)="020000000300000004000000", 0xc, 0x800}, {&(0x7f0000010400), 0x0, 0x1000}, {0x0, 0x0, 0x2080}, {0x0}, {0x0}, {&(0x7f0000011c00)="0b0000000c0001022e00000002000000f40702022e", 0x15, 0x10000}, {0x0}, {0x0}, {&(0x7f0000012400)="504d4d00504d4dffdbf4655f00000000647679756b6f762d676c6170746f70320000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000006c6f6f7033340075782f746573742f73797a5f6d6f756e745f696d6167655f650500"/123, 0x7b, 0x20000}, {0x0}, {0x0, 0x0, 0x38000}], 0x0, &(0x7f0000012f00)) 22:31:37 executing program 2: perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000480)}}, 0x0, 0xffffffefffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x100000, 0xe, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000500100000f000000000000000100000005000000000004000040000020000000dbf4655fdbf4655f0100ffff53ef010001000000dbf4655f000000000000000001000000000000000b0000008000000018000000c20500002b0200"/116, 0x74, 0x400}, {&(0x7f0000010100)="000000000000000000000000244b8e9b57f04b59aa229cc218853f9501004000", 0x20, 0x4e0}, {&(0x7f0000010200)="010000000000050040", 0x9, 0x560}, {&(0x7f0000010300)="020000000300000004000000", 0xc, 0x800}, {&(0x7f0000010400), 0x0, 0x1000}, {&(0x7f0000011500)="ed41000000080000dbf4655fdbf4655fdbf4655f000000", 0x17, 0x2080}, {0x0}, {0x0}, {&(0x7f0000011c00)="0b0000000c0001022e00000002000000f40702022e", 0x15, 0x10000}, {0x0}, {0x0}, {&(0x7f0000012400)="504d4d00504d4dffdbf4655f00000000647679756b6f762d676c6170746f70320000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000006c6f6f7033340075782f746573742f73797a5f6d6f756e745f696d6167655f650500"/123, 0x7b, 0x20000}, {0x0}, {0x0, 0x0, 0x38000}], 0x0, &(0x7f0000012f00)) 22:31:37 executing program 1: r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, @perf_config_ext, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000000), 0x0) r2 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) ioctl$EXT4_IOC_CHECKPOINT(r2, 0x4004662b, &(0x7f0000000100)=0x5) ioctl$AUTOFS_DEV_IOCTL_TIMEOUT(0xffffffffffffffff, 0xc018937a, &(0x7f0000001480)=ANY=[@ANYBLOB="010000fe04f804f32d1ae95f4d8fd9ce99ff00010000001800000059a5a91fc707002c3e05f0bcf35234dd60eedec3d5f1b58f0d41f6996d0df70b25316c86b91cf6440f87695b3e2bf9118d7b986e6dd6169cde2d7b35569ff3c18ea708da093a5e297fd2ec2322a167617fa6662e65407cedfd90d2ee90deccf04f2c85b215e5090cb50628f934703c2db873b5eb9a2e276f987493cc445a8474761879f6df5a5233b80656c014a59590366f77d5104d838160f3f8f304bbfb07a672117635569099d752c2b724b38b74a3b0e2c4dd54619ff2e05de8c58ace02796bd997ccfd3fbf04c5bb7420f2656931eb46c8e72d17fd9b33dd84ff6fab17ff995be40bf9a47cdde574665966c721e5f265d3aaac1788c3ea", @ANYRES32=r0]) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r3, 0xc08c5332, &(0x7f00000013c0)={0xffffffff, 0x6964, 0x0, 'queue1\x00', 0xff}) r4 = gettid() process_vm_writev(r4, &(0x7f0000002580)=[{&(0x7f0000000140)=""/89, 0x59}, {&(0x7f00000001c0)=""/175, 0xaf}, {&(0x7f0000000280)=""/4096, 0x1000}], 0x3, &(0x7f0000003840)=[{&(0x7f0000002640)=""/105, 0x69}, {0xfffffffffffffffe, 0x10}], 0x2, 0x0) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r1, 0xc08c5332, &(0x7f0000001280)={0x3, 0x5, 0x0, 'queue1\x00', 0x8}) r5 = fork() write$sndseq(r1, &(0x7f0000001340)=[{0x22, 0x8, 0x2, 0x3, @time={0x4}, {0x0, 0x1}, {0x6, 0x81}, @raw32={[0x800, 0x3, 0x9]}}, {0xe1, 0x7, 0xf8, 0xff, @tick=0x2, {0x3f}, {0x4, 0xf1}, @queue={0xff, {0x6, 0x9}}}, {0x4, 0x1, 0x9, 0x5, @time={0x7, 0x6}, {0x7c, 0x2}, {0x20, 0x6}, @connect={{0x0, 0xfd}, {0x98, 0x4}}}, {0x80, 0x4, 0x7, 0x7d, @time={0xfffff000, 0x9}, {0x81, 0x1f}, {0xaa}, @queue={0x5, {0xffffffe0, 0x3}}}], 0x70) r6 = syz_open_dev$vcsn(&(0x7f0000000040), 0x3, 0x2001) ioctl$LOOP_CTL_GET_FREE(r6, 0x4c82) ptrace$setopts(0x4206, r5, 0x0, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fork() fork() clone3(&(0x7f0000004c00)={0xc0002100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) [ 1373.312869] loop7: detected capacity change from 0 to 2048 [ 1373.362788] loop0: detected capacity change from 0 to 512 [ 1373.381939] loop4: detected capacity change from 0 to 2048 [ 1373.386255] EXT4-fs error (device loop7): __ext4_fill_super:5244: inode #2: comm syz-executor.7: iget: root inode unallocated [ 1373.388944] EXT4-fs (loop7): get root inode failed [ 1373.389812] EXT4-fs (loop7): mount failed 22:31:37 executing program 5: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) lsetxattr$security_evm(&(0x7f0000000240)='.\x00', &(0x7f0000000300), &(0x7f00000003c0)=@sha1={0x1, "bd2b5bce8b74aea700654a682479ac2c0852bc4d"}, 0x15, 0x3) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={&(0x7f0000000040), 0xb}, 0x0, 0x20, 0x0, 0x0, 0x8}, 0x0, 0x0, 0xffffffffffffffff, 0x2) r0 = fork() r1 = syz_open_procfs(r0, &(0x7f0000000000)='status\x00') r2 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x2, 0x0) pwrite64(r2, &(0x7f00000000c0)='9', 0x1, 0x8040000) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x20, 0x3, 0x4, 0x1, 0x0, 0x8, 0x20620, 0x2, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x3f, 0x2, @perf_config_ext={0x240000000, 0x5}, 0x1400, 0x4, 0x8, 0x7, 0x9, 0x6, 0x6, 0x0, 0x1, 0x0, 0x8}, r0, 0xa, r2, 0x1) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r3, 0x6, 0x1e, &(0x7f0000000040)=0x1, 0x4) connect$inet6(r3, &(0x7f0000000080)={0xa, 0x0, 0x0, @loopback}, 0x1c) openat$cgroup_ro(r1, &(0x7f0000000180)='blkio.throttle.io_serviced_recursive\x00', 0x0, 0x0) [ 1373.412964] loop2: detected capacity change from 0 to 2048 [ 1373.424681] EXT4-fs (loop0): bad geometry: block count 512 exceeds size of device (128 blocks) [ 1373.457086] EXT4-fs error (device loop4): __ext4_fill_super:5244: inode #2: comm syz-executor.4: iget: root inode unallocated [ 1373.459932] EXT4-fs (loop4): get root inode failed [ 1373.460822] EXT4-fs (loop4): mount failed [ 1373.498988] EXT4-fs error (device loop2): __ext4_fill_super:5244: inode #2: comm syz-executor.2: iget: root inode unallocated [ 1373.503728] EXT4-fs (loop2): get root inode failed [ 1373.504297] EXT4-fs (loop2): mount failed [ 1394.821012] loop4: detected capacity change from 0 to 2048 22:31:59 executing program 1: r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, @perf_config_ext, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000000), 0x0) r2 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) ioctl$EXT4_IOC_CHECKPOINT(r2, 0x4004662b, &(0x7f0000000100)=0x5) ioctl$AUTOFS_DEV_IOCTL_TIMEOUT(0xffffffffffffffff, 0xc018937a, &(0x7f0000001480)=ANY=[@ANYBLOB="010000fe04f804f32d1ae95f4d8fd9ce99ff00010000001800000059a5a91fc707002c3e05f0bcf35234dd60eedec3d5f1b58f0d41f6996d0df70b25316c86b91cf6440f87695b3e2bf9118d7b986e6dd6169cde2d7b35569ff3c18ea708da093a5e297fd2ec2322a167617fa6662e65407cedfd90d2ee90deccf04f2c85b215e5090cb50628f934703c2db873b5eb9a2e276f987493cc445a8474761879f6df5a5233b80656c014a59590366f77d5104d838160f3f8f304bbfb07a672117635569099d752c2b724b38b74a3b0e2c4dd54619ff2e05de8c58ace02796bd997ccfd3fbf04c5bb7420f2656931eb46c8e72d17fd9b33dd84ff6fab17ff995be40bf9a47cdde574665966c721e5f265d3aaac1788c3ea", @ANYRES32=r0]) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r3, 0xc08c5332, &(0x7f00000013c0)={0xffffffff, 0x6964, 0x0, 'queue1\x00', 0xff}) r4 = gettid() process_vm_writev(r4, &(0x7f0000002580)=[{&(0x7f0000000140)=""/89, 0x59}, {&(0x7f00000001c0)=""/175, 0xaf}, {&(0x7f0000000280)=""/4096, 0x1000}], 0x3, &(0x7f0000003840)=[{&(0x7f0000002640)=""/105, 0x69}, {0xfffffffffffffffe, 0x10}], 0x2, 0x0) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r1, 0xc08c5332, &(0x7f0000001280)={0x3, 0x5, 0x0, 'queue1\x00', 0x8}) r5 = fork() write$sndseq(r1, &(0x7f0000001340)=[{0x22, 0x8, 0x2, 0x3, @time={0x4}, {0x0, 0x1}, {0x6, 0x81}, @raw32={[0x800, 0x3, 0x9]}}, {0xe1, 0x7, 0xf8, 0xff, @tick=0x2, {0x3f}, {0x4, 0xf1}, @queue={0xff, {0x6, 0x9}}}, {0x4, 0x1, 0x9, 0x5, @time={0x7, 0x6}, {0x7c, 0x2}, {0x20, 0x6}, @connect={{0x0, 0xfd}, {0x98, 0x4}}}, {0x80, 0x4, 0x7, 0x7d, @time={0xfffff000, 0x9}, {0x81, 0x1f}, {0xaa}, @queue={0x5, {0xffffffe0, 0x3}}}], 0x70) r6 = syz_open_dev$vcsn(&(0x7f0000000040), 0x3, 0x2001) ioctl$LOOP_CTL_GET_FREE(r6, 0x4c82) ptrace$setopts(0x4206, r5, 0x0, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fork() fork() clone3(&(0x7f0000004c00)={0xc0002100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) 22:31:59 executing program 5: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) lsetxattr$security_evm(&(0x7f0000000240)='.\x00', &(0x7f0000000300), &(0x7f00000003c0)=@sha1={0x1, "bd2b5bce8b74aea700654a682479ac2c0852bc4d"}, 0x15, 0x3) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={&(0x7f0000000040), 0xb}, 0x0, 0x20, 0x0, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = fork() r1 = syz_open_procfs(r0, &(0x7f0000000000)='status\x00') r2 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x2, 0x0) pwrite64(r2, &(0x7f00000000c0)='9', 0x1, 0x8040000) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x20, 0x3, 0x4, 0x1, 0x0, 0x8, 0x20620, 0x2, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x3f, 0x2, @perf_config_ext={0x240000000, 0x5}, 0x1400, 0x4, 0x8, 0x7, 0x9, 0x6, 0x6, 0x0, 0x1, 0x0, 0x8}, r0, 0xa, r2, 0x1) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r3, 0x6, 0x1e, &(0x7f0000000040)=0x1, 0x4) connect$inet6(r3, &(0x7f0000000080)={0xa, 0x0, 0x0, @loopback}, 0x1c) openat$cgroup_ro(r1, &(0x7f0000000180)='blkio.throttle.io_serviced_recursive\x00', 0x0, 0x0) 22:31:59 executing program 0: perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000480)}}, 0x0, 0xffffffefffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0xd, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000500100000f000000000000000100000005000000000004000040000020000000dbf4655fdbf4655f0100ffff53ef010001000000dbf4655f000000000000000001000000000000000b0000008000000018000000c20500002b0200"/116, 0x74, 0x400}, {&(0x7f0000010100)="000000000000000000000000244b8e9b57f04b59aa229cc218853f9501004000", 0x20, 0x4e0}, {&(0x7f0000010200)="010000000000050040", 0x9, 0x560}, {&(0x7f0000010300)="0200000003000000040000", 0xb, 0x800}, {&(0x7f0000010400), 0x0, 0x1000}, {&(0x7f0000011500)="ed41000000080000dbf4655fdbf4655f", 0x10, 0x2080}, {0x0}, {0x0}, {0x0, 0x0, 0x10000}, {0x0}, {0x0}, {0x0, 0x0, 0x20000}, {0x0}], 0x0, &(0x7f0000012f00)) 22:31:59 executing program 3: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) lsetxattr$security_evm(&(0x7f0000000240)='.\x00', &(0x7f0000000300), &(0x7f00000003c0)=@sha1={0x1, "bd2b5bce8b74aea700654a682479ac2c0852bc4d"}, 0x15, 0x3) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={&(0x7f0000000040), 0xb}, 0x0, 0x20, 0x0, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) r0 = fork() r1 = syz_open_procfs(r0, &(0x7f0000000000)='status\x00') r2 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x0, 0x0) pwrite64(r2, &(0x7f00000000c0)='9', 0x1, 0x8040000) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x20, 0x3, 0x4, 0x1, 0x0, 0x8, 0x20620, 0x2, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x3f, 0x2, @perf_config_ext={0x240000000, 0x5}, 0x1400, 0x4, 0x8, 0x7, 0x9, 0x6, 0x6, 0x0, 0x1, 0x0, 0x8}, r0, 0xa, r2, 0x1) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r3, 0x6, 0x1e, &(0x7f0000000040)=0x1, 0x4) setsockopt$inet6_tcp_TCP_REPAIR(r3, 0x6, 0x13, &(0x7f00000018c0)=0x1, 0x4) connect$inet6(r3, &(0x7f0000000080)={0xa, 0x0, 0x0, @loopback}, 0x1c) openat$cgroup_ro(r1, &(0x7f0000000180)='blkio.throttle.io_serviced_recursive\x00', 0x0, 0x0) 22:31:59 executing program 7: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000480)}}, 0x0, 0xffffffefffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x100000, 0xe, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000500100000f000000000000000100000005000000000004000040000020000000dbf4655fdbf4655f0100ffff53ef010001000000dbf4655f000000000000000001000000000000000b0000008000000018000000c20500002b0200"/116, 0x74, 0x400}, {&(0x7f0000010100)="000000000000000000000000244b8e9b57f04b59aa229cc218853f9501004000", 0x20, 0x4e0}, {&(0x7f0000010200)="010000000000050040", 0x9, 0x560}, {&(0x7f0000010300)="020000000300000004000000", 0xc, 0x800}, {&(0x7f0000010400), 0x0, 0x1000}, {&(0x7f0000011500), 0x0, 0x2080}, {0x0}, {0x0}, {&(0x7f0000011c00)="0b0000000c0001022e00000002000000f40702022e", 0x15, 0x10000}, {0x0}, {0x0}, {&(0x7f0000012400)="504d4d00504d4dffdbf4655f00000000647679756b6f762d676c6170746f70320000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000006c6f6f7033340075782f746573742f73797a5f6d6f756e745f696d6167655f650500"/123, 0x7b, 0x20000}, {0x0}, {0x0, 0x0, 0x38000}], 0x0, &(0x7f0000012f00)) 22:31:59 executing program 6: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) lsetxattr$security_evm(&(0x7f0000000240)='.\x00', &(0x7f0000000300), &(0x7f00000003c0)=@sha1={0x1, "bd2b5bce8b74aea700654a682479ac2c0852bc4d"}, 0x15, 0x3) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={&(0x7f0000000040), 0xb}, 0x0, 0x20, 0x0, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) r0 = fork() r1 = syz_open_procfs(0x0, &(0x7f0000000000)='status\x00') r2 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x2, 0x0) pwrite64(r2, &(0x7f00000000c0)='9', 0x1, 0x8040000) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x20, 0x3, 0x4, 0x1, 0x0, 0x8, 0x20620, 0x2, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x3f, 0x2, @perf_config_ext={0x240000000, 0x5}, 0x1400, 0x4, 0x8, 0x7, 0x9, 0x6, 0x6, 0x0, 0x1, 0x0, 0x8}, r0, 0xa, r2, 0x1) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r3, 0x6, 0x1e, &(0x7f0000000040)=0x1, 0x4) setsockopt$inet6_tcp_TCP_REPAIR(r3, 0x6, 0x13, &(0x7f00000018c0)=0x1, 0x4) connect$inet6(r3, &(0x7f0000000080)={0xa, 0x0, 0x0, @loopback}, 0x1c) openat$cgroup_ro(r1, &(0x7f0000000180)='blkio.throttle.io_serviced_recursive\x00', 0x0, 0x0) 22:31:59 executing program 4: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000480)}}, 0x0, 0xffffffefffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x100000, 0xe, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000500100000f000000000000000100000005000000000004000040000020000000dbf4655fdbf4655f0100ffff53ef010001000000dbf4655f000000000000000001000000000000000b0000008000000018000000c20500002b0200"/116, 0x74, 0x400}, {&(0x7f0000010100)="000000000000000000000000244b8e9b57f04b59aa229cc218853f9501004000", 0x20, 0x4e0}, {&(0x7f0000010200)="010000000000050040", 0x9, 0x560}, {&(0x7f0000010300)="020000000300000004000000", 0xc, 0x800}, {&(0x7f0000010400), 0x0, 0x1000}, {&(0x7f0000011500), 0x0, 0x2080}, {0x0}, {0x0}, {&(0x7f0000011c00)="0b0000000c0001022e00000002000000f40702022e", 0x15, 0x10000}, {0x0}, {0x0}, {&(0x7f0000012400)="504d4d00504d4dffdbf4655f00000000647679756b6f762d676c6170746f70320000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000006c6f6f7033340075782f746573742f73797a5f6d6f756e745f696d6167655f650500"/123, 0x7b, 0x20000}, {0x0}, {0x0, 0x0, 0x38000}], 0x0, &(0x7f0000012f00)) 22:31:59 executing program 2: perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000480)}}, 0x0, 0xffffffefffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x100000, 0xe, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000500100000f000000000000000100000005000000000004000040000020000000dbf4655fdbf4655f0100ffff53ef010001000000dbf4655f000000000000000001000000000000000b0000008000000018000000c20500002b0200"/116, 0x74, 0x400}, {&(0x7f0000010100)="000000000000000000000000244b8e9b57f04b59aa229cc218853f9501004000", 0x20, 0x4e0}, {&(0x7f0000010200)="010000000000050040", 0x9, 0x560}, {&(0x7f0000010300)="020000000300000004000000", 0xc, 0x800}, {&(0x7f0000010400), 0x0, 0x1000}, {&(0x7f0000011500)="ed41000000080000dbf4655fdbf4655fdbf4655f00000000000004", 0x1b, 0x2080}, {0x0}, {0x0}, {&(0x7f0000011c00)="0b0000000c0001022e00000002000000f40702022e", 0x15, 0x10000}, {0x0}, {0x0}, {&(0x7f0000012400)="504d4d00504d4dffdbf4655f00000000647679756b6f762d676c6170746f70320000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000006c6f6f7033340075782f746573742f73797a5f6d6f756e745f696d6167655f650500"/123, 0x7b, 0x20000}, {0x0}, {0x0, 0x0, 0x38000}], 0x0, &(0x7f0000012f00)) [ 1394.888089] loop7: detected capacity change from 0 to 2048 [ 1394.890733] EXT4-fs error (device loop4): __ext4_fill_super:5244: inode #2: comm syz-executor.4: iget: root inode unallocated [ 1394.893950] EXT4-fs (loop4): get root inode failed [ 1394.894945] EXT4-fs (loop4): mount failed [ 1394.908764] loop0: detected capacity change from 0 to 512 [ 1394.910644] loop2: detected capacity change from 0 to 2048 [ 1394.949100] EXT4-fs (loop0): bad geometry: block count 512 exceeds size of device (128 blocks) [ 1394.975937] EXT4-fs (loop2): corrupt root inode, run e2fsck [ 1394.977103] EXT4-fs (loop2): mount failed [ 1394.979327] EXT4-fs error (device loop7): __ext4_fill_super:5244: inode #2: comm syz-executor.7: iget: root inode unallocated [ 1394.981718] EXT4-fs (loop7): get root inode failed [ 1394.982379] EXT4-fs (loop7): mount failed 22:31:59 executing program 4: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000480)}}, 0x0, 0xffffffefffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x100000, 0xe, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000500100000f000000000000000100000005000000000004000040000020000000dbf4655fdbf4655f0100ffff53ef010001000000dbf4655f000000000000000001000000000000000b0000008000000018000000c20500002b0200"/116, 0x74, 0x400}, {&(0x7f0000010100)="000000000000000000000000244b8e9b57f04b59aa229cc218853f9501004000", 0x20, 0x4e0}, {&(0x7f0000010200)="010000000000050040", 0x9, 0x560}, {&(0x7f0000010300)="020000000300000004000000", 0xc, 0x800}, {&(0x7f0000010400), 0x0, 0x1000}, {&(0x7f0000011500), 0x0, 0x2080}, {0x0}, {0x0}, {&(0x7f0000011c00)="0b0000000c0001022e00000002000000f40702022e", 0x15, 0x10000}, {0x0}, {0x0}, {&(0x7f0000012400)="504d4d00504d4dffdbf4655f00000000647679756b6f762d676c6170746f70320000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000006c6f6f7033340075782f746573742f73797a5f6d6f756e745f696d6167655f650500"/123, 0x7b, 0x20000}, {0x0}, {0x0, 0x0, 0x38000}], 0x0, &(0x7f0000012f00)) 22:31:59 executing program 0: perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000480)}}, 0x0, 0xffffffefffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0xd, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000500100000f000000000000000100000005000000000004000040000020000000dbf4655fdbf4655f0100ffff53ef010001000000dbf4655f000000000000000001000000000000000b0000008000000018000000c20500002b0200"/116, 0x74, 0x400}, {&(0x7f0000010100)="000000000000000000000000244b8e9b57f04b59aa229cc218853f9501004000", 0x20, 0x4e0}, {&(0x7f0000010200)="010000000000050040", 0x9, 0x560}, {&(0x7f0000010300)="020000000300000004000000", 0xc}, {&(0x7f0000010400), 0x0, 0x1000}, {&(0x7f0000011500)="ed41000000080000dbf4655fdbf4655f", 0x10, 0x2080}, {0x0}, {0x0}, {0x0, 0x0, 0x10000}, {0x0}, {0x0}, {0x0, 0x0, 0x20000}, {0x0}], 0x0, &(0x7f0000012f00)) 22:31:59 executing program 2: perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000480)}}, 0x0, 0xffffffefffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x100000, 0xe, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000500100000f000000000000000100000005000000000004000040000020000000dbf4655fdbf4655f0100ffff53ef010001000000dbf4655f000000000000000001000000000000000b0000008000000018000000c20500002b0200"/116, 0x74, 0x400}, {&(0x7f0000010100)="000000000000000000000000244b8e9b57f04b59aa229cc218853f9501004000", 0x20, 0x4e0}, {&(0x7f0000010200)="010000000000050040", 0x9, 0x560}, {&(0x7f0000010300)="020000000300000004000000", 0xc, 0x800}, {&(0x7f0000010400), 0x0, 0x1000}, {&(0x7f0000011500)="ed41000000080000dbf4655fdbf4655fdbf4655f00000000000004", 0x1b, 0x2080}, {0x0}, {0x0}, {&(0x7f0000011c00)="0b0000000c0001022e00000002000000f40702022e", 0x15, 0x10000}, {0x0}, {0x0}, {&(0x7f0000012400)="504d4d00504d4dffdbf4655f00000000647679756b6f762d676c6170746f70320000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000006c6f6f7033340075782f746573742f73797a5f6d6f756e745f696d6167655f650500"/123, 0x7b, 0x20000}, {0x0}, {0x0, 0x0, 0x38000}], 0x0, &(0x7f0000012f00)) 22:31:59 executing program 7: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000480)}}, 0x0, 0xffffffefffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x100000, 0xe, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000500100000f000000000000000100000005000000000004000040000020000000dbf4655fdbf4655f0100ffff53ef010001000000dbf4655f000000000000000001000000000000000b0000008000000018000000c20500002b0200"/116, 0x74, 0x400}, {&(0x7f0000010100)="000000000000000000000000244b8e9b57f04b59aa229cc218853f9501004000", 0x20, 0x4e0}, {&(0x7f0000010200)="010000000000050040", 0x9, 0x560}, {&(0x7f0000010300)="020000000300000004000000", 0xc, 0x800}, {&(0x7f0000010400), 0x0, 0x1000}, {&(0x7f0000011500), 0x0, 0x2080}, {0x0}, {0x0}, {&(0x7f0000011c00)="0b0000000c0001022e00000002000000f40702022e", 0x15, 0x10000}, {0x0}, {0x0}, {&(0x7f0000012400)="504d4d00504d4dffdbf4655f00000000647679756b6f762d676c6170746f70320000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000006c6f6f7033340075782f746573742f73797a5f6d6f756e745f696d6167655f650500"/123, 0x7b, 0x20000}, {0x0}, {0x0, 0x0, 0x38000}], 0x0, &(0x7f0000012f00)) [ 1395.235800] loop0: detected capacity change from 0 to 512 [ 1395.258292] EXT4-fs (loop0): bad geometry: block count 512 exceeds size of device (128 blocks) [ 1395.259722] loop2: detected capacity change from 0 to 2048 [ 1395.262061] loop7: detected capacity change from 0 to 2048 [ 1395.281445] loop4: detected capacity change from 0 to 2048 [ 1395.308020] EXT4-fs error (device loop7): __ext4_fill_super:5244: inode #2: comm syz-executor.7: iget: root inode unallocated [ 1395.310342] EXT4-fs (loop7): get root inode failed [ 1395.311023] EXT4-fs (loop7): mount failed [ 1395.325597] EXT4-fs (loop2): corrupt root inode, run e2fsck [ 1395.326354] EXT4-fs (loop2): mount failed [ 1395.348100] EXT4-fs error (device loop4): __ext4_fill_super:5244: inode #2: comm syz-executor.4: iget: root inode unallocated [ 1395.350915] EXT4-fs (loop4): get root inode failed [ 1395.351867] EXT4-fs (loop4): mount failed 22:31:59 executing program 1: r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, @perf_config_ext, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000000), 0x0) r2 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) ioctl$EXT4_IOC_CHECKPOINT(r2, 0x4004662b, &(0x7f0000000100)=0x5) ioctl$AUTOFS_DEV_IOCTL_TIMEOUT(0xffffffffffffffff, 0xc018937a, &(0x7f0000001480)=ANY=[@ANYBLOB="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", @ANYRES32=r0, @ANYBLOB]) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r3, 0xc08c5332, &(0x7f00000013c0)={0xffffffff, 0x6964, 0x0, 'queue1\x00', 0xff}) r4 = gettid() process_vm_writev(r4, &(0x7f0000002580)=[{&(0x7f0000000140)=""/89, 0x59}, {&(0x7f00000001c0)=""/175, 0xaf}, {&(0x7f0000000280)=""/4096, 0x1000}], 0x3, &(0x7f0000003840)=[{&(0x7f0000002640)=""/105, 0x69}, {0xfffffffffffffffe, 0x10}], 0x2, 0x0) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r1, 0xc08c5332, &(0x7f0000001280)={0x3, 0x5, 0x0, 'queue1\x00', 0x8}) r5 = fork() write$sndseq(r1, &(0x7f0000001340)=[{0x22, 0x8, 0x2, 0x3, @time={0x4}, {0x0, 0x1}, {0x6, 0x81}, @raw32={[0x800, 0x3, 0x9]}}, {0xe1, 0x7, 0xf8, 0xff, @tick=0x2, {0x3f}, {0x4, 0xf1}, @queue={0xff, {0x6, 0x9}}}, {0x4, 0x1, 0x9, 0x5, @time={0x7, 0x6}, {0x7c, 0x2}, {0x20, 0x6}, @connect={{0x0, 0xfd}, {0x98, 0x4}}}, {0x80, 0x4, 0x7, 0x7d, @time={0xfffff000, 0x9}, {0x81, 0x1f}, {0xaa}, @queue={0x5, {0xffffffe0, 0x3}}}], 0x70) r6 = syz_open_dev$vcsn(&(0x7f0000000040), 0x3, 0x2001) ioctl$LOOP_CTL_GET_FREE(r6, 0x4c82) ptrace$setopts(0x4206, r5, 0x0, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fork() fork() clone3(&(0x7f0000004c00)={0xc0002100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) 22:31:59 executing program 0: perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000480)}}, 0x0, 0xffffffefffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0xd, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000500100000f000000000000000100000005000000000004000040000020000000dbf4655fdbf4655f0100ffff53ef010001000000dbf4655f000000000000000001000000000000000b0000008000000018000000c20500002b0200"/116, 0x74, 0x400}, {&(0x7f0000010100)="000000000000000000000000244b8e9b57f04b59aa229cc218853f9501004000", 0x20, 0x4e0}, {&(0x7f0000010200)="010000000000050040", 0x9, 0x560}, {&(0x7f0000010300)="020000000300000004000000", 0xc}, {&(0x7f0000010400), 0x0, 0x1000}, {&(0x7f0000011500)="ed41000000080000dbf4655fdbf4655f", 0x10, 0x2080}, {0x0}, {0x0}, {0x0, 0x0, 0x10000}, {0x0}, {0x0}, {0x0, 0x0, 0x20000}, {0x0}], 0x0, &(0x7f0000012f00)) [ 1395.490720] loop0: detected capacity change from 0 to 512 [ 1395.497436] EXT4-fs (loop0): bad geometry: block count 512 exceeds size of device (128 blocks) 22:32:15 executing program 2: perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000480)}}, 0x0, 0xffffffefffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x100000, 0xe, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000500100000f000000000000000100000005000000000004000040000020000000dbf4655fdbf4655f0100ffff53ef010001000000dbf4655f000000000000000001000000000000000b0000008000000018000000c20500002b0200"/116, 0x74, 0x400}, {&(0x7f0000010100)="000000000000000000000000244b8e9b57f04b59aa229cc218853f9501004000", 0x20, 0x4e0}, {&(0x7f0000010200)="010000000000050040", 0x9, 0x560}, {&(0x7f0000010300)="020000000300000004000000", 0xc, 0x800}, {&(0x7f0000010400), 0x0, 0x1000}, {&(0x7f0000011500)="ed41000000080000dbf4655fdbf4655fdbf4655f00000000000004", 0x1b, 0x2080}, {0x0}, {0x0}, {&(0x7f0000011c00)="0b0000000c0001022e00000002000000f40702022e", 0x15, 0x10000}, {0x0}, {0x0}, {&(0x7f0000012400)="504d4d00504d4dffdbf4655f00000000647679756b6f762d676c6170746f70320000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000006c6f6f7033340075782f746573742f73797a5f6d6f756e745f696d6167655f650500"/123, 0x7b, 0x20000}, {0x0}, {0x0, 0x0, 0x38000}], 0x0, &(0x7f0000012f00)) 22:32:15 executing program 7: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000480)}}, 0x0, 0xffffffefffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x100000, 0xe, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000500100000f000000000000000100000005000000000004000040000020000000dbf4655fdbf4655f0100ffff53ef010001000000dbf4655f000000000000000001000000000000000b0000008000000018000000c20500002b0200"/116, 0x74, 0x400}, {&(0x7f0000010100)="000000000000000000000000244b8e9b57f04b59aa229cc218853f9501004000", 0x20, 0x4e0}, {&(0x7f0000010200)="010000000000050040", 0x9, 0x560}, {&(0x7f0000010300)="020000000300000004000000", 0xc, 0x800}, {&(0x7f0000010400), 0x0, 0x1000}, {&(0x7f0000011500)="ed41000000080000dbf4655fdbf465", 0xf, 0x2080}, {0x0}, {0x0}, {&(0x7f0000011c00)="0b0000000c0001022e00000002000000f40702022e", 0x15, 0x10000}, {0x0}, {0x0}, {&(0x7f0000012400)="504d4d00504d4dffdbf4655f00000000647679756b6f762d676c6170746f70320000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000006c6f6f7033340075782f746573742f73797a5f6d6f756e745f696d6167655f650500"/123, 0x7b, 0x20000}, {0x0}, {0x0, 0x0, 0x38000}], 0x0, &(0x7f0000012f00)) 22:32:15 executing program 1: r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, @perf_config_ext, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000000), 0x0) r2 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) ioctl$EXT4_IOC_CHECKPOINT(r2, 0x4004662b, &(0x7f0000000100)=0x5) ioctl$AUTOFS_DEV_IOCTL_TIMEOUT(0xffffffffffffffff, 0xc018937a, &(0x7f0000001480)=ANY=[@ANYBLOB="010000fe04f804f32d1ae95f4d8fd9ce99ff00010000001800000059a5a91fc707002c3e05f0bcf35234dd60eedec3d5f1b58f0d41f6996d0df70b25316c86b91cf6440f87695b3e2bf9118d7b986e6dd6169cde2d7b35569ff3c18ea708da093a5e297fd2ec2322a167617fa6662e65407cedfd90d2ee90deccf04f2c85b215e5090cb50628f934703c2db873b5eb9a2e276f987493cc445a8474761879f6df5a5233b80656c014a59590366f77d5104d838160f3f8f304bbfb07a672117635569099d752c2b724b38b74a3b0e2c4dd54619ff2e05de8c58ace02796bd997ccfd3fbf04c5bb7420f2656931eb46c8e72d17fd9b33dd84ff6fab17ff995be40bf9a47cdde574665966c721e5f265d3aaac1788c3ea", @ANYRES32=r0, @ANYBLOB]) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r3, 0xc08c5332, &(0x7f00000013c0)={0xffffffff, 0x6964, 0x0, 'queue1\x00', 0xff}) r4 = gettid() process_vm_writev(r4, &(0x7f0000002580)=[{&(0x7f0000000140)=""/89, 0x59}, {&(0x7f00000001c0)=""/175, 0xaf}, {&(0x7f0000000280)=""/4096, 0x1000}], 0x3, &(0x7f0000003840)=[{&(0x7f0000002640)=""/105, 0x69}, {0xfffffffffffffffe, 0x10}], 0x2, 0x0) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r1, 0xc08c5332, &(0x7f0000001280)={0x3, 0x5, 0x0, 'queue1\x00', 0x8}) r5 = fork() write$sndseq(r1, &(0x7f0000001340)=[{0x22, 0x8, 0x2, 0x3, @time={0x4}, {0x0, 0x1}, {0x6, 0x81}, @raw32={[0x800, 0x3, 0x9]}}, {0xe1, 0x7, 0xf8, 0xff, @tick=0x2, {0x3f}, {0x4, 0xf1}, @queue={0xff, {0x6, 0x9}}}, {0x4, 0x1, 0x9, 0x5, @time={0x7, 0x6}, {0x7c, 0x2}, {0x20, 0x6}, @connect={{0x0, 0xfd}, {0x98, 0x4}}}, {0x80, 0x4, 0x7, 0x7d, @time={0xfffff000, 0x9}, {0x81, 0x1f}, {0xaa}, @queue={0x5, {0xffffffe0, 0x3}}}], 0x70) r6 = syz_open_dev$vcsn(&(0x7f0000000040), 0x3, 0x2001) ioctl$LOOP_CTL_GET_FREE(r6, 0x4c82) ptrace$setopts(0x4206, r5, 0x0, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fork() fork() clone3(&(0x7f0000004c00)={0xc0002100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) 22:32:15 executing program 0: perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000480)}}, 0x0, 0xffffffefffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0xd, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000500100000f000000000000000100000005000000000004000040000020000000dbf4655fdbf4655f0100ffff53ef010001000000dbf4655f000000000000000001000000000000000b0000008000000018000000c20500002b0200"/116, 0x74, 0x400}, {&(0x7f0000010100)="000000000000000000000000244b8e9b57f04b59aa229cc218853f9501004000", 0x20, 0x4e0}, {&(0x7f0000010200)="010000000000050040", 0x9, 0x560}, {&(0x7f0000010300)="020000000300000004000000", 0xc}, {&(0x7f0000010400), 0x0, 0x1000}, {&(0x7f0000011500)="ed41000000080000dbf4655fdbf4655f", 0x10, 0x2080}, {0x0}, {0x0}, {0x0, 0x0, 0x10000}, {0x0}, {0x0}, {0x0, 0x0, 0x20000}, {0x0}], 0x0, &(0x7f0000012f00)) 22:32:15 executing program 3: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) lsetxattr$security_evm(&(0x7f0000000240)='.\x00', &(0x7f0000000300), &(0x7f00000003c0)=@sha1={0x1, "bd2b5bce8b74aea700654a682479ac2c0852bc4d"}, 0x15, 0x3) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={&(0x7f0000000040), 0xb}, 0x0, 0x20, 0x0, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) r0 = fork() r1 = syz_open_procfs(r0, &(0x7f0000000000)='status\x00') r2 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x0, 0x0) pwrite64(r2, &(0x7f00000000c0)='9', 0x1, 0x8040000) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x20, 0x3, 0x4, 0x1, 0x0, 0x8, 0x20620, 0x2, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x3f, 0x2, @perf_config_ext={0x240000000, 0x5}, 0x1400, 0x4, 0x8, 0x7, 0x9, 0x6, 0x6, 0x0, 0x1, 0x0, 0x8}, r0, 0xa, r2, 0x1) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r3, 0x6, 0x1e, &(0x7f0000000040)=0x1, 0x4) setsockopt$inet6_tcp_TCP_REPAIR(r3, 0x6, 0x13, &(0x7f00000018c0)=0x1, 0x4) connect$inet6(r3, &(0x7f0000000080)={0xa, 0x0, 0x0, @loopback}, 0x1c) openat$cgroup_ro(r1, &(0x7f0000000180)='blkio.throttle.io_serviced_recursive\x00', 0x0, 0x0) 22:32:15 executing program 5: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) lsetxattr$security_evm(&(0x7f0000000240)='.\x00', &(0x7f0000000300), &(0x7f00000003c0)=@sha1={0x1, "bd2b5bce8b74aea700654a682479ac2c0852bc4d"}, 0x15, 0x3) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={&(0x7f0000000040), 0xb}, 0x0, 0x20, 0x0, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = fork() r1 = syz_open_procfs(r0, &(0x7f0000000000)='status\x00') r2 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x2, 0x0) pwrite64(r2, &(0x7f00000000c0)='9', 0x1, 0x8040000) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x20, 0x3, 0x4, 0x1, 0x0, 0x8, 0x20620, 0x2, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x3f, 0x2, @perf_config_ext={0x240000000, 0x5}, 0x1400, 0x4, 0x8, 0x7, 0x9, 0x6, 0x6, 0x0, 0x1, 0x0, 0x8}, r0, 0xa, r2, 0x1) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r3, 0x6, 0x1e, &(0x7f0000000040)=0x1, 0x4) connect$inet6(r3, &(0x7f0000000080)={0xa, 0x0, 0x0, @loopback}, 0x1c) openat$cgroup_ro(r1, &(0x7f0000000180)='blkio.throttle.io_serviced_recursive\x00', 0x0, 0x0) 22:32:15 executing program 6: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) lsetxattr$security_evm(&(0x7f0000000240)='.