0000010100)="000000000000000000000000000000000000000000000000000000005178aedb030000", 0x23, 0x7e0}, {&(0x7f0000010ce0)="00000000000000000000000000000000000000000000000000000000c99b0000ed410000000400009f09c75f9f09c75f9f09c75f00000000000003000200000000000800000000000af3010004", 0x4d, 0x8c60}], 0x0, &(0x7f0000010f60)) [ 1925.146670] loop3: detected capacity change from 0 to 140 [ 1925.147895] loop5: detected capacity change from 0 to 518 [ 1925.155630] EXT4-fs (loop5): mounting ext2 file system using the ext4 subsystem [ 1925.158028] EXT4-fs (loop3): VFS: Can't find ext4 filesystem [ 1925.158605] EXT4-fs (loop5): warning: mounting unchecked fs, running e2fsck is recommended [ 1925.166963] EXT4-fs (loop5): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: none. [ 1925.172968] EXT4-fs (loop5): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 1925.183545] loop4: detected capacity change from 0 to 140 [ 1925.189671] loop0: detected capacity change from 0 to 140 04:05:24 executing program 3: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x3, &(0x7f0000000200)=[{0x0, 0x0, 0x400}, {&(0x7f0000010100)="000000000000000000000000000000000000000000000000000000005178aedb030000001300000023", 0x29, 0x7e0}, {&(0x7f0000010ce0)="00000000000000000000000000000000000000000000000000000000c99b0000ed410000000400009f09c75f9f09c75f9f09c75f00000000000003000200000000000800000000000af301000400000000000000000000000100000004", 0x5d, 0x8c60}], 0x0, &(0x7f0000010f60)) getdents64(r0, &(0x7f0000000040)=""/4, 0x4) [ 1925.209229] EXT4-fs (loop0): ext4_check_descriptors: Inode table for group 0 not in group (block 0)! [ 1925.210768] EXT4-fs (loop0): group descriptors corrupted! [ 1925.213633] loop6: detected capacity change from 0 to 140 [ 1925.215578] EXT4-fs (loop4): ext4_check_descriptors: Inode bitmap for group 0 not in group (block 0)! [ 1925.216318] EXT4-fs (loop4): group descriptors corrupted! [ 1925.219538] loop1: detected capacity change from 0 to 140 [ 1925.222788] loop7: detected capacity change from 0 to 140 [ 1925.227520] EXT4-fs (loop6): ext4_check_descriptors: Block bitmap for group 0 not in group (block 0)! [ 1925.228992] EXT4-fs (loop6): group descriptors corrupted! [ 1925.238983] EXT4-fs (loop7): ext4_check_descriptors: Block bitmap for group 0 not in group (block 0)! [ 1925.239718] EXT4-fs (loop7): group descriptors corrupted! [ 1925.260762] loop3: detected capacity change from 0 to 140 04:05:24 executing program 5: creat(&(0x7f00000003c0)='./file0\x00', 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext2\x00', &(0x7f0000000100)='./file0\x00', 0x40e00, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}], 0x0, &(0x7f0000013c00)=ANY=[]) [ 1925.262861] EXT4-fs error (device loop1): ext4_ext_check_inode:523: inode #2: comm syz-executor.1: pblk 0 bad header/extent: invalid extent entries - magic f30a, entries 1, max 4(4), depth 0(0) 04:05:24 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="1000000040000000030000002b00000005000000010000000000000000000000002000000020000010000000000000009f09c75f0000ffff53ef", 0x3a, 0x400}, {&(0x7f0000010080)="000000000000000000000000ede2de4df49d4f87b54a3176cfd4eb4f010040000c000000000000009f09c75f", 0x2c, 0x4e0}, {&(0x7f00000100c0)="01000000000000000000000000000000000000000401000012", 0x19, 0x560}, {&(0x7f00000100e0)="00000000000000000000000000000000000000000104", 0x16, 0x640}, {&(0x7f0000010100)="000000000000000000000000000000000000000000000000000000005178aedb030000", 0x23, 0x7e0}, {&(0x7f0000010ce0)="00000000000000000000000000000000000000000000000000000000c99b0000ed410000000400009f09c75f9f09c75f9f09c75f00000000000003000200000000000800000000000af3010004", 0x4d, 0x8c60}], 0x0, &(0x7f0000010f60)) [ 1925.291047] EXT4-fs (loop1): get root inode failed [ 1925.291843] EXT4-fs (loop1): mount failed 04:05:24 executing program 7: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010100)="000000000000000000000000000000000000000000000000000000005178aedb030000001300000023", 0x29, 0x7e0}, {&(0x7f0000010ce0)="00000000000000000000000000000000000000000000000000000000c99b0000ed410000000400009f09c75f9f09c75f9f09c75f00000000000003000200000000000800000000000af301000400000000000000000000000100000004", 0x5d, 0x8c60}], 0x0, &(0x7f0000010f60)) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) getdents64(r0, &(0x7f0000000040)=""/4, 0x4) 04:05:24 executing program 6: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="1000000040000000030000002b00000005000000010000000000000000000000002000000020000010000000000000009f09c75f0000ffff53ef", 0x3a, 0x400}, {&(0x7f0000010100)="000000000000000000000000000000000000000000000000000000005178ae", 0x1f, 0x7e0}, {&(0x7f0000010ce0)="00000000000000000000000000000000000000000000000000000000c99b0000ed410000000400009f09c75f9f09c75f9f09c75f00000000000003000200000000000800000000000af301000400000000000000000000000100000004", 0x5d, 0x8c60}], 0x0, &(0x7f0000010f60)) getdents64(r0, &(0x7f0000000040)=""/4, 0x4) [ 1925.354489] EXT4-fs (loop3): VFS: Can't find ext4 filesystem 04:05:24 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="1000000040000000030000002b00000005000000010000000000000000000000002000000020000010000000000000009f09c75f0000ffff53ef", 0x3a, 0x400}, {&(0x7f0000010080)="000000000000000000000000ede2de4df49d4f87b54a3176cfd4eb4f010040000c000000000000009f09c75f", 0x2c, 0x4e0}, {&(0x7f0000010100)="000000000000000000000000000000000000000000000000000000005178aedb0300000013000000", 0x28, 0x7e0}, {&(0x7f0000010ce0)="00000000000000000000000000000000000000000000000000000000c99b0000ed410000000400009f09c75f9f09c75f9f09c75f00000000000003000200000000000800000000000af3010004", 0x4d, 0x8c60}], 0x0, &(0x7f0000010f60)) [ 1925.363400] loop4: detected capacity change from 0 to 140 [ 1925.373106] EXT4-fs (loop4): ext4_check_descriptors: Inode bitmap for group 0 not in group (block 0)! [ 1925.373883] EXT4-fs (loop4): group descriptors corrupted! 04:05:24 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="1000000040000000030000002b00000005000000010000000000000000000000002000000020000010000000000000009f09c75f0000ffff53ef", 0x3a, 0x400}, {&(0x7f0000010100)="000000000000000000000000000000000000000000000000000000005178aedb030000001300000023", 0x29, 0x7e0}, {&(0x7f0000010ce0)="00000000000000000000000000000000000000000000000000000000c99b0000ed410000000400009f09c75f9f09c75f9f09c75f00000000000003000200000000000800000000000af3010004000000000000000000000001", 0x59, 0x8c60}], 0x0, &(0x7f0000010f60)) (fail_nth: 3) [ 1925.404351] loop5: detected capacity change from 0 to 519 [ 1925.415014] EXT4-fs (loop5): mounting ext2 file system using the ext4 subsystem [ 1925.423661] EXT4-fs (loop5): warning: mounting unchecked fs, running e2fsck is recommended [ 1925.433306] EXT4-fs (loop5): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: none. [ 1925.441956] EXT4-fs (loop5): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 1925.496616] loop7: detected capacity change from 0 to 140 [ 1925.522965] loop6: detected capacity change from 0 to 140 [ 1925.529106] EXT4-fs (loop6): ext4_check_descriptors: Block bitmap for group 0 not in group (block 0)! [ 1925.529826] EXT4-fs (loop6): group descriptors corrupted! [ 1925.530435] EXT4-fs (loop7): VFS: Can't find ext4 filesystem [ 1925.534204] loop0: detected capacity change from 0 to 140 [ 1925.541195] FAULT_INJECTION: forcing a failure. [ 1925.541195] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 1925.542904] CPU: 0 UID: 0 PID: 13939 Comm: syz-executor.1 Not tainted 6.18.0-rc5-next-20251111 #1 PREEMPT(voluntary) [ 1925.542940] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1925.542953] Call Trace: [ 1925.542961] [ 1925.542970] dump_stack_lvl+0xfa/0x120 [ 1925.542999] should_fail_ex+0x4d7/0x5e0 [ 1925.543025] strncpy_from_user+0x3b/0x2f0 [ 1925.543058] alloc_name+0x78/0x110 [ 1925.543090] __x64_sys_memfd_create+0x130/0x280 [ 1925.543123] ? __pfx___x64_sys_memfd_create+0x10/0x10 [ 1925.543155] ? lockdep_hardirqs_on_prepare+0xdb/0x1a0 [ 1925.543195] do_syscall_64+0xbf/0x430 [ 1925.543220] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 1925.543242] RIP: 0033:0x7f52e79b4b19 [ 1925.543260] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1925.543282] RSP: 002b:00007f52e4f29f48 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 1925.543303] RAX: ffffffffffffffda RBX: 0000000020000200 RCX: 00007f52e79b4b19 [ 1925.543319] RDX: 00000000000118c0 RSI: 0000000000000000 RDI: 00007f52e7a0e0fb [ 1925.543333] RBP: 0000000000000003 R08: 0000000000008c60 R09: ffffffffffffffff [ 1925.543347] R10: 0000000000000003 R11: 0000000000000246 R12: 0000000008100000 [ 1925.543361] R13: 0000000020000100 R14: 00000000000118c0 R15: 0000000020010f60 [ 1925.543390] [ 1925.579292] EXT4-fs (loop0): ext4_check_descriptors: Inode table for group 0 not in group (block 0)! [ 1925.580783] EXT4-fs (loop0): group descriptors corrupted! 04:05:33 executing program 2: sendmsg$NL80211_CMD_UNEXPECTED_FRAME(0xffffffffffffffff, &(0x7f0000000400)={0x0, 0x0, &(0x7f0000000300)={&(0x7f00000002c0)={0x1c, 0x0, 0x1, 0x0, 0x0, {{}, {@val={0x8}, @void}}}, 0x1c}}, 0x0) sendmsg$NL80211_CMD_UPDATE_FT_IES(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000001c0)={0x24, 0x0, 0x1, 0x70bd2c, 0x0, {{}, {@val={0x8}, @void}}, [@NL80211_ATTR_MDID={0x6, 0xb1, 0xc116}]}, 0x24}, 0x1, 0x0, 0x0, 0x80}, 0xc000) r0 = creat(&(0x7f00000003c0)='./file1\x00', 0x0) sendmsg$netlink(0xffffffffffffffff, 0x0, 0x0) dup(0xffffffffffffffff) pwritev2(r0, &(0x7f0000000380)=[{&(0x7f0000000180)="bd", 0xfffffdef}], 0x1, 0x1200, 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) ioctl$FS_IOC_FSSETXATTR(r1, 0x40087602, &(0x7f0000000200)={0x9}) syz_io_uring_setup(0x0, &(0x7f0000000000)={0x0, 0x0, 0x4, 0x2, 0x309}, &(0x7f0000ffc000/0x2000)=nil, &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000000080), &(0x7f0000000240)) syz_io_uring_submit(0x0, 0x0, &(0x7f0000000280)=@IORING_OP_ASYNC_CANCEL={0xe, 0x0, 0x0, 0x0, 0x0, 0x12345}, 0x1ff) 04:05:33 executing program 7: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010100)="000000000000000000000000000000000000000000000000000000005178aedb030000001300000023", 0x29, 0x7e0}, {&(0x7f0000010ce0)="00000000000000000000000000000000000000000000000000000000c99b0000ed410000000400009f09c75f9f09c75f9f09c75f00000000000003000200000000000800000000000af301000400000000000000000000000100000004", 0x5d, 0x8c60}], 0x0, &(0x7f0000010f60)) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) getdents64(r0, &(0x7f0000000040)=""/4, 0x4) 04:05:33 executing program 6: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="1000000040000000030000002b00000005000000010000000000000000000000002000000020000010000000000000009f09c75f0000ffff53ef", 0x3a, 0x400}, {&(0x7f0000010100)="000000000000000000000000000000000000000000000000000000005178aedb03000000", 0x24, 0x7e0}, {&(0x7f0000010ce0)="00000000000000000000000000000000000000000000000000000000c99b0000ed410000000400009f09c75f9f09c75f9f09c75f00000000000003000200000000000800000000000af301000400000000000000000000000100000004", 0x5d, 0x8c60}], 0x0, &(0x7f0000010f60)) getdents64(r0, &(0x7f0000000040)=""/4, 0x4) 04:05:33 executing program 3: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x3, &(0x7f0000000200)=[{0x0, 0x0, 0x400}, {&(0x7f0000010100)="000000000000000000000000000000000000000000000000000000005178aedb030000001300000023", 0x29, 0x7e0}, {&(0x7f0000010ce0)="00000000000000000000000000000000000000000000000000000000c99b0000ed410000000400009f09c75f9f09c75f9f09c75f00000000000003000200000000000800000000000af301000400000000000000000000000100000004", 0x5d, 0x8c60}], 0x0, &(0x7f0000010f60)) getdents64(r0, &(0x7f0000000040)=""/4, 0x4) 04:05:33 executing program 5: creat(&(0x7f00000003c0)='./file0\x00', 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext2\x00', &(0x7f0000000100)='./file0\x00', 0x41004, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}], 0x0, &(0x7f0000013c00)=ANY=[]) 04:05:33 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="1000000040000000030000002b00000005000000010000000000000000000000002000000020000010000000000000009f09c75f0000ffff53ef", 0x3a, 0x400}, {&(0x7f0000010100)="000000000000000000000000000000000000000000000000000000005178aedb030000001300000023", 0x29, 0x7e0}, {&(0x7f0000010ce0)="00000000000000000000000000000000000000000000000000000000c99b0000ed410000000400009f09c75f9f09c75f9f09c75f00000000000003000200000000000800000000000af3010004000000000000000000000001", 0x59, 0x8c60}], 0x0, &(0x7f0000010f60)) (fail_nth: 4) 04:05:33 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="1000000040000000030000002b00000005000000010000000000000000000000002000000020000010000000000000009f09c75f0000ffff53ef", 0x3a, 0x400}, {&(0x7f0000010080)="000000000000000000000000ede2de4df49d4f87b54a3176cfd4eb4f010040000c000000000000009f09c75f", 0x2c, 0x4e0}, {&(0x7f00000100c0)="01000000000000000000000000000000000000000401000012", 0x19, 0x560}, {&(0x7f00000100e0)="00000000000000000000000000000000000000000104", 0x16, 0x640}, {&(0x7f0000010100)="000000000000000000000000000000000000000000000000000000005178aedb030000", 0x23, 0x7e0}, {&(0x7f0000010ce0)="00000000000000000000000000000000000000000000000000000000c99b0000ed410000000400009f09c75f9f09c75f9f09c75f00000000000003000200000000000800000000000af3010004", 0x4d, 0x8c60}], 0x0, &(0x7f0000010f60)) 04:05:33 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="1000000040000000030000002b00000005000000010000000000000000000000002000000020000010000000000000009f09c75f0000ffff53ef", 0x3a, 0x400}, {&(0x7f0000010080)="000000000000000000000000ede2de4df49d4f87b54a3176cfd4eb4f010040000c000000000000009f09c75f", 0x2c, 0x4e0}, {&(0x7f0000010100)="000000000000000000000000000000000000000000000000000000005178aedb0300000013000000", 0x28, 0x7e0}, {&(0x7f0000010ce0)="00000000000000000000000000000000000000000000000000000000c99b0000ed410000000400009f09c75f9f09c75f9f09c75f00000000000003000200000000000800000000000af3010004", 0x4d, 0x8c60}], 0x0, &(0x7f0000010f60)) [ 1934.271879] loop3: detected capacity change from 0 to 140 [ 1934.274594] loop6: detected capacity change from 0 to 140 [ 1934.281110] loop5: detected capacity change from 0 to 520 [ 1934.284878] EXT4-fs (loop6): ext4_check_descriptors: Inode bitmap for group 0 not in group (block 0)! [ 1934.285647] EXT4-fs (loop6): group descriptors corrupted! [ 1934.286980] EXT4-fs (loop3): VFS: Can't find ext4 filesystem [ 1934.290656] EXT4-fs (loop5): mounting ext2 file system using the ext4 subsystem [ 1934.292728] EXT4-fs (loop5): warning: mounting unchecked fs, running e2fsck is recommended [ 1934.303267] loop7: detected capacity change from 0 to 140 [ 1934.304204] EXT4-fs (loop5): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: none. [ 1934.306911] FAULT_INJECTION: forcing a failure. [ 1934.306911] name failslab, interval 1, probability 0, space 0, times 0 [ 1934.308748] CPU: 0 UID: 0 PID: 13962 Comm: syz-executor.1 Not tainted 6.18.0-rc5-next-20251111 #1 PREEMPT(voluntary) [ 1934.308780] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1934.308795] Call Trace: [ 1934.308805] [ 1934.308814] dump_stack_lvl+0xfa/0x120 [ 1934.308845] should_fail_ex+0x4d7/0x5e0 [ 1934.308873] ? shmem_alloc_inode+0x27/0x50 [ 1934.308904] should_failslab+0xc2/0x120 [ 1934.308936] kmem_cache_alloc_lru_noprof+0x84/0x690 [ 1934.308969] ? __lock_acquire+0xc65/0x1b70 [ 1934.309009] ? shmem_alloc_inode+0x27/0x50 [ 1934.309038] shmem_alloc_inode+0x27/0x50 [ 1934.309067] ? __pfx_shmem_alloc_inode+0x10/0x10 [ 1934.309097] alloc_inode+0x67/0x250 [ 1934.309126] new_inode+0x1e/0x160 [ 1934.309155] __shmem_get_inode+0x17c/0xea0 [ 1934.309194] __shmem_file_setup+0x108/0x370 [ 1934.309227] ? alloc_fd+0x2c1/0x560 [ 1934.309263] alloc_file+0x2ae/0x590 [ 1934.309299] __x64_sys_memfd_create+0x193/0x280 [ 1934.309334] ? __pfx___x64_sys_memfd_create+0x10/0x10 [ 1934.309369] ? lockdep_hardirqs_on_prepare+0xdb/0x1a0 [ 1934.309410] do_syscall_64+0xbf/0x430 [ 1934.309436] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 1934.309460] RIP: 0033:0x7f52e79b4b19 [ 1934.309478] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1934.309501] RSP: 002b:00007f52e4f29f48 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 1934.309525] RAX: ffffffffffffffda RBX: 0000000020000200 RCX: 00007f52e79b4b19 [ 1934.309541] RDX: 00000000000118c0 RSI: 0000000000000000 RDI: 00007f52e7a0e0fb [ 1934.309556] RBP: 0000000000000003 R08: 0000000000008c60 R09: ffffffffffffffff [ 1934.309570] R10: 0000000000000003 R11: 0000000000000246 R12: 0000000008100000 [ 1934.309585] R13: 0000000020000100 R14: 00000000000118c0 R15: 0000000020010f60 [ 1934.309616] [ 1934.312884] EXT4-fs (loop5): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 1934.316697] loop4: detected capacity change from 0 to 140 [ 1934.324999] EXT4-fs (loop7): VFS: Can't find ext4 filesystem [ 1934.337436] loop0: detected capacity change from 0 to 140 [ 1934.340079] EXT4-fs (loop4): ext4_check_descriptors: Inode bitmap for group 0 not in group (block 0)! [ 1934.341704] EXT4-fs (loop4): group descriptors corrupted! 04:05:33 executing program 6: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="1000000040000000030000002b00000005000000010000000000000000000000002000000020000010000000000000009f09c75f0000ffff53ef", 0x3a, 0x400}, {&(0x7f0000010100)="000000000000000000000000000000000000000000000000000000005178aedb03000000", 0x24, 0x7e0}, {&(0x7f0000010ce0)="00000000000000000000000000000000000000000000000000000000c99b0000ed410000000400009f09c75f9f09c75f9f09c75f00000000000003000200000000000800000000000af301000400000000000000000000000100000004", 0x5d, 0x8c60}], 0x0, &(0x7f0000010f60)) getdents64(r0, &(0x7f0000000040)=""/4, 0x4) [ 1934.359279] EXT4-fs warning (device sda): __ext4_ioctl:1550: Setting inode version is not supported with metadata_csum enabled. [ 1934.372823] EXT4-fs (loop0): ext4_check_descriptors: Inode table for group 0 not in group (block 0)! [ 1934.374534] EXT4-fs (loop0): group descriptors corrupted! 04:05:33 executing program 3: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x3, &(0x7f0000000200)=[{0x0, 0x0, 0x400}, {&(0x7f0000010100)="000000000000000000000000000000000000000000000000000000005178aedb030000001300000023", 0x29, 0x7e0}, {&(0x7f0000010ce0)="00000000000000000000000000000000000000000000000000000000c99b0000ed410000000400009f09c75f9f09c75f9f09c75f00000000000003000200000000000800000000000af301000400000000000000000000000100000004", 0x5d, 0x8c60}], 0x0, &(0x7f0000010f60)) getdents64(r0, &(0x7f0000000040)=""/4, 0x4) 04:05:33 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="1000000040000000030000002b00000005000000010000000000000000000000002000000020000010000000000000009f09c75f0000ffff53ef", 0x3a, 0x400}, {&(0x7f0000010100)="000000000000000000000000000000000000000000000000000000005178aedb030000001300000023", 0x29, 0x7e0}, {&(0x7f0000010ce0)="00000000000000000000000000000000000000000000000000000000c99b0000ed410000000400009f09c75f9f09c75f9f09c75f00000000000003000200000000000800000000000af3010004000000000000000000000001", 0x59, 0x8c60}], 0x0, &(0x7f0000010f60)) (fail_nth: 5) [ 1934.389030] loop6: detected capacity change from 0 to 140 [ 1934.404511] EXT4-fs (loop6): ext4_check_descriptors: Inode bitmap for group 0 not in group (block 0)! [ 1934.405273] EXT4-fs (loop6): group descriptors corrupted! [ 1934.446818] loop1: detected capacity change from 0 to 140 [ 1934.468336] EXT4-fs error (device loop1): ext4_ext_check_inode:523: inode #2: comm syz-executor.1: pblk 0 bad header/extent: invalid extent entries - magic f30a, entries 1, max 4(4), depth 0(0) [ 1934.474222] EXT4-fs (loop1): get root inode failed [ 1934.474656] EXT4-fs (loop1): mount failed 04:05:33 executing program 7: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010100)="000000000000000000000000000000000000000000000000000000005178aedb030000001300000023", 0x29, 0x7e0}, {&(0x7f0000010ce0)="00000000000000000000000000000000000000000000000000000000c99b0000ed410000000400009f09c75f9f09c75f9f09c75f00000000000003000200000000000800000000000af301000400000000000000000000000100000004", 0x5d, 0x8c60}], 0x0, &(0x7f0000010f60)) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) getdents64(r0, &(0x7f0000000040)=""/4, 0x4) 04:05:33 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="1000000040000000030000002b00000005000000010000000000000000000000002000000020000010000000000000009f09c75f0000ffff53ef", 0x3a, 0x400}, {&(0x7f0000010080)="000000000000000000000000ede2de4df49d4f87b54a3176cfd4eb4f010040000c000000000000009f09c75f", 0x2c, 0x4e0}, {&(0x7f00000100c0)="01000000000000000000000000000000000000000401000012", 0x19, 0x560}, {&(0x7f00000100e0)="00000000000000000000000000000000000000000104", 0x16, 0x640}, {&(0x7f0000010100)="000000000000000000000000000000000000000000000000000000005178aedb030000001300000023", 0x29, 0x7e0}, {&(0x7f0000010ce0)="00000000000000000000000000000000000000000000000000000000c99b0000ed410000000400009f09c75f9f09c75f9f09c75f00000000000003000200000000000800000000000af3010004", 0x4d, 0x8c60}], 0x0, &(0x7f0000010f60)) 04:05:33 executing program 6: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="1000000040000000030000002b00000005000000010000000000000000000000002000000020000010000000000000009f09c75f0000ffff53ef", 0x3a, 0x400}, {&(0x7f0000010100)="000000000000000000000000000000000000000000000000000000005178aedb03000000", 0x24, 0x7e0}, {&(0x7f0000010ce0)="00000000000000000000000000000000000000000000000000000000c99b0000ed410000000400009f09c75f9f09c75f9f09c75f00000000000003000200000000000800000000000af301000400000000000000000000000100000004", 0x5d, 0x8c60}], 0x0, &(0x7f0000010f60)) getdents64(r0, &(0x7f0000000040)=""/4, 0x4) 04:05:33 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="1000000040000000030000002b00000005000000010000000000000000000000002000000020000010000000000000009f09c75f0000ffff53ef", 0x3a, 0x400}, {&(0x7f0000010080)="000000000000000000000000ede2de4df49d4f87b54a3176cfd4eb4f010040000c000000000000009f09c75f", 0x2c, 0x4e0}, {&(0x7f0000010100)="000000000000000000000000000000000000000000000000000000005178aedb0300000013000000", 0x28, 0x7e0}, {&(0x7f0000010ce0)="00000000000000000000000000000000000000000000000000000000c99b0000ed410000000400009f09c75f9f09c75f9f09c75f00000000000003000200000000000800000000000af3010004", 0x4d, 0x8c60}], 0x0, &(0x7f0000010f60)) [ 1934.512463] loop4: detected capacity change from 0 to 140 [ 1934.513530] loop3: detected capacity change from 0 to 140 [ 1934.520397] loop6: detected capacity change from 0 to 140 [ 1934.525708] EXT4-fs (loop3): VFS: Can't find ext4 filesystem [ 1934.532787] EXT4-fs error (device loop4): ext4_ext_check_inode:523: inode #2: comm syz-executor.4: pblk 0 bad header/extent: invalid extent entries - magic f30a, entries 1, max 4(4), depth 0(0) [ 1934.536588] EXT4-fs (loop6): ext4_check_descriptors: Inode bitmap for group 0 not in group (block 0)! [ 1934.538137] EXT4-fs (loop6): group descriptors corrupted! [ 1934.542372] EXT4-fs (loop4): get root inode failed [ 1934.542909] EXT4-fs (loop4): mount failed 04:05:33 executing program 5: creat(&(0x7f00000003c0)='./file0\x00', 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext2\x00', &(0x7f0000000100)='./file0\x00', 0x41020, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}], 0x0, &(0x7f0000013c00)=ANY=[]) [ 1934.558225] loop7: detected capacity change from 0 to 140 [ 1934.569889] loop0: detected capacity change from 0 to 140 [ 1934.573313] EXT4-fs (loop0): ext4_check_descriptors: Inode table for group 0 not in group (block 0)! [ 1934.574199] EXT4-fs (loop0): group descriptors corrupted! [ 1934.593261] EXT4-fs (loop7): VFS: Can't find ext4 filesystem [ 1934.620570] loop5: detected capacity change from 0 to 520 [ 1934.661234] EXT4-fs (loop5): mounting ext2 file system using the ext4 subsystem [ 1934.669533] EXT4-fs (loop5): warning: mounting unchecked fs, running e2fsck is recommended [ 1934.689030] EXT4-fs (loop5): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: none. [ 1934.691862] EXT4-fs (loop5): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 1934.974592] EXT4-fs warning (device sda): __ext4_ioctl:1550: Setting inode version is not supported with metadata_csum enabled. 04:05:46 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="1000000040000000030000002b00000005000000010000000000000000000000002000000020000010000000000000009f09c75f0000ffff53ef", 0x3a, 0x400}, {&(0x7f0000010080)="000000000000000000000000ede2de4df49d4f87b54a3176cfd4eb4f010040000c000000000000009f09c75f", 0x2c, 0x4e0}, {&(0x7f00000100c0)="01000000000000000000000000000000000000000401000012", 0x19, 0x560}, {&(0x7f00000100e0)="00000000000000000000000000000000000000000104", 0x16, 0x640}, {&(0x7f0000010100)="000000000000000000000000000000000000000000000000000000005178aedb03000000", 0x24, 0x7e0}, {&(0x7f0000010ce0)="00000000000000000000000000000000000000000000000000000000c99b0000ed410000000400009f09c75f9f09c75f9f09c75f00000000000003000200000000000800000000000af3010004", 0x4d, 0x8c60}], 0x0, &(0x7f0000010f60)) 04:05:46 executing program 2: sendmsg$NL80211_CMD_UNEXPECTED_FRAME(0xffffffffffffffff, &(0x7f0000000400)={0x0, 0x0, &(0x7f0000000300)={&(0x7f00000002c0)={0x1c, 0x0, 0x1, 0x0, 0x0, {{}, {@val={0x8}, @void}}}, 0x1c}}, 0x0) sendmsg$NL80211_CMD_UPDATE_FT_IES(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000001c0)={0x24, 0x0, 0x1, 0x70bd2c, 0x0, {{}, {@val={0x8}, @void}}, [@NL80211_ATTR_MDID={0x6, 0xb1, 0xc116}]}, 0x24}, 0x1, 0x0, 0x0, 0x80}, 0xc000) r0 = creat(&(0x7f00000003c0)='./file1\x00', 0x0) sendmsg$netlink(0xffffffffffffffff, 0x0, 0x0) dup(0xffffffffffffffff) pwritev2(r0, &(0x7f0000000380)=[{&(0x7f0000000180)="bd", 0xfffffdef}], 0x1, 0x1200, 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) ioctl$FS_IOC_FSSETXATTR(r1, 0x401c5821, &(0x7f0000000200)={0x9}) syz_io_uring_setup(0x0, &(0x7f0000000000)={0x0, 0x0, 0x4, 0x2, 0x309}, &(0x7f0000ffc000/0x2000)=nil, &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000000080), &(0x7f0000000240)) syz_io_uring_submit(0x0, 0x0, &(0x7f0000000280)=@IORING_OP_ASYNC_CANCEL={0xe, 0x0, 0x0, 0x0, 0x0, 0x12345}, 0x1ff) 04:05:46 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="1000000040000000030000002b00000005000000010000000000000000000000002000000020000010000000000000009f09c75f0000ffff53ef", 0x3a, 0x400}, {&(0x7f0000010080)="000000000000000000000000ede2de4df49d4f87b54a3176cfd4eb4f010040000c000000000000009f09c75f", 0x2c, 0x4e0}, {&(0x7f0000010100)="000000000000000000000000000000000000000000000000000000005178aedb030000001300000023", 0x29}, {&(0x7f0000010ce0)="00000000000000000000000000000000000000000000000000000000c99b0000ed410000000400009f09c75f9f09c75f9f09c75f00000000000003000200000000000800000000000af3010004", 0x4d, 0x8c60}], 0x0, &(0x7f0000010f60)) 04:05:46 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="1000000040000000030000002b00000005000000010000000000000000000000002000000020000010000000000000009f09c75f0000ffff53ef", 0x3a, 0x400}, {&(0x7f0000010100)="000000000000000000000000000000000000000000000000000000005178aedb030000001300000023", 0x29, 0x7e0}, {&(0x7f0000010ce0)="00000000000000000000000000000000000000000000000000000000c99b0000ed410000000400009f09c75f9f09c75f9f09c75f00000000000003000200000000000800000000000af3010004000000000000000000000001", 0x59, 0x8c60}], 0x0, &(0x7f0000010f60)) (fail_nth: 6) 04:05:46 executing program 3: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000), 0x0, 0x400}, {&(0x7f0000010100)="000000000000000000000000000000000000000000000000000000005178aedb030000001300000023", 0x29, 0x7e0}, {&(0x7f0000010ce0)="00000000000000000000000000000000000000000000000000000000c99b0000ed410000000400009f09c75f9f09c75f9f09c75f00000000000003000200000000000800000000000af301000400000000000000000000000100000004", 0x5d, 0x8c60}], 0x0, &(0x7f0000010f60)) getdents64(r0, &(0x7f0000000040)=""/4, 0x4) 04:05:46 executing program 6: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="1000000040000000030000002b00000005000000010000000000000000000000002000000020000010000000000000009f09c75f0000ffff53ef", 0x3a, 0x400}, {&(0x7f0000010100)="000000000000000000000000000000000000000000000000000000005178aedb03000000130000", 0x27, 0x7e0}, {&(0x7f0000010ce0)="00000000000000000000000000000000000000000000000000000000c99b0000ed410000000400009f09c75f9f09c75f9f09c75f00000000000003000200000000000800000000000af301000400000000000000000000000100000004", 0x5d, 0x8c60}], 0x0, &(0x7f0000010f60)) getdents64(r0, &(0x7f0000000040)=""/4, 0x4) 04:05:46 executing program 7: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x3, &(0x7f0000000200)=[{0x0, 0x0, 0x400}, {&(0x7f0000010100)="000000000000000000000000000000000000000000000000000000005178aedb030000001300000023", 0x29, 0x7e0}, {&(0x7f0000010ce0)="00000000000000000000000000000000000000000000000000000000c99b0000ed410000000400009f09c75f9f09c75f9f09c75f00000000000003000200000000000800000000000af301000400000000000000000000000100000004", 0x5d, 0x8c60}], 0x0, &(0x7f0000010f60)) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) getdents64(r0, &(0x7f0000000040)=""/4, 0x4) 04:05:46 executing program 5: creat(&(0x7f00000003c0)='./file0\x00', 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext2\x00', &(0x7f0000000100)='./file0\x00', 0x41100, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}], 0x0, &(0x7f0000013c00)=ANY=[]) [ 1947.221783] FAULT_INJECTION: forcing a failure. [ 1947.221783] name failslab, interval 1, probability 0, space 0, times 0 [ 1947.222764] CPU: 1 UID: 0 PID: 14002 Comm: syz-executor.1 Not tainted 6.18.0-rc5-next-20251111 #1 PREEMPT(voluntary) [ 1947.222781] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1947.222789] Call Trace: [ 1947.222794] [ 1947.222799] dump_stack_lvl+0xfa/0x120 [ 1947.222822] should_fail_ex+0x4d7/0x5e0 [ 1947.222838] ? security_inode_alloc+0x3e/0x130 [ 1947.222851] should_failslab+0xc2/0x120 [ 1947.222866] kmem_cache_alloc_noprof+0x80/0x690 [ 1947.222883] ? __pfx_map_id_range_down+0x10/0x10 [ 1947.222901] ? security_inode_alloc+0x3e/0x130 [ 1947.222911] security_inode_alloc+0x3e/0x130 [ 1947.222923] inode_init_always_gfp+0xc9d/0xff0 [ 1947.222946] alloc_inode+0x8d/0x250 [ 1947.222960] new_inode+0x1e/0x160 [ 1947.222975] __shmem_get_inode+0x17c/0xea0 [ 1947.222996] __shmem_file_setup+0x108/0x370 [ 1947.223013] ? alloc_fd+0x2c1/0x560 [ 1947.223031] alloc_file+0x2ae/0x590 [ 1947.223050] __x64_sys_memfd_create+0x193/0x280 [ 1947.223068] ? __pfx___x64_sys_memfd_create+0x10/0x10 [ 1947.223086] ? lockdep_hardirqs_on_prepare+0xdb/0x1a0 [ 1947.223108] do_syscall_64+0xbf/0x430 [ 1947.223122] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 1947.223136] RIP: 0033:0x7f52e79b4b19 [ 1947.223145] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1947.223157] RSP: 002b:00007f52e4f29f48 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 1947.223169] RAX: ffffffffffffffda RBX: 0000000020000200 RCX: 00007f52e79b4b19 [ 1947.223177] RDX: 00000000000118c0 RSI: 0000000000000000 RDI: 00007f52e7a0e0fb [ 1947.223185] RBP: 0000000000000003 R08: 0000000000008c60 R09: ffffffffffffffff [ 1947.223192] R10: 0000000000000003 R11: 0000000000000246 R12: 0000000008100000 [ 1947.223200] R13: 0000000020000100 R14: 00000000000118c0 R15: 0000000020010f60 [ 1947.223216] [ 1947.237687] loop6: detected capacity change from 0 to 140 [ 1947.241374] loop4: detected capacity change from 0 to 140 [ 1947.244456] loop7: detected capacity change from 0 to 140 [ 1947.247884] EXT4-fs (loop6): ext4_check_descriptors: Inode table for group 0 not in group (block 0)! [ 1947.248677] EXT4-fs (loop6): group descriptors corrupted! [ 1947.253618] EXT4-fs (loop7): VFS: Can't find ext4 filesystem [ 1947.256365] EXT4-fs (loop4): ext4_check_descriptors: Inode bitmap for group 0 not in group (block 0)! [ 1947.257142] EXT4-fs (loop4): group descriptors corrupted! [ 1947.258845] loop0: detected capacity change from 0 to 140 [ 1947.266290] loop3: detected capacity change from 0 to 140 [ 1947.277882] loop5: detected capacity change from 0 to 520 [ 1947.282256] EXT4-fs (loop0): ext4_check_descriptors: Block bitmap for group 0 not in group (block 0)! [ 1947.283854] EXT4-fs (loop0): group descriptors corrupted! [ 1947.284991] EXT4-fs (loop3): VFS: Can't find ext4 filesystem [ 1947.292814] EXT4-fs (loop5): mounting ext2 file system using the ext4 subsystem 04:05:46 executing program 6: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="1000000040000000030000002b00000005000000010000000000000000000000002000000020000010000000000000009f09c75f0000ffff53ef", 0x3a, 0x400}, {&(0x7f0000010100)="000000000000000000000000000000000000000000000000000000005178aedb03000000130000", 0x27, 0x7e0}, {&(0x7f0000010ce0)="00000000000000000000000000000000000000000000000000000000c99b0000ed410000000400009f09c75f9f09c75f9f09c75f00000000000003000200000000000800000000000af301000400000000000000000000000100000004", 0x5d, 0x8c60}], 0x0, &(0x7f0000010f60)) getdents64(r0, &(0x7f0000000040)=""/4, 0x4) 04:05:46 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="1000000040000000030000002b00000005000000010000000000000000000000002000000020000010000000000000009f09c75f0000ffff53ef", 0x3a, 0x400}, {&(0x7f0000010080)="000000000000000000000000ede2de4df49d4f87b54a3176cfd4eb4f010040000c000000000000009f09c75f", 0x2c, 0x4e0}, {&(0x7f00000100c0)="01000000000000000000000000000000000000000401000012", 0x19, 0x560}, {&(0x7f00000100e0)="00000000000000000000000000000000000000000104", 0x16, 0x640}, {&(0x7f0000010100)="000000000000000000000000000000000000000000000000000000005178aedb03000000", 0x24, 0x7e0}, {&(0x7f0000010ce0)="00000000000000000000000000000000000000000000000000000000c99b0000ed410000000400009f09c75f9f09c75f9f09c75f00000000000003000200000000000800000000000af3010004", 0x4d, 0x8c60}], 0x0, &(0x7f0000010f60)) 04:05:46 executing program 7: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x3, &(0x7f0000000200)=[{0x0, 0x0, 0x400}, {&(0x7f0000010100)="000000000000000000000000000000000000000000000000000000005178aedb030000001300000023", 0x29, 0x7e0}, {&(0x7f0000010ce0)="00000000000000000000000000000000000000000000000000000000c99b0000ed410000000400009f09c75f9f09c75f9f09c75f00000000000003000200000000000800000000000af301000400000000000000000000000100000004", 0x5d, 0x8c60}], 0x0, &(0x7f0000010f60)) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) getdents64(r0, &(0x7f0000000040)=""/4, 0x4) [ 1947.325138] EXT4-fs (loop5): warning: mounting unchecked fs, running e2fsck is recommended [ 1947.348740] EXT4-fs (loop5): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: none. 04:05:46 executing program 3: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000), 0x0, 0x400}, {&(0x7f0000010100)="000000000000000000000000000000000000000000000000000000005178aedb030000001300000023", 0x29, 0x7e0}, {&(0x7f0000010ce0)="00000000000000000000000000000000000000000000000000000000c99b0000ed410000000400009f09c75f9f09c75f9f09c75f00000000000003000200000000000800000000000af301000400000000000000000000000100000004", 0x5d, 0x8c60}], 0x0, &(0x7f0000010f60)) getdents64(r0, &(0x7f0000000040)=""/4, 0x4) 04:05:46 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="1000000040000000030000002b00000005000000010000000000000000000000002000000020000010000000000000009f09c75f0000ffff53ef", 0x3a, 0x400}, {&(0x7f0000010100)="000000000000000000000000000000000000000000000000000000005178aedb030000001300000023", 0x29, 0x7e0}, {&(0x7f0000010ce0)="00000000000000000000000000000000000000000000000000000000c99b0000ed410000000400009f09c75f9f09c75f9f09c75f00000000000003000200000000000800000000000af3010004000000000000000000000001", 0x59, 0x8c60}], 0x0, &(0x7f0000010f60)) (fail_nth: 7) [ 1947.380472] EXT4-fs (loop5): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 1947.391606] loop6: detected capacity change from 0 to 140 [ 1947.412230] loop4: detected capacity change from 0 to 140 [ 1947.422604] loop7: detected capacity change from 0 to 140 [ 1947.422620] EXT4-fs (loop4): ext4_check_descriptors: Inode bitmap for group 0 not in group (block 0)! [ 1947.422650] EXT4-fs (loop4): group descriptors corrupted! [ 1947.425189] EXT4-fs (loop6): ext4_check_descriptors: Inode table for group 0 not in group (block 0)! [ 1947.426011] EXT4-fs (loop6): group descriptors corrupted! [ 1947.435132] EXT4-fs (loop7): VFS: Can't find ext4 filesystem [ 1947.437493] loop1: detected capacity change from 0 to 140 04:05:46 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="1000000040000000030000002b00000005000000010000000000000000000000002000000020000010000000000000009f09c75f0000ffff53ef", 0x3a, 0x400}, {&(0x7f0000010080)="000000000000000000000000ede2de4df49d4f87b54a3176cfd4eb4f010040000c000000000000009f09c75f", 0x2c, 0x4e0}, {&(0x7f0000010100)="000000000000000000000000000000000000000000000000000000005178aedb030000001300000023", 0x29}, {&(0x7f0000010ce0)="00000000000000000000000000000000000000000000000000000000c99b0000ed410000000400009f09c75f9f09c75f9f09c75f00000000000003000200000000000800000000000af3010004", 0x4d, 0x8c60}], 0x0, &(0x7f0000010f60)) [ 1947.463041] loop3: detected capacity change from 0 to 140 [ 1947.465448] EXT4-fs error (device loop1): ext4_ext_check_inode:523: inode #2: comm syz-executor.1: pblk 0 bad header/extent: invalid extent entries - magic f30a, entries 1, max 4(4), depth 0(0) 04:05:46 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="1000000040000000030000002b00000005000000010000000000000000000000002000000020000010000000000000009f09c75f0000ffff53ef", 0x3a, 0x400}, {&(0x7f0000010080)="000000000000000000000000ede2de4df49d4f87b54a3176cfd4eb4f010040000c000000000000009f09c75f", 0x2c, 0x4e0}, {&(0x7f00000100c0)="01000000000000000000000000000000000000000401000012", 0x19, 0x560}, {&(0x7f00000100e0)="00000000000000000000000000000000000000000104", 0x16, 0x640}, {&(0x7f0000010100)="000000000000000000000000000000000000000000000000000000005178aedb03000000", 0x24, 0x7e0}, {&(0x7f0000010ce0)="00000000000000000000000000000000000000000000000000000000c99b0000ed410000000400009f09c75f9f09c75f9f09c75f00000000000003000200000000000800000000000af3010004", 0x4d, 0x8c60}], 0x0, &(0x7f0000010f60)) [ 1947.496379] EXT4-fs (loop1): get root inode failed [ 1947.497484] EXT4-fs (loop1): mount failed 04:05:46 executing program 6: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="1000000040000000030000002b00000005000000010000000000000000000000002000000020000010000000000000009f09c75f0000ffff53ef", 0x3a, 0x400}, {&(0x7f0000010100)="000000000000000000000000000000000000000000000000000000005178aedb03000000130000", 0x27, 0x7e0}, {&(0x7f0000010ce0)="00000000000000000000000000000000000000000000000000000000c99b0000ed410000000400009f09c75f9f09c75f9f09c75f00000000000003000200000000000800000000000af301000400000000000000000000000100000004", 0x5d, 0x8c60}], 0x0, &(0x7f0000010f60)) getdents64(r0, &(0x7f0000000040)=""/4, 0x4) [ 1947.535526] EXT4-fs (loop3): VFS: Can't find ext4 filesystem 04:05:46 executing program 5: creat(&(0x7f00000003c0)='./file0\x00', 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext2\x00', &(0x7f0000000100)='./file0\x00', 0x41101, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}], 0x0, &(0x7f0000013c00)=ANY=[]) [ 1947.573479] loop0: detected capacity change from 0 to 140 [ 1947.582147] EXT4-fs (loop0): ext4_check_descriptors: Block bitmap for group 0 not in group (block 0)! [ 1947.583124] EXT4-fs (loop0): group descriptors corrupted! [ 1947.607630] loop5: detected capacity change from 0 to 520 04:05:46 executing program 7: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x3, &(0x7f0000000200)=[{0x0, 0x0, 0x400}, {&(0x7f0000010100)="000000000000000000000000000000000000000000000000000000005178aedb030000001300000023", 0x29, 0x7e0}, {&(0x7f0000010ce0)="00000000000000000000000000000000000000000000000000000000c99b0000ed410000000400009f09c75f9f09c75f9f09c75f00000000000003000200000000000800000000000af301000400000000000000000000000100000004", 0x5d, 0x8c60}], 0x0, &(0x7f0000010f60)) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) getdents64(r0, &(0x7f0000000040)=""/4, 0x4) [ 1947.626141] EXT4-fs (loop5): mounting ext2 file system using the ext4 subsystem [ 1947.638030] EXT4-fs (loop5): warning: mounting unchecked fs, running e2fsck is recommended [ 1947.655386] EXT4-fs (loop5): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: none. [ 1947.663905] loop4: detected capacity change from 0 to 140 [ 1947.671319] EXT4-fs (loop5): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 1947.673465] loop7: detected capacity change from 0 to 140 [ 1947.678628] EXT4-fs (loop4): ext4_check_descriptors: Inode bitmap for group 0 not in group (block 0)! [ 1947.679482] EXT4-fs (loop4): group descriptors corrupted! [ 1947.680512] loop6: detected capacity change from 0 to 140 [ 1947.687542] EXT4-fs (loop7): VFS: Can't find ext4 filesystem [ 1947.714943] EXT4-fs (loop6): ext4_check_descriptors: Inode table for group 0 not in group (block 0)! [ 1947.715701] EXT4-fs (loop6): group descriptors corrupted! 04:05:56 executing program 2: sendmsg$NL80211_CMD_UNEXPECTED_FRAME(0xffffffffffffffff, &(0x7f0000000400)={0x0, 0x0, &(0x7f0000000300)={&(0x7f00000002c0)={0x1c, 0x0, 0x1, 0x0, 0x0, {{}, {@val={0x8}, @void}}}, 0x1c}}, 0x0) sendmsg$NL80211_CMD_UPDATE_FT_IES(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000001c0)={0x24, 0x0, 0x1, 0x70bd2c, 0x0, {{}, {@val={0x8}, @void}}, [@NL80211_ATTR_MDID={0x6, 0xb1, 0xc116}]}, 0x24}, 0x1, 0x0, 0x0, 0x80}, 0xc000) r0 = creat(&(0x7f00000003c0)='./file1\x00', 0x0) sendmsg$netlink(0xffffffffffffffff, 0x0, 0x0) dup(0xffffffffffffffff) pwritev2(r0, &(0x7f0000000380)=[{&(0x7f0000000180)="bd", 0xfffffdef}], 0x1, 0x1200, 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) ioctl$FS_IOC_FSSETXATTR(r1, 0x4020940d, &(0x7f0000000200)={0x9}) syz_io_uring_setup(0x0, &(0x7f0000000000)={0x0, 0x0, 0x4, 0x2, 0x309}, &(0x7f0000ffc000/0x2000)=nil, &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000000080), &(0x7f0000000240)) syz_io_uring_submit(0x0, 0x0, &(0x7f0000000280)=@IORING_OP_ASYNC_CANCEL={0xe, 0x0, 0x0, 0x0, 0x0, 0x12345}, 0x1ff) 04:05:56 executing program 5: creat(&(0x7f00000003c0)='./file0\x00', 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext2\x00', &(0x7f0000000100)='./file0\x00', 0x41200, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}], 0x0, &(0x7f0000013c00)=ANY=[]) 04:05:56 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="1000000040000000030000002b00000005000000010000000000000000000000002000000020000010000000000000009f09c75f0000ffff53ef", 0x3a, 0x400}, {&(0x7f0000010080)="000000000000000000000000ede2de4df49d4f87b54a3176cfd4eb4f010040000c000000000000009f09c75f", 0x2c, 0x4e0}, {&(0x7f00000100c0)="01000000000000000000000000000000000000000401000012", 0x19, 0x560}, {&(0x7f00000100e0)="00000000000000000000000000000000000000000104", 0x16, 0x640}, {&(0x7f0000010100)="000000000000000000000000000000000000000000000000000000005178aedb03000000130000", 0x27, 0x7e0}, {&(0x7f0000010ce0)="00000000000000000000000000000000000000000000000000000000c99b0000ed410000000400009f09c75f9f09c75f9f09c75f00000000000003000200000000000800000000000af3010004", 0x4d, 0x8c60}], 0x0, &(0x7f0000010f60)) 04:05:56 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="1000000040000000030000002b00000005000000010000000000000000000000002000000020000010000000000000009f09c75f0000ffff53ef", 0x3a, 0x400}, {&(0x7f0000010080)="000000000000000000000000ede2de4df49d4f87b54a3176cfd4eb4f010040000c000000000000009f09c75f", 0x2c, 0x4e0}, {&(0x7f0000010100)="000000000000000000000000000000000000000000000000000000005178aedb030000001300000023", 0x29}, {&(0x7f0000010ce0)="00000000000000000000000000000000000000000000000000000000c99b0000ed410000000400009f09c75f9f09c75f9f09c75f00000000000003000200000000000800000000000af3010004", 0x4d, 0x8c60}], 0x0, &(0x7f0000010f60)) 04:05:56 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="1000000040000000030000002b00000005000000010000000000000000000000002000000020000010000000000000009f09c75f0000ffff53ef", 0x3a, 0x400}, {&(0x7f0000010100)="000000000000000000000000000000000000000000000000000000005178aedb030000001300000023", 0x29, 0x7e0}, {&(0x7f0000010ce0)="00000000000000000000000000000000000000000000000000000000c99b0000ed410000000400009f09c75f9f09c75f9f09c75f00000000000003000200000000000800000000000af3010004000000000000000000000001", 0x59, 0x8c60}], 0x0, &(0x7f0000010f60)) (fail_nth: 8) 04:05:56 executing program 3: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000), 0x0, 0x400}, {&(0x7f0000010100)="000000000000000000000000000000000000000000000000000000005178aedb030000001300000023", 0x29, 0x7e0}, {&(0x7f0000010ce0)="00000000000000000000000000000000000000000000000000000000c99b0000ed410000000400009f09c75f9f09c75f9f09c75f00000000000003000200000000000800000000000af301000400000000000000000000000100000004", 0x5d, 0x8c60}], 0x0, &(0x7f0000010f60)) getdents64(r0, &(0x7f0000000040)=""/4, 0x4) 04:05:56 executing program 7: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000), 0x0, 0x400}, {&(0x7f0000010100)="000000000000000000000000000000000000000000000000000000005178aedb030000001300000023", 0x29, 0x7e0}, {&(0x7f0000010ce0)="00000000000000000000000000000000000000000000000000000000c99b0000ed410000000400009f09c75f9f09c75f9f09c75f00000000000003000200000000000800000000000af301000400000000000000000000000100000004", 0x5d, 0x8c60}], 0x0, &(0x7f0000010f60)) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) getdents64(r0, &(0x7f0000000040)=""/4, 0x4) 04:05:56 executing program 6: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="1000000040000000030000002b00000005000000010000000000000000000000002000000020000010000000000000009f09c75f0000ffff53ef", 0x3a, 0x400}, {&(0x7f0000010100)="000000000000000000000000000000000000000000000000000000005178aedb0300000013000000", 0x28, 0x7e0}, {&(0x7f0000010ce0)="00000000000000000000000000000000000000000000000000000000c99b0000ed410000000400009f09c75f9f09c75f9f09c75f00000000000003000200000000000800000000000af301000400000000000000000000000100000004", 0x5d, 0x8c60}], 0x0, &(0x7f0000010f60)) getdents64(r0, &(0x7f0000000040)=""/4, 0x4) [ 1957.559344] loop3: detected capacity change from 0 to 140 [ 1957.561453] loop4: detected capacity change from 0 to 140 [ 1957.566608] EXT4-fs (loop3): VFS: Can't find ext4 filesystem [ 1957.567379] EXT4-fs (loop4): ext4_check_descriptors: Inode table for group 0 not in group (block 0)! [ 1957.568223] EXT4-fs (loop4): group descriptors corrupted! [ 1957.581497] loop0: detected capacity change from 0 to 140 [ 1957.596111] loop5: detected capacity change from 0 to 521 [ 1957.601266] FAULT_INJECTION: forcing a failure. [ 1957.601266] name failslab, interval 1, probability 0, space 0, times 0 [ 1957.603156] CPU: 0 UID: 0 PID: 14064 Comm: syz-executor.1 Not tainted 6.18.0-rc5-next-20251111 #1 PREEMPT(voluntary) [ 1957.603189] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1957.603204] Call Trace: [ 1957.603212] [ 1957.603221] dump_stack_lvl+0xfa/0x120 [ 1957.603252] should_fail_ex+0x4d7/0x5e0 [ 1957.603279] ? __d_alloc+0x31/0xa10 [ 1957.603303] should_failslab+0xc2/0x120 [ 1957.603329] kmem_cache_alloc_lru_noprof+0x84/0x690 [ 1957.603362] ? find_held_lock+0x2b/0x80 [ 1957.603396] ? __d_alloc+0x31/0xa10 [ 1957.603418] __d_alloc+0x31/0xa10 [ 1957.603440] ? mpol_shared_policy_init+0x24f/0x390 [ 1957.603480] d_alloc_pseudo+0x1d/0xc0 [ 1957.603510] alloc_file_pseudo+0xbe/0x220 [ 1957.603542] ? __pfx_alloc_file_pseudo+0x10/0x10 [ 1957.603572] ? __shmem_get_inode+0x69f/0xea0 [ 1957.603613] __shmem_file_setup+0x1a8/0x370 [ 1957.603646] ? alloc_fd+0x2c1/0x560 [ 1957.603683] alloc_file+0x2ae/0x590 [ 1957.603720] __x64_sys_memfd_create+0x193/0x280 [ 1957.603755] ? __pfx___x64_sys_memfd_create+0x10/0x10 [ 1957.603791] ? lockdep_hardirqs_on_prepare+0xdb/0x1a0 [ 1957.603833] do_syscall_64+0xbf/0x430 [ 1957.603859] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 1957.603884] RIP: 0033:0x7f52e79b4b19 [ 1957.603902] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1957.603933] RSP: 002b:00007f52e4f29f48 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 1957.603957] RAX: ffffffffffffffda RBX: 0000000020000200 RCX: 00007f52e79b4b19 [ 1957.603973] RDX: 00000000000118c0 RSI: 0000000000000000 RDI: 00007f52e7a0e0fb [ 1957.603989] RBP: 0000000000000003 R08: 0000000000008c60 R09: ffffffffffffffff [ 1957.604004] R10: 0000000000000003 R11: 0000000000000246 R12: 0000000008100000 [ 1957.604019] R13: 0000000020000100 R14: 00000000000118c0 R15: 0000000020010f60 [ 1957.604050] [ 1957.641458] loop7: detected capacity change from 0 to 140 04:05:56 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="1000000040000000030000002b00000005000000010000000000000000000000002000000020000010000000000000009f09c75f0000ffff53ef", 0x3a, 0x400}, {&(0x7f0000010080)="000000000000000000000000ede2de4df49d4f87b54a3176cfd4eb4f010040000c000000000000009f09c75f", 0x2c, 0x4e0}, {&(0x7f00000100c0)="01000000000000000000000000000000000000000401000012", 0x19, 0x560}, {&(0x7f00000100e0)="00000000000000000000000000000000000000000104", 0x16, 0x640}, {&(0x7f0000010100)="000000000000000000000000000000000000000000000000000000005178aedb03000000130000", 0x27, 0x7e0}, {&(0x7f0000010ce0)="00000000000000000000000000000000000000000000000000000000c99b0000ed410000000400009f09c75f9f09c75f9f09c75f00000000000003000200000000000800000000000af3010004", 0x4d, 0x8c60}], 0x0, &(0x7f0000010f60)) 04:05:56 executing program 3: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="1000000040000000030000002b00000005000000010000000000000000", 0x1d, 0x400}, {&(0x7f0000010100)="000000000000000000000000000000000000000000000000000000005178aedb030000001300000023", 0x29, 0x7e0}, {&(0x7f0000010ce0)="00000000000000000000000000000000000000000000000000000000c99b0000ed410000000400009f09c75f9f09c75f9f09c75f00000000000003000200000000000800000000000af301000400000000000000000000000100000004", 0x5d, 0x8c60}], 0x0, &(0x7f0000010f60)) getdents64(r0, &(0x7f0000000040)=""/4, 0x4) [ 1957.659357] loop6: detected capacity change from 0 to 140 [ 1957.662034] EXT4-fs (loop0): ext4_check_descriptors: Block bitmap for group 0 not in group (block 0)! [ 1957.662800] EXT4-fs (loop0): group descriptors corrupted! [ 1957.666991] EXT4-fs (loop7): VFS: Can't find ext4 filesystem [ 1957.669795] loop4: detected capacity change from 0 to 140 [ 1957.671794] EXT4-fs (loop6): ext4_check_descriptors: Inode table for group 0 not in group (block 0)! [ 1957.673366] EXT4-fs (loop6): group descriptors corrupted! [ 1957.677205] loop3: detected capacity change from 0 to 140 [ 1957.682107] EXT4-fs (loop4): ext4_check_descriptors: Inode table for group 0 not in group (block 0)! [ 1957.682856] EXT4-fs (loop4): group descriptors corrupted! [ 1957.685036] EXT4-fs (loop3): VFS: Can't find ext4 filesystem 04:05:56 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="1000000040000000030000002b00000005000000010000000000000000000000002000000020000010000000000000009f09c75f0000ffff53ef", 0x3a, 0x400}, {&(0x7f0000010100)="000000000000000000000000000000000000000000000000000000005178aedb030000001300000023", 0x29, 0x7e0}, {&(0x7f0000010ce0)="00000000000000000000000000000000000000000000000000000000c99b0000ed410000000400009f09c75f9f09c75f9f09c75f00000000000003000200000000000800000000000af3010004", 0x4d, 0x8c60}], 0x0, &(0x7f0000010f60)) [ 1957.749988] EXT4-fs (loop5): mounting ext2 file system using the ext4 subsystem [ 1957.755042] EXT4-fs (loop5): warning: mounting unchecked fs, running e2fsck is recommended [ 1957.760350] EXT4-fs (loop5): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: none. [ 1957.765826] EXT4-fs (loop5): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 1957.805852] loop0: detected capacity change from 0 to 140 [ 1957.823721] EXT4-fs error (device loop0): ext4_ext_check_inode:523: inode #2: comm syz-executor.0: pblk 0 bad