\x00', &(0x7f0000000300), &(0x7f00000003c0)=@sha1={0x1, "bd2b5bce8b74aea700654a682479ac2c0852bc4d"}, 0x15, 0x3) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={&(0x7f0000000040), 0xb}, 0x0, 0x20, 0x0, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) r0 = fork() r1 = syz_open_procfs(0x0, &(0x7f0000000000)='status\x00') r2 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x2, 0x0) pwrite64(r2, &(0x7f00000000c0)='9', 0x1, 0x8040000) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x20, 0x3, 0x4, 0x1, 0x0, 0x8, 0x20620, 0x2, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x3f, 0x2, @perf_config_ext={0x240000000, 0x5}, 0x1400, 0x4, 0x8, 0x7, 0x9, 0x6, 0x6, 0x0, 0x1, 0x0, 0x8}, r0, 0xa, r2, 0x1) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r3, 0x6, 0x1e, &(0x7f0000000040)=0x1, 0x4) setsockopt$inet6_tcp_TCP_REPAIR(r3, 0x6, 0x13, &(0x7f00000018c0)=0x1, 0x4) connect$inet6(r3, &(0x7f0000000080)={0xa, 0x0, 0x0, @loopback}, 0x1c) openat$cgroup_ro(r1, &(0x7f0000000180)='blkio.throttle.io_serviced_recursive\x00', 0x0, 0x0) 22:32:15 executing program 4: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000480)}}, 0x0, 0xffffffefffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x100000, 0xe, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000500100000f000000000000000100000005000000000004000040000020000000dbf4655fdbf4655f0100ffff53ef010001000000dbf4655f000000000000000001000000000000000b0000008000000018000000c20500002b0200"/116, 0x74, 0x400}, {&(0x7f0000010100)="000000000000000000000000244b8e9b57f04b59aa229cc218853f9501004000", 0x20, 0x4e0}, {&(0x7f0000010200)="010000000000050040", 0x9, 0x560}, {&(0x7f0000010300)="020000000300000004000000", 0xc, 0x800}, {&(0x7f0000010400), 0x0, 0x1000}, {&(0x7f0000011500), 0x0, 0x2080}, {0x0}, {0x0}, {&(0x7f0000011c00)="0b0000000c0001022e00000002000000f40702022e", 0x15, 0x10000}, {0x0}, {0x0}, {&(0x7f0000012400)="504d4d00504d4dffdbf4655f00000000647679756b6f762d676c6170746f70320000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000006c6f6f7033340075782f746573742f73797a5f6d6f756e745f696d6167655f650500"/123, 0x7b, 0x20000}, {0x0}, {0x0, 0x0, 0x38000}], 0x0, &(0x7f0000012f00)) [ 1411.256892] loop7: detected capacity change from 0 to 2048 [ 1411.278992] loop0: detected capacity change from 0 to 512 [ 1411.282859] loop2: detected capacity change from 0 to 2048 [ 1411.290393] EXT4-fs error (device loop7): __ext4_fill_super:5244: inode #2: comm syz-executor.7: iget: root inode unallocated [ 1411.292450] EXT4-fs (loop7): get root inode failed [ 1411.292993] EXT4-fs (loop7): mount failed [ 1411.306409] loop4: detected capacity change from 0 to 2048 [ 1411.308872] EXT4-fs (loop0): bad geometry: block count 512 exceeds size of device (128 blocks) [ 1411.338289] EXT4-fs (loop2): corrupt root inode, run e2fsck [ 1411.339011] EXT4-fs (loop2): mount failed [ 1411.354745] EXT4-fs error (device loop4): __ext4_fill_super:5244: inode #2: comm syz-executor.4: iget: root inode unallocated [ 1411.357409] EXT4-fs (loop4): get root inode failed [ 1411.358370] EXT4-fs (loop4): mount failed 22:32:15 executing program 0: perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000480)}}, 0x0, 0xffffffefffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0xc, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000500100000f000000000000000100000005000000000004000040000020000000dbf4655fdbf4655f0100ffff53ef010001000000dbf4655f000000000000000001000000000000000b0000008000000018000000c20500002b0200"/116, 0x74, 0x400}, {&(0x7f0000010100)="000000000000000000000000244b8e9b57f04b59aa229cc218853f9501004000", 0x20, 0x4e0}, {&(0x7f0000010300)="020000000300000004000000", 0xc, 0x800}, {&(0x7f0000010400), 0x0, 0x1000}, {&(0x7f0000011500)="ed41000000080000dbf4655fdbf4655f", 0x10, 0x2080}, {0x0}, {0x0}, {0x0, 0x0, 0x10000}, {0x0}, {0x0}, {0x0, 0x0, 0x20000}, {0x0}], 0x0, &(0x7f0000012f00)) [ 1411.452429] loop0: detected capacity change from 0 to 512 22:32:16 executing program 7: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000480)}}, 0x0, 0xffffffefffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x100000, 0xe, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000500100000f000000000000000100000005000000000004000040000020000000dbf4655fdbf4655f0100ffff53ef010001000000dbf4655f000000000000000001000000000000000b0000008000000018000000c20500002b0200"/116, 0x74, 0x400}, {&(0x7f0000010100)="000000000000000000000000244b8e9b57f04b59aa229cc218853f9501004000", 0x20, 0x4e0}, {&(0x7f0000010200)="010000000000050040", 0x9, 0x560}, {&(0x7f0000010300)="020000000300000004000000", 0xc, 0x800}, {&(0x7f0000010400), 0x0, 0x1000}, {&(0x7f0000011500)="ed41000000080000dbf4655fdbf465", 0xf, 0x2080}, {0x0}, {0x0}, {&(0x7f0000011c00)="0b0000000c0001022e00000002000000f40702022e", 0x15, 0x10000}, {0x0}, {0x0}, {&(0x7f0000012400)="504d4d00504d4dffdbf4655f00000000647679756b6f762d676c6170746f70320000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000006c6f6f7033340075782f746573742f73797a5f6d6f756e745f696d6167655f650500"/123, 0x7b, 0x20000}, {0x0}, {0x0, 0x0, 0x38000}], 0x0, &(0x7f0000012f00)) 22:32:16 executing program 4: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000480)}}, 0x0, 0xffffffefffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x100000, 0xe, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000500100000f000000000000000100000005000000000004000040000020000000dbf4655fdbf4655f0100ffff53ef010001000000dbf4655f000000000000000001000000000000000b0000008000000018000000c20500002b0200"/116, 0x74, 0x400}, {&(0x7f0000010100)="000000000000000000000000244b8e9b57f04b59aa229cc218853f9501004000", 0x20, 0x4e0}, {&(0x7f0000010200)="010000000000050040", 0x9, 0x560}, {&(0x7f0000010300)="020000000300000004000000", 0xc, 0x800}, {&(0x7f0000010400), 0x0, 0x1000}, {&(0x7f0000011500)="ed41000000080000dbf4655fdbf465", 0xf, 0x2080}, {0x0}, {0x0}, {&(0x7f0000011c00)="0b0000000c0001022e00000002000000f40702022e", 0x15, 0x10000}, {0x0}, {0x0}, {&(0x7f0000012400)="504d4d00504d4dffdbf4655f00000000647679756b6f762d676c6170746f70320000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000006c6f6f7033340075782f746573742f73797a5f6d6f756e745f696d6167655f650500"/123, 0x7b, 0x20000}, {0x0}, {0x0, 0x0, 0x38000}], 0x0, &(0x7f0000012f00)) [ 1411.484598] EXT4-fs (loop0): bad geometry: block count 512 exceeds size of device (128 blocks) 22:32:16 executing program 2: perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000480)}}, 0x0, 0xffffffefffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x100000, 0xe, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000500100000f000000000000000100000005000000000004000040000020000000dbf4655fdbf4655f0100ffff53ef010001000000dbf4655f000000000000000001000000000000000b0000008000000018000000c20500002b0200"/116, 0x74, 0x400}, {&(0x7f0000010100)="000000000000000000000000244b8e9b57f04b59aa229cc218853f9501004000", 0x20, 0x4e0}, {&(0x7f0000010200)="010000000000050040", 0x9, 0x560}, {&(0x7f0000010300)="020000000300000004000000", 0xc, 0x800}, {&(0x7f0000010400), 0x0, 0x1000}, {&(0x7f0000011500)="ed41000000080000dbf4655fdbf4655fdbf4655f000000000000040040", 0x1d, 0x2080}, {0x0}, {0x0}, {&(0x7f0000011c00)="0b0000000c0001022e00000002000000f40702022e", 0x15, 0x10000}, {0x0}, {0x0}, {&(0x7f0000012400)="504d4d00504d4dffdbf4655f00000000647679756b6f762d676c6170746f70320000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000006c6f6f7033340075782f746573742f73797a5f6d6f756e745f696d6167655f650500"/123, 0x7b, 0x20000}, {0x0}, {0x0, 0x0, 0x38000}], 0x0, &(0x7f0000012f00)) [ 1411.534885] loop4: detected capacity change from 0 to 2048 [ 1411.579564] EXT4-fs error (device loop4): __ext4_fill_super:5244: inode #2: comm syz-executor.4: iget: root inode unallocated [ 1411.582237] loop7: detected capacity change from 0 to 2048 [ 1411.585219] EXT4-fs (loop4): get root inode failed [ 1411.585715] EXT4-fs (loop4): mount failed 22:32:16 executing program 0: perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000480)}}, 0x0, 0xffffffefffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0xc, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000500100000f000000000000000100000005000000000004000040000020000000dbf4655fdbf4655f0100ffff53ef010001000000dbf4655f000000000000000001000000000000000b0000008000000018000000c20500002b0200"/116, 0x74, 0x400}, {&(0x7f0000010100)="000000000000000000000000244b8e9b57f04b59aa229cc218853f9501004000", 0x20, 0x4e0}, {&(0x7f0000010300)="020000000300000004000000", 0xc, 0x800}, {&(0x7f0000010400), 0x0, 0x1000}, {&(0x7f0000011500)="ed41000000080000dbf4655fdbf4655f", 0x10, 0x2080}, {0x0}, {0x0}, {0x0, 0x0, 0x10000}, {0x0}, {0x0}, {0x0, 0x0, 0x20000}, {0x0}], 0x0, &(0x7f0000012f00)) [ 1411.640204] loop2: detected capacity change from 0 to 2048 22:32:16 executing program 5: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) lsetxattr$security_evm(&(0x7f0000000240)='.\x00', &(0x7f0000000300), &(0x7f00000003c0)=@sha1={0x1, "bd2b5bce8b74aea700654a682479ac2c0852bc4d"}, 0x15, 0x3) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={&(0x7f0000000040), 0xb}, 0x0, 0x20, 0x0, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = fork() r1 = syz_open_procfs(r0, &(0x7f0000000000)='status\x00') r2 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x2, 0x0) pwrite64(r2, &(0x7f00000000c0)='9', 0x1, 0x8040000) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x20, 0x3, 0x4, 0x1, 0x0, 0x8, 0x20620, 0x2, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x3f, 0x2, @perf_config_ext={0x240000000, 0x5}, 0x1400, 0x4, 0x8, 0x7, 0x9, 0x6, 0x6, 0x0, 0x1, 0x0, 0x8}, r0, 0xa, r2, 0x1) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r3, 0x6, 0x1e, &(0x7f0000000040)=0x1, 0x4) connect$inet6(r3, &(0x7f0000000080)={0xa, 0x0, 0x0, @loopback}, 0x1c) openat$cgroup_ro(r1, &(0x7f0000000180)='blkio.throttle.io_serviced_recursive\x00', 0x0, 0x0) 22:32:16 executing program 1: r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, @perf_config_ext, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000000), 0x0) r2 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) ioctl$EXT4_IOC_CHECKPOINT(r2, 0x4004662b, &(0x7f0000000100)=0x5) ioctl$AUTOFS_DEV_IOCTL_TIMEOUT(0xffffffffffffffff, 0xc018937a, &(0x7f0000001480)=ANY=[@ANYBLOB="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", @ANYRES32=r0, @ANYBLOB]) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r3, 0xc08c5332, &(0x7f00000013c0)={0xffffffff, 0x6964, 0x0, 'queue1\x00', 0xff}) r4 = gettid() process_vm_writev(r4, &(0x7f0000002580)=[{&(0x7f0000000140)=""/89, 0x59}, {&(0x7f00000001c0)=""/175, 0xaf}, {&(0x7f0000000280)=""/4096, 0x1000}], 0x3, &(0x7f0000003840)=[{&(0x7f0000002640)=""/105, 0x69}, {0xfffffffffffffffe, 0x10}], 0x2, 0x0) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r1, 0xc08c5332, &(0x7f0000001280)={0x3, 0x5, 0x0, 'queue1\x00', 0x8}) r5 = fork() write$sndseq(r1, &(0x7f0000001340)=[{0x22, 0x8, 0x2, 0x3, @time={0x4}, {0x0, 0x1}, {0x6, 0x81}, @raw32={[0x800, 0x3, 0x9]}}, {0xe1, 0x7, 0xf8, 0xff, @tick=0x2, {0x3f}, {0x4, 0xf1}, @queue={0xff, {0x6, 0x9}}}, {0x4, 0x1, 0x9, 0x5, @time={0x7, 0x6}, {0x7c, 0x2}, {0x20, 0x6}, @connect={{0x0, 0xfd}, {0x98, 0x4}}}, {0x80, 0x4, 0x7, 0x7d, @time={0xfffff000, 0x9}, {0x81, 0x1f}, {0xaa}, @queue={0x5, {0xffffffe0, 0x3}}}], 0x70) r6 = syz_open_dev$vcsn(&(0x7f0000000040), 0x3, 0x2001) ioctl$LOOP_CTL_GET_FREE(r6, 0x4c82) ptrace$setopts(0x4206, r5, 0x0, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fork() fork() clone3(&(0x7f0000004c00)={0xc0002100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) [ 1411.679116] loop0: detected capacity change from 0 to 512 [ 1411.681952] EXT4-fs error (device loop7): __ext4_fill_super:5244: inode #2: comm syz-executor.7: iget: root inode unallocated [ 1411.687638] EXT4-fs (loop2): mounted filesystem without journal. Quota mode: none. [ 1411.693358] ext4 filesystem being mounted at /syzkaller-testdir307671421/syzkaller.SFQaEW/154/file0 supports timestamps until 2038 (0x7fffffff) [ 1411.696825] EXT4-fs (loop7): get root inode failed [ 1411.697882] EXT4-fs (loop7): mount failed 22:32:16 executing program 4: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000480)}}, 0x0, 0xffffffefffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x100000, 0xe, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000500100000f000000000000000100000005000000000004000040000020000000dbf4655fdbf4655f0100ffff53ef010001000000dbf4655f000000000000000001000000000000000b0000008000000018000000c20500002b0200"/116, 0x74, 0x400}, {&(0x7f0000010100)="000000000000000000000000244b8e9b57f04b59aa229cc218853f9501004000", 0x20, 0x4e0}, {&(0x7f0000010200)="010000000000050040", 0x9, 0x560}, {&(0x7f0000010300)="020000000300000004000000", 0xc, 0x800}, {&(0x7f0000010400), 0x0, 0x1000}, {&(0x7f0000011500)="ed41000000080000dbf4655fdbf465", 0xf, 0x2080}, {0x0}, {0x0}, {&(0x7f0000011c00)="0b0000000c0001022e00000002000000f40702022e", 0x15, 0x10000}, {0x0}, {0x0}, {&(0x7f0000012400)="504d4d00504d4dffdbf4655f00000000647679756b6f762d676c6170746f70320000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000006c6f6f7033340075782f746573742f73797a5f6d6f756e745f696d6167655f650500"/123, 0x7b, 0x20000}, {0x0}, {0x0, 0x0, 0x38000}], 0x0, &(0x7f0000012f00)) [ 1411.731572] EXT4-fs (loop0): bad geometry: block count 512 exceeds size of device (128 blocks) 22:32:16 executing program 6: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) lsetxattr$security_evm(&(0x7f0000000240)='.\x00', &(0x7f0000000300), &(0x7f00000003c0)=@sha1={0x1, "bd2b5bce8b74aea700654a682479ac2c0852bc4d"}, 0x15, 0x3) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={&(0x7f0000000040), 0xb}, 0x0, 0x20, 0x0, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) r0 = fork() r1 = syz_open_procfs(r0, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x2, 0x0) pwrite64(r2, &(0x7f00000000c0)='9', 0x1, 0x8040000) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x20, 0x3, 0x4, 0x1, 0x0, 0x8, 0x20620, 0x2, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x3f, 0x2, @perf_config_ext={0x240000000, 0x5}, 0x1400, 0x4, 0x8, 0x7, 0x9, 0x6, 0x6, 0x0, 0x1, 0x0, 0x8}, r0, 0xa, r2, 0x1) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r3, 0x6, 0x1e, &(0x7f0000000040)=0x1, 0x4) setsockopt$inet6_tcp_TCP_REPAIR(r3, 0x6, 0x13, &(0x7f00000018c0)=0x1, 0x4) connect$inet6(r3, &(0x7f0000000080)={0xa, 0x0, 0x0, @loopback}, 0x1c) openat$cgroup_ro(r1, &(0x7f0000000180)='blkio.throttle.io_serviced_recursive\x00', 0x0, 0x0) 22:32:16 executing program 0: perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000480)}}, 0x0, 0xffffffefffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0xc, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000500100000f000000000000000100000005000000000004000040000020000000dbf4655fdbf4655f0100ffff53ef010001000000dbf4655f000000000000000001000000000000000b0000008000000018000000c20500002b0200"/116, 0x74, 0x400}, {&(0x7f0000010100)="000000000000000000000000244b8e9b57f04b59aa229cc218853f9501004000", 0x20, 0x4e0}, {&(0x7f0000010300)="020000000300000004000000", 0xc, 0x800}, {&(0x7f0000010400), 0x0, 0x1000}, {&(0x7f0000011500)="ed41000000080000dbf4655fdbf4655f", 0x10, 0x2080}, {0x0}, {0x0}, {0x0, 0x0, 0x10000}, {0x0}, {0x0}, {0x0, 0x0, 0x20000}, {0x0}], 0x0, &(0x7f0000012f00)) [ 1411.807651] loop4: detected capacity change from 0 to 2048 [ 1411.832403] EXT4-fs (loop2): unmounting filesystem. 22:32:16 executing program 3: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) lsetxattr$security_evm(&(0x7f0000000240)='.\x00', &(0x7f0000000300), &(0x7f00000003c0)=@sha1={0x1, "bd2b5bce8b74aea700654a682479ac2c0852bc4d"}, 0x15, 0x3) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={&(0x7f0000000040), 0xb}, 0x0, 0x20, 0x0, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) r0 = fork() r1 = syz_open_procfs(r0, &(0x7f0000000000)='status\x00') r2 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x0, 0x0) pwrite64(r2, &(0x7f00000000c0)='9', 0x1, 0x8040000) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x20, 0x3, 0x4, 0x1, 0x0, 0x8, 0x20620, 0x2, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x3f, 0x2, @perf_config_ext={0x240000000, 0x5}, 0x1400, 0x4, 0x8, 0x7, 0x9, 0x6, 0x6, 0x0, 0x1, 0x0, 0x8}, r0, 0xa, r2, 0x1) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r3, 0x6, 0x1e, &(0x7f0000000040)=0x1, 0x4) setsockopt$inet6_tcp_TCP_REPAIR(r3, 0x6, 0x13, &(0x7f00000018c0)=0x1, 0x4) connect$inet6(r3, &(0x7f0000000080)={0xa, 0x0, 0x0, @loopback}, 0x1c) openat$cgroup_ro(r1, &(0x7f0000000180)='blkio.throttle.io_serviced_recursive\x00', 0x0, 0x0) 22:32:16 executing program 2: perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000480)}}, 0x0, 0xffffffefffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x100000, 0xe, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000500100000f000000000000000100000005000000000004000040000020000000dbf4655fdbf4655f0100ffff53ef010001000000dbf4655f000000000000000001000000000000000b0000008000000018000000c20500002b0200"/116, 0x74, 0x400}, {&(0x7f0000010100)="000000000000000000000000244b8e9b57f04b59aa229cc218853f9501004000", 0x20, 0x4e0}, {&(0x7f0000010200)="010000000000050040", 0x9, 0x560}, {&(0x7f0000010300)="020000000300000004000000", 0xc, 0x800}, {&(0x7f0000010400), 0x0, 0x1000}, {&(0x7f0000011500)="ed41000000080000dbf4655fdbf4655fdbf4655f000000000000040040", 0x1d, 0x2080}, {0x0}, {0x0}, {&(0x7f0000011c00)="0b0000000c0001022e00000002000000f40702022e", 0x15, 0x10000}, {0x0}, {0x0}, {&(0x7f0000012400)="504d4d00504d4dffdbf4655f00000000647679756b6f762d676c6170746f70320000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000006c6f6f7033340075782f746573742f73797a5f6d6f756e745f696d6167655f650500"/123, 0x7b, 0x20000}, {0x0}, {0x0, 0x0, 0x38000}], 0x0, &(0x7f0000012f00)) 22:32:16 executing program 7: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000480)}}, 0x0, 0xffffffefffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x100000, 0xe, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000500100000f000000000000000100000005000000000004000040000020000000dbf4655fdbf4655f0100ffff53ef010001000000dbf4655f000000000000000001000000000000000b0000008000000018000000c20500002b0200"/116, 0x74, 0x400}, {&(0x7f0000010100)="000000000000000000000000244b8e9b57f04b59aa229cc218853f9501004000", 0x20, 0x4e0}, {&(0x7f0000010200)="010000000000050040", 0x9, 0x560}, {&(0x7f0000010300)="020000000300000004000000", 0xc, 0x800}, {&(0x7f0000010400), 0x0, 0x1000}, {&(0x7f0000011500)="ed41000000080000dbf4655fdbf465", 0xf, 0x2080}, {0x0}, {0x0}, {&(0x7f0000011c00)="0b0000000c0001022e00000002000000f40702022e", 0x15, 0x10000}, {0x0}, {0x0}, {&(0x7f0000012400)="504d4d00504d4dffdbf4655f00000000647679756b6f762d676c6170746f70320000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000006c6f6f7033340075782f746573742f73797a5f6d6f756e745f696d6167655f650500"/123, 0x7b, 0x20000}, {0x0}, {0x0, 0x0, 0x38000}], 0x0, &(0x7f0000012f00)) [ 1411.884605] EXT4-fs error (device loop4): __ext4_fill_super:5244: inode #2: comm syz-executor.4: iget: root inode unallocated [ 1411.886694] EXT4-fs (loop4): get root inode failed [ 1411.887087] EXT4-fs (loop4): mount failed [ 1411.919329] loop0: detected capacity change from 0 to 512 [ 1411.931065] EXT4-fs (loop0): bad geometry: block count 512 exceeds size of device (128 blocks) [ 1411.942865] loop2: detected capacity change from 0 to 2048 22:32:16 executing program 0: perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000480)}}, 0x0, 0xffffffefffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0xd, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000500100000f000000000000000100000005000000000004000040000020000000dbf4655fdbf4655f0100ffff53ef010001000000dbf4655f000000000000000001000000000000000b0000008000000018000000c20500002b0200"/116, 0x74, 0x400}, {&(0x7f0000010100)="000000000000000000000000244b8e9b57f04b59aa229cc218853f9501004000", 0x20, 0x4e0}, {0x0, 0x0, 0x560}, {&(0x7f0000010300)="020000000300000004000000", 0xc, 0x800}, {&(0x7f0000010400), 0x0, 0x1000}, {&(0x7f0000011500)="ed41000000080000dbf4655fdbf4655f", 0x10, 0x2080}, {0x0}, {0x0}, {0x0, 0x0, 0x10000}, {0x0}, {0x0}, {0x0, 0x0, 0x20000}, {0x0}], 0x0, &(0x7f0000012f00)) 22:32:16 executing program 7: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000480)}}, 0x0, 0xffffffefffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x100000, 0xe, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000500100000f000000000000000100000005000000000004000040000020000000dbf4655fdbf4655f0100ffff53ef010001000000dbf4655f000000000000000001000000000000000b0000008000000018000000c20500002b0200"/116, 0x74, 0x400}, {&(0x7f0000010100)="000000000000000000000000244b8e9b57f04b59aa229cc218853f9501004000", 0x20, 0x4e0}, {&(0x7f0000010200)="010000000000050040", 0x9, 0x560}, {&(0x7f0000010300)="020000000300000004000000", 0xc, 0x800}, {&(0x7f0000010400), 0x0, 0x1000}, {&(0x7f0000011500)="ed41000000080000dbf4655fdbf4655fdbf4655f000000", 0x17, 0x2080}, {0x0}, {0x0}, {&(0x7f0000011c00)="0b0000000c0001022e00000002000000f40702022e", 0x15, 0x10000}, {0x0}, {0x0}, {&(0x7f0000012400)="504d4d00504d4dffdbf4655f00000000647679756b6f762d676c6170746f70320000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000006c6f6f7033340075782f746573742f73797a5f6d6f756e745f696d6167655f650500"/123, 0x7b, 0x20000}, {0x0}, {0x0, 0x0, 0x38000}], 0x0, &(0x7f0000012f00)) [ 1412.061285] EXT4-fs (loop2): mounted filesystem without journal. Quota mode: none. [ 1412.076444] ext4 filesystem being mounted at /syzkaller-testdir307671421/syzkaller.SFQaEW/155/file0 supports timestamps until 2038 (0x7fffffff) [ 1412.094195] loop0: detected capacity change from 0 to 512 22:32:16 executing program 4: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000480)}}, 0x0, 0xffffffefffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x100000, 0xe, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000500100000f000000000000000100000005000000000004000040000020000000dbf4655fdbf4655f0100ffff53ef010001000000dbf4655f000000000000000001000000000000000b0000008000000018000000c20500002b0200"/116, 0x74, 0x400}, {&(0x7f0000010100)="000000000000000000000000244b8e9b57f04b59aa229cc218853f9501004000", 0x20, 0x4e0}, {&(0x7f0000010200)="010000000000050040", 0x9, 0x560}, {&(0x7f0000010300)="020000000300000004000000", 0xc, 0x800}, {&(0x7f0000010400), 0x0, 0x1000}, {&(0x7f0000011500)="ed41000000080000dbf4655fdbf465", 0xf, 0x2080}, {0x0}, {0x0}, {&(0x7f0000011c00)="0b0000000c0001022e00000002000000f40702022e", 0x15, 0x10000}, {0x0}, {0x0}, {&(0x7f0000012400)="504d4d00504d4dffdbf4655f00000000647679756b6f762d676c6170746f70320000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000006c6f6f7033340075782f746573742f73797a5f6d6f756e745f696d6167655f650500"/123, 0x7b, 0x20000}, {0x0}, {0x0, 0x0, 0x38000}], 0x0, &(0x7f0000012f00)) [ 1412.114439] EXT4-fs (loop0): bad geometry: block count 512 exceeds size of device (128 blocks) [ 1412.165851] loop4: detected capacity change from 0 to 2048 [ 1412.196356] EXT4-fs error (device loop4): __ext4_fill_super:5244: inode #2: comm syz-executor.4: iget: root inode unallocated [ 1412.198396] EXT4-fs (loop4): get root inode failed [ 1412.198915] EXT4-fs (loop4): mount failed [ 1412.233671] EXT4-fs (loop2): unmounting filesystem. 22:32:31 executing program 5: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) lsetxattr$security_evm(&(0x7f0000000240)='.\x00', &(0x7f0000000300), &(0x7f00000003c0)=@sha1={0x1, "bd2b5bce8b74aea700654a682479ac2c0852bc4d"}, 0x15, 0x3) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={&(0x7f0000000040), 0xb}, 0x0, 0x20, 0x0, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) r0 = fork() r1 = syz_open_procfs(0x0, &(0x7f0000000000)='status\x00') r2 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x2, 0x0) pwrite64(r2, &(0x7f00000000c0)='9', 0x1, 0x8040000) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x20, 0x3, 0x4, 0x1, 0x0, 0x8, 0x20620, 0x2, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x3f, 0x2, @perf_config_ext={0x240000000, 0x5}, 0x1400, 0x4, 0x8, 0x7, 0x9, 0x6, 0x6, 0x0, 0x1, 0x0, 0x8}, r0, 0xa, r2, 0x1) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r3, 0x6, 0x1e, &(0x7f0000000040)=0x1, 0x4) connect$inet6(r3, &(0x7f0000000080)={0xa, 0x0, 0x0, @loopback}, 0x1c) openat$cgroup_ro(r1, &(0x7f0000000180)='blkio.throttle.io_serviced_recursive\x00', 0x0, 0x0) 22:32:31 executing program 3: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) lsetxattr$security_evm(&(0x7f0000000240)='.\x00', &(0x7f0000000300), &(0x7f00000003c0)=@sha1={0x1, "bd2b5bce8b74aea700654a682479ac2c0852bc4d"}, 0x15, 0x3) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={&(0x7f0000000040), 0xb}, 0x0, 0x20, 0x0, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) r0 = fork() r1 = syz_open_procfs(r0, &(0x7f0000000000)='status\x00') r2 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x2, 0x0) pwrite64(0xffffffffffffffff, &(0x7f00000000c0)='9', 0x1, 0x8040000) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x20, 0x3, 0x4, 0x1, 0x0, 0x8, 0x20620, 0x2, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x3f, 0x2, @perf_config_ext={0x240000000, 0x5}, 0x1400, 0x4, 0x8, 0x7, 0x9, 0x6, 0x6, 0x0, 0x1, 0x0, 0x8}, r0, 0xa, r2, 0x1) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r3, 0x6, 0x1e, &(0x7f0000000040)=0x1, 0x4) setsockopt$inet6_tcp_TCP_REPAIR(r3, 0x6, 0x13, &(0x7f00000018c0)=0x1, 0x4) connect$inet6(r3, &(0x7f0000000080)={0xa, 0x0, 0x0, @loopback}, 0x1c) openat$cgroup_ro(r1, &(0x7f0000000180)='blkio.throttle.io_serviced_recursive\x00', 0x0, 0x0) 22:32:31 executing program 6: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) lsetxattr$security_evm(&(0x7f0000000240)='.\x00', &(0x7f0000000300), &(0x7f00000003c0)=@sha1={0x1, "bd2b5bce8b74aea700654a682479ac2c0852bc4d"}, 0x15, 0x3) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={&(0x7f0000000040), 0xb}, 0x0, 0x20, 0x0, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) r0 = fork() r1 = syz_open_procfs(r0, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x2, 0x0) pwrite64(r2, &(0x7f00000000c0)='9', 0x1, 0x8040000) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x20, 0x3, 0x4, 0x1, 0x0, 0x8, 0x20620, 0x2, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x3f, 0x2, @perf_config_ext={0x240000000, 0x5}, 0x1400, 0x4, 0x8, 0x7, 0x9, 0x6, 0x6, 0x0, 0x1, 0x0, 0x8}, r0, 0xa, r2, 0x1) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r3, 0x6, 0x1e, &(0x7f0000000040)=0x1, 0x4) setsockopt$inet6_tcp_TCP_REPAIR(r3, 0x6, 0x13, &(0x7f00000018c0)=0x1, 0x4) connect$inet6(r3, &(0x7f0000000080)={0xa, 0x0, 0x0, @loopback}, 0x1c) openat$cgroup_ro(r1, &(0x7f0000000180)='blkio.throttle.io_serviced_recursive\x00', 0x0, 0x0) 22:32:31 executing program 4: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000480)}}, 0x0, 0xffffffefffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x100000, 0xe, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000500100000f000000000000000100000005000000000004000040000020000000dbf4655fdbf4655f0100ffff53ef010001000000dbf4655f000000000000000001000000000000000b0000008000000018000000c20500002b0200"/116, 0x74, 0x400}, {&(0x7f0000010100)="000000000000000000000000244b8e9b57f04b59aa229cc218853f9501004000", 0x20, 0x4e0}, {&(0x7f0000010200)="010000000000050040", 0x9, 0x560}, {&(0x7f0000010300)="020000000300000004000000", 0xc, 0x800}, {&(0x7f0000010400), 0x0, 0x1000}, {&(0x7f0000011500)="ed41000000080000dbf4655fdbf4655fdbf4655f000000", 0x17, 0x2080}, {0x0}, {0x0}, {&(0x7f0000011c00)="0b0000000c0001022e00000002000000f40702022e", 0x15, 0x10000}, {0x0}, {0x0}, {&(0x7f0000012400)="504d4d00504d4dffdbf4655f00000000647679756b6f762d676c6170746f70320000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000006c6f6f7033340075782f746573742f73797a5f6d6f756e745f696d6167655f650500"/123, 0x7b, 0x20000}, {0x0}, {0x0, 0x0, 0x38000}], 0x0, &(0x7f0000012f00)) 22:32:31 executing program 2: perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000480)}}, 0x0, 0xffffffefffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x100000, 0xe, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000500100000f000000000000000100000005000000000004000040000020000000dbf4655fdbf4655f0100ffff53ef010001000000dbf4655f000000000000000001000000000000000b0000008000000018000000c20500002b0200"/116, 0x74, 0x400}, {&(0x7f0000010100)="000000000000000000000000244b8e9b57f04b59aa229cc218853f9501004000", 0x20, 0x4e0}, {&(0x7f0000010200)="010000000000050040", 0x9, 0x560}, {&(0x7f0000010300)="020000000300000004000000", 0xc, 0x800}, {&(0x7f0000010400), 0x0, 0x1000}, {&(0x7f0000011500)="ed41000000080000dbf4655fdbf4655fdbf4655f000000000000040040", 0x1d, 0x2080}, {0x0}, {0x0}, {&(0x7f0000011c00)="0b0000000c0001022e00000002000000f40702022e", 0x15, 0x10000}, {0x0}, {0x0}, {&(0x7f0000012400)="504d4d00504d4dffdbf4655f00000000647679756b6f762d676c6170746f70320000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000006c6f6f7033340075782f746573742f73797a5f6d6f756e745f696d6167655f650500"/123, 0x7b, 0x20000}, {0x0}, {0x0, 0x0, 0x38000}], 0x0, &(0x7f0000012f00)) 22:32:31 executing program 1: r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, @perf_config_ext, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000000), 0x0) r2 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) ioctl$EXT4_IOC_CHECKPOINT(r2, 0x4004662b, &(0x7f0000000100)=0x5) ioctl$AUTOFS_DEV_IOCTL_TIMEOUT(0xffffffffffffffff, 0xc018937a, &(0x7f0000001480)=ANY=[@ANYBLOB="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", @ANYRES32=r0, @ANYBLOB="0104000000000000"]) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r3, 0xc08c5332, &(0x7f00000013c0)={0xffffffff, 0x6964, 0x0, 'queue1\x00', 0xff}) r4 = gettid() process_vm_writev(r4, &(0x7f0000002580)=[{&(0x7f0000000140)=""/89, 0x59}, {&(0x7f00000001c0)=""/175, 0xaf}, {&(0x7f0000000280)=""/4096, 0x1000}], 0x3, &(0x7f0000003840)=[{&(0x7f0000002640)=""/105, 0x69}, {0xfffffffffffffffe, 0x10}], 0x2, 0x0) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r1, 0xc08c5332, &(0x7f0000001280)={0x3, 0x5, 0x0, 'queue1\x00', 0x8}) r5 = fork() write$sndseq(r1, &(0x7f0000001340)=[{0x22, 0x8, 0x2, 0x3, @time={0x4}, {0x0, 0x1}, {0x6, 0x81}, @raw32={[0x800, 0x3, 0x9]}}, {0xe1, 0x7, 0xf8, 0xff, @tick=0x2, {0x3f}, {0x4, 0xf1}, @queue={0xff, {0x6, 0x9}}}, {0x4, 0x1, 0x9, 0x5, @time={0x7, 0x6}, {0x7c, 0x2}, {0x20, 0x6}, @connect={{0x0, 0xfd}, {0x98, 0x4}}}, {0x80, 0x4, 0x7, 0x7d, @time={0xfffff000, 0x9}, {0x81, 0x1f}, {0xaa}, @queue={0x5, {0xffffffe0, 0x3}}}], 0x70) r6 = syz_open_dev$vcsn(&(0x7f0000000040), 0x3, 0x2001) ioctl$LOOP_CTL_GET_FREE(r6, 0x4c82) ptrace$setopts(0x4206, r5, 0x0, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fork() fork() clone3(&(0x7f0000004c00)={0xc0002100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) 22:32:31 executing program 0: perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000480)}}, 0x0, 0xffffffefffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0xd, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000500100000f000000000000000100000005000000000004000040000020000000dbf4655fdbf4655f0100ffff53ef010001000000dbf4655f000000000000000001000000000000000b0000008000000018000000c20500002b0200"/116, 0x74, 0x400}, {&(0x7f0000010100)="000000000000000000000000244b8e9b57f04b59aa229cc218853f9501004000", 0x20, 0x4e0}, {0x0, 0x0, 0x560}, {&(0x7f0000010300)="020000000300000004000000", 0xc, 0x800}, {&(0x7f0000010400), 0x0, 0x1000}, {&(0x7f0000011500)="ed41000000080000dbf4655fdbf4655f", 0x10, 0x2080}, {0x0}, {0x0}, {0x0, 0x0, 0x10000}, {0x0}, {0x0}, {0x0, 0x0, 0x20000}, {0x0}], 0x0, &(0x7f0000012f00)) 22:32:31 executing program 7: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000480)}}, 0x0, 0xffffffefffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x100000, 0xe, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000500100000f000000000000000100000005000000000004000040000020000000dbf4655fdbf4655f0100ffff53ef010001000000dbf4655f000000000000000001000000000000000b0000008000000018000000c20500002b0200"/116, 0x74, 0x400}, {&(0x7f0000010100)="000000000000000000000000244b8e9b57f04b59aa229cc218853f9501004000", 0x20, 0x4e0}, {&(0x7f0000010200)="010000000000050040", 0x9, 0x560}, {&(0x7f0000010300)="020000000300000004000000", 0xc, 0x800}, {&(0x7f0000010400), 0x0, 0x1000}, {&(0x7f0000011500)="ed41000000080000dbf4655fdbf4655fdbf4655f000000", 0x17, 0x2080}, {0x0}, {0x0}, {&(0x7f0000011c00)="0b0000000c0001022e00000002000000f40702022e", 0x15, 0x10000}, {0x0}, {0x0}, {&(0x7f0000012400)="504d4d00504d4dffdbf4655f00000000647679756b6f762d676c6170746f70320000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000006c6f6f7033340075782f746573742f73797a5f6d6f756e745f696d6167655f650500"/123, 0x7b, 0x20000}, {0x0}, {0x0, 0x0, 0x38000}], 0x0, &(0x7f0000012f00)) 22:32:31 executing program 6: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) lsetxattr$security_evm(&(0x7f0000000240)='.\x00', &(0x7f0000000300), &(0x7f00000003c0)=@sha1={0x1, "bd2b5bce8b74aea700654a682479ac2c0852bc4d"}, 0x15, 0x3) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={&(0x7f0000000040), 0xb}, 0x0, 0x20, 0x0, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) r0 = fork() r1 = syz_open_procfs(r0, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x2, 0x0) pwrite64(r2, &(0x7f00000000c0)='9', 0x1, 0x8040000) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x20, 0x3, 0x4, 0x1, 0x0, 0x8, 0x20620, 0x2, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x3f, 0x2, @perf_config_ext={0x240000000, 0x5}, 0x1400, 0x4, 0x8, 0x7, 0x9, 0x6, 0x6, 0x0, 0x1, 0x0, 0x8}, r0, 0xa, r2, 0x1) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r3, 0x6, 0x1e, &(0x7f0000000040)=0x1, 0x4) setsockopt$inet6_tcp_TCP_REPAIR(r3, 0x6, 0x13, &(0x7f00000018c0)=0x1, 0x4) connect$inet6(r3, &(0x7f0000000080)={0xa, 0x0, 0x0, @loopback}, 0x1c) openat$cgroup_ro(r1, &(0x7f0000000180)='blkio.throttle.io_serviced_recursive\x00', 0x0, 0x0) [ 1427.360424] loop2: detected capacity change from 0 to 2048 [ 1427.366418] loop0: detected capacity change from 0 to 512 [ 1427.381442] loop7: detected capacity change from 0 to 2048 [ 1427.385351] loop4: detected capacity change from 0 to 2048 [ 1427.391085] EXT4-fs (loop0): bad geometry: block count 512 exceeds size of device (128 blocks) [ 1427.407906] EXT4-fs (loop2): mounted filesystem without journal. Quota mode: none. [ 1427.419698] ext4 filesystem being mounted at /syzkaller-testdir307671421/syzkaller.SFQaEW/156/file0 supports timestamps until 2038 (0x7fffffff) [ 1427.440037] EXT4-fs error (device loop4): __ext4_fill_super:5244: inode #2: comm syz-executor.4: iget: root inode unallocated [ 1427.442138] EXT4-fs (loop4): get root inode failed [ 1427.442656] EXT4-fs (loop4): mount failed [ 1427.466493] EXT4-fs error (device loop7): __ext4_fill_super:5244: inode #2: comm syz-executor.7: iget: root inode unallocated [ 1427.468213] EXT4-fs (loop7): get root inode failed [ 1427.468754] EXT4-fs (loop7): mount failed [ 1427.512815] EXT4-fs (loop2): unmounting filesystem. 22:32:32 executing program 2: perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000480)}}, 0x0, 0xffffffefffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x100000, 0xe, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000500100000f000000000000000100000005000000000004000040000020000000dbf4655fdbf4655f0100ffff53ef010001000000dbf4655f000000000000000001000000000000000b0000008000000018000000c20500002b0200"/116, 0x74, 0x400}, {&(0x7f0000010100)="000000000000000000000000244b8e9b57f04b59aa229cc218853f9501004000", 0x20, 0x4e0}, {&(0x7f0000010200)="010000000000050040", 0x9, 0x560}, {&(0x7f0000010300)="020000000300000004000000", 0xc, 0x800}, {&(0x7f0000010400), 0x0, 0x1000}, {&(0x7f0000011500)="ed41000000080000dbf4655fdbf4655fdbf4655f00000000000004004000", 0x1e}, {0x0}, {0x0}, {&(0x7f0000011c00)="0b0000000c0001022e00000002000000f40702022e", 0x15, 0x10000}, {0x0}, {0x0}, {&(0x7f0000012400)="504d4d00504d4dffdbf4655f00000000647679756b6f762d676c6170746f70320000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000006c6f6f7033340075782f746573742f73797a5f6d6f756e745f696d6167655f650500"/123, 0x7b, 0x20000}, {0x0}, {0x0, 0x0, 0x38000}], 0x0, &(0x7f0000012f00)) [ 1427.631411] loop2: detected capacity change from 0 to 2048 [ 1427.667331] EXT4-fs error (device loop2): __ext4_fill_super:5244: inode #2: comm syz-executor.2: iget: root inode unallocated [ 1427.669785] EXT4-fs (loop2): get root inode failed [ 1427.670179] EXT4-fs (loop2): mount failed 22:32:47 executing program 6: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) lsetxattr$security_evm(&(0x7f0000000240)='.\x00', &(0x7f0000000300), &(0x7f00000003c0)=@sha1={0x1, "bd2b5bce8b74aea700654a682479ac2c0852bc4d"}, 0x15, 0x3) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={&(0x7f0000000040), 0xb}, 0x0, 0x20, 0x0, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) r0 = fork() r1 = syz_open_procfs(r0, &(0x7f0000000000)='status\x00') r2 = openat(0xffffffffffffff9c, 0x0, 0x2, 0x0) pwrite64(r2, &(0x7f00000000c0)='9', 0x1, 0x8040000) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x20, 0x3, 0x4, 0x1, 0x0, 0x8, 0x20620, 0x2, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x3f, 0x2, @perf_config_ext={0x240000000, 0x5}, 0x1400, 0x4, 0x8, 0x7, 0x9, 0x6, 0x6, 0x0, 0x1, 0x0, 0x8}, r0, 0xa, r2, 0x1) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r3, 0x6, 0x1e, &(0x7f0000000040)=0x1, 0x4) setsockopt$inet6_tcp_TCP_REPAIR(r3, 0x6, 0x13, &(0x7f00000018c0)=0x1, 0x4) connect$inet6(r3, &(0x7f0000000080)={0xa, 0x0, 0x0, @loopback}, 0x1c) openat$cgroup_ro(r1, &(0x7f0000000180)='blkio.throttle.io_serviced_recursive\x00', 0x0, 0x0) 22:32:47 executing program 1: r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, @perf_config_ext, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000000), 0x0) r2 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) ioctl$EXT4_IOC_CHECKPOINT(r2, 0x4004662b, &(0x7f0000000100)=0x5) ioctl$AUTOFS_DEV_IOCTL_TIMEOUT(0xffffffffffffffff, 0xc018937a, &(0x7f0000001480)=ANY=[@ANYBLOB="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", @ANYRES32=r0, @ANYBLOB="0104000000000000"]) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r3, 0xc08c5332, &(0x7f00000013c0)={0xffffffff, 0x6964, 0x0, 'queue1\x00', 0xff}) r4 = gettid() process_vm_writev(r4, &(0x7f0000002580)=[{&(0x7f0000000140)=""/89, 0x59}, {&(0x7f00000001c0)=""/175, 0xaf}, {&(0x7f0000000280)=""/4096, 0x1000}], 0x3, &(0x7f0000003840)=[{&(0x7f0000002640)=""/105, 0x69}, {0xfffffffffffffffe, 0x10}], 0x2, 0x0) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r1, 0xc08c5332, &(0x7f0000001280)={0x3, 0x5, 0x0, 'queue1\x00', 0x8}) r5 = fork() write$sndseq(r1, &(0x7f0000001340)=[{0x22, 0x8, 0x2, 0x3, @time={0x4}, {0x0, 0x1}, {0x6, 0x81}, @raw32={[0x800, 0x3, 0x9]}}, {0xe1, 0x7, 0xf8, 0xff, @tick=0x2, {0x3f}, {0x4, 0xf1}, @queue={0xff, {0x6, 0x9}}}, {0x4, 0x1, 0x9, 0x5, @time={0x7, 0x6}, {0x7c, 0x2}, {0x20, 0x6}, @connect={{0x0, 0xfd}, {0x98, 0x4}}}, {0x80, 0x4, 0x7, 0x7d, @time={0xfffff000, 0x9}, {0x81, 0x1f}, {0xaa}, @queue={0x5, {0xffffffe0, 0x3}}}], 0x70) r6 = syz_open_dev$vcsn(&(0x7f0000000040), 0x3, 0x2001) ioctl$LOOP_CTL_GET_FREE(r6, 0x4c82) ptrace$setopts(0x4206, r5, 0x0, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fork() fork() clone3(&(0x7f0000004c00)={0xc0002100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) 22:32:47 executing program 2: perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000480)}}, 0x0, 0xffffffefffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x100000, 0xe, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000500100000f000000000000000100000005000000000004000040000020000000dbf4655fdbf4655f0100ffff53ef010001000000dbf4655f000000000000000001000000000000000b0000008000000018000000c20500002b0200"/116, 0x74, 0x400}, {&(0x7f0000010100)="000000000000000000000000244b8e9b57f04b59aa229cc218853f9501004000", 0x20, 0x4e0}, {&(0x7f0000010200)="010000000000050040", 0x9, 0x560}, {&(0x7f0000010300)="020000000300000004000000", 0xc, 0x800}, {&(0x7f0000010400), 0x0, 0x1000}, {&(0x7f0000011500)="ed41000000080000dbf4655fdbf4655fdbf4655f00000000000004004000", 0x1e}, {0x0}, {0x0}, {&(0x7f0000011c00)="0b0000000c0001022e00000002000000f40702022e", 0x15, 0x10000}, {0x0}, {0x0}, {&(0x7f0000012400)="504d4d00504d4dffdbf4655f00000000647679756b6f762d676c6170746f70320000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000006c6f6f7033340075782f746573742f73797a5f6d6f756e745f696d6167655f650500"/123, 0x7b, 0x20000}, {0x0}, {0x0, 0x0, 0x38000}], 0x0, &(0x7f0000012f00)) 22:32:47 executing program 0: perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000480)}}, 0x0, 0xffffffefffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0xd, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000500100000f000000000000000100000005000000000004000040000020000000dbf4655fdbf4655f0100ffff53ef010001000000dbf4655f000000000000000001000000000000000b0000008000000018000000c20500002b0200"/116, 0x74, 0x400}, {&(0x7f0000010100)="000000000000000000000000244b8e9b57f04b59aa229cc218853f9501004000", 0x20, 0x4e0}, {0x0, 0x0, 0x560}, {&(0x7f0000010300)="020000000300000004000000", 0xc, 0x800}, {&(0x7f0000010400), 0x0, 0x1000}, {&(0x7f0000011500)="ed41000000080000dbf4655fdbf4655f", 0x10, 0x2080}, {0x0}, {0x0}, {0x0, 0x0, 0x10000}, {0x0}, {0x0}, {0x0, 0x0, 0x20000}, {0x0}], 0x0, &(0x7f0000012f00)) 22:32:47 executing program 4: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000480)}}, 0x0, 0xffffffefffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x100000, 0xe, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000500100000f000000000000000100000005000000000004000040000020000000dbf4655fdbf4655f0100ffff53ef010001000000dbf4655f000000000000000001000000000000000b0000008000000018000000c20500002b0200"/116, 0x74, 0x400}, {&(0x7f0000010100)="000000000000000000000000244b8e9b57f04b59aa229cc218853f9501004000", 0x20, 0x4e0}, {&(0x7f0000010200)="010000000000050040", 0x9, 0x560}, {&(0x7f0000010300)="020000000300000004000000", 0xc, 0x800}, {&(0x7f0000010400), 0x0, 0x1000}, {&(0x7f0000011500)="ed41000000080000dbf4655fdbf4655fdbf4655f000000", 0x17, 0x2080}, {0x0}, {0x0}, {&(0x7f0000011c00)="0b0000000c0001022e00000002000000f40702022e", 0x15, 0x10000}, {0x0}, {0x0}, {&(0x7f0000012400)="504d4d00504d4dffdbf4655f00000000647679756b6f762d676c6170746f70320000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000006c6f6f7033340075782f746573742f73797a5f6d6f756e745f696d6167655f650500"/123, 0x7b, 0x20000}, {0x0}, {0x0, 0x0, 0x38000}], 0x0, &(0x7f0000012f00)) 22:32:47 executing program 7: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000480)}}, 0x0, 0xffffffefffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x100000, 0xe, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000500100000f000000000000000100000005000000000004000040000020000000dbf4655fdbf4655f0100ffff53ef010001000000dbf4655f000000000000000001000000000000000b0000008000000018000000c20500002b0200"/116, 0x74, 0x400}, {&(0x7f0000010100)="000000000000000000000000244b8e9b57f04b59aa229cc218853f9501004000", 0x20, 0x4e0}, {&(0x7f0000010200)="010000000000050040", 0x9, 0x560}, {&(0x7f0000010300)="020000000300000004000000", 0xc, 0x800}, {&(0x7f0000010400), 0x0, 0x1000}, {&(0x7f0000011500)="ed41000000080000dbf4655fdbf4655fdbf4655f000000", 0x17, 0x2080}, {0x0}, {0x0}, {&(0x7f0000011c00)="0b0000000c0001022e00000002000000f40702022e", 0x15, 0x10000}, {0x0}, {0x0}, {&(0x7f0000012400)="504d4d00504d4dffdbf4655f00000000647679756b6f762d676c6170746f70320000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000006c6f6f7033340075782f746573742f73797a5f6d6f756e745f696d6167655f650500"/123, 0x7b, 0x20000}, {0x0}, {0x0, 0x0, 0x38000}], 0x0, &(0x7f0000012f00)) 22:32:47 executing program 3: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) lsetxattr$security_evm(&(0x7f0000000240)='.\x00', &(0x7f0000000300), &(0x7f00000003c0)=@sha1={0x1, "bd2b5bce8b74aea700654a682479ac2c0852bc4d"}, 0x15, 0x3) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={&(0x7f0000000040), 0xb}, 0x0, 0x20, 0x0, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) r0 = fork() r1 = syz_open_procfs(r0, &(0x7f0000000000)='status\x00') r2 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x2, 0x0) pwrite64(0xffffffffffffffff, &(0x7f00000000c0)='9', 0x1, 0x8040000) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x20, 0x3, 0x4, 0x1, 0x0, 0x8, 0x20620, 0x2, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x3f, 0x2, @perf_config_ext={0x240000000, 0x5}, 0x1400, 0x4, 0x8, 0x7, 0x9, 0x6, 0x6, 0x0, 0x1, 0x0, 0x8}, r0, 0xa, r2, 0x1) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r3, 0x6, 0x1e, &(0x7f0000000040)=0x1, 0x4) setsockopt$inet6_tcp_TCP_REPAIR(r3, 0x6, 0x13, &(0x7f00000018c0)=0x1, 0x4) connect$inet6(r3, &(0x7f0000000080)={0xa, 0x0, 0x0, @loopback}, 0x1c) openat$cgroup_ro(r1, &(0x7f0000000180)='blkio.throttle.io_serviced_recursive\x00', 0x0, 0x0) 22:32:47 executing program 5: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) lsetxattr$security_evm(&(0x7f0000000240)='.\x00', &(0x7f0000000300), &(0x7f00000003c0)=@sha1={0x1, "bd2b5bce8b74aea700654a682479ac2c0852bc4d"}, 0x15, 0x3) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={&(0x7f0000000040), 0xb}, 0x0, 0x20, 0x0, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) r0 = fork() r1 = syz_open_procfs(0x0, &(0x7f0000000000)='status\x00') r2 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x2, 0x0) pwrite64(r2, &(0x7f00000000c0)='9', 0x1, 0x8040000) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x20, 0x3, 0x4, 0x1, 0x0, 0x8, 0x20620, 0x2, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x3f, 0x2, @perf_config_ext={0x240000000, 0x5}, 0x1400, 0x4, 0x8, 0x7, 0x9, 0x6, 0x6, 0x0, 0x1, 0x0, 0x8}, r0, 0xa, r2, 0x1) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r3, 0x6, 0x1e, &(0x7f0000000040)=0x1, 0x4) connect$inet6(r3, &(0x7f0000000080)={0xa, 0x0, 0x0, @loopback}, 0x1c) openat$cgroup_ro(r1, &(0x7f0000000180)='blkio.throttle.io_serviced_recursive\x00', 0x0, 0x0) [ 1442.723342] loop0: detected capacity change from 0 to 512 [ 1442.732128] EXT4-fs (loop0): bad geometry: block count 512 exceeds size of device (128 blocks) [ 1442.775119] loop7: detected capacity change from 0 to 2048 [ 1442.818235] loop4: detected capacity change from 0 to 2048 [ 1442.840305] loop2: detected capacity change from 0 to 2048 22:32:47 executing program 0: perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000480)}}, 0x0, 0xffffffefffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0xd, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000500100000f000000000000000100000005000000000004000040000020000000dbf4655fdbf4655f0100ffff53ef010001000000dbf4655f000000000000000001000000000000000b0000008000000018000000c20500002b0200"/116, 0x74, 0x400}, {&(0x7f0000010100)="000000000000000000000000244b8e9b57f04b59aa229cc218853f9501004000", 0x20, 0x4e0}, {&(0x7f0000010200), 0x0, 0x560}, {&(0x7f0000010300)="020000000300000004000000", 0xc, 0x800}, {&(0x7f0000010400), 0x0, 0x1000}, {&(0x7f0000011500)="ed41000000080000dbf4655fdbf4655f", 0x10, 0x2080}, {0x0}, {0x0}, {0x0, 0x0, 0x10000}, {0x0}, {0x0}, {0x0, 0x0, 0x20000}, {0x0}], 0x0, &(0x7f0000012f00)) [ 1442.871083] EXT4-fs error (device loop4): __ext4_fill_super:5244: inode #2: comm syz-executor.4: iget: root inode unallocated [ 1442.873976] EXT4-fs (loop4): get root inode failed [ 1442.874352] EXT4-fs (loop4): mount failed [ 1442.876068] EXT4-fs error (device loop7): __ext4_fill_super:5244: inode #2: comm syz-executor.7: iget: root inode unallocated [ 1442.884986] EXT4-fs error (device loop2): __ext4_fill_super:5244: inode #2: comm syz-executor.2: iget: root inode unallocated [ 1442.885041] EXT4-fs (loop7): get root inode failed [ 1442.885066] EXT4-fs (loop7): mount failed [ 1442.890363] EXT4-fs (loop2): get root inode failed [ 1442.890926] EXT4-fs (loop2): mount failed [ 1442.935431] loop0: detected capacity change from 0 to 512 22:32:47 executing program 6: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) lsetxattr$security_evm(&(0x7f0000000240)='.\x00', &(0x7f0000000300), &(0x7f00000003c0)=@sha1={0x1, "bd2b5bce8b74aea700654a682479ac2c0852bc4d"}, 0x15, 0x3) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={&(0x7f0000000040), 0xb}, 0x0, 0x20, 0x0, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) r0 = fork() r1 = syz_open_procfs(r0, &(0x7f0000000000)='status\x00') r2 = openat(0xffffffffffffff9c, 0x0, 0x2, 0x0) pwrite64(r2, &(0x7f00000000c0)='9', 0x1, 0x8040000) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x20, 0x3, 0x4, 0x1, 0x0, 0x8, 0x20620, 0x2, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x3f, 0x2, @perf_config_ext={0x240000000, 0x5}, 0x1400, 0x4, 0x8, 0x7, 0x9, 0x6, 0x6, 0x0, 0x1, 0x0, 0x8}, r0, 0xa, r2, 0x1) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r3, 0x6, 0x1e, &(0x7f0000000040)=0x1, 0x4) setsockopt$inet6_tcp_TCP_REPAIR(r3, 0x6, 0x13, &(0x7f00000018c0)=0x1, 0x4) connect$inet6(r3, &(0x7f0000000080)={0xa, 0x0, 0x0, @loopback}, 0x1c) openat$cgroup_ro(r1, &(0x7f0000000180)='blkio.throttle.io_serviced_recursive\x00', 0x0, 0x0) [ 1442.956086] EXT4-fs (loop0): bad geometry: block count 512 exceeds size of device (128 blocks) 22:32:47 executing program 4: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000480)}}, 0x0, 0xffffffefffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x100000, 0xe, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000500100000f000000000000000100000005000000000004000040000020000000dbf4655fdbf4655f0100ffff53ef010001000000dbf4655f000000000000000001000000000000000b0000008000000018000000c20500002b0200"/116, 0x74, 0x400}, {&(0x7f0000010100)="000000000000000000000000244b8e9b57f04b59aa229cc218853f9501004000", 0x20, 0x4e0}, {&(0x7f0000010200)="010000000000050040", 0x9, 0x560}, {&(0x7f0000010300)="020000000300000004000000", 0xc, 0x800}, {&(0x7f0000010400), 0x0, 0x1000}, {&(0x7f0000011500)="ed41000000080000dbf4655fdbf4655fdbf4655f000000", 0x17, 0x2080}, {0x0}, {0x0}, {&(0x7f0000011c00)="0b0000000c0001022e00000002000000f40702022e", 0x15, 0x10000}, {0x0}, {0x0}, {&(0x7f0000012400)="504d4d00504d4dffdbf4655f00000000647679756b6f762d676c6170746f70320000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000006c6f6f7033340075782f746573742f73797a5f6d6f756e745f696d6167655f650500"/123, 0x7b, 0x20000}, {0x0}, {0x0, 0x0, 0x38000}], 0x0, &(0x7f0000012f00)) 22:32:47 executing program 2: perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000480)}}, 0x0, 0xffffffefffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x100000, 0xe, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000500100000f000000000000000100000005000000000004000040000020000000dbf4655fdbf4655f0100ffff53ef010001000000dbf4655f000000000000000001000000000000000b0000008000000018000000c20500002b0200"/116, 0x74, 0x400}, {&(0x7f0000010100)="000000000000000000000000244b8e9b57f04b59aa229cc218853f9501004000", 0x20, 0x4e0}, {&(0x7f0000010200)="010000000000050040", 0x9, 0x560}, {&(0x7f0000010300)="020000000300000004000000", 0xc, 0x800}, {&(0x7f0000010400), 0x0, 0x1000}, {&(0x7f0000011500)="ed41000000080000dbf4655fdbf4655fdbf4655f00000000000004004000", 0x1e}, {0x0}, {0x0}, {&(0x7f0000011c00)="0b0000000c0001022e00000002000000f40702022e", 0x15, 0x10000}, {0x0}, {0x0}, {&(0x7f0000012400)="504d4d00504d4dffdbf4655f00000000647679756b6f762d676c6170746f70320000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000006c6f6f7033340075782f746573742f73797a5f6d6f756e745f696d6167655f650500"/123, 0x7b, 0x20000}, {0x0}, {0x0, 0x0, 0x38000}], 0x0, &(0x7f0000012f00)) 22:32:47 executing program 0: perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000480)}}, 0x0, 0xffffffefffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0xd, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000500100000f000000000000000100000005000000000004000040000020000000dbf4655fdbf4655f0100ffff53ef010001000000dbf4655f000000000000000001000000000000000b0000008000000018000000c20500002b0200"/116, 0x74, 0x400}, {&(0x7f0000010100)="000000000000000000000000244b8e9b57f04b59aa229cc218853f9501004000", 0x20, 0x4e0}, {&(0x7f0000010200), 0x0, 0x560}, {&(0x7f0000010300)="020000000300000004000000", 0xc, 0x800}, {&(0x7f0000010400), 0x0, 0x1000}, {&(0x7f0000011500)="ed41000000080000dbf4655fdbf4655f", 0x10, 0x2080}, {0x0}, {0x0}, {0x0, 0x0, 0x10000}, {0x0}, {0x0}, {0x0, 0x0, 0x20000}, {0x0}], 0x0, &(0x7f0000012f00)) 22:32:47 executing program 7: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000480)}}, 0x0, 0xffffffefffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x100000, 0xe, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000500100000f000000000000000100000005000000000004000040000020000000dbf4655fdbf4655f0100ffff53ef010001000000dbf4655f000000000000000001000000000000000b0000008000000018000000c20500002b0200"/116, 0x74, 0x400}, {&(0x7f0000010100)="000000000000000000000000244b8e9b57f04b59aa229cc218853f9501004000", 0x20, 0x4e0}, {&(0x7f0000010200)="010000000000050040", 0x9, 0x560}, {&(0x7f0000010300)="020000000300000004000000", 0xc, 0x800}, {&(0x7f0000010400), 0x0, 0x1000}, {&(0x7f0000011500)="ed41000000080000dbf4655fdbf4655fdbf4655f00000000000004", 0x1b, 0x2080}, {0x0}, {0x0}, {&(0x7f0000011c00)="0b0000000c0001022e00000002000000f40702022e", 0x15, 0x10000}, {0x0}, {0x0}, {&(0x7f0000012400)="504d4d00504d4dffdbf4655f00000000647679756b6f762d676c6170746f70320000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000006c6f6f7033340075782f746573742f73797a5f6d6f756e745f696d6167655f650500"/123, 0x7b, 0x20000}, {0x0}, {0x0, 0x0, 0x38000}], 0x0, &(0x7f0000012f00)) [ 1443.095439] loop2: detected capacity change from 0 to 2048 [ 1443.152941] loop4: detected capacity change from 0 to 2048 [ 1443.168001] loop7: detected capacity change from 0 to 2048 [ 1443.207713] EXT4-fs error (device loop2): __ext4_fill_super:5244: inode #2: comm syz-executor.2: iget: root inode unallocated [ 1443.210287] EXT4-fs (loop7): corrupt root inode, run e2fsck [ 1443.211672] EXT4-fs (loop7): mount failed [ 1443.214915] EXT4-fs (loop2): get root inode failed [ 1443.215766] EXT4-fs (loop2): mount failed 22:32:47 executing program 0: perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000480)}}, 0x0, 0xffffffefffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0xd, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000500100000f000000000000000100000005000000000004000040000020000000dbf4655fdbf4655f0100ffff53ef010001000000dbf4655f000000000000000001000000000000000b0000008000000018000000c20500002b0200"/116, 0x74, 0x400}, {&(0x7f0000010100)="000000000000000000000000244b8e9b57f04b59aa229cc218853f9501004000", 0x20, 0x4e0}, {&(0x7f0000010200), 0x0, 0x560}, {&(0x7f0000010300)="020000000300000004000000", 0xc, 0x800}, {&(0x7f0000010400), 0x0, 0x1000}, {&(0x7f0000011500)="ed41000000080000dbf4655fdbf4655f", 0x10, 0x2080}, {0x0}, {0x0}, {0x0, 0x0, 0x10000}, {0x0}, {0x0}, {0x0, 0x0, 0x20000}, {0x0}], 0x0, &(0x7f0000012f00)) [ 1443.251698] EXT4-fs error (device loop4): __ext4_fill_super:5244: inode #2: comm syz-executor.4: iget: root inode unallocated [ 1443.258854] EXT4-fs (loop4): get root inode failed [ 1443.259956] EXT4-fs (loop4): mount failed [ 1443.288259] loop0: detected capacity change from 0 to 512 22:32:47 executing program 5: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) lsetxattr$security_evm(&(0x7f0000000240)='.\x00', &(0x7f0000000300), &(0x7f00000003c0)=@sha1={0x1, "bd2b5bce8b74aea700654a682479ac2c0852bc4d"}, 0x15, 0x3) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={&(0x7f0000000040), 0xb}, 0x0, 0x20, 0x0, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) r0 = fork() r1 = syz_open_procfs(0x0, &(0x7f0000000000)='status\x00') r2 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x2, 0x0) pwrite64(r2, &(0x7f00000000c0)='9', 0x1, 0x8040000) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x20, 0x3, 0x4, 0x1, 0x0, 0x8, 0x20620, 0x2, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x3f, 0x2, @perf_config_ext={0x240000000, 0x5}, 0x1400, 0x4, 0x8, 0x7, 0x9, 0x6, 0x6, 0x0, 0x1, 0x0, 0x8}, r0, 0xa, r2, 0x1) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r3, 0x6, 0x1e, &(0x7f0000000040)=0x1, 0x4) connect$inet6(r3, &(0x7f0000000080)={0xa, 0x0, 0x0, @loopback}, 0x1c) openat$cgroup_ro(r1, &(0x7f0000000180)='blkio.throttle.io_serviced_recursive\x00', 0x0, 0x0) 22:32:47 executing program 7: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000480)}}, 0x0, 0xffffffefffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x100000, 0xe, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000500100000f000000000000000100000005000000000004000040000020000000dbf4655fdbf4655f0100ffff53ef010001000000dbf4655f000000000000000001000000000000000b0000008000000018000000c20500002b0200"/116, 0x74, 0x400}, {&(0x7f0000010100)="000000000000000000000000244b8e9b57f04b59aa229cc218853f9501004000", 0x20, 0x4e0}, {&(0x7f0000010200)="010000000000050040", 0x9, 0x560}, {&(0x7f0000010300)="020000000300000004000000", 0xc, 0x800}, {&(0x7f0000010400), 0x0, 0x1000}, {&(0x7f0000011500)="ed41000000080000dbf4655fdbf4655fdbf4655f00000000000004", 0x1b, 0x2080}, {0x0}, {0x0}, {&(0x7f0000011c00)="0b0000000c0001022e00000002000000f40702022e", 0x15, 0x10000}, {0x0}, {0x0}, {&(0x7f0000012400)="504d4d00504d4dffdbf4655f00000000647679756b6f762d676c6170746f70320000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000006c6f6f7033340075782f746573742f73797a5f6d6f756e745f696d6167655f650500"/123, 0x7b, 0x20000}, {0x0}, {0x0, 0x0, 0x38000}], 0x0, &(0x7f0000012f00)) 22:32:47 executing program 1: r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, @perf_config_ext, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000000), 0x0) r2 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) ioctl$EXT4_IOC_CHECKPOINT(r2, 0x4004662b, &(0x7f0000000100)=0x5) ioctl$AUTOFS_DEV_IOCTL_TIMEOUT(0xffffffffffffffff, 0xc018937a, &(0x7f0000001480)=ANY=[@ANYBLOB="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", @ANYRES32=r0, @ANYBLOB="0104000000000000"]) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r3, 0xc08c5332, &(0x7f00000013c0)={0xffffffff, 0x6964, 0x0, 'queue1\x00', 0xff}) r4 = gettid() process_vm_writev(r4, &(0x7f0000002580)=[{&(0x7f0000000140)=""/89, 0x59}, {&(0x7f00000001c0)=""/175, 0xaf}, {&(0x7f0000000280)=""/4096, 0x1000}], 0x3, &(0x7f0000003840)=[{&(0x7f0000002640)=""/105, 0x69}, {0xfffffffffffffffe, 0x10}], 0x2, 0x0) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r1, 0xc08c5332, &(0x7f0000001280)={0x3, 0x5, 0x0, 'queue1\x00', 0x8}) r5 = fork() write$sndseq(r1, &(0x7f0000001340)=[{0x22, 0x8, 0x2, 0x3, @time={0x4}, {0x0, 0x1}, {0x6, 0x81}, @raw32={[0x800, 0x3, 0x9]}}, {0xe1, 0x7, 0xf8, 0xff, @tick=0x2, {0x3f}, {0x4, 0xf1}, @queue={0xff, {0x6, 0x9}}}, {0x4, 0x1, 0x9, 0x5, @time={0x7, 0x6}, {0x7c, 0x2}, {0x20, 0x6}, @connect={{0x0, 0xfd}, {0x98, 0x4}}}, {0x80, 0x4, 0x7, 0x7d, @time={0xfffff000, 0x9}, {0x81, 0x1f}, {0xaa}, @queue={0x5, {0xffffffe0, 0x3}}}], 0x70) r6 = syz_open_dev$vcsn(&(0x7f0000000040), 0x3, 0x2001) ioctl$LOOP_CTL_GET_FREE(r6, 0x4c82) ptrace$setopts(0x4206, r5, 0x0, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fork() fork() clone3(&(0x7f0000004c00)={0xc0002100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) [ 1443.309382] EXT4-fs (loop0): bad geometry: block count 512 exceeds size of device (128 blocks) [ 1443.385815] loop7: detected capacity change from 0 to 2048 [ 1443.437233] EXT4-fs (loop7): corrupt root inode, run e2fsck [ 1443.437996] EXT4-fs (loop7): mount failed 22:33:04 executing program 1: r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, @perf_config_ext, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000000), 0x0) r2 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) ioctl$EXT4_IOC_CHECKPOINT(r2, 0x4004662b, &(0x7f0000000100)=0x5) ioctl$AUTOFS_DEV_IOCTL_TIMEOUT(0xffffffffffffffff, 0xc018937a, &(0x7f0000001480)=ANY=[@ANYBLOB="010000fe04f804f32d1ae95f4d8fd9ce99ff00010000001800000059a5a91fc707002c3e05f0bcf35234dd60eedec3d5f1b58f0d41f6996d0df70b25316c86b91cf6440f87695b3e2bf9118d7b986e6dd6169cde2d7b35569ff3c18ea708da093a5e297fd2ec2322a167617fa6662e65407cedfd90d2ee90deccf04f2c85b215e5090cb50628f934703c2db873b5eb9a2e276f987493cc445a8474761879f6df5a5233b80656c014a59590366f77d5104d838160f3f8f304bbfb07a672117635569099d752c2b724b38b74a3b0e2c4dd54619ff2e05de8c58ace02796bd997ccfd3fbf04c5bb7420f2656931eb46c8e72d17fd9b33dd84ff6fab17ff995be40bf9a47cdde574665966c721e5f265d3aaac1788c3ea", @ANYRES32=r0, @ANYBLOB="01040000000000002e2f6669"]) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r3, 0xc08c5332, &(0x7f00000013c0)={0xffffffff, 0x6964, 0x0, 'queue1\x00', 0xff}) r4 = gettid() process_vm_writev(r4, &(0x7f0000002580)=[{&(0x7f0000000140)=""/89, 0x59}, {&(0x7f00000001c0)=""/175, 0xaf}, {&(0x7f0000000280)=""/4096, 0x1000}], 0x3, &(0x7f0000003840)=[{&(0x7f0000002640)=""/105, 0x69}, {0xfffffffffffffffe, 0x10}], 0x2, 0x0) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r1, 0xc08c5332, &(0x7f0000001280)={0x3, 0x5, 0x0, 'queue1\x00', 0x8}) r5 = fork() write$sndseq(r1, &(0x7f0000001340)=[{0x22, 0x8, 0x2, 0x3, @time={0x4}, {0x0, 0x1}, {0x6, 0x81}, @raw32={[0x800, 0x3, 0x9]}}, {0xe1, 0x7, 0xf8, 0xff, @tick=0x2, {0x3f}, {0x4, 0xf1}, @queue={0xff, {0x6, 0x9}}}, {0x4, 0x1, 0x9, 0x5, @time={0x7, 0x6}, {0x7c, 0x2}, {0x20, 0x6}, @connect={{0x0, 0xfd}, {0x98, 0x4}}}, {0x80, 0x4, 0x7, 0x7d, @time={0xfffff000, 0x9}, {0x81, 0x1f}, {0xaa}, @queue={0x5, {0xffffffe0, 0x3}}}], 0x70) r6 = syz_open_dev$vcsn(&(0x7f0000000040), 0x3, 0x2001) ioctl$LOOP_CTL_GET_FREE(r6, 0x4c82) ptrace$setopts(0x4206, r5, 0x0, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fork() fork() clone3(&(0x7f0000004c00)={0xc0002100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) 22:33:04 executing program 5: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) lsetxattr$security_evm(&(0x7f0000000240)='.\x00', &(0x7f0000000300), &(0x7f00000003c0)=@sha1={0x1, "bd2b5bce8b74aea700654a682479ac2c0852bc4d"}, 0x15, 0x3) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={&(0x7f0000000040), 0xb}, 0x0, 0x20, 0x0, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) r0 = fork() r1 = syz_open_procfs(r0, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x2, 0x0) pwrite64(r2, &(0x7f00000000c0)='9', 0x1, 0x8040000) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x20, 0x3, 0x4, 0x1, 0x0, 0x8, 0x20620, 0x2, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x3f, 0x2, @perf_config_ext={0x240000000, 0x5}, 0x1400, 0x4, 0x8, 0x7, 0x9, 0x6, 0x6, 0x0, 0x1, 0x0, 0x8}, r0, 0xa, r2, 0x1) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r3, 0x6, 0x1e, &(0x7f0000000040)=0x1, 0x4) connect$inet6(r3, &(0x7f0000000080)={0xa, 0x0, 0x0, @loopback}, 0x1c) openat$cgroup_ro(r1, &(0x7f0000000180)='blkio.throttle.io_serviced_recursive\x00', 0x0, 0x0) 22:33:04 executing program 2: perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000480)}}, 0x0, 0xffffffefffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x100000, 0xd, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000500100000f000000000000000100000005000000000004000040000020000000dbf4655fdbf4655f0100ffff53ef010001000000dbf4655f000000000000000001000000000000000b0000008000000018000000c20500002b0200"/116, 0x74, 0x400}, {&(0x7f0000010100)="000000000000000000000000244b8e9b57f04b59aa229cc218853f9501004000", 0x20, 0x4e0}, {&(0x7f0000010200)="010000000000050040", 0x9, 0x560}, {&(0x7f0000010300)="020000000300000004000000", 0xc, 0x800}, {&(0x7f0000011500)="ed41000000080000dbf4655fdbf4655fdbf4655f00000000000004004000", 0x1e, 0x2080}, {0x0}, {0x0}, {&(0x7f0000011c00)="0b0000000c0001022e00000002000000f40702022e", 0x15, 0x10000}, {0x0}, {0x0}, {&(0x7f0000012400)="504d4d00504d4dffdbf4655f00000000647679756b6f762d676c6170746f70320000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000006c6f6f7033340075782f746573742f73797a5f6d6f756e745f696d6167655f650500"/123, 0x7b, 0x20000}, {0x0}, {0x0, 0x0, 0x38000}], 0x0, &(0x7f0000012f00)) 22:33:04 executing program 3: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) lsetxattr$security_evm(&(0x7f0000000240)='.\x00', &(0x7f0000000300), &(0x7f00000003c0)=@sha1={0x1, "bd2b5bce8b74aea700654a682479ac2c0852bc4d"}, 0x15, 0x3) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={&(0x7f0000000040), 0xb}, 0x0, 0x20, 0x0, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) r0 = fork() r1 = syz_open_procfs(r0, &(0x7f0000000000)='status\x00') r2 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x2, 0x0) pwrite64(0xffffffffffffffff, &(0x7f00000000c0)='9', 0x1, 0x8040000) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x20, 0x3, 0x4, 0x1, 0x0, 0x8, 0x20620, 0x2, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x3f, 0x2, @perf_config_ext={0x240000000, 0x5}, 0x1400, 0x4, 0x8, 0x7, 0x9, 0x6, 0x6, 0x0, 0x1, 0x0, 0x8}, r0, 0xa, r2, 0x1) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r3, 0x6, 0x1e, &(0x7f0000000040)=0x1, 0x4) setsockopt$inet6_tcp_TCP_REPAIR(r3, 0x6, 0x13, &(0x7f00000018c0)=0x1, 0x4) connect$inet6(r3, &(0x7f0000000080)={0xa, 0x0, 0x0, @loopback}, 0x1c) openat$cgroup_ro(r1, &(0x7f0000000180)='blkio.throttle.io_serviced_recursive\x00', 0x0, 0x0) 22:33:04 executing program 0: perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000480)}}, 0x0, 0xffffffefffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0xd, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000500100000f000000000000000100000005000000000004000040000020000000dbf4655fdbf4655f0100ffff53ef010001000000dbf4655f000000000000000001000000000000000b0000008000000018000000c20500002b0200"/116, 0x74, 0x400}, {&(0x7f0000010100)="000000000000000000000000244b8e9b57f04b59aa229cc218853f9501004000", 0x20, 0x4e0}, {&(0x7f0000010200)="0100000000", 0x5, 0x560}, {&(0x7f0000010300)="020000000300000004000000", 0xc, 0x800}, {&(0x7f0000010400), 0x0, 0x1000}, {&(0x7f0000011500)="ed41000000080000dbf4655fdbf4655f", 0x10, 0x2080}, {0x0}, {0x0}, {0x0, 0x0, 0x10000}, {0x0}, {0x0}, {0x0, 0x0, 0x20000}, {0x0}], 0x0, &(0x7f0000012f00)) 22:33:04 executing program 4: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000480)}}, 0x0, 0xffffffefffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x100000, 0xe, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000500100000f000000000000000100000005000000000004000040000020000000dbf4655fdbf4655f0100ffff53ef010001000000dbf4655f000000000000000001000000000000000b0000008000000018000000c20500002b0200"/116, 0x74, 0x400}, {&(0x7f0000010100)="000000000000000000000000244b8e9b57f04b59aa229cc218853f9501004000", 0x20, 0x4e0}, {&(0x7f0000010200)="010000000000050040", 0x9, 0x560}, {&(0x7f0000010300)="020000000300000004000000", 0xc, 0x800}, {&(0x7f0000010400), 0x0, 0x1000}, {&(0x7f0000011500)="ed41000000080000dbf4655fdbf4655fdbf4655f00000000000004", 0x1b, 0x2080}, {0x0}, {0x0}, {&(0x7f0000011c00)="0b0000000c0001022e00000002000000f40702022e", 0x15, 0x10000}, {0x0}, {0x0}, {&(0x7f0000012400)="504d4d00504d4dffdbf4655f00000000647679756b6f762d676c6170746f70320000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000006c6f6f7033340075782f746573742f73797a5f6d6f756e745f696d6167655f650500"/123, 0x7b, 0x20000}, {0x0}, {0x0, 0x0, 0x38000}], 0x0, &(0x7f0000012f00)) 22:33:04 executing program 6: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) lsetxattr$security_evm(&(0x7f0000000240)='.\x00', &(0x7f0000000300), &(0x7f00000003c0)=@sha1={0x1, "bd2b5bce8b74aea700654a682479ac2c0852bc4d"}, 0x15, 0x3) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={&(0x7f0000000040), 0xb}, 0x0, 0x20, 0x0, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) r0 = fork() r1 = syz_open_procfs(r0, &(0x7f0000000000)='status\x00') r2 = openat(0xffffffffffffff9c, 0x0, 0x2, 0x0) pwrite64(r2, &(0x7f00000000c0)='9', 0x1, 0x8040000) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x20, 0x3, 0x4, 0x1, 0x0, 0x8, 0x20620, 0x2, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x3f, 0x2, @perf_config_ext={0x240000000, 0x5}, 0x1400, 0x4, 0x8, 0x7, 0x9, 0x6, 0x6, 0x0, 0x1, 0x0, 0x8}, r0, 0xa, r2, 0x1) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r3, 0x6, 0x1e, &(0x7f0000000040)=0x1, 0x4) setsockopt$inet6_tcp_TCP_REPAIR(r3, 0x6, 0x13, &(0x7f00000018c0)=0x1, 0x4) connect$inet6(r3, &(0x7f0000000080)={0xa, 0x0, 0x0, @loopback}, 0x1c) openat$cgroup_ro(r1, &(0x7f0000000180)='blkio.throttle.io_serviced_recursive\x00', 0x0, 0x0) 22:33:04 executing program 7: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000480)}}, 0x0, 0xffffffefffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x100000, 0xe, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000500100000f000000000000000100000005000000000004000040000020000000dbf4655fdbf4655f0100ffff53ef010001000000dbf4655f000000000000000001000000000000000b0000008000000018000000c20500002b0200"/116, 0x74, 0x400}, {&(0x7f0000010100)="000000000000000000000000244b8e9b57f04b59aa229cc218853f9501004000", 0x20, 0x4e0}, {&(0x7f0000010200)="010000000000050040", 0x9, 0x560}, {&(0x7f0000010300)="020000000300000004000000", 0xc, 0x800}, {&(0x7f0000010400), 0x0, 0x1000}, {&(0x7f0000011500)="ed41000000080000dbf4655fdbf4655fdbf4655f00000000000004", 0x1b, 0x2080}, {0x0}, {0x0}, {&(0x7f0000011c00)="0b0000000c0001022e00000002000000f40702022e", 0x15, 0x10000}, {0x0}, {0x0}, {&(0x7f0000012400)="504d4d00504d4dffdbf4655f00000000647679756b6f762d676c6170746f70320000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000006c6f6f7033340075782f746573742f73797a5f6d6f756e745f696d6167655f650500"/123, 0x7b, 0x20000}, {0x0}, {0x0, 0x0, 0x38000}], 0x0, &(0x7f0000012f00)) [ 1459.944412] loop0: detected capacity change from 0 to 512 [ 1459.958905] loop7: detected capacity change from 0 to 2048 [ 1459.970457] EXT4-fs (loop0): bad geometry: block count 512 exceeds size of device (128 blocks) [ 1459.975417] loop2: detected capacity change from 0 to 2048 [ 1459.998801] loop4: detected capacity change from 0 to 2048 [ 1460.027201] EXT4-fs (loop7): corrupt root inode, run e2fsck [ 1460.028692] EXT4-fs (loop7): mount failed [ 1460.114330] EXT4-fs (loop2): mounted filesystem without journal. Quota mode: none. [ 1460.117861] EXT4-fs (loop4): corrupt root inode, run e2fsck [ 1460.119187] EXT4-fs (loop4): mount failed 22:33:04 executing program 0: perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000480)}}, 0x0, 0xffffffefffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0xd, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000500100000f000000000000000100000005000000000004000040000020000000dbf4655fdbf4655f0100ffff53ef010001000000dbf4655f000000000000000001000000000000000b0000008000000018000000c20500002b0200"/116, 0x74, 0x400}, {&(0x7f0000010100)="000000000000000000000000244b8e9b57f04b59aa229cc218853f9501004000", 0x20, 0x4e0}, {&(0x7f0000010200)="0100000000", 0x5, 0x560}, {&(0x7f0000010300)="020000000300000004000000", 0xc, 0x800}, {&(0x7f0000010400), 0x0, 0x1000}, {&(0x7f0000011500)="ed41000000080000dbf4655fdbf4655f", 0x10, 0x2080}, {0x0}, {0x0}, {0x0, 0x0, 0x10000}, {0x0}, {0x0}, {0x0, 0x0, 0x20000}, {0x0}], 0x0, &(0x7f0000012f00)) [ 1460.149068] ext4 filesystem being mounted at /syzkaller-testdir307671421/syzkaller.SFQaEW/160/file0 supports timestamps until 2038 (0x7fffffff) 22:33:04 executing program 7: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000480)}}, 0x0, 0xffffffefffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x100000, 0xe, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000500100000f000000000000000100000005000000000004000040000020000000dbf4655fdbf4655f0100ffff53ef010001000000dbf4655f000000000000000001000000000000000b0000008000000018000000c20500002b0200"/116, 0x74, 0x400}, {&(0x7f0000010100)="000000000000000000000000244b8e9b57f04b59aa229cc218853f9501004000", 0x20, 0x4e0}, {&(0x7f0000010200)="010000000000050040", 0x9, 0x560}, {&(0x7f0000010300)="020000000300000004000000", 0xc, 0x800}, {&(0x7f0000010400), 0x0, 0x1000}, {&(0x7f0000011500)="ed41000000080000dbf4655fdbf4655fdbf4655f000000000000040040", 0x1d, 0x2080}, {0x0}, {0x0}, {&(0x7f0000011c00)="0b0000000c0001022e00000002000000f40702022e", 0x15, 0x10000}, {0x0}, {0x0}, {&(0x7f0000012400)="504d4d00504d4dffdbf4655f00000000647679756b6f762d676c6170746f70320000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000006c6f6f7033340075782f746573742f73797a5f6d6f756e745f696d6167655f650500"/123, 0x7b, 0x20000}, {0x0}, {0x0, 0x0, 0x38000}], 0x0, &(0x7f0000012f00)) 22:33:04 executing program 2: perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000480)}}, 0x0, 0xffffffefffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x100000, 0xd, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000500100000f000000000000000100000005000000000004000040000020000000dbf4655fdbf4655f0100ffff53ef010001000000dbf4655f000000000000000001000000000000000b0000008000000018000000c20500002b0200"/116, 0x74, 0x400}, {&(0x7f0000010100)="000000000000000000000000244b8e9b57f04b59aa229cc218853f9501004000", 0x20, 0x4e0}, {&(0x7f0000010200)="010000000000050040", 0x9, 0x560}, {&(0x7f0000010300)="020000000300000004000000", 0xc, 0x800}, {&(0x7f0000011500)="ed41000000080000dbf4655fdbf4655fdbf4655f00000000000004004000", 0x1e, 0x2080}, {0x0}, {0x0}, {&(0x7f0000011c00)="0b0000000c0001022e00000002000000f40702022e", 0x15, 0x10000}, {0x0}, {0x0}, {&(0x7f0000012400)="504d4d00504d4dffdbf4655f00000000647679756b6f762d676c6170746f70320000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000006c6f6f7033340075782f746573742f73797a5f6d6f756e745f696d6167655f650500"/123, 0x7b, 0x20000}, {0x0}, {0x0, 0x0, 0x38000}], 0x0, &(0x7f0000012f00)) [ 1460.313402] EXT4-fs (loop2): unmounting filesystem. [ 1460.339977] loop0: detected capacity change from 0 to 512 22:33:04 executing program 4: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000480)}}, 0x0, 0xffffffefffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x100000, 0xe, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000500100000f000000000000000100000005000000000004000040000020000000dbf4655fdbf4655f0100ffff53ef010001000000dbf4655f000000000000000001000000000000000b0000008000000018000000c20500002b0200"/116, 0x74, 0x400}, {&(0x7f0000010100)="000000000000000000000000244b8e9b57f04b59aa229cc218853f9501004000", 0x20, 0x4e0}, {&(0x7f0000010200)="010000000000050040", 0x9, 0x560}, {&(0x7f0000010300)="020000000300000004000000", 0xc, 0x800}, {&(0x7f0000010400), 0x0, 0x1000}, {&(0x7f0000011500)="ed41000000080000dbf4655fdbf4655fdbf4655f00000000000004", 0x1b, 0x2080}, {0x0}, {0x0}, {&(0x7f0000011c00)="0b0000000c0001022e00000002000000f40702022e", 0x15, 0x10000}, {0x0}, {0x0}, {&(0x7f0000012400)="504d4d00504d4dffdbf4655f00000000647679756b6f762d676c6170746f70320000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000006c6f6f7033340075782f746573742f73797a5f6d6f756e745f696d6167655f650500"/123, 0x7b, 0x20000}, {0x0}, {0x0, 0x0, 0x38000}], 0x0, &(0x7f0000012f00)) [ 1460.394855] loop7: detected capacity change from 0 to 2048 [ 1460.398630] EXT4-fs (loop0): bad geometry: block count 512 exceeds size of device (128 blocks) [ 1460.472181] EXT4-fs (loop7): mounted filesystem without journal. Quota mode: none. [ 1460.477647] ext4 filesystem being mounted at /syzkaller-testdir391614100/syzkaller.1GCODk/172/file0 supports timestamps until 2038 (0x7fffffff) [ 1460.522344] loop4: detected capacity change from 0 to 2048 22:33:05 executing program 1: r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, @perf_config_ext, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000000), 0x0) r2 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) ioctl$EXT4_IOC_CHECKPOINT(r2, 0x4004662b, &(0x7f0000000100)=0x5) ioctl$AUTOFS_DEV_IOCTL_TIMEOUT(0xffffffffffffffff, 0xc018937a, &(0x7f0000001480)=ANY=[@ANYBLOB="010000fe04f804f32d1ae95f4d8fd9ce99ff00010000001800000059a5a91fc707002c3e05f0bcf35234dd60eedec3d5f1b58f0d41f6996d0df70b25316c86b91cf6440f87695b3e2bf9118d7b986e6dd6169cde2d7b35569ff3c18ea708da093a5e297fd2ec2322a167617fa6662e65407cedfd90d2ee90deccf04f2c85b215e5090cb50628f934703c2db873b5eb9a2e276f987493cc445a8474761879f6df5a5233b80656c014a59590366f77d5104d838160f3f8f304bbfb07a672117635569099d752c2b724b38b74a3b0e2c4dd54619ff2e05de8c58ace02796bd997ccfd3fbf04c5bb7420f2656931eb46c8e72d17fd9b33dd84ff6fab17ff995be40bf9a47cdde574665966c721e5f265d3aaac1788c3ea", @ANYRES32=r0, @ANYBLOB="01040000000000002e2f6669"]) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r3, 0xc08c5332, &(0x7f00000013c0)={0xffffffff, 0x6964, 0x0, 'queue1\x00', 0xff}) r4 = gettid() process_vm_writev(r4, &(0x7f0000002580)=[{&(0x7f0000000140)=""/89, 0x59}, {&(0x7f00000001c0)=""/175, 0xaf}, {&(0x7f0000000280)=""/4096, 0x1000}], 0x3, &(0x7f0000003840)=[{&(0x7f0000002640)=""/105, 0x69}, {0xfffffffffffffffe, 0x10}], 0x2, 0x0) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r1, 0xc08c5332, &(0x7f0000001280)={0x3, 0x5, 0x0, 'queue1\x00', 0x8}) r5 = fork() write$sndseq(r1, &(0x7f0000001340)=[{0x22, 0x8, 0x2, 0x3, @time={0x4}, {0x0, 0x1}, {0x6, 0x81}, @raw32={[0x800, 0x3, 0x9]}}, {0xe1, 0x7, 0xf8, 0xff, @tick=0x2, {0x3f}, {0x4, 0xf1}, @queue={0xff, {0x6, 0x9}}}, {0x4, 0x1, 0x9, 0x5, @time={0x7, 0x6}, {0x7c, 0x2}, {0x20, 0x6}, @connect={{0x0, 0xfd}, {0x98, 0x4}}}, {0x80, 0x4, 0x7, 0x7d, @time={0xfffff000, 0x9}, {0x81, 0x1f}, {0xaa}, @queue={0x5, {0xffffffe0, 0x3}}}], 0x70) r6 = syz_open_dev$vcsn(&(0x7f0000000040), 0x3, 0x2001) ioctl$LOOP_CTL_GET_FREE(r6, 0x4c82) ptrace$setopts(0x4206, r5, 0x0, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fork() fork() clone3(&(0x7f0000004c00)={0xc0002100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) [ 1460.554355] EXT4-fs (loop7): unmounting filesystem. [ 1460.564291] loop2: detected capacity change from 0 to 2048 [ 1460.635816] EXT4-fs (loop4): corrupt root inode, run e2fsck [ 1460.637131] EXT4-fs (loop4): mount failed [ 1460.650404] EXT4-fs (loop2): mounted filesystem without journal. Quota mode: none. [ 1460.657854] ext4 filesystem being mounted at /syzkaller-testdir307671421/syzkaller.SFQaEW/161/file0 supports timestamps until 2038 (0x7fffffff) [ 1460.773247] EXT4-fs (loop2): unmounting filesystem. 