header/extent: invalid extent entries - magic f30a, entries 1, max 4(4), depth 0(0) [ 1957.834043] EXT4-fs (loop0): get root inode failed [ 1957.834847] EXT4-fs (loop0): mount failed 04:06:07 executing program 2: sendmsg$NL80211_CMD_UNEXPECTED_FRAME(0xffffffffffffffff, &(0x7f0000000400)={0x0, 0x0, &(0x7f0000000300)={&(0x7f00000002c0)={0x1c, 0x0, 0x1, 0x0, 0x0, {{}, {@val={0x8}, @void}}}, 0x1c}}, 0x0) sendmsg$NL80211_CMD_UPDATE_FT_IES(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000001c0)={0x24, 0x0, 0x1, 0x70bd2c, 0x0, {{}, {@val={0x8}, @void}}, [@NL80211_ATTR_MDID={0x6, 0xb1, 0xc116}]}, 0x24}, 0x1, 0x0, 0x0, 0x80}, 0xc000) r0 = creat(&(0x7f00000003c0)='./file1\x00', 0x0) sendmsg$netlink(0xffffffffffffffff, 0x0, 0x0) dup(0xffffffffffffffff) pwritev2(r0, &(0x7f0000000380)=[{&(0x7f0000000180)="bd", 0xfffffdef}], 0x1, 0x1200, 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) ioctl$FS_IOC_FSSETXATTR(r1, 0x80086601, &(0x7f0000000200)={0x9}) syz_io_uring_setup(0x0, &(0x7f0000000000)={0x0, 0x0, 0x4, 0x2, 0x309}, &(0x7f0000ffc000/0x2000)=nil, &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000000080), &(0x7f0000000240)) syz_io_uring_submit(0x0, 0x0, &(0x7f0000000280)=@IORING_OP_ASYNC_CANCEL={0xe, 0x0, 0x0, 0x0, 0x0, 0x12345}, 0x1ff) 04:06:07 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="1000000040000000030000002b00000005000000010000000000000000000000002000000020000010000000000000009f09c75f0000ffff53ef", 0x3a, 0x400}, {0x0, 0x0, 0x7e0}, {&(0x7f0000010ce0)="00000000000000000000000000000000000000000000000000000000c99b0000ed410000000400009f09c75f9f09c75f9f09c75f00000000000003000200000000000800000000000af3010004", 0x4d, 0x8c60}], 0x0, &(0x7f0000010f60)) 04:06:07 executing program 6: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="1000000040000000030000002b00000005000000010000000000000000000000002000000020000010000000000000009f09c75f0000ffff53ef", 0x3a, 0x400}, {&(0x7f0000010100)="000000000000000000000000000000000000000000000000000000005178aedb0300000013000000", 0x28, 0x7e0}, {&(0x7f0000010ce0)="00000000000000000000000000000000000000000000000000000000c99b0000ed410000000400009f09c75f9f09c75f9f09c75f00000000000003000200000000000800000000000af301000400000000000000000000000100000004", 0x5d, 0x8c60}], 0x0, &(0x7f0000010f60)) getdents64(r0, &(0x7f0000000040)=""/4, 0x4) 04:06:07 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="1000000040000000030000002b00000005000000010000000000000000000000002000000020000010000000000000009f09c75f0000ffff53ef", 0x3a, 0x400}, {&(0x7f0000010080)="000000000000000000000000ede2de4df49d4f87b54a3176cfd4eb4f010040000c000000000000009f09c75f", 0x2c, 0x4e0}, {&(0x7f00000100c0)="01000000000000000000000000000000000000000401000012", 0x19, 0x560}, {&(0x7f00000100e0)="00000000000000000000000000000000000000000104", 0x16, 0x640}, {&(0x7f0000010100)="000000000000000000000000000000000000000000000000000000005178aedb03000000130000", 0x27, 0x7e0}, {&(0x7f0000010ce0)="00000000000000000000000000000000000000000000000000000000c99b0000ed410000000400009f09c75f9f09c75f9f09c75f00000000000003000200000000000800000000000af3010004", 0x4d, 0x8c60}], 0x0, &(0x7f0000010f60)) 04:06:07 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="1000000040000000030000002b00000005000000010000000000000000000000002000000020000010000000000000009f09c75f0000ffff53ef", 0x3a, 0x400}, {&(0x7f0000010100)="000000000000000000000000000000000000000000000000000000005178aedb030000001300000023", 0x29, 0x7e0}, {&(0x7f0000010ce0)="00000000000000000000000000000000000000000000000000000000c99b0000ed410000000400009f09c75f9f09c75f9f09c75f00000000000003000200000000000800000000000af3010004000000000000000000000001", 0x59, 0x8c60}], 0x0, &(0x7f0000010f60)) (fail_nth: 9) 04:06:07 executing program 7: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000), 0x0, 0x400}, {&(0x7f0000010100)="000000000000000000000000000000000000000000000000000000005178aedb030000001300000023", 0x29, 0x7e0}, {&(0x7f0000010ce0)="00000000000000000000000000000000000000000000000000000000c99b0000ed410000000400009f09c75f9f09c75f9f09c75f00000000000003000200000000000800000000000af301000400000000000000000000000100000004", 0x5d, 0x8c60}], 0x0, &(0x7f0000010f60)) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) getdents64(r0, &(0x7f0000000040)=""/4, 0x4) 04:06:07 executing program 5: creat(&(0x7f00000003c0)='./file0\x00', 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext2\x00', &(0x7f0000000100)='./file0\x00', 0x41300, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}], 0x0, &(0x7f0000013c00)=ANY=[]) 04:06:07 executing program 3: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="1000000040000000030000002b00000005000000010000000000000000", 0x1d, 0x400}, {&(0x7f0000010100)="000000000000000000000000000000000000000000000000000000005178aedb030000001300000023", 0x29, 0x7e0}, {&(0x7f0000010ce0)="00000000000000000000000000000000000000000000000000000000c99b0000ed410000000400009f09c75f9f09c75f9f09c75f00000000000003000200000000000800000000000af301000400000000000000000000000100000004", 0x5d, 0x8c60}], 0x0, &(0x7f0000010f60)) getdents64(r0, &(0x7f0000000040)=""/4, 0x4) [ 1968.219315] loop4: detected capacity change from 0 to 140 [ 1968.229373] EXT4-fs (loop4): ext4_check_descriptors: Inode table for group 0 not in group (block 0)! [ 1968.230186] EXT4-fs (loop4): group descriptors corrupted! [ 1968.251076] loop3: detected capacity change from 0 to 140 [ 1968.257101] EXT4-fs (loop3): VFS: Can't find ext4 filesystem [ 1968.258846] loop1: detected capacity change from 0 to 140 [ 1968.269461] loop0: detected capacity change from 0 to 140 04:06:07 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="1000000040000000030000002b00000005000000010000000000000000000000002000000020000010000000000000009f09c75f0000ffff53ef", 0x3a, 0x400}, {&(0x7f0000010080)="000000000000000000000000ede2de4df49d4f87b54a3176cfd4eb4f010040000c000000000000009f09c75f", 0x2c, 0x4e0}, {&(0x7f00000100c0)="01000000000000000000000000000000000000000401000012", 0x19, 0x560}, {&(0x7f00000100e0)="00000000000000000000000000000000000000000104", 0x16, 0x640}, {&(0x7f0000010100)="000000000000000000000000000000000000000000000000000000005178aedb0300000013000000", 0x28, 0x7e0}, {&(0x7f0000010ce0)="00000000000000000000000000000000000000000000000000000000c99b0000ed410000000400009f09c75f9f09c75f9f09c75f00000000000003000200000000000800000000000af3010004", 0x4d, 0x8c60}], 0x0, &(0x7f0000010f60)) [ 1968.281825] EXT4-fs (loop0): ext4_check_descriptors: Block bitmap for group 0 not in group (block 0)! [ 1968.282691] EXT4-fs (loop0): group descriptors corrupted! [ 1968.292394] loop7: detected capacity change from 0 to 140 [ 1968.292944] loop6: detected capacity change from 0 to 140 [ 1968.298207] EXT4-fs error (device loop1): ext4_ext_check_inode:523: inode #2: comm syz-executor.1: pblk 0 bad header/extent: invalid extent entries - magic f30a, entries 1, max 4(4), depth 0(0) [ 1968.303528] EXT4-fs (loop7): VFS: Can't find ext4 filesystem [ 1968.307355] loop5: detected capacity change from 0 to 521 [ 1968.309909] EXT4-fs (loop1): get root inode failed [ 1968.310977] EXT4-fs (loop1): mount failed [ 1968.315084] EXT4-fs (loop6): ext4_check_descriptors: Inode table for group 0 not in group (block 0)! [ 1968.315852] EXT4-fs (loop6): group descriptors corrupted! [ 1968.322397] EXT4-fs (loop5): mounting ext2 file system using the ext4 subsystem 04:06:07 executing program 3: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="1000000040000000030000002b00000005000000010000000000000000", 0x1d, 0x400}, {&(0x7f0000010100)="000000000000000000000000000000000000000000000000000000005178aedb030000001300000023", 0x29, 0x7e0}, {&(0x7f0000010ce0)="00000000000000000000000000000000000000000000000000000000c99b0000ed410000000400009f09c75f9f09c75f9f09c75f00000000000003000200000000000800000000000af301000400000000000000000000000100000004", 0x5d, 0x8c60}], 0x0, &(0x7f0000010f60)) getdents64(r0, &(0x7f0000000040)=""/4, 0x4) [ 1968.348468] EXT4-fs (loop5): warning: mounting unchecked fs, running e2fsck is recommended [ 1968.363054] EXT4-fs (loop5): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: none. [ 1968.369548] loop3: detected capacity change from 0 to 140 [ 1968.373497] loop4: detected capacity change from 0 to 140 [ 1968.375534] EXT4-fs (loop4): ext4_check_descriptors: Inode table for group 0 not in group (block 0)! [ 1968.376307] EXT4-fs (loop4): group descriptors corrupted! [ 1968.396740] EXT4-fs (loop5): unmounting filesystem 00000000-0000-0000-0000-000000000000. 04:06:07 executing program 6: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="1000000040000000030000002b00000005000000010000000000000000000000002000000020000010000000000000009f09c75f0000ffff53ef", 0x3a, 0x400}, {&(0x7f0000010100)="000000000000000000000000000000000000000000000000000000005178aedb0300000013000000", 0x28, 0x7e0}, {&(0x7f0000010ce0)="00000000000000000000000000000000000000000000000000000000c99b0000ed410000000400009f09c75f9f09c75f9f09c75f00000000000003000200000000000800000000000af301000400000000000000000000000100000004", 0x5d, 0x8c60}], 0x0, &(0x7f0000010f60)) getdents64(r0, &(0x7f0000000040)=""/4, 0x4) [ 1968.406242] EXT4-fs (loop3): VFS: Can't find ext4 filesystem 04:06:07 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="1000000040000000030000002b00000005000000010000000000000000000000002000000020000010000000000000009f09c75f0000ffff53ef", 0x3a, 0x400}, {&(0x7f0000010100)="000000000000000000000000000000000000000000000000000000005178aedb030000001300000023", 0x29, 0x7e0}, {&(0x7f0000010ce0)="00000000000000000000000000000000000000000000000000000000c99b0000ed410000000400009f09c75f9f09c75f9f09c75f00000000000003000200000000000800000000000af3010004000000000000000000000001", 0x59, 0x8c60}], 0x0, &(0x7f0000010f60)) (fail_nth: 10) 04:06:07 executing program 7: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000), 0x0, 0x400}, {&(0x7f0000010100)="000000000000000000000000000000000000000000000000000000005178aedb030000001300000023", 0x29, 0x7e0}, {&(0x7f0000010ce0)="00000000000000000000000000000000000000000000000000000000c99b0000ed410000000400009f09c75f9f09c75f9f09c75f00000000000003000200000000000800000000000af301000400000000000000000000000100000004", 0x5d, 0x8c60}], 0x0, &(0x7f0000010f60)) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) getdents64(r0, &(0x7f0000000040)=""/4, 0x4) 04:06:07 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="1000000040000000030000002b00000005000000010000000000000000000000002000000020000010000000000000009f09c75f0000ffff53ef", 0x3a, 0x400}, {0x0, 0x0, 0x7e0}, {&(0x7f0000010ce0)="00000000000000000000000000000000000000000000000000000000c99b0000ed410000000400009f09c75f9f09c75f9f09c75f00000000000003000200000000000800000000000af3010004", 0x4d, 0x8c60}], 0x0, &(0x7f0000010f60)) [ 1968.499303] loop6: detected capacity change from 0 to 140 [ 1968.505108] EXT4-fs (loop6): ext4_check_descriptors: Inode table for group 0 not in group (block 0)! [ 1968.505858] EXT4-fs (loop6): group descriptors corrupted! 04:06:07 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="1000000040000000030000002b00000005000000010000000000000000000000002000000020000010000000000000009f09c75f0000ffff53ef", 0x3a, 0x400}, {&(0x7f0000010080)="000000000000000000000000ede2de4df49d4f87b54a3176cfd4eb4f010040000c000000000000009f09c75f", 0x2c, 0x4e0}, {&(0x7f00000100c0)="01000000000000000000000000000000000000000401000012", 0x19, 0x560}, {&(0x7f00000100e0)="00000000000000000000000000000000000000000104", 0x16, 0x640}, {&(0x7f0000010100)="000000000000000000000000000000000000000000000000000000005178aedb0300000013000000", 0x28, 0x7e0}, {&(0x7f0000010ce0)="00000000000000000000000000000000000000000000000000000000c99b0000ed410000000400009f09c75f9f09c75f9f09c75f00000000000003000200000000000800000000000af3010004", 0x4d, 0x8c60}], 0x0, &(0x7f0000010f60)) 04:06:07 executing program 5: creat(&(0x7f00000003c0)='./file0\x00', 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext2\x00', &(0x7f0000000100)='./file0\x00', 0x42000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}], 0x0, &(0x7f0000013c00)=ANY=[]) [ 1968.532590] loop4: detected capacity change from 0 to 140 [ 1968.544717] FAULT_INJECTION: forcing a failure. [ 1968.544717] name failslab, interval 1, probability 0, space 0, times 0 [ 1968.545807] CPU: 1 UID: 0 PID: 14121 Comm: syz-executor.1 Not tainted 6.18.0-rc5-next-20251111 #1 PREEMPT(voluntary) [ 1968.545826] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1968.545834] Call Trace: [ 1968.545840] [ 1968.545845] dump_stack_lvl+0xfa/0x120 [ 1968.545865] should_fail_ex+0x4d7/0x5e0 [ 1968.545881] ? alloc_empty_file+0x58/0x1e0 [ 1968.545898] should_failslab+0xc2/0x120 [ 1968.545913] kmem_cache_alloc_noprof+0x80/0x690 [ 1968.545937] ? d_instantiate+0x79/0xa0 [ 1968.545955] ? alloc_empty_file+0x58/0x1e0 [ 1968.545969] alloc_empty_file+0x58/0x1e0 [ 1968.545985] alloc_file_pseudo+0x12b/0x220 [ 1968.546003] ? __pfx_alloc_file_pseudo+0x10/0x10 [ 1968.546024] __shmem_file_setup+0x1a8/0x370 [ 1968.546043] ? alloc_fd+0x2c1/0x560 [ 1968.546063] alloc_file+0x2ae/0x590 [ 1968.546083] __x64_sys_memfd_create+0x193/0x280 [ 1968.546103] ? __pfx___x64_sys_memfd_create+0x10/0x10 [ 1968.546122] ? lockdep_hardirqs_on_prepare+0xdb/0x1a0 [ 1968.546146] do_syscall_64+0xbf/0x430 [ 1968.546161] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 1968.546176] RIP: 0033:0x7f52e79b4b19 [ 1968.546187] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1968.546200] RSP: 002b:00007f52e4f29f48 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 1968.546213] RAX: ffffffffffffffda RBX: 0000000020000200 RCX: 00007f52e79b4b19 [ 1968.546222] RDX: 00000000000118c0 RSI: 0000000000000000 RDI: 00007f52e7a0e0fb [ 1968.546241] RBP: 0000000000000003 R08: 0000000000008c60 R09: ffffffffffffffff [ 1968.546249] R10: 0000000000000003 R11: 0000000000000246 R12: 0000000008100000 [ 1968.546258] R13: 0000000020000100 R14: 00000000000118c0 R15: 0000000020010f60 [ 1968.546274] [ 1968.574122] EXT4-fs (loop4): ext4_check_descriptors: Inode table for group 0 not in group (block 0)! [ 1968.574883] EXT4-fs (loop4): group descriptors corrupted! [ 1968.582326] loop0: detected capacity change from 0 to 140 [ 1968.591875] loop7: detected capacity change from 0 to 140 [ 1968.599959] EXT4-fs (loop0): ext4_check_descriptors: Block bitmap for group 0 not in group (block 0)! [ 1968.600706] EXT4-fs (loop0): group descriptors corrupted! [ 1968.610399] EXT4-fs (loop7): VFS: Can't find ext4 filesystem [ 1968.638365] loop5: detected capacity change from 0 to 528 [ 1968.649402] EXT4-fs (loop5): mounting ext2 file system using the ext4 subsystem [ 1968.659229] EXT4-fs (loop5): warning: mounting unchecked fs, running e2fsck is recommended [ 1968.668797] EXT4-fs (loop5): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: none. [ 1968.673892] EXT4-fs (loop5): unmounting filesystem 00000000-0000-0000-0000-000000000000. 04:06:17 executing program 2: sendmsg$NL80211_CMD_UNEXPECTED_FRAME(0xffffffffffffffff, &(0x7f0000000400)={0x0, 0x0, &(0x7f0000000300)={&(0x7f00000002c0)={0x1c, 0x0, 0x1, 0x0, 0x0, {{}, {@val={0x8}, @void}}}, 0x1c}}, 0x0) sendmsg$NL80211_CMD_UPDATE_FT_IES(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000001c0)={0x24, 0x0, 0x1, 0x70bd2c, 0x0, {{}, {@val={0x8}, @void}}, [@NL80211_ATTR_MDID={0x6, 0xb1, 0xc116}]}, 0x24}, 0x1, 0x0, 0x0, 0x80}, 0xc000) r0 = creat(&(0x7f00000003c0)='./file1\x00', 0x0) sendmsg$netlink(0xffffffffffffffff, 0x0, 0x0) dup(0xffffffffffffffff) pwritev2(r0, &(0x7f0000000380)=[{&(0x7f0000000180)="bd", 0xfffffdef}], 0x1, 0x1200, 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) ioctl$FS_IOC_FSSETXATTR(r1, 0x80087601, &(0x7f0000000200)={0x9}) syz_io_uring_setup(0x0, &(0x7f0000000000)={0x0, 0x0, 0x4, 0x2, 0x309}, &(0x7f0000ffc000/0x2000)=nil, &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000000080), &(0x7f0000000240)) syz_io_uring_submit(0x0, 0x0, &(0x7f0000000280)=@IORING_OP_ASYNC_CANCEL={0xe, 0x0, 0x0, 0x0, 0x0, 0x12345}, 0x1ff) 04:06:18 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="1000000040000000030000002b00000005000000010000000000000000000000002000000020000010000000000000009f09c75f0000ffff53ef", 0x3a, 0x400}, {&(0x7f0000010080)="000000000000000000000000ede2de4df49d4f87b54a3176cfd4eb4f010040000c000000000000009f09c75f", 0x2c, 0x4e0}, {&(0x7f00000100c0)="01000000000000000000000000000000000000000401000012", 0x19, 0x560}, {&(0x7f00000100e0)="00000000000000000000000000000000000000000104", 0x16, 0x640}, {&(0x7f0000010100)="000000000000000000000000000000000000000000000000000000005178aedb0300000013000000", 0x28, 0x7e0}, {&(0x7f0000010ce0)="00000000000000000000000000000000000000000000000000000000c99b0000ed410000000400009f09c75f9f09c75f9f09c75f00000000000003000200000000000800000000000af3010004", 0x4d, 0x8c60}], 0x0, &(0x7f0000010f60)) 04:06:18 executing program 5: creat(&(0x7f00000003c0)='./file0\x00', 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext2\x00', &(0x7f0000000100)='./file0\x00', 0x42010, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}], 0x0, &(0x7f0000013c00)=ANY=[]) 04:06:18 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="1000000040000000030000002b00000005000000010000000000000000000000002000000020000010000000000000009f09c75f0000ffff53ef", 0x3a, 0x400}, {0x0, 0x0, 0x7e0}, {&(0x7f0000010ce0)="00000000000000000000000000000000000000000000000000000000c99b0000ed410000000400009f09c75f9f09c75f9f09c75f00000000000003000200000000000800000000000af3010004", 0x4d, 0x8c60}], 0x0, &(0x7f0000010f60)) 04:06:18 executing program 7: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="1000000040000000030000002b00000005000000010000000000000000", 0x1d, 0x400}, {&(0x7f0000010100)="000000000000000000000000000000000000000000000000000000005178aedb030000001300000023", 0x29, 0x7e0}, {&(0x7f0000010ce0)="00000000000000000000000000000000000000000000000000000000c99b0000ed410000000400009f09c75f9f09c75f9f09c75f00000000000003000200000000000800000000000af301000400000000000000000000000100000004", 0x5d, 0x8c60}], 0x0, &(0x7f0000010f60)) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) getdents64(r0, &(0x7f0000000040)=""/4, 0x4) 04:06:18 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="1000000040000000030000002b00000005000000010000000000000000000000002000000020000010000000000000009f09c75f0000ffff53ef", 0x3a, 0x400}, {&(0x7f0000010100)="000000000000000000000000000000000000000000000000000000005178aedb030000001300000023", 0x29, 0x7e0}, {&(0x7f0000010ce0)="00000000000000000000000000000000000000000000000000000000c99b0000ed410000000400009f09c75f9f09c75f9f09c75f00000000000003000200000000000800000000000af3010004000000000000000000000001", 0x59, 0x8c60}], 0x0, &(0x7f0000010f60)) (fail_nth: 11) 04:06:18 executing program 3: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="1000000040000000030000002b00000005000000010000000000000000000000002000000020000010000000", 0x2c, 0x400}, {&(0x7f0000010100)="000000000000000000000000000000000000000000000000000000005178aedb030000001300000023", 0x29, 0x7e0}, {&(0x7f0000010ce0)="00000000000000000000000000000000000000000000000000000000c99b0000ed410000000400009f09c75f9f09c75f9f09c75f00000000000003000200000000000800000000000af301000400000000000000000000000100000004", 0x5d, 0x8c60}], 0x0, &(0x7f0000010f60)) getdents64(r0, &(0x7f0000000040)=""/4, 0x4) 04:06:18 executing program 6: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="1000000040000000030000002b00000005000000010000000000000000000000002000000020000010000000000000009f09c75f0000ffff53ef", 0x3a, 0x400}, {&(0x7f0000010100)="000000000000000000000000000000000000000000000000000000005178aedb030000001300000023", 0x29}, {&(0x7f0000010ce0)="00000000000000000000000000000000000000000000000000000000c99b0000ed410000000400009f09c75f9f09c75f9f09c75f00000000000003000200000000000800000000000af301000400000000000000000000000100000004", 0x5d, 0x8c60}], 0x0, &(0x7f0000010f60)) getdents64(r0, &(0x7f0000000040)=""/4, 0x4) [ 1979.110368] loop4: detected capacity change from 0 to 140 [ 1979.112621] loop6: detected capacity change from 0 to 140 [ 1979.125671] EXT4-fs (loop6): ext4_check_descriptors: Block bitmap for group 0 not in group (block 0)! [ 1979.127250] EXT4-fs (loop6): group descriptors corrupted! [ 1979.128184] EXT4-fs (loop4): ext4_check_descriptors: Inode table for group 0 not in group (block 0)! [ 1979.129603] EXT4-fs (loop4): group descriptors corrupted! [ 1979.167253] loop3: detected capacity change from 0 to 140 [ 1979.168812] loop1: detected capacity change from 0 to 140 [ 1979.170855] loop5: detected capacity change from 0 to 528 [ 1979.175042] loop0: detected capacity change from 0 to 140 [ 1979.178851] loop7: detected capacity change from 0 to 140 [ 1979.185645] EXT4-fs (loop3): VFS: Can't find ext4 filesystem [ 1979.188227] EXT4-fs (loop5): mounting ext2 file system using the ext4 subsystem [ 1979.191740] EXT4-fs (loop0): ext4_check_descriptors: Block bitmap for group 0 not in group (block 0)! [ 1979.193219] EXT4-fs (loop0): group descriptors corrupted! [ 1979.197708] EXT4-fs error (device loop1): ext4_ext_check_inode:523: inode #2: comm syz-executor.1: pblk 0 bad header/extent: invalid extent entries - magic f30a, entries 1, max 4(4), depth 0(0) [ 1979.204673] EXT4-fs (loop5): warning: mounting unchecked fs, running e2fsck is recommended [ 1979.208816] EXT4-fs (loop1): get root inode failed [ 1979.209078] EXT4-fs (loop7): VFS: Can't find ext4 filesystem [ 1979.209636] EXT4-fs (loop1): mount failed 04:06:18 executing program 6: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="1000000040000000030000002b00000005000000010000000000000000000000002000000020000010000000000000009f09c75f0000ffff53ef", 0x3a, 0x400}, {&(0x7f0000010100)="000000000000000000000000000000000000000000000000000000005178aedb030000001300000023", 0x29}, {&(0x7f0000010ce0)="00000000000000000000000000000000000000000000000000000000c99b0000ed410000000400009f09c75f9f09c75f9f09c75f00000000000003000200000000000800000000000af301000400000000000000000000000100000004", 0x5d, 0x8c60}], 0x0, &(0x7f0000010f60)) getdents64(r0, &(0x7f0000000040)=""/4, 0x4) [ 1979.232394] EXT4-fs (loop5): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: none. 04:06:18 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="1000000040000000030000002b00000005000000010000000000000000000000002000000020000010000000000000009f09c75f0000ffff53ef", 0x3a, 0x400}, {&(0x7f0000010080)="000000000000000000000000ede2de4df49d4f87b54a3176cfd4eb4f010040000c000000000000009f09c75f", 0x2c, 0x4e0}, {&(0x7f00000100c0)="01000000000000000000000000000000000000000401000012", 0x19, 0x560}, {&(0x7f00000100e0)="00000000000000000000000000000000000000000104", 0x16, 0x640}, {&(0x7f0000010100)="000000000000000000000000000000000000000000000000000000005178aedb030000001300000023", 0x29}, {&(0x7f0000010ce0)="00000000000000000000000000000000000000000000000000000000c99b0000ed410000000400009f09c75f9f09c75f9f09c75f00000000000003000200000000000800000000000af3010004", 0x4d, 0x8c60}], 0x0, &(0x7f0000010f60)) [ 1979.259270] EXT4-fs (loop5): unmounting filesystem 00000000-0000-0000-0000-000000000000. 04:06:18 executing program 3: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="1000000040000000030000002b00000005000000010000000000000000000000002000000020000010000000", 0x2c, 0x400}, {&(0x7f0000010100)="000000000000000000000000000000000000000000000000000000005178aedb030000001300000023", 0x29, 0x7e0}, {&(0x7f0000010ce0)="00000000000000000000000000000000000000000000000000000000c99b0000ed410000000400009f09c75f9f09c75f9f09c75f00000000000003000200000000000800000000000af301000400000000000000000000000100000004", 0x5d, 0x8c60}], 0x0, &(0x7f0000010f60)) getdents64(r0, &(0x7f0000000040)=""/4, 0x4) [ 1979.306901] loop5: detected capacity change from 0 to 528 04:06:18 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="1000000040000000030000002b00000005000000010000000000000000000000002000000020000010000000000000009f09c75f0000ffff53ef", 0x3a, 0x400}, {&(0x7f0000010100), 0x0, 0x7e0}, {&(0x7f0000010ce0)="00000000000000000000000000000000000000000000000000000000c99b0000ed410000000400009f09c75f9f09c75f9f09c75f00000000000003000200000000000800000000000af3010004", 0x4d, 0x8c60}], 0x0, &(0x7f0000010f60)) [ 1979.362738] loop6: detected capacity change from 0 to 140 04:06:18 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="1000000040000000030000002b00000005000000010000000000000000000000002000000020000010000000000000009f09c75f0000ffff53ef", 0x3a, 0x400}, {&(0x7f0000010100)="000000000000000000000000000000000000000000000000000000005178aedb030000001300000023", 0x29, 0x7e0}, {&(0x7f0000010ce0)="00000000000000000000000000000000000000000000000000000000c99b0000ed410000000400009f09c75f9f09c75f9f09c75f00000000000003000200000000000800000000000af3010004000000000000000000000001", 0x59, 0x8c60}], 0x0, &(0x7f0000010f60)) (fail_nth: 12) 04:06:18 executing program 7: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="1000000040000000030000002b00000005000000010000000000000000", 0x1d, 0x400}, {&(0x7f0000010100)="000000000000000000000000000000000000000000000000000000005178aedb030000001300000023", 0x29, 0x7e0}, {&(0x7f0000010ce0)="00000000000000000000000000000000000000000000000000000000c99b0000ed410000000400009f09c75f9f09c75f9f09c75f00000000000003000200000000000800000000000af301000400000000000000000000000100000004", 0x5d, 0x8c60}], 0x0, &(0x7f0000010f60)) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) getdents64(r0, &(0x7f0000000040)=""/4, 0x4) [ 1979.400523] loop3: detected capacity change from 0 to 140 [ 1979.406738] EXT4-fs (loop6): ext4_check_descriptors: Block bitmap for group 0 not in group (block 0)! [ 1979.408112] EXT4-fs (loop6): group descriptors corrupted! [ 1979.421873] loop4: detected capacity change from 0 to 140 [ 1979.430190] EXT4-fs (loop3): VFS: Can't find ext4 filesystem [ 1979.457497] EXT4-fs (loop4): ext4_check_descriptors: Block bitmap for group 0 not in group (block 0)! [ 1979.458842] EXT4-fs (loop4): group descriptors corrupted! [ 1979.466993] loop0: detected capacity change from 0 to 140 04:06:18 executing program 5: creat(&(0x7f00000003c0)='./file0\x00', 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext2\x00', &(0x7f0000000100)='./file0\x00', 0x42200, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}], 0x0, &(0x7f0000013c00)=ANY=[]) [ 1979.472778] FAULT_INJECTION: forcing a failure. [ 1979.472778] name failslab, interval 1, probability 0, space 0, times 0 [ 1979.474389] CPU: 1 UID: 0 PID: 14169 Comm: syz-executor.1 Not tainted 6.18.0-rc5-next-20251111 #1 PREEMPT(voluntary) [ 1979.474419] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1979.474433] Call Trace: [ 1979.474441] [ 1979.474449] dump_stack_lvl+0xfa/0x120 [ 1979.474478] should_fail_ex+0x4d7/0x5e0 [ 1979.474504] ? security_file_alloc+0x35/0x130 [ 1979.474530] should_failslab+0xc2/0x120 [ 1979.474554] kmem_cache_alloc_noprof+0x80/0x690 [ 1979.474584] ? __create_object+0x59/0x80 [ 1979.474617] ? security_file_alloc+0x35/0x130 [ 1979.474640] security_file_alloc+0x35/0x130 [ 1979.474665] init_file+0x95/0x4c0 [ 1979.474693] alloc_empty_file+0x76/0x1e0 [ 1979.474721] alloc_file_pseudo+0x12b/0x220 [ 1979.474750] ? __pfx_alloc_file_pseudo+0x10/0x10 [ 1979.474786] __shmem_file_setup+0x1a8/0x370 [ 1979.474818] ? alloc_fd+0x2c1/0x560 [ 1979.474852] alloc_file+0x2ae/0x590 [ 1979.474886] __x64_sys_memfd_create+0x193/0x280 [ 1979.474926] ? __pfx___x64_sys_memfd_create+0x10/0x10 [ 1979.474959] ? lockdep_hardirqs_on_prepare+0xdb/0x1a0 [ 1979.474999] do_syscall_64+0xbf/0x430 [ 1979.475024] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 1979.475046] RIP: 0033:0x7f52e79b4b19 [ 1979.475063] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1979.475085] RSP: 002b:00007f52e4f29f48 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 1979.475106] RAX: ffffffffffffffda RBX: 0000000020000200 RCX: 00007f52e79b4b19 [ 1979.475121] RDX: 00000000000118c0 RSI: 0000000000000000 RDI: 00007f52e7a0e0fb [ 1979.475135] RBP: 0000000000000003 R08: 0000000000008c60 R09: ffffffffffffffff [ 1979.475149] R10: 0000000000000003 R11: 0000000000000246 R12: 0000000008100000 [ 1979.475162] R13: 0000000020000100 R14: 00000000000118c0 R15: 0000000020010f60 [ 1979.475190] [ 1979.538856] loop7: detected capacity change from 0 to 140 [ 1979.547523] EXT4-fs (loop7): VFS: Can't find ext4 filesystem [ 1979.551587] EXT4-fs (loop0): ext4_check_descriptors: Block bitmap for group 0 not in group (block 0)! [ 1979.553907] EXT4-fs (loop0): group descriptors corrupted! 04:06:18 executing program 3: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="1000000040000000030000002b00000005000000010000000000000000000000002000000020000010000000", 0x2c, 0x400}, {&(0x7f0000010100)="000000000000000000000000000000000000000000000000000000005178aedb030000001300000023", 0x29, 0x7e0}, {&(0x7f0000010ce0)="00000000000000000000000000000000000000000000000000000000c99b0000ed410000000400009f09c75f9f09c75f9f09c75f00000000000003000200000000000800000000000af301000400000000000000000000000100000004", 0x5d, 0x8c60}], 0x0, &(0x7f0000010f60)) getdents64(r0, &(0x7f0000000040)=""/4, 0x4) [ 1979.602677] loop5: detected capacity change from 0 to 529 [ 1979.631435] EXT4-fs (loop5): mounting ext2 file system using the ext4 subsystem [ 1979.636695] EXT4-fs (loop5): warning: mounting unchecked fs, running e2fsck is recommended [ 1979.646977] loop3: detected capacity change from 0 to 140 [ 1979.665460] EXT4-fs (loop3): VFS: Can't find ext4 filesystem [ 1979.674706] EXT4-fs (loop5): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: none. [ 1979.692158] EXT4-fs (loop5): unmounting filesystem 00000000-0000-0000-0000-000000000000. 04:06:28 executing program 2: sendmsg$NL80211_CMD_UNEXPECTED_FRAME(0xffffffffffffffff, &(0x7f0000000400)={0x0, 0x0, &(0x7f0000000300)={&(0x7f00000002c0)={0x1c, 0x0, 0x1, 0x0, 0x0, {{}, {@val={0x8}, @void}}}, 0x1c}}, 0x0) sendmsg$NL80211_CMD_UPDATE_FT_IES(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000001c0)={0x24, 0x0, 0x1, 0x70bd2c, 0x0, {{}, {@val={0x8}, @void}}, [@NL80211_ATTR_MDID={0x6, 0xb1, 0xc116}]}, 0x24}, 0x1, 0x0, 0x0, 0x80}, 0xc000) r0 = creat(&(0x7f00000003c0)='./file1\x00', 0x0) sendmsg$netlink(0xffffffffffffffff, 0x0, 0x0) dup(0xffffffffffffffff) pwritev2(r0, &(0x7f0000000380)=[{&(0x7f0000000180)="bd", 0xfffffdef}], 0x1, 0x1200, 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) ioctl$FS_IOC_FSSETXATTR(r1, 0x80111500, &(0x7f0000000200)={0x9}) syz_io_uring_setup(0x0, &(0x7f0000000000)={0x0, 0x0, 0x4, 0x2, 0x309}, &(0x7f0000ffc000/0x2000)=nil, &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000000080), &(0x7f0000000240)) syz_io_uring_submit(0x0, 0x0, &(0x7f0000000280)=@IORING_OP_ASYNC_CANCEL={0xe, 0x0, 0x0, 0x0, 0x0, 0x12345}, 0x1ff) 04:06:28 executing program 5: creat(&(0x7f00000003c0)='./file0\x00', 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext2\x00', &(0x7f0000000100)='./file0\x00', 0x42300, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}], 0x0, &(0x7f0000013c00)=ANY=[]) 04:06:28 executing program 6: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="1000000040000000030000002b00000005000000010000000000000000000000002000000020000010000000000000009f09c75f0000ffff53ef", 0x3a, 0x400}, {&(0x7f0000010100)="000000000000000000000000000000000000000000000000000000005178aedb030000001300000023", 0x29}, {&(0x7f0000010ce0)="00000000000000000000000000000000000000000000000000000000c99b0000ed410000000400009f09c75f9f09c75f9f09c75f00000000000003000200000000000800000000000af301000400000000000000000000000100000004", 0x5d, 0x8c60}], 0x0, &(0x7f0000010f60)) getdents64(r0, &(0x7f0000000040)=""/4, 0x4) 04:06:28 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="1000000040000000030000002b00000005000000010000000000000000000000002000000020000010000000000000009f09c75f0000ffff53ef", 0x3a, 0x400}, {&(0x7f0000010080)="000000000000000000000000ede2de4df49d4f87b54a3176cfd4eb4f010040000c000000000000009f09c75f", 0x2c, 0x4e0}, {&(0x7f00000100c0)="01000000000000000000000000000000000000000401000012", 0x19, 0x560}, {&(0x7f00000100e0)="00000000000000000000000000000000000000000104", 0x16, 0x640}, {&(0x7f0000010100)="000000000000000000000000000000000000000000000000000000005178aedb030000001300000023", 0x29}, {&(0x7f0000010ce0)="00000000000000000000000000000000000000000000000000000000c99b0000ed410000000400009f09c75f9f09c75f9f09c75f00000000000003000200000000000800000000000af3010004", 0x4d, 0x8c60}], 0x0, &(0x7f0000010f60)) 04:06:28 executing program 7: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="1000000040000000030000002b00000005000000010000000000000000", 0x1d, 0x400}, {&(0x7f0000010100)="000000000000000000000000000000000000000000000000000000005178aedb030000001300000023", 0x29, 0x7e0}, {&(0x7f0000010ce0)="00000000000000000000000000000000000000000000000000000000c99b0000ed410000000400009f09c75f9f09c75f9f09c75f00000000000003000200000000000800000000000af301000400000000000000000000000100000004", 0x5d, 0x8c60}], 0x0, &(0x7f0000010f60)) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) getdents64(r0, &(0x7f0000000040)=""/4, 0x4) 04:06:28 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="1000000040000000030000002b00000005000000010000000000000000000000002000000020000010000000000000009f09c75f0000ffff53ef", 0x3a, 0x400}, {&(0x7f0000010100), 0x0, 0x7e0}, {&(0x7f0000010ce0)="00000000000000000000000000000000000000000000000000000000c99b0000ed410000000400009f09c75f9f09c75f9f09c75f00000000000003000200000000000800000000000af3010004", 0x4d, 0x8c60}], 0x0, &(0x7f0000010f60)) 04:06:28 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="1000000040000000030000002b00000005000000010000000000000000000000002000000020000010000000000000009f09c75f0000ffff53ef", 0x3a, 0x400}, {&(0x7f0000010100)="000000000000000000000000000000000000000000000000000000005178aedb030000001300000023", 0x29, 0x7e0}, {&(0x7f0000010ce0)="00000000000000000000000000000000000000000000000000000000c99b0000ed410000000400009f09c75f9f09c75f9f09c75f00000000000003000200000000000800000000000af3010004000000000000000000000001", 0x59, 0x8c60}], 0x0, &(0x7f0000010f60)) (fail_nth: 13) 04:06:28 executing program 3: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="1000000040000000030000002b00000005000000010000000000000000000000002000000020000010000000000000009f09c7", 0x33, 0x400}, {&(0x7f0000010100)="000000000000000000000000000000000000000000000000000000005178aedb030000001300000023", 0x29, 0x7e0}, {&(0x7f0000010ce0)="00000000000000000000000000000000000000000000000000000000c99b0000ed410000000400009f09c75f9f09c75f9f09c75f00000000000003000200000000000800000000000af301000400000000000000000000000100000004", 0x5d, 0x8c60}], 0x0, &(0x7f0000010f60)) getdents64(r0, &(0x7f0000000040)=""/4, 0x4) [ 1989.477780] loop7: detected capacity change from 0 to 140 [ 1989.478689] loop0: detected capacity change from 0 to 140 [ 1989.488673] EXT4-fs (loop0): ext4_check_descriptors: Block bitmap for group 0 not in group (block 0)! [ 1989.489505] EXT4-fs (loop0): group descriptors corrupted! [ 1989.490643] EXT4-fs (loop7): VFS: Can't find ext4 filesystem [ 1989.515249] loop3: detected capacity change from 0 to 140 [ 1989.525471] EXT4-fs (loop3): VFS: Can't find ext4 filesystem [ 1989.537907] loop6: detected capacity change from 0 to 140 [ 1989.541625] loop4: detected capacity change from 0 to 140 [ 1989.551655] loop5: detected capacity change from 0 to 529 [ 1989.552959] EXT4-fs (loop6): ext4_check_descriptors: Block bitmap for group 0 not in group (block 0)! [ 1989.553694] EXT4-fs (loop6): group descriptors corrupted! [ 1989.554053] loop1: detected capacity change from 0 to 140 [ 1989.560519] EXT4-fs (loop4): ext4_check_descriptors: Block bitmap for group 0 not in group (block 0)! [ 1989.562055] EXT4-fs (loop4): group descriptors corrupted! [ 1989.576673] EXT4-fs error (device loop1): ext4_ext_check_inode:523: inode #2: comm syz-executor.1: pblk 0 bad header/extent: invalid extent entries - magic f30a, entries 1, max 4(4), depth 0(0) [ 1989.578945] EXT4-fs (loop5): mounting ext2 file system using the ext4 subsystem 04:06:28 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="1000000040000000030000002b00000005000000010000000000000000000000002000000020000010000000000000009f09c75f0000ffff53ef", 0x3a, 0x400}, {&(0x7f0000010100), 0x0, 0x7e0}, {&(0x7f0000010ce0)="00000000000000000000000000000000000000000000000000000000c99b0000ed410000000400009f09c75f9f09c75f9f09c75f00000000000003000200000000000800000000000af3010004", 0x4d, 0x8c60}], 0x0, &(0x7f0000010f60)) 04:06:28 executing program 7: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="1000000040000000030000002b00000005000000010000000000000000000000002000000020000010000000", 0x2c, 0x400}, {&(0x7f0000010100)="000000000000000000000000000000000000000000000000000000005178aedb030000001300000023", 0x29, 0x7e0}, {&(0x7f0000010ce0)="00000000000000000000000000000000000000000000000000000000c99b0000ed410000000400009f09c75f9f09c75f9f09c75f00000000000003000200000000000800000000000af301000400000000000000000000000100000004", 0x5d, 0x8c60}], 0x0, &(0x7f0000010f60)) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) getdents64(r0, &(0x7f0000000040)=""/4, 0x4) [ 1989.592448] EXT4-fs (loop1): get root inode failed [ 1989.593348] EXT4-fs (loop1): mount failed [ 1989.602040] EXT4-fs (loop5): warning: mounting unchecked fs, running e2fsck is recommended [ 1989.624798] EXT4-fs (loop5): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: none. [ 1989.627213] loop7: detected capacity change from 0 to 140 04:06:28 executing program 3: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="1000000040000000030000002b00000005000000010000000000000000000000002000000020000010000000000000009f09c7", 0x33, 0x400}, {&(0x7f0000010100)="000000000000000000000000000000000000000000000000000000005178aedb030000001300000023", 0x29, 0x7e0}, {&(0x7f0000010ce0)="00000000000000000000000000000000000000000000000000000000c99b0000ed410000000400009f09c75f9f09c75f9f09c75f00000000000003000200000000000800000000000af301000400000000000000000000000100000004", 0x5d, 0x8c60}], 0x0, &(0x7f0000010f60)) getdents64(r0, &(0x7f0000000040)=""/4, 0x4) [ 1989.637882] EXT4-fs (loop7): VFS: Can't find ext4 filesystem [ 1989.647661] EXT4-fs (loop5): unmounting filesystem 00000000-0000-0000-0000-000000000000. 04:06:28 executing program 6: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010100)="000000000000000000000000000000000000000000000000000000005178aedb030000001300000023", 0x29, 0x7e0}, {&(0x7f0000010ce0)="00000000000000000000000000000000000000000000000000000000c99b0000ed410000000400009f09c75f9f09c75f9f09c75f00000000000003000200000000000800000000000af301000400000000000000000000000100000004", 0x5d, 0x8c60}], 0x0, &(0x7f0000010f60)) getdents64(r0, &(0x7f0000000040)=""/4, 0x4) [ 1989.680582] loop3: detected capacity change from 0 to 140 04:06:28 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="1000000040000000030000002b00000005000000010000000000000000000000002000000020000010000000000000009f09c75f0000ffff53ef", 0x3a, 0x400}, {&(0x7f0000010080)="000000000000000000000000ede2de4df49d4f87b54a3176cfd4eb4f010040000c000000000000009f09c75f", 0x2c, 0x4e0}, {&(0x7f00000100c0)="01000000000000000000000000000000000000000401000012", 0x19, 0x560}, {&(0x7f00000100e0)="00000000000000000000000000000000000000000104", 0x16, 0x640}, {&(0x7f0000010100)="000000000000000000000000000000000000000000000000000000005178aedb030000001300000023", 0x29}, {&(0x7f0000010ce0)="00000000000000000000000000000000000000000000000000000000c99b0000ed410000000400009f09c75f9f09c75f9f09c75f00000000000003000200000000000800000000000af3010004", 0x4d, 0x8c60}], 0x0, &(0x7f0000010f60)) 04:06:28 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="1000000040000000030000002b00000005000000010000000000000000000000002000000020000010000000000000009f09c75f0000ffff53ef", 0x3a, 0x400}, {&(0x7f0000010100)="000000000000000000000000000000000000000000000000000000005178aedb030000001300000023", 0x29, 0x7e0}, {&(0x7f0000010ce0)="00000000000000000000000000000000000000000000000000000000c99b0000ed410000000400009f09c75f9f09c75f9f09c75f00000000000003000200000000000800000000000af3010004000000000000000000000001", 0x59, 0x8c60}], 0x0, &(0x7f0000010f60)) (fail_nth: 14) [ 1989.712042] EXT4-fs (loop3): VFS: Can't find ext4 filesystem 04:06:28 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="1000000040000000030000002b00000005000000010000000000000000000000002000000020000010000000000000009f09c75f0000ffff53ef", 0x3a, 0x400}, {&(0x7f0000010100)='\x00'/21, 0x15, 0x7e0}, {&(0x7f0000010ce0)="00000000000000000000000000000000000000000000000000000000c99b0000ed410000000400009f09c75f9f09c75f9f09c75f00000000000003000200000000000800000000000af3010004", 0x4d, 0x8c60}], 0x0, &(0x7f0000010f60)) [ 1989.771299] loop4: detected capacity change from 0 to 140 [ 1989.772185] loop6: detected capacity change from 0 to 140 04:06:28 executing program 7: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="1000000040000000030000002b00000005000000010000000000000000000000002000000020000010000000", 0x2c, 0x400}, {&(0x7f0000010100)="000000000000000000000000000000000000000000000000000000005178aedb030000001300000023", 0x29, 0x7e0}, {&(0x7f0000010ce0)="00000000000000000000000000000000000000000000000000000000c99b0000ed410000000400009f09c75f9f09c75f9f09c75f00000000000003000200000000000800000000000af301000400000000000000000000000100000004", 0x5d, 0x8c60}], 0x0, &(0x7f0000010f60)) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) getdents64(r0, &(0x7f0000000040)=""/4, 0x4) [ 1989.779980] FAULT_INJECTION: forcing a failure. [ 1989.779980] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 1989.782578] CPU: 0 UID: 0 PID: 14222 Comm: syz-executor.1 Not tainted 6.18.0-rc5-next-20251111 #1 PREEMPT(voluntary) [ 1989.782612] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1989.782626] Call Trace: [ 1989.782634] [ 1989.782644] dump_stack_lvl+0xfa/0x120 [ 1989.782674] should_fail_ex+0x4d7/0x5e0 [ 1989.782708] should_fail_alloc_page+0xe0/0x110 [ 1989.782735] prepare_alloc_pages+0x1eb/0x550 [ 1989.782779] __alloc_frozen_pages_noprof+0x17f/0x1f10 [ 1989.782807] ? find_held_lock+0x2b/0x80 [ 1989.782836] ? lock_release+0xc8/0x290 [ 1989.782874] ? __is_insn_slot_addr+0x140/0x290 [ 1989.782909] ? __pfx___alloc_frozen_pages_noprof+0x10/0x10 [ 1989.782948] ? __lock_acquire+0x694/0x1b70 [ 1989.782985] ? __lock_acquire+0x694/0x1b70 [ 1989.783018] ? lock_is_held_type+0x9e/0x120 [ 1989.783058] ? __sanitizer_cov_trace_switch+0x54/0x90 [ 1989.783085] ? policy_nodemask+0xeb/0x4e0 [ 1989.783120] alloc_pages_mpol+0xed/0x340 [ 1989.783150] ? __pfx_alloc_pages_mpol+0x10/0x10 [ 1989.783179] ? filemap_get_entry+0x1bb/0x3b0 [ 1989.783203] ? __pfx_filemap_get_entry+0x10/0x10 [ 1989.783226] ? __lock_acquire+0x694/0x1b70 [ 1989.783265] folio_alloc_mpol_noprof+0x38/0xa0 [ 1989.783301] shmem_alloc_folio+0x11b/0x140 [ 1989.783337] shmem_get_folio_gfp.constprop.0+0x4ea/0x13a0 [ 1989.783373] ? lock_acquire+0x15e/0x2f0 [ 1989.783406] ? __pfx_shmem_get_folio_gfp.constprop.0+0x10/0x10 [ 1989.783438] ? __lock_acquire+0xc65/0x1b70 [ 1989.783474] shmem_write_begin+0x194/0x3b0 [ 1989.783500] ? __pfx_shmem_write_begin+0x10/0x10 [ 1989.783525] ? balance_dirty_pages_ratelimited_flags+0x8f/0x1190 [ 1989.783556] ? __mark_inode_dirty+0xecf/0x1470 [ 1989.783588] generic_perform_write+0x391/0x810 [ 1989.783634] ? __pfx_generic_perform_write+0x10/0x10 [ 1989.783674] ? generic_update_time+0xcb/0xf0 [ 1989.783698] ? mnt_put_write_access_file+0xb7/0xe0 [ 1989.783737] shmem_file_write_iter+0x111/0x140 [ 1989.783773] vfs_write+0xbe9/0x1150 [ 1989.783796] ? __pfx_shmem_file_write_iter+0x10/0x10 [ 1989.783829] ? __fget_files+0x34/0x3b0 [ 1989.783863] ? __pfx_vfs_write+0x10/0x10 [ 1989.783907] __x64_sys_pwrite64+0x1f1/0x260 [ 1989.783932] ? __pfx___x64_sys_pwrite64+0x10/0x10 [ 1989.783966] do_syscall_64+0xbf/0x430 [ 1989.783992] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 1989.784016] RIP: 0033:0x7f52e7967ab7 [ 1989.784035] Code: 08 89 3c 24 48 89 4c 24 18 e8 e5 f8 ff ff 4c 8b 54 24 18 48 8b 54 24 10 41 89 c0 48 8b 74 24 08 8b 3c 24 b8 12 00 00 00 0f 05 <48> 3d 00 f0 ff ff 77 31 44 89 c7 48 89 04 24 e8 15 f9 ff ff 48 8b [ 1989.784057] RSP: 002b:00007f52e4f29f20 EFLAGS: 00000293 ORIG_RAX: 0000000000000012 [ 1989.784080] RAX: ffffffffffffffda RBX: 00007f52e79fe970 RCX: 00007f52e7967ab7 [ 1989.784096] RDX: 000000000000003a RSI: 0000000020010000 RDI: 0000000000000004 [ 1989.784110] RBP: 0000000000000003 R08: 0000000000000000 R09: ffffffffffffffff [ 1989.784125] R10: 0000000000000400 R11: 0000000000000293 R12: 0000000000000004 [ 1989.784139] R13: 0000000000000004 R14: 0000000020000200 R15: 0000000000000000 [ 1989.784171] [ 1989.792981] EXT4-fs (loop4): ext4_check_descriptors: Block bitmap for group 0 not in group (block 0)! [ 1989.801266] loop1: detected capacity change from 0 to 140 [ 1989.801565] EXT4-fs (loop4): group descriptors corrupted! [ 1989.805188] EXT4-fs (loop1): VFS: Can't find ext4 filesystem [ 1989.806982] EXT4-fs (loop6): VFS: Can't find ext4 filesystem [ 1989.824838] loop7: detected capacity change from 0 to 140 [ 1989.831001] EXT4-fs (loop7): VFS: Can't find ext4 filesystem 04:06:39 executing program 7: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="1000000040000000030000002b00000005000000010000000000000000000000002000000020000010000000", 0x2c, 0x400}, {&(0x7f0000010100)="000000000000000000000000000000000000000000000000000000005178aedb030000001300000023", 0x29, 0x7e0}, {&(0x7f0000010ce0)="00000000000000000000000000000000000000000000000000000000c99b0000ed410000000400009f09c75f9f09c75f9f09c75f00000000000003000200000000000800000000000af301000400000000000000000000000100000004", 0x5d, 0x8c60}], 0x0, &(0x7f0000010f60)) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) getdents64(r0, &(0x7f0000000040)=""/4, 0x4) 04:06:39 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="1000000040000000030000002b00000005000000010000000000000000000000002000000020000010000000000000009f09c75f0000ffff53ef", 0x3a, 0x400}, {&(0x7f0000010100)='\x00'/21, 0x15, 0x7e0}, {&(0x7f0000010ce0)="00000000000000000000000000000000000000000000000000000000c99b0000ed410000000400009f09c75f9f09c75f9f09c75f00000000000003000200000000000800000000000af3010004", 0x4d, 0x8c60}], 0x0, &(0x7f0000010f60)) 04:06:39 executing program 5: creat(&(0x7f00000003c0)='./file0\x00', 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext2\x00', &(0x7f0000000100)='./file0\x00', 0x423ac, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}], 0x0, &(0x7f0000013c00)=ANY=[]) 04:06:39 executing program 3: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="1000000040000000030000002b00000005000000010000000000000000000000002000000020000010000000000000009f09c7", 0x33, 0x400}, {&(0x7f0000010100)="000000000000000000000000000000000000000000000000000000005178aedb030000001300000023", 0x29, 0x7e0}, {&(0x7f0000010ce0)="00000000000000000000000000000000000000000000000000000000c99b0000ed410000000400009f09c75f9f09c75f9f09c75f00000000000003000200000000000800000000000af301000400000000000000000000000100000004", 0x5d, 0x8c60}], 0x0, &(0x7f0000010f60)) getdents64(r0, &(0x7f0000000040)=""/4, 0x4) 04:06:39 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="1000000040000000030000002b00000005000000010000000000000000000000002000000020000010000000000000009f09c75f0000ffff53ef", 0x3a, 0x400}, {&(0x7f0000010080)="000000000000000000000000ede2de4df49d4f87b54a3176cfd4eb4f010040000c000000000000009f09c75f", 0x2c, 0x4e0}, {&(0x7f00000100c0)="01000000000000000000000000000000000000000401000012", 0x19, 0x560}, {&(0x7f0000010100)="000000000000000000000000000000000000000000000000000000005178aedb030000001300000023", 0x29, 0x7e0}, {&(0x7f0000010ce0)="00000000000000000000000000000000000000000000000000000000c99b0000ed410000000400009f09c75f9f09c75f9f09c75f00000000000003000200000000000800000000000af3010004", 0x4d, 0x8c60}], 0x0, &(0x7f0000010f60)) 04:06:39 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="1000000040000000030000002b00000005000000010000000000000000000000002000000020000010000000000000009f09c75f0000ffff53ef", 0x3a, 0x400}, {&(0x7f0000010100)="000000000000000000000000000000000000000000000000000000005178aedb030000001300000023", 0x29, 0x7e0}, {&(0x7f0000010ce0)="00000000000000000000000000000000000000000000000000000000c99b0000ed410000000400009f09c75f9f09c75f9f09c75f00000000000003000200000000000800000000000af3010004000000000000000000000001", 0x59, 0x8c60}], 0x0, &(0x7f0000010f60)) (fail_nth: 15) 04:06:39 executing program 6: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010100)="000000000000000000000000000000000000000000000000000000005178aedb030000001300000023", 0x29, 0x7e0}, {&(0x7f0000010ce0)="00000000000000000000000000000000000000000000000000000000c99b0000ed410000000400009f09c75f9f09c75f9f09c75f00000000000003000200000000000800000000000af301000400000000000000000000000100000004", 0x5d, 0x8c60}], 0x0, &(0x7f0000010f60)) getdents64(r0, &(0x7f0000000040)=""/4, 0x4) 04:06:39 executing program 2: sendmsg$NL80211_CMD_UNEXPECTED_FRAME(0xffffffffffffffff, &(0x7f0000000400)={0x0, 0x0, &(0x7f0000000300)={&(0x7f00000002c0)={0x1c, 0x0, 0x1, 0x0, 0x0, {{}, {@val={0x8}, @void}}}, 0x1c}}, 0x0) sendmsg$NL80211_CMD_UPDATE_FT_IES(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000001c0)={0x24, 0x0, 0x1, 0x70bd2c, 0x0, {{}, {@val={0x8}, @void}}, [@NL80211_ATTR_MDID={0x6, 0xb1, 0xc116}]}, 0x24}, 0x1, 0x0, 0x0, 0x80}, 0xc000) r0 = creat(&(0x7f00000003c0)='./file1\x00', 0x0) sendmsg$netlink(0xffffffffffffffff, 0x0, 0x0) dup(0xffffffffffffffff) pwritev2(r0, &(0x7f0000000380)=[{&(0x7f0000000180)="bd", 0xfffffdef}], 0x1, 0x1200, 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) ioctl$FS_IOC_FSSETXATTR(r1, 0x801c581f, &(0x7f0000000200)={0x9}) syz_io_uring_setup(0x0, &(0x7f0000000000)={0x0, 0x0, 0x4, 0x2, 0x309}, &(0x7f0000ffc000/0x2000)=nil, &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000000080), &(0x7f0000000240)) syz_io_uring_submit(0x0, 0x0, &(0x7f0000000280)=@IORING_OP_ASYNC_CANCEL={0xe, 0x0, 0x0, 0x0, 0x0, 0x12345}, 0x1ff) [ 2000.365314] loop3: detected capacity change from 0 to 140 [ 2000.378075] loop0: detected capacity change from 0 to 140 [ 2000.380162] loop7: detected capacity change from 0 to 140 [ 2000.383427] EXT4-fs (loop3): VFS: Can't find ext4 filesystem [ 2000.389807] FAULT_INJECTION: forcing a failure. [ 2000.389807] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 2000.391523] CPU: 0 UID: 0 PID: 14245 Comm: syz-executor.1 Not tainted 6.18.0-rc5-next-20251111 #1 PREEMPT(voluntary) [ 2000.391554] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2000.391568] Call Trace: [ 2000.391576] [ 2000.391586] dump_stack_lvl+0xfa/0x120 [ 2000.391615] should_fail_ex+0x4d7/0x5e0 [ 2000.391637] ? page_copy_sane+0xce/0x2b0 [ 2000.391674] copy_folio_from_iter_atomic+0x3d3/0x18c0 [ 2000.391708] ? simple_xattr_get+0x173/0x1d0 [ 2000.391738] ? __pfx_copy_folio_from_iter_atomic+0x10/0x10 [ 2000.391763] ? shmem_write_begin+0x1ab/0x3b0 [ 2000.391789] ? __pfx_shmem_write_begin+0x10/0x10 [ 2000.391810] ? timestamp_truncate+0x1eb/0x2f0 [ 2000.391834] ? balance_dirty_pages_ratelimited_flags+0x8f/0x1190 [ 2000.391864] ? __pfx_timestamp_truncate+0x10/0x10 [ 2000.391889] loop6: detected capacity change from 0 to 140 [ 2000.391892] generic_perform_write+0x1d7/0x810 [ 2000.391945] ? __pfx_generic_perform_write+0x10/0x10 [ 2000.391982] ? inode_needs_update_time.part.0+0x170/0x270 [ 2000.392015] shmem_file_write_iter+0x111/0x140 [ 2000.392050] vfs_write+0xbe9/0x1150 [ 2000.392073] ? __pfx_shmem_file_write_iter+0x10/0x10 [ 2000.392106] ? __fget_files+0x34/0x3b0 [ 2000.392140] ? __pfx_vfs_write+0x10/0x10 [ 2000.392181] __x64_sys_pwrite64+0x1f1/0x260 [ 2000.392206] ? __pfx___x64_sys_pwrite64+0x10/0x10 [ 2000.392238] do_syscall_64+0xbf/0x430 [ 2000.392264] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 2000.392288] RIP: 0033:0x7f52e7967ab7 [ 2000.392305] Code: 08 89 3c 24 48 89 4c 24 18 e8 e5 f8 ff ff 4c 8b 54 24 18 48 8b 54 24 10 41 89 c0 48 8b 74 24 08 8b 3c 24 b8 12 00 00 00 0f 05 <48> 3d 00 f0 ff ff 77 31 44 89 c7 48 89 04 24 e8 15 f9 ff ff 48 8b [ 2000.392328] RSP: 002b:00007f52e4f29f20 EFLAGS: 00000293 ORIG_RAX: 0000000000000012 [ 2000.392350] RAX: ffffffffffffffda RBX: 00007f52e79fe970 RCX: 00007f52e7967ab7 [ 2000.392365] RDX: 000000000000003a RSI: 0000000020010000 RDI: 0000000000000004 [ 2000.392380] RBP: 0000000000000003 R08: 0000000000000000 R09: ffffffffffffffff [ 2000.392394] R10: 0000000000000400 R11: 0000000000000293 R12: 0000000000000004 [ 2000.392408] R13: 0000000000000004 R14: 0000000020000200 R15: 0000000000000000 [ 2000.392438] [ 2000.400078] EXT4-fs (loop0): ext4_check_descriptors: Block bitmap for group 0 not in group (block 0)! [ 2000.401474] loop4: detected capacity change from 0 to 140 [ 2000.402069] EXT4-fs (loop0): group descriptors corrupted! [ 2000.406742] loop5: detected capacity change from 0 to 529 [ 2000.407312] EXT4-fs (loop7): VFS: Can't find ext4 filesystem [ 2000.416882] EXT4-fs (loop5): mounting ext2 file system using the ext4 subsystem [ 2000.442309] EXT4-fs error (device loop4): ext4_ext_check_inode:523: inode #2: comm syz-executor.4: pblk 0 bad header/extent: invalid extent entries - magic f30a, entries 1, max 4(4), depth 0(0) [ 2000.446268] loop1: detected capacity change from 0 to 140 [ 2000.446568] EXT4-fs (loop6): VFS: Can't find ext4 filesystem [ 2000.448504] EXT4-fs (loop4): get root inode failed [ 2000.449406] EXT4-fs (loop4): mount failed 04:06:39 executing program 3: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="1000000040000000030000002b00000005000000010000000000000000000000002000000020000010000000000000009f09c75f0000ff", 0x37, 0x400}, {&(0x7f0000010100)="000000000000000000000000000000000000000000000000000000005178aedb030000001300000023", 0x29, 0x7e0}, {&(0x7f0000010ce0)="00000000000000000000000000000000000000000000000000000000c99b0000ed410000000400009f09c75f9f09c75f9f09c75f00000000000003000200000000000800000000000af301000400000000000000000000000100000004", 0x5d, 0x8c60}], 0x0, &(0x7f0000010f60)) getdents64(r0, &(0x7f0000000040)=""/4, 0x4) 04:06:39 executing program 6: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010100)="000000000000000000000000000000000000000000000000000000005178aedb030000001300000023", 0x29, 0x7e0}, {&(0x7f0000010ce0)="00000000000000000000000000000000000000000000000000000000c99b0000ed410000000400009f09c75f9f09c75f9f09c75f00000000000003000200000000000800000000000af301000400000000000000000000000100000004", 0x5d, 0x8c60}], 0x0, &(0x7f0000010f60)) getdents64(r0, &(0x7f0000000040)=""/4, 0x4) [ 2000.489343] EXT4-fs (loop5): warning: mounting unchecked fs, running e2fsck is recommended [ 2000.493087] EXT4-fs error (device loop1): ext4_ext_check_inode:523: inode #2: comm syz-executor.1: pblk 0 bad header/extent: invalid extent entries - magic f30a, entries 1, max 4(4), depth 0(0) [ 2000.503039] EXT4-fs (loop1): get root inode failed [ 2000.503839] EXT4-fs (loop1): mount failed [ 2000.523833] EXT4-fs (loop5): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: none. [ 2000.563609] EXT4-fs (loop5): unmounting filesystem 00000000-0000-0000-0000-000000000000. 