22:33:20 executing program 1: r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, @perf_config_ext, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000000), 0x0) r2 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) ioctl$EXT4_IOC_CHECKPOINT(r2, 0x4004662b, &(0x7f0000000100)=0x5) ioctl$AUTOFS_DEV_IOCTL_TIMEOUT(0xffffffffffffffff, 0xc018937a, &(0x7f0000001480)=ANY=[@ANYBLOB="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", @ANYRES32=r0, @ANYBLOB="01040000000000002e2f6669"]) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r3, 0xc08c5332, &(0x7f00000013c0)={0xffffffff, 0x6964, 0x0, 'queue1\x00', 0xff}) r4 = gettid() process_vm_writev(r4, &(0x7f0000002580)=[{&(0x7f0000000140)=""/89, 0x59}, {&(0x7f00000001c0)=""/175, 0xaf}, {&(0x7f0000000280)=""/4096, 0x1000}], 0x3, &(0x7f0000003840)=[{&(0x7f0000002640)=""/105, 0x69}, {0xfffffffffffffffe, 0x10}], 0x2, 0x0) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r1, 0xc08c5332, &(0x7f0000001280)={0x3, 0x5, 0x0, 'queue1\x00', 0x8}) r5 = fork() write$sndseq(r1, &(0x7f0000001340)=[{0x22, 0x8, 0x2, 0x3, @time={0x4}, {0x0, 0x1}, {0x6, 0x81}, @raw32={[0x800, 0x3, 0x9]}}, {0xe1, 0x7, 0xf8, 0xff, @tick=0x2, {0x3f}, {0x4, 0xf1}, @queue={0xff, {0x6, 0x9}}}, {0x4, 0x1, 0x9, 0x5, @time={0x7, 0x6}, {0x7c, 0x2}, {0x20, 0x6}, @connect={{0x0, 0xfd}, {0x98, 0x4}}}, {0x80, 0x4, 0x7, 0x7d, @time={0xfffff000, 0x9}, {0x81, 0x1f}, {0xaa}, @queue={0x5, {0xffffffe0, 0x3}}}], 0x70) r6 = syz_open_dev$vcsn(&(0x7f0000000040), 0x3, 0x2001) ioctl$LOOP_CTL_GET_FREE(r6, 0x4c82) ptrace$setopts(0x4206, r5, 0x0, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fork() fork() clone3(&(0x7f0000004c00)={0xc0002100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) 22:33:20 executing program 7: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000480)}}, 0x0, 0xffffffefffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x100000, 0xe, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000500100000f000000000000000100000005000000000004000040000020000000dbf4655fdbf4655f0100ffff53ef010001000000dbf4655f000000000000000001000000000000000b0000008000000018000000c20500002b0200"/116, 0x74, 0x400}, {&(0x7f0000010100)="000000000000000000000000244b8e9b57f04b59aa229cc218853f9501004000", 0x20, 0x4e0}, {&(0x7f0000010200)="010000000000050040", 0x9, 0x560}, {&(0x7f0000010300)="020000000300000004000000", 0xc, 0x800}, {&(0x7f0000010400), 0x0, 0x1000}, {&(0x7f0000011500)="ed41000000080000dbf4655fdbf4655fdbf4655f000000000000040040", 0x1d, 0x2080}, {0x0}, {0x0}, {&(0x7f0000011c00)="0b0000000c0001022e00000002000000f40702022e", 0x15, 0x10000}, {0x0}, {0x0}, {&(0x7f0000012400)="504d4d00504d4dffdbf4655f00000000647679756b6f762d676c6170746f70320000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000006c6f6f7033340075782f746573742f73797a5f6d6f756e745f696d6167655f650500"/123, 0x7b, 0x20000}, {0x0}, {0x0, 0x0, 0x38000}], 0x0, &(0x7f0000012f00)) 22:33:20 executing program 2: perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000480)}}, 0x0, 0xffffffefffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x100000, 0xd, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000500100000f000000000000000100000005000000000004000040000020000000dbf4655fdbf4655f0100ffff53ef010001000000dbf4655f000000000000000001000000000000000b0000008000000018000000c20500002b0200"/116, 0x74, 0x400}, {&(0x7f0000010100)="000000000000000000000000244b8e9b57f04b59aa229cc218853f9501004000", 0x20, 0x4e0}, {&(0x7f0000010200)="010000000000050040", 0x9, 0x560}, {&(0x7f0000010300)="020000000300000004000000", 0xc, 0x800}, {&(0x7f0000011500)="ed41000000080000dbf4655fdbf4655fdbf4655f00000000000004004000", 0x1e, 0x2080}, {0x0}, {0x0}, {&(0x7f0000011c00)="0b0000000c0001022e00000002000000f40702022e", 0x15, 0x10000}, {0x0}, {0x0}, {&(0x7f0000012400)="504d4d00504d4dffdbf4655f00000000647679756b6f762d676c6170746f70320000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000006c6f6f7033340075782f746573742f73797a5f6d6f756e745f696d6167655f650500"/123, 0x7b, 0x20000}, {0x0}, {0x0, 0x0, 0x38000}], 0x0, &(0x7f0000012f00)) 22:33:20 executing program 6: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) lsetxattr$security_evm(&(0x7f0000000240)='.\x00', &(0x7f0000000300), &(0x7f00000003c0)=@sha1={0x1, "bd2b5bce8b74aea700654a682479ac2c0852bc4d"}, 0x15, 0x3) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={&(0x7f0000000040), 0xb}, 0x0, 0x20, 0x0, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) r0 = fork() r1 = syz_open_procfs(r0, &(0x7f0000000000)='status\x00') r2 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x0, 0x0) pwrite64(r2, &(0x7f00000000c0)='9', 0x1, 0x8040000) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x20, 0x3, 0x4, 0x1, 0x0, 0x8, 0x20620, 0x2, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x3f, 0x2, @perf_config_ext={0x240000000, 0x5}, 0x1400, 0x4, 0x8, 0x7, 0x9, 0x6, 0x6, 0x0, 0x1, 0x0, 0x8}, r0, 0xa, r2, 0x1) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r3, 0x6, 0x1e, &(0x7f0000000040)=0x1, 0x4) setsockopt$inet6_tcp_TCP_REPAIR(r3, 0x6, 0x13, &(0x7f00000018c0)=0x1, 0x4) connect$inet6(r3, &(0x7f0000000080)={0xa, 0x0, 0x0, @loopback}, 0x1c) openat$cgroup_ro(r1, &(0x7f0000000180)='blkio.throttle.io_serviced_recursive\x00', 0x0, 0x0) 22:33:20 executing program 0: perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000480)}}, 0x0, 0xffffffefffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0xd, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000500100000f000000000000000100000005000000000004000040000020000000dbf4655fdbf4655f0100ffff53ef010001000000dbf4655f000000000000000001000000000000000b0000008000000018000000c20500002b0200"/116, 0x74, 0x400}, {&(0x7f0000010100)="000000000000000000000000244b8e9b57f04b59aa229cc218853f9501004000", 0x20, 0x4e0}, {&(0x7f0000010200)="0100000000", 0x5, 0x560}, {&(0x7f0000010300)="020000000300000004000000", 0xc, 0x800}, {&(0x7f0000010400), 0x0, 0x1000}, {&(0x7f0000011500)="ed41000000080000dbf4655fdbf4655f", 0x10, 0x2080}, {0x0}, {0x0}, {0x0, 0x0, 0x10000}, {0x0}, {0x0}, {0x0, 0x0, 0x20000}, {0x0}], 0x0, &(0x7f0000012f00)) 22:33:20 executing program 3: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) lsetxattr$security_evm(&(0x7f0000000240)='.\x00', &(0x7f0000000300), &(0x7f00000003c0)=@sha1={0x1, "bd2b5bce8b74aea700654a682479ac2c0852bc4d"}, 0x15, 0x3) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={&(0x7f0000000040), 0xb}, 0x0, 0x20, 0x0, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) r0 = fork() r1 = syz_open_procfs(r0, &(0x7f0000000000)='status\x00') r2 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x2, 0x0) pwrite64(r2, 0x0, 0x0, 0x8040000) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x20, 0x3, 0x4, 0x1, 0x0, 0x8, 0x20620, 0x2, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x3f, 0x2, @perf_config_ext={0x240000000, 0x5}, 0x1400, 0x4, 0x8, 0x7, 0x9, 0x6, 0x6, 0x0, 0x1, 0x0, 0x8}, r0, 0xa, r2, 0x1) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r3, 0x6, 0x1e, &(0x7f0000000040)=0x1, 0x4) setsockopt$inet6_tcp_TCP_REPAIR(r3, 0x6, 0x13, &(0x7f00000018c0)=0x1, 0x4) connect$inet6(r3, &(0x7f0000000080)={0xa, 0x0, 0x0, @loopback}, 0x1c) openat$cgroup_ro(r1, &(0x7f0000000180)='blkio.throttle.io_serviced_recursive\x00', 0x0, 0x0) 22:33:20 executing program 4: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000480)}}, 0x0, 0xffffffefffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x100000, 0xe, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000500100000f000000000000000100000005000000000004000040000020000000dbf4655fdbf4655f0100ffff53ef010001000000dbf4655f000000000000000001000000000000000b0000008000000018000000c20500002b0200"/116, 0x74, 0x400}, {&(0x7f0000010100)="000000000000000000000000244b8e9b57f04b59aa229cc218853f9501004000", 0x20, 0x4e0}, {&(0x7f0000010200)="010000000000050040", 0x9, 0x560}, {&(0x7f0000010300)="020000000300000004000000", 0xc, 0x800}, {&(0x7f0000010400), 0x0, 0x1000}, {&(0x7f0000011500)="ed41000000080000dbf4655fdbf4655fdbf4655f00000000000004", 0x1b, 0x2080}, {0x0}, {0x0}, {&(0x7f0000011c00)="0b0000000c0001022e00000002000000f40702022e", 0x15, 0x10000}, {0x0}, {0x0}, {&(0x7f0000012400)="504d4d00504d4dffdbf4655f00000000647679756b6f762d676c6170746f70320000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000006c6f6f7033340075782f746573742f73797a5f6d6f756e745f696d6167655f650500"/123, 0x7b, 0x20000}, {0x0}, {0x0, 0x0, 0x38000}], 0x0, &(0x7f0000012f00)) 22:33:20 executing program 5: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) lsetxattr$security_evm(&(0x7f0000000240)='.\x00', &(0x7f0000000300), &(0x7f00000003c0)=@sha1={0x1, "bd2b5bce8b74aea700654a682479ac2c0852bc4d"}, 0x15, 0x3) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={&(0x7f0000000040), 0xb}, 0x0, 0x20, 0x0, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) r0 = fork() r1 = syz_open_procfs(r0, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x2, 0x0) pwrite64(r2, &(0x7f00000000c0)='9', 0x1, 0x8040000) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x20, 0x3, 0x4, 0x1, 0x0, 0x8, 0x20620, 0x2, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x3f, 0x2, @perf_config_ext={0x240000000, 0x5}, 0x1400, 0x4, 0x8, 0x7, 0x9, 0x6, 0x6, 0x0, 0x1, 0x0, 0x8}, r0, 0xa, r2, 0x1) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r3, 0x6, 0x1e, &(0x7f0000000040)=0x1, 0x4) connect$inet6(r3, &(0x7f0000000080)={0xa, 0x0, 0x0, @loopback}, 0x1c) openat$cgroup_ro(r1, &(0x7f0000000180)='blkio.throttle.io_serviced_recursive\x00', 0x0, 0x0) [ 1476.390740] loop2: detected capacity change from 0 to 2048 [ 1476.391448] loop4: detected capacity change from 0 to 2048 [ 1476.394074] loop7: detected capacity change from 0 to 2048 [ 1476.404786] loop0: detected capacity change from 0 to 512 [ 1476.430193] EXT4-fs (loop0): bad geometry: block count 512 exceeds size of device (128 blocks) [ 1476.444754] EXT4-fs (loop2): mounted filesystem without journal. Quota mode: none. [ 1476.448382] EXT4-fs (loop7): mounted filesystem without journal. Quota mode: none. [ 1476.449313] ext4 filesystem being mounted at /syzkaller-testdir307671421/syzkaller.SFQaEW/162/file0 supports timestamps until 2038 (0x7fffffff) [ 1476.450942] ext4 filesystem being mounted at /syzkaller-testdir391614100/syzkaller.1GCODk/173/file0 supports timestamps until 2038 (0x7fffffff) [ 1476.501046] EXT4-fs (loop4): corrupt root inode, run e2fsck [ 1476.502303] EXT4-fs (loop4): mount failed 22:33:21 executing program 0: perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000480)}}, 0x0, 0xffffffefffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0xd, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000500100000f000000000000000100000005000000000004000040000020000000dbf4655fdbf4655f0100ffff53ef010001000000dbf4655f000000000000000001000000000000000b0000008000000018000000c20500002b0200"/116, 0x74, 0x400}, {&(0x7f0000010100)="000000000000000000000000244b8e9b57f04b59aa229cc218853f9501004000", 0x20, 0x4e0}, {&(0x7f0000010200)="01000000000005", 0x7, 0x560}, {&(0x7f0000010300)="020000000300000004000000", 0xc, 0x800}, {&(0x7f0000010400), 0x0, 0x1000}, {&(0x7f0000011500)="ed41000000080000dbf4655fdbf4655f", 0x10, 0x2080}, {0x0}, {0x0}, {0x0, 0x0, 0x10000}, {0x0}, {0x0}, {0x0, 0x0, 0x20000}, {0x0}], 0x0, &(0x7f0000012f00)) 22:33:21 executing program 4: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000480)}}, 0x0, 0xffffffefffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x100000, 0xe, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000500100000f000000000000000100000005000000000004000040000020000000dbf4655fdbf4655f0100ffff53ef010001000000dbf4655f000000000000000001000000000000000b0000008000000018000000c20500002b0200"/116, 0x74, 0x400}, {&(0x7f0000010100)="000000000000000000000000244b8e9b57f04b59aa229cc218853f9501004000", 0x20, 0x4e0}, {&(0x7f0000010200)="010000000000050040", 0x9, 0x560}, {&(0x7f0000010300)="020000000300000004000000", 0xc, 0x800}, {&(0x7f0000010400), 0x0, 0x1000}, {&(0x7f0000011500)="ed41000000080000dbf4655fdbf4655fdbf4655f000000000000040040", 0x1d, 0x2080}, {0x0}, {0x0}, {&(0x7f0000011c00)="0b0000000c0001022e00000002000000f40702022e", 0x15, 0x10000}, {0x0}, {0x0}, {&(0x7f0000012400)="504d4d00504d4dffdbf4655f00000000647679756b6f762d676c6170746f70320000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000006c6f6f7033340075782f746573742f73797a5f6d6f756e745f696d6167655f650500"/123, 0x7b, 0x20000}, {0x0}, {0x0, 0x0, 0x38000}], 0x0, &(0x7f0000012f00)) 22:33:21 executing program 2: perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000480)}}, 0x0, 0xffffffefffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x100000, 0xe, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000500100000f000000000000000100000005000000000004000040000020000000dbf4655fdbf4655f0100ffff53ef010001000000dbf4655f000000000000000001000000000000000b0000008000000018000000c20500002b0200"/116, 0x74, 0x400}, {&(0x7f0000010100)="000000000000000000000000244b8e9b57f04b59aa229cc218853f9501004000", 0x20, 0x4e0}, {&(0x7f0000010200)="010000000000050040", 0x9, 0x560}, {&(0x7f0000010300)="020000000300000004000000", 0xc, 0x800}, {0x0, 0x0, 0x1000}, {&(0x7f0000011500)="ed41000000080000dbf4655fdbf4655fdbf4655f00000000000004004000", 0x1e, 0x2080}, {0x0}, {0x0}, {&(0x7f0000011c00)="0b0000000c0001022e00000002000000f40702022e", 0x15, 0x10000}, {0x0}, {0x0}, {&(0x7f0000012400)="504d4d00504d4dffdbf4655f00000000647679756b6f762d676c6170746f70320000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000006c6f6f7033340075782f746573742f73797a5f6d6f756e745f696d6167655f650500"/123, 0x7b, 0x20000}, {0x0}, {0x0, 0x0, 0x38000}], 0x0, &(0x7f0000012f00)) 22:33:21 executing program 7: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000480)}}, 0x0, 0xffffffefffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x100000, 0xe, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000500100000f000000000000000100000005000000000004000040000020000000dbf4655fdbf4655f0100ffff53ef010001000000dbf4655f000000000000000001000000000000000b0000008000000018000000c20500002b0200"/116, 0x74, 0x400}, {&(0x7f0000010100)="000000000000000000000000244b8e9b57f04b59aa229cc218853f9501004000", 0x20, 0x4e0}, {&(0x7f0000010200)="010000000000050040", 0x9, 0x560}, {&(0x7f0000010300)="020000000300000004000000", 0xc, 0x800}, {&(0x7f0000010400), 0x0, 0x1000}, {&(0x7f0000011500)="ed41000000080000dbf4655fdbf4655fdbf4655f000000000000040040", 0x1d, 0x2080}, {0x0}, {0x0}, {&(0x7f0000011c00)="0b0000000c0001022e00000002000000f40702022e", 0x15, 0x10000}, {0x0}, {0x0}, {&(0x7f0000012400)="504d4d00504d4dffdbf4655f00000000647679756b6f762d676c6170746f70320000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000006c6f6f7033340075782f746573742f73797a5f6d6f756e745f696d6167655f650500"/123, 0x7b, 0x20000}, {0x0}, {0x0, 0x0, 0x38000}], 0x0, &(0x7f0000012f00)) [ 1476.618004] EXT4-fs (loop2): unmounting filesystem. [ 1476.621280] EXT4-fs (loop7): unmounting filesystem. [ 1476.665253] loop4: detected capacity change from 0 to 2048 [ 1476.704710] loop0: detected capacity change from 0 to 512 [ 1476.709920] EXT4-fs (loop0): bad geometry: block count 512 exceeds size of device (128 blocks) [ 1476.720810] loop7: detected capacity change from 0 to 2048 [ 1476.722244] loop2: detected capacity change from 0 to 2048 22:33:21 executing program 3: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) lsetxattr$security_evm(&(0x7f0000000240)='.\x00', &(0x7f0000000300), &(0x7f00000003c0)=@sha1={0x1, "bd2b5bce8b74aea700654a682479ac2c0852bc4d"}, 0x15, 0x3) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={&(0x7f0000000040), 0xb}, 0x0, 0x20, 0x0, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) r0 = fork() r1 = syz_open_procfs(r0, &(0x7f0000000000)='status\x00') r2 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x2, 0x0) pwrite64(r2, 0x0, 0x0, 0x8040000) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x20, 0x3, 0x4, 0x1, 0x0, 0x8, 0x20620, 0x2, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x3f, 0x2, @perf_config_ext={0x240000000, 0x5}, 0x1400, 0x4, 0x8, 0x7, 0x9, 0x6, 0x6, 0x0, 0x1, 0x0, 0x8}, r0, 0xa, r2, 0x1) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r3, 0x6, 0x1e, &(0x7f0000000040)=0x1, 0x4) setsockopt$inet6_tcp_TCP_REPAIR(r3, 0x6, 0x13, &(0x7f00000018c0)=0x1, 0x4) connect$inet6(r3, &(0x7f0000000080)={0xa, 0x0, 0x0, @loopback}, 0x1c) openat$cgroup_ro(r1, &(0x7f0000000180)='blkio.throttle.io_serviced_recursive\x00', 0x0, 0x0) [ 1476.754218] EXT4-fs (loop2): mounted filesystem without journal. Quota mode: none. [ 1476.757627] ext4 filesystem being mounted at /syzkaller-testdir307671421/syzkaller.SFQaEW/163/file0 supports timestamps until 2038 (0x7fffffff) 22:33:21 executing program 1: r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, @perf_config_ext, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000000), 0x0) r2 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) ioctl$EXT4_IOC_CHECKPOINT(r2, 0x4004662b, &(0x7f0000000100)=0x5) ioctl$AUTOFS_DEV_IOCTL_TIMEOUT(0xffffffffffffffff, 0xc018937a, &(0x7f0000001480)=ANY=[@ANYBLOB="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", @ANYRES32=r0, @ANYBLOB="01040000000000002e2f66696c65"]) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r3, 0xc08c5332, &(0x7f00000013c0)={0xffffffff, 0x6964, 0x0, 'queue1\x00', 0xff}) r4 = gettid() process_vm_writev(r4, &(0x7f0000002580)=[{&(0x7f0000000140)=""/89, 0x59}, {&(0x7f00000001c0)=""/175, 0xaf}, {&(0x7f0000000280)=""/4096, 0x1000}], 0x3, &(0x7f0000003840)=[{&(0x7f0000002640)=""/105, 0x69}, {0xfffffffffffffffe, 0x10}], 0x2, 0x0) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r1, 0xc08c5332, &(0x7f0000001280)={0x3, 0x5, 0x0, 'queue1\x00', 0x8}) r5 = fork() write$sndseq(r1, &(0x7f0000001340)=[{0x22, 0x8, 0x2, 0x3, @time={0x4}, {0x0, 0x1}, {0x6, 0x81}, @raw32={[0x800, 0x3, 0x9]}}, {0xe1, 0x7, 0xf8, 0xff, @tick=0x2, {0x3f}, {0x4, 0xf1}, @queue={0xff, {0x6, 0x9}}}, {0x4, 0x1, 0x9, 0x5, @time={0x7, 0x6}, {0x7c, 0x2}, {0x20, 0x6}, @connect={{0x0, 0xfd}, {0x98, 0x4}}}, {0x80, 0x4, 0x7, 0x7d, @time={0xfffff000, 0x9}, {0x81, 0x1f}, {0xaa}, @queue={0x5, {0xffffffe0, 0x3}}}], 0x70) r6 = syz_open_dev$vcsn(&(0x7f0000000040), 0x3, 0x2001) ioctl$LOOP_CTL_GET_FREE(r6, 0x4c82) ptrace$setopts(0x4206, r5, 0x0, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fork() fork() clone3(&(0x7f0000004c00)={0xc0002100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) 22:33:21 executing program 2: perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000480)}}, 0x0, 0xffffffefffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x100000, 0xe, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000500100000f000000000000000100000005000000000004000040000020000000dbf4655fdbf4655f0100ffff53ef010001000000dbf4655f000000000000000001000000000000000b0000008000000018000000c20500002b0200"/116, 0x74, 0x400}, {&(0x7f0000010100)="000000000000000000000000244b8e9b57f04b59aa229cc218853f9501004000", 0x20, 0x4e0}, {&(0x7f0000010200)="010000000000050040", 0x9, 0x560}, {&(0x7f0000010300)="020000000300000004000000", 0xc, 0x800}, {0x0, 0x0, 0x1000}, {&(0x7f0000011500)="ed41000000080000dbf4655fdbf4655fdbf4655f00000000000004004000", 0x1e, 0x2080}, {0x0}, {0x0}, {&(0x7f0000011c00)="0b0000000c0001022e00000002000000f40702022e", 0x15, 0x10000}, {0x0}, {0x0}, {&(0x7f0000012400)="504d4d00504d4dffdbf4655f00000000647679756b6f762d676c6170746f70320000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000006c6f6f7033340075782f746573742f73797a5f6d6f756e745f696d6167655f650500"/123, 0x7b, 0x20000}, {0x0}, {0x0, 0x0, 0x38000}], 0x0, &(0x7f0000012f00)) [ 1476.806023] EXT4-fs (loop4): mounted filesystem without journal. Quota mode: none. [ 1476.806948] EXT4-fs (loop7): mounted filesystem without journal. Quota mode: none. [ 1476.808288] ext4 filesystem being mounted at /syzkaller-testdir967783826/syzkaller.dhcxYf/169/file0 supports timestamps until 2038 (0x7fffffff) [ 1476.808573] EXT4-fs (loop2): unmounting filesystem. [ 1476.811213] ext4 filesystem being mounted at /syzkaller-testdir391614100/syzkaller.1GCODk/174/file0 supports timestamps until 2038 (0x7fffffff) [ 1476.872237] EXT4-fs (loop7): unmounting filesystem. 22:33:21 executing program 7: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000480)}}, 0x0, 0xffffffefffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x100000, 0xe, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000500100000f000000000000000100000005000000000004000040000020000000dbf4655fdbf4655f0100ffff53ef010001000000dbf4655f000000000000000001000000000000000b0000008000000018000000c20500002b0200"/116, 0x74, 0x400}, {&(0x7f0000010100)="000000000000000000000000244b8e9b57f04b59aa229cc218853f9501004000", 0x20, 0x4e0}, {&(0x7f0000010200)="010000000000050040", 0x9, 0x560}, {&(0x7f0000010300)="020000000300000004000000", 0xc, 0x800}, {&(0x7f0000010400), 0x0, 0x1000}, {&(0x7f0000011500)="ed41000000080000dbf4655fdbf4655fdbf4655f00000000000004004000", 0x1e}, {0x0}, {0x0}, {&(0x7f0000011c00)="0b0000000c0001022e00000002000000f40702022e", 0x15, 0x10000}, {0x0}, {0x0}, {&(0x7f0000012400)="504d4d00504d4dffdbf4655f00000000647679756b6f762d676c6170746f70320000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000006c6f6f7033340075782f746573742f73797a5f6d6f756e745f696d6167655f650500"/123, 0x7b, 0x20000}, {0x0}, {0x0, 0x0, 0x38000}], 0x0, &(0x7f0000012f00)) 22:33:21 executing program 0: perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000480)}}, 0x0, 0xffffffefffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0xd, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000500100000f000000000000000100000005000000000004000040000020000000dbf4655fdbf4655f0100ffff53ef010001000000dbf4655f000000000000000001000000000000000b0000008000000018000000c20500002b0200"/116, 0x74, 0x400}, {&(0x7f0000010100)="000000000000000000000000244b8e9b57f04b59aa229cc218853f9501004000", 0x20, 0x4e0}, {&(0x7f0000010200)="01000000000005", 0x7, 0x560}, {&(0x7f0000010300)="020000000300000004000000", 0xc, 0x800}, {&(0x7f0000010400), 0x0, 0x1000}, {&(0x7f0000011500)="ed41000000080000dbf4655fdbf4655f", 0x10, 0x2080}, {0x0}, {0x0}, {0x0, 0x0, 0x10000}, {0x0}, {0x0}, {0x0, 0x0, 0x20000}, {0x0}], 0x0, &(0x7f0000012f00)) 22:33:21 executing program 6: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) lsetxattr$security_evm(&(0x7f0000000240)='.\x00', &(0x7f0000000300), &(0x7f00000003c0)=@sha1={0x1, "bd2b5bce8b74aea700654a682479ac2c0852bc4d"}, 0x15, 0x3) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={&(0x7f0000000040), 0xb}, 0x0, 0x20, 0x0, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) r0 = fork() r1 = syz_open_procfs(r0, &(0x7f0000000000)='status\x00') r2 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x0, 0x0) pwrite64(r2, &(0x7f00000000c0)='9', 0x1, 0x8040000) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x20, 0x3, 0x4, 0x1, 0x0, 0x8, 0x20620, 0x2, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x3f, 0x2, @perf_config_ext={0x240000000, 0x5}, 0x1400, 0x4, 0x8, 0x7, 0x9, 0x6, 0x6, 0x0, 0x1, 0x0, 0x8}, r0, 0xa, r2, 0x1) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r3, 0x6, 0x1e, &(0x7f0000000040)=0x1, 0x4) setsockopt$inet6_tcp_TCP_REPAIR(r3, 0x6, 0x13, &(0x7f00000018c0)=0x1, 0x4) connect$inet6(r3, &(0x7f0000000080)={0xa, 0x0, 0x0, @loopback}, 0x1c) openat$cgroup_ro(r1, &(0x7f0000000180)='blkio.throttle.io_serviced_recursive\x00', 0x0, 0x0) 22:33:21 executing program 5: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) lsetxattr$security_evm(&(0x7f0000000240)='.\x00', &(0x7f0000000300), &(0x7f00000003c0)=@sha1={0x1, "bd2b5bce8b74aea700654a682479ac2c0852bc4d"}, 0x15, 0x3) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={&(0x7f0000000040), 0xb}, 0x0, 0x20, 0x0, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) r0 = fork() r1 = syz_open_procfs(r0, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x2, 0x0) pwrite64(r2, &(0x7f00000000c0)='9', 0x1, 0x8040000) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x20, 0x3, 0x4, 0x1, 0x0, 0x8, 0x20620, 0x2, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x3f, 0x2, @perf_config_ext={0x240000000, 0x5}, 0x1400, 0x4, 0x8, 0x7, 0x9, 0x6, 0x6, 0x0, 0x1, 0x0, 0x8}, r0, 0xa, r2, 0x1) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r3, 0x6, 0x1e, &(0x7f0000000040)=0x1, 0x4) connect$inet6(r3, &(0x7f0000000080)={0xa, 0x0, 0x0, @loopback}, 0x1c) openat$cgroup_ro(r1, &(0x7f0000000180)='blkio.throttle.io_serviced_recursive\x00', 0x0, 0x0) [ 1476.902068] loop2: detected capacity change from 0 to 2048 22:33:21 executing program 4: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000480)}}, 0x0, 0xffffffefffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x100000, 0xe, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000500100000f000000000000000100000005000000000004000040000020000000dbf4655fdbf4655f0100ffff53ef010001000000dbf4655f000000000000000001000000000000000b0000008000000018000000c20500002b0200"/116, 0x74, 0x400}, {&(0x7f0000010100)="000000000000000000000000244b8e9b57f04b59aa229cc218853f9501004000", 0x20, 0x4e0}, {&(0x7f0000010200)="010000000000050040", 0x9, 0x560}, {&(0x7f0000010300)="020000000300000004000000", 0xc, 0x800}, {&(0x7f0000010400), 0x0, 0x1000}, {&(0x7f0000011500)="ed41000000080000dbf4655fdbf4655fdbf4655f000000000000040040", 0x1d, 0x2080}, {0x0}, {0x0}, {&(0x7f0000011c00)="0b0000000c0001022e00000002000000f40702022e", 0x15, 0x10000}, {0x0}, {0x0}, {&(0x7f0000012400)="504d4d00504d4dffdbf4655f00000000647679756b6f762d676c6170746f70320000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000006c6f6f7033340075782f746573742f73797a5f6d6f756e745f696d6167655f650500"/123, 0x7b, 0x20000}, {0x0}, {0x0, 0x0, 0x38000}], 0x0, &(0x7f0000012f00)) [ 1476.912121] EXT4-fs (loop4): unmounting filesystem. [ 1476.974949] EXT4-fs (loop2): mounted filesystem without journal. Quota mode: none. [ 1476.987715] ext4 filesystem being mounted at /syzkaller-testdir307671421/syzkaller.SFQaEW/164/file0 supports timestamps until 2038 (0x7fffffff) [ 1477.008042] loop0: detected capacity change from 0 to 512 [ 1477.042102] loop7: detected capacity change from 0 to 2048 [ 1477.044312] EXT4-fs (loop0): bad geometry: block count 512 exceeds size of device (128 blocks) [ 1477.047375] loop4: detected capacity change from 0 to 2048 [ 1477.111872] EXT4-fs error (device loop7): __ext4_fill_super:5244: inode #2: comm syz-executor.7: iget: root inode unallocated 22:33:21 executing program 2: perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000480)}}, 0x0, 0xffffffefffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x100000, 0xe, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000500100000f000000000000000100000005000000000004000040000020000000dbf4655fdbf4655f0100ffff53ef010001000000dbf4655f000000000000000001000000000000000b0000008000000018000000c20500002b0200"/116, 0x74, 0x400}, {&(0x7f0000010100)="000000000000000000000000244b8e9b57f04b59aa229cc218853f9501004000", 0x20, 0x4e0}, {&(0x7f0000010200)="010000000000050040", 0x9, 0x560}, {&(0x7f0000010300)="020000000300000004000000", 0xc, 0x800}, {0x0, 0x0, 0x1000}, {&(0x7f0000011500)="ed41000000080000dbf4655fdbf4655fdbf4655f00000000000004004000", 0x1e, 0x2080}, {0x0}, {0x0}, {&(0x7f0000011c00)="0b0000000c0001022e00000002000000f40702022e", 0x15, 0x10000}, {0x0}, {0x0}, {&(0x7f0000012400)="504d4d00504d4dffdbf4655f00000000647679756b6f762d676c6170746f70320000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000006c6f6f7033340075782f746573742f73797a5f6d6f756e745f696d6167655f650500"/123, 0x7b, 0x20000}, {0x0}, {0x0, 0x0, 0x38000}], 0x0, &(0x7f0000012f00)) [ 1477.114334] EXT4-fs (loop7): get root inode failed [ 1477.115018] EXT4-fs (loop7): mount failed [ 1477.123251] EXT4-fs (loop4): mounted filesystem without journal. Quota mode: none. [ 1477.128059] EXT4-fs (loop2): unmounting filesystem. [ 1477.147161] ext4 filesystem being mounted at /syzkaller-testdir967783826/syzkaller.dhcxYf/170/file0 supports timestamps until 2038 (0x7fffffff) 22:33:21 executing program 1: r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, @perf_config_ext, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000000), 0x0) r2 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) ioctl$EXT4_IOC_CHECKPOINT(r2, 0x4004662b, &(0x7f0000000100)=0x5) ioctl$AUTOFS_DEV_IOCTL_TIMEOUT(0xffffffffffffffff, 0xc018937a, &(0x7f0000001480)=ANY=[@ANYBLOB="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", @ANYRES32=r0, @ANYBLOB="01040000000000002e2f66696c65"]) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r3, 0xc08c5332, &(0x7f00000013c0)={0xffffffff, 0x6964, 0x0, 'queue1\x00', 0xff}) r4 = gettid() process_vm_writev(r4, &(0x7f0000002580)=[{&(0x7f0000000140)=""/89, 0x59}, {&(0x7f00000001c0)=""/175, 0xaf}, {&(0x7f0000000280)=""/4096, 0x1000}], 0x3, &(0x7f0000003840)=[{&(0x7f0000002640)=""/105, 0x69}, {0xfffffffffffffffe, 0x10}], 0x2, 0x0) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r1, 0xc08c5332, &(0x7f0000001280)={0x3, 0x5, 0x0, 'queue1\x00', 0x8}) r5 = fork() write$sndseq(r1, &(0x7f0000001340)=[{0x22, 0x8, 0x2, 0x3, @time={0x4}, {0x0, 0x1}, {0x6, 0x81}, @raw32={[0x800, 0x3, 0x9]}}, {0xe1, 0x7, 0xf8, 0xff, @tick=0x2, {0x3f}, {0x4, 0xf1}, @queue={0xff, {0x6, 0x9}}}, {0x4, 0x1, 0x9, 0x5, @time={0x7, 0x6}, {0x7c, 0x2}, {0x20, 0x6}, @connect={{0x0, 0xfd}, {0x98, 0x4}}}, {0x80, 0x4, 0x7, 0x7d, @time={0xfffff000, 0x9}, {0x81, 0x1f}, {0xaa}, @queue={0x5, {0xffffffe0, 0x3}}}], 0x70) r6 = syz_open_dev$vcsn(&(0x7f0000000040), 0x3, 0x2001) ioctl$LOOP_CTL_GET_FREE(r6, 0x4c82) ptrace$setopts(0x4206, r5, 0x0, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fork() fork() clone3(&(0x7f0000004c00)={0xc0002100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) [ 1477.236949] loop2: detected capacity change from 0 to 2048 [ 1477.244063] EXT4-fs (loop4): unmounting filesystem. [ 1477.281037] EXT4-fs (loop2): mounted filesystem without journal. Quota mode: none. [ 1477.284754] ext4 filesystem being mounted at /syzkaller-testdir307671421/syzkaller.SFQaEW/165/file0 supports timestamps until 2038 (0x7fffffff) [ 1477.307704] EXT4-fs (loop2): unmounting filesystem. 22:33:36 executing program 7: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000480)}}, 0x0, 0xffffffefffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x100000, 0xe, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000500100000f000000000000000100000005000000000004000040000020000000dbf4655fdbf4655f0100ffff53ef010001000000dbf4655f000000000000000001000000000000000b0000008000000018000000c20500002b0200"/116, 0x74, 0x400}, {&(0x7f0000010100)="000000000000000000000000244b8e9b57f04b59aa229cc218853f9501004000", 0x20, 0x4e0}, {&(0x7f0000010200)="010000000000050040", 0x9, 0x560}, {&(0x7f0000010300)="020000000300000004000000", 0xc, 0x800}, {&(0x7f0000010400), 0x0, 0x1000}, {&(0x7f0000011500)="ed41000000080000dbf4655fdbf4655fdbf4655f00000000000004004000", 0x1e}, {0x0}, {0x0}, {&(0x7f0000011c00)="0b0000000c0001022e00000002000000f40702022e", 0x15, 0x10000}, {0x0}, {0x0}, {&(0x7f0000012400)="504d4d00504d4dffdbf4655f00000000647679756b6f762d676c6170746f70320000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000006c6f6f7033340075782f746573742f73797a5f6d6f756e745f696d6167655f650500"/123, 0x7b, 0x20000}, {0x0}, {0x0, 0x0, 0x38000}], 0x0, &(0x7f0000012f00)) 22:33:36 executing program 3: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) lsetxattr$security_evm(&(0x7f0000000240)='.