04:06:39 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="1000000040000000030000002b00000005000000010000000000000000000000002000000020000010000000000000009f09c75f0000ffff53ef", 0x3a, 0x400}, {&(0x7f0000010100)='\x00'/21, 0x15, 0x7e0}, {&(0x7f0000010ce0)="00000000000000000000000000000000000000000000000000000000c99b0000ed410000000400009f09c75f9f09c75f9f09c75f00000000000003000200000000000800000000000af3010004", 0x4d, 0x8c60}], 0x0, &(0x7f0000010f60)) [ 2000.714167] loop6: detected capacity change from 0 to 140 [ 2000.721862] loop3: detected capacity change from 0 to 140 [ 2000.727857] EXT4-fs (loop3): VFS: Can't find ext4 filesystem [ 2000.737951] loop0: detected capacity change from 0 to 140 [ 2000.741906] EXT4-fs (loop0): ext4_check_descriptors: Block bitmap for group 0 not in group (block 0)! [ 2000.742100] EXT4-fs (loop6): VFS: Can't find ext4 filesystem 04:06:39 executing program 7: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="1000000040000000030000002b00000005000000010000000000000000000000002000000020000010000000000000009f09c7", 0x33, 0x400}, {&(0x7f0000010100)="000000000000000000000000000000000000000000000000000000005178aedb030000001300000023", 0x29, 0x7e0}, {&(0x7f0000010ce0)="00000000000000000000000000000000000000000000000000000000c99b0000ed410000000400009f09c75f9f09c75f9f09c75f00000000000003000200000000000800000000000af301000400000000000000000000000100000004", 0x5d, 0x8c60}], 0x0, &(0x7f0000010f60)) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) getdents64(r0, &(0x7f0000000040)=""/4, 0x4) 04:06:39 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="1000000040000000030000002b00000005000000010000000000000000000000002000000020000010000000000000009f09c75f0000ffff53ef", 0x3a, 0x400}, {&(0x7f0000010080)="000000000000000000000000ede2de4df49d4f87b54a3176cfd4eb4f010040000c000000000000009f09c75f", 0x2c, 0x4e0}, {&(0x7f00000100c0)="01000000000000000000000000000000000000000401000012", 0x19, 0x560}, {0x0, 0x0, 0x7e0}, {&(0x7f0000010ce0)="00000000000000000000000000000000000000000000000000000000c99b0000ed410000000400009f09c75f9f09c75f9f09c75f00000000000003000200000000000800000000000af3010004", 0x4d, 0x8c60}], 0x0, &(0x7f0000010f60)) [ 2000.743452] EXT4-fs (loop0): group descriptors corrupted! 04:06:39 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="1000000040000000030000002b00000005000000010000000000000000000000002000000020000010000000000000009f09c75f0000ffff53ef", 0x3a, 0x400}, {&(0x7f0000010100)="000000000000000000000000000000000000000000000000000000005178aedb030000001300000023", 0x29, 0x7e0}, {&(0x7f0000010ce0)="00000000000000000000000000000000000000000000000000000000c99b0000ed410000000400009f09c75f9f09c75f9f09c75f00000000000003000200000000000800000000000af3010004000000000000000000000001", 0x59, 0x8c60}], 0x0, &(0x7f0000010f60)) (fail_nth: 16) [ 2000.780859] loop4: detected capacity change from 0 to 140 04:06:39 executing program 5: creat(&(0x7f00000003c0)='./file0\x00', 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext2\x00', &(0x7f0000000100)='./file0\x00', 0x423b2, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}], 0x0, &(0x7f0000013c00)=ANY=[]) [ 2000.799378] EXT4-fs (loop4): ext4_check_descriptors: Block bitmap for group 0 not in group (block 0)! [ 2000.800889] EXT4-fs (loop4): group descriptors corrupted! 04:06:39 executing program 3: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="1000000040000000030000002b00000005000000010000000000000000000000002000000020000010000000000000009f09c75f0000ff", 0x37, 0x400}, {&(0x7f0000010100)="000000000000000000000000000000000000000000000000000000005178aedb030000001300000023", 0x29, 0x7e0}, {&(0x7f0000010ce0)="00000000000000000000000000000000000000000000000000000000c99b0000ed410000000400009f09c75f9f09c75f9f09c75f00000000000003000200000000000800000000000af301000400000000000000000000000100000004", 0x5d, 0x8c60}], 0x0, &(0x7f0000010f60)) getdents64(r0, &(0x7f0000000040)=""/4, 0x4) [ 2000.823425] loop5: detected capacity change from 0 to 529 [ 2000.829344] EXT4-fs (loop5): mounting ext2 file system using the ext4 subsystem 04:06:39 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="1000000040000000030000002b00000005000000010000000000000000000000002000000020000010000000000000009f09c75f0000ffff53ef", 0x3a, 0x400}, {&(0x7f0000010100)="000000000000000000000000000000000000000000000000000000005178ae", 0x1f, 0x7e0}, {&(0x7f0000010ce0)="00000000000000000000000000000000000000000000000000000000c99b0000ed410000000400009f09c75f9f09c75f9f09c75f00000000000003000200000000000800000000000af3010004", 0x4d, 0x8c60}], 0x0, &(0x7f0000010f60)) [ 2000.835456] EXT4-fs (loop5): warning: mounting unchecked fs, running e2fsck is recommended [ 2000.853048] EXT4-fs (loop5): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: none. [ 2000.855531] loop7: detected capacity change from 0 to 140 [ 2000.861312] EXT4-fs (loop5): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 2000.888908] loop3: detected capacity change from 0 to 140 [ 2000.893472] EXT4-fs (loop7): VFS: Can't find ext4 filesystem [ 2000.894493] FAULT_INJECTION: forcing a failure. [ 2000.894493] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 2000.896272] CPU: 1 UID: 0 PID: 14275 Comm: syz-executor.1 Not tainted 6.18.0-rc5-next-20251111 #1 PREEMPT(voluntary) [ 2000.896304] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2000.896317] Call Trace: [ 2000.896325] [ 2000.896334] dump_stack_lvl+0xfa/0x120 [ 2000.896363] should_fail_ex+0x4d7/0x5e0 [ 2000.896384] ? page_copy_sane+0xce/0x2b0 [ 2000.896420] copy_folio_from_iter_atomic+0x3d3/0x18c0 [ 2000.896459] ? __pfx_copy_folio_from_iter_atomic+0x10/0x10 [ 2000.896483] ? shmem_write_begin+0x1ab/0x3b0 [ 2000.896507] ? __pfx_shmem_write_begin+0x10/0x10 [ 2000.896528] ? timestamp_truncate+0x1eb/0x2f0 [ 2000.896552] ? balance_dirty_pages_ratelimited_flags+0x8f/0x1190 [ 2000.896579] ? __pfx_timestamp_truncate+0x10/0x10 [ 2000.896607] generic_perform_write+0x1d7/0x810 [ 2000.896649] ? __pfx_generic_perform_write+0x10/0x10 [ 2000.896684] ? inode_needs_update_time.part.0+0x170/0x270 [ 2000.896715] shmem_file_write_iter+0x111/0x140 [ 2000.896748] vfs_write+0xbe9/0x1150 [ 2000.896770] ? __pfx_shmem_file_write_iter+0x10/0x10 [ 2000.896801] ? __fget_files+0x34/0x3b0 [ 2000.896834] ? __pfx_vfs_write+0x10/0x10 [ 2000.896875] __x64_sys_pwrite64+0x1f1/0x260 [ 2000.896897] ? __pfx___x64_sys_pwrite64+0x10/0x10 [ 2000.896937] do_syscall_64+0xbf/0x430 [ 2000.896962] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 2000.896985] RIP: 0033:0x7f52e7967ab7 [ 2000.897002] Code: 08 89 3c 24 48 89 4c 24 18 e8 e5 f8 ff ff 4c 8b 54 24 18 48 8b 54 24 10 41 89 c0 48 8b 74 24 08 8b 3c 24 b8 12 00 00 00 0f 05 <48> 3d 00 f0 ff ff 77 31 44 89 c7 48 89 04 24 e8 15 f9 ff ff 48 8b [ 2000.897022] RSP: 002b:00007f52e4f29f20 EFLAGS: 00000293 ORIG_RAX: 0000000000000012 [ 2000.897044] RAX: ffffffffffffffda RBX: 00007f52e79fe970 RCX: 00007f52e7967ab7 [ 2000.897059] RDX: 0000000000000029 RSI: 0000000020010100 RDI: 0000000000000004 [ 2000.897072] RBP: 0000000000000003 R08: 0000000000000000 R09: ffffffffffffffff [ 2000.897086] R10: 00000000000007e0 R11: 0000000000000293 R12: 0000000000000004 [ 2000.897099] R13: 0000000000000004 R14: 0000000020000218 R15: 0000000000000001 [ 2000.897128] [ 2000.942285] EXT4-fs (loop3): VFS: Can't find ext4 filesystem 04:06:39 executing program 6: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x3, &(0x7f0000000200)=[{0x0, 0x0, 0x400}, {&(0x7f0000010100)="000000000000000000000000000000000000000000000000000000005178aedb030000001300000023", 0x29, 0x7e0}, {&(0x7f0000010ce0)="00000000000000000000000000000000000000000000000000000000c99b0000ed410000000400009f09c75f9f09c75f9f09c75f00000000000003000200000000000800000000000af301000400000000000000000000000100000004", 0x5d, 0x8c60}], 0x0, &(0x7f0000010f60)) getdents64(r0, &(0x7f0000000040)=""/4, 0x4) [ 2000.966602] loop0: detected capacity change from 0 to 140 [ 2000.971560] loop1: detected capacity change from 0 to 140 04:06:39 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="1000000040000000030000002b00000005000000010000000000000000000000002000000020000010000000000000009f09c75f0000ffff53ef", 0x3a, 0x400}, {&(0x7f0000010080)="000000000000000000000000ede2de4df49d4f87b54a3176cfd4eb4f010040000c000000000000009f09c75f", 0x2c, 0x4e0}, {&(0x7f00000100c0)="01000000000000000000000000000000000000000401000012", 0x19, 0x560}, {0x0, 0x0, 0x7e0}, {&(0x7f0000010ce0)="00000000000000000000000000000000000000000000000000000000c99b0000ed410000000400009f09c75f9f09c75f9f09c75f00000000000003000200000000000800000000000af3010004", 0x4d, 0x8c60}], 0x0, &(0x7f0000010f60)) [ 2000.983904] EXT4-fs (loop0): ext4_check_descriptors: Block bitmap for group 0 not in group (block 0)! [ 2000.985445] EXT4-fs (loop0): group descriptors corrupted! [ 2000.991092] EXT4-fs error (device loop1): ext4_ext_check_inode:523: inode #2: comm syz-executor.1: pblk 0 bad header/extent: invalid extent entries - magic f30a, entries 1, max 4(4), depth 0(0) [ 2000.999857] EXT4-fs (loop1): get root inode failed [ 2001.000644] EXT4-fs (loop1): mount failed [ 2001.041341] loop4: detected capacity change from 0 to 140 [ 2001.045755] EXT4-fs (loop4): ext4_check_descriptors: Block bitmap for group 0 not in group (block 0)! [ 2001.047167] EXT4-fs (loop4): group descriptors corrupted! [ 2001.086282] loop6: detected capacity change from 0 to 140 [ 2001.093310] EXT4-fs (loop6): VFS: Can't find ext4 filesystem 04:06:50 executing program 2: sendmsg$NL80211_CMD_UNEXPECTED_FRAME(0xffffffffffffffff, &(0x7f0000000400)={0x0, 0x0, &(0x7f0000000300)={&(0x7f00000002c0)={0x1c, 0x0, 0x1, 0x0, 0x0, {{}, {@val={0x8}, @void}}}, 0x1c}}, 0x0) sendmsg$NL80211_CMD_UPDATE_FT_IES(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000001c0)={0x24, 0x0, 0x1, 0x70bd2c, 0x0, {{}, {@val={0x8}, @void}}, [@NL80211_ATTR_MDID={0x6, 0xb1, 0xc116}]}, 0x24}, 0x1, 0x0, 0x0, 0x80}, 0xc000) r0 = creat(&(0x7f00000003c0)='./file1\x00', 0x0) sendmsg$netlink(0xffffffffffffffff, 0x0, 0x0) dup(0xffffffffffffffff) pwritev2(r0, &(0x7f0000000380)=[{&(0x7f0000000180)="bd", 0xfffffdef}], 0x1, 0x1200, 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) ioctl$FS_IOC_FSSETXATTR(r1, 0x80811501, &(0x7f0000000200)={0x9}) syz_io_uring_setup(0x0, &(0x7f0000000000)={0x0, 0x0, 0x4, 0x2, 0x309}, &(0x7f0000ffc000/0x2000)=nil, &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000000080), &(0x7f0000000240)) syz_io_uring_submit(0x0, 0x0, &(0x7f0000000280)=@IORING_OP_ASYNC_CANCEL={0xe, 0x0, 0x0, 0x0, 0x0, 0x12345}, 0x1ff) 04:06:50 executing program 5: creat(&(0x7f00000003c0)='./file0\x00', 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext2\x00', &(0x7f0000000100)='./file0\x00', 0x423b3, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}], 0x0, &(0x7f0000013c00)=ANY=[]) 04:06:50 executing program 6: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x3, &(0x7f0000000200)=[{0x0, 0x0, 0x400}, {&(0x7f0000010100)="000000000000000000000000000000000000000000000000000000005178aedb030000001300000023", 0x29, 0x7e0}, {&(0x7f0000010ce0)="00000000000000000000000000000000000000000000000000000000c99b0000ed410000000400009f09c75f9f09c75f9f09c75f00000000000003000200000000000800000000000af301000400000000000000000000000100000004", 0x5d, 0x8c60}], 0x0, &(0x7f0000010f60)) getdents64(r0, &(0x7f0000000040)=""/4, 0x4) 04:06:50 executing program 3: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="1000000040000000030000002b00000005000000010000000000000000000000002000000020000010000000000000009f09c75f0000ff", 0x37, 0x400}, {&(0x7f0000010100)="000000000000000000000000000000000000000000000000000000005178aedb030000001300000023", 0x29, 0x7e0}, {&(0x7f0000010ce0)="00000000000000000000000000000000000000000000000000000000c99b0000ed410000000400009f09c75f9f09c75f9f09c75f00000000000003000200000000000800000000000af301000400000000000000000000000100000004", 0x5d, 0x8c60}], 0x0, &(0x7f0000010f60)) getdents64(r0, &(0x7f0000000040)=""/4, 0x4) 04:06:50 executing program 7: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="1000000040000000030000002b00000005000000010000000000000000000000002000000020000010000000000000009f09c7", 0x33, 0x400}, {&(0x7f0000010100)="000000000000000000000000000000000000000000000000000000005178aedb030000001300000023", 0x29, 0x7e0}, {&(0x7f0000010ce0)="00000000000000000000000000000000000000000000000000000000c99b0000ed410000000400009f09c75f9f09c75f9f09c75f00000000000003000200000000000800000000000af301000400000000000000000000000100000004", 0x5d, 0x8c60}], 0x0, &(0x7f0000010f60)) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) getdents64(r0, &(0x7f0000000040)=""/4, 0x4) 04:06:50 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="1000000040000000030000002b00000005000000010000000000000000000000002000000020000010000000000000009f09c75f0000ffff53ef", 0x3a, 0x400}, {&(0x7f0000010080)="000000000000000000000000ede2de4df49d4f87b54a3176cfd4eb4f010040000c000000000000009f09c75f", 0x2c, 0x4e0}, {&(0x7f00000100c0)="01000000000000000000000000000000000000000401000012", 0x19, 0x560}, {0x0, 0x0, 0x7e0}, {&(0x7f0000010ce0)="00000000000000000000000000000000000000000000000000000000c99b0000ed410000000400009f09c75f9f09c75f9f09c75f00000000000003000200000000000800000000000af3010004", 0x4d, 0x8c60}], 0x0, &(0x7f0000010f60)) 04:06:50 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="1000000040000000030000002b00000005000000010000000000000000000000002000000020000010000000000000009f09c75f0000ffff53ef", 0x3a, 0x400}, {&(0x7f0000010100)="000000000000000000000000000000000000000000000000000000005178ae", 0x1f, 0x7e0}, {&(0x7f0000010ce0)="00000000000000000000000000000000000000000000000000000000c99b0000ed410000000400009f09c75f9f09c75f9f09c75f00000000000003000200000000000800000000000af3010004", 0x4d, 0x8c60}], 0x0, &(0x7f0000010f60)) 04:06:50 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="1000000040000000030000002b00000005000000010000000000000000000000002000000020000010000000000000009f09c75f0000ffff53ef", 0x3a, 0x400}, {&(0x7f0000010100)="000000000000000000000000000000000000000000000000000000005178aedb030000001300000023", 0x29, 0x7e0}, {&(0x7f0000010ce0)="00000000000000000000000000000000000000000000000000000000c99b0000ed410000000400009f09c75f9f09c75f9f09c75f00000000000003000200000000000800000000000af3010004000000000000000000000001", 0x59, 0x8c60}], 0x0, &(0x7f0000010f60)) (fail_nth: 17) [ 2011.318093] loop5: detected capacity change from 0 to 529 [ 2011.320760] EXT4-fs (loop5): mounting ext2 file system using the ext4 subsystem [ 2011.324048] EXT4-fs (loop5): warning: mounting unchecked fs, running e2fsck is recommended [ 2011.328105] EXT4-fs (loop5): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: none. [ 2011.331229] EXT4-fs (loop5): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 2011.354194] loop3: detected capacity change from 0 to 140 [ 2011.358728] EXT4-fs (loop3): VFS: Can't find ext4 filesystem [ 2011.365060] loop4: detected capacity change from 0 to 140 04:06:50 executing program 5: creat(&(0x7f00000003c0)='./file0\x00', 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext2\x00', &(0x7f0000000100)='./file0\x00', 0x423b8, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}], 0x0, &(0x7f0000013c00)=ANY=[]) [ 2011.391846] EXT4-fs (loop4): ext4_check_descriptors: Block bitmap for group 0 not in group (block 0)! [ 2011.392631] EXT4-fs (loop4): group descriptors corrupted! [ 2011.406887] loop0: detected capacity change from 0 to 140 [ 2011.410210] loop7: detected capacity change from 0 to 140 [ 2011.411839] loop6: detected capacity change from 0 to 140 [ 2011.417368] FAULT_INJECTION: forcing a failure. [ 2011.417368] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 2011.419322] CPU: 0 UID: 0 PID: 14313 Comm: syz-executor.1 Not tainted 6.18.0-rc5-next-20251111 #1 PREEMPT(voluntary) [ 2011.419355] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2011.419369] Call Trace: [ 2011.419378] [ 2011.419387] dump_stack_lvl+0xfa/0x120 [ 2011.419418] should_fail_ex+0x4d7/0x5e0 [ 2011.419447] should_fail_alloc_page+0xe0/0x110 [ 2011.419475] prepare_alloc_pages+0x1eb/0x550 [ 2011.419519] __alloc_frozen_pages_noprof+0x17f/0x1f10 [ 2011.419564] ? __pfx___alloc_frozen_pages_noprof+0x10/0x10 [ 2011.419596] ? __lock_acquire+0x694/0x1b70 [ 2011.419638] ? lock_is_held_type+0x9e/0x120 [ 2011.419678] ? __sanitizer_cov_trace_switch+0x54/0x90 [ 2011.419708] ? policy_nodemask+0xeb/0x4e0 [ 2011.419742] alloc_pages_mpol+0xed/0x340 [ 2011.419773] ? __pfx_alloc_pages_mpol+0x10/0x10 [ 2011.419801] ? filemap_get_entry+0x1bb/0x3b0 [ 2011.419826] ? __pfx_filemap_get_entry+0x10/0x10 [ 2011.419849] ? __lock_acquire+0x694/0x1b70 [ 2011.419888] folio_alloc_mpol_noprof+0x38/0xa0 [ 2011.419932] shmem_alloc_folio+0x11b/0x140 [ 2011.419968] shmem_get_folio_gfp.constprop.0+0x4ea/0x13a0 [ 2011.420004] ? __pfx_shmem_get_folio_gfp.constprop.0+0x10/0x10 [ 2011.420034] ? avc_has_perm+0x12b/0x1d0 [ 2011.420070] shmem_write_begin+0x194/0x3b0 [ 2011.420095] ? __pfx_shmem_write_begin+0x10/0x10 [ 2011.420117] ? timestamp_truncate+0x1eb/0x2f0 [ 2011.420142] ? balance_dirty_pages_ratelimited_flags+0x8f/0x1190 [ 2011.420172] ? __pfx_timestamp_truncate+0x10/0x10 [ 2011.420202] generic_perform_write+0x391/0x810 [ 2011.420247] ? __pfx_generic_perform_write+0x10/0x10 [ 2011.420285] ? inode_needs_update_time.part.0+0x170/0x270 [ 2011.420319] shmem_file_write_iter+0x111/0x140 04:06:50 executing program 3: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="1000000040000000030000002b00000005000000010000000000000000000000002000000020000010000000000000009f09c75f0000ffff53", 0x39, 0x400}, {&(0x7f0000010100)="000000000000000000000000000000000000000000000000000000005178aedb030000001300000023", 0x29, 0x7e0}, {&(0x7f0000010ce0)="00000000000000000000000000000000000000000000000000000000c99b0000ed410000000400009f09c75f9f09c75f9f09c75f00000000000003000200000000000800000000000af301000400000000000000000000000100000004", 0x5d, 0x8c60}], 0x0, &(0x7f0000010f60)) getdents64(r0, &(0x7f0000000040)=""/4, 0x4) [ 2011.420354] vfs_write+0xbe9/0x1150 [ 2011.420377] ? __pfx_shmem_file_write_iter+0x10/0x10 [ 2011.420410] ? __fget_files+0x34/0x3b0 [ 2011.420445] ? __pfx_vfs_write+0x10/0x10 [ 2011.420488] __x64_sys_pwrite64+0x1f1/0x260 [ 2011.420514] ? __pfx___x64_sys_pwrite64+0x10/0x10 [ 2011.420548] do_syscall_64+0xbf/0x430 [ 2011.420574] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 2011.420598] RIP: 0033:0x7f52e7967ab7 [ 2011.420616] Code: 08 89 3c 24 48 89 4c 24 18 e8 e5 f8 ff ff 4c 8b 54 24 18 48 8b 54 24 10 41 89 c0 48 8b 74 24 08 8b 3c 24 b8 12 00 00 00 0f 05 <48> 3d 00 f0 ff ff 77 31 44 89 c7 48 89 04 24 e8 15 f9 ff ff 48 8b [ 2011.420638] RSP: 002b:00007f52e4f29f20 EFLAGS: 00000293 ORIG_RAX: 0000000000000012 [ 2011.420662] RAX: ffffffffffffffda RBX: 00007f52e79fe970 RCX: 00007f52e7967ab7 [ 2011.420678] RDX: 0000000000000059 RSI: 0000000020010ce0 RDI: 0000000000000004 [ 2011.420692] RBP: 0000000000000003 R08: 0000000000000000 R09: ffffffffffffffff [ 2011.420707] R10: 0000000000008c60 R11: 0000000000000293 R12: 0000000000000004 [ 2011.420722] R13: 0000000000000004 R14: 0000000020000230 R15: 0000000000000002 [ 2011.420753] [ 2011.421412] EXT4-fs (loop6): VFS: Can't find ext4 filesystem [ 2011.427591] EXT4-fs (loop7): VFS: Can't find ext4 filesystem [ 2011.437506] loop5: detected capacity change from 0 to 529 [ 2011.438530] EXT4-fs (loop0): ext4_check_descriptors: Block bitmap for group 0 not in group (block 0)! [ 2011.461233] EXT4-fs (loop0): group descriptors corrupted! [ 2011.465586] EXT4-fs (loop5): mounting ext2 file system using the ext4 subsystem [ 2011.466462] loop1: detected capacity change from 0 to 140 [ 2011.478056] EXT4-fs (loop5): warning: mounting unchecked fs, running e2fsck is recommended 04:06:50 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="1000000040000000030000002b00000005000000010000000000000000000000002000000020000010000000000000009f09c75f0000ffff53ef", 0x3a, 0x400}, {&(0x7f0000010080)="000000000000000000000000ede2de4df49d4f87b54a3176cfd4eb4f010040000c000000000000009f09c75f", 0x2c, 0x4e0}, {&(0x7f00000100c0)="01000000000000000000000000000000000000000401000012", 0x19, 0x560}, {&(0x7f0000010100), 0x0, 0x7e0}, {&(0x7f0000010ce0)="00000000000000000000000000000000000000000000000000000000c99b0000ed410000000400009f09c75f9f09c75f9f09c75f00000000000003000200000000000800000000000af3010004", 0x4d, 0x8c60}], 0x0, &(0x7f0000010f60)) [ 2011.492691] EXT4-fs error (device loop1): __ext4_fill_super:5513: inode #2: comm syz-executor.1: iget: special inode unallocated [ 2011.494672] EXT4-fs (loop1): get root inode failed [ 2011.495277] EXT4-fs (loop1): mount failed [ 2011.507369] loop3: detected capacity change from 0 to 140 [ 2011.510891] EXT4-fs (loop3): VFS: Can't find ext4 filesystem 04:06:50 executing program 6: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x3, &(0x7f0000000200)=[{0x0, 0x0, 0x400}, {&(0x7f0000010100)="000000000000000000000000000000000000000000000000000000005178aedb030000001300000023", 0x29, 0x7e0}, {&(0x7f0000010ce0)="00000000000000000000000000000000000000000000000000000000c99b0000ed410000000400009f09c75f9f09c75f9f09c75f00000000000003000200000000000800000000000af301000400000000000000000000000100000004", 0x5d, 0x8c60}], 0x0, &(0x7f0000010f60)) getdents64(r0, &(0x7f0000000040)=""/4, 0x4) [ 2011.534384] EXT4-fs (loop5): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: none. 04:06:50 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="1000000040000000030000002b00000005000000010000000000000000000000002000000020000010000000000000009f09c75f0000ffff53ef", 0x3a, 0x400}, {&(0x7f0000010100)="000000000000000000000000000000000000000000000000000000005178aedb030000001300000023", 0x29, 0x7e0}, {&(0x7f0000010ce0)="00000000000000000000000000000000000000000000000000000000c99b0000ed410000000400009f09c75f9f09c75f9f09c75f00000000000003000200000000000800000000000af3010004000000000000000000000001", 0x59, 0x8c60}], 0x0, &(0x7f0000010f60)) (fail_nth: 18) 04:06:50 executing program 3: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="1000000040000000030000002b00000005000000010000000000000000000000002000000020000010000000000000009f09c75f0000ffff53", 0x39, 0x400}, {&(0x7f0000010100)="000000000000000000000000000000000000000000000000000000005178aedb030000001300000023", 0x29, 0x7e0}, {&(0x7f0000010ce0)="00000000000000000000000000000000000000000000000000000000c99b0000ed410000000400009f09c75f9f09c75f9f09c75f00000000000003000200000000000800000000000af301000400000000000000000000000100000004", 0x5d, 0x8c60}], 0x0, &(0x7f0000010f60)) getdents64(r0, &(0x7f0000000040)=""/4, 0x4) [ 2011.569330] EXT4-fs (loop5): unmounting filesystem 00000000-0000-0000-0000-000000000000. 04:06:50 executing program 7: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="1000000040000000030000002b00000005000000010000000000000000000000002000000020000010000000000000009f09c7", 0x33, 0x400}, {&(0x7f0000010100)="000000000000000000000000000000000000000000000000000000005178aedb030000001300000023", 0x29, 0x7e0}, {&(0x7f0000010ce0)="00000000000000000000000000000000000000000000000000000000c99b0000ed410000000400009f09c75f9f09c75f9f09c75f00000000000003000200000000000800000000000af301000400000000000000000000000100000004", 0x5d, 0x8c60}], 0x0, &(0x7f0000010f60)) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) getdents64(r0, &(0x7f0000000040)=""/4, 0x4) [ 2011.604423] loop6: detected capacity change from 0 to 140 [ 2011.608828] loop4: detected capacity change from 0 to 140 [ 2011.617496] EXT4-fs (loop6): VFS: Can't find ext4 filesystem [ 2011.618436] EXT4-fs (loop4): ext4_check_descriptors: Block bitmap for group 0 not in group (block 0)! [ 2011.619221] EXT4-fs (loop4): group descriptors corrupted! 04:06:50 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="1000000040000000030000002b00000005000000010000000000000000000000002000000020000010000000000000009f09c75f0000ffff53ef", 0x3a, 0x400}, {&(0x7f0000010100)="000000000000000000000000000000000000000000000000000000005178ae", 0x1f, 0x7e0}, {&(0x7f0000010ce0)="00000000000000000000000000000000000000000000000000000000c99b0000ed410000000400009f09c75f9f09c75f9f09c75f00000000000003000200000000000800000000000af3010004", 0x4d, 0x8c60}], 0x0, &(0x7f0000010f60)) [ 2011.650251] loop1: detected capacity change from 0 to 140 [ 2011.651941] loop3: detected capacity change from 0 to 140 [ 2011.667568] loop7: detected capacity change from 0 to 140 [ 2011.678395] EXT4-fs error (device loop1): ext4_ext_check_inode:523: inode #2: comm syz-executor.1: pblk 0 bad header/extent: invalid extent entries - magic f30a, entries 1, max 4(4), depth 0(0) [ 2011.681062] EXT4-fs (loop3): VFS: Can't find ext4 filesystem [ 2011.696600] EXT4-fs (loop1): get root inode failed [ 2011.697040] EXT4-fs (loop1): mount failed [ 2011.697666] EXT4-fs (loop7): VFS: Can't find ext4 filesystem [ 2011.709056] loop0: detected capacity change from 0 to 140 [ 2011.746124] EXT4-fs (loop0): ext4_check_descriptors: Block bitmap for group 0 not in group (block 0)! [ 2011.747043] EXT4-fs (loop0): group descriptors corrupted! 04:07:01 executing program 5: creat(&(0x7f00000003c0)='./file0\x00', 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext2\x00', &(0x7f0000000100)='./file0\x00', 0x42400, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}], 0x0, &(0x7f0000013c00)=ANY=[]) 04:07:01 executing program 2: sendmsg$NL80211_CMD_UNEXPECTED_FRAME(0xffffffffffffffff, &(0x7f0000000400)={0x0, 0x0, &(0x7f0000000300)={&(0x7f00000002c0)={0x1c, 0x0, 0x1, 0x0, 0x0, {{}, {@val={0x8}, @void}}}, 0x1c}}, 0x0) sendmsg$NL80211_CMD_UPDATE_FT_IES(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000001c0)={0x24, 0x0, 0x1, 0x70bd2c, 0x0, {{}, {@val={0x8}, @void}}, [@NL80211_ATTR_MDID={0x6, 0xb1, 0xc116}]}, 0x24}, 0x1, 0x0, 0x0, 0x80}, 0xc000) r0 = creat(&(0x7f00000003c0)='./file1\x00', 0x0) sendmsg$netlink(0xffffffffffffffff, 0x0, 0x0) dup(0xffffffffffffffff) pwritev2(r0, &(0x7f0000000380)=[{&(0x7f0000000180)="bd", 0xfffffdef}], 0x1, 0x1200, 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) ioctl$FS_IOC_FSSETXATTR(r1, 0xc0045878, &(0x7f0000000200)={0x9}) syz_io_uring_setup(0x0, &(0x7f0000000000)={0x0, 0x0, 0x4, 0x2, 0x309}, &(0x7f0000ffc000/0x2000)=nil, &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000000080), &(0x7f0000000240)) syz_io_uring_submit(0x0, 0x0, &(0x7f0000000280)=@IORING_OP_ASYNC_CANCEL={0xe, 0x0, 0x0, 0x0, 0x0, 0x12345}, 0x1ff) 04:07:01 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="1000000040000000030000002b00000005000000010000000000000000000000002000000020000010000000000000009f09c75f0000ffff53ef", 0x3a, 0x400}, {&(0x7f0000010100)="000000000000000000000000000000000000000000000000000000005178aedb03000000", 0x24, 0x7e0}, {&(0x7f0000010ce0)="00000000000000000000000000000000000000000000000000000000c99b0000ed410000000400009f09c75f9f09c75f9f09c75f00000000000003000200000000000800000000000af3010004", 0x4d, 0x8c60}], 0x0, &(0x7f0000010f60)) 04:07:01 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="1000000040000000030000002b00000005000000010000000000000000000000002000000020000010000000000000009f09c75f0000ffff53ef", 0x3a, 0x400}, {&(0x7f0000010100)="000000000000000000000000000000000000000000000000000000005178aedb030000001300000023", 0x29, 0x7e0}, {&(0x7f0000010ce0)="00000000000000000000000000000000000000000000000000000000c99b0000ed410000000400009f09c75f9f09c75f9f09c75f00000000000003000200000000000800000000000af3010004000000000000000000000001", 0x59, 0x8c60}], 0x0, &(0x7f0000010f60)) (fail_nth: 19) 04:07:01 executing program 7: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="1000000040000000030000002b00000005000000010000000000000000000000002000000020000010000000000000009f09c75f0000ff", 0x37, 0x400}, {&(0x7f0000010100)="000000000000000000000000000000000000000000000000000000005178aedb030000001300000023", 0x29, 0x7e0}, {&(0x7f0000010ce0)="00000000000000000000000000000000000000000000000000000000c99b0000ed410000000400009f09c75f9f09c75f9f09c75f00000000000003000200000000000800000000000af301000400000000000000000000000100000004", 0x5d, 0x8c60}], 0x0, &(0x7f0000010f60)) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) getdents64(r0, &(0x7f0000000040)=""/4, 0x4) 04:07:01 executing program 3: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="1000000040000000030000002b00000005000000010000000000000000000000002000000020000010000000000000009f09c75f0000ffff53", 0x39, 0x400}, {&(0x7f0000010100)="000000000000000000000000000000000000000000000000000000005178aedb030000001300000023", 0x29, 0x7e0}, {&(0x7f0000010ce0)="00000000000000000000000000000000000000000000000000000000c99b0000ed410000000400009f09c75f9f09c75f9f09c75f00000000000003000200000000000800000000000af301000400000000000000000000000100000004", 0x5d, 0x8c60}], 0x0, &(0x7f0000010f60)) getdents64(r0, &(0x7f0000000040)=""/4, 0x4) 04:07:01 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="1000000040000000030000002b00000005000000010000000000000000000000002000000020000010000000000000009f09c75f0000ffff53ef", 0x3a, 0x400}, {&(0x7f0000010080)="000000000000000000000000ede2de4df49d4f87b54a3176cfd4eb4f010040000c000000000000009f09c75f", 0x2c, 0x4e0}, {&(0x7f00000100c0)="01000000000000000000000000000000000000000401000012", 0x19, 0x560}, {&(0x7f0000010100), 0x0, 0x7e0}, {&(0x7f0000010ce0)="00000000000000000000000000000000000000000000000000000000c99b0000ed410000000400009f09c75f9f09c75f9f09c75f00000000000003000200000000000800000000000af3010004", 0x4d, 0x8c60}], 0x0, &(0x7f0000010f60)) 04:07:01 executing program 6: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000), 0x0, 0x400}, {&(0x7f0000010100)="000000000000000000000000000000000000000000000000000000005178aedb030000001300000023", 0x29, 0x7e0}, {&(0x7f0000010ce0)="00000000000000000000000000000000000000000000000000000000c99b0000ed410000000400009f09c75f9f09c75f9f09c75f00000000000003000200000000000800000000000af301000400000000000000000000000100000004", 0x5d, 0x8c60}], 0x0, &(0x7f0000010f60)) getdents64(r0, &(0x7f0000000040)=""/4, 0x4) [ 2022.203903] loop4: detected capacity change from 0 to 140 [ 2022.205879] loop3: detected capacity change from 0 to 140 [ 2022.206449] loop6: detected capacity change from 0 to 140 [ 2022.216852] EXT4-fs (loop4): ext4_check_descriptors: Block bitmap for group 0 not in group (block 0)! [ 2022.217660] EXT4-fs (loop4): group descriptors corrupted! [ 2022.218257] EXT4-fs (loop6): VFS: Can't find ext4 filesystem [ 2022.218851] EXT4-fs (loop3): VFS: Can't find ext4 filesystem [ 2022.226889] loop0: detected capacity change from 0 to 140 [ 2022.233668] loop1: detected capacity change from 0 to 140 [ 2022.241249] EXT4-fs (loop0): ext4_check_descriptors: Inode bitmap for group 0 not in group (block 0)! [ 2022.242082] EXT4-fs (loop0): group descriptors corrupted! [ 2022.243883] loop7: detected capacity change from 0 to 140 [ 2022.249190] loop5: detected capacity change from 0 to 530 [ 2022.269562] EXT4-fs (loop7): VFS: Can't find ext4 filesystem [ 2022.272152] EXT4-fs (loop5): mounting ext2 file system using the ext4 subsystem [ 2022.278291] EXT4-fs error (device loop1): ext4_ext_check_inode:523: inode #2: comm syz-executor.1: pblk 0 bad header/extent: invalid extent entries - magic f30a, entries 1, max 4(4), depth 0(0) [ 2022.285373] EXT4-fs (loop5): warning: mounting unchecked fs, running e2fsck is recommended 04:07:01 executing program 6: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000), 0x0, 0x400}, {&(0x7f0000010100)="000000000000000000000000000000000000000000000000000000005178aedb030000001300000023", 0x29, 0x7e0}, {&(0x7f0000010ce0)="00000000000000000000000000000000000000000000000000000000c99b0000ed410000000400009f09c75f9f09c75f9f09c75f00000000000003000200000000000800000000000af301000400000000000000000000000100000004", 0x5d, 0x8c60}], 0x0, &(0x7f0000010f60)) getdents64(r0, &(0x7f0000000040)=""/4, 0x4) 04:07:01 executing program 3: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="1000000040000000030000002b00000005000000010000000000000000000000002000000020000010000000000000009f09c75f0000ffff53ef", 0x3a}, {&(0x7f0000010100)="000000000000000000000000000000000000000000000000000000005178aedb030000001300000023", 0x29, 0x7e0}, {&(0x7f0000010ce0)="00000000000000000000000000000000000000000000000000000000c99b0000ed410000000400009f09c75f9f09c75f9f09c75f00000000000003000200000000000800000000000af301000400000000000000000000000100000004", 0x5d, 0x8c60}], 0x0, &(0x7f0000010f60)) getdents64(r0, &(0x7f0000000040)=""/4, 0x4) 04:07:01 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="1000000040000000030000002b00000005000000010000000000000000000000002000000020000010000000000000009f09c75f0000ffff53ef", 0x3a, 0x400}, {&(0x7f0000010080)="000000000000000000000000ede2de4df49d4f87b54a3176cfd4eb4f010040000c000000000000009f09c75f", 0x2c, 0x4e0}, {&(0x7f00000100c0)="01000000000000000000000000000000000000000401000012", 0x19, 0x560}, {&(0x7f0000010100), 0x0, 0x7e0}, {&(0x7f0000010ce0)="00000000000000000000000000000000000000000000000000000000c99b0000ed410000000400009f09c75f9f09c75f9f09c75f00000000000003000200000000000800000000000af3010004", 0x4d, 0x8c60}], 0x0, &(0x7f0000010f60)) [ 2022.309696] loop3: detected capacity change from 0 to 140 [ 2022.313961] EXT4-fs (loop3): VFS: Can't find ext4 filesystem [ 2022.320112] EXT4-fs (loop1): get root inode failed [ 2022.320868] EXT4-fs (loop1): mount failed [ 2022.329710] EXT4-fs (loop5): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: none. [ 2022.370324] EXT4-fs (loop5): unmounting filesystem 00000000-0000-0000-0000-000000000000. 04:07:01 executing program 3: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="1000000040000000030000002b00000005000000010000000000000000000000002000000020000010000000000000009f09c75f0000ffff53ef", 0x3a}, {&(0x7f0000010100)="000000000000000000000000000000000000000000000000000000005178aedb030000001300000023", 0x29, 0x7e0}, {&(0x7f0000010ce0)="00000000000000000000000000000000000000000000000000000000c99b0000ed410000000400009f09c75f9f09c75f9f09c75f00000000000003000200000000000800000000000af301000400000000000000000000000100000004", 0x5d, 0x8c60}], 0x0, &(0x7f0000010f60)) getdents64(r0, &(0x7f0000000040)=""/4, 0x4) 04:07:01 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="1000000040000000030000002b00000005000000010000000000000000000000002000000020000010000000000000009f09c75f0000ffff53ef", 0x3a, 0x400}, {&(0x7f0000010100)="000000000000000000000000000000000000000000000000000000005178aedb03000000", 0x24, 0x7e0}, {&(0x7f0000010ce0)="00000000000000000000000000000000000000000000000000000000c99b0000ed410000000400009f09c75f9f09c75f9f09c75f00000000000003000200000000000800000000000af3010004", 0x4d, 0x8c60}], 0x0, &(0x7f0000010f60)) [ 2022.402343] loop6: detected capacity change from 0 to 140 [ 2022.406550] EXT4-fs (loop6): VFS: Can't find ext4 filesystem [ 2022.416570] loop3: detected capacity change from 0 to 140 [ 2022.437280] EXT4-fs (loop3): VFS: Can't find ext4 filesystem 04:07:01 executing program 7: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="1000000040000000030000002b00000005000000010000000000000000000000002000000020000010000000000000009f09c75f0000ff", 0x37, 0x400}, {&(0x7f0000010100)="000000000000000000000000000000000000000000000000000000005178aedb030000001300000023", 0x29, 0x7e0}, {&(0x7f0000010ce0)="00000000000000000000000000000000000000000000000000000000c99b0000ed410000000400009f09c75f9f09c75f9f09c75f00000000000003000200000000000800000000000af301000400000000000000000000000100000004", 0x5d, 0x8c60}], 0x0, &(0x7f0000010f60)) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) getdents64(r0, &(0x7f0000000040)=""/4, 0x4) 04:07:01 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="1000000040000000030000002b00000005000000010000000000000000000000002000000020000010000000000000009f09c75f0000ffff53ef", 0x3a, 0x400}, {&(0x7f0000010100)="000000000000000000000000000000000000000000000000000000005178aedb030000001300000023", 0x29, 0x7e0}, {&(0x7f0000010ce0)="00000000000000000000000000000000000000000000000000000000c99b0000ed410000000400009f09c75f9f09c75f9f09c75f00000000000003000200000000000800000000000af3010004000000000000000000000001", 0x59, 0x8c60}], 0x0, &(0x7f0000010f60)) (fail_nth: 20) 04:07:01 executing program 6: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000), 0x0, 0x400}, {&(0x7f0000010100)="000000000000000000000000000000000000000000000000000000005178aedb030000001300000023", 0x29, 0x7e0}, {&(0x7f0000010ce0)="00000000000000000000000000000000000000000000000000000000c99b0000ed410000000400009f09c75f9f09c75f9f09c75f00000000000003000200000000000800000000000af301000400000000000000000000000100000004", 0x5d, 0x8c60}], 0x0, &(0x7f0000010f60)) getdents64(r0, &(0x7f0000000040)=""/4, 0x4) [ 2022.471634] loop4: detected capacity change from 0 to 140 [ 2022.476907] loop0: detected capacity change from 0 to 140 [ 2022.491260] EXT4-fs (loop4): ext4_check_descriptors: Block bitmap for group 0 not in group (block 0)! [ 2022.492739] EXT4-fs (loop4): group descriptors corrupted! 04:07:01 executing program 5: creat(&(0x7f00000003c0)='./file0\x00', 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext2\x00', &(0x7f0000000100)='./file0\x00', 0x42500, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}], 0x0, &(0x7f0000013c00)=ANY=[]) [ 2022.518218] EXT4-fs (loop0): ext4_check_descriptors: Inode bitmap for group 0 not in group (block 0)! [ 2022.519718] EXT4-fs (loop0): group descriptors corrupted! [ 2022.531869] loop7: detected capacity change from 0 to 140 [ 2022.533773] loop6: detected capacity change from 0 to 140 [ 2022.535685] FAULT_INJECTION: forcing a failure. [ 2022.535685] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 2022.536827] CPU: 1 UID: 0 PID: 14384 Comm: syz-executor.1 Not tainted 6.18.0-rc5-next-20251111 #1 PREEMPT(voluntary) [ 2022.536844] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2022.536854] Call Trace: [ 2022.536858] [ 2022.536864] dump_stack_lvl+0xfa/0x120 [ 2022.536883] should_fail_ex+0x4d7/0x5e0 [ 2022.536896] ? page_copy_sane+0xce/0x2b0 [ 2022.536921] copy_folio_from_iter_atomic+0x3d3/0x18c0 [ 2022.536946] ? __pfx_copy_folio_from_iter_atomic+0x10/0x10 [ 2022.536959] ? shmem_write_begin+0x1ab/0x3b0 [ 2022.536974] ? __pfx_shmem_write_begin+0x10/0x10 [ 2022.536986] ? timestamp_truncate+0x1eb/0x2f0 [ 2022.537000] ? balance_dirty_pages_ratelimited_flags+0x8f/0x1190 [ 2022.537017] ? __pfx_timestamp_truncate+0x10/0x10 [ 2022.537032] generic_perform_write+0x1d7/0x810 [ 2022.537059] ? __pfx_generic_perform_write+0x10/0x10 [ 2022.537078] ? inode_needs_update_time.part.0+0x170/0x270 [ 2022.537096] shmem_file_write_iter+0x111/0x140 [ 2022.537114] vfs_write+0xbe9/0x1150 [ 2022.537126] ? __pfx_shmem_file_write_iter+0x10/0x10 [ 2022.537144] ? __fget_files+0x34/0x3b0 [ 2022.537162] ? __pfx_vfs_write+0x10/0x10 [ 2022.537183] __x64_sys_pwrite64+0x1f1/0x260 [ 2022.537196] ? __pfx___x64_sys_pwrite64+0x10/0x10 [ 2022.537214] do_syscall_64+0xbf/0x430 [ 2022.537228] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 2022.537241] RIP: 0033:0x7f52e7967ab7 [ 2022.537251] Code: 08 89 3c 24 48 89 4c 24 18 e8 e5 f8 ff ff 4c 8b 54 24 18 48 8b 54 24 10 41 89 c0 48 8b 74 24 08 8b 3c 24 b8 12 00 00 00 0f 05 <48> 3d 00 f0 ff ff 77 31 44 89 c7 48 89 04 24 e8 15 f9 ff ff 48 8b [ 2022.537263] RSP: 002b:00007f52e4f29f20 EFLAGS: 00000293 ORIG_RAX: 0000000000000012 [ 2022.537275] RAX: ffffffffffffffda RBX: 00007f52e79fe970 RCX: 00007f52e7967ab7 [ 2022.537284] RDX: 0000000000000059 RSI: 0000000020010ce0 RDI: 0000000000000004 [ 2022.537291] RBP: 0000000000000003 R08: 0000000000000000 R09: ffffffffffffffff [ 2022.537299] R10: 0000000000008c60 R11: 0000000000000293 R12: 0000000000000004 [ 2022.537306] R13: 0000000000000004 R14: 0000000020000230 R15: 0000000000000002 [ 2022.537322] [ 2022.577593] EXT4-fs (loop6): VFS: Can't find ext4 filesystem [ 2022.579073] EXT4-fs (loop7): VFS: Can't find ext4 filesystem [ 2022.591198] loop5: detected capacity change from 0 to 530 [ 2022.592180] loop1: detected capacity change from 0 to 140 [ 2022.602299] EXT4-fs (loop5): mounting ext2 file system using the ext4 subsystem [ 2022.603475] EXT4-fs error (device loop1): ext4_ext_check_inode:523: inode #2: comm syz-executor.1: pblk 0 bad header/extent: invalid extent entries - magic f30a, entries 1, max 4(4), depth 0(0) [ 2022.609813] EXT4-fs (loop1): get root inode failed [ 2022.610268] EXT4-fs (loop1): mount failed [ 2022.611669] EXT4-fs (loop5): warning: mounting unchecked fs, running e2fsck is recommended [ 2022.624385] EXT4-fs (loop5): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: none. [ 2022.634749] EXT4-fs (loop5): unmounting filesystem 00000000-0000-0000-0000-000000000000. 04:07:10 executing program 3: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="1000000040000000030000002b00000005000000010000000000000000000000002000000020000010000000000000009f09c75f0000ffff53ef", 0x3a}, {&(0x7f0000010100)="000000000000000000000000000000000000000000000000000000005178aedb030000001300000023", 0x29, 0x7e0}, {&(0x7f0000010ce0)="00000000000000000000000000000000000000000000000000000000c99b0000ed410000000400009f09c75f9f09c75f9f09c75f00000000000003000200000000000800000000000af301000400000000000000000000000100000004", 0x5d, 0x8c60}], 0x0, &(0x7f0000010f60)) getdents64(r0, &(0x7f0000000040)=""/4, 0x4) 04:07:10 executing program 6: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="1000000040000000030000002b00000005000000010000000000000000", 0x1d, 0x400}, {&(0x7f0000010100)="000000000000000000000000000000000000000000000000000000005178aedb030000001300000023", 0x29, 0x7e0}, {&(0x7f0000010ce0)="00000000000000000000000000000000000000000000000000000000c99b0000ed410000000400009f09c75f9f09c75f9f09c75f00000000000003000200000000000800000000000af301000400000000000000000000000100000004", 0x5d, 0x8c60}], 0x0, &(0x7f0000010f60)) getdents64(r0, &(0x7f0000000040)=""/4, 0x4) 04:07:10 executing program 5: creat(&(0x7f00000003c0)='./file0\x00', 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext2\x00', &(0x7f0000000100)='./file0\x00', 0x42700, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}], 0x0, &(0x7f0000013c00)=ANY=[]) 04:07:10 executing program 7: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="1000000040000000030000002b00000005000000010000000000000000000000002000000020000010000000000000009f09c75f0000ff", 0x37, 0x400}, {&(0x7f0000010100)="000000000000000000000000000000000000000000000000000000005178aedb030000001300000023", 0x29, 0x7e0}, {&(0x7f0000010ce0)="00000000000000000000000000000000000000000000000000000000c99b0000ed410000000400009f09c75f9f09c75f9f09c75f00000000000003000200000000000800000000000af301000400000000000000000000000100000004", 0x5d, 0x8c60}], 0x0, &(0x7f0000010f60)) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) getdents64(r0, &(0x7f0000000040)=""/4, 0x4) 04:07:10 executing program 2: sendmsg$NL80211_CMD_UNEXPECTED_FRAME(0xffffffffffffffff, &(0x7f0000000400)={0x0, 0x0, &(0x7f0000000300)={&(0x7f00000002c0)={0x1c, 0x0, 0x1, 0x0, 0x0, {{}, {@val={0x8}, @void}}}, 0x1c}}, 0x0) sendmsg$NL80211_CMD_UPDATE_FT_IES(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000001c0)={0x24, 0x0, 0x1, 0x70bd2c, 0x0, {{}, {@val={0x8}, @void}}, [@NL80211_ATTR_MDID={0x6, 0xb1, 0xc116}]}, 0x24}, 0x1, 0x0, 0x0, 0x80}, 0xc000) r0 = creat(&(0x7f00000003c0)='./file1\x00', 0x0) sendmsg$netlink(0xffffffffffffffff, 0x0, 0x0) dup(0xffffffffffffffff) pwritev2(r0, &(0x7f0000000380)=[{&(0x7f0000000180)="bd", 0xfffffdef}], 0x1, 0x1200, 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) ioctl$FS_IOC_FSSETXATTR(r1, 0xc0045878, &(0x7f0000000200)={0x9}) syz_io_uring_setup(0x0, &(0x7f0000000000)={0x0, 0x0, 0x4, 0x2, 0x309}, &(0x7f0000ffc000/0x2000)=nil, &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000000080), &(0x7f0000000240)) syz_io_uring_submit(0x0, 0x0, &(0x7f0000000280)=@IORING_OP_ASYNC_CANCEL={0xe, 0x0, 0x0, 0x0, 0x0, 0x12345}, 0x1ff) 04:07:10 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="1000000040000000030000002b00000005000000010000000000000000000000002000000020000010000000000000009f09c75f0000ffff53ef", 0x3a, 0x400}, {&(0x7f0000010100)="000000000000000000000000000000000000000000000000000000005178aedb03000000", 0x24, 0x7e0}, {&(0x7f0000010ce0)="00000000000000000000000000000000000000000000000000000000c99b0000ed410000000400009f09c75f9f09c75f9f09c75f00000000000003000200000000000800000000000af3010004", 0x4d, 0x8c60}], 0x0, &(0x7f0000010f60)) 04:07:10 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="1000000040000000030000002b00000005000000010000000000000000000000002000000020000010000000000000009f09c75f0000ffff53ef", 0x3a, 0x400}, {&(0x7f0000010100)="000000000000000000000000000000000000000000000000000000005178aedb030000001300000023", 0x29, 0x7e0}, {&(0x7f0000010ce0)="00000000000000000000000000000000000000000000000000000000c99b0000ed410000000400009f09c75f9f09c75f9f09c75f00000000000003000200000000000800000000000af3010004000000000000000000000001", 0x59, 0x8c60}], 0x0, &(0x7f0000010f60)) (fail_nth: 21) 04:07:10 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="1000000040000000030000002b00000005000000010000000000000000000000002000000020000010000000000000009f09c75f0000ffff53ef", 0x3a, 0x400}, {&(0x7f0000010080)="000000000000000000000000ede2de4df49d4f87b54a3176cfd4eb4f010040000c000000000000009f09c75f", 0x2c, 0x4e0}, {&(0x7f00000100c0)="01000000000000000000000000000000000000000401000012", 0x19, 0x560}, {&(0x7f0000010100)='\x00'/21, 0x15, 0x7e0}, {&(0x7f0000010ce0)="00000000000000000000000000000000000000000000000000000000c99b0000ed410000000400009f09c75f9f09c75f9f09c75f00000000000003000200000000000800000000000af3010004", 0x4d, 0x8c60}], 0x0, &(0x7f0000010f60)) [ 2031.986514] loop6: detected capacity change from 0 to 140 [ 2031.987067] FAULT_INJECTION: forcing a failure. [ 2031.987067] name failslab, interval 1, probability 0, space 0, times 0 [ 2031.988648] loop4: detected capacity change from 0 to 140 [ 2031.989424] CPU: 1 UID: 0 PID: 14410 Comm: syz-executor.1 Not tainted 6.18.0-rc5-next-20251111 #1 PREEMPT(voluntary) [ 2031.989456] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2031.989470] Call Trace: [ 2031.989478] [ 2031.989486] dump_stack_lvl+0xfa/0x120 [ 2031.989516] should_fail_ex+0x4d7/0x5e0 [ 2031.989542] ? getname_flags.part.0+0x48/0x540 [ 2031.989571] should_failslab+0xc2/0x120 [ 2031.989595] kmem_cache_alloc_noprof+0x80/0x690 [ 2031.989632] ? getname_flags.part.0+0x48/0x540 [ 2031.989659] getname_flags.part.0+0x48/0x540 [ 2031.989689] getname_flags+0x95/0xe0 [ 2031.989723] do_sys_openat2+0x9f/0x1b0 [ 2031.989751] ? __pfx_do_sys_openat2+0x10/0x10 [ 2031.989790] __x64_sys_openat+0x142/0x200 [ 2031.989818] ? __pfx___x64_sys_openat+0x10/0x10 [ 2031.989858] do_syscall_64+0xbf/0x430 [ 2031.989883] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 2031.989906] RIP: 0033:0x7f52e7967a04 [ 2031.989931] Code: 84 00 00 00 00 00 44 89 54 24 0c e8 96 f9 ff ff 44 8b 54 24 0c 44 89 e2 48 89 ee 41 89 c0 bf 9c ff ff ff b8 01 01 00 00 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 89 44 24 0c e8 c8 f9 ff ff 8b 44 [ 2031.989953] RSP: 002b:00007f52e4f29ed0 EFLAGS: 00000293 ORIG_RAX: 0000000000000101 [ 2031.989974] RAX: ffffffffffffffda RBX: 00007f52e79fe970 RCX: 00007f52e7967a04 [ 2031.989990] RDX: 0000000000000002 RSI: 00007f52e4f2a000 RDI: 00000000ffffff9c [ 2031.990004] RBP: 00007f52e4f2a000 R08: 0000000000000000 R09: ffffffffffffffff [ 2031.990018] R10: 0000000000000000 R11: 0000000000000293 R12: 0000000000000002 [ 2031.990032] R13: 0000000000000004 R14: 0000000020000248 R15: 0000000000000003 [ 2031.990060] [ 2031.990986] loop0: detected capacity change from 0 to 140 [ 2032.002876] EXT4-fs (loop6): VFS: Can't find ext4 filesystem [ 2032.009742] loop5: detected capacity change from 0 to 531 [ 2032.014314] loop3: detected capacity change from 0 to 140 [ 2032.018643] loop7: detected capacity change from 0 to 140 [ 2032.025267] EXT4-fs (loop4): ext4_check_descriptors: Block bitmap for group 0 not in group (block 0)! [ 2032.027033] EXT4-fs (loop4): group descriptors corrupted! [ 2032.032498] EXT4-fs (loop5): mounting ext2 file system using the ext4 subsystem [ 2032.041340] EXT4-fs (loop5): warning: mounting unchecked fs, running e2fsck is recommended [ 2032.041416] EXT4-fs (loop7): VFS: Can't find ext4 filesystem [ 2032.048557] EXT4-fs (loop3): VFS: Can't find ext4 filesystem [ 2032.059210] EXT4-fs (loop0): ext4_check_descriptors: Inode bitmap for group 0 not in group (block 0)! [ 2032.060601] EXT4-fs (loop0): group descriptors corrupted! [ 2032.070135] EXT4-fs (loop5): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: none. 04:07:10 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="1000000040000000030000002b00000005000000010000000000000000000000002000000020000010000000000000009f09c75f0000ffff53ef", 0x3a, 0x400}, {&(0x7f0000010100)="000000000000000000000000000000000000000000000000000000005178aedb030000001300000023", 0x29, 0x7e0}, {&(0x7f0000010ce0)="00000000000000000000000000000000000000000000000000000000c99b0000ed410000000400009f09c75f9f09c75f9f09c75f00000000000003000200000000000800000000000af3010004000000000000000000000001", 0x59, 0x8c60}], 0x0, &(0x7f0000010f60)) (fail_nth: 22) [ 2032.093550] EXT4-fs (loop5): unmounting filesystem 00000000-0000-0000-0000-000000000000. 04:07:11 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="1000000040000000030000002b00000005000000010000000000000000000000002000000020000010000000000000009f09c75f0000ffff53ef", 0x3a, 0x400}, {&(0x7f0000010080)="000000000000000000000000ede2de4df49d4f87b54a3176cfd4eb4f010040000c000000000000009f09c75f", 0x2c, 0x4e0}, {&(0x7f00000100c0)="01000000000000000000000000000000000000000401000012", 0x19, 0x560}, {&(0x7f0000010100)='\x00'/21, 0x15, 0x7e0}, {&(0x7f0000010ce0)="00000000000000000000000000000000000000000000000000000000c99b0000ed410000000400009f09c75f9f09c75f9f09c75f00000000000003000200000000000800000000000af3010004", 0x4d, 0x8c60}], 0x0, &(0x7f0000010f60)) 04:07:11 executing program 3: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="1000000040000000030000002b00000005000000010000000000000000000000002000000020000010000000000000009f09c75f0000ffff53ef", 0x3a, 0x400}, {&(0x7f0000010100)="000000000000000000000000000000000000000000000000000000005178aedb030000001300000023", 0x29, 0x7e0}, {&(0x7f0000010ce0)="00000000000000000000000000000000000000000000000000000000c99b0000ed410000000400009f09c75f9f09c75f9f09c75f00000000000003000200000000000800000000000af301000400000000000000000000000100000004", 0x5d, 0x8c60}], 0x0, 0x0) getdents64(r0, &(0x7f0000000040)=""/4, 0x4) 04:07:11 executing program 6: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="1000000040000000030000002b00000005000000010000000000000000", 0x1d, 0x400}, {&(0x7f0000010100)="000000000000000000000000000000000000000000000000000000005178aedb030000001300000023", 0x29, 0x7e0}, {&(0x7f0000010ce0)="00000000000000000000000000000000000000000000000000000000c99b0000ed410000000400009f09c75f9f09c75f9f09c75f00000000000003000200000000000800000000000af301000400000000000000000000000100000004", 0x5d, 0x8c60}], 0x0, &(0x7f0000010f60)) getdents64(r0, &(0x7f0000000040)=""/4, 0x4) [ 2032.211747] loop1: detected capacity change from 0 to 140 04:07:11 executing program 7: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="1000000040000000030000002b00000005000000010000000000000000000000002000000020000010000000000000009f09c75f0000ffff53", 0x39, 0x400}, {&(0x7f0000010100)="000000000000000000000000000000000000000000000000000000005178aedb030000001300000023", 0x29, 0x7e0}, {&(0x7f0000010ce0)="00000000000000000000000000000000000000000000000000000000c99b0000ed410000000400009f09c75f9f09c75f9f09c75f00000000000003000200000000000800000000000af301000400000000000000000000000100000004", 0x5d, 0x8c60}], 0x0, &(0x7f0000010f60)) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) getdents64(r0, &(0x7f0000000040)=""/4, 0x4) [ 2032.251080] loop4: detected capacity change from 0 to 140 04:07:11 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="1000000040000000030000002b00000005000000010000000000000000000000002000000020000010000000000000009f09c75f0000ffff53ef", 0x3a, 0x400}, {&(0x7f0000010100)="000000000000000000000000000000000000000000000000000000005178aedb03000000130000", 0x27, 0x7e0}, {&(0x7f0000010ce0)="00000000000000000000000000000000000000000000000000000000c99b0000ed410000000400009f09c75f9f09c75f9f09c75f00000000000003000200000000000800000000000af3010004", 0x4d, 0x8c60}], 0x0, &(0x7f0000010f60)) [ 2032.260576] EXT4-fs error (device loop1): ext4_ext_check_inode:523: inode #2: comm syz-executor.1: pblk 0 bad header/extent: invalid extent entries - magic f30a, entries 1, max 4(4), depth 0(0) [ 2032.263869] EXT4-fs (loop4): ext4_check_descriptors: Block bitmap for group 0 not in group (block 0)! [ 2032.265200] loop3: detected capacity change from 0 to 140 [ 2032.265409] EXT4-fs (loop4): group descriptors corrupted! 04:07:11 executing program 5: creat(&(0x7f00000003c0)='./file0\x00', 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext2\x00', &(0x7f0000000100)='./file0\x00', 0x42bde, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}], 0x0, &(0x7f0000013c00)=ANY=[]) [ 2032.282702] EXT4-fs (loop1): get root inode failed [ 2032.283496] EXT4-fs (loop1): mount failed [ 2032.315588] loop7: detected capacity change from 0 to 140 04:07:11 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="1000000040000000030000002b00000005000000010000000000000000000000002000000020000010000000000000009f09c75f0000ffff53ef", 0x3a, 0x400}, {&(0x7f0000010080)="000000000000000000000000ede2de4df49d4f87b54a3176cfd4eb4f010040000c000000000000009f09c75f", 0x2c, 0x4e0}, {&(0x7f00000100c0)="01000000000000000000000000000000000000000401000012", 0x19, 0x560}, {&(0x7f0000010100)='\x00'/21, 0x15, 0x7e0}, {&(0x7f0000010ce0)="00000000000000000000000000000000000000000000000000000000c99b0000ed410000000400009f09c75f9f09c75f9f09c75f00000000000003000200000000000800000000000af3010004", 0x4d, 0x8c60}], 0x0, &(0x7f0000010f60)) [ 2032.327733] loop6: detected capacity change from 0 to 140 [ 2032.343525] loop0: detected capacity change from 0 to 140 [ 2032.350210] EXT4-fs (loop7): VFS: Can't find ext4 filesystem [ 2032.355632] loop4: detected capacity change from 0 to 140 [ 2032.356825] EXT4-fs (loop0): ext4_check_descriptors: Inode table for group 0 not in group (block 0)! [ 2032.358239] EXT4-fs (loop0): group descriptors corrupted! [ 2032.358974] EXT4-fs (loop6): VFS: Can't find ext4 filesystem [ 2032.368288] EXT4-fs (loop4): ext4_check_descriptors: Block bitmap for group 0 not in group (block 0)! [ 2032.369861] EXT4-fs (loop4): group descriptors corrupted! [ 2032.373882] loop5: detected capacity change from 0 to 533 [ 2032.411239] EXT4-fs (loop5): mounting ext2 file system using the ext4 subsystem [ 2032.434017] EXT4-fs (loop5): warning: mounting unchecked fs, running e2fsck is recommended [ 2032.475242] EXT4-fs (loop5): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: none. [ 2032.496665] EXT4-fs (loop5): unmounting filesystem 00000000-0000-0000-0000-000000000000. 04:07:20 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="1000000040000000030000002b00000005000000010000000000000000000000002000000020000010000000000000009f09c75f0000ffff53ef", 0x3a, 0x400}, {&(0x7f0000010100)="000000000000000000000000000000000000000000000000000000005178aedb030000001300000023", 0x29, 0x7e0}, {&(0x7f0000010ce0)="00000000000000000000000000000000000000000000000000000000c99b0000ed410000000400009f09c75f9f09c75f9f09c75f00000000000003000200000000000800000000000af3010004000000000000000000000001", 0x59, 0x8c60}], 0x0, &(0x7f0000010f60)) (fail_nth: 23) 04:07:20 executing program 3: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="1000000040000000030000002b00000005000000010000000000000000000000002000000020000010000000000000009f09c75f0000ffff53ef", 0x3a, 0x400}, {&(0x7f0000010100)="000000000000000000000000000000000000000000000000000000005178aedb030000001300000023", 0x29, 0x7e0}, {&(0x7f0000010ce0)="00000000000000000000000000000000000000000000000000000000c99b0000ed410000000400009f09c75f9f09c75f9f09c75f00000000000003000200000000000800000000000af301000400000000000000000000000100000004", 0x5d, 0x8c60}], 0x0, 0x0) getdents64(r0, &(0x7f0000000040)=""/4, 0x4) 04:07:20 executing program 2: sendmsg$NL80211_CMD_UNEXPECTED_FRAME(0xffffffffffffffff, &(0x7f0000000400)={0x0, 0x0, &(0x7f0000000300)={&(0x7f00000002c0)={0x1c, 0x0, 0x1, 0x0, 0x0, {{}, {@val={0x8}, @void}}}, 0x1c}}, 0x0) sendmsg$NL80211_CMD_UPDATE_FT_IES(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000001c0)={0x24, 0x0, 0x1, 0x70bd2c, 0x0, {{}, {@val={0x8}, @void}}, [@NL80211_ATTR_MDID={0x6, 0xb1, 0xc116}]}, 0x24}, 0x1, 0x0, 0x0, 0x80}, 0xc000) r0 = creat(&(0x7f00000003c0)='./file1\x00', 0x0) sendmsg$netlink(0xffffffffffffffff, 0x0, 0x0) dup(0xffffffffffffffff) pwritev2(r0, &(0x7f0000000380)=[{&(0x7f0000000180)="bd", 0xfffffdef}], 0x1, 0x1200, 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) ioctl$FS_IOC_FSSETXATTR(r1, 0xc0189436, &(0x7f0000000200)={0x9}) syz_io_uring_setup(0x0, &(0x7f0000000000)={0x0, 0x0, 0x4, 0x2, 0x309}, &(0x7f0000ffc000/0x2000)=nil, &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000000080), &(0x7f0000000240)) syz_io_uring_submit(0x0, 0x0, &(0x7f0000000280)=@IORING_OP_ASYNC_CANCEL={0xe, 0x0, 0x0, 0x0, 0x0, 0x12345}, 0x1ff) 04:07:20 executing program 5: creat(&(0x7f00000003c0)='./file0\x00', 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext2\x00', &(0x7f0000000100)='./file0\x00', 0x42cde, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}], 0x0, &(0x7f0000013c00)=ANY=[]) 04:07:20 executing program 6: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="1000000040000000030000002b00000005000000010000000000000000", 0x1d, 0x400}, {&(0x7f0000010100)="000000000000000000000000000000000000000000000000000000005178aedb030000001300000023", 0x29, 0x7e0}, {&(0x7f0000010ce0)="00000000000000000000000000000000000000000000000000000000c99b0000ed410000000400009f09c75f9f09c75f9f09c75f00000000000003000200000000000800000000000af301000400000000000000000000000100000004", 0x5d, 0x8c60}], 0x0, &(0x7f0000010f60)) getdents64(r0, &(0x7f0000000040)=""/4, 0x4) 04:07:20 executing program 7: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="1000000040000000030000002b00000005000000010000000000000000000000002000000020000010000000000000009f09c75f0000ffff53", 0x39, 0x400}, {&(0x7f0000010100)="000000000000000000000000000000000000000000000000000000005178aedb030000001300000023", 0x29, 0x7e0}, {&(0x7f0000010ce0)="00000000000000000000000000000000000000000000000000000000c99b0000ed410000000400009f09c75f9f09c75f9f09c75f00000000000003000200000000000800000000000af301000400000000000000000000000100000004", 0x5d, 0x8c60}], 0x0, &(0x7f0000010f60)) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) getdents64(r0, &(0x7f0000000040)=""/4, 0x4) 04:07:20 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="1000000040000000030000002b00000005000000010000000000000000000000002000000020000010000000000000009f09c75f0000ffff53ef", 0x3a, 0x400}, {&(0x7f0000010080)="000000000000000000000000ede2de4df49d4f87b54a3176cfd4eb4f010040000c000000000000009f09c75f", 0x2c, 0x4e0}, {&(0x7f00000100c0)="01000000000000000000000000000000000000000401000012", 0x19, 0x560}, {&(0x7f0000010100)="000000000000000000000000000000000000000000000000000000005178ae", 0x1f, 0x7e0}, {&(0x7f0000010ce0)="00000000000000000000000000000000000000000000000000000000c99b0000ed410000000400009f09c75f9f09c75f9f09c75f00000000000003000200000000000800000000000af3010004", 0x4d, 0x8c60}], 0x0, &(0x7f0000010f60)) 04:07:20 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="1000000040000000030000002b00000005000000010000000000000000000000002000000020000010000000000000009f09c75f0000ffff53ef", 0x3a, 0x400}, {&(0x7f0000010100)="000000000000000000000000000000000000000000000000000000005178aedb03000000130000", 0x27, 0x7e0}, {&(0x7f0000010ce0)="00000000000000000000000000000000000000000000000000000000c99b0000ed410000000400009f09c75f9f09c75f9f09c75f00000000000003000200000000000800000000000af3010004", 0x4d, 0x8c60}], 0x0, &(0x7f0000010f60)) [ 2041.121086] loop3: detected capacity change from 0 to 140 [ 2041.122469] FAULT_INJECTION: forcing a failure. [ 2041.122469] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 2041.123424] CPU: 1 UID: 0 PID: 14452 Comm: syz-executor.1 Not tainted 6.18.0-rc5-next-20251111 #1 PREEMPT(voluntary) [ 2041.123441] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2041.123449] Call Trace: [ 2041.123453] [ 2041.123458] dump_stack_lvl+0xfa/0x120 [ 2041.123477] should_fail_ex+0x4d7/0x5e0 [ 2041.123493] strncpy_from_user+0x3b/0x2f0 [ 2041.123513] getname_flags.part.0+0x8d/0x540 [ 2041.123531] getname_flags+0x95/0xe0 [ 2041.123550] do_sys_openat2+0x9f/0x1b0 [ 2041.123567] ? __pfx_do_sys_openat2+0x10/0x10 [ 2041.123589] __x64_sys_openat+0x142/0x200 [ 2041.123604] ? __pfx___x64_sys_openat+0x10/0x10 [ 2041.123626] do_syscall_64+0xbf/0x430 [ 2041.123640] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 2041.123654] RIP: 0033:0x7f52e7967a04 [ 2041.123663] Code: 84 00 00 00 00 00 44 89 54 24 0c e8 96 f9 ff ff 44 8b 54 24 0c 44 89 e2 48 89 ee 41 89 c0 bf 9c ff ff ff b8 01 01 00 00 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 89 44 24 0c e8 c8 f9 ff ff 8b 44 [ 2041.123675] RSP: 002b:00007f52e4f29ed0 EFLAGS: 00000293 ORIG_RAX: 0000000000000101 [ 2041.123687] RAX: ffffffffffffffda RBX: 00007f52e79fe970 RCX: 00007f52e7967a04 [ 2041.123695] RDX: 0000000000000002 RSI: 00007f52e4f2a000 RDI: 00000000ffffff9c [ 2041.123703] RBP: 00007f52e4f2a000 R08: 0000000000000000 R09: ffffffffffffffff [ 2041.123711] R10: 0000000000000000 R11: 0000000000000293 R12: 0000000000000002 [ 2041.123719] R13: 0000000000000004 R14: 0000000020000248 R15: 0000000000000003 [ 2041.123734] [ 2041.168362] loop5: detected capacity change from 0 to 534 04:07:20 executing program 3: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="1000000040000000030000002b00000005000000010000000000000000000000002000000020000010000000000000009f09c75f0000ffff53ef", 0x3a, 0x400}, {&(0x7f0000010100)="000000000000000000000000000000000000000000000000000000005178aedb030000001300000023", 0x29, 0x7e0}, {&(0x7f0000010ce0)="00000000000000000000000000000000000000000000000000000000c99b0000ed410000000400009f09c75f9f09c75f9f09c75f00000000000003000200000000000800000000000af301000400000000000000000000000100000004", 0x5d, 0x8c60}], 0x0, 0x0) getdents64(r0, &(0x7f0000000040)=""/4, 0x4) 04:07:20 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="1000000040000000030000002b00000005000000010000000000000000000000002000000020000010000000000000009f09c75f0000ffff53ef", 0x3a, 0x400}, {&(0x7f0000010100)="000000000000000000000000000000000000000000000000000000005178aedb030000001300000023", 0x29, 0x7e0}, {&(0x7f0000010ce0)="00000000000000000000000000000000000000000000000000000000c99b0000ed410000000400009f09c75f9f09c75f9f09c75f00000000000003000200000000000800000000000af3010004000000000000000000000001", 0x59, 0x8c60}], 0x0, &(0x7f0000010f60)) (fail_nth: 24) [ 2041.179661] loop7: detected capacity change from 0 to 140 [ 2041.180398] loop0: detected capacity change from 0 to 140 [ 2041.185236] loop4: detected capacity change from 0 to 140 [ 2041.187587] EXT4-fs (loop5): mounting ext2 file system using the ext4 subsystem [ 2041.188365] loop6: detected capacity change from 0 to 140 [ 2041.199567] EXT4-fs (loop0): ext4_check_descriptors: Inode table for group 0 not in group (block 0)! [ 2041.199886] EXT4-fs (loop7): VFS: Can't find ext4 filesystem [ 2041.200335] EXT4-fs (loop0): group descriptors corrupted! [ 2041.201339] EXT4-fs (loop6): VFS: Can't find ext4 filesystem [ 2041.208203] EXT4-fs (loop4): ext4_check_descriptors: Block bitmap for group 0 not in group (block 0)! [ 2041.209828] EXT4-fs (loop4): group descriptors corrupted! [ 2041.215443] EXT4-fs (loop5): warning: mounting unchecked fs, running e2fsck is recommended [ 2041.236157] loop3: detected capacity change from 0 to 140 [ 2041.249376] FAULT_INJECTION: forcing a failure. [ 2041.249376] name failslab, interval 1, probability 0, space 0, times 0 [ 2041.250460] CPU: 1 UID: 0 PID: 14469 Comm: syz-executor.1 Not tainted 6.18.0-rc5-next-20251111 #1 PREEMPT(voluntary) [ 2041.250458] EXT4-fs (loop5): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: none. [ 2041.250479] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2041.250489] Call Trace: [ 2041.250494] [ 2041.250500] dump_stack_lvl+0xfa/0x120 [ 2041.250520] should_fail_ex+0x4d7/0x5e0 [ 2041.250536] ? alloc_empty_file+0x58/0x1e0 [ 2041.250553] should_failslab+0xc2/0x120 [ 2041.250568] kmem_cache_alloc_noprof+0x80/0x690 [ 2041.250585] ? __is_insn_slot_addr+0x140/0x290 [ 2041.250608] ? alloc_empty_file+0x58/0x1e0 [ 2041.250623] alloc_empty_file+0x58/0x1e0 [ 2041.250639] path_openat+0xe0/0x2880 [ 2041.250657] ? __lock_acquire+0x694/0x1b70 [ 2041.250676] ? __pfx_path_openat+0x10/0x10 [ 2041.250693] do_filp_open+0x1e8/0x450 [ 2041.250705] ? __pfx_do_filp_open+0x10/0x10 [ 2041.250723] ? find_held_lock+0x2b/0x80 [ 2041.250737] ? alloc_fd+0x2c1/0x560 [ 2041.250756] ? lock_release+0xc8/0x290 [ 2041.250775] ? _raw_spin_unlock+0x1e/0x40 [ 2041.250794] ? alloc_fd+0x2c1/0x560 [ 2041.250817] do_sys_openat2+0x104/0x1b0 [ 2041.250834] ? __pfx_do_sys_openat2+0x10/0x10 [ 2041.250856] __x64_sys_openat+0x142/0x200 [ 2041.250881] ? __pfx___x64_sys_openat+0x10/0x10 [ 2041.250904] do_syscall_64+0xbf/0x430 [ 2041.250923] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 2041.250937] RIP: 0033:0x7f52e7967a04 [ 2041.250947] Code: 84 00 00 00 00 00 44 89 54 24 0c e8 96 f9 ff ff 44 8b 54 24 0c 44 89 e2 48 89 ee 41 89 c0 bf 9c ff ff ff b8 01 01 00 00 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 89 44 24 0c e8 c8 f9 ff ff 8b 44 [ 2041.250959] RSP: 002b:00007f52e4f29ed0 EFLAGS: 00000293 ORIG_RAX: 0000000000000101 [ 2041.250973] RAX: ffffffffffffffda RBX: 00007f52e79fe970 RCX: 00007f52e7967a04 [ 2041.250982] RDX: 0000000000000002 RSI: 00007f52e4f2a000 RDI: 00000000ffffff9c [ 2041.250990] RBP: 00007f52e4f2a000 R08: 0000000000000000 R09: ffffffffffffffff [ 2041.250999] R10: 0000000000000000 R11: 0000000000000293 R12: 0000000000000002 [ 2041.251006] R13: 0000000000000004 R14: 0000000020000248 R15: 0000000000000003 [ 2041.251022] 04:07:20 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="1000000040000000030000002b00000005000000010000000000000000000000002000000020000010000000000000009f09c75f0000ffff53ef", 0x3a, 0x400}, {&(0x7f0000010100)="000000000000000000000000000000000000000000000000000000005178aedb03000000130000", 0x27, 0x7e0}, {&(0x7f0000010ce0)="00000000000000000000000000000000000000000000000000000000c99b0000ed410000000400009f09c75f9f09c75f9f09c75f00000000000003000200000000000800000000000af3010004", 0x4d, 0x8c60}], 0x0, &(0x7f0000010f60)) 04:07:20 executing program 6: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="1000000040000000030000002b00000005000000010000000000000000000000002000000020000010000000", 0x2c, 0x400}, {&(0x7f0000010100)="000000000000000000000000000000000000000000000000000000005178aedb030000001300000023", 0x29, 0x7e0}, {&(0x7f0000010ce0)="00000000000000000000000000000000000000000000000000000000c99b0000ed410000000400009f09c75f9f09c75f9f09c75f00000000000003000200000000000800000000000af301000400000000000000000000000100000004", 0x5d, 0x8c60}], 0x0, &(0x7f0000010f60)) getdents64(r0, &(0x7f0000000040)=""/4, 0x4) [ 2041.337737] EXT4-fs (loop5): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 2041.377244] loop5: detected capacity change from 0 to 534 04:07:20 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="1000000040000000030000002b00000005000000010000000000000000000000002000000020000010000000000000009f09c75f0000ffff53ef", 0x3a, 0x400}, {&(0x7f0000010080)="000000000000000000000000ede2de4df49d4f87b54a3176cfd4eb4f010040000c000000000000009f09c75f", 0x2c, 0x4e0}, {&(0x7f00000100c0)="01000000000000000000000000000000000000000401000012", 0x19, 0x560}, {&(0x7f0000010100)="000000000000000000000000000000000000000000000000000000005178ae", 0x1f, 0x7e0}, {&(0x7f0000010ce0)="00000000000000000000000000000000000000000000000000000000c99b0000ed410000000400009f09c75f9f09c75f9f09c75f00000000000003000200000000000800000000000af3010004", 0x4d, 0x8c60}], 0x0, &(0x7f0000010f60)) 04:07:20 executing program 7: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="1000000040000000030000002b00000005000000010000000000000000000000002000000020000010000000000000009f09c75f0000ffff53", 0x39, 0x400}, {&(0x7f0000010100)="000000000000000000000000000000000000000000000000000000005178aedb030000001300000023", 0x29, 0x7e0}, {&(0x7f0000010ce0)="00000000000000000000000000000000000000000000000000000000c99b0000ed410000000400009f09c75f9f09c75f9f09c75f00000000000003000200000000000800000000000af301000400000000000000000000000100000004", 0x5d, 0x8c60}], 0x0, &(0x7f0000010f60)) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) getdents64(r0, &(0x7f0000000040)=""/4, 0x4) 04:07:20 executing program 5: creat(&(0x7f00000003c0)='./file0\x00', 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext2\x00', &(0x7f0000000100)='./file0\x00', 0x42dde, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}], 0x0, &(0x7f0000013c00)=ANY=[]) 04:07:20 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="1000000040000000030000002b00000005000000010000000000000000000000002000000020000010000000000000009f09c75f0000ffff53ef", 0x3a, 0x400}, {&(0x7f0000010100)="000000000000000000000000000000000000000000000000000000005178aedb030000001300000023", 0x29, 0x7e0}, {&(0x7f0000010ce0)="00000000000000000000000000000000000000000000000000000000c99b0000ed410000000400009f09c75f9f09c75f9f09c75f00000000000003000200000000000800000000000af301000400000000000000000000000100000004", 0x5d, 0x8c60}], 0x0, &(0x7f0000010f60)) getdents64(0xffffffffffffffff, &(0x7f0000000040)=""/4, 0x4) 04:07:20 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="1000000040000000030000002b00000005000000010000000000000000000000002000000020000010000000000000009f09c75f0000ffff53ef", 0x3a, 0x400}, {&(0x7f0000010100)="000000000000000000000000000000000000000000000000000000005178aedb030000001300000023", 0x29, 0x7e0}, {&(0x7f0000010ce0)="00000000000000000000000000000000000000000000000000000000c99b0000ed410000000400009f09c75f9f09c75f9f09c75f00000000000003000200000000000800000000000af3010004000000000000000000000001", 0x59, 0x8c60}], 0x0, &(0x7f0000010f60)) (fail_nth: 25) [ 2041.440453] loop6: detected capacity change from 0 to 140 [ 2041.452013] EXT4-fs (loop6): VFS: Can't find ext4 filesystem [ 2041.463732] loop0: detected capacity change from 0 to 140 [ 2041.475587] EXT4-fs (loop0): ext4_check_descriptors: Inode table for group 0 not in group (block 0)! [ 2041.476450] EXT4-fs (loop0): group descriptors corrupted! [ 2041.488515] loop4: detected capacity change from 0 to 140 [ 2041.498135] loop1: detected capacity change from 0 to 140 [ 2041.499995] loop5: detected capacity change from 0 to 534 [ 2041.510540] EXT4-fs error (device loop1): ext4_ext_check_inode:523: inode #2: comm syz-executor.1: pblk 0 bad header/extent: invalid extent entries - magic f30a, entries 1, max 4(4), depth 0(0) [ 2041.513203] loop7: detected capacity change from 0 to 140 [ 2041.520806] EXT4-fs (loop1): get root inode failed [ 2041.521253] EXT4-fs (loop1): mount failed [ 2041.538583] EXT4-fs (loop4): ext4_check_descriptors: Block bitmap for group 0 not in group (block 0)! [ 2041.540244] EXT4-fs (loop4): group descriptors corrupted! 04:07:20 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="1000000040000000030000002b00000005000000010000000000000000000000002000000020000010000000000000009f09c75f0000ffff53ef", 0x3a, 0x400}, {&(0x7f0000010100)="000000000000000000000000000000000000000000000000000000005178aedb030000001300000023", 0x29, 0x7e0}, {&(0x7f0000010ce0)="00000000000000000000000000000000000000000000000000000000c99b0000ed410000000400009f09c75f9f09c75f9f09c75f00000000000003000200000000000800000000000af301000400000000000000000000000100000004", 0x5d, 0x8c60}], 0x0, &(0x7f0000010f60)) getdents64(0xffffffffffffffff, &(0x7f0000000040)=""/4, 0x4) [ 2041.550703] EXT4-fs (loop7): VFS: Can't find ext4 filesystem [ 2041.560731] EXT4-fs (loop5): mounting ext2 file system using the ext4 subsystem [ 2041.573323] EXT4-fs (loop5): warning: mounting unchecked fs, running e2fsck is recommended [ 2041.596826] loop3: detected capacity change from 0 to 140 [ 2041.622294] EXT4-fs (loop5): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: none. [ 2041.657283] EXT4-fs (loop5): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 2041.662862] EXT4-fs (loop3): warning: mounting unchecked fs, running e2fsck is recommended [ 2041.687290] loop5: detected capacity change from 0 to 534 [ 2041.689490] EXT4-fs (loop3): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: none. [ 2041.741292] EXT4-fs (loop3): unmounting filesystem 00000000-0000-0000-0000-000000000000. 04:07:29 executing program 2: sendmsg$NL80211_CMD_UNEXPECTED_FRAME(0xffffffffffffffff, &(0x7f0000000400)={0x0, 0x0, &(0x7f0000000300)={&(0x7f00000002c0)={0x1c, 0x0, 0x1, 0x0, 0x0, {{}, {@val={0x8}, @void}}}, 0x1c}}, 0x0) sendmsg$NL80211_CMD_UPDATE_FT_IES(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000001c0)={0x24, 0x0, 0x1, 0x70bd2c, 0x0, {{}, {@val={0x8}, @void}}, [@NL80211_ATTR_MDID={0x6, 0xb1, 0xc116}]}, 0x24}, 0x1, 0x0, 0x0, 0x80}, 0xc000) r0 = creat(&(0x7f00000003c0)='./file1\x00', 0x0) sendmsg$netlink(0xffffffffffffffff, 0x0, 0x0) dup(0xffffffffffffffff) pwritev2(r0, &(0x7f0000000380)=[{&(0x7f0000000180)="bd", 0xfffffdef}], 0x1, 0x1200, 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) ioctl$FS_IOC_FSSETXATTR(r1, 0xc020660b, &(0x7f0000000200)={0x9}) syz_io_uring_setup(0x0, &(0x7f0000000000)={0x0, 0x0, 0x4, 0x2, 0x309}, &(0x7f0000ffc000/0x2000)=nil, &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000000080), &(0x7f0000000240)) syz_io_uring_submit(0x0, 0x0, &(0x7f0000000280)=@IORING_OP_ASYNC_CANCEL={0xe, 0x0, 0x0, 0x0, 0x0, 0x12345}, 0x1ff) 04:07:29 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="1000000040000000030000002b00000005000000010000000000000000000000002000000020000010000000000000009f09c75f0000ffff53ef", 0x3a, 0x400}, {&(0x7f0000010100)="000000000000000000000000000000000000000000000000000000005178aedb030000001300000023", 0x29, 0x7e0}, {&(0x7f0000010ce0)="00000000000000000000000000000000000000000000000000000000c99b0000ed410000000400009f09c75f9f09c75f9f09c75f00000000000003000200000000000800000000000af301000400000000000000000000000100000004", 0x5d, 0x8c60}], 0x0, &(0x7f0000010f60)) getdents64(0xffffffffffffffff, &(0x7f0000000040)=""/4, 0x4) 04:07:29 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="1000000040000000030000002b00000005000000010000000000000000000000002000000020000010000000000000009f09c75f0000ffff53ef", 0x3a, 0x400}, {&(0x7f0000010080)="000000000000000000000000ede2de4df49d4f87b54a3176cfd4eb4f010040000c000000000000009f09c75f", 0x2c, 0x4e0}, {&(0x7f00000100c0)="01000000000000000000000000000000000000000401000012", 0x19, 0x560}, {&(0x7f0000010100)="000000000000000000000000000000000000000000000000000000005178ae", 0x1f, 0x7e0}, {&(0x7f0000010ce0)="00000000000000000000000000000000000000000000000000000000c99b0000ed410000000400009f09c75f9f09c75f9f09c75f00000000000003000200000000000800000000000af3010004", 0x4d, 0x8c60}], 0x0, &(0x7f0000010f60)) 04:07:29 executing program 6: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="1000000040000000030000002b00000005000000010000000000000000000000002000000020000010000000", 0x2c, 0x400}, {&(0x7f0000010100)="000000000000000000000000000000000000000000000000000000005178aedb030000001300000023", 0x29, 0x7e0}, {&(0x7f0000010ce0)="00000000000000000000000000000000000000000000000000000000c99b0000ed410000000400009f09c75f9f09c75f9f09c75f00000000000003000200000000000800000000000af301000400000000000000000000000100000004", 0x5d, 0x8c60}], 0x0, &(0x7f0000010f60)) getdents64(r0, &(0x7f0000000040)=""/4, 0x4) 04:07:29 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="1000000040000000030000002b00000005000000010000000000000000000000002000000020000010000000000000009f09c75f0000ffff53ef", 0x3a, 0x400}, {&(0x7f0000010100)="000000000000000000000000000000000000000000000000000000005178aedb030000001300000023", 0x29, 0x7e0}, {&(0x7f0000010ce0)="00000000000000000000000000000000000000000000000000000000c99b0000ed410000000400009f09c75f9f09c75f9f09c75f00000000000003000200000000000800000000000af3010004000000000000000000000001", 0x59, 0x8c60}], 0x0, &(0x7f0000010f60)) (fail_nth: 26) 04:07:29 executing program 7: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="1000000040000000030000002b00000005000000010000000000000000000000002000000020000010000000000000009f09c75f0000ffff53ef", 0x3a}, {&(0x7f0000010100)="000000000000000000000000000000000000000000000000000000005178aedb030000001300000023", 0x29, 0x7e0}, {&(0x7f0000010ce0)="00000000000000000000000000000000000000000000000000000000c99b0000ed410000000400009f09c75f9f09c75f9f09c75f00000000000003000200000000000800000000000af301000400000000000000000000000100000004", 0x5d, 0x8c60}], 0x0, &(0x7f0000010f60)) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) getdents64(r0, &(0x7f0000000040)=""/4, 0x4) 04:07:29 executing program 5: creat(&(0x7f00000003c0)='./file0\x00', 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext2\x00', &(0x7f0000000100)='./file0\x00', 0x42e00, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}], 0x0, &(0x7f0000013c00)=ANY=[]) 04:07:29 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="1000000040000000030000002b00000005000000010000000000000000000000002000000020000010000000000000009f09c75f0000ffff53ef", 0x3a, 0x400}, {&(0x7f0000010100)="000000000000000000000000000000000000000000000000000000005178aedb0300000013000000", 0x28, 0x7e0}, {&(0x7f0000010ce0)="00000000000000000000000000000000000000000000000000000000c99b0000ed410000000400009f09c75f9f09c75f9f09c75f00000000000003000200000000000800000000000af3010004", 0x4d, 0x8c60}], 0x0, &(0x7f0000010f60)) [ 2050.237539] loop6: detected capacity change from 0 to 140 [ 2050.238470] loop3: detected capacity change from 0 to 140 [ 2050.248731] EXT4-fs (loop6): VFS: Can't find ext4 filesystem [ 2050.263579] loop7: detected capacity change from 0 to 140 [ 2050.266689] EXT4-fs (loop3): warning: mounting unchecked fs, running e2fsck is recommended [ 2050.268801] loop4: detected capacity change from 0 to 140 [ 2050.274678] loop5: detected capacity change from 0 to 535 [ 2050.279129] EXT4-fs (loop7): VFS: Can't find ext4 filesystem [ 2050.282425] EXT4-fs (loop3): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: none. [ 2050.285644] EXT4-fs (loop4): ext4_check_descriptors: Block bitmap for group 0 not in group (block 0)! [ 2050.286160] FAULT_INJECTION: forcing a failure. [ 2050.286160] name failslab, interval 1, probability 0, space 0, times 0 [ 2050.286504] EXT4-fs (loop4): group descriptors corrupted! [ 2050.287977] CPU: 1 UID: 0 PID: 14518 Comm: syz-executor.1 Not tainted 6.18.0-rc5-next-20251111 #1 PREEMPT(voluntary) [ 2050.288008] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2050.288023] Call Trace: [ 2050.288031] [ 2050.288040] dump_stack_lvl+0xfa/0x120 [ 2050.288070] should_fail_ex+0x4d7/0x5e0 [ 2050.288096] ? security_file_alloc+0x35/0x130 [ 2050.288123] should_failslab+0xc2/0x120 [ 2050.288147] kmem_cache_alloc_noprof+0x80/0x690 [ 2050.288176] ? __create_object+0x59/0x80 [ 2050.288208] ? security_file_alloc+0x35/0x130 [ 2050.288232] security_file_alloc+0x35/0x130 [ 2050.288257] init_file+0x95/0x4c0 [ 2050.288284] alloc_empty_file+0x76/0x1e0 [ 2050.288313] path_openat+0xe0/0x2880 [ 2050.288341] ? __lock_acquire+0x694/0x1b70 [ 2050.288373] ? __pfx_path_openat+0x10/0x10 [ 2050.288402] do_filp_open+0x1e8/0x450 [ 2050.288422] ? __pfx_do_filp_open+0x10/0x10 [ 2050.288453] ? find_held_lock+0x2b/0x80 [ 2050.288476] ? alloc_fd+0x2c1/0x560 [ 2050.288507] ? lock_release+0xc8/0x290 [ 2050.288540] ? _raw_spin_unlock+0x1e/0x40 [ 2050.288569] ? alloc_fd+0x2c1/0x560 [ 2050.288608] do_sys_openat2+0x104/0x1b0 [ 2050.288635] ? __pfx_do_sys_openat2+0x10/0x10 [ 2050.288674] __x64_sys_openat+0x142/0x200 [ 2050.288702] ? __pfx___x64_sys_openat+0x10/0x10 [ 2050.288741] do_syscall_64+0xbf/0x430 [ 2050.288766] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 2050.288789] RIP: 0033:0x7f52e7967a04 [ 2050.288806] Code: 84 00 00 00 00 00 44 89 54 24 0c e8 96 f9 ff ff 44 8b 54 24 0c 44 89 e2 48 89 ee 41 89 c0 bf 9c ff ff ff b8 01 01 00 00 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 89 44 24 0c e8 c8 f9 ff ff 8b 44 [ 2050.288827] RSP: 002b:00007f52e4f29ed0 EFLAGS: 00000293 ORIG_RAX: 0000000000000101 [ 2050.288848] RAX: ffffffffffffffda RBX: 00007f52e79fe970 RCX: 00007f52e7967a04 [ 2050.288863] RDX: 0000000000000002 RSI: 00007f52e4f2a000 RDI: 00000000ffffff9c [ 2050.288877] RBP: 00007f52e4f2a000 R08: 0000000000000000 R09: ffffffffffffffff [ 2050.288891] R10: 0000000000000000 R11: 0000000000000293 R12: 0000000000000002 [ 2050.288905] R13: 0000000000000004 R14: 0000000020000248 R15: 0000000000000003 [ 2050.288941] [ 2050.312324] loop0: detected capacity change from 0 to 140 [ 2050.330820] EXT4-fs (loop5): mounting ext2 file system using the ext4 subsystem 04:07:29 executing program 6: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="1000000040000000030000002b00000005000000010000000000000000000000002000000020000010000000", 0x2c, 0x400}, {&(0x7f0000010100)="000000000000000000000000000000000000000000000000000000005178aedb030000001300000023", 0x29, 0x7e0}, {&(0x7f0000010ce0)="00000000000000000000000000000000000000000000000000000000c99b0000ed410000000400009f09c75f9f09c75f9f09c75f00000000000003000200000000000800000000000af301000400000000000000000000000100000004", 0x5d, 0x8c60}], 0x0, &(0x7f0000010f60)) getdents64(r0, &(0x7f0000000040)=""/4, 0x4) [ 2050.340599] EXT4-fs (loop0): ext4_check_descriptors: Inode table for group 0 not in group (block 0)! [ 2050.341464] EXT4-fs (loop0): group descriptors corrupted! 04:07:29 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="1000000040000000030000002b00000005000000010000000000000000000000002000000020000010000000000000009f09c75f0000ffff53ef", 0x3a, 0x400}, {&(0x7f0000010100)="000000000000000000000000000000000000000000000000000000005178aedb030000001300000023", 0x29, 0x7e0}, {&(0x7f0000010ce0)="00000000000000000000000000000000000000000000000000000000c99b0000ed410000000400009f09c75f9f09c75f9f09c75f00000000000003000200000000000800000000000af3010004000000000000000000000001", 0x59, 0x8c60}], 0x0, &(0x7f0000010f60)) (fail_nth: 27) [ 2050.372289] EXT4-fs (loop5): warning: mounting unchecked fs, running e2fsck is recommended [ 2050.396886] EXT4-fs (loop3): unmounting filesystem 00000000-0000-0000-0000-000000000000. 04:07:29 executing program 3: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="1000000040000000030000002b00000005000000010000000000000000000000002000000020000010000000000000009f09c75f0000ffff53ef", 0x3a, 0x400}, {&(0x7f0000010100)="000000000000000000000000000000000000000000000000000000005178aedb030000001300000023", 0x29, 0x7e0}, {&(0x7f0000010ce0)="00000000000000000000000000000000000000000000000000000000c99b0000ed410000000400009f09c75f9f09c75f9f09c75f00000000000003000200000000000800000000000af301000400000000000000000000000100000004", 0x5d, 0x8c60}], 0x0, &(0x7f0000010f60)) getdents64(r0, 0x0, 0x0) 04:07:29 executing program 7: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="1000000040000000030000002b00000005000000010000000000000000000000002000000020000010000000000000009f09c75f0000ffff53ef", 0x3a}, {&(0x7f0000010100)="000000000000000000000000000000000000000000000000000000005178aedb030000001300000023", 0x29, 0x7e0}, {&(0x7f0000010ce0)="00000000000000000000000000000000000000000000000000000000c99b0000ed410000000400009f09c75f9f09c75f9f09c75f00000000000003000200000000000800000000000af301000400000000000000000000000100000004", 0x5d, 0x8c60}], 0x0, &(0x7f0000010f60)) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) getdents64(r0, &(0x7f0000000040)=""/4, 0x4) 04:07:29 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="1000000040000000030000002b00000005000000010000000000000000000000002000000020000010000000000000009f09c75f0000ffff53ef", 0x3a, 0x400}, {&(0x7f0000010100)="000000000000000000000000000000000000000000000000000000005178aedb0300000013000000", 0x28, 0x7e0}, {&(0x7f0000010ce0)="00000000000000000000000000000000000000000000000000000000c99b0000ed410000000400009f09c75f9f09c75f9f09c75f00000000000003000200000000000800000000000af3010004", 0x4d, 0x8c60}], 0x0, &(0x7f0000010f60)) [ 2050.441065] EXT4-fs (loop5): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: none. [ 2050.458393] loop6: detected capacity change from 0 to 140 04:07:29 executing program 3: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="1000000040000000030000002b00000005000000010000000000000000000000002000000020000010000000000000009f09c75f0000ffff53ef", 0x3a, 0x400}, {&(0x7f0000010100)="000000000000000000000000000000000000000000000000000000005178aedb030000001300000023", 0x29, 0x7e0}, {&(0x7f0000010ce0)="00000000000000000000000000000000000000000000000000000000c99b0000ed410000000400009f09c75f9f09c75f9f09c75f00000000000003000200000000000800000000000af301000400000000000000000000000100000004", 0x5d, 0x8c60}], 0x0, &(0x7f0000010f60)) getdents64(r0, 0x0, 0x0) [ 2050.475999] EXT4-fs (loop5): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 2050.485382] loop0: detected capacity change from 0 to 140 [ 2050.491751] EXT4-fs (loop0): ext4_check_descriptors: Inode table for group 0 not in group (block 0)! [ 2050.491974] EXT4-fs (loop6): VFS: Can't find ext4 filesystem [ 2050.493130] EXT4-fs (loop0): group descriptors corrupted! [ 2050.543167] loop1: detected capacity change from 0 to 140 04:07:29 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="1000000040000000030000002b00000005000000010000000000000000000000002000000020000010000000000000009f09c75f0000ffff53ef", 0x3a, 0x400}, {&(0x7f0000010100)="000000000000000000000000000000000000000000000000000000005178aedb0300000013000000", 0x28, 0x7e0}, {&(0x7f0000010ce0)="00000000000000000000000000000000000000000000000000000000c99b0000ed410000000400009f09c75f9f09c75f9f09c75f00000000000003000200000000000800000000000af3010004", 0x4d, 0x8c60}], 0x0, &(0x7f0000010f60)) 04:07:29 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="1000000040000000030000002b00000005000000010000000000000000000000002000000020000010000000000000009f09c75f0000ffff53ef", 0x3a, 0x400}, {&(0x7f0000010080)="000000000000000000000000ede2de4df49d4f87b54a3176cfd4eb4f010040000c000000000000009f09c75f", 0x2c, 0x4e0}, {&(0x7f00000100c0)="01000000000000000000000000000000000000000401000012", 0x19, 0x560}, {&(0x7f0000010100)="000000000000000000000000000000000000000000000000000000005178aedb03000000", 0x24, 0x7e0}, {&(0x7f0000010ce0)="00000000000000000000000000000000000000000000000000000000c99b0000ed410000000400009f09c75f9f09c75f9f09c75f00000000000003000200000000000800000000000af3010004", 0x4d, 0x8c60}], 0x0, &(0x7f0000010f60)) [ 2050.557981] EXT4-fs error (device loop1): ext4_ext_check_inode:523: inode #2: comm syz-executor.1: pblk 0 bad header/extent: invalid extent entries - magic f30a, entries 1, max 4(4), depth 0(0) [ 2050.562008] EXT4-fs (loop1): get root inode failed [ 2050.562527] EXT4-fs (loop1): mount failed [ 2050.604711] loop7: detected capacity change from 0 to 140 [ 2050.613062] loop0: detected capacity change from 0 to 140 [ 2050.618805] EXT4-fs (loop7): VFS: Can't find ext4 filesystem [ 2050.622428] EXT4-fs (loop0): ext4_check_descriptors: Inode table for group 0 not in group (block 0)! [ 2050.623580] EXT4-fs (loop0): group descriptors corrupted! [ 2050.663432] loop4: detected capacity change from 0 to 140 [ 2050.684257] EXT4-fs (loop4): ext4_check_descriptors: Inode bitmap for group 0 not in group (block 0)! [ 2050.685262] EXT4-fs (loop4): group descriptors corrupted! 04:07:39 executing program 5: creat(&(0x7f00000003c0)='./file0\x00', 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext2\x00', &(0x7f0000000100)='./file0\x00', 0x42ede, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}], 0x0, &(0x7f0000013c00)=ANY=[]) 04:07:39 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="1000000040000000030000002b00000005000000010000000000000000000000002000000020000010000000000000009f09c75f0000ffff53ef", 0x3a, 0x400}, {&(0x7f0000010100)="000000000000000000000000000000000000000000000000000000005178aedb030000001300000023", 0x29, 0x7e0}, {&(0x7f0000010ce0)="00000000000000000000000000000000000000000000000000000000c99b0000ed410000000400009f09c75f9f09c75f9f09c75f00000000000003000200000000000800000000000af3010004000000000000000000000001", 0x59, 0x8c60}], 0x0, &(0x7f0000010f60)) (fail_nth: 28) 04:07:39 executing program 2: sendmsg$NL80211_CMD_UNEXPECTED_FRAME(0xffffffffffffffff, &(0x7f0000000400)={0x0, 0x0, &(0x7f0000000300)={&(0x7f00000002c0)={0x1c, 0x0, 0x1, 0x0, 0x0, {{}, {@val={0x8}, @void}}}, 0x1c}}, 0x0) sendmsg$NL80211_CMD_UPDATE_FT_IES(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000001c0)={0x24, 0x0, 0x1, 0x70bd2c, 0x0, {{}, {@val={0x8}, @void}}, [@NL80211_ATTR_MDID={0x6, 0xb1, 0xc116}]}, 0x24}, 0x1, 0x0, 0x0, 0x80}, 0xc000) r0 = creat(&(0x7f00000003c0)='./file1\x00', 0x0) sendmsg$netlink(0xffffffffffffffff, 0x0, 0x0) dup(0xffffffffffffffff) pwritev2(r0, &(0x7f0000000380)=[{&(0x7f0000000180)="bd", 0xfffffdef}], 0x1, 0x1200, 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) ioctl$FS_IOC_FSSETXATTR(r1, 0x401c5820, &(0x7f0000000200)={0x8}) syz_io_uring_setup(0x0, &(0x7f0000000000)={0x0, 0x0, 0x4, 0x2, 0x309}, &(0x7f0000ffc000/0x2000)=nil, &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000000080), &(0x7f0000000240)) syz_io_uring_submit(0x0, 0x0, &(0x7f0000000280)=@IORING_OP_ASYNC_CANCEL={0xe, 0x0, 0x0, 0x0, 0x0, 0x12345}, 0x1ff) 04:07:39 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="1000000040000000030000002b00000005000000010000000000000000000000002000000020000010000000000000009f09c75f0000ffff53ef", 0x3a, 0x400}, {&(0x7f0000010080)="000000000000000000000000ede2de4df49d4f87b54a3176cfd4eb4f010040000c000000000000009f09c75f", 0x2c, 0x4e0}, {&(0x7f00000100c0)="01000000000000000000000000000000000000000401000012", 0x19, 0x560}, {&(0x7f0000010100)="000000000000000000000000000000000000000000000000000000005178aedb03000000", 0x24, 0x7e0}, {&(0x7f0000010ce0)="00000000000000000000000000000000000000000000000000000000c99b0000ed410000000400009f09c75f9f09c75f9f09c75f00000000000003000200000000000800000000000af3010004", 0x4d, 0x8c60}], 0x0, &(0x7f0000010f60)) 04:07:39 executing program 6: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="1000000040000000030000002b00000005000000010000000000000000000000002000000020000010000000000000009f09c7", 0x33, 0x400}, {&(0x7f0000010100)="000000000000000000000000000000000000000000000000000000005178aedb030000001300000023", 0x29, 0x7e0}, {&(0x7f0000010ce0)="00000000000000000000000000000000000000000000000000000000c99b0000ed410000000400009f09c75f9f09c75f9f09c75f00000000000003000200000000000800000000000af301000400000000000000000000000100000004", 0x5d, 0x8c60}], 0x0, &(0x7f0000010f60)) getdents64(r0, &(0x7f0000000040)=""/4, 0x4) 04:07:39 executing program 3: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="1000000040000000030000002b00000005000000010000000000000000000000002000000020000010000000000000009f09c75f0000ffff53ef", 0x3a, 0x400}, {&(0x7f0000010100)="000000000000000000000000000000000000000000000000000000005178aedb030000001300000023", 0x29, 0x7e0}, {&(0x7f0000010ce0)="00000000000000000000000000000000000000000000000000000000c99b0000ed410000000400009f09c75f9f09c75f9f09c75f00000000000003000200000000000800000000000af301000400000000000000000000000100000004", 0x5d, 0x8c60}], 0x0, &(0x7f0000010f60)) getdents64(r0, 0x0, 0x0) 04:07:39 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="1000000040000000030000002b00000005000000010000000000000000000000002000000020000010000000000000009f09c75f0000ffff53ef", 0x3a, 0x400}, {&(0x7f0000010100)="000000000000000000000000000000000000000000000000000000005178aedb030000001300000023", 0x29}, {&(0x7f0000010ce0)="00000000000000000000000000000000000000000000000000000000c99b0000ed410000000400009f09c75f9f09c75f9f09c75f00000000000003000200000000000800000000000af3010004", 0x4d, 0x8c60}], 0x0, &(0x7f0000010f60)) 04:07:39 executing program 7: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="1000000040000000030000002b00000005000000010000000000000000000000002000000020000010000000000000009f09c75f0000ffff53ef", 0x3a}, {&(0x7f0000010100)="000000000000000000000000000000000000000000000000000000005178aedb030000001300000023", 0x29, 0x7e0}, {&(0x7f0000010ce0)="00000000000000000000000000000000000000000000000000000000c99b0000ed410000000400009f09c75f9f09c75f9f09c75f00000000000003000200000000000800000000000af301000400000000000000000000000100000004", 0x5d, 0x8c60}], 0x0, &(0x7f0000010f60)) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) getdents64(r0, &(0x7f0000000040)=""/4, 0x4) [ 2061.008657] loop7: detected capacity change from 0 to 140 [ 2061.013497] EXT4-fs (loop7): VFS: Can't find ext4 filesystem 04:07:39 executing program 7: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="1000000040000000030000002b00000005000000010000000000000000000000002000000020000010000000000000009f09c75f0000ffff53ef", 0x3a, 0x400}, {&(0x7f0000010100)="000000000000000000000000000000000000000000000000000000005178aedb030000001300000023", 0x29, 0x7e0}, {&(0x7f0000010ce0)="00000000000000000000000000000000000000000000000000000000c99b0000ed410000000400009f09c75f9f09c75f9f09c75f00000000000003000200000000000800000000000af301000400000000000000000000000100000004", 0x5d, 0x8c60}], 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) getdents64(r0, &(0x7f0000000040)=""/4, 0x4) [ 2061.049408] loop3: detected capacity change from 0 to 140 [ 2061.054437] loop5: detected capacity change from 0 to 535 [ 2061.055600] loop6: detected capacity change from 0 to 140 [ 2061.065074] EXT4-fs (loop5): mounting ext2 file system using the ext4 subsystem [ 2061.068291] EXT4-fs (loop3): warning: mounting unchecked fs, running e2fsck is recommended [ 2061.072457] FAULT_INJECTION: forcing a failure. [ 2061.072457] name failslab, interval 1, probability 0, space 0, times 0 [ 2061.073373] CPU: 1 UID: 0 PID: 14563 Comm: syz-executor.1 Not tainted 6.18.0-rc5-next-20251111 #1 PREEMPT(voluntary) [ 2061.073390] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2061.073398] Call Trace: [ 2061.073403] [ 2061.073408] dump_stack_lvl+0xfa/0x120 [ 2061.073427] should_fail_ex+0x4d7/0x5e0 [ 2061.073444] ? __kernfs_new_node+0xd3/0x870 [ 2061.073464] should_failslab+0xc2/0x120 [ 2061.073479] kmem_cache_alloc_noprof+0x80/0x690 [ 2061.073497] ? __pfx_avc_has_perm+0x10/0x10 [ 2061.073516] ? __kernfs_new_node+0xd3/0x870 [ 2061.073529] __kernfs_new_node+0xd3/0x870 [ 2061.073546] ? __pfx___kernfs_new_node+0x10/0x10 [ 2061.073563] ? lock_acquire+0x15e/0x2f0 [ 2061.073581] ? kernfs_root+0x23/0x2a0 [ 2061.073595] ? find_held_lock+0x2b/0x80 [ 2061.073609] ? kernfs_root+0xee/0x2a0 [ 2061.073622] ? lock_release+0xc8/0x290 [ 2061.073638] ? lock_is_held_type+0x9e/0x120 [ 2061.073661] kernfs_new_node+0x13c/0x1e0 [ 2061.073680] kernfs_create_dir_ns+0x4d/0x1a0 [ 2061.073699] internal_create_group+0xa7f/0xeb0 [ 2061.073715] ? __pfx___mutex_unlock_slowpath+0x10/0x10 [ 2061.073738] ? __pfx_internal_create_group+0x10/0x10 [ 2061.073753] ? blk_validate_limits+0xc27/0x15c0 [ 2061.073771] ? lock_is_held_type+0x9e/0x120 [ 2061.073791] loop_configure+0xc46/0x15a0 [ 2061.073824] ? __pfx_loop_configure+0x10/0x10 [ 2061.073851] ? avc_has_extended_perms+0x107/0xf20 [ 2061.073866] ? find_held_lock+0x2b/0x80 [ 2061.073878] ? avc_has_extended_perms+0x23b/0xf20 [ 2061.073893] ? lock_release+0xc8/0x290 [ 2061.073915] lo_ioctl+0x66d/0x1ca0 [ 2061.073929] ? __pfx_lo_ioctl+0x10/0x10 [ 2061.073939] ? __pfx_avc_has_extended_perms+0x10/0x10 [ 2061.073958] ? lock_acquire+0x15e/0x2f0 [ 2061.073974] ? __virt_addr_valid+0x1c6/0x5d0 [ 2061.073989] ? __pfx_perf_trace_preemptirq_template+0x10/0x10 [ 2061.074010] ? __pfx_perf_trace_preemptirq_template+0x10/0x10 [ 2061.074028] ? __pfx_perf_trace_preemptirq_template+0x10/0x10 [ 2061.074046] ? lock_release+0xc8/0x290 [ 2061.074064] ? __sanitizer_cov_trace_switch+0x54/0x90 [ 2061.074093] ? lockdep_softirqs_off+0x110/0x110 [ 2061.074110] ? __fget_files+0x34/0x3b0 [ 2061.074129] ? find_held_lock+0x2b/0x80 [ 2061.074142] ? __fget_files+0x203/0x3b0 [ 2061.074160] ? __pfx_lo_ioctl+0x10/0x10 [ 2061.074171] blkdev_ioctl+0x365/0x6d0 [ 2061.074188] ? __pfx_blkdev_ioctl+0x10/0x10 [ 2061.074204] ? selinux_file_ioctl+0xb9/0x280 [ 2061.074224] ? __pfx_blkdev_ioctl+0x10/0x10 [ 2061.074241] __x64_sys_ioctl+0x18f/0x210 [ 2061.074259] do_syscall_64+0xbf/0x430 [ 2061.074273] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 2061.074286] RIP: 0033:0x7f52e79b48d7 [ 2061.074296] Code: 3c 1c 48 f7 d8 49 39 c4 72 b8 e8 a4 54 02 00 85 c0 78 bd 48 83 c4 08 4c 89 e0 5b 41 5c c3 0f 1f 44 00 00 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2061.074308] RSP: 002b:00007f52e4f29f48 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 2061.074320] RAX: ffffffffffffffda RBX: 00007f52e79fe970 RCX: 00007f52e79b48d7 [ 2061.074328] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 2061.074336] RBP: 0000000000000005 R08: 0000000000000000 R09: ffffffffffffffff [ 2061.074344] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000004 [ 2061.074351] R13: 0000000000000004 R14: 0000000020000248 R15: 0000000000000003 [ 2061.074367] [ 2061.081429] EXT4-fs (loop6): VFS: Can't find ext4 filesystem [ 2061.081865] loop1: detected capacity change from 0 to 140 [ 2061.091201] loop4: detected capacity change from 0 to 140 [ 2061.093152] EXT4-fs (loop5): warning: mounting unchecked fs, running e2fsck is recommended [ 2061.105650] loop0: detected capacity change from 0 to 140 [ 2061.105881] loop7: detected capacity change from 0 to 140 [ 2061.109391] EXT4-fs (loop3): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: none. [ 2061.116236] EXT4-fs (loop4): ext4_check_descriptors: Inode bitmap for group 0 not in group (block 0)! [ 2061.116325] EXT4-fs (loop0): ext4_check_descriptors: Block bitmap for group 0 not in group (block 0)! [ 2061.117785] EXT4-fs (loop4): group descriptors corrupted! [ 2061.118502] EXT4-fs (loop0): group descriptors corrupted! [ 2061.120025] EXT4-fs error (device loop1): ext4_ext_check_inode:523: inode #2: comm syz-executor.1: pblk 0 bad header/extent: invalid extent entries - magic f30a, entries 1, max 4(4), depth 0(0) [ 2061.125733] EXT4-fs (loop1): get root inode failed [ 2061.126204] EXT4-fs (loop1): mount failed [ 2061.129588] EXT4-fs error (device loop3): ext4_readdir:262: inode #2: block 4: comm syz-executor.3: path /syzkaller-testdir621642535/syzkaller.Ms8KeX/411/mnt: bad entry in directory: rec_len is smaller than minimal - offset=0, inode=0, rec_len=0, size=1024 fake=0 [ 2061.142728] EXT4-fs (loop5): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: none. [ 2061.159633] EXT4-fs (loop5): unmounting filesystem 00000000-0000-0000-0000-000000000000. 