\x00', &(0x7f0000000300), &(0x7f00000003c0)=@sha1={0x1, "bd2b5bce8b74aea700654a682479ac2c0852bc4d"}, 0x15, 0x3) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={&(0x7f0000000040), 0xb}, 0x0, 0x20, 0x0, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) r0 = fork() r1 = syz_open_procfs(r0, &(0x7f0000000000)='status\x00') r2 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x2, 0x0) pwrite64(r2, 0x0, 0x0, 0x8040000) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x20, 0x3, 0x4, 0x1, 0x0, 0x8, 0x20620, 0x2, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x3f, 0x2, @perf_config_ext={0x240000000, 0x5}, 0x1400, 0x4, 0x8, 0x7, 0x9, 0x6, 0x6, 0x0, 0x1, 0x0, 0x8}, r0, 0xa, r2, 0x1) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r3, 0x6, 0x1e, &(0x7f0000000040)=0x1, 0x4) setsockopt$inet6_tcp_TCP_REPAIR(r3, 0x6, 0x13, &(0x7f00000018c0)=0x1, 0x4) connect$inet6(r3, &(0x7f0000000080)={0xa, 0x0, 0x0, @loopback}, 0x1c) openat$cgroup_ro(r1, &(0x7f0000000180)='blkio.throttle.io_serviced_recursive\x00', 0x0, 0x0) 22:33:36 executing program 1: r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, @perf_config_ext, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000000), 0x0) r2 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) ioctl$EXT4_IOC_CHECKPOINT(r2, 0x4004662b, &(0x7f0000000100)=0x5) ioctl$AUTOFS_DEV_IOCTL_TIMEOUT(0xffffffffffffffff, 0xc018937a, &(0x7f0000001480)=ANY=[@ANYBLOB="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", @ANYRES32=r0, @ANYBLOB="01040000000000002e2f66696c65"]) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r3, 0xc08c5332, &(0x7f00000013c0)={0xffffffff, 0x6964, 0x0, 'queue1\x00', 0xff}) r4 = gettid() process_vm_writev(r4, &(0x7f0000002580)=[{&(0x7f0000000140)=""/89, 0x59}, {&(0x7f00000001c0)=""/175, 0xaf}, {&(0x7f0000000280)=""/4096, 0x1000}], 0x3, &(0x7f0000003840)=[{&(0x7f0000002640)=""/105, 0x69}, {0xfffffffffffffffe, 0x10}], 0x2, 0x0) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r1, 0xc08c5332, &(0x7f0000001280)={0x3, 0x5, 0x0, 'queue1\x00', 0x8}) r5 = fork() write$sndseq(r1, &(0x7f0000001340)=[{0x22, 0x8, 0x2, 0x3, @time={0x4}, {0x0, 0x1}, {0x6, 0x81}, @raw32={[0x800, 0x3, 0x9]}}, {0xe1, 0x7, 0xf8, 0xff, @tick=0x2, {0x3f}, {0x4, 0xf1}, @queue={0xff, {0x6, 0x9}}}, {0x4, 0x1, 0x9, 0x5, @time={0x7, 0x6}, {0x7c, 0x2}, {0x20, 0x6}, @connect={{0x0, 0xfd}, {0x98, 0x4}}}, {0x80, 0x4, 0x7, 0x7d, @time={0xfffff000, 0x9}, {0x81, 0x1f}, {0xaa}, @queue={0x5, {0xffffffe0, 0x3}}}], 0x70) r6 = syz_open_dev$vcsn(&(0x7f0000000040), 0x3, 0x2001) ioctl$LOOP_CTL_GET_FREE(r6, 0x4c82) ptrace$setopts(0x4206, r5, 0x0, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fork() fork() clone3(&(0x7f0000004c00)={0xc0002100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) 22:33:36 executing program 6: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) lsetxattr$security_evm(&(0x7f0000000240)='.\x00', &(0x7f0000000300), &(0x7f00000003c0)=@sha1={0x1, "bd2b5bce8b74aea700654a682479ac2c0852bc4d"}, 0x15, 0x3) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={&(0x7f0000000040), 0xb}, 0x0, 0x20, 0x0, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) r0 = fork() r1 = syz_open_procfs(r0, &(0x7f0000000000)='status\x00') r2 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x0, 0x0) pwrite64(r2, &(0x7f00000000c0)='9', 0x1, 0x8040000) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x20, 0x3, 0x4, 0x1, 0x0, 0x8, 0x20620, 0x2, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x3f, 0x2, @perf_config_ext={0x240000000, 0x5}, 0x1400, 0x4, 0x8, 0x7, 0x9, 0x6, 0x6, 0x0, 0x1, 0x0, 0x8}, r0, 0xa, r2, 0x1) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r3, 0x6, 0x1e, &(0x7f0000000040)=0x1, 0x4) setsockopt$inet6_tcp_TCP_REPAIR(r3, 0x6, 0x13, &(0x7f00000018c0)=0x1, 0x4) connect$inet6(r3, &(0x7f0000000080)={0xa, 0x0, 0x0, @loopback}, 0x1c) openat$cgroup_ro(r1, &(0x7f0000000180)='blkio.throttle.io_serviced_recursive\x00', 0x0, 0x0) 22:33:36 executing program 4: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000480)}}, 0x0, 0xffffffefffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x100000, 0xe, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000500100000f000000000000000100000005000000000004000040000020000000dbf4655fdbf4655f0100ffff53ef010001000000dbf4655f000000000000000001000000000000000b0000008000000018000000c20500002b0200"/116, 0x74, 0x400}, {&(0x7f0000010100)="000000000000000000000000244b8e9b57f04b59aa229cc218853f9501004000", 0x20, 0x4e0}, {&(0x7f0000010200)="010000000000050040", 0x9, 0x560}, {&(0x7f0000010300)="020000000300000004000000", 0xc, 0x800}, {&(0x7f0000010400), 0x0, 0x1000}, {&(0x7f0000011500)="ed41000000080000dbf4655fdbf4655fdbf4655f000000000000040040", 0x1d, 0x2080}, {0x0}, {0x0}, {&(0x7f0000011c00)="0b0000000c0001022e00000002000000f40702022e", 0x15, 0x10000}, {0x0}, {0x0}, {&(0x7f0000012400)="504d4d00504d4dffdbf4655f00000000647679756b6f762d676c6170746f70320000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000006c6f6f7033340075782f746573742f73797a5f6d6f756e745f696d6167655f650500"/123, 0x7b, 0x20000}, {0x0}, {0x0, 0x0, 0x38000}], 0x0, &(0x7f0000012f00)) 22:33:36 executing program 5: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) lsetxattr$security_evm(&(0x7f0000000240)='.\x00', &(0x7f0000000300), &(0x7f00000003c0)=@sha1={0x1, "bd2b5bce8b74aea700654a682479ac2c0852bc4d"}, 0x15, 0x3) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={&(0x7f0000000040), 0xb}, 0x0, 0x20, 0x0, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) r0 = fork() r1 = syz_open_procfs(r0, &(0x7f0000000000)='status\x00') r2 = openat(0xffffffffffffff9c, 0x0, 0x2, 0x0) pwrite64(r2, &(0x7f00000000c0)='9', 0x1, 0x8040000) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x20, 0x3, 0x4, 0x1, 0x0, 0x8, 0x20620, 0x2, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x3f, 0x2, @perf_config_ext={0x240000000, 0x5}, 0x1400, 0x4, 0x8, 0x7, 0x9, 0x6, 0x6, 0x0, 0x1, 0x0, 0x8}, r0, 0xa, r2, 0x1) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r3, 0x6, 0x1e, &(0x7f0000000040)=0x1, 0x4) connect$inet6(r3, &(0x7f0000000080)={0xa, 0x0, 0x0, @loopback}, 0x1c) openat$cgroup_ro(r1, &(0x7f0000000180)='blkio.throttle.io_serviced_recursive\x00', 0x0, 0x0) 22:33:36 executing program 2: perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000480)}}, 0x0, 0xffffffefffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x100000, 0xe, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000500100000f000000000000000100000005000000000004000040000020000000dbf4655fdbf4655f0100ffff53ef010001000000dbf4655f000000000000000001000000000000000b0000008000000018000000c20500002b0200"/116, 0x74, 0x400}, {&(0x7f0000010100)="000000000000000000000000244b8e9b57f04b59aa229cc218853f9501004000", 0x20, 0x4e0}, {&(0x7f0000010200)="010000000000050040", 0x9, 0x560}, {&(0x7f0000010300)="020000000300000004000000", 0xc, 0x800}, {&(0x7f0000010400)}, {&(0x7f0000011500)="ed41000000080000dbf4655fdbf4655fdbf4655f00000000000004004000", 0x1e, 0x2080}, {0x0}, {0x0}, {&(0x7f0000011c00)="0b0000000c0001022e00000002000000f40702022e", 0x15, 0x10000}, {0x0}, {0x0}, {&(0x7f0000012400)="504d4d00504d4dffdbf4655f00000000647679756b6f762d676c6170746f70320000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000006c6f6f7033340075782f746573742f73797a5f6d6f756e745f696d6167655f650500"/123, 0x7b, 0x20000}, {0x0}, {0x0, 0x0, 0x38000}], 0x0, &(0x7f0000012f00)) 22:33:36 executing program 0: perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000480)}}, 0x0, 0xffffffefffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0xd, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000500100000f000000000000000100000005000000000004000040000020000000dbf4655fdbf4655f0100ffff53ef010001000000dbf4655f000000000000000001000000000000000b0000008000000018000000c20500002b0200"/116, 0x74, 0x400}, {&(0x7f0000010100)="000000000000000000000000244b8e9b57f04b59aa229cc218853f9501004000", 0x20, 0x4e0}, {&(0x7f0000010200)="01000000000005", 0x7, 0x560}, {&(0x7f0000010300)="020000000300000004000000", 0xc, 0x800}, {&(0x7f0000010400), 0x0, 0x1000}, {&(0x7f0000011500)="ed41000000080000dbf4655fdbf4655f", 0x10, 0x2080}, {0x0}, {0x0}, {0x0, 0x0, 0x10000}, {0x0}, {0x0}, {0x0, 0x0, 0x20000}, {0x0}], 0x0, &(0x7f0000012f00)) [ 1492.025723] loop7: detected capacity change from 0 to 2048 [ 1492.040971] loop4: detected capacity change from 0 to 2048 [ 1492.045869] loop0: detected capacity change from 0 to 512 [ 1492.054348] loop2: detected capacity change from 0 to 2048 [ 1492.080311] EXT4-fs error (device loop7): __ext4_fill_super:5244: inode #2: comm syz-executor.7: iget: root inode unallocated [ 1492.088381] EXT4-fs (loop0): bad geometry: block count 512 exceeds size of device (128 blocks) [ 1492.089838] EXT4-fs (loop7): get root inode failed [ 1492.090237] EXT4-fs (loop7): mount failed [ 1492.141787] EXT4-fs (loop2): mounted filesystem without journal. Quota mode: none. [ 1492.144828] ext4 filesystem being mounted at /syzkaller-testdir307671421/syzkaller.SFQaEW/166/file0 supports timestamps until 2038 (0x7fffffff) [ 1492.175887] EXT4-fs (loop4): mounted filesystem without journal. Quota mode: none. [ 1492.179688] ext4 filesystem being mounted at /syzkaller-testdir967783826/syzkaller.dhcxYf/171/file0 supports timestamps until 2038 (0x7fffffff) 22:33:36 executing program 3: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) lsetxattr$security_evm(&(0x7f0000000240)='.\x00', &(0x7f0000000300), &(0x7f00000003c0)=@sha1={0x1, "bd2b5bce8b74aea700654a682479ac2c0852bc4d"}, 0x15, 0x3) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={&(0x7f0000000040), 0xb}, 0x0, 0x20, 0x0, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) r0 = fork() r1 = syz_open_procfs(r0, &(0x7f0000000000)='status\x00') r2 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x2, 0x0) pwrite64(r2, &(0x7f00000000c0), 0x0, 0x8040000) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x20, 0x3, 0x4, 0x1, 0x0, 0x8, 0x20620, 0x2, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x3f, 0x2, @perf_config_ext={0x240000000, 0x5}, 0x1400, 0x4, 0x8, 0x7, 0x9, 0x6, 0x6, 0x0, 0x1, 0x0, 0x8}, r0, 0xa, r2, 0x1) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r3, 0x6, 0x1e, &(0x7f0000000040)=0x1, 0x4) setsockopt$inet6_tcp_TCP_REPAIR(r3, 0x6, 0x13, &(0x7f00000018c0)=0x1, 0x4) connect$inet6(r3, &(0x7f0000000080)={0xa, 0x0, 0x0, @loopback}, 0x1c) openat$cgroup_ro(r1, &(0x7f0000000180)='blkio.throttle.io_serviced_recursive\x00', 0x0, 0x0) 22:33:36 executing program 0: perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000480)}}, 0x0, 0xffffffefffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0xd, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000500100000f000000000000000100000005000000000004000040000020000000dbf4655fdbf4655f0100ffff53ef010001000000dbf4655f000000000000000001000000000000000b0000008000000018000000c20500002b0200"/116, 0x74, 0x400}, {&(0x7f0000010100)="000000000000000000000000244b8e9b57f04b59aa229cc218853f9501004000", 0x20, 0x4e0}, {&(0x7f0000010200)="0100000000", 0x5, 0x560}, {&(0x7f0000010300)="020000000300000004000000", 0xc, 0x800}, {&(0x7f0000010400), 0x0, 0x1000}, {&(0x7f0000011500)="ed41000000080000dbf4655fdbf4655f", 0x10, 0x2080}, {0x0}, {0x0}, {0x0, 0x0, 0x10000}, {0x0}, {0x0}, {0x0, 0x0, 0x20000}, {0x0}], 0x0, &(0x7f0000012f00)) 22:33:36 executing program 7: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000480)}}, 0x0, 0xffffffefffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x100000, 0xe, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000500100000f000000000000000100000005000000000004000040000020000000dbf4655fdbf4655f0100ffff53ef010001000000dbf4655f000000000000000001000000000000000b0000008000000018000000c20500002b0200"/116, 0x74, 0x400}, {&(0x7f0000010100)="000000000000000000000000244b8e9b57f04b59aa229cc218853f9501004000", 0x20, 0x4e0}, {&(0x7f0000010200)="010000000000050040", 0x9, 0x560}, {&(0x7f0000010300)="020000000300000004000000", 0xc, 0x800}, {&(0x7f0000010400), 0x0, 0x1000}, {&(0x7f0000011500)="ed41000000080000dbf4655fdbf4655fdbf4655f00000000000004004000", 0x1e}, {0x0}, {0x0}, {&(0x7f0000011c00)="0b0000000c0001022e00000002000000f40702022e", 0x15, 0x10000}, {0x0}, {0x0}, {&(0x7f0000012400)="504d4d00504d4dffdbf4655f00000000647679756b6f762d676c6170746f70320000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000006c6f6f7033340075782f746573742f73797a5f6d6f756e745f696d6167655f650500"/123, 0x7b, 0x20000}, {0x0}, {0x0, 0x0, 0x38000}], 0x0, &(0x7f0000012f00)) [ 1492.269163] EXT4-fs (loop2): unmounting filesystem. [ 1492.299676] EXT4-fs (loop4): unmounting filesystem. [ 1492.320192] loop7: detected capacity change from 0 to 2048 [ 1492.321310] loop0: detected capacity change from 0 to 512 [ 1492.340024] EXT4-fs (loop0): bad geometry: block count 512 exceeds size of device (128 blocks) [ 1492.377217] EXT4-fs error (device loop7): __ext4_fill_super:5244: inode #2: comm syz-executor.7: iget: root inode unallocated [ 1492.392964] EXT4-fs (loop7): get root inode failed [ 1492.394227] EXT4-fs (loop7): mount failed 22:33:53 executing program 3: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) lsetxattr$security_evm(&(0x7f0000000240)='.\x00', &(0x7f0000000300), &(0x7f00000003c0)=@sha1={0x1, "bd2b5bce8b74aea700654a682479ac2c0852bc4d"}, 0x15, 0x3) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={&(0x7f0000000040), 0xb}, 0x0, 0x20, 0x0, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) r0 = fork() r1 = syz_open_procfs(r0, &(0x7f0000000000)='status\x00') r2 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x2, 0x0) pwrite64(r2, &(0x7f00000000c0), 0x0, 0x8040000) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x20, 0x3, 0x4, 0x1, 0x0, 0x8, 0x20620, 0x2, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x3f, 0x2, @perf_config_ext={0x240000000, 0x5}, 0x1400, 0x4, 0x8, 0x7, 0x9, 0x6, 0x6, 0x0, 0x1, 0x0, 0x8}, r0, 0xa, r2, 0x1) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r3, 0x6, 0x1e, &(0x7f0000000040)=0x1, 0x4) setsockopt$inet6_tcp_TCP_REPAIR(r3, 0x6, 0x13, &(0x7f00000018c0)=0x1, 0x4) connect$inet6(r3, &(0x7f0000000080)={0xa, 0x0, 0x0, @loopback}, 0x1c) openat$cgroup_ro(r1, &(0x7f0000000180)='blkio.throttle.io_serviced_recursive\x00', 0x0, 0x0) 22:33:53 executing program 2: perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000480)}}, 0x0, 0xffffffefffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x100000, 0xe, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000500100000f000000000000000100000005000000000004000040000020000000dbf4655fdbf4655f0100ffff53ef010001000000dbf4655f000000000000000001000000000000000b0000008000000018000000c20500002b0200"/116, 0x74, 0x400}, {&(0x7f0000010100)="000000000000000000000000244b8e9b57f04b59aa229cc218853f9501004000", 0x20, 0x4e0}, {&(0x7f0000010200)="010000000000050040", 0x9, 0x560}, {&(0x7f0000010300)="020000000300000004000000", 0xc, 0x800}, {&(0x7f0000010400)}, {&(0x7f0000011500)="ed41000000080000dbf4655fdbf4655fdbf4655f00000000000004004000", 0x1e, 0x2080}, {0x0}, {0x0}, {&(0x7f0000011c00)="0b0000000c0001022e00000002000000f40702022e", 0x15, 0x10000}, {0x0}, {0x0}, {&(0x7f0000012400)="504d4d00504d4dffdbf4655f00000000647679756b6f762d676c6170746f70320000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000006c6f6f7033340075782f746573742f73797a5f6d6f756e745f696d6167655f650500"/123, 0x7b, 0x20000}, {0x0}, {0x0, 0x0, 0x38000}], 0x0, &(0x7f0000012f00)) 22:33:53 executing program 7: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000480)}}, 0x0, 0xffffffefffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x100000, 0xd, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000500100000f000000000000000100000005000000000004000040000020000000dbf4655fdbf4655f0100ffff53ef010001000000dbf4655f000000000000000001000000000000000b0000008000000018000000c20500002b0200"/116, 0x74, 0x400}, {&(0x7f0000010100)="000000000000000000000000244b8e9b57f04b59aa229cc218853f9501004000", 0x20, 0x4e0}, {&(0x7f0000010200)="010000000000050040", 0x9, 0x560}, {&(0x7f0000010300)="020000000300000004000000", 0xc, 0x800}, {&(0x7f0000011500)="ed41000000080000dbf4655fdbf4655fdbf4655f00000000000004004000", 0x1e, 0x2080}, {0x0}, {0x0}, {&(0x7f0000011c00)="0b0000000c0001022e00000002000000f40702022e", 0x15, 0x10000}, {0x0}, {0x0}, {&(0x7f0000012400)="504d4d00504d4dffdbf4655f00000000647679756b6f762d676c6170746f70320000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000006c6f6f7033340075782f746573742f73797a5f6d6f756e745f696d6167655f650500"/123, 0x7b, 0x20000}, {0x0}, {0x0, 0x0, 0x38000}], 0x0, &(0x7f0000012f00)) 22:33:53 executing program 1: r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, @perf_config_ext, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000000), 0x0) r2 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) ioctl$EXT4_IOC_CHECKPOINT(r2, 0x4004662b, &(0x7f0000000100)=0x5) ioctl$AUTOFS_DEV_IOCTL_TIMEOUT(0xffffffffffffffff, 0xc018937a, &(0x7f0000001480)=ANY=[@ANYBLOB="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", @ANYRES32=r0, @ANYBLOB="01040000000000002e2f66696c6530"]) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r3, 0xc08c5332, &(0x7f00000013c0)={0xffffffff, 0x6964, 0x0, 'queue1\x00', 0xff}) r4 = gettid() process_vm_writev(r4, &(0x7f0000002580)=[{&(0x7f0000000140)=""/89, 0x59}, {&(0x7f00000001c0)=""/175, 0xaf}, {&(0x7f0000000280)=""/4096, 0x1000}], 0x3, &(0x7f0000003840)=[{&(0x7f0000002640)=""/105, 0x69}, {0xfffffffffffffffe, 0x10}], 0x2, 0x0) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r1, 0xc08c5332, &(0x7f0000001280)={0x3, 0x5, 0x0, 'queue1\x00', 0x8}) r5 = fork() write$sndseq(r1, &(0x7f0000001340)=[{0x22, 0x8, 0x2, 0x3, @time={0x4}, {0x0, 0x1}, {0x6, 0x81}, @raw32={[0x800, 0x3, 0x9]}}, {0xe1, 0x7, 0xf8, 0xff, @tick=0x2, {0x3f}, {0x4, 0xf1}, @queue={0xff, {0x6, 0x9}}}, {0x4, 0x1, 0x9, 0x5, @time={0x7, 0x6}, {0x7c, 0x2}, {0x20, 0x6}, @connect={{0x0, 0xfd}, {0x98, 0x4}}}, {0x80, 0x4, 0x7, 0x7d, @time={0xfffff000, 0x9}, {0x81, 0x1f}, {0xaa}, @queue={0x5, {0xffffffe0, 0x3}}}], 0x70) r6 = syz_open_dev$vcsn(&(0x7f0000000040), 0x3, 0x2001) ioctl$LOOP_CTL_GET_FREE(r6, 0x4c82) ptrace$setopts(0x4206, r5, 0x0, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fork() fork() clone3(&(0x7f0000004c00)={0xc0002100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) 22:33:53 executing program 4: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000480)}}, 0x0, 0xffffffefffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x100000, 0xe, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000500100000f000000000000000100000005000000000004000040000020000000dbf4655fdbf4655f0100ffff53ef010001000000dbf4655f000000000000000001000000000000000b0000008000000018000000c20500002b0200"/116, 0x74, 0x400}, {&(0x7f0000010100)="000000000000000000000000244b8e9b57f04b59aa229cc218853f9501004000", 0x20, 0x4e0}, {&(0x7f0000010200)="010000000000050040", 0x9, 0x560}, {&(0x7f0000010300)="020000000300000004000000", 0xc, 0x800}, {&(0x7f0000010400), 0x0, 0x1000}, {&(0x7f0000011500)="ed41000000080000dbf4655fdbf4655fdbf4655f00000000000004004000", 0x1e}, {0x0}, {0x0}, {&(0x7f0000011c00)="0b0000000c0001022e00000002000000f40702022e", 0x15, 0x10000}, {0x0}, {0x0}, {&(0x7f0000012400)="504d4d00504d4dffdbf4655f00000000647679756b6f762d676c6170746f70320000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000006c6f6f7033340075782f746573742f73797a5f6d6f756e745f696d6167655f650500"/123, 0x7b, 0x20000}, {0x0}, {0x0, 0x0, 0x38000}], 0x0, &(0x7f0000012f00)) 22:33:53 executing program 0: perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000480)}}, 0x0, 0xffffffefffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0xd, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000500100000f000000000000000100000005000000000004000040000020000000dbf4655fdbf4655f0100ffff53ef010001000000dbf4655f000000000000000001000000000000000b0000008000000018000000c20500002b0200"/116, 0x74, 0x400}, {&(0x7f0000010100)="000000000000000000000000244b8e9b57f04b59aa229cc218853f9501004000", 0x20, 0x4e0}, {&(0x7f0000010200)="0100000000", 0x5, 0x560}, {&(0x7f0000010300)="020000000300000004000000", 0xc, 0x800}, {&(0x7f0000010400), 0x0, 0x1000}, {&(0x7f0000011500)="ed41000000080000dbf4655fdbf4655f", 0x10, 0x2080}, {0x0}, {0x0}, {0x0, 0x0, 0x10000}, {0x0}, {0x0}, {0x0, 0x0, 0x20000}, {0x0}], 0x0, &(0x7f0000012f00)) 22:33:53 executing program 5: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) lsetxattr$security_evm(&(0x7f0000000240)='.\x00', &(0x7f0000000300), &(0x7f00000003c0)=@sha1={0x1, "bd2b5bce8b74aea700654a682479ac2c0852bc4d"}, 0x15, 0x3) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={&(0x7f0000000040), 0xb}, 0x0, 0x20, 0x0, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) r0 = fork() r1 = syz_open_procfs(r0, &(0x7f0000000000)='status\x00') r2 = openat(0xffffffffffffff9c, 0x0, 0x2, 0x0) pwrite64(r2, &(0x7f00000000c0)='9', 0x1, 0x8040000) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x20, 0x3, 0x4, 0x1, 0x0, 0x8, 0x20620, 0x2, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x3f, 0x2, @perf_config_ext={0x240000000, 0x5}, 0x1400, 0x4, 0x8, 0x7, 0x9, 0x6, 0x6, 0x0, 0x1, 0x0, 0x8}, r0, 0xa, r2, 0x1) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r3, 0x6, 0x1e, &(0x7f0000000040)=0x1, 0x4) connect$inet6(r3, &(0x7f0000000080)={0xa, 0x0, 0x0, @loopback}, 0x1c) openat$cgroup_ro(r1, &(0x7f0000000180)='blkio.throttle.io_serviced_recursive\x00', 0x0, 0x0) 22:33:53 executing program 6: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) lsetxattr$security_evm(&(0x7f0000000240)='.\x00', &(0x7f0000000300), &(0x7f00000003c0)=@sha1={0x1, "bd2b5bce8b74aea700654a682479ac2c0852bc4d"}, 0x15, 0x3) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={&(0x7f0000000040), 0xb}, 0x0, 0x20, 0x0, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) r0 = fork() r1 = syz_open_procfs(r0, &(0x7f0000000000)='status\x00') r2 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x2, 0x0) pwrite64(0xffffffffffffffff, &(0x7f00000000c0)='9', 0x1, 0x8040000) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x20, 0x3, 0x4, 0x1, 0x0, 0x8, 0x20620, 0x2, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x3f, 0x2, @perf_config_ext={0x240000000, 0x5}, 0x1400, 0x4, 0x8, 0x7, 0x9, 0x6, 0x6, 0x0, 0x1, 0x0, 0x8}, r0, 0xa, r2, 0x1) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r3, 0x6, 0x1e, &(0x7f0000000040)=0x1, 0x4) setsockopt$inet6_tcp_TCP_REPAIR(r3, 0x6, 0x13, &(0x7f00000018c0)=0x1, 0x4) connect$inet6(r3, &(0x7f0000000080)={0xa, 0x0, 0x0, @loopback}, 0x1c) openat$cgroup_ro(r1, &(0x7f0000000180)='blkio.throttle.io_serviced_recursive\x00', 0x0, 0x0) [ 1508.838038] loop0: detected capacity change from 0 to 512 [ 1508.840795] loop2: detected capacity change from 0 to 2048 [ 1508.874174] loop7: detected capacity change from 0 to 2048 [ 1508.875049] loop4: detected capacity change from 0 to 2048 [ 1508.889761] EXT4-fs (loop0): bad geometry: block count 512 exceeds size of device (128 blocks) [ 1508.889852] EXT4-fs (loop2): mounted filesystem without journal. Quota mode: none. [ 1508.893184] ext4 filesystem being mounted at /syzkaller-testdir307671421/syzkaller.SFQaEW/167/file0 supports timestamps until 2038 (0x7fffffff) [ 1508.933783] EXT4-fs error (device loop4): __ext4_fill_super:5244: inode #2: comm syz-executor.4: iget: root inode unallocated [ 1508.936170] EXT4-fs (loop4): get root inode failed [ 1508.936683] EXT4-fs (loop4): mount failed [ 1508.956320] EXT4-fs (loop7): mounted filesystem without journal. Quota mode: none. [ 1508.987021] EXT4-fs (loop2): unmounting filesystem. [ 1508.998383] ext4 filesystem being mounted at /syzkaller-testdir391614100/syzkaller.1GCODk/178/file0 supports timestamps until 2038 (0x7fffffff) 22:33:53 executing program 2: perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000480)}}, 0x0, 0xffffffefffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x100000, 0xe, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000500100000f000000000000000100000005000000000004000040000020000000dbf4655fdbf4655f0100ffff53ef010001000000dbf4655f000000000000000001000000000000000b0000008000000018000000c20500002b0200"/116, 0x74, 0x400}, {&(0x7f0000010100)="000000000000000000000000244b8e9b57f04b59aa229cc218853f9501004000", 0x20, 0x4e0}, {&(0x7f0000010200)="010000000000050040", 0x9, 0x560}, {&(0x7f0000010300)="020000000300000004000000", 0xc, 0x800}, {&(0x7f0000010400)}, {&(0x7f0000011500)="ed41000000080000dbf4655fdbf4655fdbf4655f00000000000004004000", 0x1e, 0x2080}, {0x0}, {0x0}, {&(0x7f0000011c00)="0b0000000c0001022e00000002000000f40702022e", 0x15, 0x10000}, {0x0}, {0x0}, {&(0x7f0000012400)="504d4d00504d4dffdbf4655f00000000647679756b6f762d676c6170746f70320000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000006c6f6f7033340075782f746573742f73797a5f6d6f756e745f696d6167655f650500"/123, 0x7b, 0x20000}, {0x0}, {0x0, 0x0, 0x38000}], 0x0, &(0x7f0000012f00)) 22:33:53 executing program 4: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000480)}}, 0x0, 0xffffffefffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x100000, 0xe, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000500100000f000000000000000100000005000000000004000040000020000000dbf4655fdbf4655f0100ffff53ef010001000000dbf4655f000000000000000001000000000000000b0000008000000018000000c20500002b0200"/116, 0x74, 0x400}, {&(0x7f0000010100)="000000000000000000000000244b8e9b57f04b59aa229cc218853f9501004000", 0x20, 0x4e0}, {&(0x7f0000010200)="010000000000050040", 0x9, 0x560}, {&(0x7f0000010300)="020000000300000004000000", 0xc, 0x800}, {&(0x7f0000010400), 0x0, 0x1000}, {&(0x7f0000011500)="ed41000000080000dbf4655fdbf4655fdbf4655f00000000000004004000", 0x1e}, {0x0}, {0x0}, {&(0x7f0000011c00)="0b0000000c0001022e00000002000000f40702022e", 0x15, 0x10000}, {0x0}, {0x0}, {&(0x7f0000012400)="504d4d00504d4dffdbf4655f00000000647679756b6f762d676c6170746f70320000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000006c6f6f7033340075782f746573742f73797a5f6d6f756e745f696d6167655f650500"/123, 0x7b, 0x20000}, {0x0}, {0x0, 0x0, 0x38000}], 0x0, &(0x7f0000012f00)) 22:33:53 executing program 0: perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000480)}}, 0x0, 0xffffffefffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0xd, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000500100000f000000000000000100000005000000000004000040000020000000dbf4655fdbf4655f0100ffff53ef010001000000dbf4655f000000000000000001000000000000000b0000008000000018000000c20500002b0200"/116, 0x74, 0x400}, {&(0x7f0000010100)="000000000000000000000000244b8e9b57f04b59aa229cc218853f9501004000", 0x20, 0x4e0}, {&(0x7f0000010200)="0100000000", 0x5, 0x560}, {&(0x7f0000010300)="020000000300000004000000", 0xc, 0x800}, {&(0x7f0000010400), 0x0, 0x1000}, {&(0x7f0000011500)="ed41000000080000dbf4655fdbf4655f", 0x10, 0x2080}, {0x0}, {0x0}, {0x0, 0x0, 0x10000}, {0x0}, {0x0}, {0x0, 0x0, 0x20000}, {0x0}], 0x0, &(0x7f0000012f00)) [ 1509.110732] loop2: detected capacity change from 0 to 2048 [ 1509.147741] loop4: detected capacity change from 0 to 2048 [ 1509.169823] EXT4-fs (loop2): mounted filesystem without journal. Quota mode: none. [ 1509.171187] loop0: detected capacity change from 0 to 512 [ 1509.175302] ext4 filesystem being mounted at /syzkaller-testdir307671421/syzkaller.SFQaEW/168/file0 supports timestamps until 2038 (0x7fffffff) 22:33:53 executing program 7: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000480)}}, 0x0, 0xffffffefffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x100000, 0xd, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000500100000f000000000000000100000005000000000004000040000020000000dbf4655fdbf4655f0100ffff53ef010001000000dbf4655f000000000000000001000000000000000b0000008000000018000000c20500002b0200"/116, 0x74, 0x400}, {&(0x7f0000010100)="000000000000000000000000244b8e9b57f04b59aa229cc218853f9501004000", 0x20, 0x4e0}, {&(0x7f0000010200)="010000000000050040", 0x9, 0x560}, {&(0x7f0000010300)="020000000300000004000000", 0xc, 0x800}, {&(0x7f0000011500)="ed41000000080000dbf4655fdbf4655fdbf4655f00000000000004004000", 0x1e, 0x2080}, {0x0}, {0x0}, {&(0x7f0000011c00)="0b0000000c0001022e00000002000000f40702022e", 0x15, 0x10000}, {0x0}, {0x0}, {&(0x7f0000012400)="504d4d00504d4dffdbf4655f00000000647679756b6f762d676c6170746f70320000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000006c6f6f7033340075782f746573742f73797a5f6d6f756e745f696d6167655f650500"/123, 0x7b, 0x20000}, {0x0}, {0x0, 0x0, 0x38000}], 0x0, &(0x7f0000012f00)) [ 1509.186017] EXT4-fs (loop7): unmounting filesystem. [ 1509.188418] EXT4-fs (loop0): bad geometry: block count 512 exceeds size of device (128 blocks) 22:33:53 executing program 1: r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, @perf_config_ext, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000000), 0x0) r2 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) ioctl$EXT4_IOC_CHECKPOINT(r2, 0x4004662b, &(0x7f0000000100)=0x5) ioctl$AUTOFS_DEV_IOCTL_TIMEOUT(0xffffffffffffffff, 0xc018937a, &(0x7f0000001480)=ANY=[@ANYBLOB="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", @ANYRES32=r0, @ANYBLOB="01040000000000002e2f66696c6530"]) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r3, 0xc08c5332, &(0x7f00000013c0)={0xffffffff, 0x6964, 0x0, 'queue1\x00', 0xff}) r4 = gettid() process_vm_writev(r4, &(0x7f0000002580)=[{&(0x7f0000000140)=""/89, 0x59}, {&(0x7f00000001c0)=""/175, 0xaf}, {&(0x7f0000000280)=""/4096, 0x1000}], 0x3, &(0x7f0000003840)=[{&(0x7f0000002640)=""/105, 0x69}, {0xfffffffffffffffe, 0x10}], 0x2, 0x0) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r1, 0xc08c5332, &(0x7f0000001280)={0x3, 0x5, 0x0, 'queue1\x00', 0x8}) r5 = fork() write$sndseq(r1, &(0x7f0000001340)=[{0x22, 0x8, 0x2, 0x3, @time={0x4}, {0x0, 0x1}, {0x6, 0x81}, @raw32={[0x800, 0x3, 0x9]}}, {0xe1, 0x7, 0xf8, 0xff, @tick=0x2, {0x3f}, {0x4, 0xf1}, @queue={0xff, {0x6, 0x9}}}, {0x4, 0x1, 0x9, 0x5, @time={0x7, 0x6}, {0x7c, 0x2}, {0x20, 0x6}, @connect={{0x0, 0xfd}, {0x98, 0x4}}}, {0x80, 0x4, 0x7, 0x7d, @time={0xfffff000, 0x9}, {0x81, 0x1f}, {0xaa}, @queue={0x5, {0xffffffe0, 0x3}}}], 0x70) r6 = syz_open_dev$vcsn(&(0x7f0000000040), 0x3, 0x2001) ioctl$LOOP_CTL_GET_FREE(r6, 0x4c82) ptrace$setopts(0x4206, r5, 0x0, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fork() fork() clone3(&(0x7f0000004c00)={0xc0002100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) [ 1509.235884] EXT4-fs error (device loop4): __ext4_fill_super:5244: inode #2: comm syz-executor.4: iget: root inode unallocated [ 1509.239781] EXT4-fs (loop4): get root inode failed [ 1509.240787] EXT4-fs (loop4): mount failed 22:33:53 executing program 2: perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000480)}}, 0x0, 0xffffffefffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x100000, 0xd, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000500100000f000000000000000100000005000000000004000040000020000000dbf4655fdbf4655f0100ffff53ef010001000000dbf4655f000000000000000001000000000000000b0000008000000018000000c20500002b0200"/116, 0x74, 0x400}, {&(0x7f0000010100)="000000000000000000000000244b8e9b57f04b59aa229cc218853f9501004000", 0x20, 0x4e0}, {&(0x7f0000010200)="010000000000050040", 0x9, 0x560}, {&(0x7f0000010400), 0x0, 0x1000}, {&(0x7f0000011500)="ed41000000080000dbf4655fdbf4655fdbf4655f00000000000004004000", 0x1e, 0x2080}, {0x0}, {0x0}, {&(0x7f0000011c00)="0b0000000c0001022e00000002000000f40702022e", 0x15, 0x10000}, {0x0}, {0x0}, {&(0x7f0000012400)="504d4d00504d4dffdbf4655f00000000647679756b6f762d676c6170746f70320000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000006c6f6f7033340075782f746573742f73797a5f6d6f756e745f696d6167655f650500"/123, 0x7b, 0x20000}, {0x0}, {0x0, 0x0, 0x38000}], 0x0, &(0x7f0000012f00)) [ 1509.278596] EXT4-fs (loop2): unmounting filesystem. 22:33:53 executing program 3: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) lsetxattr$security_evm(&(0x7f0000000240)='.\x00', &(0x7f0000000300), &(0x7f00000003c0)=@sha1={0x1, "bd2b5bce8b74aea700654a682479ac2c0852bc4d"}, 0x15, 0x3) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={&(0x7f0000000040), 0xb}, 0x0, 0x20, 0x0, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) r0 = fork() r1 = syz_open_procfs(r0, &(0x7f0000000000)='status\x00') r2 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x2, 0x0) pwrite64(r2, &(0x7f00000000c0), 0x0, 0x8040000) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x20, 0x3, 0x4, 0x1, 0x0, 0x8, 0x20620, 0x2, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x3f, 0x2, @perf_config_ext={0x240000000, 0x5}, 0x1400, 0x4, 0x8, 0x7, 0x9, 0x6, 0x6, 0x0, 0x1, 0x0, 0x8}, r0, 0xa, r2, 0x1) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r3, 0x6, 0x1e, &(0x7f0000000040)=0x1, 0x4) setsockopt$inet6_tcp_TCP_REPAIR(r3, 0x6, 0x13, &(0x7f00000018c0)=0x1, 0x4) connect$inet6(r3, &(0x7f0000000080)={0xa, 0x0, 0x0, @loopback}, 0x1c) openat$cgroup_ro(r1, &(0x7f0000000180)='blkio.throttle.io_serviced_recursive\x00', 0x0, 0x0) 22:33:53 executing program 0: perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000480)}}, 0x0, 0xffffffefffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0xd, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000500100000f000000000000000100000005000000000004000040000020000000dbf4655fdbf4655f0100ffff53ef010001000000dbf4655f000000000000000001000000000000000b0000008000000018000000c20500002b0200"/116, 0x74, 0x400}, {&(0x7f0000010100)="000000000000000000000000244b8e9b57f04b59aa229cc218853f9501004000", 0x20, 0x4e0}, {&(0x7f0000010200)="010000000000", 0x6, 0x560}, {&(0x7f0000010300)="020000000300000004000000", 0xc, 0x800}, {&(0x7f0000010400), 0x0, 0x1000}, {&(0x7f0000011500)="ed41000000080000dbf4655fdbf4655f", 0x10, 0x2080}, {0x0}, {0x0}, {0x0, 0x0, 0x10000}, {0x0}, {0x0}, {0x0, 0x0, 0x20000}, {0x0}], 0x0, &(0x7f0000012f00)) 22:33:53 executing program 5: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) lsetxattr$security_evm(&(0x7f0000000240)='.\x00', &(0x7f0000000300), &(0x7f00000003c0)=@sha1={0x1, "bd2b5bce8b74aea700654a682479ac2c0852bc4d"}, 0x15, 0x3) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={&(0x7f0000000040), 0xb}, 0x0, 0x20, 0x0, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) r0 = fork() r1 = syz_open_procfs(r0, &(0x7f0000000000)='status\x00') r2 = openat(0xffffffffffffff9c, 0x0, 0x2, 0x0) pwrite64(r2, &(0x7f00000000c0)='9', 0x1, 0x8040000) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x20, 0x3, 0x4, 0x1, 0x0, 0x8, 0x20620, 0x2, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x3f, 0x2, @perf_config_ext={0x240000000, 0x5}, 0x1400, 0x4, 0x8, 0x7, 0x9, 0x6, 0x6, 0x0, 0x1, 0x0, 0x8}, r0, 0xa, r2, 0x1) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r3, 0x6, 0x1e, &(0x7f0000000040)=0x1, 0x4) connect$inet6(r3, &(0x7f0000000080)={0xa, 0x0, 0x0, @loopback}, 0x1c) openat$cgroup_ro(r1, &(0x7f0000000180)='blkio.throttle.io_serviced_recursive\x00', 0x0, 0x0) 22:33:53 executing program 6: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) lsetxattr$security_evm(&(0x7f0000000240)='.