04:07:40 executing program 6: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="1000000040000000030000002b00000005000000010000000000000000000000002000000020000010000000000000009f09c7", 0x33, 0x400}, {&(0x7f0000010100)="000000000000000000000000000000000000000000000000000000005178aedb030000001300000023", 0x29, 0x7e0}, {&(0x7f0000010ce0)="00000000000000000000000000000000000000000000000000000000c99b0000ed410000000400009f09c75f9f09c75f9f09c75f00000000000003000200000000000800000000000af301000400000000000000000000000100000004", 0x5d, 0x8c60}], 0x0, &(0x7f0000010f60)) getdents64(r0, &(0x7f0000000040)=""/4, 0x4) [ 2061.216249] EXT4-fs (loop3): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 2061.248574] loop6: detected capacity change from 0 to 140 [ 2061.253586] EXT4-fs (loop6): VFS: Can't find ext4 filesystem 04:07:48 executing program 2: sendmsg$NL80211_CMD_UNEXPECTED_FRAME(0xffffffffffffffff, &(0x7f0000000400)={0x0, 0x0, &(0x7f0000000300)={&(0x7f00000002c0)={0x1c, 0x0, 0x1, 0x0, 0x0, {{}, {@val={0x8}, @void}}}, 0x1c}}, 0x0) sendmsg$NL80211_CMD_UPDATE_FT_IES(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000001c0)={0x24, 0x0, 0x1, 0x70bd2c, 0x0, {{}, {@val={0x8}, @void}}, [@NL80211_ATTR_MDID={0x6, 0xb1, 0xc116}]}, 0x24}, 0x1, 0x0, 0x0, 0x80}, 0xc000) r0 = creat(&(0x7f00000003c0)='./file1\x00', 0x0) sendmsg$netlink(0xffffffffffffffff, 0x0, 0x0) dup(0xffffffffffffffff) pwritev2(r0, &(0x7f0000000380)=[{&(0x7f0000000180)="bd", 0xfffffdef}], 0x1, 0x1200, 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) ioctl$FS_IOC_FSSETXATTR(r1, 0x401c5820, &(0x7f0000000200)={0xa}) syz_io_uring_setup(0x0, &(0x7f0000000000)={0x0, 0x0, 0x4, 0x2, 0x309}, &(0x7f0000ffc000/0x2000)=nil, &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000000080), &(0x7f0000000240)) syz_io_uring_submit(0x0, 0x0, &(0x7f0000000280)=@IORING_OP_ASYNC_CANCEL={0xe, 0x0, 0x0, 0x0, 0x0, 0x12345}, 0x1ff) 04:07:48 executing program 3: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000), 0x0, 0x400}, {&(0x7f0000010100)="000000000000000000000000000000000000000000000000000000005178aedb030000001300000023", 0x29, 0x7e0}, {&(0x7f0000010ce0)="00000000000000000000000000000000000000000000000000000000c99b0000ed410000000400009f09c75f9f09c75f9f09c75f00000000000003000200000000000800000000000af301000400000000000000000000000100000004", 0x5d, 0x8c60}], 0x0, &(0x7f0000010f60)) getdents64(r0, &(0x7f0000000040)=""/4, 0x4) 04:07:48 executing program 7: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="1000000040000000030000002b00000005000000010000000000000000000000002000000020000010000000000000009f09c75f0000ffff53ef", 0x3a, 0x400}, {&(0x7f0000010100)="000000000000000000000000000000000000000000000000000000005178aedb030000001300000023", 0x29, 0x7e0}, {&(0x7f0000010ce0)="00000000000000000000000000000000000000000000000000000000c99b0000ed410000000400009f09c75f9f09c75f9f09c75f00000000000003000200000000000800000000000af301000400000000000000000000000100000004", 0x5d, 0x8c60}], 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) getdents64(r0, &(0x7f0000000040)=""/4, 0x4) 04:07:48 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="1000000040000000030000002b00000005000000010000000000000000000000002000000020000010000000000000009f09c75f0000ffff53ef", 0x3a, 0x400}, {&(0x7f0000010100)="000000000000000000000000000000000000000000000000000000005178aedb030000001300000023", 0x29}, {&(0x7f0000010ce0)="00000000000000000000000000000000000000000000000000000000c99b0000ed410000000400009f09c75f9f09c75f9f09c75f00000000000003000200000000000800000000000af3010004", 0x4d, 0x8c60}], 0x0, &(0x7f0000010f60)) 04:07:48 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="1000000040000000030000002b00000005000000010000000000000000000000002000000020000010000000000000009f09c75f0000ffff53ef", 0x3a, 0x400}, {&(0x7f0000010080)="000000000000000000000000ede2de4df49d4f87b54a3176cfd4eb4f010040000c000000000000009f09c75f", 0x2c, 0x4e0}, {&(0x7f00000100c0)="01000000000000000000000000000000000000000401000012", 0x19, 0x560}, {&(0x7f0000010100)="000000000000000000000000000000000000000000000000000000005178aedb03000000", 0x24, 0x7e0}, {&(0x7f0000010ce0)="00000000000000000000000000000000000000000000000000000000c99b0000ed410000000400009f09c75f9f09c75f9f09c75f00000000000003000200000000000800000000000af3010004", 0x4d, 0x8c60}], 0x0, &(0x7f0000010f60)) 04:07:48 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="1000000040000000030000002b00000005000000010000000000000000000000002000000020000010000000000000009f09c75f0000ffff53ef", 0x3a, 0x400}, {&(0x7f0000010100)="000000000000000000000000000000000000000000000000000000005178aedb030000001300000023", 0x29, 0x7e0}, {&(0x7f0000010ce0)="00000000000000000000000000000000000000000000000000000000c99b0000ed410000000400009f09c75f9f09c75f9f09c75f00000000000003000200000000000800000000000af3010004000000000000000000000001", 0x59, 0x8c60}], 0x0, &(0x7f0000010f60)) (fail_nth: 29) 04:07:48 executing program 5: creat(&(0x7f00000003c0)='./file0\x00', 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext2\x00', &(0x7f0000000100)='./file0\x00', 0x42fde, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}], 0x0, &(0x7f0000013c00)=ANY=[]) 04:07:48 executing program 6: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="1000000040000000030000002b00000005000000010000000000000000000000002000000020000010000000000000009f09c7", 0x33, 0x400}, {&(0x7f0000010100)="000000000000000000000000000000000000000000000000000000005178aedb030000001300000023", 0x29, 0x7e0}, {&(0x7f0000010ce0)="00000000000000000000000000000000000000000000000000000000c99b0000ed410000000400009f09c75f9f09c75f9f09c75f00000000000003000200000000000800000000000af301000400000000000000000000000100000004", 0x5d, 0x8c60}], 0x0, &(0x7f0000010f60)) getdents64(r0, &(0x7f0000000040)=""/4, 0x4) [ 2069.832478] loop3: detected capacity change from 0 to 140 [ 2069.834853] loop7: detected capacity change from 0 to 140 [ 2069.836655] loop1: detected capacity change from 0 to 140 [ 2069.843442] loop6: detected capacity change from 0 to 140 [ 2069.846311] loop5: detected capacity change from 0 to 535 [ 2069.851330] loop0: detected capacity change from 0 to 140 [ 2069.851360] EXT4-fs error (device loop1): ext4_ext_check_inode:523: inode #2: comm syz-executor.1: pblk 0 bad header/extent: invalid extent entries - magic f30a, entries 1, max 4(4), depth 0(0) [ 2069.856184] EXT4-fs (loop1): get root inode failed [ 2069.856591] EXT4-fs (loop1): mount failed [ 2069.873693] loop4: detected capacity change from 0 to 140 [ 2069.879025] EXT4-fs (loop5): mounting ext2 file system using the ext4 subsystem [ 2069.883820] EXT4-fs (loop3): VFS: Can't find ext4 filesystem [ 2069.883944] EXT4-fs (loop4): ext4_check_descriptors: Inode bitmap for group 0 not in group (block 0)! [ 2069.885508] EXT4-fs (loop4): group descriptors corrupted! [ 2069.886570] EXT4-fs (loop6): VFS: Can't find ext4 filesystem 04:07:48 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="1000000040000000030000002b00000005000000010000000000000000000000002000000020000010000000000000009f09c75f0000ffff53ef", 0x3a, 0x400}, {&(0x7f0000010100)="000000000000000000000000000000000000000000000000000000005178aedb030000001300000023", 0x29, 0x7e0}, {&(0x7f0000010ce0)="00000000000000000000000000000000000000000000000000000000c99b0000ed410000000400009f09c75f9f09c75f9f09c75f00000000000003000200000000000800000000000af3010004000000000000000000000001", 0x59, 0x8c60}], 0x0, &(0x7f0000010f60)) (fail_nth: 30) [ 2069.907473] EXT4-fs (loop5): warning: mounting unchecked fs, running e2fsck is recommended [ 2069.918480] EXT4-fs (loop0): ext4_check_descriptors: Block bitmap for group 0 not in group (block 0)! [ 2069.920353] EXT4-fs (loop0): group descriptors corrupted! 04:07:48 executing program 7: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="1000000040000000030000002b00000005000000010000000000000000000000002000000020000010000000000000009f09c75f0000ffff53ef", 0x3a, 0x400}, {&(0x7f0000010100)="000000000000000000000000000000000000000000000000000000005178aedb030000001300000023", 0x29, 0x7e0}, {&(0x7f0000010ce0)="00000000000000000000000000000000000000000000000000000000c99b0000ed410000000400009f09c75f9f09c75f9f09c75f00000000000003000200000000000800000000000af301000400000000000000000000000100000004", 0x5d, 0x8c60}], 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) getdents64(r0, &(0x7f0000000040)=""/4, 0x4) [ 2069.956787] EXT4-fs (loop5): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: none. [ 2070.005743] EXT4-fs (loop5): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 2070.100899] loop1: detected capacity change from 0 to 140 [ 2070.167022] EXT4-fs error (device loop1): ext4_ext_check_inode:523: inode #2: comm syz-executor.1: pblk 0 bad header/extent: invalid extent entries - magic f30a, entries 1, max 4(4), depth 0(0) [ 2070.171744] loop6: detected capacity change from 0 to 140 04:07:49 executing program 3: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="1000000040000000030000002b00000005000000010000000000000000000000002000000020000010000000000000009f09c75f0000ffff53ef", 0x3a, 0x400}, {&(0x7f0000010100)="000000000000000000000000000000000000000000000000000000005178aedb030000001300000023", 0x29, 0x7e0}, {&(0x7f0000010ce0)="00000000000000000000000000000000000000000000000000000000c99b0000ed410000000400009f09c75f9f09c75f9f09c75f00000000000003000200000000000800000000000af301000400000000000000000000000100000004", 0x5d, 0x8c60}], 0x0, &(0x7f0000010f60)) getdents64(r0, 0x0, 0x0) (fail_nth: 1) 04:07:49 executing program 6: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="1000000040000000030000002b00000005000000010000000000000000000000002000000020000010000000000000009f09c75f0000ff", 0x37, 0x400}, {&(0x7f0000010100)="000000000000000000000000000000000000000000000000000000005178aedb030000001300000023", 0x29, 0x7e0}, {&(0x7f0000010ce0)="00000000000000000000000000000000000000000000000000000000c99b0000ed410000000400009f09c75f9f09c75f9f09c75f00000000000003000200000000000800000000000af301000400000000000000000000000100000004", 0x5d, 0x8c60}], 0x0, &(0x7f0000010f60)) getdents64(r0, &(0x7f0000000040)=""/4, 0x4) 04:07:49 executing program 7: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="1000000040000000030000002b00000005000000010000000000000000000000002000000020000010000000000000009f09c75f0000ffff53ef", 0x3a, 0x400}, {&(0x7f0000010100)="000000000000000000000000000000000000000000000000000000005178aedb030000001300000023", 0x29, 0x7e0}, {&(0x7f0000010ce0)="00000000000000000000000000000000000000000000000000000000c99b0000ed410000000400009f09c75f9f09c75f9f09c75f00000000000003000200000000000800000000000af301000400000000000000000000000100000004", 0x5d, 0x8c60}], 0x0, &(0x7f0000010f60)) mkdirat(0xffffffffffffff9c, 0x0, 0x0) getdents64(r0, &(0x7f0000000040)=""/4, 0x4) [ 2070.201426] loop3: detected capacity change from 0 to 140 [ 2070.207069] EXT4-fs (loop1): get root inode failed [ 2070.207890] EXT4-fs (loop1): mount failed [ 2070.213029] EXT4-fs (loop6): VFS: Can't find ext4 filesystem 04:07:49 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="1000000040000000030000002b00000005000000010000000000000000000000002000000020000010000000000000009f09c75f0000ffff53ef", 0x3a, 0x400}, {&(0x7f0000010080)="000000000000000000000000ede2de4df49d4f87b54a3176cfd4eb4f010040000c000000000000009f09c75f", 0x2c, 0x4e0}, {&(0x7f00000100c0)="01000000000000000000000000000000000000000401000012", 0x19, 0x560}, {&(0x7f0000010100)="000000000000000000000000000000000000000000000000000000005178aedb03000000130000", 0x27, 0x7e0}, {&(0x7f0000010ce0)="00000000000000000000000000000000000000000000000000000000c99b0000ed410000000400009f09c75f9f09c75f9f09c75f00000000000003000200000000000800000000000af3010004", 0x4d, 0x8c60}], 0x0, &(0x7f0000010f60)) 04:07:49 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="1000000040000000030000002b00000005000000010000000000000000000000002000000020000010000000000000009f09c75f0000ffff53ef", 0x3a, 0x400}, {&(0x7f0000010100)="000000000000000000000000000000000000000000000000000000005178aedb030000001300000023", 0x29}, {&(0x7f0000010ce0)="00000000000000000000000000000000000000000000000000000000c99b0000ed410000000400009f09c75f9f09c75f9f09c75f00000000000003000200000000000800000000000af3010004", 0x4d, 0x8c60}], 0x0, &(0x7f0000010f60)) [ 2070.234011] EXT4-fs (loop3): warning: mounting unchecked fs, running e2fsck is recommended [ 2070.257186] EXT4-fs (loop3): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: none. [ 2070.271310] FAULT_INJECTION: forcing a failure. [ 2070.271310] name failslab, interval 1, probability 0, space 0, times 0 [ 2070.272536] CPU: 1 UID: 0 PID: 14617 Comm: syz-executor.3 Not tainted 6.18.0-rc5-next-20251111 #1 PREEMPT(voluntary) [ 2070.272574] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2070.272591] Call Trace: [ 2070.272600] [ 2070.272611] dump_stack_lvl+0xfa/0x120 [ 2070.272643] should_fail_ex+0x4d7/0x5e0 [ 2070.272674] should_failslab+0xc2/0x120 [ 2070.272705] __kmalloc_noprof+0xcd/0x680 [ 2070.272742] ? __lock_acquire+0xc65/0x1b70 [ 2070.272783] ? ext4_find_extent+0x7f5/0xa00 [ 2070.272828] ext4_find_extent+0x7f5/0xa00 [ 2070.272867] ? __lock_acquire+0x694/0x1b70 [ 2070.272915] ext4_ext_map_blocks+0x1cc/0x5f30 [ 2070.272961] ? __d_add+0x469/0xb20 [ 2070.273004] ? __lock_acquire+0x694/0x1b70 [ 2070.273050] ? __lock_acquire+0x694/0x1b70 [ 2070.273095] ? __pfx_ext4_ext_map_blocks+0x10/0x10 [ 2070.273145] ? look_up_lock_class+0x66/0x150 [ 2070.273193] ? register_lock_class+0x41/0x560 [ 2070.273240] ? __lock_acquire+0xc65/0x1b70 [ 2070.273281] ? __lock_acquire+0xc61/0x1b70 [ 2070.273331] ? lock_acquire+0x15e/0x2f0 [ 2070.273363] ? ext4_map_blocks+0x4a8/0x1510 [ 2070.273379] ext4_map_query_blocks+0x110/0x900 [ 2070.273400] ? __pfx_ext4_map_query_blocks+0x10/0x10 [ 2070.273418] ? do_raw_read_unlock+0x44/0xe0 [ 2070.273431] ? __pfx_down_read+0x10/0x10 [ 2070.273444] ? ext4_es_lookup_extent+0xcd/0xbb0 [ 2070.273461] ext4_map_blocks+0x4bc/0x1510 [ 2070.273475] ? __might_fault+0xe0/0x190 [ 2070.273494] ? find_held_lock+0x2b/0x80 [ 2070.273510] ? __pfx_ext4_map_blocks+0x10/0x10 [ 2070.273522] ? register_lock_class+0x41/0x560 [ 2070.273544] ? lock_is_held_type+0x9e/0x120 [ 2070.273569] ext4_readdir+0x884/0x2960 [ 2070.273590] ? lock_acquire+0x15e/0x2f0 [ 2070.273607] ? iterate_dir+0xdf/0x5f0 [ 2070.273624] ? __pfx_ext4_readdir+0x10/0x10 [ 2070.273643] ? down_read_killable+0x1d4/0x4f0 [ 2070.273657] ? __pfx_down_read_killable+0x10/0x10 [ 2070.273670] ? avc_policy_seqno+0x9/0x20 [ 2070.273687] ? selinux_file_permission+0x99/0x600 [ 2070.273705] iterate_dir+0x1e8/0x5f0 [ 2070.273723] __x64_sys_getdents64+0x13d/0x2c0 [ 2070.273742] ? __pfx___x64_sys_getdents64+0x10/0x10 [ 2070.273759] ? __pfx_perf_trace_preemptirq_template+0x10/0x10 [ 2070.273782] ? __pfx_filldir64+0x10/0x10 [ 2070.273805] do_syscall_64+0xbf/0x430 [ 2070.273821] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 2070.273835] RIP: 0033:0x7fdb8a185b19 [ 2070.273845] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2070.273858] RSP: 002b:00007fdb876fb188 EFLAGS: 00000246 ORIG_RAX: 00000000000000d9 [ 2070.273872] RAX: ffffffffffffffda RBX: 00007fdb8a298f60 RCX: 00007fdb8a185b19 [ 2070.273881] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000005 [ 2070.273889] RBP: 00007fdb876fb1d0 R08: 0000000000000000 R09: 0000000000000000 [ 2070.273897] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 2070.273905] R13: 00007fff36efcdbf R14: 00007fdb876fb300 R15: 0000000000022000 [ 2070.273922] 04:07:49 executing program 6: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="1000000040000000030000002b00000005000000010000000000000000000000002000000020000010000000000000009f09c75f0000ff", 0x37, 0x400}, {&(0x7f0000010100)="000000000000000000000000000000000000000000000000000000005178aedb030000001300000023", 0x29, 0x7e0}, {&(0x7f0000010ce0)="00000000000000000000000000000000000000000000000000000000c99b0000ed410000000400009f09c75f9f09c75f9f09c75f00000000000003000200000000000800000000000af301000400000000000000000000000100000004", 0x5d, 0x8c60}], 0x0, &(0x7f0000010f60)) getdents64(r0, &(0x7f0000000040)=""/4, 0x4) [ 2070.307885] loop4: detected capacity change from 0 to 140 [ 2070.310173] loop0: detected capacity change from 0 to 140 [ 2070.316150] loop7: detected capacity change from 0 to 140 [ 2070.333226] EXT4-fs (loop4): ext4_check_descriptors: Inode table for group 0 not in group (block 0)! [ 2070.334246] EXT4-fs (loop4): group descriptors corrupted! [ 2070.335261] EXT4-fs (loop0): ext4_check_descriptors: Block bitmap for group 0 not in group (block 0)! [ 2070.336157] EXT4-fs (loop0): group descriptors corrupted! [ 2070.346041] EXT4-fs (loop7): warning: mounting unchecked fs, running e2fsck is recommended 04:07:49 executing program 2: sendmsg$NL80211_CMD_UNEXPECTED_FRAME(0xffffffffffffffff, &(0x7f0000000400)={0x0, 0x0, &(0x7f0000000300)={&(0x7f00000002c0)={0x1c, 0x0, 0x1, 0x0, 0x0, {{}, {@val={0x8}, @void}}}, 0x1c}}, 0x0) sendmsg$NL80211_CMD_UPDATE_FT_IES(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000001c0)={0x24, 0x0, 0x1, 0x70bd2c, 0x0, {{}, {@val={0x8}, @void}}, [@NL80211_ATTR_MDID={0x6, 0xb1, 0xc116}]}, 0x24}, 0x1, 0x0, 0x0, 0x80}, 0xc000) r0 = creat(&(0x7f00000003c0)='./file1\x00', 0x0) sendmsg$netlink(0xffffffffffffffff, 0x0, 0x0) dup(0xffffffffffffffff) pwritev2(r0, &(0x7f0000000380)=[{&(0x7f0000000180)="bd", 0xfffffdef}], 0x1, 0x1200, 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) ioctl$FS_IOC_FSSETXATTR(r1, 0x401c5820, &(0x7f0000000200)={0x28}) syz_io_uring_setup(0x0, &(0x7f0000000000)={0x0, 0x0, 0x4, 0x2, 0x309}, &(0x7f0000ffc000/0x2000)=nil, &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000000080), &(0x7f0000000240)) syz_io_uring_submit(0x0, 0x0, &(0x7f0000000280)=@IORING_OP_ASYNC_CANCEL={0xe, 0x0, 0x0, 0x0, 0x0, 0x12345}, 0x1ff) 04:07:49 executing program 5: creat(&(0x7f00000003c0)='./file0\x00', 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext2\x00', &(0x7f0000000100)='./file0\x00', 0x430de, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}], 0x0, &(0x7f0000013c00)=ANY=[]) 04:07:49 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="1000000040000000030000002b00000005000000010000000000000000000000002000000020000010000000000000009f09c75f0000ffff53ef", 0x3a, 0x400}, {&(0x7f0000010100)="000000000000000000000000000000000000000000000000000000005178aedb030000001300000023", 0x29, 0x7e0}, {&(0x7f0000010ce0)="00000000000000000000000000000000000000000000000000000000c99b0000ed410000000400009f09c75f9f09c75f9f09c75f00000000000003000200000000000800000000000af3010004000000000000000000000001", 0x59, 0x8c60}], 0x0, &(0x7f0000010f60)) (fail_nth: 31) [ 2070.356895] EXT4-fs (loop7): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: none. [ 2070.366592] loop6: detected capacity change from 0 to 140 [ 2070.371819] EXT4-fs (loop6): VFS: Can't find ext4 filesystem [ 2070.399299] EXT4-fs error (device loop7): ext4_readdir:262: inode #2: block 4: comm syz-executor.7: path /syzkaller-testdir823765038/syzkaller.a3rO6g/412/mnt: bad entry in directory: rec_len is smaller than minimal - offset=0, inode=0, rec_len=0, size=1024 fake=0 [ 2070.400624] loop5: detected capacity change from 0 to 536 [ 2070.407083] loop1: detected capacity change from 0 to 140 04:07:49 executing program 3: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="1000000040000000030000002b00000005000000010000000000000000000000002000000020000010000000000000009f09c75f0000ffff53ef", 0x3a, 0x400}, {&(0x7f0000010100)="000000000000000000000000000000000000000000000000000000005178aedb030000001300000023", 0x29, 0x7e0}, {&(0x7f0000010ce0)="00000000000000000000000000000000000000000000000000000000c99b0000ed410000000400009f09c75f9f09c75f9f09c75f00000000000003000200000000000800000000000af301000400000000000000000000000100000004", 0x5d, 0x8c60}], 0x0, &(0x7f0000010f60)) getdents64(r0, 0x0, 0x0) (fail_nth: 2) [ 2070.426518] EXT4-fs (loop3): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 2070.429558] EXT4-fs (loop5): mounting ext2 file system using the ext4 subsystem [ 2070.463163] EXT4-fs (loop5): warning: mounting unchecked fs, running e2fsck is recommended [ 2070.469160] EXT4-fs error (device loop1): ext4_ext_check_inode:523: inode #2: comm syz-executor.1: pblk 0 bad header/extent: invalid extent entries - magic f30a, entries 1, max 4(4), depth 0(0) [ 2070.474381] EXT4-fs (loop7): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 2070.475581] EXT4-fs (loop5): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: none. [ 2070.477864] EXT4-fs (loop1): get root inode failed [ 2070.478301] EXT4-fs (loop1): mount failed [ 2070.489205] EXT4-fs (loop5): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 2070.492300] loop3: detected capacity change from 0 to 140 [ 2070.525891] EXT4-fs (loop3): warning: mounting unchecked fs, running e2fsck is recommended [ 2070.547856] EXT4-fs (loop3): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: none. [ 2070.561140] EXT4-fs error (device loop3): ext4_readdir:262: inode #2: block 4: comm syz-executor.3: path /syzkaller-testdir621642535/syzkaller.Ms8KeX/414/mnt: bad entry in directory: rec_len is smaller than minimal - offset=0, inode=0, rec_len=0, size=1024 fake=0 [ 2070.630335] EXT4-fs (loop3): unmounting filesystem 00000000-0000-0000-0000-000000000000. 04:07:59 executing program 2: sendmsg$NL80211_CMD_UNEXPECTED_FRAME(0xffffffffffffffff, &(0x7f0000000400)={0x0, 0x0, &(0x7f0000000300)={&(0x7f00000002c0)={0x1c, 0x0, 0x1, 0x0, 0x0, {{}, {@val={0x8}, @void}}}, 0x1c}}, 0x0) sendmsg$NL80211_CMD_UPDATE_FT_IES(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000001c0)={0x24, 0x0, 0x1, 0x70bd2c, 0x0, {{}, {@val={0x8}, @void}}, [@NL80211_ATTR_MDID={0x6, 0xb1, 0xc116}]}, 0x24}, 0x1, 0x0, 0x0, 0x80}, 0xc000) r0 = creat(&(0x7f00000003c0)='./file1\x00', 0x0) sendmsg$netlink(0xffffffffffffffff, 0x0, 0x0) dup(0xffffffffffffffff) pwritev2(r0, &(0x7f0000000380)=[{&(0x7f0000000180)="bd", 0xfffffdef}], 0x1, 0x1200, 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) ioctl$FS_IOC_FSSETXATTR(r1, 0x401c5820, &(0x7f0000000200)={0x1002}) syz_io_uring_setup(0x0, &(0x7f0000000000)={0x0, 0x0, 0x4, 0x2, 0x309}, &(0x7f0000ffc000/0x2000)=nil, &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000000080), &(0x7f0000000240)) syz_io_uring_submit(0x0, 0x0, &(0x7f0000000280)=@IORING_OP_ASYNC_CANCEL={0xe, 0x0, 0x0, 0x0, 0x0, 0x12345}, 0x1ff) 04:07:59 executing program 3: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="1000000040000000030000002b00000005000000010000000000000000000000002000000020000010000000000000009f09c75f0000ffff53ef", 0x3a, 0x400}, {&(0x7f0000010100)="000000000000000000000000000000000000000000000000000000005178aedb030000001300000023", 0x29, 0x7e0}, {&(0x7f0000010ce0)="00000000000000000000000000000000000000000000000000000000c99b0000ed410000000400009f09c75f9f09c75f9f09c75f00000000000003000200000000000800000000000af301000400000000000000000000000100000004", 0x5d, 0x8c60}], 0x0, &(0x7f0000010f60)) getdents64(r0, 0x0, 0x0) (fail_nth: 3) 04:07:59 executing program 7: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="1000000040000000030000002b00000005000000010000000000000000000000002000000020000010000000000000009f09c75f0000ffff53ef", 0x3a, 0x400}, {&(0x7f0000010100)="000000000000000000000000000000000000000000000000000000005178aedb030000001300000023", 0x29, 0x7e0}, {&(0x7f0000010ce0)="00000000000000000000000000000000000000000000000000000000c99b0000ed410000000400009f09c75f9f09c75f9f09c75f00000000000003000200000000000800000000000af301000400000000000000000000000100000004", 0x5d, 0x8c60}], 0x0, &(0x7f0000010f60)) mkdirat(0xffffffffffffff9c, 0x0, 0x0) getdents64(r0, &(0x7f0000000040)=""/4, 0x4) 04:07:59 executing program 6: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="1000000040000000030000002b00000005000000010000000000000000000000002000000020000010000000000000009f09c75f0000ff", 0x37, 0x400}, {&(0x7f0000010100)="000000000000000000000000000000000000000000000000000000005178aedb030000001300000023", 0x29, 0x7e0}, {&(0x7f0000010ce0)="00000000000000000000000000000000000000000000000000000000c99b0000ed410000000400009f09c75f9f09c75f9f09c75f00000000000003000200000000000800000000000af301000400000000000000000000000100000004", 0x5d, 0x8c60}], 0x0, &(0x7f0000010f60)) getdents64(r0, &(0x7f0000000040)=""/4, 0x4) 04:07:59 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010100)="000000000000000000000000000000000000000000000000000000005178aedb030000001300000023", 0x29, 0x7e0}, {&(0x7f0000010ce0)="00000000000000000000000000000000000000000000000000000000c99b0000ed410000000400009f09c75f9f09c75f9f09c75f00000000000003000200000000000800000000000af3010004", 0x4d, 0x8c60}], 0x0, &(0x7f0000010f60)) 04:07:59 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="1000000040000000030000002b00000005000000010000000000000000000000002000000020000010000000000000009f09c75f0000ffff53ef", 0x3a, 0x400}, {&(0x7f0000010100)="000000000000000000000000000000000000000000000000000000005178aedb030000001300000023", 0x29, 0x7e0}, {&(0x7f0000010ce0)="00000000000000000000000000000000000000000000000000000000c99b0000ed410000000400009f09c75f9f09c75f9f09c75f00000000000003000200000000000800000000000af3010004000000000000000000000001", 0x59, 0x8c60}], 0x0, &(0x7f0000010f60)) (fail_nth: 32) 04:07:59 executing program 5: creat(&(0x7f00000003c0)='./file0\x00', 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext2\x00', &(0x7f0000000100)='./file0\x00', 0x431de, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}], 0x0, &(0x7f0000013c00)=ANY=[]) 04:07:59 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="1000000040000000030000002b00000005000000010000000000000000000000002000000020000010000000000000009f09c75f0000ffff53ef", 0x3a, 0x400}, {&(0x7f0000010080)="000000000000000000000000ede2de4df49d4f87b54a3176cfd4eb4f010040000c000000000000009f09c75f", 0x2c, 0x4e0}, {&(0x7f00000100c0)="01000000000000000000000000000000000000000401000012", 0x19, 0x560}, {&(0x7f0000010100)="000000000000000000000000000000000000000000000000000000005178aedb03000000130000", 0x27, 0x7e0}, {&(0x7f0000010ce0)="00000000000000000000000000000000000000000000000000000000c99b0000ed410000000400009f09c75f9f09c75f9f09c75f00000000000003000200000000000800000000000af3010004", 0x4d, 0x8c60}], 0x0, &(0x7f0000010f60)) [ 2080.300100] loop0: detected capacity change from 0 to 140 [ 2080.320509] EXT4-fs (loop0): VFS: Can't find ext4 filesystem [ 2080.325800] loop6: detected capacity change from 0 to 140 [ 2080.331824] loop7: detected capacity change from 0 to 140 [ 2080.338434] loop5: detected capacity change from 0 to 536 [ 2080.341464] loop4: detected capacity change from 0 to 140 [ 2080.343617] FAULT_INJECTION: forcing a failure. [ 2080.343617] name failslab, interval 1, probability 0, space 0, times 0 [ 2080.345365] CPU: 1 UID: 0 PID: 14668 Comm: syz-executor.1 Not tainted 6.18.0-rc5-next-20251111 #1 PREEMPT(voluntary) [ 2080.345396] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2080.345410] Call Trace: [ 2080.345418] [ 2080.345426] dump_stack_lvl+0xfa/0x120 [ 2080.345456] should_fail_ex+0x4d7/0x5e0 [ 2080.345482] ? __kernfs_new_node+0xd3/0x870 [ 2080.345510] should_failslab+0xc2/0x120 [ 2080.345534] kmem_cache_alloc_noprof+0x80/0x690 [ 2080.345572] ? __kernfs_new_node+0xd3/0x870 [ 2080.345598] __kernfs_new_node+0xd3/0x870 [ 2080.345628] ? __pfx___kernfs_new_node+0x10/0x10 [ 2080.345660] ? lock_acquire+0x15e/0x2f0 [ 2080.345692] ? kernfs_root+0x23/0x2a0 [ 2080.345717] ? find_held_lock+0x2b/0x80 [ 2080.345741] ? kernfs_root+0xee/0x2a0 [ 2080.345767] ? lock_release+0xc8/0x290 [ 2080.345795] ? lock_is_held_type+0x9e/0x120 [ 2080.345836] kernfs_new_node+0x13c/0x1e0 [ 2080.345872] __kernfs_create_file+0x55/0x360 [ 2080.345897] sysfs_add_file_mode_ns+0x21c/0x440 [ 2080.345934] ? __pfx_dev_attr_store+0x10/0x10 [ 2080.345959] internal_create_group+0x571/0xeb0 [ 2080.345996] ? __pfx_internal_create_group+0x10/0x10 [ 2080.346023] ? blk_validate_limits+0xc27/0x15c0 [ 2080.346058] ? lock_is_held_type+0x9e/0x120 [ 2080.346096] loop_configure+0xc46/0x15a0 [ 2080.346154] ? __pfx_loop_configure+0x10/0x10 [ 2080.346204] ? avc_has_extended_perms+0x107/0xf20 [ 2080.346233] ? find_held_lock+0x2b/0x80 [ 2080.346257] ? avc_has_extended_perms+0x23b/0xf20 [ 2080.346284] ? lock_release+0xc8/0x290 [ 2080.346318] lo_ioctl+0x66d/0x1ca0 [ 2080.346344] ? __pfx_lo_ioctl+0x10/0x10 [ 2080.346363] ? __pfx_avc_has_extended_perms+0x10/0x10 [ 2080.346399] ? lock_acquire+0x15e/0x2f0 [ 2080.346429] ? __virt_addr_valid+0x1c6/0x5d0 [ 2080.346454] ? __pfx_perf_trace_preemptirq_template+0x10/0x10 [ 2080.346491] ? __pfx_perf_trace_preemptirq_template+0x10/0x10 [ 2080.346525] ? __pfx_perf_trace_preemptirq_template+0x10/0x10 [ 2080.346558] ? lock_release+0xc8/0x290 [ 2080.346591] ? __sanitizer_cov_trace_switch+0x54/0x90 [ 2080.346645] ? lockdep_softirqs_off+0x110/0x110 [ 2080.346678] ? __fget_files+0x34/0x3b0 [ 2080.346711] ? find_held_lock+0x2b/0x80 [ 2080.346735] ? __fget_files+0x203/0x3b0 [ 2080.346769] ? __pfx_lo_ioctl+0x10/0x10 [ 2080.346789] blkdev_ioctl+0x365/0x6d0 [ 2080.346819] ? __pfx_blkdev_ioctl+0x10/0x10 [ 2080.346849] ? selinux_file_ioctl+0xb9/0x280 [ 2080.346886] ? __pfx_blkdev_ioctl+0x10/0x10 [ 2080.346916] __x64_sys_ioctl+0x18f/0x210 [ 2080.346949] do_syscall_64+0xbf/0x430 [ 2080.346973] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 2080.346996] RIP: 0033:0x7f52e79b48d7 [ 2080.347013] Code: 3c 1c 48 f7 d8 49 39 c4 72 b8 e8 a4 54 02 00 85 c0 78 bd 48 83 c4 08 4c 89 e0 5b 41 5c c3 0f 1f 44 00 00 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2080.347034] RSP: 002b:00007f52e4f29f48 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 2080.347056] RAX: ffffffffffffffda RBX: 00007f52e79fe970 RCX: 00007f52e79b48d7 [ 2080.347072] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 2080.347085] RBP: 0000000000000005 R08: 0000000000000000 R09: ffffffffffffffff [ 2080.347100] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000004 [ 2080.347113] R13: 0000000000000004 R14: 0000000020000248 R15: 0000000000000003 [ 2080.347142] [ 2080.348034] loop3: detected capacity change from 0 to 140 [ 2080.353637] EXT4-fs (loop6): VFS: Can't find ext4 filesystem [ 2080.366545] EXT4-fs (loop4): ext4_check_descriptors: Inode table for group 0 not in group (block 0)! [ 2080.369509] EXT4-fs (loop5): mounting ext2 file system using the ext4 subsystem [ 2080.370123] EXT4-fs (loop4): group descriptors corrupted! [ 2080.373142] EXT4-fs (loop7): warning: mounting unchecked fs, running e2fsck is recommended [ 2080.399002] loop1: detected capacity change from 0 to 140 [ 2080.421840] EXT4-fs (loop5): warning: mounting unchecked fs, running e2fsck is recommended 04:07:59 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010100)="000000000000000000000000000000000000000000000000000000005178aedb030000001300000023", 0x29, 0x7e0}, {&(0x7f0000010ce0)="00000000000000000000000000000000000000000000000000000000c99b0000ed410000000400009f09c75f9f09c75f9f09c75f00000000000003000200000000000800000000000af3010004", 0x4d, 0x8c60}], 0x0, &(0x7f0000010f60)) [ 2080.426247] EXT4-fs error (device loop1): ext4_ext_check_inode:523: inode #2: comm syz-executor.1: pblk 0 bad header/extent: invalid extent entries - magic f30a, entries 1, max 4(4), depth 0(0) [ 2080.433136] EXT4-fs (loop3): warning: mounting unchecked fs, running e2fsck is recommended [ 2080.452101] EXT4-fs (loop1): get root inode failed [ 2080.453019] EXT4-fs (loop1): mount failed [ 2080.455781] EXT4-fs (loop5): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: none. [ 2080.473671] EXT4-fs (loop3): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: none. [ 2080.480669] EXT4-fs (loop7): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: none. [ 2080.482896] EXT4-fs (loop5): unmounting filesystem 00000000-0000-0000-0000-000000000000. 04:07:59 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="1000000040000000030000002b00000005000000010000000000000000000000002000000020000010000000000000009f09c75f0000ffff53ef", 0x3a, 0x400}, {&(0x7f0000010080)="000000000000000000000000ede2de4df49d4f87b54a3176cfd4eb4f010040000c000000000000009f09c75f", 0x2c, 0x4e0}, {&(0x7f00000100c0)="01000000000000000000000000000000000000000401000012", 0x19, 0x560}, {&(0x7f0000010100)="000000000000000000000000000000000000000000000000000000005178aedb03000000130000", 0x27, 0x7e0}, {&(0x7f0000010ce0)="00000000000000000000000000000000000000000000000000000000c99b0000ed410000000400009f09c75f9f09c75f9f09c75f00000000000003000200000000000800000000000af3010004", 0x4d, 0x8c60}], 0x0, &(0x7f0000010f60)) 04:07:59 executing program 6: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="1000000040000000030000002b00000005000000010000000000000000000000002000000020000010000000000000009f09c75f0000ffff53", 0x39, 0x400}, {&(0x7f0000010100)="000000000000000000000000000000000000000000000000000000005178aedb030000001300000023", 0x29, 0x7e0}, {&(0x7f0000010ce0)="00000000000000000000000000000000000000000000000000000000c99b0000ed410000000400009f09c75f9f09c75f9f09c75f00000000000003000200000000000800000000000af301000400000000000000000000000100000004", 0x5d, 0x8c60}], 0x0, &(0x7f0000010f60)) getdents64(r0, &(0x7f0000000040)=""/4, 0x4) [ 2080.542808] loop4: detected capacity change from 0 to 140 04:07:59 executing program 5: creat(&(0x7f00000003c0)='./file0\x00', 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext2\x00', &(0x7f0000000100)='./file0\x00', 0x432de, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}], 0x0, &(0x7f0000013c00)=ANY=[]) [ 2080.561347] EXT4-fs (loop4): ext4_check_descriptors: Inode table for group 0 not in group (block 0)! [ 2080.563056] EXT4-fs (loop4): group descriptors corrupted! [ 2080.579726] loop0: detected capacity change from 0 to 140 04:07:59 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="1000000040000000030000002b00000005000000010000000000000000000000002000000020000010000000000000009f09c75f0000ffff53ef", 0x3a, 0x400}, {&(0x7f0000010100)="000000000000000000000000000000000000000000000000000000005178aedb030000001300000023", 0x29, 0x7e0}, {&(0x7f0000010ce0)="00000000000000000000000000000000000000000000000000000000c99b0000ed410000000400009f09c75f9f09c75f9f09c75f00000000000003000200000000000800000000000af3010004000000000000000000000001", 0x59, 0x8c60}], 0x0, &(0x7f0000010f60)) (fail_nth: 33) 04:07:59 executing program 3: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="1000000040000000030000002b00000005000000010000000000000000000000002000000020000010000000000000009f09c75f0000ffff53ef", 0x3a, 0x400}, {&(0x7f0000010100)="000000000000000000000000000000000000000000000000000000005178aedb030000001300000023", 0x29, 0x7e0}, {&(0x7f0000010ce0)="00000000000000000000000000000000000000000000000000000000c99b0000ed410000000400009f09c75f9f09c75f9f09c75f00000000000003000200000000000800000000000af301000400000000000000000000000100000004", 0x5d, 0x8c60}], 0x0, &(0x7f0000010f60)) getdents64(r0, 0x0, 0x0) [ 2080.615507] EXT4-fs (loop0): VFS: Can't find ext4 filesystem 04:07:59 executing program 7: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="1000000040000000030000002b00000005000000010000000000000000000000002000000020000010000000000000009f09c75f0000ffff53ef", 0x3a, 0x400}, {&(0x7f0000010100)="000000000000000000000000000000000000000000000000000000005178aedb030000001300000023", 0x29, 0x7e0}, {&(0x7f0000010ce0)="00000000000000000000000000000000000000000000000000000000c99b0000ed410000000400009f09c75f9f09c75f9f09c75f00000000000003000200000000000800000000000af301000400000000000000000000000100000004", 0x5d, 0x8c60}], 0x0, &(0x7f0000010f60)) mkdirat(0xffffffffffffff9c, 0x0, 0x0) getdents64(r0, &(0x7f0000000040)=""/4, 0x4) [ 2080.659448] EXT4-fs (loop3): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 2080.661544] loop5: detected capacity change from 0 to 537 [ 2080.662752] EXT4-fs (loop7): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 2080.674311] loop6: detected capacity change from 0 to 140 04:07:59 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="1000000040000000030000002b00000005000000010000000000000000000000002000000020000010000000000000009f09c75f0000ffff53ef", 0x3a, 0x400}, {&(0x7f0000010080)="000000000000000000000000ede2de4df49d4f87b54a3176cfd4eb4f010040000c000000000000009f09c75f", 0x2c, 0x4e0}, {&(0x7f00000100c0)="01000000000000000000000000000000000000000401000012", 0x19, 0x560}, {&(0x7f0000010100)="000000000000000000000000000000000000000000000000000000005178aedb0300000013000000", 0x28, 0x7e0}, {&(0x7f0000010ce0)="00000000000000000000000000000000000000000000000000000000c99b0000ed410000000400009f09c75f9f09c75f9f09c75f00000000000003000200000000000800000000000af3010004", 0x4d, 0x8c60}], 0x0, &(0x7f0000010f60)) [ 2080.688023] EXT4-fs (loop5): mounting ext2 file system using the ext4 subsystem [ 2080.699544] EXT4-fs (loop5): warning: mounting unchecked fs, running e2fsck is recommended [ 2080.711797] EXT4-fs (loop6): VFS: Can't find ext4 filesystem [ 2080.734751] loop1: detected capacity change from 0 to 140 [ 2080.738715] EXT4-fs (loop5): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: none. [ 2080.765541] EXT4-fs (loop5): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 2080.767025] EXT4-fs error (device loop1): ext4_ext_check_inode:523: inode #2: comm syz-executor.1: pblk 0 bad header/extent: invalid extent entries - magic f30a, entries 1, max 4(4), depth 0(0) [ 2080.782589] EXT4-fs (loop1): get root inode failed [ 2080.783426] EXT4-fs (loop1): mount failed [ 2080.793142] loop4: detected capacity change from 0 to 140 [ 2080.807457] loop3: detected capacity change from 0 to 140 [ 2080.816551] EXT4-fs (loop3): warning: mounting unchecked fs, running e2fsck is recommended [ 2080.827963] EXT4-fs (loop3): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: none. [ 2080.829575] EXT4-fs (loop4): ext4_check_descriptors: Inode table for group 0 not in group (block 0)! [ 2080.831003] EXT4-fs (loop4): group descriptors corrupted! [ 2080.833191] loop7: detected capacity change from 0 to 140 [ 2080.842890] EXT4-fs error (device loop3): ext4_readdir:262: inode #2: block 4: comm syz-executor.3: path /syzkaller-testdir621642535/syzkaller.Ms8KeX/416/mnt: bad entry in directory: rec_len is smaller than minimal - offset=0, inode=0, rec_len=0, size=1024 fake=0 [ 2080.870486] EXT4-fs (loop7): warning: mounting unchecked fs, running e2fsck is recommended [ 2080.908483] EXT4-fs (loop7): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: none. [ 2080.912451] EXT4-fs (loop3): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 2081.017278] EXT4-fs (loop7): unmounting filesystem 00000000-0000-0000-0000-000000000000. 04:08:09 executing program 3: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="1000000040000000030000002b00000005000000010000000000000000000000002000000020000010000000000000009f09c75f0000ffff53ef", 0x3a, 0x400}, {&(0x7f0000010100)="000000000000000000000000000000000000000000000000000000005178aedb030000001300000023", 0x29, 0x7e0}, {&(0x7f0000010ce0)="00000000000000000000000000000000000000000000000000000000c99b0000ed410000000400009f09c75f9f09c75f9f09c75f00000000000003000200000000000800000000000af301000400000000000000000000000100000004", 0x5d, 0x8c60}], 0x0, &(0x7f0000010f60)) getdents64(r0, 0x0, 0x2) 04:08:09 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010100)="000000000000000000000000000000000000000000000000000000005178aedb030000001300000023", 0x29, 0x7e0}, {&(0x7f0000010ce0)="00000000000000000000000000000000000000000000000000000000c99b0000ed410000000400009f09c75f9f09c75f9f09c75f00000000000003000200000000000800000000000af3010004", 0x4d, 0x8c60}], 0x0, &(0x7f0000010f60)) 04:08:09 executing program 2: sendmsg$NL80211_CMD_UNEXPECTED_FRAME(0xffffffffffffffff, &(0x7f0000000400)={0x0, 0x0, &(0x7f0000000300)={&(0x7f00000002c0)={0x1c, 0x0, 0x1, 0x0, 0x0, {{}, {@val={0x8}, @void}}}, 0x1c}}, 0x0) sendmsg$NL80211_CMD_UPDATE_FT_IES(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000001c0)={0x24, 0x0, 0x1, 0x70bd2c, 0x0, {{}, {@val={0x8}, @void}}, [@NL80211_ATTR_MDID={0x6, 0xb1, 0xc116}]}, 0x24}, 0x1, 0x0, 0x0, 0x80}, 0xc000) r0 = creat(&(0x7f00000003c0)='./file1\x00', 0x0) sendmsg$netlink(0xffffffffffffffff, 0x0, 0x0) dup(0xffffffffffffffff) pwritev2(r0, &(0x7f0000000380)=[{&(0x7f0000000180)="bd", 0xfffffdef}], 0x1, 0x1200, 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) ioctl$FS_IOC_FSSETXATTR(r1, 0x401c5820, &(0x7f0000000200)={0x9}) syz_io_uring_setup(0x0, &(0x7f0000000000)={0x0, 0x0, 0x4, 0x2, 0x309}, &(0x7f0000ffc000/0x2000)=nil, &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000000080), &(0x7f0000000240)) syz_io_uring_submit(0x0, 0x0, &(0x7f0000000280)=@IORING_OP_ASYNC_CANCEL={0xe, 0x0, 0x0, 0x0, 0x0, 0x12345}, 0x1ff) 04:08:09 executing program 7: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="1000000040000000030000002b00000005000000010000000000000000000000002000000020000010000000000000009f09c75f0000ffff53ef", 0x3a, 0x400}, {&(0x7f0000010100)="000000000000000000000000000000000000000000000000000000005178aedb030000001300000023", 0x29, 0x7e0}, {&(0x7f0000010ce0)="00000000000000000000000000000000000000000000000000000000c99b0000ed410000000400009f09c75f9f09c75f9f09c75f00000000000003000200000000000800000000000af301000400000000000000000000000100000004", 0x5d, 0x8c60}], 0x0, &(0x7f0000010f60)) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) getdents64(0xffffffffffffffff, &(0x7f0000000040)=""/4, 0x4) 04:08:09 executing program 5: creat(&(0x7f00000003c0)='./file0\x00', 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext2\x00', &(0x7f0000000100)='./file0\x00', 0x43306, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}], 0x0, &(0x7f0000013c00)=ANY=[]) 04:08:09 executing program 6: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="1000000040000000030000002b00000005000000010000000000000000000000002000000020000010000000000000009f09c75f0000ffff53", 0x39, 0x400}, {&(0x7f0000010100)="000000000000000000000000000000000000000000000000000000005178aedb030000001300000023", 0x29, 0x7e0}, {&(0x7f0000010ce0)="00000000000000000000000000000000000000000000000000000000c99b0000ed410000000400009f09c75f9f09c75f9f09c75f00000000000003000200000000000800000000000af301000400000000000000000000000100000004", 0x5d, 0x8c60}], 0x0, &(0x7f0000010f60)) getdents64(r0, &(0x7f0000000040)=""/4, 0x4) 04:08:09 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="1000000040000000030000002b00000005000000010000000000000000000000002000000020000010000000000000009f09c75f0000ffff53ef", 0x3a, 0x400}, {&(0x7f0000010100)="000000000000000000000000000000000000000000000000000000005178aedb030000001300000023", 0x29, 0x7e0}, {&(0x7f0000010ce0)="00000000000000000000000000000000000000000000000000000000c99b0000ed410000000400009f09c75f9f09c75f9f09c75f00000000000003000200000000000800000000000af3010004000000000000000000000001", 0x59, 0x8c60}], 0x0, &(0x7f0000010f60)) (fail_nth: 34) 04:08:09 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="1000000040000000030000002b00000005000000010000000000000000000000002000000020000010000000000000009f09c75f0000ffff53ef", 0x3a, 0x400}, {&(0x7f0000010080)="000000000000000000000000ede2de4df49d4f87b54a3176cfd4eb4f010040000c000000000000009f09c75f", 0x2c, 0x4e0}, {&(0x7f00000100c0)="01000000000000000000000000000000000000000401000012", 0x19, 0x560}, {&(0x7f0000010100)="000000000000000000000000000000000000000000000000000000005178aedb0300000013000000", 0x28, 0x7e0}, {&(0x7f0000010ce0)="00000000000000000000000000000000000000000000000000000000c99b0000ed410000000400009f09c75f9f09c75f9f09c75f00000000000003000200000000000800000000000af3010004", 0x4d, 0x8c60}], 0x0, &(0x7f0000010f60)) [ 2090.486767] loop0: detected capacity change from 0 to 140 [ 2090.493514] EXT4-fs (loop0): VFS: Can't find ext4 filesystem 04:08:09 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x3, &(0x7f0000000200)=[{0x0, 0x0, 0x400}, {&(0x7f0000010100)="000000000000000000000000000000000000000000000000000000005178aedb030000001300000023", 0x29, 0x7e0}, {&(0x7f0000010ce0)="00000000000000000000000000000000000000000000000000000000c99b0000ed410000000400009f09c75f9f09c75f9f09c75f00000000000003000200000000000800000000000af3010004", 0x4d, 0x8c60}], 0x0, &(0x7f0000010f60)) [ 2090.528301] loop6: detected capacity change from 0 to 140 [ 2090.537678] loop3: detected capacity change from 0 to 140 [ 2090.544384] loop4: detected capacity change from 0 to 140 [ 2090.546501] loop5: detected capacity change from 0 to 537 [ 2090.548538] EXT4-fs (loop6): VFS: Can't find ext4 filesystem [ 2090.559789] FAULT_INJECTION: forcing a failure. [ 2090.559789] name failslab, interval 1, probability 0, space 0, times 0 [ 2090.560801] CPU: 1 UID: 0 PID: 14729 Comm: syz-executor.1 Not tainted 6.18.0-rc5-next-20251111 #1 PREEMPT(voluntary) [ 2090.560821] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2090.560830] Call Trace: [ 2090.560835] [ 2090.560841] dump_stack_lvl+0xfa/0x120 [ 2090.560862] should_fail_ex+0x4d7/0x5e0 [ 2090.560879] ? __kernfs_new_node+0xd3/0x870 [ 2090.560897] should_failslab+0xc2/0x120 [ 2090.560918] kmem_cache_alloc_noprof+0x80/0x690 [ 2090.560942] ? __kernfs_new_node+0xd3/0x870 [ 2090.560959] __kernfs_new_node+0xd3/0x870 [ 2090.560978] ? __pfx___kernfs_new_node+0x10/0x10 [ 2090.560998] ? lock_acquire+0x15e/0x2f0 [ 2090.561019] ? kernfs_root+0x23/0x2a0 [ 2090.561035] ? find_held_lock+0x2b/0x80 [ 2090.561050] ? kernfs_root+0xee/0x2a0 [ 2090.561067] ? lock_release+0xc8/0x290 [ 2090.561085] ? lock_is_held_type+0x9e/0x120 [ 2090.561111] kernfs_new_node+0x13c/0x1e0 [ 2090.561134] __kernfs_create_file+0x55/0x360 [ 2090.561150] sysfs_add_file_mode_ns+0x21c/0x440 [ 2090.561168] ? __pfx_dev_attr_store+0x10/0x10 [ 2090.561184] internal_create_group+0x571/0xeb0 [ 2090.561207] ? __pfx_internal_create_group+0x10/0x10 [ 2090.561225] ? blk_validate_limits+0xc27/0x15c0 [ 2090.561247] ? lock_is_held_type+0x9e/0x120 [ 2090.561270] loop_configure+0xc46/0x15a0 [ 2090.561306] ? __pfx_loop_configure+0x10/0x10 [ 2090.561338] ? avc_has_extended_perms+0x107/0xf20 [ 2090.561357] ? find_held_lock+0x2b/0x80 [ 2090.561372] ? avc_has_extended_perms+0x23b/0xf20 [ 2090.561389] ? lock_release+0xc8/0x290 [ 2090.561414] lo_ioctl+0x66d/0x1ca0 [ 2090.561431] ? __pfx_lo_ioctl+0x10/0x10 [ 2090.561443] ? __pfx_avc_has_extended_perms+0x10/0x10 [ 2090.561466] ? lock_acquire+0x15e/0x2f0 [ 2090.561485] ? __virt_addr_valid+0x1c6/0x5d0 [ 2090.561501] ? __pfx_perf_trace_preemptirq_template+0x10/0x10 [ 2090.561526] ? __pfx_perf_trace_preemptirq_template+0x10/0x10 [ 2090.561547] ? __pfx_perf_trace_preemptirq_template+0x10/0x10 [ 2090.561569] ? lock_release+0xc8/0x290 [ 2090.561590] ? __sanitizer_cov_trace_switch+0x54/0x90 [ 2090.561624] ? lockdep_softirqs_off+0x110/0x110 [ 2090.561645] ? __fget_files+0x34/0x3b0 [ 2090.561667] ? find_held_lock+0x2b/0x80 [ 2090.561682] ? __fget_files+0x203/0x3b0 [ 2090.561704] ? __pfx_lo_ioctl+0x10/0x10 [ 2090.561717] blkdev_ioctl+0x365/0x6d0 [ 2090.561736] ? __pfx_blkdev_ioctl+0x10/0x10 [ 2090.561755] ? selinux_file_ioctl+0xb9/0x280 [ 2090.561779] ? __pfx_blkdev_ioctl+0x10/0x10 [ 2090.561798] __x64_sys_ioctl+0x18f/0x210 [ 2090.561820] do_syscall_64+0xbf/0x430 [ 2090.561836] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 2090.561851] RIP: 0033:0x7f52e79b48d7 [ 2090.561862] Code: 3c 1c 48 f7 d8 49 39 c4 72 b8 e8 a4 54 02 00 85 c0 78 bd 48 83 c4 08 4c 89 e0 5b 41 5c c3 0f 1f 44 00 00 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2090.561876] RSP: 002b:00007f52e4f29f48 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 2090.561890] RAX: ffffffffffffffda RBX: 00007f52e79fe970 RCX: 00007f52e79b48d7 [ 2090.561900] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 2090.561908] RBP: 0000000000000005 R08: 0000000000000000 R09: ffffffffffffffff [ 2090.561917] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000004 [ 2090.561926] R13: 0000000000000004 R14: 0000000020000248 R15: 0000000000000003 [ 2090.561944] [ 2090.562736] EXT4-fs (loop4): ext4_check_descriptors: Inode table for group 0 not in group (block 0)! [ 2090.574600] EXT4-fs (loop3): warning: mounting unchecked fs, running e2fsck is recommended [ 2090.574686] EXT4-fs (loop4): group descriptors corrupted! [ 2090.582336] loop1: detected capacity change from 0 to 140 [ 2090.583906] loop7: detected capacity change from 0 to 140 [ 2090.617862] EXT4-fs (loop5): mounting ext2 file system using the ext4 subsystem [ 2090.621878] EXT4-fs error (device loop1): ext4_ext_check_inode:523: inode #2: comm syz-executor.1: pblk 0 bad header/extent: invalid extent entries - magic f30a, entries 1, max 4(4), depth 0(0) [ 2090.632834] EXT4-fs (loop3): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: none. [ 2090.635209] EXT4-fs (loop1): get root inode failed [ 2090.635653] EXT4-fs (loop1): mount failed [ 2090.639754] loop0: detected capacity change from 0 to 140 [ 2090.650562] EXT4-fs (loop5): warning: mounting unchecked fs, running e2fsck is recommended [ 2090.678821] EXT4-fs (loop0): VFS: Can't find ext4 filesystem 04:08:09 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="1000000040000000030000002b00000005000000010000000000000000000000002000000020000010000000000000009f09c75f0000ffff53ef", 0x3a, 0x400}, {&(0x7f0000010100)="000000000000000000000000000000000000000000000000000000005178aedb030000001300000023", 0x29, 0x7e0}, {&(0x7f0000010ce0)="00000000000000000000000000000000000000000000000000000000c99b0000ed410000000400009f09c75f9f09c75f9f09c75f00000000000003000200000000000800000000000af3010004000000000000000000000001", 0x59, 0x8c60}], 0x0, &(0x7f0000010f60)) (fail_nth: 35) [ 2090.720670] EXT4-fs (loop3): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 2090.724472] EXT4-fs (loop5): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: none. [ 2090.735710] EXT4-fs (loop7): warning: mounting unchecked fs, running e2fsck is recommended [ 2090.739781] EXT4-fs (loop5): unmounting filesystem 00000000-0000-0000-0000-000000000000. 