\x00', &(0x7f0000000300), &(0x7f00000003c0)=@sha1={0x1, "bd2b5bce8b74aea700654a682479ac2c0852bc4d"}, 0x15, 0x3) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={&(0x7f0000000040), 0xb}, 0x0, 0x20, 0x0, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) r0 = fork() r1 = syz_open_procfs(r0, &(0x7f0000000000)='status\x00') r2 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x2, 0x0) pwrite64(0xffffffffffffffff, &(0x7f00000000c0)='9', 0x1, 0x8040000) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x20, 0x3, 0x4, 0x1, 0x0, 0x8, 0x20620, 0x2, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x3f, 0x2, @perf_config_ext={0x240000000, 0x5}, 0x1400, 0x4, 0x8, 0x7, 0x9, 0x6, 0x6, 0x0, 0x1, 0x0, 0x8}, r0, 0xa, r2, 0x1) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r3, 0x6, 0x1e, &(0x7f0000000040)=0x1, 0x4) setsockopt$inet6_tcp_TCP_REPAIR(r3, 0x6, 0x13, &(0x7f00000018c0)=0x1, 0x4) connect$inet6(r3, &(0x7f0000000080)={0xa, 0x0, 0x0, @loopback}, 0x1c) openat$cgroup_ro(r1, &(0x7f0000000180)='blkio.throttle.io_serviced_recursive\x00', 0x0, 0x0) [ 1509.385919] loop7: detected capacity change from 0 to 2048 [ 1509.401321] loop0: detected capacity change from 0 to 512 [ 1509.403239] loop2: detected capacity change from 0 to 2048 22:33:53 executing program 4: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000480)}}, 0x0, 0xffffffefffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x100000, 0xe, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000500100000f000000000000000100000005000000000004000040000020000000dbf4655fdbf4655f0100ffff53ef010001000000dbf4655f000000000000000001000000000000000b0000008000000018000000c20500002b0200"/116, 0x74, 0x400}, {&(0x7f0000010100)="000000000000000000000000244b8e9b57f04b59aa229cc218853f9501004000", 0x20, 0x4e0}, {&(0x7f0000010200)="010000000000050040", 0x9, 0x560}, {&(0x7f0000010300)="020000000300000004000000", 0xc, 0x800}, {&(0x7f0000010400), 0x0, 0x1000}, {&(0x7f0000011500)="ed41000000080000dbf4655fdbf4655fdbf4655f00000000000004004000", 0x1e}, {0x0}, {0x0}, {&(0x7f0000011c00)="0b0000000c0001022e00000002000000f40702022e", 0x15, 0x10000}, {0x0}, {0x0}, {&(0x7f0000012400)="504d4d00504d4dffdbf4655f00000000647679756b6f762d676c6170746f70320000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000006c6f6f7033340075782f746573742f73797a5f6d6f756e745f696d6167655f650500"/123, 0x7b, 0x20000}, {0x0}, {0x0, 0x0, 0x38000}], 0x0, &(0x7f0000012f00)) [ 1509.431755] EXT4-fs (loop0): bad geometry: block count 512 exceeds size of device (128 blocks) [ 1509.437130] EXT4-fs (loop2): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 1509.437906] EXT4-fs (loop2): group descriptors corrupted! 22:33:54 executing program 0: perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000480)}}, 0x0, 0xffffffefffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0xd, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000500100000f000000000000000100000005000000000004000040000020000000dbf4655fdbf4655f0100ffff53ef010001000000dbf4655f000000000000000001000000000000000b0000008000000018000000c20500002b0200"/116, 0x74, 0x400}, {&(0x7f0000010100)="000000000000000000000000244b8e9b57f04b59aa229cc218853f9501004000", 0x20, 0x4e0}, {&(0x7f0000010200)="010000000000", 0x6, 0x560}, {&(0x7f0000010300)="020000000300000004000000", 0xc, 0x800}, {&(0x7f0000010400), 0x0, 0x1000}, {&(0x7f0000011500)="ed41000000080000dbf4655fdbf4655f", 0x10, 0x2080}, {0x0}, {0x0}, {0x0, 0x0, 0x10000}, {0x0}, {0x0}, {0x0, 0x0, 0x20000}, {0x0}], 0x0, &(0x7f0000012f00)) [ 1509.497197] EXT4-fs (loop7): mounted filesystem without journal. Quota mode: none. 22:33:54 executing program 1: r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, @perf_config_ext, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000000), 0x0) r2 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) ioctl$EXT4_IOC_CHECKPOINT(r2, 0x4004662b, &(0x7f0000000100)=0x5) ioctl$AUTOFS_DEV_IOCTL_TIMEOUT(0xffffffffffffffff, 0xc018937a, &(0x7f0000001480)=ANY=[@ANYBLOB="010000fe04f804f32d1ae95f4d8fd9ce99ff00010000001800000059a5a91fc707002c3e05f0bcf35234dd60eedec3d5f1b58f0d41f6996d0df70b25316c86b91cf6440f87695b3e2bf9118d7b986e6dd6169cde2d7b35569ff3c18ea708da093a5e297fd2ec2322a167617fa6662e65407cedfd90d2ee90deccf04f2c85b215e5090cb50628f934703c2db873b5eb9a2e276f987493cc445a8474761879f6df5a5233b80656c014a59590366f77d5104d838160f3f8f304bbfb07a672117635569099d752c2b724b38b74a3b0e2c4dd54619ff2e05de8c58ace02796bd997ccfd3fbf04c5bb7420f2656931eb46c8e72d17fd9b33dd84ff6fab17ff995be40bf9a47cdde574665966c721e5f265d3aaac1788c3ea", @ANYRES32=r0, @ANYBLOB="01040000000000002e2f66696c6530"]) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r3, 0xc08c5332, &(0x7f00000013c0)={0xffffffff, 0x6964, 0x0, 'queue1\x00', 0xff}) r4 = gettid() process_vm_writev(r4, &(0x7f0000002580)=[{&(0x7f0000000140)=""/89, 0x59}, {&(0x7f00000001c0)=""/175, 0xaf}, {&(0x7f0000000280)=""/4096, 0x1000}], 0x3, &(0x7f0000003840)=[{&(0x7f0000002640)=""/105, 0x69}, {0xfffffffffffffffe, 0x10}], 0x2, 0x0) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r1, 0xc08c5332, &(0x7f0000001280)={0x3, 0x5, 0x0, 'queue1\x00', 0x8}) r5 = fork() write$sndseq(r1, &(0x7f0000001340)=[{0x22, 0x8, 0x2, 0x3, @time={0x4}, {0x0, 0x1}, {0x6, 0x81}, @raw32={[0x800, 0x3, 0x9]}}, {0xe1, 0x7, 0xf8, 0xff, @tick=0x2, {0x3f}, {0x4, 0xf1}, @queue={0xff, {0x6, 0x9}}}, {0x4, 0x1, 0x9, 0x5, @time={0x7, 0x6}, {0x7c, 0x2}, {0x20, 0x6}, @connect={{0x0, 0xfd}, {0x98, 0x4}}}, {0x80, 0x4, 0x7, 0x7d, @time={0xfffff000, 0x9}, {0x81, 0x1f}, {0xaa}, @queue={0x5, {0xffffffe0, 0x3}}}], 0x70) r6 = syz_open_dev$vcsn(&(0x7f0000000040), 0x3, 0x2001) ioctl$LOOP_CTL_GET_FREE(r6, 0x4c82) ptrace$setopts(0x4206, r5, 0x0, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fork() fork() clone3(&(0x7f0000004c00)={0xc0002100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) [ 1509.530213] ext4 filesystem being mounted at /syzkaller-testdir391614100/syzkaller.1GCODk/179/file0 supports timestamps until 2038 (0x7fffffff) [ 1509.580445] loop4: detected capacity change from 0 to 2048 [ 1509.580792] I/O error, dev loop4, sector 0 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 2 [ 1509.582585] Buffer I/O error on dev loop4, logical block 0, async page read 22:33:54 executing program 2: perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000480)}}, 0x0, 0xffffffefffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x100000, 0xd, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000500100000f000000000000000100000005000000000004000040000020000000dbf4655fdbf4655f0100ffff53ef010001000000dbf4655f000000000000000001000000000000000b0000008000000018000000c20500002b0200"/116, 0x74, 0x400}, {&(0x7f0000010100)="000000000000000000000000244b8e9b57f04b59aa229cc218853f9501004000", 0x20, 0x4e0}, {&(0x7f0000010200)="010000000000050040", 0x9, 0x560}, {&(0x7f0000010400), 0x0, 0x1000}, {&(0x7f0000011500)="ed41000000080000dbf4655fdbf4655fdbf4655f00000000000004004000", 0x1e, 0x2080}, {0x0}, {0x0}, {&(0x7f0000011c00)="0b0000000c0001022e00000002000000f40702022e", 0x15, 0x10000}, {0x0}, {0x0}, {&(0x7f0000012400)="504d4d00504d4dffdbf4655f00000000647679756b6f762d676c6170746f70320000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000006c6f6f7033340075782f746573742f73797a5f6d6f756e745f696d6167655f650500"/123, 0x7b, 0x20000}, {0x0}, {0x0, 0x0, 0x38000}], 0x0, &(0x7f0000012f00)) [ 1509.683412] EXT4-fs error (device loop4): __ext4_fill_super:5244: inode #2: comm syz-executor.4: iget: root inode unallocated [ 1509.693979] EXT4-fs (loop7): unmounting filesystem. [ 1509.694322] loop0: detected capacity change from 0 to 512 [ 1509.699085] loop2: detected capacity change from 0 to 2048 [ 1509.699121] EXT4-fs (loop4): get root inode failed [ 1509.700768] EXT4-fs (loop4): mount failed [ 1509.729250] EXT4-fs (loop2): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 1509.730254] EXT4-fs (loop2): group descriptors corrupted! [ 1509.763649] EXT4-fs (loop0): bad geometry: block count 512 exceeds size of device (128 blocks) 22:34:10 executing program 6: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) lsetxattr$security_evm(&(0x7f0000000240)='.\x00', &(0x7f0000000300), &(0x7f00000003c0)=@sha1={0x1, "bd2b5bce8b74aea700654a682479ac2c0852bc4d"}, 0x15, 0x3) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={&(0x7f0000000040), 0xb}, 0x0, 0x20, 0x0, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) r0 = fork() r1 = syz_open_procfs(r0, &(0x7f0000000000)='status\x00') r2 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x2, 0x0) pwrite64(0xffffffffffffffff, &(0x7f00000000c0)='9', 0x1, 0x8040000) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x20, 0x3, 0x4, 0x1, 0x0, 0x8, 0x20620, 0x2, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x3f, 0x2, @perf_config_ext={0x240000000, 0x5}, 0x1400, 0x4, 0x8, 0x7, 0x9, 0x6, 0x6, 0x0, 0x1, 0x0, 0x8}, r0, 0xa, r2, 0x1) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r3, 0x6, 0x1e, &(0x7f0000000040)=0x1, 0x4) setsockopt$inet6_tcp_TCP_REPAIR(r3, 0x6, 0x13, &(0x7f00000018c0)=0x1, 0x4) connect$inet6(r3, &(0x7f0000000080)={0xa, 0x0, 0x0, @loopback}, 0x1c) openat$cgroup_ro(r1, &(0x7f0000000180)='blkio.throttle.io_serviced_recursive\x00', 0x0, 0x0) 22:34:10 executing program 7: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000480)}}, 0x0, 0xffffffefffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x100000, 0xd, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000500100000f000000000000000100000005000000000004000040000020000000dbf4655fdbf4655f0100ffff53ef010001000000dbf4655f000000000000000001000000000000000b0000008000000018000000c20500002b0200"/116, 0x74, 0x400}, {&(0x7f0000010100)="000000000000000000000000244b8e9b57f04b59aa229cc218853f9501004000", 0x20, 0x4e0}, {&(0x7f0000010200)="010000000000050040", 0x9, 0x560}, {&(0x7f0000010300)="020000000300000004000000", 0xc, 0x800}, {&(0x7f0000011500)="ed41000000080000dbf4655fdbf4655fdbf4655f00000000000004004000", 0x1e, 0x2080}, {0x0}, {0x0}, {&(0x7f0000011c00)="0b0000000c0001022e00000002000000f40702022e", 0x15, 0x10000}, {0x0}, {0x0}, {&(0x7f0000012400)="504d4d00504d4dffdbf4655f00000000647679756b6f762d676c6170746f70320000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000006c6f6f7033340075782f746573742f73797a5f6d6f756e745f696d6167655f650500"/123, 0x7b, 0x20000}, {0x0}, {0x0, 0x0, 0x38000}], 0x0, &(0x7f0000012f00)) 22:34:10 executing program 1: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, @perf_config_ext, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000000), 0x0) r1 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) ioctl$EXT4_IOC_CHECKPOINT(r1, 0x4004662b, &(0x7f0000000100)=0x5) ioctl$AUTOFS_DEV_IOCTL_TIMEOUT(0xffffffffffffffff, 0xc018937a, &(0x7f0000001480)=ANY=[@ANYBLOB="010000fe04f804f32d1ae95f4d8fd9ce99ff00010000001800000059a5a91fc707002c3e05f0bcf35234dd60eedec3d5f1b58f0d41f6996d0df70b25316c86b91cf6440f87695b3e2bf9118d7b986e6dd6169cde2d7b35569ff3c18ea708da093a5e297fd2ec2322a167617fa6662e65407cedfd90d2ee90deccf04f2c85b215e5090cb50628f934703c2db873b5eb9a2e276f987493cc445a8474761879f6df5a5233b80656c014a59590366f77d5104d838160f3f8f304bbfb07a672117635569099d752c2b724b38b74a3b0e2c4dd54619ff2e05de8c58ace02796bd997ccfd3fbf04c5bb7420f2656931eb46c8e72d17fd9b33dd84ff6fab17ff995be40bf9a47cdde574665966c721e5f265d3aaac1788c3ea", @ANYBLOB="01040000000000002e2f66696c653000"]) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(0xffffffffffffffff, 0xc08c5332, &(0x7f00000013c0)={0xffffffff, 0x6964, 0x0, 'queue1\x00', 0xff}) r2 = gettid() process_vm_writev(r2, &(0x7f0000002580)=[{&(0x7f0000000140)=""/89, 0x59}, {&(0x7f00000001c0)=""/175, 0xaf}, {&(0x7f0000000280)=""/4096, 0x1000}], 0x3, &(0x7f0000003840)=[{&(0x7f0000002640)=""/105, 0x69}, {0xfffffffffffffffe, 0x10}], 0x2, 0x0) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r0, 0xc08c5332, &(0x7f0000001280)={0x3, 0x5, 0x0, 'queue1\x00', 0x8}) r3 = fork() write$sndseq(r0, &(0x7f0000001340)=[{0x22, 0x8, 0x2, 0x3, @time={0x4}, {0x0, 0x1}, {0x6, 0x81}, @raw32={[0x800, 0x3, 0x9]}}, {0xe1, 0x7, 0xf8, 0xff, @tick=0x2, {0x3f}, {0x4, 0xf1}, @queue={0xff, {0x6, 0x9}}}, {0x4, 0x1, 0x9, 0x5, @time={0x7, 0x6}, {0x7c, 0x2}, {0x20, 0x6}, @connect={{0x0, 0xfd}, {0x98, 0x4}}}, {0x80, 0x4, 0x7, 0x7d, @time={0xfffff000, 0x9}, {0x81, 0x1f}, {0xaa}, @queue={0x5, {0xffffffe0, 0x3}}}], 0x70) r4 = syz_open_dev$vcsn(&(0x7f0000000040), 0x3, 0x2001) ioctl$LOOP_CTL_GET_FREE(r4, 0x4c82) ptrace$setopts(0x4206, r3, 0x0, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fork() fork() clone3(&(0x7f0000004c00)={0xc0002100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) 22:34:10 executing program 2: perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000480)}}, 0x0, 0xffffffefffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x100000, 0xd, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000500100000f000000000000000100000005000000000004000040000020000000dbf4655fdbf4655f0100ffff53ef010001000000dbf4655f000000000000000001000000000000000b0000008000000018000000c20500002b0200"/116, 0x74, 0x400}, {&(0x7f0000010100)="000000000000000000000000244b8e9b57f04b59aa229cc218853f9501004000", 0x20, 0x4e0}, {&(0x7f0000010200)="010000000000050040", 0x9, 0x560}, {&(0x7f0000010400), 0x0, 0x1000}, {&(0x7f0000011500)="ed41000000080000dbf4655fdbf4655fdbf4655f00000000000004004000", 0x1e, 0x2080}, {0x0}, {0x0}, {&(0x7f0000011c00)="0b0000000c0001022e00000002000000f40702022e", 0x15, 0x10000}, {0x0}, {0x0}, {&(0x7f0000012400)="504d4d00504d4dffdbf4655f00000000647679756b6f762d676c6170746f70320000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000006c6f6f7033340075782f746573742f73797a5f6d6f756e745f696d6167655f650500"/123, 0x7b, 0x20000}, {0x0}, {0x0, 0x0, 0x38000}], 0x0, &(0x7f0000012f00)) 22:34:10 executing program 3: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) lsetxattr$security_evm(&(0x7f0000000240)='.\x00', &(0x7f0000000300), &(0x7f00000003c0)=@sha1={0x1, "bd2b5bce8b74aea700654a682479ac2c0852bc4d"}, 0x15, 0x3) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={&(0x7f0000000040), 0xb}, 0x0, 0x20, 0x0, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) r0 = fork() r1 = syz_open_procfs(r0, &(0x7f0000000000)='status\x00') r2 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x2, 0x0) pwrite64(r2, &(0x7f00000000c0)='9', 0x1, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x20, 0x3, 0x4, 0x1, 0x0, 0x8, 0x20620, 0x2, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x3f, 0x2, @perf_config_ext={0x240000000, 0x5}, 0x1400, 0x4, 0x8, 0x7, 0x9, 0x6, 0x6, 0x0, 0x1, 0x0, 0x8}, r0, 0xa, r2, 0x1) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r3, 0x6, 0x1e, &(0x7f0000000040)=0x1, 0x4) setsockopt$inet6_tcp_TCP_REPAIR(r3, 0x6, 0x13, &(0x7f00000018c0)=0x1, 0x4) connect$inet6(r3, &(0x7f0000000080)={0xa, 0x0, 0x0, @loopback}, 0x1c) openat$cgroup_ro(r1, &(0x7f0000000180)='blkio.throttle.io_serviced_recursive\x00', 0x0, 0x0) 22:34:10 executing program 4: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000480)}}, 0x0, 0xffffffefffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x100000, 0xd, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000500100000f000000000000000100000005000000000004000040000020000000dbf4655fdbf4655f0100ffff53ef010001000000dbf4655f000000000000000001000000000000000b0000008000000018000000c20500002b0200"/116, 0x74, 0x400}, {&(0x7f0000010100)="000000000000000000000000244b8e9b57f04b59aa229cc218853f9501004000", 0x20, 0x4e0}, {&(0x7f0000010200)="010000000000050040", 0x9, 0x560}, {&(0x7f0000010300)="020000000300000004000000", 0xc, 0x800}, {&(0x7f0000011500)="ed41000000080000dbf4655fdbf4655fdbf4655f00000000000004004000", 0x1e, 0x2080}, {0x0}, {0x0}, {&(0x7f0000011c00)="0b0000000c0001022e00000002000000f40702022e", 0x15, 0x10000}, {0x0}, {0x0}, {&(0x7f0000012400)="504d4d00504d4dffdbf4655f00000000647679756b6f762d676c6170746f70320000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000006c6f6f7033340075782f746573742f73797a5f6d6f756e745f696d6167655f650500"/123, 0x7b, 0x20000}, {0x0}, {0x0, 0x0, 0x38000}], 0x0, &(0x7f0000012f00)) 22:34:10 executing program 0: perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000480)}}, 0x0, 0xffffffefffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0xd, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000500100000f000000000000000100000005000000000004000040000020000000dbf4655fdbf4655f0100ffff53ef010001000000dbf4655f000000000000000001000000000000000b0000008000000018000000c20500002b0200"/116, 0x74, 0x400}, {&(0x7f0000010100)="000000000000000000000000244b8e9b57f04b59aa229cc218853f9501004000", 0x20, 0x4e0}, {&(0x7f0000010200)="010000000000", 0x6, 0x560}, {&(0x7f0000010300)="020000000300000004000000", 0xc, 0x800}, {&(0x7f0000010400), 0x0, 0x1000}, {&(0x7f0000011500)="ed41000000080000dbf4655fdbf4655f", 0x10, 0x2080}, {0x0}, {0x0}, {0x0, 0x0, 0x10000}, {0x0}, {0x0}, {0x0, 0x0, 0x20000}, {0x0}], 0x0, &(0x7f0000012f00)) 22:34:10 executing program 5: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) lsetxattr$security_evm(&(0x7f0000000240)='.\x00', &(0x7f0000000300), &(0x7f00000003c0)=@sha1={0x1, "bd2b5bce8b74aea700654a682479ac2c0852bc4d"}, 0x15, 0x3) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={&(0x7f0000000040), 0xb}, 0x0, 0x20, 0x0, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) r0 = fork() r1 = syz_open_procfs(r0, &(0x7f0000000000)='status\x00') r2 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x0, 0x0) pwrite64(r2, &(0x7f00000000c0)='9', 0x1, 0x8040000) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x20, 0x3, 0x4, 0x1, 0x0, 0x8, 0x20620, 0x2, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x3f, 0x2, @perf_config_ext={0x240000000, 0x5}, 0x1400, 0x4, 0x8, 0x7, 0x9, 0x6, 0x6, 0x0, 0x1, 0x0, 0x8}, r0, 0xa, r2, 0x1) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r3, 0x6, 0x1e, &(0x7f0000000040)=0x1, 0x4) connect$inet6(r3, &(0x7f0000000080)={0xa, 0x0, 0x0, @loopback}, 0x1c) openat$cgroup_ro(r1, &(0x7f0000000180)='blkio.throttle.io_serviced_recursive\x00', 0x0, 0x0) [ 1525.639240] loop0: detected capacity change from 0 to 512 [ 1525.642670] loop4: detected capacity change from 0 to 2048 [ 1525.663317] loop2: detected capacity change from 0 to 2048 [ 1525.668249] EXT4-fs (loop0): bad geometry: block count 512 exceeds size of device (128 blocks) [ 1525.670263] loop7: detected capacity change from 0 to 2048 [ 1525.736364] EXT4-fs (loop2): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 1525.738103] EXT4-fs (loop2): group descriptors corrupted! [ 1525.745097] EXT4-fs (loop4): mounted filesystem without journal. Quota mode: none. [ 1525.750970] ext4 filesystem being mounted at /syzkaller-testdir967783826/syzkaller.dhcxYf/175/file0 supports timestamps until 2038 (0x7fffffff) [ 1525.809247] EXT4-fs (loop7): mounted filesystem without journal. Quota mode: none. 22:34:10 executing program 0: perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000480)}}, 0x0, 0xffffffefffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0xd, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000500100000f000000000000000100000005000000000004000040000020000000dbf4655fdbf4655f0100ffff53ef010001000000dbf4655f000000000000000001000000000000000b0000008000000018000000c20500002b0200"/116, 0x74, 0x400}, {&(0x7f0000010100)="000000000000000000000000244b8e9b57f04b59aa229cc218853f9501004000", 0x20, 0x4e0}, {&(0x7f0000010200)="01000000000005", 0x7}, {&(0x7f0000010300)="020000000300000004000000", 0xc, 0x800}, {&(0x7f0000010400), 0x0, 0x1000}, {&(0x7f0000011500)="ed41000000080000dbf4655fdbf4655f", 0x10, 0x2080}, {0x0}, {0x0}, {0x0, 0x0, 0x10000}, {0x0}, {0x0}, {0x0, 0x0, 0x20000}, {0x0}], 0x0, &(0x7f0000012f00)) [ 1525.825397] ext4 filesystem being mounted at /syzkaller-testdir391614100/syzkaller.1GCODk/180/file0 supports timestamps until 2038 (0x7fffffff) [ 1525.893297] EXT4-fs (loop4): unmounting filesystem. [ 1525.954057] loop0: detected capacity change from 0 to 512 [ 1526.046180] EXT4-fs (loop7): unmounting filesystem. [ 1526.050292] EXT4-fs (loop0): bad geometry: block count 512 exceeds size of device (128 blocks) 22:34:28 executing program 2: perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000480)}}, 0x0, 0xffffffefffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x100000, 0xe, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000500100000f000000000000000100000005000000000004000040000020000000dbf4655fdbf4655f0100ffff53ef010001000000dbf4655f000000000000000001000000000000000b0000008000000018000000c20500002b0200"/116, 0x74, 0x400}, {&(0x7f0000010100)="000000000000000000000000244b8e9b57f04b59aa229cc218853f9501004000", 0x20, 0x4e0}, {&(0x7f0000010200)="010000000000050040", 0x9, 0x560}, {0x0, 0x0, 0x800}, {&(0x7f0000010400), 0x0, 0x1000}, {&(0x7f0000011500)="ed41000000080000dbf4655fdbf4655fdbf4655f00000000000004004000", 0x1e, 0x2080}, {0x0}, {0x0}, {&(0x7f0000011c00)="0b0000000c0001022e00000002000000f40702022e", 0x15, 0x10000}, {0x0}, {0x0}, {&(0x7f0000012400)="504d4d00504d4dffdbf4655f00000000647679756b6f762d676c6170746f70320000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000006c6f6f7033340075782f746573742f73797a5f6d6f756e745f696d6167655f650500"/123, 0x7b, 0x20000}, {0x0}, {0x0, 0x0, 0x38000}], 0x0, &(0x7f0000012f00)) 22:34:28 executing program 5: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) lsetxattr$security_evm(&(0x7f0000000240)='.\x00', &(0x7f0000000300), &(0x7f00000003c0)=@sha1={0x1, "bd2b5bce8b74aea700654a682479ac2c0852bc4d"}, 0x15, 0x3) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={&(0x7f0000000040), 0xb}, 0x0, 0x20, 0x0, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) r0 = fork() r1 = syz_open_procfs(r0, &(0x7f0000000000)='status\x00') r2 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x0, 0x0) pwrite64(r2, &(0x7f00000000c0)='9', 0x1, 0x8040000) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x20, 0x3, 0x4, 0x1, 0x0, 0x8, 0x20620, 0x2, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x3f, 0x2, @perf_config_ext={0x240000000, 0x5}, 0x1400, 0x4, 0x8, 0x7, 0x9, 0x6, 0x6, 0x0, 0x1, 0x0, 0x8}, r0, 0xa, r2, 0x1) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r3, 0x6, 0x1e, &(0x7f0000000040)=0x1, 0x4) connect$inet6(r3, &(0x7f0000000080)={0xa, 0x0, 0x0, @loopback}, 0x1c) openat$cgroup_ro(r1, &(0x7f0000000180)='blkio.throttle.io_serviced_recursive\x00', 0x0, 0x0) 22:34:28 executing program 6: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) lsetxattr$security_evm(&(0x7f0000000240)='.\x00', &(0x7f0000000300), &(0x7f00000003c0)=@sha1={0x1, "bd2b5bce8b74aea700654a682479ac2c0852bc4d"}, 0x15, 0x3) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={&(0x7f0000000040), 0xb}, 0x0, 0x20, 0x0, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) r0 = fork() r1 = syz_open_procfs(r0, &(0x7f0000000000)='status\x00') r2 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x2, 0x0) pwrite64(r2, 0x0, 0x0, 0x8040000) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x20, 0x3, 0x4, 0x1, 0x0, 0x8, 0x20620, 0x2, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x3f, 0x2, @perf_config_ext={0x240000000, 0x5}, 0x1400, 0x4, 0x8, 0x7, 0x9, 0x6, 0x6, 0x0, 0x1, 0x0, 0x8}, r0, 0xa, r2, 0x1) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r3, 0x6, 0x1e, &(0x7f0000000040)=0x1, 0x4) setsockopt$inet6_tcp_TCP_REPAIR(r3, 0x6, 0x13, &(0x7f00000018c0)=0x1, 0x4) connect$inet6(r3, &(0x7f0000000080)={0xa, 0x0, 0x0, @loopback}, 0x1c) openat$cgroup_ro(r1, &(0x7f0000000180)='blkio.throttle.io_serviced_recursive\x00', 0x0, 0x0) 22:34:28 executing program 7: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000480)}}, 0x0, 0xffffffefffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x100000, 0xe, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000500100000f000000000000000100000005000000000004000040000020000000dbf4655fdbf4655f0100ffff53ef010001000000dbf4655f000000000000000001000000000000000b0000008000000018000000c20500002b0200"/116, 0x74, 0x400}, {&(0x7f0000010100)="000000000000000000000000244b8e9b57f04b59aa229cc218853f9501004000", 0x20, 0x4e0}, {&(0x7f0000010200)="010000000000050040", 0x9, 0x560}, {&(0x7f0000010300)="020000000300000004000000", 0xc, 0x800}, {0x0, 0x0, 0x1000}, {&(0x7f0000011500)="ed41000000080000dbf4655fdbf4655fdbf4655f00000000000004004000", 0x1e, 0x2080}, {0x0}, {0x0}, {&(0x7f0000011c00)="0b0000000c0001022e00000002000000f40702022e", 0x15, 0x10000}, {0x0}, {0x0}, {&(0x7f0000012400)="504d4d00504d4dffdbf4655f00000000647679756b6f762d676c6170746f70320000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000006c6f6f7033340075782f746573742f73797a5f6d6f756e745f696d6167655f650500"/123, 0x7b, 0x20000}, {0x0}, {0x0, 0x0, 0x38000}], 0x0, &(0x7f0000012f00)) 22:34:28 executing program 3: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) lsetxattr$security_evm(&(0x7f0000000240)='.\x00', &(0x7f0000000300), &(0x7f00000003c0)=@sha1={0x1, "bd2b5bce8b74aea700654a682479ac2c0852bc4d"}, 0x15, 0x3) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={&(0x7f0000000040), 0xb}, 0x0, 0x20, 0x0, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) r0 = fork() r1 = syz_open_procfs(r0, &(0x7f0000000000)='status\x00') r2 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x2, 0x0) pwrite64(r2, &(0x7f00000000c0)='9', 0x1, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x20, 0x3, 0x4, 0x1, 0x0, 0x8, 0x20620, 0x2, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x3f, 0x2, @perf_config_ext={0x240000000, 0x5}, 0x1400, 0x4, 0x8, 0x7, 0x9, 0x6, 0x6, 0x0, 0x1, 0x0, 0x8}, r0, 0xa, r2, 0x1) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r3, 0x6, 0x1e, &(0x7f0000000040)=0x1, 0x4) setsockopt$inet6_tcp_TCP_REPAIR(r3, 0x6, 0x13, &(0x7f00000018c0)=0x1, 0x4) connect$inet6(r3, &(0x7f0000000080)={0xa, 0x0, 0x0, @loopback}, 0x1c) openat$cgroup_ro(r1, &(0x7f0000000180)='blkio.throttle.io_serviced_recursive\x00', 0x0, 0x0) 22:34:28 executing program 0: perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000480)}}, 0x0, 0xffffffefffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0xd, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000500100000f000000000000000100000005000000000004000040000020000000dbf4655fdbf4655f0100ffff53ef010001000000dbf4655f000000000000000001000000000000000b0000008000000018000000c20500002b0200"/116, 0x74, 0x400}, {&(0x7f0000010100)="000000000000000000000000244b8e9b57f04b59aa229cc218853f9501004000", 0x20, 0x4e0}, {&(0x7f0000010200)="01000000000005", 0x7}, {&(0x7f0000010300)="020000000300000004000000", 0xc, 0x800}, {&(0x7f0000010400), 0x0, 0x1000}, {&(0x7f0000011500)="ed41000000080000dbf4655fdbf4655f", 0x10, 0x2080}, {0x0}, {0x0}, {0x0, 0x0, 0x10000}, {0x0}, {0x0}, {0x0, 0x0, 0x20000}, {0x0}], 0x0, &(0x7f0000012f00)) 22:34:28 executing program 1: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, @perf_config_ext, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000000), 0x0) r1 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) ioctl$EXT4_IOC_CHECKPOINT(r1, 0x4004662b, &(0x7f0000000100)=0x5) ioctl$AUTOFS_DEV_IOCTL_TIMEOUT(0xffffffffffffffff, 0xc018937a, &(0x7f0000001480)=ANY=[@ANYBLOB="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", @ANYBLOB="01040000000000002e2f66696c653000"]) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(0xffffffffffffffff, 0xc08c5332, &(0x7f00000013c0)={0xffffffff, 0x6964, 0x0, 'queue1\x00', 0xff}) r2 = gettid() process_vm_writev(r2, &(0x7f0000002580)=[{&(0x7f0000000140)=""/89, 0x59}, {&(0x7f00000001c0)=""/175, 0xaf}, {&(0x7f0000000280)=""/4096, 0x1000}], 0x3, &(0x7f0000003840)=[{&(0x7f0000002640)=""/105, 0x69}, {0xfffffffffffffffe, 0x10}], 0x2, 0x0) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r0, 0xc08c5332, &(0x7f0000001280)={0x3, 0x5, 0x0, 'queue1\x00', 0x8}) r3 = fork() write$sndseq(r0, &(0x7f0000001340)=[{0x22, 0x8, 0x2, 0x3, @time={0x4}, {0x0, 0x1}, {0x6, 0x81}, @raw32={[0x800, 0x3, 0x9]}}, {0xe1, 0x7, 0xf8, 0xff, @tick=0x2, {0x3f}, {0x4, 0xf1}, @queue={0xff, {0x6, 0x9}}}, {0x4, 0x1, 0x9, 0x5, @time={0x7, 0x6}, {0x7c, 0x2}, {0x20, 0x6}, @connect={{0x0, 0xfd}, {0x98, 0x4}}}, {0x80, 0x4, 0x7, 0x7d, @time={0xfffff000, 0x9}, {0x81, 0x1f}, {0xaa}, @queue={0x5, {0xffffffe0, 0x3}}}], 0x70) r4 = syz_open_dev$vcsn(&(0x7f0000000040), 0x3, 0x2001) ioctl$LOOP_CTL_GET_FREE(r4, 0x4c82) ptrace$setopts(0x4206, r3, 0x0, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fork() fork() clone3(&(0x7f0000004c00)={0xc0002100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) 22:34:28 executing program 4: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000480)}}, 0x0, 0xffffffefffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x100000, 0xd, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000500100000f000000000000000100000005000000000004000040000020000000dbf4655fdbf4655f0100ffff53ef010001000000dbf4655f000000000000000001000000000000000b0000008000000018000000c20500002b0200"/116, 0x74, 0x400}, {&(0x7f0000010100)="000000000000000000000000244b8e9b57f04b59aa229cc218853f9501004000", 0x20, 0x4e0}, {&(0x7f0000010200)="010000000000050040", 0x9, 0x560}, {&(0x7f0000010300)="020000000300000004000000", 0xc, 0x800}, {&(0x7f0000011500)="ed41000000080000dbf4655fdbf4655fdbf4655f00000000000004004000", 0x1e, 0x2080}, {0x0}, {0x0}, {&(0x7f0000011c00)="0b0000000c0001022e00000002000000f40702022e", 0x15, 0x10000}, {0x0}, {0x0}, {&(0x7f0000012400)="504d4d00504d4dffdbf4655f00000000647679756b6f762d676c6170746f70320000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000006c6f6f7033340075782f746573742f73797a5f6d6f756e745f696d6167655f650500"/123, 0x7b, 0x20000}, {0x0}, {0x0, 0x0, 0x38000}], 0x0, &(0x7f0000012f00)) [ 1544.437443] loop2: detected capacity change from 0 to 2048 [ 1544.441871] loop0: detected capacity change from 0 to 512 [ 1544.447365] loop7: detected capacity change from 0 to 2048 [ 1544.454414] loop4: detected capacity change from 0 to 2048 [ 1544.473291] EXT4-fs (loop0): bad geometry: block count 512 exceeds size of device (128 blocks) [ 1544.478403] EXT4-fs (loop2): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 1544.479933] EXT4-fs (loop2): group descriptors corrupted! [ 1544.547762] EXT4-fs (loop7): mounted filesystem without journal. Quota mode: none. [ 1544.566696] ext4 filesystem being mounted at /syzkaller-testdir391614100/syzkaller.1GCODk/181/file0 supports timestamps until 2038 (0x7fffffff) [ 1544.568339] EXT4-fs (loop4): mounted filesystem without journal. Quota mode: none. [ 1544.574039] ext4 filesystem being mounted at /syzkaller-testdir967783826/syzkaller.dhcxYf/176/file0 supports timestamps until 2038 (0x7fffffff) 22:34:29 executing program 2: perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000480)}}, 0x0, 0xffffffefffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x100000, 0xe, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000500100000f000000000000000100000005000000000004000040000020000000dbf4655fdbf4655f0100ffff53ef010001000000dbf4655f000000000000000001000000000000000b0000008000000018000000c20500002b0200"/116, 0x74, 0x400}, {&(0x7f0000010100)="000000000000000000000000244b8e9b57f04b59aa229cc218853f9501004000", 0x20, 0x4e0}, {&(0x7f0000010200)="010000000000050040", 0x9, 0x560}, {0x0, 0x0, 0x800}, {&(0x7f0000010400), 0x0, 0x1000}, {&(0x7f0000011500)="ed41000000080000dbf4655fdbf4655fdbf4655f00000000000004004000", 0x1e, 0x2080}, {0x0}, {0x0}, {&(0x7f0000011c00)="0b0000000c0001022e00000002000000f40702022e", 0x15, 0x10000}, {0x0}, {0x0}, {&(0x7f0000012400)="504d4d00504d4dffdbf4655f00000000647679756b6f762d676c6170746f70320000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000006c6f6f7033340075782f746573742f73797a5f6d6f756e745f696d6167655f650500"/123, 0x7b, 0x20000}, {0x0}, {0x0, 0x0, 0x38000}], 0x0, &(0x7f0000012f00)) 22:34:29 executing program 0: perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000480)}}, 0x0, 0xffffffefffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0xd, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000500100000f000000000000000100000005000000000004000040000020000000dbf4655fdbf4655f0100ffff53ef010001000000dbf4655f000000000000000001000000000000000b0000008000000018000000c20500002b0200"/116, 0x74, 0x400}, {&(0x7f0000010100)="000000000000000000000000244b8e9b57f04b59aa229cc218853f9501004000", 0x20, 0x4e0}, {&(0x7f0000010200)="01000000000005", 0x7}, {&(0x7f0000010300)="020000000300000004000000", 0xc, 0x800}, {&(0x7f0000010400), 0x0, 0x1000}, {&(0x7f0000011500)="ed41000000080000dbf4655fdbf4655f", 0x10, 0x2080}, {0x0}, {0x0}, {0x0, 0x0, 0x10000}, {0x0}, {0x0}, {0x0, 0x0, 0x20000}, {0x0}], 0x0, &(0x7f0000012f00)) [ 1544.743366] EXT4-fs (loop7): unmounting filesystem. 22:34:29 executing program 4: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000480)}}, 0x0, 0xffffffefffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x100000, 0xd, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000500100000f000000000000000100000005000000000004000040000020000000dbf4655fdbf4655f0100ffff53ef010001000000dbf4655f000000000000000001000000000000000b0000008000000018000000c20500002b0200"/116, 0x74, 0x400}, {&(0x7f0000010100)="000000000000000000000000244b8e9b57f04b59aa229cc218853f9501004000", 0x20, 0x4e0}, {&(0x7f0000010200)="010000000000050040", 0x9, 0x560}, {&(0x7f0000010300)="020000000300000004000000", 0xc, 0x800}, {&(0x7f0000011500)="ed41000000080000dbf4655fdbf4655fdbf4655f00000000000004004000", 0x1e, 0x2080}, {0x0}, {0x0}, {&(0x7f0000011c00)="0b0000000c0001022e00000002000000f40702022e", 0x15, 0x10000}, {0x0}, {0x0}, {&(0x7f0000012400)="504d4d00504d4dffdbf4655f00000000647679756b6f762d676c6170746f70320000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000006c6f6f7033340075782f746573742f73797a5f6d6f756e745f696d6167655f650500"/123, 0x7b, 0x20000}, {0x0}, {0x0, 0x0, 0x38000}], 0x0, &(0x7f0000012f00)) [ 1544.770390] EXT4-fs (loop4): unmounting filesystem. 22:34:29 executing program 7: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000480)}}, 0x0, 0xffffffefffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x100000, 0xe, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000500100000f000000000000000100000005000000000004000040000020000000dbf4655fdbf4655f0100ffff53ef010001000000dbf4655f000000000000000001000000000000000b0000008000000018000000c20500002b0200"/116, 0x74, 0x400}, {&(0x7f0000010100)="000000000000000000000000244b8e9b57f04b59aa229cc218853f9501004000", 0x20, 0x4e0}, {&(0x7f0000010200)="010000000000050040", 0x9, 0x560}, {&(0x7f0000010300)="020000000300000004000000", 0xc, 0x800}, {0x0, 0x0, 0x1000}, {&(0x7f0000011500)="ed41000000080000dbf4655fdbf4655fdbf4655f00000000000004004000", 0x1e, 0x2080}, {0x0}, {0x0}, {&(0x7f0000011c00)="0b0000000c0001022e00000002000000f40702022e", 0x15, 0x10000}, {0x0}, {0x0}, {&(0x7f0000012400)="504d4d00504d4dffdbf4655f00000000647679756b6f762d676c6170746f70320000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000006c6f6f7033340075782f746573742f73797a5f6d6f756e745f696d6167655f650500"/123, 0x7b, 0x20000}, {0x0}, {0x0, 0x0, 0x38000}], 0x0, &(0x7f0000012f00)) [ 1544.804859] loop0: detected capacity change from 0 to 512 [ 1544.816778] loop2: detected capacity change from 0 to 2048 [ 1544.840169] EXT4-fs (loop0): bad geometry: block count 512 exceeds size of device (128 blocks) [ 1544.848685] EXT4-fs (loop2): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 1544.850055] EXT4-fs (loop2): group descriptors corrupted! 