04:08:09 executing program 6: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="1000000040000000030000002b00000005000000010000000000000000000000002000000020000010000000000000009f09c75f0000ffff53", 0x39, 0x400}, {&(0x7f0000010100)="000000000000000000000000000000000000000000000000000000005178aedb030000001300000023", 0x29, 0x7e0}, {&(0x7f0000010ce0)="00000000000000000000000000000000000000000000000000000000c99b0000ed410000000400009f09c75f9f09c75f9f09c75f00000000000003000200000000000800000000000af301000400000000000000000000000100000004", 0x5d, 0x8c60}], 0x0, &(0x7f0000010f60)) getdents64(r0, &(0x7f0000000040)=""/4, 0x4) [ 2090.754672] EXT4-fs (loop7): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: none. 04:08:09 executing program 3: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="1000000040000000030000002b00000005000000010000000000000000000000002000000020000010000000000000009f09c75f0000ffff53ef", 0x3a, 0x400}, {&(0x7f0000010100)="000000000000000000000000000000000000000000000000000000005178aedb030000001300000023", 0x29, 0x7e0}, {&(0x7f0000010ce0)="00000000000000000000000000000000000000000000000000000000c99b0000ed410000000400009f09c75f9f09c75f9f09c75f00000000000003000200000000000800000000000af301000400000000000000000000000100000004", 0x5d, 0x8c60}], 0x0, &(0x7f0000010f60)) getdents64(r0, 0x0, 0x3) 04:08:09 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x3, &(0x7f0000000200)=[{0x0, 0x0, 0x400}, {&(0x7f0000010100)="000000000000000000000000000000000000000000000000000000005178aedb030000001300000023", 0x29, 0x7e0}, {&(0x7f0000010ce0)="00000000000000000000000000000000000000000000000000000000c99b0000ed410000000400009f09c75f9f09c75f9f09c75f00000000000003000200000000000800000000000af3010004", 0x4d, 0x8c60}], 0x0, &(0x7f0000010f60)) [ 2090.783584] loop3: detected capacity change from 0 to 140 04:08:09 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="1000000040000000030000002b00000005000000010000000000000000000000002000000020000010000000000000009f09c75f0000ffff53ef", 0x3a, 0x400}, {&(0x7f0000010080)="000000000000000000000000ede2de4df49d4f87b54a3176cfd4eb4f010040000c000000000000009f09c75f", 0x2c, 0x4e0}, {&(0x7f00000100c0)="01000000000000000000000000000000000000000401000012", 0x19, 0x560}, {&(0x7f0000010100)="000000000000000000000000000000000000000000000000000000005178aedb0300000013000000", 0x28, 0x7e0}, {&(0x7f0000010ce0)="00000000000000000000000000000000000000000000000000000000c99b0000ed410000000400009f09c75f9f09c75f9f09c75f00000000000003000200000000000800000000000af3010004", 0x4d, 0x8c60}], 0x0, &(0x7f0000010f60)) [ 2090.792340] loop5: detected capacity change from 0 to 537 [ 2090.794879] EXT4-fs (loop3): warning: mounting unchecked fs, running e2fsck is recommended [ 2090.804694] EXT4-fs (loop3): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: none. [ 2090.806737] loop1: detected capacity change from 0 to 140 [ 2090.820143] EXT4-fs error (device loop3): ext4_readdir:262: inode #2: block 4: comm syz-executor.3: path /syzkaller-testdir621642535/syzkaller.Ms8KeX/418/mnt: bad entry in directory: rec_len is smaller than minimal - offset=0, inode=0, rec_len=0, size=1024 fake=0 [ 2090.831529] loop6: detected capacity change from 0 to 140 [ 2090.839960] EXT4-fs error (device loop1): ext4_ext_check_inode:523: inode #2: comm syz-executor.1: pblk 0 bad header/extent: invalid extent entries - magic f30a, entries 1, max 4(4), depth 0(0) [ 2090.853251] EXT4-fs (loop1): get root inode failed [ 2090.853669] EXT4-fs (loop1): mount failed [ 2090.871572] EXT4-fs (loop6): VFS: Can't find ext4 filesystem [ 2090.881981] loop4: detected capacity change from 0 to 140 04:08:09 executing program 7: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="1000000040000000030000002b00000005000000010000000000000000000000002000000020000010000000000000009f09c75f0000ffff53ef", 0x3a, 0x400}, {&(0x7f0000010100)="000000000000000000000000000000000000000000000000000000005178aedb030000001300000023", 0x29, 0x7e0}, {&(0x7f0000010ce0)="00000000000000000000000000000000000000000000000000000000c99b0000ed410000000400009f09c75f9f09c75f9f09c75f00000000000003000200000000000800000000000af301000400000000000000000000000100000004", 0x5d, 0x8c60}], 0x0, &(0x7f0000010f60)) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) getdents64(0xffffffffffffffff, &(0x7f0000000040)=""/4, 0x4) 04:08:09 executing program 5: creat(&(0x7f00000003c0)='./file0\x00', 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext2\x00', &(0x7f0000000100)='./file0\x00', 0x433de, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}], 0x0, &(0x7f0000013c00)=ANY=[]) 04:08:09 executing program 3: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="1000000040000000030000002b00000005000000010000000000000000000000002000000020000010000000000000009f09c75f0000ffff53ef", 0x3a, 0x400}, {&(0x7f0000010100)="000000000000000000000000000000000000000000000000000000005178aedb030000001300000023", 0x29, 0x7e0}, {&(0x7f0000010ce0)="00000000000000000000000000000000000000000000000000000000c99b0000ed410000000400009f09c75f9f09c75f9f09c75f00000000000003000200000000000800000000000af301000400000000000000000000000100000004", 0x5d, 0x8c60}], 0x0, &(0x7f0000010f60)) getdents64(r0, 0x0, 0x4) [ 2090.898553] EXT4-fs (loop4): ext4_check_descriptors: Inode table for group 0 not in group (block 0)! [ 2090.900005] EXT4-fs (loop4): group descriptors corrupted! [ 2090.904307] EXT4-fs (loop7): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 2090.905636] EXT4-fs (loop3): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 2090.914358] loop0: detected capacity change from 0 to 140 [ 2090.930768] EXT4-fs (loop0): VFS: Can't find ext4 filesystem [ 2091.003472] loop5: detected capacity change from 0 to 537 [ 2091.024528] EXT4-fs (loop5): mounting ext2 file system using the ext4 subsystem [ 2091.044990] EXT4-fs (loop5): warning: mounting unchecked fs, running e2fsck is recommended [ 2091.069433] EXT4-fs (loop5): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: none. [ 2091.076541] EXT4-fs (loop5): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 2091.078279] loop7: detected capacity change from 0 to 140 [ 2091.081315] loop3: detected capacity change from 0 to 140 [ 2091.089220] EXT4-fs (loop7): warning: mounting unchecked fs, running e2fsck is recommended [ 2091.093289] EXT4-fs (loop3): warning: mounting unchecked fs, running e2fsck is recommended [ 2091.106743] EXT4-fs (loop3): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: none. [ 2091.108430] EXT4-fs (loop7): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: none. [ 2091.118084] EXT4-fs error (device loop3): ext4_readdir:262: inode #2: block 4: comm syz-executor.3: path /syzkaller-testdir621642535/syzkaller.Ms8KeX/419/mnt: bad entry in directory: rec_len is smaller than minimal - offset=0, inode=0, rec_len=0, size=1024 fake=0 [ 2091.158668] EXT4-fs (loop7): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 2091.196665] EXT4-fs (loop3): unmounting filesystem 00000000-0000-0000-0000-000000000000. 04:08:20 executing program 2: sendmsg$NL80211_CMD_UNEXPECTED_FRAME(0xffffffffffffffff, &(0x7f0000000400)={0x0, 0x0, &(0x7f0000000300)={&(0x7f00000002c0)={0x1c, 0x0, 0x1, 0x0, 0x0, {{}, {@val={0x8}, @void}}}, 0x1c}}, 0x0) sendmsg$NL80211_CMD_UPDATE_FT_IES(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000001c0)={0x24, 0x0, 0x1, 0x70bd2c, 0x0, {{}, {@val={0x8}, @void}}, [@NL80211_ATTR_MDID={0x6, 0xb1, 0xc116}]}, 0x24}, 0x1, 0x0, 0x0, 0x80}, 0xc000) r0 = creat(&(0x7f00000003c0)='./file1\x00', 0x0) sendmsg$netlink(0xffffffffffffffff, 0x0, 0x0) dup(0xffffffffffffffff) pwritev2(r0, &(0x7f0000000380)=[{&(0x7f0000000180)="bd", 0xfffffdef}], 0x1, 0x1200, 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) ioctl$FS_IOC_FSSETXATTR(r1, 0x401c5820, &(0x7f0000000200)={0x9, 0x2}) syz_io_uring_setup(0x0, &(0x7f0000000000)={0x0, 0x0, 0x4, 0x2, 0x309}, &(0x7f0000ffc000/0x2000)=nil, &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000000080), &(0x7f0000000240)) syz_io_uring_submit(0x0, 0x0, &(0x7f0000000280)=@IORING_OP_ASYNC_CANCEL={0xe, 0x0, 0x0, 0x0, 0x0, 0x12345}, 0x1ff) 04:08:20 executing program 3: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="1000000040000000030000002b00000005000000010000000000000000000000002000000020000010000000000000009f09c75f0000ffff53ef", 0x3a, 0x400}, {&(0x7f0000010100)="000000000000000000000000000000000000000000000000000000005178aedb030000001300000023", 0x29, 0x7e0}, {&(0x7f0000010ce0)="00000000000000000000000000000000000000000000000000000000c99b0000ed410000000400009f09c75f9f09c75f9f09c75f00000000000003000200000000000800000000000af301000400000000000000000000000100000004", 0x5d, 0x8c60}], 0x0, &(0x7f0000010f60)) getdents64(r0, 0x0, 0x5) 04:08:20 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="1000000040000000030000002b00000005000000010000000000000000000000002000000020000010000000000000009f09c75f0000ffff53ef", 0x3a, 0x400}, {&(0x7f0000010080)="000000000000000000000000ede2de4df49d4f87b54a3176cfd4eb4f010040000c000000000000009f09c75f", 0x2c, 0x4e0}, {&(0x7f00000100c0)="01000000000000000000000000000000000000000401000012", 0x19, 0x560}, {&(0x7f0000010100)="000000000000000000000000000000000000000000000000000000005178aedb030000001300000023", 0x29}, {&(0x7f0000010ce0)="00000000000000000000000000000000000000000000000000000000c99b0000ed410000000400009f09c75f9f09c75f9f09c75f00000000000003000200000000000800000000000af3010004", 0x4d, 0x8c60}], 0x0, &(0x7f0000010f60)) 04:08:20 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="1000000040000000030000002b00000005000000010000000000000000000000002000000020000010000000000000009f09c75f0000ffff53ef", 0x3a, 0x400}, {&(0x7f0000010100)="000000000000000000000000000000000000000000000000000000005178aedb030000001300000023", 0x29, 0x7e0}, {&(0x7f0000010ce0)="00000000000000000000000000000000000000000000000000000000c99b0000ed410000000400009f09c75f9f09c75f9f09c75f00000000000003000200000000000800000000000af3010004000000000000000000000001", 0x59, 0x8c60}], 0x0, &(0x7f0000010f60)) (fail_nth: 36) 04:08:20 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x3, &(0x7f0000000200)=[{0x0, 0x0, 0x400}, {&(0x7f0000010100)="000000000000000000000000000000000000000000000000000000005178aedb030000001300000023", 0x29, 0x7e0}, {&(0x7f0000010ce0)="00000000000000000000000000000000000000000000000000000000c99b0000ed410000000400009f09c75f9f09c75f9f09c75f00000000000003000200000000000800000000000af3010004", 0x4d, 0x8c60}], 0x0, &(0x7f0000010f60)) 04:08:20 executing program 5: creat(&(0x7f00000003c0)='./file0\x00', 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext2\x00', &(0x7f0000000100)='./file0\x00', 0x434de, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}], 0x0, &(0x7f0000013c00)=ANY=[]) 04:08:20 executing program 7: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="1000000040000000030000002b00000005000000010000000000000000000000002000000020000010000000000000009f09c75f0000ffff53ef", 0x3a, 0x400}, {&(0x7f0000010100)="000000000000000000000000000000000000000000000000000000005178aedb030000001300000023", 0x29, 0x7e0}, {&(0x7f0000010ce0)="00000000000000000000000000000000000000000000000000000000c99b0000ed410000000400009f09c75f9f09c75f9f09c75f00000000000003000200000000000800000000000af301000400000000000000000000000100000004", 0x5d, 0x8c60}], 0x0, &(0x7f0000010f60)) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) getdents64(0xffffffffffffffff, &(0x7f0000000040)=""/4, 0x4) 04:08:20 executing program 6: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="1000000040000000030000002b00000005000000010000000000000000000000002000000020000010000000000000009f09c75f0000ffff53ef", 0x3a}, {&(0x7f0000010100)="000000000000000000000000000000000000000000000000000000005178aedb030000001300000023", 0x29, 0x7e0}, {&(0x7f0000010ce0)="00000000000000000000000000000000000000000000000000000000c99b0000ed410000000400009f09c75f9f09c75f9f09c75f00000000000003000200000000000800000000000af301000400000000000000000000000100000004", 0x5d, 0x8c60}], 0x0, &(0x7f0000010f60)) getdents64(r0, &(0x7f0000000040)=""/4, 0x4) [ 2101.566148] loop7: detected capacity change from 0 to 140 [ 2101.567467] loop5: detected capacity change from 0 to 538 [ 2101.571292] EXT4-fs (loop5): mounting ext2 file system using the ext4 subsystem [ 2101.575203] loop0: detected capacity change from 0 to 140 [ 2101.577473] EXT4-fs (loop7): warning: mounting unchecked fs, running e2fsck is recommended [ 2101.579182] loop4: detected capacity change from 0 to 140 [ 2101.579499] EXT4-fs (loop0): VFS: Can't find ext4 filesystem [ 2101.582735] EXT4-fs (loop5): warning: mounting unchecked fs, running e2fsck is recommended [ 2101.585000] EXT4-fs (loop7): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: none. [ 2101.591071] EXT4-fs (loop5): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: none. [ 2101.600617] loop3: detected capacity change from 0 to 140 [ 2101.602937] EXT4-fs (loop5): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 2101.608496] EXT4-fs (loop4): ext4_check_descriptors: Block bitmap for group 0 not in group (block 0)! [ 2101.609649] EXT4-fs (loop4): group descriptors corrupted! [ 2101.615515] loop6: detected capacity change from 0 to 140 [ 2101.624059] EXT4-fs (loop6): VFS: Can't find ext4 filesystem [ 2101.631310] FAULT_INJECTION: forcing a failure. [ 2101.631310] name failslab, interval 1, probability 0, space 0, times 0 [ 2101.632709] CPU: 0 UID: 0 PID: 14796 Comm: syz-executor.1 Not tainted 6.18.0-rc5-next-20251111 #1 PREEMPT(voluntary) [ 2101.632733] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2101.632744] Call Trace: [ 2101.632750] [ 2101.632757] dump_stack_lvl+0xfa/0x120 [ 2101.632781] should_fail_ex+0x4d7/0x5e0 [ 2101.632800] ? __kernfs_new_node+0xd3/0x870 [ 2101.632821] should_failslab+0xc2/0x120 [ 2101.632840] kmem_cache_alloc_noprof+0x80/0x690 [ 2101.632869] ? __kernfs_new_node+0xd3/0x870 [ 2101.632889] __kernfs_new_node+0xd3/0x870 [ 2101.632918] ? __pfx___kernfs_new_node+0x10/0x10 [ 2101.632942] ? lock_acquire+0x15e/0x2f0 [ 2101.632966] ? kernfs_root+0x23/0x2a0 [ 2101.632986] ? find_held_lock+0x2b/0x80 [ 2101.633004] ? kernfs_root+0xee/0x2a0 [ 2101.633024] ? lock_release+0xc8/0x290 [ 2101.633045] ? lock_is_held_type+0x9e/0x120 [ 2101.633076] kernfs_new_node+0x13c/0x1e0 [ 2101.633104] __kernfs_create_file+0x55/0x360 [ 2101.633124] sysfs_add_file_mode_ns+0x21c/0x440 [ 2101.633146] ? __pfx_dev_attr_store+0x10/0x10 [ 2101.633165] internal_create_group+0x571/0xeb0 [ 2101.633193] ? __pfx_internal_create_group+0x10/0x10 [ 2101.633214] ? blk_validate_limits+0xc27/0x15c0 [ 2101.633240] ? lock_is_held_type+0x9e/0x120 [ 2101.633267] loop_configure+0xc46/0x15a0 [ 2101.633312] ? __pfx_loop_configure+0x10/0x10 [ 2101.633350] ? avc_has_extended_perms+0x107/0xf20 [ 2101.633372] ? find_held_lock+0x2b/0x80 [ 2101.633389] ? avc_has_extended_perms+0x23b/0xf20 [ 2101.633409] ? lock_release+0xc8/0x290 [ 2101.633435] lo_ioctl+0x66d/0x1ca0 [ 2101.633454] ? __pfx_lo_ioctl+0x10/0x10 [ 2101.633470] ? __pfx_avc_has_extended_perms+0x10/0x10 [ 2101.633497] ? lock_acquire+0x15e/0x2f0 [ 2101.633519] ? __virt_addr_valid+0x1c6/0x5d0 [ 2101.633539] ? __pfx_perf_trace_preemptirq_template+0x10/0x10 [ 2101.633567] ? __pfx_perf_trace_preemptirq_template+0x10/0x10 [ 2101.633593] ? __pfx_perf_trace_preemptirq_template+0x10/0x10 [ 2101.633618] ? lock_release+0xc8/0x290 [ 2101.633643] ? __sanitizer_cov_trace_switch+0x54/0x90 [ 2101.633684] ? lockdep_softirqs_off+0x110/0x110 [ 2101.633708] ? __fget_files+0x34/0x3b0 [ 2101.633734] ? find_held_lock+0x2b/0x80 [ 2101.633752] ? __fget_files+0x203/0x3b0 [ 2101.633778] ? __pfx_lo_ioctl+0x10/0x10 [ 2101.633793] blkdev_ioctl+0x365/0x6d0 [ 2101.633816] ? __pfx_blkdev_ioctl+0x10/0x10 [ 2101.633838] ? selinux_file_ioctl+0xb9/0x280 [ 2101.633866] ? __pfx_blkdev_ioctl+0x10/0x10 [ 2101.633889] __x64_sys_ioctl+0x18f/0x210 [ 2101.633914] do_syscall_64+0xbf/0x430 [ 2101.633933] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 2101.633950] RIP: 0033:0x7f52e79b48d7 [ 2101.633964] Code: 3c 1c 48 f7 d8 49 39 c4 72 b8 e8 a4 54 02 00 85 c0 78 bd 48 83 c4 08 4c 89 e0 5b 41 5c c3 0f 1f 44 00 00 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2101.633980] RSP: 002b:00007f52e4f29f48 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 2101.633996] RAX: ffffffffffffffda RBX: 00007f52e79fe970 RCX: 00007f52e79b48d7 [ 2101.634008] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 2101.634018] RBP: 0000000000000005 R08: 0000000000000000 R09: ffffffffffffffff [ 2101.634029] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000004 [ 2101.634039] R13: 0000000000000004 R14: 0000000020000248 R15: 0000000000000003 [ 2101.634061] [ 2101.634327] EXT4-fs (loop3): warning: mounting unchecked fs, running e2fsck is recommended [ 2101.635875] loop1: detected capacity change from 0 to 140 [ 2101.638111] loop5: detected capacity change from 0 to 538 04:08:20 executing program 7: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="1000000040000000030000002b00000005000000010000000000000000000000002000000020000010000000000000009f09c75f0000ffff53ef", 0x3a, 0x400}, {&(0x7f0000010100)="000000000000000000000000000000000000000000000000000000005178aedb030000001300000023", 0x29, 0x7e0}, {&(0x7f0000010ce0)="00000000000000000000000000000000000000000000000000000000c99b0000ed410000000400009f09c75f9f09c75f9f09c75f00000000000003000200000000000800000000000af301000400000000000000000000000100000004", 0x5d, 0x8c60}], 0x0, &(0x7f0000010f60)) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) getdents64(r0, 0x0, 0x0) 04:08:20 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000), 0x0, 0x400}, {&(0x7f0000010100)="000000000000000000000000000000000000000000000000000000005178aedb030000001300000023", 0x29, 0x7e0}, {&(0x7f0000010ce0)="00000000000000000000000000000000000000000000000000000000c99b0000ed410000000400009f09c75f9f09c75f9f09c75f00000000000003000200000000000800000000000af3010004", 0x4d, 0x8c60}], 0x0, &(0x7f0000010f60)) [ 2101.642028] EXT4-fs error (device loop1): ext4_ext_check_inode:523: inode #2: comm syz-executor.1: pblk 0 bad header/extent: invalid extent entries - magic f30a, entries 1, max 4(4), depth 0(0) [ 2101.658272] EXT4-fs (loop3): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: none. [ 2101.659899] EXT4-fs (loop1): get root inode failed [ 2101.672795] EXT4-fs (loop1): mount failed [ 2101.674538] EXT4-fs (loop7): unmounting filesystem 00000000-0000-0000-0000-000000000000. 04:08:20 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="1000000040000000030000002b00000005000000010000000000000000000000002000000020000010000000000000009f09c75f0000ffff53ef", 0x3a, 0x400}, {&(0x7f0000010080)="000000000000000000000000ede2de4df49d4f87b54a3176cfd4eb4f010040000c000000000000009f09c75f", 0x2c, 0x4e0}, {&(0x7f00000100c0)="01000000000000000000000000000000000000000401000012", 0x19, 0x560}, {&(0x7f0000010100)="000000000000000000000000000000000000000000000000000000005178aedb030000001300000023", 0x29}, {&(0x7f0000010ce0)="00000000000000000000000000000000000000000000000000000000c99b0000ed410000000400009f09c75f9f09c75f9f09c75f00000000000003000200000000000800000000000af3010004", 0x4d, 0x8c60}], 0x0, &(0x7f0000010f60)) [ 2101.698136] EXT4-fs error (device loop3): ext4_readdir:262: inode #2: block 4: comm syz-executor.3: path /syzkaller-testdir621642535/syzkaller.Ms8KeX/420/mnt: bad entry in directory: rec_len is smaller than minimal - offset=0, inode=0, rec_len=0, size=1024 fake=0 04:08:20 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="1000000040000000030000002b00000005000000010000000000000000000000002000000020000010000000000000009f09c75f0000ffff53ef", 0x3a, 0x400}, {&(0x7f0000010100)="000000000000000000000000000000000000000000000000000000005178aedb030000001300000023", 0x29, 0x7e0}, {&(0x7f0000010ce0)="00000000000000000000000000000000000000000000000000000000c99b0000ed410000000400009f09c75f9f09c75f9f09c75f00000000000003000200000000000800000000000af3010004000000000000000000000001", 0x59, 0x8c60}], 0x0, &(0x7f0000010f60)) (fail_nth: 37) 04:08:20 executing program 6: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="1000000040000000030000002b00000005000000010000000000000000000000002000000020000010000000000000009f09c75f0000ffff53ef", 0x3a}, {&(0x7f0000010100)="000000000000000000000000000000000000000000000000000000005178aedb030000001300000023", 0x29, 0x7e0}, {&(0x7f0000010ce0)="00000000000000000000000000000000000000000000000000000000c99b0000ed410000000400009f09c75f9f09c75f9f09c75f00000000000003000200000000000800000000000af301000400000000000000000000000100000004", 0x5d, 0x8c60}], 0x0, &(0x7f0000010f60)) getdents64(r0, &(0x7f0000000040)=""/4, 0x4) [ 2101.748610] loop0: detected capacity change from 0 to 140 04:08:20 executing program 5: creat(&(0x7f00000003c0)='./file0\x00', 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext2\x00', &(0x7f0000000100)='./file0\x00', 0x435de, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}], 0x0, &(0x7f0000013c00)=ANY=[]) [ 2101.758824] loop1: detected capacity change from 0 to 140 [ 2101.765480] loop7: detected capacity change from 0 to 140 [ 2101.772471] EXT4-fs error (device loop1): ext4_ext_check_inode:523: inode #2: comm syz-executor.1: pblk 0 bad header/extent: invalid extent entries - magic f30a, entries 1, max 4(4), depth 0(0) [ 2101.778540] EXT4-fs (loop1): get root inode failed [ 2101.778985] EXT4-fs (loop1): mount failed [ 2101.781886] EXT4-fs (loop7): warning: mounting unchecked fs, running e2fsck is recommended [ 2101.784781] EXT4-fs (loop7): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: none. [ 2101.786255] loop5: detected capacity change from 0 to 538 [ 2101.790604] loop6: detected capacity change from 0 to 140 [ 2101.793045] EXT4-fs (loop0): VFS: Can't find ext4 filesystem [ 2101.796287] EXT4-fs (loop3): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 2101.811051] EXT4-fs (loop5): mounting ext2 file system using the ext4 subsystem [ 2101.814036] loop4: detected capacity change from 0 to 140 04:08:20 executing program 3: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="1000000040000000030000002b00000005000000010000000000000000000000002000000020000010000000000000009f09c75f0000ffff53ef", 0x3a, 0x400}, {&(0x7f0000010100)="000000000000000000000000000000000000000000000000000000005178aedb030000001300000023", 0x29, 0x7e0}, {&(0x7f0000010ce0)="00000000000000000000000000000000000000000000000000000000c99b0000ed410000000400009f09c75f9f09c75f9f09c75f00000000000003000200000000000800000000000af301000400000000000000000000000100000004", 0x5d, 0x8c60}], 0x0, &(0x7f0000010f60)) getdents64(r0, 0x0, 0x6) [ 2101.823671] EXT4-fs (loop5): warning: mounting unchecked fs, running e2fsck is recommended [ 2101.824475] EXT4-fs error (device loop7): ext4_readdir:262: inode #2: block 4: comm syz-executor.7: path /syzkaller-testdir823765038/syzkaller.a3rO6g/418/mnt: bad entry in directory: rec_len is smaller than minimal - offset=0, inode=0, rec_len=0, size=1024 fake=0 [ 2101.840844] EXT4-fs (loop5): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: none. [ 2101.844609] EXT4-fs (loop6): VFS: Can't find ext4 filesystem [ 2101.849132] EXT4-fs (loop4): ext4_check_descriptors: Block bitmap for group 0 not in group (block 0)! [ 2101.850219] EXT4-fs (loop4): group descriptors corrupted! [ 2101.857470] loop3: detected capacity change from 0 to 140 [ 2101.868281] EXT4-fs (loop5): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 2101.897731] EXT4-fs (loop3): warning: mounting unchecked fs, running e2fsck is recommended [ 2101.921629] loop5: detected capacity change from 0 to 538 [ 2101.925698] EXT4-fs (loop3): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: none. [ 2101.928867] EXT4-fs (loop7): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 2101.958405] EXT4-fs error (device loop3): ext4_readdir:262: inode #2: block 4: comm syz-executor.3: path /syzkaller-testdir621642535/syzkaller.Ms8KeX/421/mnt: bad entry in directory: rec_len is smaller than minimal - offset=0, inode=0, rec_len=0, size=1024 fake=0 [ 2102.018646] EXT4-fs (loop3): unmounting filesystem 00000000-0000-0000-0000-000000000000. 04:08:29 executing program 2: sendmsg$NL80211_CMD_UNEXPECTED_FRAME(0xffffffffffffffff, &(0x7f0000000400)={0x0, 0x0, &(0x7f0000000300)={&(0x7f00000002c0)={0x1c, 0x0, 0x1, 0x0, 0x0, {{}, {@val={0x8}, @void}}}, 0x1c}}, 0x0) sendmsg$NL80211_CMD_UPDATE_FT_IES(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000001c0)={0x24, 0x0, 0x1, 0x70bd2c, 0x0, {{}, {@val={0x8}, @void}}, [@NL80211_ATTR_MDID={0x6, 0xb1, 0xc116}]}, 0x24}, 0x1, 0x0, 0x0, 0x80}, 0xc000) r0 = creat(&(0x7f00000003c0)='./file1\x00', 0x0) sendmsg$netlink(0xffffffffffffffff, 0x0, 0x0) dup(0xffffffffffffffff) pwritev2(r0, &(0x7f0000000380)=[{&(0x7f0000000180)="bd", 0xfffffdef}], 0x1, 0x1200, 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) ioctl$FS_IOC_FSSETXATTR(r1, 0x401c5820, &(0x7f0000000200)={0x9, 0x4}) syz_io_uring_setup(0x0, &(0x7f0000000000)={0x0, 0x0, 0x4, 0x2, 0x309}, &(0x7f0000ffc000/0x2000)=nil, &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000000080), &(0x7f0000000240)) syz_io_uring_submit(0x0, 0x0, &(0x7f0000000280)=@IORING_OP_ASYNC_CANCEL={0xe, 0x0, 0x0, 0x0, 0x0, 0x12345}, 0x1ff) 04:08:29 executing program 3: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="1000000040000000030000002b00000005000000010000000000000000000000002000000020000010000000000000009f09c75f0000ffff53ef", 0x3a, 0x400}, {&(0x7f0000010100)="000000000000000000000000000000000000000000000000000000005178aedb030000001300000023", 0x29, 0x7e0}, {&(0x7f0000010ce0)="00000000000000000000000000000000000000000000000000000000c99b0000ed410000000400009f09c75f9f09c75f9f09c75f00000000000003000200000000000800000000000af301000400000000000000000000000100000004", 0x5d, 0x8c60}], 0x0, &(0x7f0000010f60)) getdents64(r0, 0x0, 0x7) 04:08:29 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="1000000040000000030000002b00000005000000010000000000000000000000002000000020000010000000000000009f09c75f0000ffff53ef", 0x3a, 0x400}, {&(0x7f0000010080)="000000000000000000000000ede2de4df49d4f87b54a3176cfd4eb4f010040000c000000000000009f09c75f", 0x2c, 0x4e0}, {&(0x7f00000100c0)="01000000000000000000000000000000000000000401000012", 0x19, 0x560}, {&(0x7f0000010100)="000000000000000000000000000000000000000000000000000000005178aedb030000001300000023", 0x29}, {&(0x7f0000010ce0)="00000000000000000000000000000000000000000000000000000000c99b0000ed410000000400009f09c75f9f09c75f9f09c75f00000000000003000200000000000800000000000af3010004", 0x4d, 0x8c60}], 0x0, &(0x7f0000010f60)) 04:08:29 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="1000000040000000030000002b00000005000000010000000000000000000000002000000020000010000000000000009f09c75f0000ffff53ef", 0x3a, 0x400}, {&(0x7f0000010100)="000000000000000000000000000000000000000000000000000000005178aedb030000001300000023", 0x29, 0x7e0}, {&(0x7f0000010ce0)="00000000000000000000000000000000000000000000000000000000c99b0000ed410000000400009f09c75f9f09c75f9f09c75f00000000000003000200000000000800000000000af3010004000000000000000000000001", 0x59, 0x8c60}], 0x0, &(0x7f0000010f60)) (fail_nth: 38) 04:08:29 executing program 6: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="1000000040000000030000002b00000005000000010000000000000000000000002000000020000010000000000000009f09c75f0000ffff53ef", 0x3a}, {&(0x7f0000010100)="000000000000000000000000000000000000000000000000000000005178aedb030000001300000023", 0x29, 0x7e0}, {&(0x7f0000010ce0)="00000000000000000000000000000000000000000000000000000000c99b0000ed410000000400009f09c75f9f09c75f9f09c75f00000000000003000200000000000800000000000af301000400000000000000000000000100000004", 0x5d, 0x8c60}], 0x0, &(0x7f0000010f60)) getdents64(r0, &(0x7f0000000040)=""/4, 0x4) 04:08:29 executing program 7: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="1000000040000000030000002b00000005000000010000000000000000000000002000000020000010000000000000009f09c75f0000ffff53ef", 0x3a, 0x400}, {&(0x7f0000010100)="000000000000000000000000000000000000000000000000000000005178aedb030000001300000023", 0x29, 0x7e0}, {&(0x7f0000010ce0)="00000000000000000000000000000000000000000000000000000000c99b0000ed410000000400009f09c75f9f09c75f9f09c75f00000000000003000200000000000800000000000af301000400000000000000000000000100000004", 0x5d, 0x8c60}], 0x0, &(0x7f0000010f60)) getdents64(r0, 0x0, 0x3) 04:08:29 executing program 5: creat(&(0x7f00000003c0)='./file0\x00', 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext2\x00', &(0x7f0000000100)='./file0\x00', 0x436de, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}], 0x0, &(0x7f0000013c00)=ANY=[]) 04:08:29 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000), 0x0, 0x400}, {&(0x7f0000010100)="000000000000000000000000000000000000000000000000000000005178aedb030000001300000023", 0x29, 0x7e0}, {&(0x7f0000010ce0)="00000000000000000000000000000000000000000000000000000000c99b0000ed410000000400009f09c75f9f09c75f9f09c75f00000000000003000200000000000800000000000af3010004", 0x4d, 0x8c60}], 0x0, &(0x7f0000010f60)) [ 2110.116787] loop0: detected capacity change from 0 to 140 [ 2110.122464] EXT4-fs (loop0): VFS: Can't find ext4 filesystem 04:08:29 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000), 0x0, 0x400}, {&(0x7f0000010100)="000000000000000000000000000000000000000000000000000000005178aedb030000001300000023", 0x29, 0x7e0}, {&(0x7f0000010ce0)="00000000000000000000000000000000000000000000000000000000c99b0000ed410000000400009f09c75f9f09c75f9f09c75f00000000000003000200000000000800000000000af3010004", 0x4d, 0x8c60}], 0x0, &(0x7f0000010f60)) [ 2110.176790] loop4: detected capacity change from 0 to 140 [ 2110.178327] loop7: detected capacity change from 0 to 140 [ 2110.181423] loop3: detected capacity change from 0 to 140 [ 2110.182607] loop6: detected capacity change from 0 to 140 [ 2110.188764] FAULT_INJECTION: forcing a failure. [ 2110.188764] name failslab, interval 1, probability 0, space 0, times 0 [ 2110.189813] CPU: 1 UID: 0 PID: 14851 Comm: syz-executor.1 Not tainted 6.18.0-rc5-next-20251111 #1 PREEMPT(voluntary) [ 2110.189832] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2110.189841] Call Trace: [ 2110.189846] [ 2110.189851] dump_stack_lvl+0xfa/0x120 [ 2110.189871] should_fail_ex+0x4d7/0x5e0 [ 2110.189888] ? __kernfs_new_node+0xd3/0x870 [ 2110.189910] should_failslab+0xc2/0x120 [ 2110.189925] kmem_cache_alloc_noprof+0x80/0x690 [ 2110.189948] ? __kernfs_new_node+0xd3/0x870 [ 2110.189963] __kernfs_new_node+0xd3/0x870 [ 2110.189981] ? __pfx___kernfs_new_node+0x10/0x10 [ 2110.189999] ? lock_acquire+0x15e/0x2f0 [ 2110.190019] ? kernfs_root+0x23/0x2a0 [ 2110.190033] ? find_held_lock+0x2b/0x80 [ 2110.190048] ? kernfs_root+0xee/0x2a0 [ 2110.190063] ? lock_release+0xc8/0x290 [ 2110.190079] ? lock_is_held_type+0x9e/0x120 [ 2110.190103] kernfs_new_node+0x13c/0x1e0 [ 2110.190124] __kernfs_create_file+0x55/0x360 [ 2110.190139] sysfs_add_file_mode_ns+0x21c/0x440 [ 2110.190156] ? __pfx_dev_attr_store+0x10/0x10 [ 2110.190171] internal_create_group+0x571/0xeb0 [ 2110.190193] ? __pfx_internal_create_group+0x10/0x10 [ 2110.190209] ? blk_validate_limits+0xc27/0x15c0 [ 2110.190229] ? lock_is_held_type+0x9e/0x120 [ 2110.190250] loop_configure+0xc46/0x15a0 [ 2110.190284] ? __pfx_loop_configure+0x10/0x10 [ 2110.190313] ? avc_has_extended_perms+0x107/0xf20 [ 2110.190330] ? find_held_lock+0x2b/0x80 [ 2110.190344] ? avc_has_extended_perms+0x23b/0xf20 [ 2110.190360] ? lock_release+0xc8/0x290 [ 2110.190379] lo_ioctl+0x66d/0x1ca0 [ 2110.190394] ? __pfx_lo_ioctl+0x10/0x10 [ 2110.190405] ? __pfx_avc_has_extended_perms+0x10/0x10 [ 2110.190426] ? lock_acquire+0x15e/0x2f0 [ 2110.190443] ? __virt_addr_valid+0x1c6/0x5d0 [ 2110.190459] ? __pfx_perf_trace_preemptirq_template+0x10/0x10 [ 2110.190481] ? __pfx_perf_trace_preemptirq_template+0x10/0x10 [ 2110.190501] ? __pfx_perf_trace_preemptirq_template+0x10/0x10 [ 2110.190521] ? lock_release+0xc8/0x290 [ 2110.190539] ? __sanitizer_cov_trace_switch+0x54/0x90 [ 2110.190571] ? lockdep_softirqs_off+0x110/0x110 [ 2110.190589] ? __fget_files+0x34/0x3b0 [ 2110.190610] ? find_held_lock+0x2b/0x80 [ 2110.190623] ? __fget_files+0x203/0x3b0 [ 2110.190643] ? __pfx_lo_ioctl+0x10/0x10 [ 2110.190655] blkdev_ioctl+0x365/0x6d0 [ 2110.190673] ? __pfx_blkdev_ioctl+0x10/0x10 [ 2110.190690] ? selinux_file_ioctl+0xb9/0x280 [ 2110.190712] ? __pfx_blkdev_ioctl+0x10/0x10 [ 2110.190730] __x64_sys_ioctl+0x18f/0x210 [ 2110.190749] do_syscall_64+0xbf/0x430 [ 2110.190764] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 2110.190777] RIP: 0033:0x7f52e79b48d7 [ 2110.190788] Code: 3c 1c 48 f7 d8 49 39 c4 72 b8 e8 a4 54 02 00 85 c0 78 bd 48 83 c4 08 4c 89 e0 5b 41 5c c3 0f 1f 44 00 00 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2110.190801] RSP: 002b:00007f52e4f29f48 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 2110.190813] RAX: ffffffffffffffda RBX: 00007f52e79fe970 RCX: 00007f52e79b48d7 [ 2110.190822] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 2110.190830] RBP: 0000000000000005 R08: 0000000000000000 R09: ffffffffffffffff [ 2110.190838] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000004 [ 2110.190846] R13: 0000000000000004 R14: 0000000020000248 R15: 0000000000000003 [ 2110.190863] [ 2110.191010] loop5: detected capacity change from 0 to 539 [ 2110.202179] loop1: detected capacity change from 0 to 140 [ 2110.206513] EXT4-fs (loop4): ext4_check_descriptors: Block bitmap for group 0 not in group (block 0)! [ 2110.208020] EXT4-fs (loop3): warning: mounting unchecked fs, running e2fsck is recommended [ 2110.208267] EXT4-fs (loop4): group descriptors corrupted! [ 2110.232868] loop0: detected capacity change from 0 to 140 [ 2110.233510] EXT4-fs error (device loop1): ext4_ext_check_inode:523: inode #2: comm syz-executor.1: pblk 0 bad header/extent: invalid extent entries - magic f30a, entries 1, max 4(4), depth 0(0) [ 2110.239331] EXT4-fs (loop3): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: none. [ 2110.240671] EXT4-fs (loop7): warning: mounting unchecked fs, running e2fsck is recommended [ 2110.242549] EXT4-fs (loop5): mounting ext2 file system using the ext4 subsystem [ 2110.243218] EXT4-fs (loop1): get root inode failed [ 2110.243766] EXT4-fs (loop1): mount failed [ 2110.247269] EXT4-fs (loop0): VFS: Can't find ext4 filesystem [ 2110.248739] EXT4-fs (loop5): warning: mounting unchecked fs, running e2fsck is recommended [ 2110.251437] EXT4-fs (loop7): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: none. [ 2110.256495] EXT4-fs (loop5): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: none. [ 2110.257575] EXT4-fs (loop6): VFS: Can't find ext4 filesystem [ 2110.257842] EXT4-fs error (device loop3): ext4_readdir:262: inode #2: block 4: comm syz-executor.3: path /syzkaller-testdir621642535/syzkaller.Ms8KeX/422/mnt: bad entry in directory: rec_len is smaller than minimal - offset=0, inode=0, rec_len=0, size=1024 fake=0 [ 2110.267051] EXT4-fs error (device loop7): ext4_readdir:262: inode #2: block 4: comm syz-executor.7: path /syzkaller-testdir823765038/syzkaller.a3rO6g/419/mnt: bad entry in directory: rec_len is smaller than minimal - offset=0, inode=0, rec_len=0, size=1024 fake=0 [ 2110.270765] EXT4-fs (loop5): unmounting filesystem 00000000-0000-0000-0000-000000000000. 04:08:29 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="1000000040000000030000002b00000005000000010000000000000000", 0x1d, 0x400}, {&(0x7f0000010100)="000000000000000000000000000000000000000000000000000000005178aedb030000001300000023", 0x29, 0x7e0}, {&(0x7f0000010ce0)="00000000000000000000000000000000000000000000000000000000c99b0000ed410000000400009f09c75f9f09c75f9f09c75f00000000000003000200000000000800000000000af3010004", 0x4d, 0x8c60}], 0x0, &(0x7f0000010f60)) 04:08:29 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="1000000040000000030000002b00000005000000010000000000000000000000002000000020000010000000000000009f09c75f0000ffff53ef", 0x3a, 0x400}, {&(0x7f0000010100)="000000000000000000000000000000000000000000000000000000005178aedb030000001300000023", 0x29, 0x7e0}, {&(0x7f0000010ce0)="00000000000000000000000000000000000000000000000000000000c99b0000ed410000000400009f09c75f9f09c75f9f09c75f00000000000003000200000000000800000000000af3010004000000000000000000000001", 0x59, 0x8c60}], 0x0, &(0x7f0000010f60)) (fail_nth: 39) 04:08:29 executing program 6: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="1000000040000000030000002b00000005000000010000000000000000000000002000000020000010000000000000009f09c75f0000ffff53ef", 0x3a, 0x400}, {&(0x7f0000010100)="000000000000000000000000000000000000000000000000000000005178aedb030000001300000023", 0x29, 0x7e0}, {&(0x7f0000010ce0)="00000000000000000000000000000000000000000000000000000000c99b0000ed410000000400009f09c75f9f09c75f9f09c75f00000000000003000200000000000800000000000af301000400000000000000000000000100000004", 0x5d, 0x8c60}], 0x0, 0x0) getdents64(r0, &(0x7f0000000040)=""/4, 0x4) [ 2110.342703] loop0: detected capacity change from 0 to 140 [ 2110.349684] loop1: detected capacity change from 0 to 140 04:08:29 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="1000000040000000030000002b00000005000000010000000000000000000000002000000020000010000000000000009f09c75f0000ffff53ef", 0x3a, 0x400}, {&(0x7f0000010080)="000000000000000000000000ede2de4df49d4f87b54a3176cfd4eb4f010040000c000000000000009f09c75f", 0x2c, 0x4e0}, {&(0x7f0000010100)="000000000000000000000000000000000000000000000000000000005178aedb030000001300000023", 0x29, 0x7e0}, {&(0x7f0000010ce0)="00000000000000000000000000000000000000000000000000000000c99b0000ed410000000400009f09c75f9f09c75f9f09c75f00000000000003000200000000000800000000000af3010004", 0x4d, 0x8c60}], 0x0, &(0x7f0000010f60)) 04:08:29 executing program 7: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="1000000040000000030000002b00000005000000010000000000000000000000002000000020000010000000000000009f09c75f0000ffff53ef", 0x3a, 0x400}, {&(0x7f0000010100)="000000000000000000000000000000000000000000000000000000005178aedb030000001300000023", 0x29, 0x7e0}, {&(0x7f0000010ce0)="00000000000000000000000000000000000000000000000000000000c99b0000ed410000000400009f09c75f9f09c75f9f09c75f00000000000003000200000000000800000000000af301000400000000000000000000000100000004", 0x5d, 0x8c60}], 0x0, &(0x7f0000010f60)) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) getdents64(r0, 0x0, 0x0) (fail_nth: 1) [ 2110.353114] EXT4-fs (loop0): VFS: Can't find ext4 filesystem [ 2110.354247] EXT4-fs (loop7): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 2110.368036] EXT4-fs (loop3): unmounting filesystem 00000000-0000-0000-0000-000000000000. 04:08:29 executing program 5: creat(&(0x7f00000003c0)='./file0\x00', 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext2\x00', &(0x7f0000000100)='./file0\x00', 0x43bde, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}], 0x0, &(0x7f0000013c00)=ANY=[]) [ 2110.378265] EXT4-fs error (device loop1): ext4_ext_check_inode:523: inode #2: comm syz-executor.1: pblk 0 bad header/extent: invalid extent entries - magic f30a, entries 1, max 4(4), depth 0(0) [ 2110.387103] EXT4-fs (loop1): get root inode failed [ 2110.387516] EXT4-fs (loop1): mount failed 04:08:29 executing program 3: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="1000000040000000030000002b00000005000000010000000000000000000000002000000020000010000000000000009f09c75f0000ffff53ef", 0x3a, 0x400}, {&(0x7f0000010100)="000000000000000000000000000000000000000000000000000000005178aedb030000001300000023", 0x29, 0x7e0}, {&(0x7f0000010ce0)="00000000000000000000000000000000000000000000000000000000c99b0000ed410000000400009f09c75f9f09c75f9f09c75f00000000000003000200000000000800000000000af301000400000000000000000000000100000004", 0x5d, 0x8c60}], 0x0, &(0x7f0000010f60)) getdents64(r0, 0x0, 0x8) [ 2110.422741] loop5: detected capacity change from 0 to 541 [ 2110.430470] loop6: detected capacity change from 0 to 140 [ 2110.430565] EXT4-fs (loop5): mounting ext2 file system using the ext4 subsystem [ 2110.433982] loop4: detected capacity change from 0 to 140 [ 2110.435603] loop7: detected capacity change from 0 to 140 [ 2110.437350] loop3: detected capacity change from 0 to 140 [ 2110.444634] EXT4-fs (loop5): warning: mounting unchecked fs, running e2fsck is recommended [ 2110.452183] EXT4-fs (loop7): warning: mounting unchecked fs, running e2fsck is recommended [ 2110.454060] EXT4-fs (loop3): warning: mounting unchecked fs, running e2fsck is recommended [ 2110.455646] EXT4-fs error (device loop4): ext4_ext_check_inode:523: inode #2: comm syz-executor.4: pblk 0 bad header/extent: invalid extent entries - magic f30a, entries 1, max 4(4), depth 0(0) [ 2110.457375] EXT4-fs (loop5): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: none. [ 2110.460583] EXT4-fs (loop3): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: none. [ 2110.466117] EXT4-fs (loop4): get root inode failed [ 2110.466589] EXT4-fs (loop4): mount failed [ 2110.467719] EXT4-fs (loop7): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: none. [ 2110.469790] EXT4-fs (loop5): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 2110.481007] EXT4-fs error (device loop3): ext4_readdir:262: inode #2: block 4: comm syz-executor.3: path /syzkaller-testdir621642535/syzkaller.Ms8KeX/423/mnt: bad entry in directory: rec_len is smaller than minimal - offset=0, inode=0, rec_len=0, size=1024 fake=0 [ 2110.489397] EXT4-fs error (device loop7): ext4_readdir:262: inode #2: block 4: comm syz-executor.7: path /syzkaller-testdir823765038/syzkaller.a3rO6g/420/mnt: bad entry in directory: rec_len is smaller than minimal - offset=0, inode=0, rec_len=0, size=1024 fake=0 [ 2110.544248] EXT4-fs (loop3): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 2110.564173] EXT4-fs (loop7): unmounting filesystem 00000000-0000-0000-0000-000000000000. 04:08:37 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="1000000040000000030000002b00000005000000010000000000000000000000002000000020000010000000000000009f09c75f0000ffff53ef", 0x3a, 0x400}, {&(0x7f0000010100)="000000000000000000000000000000000000000000000000000000005178aedb030000001300000023", 0x29, 0x7e0}, {&(0x7f0000010ce0)="00000000000000000000000000000000000000000000000000000000c99b0000ed410000000400009f09c75f9f09c75f9f09c75f00000000000003000200000000000800000000000af3010004000000000000000000000001", 0x59, 0x8c60}], 0x0, &(0x7f0000010f60)) (fail_nth: 40) 04:08:37 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="1000000040000000030000002b00000005000000010000000000000000", 0x1d, 0x400}, {&(0x7f0000010100)="000000000000000000000000000000000000000000000000000000005178aedb030000001300000023", 0x29, 0x7e0}, {&(0x7f0000010ce0)="00000000000000000000000000000000000000000000000000000000c99b0000ed410000000400009f09c75f9f09c75f9f09c75f00000000000003000200000000000800000000000af3010004", 0x4d, 0x8c60}], 0x0, &(0x7f0000010f60)) 04:08:37 executing program 7: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="1000000040000000030000002b00000005000000010000000000000000000000002000000020000010000000000000009f09c75f0000ffff53ef", 0x3a, 0x400}, {&(0x7f0000010100)="000000000000000000000000000000000000000000000000000000005178aedb030000001300000023", 0x29, 0x7e0}, {&(0x7f0000010ce0)="00000000000000000000000000000000000000000000000000000000c99b0000ed410000000400009f09c75f9f09c75f9f09c75f00000000000003000200000000000800000000000af301000400000000000000000000000100000004", 0x5d, 0x8c60}], 0x0, &(0x7f0000010f60)) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) getdents64(r0, 0x0, 0x0) (fail_nth: 2) 04:08:37 executing program 3: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="1000000040000000030000002b00000005000000010000000000000000000000002000000020000010000000000000009f09c75f0000ffff53ef", 0x3a, 0x400}, {&(0x7f0000010100)="000000000000000000000000000000000000000000000000000000005178aedb030000001300000023", 0x29, 0x7e0}, {&(0x7f0000010ce0)="00000000000000000000000000000000000000000000000000000000c99b0000ed410000000400009f09c75f9f09c75f9f09c75f00000000000003000200000000000800000000000af301000400000000000000000000000100000004", 0x5d, 0x8c60}], 0x0, &(0x7f0000010f60)) getdents64(r0, 0x0, 0x9) 04:08:37 executing program 6: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="1000000040000000030000002b00000005000000010000000000000000000000002000000020000010000000000000009f09c75f0000ffff53ef", 0x3a, 0x400}, {&(0x7f0000010100)="000000000000000000000000000000000000000000000000000000005178aedb030000001300000023", 0x29, 0x7e0}, {&(0x7f0000010ce0)="00000000000000000000000000000000000000000000000000000000c99b0000ed410000000400009f09c75f9f09c75f9f09c75f00000000000003000200000000000800000000000af301000400000000000000000000000100000004", 0x5d, 0x8c60}], 0x0, 0x0) getdents64(r0, &(0x7f0000000040)=""/4, 0x4) 04:08:37 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="1000000040000000030000002b00000005000000010000000000000000000000002000000020000010000000000000009f09c75f0000ffff53ef", 0x3a, 0x400}, {&(0x7f0000010080)="000000000000000000000000ede2de4df49d4f87b54a3176cfd4eb4f010040000c000000000000009f09c75f", 0x2c, 0x4e0}, {0x0, 0x0, 0x7e0}, {&(0x7f0000010ce0)="00000000000000000000000000000000000000000000000000000000c99b0000ed410000000400009f09c75f9f09c75f9f09c75f00000000000003000200000000000800000000000af3010004", 0x4d, 0x8c60}], 0x0, &(0x7f0000010f60)) 04:08:37 executing program 5: creat(&(0x7f00000003c0)='./file0\x00', 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext2\x00', &(0x7f0000000100)='./file0\x00', 0x43cde, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}], 0x0, &(0x7f0000013c00)=ANY=[]) 04:08:37 executing program 2: sendmsg$NL80211_CMD_UNEXPECTED_FRAME(0xffffffffffffffff, &(0x7f0000000400)={0x0, 0x0, &(0x7f0000000300)={&(0x7f00000002c0)={0x1c, 0x0, 0x1, 0x0, 0x0, {{}, {@val={0x8}, @void}}}, 0x1c}}, 0x0) sendmsg$NL80211_CMD_UPDATE_FT_IES(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000001c0)={0x24, 0x0, 0x1, 0x70bd2c, 0x0, {{}, {@val={0x8}, @void}}, [@NL80211_ATTR_MDID={0x6, 0xb1, 0xc116}]}, 0x24}, 0x1, 0x0, 0x0, 0x80}, 0xc000) r0 = creat(&(0x7f00000003c0)='./file1\x00', 0x0) sendmsg$netlink(0xffffffffffffffff, 0x0, 0x0) dup(0xffffffffffffffff) pwritev2(r0, &(0x7f0000000380)=[{&(0x7f0000000180)="bd", 0xfffffdef}], 0x1, 0x1200, 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) ioctl$FS_IOC_FSSETXATTR(r1, 0x401c5820, &(0x7f0000000200)={0x9, 0x6}) syz_io_uring_setup(0x0, &(0x7f0000000000)={0x0, 0x0, 0x4, 0x2, 0x309}, &(0x7f0000ffc000/0x2000)=nil, &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000000080), &(0x7f0000000240)) syz_io_uring_submit(0x0, 0x0, &(0x7f0000000280)=@IORING_OP_ASYNC_CANCEL={0xe, 0x0, 0x0, 0x0, 0x0, 0x12345}, 0x1ff) [ 2118.599473] loop4: detected capacity change from 0 to 140 [ 2118.600240] loop0: detected capacity change from 0 to 140 [ 2118.603748] FAULT_INJECTION: forcing a failure. [ 2118.603748] name failslab, interval 1, probability 0, space 0, times 0 [ 2118.603880] EXT4-fs (loop4): ext4_check_descriptors: Block bitmap for group 0 not in group (block 0)! [ 2118.605889] CPU: 0 UID: 0 PID: 14898 Comm: syz-executor.1 Not tainted 6.18.0-rc5-next-20251111 #1 PREEMPT(voluntary) [ 2118.605932] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2118.605948] Call Trace: [ 2118.605957] [ 2118.605968] dump_stack_lvl+0xfa/0x120 [ 2118.606001] should_fail_ex+0x4d7/0x5e0 [ 2118.606031] ? __kernfs_new_node+0xd3/0x870 [ 2118.606063] should_failslab+0xc2/0x120 [ 2118.606092] kmem_cache_alloc_noprof+0x80/0x690 [ 2118.606137] ? __kernfs_new_node+0xd3/0x870 [ 2118.606168] __kernfs_new_node+0xd3/0x870 [ 2118.606205] ? __pfx___kernfs_new_node+0x10/0x10 [ 2118.606243] ? lock_acquire+0x15e/0x2f0 [ 2118.606280] ? kernfs_root+0x23/0x2a0 [ 2118.606312] ? find_held_lock+0x2b/0x80 [ 2118.606340] ? kernfs_root+0xee/0x2a0 [ 2118.606371] ? lock_release+0xc8/0x290 [ 2118.606405] ? lock_is_held_type+0x9e/0x120 [ 2118.606453] kernfs_new_node+0x13c/0x1e0 [ 2118.606496] __kernfs_create_file+0x55/0x360 [ 2118.606526] sysfs_add_file_mode_ns+0x21c/0x440 [ 2118.606588] ? __pfx_dev_attr_store+0x10/0x10 [ 2118.606618] internal_create_group+0x571/0xeb0 [ 2118.606662] ? __pfx_internal_create_group+0x10/0x10 [ 2118.606695] ? blk_validate_limits+0xc27/0x15c0 [ 2118.606734] ? lock_is_held_type+0x9e/0x120 [ 2118.606778] loop_configure+0xc46/0x15a0 [ 2118.606847] ? __pfx_loop_configure+0x10/0x10 [ 2118.606907] ? avc_has_extended_perms+0x107/0xf20 [ 2118.606941] ? find_held_lock+0x2b/0x80 [ 2118.606969] ? avc_has_extended_perms+0x23b/0xf20 [ 2118.607001] ? lock_release+0xc8/0x290 [ 2118.607042] lo_ioctl+0x66d/0x1ca0 [ 2118.607073] ? __pfx_lo_ioctl+0x10/0x10 [ 2118.607097] ? __pfx_avc_has_extended_perms+0x10/0x10 [ 2118.607140] ? lock_acquire+0x15e/0x2f0 [ 2118.607175] ? __virt_addr_valid+0x1c6/0x5d0 [ 2118.607205] ? __pfx_perf_trace_preemptirq_template+0x10/0x10 [ 2118.607249] ? __pfx_perf_trace_preemptirq_template+0x10/0x10 [ 2118.607289] ? __pfx_perf_trace_preemptirq_template+0x10/0x10 [ 2118.607329] ? lock_release+0xc8/0x290 [ 2118.607368] ? __sanitizer_cov_trace_switch+0x54/0x90 [ 2118.607433] ? lockdep_softirqs_off+0x110/0x110 [ 2118.607471] ? __fget_files+0x34/0x3b0 [ 2118.607511] ? find_held_lock+0x2b/0x80 [ 2118.607539] ? __fget_files+0x203/0x3b0 [ 2118.607594] ? __pfx_lo_ioctl+0x10/0x10 [ 2118.607618] blkdev_ioctl+0x365/0x6d0 [ 2118.607653] ? __pfx_blkdev_ioctl+0x10/0x10 [ 2118.607688] ? selinux_file_ioctl+0xb9/0x280 [ 2118.607731] ? __pfx_blkdev_ioctl+0x10/0x10 [ 2118.607768] __x64_sys_ioctl+0x18f/0x210 [ 2118.607807] do_syscall_64+0xbf/0x430 [ 2118.607836] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 2118.607863] RIP: 0033:0x7f52e79b48d7 [ 2118.607883] Code: 3c 1c 48 f7 d8 49 39 c4 72 b8 e8 a4 54 02 00 85 c0 78 bd 48 83 c4 08 4c 89 e0 5b 41 5c c3 0f 1f 44 00 00 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2118.607909] RSP: 002b:00007f52e4f29f48 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 2118.607934] RAX: ffffffffffffffda RBX: 00007f52e79fe970 RCX: 00007f52e79b48d7 [ 2118.607952] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 2118.607969] RBP: 0000000000000005 R08: 0000000000000000 R09: ffffffffffffffff [ 2118.607985] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000004 [ 2118.608001] R13: 0000000000000004 R14: 0000000020000248 R15: 0000000000000003 [ 2118.608036] [ 2118.633120] EXT4-fs (loop4): group descriptors corrupted! [ 2118.634861] loop6: detected capacity change from 0 to 140 [ 2118.637535] EXT4-fs (loop0): VFS: Can't find ext4 filesystem [ 2118.646296] loop7: detected capacity change from 0 to 140 [ 2118.648899] loop3: detected capacity change from 0 to 140 04:08:37 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="1000000040000000030000002b00000005000000010000000000000000", 0x1d, 0x400}, {&(0x7f0000010100)="000000000000000000000000000000000000000000000000000000005178aedb030000001300000023", 0x29, 0x7e0}, {&(0x7f0000010ce0)="00000000000000000000000000000000000000000000000000000000c99b0000ed410000000400009f09c75f9f09c75f9f09c75f00000000000003000200000000000800000000000af3010004", 0x4d, 0x8c60}], 0x0, &(0x7f0000010f60)) [ 2118.657333] EXT4-fs (loop7): warning: mounting unchecked fs, running e2fsck is recommended [ 2118.658808] loop1: detected capacity change from 0 to 140 [ 2118.663768] EXT4-fs (loop7): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: none. [ 2118.667586] EXT4-fs error (device loop7): ext4_readdir:262: inode #2: block 4: comm syz-executor.7: path /syzkaller-testdir823765038/syzkaller.a3rO6g/421/mnt: bad entry in directory: rec_len is smaller than minimal - offset=0, inode=0, rec_len=0, size=1024 fake=0 [ 2118.671798] loop5: detected capacity change from 0 to 542 [ 2118.680527] EXT4-fs (loop3): warning: mounting unchecked fs, running e2fsck is recommended 04:08:37 executing program 7: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="1000000040000000030000002b00000005000000010000000000000000000000002000000020000010000000000000009f09c75f0000ffff53ef", 0x3a, 0x400}, {&(0x7f0000010100)="000000000000000000000000000000000000000000000000000000005178aedb030000001300000023", 0x29, 0x7e0}, {&(0x7f0000010ce0)="00000000000000000000000000000000000000000000000000000000c99b0000ed410000000400009f09c75f9f09c75f9f09c75f00000000000003000200000000000800000000000af301000400000000000000000000000100000004", 0x5d, 0x8c60}], 0x0, &(0x7f0000010f60)) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) getdents64(r0, 0x0, 0x0) (fail_nth: 3) [ 2118.689622] EXT4-fs error (device loop1): ext4_ext_check_inode:523: inode #2: comm syz-executor.1: pblk 0 bad header/extent: invalid extent entries - magic f30a, entries 1, max 4(4), depth 0(0) [ 2118.691379] EXT4-fs (loop1): get root inode failed [ 2118.691791] EXT4-fs (loop1): mount failed [ 2118.696193] EXT4-fs (loop5): mounting ext2 file system using the ext4 subsystem [ 2118.701527] EXT4-fs (loop3): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: none. 04:08:37 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="1000000040000000030000002b00000005000000010000000000000000000000002000000020000010000000000000009f09c75f0000ffff53ef", 0x3a, 0x400}, {&(0x7f0000010100)="000000000000000000000000000000000000000000000000000000005178aedb030000001300000023", 0x29, 0x7e0}, {&(0x7f0000010ce0)="00000000000000000000000000000000000000000000000000000000c99b0000ed410000000400009f09c75f9f09c75f9f09c75f00000000000003000200000000000800000000000af3010004000000000000000000000001", 0x59, 0x8c60}], 0x0, &(0x7f0000010f60)) (fail_nth: 41) [ 2118.715215] EXT4-fs error (device loop3): ext4_readdir:262: inode #2: block 4: comm syz-executor.3: path /syzkaller-testdir621642535/syzkaller.Ms8KeX/424/mnt: bad entry in directory: rec_len is smaller than minimal - offset=0, inode=0, rec_len=0, size=1024 fake=0 [ 2118.721266] loop0: detected capacity change from 0 to 140 [ 2118.722396] EXT4-fs (loop7): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 2118.725746] EXT4-fs (loop5): warning: mounting unchecked fs, running e2fsck is recommended [ 2118.736634] EXT4-fs (loop0): VFS: Can't find ext4 filesystem 04:08:37 executing program 6: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="1000000040000000030000002b00000005000000010000000000000000000000002000000020000010000000000000009f09c75f0000ffff53ef", 0x3a, 0x400}, {&(0x7f0000010100)="000000000000000000000000000000000000000000000000000000005178aedb030000001300000023", 0x29, 0x7e0}, {&(0x7f0000010ce0)="00000000000000000000000000000000000000000000000000000000c99b0000ed410000000400009f09c75f9f09c75f9f09c75f00000000000003000200000000000800000000000af301000400000000000000000000000100000004", 0x5d, 0x8c60}], 0x0, 0x0) getdents64(r0, &(0x7f0000000040)=""/4, 0x4) [ 2118.740374] EXT4-fs (loop5): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: none. [ 2118.752796] EXT4-fs (loop5): unmounting filesystem 00000000-0000-0000-0000-000000000000. 04:08:37 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="1000000040000000030000002b00000005000000010000000000000000000000002000000020000010000000000000009f09c75f0000ffff53ef", 0x3a, 0x400}, {&(0x7f0000010080)="000000000000000000000000ede2de4df49d4f87b54a3176cfd4eb4f010040000c000000000000009f09c75f", 0x2c, 0x4e0}, {0x0, 0x0, 0x7e0}, {&(0x7f0000010ce0)="00000000000000000000000000000000000000000000000000000000c99b0000ed410000000400009f09c75f9f09c75f9f09c75f00000000000003000200000000000800000000000af3010004", 0x4d, 0x8c60}], 0x0, &(0x7f0000010f60)) [ 2118.799698] loop7: detected capacity change from 0 to 140 [ 2118.810282] EXT4-fs (loop7): warning: mounting unchecked fs, running e2fsck is recommended [ 2118.812296] loop4: detected capacity change from 0 to 140 [ 2118.822027] EXT4-fs (loop7): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: none. [ 2118.823347] loop1: detected capacity change from 0 to 140 [ 2118.825434] EXT4-fs (loop4): ext4_check_descriptors: Block bitmap for group 0 not in group (block 0)! [ 2118.826283] EXT4-fs (loop4): group descriptors corrupted! [ 2118.830192] loop5: detected capacity change from 0 to 542 [ 2118.831386] EXT4-fs error (device loop7): ext4_readdir:262: inode #2: block 4: comm syz-executor.7: path /syzkaller-testdir823765038/syzkaller.a3rO6g/422/mnt: bad entry in directory: rec_len is smaller than minimal - offset=0, inode=0, rec_len=0, size=1024 fake=0 [ 2118.838184] FAULT_INJECTION: forcing a failure. [ 2118.838184] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 2118.839363] CPU: 1 UID: 0 PID: 14921 Comm: syz-executor.7 Not tainted 6.18.0-rc5-next-20251111 #1 PREEMPT(voluntary) [ 2118.839381] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2118.839389] Call Trace: [ 2118.839394] [ 2118.839399] dump_stack_lvl+0xfa/0x120 [ 2118.839418] should_fail_ex+0x4d7/0x5e0 [ 2118.839435] _copy_to_user+0x32/0xd0 [ 2118.839449] simple_read_from_buffer+0xe0/0x180 [ 2118.839470] proc_fail_nth_read+0x18a/0x240 [ 2118.839485] ? __pfx_proc_fail_nth_read+0x10/0x10 [ 2118.839499] ? security_file_permission+0x22/0x90 [ 2118.839516] ? __pfx_proc_fail_nth_read+0x10/0x10 [ 2118.839530] vfs_read+0x1eb/0xc70 [ 2118.839563] ? __pfx_vfs_read+0x10/0x10 [ 2118.839583] ? lock_release+0xc8/0x290 [ 2118.839605] ? __fget_files+0x20d/0x3b0 [ 2118.839631] ksys_read+0x121/0x240 [ 2118.839644] ? __pfx_ksys_read+0x10/0x10 [ 2118.839663] do_syscall_64+0xbf/0x430 [ 2118.839678] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 2118.839692] RIP: 0033:0x7f5fed66269c [ 2118.839702] Code: ec 28 48 89 54 24 18 48 89 74 24 10 89 7c 24 08 e8 f9 fc ff ff 48 8b 54 24 18 48 8b 74 24 10 41 89 c0 8b 7c 24 08 31 c0 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 48 89 44 24 08 e8 2f fd ff ff 48 [ 2118.839715] RSP: 002b:00007f5feac25170 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 2118.839727] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007f5fed66269c [ 2118.839736] RDX: 000000000000000f RSI: 00007f5feac251e0 RDI: 0000000000000003 [ 2118.839744] RBP: 00007f5feac251d0 R08: 0000000000000000 R09: 0000000000000000 [ 2118.839752] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 04:08:37 executing program 3: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="1000000040000000030000002b00000005000000010000000000000000000000002000000020000010000000000000009f09c75f0000ffff53ef", 0x3a, 0x400}, {&(0x7f0000010100)="000000000000000000000000000000000000000000000000000000005178aedb030000001300000023", 0x29, 0x7e0}, {&(0x7f0000010ce0)="00000000000000000000000000000000000000000000000000000000c99b0000ed410000000400009f09c75f9f09c75f9f09c75f00000000000003000200000000000800000000000af301000400000000000000000000000100000004", 0x5d, 0x8c60}], 0x0, &(0x7f0000010f60)) getdents64(r0, 0x0, 0xa) [ 2118.839759] R13: 00007ffdf942d85f R14: 00007f5feac25300 R15: 0000000000022000 [ 2118.839776] 04:08:37 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="1000000040000000030000002b00000005000000010000000000000000000000002000000020000010000000", 0x2c, 0x400}, {&(0x7f0000010100)="000000000000000000000000000000000000000000000000000000005178aedb030000001300000023", 0x29, 0x7e0}, {&(0x7f0000010ce0)="00000000000000000000000000000000000000000000000000000000c99b0000ed410000000400009f09c75f9f09c75f9f09c75f00000000000003000200000000000800000000000af3010004", 0x4d, 0x8c60}], 0x0, &(0x7f0000010f60)) [ 2118.870170] EXT4-fs error (device loop1): ext4_ext_check_inode:523: inode #2: comm syz-executor.1: pblk 0 bad header/extent: invalid extent entries - magic f30a, entries 1, max 4(4), depth 0(0) 04:08:37 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="1000000040000000030000002b00000005000000010000000000000000000000002000000020000010000000000000009f09c75f0000ffff53ef", 0x3a, 0x400}, {&(0x7f0000010080)="000000000000000000000000ede2de4df49d4f87b54a3176cfd4eb4f010040000c000000000000009f09c75f", 0x2c, 0x4e0}, {0x0, 0x0, 0x7e0}, {&(0x7f0000010ce0)="00000000000000000000000000000000000000000000000000000000c99b0000ed410000000400009f09c75f9f09c75f9f09c75f00000000000003000200000000000800000000000af3010004", 0x4d, 0x8c60}], 0x0, &(0x7f0000010f60)) 04:08:37 executing program 7: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="1000000040000000030000002b00000005000000010000000000000000000000002000000020000010000000000000009f09c75f0000ffff53ef", 0x3a, 0x400}, {&(0x7f0000010100)="000000000000000000000000000000000000000000000000000000005178aedb030000001300000023", 0x29, 0x7e0}, {&(0x7f0000010ce0)="00000000000000000000000000000000000000000000000000000000c99b0000ed410000000400009f09c75f9f09c75f9f09c75f00000000000003000200000000000800000000000af301000400000000000000000000000100000004", 0x5d, 0x8c60}], 0x0, &(0x7f0000010f60)) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) getdents64(r0, 0x0, 0x0) [ 2118.883882] EXT4-fs (loop3): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 2118.888417] EXT4-fs (loop7): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 2118.891528] EXT4-fs (loop1): get root inode failed [ 2118.892382] EXT4-fs (loop1): mount failed [ 2118.906694] loop6: detected capacity change from 0 to 140 [ 2118.937262] loop7: detected capacity change from 0 to 140 [ 2118.951019] EXT4-fs (loop7): warning: mounting unchecked fs, running e2fsck is recommended [ 2118.960472] EXT4-fs (loop7): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: none. [ 2118.968450] EXT4-fs error (device loop7): ext4_readdir:262: inode #2: block 4: comm syz-executor.7: path /syzkaller-testdir823765038/syzkaller.a3rO6g/423/mnt: bad entry in directory: rec_len is smaller than minimal - offset=0, inode=0, rec_len=0, size=1024 fake=0 [ 2118.976193] loop0: detected capacity change from 0 to 140 [ 2118.983322] loop4: detected capacity change from 0 to 140 [ 2119.002059] EXT4-fs (loop7): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 2119.033618] EXT4-fs (loop0): VFS: Can't find ext4 filesystem [ 2119.043057] EXT4-fs (loop4): ext4_check_descriptors: Block bitmap for group 0 not in group (block 0)! [ 2119.044851] EXT4-fs (loop4): group descriptors corrupted! [ 2119.098143] loop3: detected capacity change from 0 to 140 [ 2119.111830] EXT4-fs (loop3): warning: mounting unchecked fs, running e2fsck is recommended [ 2119.118722] EXT4-fs (loop3): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: none. [ 2119.143352] EXT4-fs error (device loop3): ext4_readdir:262: inode #2: block 4: comm syz-executor.3: path /syzkaller-testdir621642535/syzkaller.Ms8KeX/425/mnt: bad entry in directory: rec_len is smaller than minimal - offset=0, inode=0, rec_len=0, size=1024 fake=0 [ 2119.245755] EXT4-fs (loop3): unmounting filesystem 00000000-0000-0000-0000-000000000000. 04:08:47 executing program 5: creat(&(0x7f00000003c0)='./file0\x00', 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext2\x00', &(0x7f0000000100)='./file0\x00', 0x43dde, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}], 0x0, &(0x7f0000013c00)=ANY=[]) 04:08:47 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="1000000040000000030000002b00000005000000010000000000000000000000002000000020000010000000000000009f09c75f0000ffff53ef", 0x3a, 0x400}, {&(0x7f0000010100)="000000000000000000000000000000000000000000000000000000005178aedb030000001300000023", 0x29, 0x7e0}, {&(0x7f0000010ce0)="00000000000000000000000000000000000000000000000000000000c99b0000ed410000000400009f09c75f9f09c75f9f09c75f00000000000003000200000000000800000000000af3010004000000000000000000000001", 0x59, 0x8c60}], 0x0, &(0x7f0000010f60)) (fail_nth: 42) 04:08:47 executing program 6: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="1000000040000000030000002b00000005000000010000000000000000000000002000000020000010000000000000009f09c75f0000ffff53ef", 0x3a, 0x400}, {&(0x7f0000010100)="000000000000000000000000000000000000000000000000000000005178aedb030000001300000023", 0x29, 0x7e0}, {&(0x7f0000010ce0)="00000000000000000000000000000000000000000000000000000000c99b0000ed410000000400009f09c75f9f09c75f9f09c75f00000000000003000200000000000800000000000af301000400000000000000000000000100000004", 0x5d, 0x8c60}], 0x0, &(0x7f0000010f60)) getdents64(0xffffffffffffffff, &(0x7f0000000040)=""/4, 0x4) 04:08:47 executing program 7: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="1000000040000000030000002b00000005000000010000000000000000000000002000000020000010000000000000009f09c75f0000ffff53ef", 0x3a, 0x400}, {&(0x7f0000010100)="000000000000000000000000000000000000000000000000000000005178aedb030000001300000023", 0x29, 0x7e0}, {&(0x7f0000010ce0)="00000000000000000000000000000000000000000000000000000000c99b0000ed410000000400009f09c75f9f09c75f9f09c75f00000000000003000200000000000800000000000af301000400000000000000000000000100000004", 0x5d, 0x8c60}], 0x0, &(0x7f0000010f60)) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) getdents64(r0, 0x0, 0x2) 04:08:47 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="1000000040000000030000002b00000005000000010000000000000000000000002000000020000010000000000000009f09c75f0000ffff53ef", 0x3a, 0x400}, {&(0x7f0000010080)="000000000000000000000000ede2de4df49d4f87b54a3176cfd4eb4f010040000c000000000000009f09c75f", 0x2c, 0x4e0}, {&(0x7f0000010100), 0x0, 0x7e0}, {&(0x7f0000010ce0)="00000000000000000000000000000000000000000000000000000000c99b0000ed410000000400009f09c75f9f09c75f9f09c75f00000000000003000200000000000800000000000af3010004", 0x4d, 0x8c60}], 0x0, &(0x7f0000010f60)) 04:08:47 executing program 2: sendmsg$NL80211_CMD_UNEXPECTED_FRAME(0xffffffffffffffff, &(0x7f0000000400)={0x0, 0x0, &(0x7f0000000300)={&(0x7f00000002c0)={0x1c, 0x0, 0x1, 0x0, 0x0, {{}, {@val={0x8}, @void}}}, 0x1c}}, 0x0) sendmsg$NL80211_CMD_UPDATE_FT_IES(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000001c0)={0x24, 0x0, 0x1, 0x70bd2c, 0x0, {{}, {@val={0x8}, @void}}, [@NL80211_ATTR_MDID={0x6, 0xb1, 0xc116}]}, 0x24}, 0x1, 0x0, 0x0, 0x80}, 0xc000) r0 = creat(&(0x7f00000003c0)='./file1\x00', 0x0) sendmsg$netlink(0xffffffffffffffff, 0x0, 0x0) dup(0xffffffffffffffff) pwritev2(r0, &(0x7f0000000380)=[{&(0x7f0000000180)="bd", 0xfffffdef}], 0x1, 0x1200, 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) ioctl$FS_IOC_FSSETXATTR(r1, 0x401c5820, &(0x7f0000000200)={0x9, 0x8}) syz_io_uring_setup(0x0, &(0x7f0000000000)={0x0, 0x0, 0x4, 0x2, 0x309}, &(0x7f0000ffc000/0x2000)=nil, &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000000080), &(0x7f0000000240)) syz_io_uring_submit(0x0, 0x0, &(0x7f0000000280)=@IORING_OP_ASYNC_CANCEL={0xe, 0x0, 0x0, 0x0, 0x0, 0x12345}, 0x1ff) 04:08:47 executing program 3: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="1000000040000000030000002b00000005000000010000000000000000000000002000000020000010000000000000009f09c75f0000ffff53ef", 0x3a, 0x400}, {&(0x7f0000010100)="000000000000000000000000000000000000000000000000000000005178aedb030000001300000023", 0x29, 0x7e0}, {&(0x7f0000010ce0)="00000000000000000000000000000000000000000000000000000000c99b0000ed410000000400009f09c75f9f09c75f9f09c75f00000000000003000200000000000800000000000af301000400000000000000000000000100000004", 0x5d, 0x8c60}], 0x0, &(0x7f0000010f60)) getdents64(r0, 0x0, 0xc) 04:08:47 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="1000000040000000030000002b00000005000000010000000000000000000000002000000020000010000000", 0x2c, 0x400}, {&(0x7f0000010100)="000000000000000000000000000000000000000000000000000000005178aedb030000001300000023", 0x29, 0x7e0}, {&(0x7f0000010ce0)="00000000000000000000000000000000000000000000000000000000c99b0000ed410000000400009f09c75f9f09c75f9f09c75f00000000000003000200000000000800000000000af3010004", 0x4d, 0x8c60}], 0x0, &(0x7f0000010f60)) [ 2128.159782] loop0: detected capacity change from 0 to 140 [ 2128.160787] loop7: detected capacity change from 0 to 140 [ 2128.164111] EXT4-fs (loop0): VFS: Can't find ext4 filesystem [ 2128.170080] EXT4-fs (loop7): warning: mounting unchecked fs, running e2fsck is recommended [ 2128.176414] EXT4-fs (loop7): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: none. [ 2128.181794] EXT4-fs error (device loop7): ext4_readdir:262: inode #2: block 4: comm syz-executor.7: path /syzkaller-testdir823765038/syzkaller.a3rO6g/424/mnt: bad entry in directory: rec_len is smaller than minimal - offset=0, inode=0, rec_len=0, size=1024 fake=0 [ 2128.203683] loop6: detected capacity change from 0 to 140 [ 2128.205306] loop4: detected capacity change from 0 to 140 04:08:47 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="1000000040000000030000002b00000005000000010000000000000000000000002000000020000010000000", 0x2c, 0x400}, {&(0x7f0000010100)="000000000000000000000000000000000000000000000000000000005178aedb030000001300000023", 0x29, 0x7e0}, {&(0x7f0000010ce0)="00000000000000000000000000000000000000000000000000000000c99b0000ed410000000400009f09c75f9f09c75f9f09c75f00000000000003000200000000000800000000000af3010004", 0x4d, 0x8c60}], 0x0, &(0x7f0000010f60)) [ 2128.215072] EXT4-fs (loop6): warning: mounting unchecked fs, running e2fsck is recommended [ 2128.217843] loop3: detected capacity change from 0 to 140 [ 2128.223824] EXT4-fs (loop6): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: none. [ 2128.246828] EXT4-fs (loop4): ext4_check_descriptors: Block bitmap for group 0 not in group (block 0)! [ 2128.248541] EXT4-fs (loop4): group descriptors corrupted! [ 2128.250497] loop0: detected capacity change from 0 to 140 [ 2128.252602] EXT4-fs (loop0): VFS: Can't find ext4 filesystem 04:08:47 executing program 7: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="1000000040000000030000002b00000005000000010000000000000000000000002000000020000010000000000000009f09c75f0000ffff53ef", 0x3a, 0x400}, {&(0x7f0000010100)="000000000000000000000000000000000000000000000000000000005178aedb030000001300000023", 0x29, 0x7e0}, {&(0x7f0000010ce0)="00000000000000000000000000000000000000000000000000000000c99b0000ed410000000400009f09c75f9f09c75f9f09c75f00000000000003000200000000000800000000000af301000400000000000000000000000100000004", 0x5d, 0x8c60}], 0x0, &(0x7f0000010f60)) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) getdents64(r0, 0x0, 0x3) [ 2128.265752] EXT4-fs (loop3): warning: mounting unchecked fs, running e2fsck is recommended [ 2128.271774] EXT4-fs (loop3): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: none. [ 2128.279571] loop5: detected capacity change from 0 to 542 04:08:47 executing program 6: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="1000000040000000030000002b00000005000000010000000000000000000000002000000020000010000000000000009f09c75f0000ffff53ef", 0x3a, 0x400}, {&(0x7f0000010100)="000000000000000000000000000000000000000000000000000000005178aedb030000001300000023", 0x29, 0x7e0}, {&(0x7f0000010ce0)="00000000000000000000000000000000000000000000000000000000c99b0000ed410000000400009f09c75f9f09c75f9f09c75f00000000000003000200000000000800000000000af301000400000000000000000000000100000004", 0x5d, 0x8c60}], 0x0, &(0x7f0000010f60)) getdents64(0xffffffffffffffff, &(0x7f0000000040)=""/4, 0x4) [ 2128.281996] EXT4-fs error (device loop3): ext4_readdir:262: inode #2: block 4: comm syz-executor.3: path /syzkaller-testdir621642535/syzkaller.Ms8KeX/426/mnt: bad entry in directory: rec_len is smaller than minimal - offset=0, inode=0, rec_len=0, size=1024 fake=0 [ 2128.283614] EXT4-fs (loop6): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 2128.285634] loop1: detected capacity change from 0 to 140 [ 2128.286006] EXT4-fs (loop7): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 2128.286594] FAULT_INJECTION: forcing a failure. [ 2128.286594] name failslab, interval 1, probability 0, space 0, times 0 [ 2128.288919] CPU: 0 UID: 0 PID: 14977 Comm: syz-executor.1 Not tainted 6.18.0-rc5-next-20251111 #1 PREEMPT(voluntary) [ 2128.288951] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2128.288966] Call Trace: [ 2128.288975] [ 2128.288985] dump_stack_lvl+0xfa/0x120 [ 2128.289015] should_fail_ex+0x4d7/0x5e0 [ 2128.289044] should_failslab+0xc2/0x120 [ 2128.289070] __kmalloc_cache_noprof+0x81/0x6b0 [ 2128.289100] ? lock_release+0xc8/0x290 [ 2128.289134] ? kobject_uevent_env+0x22e/0xf90 [ 2128.289172] ? kobject_uevent_env+0x22e/0xf90 [ 2128.289203] kobject_uevent_env+0x22e/0xf90 [ 2128.289240] ? lock_is_held_type+0x9e/0x120 [ 2128.289280] loop_configure+0xe31/0x15a0 [ 2128.289343] ? __pfx_loop_configure+0x10/0x10 [ 2128.289397] ? avc_has_extended_perms+0x107/0xf20 [ 2128.289427] ? find_held_lock+0x2b/0x80 [ 2128.289453] ? avc_has_extended_perms+0x23b/0xf20 [ 2128.289482] ? lock_release+0xc8/0x290 [ 2128.289518] lo_ioctl+0x66d/0x1ca0 [ 2128.289545] ? __pfx_lo_ioctl+0x10/0x10 [ 2128.289567] ? __pfx_avc_has_extended_perms+0x10/0x10 [ 2128.289605] ? lock_acquire+0x15e/0x2f0 [ 2128.289637] ? __virt_addr_valid+0x1c6/0x5d0 [ 2128.289663] ? __pfx_perf_trace_preemptirq_template+0x10/0x10 [ 2128.289703] ? __pfx_perf_trace_preemptirq_template+0x10/0x10 [ 2128.289739] ? __pfx_perf_trace_preemptirq_template+0x10/0x10 [ 2128.289775] ? lock_release+0xc8/0x290 [ 2128.289810] ? __sanitizer_cov_trace_switch+0x54/0x90 [ 2128.289867] ? lockdep_softirqs_off+0x110/0x110 [ 2128.289902] ? __fget_files+0x34/0x3b0 [ 2128.289938] ? find_held_lock+0x2b/0x80 [ 2128.289962] ? __fget_files+0x203/0x3b0 [ 2128.289999] ? __pfx_lo_ioctl+0x10/0x10 [ 2128.290021] blkdev_ioctl+0x365/0x6d0 [ 2128.290058] ? __pfx_blkdev_ioctl+0x10/0x10 [ 2128.290089] ? selinux_file_ioctl+0xb9/0x280 [ 2128.290128] ? __pfx_blkdev_ioctl+0x10/0x10 [ 2128.290161] __x64_sys_ioctl+0x18f/0x210 [ 2128.290196] do_syscall_64+0xbf/0x430 [ 2128.290222] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 2128.290247] RIP: 0033:0x7f52e79b48d7 [ 2128.290266] Code: 3c 1c 48 f7 d8 49 39 c4 72 b8 e8 a4 54 02 00 85 c0 78 bd 48 83 c4 08 4c 89 e0 5b 41 5c c3 0f 1f 44 00 00 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2128.290289] RSP: 002b:00007f52e4f29f48 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 2128.290312] RAX: ffffffffffffffda RBX: 00007f52e79fe970 RCX: 00007f52e79b48d7 [ 2128.290328] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 2128.290343] RBP: 0000000000000005 R08: 0000000000000000 R09: ffffffffffffffff [ 2128.290357] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000004 [ 2128.290371] R13: 0000000000000004 R14: 0000000020000248 R15: 0000000000000003 [ 2128.290403] [ 2128.346596] EXT4-fs (loop5): mounting ext2 file system using the ext4 subsystem 04:08:47 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="1000000040000000030000002b00000005000000010000000000000000000000002000000020000010000000000000009f09c7", 0x33, 0x400}, {&(0x7f0000010100)="000000000000000000000000000000000000000000000000000000005178aedb030000001300000023", 0x29, 0x7e0}, {&(0x7f0000010ce0)="00000000000000000000000000000000000000000000000000000000c99b0000ed410000000400009f09c75f9f09c75f9f09c75f00000000000003000200000000000800000000000af3010004", 0x4d, 0x8c60}], 0x0, &(0x7f0000010f60)) 04:08:47 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="1000000040000000030000002b00000005000000010000000000000000000000002000000020000010000000000000009f09c75f0000ffff53ef", 0x3a, 0x400}, {&(0x7f0000010080)="000000000000000000000000ede2de4df49d4f87b54a3176cfd4eb4f010040000c000000000000009f09c75f", 0x2c, 0x4e0}, {&(0x7f0000010100), 0x0, 0x7e0}, {&(0x7f0000010ce0)="00000000000000000000000000000000000000000000000000000000c99b0000ed410000000400009f09c75f9f09c75f9f09c75f00000000000003000200000000000800000000000af3010004", 0x4d, 0x8c60}], 0x0, &(0x7f0000010f60)) [ 2128.371130] EXT4-fs (loop5): warning: mounting unchecked fs, running e2fsck is recommended [ 2128.384298] loop4: detected capacity change from 0 to 140 [ 2128.392429] EXT4-fs (loop5): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: none. [ 2128.401022] EXT4-fs (loop4): ext4_check_descriptors: Block bitmap for group 0 not in group (block 0)! [ 2128.401793] EXT4-fs (loop4): group descriptors corrupted! [ 2128.412838] EXT4-fs error (device loop1): ext4_ext_check_inode:523: inode #2: comm syz-executor.1: pblk 0 bad header/extent: invalid extent entries - magic f30a, entries 1, max 4(4), depth 0(0) [ 2128.423795] EXT4-fs (loop1): get root inode failed [ 2128.423817] EXT4-fs (loop3): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 2128.424237] EXT4-fs (loop1): mount failed [ 2128.425129] EXT4-fs (loop5): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 2128.446723] loop0: detected capacity change from 0 to 140 04:08:47 executing program 3: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="1000000040000000030000002b00000005000000010000000000000000000000002000000020000010000000000000009f09c75f0000ffff53ef", 0x3a, 0x400}, {&(0x7f0000010100)="000000000000000000000000000000000000000000000000000000005178aedb030000001300000023", 0x29, 0x7e0}, {&(0x7f0000010ce0)="00000000000000000000000000000000000000000000000000000000c99b0000ed410000000400009f09c75f9f09c75f9f09c75f00000000000003000200000000000800000000000af301000400000000000000000000000100000004", 0x5d, 0x8c60}], 0x0, &(0x7f0000010f60)) getdents64(r0, 0x0, 0xd) [ 2128.462516] EXT4-fs (loop0): VFS: Can't find ext4 filesystem [ 2128.473336] loop3: detected capacity change from 0 to 140 [ 2128.479410] loop6: detected capacity change from 0 to 140 [ 2128.481824] EXT4-fs (loop3): warning: mounting unchecked fs, running e2fsck is recommended [ 2128.489097] EXT4-fs (loop3): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: none. [ 2128.494999] EXT4-fs error (device loop3): ext4_readdir:262: inode #2: block 4: comm syz-executor.3: path /syzkaller-testdir621642535/syzkaller.Ms8KeX/427/mnt: bad entry in directory: rec_len is smaller than minimal - offset=0, inode=0, rec_len=0, size=1024 fake=0 [ 2128.504497] EXT4-fs (loop6): warning: mounting unchecked fs, running e2fsck is recommended [ 2128.513603] EXT4-fs (loop6): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: none. 04:08:47 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="1000000040000000030000002b00000005000000010000000000000000000000002000000020000010000000000000009f09c75f0000ffff53ef", 0x3a, 0x400}, {&(0x7f0000010100)="000000000000000000000000000000000000000000000000000000005178aedb030000001300000023", 0x29, 0x7e0}, {&(0x7f0000010ce0)="00000000000000000000000000000000000000000000000000000000c99b0000ed410000000400009f09c75f9f09c75f9f09c75f00000000000003000200000000000800000000000af3010004000000000000000000000001", 0x59, 0x8c60}], 0x0, &(0x7f0000010f60)) (fail_nth: 43) [ 2128.533446] EXT4-fs (loop3): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 2128.540757] loop7: detected capacity change from 0 to 140 04:08:47 executing program 5: creat(&(0x7f00000003c0)='./file0\x00', 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext2\x00', &(0x7f0000000100)='./file0\x00', 0x43ede, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}], 0x0, &(0x7f0000013c00)=ANY=[]) 04:08:47 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="1000000040000000030000002b00000005000000010000000000000000000000002000000020000010000000000000009f09c75f0000ffff53ef", 0x3a, 0x400}, {&(0x7f0000010080)="000000000000000000000000ede2de4df49d4f87b54a3176cfd4eb4f010040000c000000000000009f09c75f", 0x2c, 0x4e0}, {&(0x7f0000010100), 0x0, 0x7e0}, {&(0x7f0000010ce0)="00000000000000000000000000000000000000000000000000000000c99b0000ed410000000400009f09c75f9f09c75f9f09c75f00000000000003000200000000000800000000000af3010004", 0x4d, 0x8c60}], 0x0, &(0x7f0000010f60)) 04:08:47 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="1000000040000000030000002b00000005000000010000000000000000000000002000000020000010000000000000009f09c7", 0x33, 0x400}, {&(0x7f0000010100)="000000000000000000000000000000000000000000000000000000005178aedb030000001300000023", 0x29, 0x7e0}, {&(0x7f0000010ce0)="00000000000000000000000000000000000000000000000000000000c99b0000ed410000000400009f09c75f9f09c75f9f09c75f00000000000003000200000000000800000000000af3010004", 0x4d, 0x8c60}], 0x0, &(0x7f0000010f60)) 04:08:47 executing program 3: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="1000000040000000030000002b00000005000000010000000000000000000000002000000020000010000000000000009f09c75f0000ffff53ef", 0x3a, 0x400}, {&(0x7f0000010100)="000000000000000000000000000000000000000000000000000000005178aedb030000001300000023", 0x29, 0x7e0}, {&(0x7f0000010ce0)="00000000000000000000000000000000000000000000000000000000c99b0000ed410000000400009f09c75f9f09c75f9f09c75f00000000000003000200000000000800000000000af301000400000000000000000000000100000004", 0x5d, 0x8c60}], 0x0, &(0x7f0000010f60)) getdents64(r0, 0x0, 0x10) [ 2128.597570] EXT4-fs (loop7): warning: mounting unchecked fs, running e2fsck is recommended [ 2128.613347] EXT4-fs (loop7): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: none. [ 2128.613415] loop4: detected capacity change from 0 to 140 [ 2128.622243] EXT4-fs error (device loop7): ext4_readdir:262: inode #2: block 4: comm syz-executor.7: path /syzkaller-testdir823765038/syzkaller.a3rO6g/425/mnt: bad entry in directory: rec_len is smaller than minimal - offset=0, inode=0, rec_len=0, size=1024 fake=0 [ 2128.632325] loop3: detected capacity change from 0 to 140 [ 2128.634437] loop1: detected capacity change from 0 to 140 [ 2128.640772] FAULT_INJECTION: forcing a failure. [ 2128.640772] name failslab, interval 1, probability 0, space 0, times 0 [ 2128.642331] CPU: 1 UID: 0 PID: 15003 Comm: syz-executor.1 Not tainted 6.18.0-rc5-next-20251111 #1 PREEMPT(voluntary) [ 2128.642355] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2128.642366] Call Trace: [ 2128.642372] [ 2128.642379] dump_stack_lvl+0xfa/0x120 [ 2128.642403] should_fail_ex+0x4d7/0x5e0 [ 2128.642424] should_failslab+0xc2/0x120 [ 2128.642442] __kmalloc_cache_noprof+0x81/0x6b0 [ 2128.642464] ? lock_release+0xc8/0x290 [ 2128.642489] ? kobject_uevent_env+0x22e/0xf90 [ 2128.642516] ? kobject_uevent_env+0x22e/0xf90 [ 2128.642538] kobject_uevent_env+0x22e/0xf90 [ 2128.642564] ? lock_is_held_type+0x9e/0x120 [ 2128.642593] loop_configure+0xe31/0x15a0 [ 2128.642637] ? __pfx_loop_configure+0x10/0x10 [ 2128.642675] ? avc_has_extended_perms+0x107/0xf20 [ 2128.642697] ? find_held_lock+0x2b/0x80 [ 2128.642714] ? avc_has_extended_perms+0x23b/0xf20 [ 2128.642735] ? lock_release+0xc8/0x290 [ 2128.642760] lo_ioctl+0x66d/0x1ca0 [ 2128.642779] ? __pfx_lo_ioctl+0x10/0x10 [ 2128.642794] ? __pfx_avc_has_extended_perms+0x10/0x10 [ 2128.642821] ? lock_acquire+0x15e/0x2f0 [ 2128.642843] ? __virt_addr_valid+0x1c6/0x5d0 [ 2128.642862] ? __pfx_perf_trace_preemptirq_template+0x10/0x10 [ 2128.642890] ? __pfx_perf_trace_preemptirq_template+0x10/0x10 [ 2128.642922] ? __pfx_perf_trace_preemptirq_template+0x10/0x10 [ 2128.642947] ? lock_release+0xc8/0x290 [ 2128.642972] ? __sanitizer_cov_trace_switch+0x54/0x90 [ 2128.643012] ? lockdep_softirqs_off+0x110/0x110 [ 2128.643036] ? __fget_files+0x34/0x3b0 [ 2128.643063] ? find_held_lock+0x2b/0x80 [ 2128.643080] ? __fget_files+0x203/0x3b0 [ 2128.643106] ? __pfx_lo_ioctl+0x10/0x10 [ 2128.643121] blkdev_ioctl+0x365/0x6d0 [ 2128.643144] ? __pfx_blkdev_ioctl+0x10/0x10 [ 2128.643166] ? selinux_file_ioctl+0xb9/0x280 [ 2128.643194] ? __pfx_blkdev_ioctl+0x10/0x10 [ 2128.643217] __x64_sys_ioctl+0x18f/0x210 [ 2128.643242] do_syscall_64+0xbf/0x430 [ 2128.643261] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 2128.643278] RIP: 0033:0x7f52e79b48d7 [ 2128.643291] Code: 3c 1c 48 f7 d8 49 39 c4 72 b8 e8 a4 54 02 00 85 c0 78 bd 48 83 c4 08 4c 89 e0 5b 41 5c c3 0f 1f 44 00 00 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2128.643307] RSP: 002b:00007f52e4f29f48 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 2128.643324] RAX: ffffffffffffffda RBX: 00007f52e79fe970 RCX: 00007f52e79b48d7 [ 2128.643335] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 2128.643345] RBP: 0000000000000005 R08: 0000000000000000 R09: ffffffffffffffff [ 2128.643356] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000004 [ 2128.643366] R13: 0000000000000004 R14: 0000000020000248 R15: 0000000000000003 [ 2128.643388] [ 2128.689409] loop5: detected capacity change from 0 to 543 [ 2128.698466] EXT4-fs (loop5): mounting ext2 file system using the ext4 subsystem 04:08:47 executing program 6: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="1000000040000000030000002b00000005000000010000000000000000000000002000000020000010000000000000009f09c75f0000ffff53ef", 0x3a, 0x400}, {&(0x7f0000010100)="000000000000000000000000000000000000000000000000000000005178aedb030000001300000023", 0x29, 0x7e0}, {&(0x7f0000010ce0)="00000000000000000000000000000000000000000000000000000000c99b0000ed410000000400009f09c75f9f09c75f9f09c75f00000000000003000200000000000800000000000af301000400000000000000000000000100000004", 0x5d, 0x8c60}], 0x0, &(0x7f0000010f60)) getdents64(0xffffffffffffffff, &(0x7f0000000040)=""/4, 0x4) [ 2128.701431] EXT4-fs (loop4): ext4_check_descriptors: Block bitmap for group 0 not in group (block 0)! [ 2128.702977] EXT4-fs (loop4): group descriptors corrupted! [ 2128.711006] EXT4-fs (loop5): warning: mounting unchecked fs, running e2fsck is recommended [ 2128.713858] loop0: detected capacity change from 0 to 140 [ 2128.716309] EXT4-fs (loop3): warning: mounting unchecked fs, running e2fsck is recommended [ 2128.721239] EXT4-fs (loop6): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 2128.729119] EXT4-fs (loop0): VFS: Can't find ext4 filesystem [ 2128.731300] EXT4-fs (loop5): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: none. [ 2128.765017] EXT4-fs (loop5): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 2128.788493] EXT4-fs (loop3): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: none. [ 2128.793975] EXT4-fs (loop7): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 2128.796682] EXT4-fs error (device loop1): ext4_ext_check_inode:523: inode #2: comm syz-executor.1: pblk 0 bad header/extent: invalid extent entries - magic f30a, entries 1, max 4(4), depth 0(0) [ 2128.876710] EXT4-fs (loop1): get root inode failed [ 2128.877864] EXT4-fs (loop1): mount failed [ 2128.900469] loop6: detected capacity change from 0 to 140 [ 2128.937992] EXT4-fs (loop3): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 2128.950308] EXT4-fs (loop6): warning: mounting unchecked fs, running e2fsck is recommended [ 2128.991755] EXT4-fs (loop6): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: none. [ 2129.062771] EXT4-fs (loop6): unmounting filesystem 00000000-0000-0000-0000-000000000000. 04:08:56 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="1000000040000000030000002b00000005000000010000000000000000000000002000000020000010000000000000009f09c7", 0x33, 0x400}, {&(0x7f0000010100)="000000000000000000000000000000000000000000000000000000005178aedb030000001300000023", 0x29, 0x7e0}, {&(0x7f0000010ce0)="00000000000000000000000000000000000000000000000000000000c99b0000ed410000000400009f09c75f9f09c75f9f09c75f00000000000003000200000000000800000000000af3010004", 0x4d, 0x8c60}], 0x0, &(0x7f0000010f60)) 04:08:56 executing program 2: sendmsg$NL80211_CMD_UNEXPECTED_FRAME(0xffffffffffffffff, &(0x7f0000000400)={0x0, 0x0, &(0x7f0000000300)={&(0x7f00000002c0)={0x1c, 0x0, 0x1, 0x0, 0x0, {{}, {@val={0x8}, @void}}}, 0x1c}}, 0x0) sendmsg$NL80211_CMD_UPDATE_FT_IES(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000001c0)={0x24, 0x0, 0x1, 0x70bd2c, 0x0, {{}, {@val={0x8}, @void}}, [@NL80211_ATTR_MDID={0x6, 0xb1, 0xc116}]}, 0x24}, 0x1, 0x0, 0x0, 0x80}, 0xc000) r0 = creat(&(0x7f00000003c0)='./file1\x00', 0x0) sendmsg$netlink(0xffffffffffffffff, 0x0, 0x0) dup(0xffffffffffffffff) pwritev2(r0, &(0x7f0000000380)=[{&(0x7f0000000180)="bd", 0xfffffdef}], 0x1, 0x1200, 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) ioctl$FS_IOC_FSSETXATTR(r1, 0x401c5820, &(0x7f0000000200)={0x9, 0xc}) syz_io_uring_setup(0x0, &(0x7f0000000000)={0x0, 0x0, 0x4, 0x2, 0x309}, &(0x7f0000ffc000/0x2000)=nil, &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000000080), &(0x7f0000000240)) syz_io_uring_submit(0x0, 0x0, &(0x7f0000000280)=@IORING_OP_ASYNC_CANCEL={0xe, 0x0, 0x0, 0x0, 0x0, 0x12345}, 0x1ff) 04:08:56 executing program 6: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="1000000040000000030000002b00000005000000010000000000000000000000002000000020000010000000000000009f09c75f0000ffff53ef", 0x3a, 0x400}, {&(0x7f0000010100)="000000000000000000000000000000000000000000000000000000005178aedb030000001300000023", 0x29, 0x7e0}, {&(0x7f0000010ce0)="00000000000000000000000000000000000000000000000000000000c99b0000ed410000000400009f09c75f9f09c75f9f09c75f00000000000003000200000000000800000000000af301000400000000000000000000000100000004", 0x5d, 0x8c60}], 0x0, &(0x7f0000010f60)) getdents64(r0, 0x0, 0x0) 04:08:56 executing program 3: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="1000000040000000030000002b00000005000000010000000000000000000000002000000020000010000000000000009f09c75f0000ffff53ef", 0x3a, 0x400}, {&(0x7f0000010100)="000000000000000000000000000000000000000000000000000000005178aedb030000001300000023", 0x29, 0x7e0}, {&(0x7f0000010ce0)="00000000000000000000000000000000000000000000000000000000c99b0000ed410000000400009f09c75f9f09c75f9f09c75f00000000000003000200000000000800000000000af301000400000000000000000000000100000004", 0x5d, 0x8c60}], 0x0, &(0x7f0000010f60)) getdents64(r0, 0x0, 0xc0) 04:08:56 executing program 5: creat(&(0x7f00000003c0)='./file0\x00', 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext2\x00', &(0x7f0000000100)='./file0\x00', 0x43f00, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}], 0x0, &(0x7f0000013c00)=ANY=[]) 04:08:56 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="1000000040000000030000002b00000005000000010000000000000000000000002000000020000010000000000000009f09c75f0000ffff53ef", 0x3a, 0x400}, {&(0x7f0000010100)="000000000000000000000000000000000000000000000000000000005178aedb030000001300000023", 0x29, 0x7e0}, {&(0x7f0000010ce0)="00000000000000000000000000000000000000000000000000000000c99b0000ed410000000400009f09c75f9f09c75f9f09c75f00000000000003000200000000000800000000000af3010004000000000000000000000001", 0x59, 0x8c60}], 0x0, &(0x7f0000010f60)) (fail_nth: 44) 04:08:56 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="1000000040000000030000002b00000005000000010000000000000000000000002000000020000010000000000000009f09c75f0000ffff53ef", 0x3a, 0x400}, {&(0x7f0000010080)="000000000000000000000000ede2de4df49d4f87b54a3176cfd4eb4f010040000c000000000000009f09c75f", 0x2c, 0x4e0}, {&(0x7f0000010100)='\x00'/21, 0x15, 0x7e0}, {&(0x7f0000010ce0)="00000000000000000000000000000000000000000000000000000000c99b0000ed410000000400009f09c75f9f09c75f9f09c75f00000000000003000200000000000800000000000af3010004", 0x4d, 0x8c60}], 0x0, &(0x7f0000010f60)) 04:08:56 executing program 7: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="1000000040000000030000002b00000005000000010000000000000000000000002000000020000010000000000000009f09c75f0000ffff53ef", 0x3a, 0x400}, {&(0x7f0000010100)="000000000000000000000000000000000000000000000000000000005178aedb030000001300000023", 0x29, 0x7e0}, {&(0x7f0000010ce0)="00000000000000000000000000000000000000000000000000000000c99b0000ed410000000400009f09c75f9f09c75f9f09c75f00000000000003000200000000000800000000000af301000400000000000000000000000100000004", 0x5d, 0x8c60}], 0x0, &(0x7f0000010f60)) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) getdents64(r0, 0x0, 0x4) [ 2138.063123] loop7: detected capacity change from 0 to 140 [ 2138.063890] loop0: detected capacity change from 0 to 140 [ 2138.075228] EXT4-fs (loop7): warning: mounting unchecked fs, running e2fsck is recommended [ 2138.077184] EXT4-fs (loop0): VFS: Can't find ext4 filesystem [ 2138.086967] EXT4-fs (loop7): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: none. [ 2138.102537] loop3: detected capacity change from 0 to 140 [ 2138.106108] loop1: detected capacity change from 0 to 140 [ 2138.109296] EXT4-fs (loop3): warning: mounting unchecked fs, running e2fsck is recommended [ 2138.111040] EXT4-fs error (device loop7): ext4_readdir:262: inode #2: block 4: comm syz-executor.7: path /syzkaller-testdir823765038/syzkaller.a3rO6g/426/mnt: bad entry in directory: rec_len is smaller than minimal - offset=0, inode=0, rec_len=0, size=1024 fake=0 [ 2138.115128] EXT4-fs (loop3): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: none. [ 2138.115621] loop6: detected capacity change from 0 to 140 [ 2138.120521] loop5: detected capacity change from 0 to 543 [ 2138.124274] FAULT_INJECTION: forcing a failure. [ 2138.124274] name failslab, interval 1, probability 0, space 0, times 0 [ 2138.125418] loop4: detected capacity change from 0 to 140 [ 2138.126142] CPU: 1 UID: 0 PID: 15044 Comm: syz-executor.1 Not tainted 6.18.0-rc5-next-20251111 #1 PREEMPT(voluntary) [ 2138.126176] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2138.126190] Call Trace: [ 2138.126198] [ 2138.126208] dump_stack_lvl+0xfa/0x120 [ 2138.126240] should_fail_ex+0x4d7/0x5e0 [ 2138.126268] should_failslab+0xc2/0x120 [ 2138.126294] __kmalloc_noprof+0xcd/0x680 [ 2138.126321] ? __create_object+0x59/0x80 [ 2138.126351] ? kobject_get_path+0xc9/0x200 [ 2138.126377] ? trace_kmalloc+0x1f/0xb0 [ 2138.126403] kobject_get_path+0xc9/0x200 [ 2138.126431] ? kasan_save_track+0x14/0x30 [ 2138.126459] kobject_uevent_env+0x252/0xf90 [ 2138.126496] ? lock_is_held_type+0x9e/0x120 [ 2138.126537] loop_configure+0xe31/0x15a0 [ 2138.126600] ? __pfx_loop_configure+0x10/0x10 [ 2138.126654] ? avc_has_extended_perms+0x107/0xf20 [ 2138.126684] ? find_held_lock+0x2b/0x80 [ 2138.126712] ? avc_has_extended_perms+0x23b/0xf20 [ 2138.126741] ? lock_release+0xc8/0x290 [ 2138.126777] lo_ioctl+0x66d/0x1ca0 [ 2138.126805] ? __pfx_lo_ioctl+0x10/0x10 [ 2138.126826] ? __pfx_avc_has_extended_perms+0x10/0x10 [ 2138.126864] ? lock_acquire+0x15e/0x2f0 [ 2138.126896] ? __virt_addr_valid+0x1c6/0x5d0 [ 2138.126930] ? __pfx_perf_trace_preemptirq_template+0x10/0x10 [ 2138.126970] ? __pfx_perf_trace_preemptirq_template+0x10/0x10 [ 2138.127006] ? __pfx_perf_trace_preemptirq_template+0x10/0x10 [ 2138.127042] ? lock_release+0xc8/0x290 [ 2138.127077] ? __sanitizer_cov_trace_switch+0x54/0x90 [ 2138.127135] ? lockdep_softirqs_off+0x110/0x110 [ 2138.127169] ? __fget_files+0x34/0x3b0 [ 2138.127205] ? find_held_lock+0x2b/0x80 [ 2138.127230] ? __fget_files+0x203/0x3b0 [ 2138.127266] ? __pfx_lo_ioctl+0x10/0x10 [ 2138.127288] blkdev_ioctl+0x365/0x6d0 [ 2138.127320] ? __pfx_blkdev_ioctl+0x10/0x10 [ 2138.127352] ? selinux_file_ioctl+0xb9/0x280 [ 2138.127391] ? __pfx_blkdev_ioctl+0x10/0x10 [ 2138.127424] __x64_sys_ioctl+0x18f/0x210 [ 2138.127459] do_syscall_64+0xbf/0x430 [ 2138.127486] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 2138.127510] RIP: 0033:0x7f52e79b48d7 [ 2138.127530] Code: 3c 1c 48 f7 d8 49 39 c4 72 b8 e8 a4 54 02 00 85 c0 78 bd 48 83 c4 08 4c 89 e0 5b 41 5c c3 0f 1f 44 00 00 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2138.127553] RSP: 002b:00007f52e4f29f48 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 2138.127577] RAX: ffffffffffffffda RBX: 00007f52e79fe970 RCX: 00007f52e79b48d7 [ 2138.127593] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 2138.127608] RBP: 0000000000000005 R08: 0000000000000000 R09: ffffffffffffffff [ 2138.127622] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000004 [ 2138.127637] R13: 0000000000000004 R14: 0000000020000248 R15: 0000000000000003 [ 2138.127668] [ 2138.135642] EXT4-fs error (device loop3): ext4_readdir:262: inode #2: block 4: comm syz-executor.3: path /syzkaller-testdir621642535/syzkaller.Ms8KeX/429/mnt: bad entry in directory: rec_len is smaller than minimal - offset=0, inode=0, rec_len=0, size=1024 fake=0 [ 2138.190182] EXT4-fs (loop4): ext4_check_descriptors: Block bitmap for group 0 not in group (block 0)! [ 2138.192166] EXT4-fs (loop4): group descriptors corrupted! [ 2138.196517] EXT4-fs (loop5): mounting ext2 file system using the ext4 subsystem 04:08:57 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="1000000040000000030000002b00000005000000010000000000000000000000002000000020000010000000000000009f09c75f0000ff", 0x37, 0x400}, {&(0x7f0000010100)="000000000000000000000000000000000000000000000000000000005178aedb030000001300000023", 0x29, 0x7e0}, {&(0x7f0000010ce0)="00000000000000000000000000000000000000000000000000000000c99b0000ed410000000400009f09c75f9f09c75f9f09c75f00000000000003000200000000000800000000000af3010004", 0x4d, 0x8c60}], 0x0, &(0x7f0000010f60)) [ 2138.285913] EXT4-fs (loop6): warning: mounting unchecked fs, running e2fsck is recommended [ 2138.295430] EXT4-fs (loop5): warning: mounting unchecked fs, running e2fsck is recommended [ 2138.298147] EXT4-fs error (device loop1): ext4_ext_check_inode:523: inode #2: comm syz-executor.1: pblk 0 bad header/extent: invalid extent entries - magic f30a, entries 1, max 4(4), depth 0(0) [ 2138.313749] EXT4-fs (loop6): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: none. [ 2138.330338] EXT4-fs (loop5): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: none. [ 2138.341410] loop0: detected capacity change from 0 to 140 [ 2138.348521] EXT4-fs (loop1): get root inode failed [ 2138.349420] EXT4-fs (loop1): mount failed [ 2138.365347] EXT4-fs (loop0): VFS: Can't find ext4 filesystem [ 2138.381359] EXT4-fs (loop5): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 2138.383225] EXT4-fs (loop7): unmounting filesystem 00000000-0000-0000-0000-000000000000. 04:08:57 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="1000000040000000030000002b00000005000000010000000000000000000000002000000020000010000000000000009f09c75f0000ffff53ef", 0x3a, 0x400}, {&(0x7f0000010080)="000000000000000000000000ede2de4df49d4f87b54a3176cfd4eb4f010040000c000000000000009f09c75f", 0x2c, 0x4e0}, {&(0x7f0000010100)='\x00'/21, 0x15, 0x7e0}, {&(0x7f0000010ce0)="00000000000000000000000000000000000000000000000000000000c99b0000ed410000000400009f09c75f9f09c75f9f09c75f00000000000003000200000000000800000000000af3010004", 0x4d, 0x8c60}], 0x0, &(0x7f0000010f60)) [ 2138.398165] EXT4-fs (loop3): unmounting filesystem 00000000-0000-0000-0000-000000000000. 04:08:57 executing program 7: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="1000000040000000030000002b00000005000000010000000000000000000000002000000020000010000000000000009f09c75f0000ffff53ef", 0x3a, 0x400}, {&(0x7f0000010100)="000000000000000000000000000000000000000000000000000000005178aedb030000001300000023", 0x29, 0x7e0}, {&(0x7f0000010ce0)="00000000000000000000000000000000000000000000000000000000c99b0000ed410000000400009f09c75f9f09c75f9f09c75f00000000000003000200000000000800000000000af301000400000000000000000000000100000004", 0x5d, 0x8c60}], 0x0, &(0x7f0000010f60)) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) getdents64(r0, 0x0, 0x5) 04:08:57 executing program 3: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="1000000040000000030000002b00000005000000010000000000000000000000002000000020000010000000000000009f09c75f0000ffff53ef", 0x3a, 0x400}, {&(0x7f0000010100)="000000000000000000000000000000000000000000000000000000005178aedb030000001300000023", 0x29, 0x7e0}, {&(0x7f0000010ce0)="00000000000000000000000000000000000000000000000000000000c99b0000ed410000000400009f09c75f9f09c75f9f09c75f00000000000003000200000000000800000000000af301000400000000000000000000000100000004", 0x5d, 0x8c60}], 0x0, &(0x7f0000010f60)) getdents64(r0, 0x0, 0x300) 04:08:57 executing program 6: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="1000000040000000030000002b00000005000000010000000000000000000000002000000020000010000000000000009f09c75f0000ffff53ef", 0x3a, 0x400}, {&(0x7f0000010100)="000000000000000000000000000000000000000000000000000000005178aedb030000001300000023", 0x29, 0x7e0}, {&(0x7f0000010ce0)="00000000000000000000000000000000000000000000000000000000c99b0000ed410000000400009f09c75f9f09c75f9f09c75f00000000000003000200000000000800000000000af301000400000000000000000000000100000004", 0x5d, 0x8c60}], 0x0, &(0x7f0000010f60)) getdents64(r0, 0x0, 0x0) 04:08:57 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="1000000040000000030000002b00000005000000010000000000000000000000002000000020000010000000000000009f09c75f0000ff", 0x37, 0x400}, {&(0x7f0000010100)="000000000000000000000000000000000000000000000000000000005178aedb030000001300000023", 0x29, 0x7e0}, {&(0x7f0000010ce0)="00000000000000000000000000000000000000000000000000000000c99b0000ed410000000400009f09c75f9f09c75f9f09c75f00000000000003000200000000000800000000000af3010004", 0x4d, 0x8c60}], 0x0, &(0x7f0000010f60)) [ 2138.457760] EXT4-fs (loop6): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 2138.510447] loop0: detected capacity change from 0 to 140 [ 2138.512563] EXT4-fs (loop0): VFS: Can't find ext4 filesystem [ 2138.521106] loop4: detected capacity change from 0 to 140 04:08:57 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="1000000040000000030000002b00000005000000010000000000000000000000002000000020000010000000000000009f09c75f0000ff", 0x37, 0x400}, {&(0x7f0000010100)="000000000000000000000000000000000000000000000000000000005178aedb030000001300000023", 0x29, 0x7e0}, {&(0x7f0000010ce0)="00000000000000000000000000000000000000000000000000000000c99b0000ed410000000400009f09c75f9f09c75f9f09c75f00000000000003000200000000000800000000000af3010004", 0x4d, 0x8c60}], 0x0, &(0x7f0000010f60)) [ 2138.538536] loop0: detected capacity change from 0 to 140 [ 2138.549009] EXT4-fs (loop4): ext4_check_descriptors: Block bitmap for group 0 not in group (block 0)! [ 2138.549771] EXT4-fs (loop4): group descriptors corrupted! [ 2138.554395] EXT4-fs (loop0): VFS: Can't find ext4 filesystem [ 2138.595136] loop3: detected capacity change from 0 to 140 [ 2138.609289] EXT4-fs (loop3): warning: mounting unchecked fs, running e2fsck is recommended [ 2138.613695] EXT4-fs (loop3): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: none. [ 2138.619293] EXT4-fs error (device loop3): ext4_readdir:262: inode #2: block 4: comm syz-executor.3: path /syzkaller-testdir621642535/syzkaller.Ms8KeX/430/mnt: bad entry in directory: rec_len is smaller than minimal - offset=0, inode=0, rec_len=0, size=1024 fake=0 [ 2138.643474] loop6: detected capacity change from 0 to 140 [ 2138.652740] EXT4-fs (loop6): warning: mounting unchecked fs, running e2fsck is recommended [ 2138.655519] EXT4-fs (loop6): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: none. [ 2138.664644] EXT4-fs error (device loop6): ext4_readdir:262: inode #2: block 4: comm syz-executor.6: path /syzkaller-testdir823133109/syzkaller.UCZRXl/407/mnt: bad entry in directory: rec_len is smaller than minimal - offset=0, inode=0, rec_len=0, size=1024 fake=0 [ 2138.719738] EXT4-fs (loop6): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 2138.721694] EXT4-fs (loop3): unmounting filesystem 00000000-0000-0000-0000-000000000000. 