22:34:29 executing program 1: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, @perf_config_ext, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000000), 0x0) r1 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) ioctl$EXT4_IOC_CHECKPOINT(r1, 0x4004662b, &(0x7f0000000100)=0x5) ioctl$AUTOFS_DEV_IOCTL_TIMEOUT(0xffffffffffffffff, 0xc018937a, &(0x7f0000001480)=ANY=[@ANYBLOB="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", @ANYBLOB="01040000000000002e2f66696c653000"]) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(0xffffffffffffffff, 0xc08c5332, &(0x7f00000013c0)={0xffffffff, 0x6964, 0x0, 'queue1\x00', 0xff}) r2 = gettid() process_vm_writev(r2, &(0x7f0000002580)=[{&(0x7f0000000140)=""/89, 0x59}, {&(0x7f00000001c0)=""/175, 0xaf}, {&(0x7f0000000280)=""/4096, 0x1000}], 0x3, &(0x7f0000003840)=[{&(0x7f0000002640)=""/105, 0x69}, {0xfffffffffffffffe, 0x10}], 0x2, 0x0) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r0, 0xc08c5332, &(0x7f0000001280)={0x3, 0x5, 0x0, 'queue1\x00', 0x8}) r3 = fork() write$sndseq(r0, &(0x7f0000001340)=[{0x22, 0x8, 0x2, 0x3, @time={0x4}, {0x0, 0x1}, {0x6, 0x81}, @raw32={[0x800, 0x3, 0x9]}}, {0xe1, 0x7, 0xf8, 0xff, @tick=0x2, {0x3f}, {0x4, 0xf1}, @queue={0xff, {0x6, 0x9}}}, {0x4, 0x1, 0x9, 0x5, @time={0x7, 0x6}, {0x7c, 0x2}, {0x20, 0x6}, @connect={{0x0, 0xfd}, {0x98, 0x4}}}, {0x80, 0x4, 0x7, 0x7d, @time={0xfffff000, 0x9}, {0x81, 0x1f}, {0xaa}, @queue={0x5, {0xffffffe0, 0x3}}}], 0x70) r4 = syz_open_dev$vcsn(&(0x7f0000000040), 0x3, 0x2001) ioctl$LOOP_CTL_GET_FREE(r4, 0x4c82) ptrace$setopts(0x4206, r3, 0x0, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fork() fork() clone3(&(0x7f0000004c00)={0xc0002100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) 22:34:29 executing program 0: perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000480)}}, 0x0, 0xffffffefffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0xc, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000500100000f000000000000000100000005000000000004000040000020000000dbf4655fdbf4655f0100ffff53ef010001000000dbf4655f000000000000000001000000000000000b0000008000000018000000c20500002b0200"/116, 0x74, 0x400}, {&(0x7f0000010200)="01000000000005", 0x7, 0x560}, {&(0x7f0000010300)="020000000300000004000000", 0xc, 0x800}, {&(0x7f0000010400), 0x0, 0x1000}, {&(0x7f0000011500)="ed41000000080000dbf4655fdbf4655f", 0x10, 0x2080}, {0x0}, {0x0}, {0x0, 0x0, 0x10000}, {0x0}, {0x0}, {0x0, 0x0, 0x20000}, {0x0}], 0x0, &(0x7f0000012f00)) [ 1544.977016] loop7: detected capacity change from 0 to 2048 [ 1544.981080] loop4: detected capacity change from 0 to 2048 22:34:29 executing program 2: perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000480)}}, 0x0, 0xffffffefffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x100000, 0xe, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000500100000f000000000000000100000005000000000004000040000020000000dbf4655fdbf4655f0100ffff53ef010001000000dbf4655f000000000000000001000000000000000b0000008000000018000000c20500002b0200"/116, 0x74, 0x400}, {&(0x7f0000010100)="000000000000000000000000244b8e9b57f04b59aa229cc218853f9501004000", 0x20, 0x4e0}, {&(0x7f0000010200)="010000000000050040", 0x9, 0x560}, {0x0, 0x0, 0x800}, {&(0x7f0000010400), 0x0, 0x1000}, {&(0x7f0000011500)="ed41000000080000dbf4655fdbf4655fdbf4655f00000000000004004000", 0x1e, 0x2080}, {0x0}, {0x0}, {&(0x7f0000011c00)="0b0000000c0001022e00000002000000f40702022e", 0x15, 0x10000}, {0x0}, {0x0}, {&(0x7f0000012400)="504d4d00504d4dffdbf4655f00000000647679756b6f762d676c6170746f70320000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000006c6f6f7033340075782f746573742f73797a5f6d6f756e745f696d6167655f650500"/123, 0x7b, 0x20000}, {0x0}, {0x0, 0x0, 0x38000}], 0x0, &(0x7f0000012f00)) 22:34:29 executing program 6: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) lsetxattr$security_evm(&(0x7f0000000240)='.\x00', &(0x7f0000000300), &(0x7f00000003c0)=@sha1={0x1, "bd2b5bce8b74aea700654a682479ac2c0852bc4d"}, 0x15, 0x3) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={&(0x7f0000000040), 0xb}, 0x0, 0x20, 0x0, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) r0 = fork() r1 = syz_open_procfs(r0, &(0x7f0000000000)='status\x00') r2 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x2, 0x0) pwrite64(r2, 0x0, 0x0, 0x8040000) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x20, 0x3, 0x4, 0x1, 0x0, 0x8, 0x20620, 0x2, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x3f, 0x2, @perf_config_ext={0x240000000, 0x5}, 0x1400, 0x4, 0x8, 0x7, 0x9, 0x6, 0x6, 0x0, 0x1, 0x0, 0x8}, r0, 0xa, r2, 0x1) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r3, 0x6, 0x1e, &(0x7f0000000040)=0x1, 0x4) setsockopt$inet6_tcp_TCP_REPAIR(r3, 0x6, 0x13, &(0x7f00000018c0)=0x1, 0x4) connect$inet6(r3, &(0x7f0000000080)={0xa, 0x0, 0x0, @loopback}, 0x1c) openat$cgroup_ro(r1, &(0x7f0000000180)='blkio.throttle.io_serviced_recursive\x00', 0x0, 0x0) [ 1545.064928] EXT4-fs (loop7): mounted filesystem without journal. Quota mode: none. [ 1545.069206] EXT4-fs (loop4): mounted filesystem without journal. Quota mode: none. [ 1545.075017] ext4 filesystem being mounted at /syzkaller-testdir391614100/syzkaller.1GCODk/182/file0 supports timestamps until 2038 (0x7fffffff) [ 1545.080963] ext4 filesystem being mounted at /syzkaller-testdir967783826/syzkaller.dhcxYf/177/file0 supports timestamps until 2038 (0x7fffffff) 22:34:29 executing program 3: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) lsetxattr$security_evm(&(0x7f0000000240)='.\x00', &(0x7f0000000300), &(0x7f00000003c0)=@sha1={0x1, "bd2b5bce8b74aea700654a682479ac2c0852bc4d"}, 0x15, 0x3) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={&(0x7f0000000040), 0xb}, 0x0, 0x20, 0x0, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) r0 = fork() r1 = syz_open_procfs(r0, &(0x7f0000000000)='status\x00') r2 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x2, 0x0) pwrite64(r2, &(0x7f00000000c0)='9', 0x1, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x20, 0x3, 0x4, 0x1, 0x0, 0x8, 0x20620, 0x2, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x3f, 0x2, @perf_config_ext={0x240000000, 0x5}, 0x1400, 0x4, 0x8, 0x7, 0x9, 0x6, 0x6, 0x0, 0x1, 0x0, 0x8}, r0, 0xa, r2, 0x1) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r3, 0x6, 0x1e, &(0x7f0000000040)=0x1, 0x4) setsockopt$inet6_tcp_TCP_REPAIR(r3, 0x6, 0x13, &(0x7f00000018c0)=0x1, 0x4) connect$inet6(r3, &(0x7f0000000080)={0xa, 0x0, 0x0, @loopback}, 0x1c) openat$cgroup_ro(r1, &(0x7f0000000180)='blkio.throttle.io_serviced_recursive\x00', 0x0, 0x0) 22:34:29 executing program 5: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) lsetxattr$security_evm(&(0x7f0000000240)='.\x00', &(0x7f0000000300), &(0x7f00000003c0)=@sha1={0x1, "bd2b5bce8b74aea700654a682479ac2c0852bc4d"}, 0x15, 0x3) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={&(0x7f0000000040), 0xb}, 0x0, 0x20, 0x0, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) r0 = fork() r1 = syz_open_procfs(r0, &(0x7f0000000000)='status\x00') r2 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x0, 0x0) pwrite64(r2, &(0x7f00000000c0)='9', 0x1, 0x8040000) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x20, 0x3, 0x4, 0x1, 0x0, 0x8, 0x20620, 0x2, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x3f, 0x2, @perf_config_ext={0x240000000, 0x5}, 0x1400, 0x4, 0x8, 0x7, 0x9, 0x6, 0x6, 0x0, 0x1, 0x0, 0x8}, r0, 0xa, r2, 0x1) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r3, 0x6, 0x1e, &(0x7f0000000040)=0x1, 0x4) connect$inet6(r3, &(0x7f0000000080)={0xa, 0x0, 0x0, @loopback}, 0x1c) openat$cgroup_ro(r1, &(0x7f0000000180)='blkio.throttle.io_serviced_recursive\x00', 0x0, 0x0) [ 1545.153039] loop0: detected capacity change from 0 to 512 [ 1545.177794] EXT4-fs (loop0): unsupported descriptor size 0 [ 1545.217682] loop2: detected capacity change from 0 to 2048 22:34:29 executing program 4: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000480)}}, 0x0, 0xffffffefffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x100000, 0xe, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000500100000f000000000000000100000005000000000004000040000020000000dbf4655fdbf4655f0100ffff53ef010001000000dbf4655f000000000000000001000000000000000b0000008000000018000000c20500002b0200"/116, 0x74, 0x400}, {&(0x7f0000010100)="000000000000000000000000244b8e9b57f04b59aa229cc218853f9501004000", 0x20, 0x4e0}, {&(0x7f0000010200)="010000000000050040", 0x9, 0x560}, {&(0x7f0000010300)="020000000300000004000000", 0xc, 0x800}, {0x0, 0x0, 0x1000}, {&(0x7f0000011500)="ed41000000080000dbf4655fdbf4655fdbf4655f00000000000004004000", 0x1e, 0x2080}, {0x0}, {0x0}, {&(0x7f0000011c00)="0b0000000c0001022e00000002000000f40702022e", 0x15, 0x10000}, {0x0}, {0x0}, {&(0x7f0000012400)="504d4d00504d4dffdbf4655f00000000647679756b6f762d676c6170746f70320000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000006c6f6f7033340075782f746573742f73797a5f6d6f756e745f696d6167655f650500"/123, 0x7b, 0x20000}, {0x0}, {0x0, 0x0, 0x38000}], 0x0, &(0x7f0000012f00)) [ 1545.255515] EXT4-fs (loop4): unmounting filesystem. 22:34:29 executing program 7: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000480)}}, 0x0, 0xffffffefffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x100000, 0xe, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000500100000f000000000000000100000005000000000004000040000020000000dbf4655fdbf4655f0100ffff53ef010001000000dbf4655f000000000000000001000000000000000b0000008000000018000000c20500002b0200"/116, 0x74, 0x400}, {&(0x7f0000010100)="000000000000000000000000244b8e9b57f04b59aa229cc218853f9501004000", 0x20, 0x4e0}, {&(0x7f0000010200)="010000000000050040", 0x9, 0x560}, {&(0x7f0000010300)="020000000300000004000000", 0xc, 0x800}, {0x0, 0x0, 0x1000}, {&(0x7f0000011500)="ed41000000080000dbf4655fdbf4655fdbf4655f00000000000004004000", 0x1e, 0x2080}, {0x0}, {0x0}, {&(0x7f0000011c00)="0b0000000c0001022e00000002000000f40702022e", 0x15, 0x10000}, {0x0}, {0x0}, {&(0x7f0000012400)="504d4d00504d4dffdbf4655f00000000647679756b6f762d676c6170746f70320000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000006c6f6f7033340075782f746573742f73797a5f6d6f756e745f696d6167655f650500"/123, 0x7b, 0x20000}, {0x0}, {0x0, 0x0, 0x38000}], 0x0, &(0x7f0000012f00)) [ 1545.268612] EXT4-fs (loop2): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 1545.269983] EXT4-fs (loop2): group descriptors corrupted! [ 1545.277102] EXT4-fs (loop7): unmounting filesystem. 22:34:29 executing program 0: perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000480)}}, 0x0, 0xffffffefffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0xc, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000500100000f000000000000000100000005000000000004000040000020000000dbf4655fdbf4655f0100ffff53ef010001000000dbf4655f000000000000000001000000000000000b0000008000000018000000c20500002b0200"/116, 0x74, 0x400}, {&(0x7f0000010200)="01000000000005", 0x7, 0x560}, {&(0x7f0000010300)="020000000300000004000000", 0xc, 0x800}, {&(0x7f0000010400), 0x0, 0x1000}, {&(0x7f0000011500)="ed41000000080000dbf4655fdbf4655f", 0x10, 0x2080}, {0x0}, {0x0}, {0x0, 0x0, 0x10000}, {0x0}, {0x0}, {0x0, 0x0, 0x20000}, {0x0}], 0x0, &(0x7f0000012f00)) [ 1545.485241] loop4: detected capacity change from 0 to 2048 [ 1545.496320] loop7: detected capacity change from 0 to 2048 [ 1545.518167] loop0: detected capacity change from 0 to 512 22:34:30 executing program 2: perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000480)}}, 0x0, 0xffffffefffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x100000, 0xe, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000500100000f000000000000000100000005000000000004000040000020000000dbf4655fdbf4655f0100ffff53ef010001000000dbf4655f000000000000000001000000000000000b0000008000000018000000c20500002b0200"/116, 0x74, 0x400}, {&(0x7f0000010100)="000000000000000000000000244b8e9b57f04b59aa229cc218853f9501004000", 0x20, 0x4e0}, {&(0x7f0000010200)="010000000000050040", 0x9, 0x560}, {&(0x7f0000010300), 0x0, 0x800}, {&(0x7f0000010400), 0x0, 0x1000}, {&(0x7f0000011500)="ed41000000080000dbf4655fdbf4655fdbf4655f00000000000004004000", 0x1e, 0x2080}, {0x0}, {0x0}, {&(0x7f0000011c00)="0b0000000c0001022e00000002000000f40702022e", 0x15, 0x10000}, {0x0}, {0x0}, {&(0x7f0000012400)="504d4d00504d4dffdbf4655f00000000647679756b6f762d676c6170746f70320000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000006c6f6f7033340075782f746573742f73797a5f6d6f756e745f696d6167655f650500"/123, 0x7b, 0x20000}, {0x0}, {0x0, 0x0, 0x38000}], 0x0, &(0x7f0000012f00)) [ 1545.546617] EXT4-fs (loop0): unsupported descriptor size 0 [ 1545.556810] EXT4-fs (loop4): mounted filesystem without journal. Quota mode: none. [ 1545.563709] EXT4-fs (loop7): mounted filesystem without journal. Quota mode: none. [ 1545.566873] ext4 filesystem being mounted at /syzkaller-testdir967783826/syzkaller.dhcxYf/178/file0 supports timestamps until 2038 (0x7fffffff) [ 1545.571814] ext4 filesystem being mounted at /syzkaller-testdir391614100/syzkaller.1GCODk/183/file0 supports timestamps until 2038 (0x7fffffff) 22:34:30 executing program 0: perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000480)}}, 0x0, 0xffffffefffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0xc, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000500100000f000000000000000100000005000000000004000040000020000000dbf4655fdbf4655f0100ffff53ef010001000000dbf4655f000000000000000001000000000000000b0000008000000018000000c20500002b0200"/116, 0x74, 0x400}, {&(0x7f0000010200)="01000000000005", 0x7, 0x560}, {&(0x7f0000010300)="020000000300000004000000", 0xc, 0x800}, {&(0x7f0000010400), 0x0, 0x1000}, {&(0x7f0000011500)="ed41000000080000dbf4655fdbf4655f", 0x10, 0x2080}, {0x0}, {0x0}, {0x0, 0x0, 0x10000}, {0x0}, {0x0}, {0x0, 0x0, 0x20000}, {0x0}], 0x0, &(0x7f0000012f00)) [ 1545.665028] loop0: detected capacity change from 0 to 512 22:34:30 executing program 4: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000480)}}, 0x0, 0xffffffefffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x100000, 0xe, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000500100000f000000000000000100000005000000000004000040000020000000dbf4655fdbf4655f0100ffff53ef010001000000dbf4655f000000000000000001000000000000000b0000008000000018000000c20500002b0200"/116, 0x74, 0x400}, {&(0x7f0000010100)="000000000000000000000000244b8e9b57f04b59aa229cc218853f9501004000", 0x20, 0x4e0}, {&(0x7f0000010200)="010000000000050040", 0x9, 0x560}, {&(0x7f0000010300)="020000000300000004000000", 0xc, 0x800}, {0x0, 0x0, 0x1000}, {&(0x7f0000011500)="ed41000000080000dbf4655fdbf4655fdbf4655f00000000000004004000", 0x1e, 0x2080}, {0x0}, {0x0}, {&(0x7f0000011c00)="0b0000000c0001022e00000002000000f40702022e", 0x15, 0x10000}, {0x0}, {0x0}, {&(0x7f0000012400)="504d4d00504d4dffdbf4655f00000000647679756b6f762d676c6170746f70320000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000006c6f6f7033340075782f746573742f73797a5f6d6f756e745f696d6167655f650500"/123, 0x7b, 0x20000}, {0x0}, {0x0, 0x0, 0x38000}], 0x0, &(0x7f0000012f00)) [ 1545.681993] EXT4-fs (loop0): unsupported descriptor size 0 [ 1545.685888] EXT4-fs (loop4): unmounting filesystem. [ 1545.726570] EXT4-fs (loop7): unmounting filesystem. [ 1545.741394] loop2: detected capacity change from 0 to 2048 [ 1545.787825] EXT4-fs (loop2): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 1545.789166] EXT4-fs (loop2): group descriptors corrupted! [ 1545.842614] loop4: detected capacity change from 0 to 2048 [ 1545.899975] EXT4-fs (loop4): mounted filesystem without journal. Quota mode: none. [ 1545.914924] ext4 filesystem being mounted at /syzkaller-testdir967783826/syzkaller.dhcxYf/179/file0 supports timestamps until 2038 (0x7fffffff) [ 1545.993168] EXT4-fs (loop4): unmounting filesystem. 22:34:46 executing program 0: perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000480)}}, 0x0, 0xffffffefffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0xd, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000500100000f000000000000000100000005000000000004000040000020000000dbf4655fdbf4655f0100ffff53ef010001000000dbf4655f000000000000000001000000000000000b0000008000000018000000c20500002b0200"/116, 0x74, 0x400}, {0x0, 0x0, 0x4e0}, {&(0x7f0000010200)="01000000000005", 0x7, 0x560}, {&(0x7f0000010300)="020000000300000004000000", 0xc, 0x800}, {&(0x7f0000010400), 0x0, 0x1000}, {&(0x7f0000011500)="ed41000000080000dbf4655fdbf4655f", 0x10, 0x2080}, {0x0}, {0x0}, {0x0, 0x0, 0x10000}, {0x0}, {0x0}, {0x0, 0x0, 0x20000}, {0x0}], 0x0, &(0x7f0000012f00)) 22:34:46 executing program 7: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000480)}}, 0x0, 0xffffffefffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x100000, 0xe, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000500100000f000000000000000100000005000000000004000040000020000000dbf4655fdbf4655f0100ffff53ef010001000000dbf4655f000000000000000001000000000000000b0000008000000018000000c20500002b0200"/116, 0x74, 0x400}, {&(0x7f0000010100)="000000000000000000000000244b8e9b57f04b59aa229cc218853f9501004000", 0x20, 0x4e0}, {&(0x7f0000010200)="010000000000050040", 0x9, 0x560}, {&(0x7f0000010300)="020000000300000004000000", 0xc, 0x800}, {&(0x7f0000010400)}, {&(0x7f0000011500)="ed41000000080000dbf4655fdbf4655fdbf4655f00000000000004004000", 0x1e, 0x2080}, {0x0}, {0x0}, {&(0x7f0000011c00)="0b0000000c0001022e00000002000000f40702022e", 0x15, 0x10000}, {0x0}, {0x0}, {&(0x7f0000012400)="504d4d00504d4dffdbf4655f00000000647679756b6f762d676c6170746f70320000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000006c6f6f7033340075782f746573742f73797a5f6d6f756e745f696d6167655f650500"/123, 0x7b, 0x20000}, {0x0}, {0x0, 0x0, 0x38000}], 0x0, &(0x7f0000012f00)) 22:34:46 executing program 2: perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000480)}}, 0x0, 0xffffffefffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x100000, 0xe, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000500100000f000000000000000100000005000000000004000040000020000000dbf4655fdbf4655f0100ffff53ef010001000000dbf4655f000000000000000001000000000000000b0000008000000018000000c20500002b0200"/116, 0x74, 0x400}, {&(0x7f0000010100)="000000000000000000000000244b8e9b57f04b59aa229cc218853f9501004000", 0x20, 0x4e0}, {&(0x7f0000010200)="010000000000050040", 0x9, 0x560}, {&(0x7f0000010300), 0x0, 0x800}, {&(0x7f0000010400), 0x0, 0x1000}, {&(0x7f0000011500)="ed41000000080000dbf4655fdbf4655fdbf4655f00000000000004004000", 0x1e, 0x2080}, {0x0}, {0x0}, {&(0x7f0000011c00)="0b0000000c0001022e00000002000000f40702022e", 0x15, 0x10000}, {0x0}, {0x0}, {&(0x7f0000012400)="504d4d00504d4dffdbf4655f00000000647679756b6f762d676c6170746f70320000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000006c6f6f7033340075782f746573742f73797a5f6d6f756e745f696d6167655f650500"/123, 0x7b, 0x20000}, {0x0}, {0x0, 0x0, 0x38000}], 0x0, &(0x7f0000012f00)) 22:34:46 executing program 5: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) lsetxattr$security_evm(&(0x7f0000000240)='.\x00', &(0x7f0000000300), &(0x7f00000003c0)=@sha1={0x1, "bd2b5bce8b74aea700654a682479ac2c0852bc4d"}, 0x15, 0x3) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={&(0x7f0000000040), 0xb}, 0x0, 0x20, 0x0, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) r0 = fork() r1 = syz_open_procfs(r0, &(0x7f0000000000)='status\x00') r2 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x2, 0x0) pwrite64(0xffffffffffffffff, &(0x7f00000000c0)='9', 0x1, 0x8040000) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x20, 0x3, 0x4, 0x1, 0x0, 0x8, 0x20620, 0x2, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x3f, 0x2, @perf_config_ext={0x240000000, 0x5}, 0x1400, 0x4, 0x8, 0x7, 0x9, 0x6, 0x6, 0x0, 0x1, 0x0, 0x8}, r0, 0xa, r2, 0x1) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r3, 0x6, 0x1e, &(0x7f0000000040)=0x1, 0x4) connect$inet6(r3, &(0x7f0000000080)={0xa, 0x0, 0x0, @loopback}, 0x1c) openat$cgroup_ro(r1, &(0x7f0000000180)='blkio.throttle.io_serviced_recursive\x00', 0x0, 0x0) 22:34:46 executing program 6: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) lsetxattr$security_evm(&(0x7f0000000240)='.\x00', &(0x7f0000000300), &(0x7f00000003c0)=@sha1={0x1, "bd2b5bce8b74aea700654a682479ac2c0852bc4d"}, 0x15, 0x3) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={&(0x7f0000000040), 0xb}, 0x0, 0x20, 0x0, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) r0 = fork() r1 = syz_open_procfs(r0, &(0x7f0000000000)='status\x00') r2 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x2, 0x0) pwrite64(r2, 0x0, 0x0, 0x8040000) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x20, 0x3, 0x4, 0x1, 0x0, 0x8, 0x20620, 0x2, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x3f, 0x2, @perf_config_ext={0x240000000, 0x5}, 0x1400, 0x4, 0x8, 0x7, 0x9, 0x6, 0x6, 0x0, 0x1, 0x0, 0x8}, r0, 0xa, r2, 0x1) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r3, 0x6, 0x1e, &(0x7f0000000040)=0x1, 0x4) setsockopt$inet6_tcp_TCP_REPAIR(r3, 0x6, 0x13, &(0x7f00000018c0)=0x1, 0x4) connect$inet6(r3, &(0x7f0000000080)={0xa, 0x0, 0x0, @loopback}, 0x1c) openat$cgroup_ro(r1, &(0x7f0000000180)='blkio.throttle.io_serviced_recursive\x00', 0x0, 0x0) 22:34:46 executing program 3: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) lsetxattr$security_evm(&(0x7f0000000240)='.\x00', &(0x7f0000000300), &(0x7f00000003c0)=@sha1={0x1, "bd2b5bce8b74aea700654a682479ac2c0852bc4d"}, 0x15, 0x3) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={&(0x7f0000000040), 0xb}, 0x0, 0x20, 0x0, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) r0 = fork() r1 = syz_open_procfs(r0, &(0x7f0000000000)='status\x00') r2 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x2, 0x0) pwrite64(r2, &(0x7f00000000c0)='9', 0x1, 0x8040000) perf_event_open(0x0, r0, 0xa, r2, 0x1) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r3, 0x6, 0x1e, &(0x7f0000000040)=0x1, 0x4) setsockopt$inet6_tcp_TCP_REPAIR(r3, 0x6, 0x13, &(0x7f00000018c0)=0x1, 0x4) connect$inet6(r3, &(0x7f0000000080)={0xa, 0x0, 0x0, @loopback}, 0x1c) openat$cgroup_ro(r1, &(0x7f0000000180)='blkio.throttle.io_serviced_recursive\x00', 0x0, 0x0) 22:34:46 executing program 4: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000480)}}, 0x0, 0xffffffefffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x100000, 0xe, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000500100000f000000000000000100000005000000000004000040000020000000dbf4655fdbf4655f0100ffff53ef010001000000dbf4655f000000000000000001000000000000000b0000008000000018000000c20500002b0200"/116, 0x74, 0x400}, {&(0x7f0000010100)="000000000000000000000000244b8e9b57f04b59aa229cc218853f9501004000", 0x20, 0x4e0}, {&(0x7f0000010200)="010000000000050040", 0x9, 0x560}, {&(0x7f0000010300)="020000000300000004000000", 0xc, 0x800}, {0x0, 0x0, 0x1000}, {&(0x7f0000011500)="ed41000000080000dbf4655fdbf4655fdbf4655f00000000000004004000", 0x1e, 0x2080}, {0x0}, {0x0}, {&(0x7f0000011c00)="0b0000000c0001022e00000002000000f40702022e", 0x15, 0x10000}, {0x0}, {0x0}, {&(0x7f0000012400)="504d4d00504d4dffdbf4655f00000000647679756b6f762d676c6170746f70320000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000006c6f6f7033340075782f746573742f73797a5f6d6f756e745f696d6167655f650500"/123, 0x7b, 0x20000}, {0x0}, {0x0, 0x0, 0x38000}], 0x0, &(0x7f0000012f00)) 22:34:46 executing program 1: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, @perf_config_ext, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000000), 0x0) r1 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) ioctl$EXT4_IOC_CHECKPOINT(r1, 0x4004662b, &(0x7f0000000100)=0x5) ioctl$AUTOFS_DEV_IOCTL_TIMEOUT(0xffffffffffffffff, 0xc018937a, &(0x7f0000001480)=ANY=[@ANYBLOB="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", @ANYRES32=0xffffffffffffffff, @ANYBLOB="01040000000000002e2f66696c653000"]) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r2, 0xc08c5332, &(0x7f00000013c0)={0xffffffff, 0x6964, 0x0, 'queue1\x00', 0xff}) r3 = gettid() process_vm_writev(r3, &(0x7f0000002580)=[{&(0x7f0000000140)=""/89, 0x59}, {&(0x7f00000001c0)=""/175, 0xaf}, {&(0x7f0000000280)=""/4096, 0x1000}], 0x3, &(0x7f0000003840)=[{&(0x7f0000002640)=""/105, 0x69}, {0xfffffffffffffffe, 0x10}], 0x2, 0x0) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r0, 0xc08c5332, &(0x7f0000001280)={0x3, 0x5, 0x0, 'queue1\x00', 0x8}) r4 = fork() write$sndseq(r0, &(0x7f0000001340)=[{0x22, 0x8, 0x2, 0x3, @time={0x4}, {0x0, 0x1}, {0x6, 0x81}, @raw32={[0x800, 0x3, 0x9]}}, {0xe1, 0x7, 0xf8, 0xff, @tick=0x2, {0x3f}, {0x4, 0xf1}, @queue={0xff, {0x6, 0x9}}}, {0x4, 0x1, 0x9, 0x5, @time={0x7, 0x6}, {0x7c, 0x2}, {0x20, 0x6}, @connect={{0x0, 0xfd}, {0x98, 0x4}}}, {0x80, 0x4, 0x7, 0x7d, @time={0xfffff000, 0x9}, {0x81, 0x1f}, {0xaa}, @queue={0x5, {0xffffffe0, 0x3}}}], 0x70) r5 = syz_open_dev$vcsn(&(0x7f0000000040), 0x3, 0x2001) ioctl$LOOP_CTL_GET_FREE(r5, 0x4c82) ptrace$setopts(0x4206, r4, 0x0, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fork() fork() clone3(&(0x7f0000004c00)={0xc0002100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) [ 1562.153619] loop0: detected capacity change from 0 to 512 [ 1562.165111] EXT4-fs (loop0): unsupported descriptor size 0 [ 1562.188280] loop7: detected capacity change from 0 to 2048 [ 1562.197199] loop2: detected capacity change from 0 to 2048 [ 1562.200089] loop4: detected capacity change from 0 to 2048 22:34:46 executing program 0: perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000480)}}, 0x0, 0xffffffefffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0xd, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000500100000f000000000000000100000005000000000004000040000020000000dbf4655fdbf4655f0100ffff53ef010001000000dbf4655f000000000000000001000000000000000b0000008000000018000000c20500002b0200"/116, 0x74, 0x400}, {0x0, 0x0, 0x4e0}, {&(0x7f0000010200)="01000000000005", 0x7, 0x560}, {&(0x7f0000010300)="020000000300000004000000", 0xc, 0x800}, {&(0x7f0000010400), 0x0, 0x1000}, {&(0x7f0000011500)="ed41000000080000dbf4655fdbf4655f", 0x10, 0x2080}, {0x0}, {0x0}, {0x0, 0x0, 0x10000}, {0x0}, {0x0}, {0x0, 0x0, 0x20000}, {0x0}], 0x0, &(0x7f0000012f00)) [ 1562.232851] loop0: detected capacity change from 0 to 512 [ 1562.238989] EXT4-fs (loop0): unsupported descriptor size 0 [ 1562.242168] EXT4-fs (loop2): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 1562.243057] EXT4-fs (loop2): group descriptors corrupted! [ 1562.266742] EXT4-fs (loop4): mounted filesystem without journal. Quota mode: none. [ 1562.268311] ext4 filesystem being mounted at /syzkaller-testdir967783826/syzkaller.dhcxYf/180/file0 supports timestamps until 2038 (0x7fffffff) [ 1562.305199] EXT4-fs (loop7): mounted filesystem without journal. Quota mode: none. 22:34:46 executing program 0: perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000480)}}, 0x0, 0xffffffefffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0xd, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000500100000f000000000000000100000005000000000004000040000020000000dbf4655fdbf4655f0100ffff53ef010001000000dbf4655f000000000000000001000000000000000b0000008000000018000000c20500002b0200"/116, 0x74, 0x400}, {0x0, 0x0, 0x4e0}, {&(0x7f0000010200)="01000000000005", 0x7, 0x560}, {&(0x7f0000010300)="020000000300000004000000", 0xc, 0x800}, {&(0x7f0000010400), 0x0, 0x1000}, {&(0x7f0000011500)="ed41000000080000dbf4655fdbf4655f", 0x10, 0x2080}, {0x0}, {0x0}, {0x0, 0x0, 0x10000}, {0x0}, {0x0}, {0x0, 0x0, 0x20000}, {0x0}], 0x0, &(0x7f0000012f00)) [ 1562.319962] ext4 filesystem being mounted at /syzkaller-testdir391614100/syzkaller.1GCODk/184/file0 supports timestamps until 2038 (0x7fffffff) [ 1562.335099] EXT4-fs (loop4): unmounting filesystem. 22:34:46 executing program 4: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000480)}}, 0x0, 0xffffffefffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x100000, 0xe, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000500100000f000000000000000100000005000000000004000040000020000000dbf4655fdbf4655f0100ffff53ef010001000000dbf4655f000000000000000001000000000000000b0000008000000018000000c20500002b0200"/116, 0x74, 0x400}, {&(0x7f0000010100)="000000000000000000000000244b8e9b57f04b59aa229cc218853f9501004000", 0x20, 0x4e0}, {&(0x7f0000010200)="010000000000050040", 0x9, 0x560}, {&(0x7f0000010300)="020000000300000004000000", 0xc, 0x800}, {&(0x7f0000010400)}, {&(0x7f0000011500)="ed41000000080000dbf4655fdbf4655fdbf4655f00000000000004004000", 0x1e, 0x2080}, {0x0}, {0x0}, {&(0x7f0000011c00)="0b0000000c0001022e00000002000000f40702022e", 0x15, 0x10000}, {0x0}, {0x0}, {&(0x7f0000012400)="504d4d00504d4dffdbf4655f00000000647679756b6f762d676c6170746f70320000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000006c6f6f7033340075782f746573742f73797a5f6d6f756e745f696d6167655f650500"/123, 0x7b, 0x20000}, {0x0}, {0x0, 0x0, 0x38000}], 0x0, &(0x7f0000012f00)) 22:34:46 executing program 2: perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000480)}}, 0x0, 0xffffffefffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x100000, 0xe, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000500100000f000000000000000100000005000000000004000040000020000000dbf4655fdbf4655f0100ffff53ef010001000000dbf4655f000000000000000001000000000000000b0000008000000018000000c20500002b0200"/116, 0x74, 0x400}, {&(0x7f0000010100)="000000000000000000000000244b8e9b57f04b59aa229cc218853f9501004000", 0x20, 0x4e0}, {&(0x7f0000010200)="010000000000050040", 0x9, 0x560}, {&(0x7f0000010300), 0x0, 0x800}, {&(0x7f0000010400), 0x0, 0x1000}, {&(0x7f0000011500)="ed41000000080000dbf4655fdbf4655fdbf4655f00000000000004004000", 0x1e, 0x2080}, {0x0}, {0x0}, {&(0x7f0000011c00)="0b0000000c0001022e00000002000000f40702022e", 0x15, 0x10000}, {0x0}, {0x0}, {&(0x7f0000012400)="504d4d00504d4dffdbf4655f00000000647679756b6f762d676c6170746f70320000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000006c6f6f7033340075782f746573742f73797a5f6d6f756e745f696d6167655f650500"/123, 0x7b, 0x20000}, {0x0}, {0x0, 0x0, 0x38000}], 0x0, &(0x7f0000012f00)) [ 1562.402242] loop0: detected capacity change from 0 to 512 [ 1562.423871] EXT4-fs (loop0): unsupported descriptor size 0 [ 1562.427822] loop4: detected capacity change from 0 to 2048 [ 1562.467125] EXT4-fs (loop4): mounted filesystem without journal. Quota mode: none. [ 1562.468802] ext4 filesystem being mounted at /syzkaller-testdir967783826/syzkaller.dhcxYf/181/file0 supports timestamps until 2038 (0x7fffffff) 22:34:47 executing program 0: perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000480)}}, 0x0, 0xffffffefffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0xd, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000500100000f000000000000000100000005000000000004000040000020000000dbf4655fdbf4655f0100ffff53ef010001000000dbf4655f000000000000000001000000000000000b0000008000000018000000c20500002b0200"/116, 0x74, 0x400}, {&(0x7f0000010100), 0x0, 0x4e0}, {&(0x7f0000010200)="01000000000005", 0x7, 0x560}, {&(0x7f0000010300)="020000000300000004000000", 0xc, 0x800}, {&(0x7f0000010400), 0x0, 0x1000}, {&(0x7f0000011500)="ed41000000080000dbf4655fdbf4655f", 0x10, 0x2080}, {0x0}, {0x0}, {0x0, 0x0, 0x10000}, {0x0}, {0x0}, {0x0, 0x0, 0x20000}, {0x0}], 0x0, &(0x7f0000012f00)) [ 1562.510372] EXT4-fs (loop7): unmounting filesystem. 22:34:47 executing program 7: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000480)}}, 0x0, 0xffffffefffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x100000, 0xe, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000500100000f000000000000000100000005000000000004000040000020000000dbf4655fdbf4655f0100ffff53ef010001000000dbf4655f000000000000000001000000000000000b0000008000000018000000c20500002b0200"/116, 0x74, 0x400}, {&(0x7f0000010100)="000000000000000000000000244b8e9b57f04b59aa229cc218853f9501004000", 0x20, 0x4e0}, {&(0x7f0000010200)="010000000000050040", 0x9, 0x560}, {&(0x7f0000010300)="020000000300000004000000", 0xc, 0x800}, {&(0x7f0000010400)}, {&(0x7f0000011500)="ed41000000080000dbf4655fdbf4655fdbf4655f00000000000004004000", 0x1e, 0x2080}, {0x0}, {0x0}, {&(0x7f0000011c00)="0b0000000c0001022e00000002000000f40702022e", 0x15, 0x10000}, {0x0}, {0x0}, {&(0x7f0000012400)="504d4d00504d4dffdbf4655f00000000647679756b6f762d676c6170746f70320000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000006c6f6f7033340075782f746573742f73797a5f6d6f756e745f696d6167655f650500"/123, 0x7b, 0x20000}, {0x0}, {0x0, 0x0, 0x38000}], 0x0, &(0x7f0000012f00)) 22:34:47 executing program 4: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000480)}}, 0x0, 0xffffffefffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x100000, 0xe, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000500100000f000000000000000100000005000000000004000040000020000000dbf4655fdbf4655f0100ffff53ef010001000000dbf4655f000000000000000001000000000000000b0000008000000018000000c20500002b0200"/116, 0x74, 0x400}, {&(0x7f0000010100)="000000000000000000000000244b8e9b57f04b59aa229cc218853f9501004000", 0x20, 0x4e0}, {&(0x7f0000010200)="010000000000050040", 0x9, 0x560}, {&(0x7f0000010300)="020000000300000004000000", 0xc, 0x800}, {&(0x7f0000010400)}, {&(0x7f0000011500)="ed41000000080000dbf4655fdbf4655fdbf4655f00000000000004004000", 0x1e, 0x2080}, {0x0}, {0x0}, {&(0x7f0000011c00)="0b0000000c0001022e00000002000000f40702022e", 0x15, 0x10000}, {0x0}, {0x0}, {&(0x7f0000012400)="504d4d00504d4dffdbf4655f00000000647679756b6f762d676c6170746f70320000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000006c6f6f7033340075782f746573742f73797a5f6d6f756e745f696d6167655f650500"/123, 0x7b, 0x20000}, {0x0}, {0x0, 0x0, 0x38000}], 0x0, &(0x7f0000012f00)) [ 1562.519079] EXT4-fs (loop4): unmounting filesystem. [ 1562.547010] loop0: detected capacity change from 0 to 512 [ 1562.556235] EXT4-fs (loop0): unsupported descriptor size 0 [ 1562.585193] loop2: detected capacity change from 0 to 2048 22:34:47 executing program 5: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) lsetxattr$security_evm(&(0x7f0000000240)='.\x00', &(0x7f0000000300), &(0x7f00000003c0)=@sha1={0x1, "bd2b5bce8b74aea700654a682479ac2c0852bc4d"}, 0x15, 0x3) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={&(0x7f0000000040), 0xb}, 0x0, 0x20, 0x0, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) r0 = fork() r1 = syz_open_procfs(r0, &(0x7f0000000000)='status\x00') r2 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x2, 0x0) pwrite64(0xffffffffffffffff, &(0x7f00000000c0)='9', 0x1, 0x8040000) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x20, 0x3, 0x4, 0x1, 0x0, 0x8, 0x20620, 0x2, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x3f, 0x2, @perf_config_ext={0x240000000, 0x5}, 0x1400, 0x4, 0x8, 0x7, 0x9, 0x6, 0x6, 0x0, 0x1, 0x0, 0x8}, r0, 0xa, r2, 0x1) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r3, 0x6, 0x1e, &(0x7f0000000040)=0x1, 0x4) connect$inet6(r3, &(0x7f0000000080)={0xa, 0x0, 0x0, @loopback}, 0x1c) openat$cgroup_ro(r1, &(0x7f0000000180)='blkio.throttle.io_serviced_recursive\x00', 0x0, 0x0) 22:34:47 executing program 3: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) lsetxattr$security_evm(&(0x7f0000000240)='.