04:09:07 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="1000000040000000030000002b00000005000000010000000000000000000000002000000020000010000000000000009f09c75f0000ffff53ef", 0x3a, 0x400}, {&(0x7f0000010100)="000000000000000000000000000000000000000000000000000000005178aedb030000001300000023", 0x29, 0x7e0}, {&(0x7f0000010ce0)="00000000000000000000000000000000000000000000000000000000c99b0000ed410000000400009f09c75f9f09c75f9f09c75f00000000000003000200000000000800000000000af3010004000000000000000000000001", 0x59, 0x8c60}], 0x0, &(0x7f0000010f60)) (fail_nth: 45) 04:09:07 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="1000000040000000030000002b00000005000000010000000000000000000000002000000020000010000000000000009f09c75f0000ffff53ef", 0x3a, 0x400}, {&(0x7f0000010080)="000000000000000000000000ede2de4df49d4f87b54a3176cfd4eb4f010040000c000000000000009f09c75f", 0x2c, 0x4e0}, {&(0x7f0000010100)='\x00'/21, 0x15, 0x7e0}, {&(0x7f0000010ce0)="00000000000000000000000000000000000000000000000000000000c99b0000ed410000000400009f09c75f9f09c75f9f09c75f00000000000003000200000000000800000000000af3010004", 0x4d, 0x8c60}], 0x0, &(0x7f0000010f60)) 04:09:07 executing program 2: sendmsg$NL80211_CMD_UNEXPECTED_FRAME(0xffffffffffffffff, &(0x7f0000000400)={0x0, 0x0, &(0x7f0000000300)={&(0x7f00000002c0)={0x1c, 0x0, 0x1, 0x0, 0x0, {{}, {@val={0x8}, @void}}}, 0x1c}}, 0x0) sendmsg$NL80211_CMD_UPDATE_FT_IES(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000001c0)={0x24, 0x0, 0x1, 0x70bd2c, 0x0, {{}, {@val={0x8}, @void}}, [@NL80211_ATTR_MDID={0x6, 0xb1, 0xc116}]}, 0x24}, 0x1, 0x0, 0x0, 0x80}, 0xc000) r0 = creat(&(0x7f00000003c0)='./file1\x00', 0x0) sendmsg$netlink(0xffffffffffffffff, 0x0, 0x0) dup(0xffffffffffffffff) pwritev2(r0, &(0x7f0000000380)=[{&(0x7f0000000180)="bd", 0xfffffdef}], 0x1, 0x1200, 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) ioctl$FS_IOC_FSSETXATTR(r1, 0x401c5820, &(0x7f0000000200)={0x9, 0x10}) syz_io_uring_setup(0x0, &(0x7f0000000000)={0x0, 0x0, 0x4, 0x2, 0x309}, &(0x7f0000ffc000/0x2000)=nil, &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000000080), &(0x7f0000000240)) syz_io_uring_submit(0x0, 0x0, &(0x7f0000000280)=@IORING_OP_ASYNC_CANCEL={0xe, 0x0, 0x0, 0x0, 0x0, 0x12345}, 0x1ff) 04:09:07 executing program 6: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="1000000040000000030000002b00000005000000010000000000000000000000002000000020000010000000000000009f09c75f0000ffff53ef", 0x3a, 0x400}, {&(0x7f0000010100)="000000000000000000000000000000000000000000000000000000005178aedb030000001300000023", 0x29, 0x7e0}, {&(0x7f0000010ce0)="00000000000000000000000000000000000000000000000000000000c99b0000ed410000000400009f09c75f9f09c75f9f09c75f00000000000003000200000000000800000000000af301000400000000000000000000000100000004", 0x5d, 0x8c60}], 0x0, &(0x7f0000010f60)) getdents64(r0, 0x0, 0x0) (fail_nth: 1) 04:09:07 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="1000000040000000030000002b00000005000000010000000000000000000000002000000020000010000000000000009f09c75f0000ffff53", 0x39, 0x400}, {&(0x7f0000010100)="000000000000000000000000000000000000000000000000000000005178aedb030000001300000023", 0x29, 0x7e0}, {&(0x7f0000010ce0)="00000000000000000000000000000000000000000000000000000000c99b0000ed410000000400009f09c75f9f09c75f9f09c75f00000000000003000200000000000800000000000af3010004", 0x4d, 0x8c60}], 0x0, &(0x7f0000010f60)) 04:09:07 executing program 3: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="1000000040000000030000002b00000005000000010000000000000000000000002000000020000010000000000000009f09c75f0000ffff53ef", 0x3a, 0x400}, {&(0x7f0000010100)="000000000000000000000000000000000000000000000000000000005178aedb030000001300000023", 0x29, 0x7e0}, {&(0x7f0000010ce0)="00000000000000000000000000000000000000000000000000000000c99b0000ed410000000400009f09c75f9f09c75f9f09c75f00000000000003000200000000000800000000000af301000400000000000000000000000100000004", 0x5d, 0x8c60}], 0x0, &(0x7f0000010f60)) getdents64(r0, 0x0, 0x500) 04:09:07 executing program 7: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="1000000040000000030000002b00000005000000010000000000000000000000002000000020000010000000000000009f09c75f0000ffff53ef", 0x3a, 0x400}, {&(0x7f0000010100)="000000000000000000000000000000000000000000000000000000005178aedb030000001300000023", 0x29, 0x7e0}, {&(0x7f0000010ce0)="00000000000000000000000000000000000000000000000000000000c99b0000ed410000000400009f09c75f9f09c75f9f09c75f00000000000003000200000000000800000000000af301000400000000000000000000000100000004", 0x5d, 0x8c60}], 0x0, &(0x7f0000010f60)) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) getdents64(r0, 0x0, 0x6) 04:09:07 executing program 5: creat(&(0x7f00000003c0)='./file0\x00', 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext2\x00', &(0x7f0000000100)='./file0\x00', 0x43fde, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}], 0x0, &(0x7f0000013c00)=ANY=[]) [ 2148.488512] loop5: detected capacity change from 0 to 543 [ 2148.489821] loop0: detected capacity change from 0 to 140 [ 2148.495851] EXT4-fs (loop0): VFS: Can't find ext4 filesystem [ 2148.503575] EXT4-fs (loop5): mounting ext2 file system using the ext4 subsystem [ 2148.522766] EXT4-fs (loop5): warning: mounting unchecked fs, running e2fsck is recommended [ 2148.529562] loop7: detected capacity change from 0 to 140 [ 2148.535515] loop1: detected capacity change from 0 to 140 [ 2148.540452] EXT4-fs (loop7): warning: mounting unchecked fs, running e2fsck is recommended [ 2148.550617] EXT4-fs (loop7): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: none. [ 2148.556728] EXT4-fs error (device loop1): ext4_ext_check_inode:523: inode #2: comm syz-executor.1: pblk 0 bad header/extent: invalid extent entries - magic f30a, entries 1, max 4(4), depth 0(0) [ 2148.558134] EXT4-fs (loop5): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: none. [ 2148.560863] EXT4-fs (loop1): get root inode failed [ 2148.562002] EXT4-fs (loop1): mount failed [ 2148.566495] loop6: detected capacity change from 0 to 140 [ 2148.572360] loop4: detected capacity change from 0 to 140 [ 2148.575506] loop3: detected capacity change from 0 to 140 [ 2148.576692] EXT4-fs error (device loop7): ext4_readdir:262: inode #2: block 4: comm syz-executor.7: path /syzkaller-testdir823765038/syzkaller.a3rO6g/428/mnt: bad entry in directory: rec_len is smaller than minimal - offset=0, inode=0, rec_len=0, size=1024 fake=0 [ 2148.591609] EXT4-fs (loop3): warning: mounting unchecked fs, running e2fsck is recommended [ 2148.591761] EXT4-fs (loop5): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 2148.605358] EXT4-fs (loop3): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: none. [ 2148.608784] EXT4-fs (loop4): ext4_check_descriptors: Block bitmap for group 0 not in group (block 0)! [ 2148.610490] EXT4-fs (loop4): group descriptors corrupted! [ 2148.640788] EXT4-fs error (device loop3): ext4_readdir:262: inode #2: block 4: comm syz-executor.3: path /syzkaller-testdir621642535/syzkaller.Ms8KeX/431/mnt: bad entry in directory: rec_len is smaller than minimal - offset=0, inode=0, rec_len=0, size=1024 fake=0 [ 2148.659367] EXT4-fs (loop6): warning: mounting unchecked fs, running e2fsck is recommended [ 2148.670415] loop1: detected capacity change from 0 to 140 [ 2148.671464] FAULT_INJECTION: forcing a failure. [ 2148.671464] name failslab, interval 1, probability 0, space 0, times 0 [ 2148.672758] FAULT_INJECTION: forcing a failure. [ 2148.672758] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 2148.673275] CPU: 1 UID: 0 PID: 15116 Comm: syz-executor.1 Not tainted 6.18.0-rc5-next-20251111 #1 PREEMPT(voluntary) [ 2148.673307] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2148.673321] Call Trace: [ 2148.673328] [ 2148.673337] dump_stack_lvl+0xfa/0x120 [ 2148.673366] should_fail_ex+0x4d7/0x5e0 04:09:07 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="1000000040000000030000002b00000005000000010000000000000000000000002000000020000010000000000000009f09c75f0000ffff53ef", 0x3a, 0x400}, {&(0x7f0000010100)="000000000000000000000000000000000000000000000000000000005178aedb030000001300000023", 0x29, 0x7e0}, {&(0x7f0000010ce0)="00000000000000000000000000000000000000000000000000000000c99b0000ed410000000400009f09c75f9f09c75f9f09c75f00000000000003000200000000000800000000000af3010004000000000000000000000001", 0x59, 0x8c60}], 0x0, &(0x7f0000010f60)) (fail_nth: 46) 04:09:07 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="1000000040000000030000002b00000005000000010000000000000000000000002000000020000010000000000000009f09c75f0000ffff53", 0x39, 0x400}, {&(0x7f0000010100)="000000000000000000000000000000000000000000000000000000005178aedb030000001300000023", 0x29, 0x7e0}, {&(0x7f0000010ce0)="00000000000000000000000000000000000000000000000000000000c99b0000ed410000000400009f09c75f9f09c75f9f09c75f00000000000003000200000000000800000000000af3010004", 0x4d, 0x8c60}], 0x0, &(0x7f0000010f60)) [ 2148.673393] should_failslab+0xc2/0x120 [ 2148.673418] kmem_cache_alloc_node_noprof+0x87/0x6b0 [ 2148.673449] ? __lock_acquire+0x694/0x1b70 [ 2148.673480] ? __alloc_skb+0x2ab/0x370 [ 2148.673515] ? __alloc_skb+0x2ab/0x370 [ 2148.673539] __alloc_skb+0x2ab/0x370 [ 2148.673567] ? __pfx___alloc_skb+0x10/0x10 [ 2148.673592] ? lock_acquire+0x15e/0x2f0 [ 2148.673621] ? netlink_has_listeners+0x7f/0x430 [ 2148.673655] ? netlink_has_listeners+0x20d/0x430 [ 2148.673683] ? lock_release+0xc8/0x290 [ 2148.673717] alloc_uevent_skb+0x7b/0x210 [ 2148.673749] kobject_uevent_env+0xa8c/0xf90 [ 2148.673783] ? lock_is_held_type+0x9e/0x120 [ 2148.673820] loop_configure+0xe31/0x15a0 [ 2148.673879] ? __pfx_loop_configure+0x10/0x10 [ 2148.673938] ? avc_has_extended_perms+0x107/0xf20 [ 2148.673967] ? find_held_lock+0x2b/0x80 [ 2148.673990] ? avc_has_extended_perms+0x23b/0xf20 [ 2148.674017] ? lock_release+0xc8/0x290 [ 2148.674051] lo_ioctl+0x66d/0x1ca0 [ 2148.674076] ? __pfx_lo_ioctl+0x10/0x10 [ 2148.674096] ? __pfx_avc_has_extended_perms+0x10/0x10 [ 2148.674132] ? lock_acquire+0x15e/0x2f0 [ 2148.674161] ? __virt_addr_valid+0x1c6/0x5d0 [ 2148.674186] ? __pfx_perf_trace_preemptirq_template+0x10/0x10 [ 2148.674222] ? __pfx_perf_trace_preemptirq_template+0x10/0x10 [ 2148.674256] ? __pfx_perf_trace_preemptirq_template+0x10/0x10 [ 2148.674289] ? lock_release+0xc8/0x290 [ 2148.674322] ? __sanitizer_cov_trace_switch+0x54/0x90 [ 2148.674376] ? lockdep_softirqs_off+0x110/0x110 [ 2148.674408] ? __fget_files+0x34/0x3b0 [ 2148.674442] ? find_held_lock+0x2b/0x80 [ 2148.674465] ? __fget_files+0x203/0x3b0 [ 2148.674499] ? __pfx_lo_ioctl+0x10/0x10 [ 2148.674519] blkdev_ioctl+0x365/0x6d0 [ 2148.674549] ? __pfx_blkdev_ioctl+0x10/0x10 [ 2148.674579] ? selinux_file_ioctl+0xb9/0x280 [ 2148.674615] ? __pfx_blkdev_ioctl+0x10/0x10 [ 2148.674645] __x64_sys_ioctl+0x18f/0x210 [ 2148.674678] do_syscall_64+0xbf/0x430 [ 2148.674703] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 2148.674725] RIP: 0033:0x7f52e79b48d7 [ 2148.674742] Code: 3c 1c 48 f7 d8 49 39 c4 72 b8 e8 a4 54 02 00 85 c0 78 bd 48 83 c4 08 4c 89 e0 5b 41 5c c3 0f 1f 44 00 00 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2148.674763] RSP: 002b:00007f52e4f29f48 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 2148.674785] RAX: ffffffffffffffda RBX: 00007f52e79fe970 RCX: 00007f52e79b48d7 [ 2148.674800] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 2148.674814] RBP: 0000000000000005 R08: 0000000000000000 R09: ffffffffffffffff [ 2148.674827] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000004 [ 2148.674840] R13: 0000000000000004 R14: 0000000020000248 R15: 0000000000000003 [ 2148.674870] [ 2148.725335] CPU: 0 UID: 0 PID: 15115 Comm: syz-executor.6 Not tainted 6.18.0-rc5-next-20251111 #1 PREEMPT(voluntary) [ 2148.725371] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2148.725385] Call Trace: [ 2148.725394] [ 2148.725404] dump_stack_lvl+0xfa/0x120 [ 2148.725437] should_fail_ex+0x4d7/0x5e0 [ 2148.725465] _copy_to_user+0x32/0xd0 [ 2148.725492] simple_read_from_buffer+0xe0/0x180 [ 2148.725528] proc_fail_nth_read+0x18a/0x240 [ 2148.725556] ? __pfx_proc_fail_nth_read+0x10/0x10 [ 2148.725584] ? security_file_permission+0x22/0x90 [ 2148.725614] ? __pfx_proc_fail_nth_read+0x10/0x10 [ 2148.725640] vfs_read+0x1eb/0xc70 [ 2148.725682] ? __pfx_vfs_read+0x10/0x10 [ 2148.725720] ? lock_release+0xc8/0x290 [ 2148.725758] ? __fget_files+0x20d/0x3b0 [ 2148.725805] ksys_read+0x121/0x240 [ 2148.725825] ? __pfx_ksys_read+0x10/0x10 [ 2148.725847] ? lockdep_hardirqs_on_prepare+0xdb/0x1a0 [ 2148.725889] do_syscall_64+0xbf/0x430 [ 2148.725924] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 2148.725948] RIP: 0033:0x7f8f815b069c [ 2148.725969] Code: ec 28 48 89 54 24 18 48 89 74 24 10 89 7c 24 08 e8 f9 fc ff ff 48 8b 54 24 18 48 8b 74 24 10 41 89 c0 8b 7c 24 08 31 c0 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 48 89 44 24 08 e8 2f fd ff ff 48 [ 2148.725992] RSP: 002b:00007f8f7eb52170 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 2148.726016] RAX: ffffffffffffffda RBX: ffffffffffffffff RCX: 00007f8f815b069c [ 2148.726032] RDX: 000000000000000f RSI: 00007f8f7eb521e0 RDI: 0000000000000005 [ 2148.726047] RBP: 00007f8f7eb521d0 R08: 0000000000000000 R09: 0000000000000000 [ 2148.726061] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 2148.726076] R13: 00007ffd907f36df R14: 00007f8f7eb52300 R15: 0000000000022000 [ 2148.726108] [ 2148.762379] EXT4-fs error (device loop1): ext4_ext_check_inode:523: inode #2: comm syz-executor.1: pblk 0 bad header/extent: invalid extent entries - magic f30a, entries 1, max 4(4), depth 0(0) [ 2148.780077] EXT4-fs (loop1): get root inode failed [ 2148.780859] EXT4-fs (loop1): mount failed [ 2148.812715] EXT4-fs (loop7): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 2148.830230] EXT4-fs (loop6): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: none. [ 2148.933320] loop0: detected capacity change from 0 to 140 [ 2148.958077] EXT4-fs (loop0): VFS: Can't find ext4 filesystem [ 2148.969691] EXT4-fs (loop3): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 2148.986561] EXT4-fs (loop6): unmounting filesystem 00000000-0000-0000-0000-000000000000. 04:09:16 executing program 2: sendmsg$NL80211_CMD_UNEXPECTED_FRAME(0xffffffffffffffff, &(0x7f0000000400)={0x0, 0x0, &(0x7f0000000300)={&(0x7f00000002c0)={0x1c, 0x0, 0x1, 0x0, 0x0, {{}, {@val={0x8}, @void}}}, 0x1c}}, 0x0) sendmsg$NL80211_CMD_UPDATE_FT_IES(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000001c0)={0x24, 0x0, 0x1, 0x70bd2c, 0x0, {{}, {@val={0x8}, @void}}, [@NL80211_ATTR_MDID={0x6, 0xb1, 0xc116}]}, 0x24}, 0x1, 0x0, 0x0, 0x80}, 0xc000) r0 = creat(&(0x7f00000003c0)='./file1\x00', 0x0) sendmsg$netlink(0xffffffffffffffff, 0x0, 0x0) dup(0xffffffffffffffff) pwritev2(r0, &(0x7f0000000380)=[{&(0x7f0000000180)="bd", 0xfffffdef}], 0x1, 0x1200, 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) ioctl$FS_IOC_FSSETXATTR(r1, 0x401c5820, &(0x7f0000000200)={0x9, 0xf5}) syz_io_uring_setup(0x0, &(0x7f0000000000)={0x0, 0x0, 0x4, 0x2, 0x309}, &(0x7f0000ffc000/0x2000)=nil, &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000000080), &(0x7f0000000240)) syz_io_uring_submit(0x0, 0x0, &(0x7f0000000280)=@IORING_OP_ASYNC_CANCEL={0xe, 0x0, 0x0, 0x0, 0x0, 0x12345}, 0x1ff) 04:09:16 executing program 7: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="1000000040000000030000002b00000005000000010000000000000000000000002000000020000010000000000000009f09c75f0000ffff53ef", 0x3a, 0x400}, {&(0x7f0000010100)="000000000000000000000000000000000000000000000000000000005178aedb030000001300000023", 0x29, 0x7e0}, {&(0x7f0000010ce0)="00000000000000000000000000000000000000000000000000000000c99b0000ed410000000400009f09c75f9f09c75f9f09c75f00000000000003000200000000000800000000000af301000400000000000000000000000100000004", 0x5d, 0x8c60}], 0x0, &(0x7f0000010f60)) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) getdents64(r0, 0x0, 0x7) 04:09:16 executing program 5: creat(&(0x7f00000003c0)='./file0\x00', 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext2\x00', &(0x7f0000000100)='./file0\x00', 0x44000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}], 0x0, &(0x7f0000013c00)=ANY=[]) 04:09:16 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="1000000040000000030000002b00000005000000010000000000000000000000002000000020000010000000000000009f09c75f0000ffff53ef", 0x3a, 0x400}, {&(0x7f0000010080)="000000000000000000000000ede2de4df49d4f87b54a3176cfd4eb4f010040000c000000000000009f09c75f", 0x2c, 0x4e0}, {&(0x7f0000010100)="000000000000000000000000000000000000000000000000000000005178ae", 0x1f, 0x7e0}, {&(0x7f0000010ce0)="00000000000000000000000000000000000000000000000000000000c99b0000ed410000000400009f09c75f9f09c75f9f09c75f00000000000003000200000000000800000000000af3010004", 0x4d, 0x8c60}], 0x0, &(0x7f0000010f60)) 04:09:16 executing program 3: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="1000000040000000030000002b00000005000000010000000000000000000000002000000020000010000000000000009f09c75f0000ffff53ef", 0x3a, 0x400}, {&(0x7f0000010100)="000000000000000000000000000000000000000000000000000000005178aedb030000001300000023", 0x29, 0x7e0}, {&(0x7f0000010ce0)="00000000000000000000000000000000000000000000000000000000c99b0000ed410000000400009f09c75f9f09c75f9f09c75f00000000000003000200000000000800000000000af301000400000000000000000000000100000004", 0x5d, 0x8c60}], 0x0, &(0x7f0000010f60)) getdents64(r0, 0x0, 0x600) 04:09:16 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="1000000040000000030000002b00000005000000010000000000000000000000002000000020000010000000000000009f09c75f0000ffff53ef", 0x3a, 0x400}, {&(0x7f0000010100)="000000000000000000000000000000000000000000000000000000005178aedb030000001300000023", 0x29, 0x7e0}, {&(0x7f0000010ce0)="00000000000000000000000000000000000000000000000000000000c99b0000ed410000000400009f09c75f9f09c75f9f09c75f00000000000003000200000000000800000000000af3010004000000000000000000000001", 0x59, 0x8c60}], 0x0, &(0x7f0000010f60)) (fail_nth: 47) 04:09:16 executing program 6: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="1000000040000000030000002b00000005000000010000000000000000000000002000000020000010000000000000009f09c75f0000ffff53ef", 0x3a, 0x400}, {&(0x7f0000010100)="000000000000000000000000000000000000000000000000000000005178aedb030000001300000023", 0x29, 0x7e0}, {&(0x7f0000010ce0)="00000000000000000000000000000000000000000000000000000000c99b0000ed410000000400009f09c75f9f09c75f9f09c75f00000000000003000200000000000800000000000af301000400000000000000000000000100000004", 0x5d, 0x8c60}], 0x0, &(0x7f0000010f60)) getdents64(r0, 0x0, 0x0) 04:09:16 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="1000000040000000030000002b00000005000000010000000000000000000000002000000020000010000000000000009f09c75f0000ffff53", 0x39, 0x400}, {&(0x7f0000010100)="000000000000000000000000000000000000000000000000000000005178aedb030000001300000023", 0x29, 0x7e0}, {&(0x7f0000010ce0)="00000000000000000000000000000000000000000000000000000000c99b0000ed410000000400009f09c75f9f09c75f9f09c75f00000000000003000200000000000800000000000af3010004", 0x4d, 0x8c60}], 0x0, &(0x7f0000010f60)) [ 2157.231610] loop4: detected capacity change from 0 to 140 [ 2157.239537] loop3: detected capacity change from 0 to 140 [ 2157.240599] EXT4-fs (loop4): ext4_check_descriptors: Block bitmap for group 0 not in group (block 0)! [ 2157.241374] EXT4-fs (loop4): group descriptors corrupted! [ 2157.242659] loop6: detected capacity change from 0 to 140 [ 2157.247836] EXT4-fs (loop3): warning: mounting unchecked fs, running e2fsck is recommended [ 2157.256875] EXT4-fs (loop3): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: none. [ 2157.262406] EXT4-fs error (device loop3): ext4_readdir:262: inode #2: block 4: comm syz-executor.3: path /syzkaller-testdir621642535/syzkaller.Ms8KeX/432/mnt: bad entry in directory: rec_len is smaller than minimal - offset=0, inode=0, rec_len=0, size=1024 fake=0 04:09:16 executing program 3: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="1000000040000000030000002b00000005000000010000000000000000000000002000000020000010000000000000009f09c75f0000ffff53ef", 0x3a, 0x400}, {&(0x7f0000010100)="000000000000000000000000000000000000000000000000000000005178aedb030000001300000023", 0x29, 0x7e0}, {&(0x7f0000010ce0)="00000000000000000000000000000000000000000000000000000000c99b0000ed410000000400009f09c75f9f09c75f9f09c75f00000000000003000200000000000800000000000af301000400000000000000000000000100000004", 0x5d, 0x8c60}], 0x0, &(0x7f0000010f60)) getdents64(r0, 0x0, 0x700) [ 2157.295277] loop7: detected capacity change from 0 to 140 04:09:16 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="1000000040000000030000002b00000005000000010000000000000000000000002000000020000010000000000000009f09c75f0000ffff53ef", 0x3a, 0x400}, {&(0x7f0000010080)="000000000000000000000000ede2de4df49d4f87b54a3176cfd4eb4f010040000c000000000000009f09c75f", 0x2c, 0x4e0}, {&(0x7f0000010100)="000000000000000000000000000000000000000000000000000000005178ae", 0x1f, 0x7e0}, {&(0x7f0000010ce0)="00000000000000000000000000000000000000000000000000000000c99b0000ed410000000400009f09c75f9f09c75f9f09c75f00000000000003000200000000000800000000000af3010004", 0x4d, 0x8c60}], 0x0, &(0x7f0000010f60)) [ 2157.303647] EXT4-fs (loop7): warning: mounting unchecked fs, running e2fsck is recommended [ 2157.307423] EXT4-fs (loop7): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: none. [ 2157.318796] EXT4-fs error (device loop7): ext4_readdir:262: inode #2: block 4: comm syz-executor.7: path /syzkaller-testdir823765038/syzkaller.a3rO6g/429/mnt: bad entry in directory: rec_len is smaller than minimal - offset=0, inode=0, rec_len=0, size=1024 fake=0 [ 2157.321670] EXT4-fs (loop6): warning: mounting unchecked fs, running e2fsck is recommended [ 2157.330409] loop0: detected capacity change from 0 to 140 [ 2157.331750] loop5: detected capacity change from 0 to 544 [ 2157.335593] EXT4-fs (loop3): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 2157.336249] loop4: detected capacity change from 0 to 140 [ 2157.337387] loop1: detected capacity change from 0 to 140 [ 2157.342465] EXT4-fs (loop6): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: none. [ 2157.346449] EXT4-fs (loop5): mounting ext2 file system using the ext4 subsystem [ 2157.348277] EXT4-fs (loop0): VFS: Can't find ext4 filesystem [ 2157.360512] EXT4-fs (loop5): warning: mounting unchecked fs, running e2fsck is recommended [ 2157.367004] EXT4-fs error (device loop1): ext4_ext_check_inode:523: inode #2: comm syz-executor.1: pblk 0 bad header/extent: invalid extent entries - magic f30a, entries 1, max 4(4), depth 0(0) [ 2157.373743] EXT4-fs (loop4): ext4_check_descriptors: Block bitmap for group 0 not in group (block 0)! [ 2157.375208] EXT4-fs (loop4): group descriptors corrupted! [ 2157.384447] EXT4-fs (loop1): get root inode failed [ 2157.385466] EXT4-fs (loop1): mount failed [ 2157.387278] EXT4-fs (loop5): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: none. 04:09:16 executing program 7: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="1000000040000000030000002b00000005000000010000000000000000000000002000000020000010000000000000009f09c75f0000ffff53ef", 0x3a, 0x400}, {&(0x7f0000010100)="000000000000000000000000000000000000000000000000000000005178aedb030000001300000023", 0x29, 0x7e0}, {&(0x7f0000010ce0)="00000000000000000000000000000000000000000000000000000000c99b0000ed410000000400009f09c75f9f09c75f9f09c75f00000000000003000200000000000800000000000af301000400000000000000000000000100000004", 0x5d, 0x8c60}], 0x0, &(0x7f0000010f60)) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) getdents64(r0, 0x0, 0x8) [ 2157.431420] loop3: detected capacity change from 0 to 140 [ 2157.447240] EXT4-fs (loop5): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 2157.452348] EXT4-fs (loop7): unmounting filesystem 00000000-0000-0000-0000-000000000000. 04:09:16 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="1000000040000000030000002b00000005000000010000000000000000000000002000000020000010000000000000009f09c75f0000ffff53ef", 0x3a}, {&(0x7f0000010100)="000000000000000000000000000000000000000000000000000000005178aedb030000001300000023", 0x29, 0x7e0}, {&(0x7f0000010ce0)="00000000000000000000000000000000000000000000000000000000c99b0000ed410000000400009f09c75f9f09c75f9f09c75f00000000000003000200000000000800000000000af3010004", 0x4d, 0x8c60}], 0x0, &(0x7f0000010f60)) [ 2157.514159] EXT4-fs (loop3): warning: mounting unchecked fs, running e2fsck is recommended [ 2157.514553] EXT4-fs (loop6): unmounting filesystem 00000000-0000-0000-0000-000000000000. 04:09:16 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="1000000040000000030000002b00000005000000010000000000000000000000002000000020000010000000000000009f09c75f0000ffff53ef", 0x3a, 0x400}, {&(0x7f0000010100)="000000000000000000000000000000000000000000000000000000005178aedb030000001300000023", 0x29, 0x7e0}, {&(0x7f0000010ce0)="00000000000000000000000000000000000000000000000000000000c99b0000ed410000000400009f09c75f9f09c75f9f09c75f00000000000003000200000000000800000000000af3010004000000000000000000000001", 0x59, 0x8c60}], 0x0, &(0x7f0000010f60)) (fail_nth: 48) 04:09:16 executing program 6: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="1000000040000000030000002b00000005000000010000000000000000000000002000000020000010000000000000009f09c75f0000ffff53ef", 0x3a, 0x400}, {&(0x7f0000010100)="000000000000000000000000000000000000000000000000000000005178aedb030000001300000023", 0x29, 0x7e0}, {&(0x7f0000010ce0)="00000000000000000000000000000000000000000000000000000000c99b0000ed410000000400009f09c75f9f09c75f9f09c75f00000000000003000200000000000800000000000af301000400000000000000000000000100000004", 0x5d, 0x8c60}], 0x0, &(0x7f0000010f60)) mkdirat(r0, &(0x7f0000000040)='./mnt/file0\x00', 0x0) getdents64(r0, 0x0, 0x0) 04:09:16 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="1000000040000000030000002b00000005000000010000000000000000000000002000000020000010000000000000009f09c75f0000ffff53ef", 0x3a, 0x400}, {&(0x7f0000010080)="000000000000000000000000ede2de4df49d4f87b54a3176cfd4eb4f010040000c000000000000009f09c75f", 0x2c, 0x4e0}, {&(0x7f0000010100)="000000000000000000000000000000000000000000000000000000005178ae", 0x1f, 0x7e0}, {&(0x7f0000010ce0)="00000000000000000000000000000000000000000000000000000000c99b0000ed410000000400009f09c75f9f09c75f9f09c75f00000000000003000200000000000800000000000af3010004", 0x4d, 0x8c60}], 0x0, &(0x7f0000010f60)) [ 2157.559576] EXT4-fs (loop3): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: none. [ 2157.581856] loop4: detected capacity change from 0 to 140 04:09:16 executing program 5: creat(&(0x7f00000003c0)='./file0\x00', 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext2\x00', &(0x7f0000000100)='./file0\x00', 0x440de, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}], 0x0, &(0x7f0000013c00)=ANY=[]) [ 2157.597406] EXT4-fs (loop4): ext4_check_descriptors: Block bitmap for group 0 not in group (block 0)! [ 2157.598224] EXT4-fs (loop4): group descriptors corrupted! [ 2157.607096] loop6: detected capacity change from 0 to 140 [ 2157.632828] loop1: detected capacity change from 0 to 140 [ 2157.638616] EXT4-fs error (device loop1): ext4_ext_check_inode:523: inode #2: comm syz-executor.1: pblk 0 bad header/extent: invalid extent entries - magic f30a, entries 1, max 4(4), depth 0(0) [ 2157.643614] EXT4-fs (loop1): get root inode failed [ 2157.644171] EXT4-fs (loop1): mount failed [ 2157.650138] EXT4-fs (loop6): warning: mounting unchecked fs, running e2fsck is recommended [ 2157.660300] loop7: detected capacity change from 0 to 140 [ 2157.664744] loop0: detected capacity change from 0 to 140 [ 2157.671163] EXT4-fs (loop0): VFS: Can't find ext4 filesystem [ 2157.693735] EXT4-fs (loop6): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: none. [ 2157.703872] EXT4-fs (loop7): warning: mounting unchecked fs, running e2fsck is recommended [ 2157.708233] EXT4-fs (loop3): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 2157.721209] loop5: detected capacity change from 0 to 544 [ 2157.721601] EXT4-fs (loop7): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: none. [ 2157.728361] EXT4-fs (loop5): mounting ext2 file system using the ext4 subsystem [ 2157.738482] EXT4-fs (loop5): warning: mounting unchecked fs, running e2fsck is recommended [ 2157.745554] EXT4-fs (loop5): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: none. [ 2157.751256] EXT4-fs (loop5): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 2157.752103] EXT4-fs error (device loop7): ext4_readdir:262: inode #2: block 4: comm syz-executor.7: path /syzkaller-testdir823765038/syzkaller.a3rO6g/430/mnt: bad entry in directory: rec_len is smaller than minimal - offset=0, inode=0, rec_len=0, size=1024 fake=0 [ 2157.764424] loop5: detected capacity change from 0 to 544 [ 2157.819765] EXT4-fs (loop6): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 2157.860805] EXT4-fs (loop7): unmounting filesystem 00000000-0000-0000-0000-000000000000. 04:09:26 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="1000000040000000030000002b00000005000000010000000000000000000000002000000020000010000000000000009f09c75f0000ffff53ef", 0x3a}, {&(0x7f0000010100)="000000000000000000000000000000000000000000000000000000005178aedb030000001300000023", 0x29, 0x7e0}, {&(0x7f0000010ce0)="00000000000000000000000000000000000000000000000000000000c99b0000ed410000000400009f09c75f9f09c75f9f09c75f00000000000003000200000000000800000000000af3010004", 0x4d, 0x8c60}], 0x0, &(0x7f0000010f60)) 04:09:26 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="1000000040000000030000002b00000005000000010000000000000000000000002000000020000010000000000000009f09c75f0000ffff53ef", 0x3a, 0x400}, {&(0x7f0000010080)="000000000000000000000000ede2de4df49d4f87b54a3176cfd4eb4f010040000c000000000000009f09c75f", 0x2c, 0x4e0}, {&(0x7f0000010100)="000000000000000000000000000000000000000000000000000000005178aedb03000000", 0x24, 0x7e0}, {&(0x7f0000010ce0)="00000000000000000000000000000000000000000000000000000000c99b0000ed410000000400009f09c75f9f09c75f9f09c75f00000000000003000200000000000800000000000af3010004", 0x4d, 0x8c60}], 0x0, &(0x7f0000010f60)) 04:09:26 executing program 3: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="1000000040000000030000002b00000005000000010000000000000000000000002000000020000010000000000000009f09c75f0000ffff53ef", 0x3a, 0x400}, {&(0x7f0000010100)="000000000000000000000000000000000000000000000000000000005178aedb030000001300000023", 0x29, 0x7e0}, {&(0x7f0000010ce0)="00000000000000000000000000000000000000000000000000000000c99b0000ed410000000400009f09c75f9f09c75f9f09c75f00000000000003000200000000000800000000000af301000400000000000000000000000100000004", 0x5d, 0x8c60}], 0x0, &(0x7f0000010f60)) getdents64(r0, 0x0, 0x900) 04:09:26 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="1000000040000000030000002b00000005000000010000000000000000000000002000000020000010000000000000009f09c75f0000ffff53ef", 0x3a, 0x400}, {&(0x7f0000010100)="000000000000000000000000000000000000000000000000000000005178aedb030000001300000023", 0x29, 0x7e0}, {&(0x7f0000010ce0)="00000000000000000000000000000000000000000000000000000000c99b0000ed410000000400009f09c75f9f09c75f9f09c75f00000000000003000200000000000800000000000af3010004000000000000000000000001", 0x59, 0x8c60}], 0x0, &(0x7f0000010f60)) (fail_nth: 49) 04:09:26 executing program 2: sendmsg$NL80211_CMD_UNEXPECTED_FRAME(0xffffffffffffffff, &(0x7f0000000400)={0x0, 0x0, &(0x7f0000000300)={&(0x7f00000002c0)={0x1c, 0x0, 0x1, 0x0, 0x0, {{}, {@val={0x8}, @void}}}, 0x1c}}, 0x0) sendmsg$NL80211_CMD_UPDATE_FT_IES(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000001c0)={0x24, 0x0, 0x1, 0x70bd2c, 0x0, {{}, {@val={0x8}, @void}}, [@NL80211_ATTR_MDID={0x6, 0xb1, 0xc116}]}, 0x24}, 0x1, 0x0, 0x0, 0x80}, 0xc000) r0 = creat(&(0x7f00000003c0)='./file1\x00', 0x0) sendmsg$netlink(0xffffffffffffffff, 0x0, 0x0) dup(0xffffffffffffffff) pwritev2(r0, &(0x7f0000000380)=[{&(0x7f0000000180)="bd", 0xfffffdef}], 0x1, 0x1200, 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) ioctl$FS_IOC_FSSETXATTR(r1, 0x401c5820, &(0x7f0000000200)={0x9, 0x600}) syz_io_uring_setup(0x0, &(0x7f0000000000)={0x0, 0x0, 0x4, 0x2, 0x309}, &(0x7f0000ffc000/0x2000)=nil, &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000000080), &(0x7f0000000240)) syz_io_uring_submit(0x0, 0x0, &(0x7f0000000280)=@IORING_OP_ASYNC_CANCEL={0xe, 0x0, 0x0, 0x0, 0x0, 0x12345}, 0x1ff) 04:09:26 executing program 7: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="1000000040000000030000002b00000005000000010000000000000000000000002000000020000010000000000000009f09c75f0000ffff53ef", 0x3a, 0x400}, {&(0x7f0000010100)="000000000000000000000000000000000000000000000000000000005178aedb030000001300000023", 0x29, 0x7e0}, {&(0x7f0000010ce0)="00000000000000000000000000000000000000000000000000000000c99b0000ed410000000400009f09c75f9f09c75f9f09c75f00000000000003000200000000000800000000000af301000400000000000000000000000100000004", 0x5d, 0x8c60}], 0x0, &(0x7f0000010f60)) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) getdents64(r0, 0x0, 0x9) 04:09:26 executing program 5: creat(&(0x7f00000003c0)='./file0\x00', 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext2\x00', &(0x7f0000000100)='./file0\x00', 0x441de, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}], 0x0, &(0x7f0000013c00)=ANY=[]) [ 2167.115488] loop4: detected capacity change from 0 to 140 04:09:26 executing program 6: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="1000000040000000030000002b00000005000000010000000000000000000000002000000020000010000000000000009f09c75f0000ffff53ef", 0x3a, 0x400}, {&(0x7f0000010100)="000000000000000000000000000000000000000000000000000000005178aedb030000001300000023", 0x29, 0x7e0}, {&(0x7f0000010ce0)="00000000000000000000000000000000000000000000000000000000c99b0000ed410000000400009f09c75f9f09c75f9f09c75f00000000000003000200000000000800000000000af301000400000000000000000000000100000004", 0x5d, 0x8c60}], 0x0, &(0x7f0000010f60)=ANY=[@ANYBLOB='B']) ioctl$AUTOFS_DEV_IOCTL_READY(0xffffffffffffffff, 0xc0189376, &(0x7f0000000040)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32=r0, @ANYBLOB="04000000377400"]) statx(r1, &(0x7f0000000080)='./mnt\x00', 0x100, 0x7ff, &(0x7f0000000280)) getdents64(r0, 0x0, 0x0) mkdirat(r0, &(0x7f00000000c0)='./mnt\x00', 0x104) r2 = syz_io_uring_setup(0x77bc, &(0x7f0000000080), &(0x7f0000ffa000/0x3000)=nil, &(0x7f0000ffe000/0x2000)=nil, &(0x7f0000000180), &(0x7f0000001240)) r3 = fcntl$dupfd(r2, 0x0, r2) io_uring_register$IORING_REGISTER_BUFFERS(r3, 0x16, &(0x7f0000000380)=[{0x0}], 0x1) r4 = socket$nl_netfilter(0x10, 0x3, 0xc) newfstatat(0xffffffffffffff9c, 0x0, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0}, 0x1100) setfsuid(r5) newfstatat(0xffffffffffffff9c, &(0x7f00000004c0)='./mnt\x00', &(0x7f0000000500), 0x0) newfstatat(0xffffffffffffff9c, 0x0, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0}, 0x1100) setfsuid(r6) r7 = openat$sr(0xffffffffffffff9c, &(0x7f00000001c0), 0xa200, 0x0) ioctl$AUTOFS_DEV_IOCTL_ISMOUNTPOINT(r7, 0xc018937e, &(0x7f0000000480)={{0x1, 0x1, 0x18, r3, @out_args}, './mnt\x00'}) mount$9p_fd(0x0, &(0x7f0000000140)='./mnt\x00', &(0x7f0000000180), 0x0, &(0x7f0000000380)={'trans=fd,', {'rfdno', 0x3d, r3}, 0x2c, {'wfdno', 0x3d, r4}, 0x2c, {[{@access_any}, {@cache_loose}, {@cache_none}, {@fscache}, {@aname={'aname', 0x3d, 'ext4\x00'}}], [{@func={'func', 0x3d, 'FILE_CHECK'}}, {@euid_lt={'euid<', r5}}, {@euid_eq={'euid', 0x3d, r6}}, {@obj_role={'obj_role', 0x3d, '-@,(\xee-+'}}, {@smackfsfloor={'smackfsfloor', 0x3d, '--{-$:%{).!(}^#}{'}}]}}) [ 2167.127365] loop3: detected capacity change from 0 to 140 [ 2167.128771] EXT4-fs (loop4): ext4_check_descriptors: Inode bitmap for group 0 not in group (block 0)! [ 2167.129463] loop0: detected capacity change from 0 to 140 [ 2167.129752] EXT4-fs (loop4): group descriptors corrupted! [ 2167.140513] loop1: detected capacity change from 0 to 140 [ 2167.144079] loop7: detected capacity change from 0 to 140 [ 2167.150422] loop5: detected capacity change from 0 to 544 [ 2167.151163] EXT4-fs (loop0): VFS: Can't find ext4 filesystem [ 2167.155208] EXT4-fs (loop5): mounting ext2 file system using the ext4 subsystem [ 2167.160217] EXT4-fs (loop5): warning: mounting unchecked fs, running e2fsck is recommended [ 2167.170893] EXT4-fs (loop3): warning: mounting unchecked fs, running e2fsck is recommended 04:09:26 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="1000000040000000030000002b00000005000000010000000000000000000000002000000020000010000000000000009f09c75f0000ffff53ef", 0x3a, 0x400}, {&(0x7f0000010080)="000000000000000000000000ede2de4df49d4f87b54a3176cfd4eb4f010040000c000000000000009f09c75f", 0x2c, 0x4e0}, {&(0x7f0000010100)="000000000000000000000000000000000000000000000000000000005178aedb03000000", 0x24, 0x7e0}, {&(0x7f0000010ce0)="00000000000000000000000000000000000000000000000000000000c99b0000ed410000000400009f09c75f9f09c75f9f09c75f00000000000003000200000000000800000000000af3010004", 0x4d, 0x8c60}], 0x0, &(0x7f0000010f60)) [ 2167.182022] EXT4-fs (loop5): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: none. [ 2167.184984] EXT4-fs error (device loop1): ext4_ext_check_inode:523: inode #2: comm syz-executor.1: pblk 0 bad header/extent: invalid extent entries - magic f30a, entries 1, max 4(4), depth 0(0) [ 2167.191203] loop4: detected capacity change from 0 to 140 [ 2167.194501] EXT4-fs (loop4): ext4_check_descriptors: Inode bitmap for group 0 not in group (block 0)! [ 2167.195439] EXT4-fs (loop4): group descriptors corrupted! [ 2167.198296] EXT4-fs (loop1): get root inode failed [ 2167.198780] EXT4-fs (loop1): mount failed [ 2167.204821] EXT4-fs (loop5): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 2167.211789] EXT4-fs (loop3): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: none. [ 2167.215026] loop6: detected capacity change from 0 to 140 [ 2167.218650] EXT4-fs (loop7): warning: mounting unchecked fs, running e2fsck is recommended [ 2167.227306] ext4: Unknown parameter 'B' 04:09:26 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="1000000040000000030000002b00000005000000010000000000000000000000002000000020000010000000000000009f09c75f0000ffff53ef", 0x3a, 0x400}, {&(0x7f0000010100)="000000000000000000000000000000000000000000000000000000005178aedb030000001300000023", 0x29, 0x7e0}, {&(0x7f0000010ce0)="00000000000000000000000000000000000000000000000000000000c99b0000ed410000000400009f09c75f9f09c75f9f09c75f00000000000003000200000000000800000000000af3010004000000000000000000000001", 0x59, 0x8c60}], 0x0, &(0x7f0000010f60)) (fail_nth: 50) 04:09:26 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="1000000040000000030000002b00000005000000010000000000000000000000002000000020000010000000000000009f09c75f0000ffff53ef", 0x3a, 0x400}, {&(0x7f0000010080)="000000000000000000000000ede2de4df49d4f87b54a3176cfd4eb4f010040000c000000000000009f09c75f", 0x2c, 0x4e0}, {&(0x7f0000010100)="000000000000000000000000000000000000000000000000000000005178aedb03000000", 0x24, 0x7e0}, {&(0x7f0000010ce0)="00000000000000000000000000000000000000000000000000000000c99b0000ed410000000400009f09c75f9f09c75f9f09c75f00000000000003000200000000000800000000000af3010004", 0x4d, 0x8c60}], 0x0, &(0x7f0000010f60)) [ 2167.279149] EXT4-fs (loop7): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: none. 04:09:26 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="1000000040000000030000002b00000005000000010000000000000000000000002000000020000010000000000000009f09c75f0000ffff53ef", 0x3a}, {&(0x7f0000010100)="000000000000000000000000000000000000000000000000000000005178aedb030000001300000023", 0x29, 0x7e0}, {&(0x7f0000010ce0)="00000000000000000000000000000000000000000000000000000000c99b0000ed410000000400009f09c75f9f09c75f9f09c75f00000000000003000200000000000800000000000af3010004", 0x4d, 0x8c60}], 0x0, &(0x7f0000010f60)) [ 2167.314360] loop0: detected capacity change from 0 to 140 [ 2167.325117] EXT4-fs (loop0): VFS: Can't find ext4 filesystem 04:09:26 executing program 3: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="1000000040000000030000002b00000005000000010000000000000000000000002000000020000010000000000000009f09c75f0000ffff53ef", 0x3a, 0x400}, {&(0x7f0000010100)="000000000000000000000000000000000000000000000000000000005178aedb030000001300000023", 0x29, 0x7e0}, {&(0x7f0000010ce0)="00000000000000000000000000000000000000000000000000000000c99b0000ed410000000400009f09c75f9f09c75f9f09c75f00000000000003000200000000000800000000000af301000400000000000000000000000100000004", 0x5d, 0x8c60}], 0x0, &(0x7f0000010f60)) getdents64(r0, 0x0, 0xa00) 04:09:26 executing program 5: creat(&(0x7f00000003c0)='./file0\x00', 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext2\x00', &(0x7f0000000100)='./file0\x00', 0x442de, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}], 0x0, &(0x7f0000013c00)=ANY=[]) [ 2167.342267] EXT4-fs (loop3): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 2167.348127] loop4: detected capacity change from 0 to 140 [ 2167.378741] EXT4-fs (loop4): ext4_check_descriptors: Inode bitmap for group 0 not in group (block 0)! [ 2167.380386] EXT4-fs (loop4): group descriptors corrupted! [ 2167.382708] EXT4-fs (loop7): unmounting filesystem 00000000-0000-0000-0000-000000000000. 04:09:26 executing program 7: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="1000000040000000030000002b00000005000000010000000000000000000000002000000020000010000000000000009f09c75f0000ffff53ef", 0x3a, 0x400}, {&(0x7f0000010100)="000000000000000000000000000000000000000000000000000000005178aedb030000001300000023", 0x29, 0x7e0}, {&(0x7f0000010ce0)="00000000000000000000000000000000000000000000000000000000c99b0000ed410000000400009f09c75f9f09c75f9f09c75f00000000000003000200000000000800000000000af301000400000000000000000000000100000004", 0x5d, 0x8c60}], 0x0, &(0x7f0000010f60)) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) getdents64(r0, 0x0, 0xa) [ 2167.425675] loop1: detected capacity change from 0 to 140 [ 2167.427404] FAULT_INJECTION: forcing a failure. [ 2167.427404] name failslab, interval 1, probability 0, space 0, times 0 [ 2167.428434] CPU: 1 UID: 0 PID: 15233 Comm: syz-executor.1 Not tainted 6.18.0-rc5-next-20251111 #1 PREEMPT(voluntary) [ 2167.428453] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2167.428461] Call Trace: [ 2167.428466] [ 2167.428471] dump_stack_lvl+0xfa/0x120 [ 2167.428490] should_fail_ex+0x4d7/0x5e0 [ 2167.428505] ? skb_clone+0x191/0x400 [ 2167.428523] should_failslab+0xc2/0x120 [ 2167.428538] kmem_cache_alloc_noprof+0x80/0x690 [ 2167.428555] ? netlink_broadcast_filtered+0xe6/0xe90 [ 2167.428578] ? skb_clone+0x191/0x400 [ 2167.428594] skb_clone+0x191/0x400 [ 2167.428612] netlink_broadcast_filtered+0xab1/0xe90 [ 2167.428636] ? __pfx_netlink_broadcast_filtered+0x10/0x10 [ 2167.428655] ? skb_put+0x138/0x1b0 [ 2167.428670] netlink_broadcast+0x39/0x50 [ 2167.428689] kobject_uevent_env+0xa58/0xf90 [ 2167.428708] ? lock_is_held_type+0x9e/0x120 [ 2167.428730] loop_configure+0xe31/0x15a0 [ 2167.428764] ? __pfx_loop_configure+0x10/0x10 [ 2167.428792] ? avc_has_extended_perms+0x107/0xf20 [ 2167.428810] ? find_held_lock+0x2b/0x80 [ 2167.428825] ? avc_has_extended_perms+0x23b/0xf20 [ 2167.428841] ? lock_release+0xc8/0x290 [ 2167.428860] lo_ioctl+0x66d/0x1ca0 [ 2167.428874] ? __pfx_lo_ioctl+0x10/0x10 [ 2167.428886] ? __pfx_avc_has_extended_perms+0x10/0x10 [ 2167.428911] ? lock_acquire+0x15e/0x2f0 [ 2167.428928] ? __virt_addr_valid+0x1c6/0x5d0 [ 2167.428943] ? __pfx_perf_trace_preemptirq_template+0x10/0x10 [ 2167.428965] ? __pfx_perf_trace_preemptirq_template+0x10/0x10 [ 2167.428985] ? __pfx_perf_trace_preemptirq_template+0x10/0x10 [ 2167.429004] ? lock_release+0xc8/0x290 [ 2167.429023] ? __sanitizer_cov_trace_switch+0x54/0x90 [ 2167.429054] ? lockdep_softirqs_off+0x110/0x110 [ 2167.429072] ? __fget_files+0x34/0x3b0 [ 2167.429093] ? find_held_lock+0x2b/0x80 [ 2167.429107] ? __fget_files+0x203/0x3b0 [ 2167.429126] ? __pfx_lo_ioctl+0x10/0x10 [ 2167.429138] blkdev_ioctl+0x365/0x6d0 [ 2167.429156] ? __pfx_blkdev_ioctl+0x10/0x10 [ 2167.429173] ? selinux_file_ioctl+0xb9/0x280 [ 2167.429194] ? __pfx_blkdev_ioctl+0x10/0x10 [ 2167.429212] __x64_sys_ioctl+0x18f/0x210 [ 2167.429231] do_syscall_64+0xbf/0x430 [ 2167.429246] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 2167.429259] RIP: 0033:0x7f52e79b48d7 [ 2167.429269] Code: 3c 1c 48 f7 d8 49 39 c4 72 b8 e8 a4 54 02 00 85 c0 78 bd 48 83 c4 08 4c 89 e0 5b 41 5c c3 0f 1f 44 00 00 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2167.429282] RSP: 002b:00007f52e4f29f48 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 2167.429294] RAX: ffffffffffffffda RBX: 00007f52e79fe970 RCX: 00007f52e79b48d7 [ 2167.429303] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 2167.429311] RBP: 0000000000000005 R08: 0000000000000000 R09: ffffffffffffffff [ 2167.429319] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000004 [ 2167.429327] R13: 0000000000000004 R14: 0000000020000248 R15: 0000000000000003 [ 2167.429343] 04:09:26 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="1000000040000000030000002b00000005000000010000000000000000000000002000000020000010000000000000009f09c75f0000ffff53ef", 0x3a, 0x400}, {&(0x7f0000010100)="000000000000000000000000000000000000000000000000000000005178aedb030000001300000023", 0x29, 0x7e0}, {&(0x7f0000010ce0)="00000000000000000000000000000000000000000000000000000000c99b0000ed410000000400009f09c75f9f09c75f9f09c75f00000000000003000200000000000800000000000af3010004", 0x4d, 0x8c60}], 0x0, 0x0) [ 2167.467437] loop5: detected capacity change from 0 to 545 [ 2167.485211] EXT4-fs (loop5): mounting ext2 file system using the ext4 subsystem [ 2167.505821] EXT4-fs (loop5): warning: mounting unchecked fs, running e2fsck is recommended [ 2167.522881] EXT4-fs error (device loop1): ext4_ext_check_inode:523: inode #2: comm syz-executor.1: pblk 0 bad header/extent: invalid extent entries - magic f30a, entries 1, max 4(4), depth 0(0) [ 2167.528024] EXT4-fs (loop1): get root inode failed [ 2167.528483] EXT4-fs (loop1): mount failed [ 2167.531421] loop0: detected capacity change from 0 to 140 04:09:26 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="1000000040000000030000002b00000005000000010000000000000000000000002000000020000010000000000000009f09c75f0000ffff53ef", 0x3a, 0x400}, {&(0x7f0000010080)="000000000000000000000000ede2de4df49d4f87b54a3176cfd4eb4f010040000c000000000000009f09c75f", 0x2c, 0x4e0}, {&(0x7f0000010100)="000000000000000000000000000000000000000000000000000000005178aedb03000000130000", 0x27, 0x7e0}, {&(0x7f0000010ce0)="00000000000000000000000000000000000000000000000000000000c99b0000ed410000000400009f09c75f9f09c75f9f09c75f00000000000003000200000000000800000000000af3010004", 0x4d, 0x8c60}], 0x0, &(0x7f0000010f60)) [ 2167.543723] EXT4-fs (loop5): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: none. [ 2167.551616] loop3: detected capacity change from 0 to 140 04:09:26 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="1000000040000000030000002b00000005000000010000000000000000000000002000000020000010000000000000009f09c75f0000ffff53ef", 0x3a, 0x400}, {&(0x7f0000010100)="000000000000000000000000000000000000000000000000000000005178aedb030000001300000023", 0x29, 0x7e0}, {&(0x7f0000010ce0)="00000000000000000000000000000000000000000000000000000000c99b0000ed410000000400009f09c75f9f09c75f9f09c75f00000000000003000200000000000800000000000af3010004000000000000000000000001", 0x59, 0x8c60}], 0x0, &(0x7f0000010f60)) (fail_nth: 51) [ 2167.568113] EXT4-fs (loop3): warning: mounting unchecked fs, running e2fsck is recommended [ 2167.580761] EXT4-fs (loop3): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: none. [ 2167.583707] EXT4-fs (loop5): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 2167.589461] EXT4-fs error (device loop3): ext4_readdir:262: inode #2: block 4: comm syz-executor.3: path /syzkaller-testdir621642535/syzkaller.Ms8KeX/435/mnt: bad entry in directory: rec_len is smaller than minimal - offset=0, inode=0, rec_len=0, size=1024 fake=0 04:09:26 executing program 3: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="1000000040000000030000002b00000005000000010000000000000000000000002000000020000010000000000000009f09c75f0000ffff53ef", 0x3a, 0x400}, {&(0x7f0000010100)="000000000000000000000000000000000000000000000000000000005178aedb030000001300000023", 0x29, 0x7e0}, {&(0x7f0000010ce0)="00000000000000000000000000000000000000000000000000000000c99b0000ed410000000400009f09c75f9f09c75f9f09c75f00000000000003000200000000000800000000000af301000400000000000000000000000100000004", 0x5d, 0x8c60}], 0x0, &(0x7f0000010f60)) getdents64(r0, 0x0, 0xc00) [ 2167.650237] loop7: detected capacity change from 0 to 140 [ 2167.650652] EXT4-fs (loop3): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 2167.689181] loop4: detected capacity change from 0 to 140 [ 2167.695675] EXT4-fs (loop4): ext4_check_descriptors: Inode table for group 0 not in group (block 0)! [ 2167.697514] EXT4-fs (loop4): group descriptors corrupted! [ 2167.703056] EXT4-fs (loop7): warning: mounting unchecked fs, running e2fsck is recommended 04:09:26 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="1000000040000000030000002b00000005000000010000000000000000000000002000000020000010000000000000009f09c75f0000ffff53ef", 0x3a, 0x400}, {&(0x7f0000010100)="000000000000000000000000000000000000000000000000000000005178aedb030000001300000023", 0x29, 0x7e0}, {&(0x7f0000010ce0)="00000000000000000000000000000000000000000000000000000000c99b0000ed410000000400009f09c75f9f09c75f9f09c75f00000000000003000200000000000800000000000af3010004", 0x4d, 0x8c60}], 0x0, 0x0) [ 2167.749446] loop1: detected capacity change from 0 to 140 [ 2167.755581] EXT4-fs (loop7): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: none. [ 2167.769417] loop3: detected capacity change from 0 to 140 [ 2167.779754] EXT4-fs (loop3): warning: mounting unchecked fs, running e2fsck is recommended [ 2167.786639] EXT4-fs (loop3): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: none. [ 2167.794771] EXT4-fs error (device loop3): ext4_readdir:262: inode #2: block 4: comm syz-executor.3: path /syzkaller-testdir621642535/syzkaller.Ms8KeX/436/mnt: bad entry in directory: rec_len is smaller than minimal - offset=0, inode=0, rec_len=0, size=1024 fake=0 [ 2167.797619] EXT4-fs error (device loop1): ext4_ext_check_inode:523: inode #2: comm syz-executor.1: pblk 0 bad header/extent: invalid extent entries - magic f30a, entries 1, max 4(4), depth 0(0) [ 2167.818780] EXT4-fs (loop1): get root inode failed [ 2167.819667] EXT4-fs (loop1): mount failed [ 2167.823870] loop0: detected capacity change from 0 to 140 [ 2167.881701] EXT4-fs (loop7): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 2167.886612] EXT4-fs (loop3): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 2168.035417] loop6: detected capacity change from 0 to 140 [ 2168.039119] ext4: Unknown parameter 'B' VM DIAGNOSIS: 04:14:28 Registers: info registers vcpu 0 RAX=0000000000b7a42d RBX=0000000000000000 RCX=ffffffff84c59f37 RDX=0000000000000000 RSI=0000000000000000 RDI=ffffffff814cdc30 RBP=dffffc0000000000 RSP=ffffffff85c07e00 R8 =0000000000000001 R9 =ffffed100d9c635a R10=ffff88806ce31ad3 R11=0000000000000001 R12=ffffffff8664c250 R13=1ffffffff0b80fc7 R14=0000000000000000 R15=0000000000000000 RIP=ffffffff84c5892e RFL=00000206 [-----P-] CPL=0 II=0 A20=1 SMM=0 HLT=1 ES =0000 0000000000000000 00000000 00000000 CS =0010 0000000000000000 ffffffff 00a09b00 DPL=0 CS64 [-RA] SS =0018 0000000000000000 ffffffff 00c09300 DPL=0 DS [-WA] DS =0000 0000000000000000 00000000 00000000 FS =0000 0000000000000000 00000000 00000000 GS =0000 ffff8880e539c000 00000000 00000000 LDT=0000 fffffe5800000000 00000000 00000000 TR =0040 fffffe0000003000 00004087 00008b00 DPL=0 TSS64-busy GDT= fffffe0000001000 0000007f IDT= fffffe0000000000 00000fff CR0=80050033 CR2=00007f0484f2c010 CR3=0000000013a54000 CR4=00350ef0 DR0=0000000000000000 DR1=0000000000000000 DR2=0000000000000000 DR3=0000000000000000 DR6=00000000ffff0ff0 DR7=0000000000000400 EFER=0000000000000d01 FCW=037f FSW=0000 [ST=0] FTW=00 MXCSR=00001fa0 FPR0=0000000000000000 0000 FPR1=0000000000000000 0000 FPR2=0000000000000000 0000 FPR3=0000000000000000 0000 FPR4=0000000000000000 0000 FPR5=0000000000000000 0000 FPR6=0000000000000000 0000 FPR7=0000000000000000 0000 XMM00=00000000000000000000000000000000 XMM01=00000000000000000000000000000000 XMM02=0000000000000000bfe62e42fefa39ef XMM03=0000ff00000000000000000000000000 XMM04=732f6c61636f6c2f7273752f3d485441 XMM05=622f6c61636f6c2f7273752f3a6e6962 XMM06=73752f3a6e6962732f7273752f3a6e69 XMM07=6e69622f3a6e6962732f3a6e69622f72 XMM08=00000000000000000000000000000000 XMM09=00000000000000000000000000000000 XMM10=00000000000000000000000000000000 XMM11=00000000000000000000000000000000 XMM12=00000000000000000000000000000000 XMM13=00000000000000000000000000000000 XMM14=00000000000000000000000000000000 XMM15=00000000000000000000000000000000 info registers vcpu 1 RAX=0000000000934ee7 RBX=0000000000000001 RCX=ffffffff84c59f37 RDX=0000000000000000 RSI=0000000000000000 RDI=ffffffff814cdc30 RBP=dffffc0000000000 RSP=ffff8880096efe58 R8 =0000000000000001 R9 =ffffed100d9e635a R10=ffff88806cf31ad3 R11=0000000000000001 R12=ffffffff8664c250 R13=1ffff110012ddfd2 R14=0000000000000000 R15=0000000000000000 RIP=ffffffff84c5892e RFL=00000206 [-----P-] CPL=0 II=0 A20=1 SMM=0 HLT=1 ES =0000 0000000000000000 00000000 00000000 CS =0010 0000000000000000 ffffffff 00a09b00 DPL=0 CS64 [-RA] SS =0018 0000000000000000 ffffffff 00c09300 DPL=0 DS [-WA] DS =0000 0000000000000000 00000000 00000000 FS =0000 0000000000000000 00000000 00000000 GS =0000 ffff8880e549c000 00000000 00000000 LDT=0000 fffffe6000000000 00000000 00000000 TR =0040 fffffe000004a000 00004087 00008b00 DPL=0 TSS64-busy GDT= fffffe0000048000 0000007f IDT= fffffe0000000000 00000fff CR0=80050033 CR2=0000562e7ea58130 CR3=0000000013a54000 CR4=00350ef0 DR0=0000000000000000 DR1=0000000000000000 DR2=0000000000000000 DR3=0000000000000000 DR6=00000000ffff0ff0 DR7=0000000000000400 EFER=0000000000000d01 FCW=037f FSW=0000 [ST=0] FTW=00 MXCSR=00001fa0 FPR0=0000000000000000 0000 FPR1=0000000000000000 0000 FPR2=0000000000000000 0000 FPR3=0000000000000000 0000 FPR4=0000000000000000 0000 FPR5=0000000000000000 0000 FPR6=0000000000000000 0000 FPR7=0000000000000000 0000 XMM00=00000000000000000000000000000000 XMM01=007c02fe016c6c6f502e726567616e61 XMM02=0201039aff15007b02fe016c6c6f502e XMM03=00000606020160768131fc3f47793cfc XMM04=000000c006444fa00000000000ea89c0 XMM05=45be20fd4d5dbfc3f885af53688595e6 XMM06=000000c0064451300000000000ea89c0 XMM07=dd563cf1f89f42c1eaed88a5ab42b1de XMM08=11a5b149903f94d9a6f5a5eb5239929d XMM09=00000002000000000000000000000000 XMM10=0c0d0e0f08090a0b0405060700010203 XMM11=000000c0064451800000000000ea89c0 XMM12=f773f0d7cb22df3871b88491cb9606b8 XMM13=bea9b3d4946c304c3e5a8f3bf2676cc1 XMM14=b5e34c55e85c149bc57f8133b0a45ba6 XMM15=4ec408cf734de9d4ca4adca819941d76