\x00', &(0x7f0000000300), &(0x7f00000003c0)=@sha1={0x1, "bd2b5bce8b74aea700654a682479ac2c0852bc4d"}, 0x15, 0x3) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={&(0x7f0000000040), 0xb}, 0x0, 0x20, 0x0, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) r0 = fork() r1 = syz_open_procfs(r0, &(0x7f0000000000)='status\x00') r2 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x2, 0x0) pwrite64(r2, &(0x7f00000000c0)='9', 0x1, 0x8040000) perf_event_open(0x0, r0, 0xa, r2, 0x1) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r3, 0x6, 0x1e, &(0x7f0000000040)=0x1, 0x4) setsockopt$inet6_tcp_TCP_REPAIR(r3, 0x6, 0x13, &(0x7f00000018c0)=0x1, 0x4) connect$inet6(r3, &(0x7f0000000080)={0xa, 0x0, 0x0, @loopback}, 0x1c) openat$cgroup_ro(r1, &(0x7f0000000180)='blkio.throttle.io_serviced_recursive\x00', 0x0, 0x0) [ 1562.622244] EXT4-fs (loop2): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 1562.623842] EXT4-fs (loop2): group descriptors corrupted! [ 1562.694095] loop4: detected capacity change from 0 to 2048 [ 1562.700134] loop7: detected capacity change from 0 to 2048 [ 1562.763872] EXT4-fs (loop7): mounted filesystem without journal. Quota mode: none. [ 1562.770451] EXT4-fs (loop4): mounted filesystem without journal. Quota mode: none. [ 1562.774258] ext4 filesystem being mounted at /syzkaller-testdir391614100/syzkaller.1GCODk/185/file0 supports timestamps until 2038 (0x7fffffff) [ 1562.780100] ext4 filesystem being mounted at /syzkaller-testdir967783826/syzkaller.dhcxYf/182/file0 supports timestamps until 2038 (0x7fffffff) [ 1562.827938] EXT4-fs (loop4): unmounting filesystem. [ 1562.835922] EXT4-fs (loop7): unmounting filesystem. [ 1578.668318] loop7: detected capacity change from 0 to 2048 22:35:03 executing program 5: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) lsetxattr$security_evm(&(0x7f0000000240)='.\x00', &(0x7f0000000300), &(0x7f00000003c0)=@sha1={0x1, "bd2b5bce8b74aea700654a682479ac2c0852bc4d"}, 0x15, 0x3) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={&(0x7f0000000040), 0xb}, 0x0, 0x20, 0x0, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) r0 = fork() r1 = syz_open_procfs(r0, &(0x7f0000000000)='status\x00') r2 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x2, 0x0) pwrite64(0xffffffffffffffff, &(0x7f00000000c0)='9', 0x1, 0x8040000) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x20, 0x3, 0x4, 0x1, 0x0, 0x8, 0x20620, 0x2, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x3f, 0x2, @perf_config_ext={0x240000000, 0x5}, 0x1400, 0x4, 0x8, 0x7, 0x9, 0x6, 0x6, 0x0, 0x1, 0x0, 0x8}, r0, 0xa, r2, 0x1) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r3, 0x6, 0x1e, &(0x7f0000000040)=0x1, 0x4) connect$inet6(r3, &(0x7f0000000080)={0xa, 0x0, 0x0, @loopback}, 0x1c) openat$cgroup_ro(r1, &(0x7f0000000180)='blkio.throttle.io_serviced_recursive\x00', 0x0, 0x0) 22:35:03 executing program 6: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) lsetxattr$security_evm(&(0x7f0000000240)='.\x00', &(0x7f0000000300), &(0x7f00000003c0)=@sha1={0x1, "bd2b5bce8b74aea700654a682479ac2c0852bc4d"}, 0x15, 0x3) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={&(0x7f0000000040), 0xb}, 0x0, 0x20, 0x0, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) r0 = fork() r1 = syz_open_procfs(r0, &(0x7f0000000000)='status\x00') r2 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x2, 0x0) pwrite64(r2, &(0x7f00000000c0), 0x0, 0x8040000) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x20, 0x3, 0x4, 0x1, 0x0, 0x8, 0x20620, 0x2, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x3f, 0x2, @perf_config_ext={0x240000000, 0x5}, 0x1400, 0x4, 0x8, 0x7, 0x9, 0x6, 0x6, 0x0, 0x1, 0x0, 0x8}, r0, 0xa, r2, 0x1) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r3, 0x6, 0x1e, &(0x7f0000000040)=0x1, 0x4) setsockopt$inet6_tcp_TCP_REPAIR(r3, 0x6, 0x13, &(0x7f00000018c0)=0x1, 0x4) connect$inet6(r3, &(0x7f0000000080)={0xa, 0x0, 0x0, @loopback}, 0x1c) openat$cgroup_ro(r1, &(0x7f0000000180)='blkio.throttle.io_serviced_recursive\x00', 0x0, 0x0) 22:35:03 executing program 3: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) lsetxattr$security_evm(&(0x7f0000000240)='.\x00', &(0x7f0000000300), &(0x7f00000003c0)=@sha1={0x1, "bd2b5bce8b74aea700654a682479ac2c0852bc4d"}, 0x15, 0x3) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={&(0x7f0000000040), 0xb}, 0x0, 0x20, 0x0, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) r0 = fork() r1 = syz_open_procfs(r0, &(0x7f0000000000)='status\x00') r2 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x2, 0x0) pwrite64(r2, &(0x7f00000000c0)='9', 0x1, 0x8040000) perf_event_open(0x0, r0, 0xa, r2, 0x1) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r3, 0x6, 0x1e, &(0x7f0000000040)=0x1, 0x4) setsockopt$inet6_tcp_TCP_REPAIR(r3, 0x6, 0x13, &(0x7f00000018c0)=0x1, 0x4) connect$inet6(r3, &(0x7f0000000080)={0xa, 0x0, 0x0, @loopback}, 0x1c) openat$cgroup_ro(r1, &(0x7f0000000180)='blkio.throttle.io_serviced_recursive\x00', 0x0, 0x0) 22:35:03 executing program 2: perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000480)}}, 0x0, 0xffffffefffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x100000, 0xe, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000500100000f000000000000000100000005000000000004000040000020000000dbf4655fdbf4655f0100ffff53ef010001000000dbf4655f000000000000000001000000000000000b0000008000000018000000c20500002b0200"/116, 0x74, 0x400}, {&(0x7f0000010100)="000000000000000000000000244b8e9b57f04b59aa229cc218853f9501004000", 0x20, 0x4e0}, {&(0x7f0000010200)="010000000000050040", 0x9, 0x560}, {&(0x7f0000010300)="020000000300", 0x6, 0x800}, {&(0x7f0000010400), 0x0, 0x1000}, {&(0x7f0000011500)="ed41000000080000dbf4655fdbf4655fdbf4655f00000000000004004000", 0x1e, 0x2080}, {0x0}, {0x0}, {&(0x7f0000011c00)="0b0000000c0001022e00000002000000f40702022e", 0x15, 0x10000}, {0x0}, {0x0}, {&(0x7f0000012400)="504d4d00504d4dffdbf4655f00000000647679756b6f762d676c6170746f70320000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000006c6f6f7033340075782f746573742f73797a5f6d6f756e745f696d6167655f650500"/123, 0x7b, 0x20000}, {0x0}, {0x0, 0x0, 0x38000}], 0x0, &(0x7f0000012f00)) 22:35:03 executing program 0: perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000480)}}, 0x0, 0xffffffefffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0xd, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000500100000f000000000000000100000005000000000004000040000020000000dbf4655fdbf4655f0100ffff53ef010001000000dbf4655f000000000000000001000000000000000b0000008000000018000000c20500002b0200"/116, 0x74, 0x400}, {&(0x7f0000010100), 0x0, 0x4e0}, {&(0x7f0000010200)="01000000000005", 0x7, 0x560}, {&(0x7f0000010300)="020000000300000004000000", 0xc, 0x800}, {&(0x7f0000010400), 0x0, 0x1000}, {&(0x7f0000011500)="ed41000000080000dbf4655fdbf4655f", 0x10, 0x2080}, {0x0}, {0x0}, {0x0, 0x0, 0x10000}, {0x0}, {0x0}, {0x0, 0x0, 0x20000}, {0x0}], 0x0, &(0x7f0000012f00)) 22:35:03 executing program 1: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, @perf_config_ext, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000000), 0x0) r1 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) ioctl$EXT4_IOC_CHECKPOINT(r1, 0x4004662b, &(0x7f0000000100)=0x5) ioctl$AUTOFS_DEV_IOCTL_TIMEOUT(0xffffffffffffffff, 0xc018937a, &(0x7f0000001480)=ANY=[@ANYBLOB="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", @ANYRES32=0xffffffffffffffff, @ANYBLOB="01040000000000002e2f66696c653000"]) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r2, 0xc08c5332, &(0x7f00000013c0)={0xffffffff, 0x6964, 0x0, 'queue1\x00', 0xff}) r3 = gettid() process_vm_writev(r3, &(0x7f0000002580)=[{&(0x7f0000000140)=""/89, 0x59}, {&(0x7f00000001c0)=""/175, 0xaf}, {&(0x7f0000000280)=""/4096, 0x1000}], 0x3, &(0x7f0000003840)=[{&(0x7f0000002640)=""/105, 0x69}, {0xfffffffffffffffe, 0x10}], 0x2, 0x0) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r0, 0xc08c5332, &(0x7f0000001280)={0x3, 0x5, 0x0, 'queue1\x00', 0x8}) r4 = fork() write$sndseq(r0, &(0x7f0000001340)=[{0x22, 0x8, 0x2, 0x3, @time={0x4}, {0x0, 0x1}, {0x6, 0x81}, @raw32={[0x800, 0x3, 0x9]}}, {0xe1, 0x7, 0xf8, 0xff, @tick=0x2, {0x3f}, {0x4, 0xf1}, @queue={0xff, {0x6, 0x9}}}, {0x4, 0x1, 0x9, 0x5, @time={0x7, 0x6}, {0x7c, 0x2}, {0x20, 0x6}, @connect={{0x0, 0xfd}, {0x98, 0x4}}}, {0x80, 0x4, 0x7, 0x7d, @time={0xfffff000, 0x9}, {0x81, 0x1f}, {0xaa}, @queue={0x5, {0xffffffe0, 0x3}}}], 0x70) r5 = syz_open_dev$vcsn(&(0x7f0000000040), 0x3, 0x2001) ioctl$LOOP_CTL_GET_FREE(r5, 0x4c82) ptrace$setopts(0x4206, r4, 0x0, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fork() fork() clone3(&(0x7f0000004c00)={0xc0002100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) 22:35:03 executing program 4: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000480)}}, 0x0, 0xffffffefffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x100000, 0xe, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000500100000f000000000000000100000005000000000004000040000020000000dbf4655fdbf4655f0100ffff53ef010001000000dbf4655f000000000000000001000000000000000b0000008000000018000000c20500002b0200"/116, 0x74, 0x400}, {&(0x7f0000010100)="000000000000000000000000244b8e9b57f04b59aa229cc218853f9501004000", 0x20, 0x4e0}, {&(0x7f0000010200)="010000000000050040", 0x9, 0x560}, {&(0x7f0000010300)="020000000300000004000000", 0xc, 0x800}, {&(0x7f0000010400)}, {&(0x7f0000011500)="ed41000000080000dbf4655fdbf4655fdbf4655f00000000000004004000", 0x1e, 0x2080}, {0x0}, {0x0}, {&(0x7f0000011c00)="0b0000000c0001022e00000002000000f40702022e", 0x15, 0x10000}, {0x0}, {0x0}, {&(0x7f0000012400)="504d4d00504d4dffdbf4655f00000000647679756b6f762d676c6170746f70320000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000006c6f6f7033340075782f746573742f73797a5f6d6f756e745f696d6167655f650500"/123, 0x7b, 0x20000}, {0x0}, {0x0, 0x0, 0x38000}], 0x0, &(0x7f0000012f00)) 22:35:03 executing program 7: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000480)}}, 0x0, 0xffffffefffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x100000, 0xe, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000500100000f000000000000000100000005000000000004000040000020000000dbf4655fdbf4655f0100ffff53ef010001000000dbf4655f000000000000000001000000000000000b0000008000000018000000c20500002b0200"/116, 0x74, 0x400}, {&(0x7f0000010100)="000000000000000000000000244b8e9b57f04b59aa229cc218853f9501004000", 0x20, 0x4e0}, {&(0x7f0000010200)="010000000000050040", 0x9, 0x560}, {&(0x7f0000010300)="020000000300000004000000", 0xc, 0x800}, {&(0x7f0000010400)}, {&(0x7f0000011500)="ed41000000080000dbf4655fdbf4655fdbf4655f00000000000004004000", 0x1e, 0x2080}, {0x0}, {0x0}, {&(0x7f0000011c00)="0b0000000c0001022e00000002000000f40702022e", 0x15, 0x10000}, {0x0}, {0x0}, {&(0x7f0000012400)="504d4d00504d4dffdbf4655f00000000647679756b6f762d676c6170746f70320000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000006c6f6f7033340075782f746573742f73797a5f6d6f756e745f696d6167655f650500"/123, 0x7b, 0x20000}, {0x0}, {0x0, 0x0, 0x38000}], 0x0, &(0x7f0000012f00)) [ 1578.699855] loop2: detected capacity change from 0 to 2048 [ 1578.702396] loop4: detected capacity change from 0 to 2048 [ 1578.731126] loop0: detected capacity change from 0 to 512 [ 1578.737308] EXT4-fs (loop0): unsupported descriptor size 0 [ 1578.742268] EXT4-fs (loop4): mounted filesystem without journal. Quota mode: none. [ 1578.744218] ext4 filesystem being mounted at /syzkaller-testdir967783826/syzkaller.dhcxYf/183/file0 supports timestamps until 2038 (0x7fffffff) [ 1578.759155] EXT4-fs (loop2): ext4_check_descriptors: Inode table for group 0 overlaps superblock [ 1578.760683] EXT4-fs (loop2): group descriptors corrupted! [ 1578.775658] EXT4-fs (loop7): mounted filesystem without journal. Quota mode: none. [ 1578.788055] ext4 filesystem being mounted at /syzkaller-testdir391614100/syzkaller.1GCODk/186/file0 supports timestamps until 2038 (0x7fffffff) [ 1578.827097] EXT4-fs (loop4): unmounting filesystem. 22:35:03 executing program 4: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000480)}}, 0x0, 0xffffffefffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x100000, 0xd, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000500100000f000000000000000100000005000000000004000040000020000000dbf4655fdbf4655f0100ffff53ef010001000000dbf4655f000000000000000001000000000000000b0000008000000018000000c20500002b0200"/116, 0x74, 0x400}, {&(0x7f0000010100)="000000000000000000000000244b8e9b57f04b59aa229cc218853f9501004000", 0x20, 0x4e0}, {&(0x7f0000010200)="010000000000050040", 0x9, 0x560}, {&(0x7f0000010400), 0x0, 0x1000}, {&(0x7f0000011500)="ed41000000080000dbf4655fdbf4655fdbf4655f00000000000004004000", 0x1e, 0x2080}, {0x0}, {0x0}, {&(0x7f0000011c00)="0b0000000c0001022e00000002000000f40702022e", 0x15, 0x10000}, {0x0}, {0x0}, {&(0x7f0000012400)="504d4d00504d4dffdbf4655f00000000647679756b6f762d676c6170746f70320000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000006c6f6f7033340075782f746573742f73797a5f6d6f756e745f696d6167655f650500"/123, 0x7b, 0x20000}, {0x0}, {0x0, 0x0, 0x38000}], 0x0, &(0x7f0000012f00)) [ 1578.877920] EXT4-fs (loop7): unmounting filesystem. 22:35:03 executing program 7: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000480)}}, 0x0, 0xffffffefffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x100000, 0xd, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000500100000f000000000000000100000005000000000004000040000020000000dbf4655fdbf4655f0100ffff53ef010001000000dbf4655f000000000000000001000000000000000b0000008000000018000000c20500002b0200"/116, 0x74, 0x400}, {&(0x7f0000010100)="000000000000000000000000244b8e9b57f04b59aa229cc218853f9501004000", 0x20, 0x4e0}, {&(0x7f0000010200)="010000000000050040", 0x9, 0x560}, {&(0x7f0000010400), 0x0, 0x1000}, {&(0x7f0000011500)="ed41000000080000dbf4655fdbf4655fdbf4655f00000000000004004000", 0x1e, 0x2080}, {0x0}, {0x0}, {&(0x7f0000011c00)="0b0000000c0001022e00000002000000f40702022e", 0x15, 0x10000}, {0x0}, {0x0}, {&(0x7f0000012400)="504d4d00504d4dffdbf4655f00000000647679756b6f762d676c6170746f70320000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000006c6f6f7033340075782f746573742f73797a5f6d6f756e745f696d6167655f650500"/123, 0x7b, 0x20000}, {0x0}, {0x0, 0x0, 0x38000}], 0x0, &(0x7f0000012f00)) 22:35:03 executing program 0: perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000480)}}, 0x0, 0xffffffefffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0xd, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000500100000f000000000000000100000005000000000004000040000020000000dbf4655fdbf4655f0100ffff53ef010001000000dbf4655f000000000000000001000000000000000b0000008000000018000000c20500002b0200"/116, 0x74, 0x400}, {&(0x7f0000010100), 0x0, 0x4e0}, {&(0x7f0000010200)="01000000000005", 0x7, 0x560}, {&(0x7f0000010300)="020000000300000004000000", 0xc, 0x800}, {&(0x7f0000010400), 0x0, 0x1000}, {&(0x7f0000011500)="ed41000000080000dbf4655fdbf4655f", 0x10, 0x2080}, {0x0}, {0x0}, {0x0, 0x0, 0x10000}, {0x0}, {0x0}, {0x0, 0x0, 0x20000}, {0x0}], 0x0, &(0x7f0000012f00)) [ 1578.993768] loop0: detected capacity change from 0 to 512 [ 1579.005039] loop7: detected capacity change from 0 to 2048 [ 1579.010093] loop4: detected capacity change from 0 to 2048 [ 1579.013864] EXT4-fs (loop0): unsupported descriptor size 0 [ 1579.025813] EXT4-fs (loop7): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 1579.026599] EXT4-fs (loop7): group descriptors corrupted! [ 1579.067929] EXT4-fs (loop4): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 1579.069611] EXT4-fs (loop4): group descriptors corrupted! 22:35:19 executing program 3: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) lsetxattr$security_evm(&(0x7f0000000240)='.\x00', &(0x7f0000000300), &(0x7f00000003c0)=@sha1={0x1, "bd2b5bce8b74aea700654a682479ac2c0852bc4d"}, 0x15, 0x3) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={&(0x7f0000000040), 0xb}, 0x0, 0x20, 0x0, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) r0 = fork() r1 = syz_open_procfs(r0, &(0x7f0000000000)='status\x00') r2 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x2, 0x0) pwrite64(r2, &(0x7f00000000c0)='9', 0x1, 0x8040000) perf_event_open(&(0x7f0000000100)={0x0, 0x80, 0x20, 0x3, 0x4, 0x1, 0x0, 0x8, 0x20620, 0x2, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x3f, 0x2, @perf_config_ext={0x240000000, 0x5}, 0x1400, 0x4, 0x8, 0x7, 0x9, 0x6, 0x6, 0x0, 0x1, 0x0, 0x8}, r0, 0xa, r2, 0x1) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r3, 0x6, 0x1e, &(0x7f0000000040)=0x1, 0x4) setsockopt$inet6_tcp_TCP_REPAIR(r3, 0x6, 0x13, &(0x7f00000018c0)=0x1, 0x4) connect$inet6(r3, &(0x7f0000000080)={0xa, 0x0, 0x0, @loopback}, 0x1c) openat$cgroup_ro(r1, &(0x7f0000000180)='blkio.throttle.io_serviced_recursive\x00', 0x0, 0x0) 22:35:19 executing program 2: perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000480)}}, 0x0, 0xffffffefffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x100000, 0xe, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000500100000f000000000000000100000005000000000004000040000020000000dbf4655fdbf4655f0100ffff53ef010001000000dbf4655f000000000000000001000000000000000b0000008000000018000000c20500002b0200"/116, 0x74, 0x400}, {&(0x7f0000010100)="000000000000000000000000244b8e9b57f04b59aa229cc218853f9501004000", 0x20, 0x4e0}, {&(0x7f0000010200)="010000000000050040", 0x9, 0x560}, {&(0x7f0000010300)="020000000300", 0x6, 0x800}, {&(0x7f0000010400), 0x0, 0x1000}, {&(0x7f0000011500)="ed41000000080000dbf4655fdbf4655fdbf4655f00000000000004004000", 0x1e, 0x2080}, {0x0}, {0x0}, {&(0x7f0000011c00)="0b0000000c0001022e00000002000000f40702022e", 0x15, 0x10000}, {0x0}, {0x0}, {&(0x7f0000012400)="504d4d00504d4dffdbf4655f00000000647679756b6f762d676c6170746f70320000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000006c6f6f7033340075782f746573742f73797a5f6d6f756e745f696d6167655f650500"/123, 0x7b, 0x20000}, {0x0}, {0x0, 0x0, 0x38000}], 0x0, &(0x7f0000012f00)) 22:35:19 executing program 5: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) lsetxattr$security_evm(&(0x7f0000000240)='.\x00', &(0x7f0000000300), &(0x7f00000003c0)=@sha1={0x1, "bd2b5bce8b74aea700654a682479ac2c0852bc4d"}, 0x15, 0x3) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={&(0x7f0000000040), 0xb}, 0x0, 0x20, 0x0, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) r0 = fork() r1 = syz_open_procfs(r0, &(0x7f0000000000)='status\x00') r2 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x2, 0x0) pwrite64(r2, 0x0, 0x0, 0x8040000) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x20, 0x3, 0x4, 0x1, 0x0, 0x8, 0x20620, 0x2, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x3f, 0x2, @perf_config_ext={0x240000000, 0x5}, 0x1400, 0x4, 0x8, 0x7, 0x9, 0x6, 0x6, 0x0, 0x1, 0x0, 0x8}, r0, 0xa, r2, 0x1) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r3, 0x6, 0x1e, &(0x7f0000000040)=0x1, 0x4) connect$inet6(r3, &(0x7f0000000080)={0xa, 0x0, 0x0, @loopback}, 0x1c) openat$cgroup_ro(r1, &(0x7f0000000180)='blkio.throttle.io_serviced_recursive\x00', 0x0, 0x0) 22:35:19 executing program 7: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000480)}}, 0x0, 0xffffffefffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x100000, 0xd, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000500100000f000000000000000100000005000000000004000040000020000000dbf4655fdbf4655f0100ffff53ef010001000000dbf4655f000000000000000001000000000000000b0000008000000018000000c20500002b0200"/116, 0x74, 0x400}, {&(0x7f0000010100)="000000000000000000000000244b8e9b57f04b59aa229cc218853f9501004000", 0x20, 0x4e0}, {&(0x7f0000010200)="010000000000050040", 0x9, 0x560}, {&(0x7f0000010400), 0x0, 0x1000}, {&(0x7f0000011500)="ed41000000080000dbf4655fdbf4655fdbf4655f00000000000004004000", 0x1e, 0x2080}, {0x0}, {0x0}, {&(0x7f0000011c00)="0b0000000c0001022e00000002000000f40702022e", 0x15, 0x10000}, {0x0}, {0x0}, {&(0x7f0000012400)="504d4d00504d4dffdbf4655f00000000647679756b6f762d676c6170746f70320000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000006c6f6f7033340075782f746573742f73797a5f6d6f756e745f696d6167655f650500"/123, 0x7b, 0x20000}, {0x0}, {0x0, 0x0, 0x38000}], 0x0, &(0x7f0000012f00)) 22:35:19 executing program 1: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, @perf_config_ext, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000000), 0x0) r1 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) ioctl$EXT4_IOC_CHECKPOINT(r1, 0x4004662b, &(0x7f0000000100)=0x5) ioctl$AUTOFS_DEV_IOCTL_TIMEOUT(0xffffffffffffffff, 0xc018937a, &(0x7f0000001480)=ANY=[@ANYBLOB="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", @ANYRES32=0xffffffffffffffff, @ANYBLOB="01040000000000002e2f66696c653000"]) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r2, 0xc08c5332, &(0x7f00000013c0)={0xffffffff, 0x6964, 0x0, 'queue1\x00', 0xff}) r3 = gettid() process_vm_writev(r3, &(0x7f0000002580)=[{&(0x7f0000000140)=""/89, 0x59}, {&(0x7f00000001c0)=""/175, 0xaf}, {&(0x7f0000000280)=""/4096, 0x1000}], 0x3, &(0x7f0000003840)=[{&(0x7f0000002640)=""/105, 0x69}, {0xfffffffffffffffe, 0x10}], 0x2, 0x0) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r0, 0xc08c5332, &(0x7f0000001280)={0x3, 0x5, 0x0, 'queue1\x00', 0x8}) r4 = fork() write$sndseq(r0, &(0x7f0000001340)=[{0x22, 0x8, 0x2, 0x3, @time={0x4}, {0x0, 0x1}, {0x6, 0x81}, @raw32={[0x800, 0x3, 0x9]}}, {0xe1, 0x7, 0xf8, 0xff, @tick=0x2, {0x3f}, {0x4, 0xf1}, @queue={0xff, {0x6, 0x9}}}, {0x4, 0x1, 0x9, 0x5, @time={0x7, 0x6}, {0x7c, 0x2}, {0x20, 0x6}, @connect={{0x0, 0xfd}, {0x98, 0x4}}}, {0x80, 0x4, 0x7, 0x7d, @time={0xfffff000, 0x9}, {0x81, 0x1f}, {0xaa}, @queue={0x5, {0xffffffe0, 0x3}}}], 0x70) r5 = syz_open_dev$vcsn(&(0x7f0000000040), 0x3, 0x2001) ioctl$LOOP_CTL_GET_FREE(r5, 0x4c82) ptrace$setopts(0x4206, r4, 0x0, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fork() fork() clone3(&(0x7f0000004c00)={0xc0002100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) 22:35:19 executing program 0: perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000480)}}, 0x0, 0xffffffefffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0xd, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000500100000f000000000000000100000005000000000004000040000020000000dbf4655fdbf4655f0100ffff53ef010001000000dbf4655f000000000000000001000000000000000b0000008000000018000000c20500002b0200"/116, 0x74, 0x400}, {&(0x7f0000010100)="000000000000000000000000244b8e9b", 0x10, 0x4e0}, {&(0x7f0000010200)="01000000000005", 0x7, 0x560}, {&(0x7f0000010300)="020000000300000004000000", 0xc, 0x800}, {&(0x7f0000010400), 0x0, 0x1000}, {&(0x7f0000011500)="ed41000000080000dbf4655fdbf4655f", 0x10, 0x2080}, {0x0}, {0x0}, {0x0, 0x0, 0x10000}, {0x0}, {0x0}, {0x0, 0x0, 0x20000}, {0x0}], 0x0, &(0x7f0000012f00)) 22:35:19 executing program 4: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000480)}}, 0x0, 0xffffffefffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x100000, 0xd, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000500100000f000000000000000100000005000000000004000040000020000000dbf4655fdbf4655f0100ffff53ef010001000000dbf4655f000000000000000001000000000000000b0000008000000018000000c20500002b0200"/116, 0x74, 0x400}, {&(0x7f0000010100)="000000000000000000000000244b8e9b57f04b59aa229cc218853f9501004000", 0x20, 0x4e0}, {&(0x7f0000010200)="010000000000050040", 0x9, 0x560}, {&(0x7f0000010400), 0x0, 0x1000}, {&(0x7f0000011500)="ed41000000080000dbf4655fdbf4655fdbf4655f00000000000004004000", 0x1e, 0x2080}, {0x0}, {0x0}, {&(0x7f0000011c00)="0b0000000c0001022e00000002000000f40702022e", 0x15, 0x10000}, {0x0}, {0x0}, {&(0x7f0000012400)="504d4d00504d4dffdbf4655f00000000647679756b6f762d676c6170746f70320000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000006c6f6f7033340075782f746573742f73797a5f6d6f756e745f696d6167655f650500"/123, 0x7b, 0x20000}, {0x0}, {0x0, 0x0, 0x38000}], 0x0, &(0x7f0000012f00)) 22:35:19 executing program 6: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) lsetxattr$security_evm(&(0x7f0000000240)='.\x00', &(0x7f0000000300), &(0x7f00000003c0)=@sha1={0x1, "bd2b5bce8b74aea700654a682479ac2c0852bc4d"}, 0x15, 0x3) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={&(0x7f0000000040), 0xb}, 0x0, 0x20, 0x0, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) r0 = fork() r1 = syz_open_procfs(r0, &(0x7f0000000000)='status\x00') r2 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x2, 0x0) pwrite64(r2, &(0x7f00000000c0), 0x0, 0x8040000) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x20, 0x3, 0x4, 0x1, 0x0, 0x8, 0x20620, 0x2, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x3f, 0x2, @perf_config_ext={0x240000000, 0x5}, 0x1400, 0x4, 0x8, 0x7, 0x9, 0x6, 0x6, 0x0, 0x1, 0x0, 0x8}, r0, 0xa, r2, 0x1) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r3, 0x6, 0x1e, &(0x7f0000000040)=0x1, 0x4) setsockopt$inet6_tcp_TCP_REPAIR(r3, 0x6, 0x13, &(0x7f00000018c0)=0x1, 0x4) connect$inet6(r3, &(0x7f0000000080)={0xa, 0x0, 0x0, @loopback}, 0x1c) openat$cgroup_ro(r1, &(0x7f0000000180)='blkio.throttle.io_serviced_recursive\x00', 0x0, 0x0) [ 1595.155831] loop0: detected capacity change from 0 to 512 [ 1595.159328] loop7: detected capacity change from 0 to 2048 [ 1595.165067] loop4: detected capacity change from 0 to 2048 [ 1595.181090] loop2: detected capacity change from 0 to 2048 [ 1595.182563] EXT4-fs (loop7): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 1595.183619] EXT4-fs (loop7): group descriptors corrupted! [ 1595.186679] EXT4-fs (loop0): unsupported descriptor size 0 [ 1595.188052] EXT4-fs (loop4): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 1595.189231] EXT4-fs (loop4): group descriptors corrupted! [ 1595.218222] EXT4-fs (loop2): ext4_check_descriptors: Inode table for group 0 overlaps superblock [ 1595.219787] EXT4-fs (loop2): group descriptors corrupted! 22:35:19 executing program 7: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000480)}}, 0x0, 0xffffffefffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x100000, 0xd, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000500100000f000000000000000100000005000000000004000040000020000000dbf4655fdbf4655f0100ffff53ef010001000000dbf4655f000000000000000001000000000000000b0000008000000018000000c20500002b0200"/116, 0x74, 0x400}, {&(0x7f0000010100)="000000000000000000000000244b8e9b57f04b59aa229cc218853f9501004000", 0x20, 0x4e0}, {&(0x7f0000010200)="010000000000050040", 0x9, 0x560}, {&(0x7f0000010400), 0x0, 0x1000}, {&(0x7f0000011500)="ed41000000080000dbf4655fdbf4655fdbf4655f00000000000004004000", 0x1e, 0x2080}, {0x0}, {0x0}, {&(0x7f0000011c00)="0b0000000c0001022e00000002000000f40702022e", 0x15, 0x10000}, {0x0}, {0x0}, {&(0x7f0000012400)="504d4d00504d4dffdbf4655f00000000647679756b6f762d676c6170746f70320000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000006c6f6f7033340075782f746573742f73797a5f6d6f756e745f696d6167655f650500"/123, 0x7b, 0x20000}, {0x0}, {0x0, 0x0, 0x38000}], 0x0, &(0x7f0000012f00)) 22:35:19 executing program 4: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000480)}}, 0x0, 0xffffffefffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x100000, 0xd, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000500100000f000000000000000100000005000000000004000040000020000000dbf4655fdbf4655f0100ffff53ef010001000000dbf4655f000000000000000001000000000000000b0000008000000018000000c20500002b0200"/116, 0x74, 0x400}, {&(0x7f0000010100)="000000000000000000000000244b8e9b57f04b59aa229cc218853f9501004000", 0x20, 0x4e0}, {&(0x7f0000010200)="010000000000050040", 0x9, 0x560}, {&(0x7f0000010400), 0x0, 0x1000}, {&(0x7f0000011500)="ed41000000080000dbf4655fdbf4655fdbf4655f00000000000004004000", 0x1e, 0x2080}, {0x0}, {0x0}, {&(0x7f0000011c00)="0b0000000c0001022e00000002000000f40702022e", 0x15, 0x10000}, {0x0}, {0x0}, {&(0x7f0000012400)="504d4d00504d4dffdbf4655f00000000647679756b6f762d676c6170746f70320000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000006c6f6f7033340075782f746573742f73797a5f6d6f756e745f696d6167655f650500"/123, 0x7b, 0x20000}, {0x0}, {0x0, 0x0, 0x38000}], 0x0, &(0x7f0000012f00)) 22:35:19 executing program 0: perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000480)}}, 0x0, 0xffffffefffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0xd, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000500100000f000000000000000100000005000000000004000040000020000000dbf4655fdbf4655f0100ffff53ef010001000000dbf4655f000000000000000001000000000000000b0000008000000018000000c20500002b0200"/116, 0x74, 0x400}, {&(0x7f0000010100)="000000000000000000000000244b8e9b", 0x10, 0x4e0}, {&(0x7f0000010200)="01000000000005", 0x7, 0x560}, {&(0x7f0000010300)="020000000300000004000000", 0xc, 0x800}, {&(0x7f0000010400), 0x0, 0x1000}, {&(0x7f0000011500)="ed41000000080000dbf4655fdbf4655f", 0x10, 0x2080}, {0x0}, {0x0}, {0x0, 0x0, 0x10000}, {0x0}, {0x0}, {0x0, 0x0, 0x20000}, {0x0}], 0x0, &(0x7f0000012f00)) [ 1595.342150] loop7: detected capacity change from 0 to 2048 [ 1595.351017] loop4: detected capacity change from 0 to 2048 [ 1595.362597] EXT4-fs (loop4): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 1595.363775] EXT4-fs (loop4): group descriptors corrupted! [ 1595.366378] EXT4-fs (loop7): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 1595.367572] EXT4-fs (loop7): group descriptors corrupted! 22:35:19 executing program 1: r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, @perf_config_ext, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000000), 0x0) r2 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) ioctl$EXT4_IOC_CHECKPOINT(r2, 0x4004662b, &(0x7f0000000100)=0x5) ioctl$AUTOFS_DEV_IOCTL_TIMEOUT(0xffffffffffffffff, 0xc018937a, &(0x7f0000001480)=ANY=[@ANYRES32=r0, @ANYBLOB="01040000000000002e2f66696c653000"]) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r3, 0xc08c5332, &(0x7f00000013c0)={0xffffffff, 0x6964, 0x0, 'queue1\x00', 0xff}) r4 = gettid() process_vm_writev(r4, &(0x7f0000002580)=[{&(0x7f0000000140)=""/89, 0x59}, {&(0x7f00000001c0)=""/175, 0xaf}, {&(0x7f0000000280)=""/4096, 0x1000}], 0x3, &(0x7f0000003840)=[{&(0x7f0000002640)=""/105, 0x69}, {0xfffffffffffffffe, 0x10}], 0x2, 0x0) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r1, 0xc08c5332, &(0x7f0000001280)={0x3, 0x5, 0x0, 'queue1\x00', 0x8}) r5 = fork() write$sndseq(r1, &(0x7f0000001340)=[{0x22, 0x8, 0x2, 0x3, @time={0x4}, {0x0, 0x1}, {0x6, 0x81}, @raw32={[0x800, 0x3, 0x9]}}, {0xe1, 0x7, 0xf8, 0xff, @tick=0x2, {0x3f}, {0x4, 0xf1}, @queue={0xff, {0x6, 0x9}}}, {0x4, 0x1, 0x9, 0x5, @time={0x7, 0x6}, {0x7c, 0x2}, {0x20, 0x6}, @connect={{0x0, 0xfd}, {0x98, 0x4}}}, {0x80, 0x4, 0x7, 0x7d, @time={0xfffff000, 0x9}, {0x81, 0x1f}, {0xaa}, @queue={0x5, {0xffffffe0, 0x3}}}], 0x70) r6 = syz_open_dev$vcsn(&(0x7f0000000040), 0x3, 0x2001) ioctl$LOOP_CTL_GET_FREE(r6, 0x4c82) ptrace$setopts(0x4206, r5, 0x0, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fork() fork() clone3(&(0x7f0000004c00)={0xc0002100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) 22:35:19 executing program 2: perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000480)}}, 0x0, 0xffffffefffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x100000, 0xe, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000500100000f000000000000000100000005000000000004000040000020000000dbf4655fdbf4655f0100ffff53ef010001000000dbf4655f000000000000000001000000000000000b0000008000000018000000c20500002b0200"/116, 0x74, 0x400}, {&(0x7f0000010100)="000000000000000000000000244b8e9b57f04b59aa229cc218853f9501004000", 0x20, 0x4e0}, {&(0x7f0000010200)="010000000000050040", 0x9, 0x560}, {&(0x7f0000010300)="020000000300", 0x6, 0x800}, {&(0x7f0000010400), 0x0, 0x1000}, {&(0x7f0000011500)="ed41000000080000dbf4655fdbf4655fdbf4655f00000000000004004000", 0x1e, 0x2080}, {0x0}, {0x0}, {&(0x7f0000011c00)="0b0000000c0001022e00000002000000f40702022e", 0x15, 0x10000}, {0x0}, {0x0}, {&(0x7f0000012400)="504d4d00504d4dffdbf4655f00000000647679756b6f762d676c6170746f70320000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000006c6f6f7033340075782f746573742f73797a5f6d6f756e745f696d6167655f650500"/123, 0x7b, 0x20000}, {0x0}, {0x0, 0x0, 0x38000}], 0x0, &(0x7f0000012f00)) [ 1595.434882] loop0: detected capacity change from 0 to 512 [ 1595.459512] EXT4-fs (loop0): unsupported descriptor size 0 [ 1595.587885] loop2: detected capacity change from 0 to 2048 [ 1595.605762] EXT4-fs (loop2): ext4_check_descriptors: Inode table for group 0 overlaps superblock [ 1595.606435] EXT4-fs (loop2): group descriptors corrupted! 22:35:36 executing program 3: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) lsetxattr$security_evm(&(0x7f0000000240)='.\x00', &(0x7f0000000300), &(0x7f00000003c0)=@sha1={0x1, "bd2b5bce8b74aea700654a682479ac2c0852bc4d"}, 0x15, 0x3) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={&(0x7f0000000040), 0xb}, 0x0, 0x20, 0x0, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) r0 = fork() r1 = syz_open_procfs(r0, &(0x7f0000000000)='status\x00') r2 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x2, 0x0) pwrite64(r2, &(0x7f00000000c0)='9', 0x1, 0x8040000) perf_event_open(&(0x7f0000000100)={0x0, 0x80, 0x20, 0x3, 0x4, 0x1, 0x0, 0x8, 0x20620, 0x2, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x3f, 0x2, @perf_config_ext={0x240000000, 0x5}, 0x1400, 0x4, 0x8, 0x7, 0x9, 0x6, 0x6, 0x0, 0x1, 0x0, 0x8}, r0, 0xa, r2, 0x1) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r3, 0x6, 0x1e, &(0x7f0000000040)=0x1, 0x4) setsockopt$inet6_tcp_TCP_REPAIR(r3, 0x6, 0x13, &(0x7f00000018c0)=0x1, 0x4) connect$inet6(r3, &(0x7f0000000080)={0xa, 0x0, 0x0, @loopback}, 0x1c) openat$cgroup_ro(r1, &(0x7f0000000180)='blkio.throttle.io_serviced_recursive\x00', 0x0, 0x0) 22:35:36 executing program 7: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000480)}}, 0x0, 0xffffffefffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x100000, 0xe, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000500100000f000000000000000100000005000000000004000040000020000000dbf4655fdbf4655f0100ffff53ef010001000000dbf4655f000000000000000001000000000000000b0000008000000018000000c20500002b0200"/116, 0x74, 0x400}, {&(0x7f0000010100)="000000000000000000000000244b8e9b57f04b59aa229cc218853f9501004000", 0x20, 0x4e0}, {&(0x7f0000010200)="010000000000050040", 0x9, 0x560}, {0x0, 0x0, 0x800}, {&(0x7f0000010400), 0x0, 0x1000}, {&(0x7f0000011500)="ed41000000080000dbf4655fdbf4655fdbf4655f00000000000004004000", 0x1e, 0x2080}, {0x0}, {0x0}, {&(0x7f0000011c00)="0b0000000c0001022e00000002000000f40702022e", 0x15, 0x10000}, {0x0}, {0x0}, {&(0x7f0000012400)="504d4d00504d4dffdbf4655f00000000647679756b6f762d676c6170746f70320000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000006c6f6f7033340075782f746573742f73797a5f6d6f756e745f696d6167655f650500"/123, 0x7b, 0x20000}, {0x0}, {0x0, 0x0, 0x38000}], 0x0, &(0x7f0000012f00)) 22:35:36 executing program 4: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000480)}}, 0x0, 0xffffffefffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x100000, 0xe, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000500100000f000000000000000100000005000000000004000040000020000000dbf4655fdbf4655f0100ffff53ef010001000000dbf4655f000000000000000001000000000000000b0000008000000018000000c20500002b0200"/116, 0x74, 0x400}, {&(0x7f0000010100)="000000000000000000000000244b8e9b57f04b59aa229cc218853f9501004000", 0x20, 0x4e0}, {&(0x7f0000010200)="010000000000050040", 0x9, 0x560}, {0x0, 0x0, 0x800}, {&(0x7f0000010400), 0x0, 0x1000}, {&(0x7f0000011500)="ed41000000080000dbf4655fdbf4655fdbf4655f00000000000004004000", 0x1e, 0x2080}, {0x0}, {0x0}, {&(0x7f0000011c00)="0b0000000c0001022e00000002000000f40702022e", 0x15, 0x10000}, {0x0}, {0x0}, {&(0x7f0000012400)="504d4d00504d4dffdbf4655f00000000647679756b6f762d676c6170746f70320000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000006c6f6f7033340075782f746573742f73797a5f6d6f756e745f696d6167655f650500"/123, 0x7b, 0x20000}, {0x0}, {0x0, 0x0, 0x38000}], 0x0, &(0x7f0000012f00)) 22:35:36 executing program 1: r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, @perf_config_ext, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000000), 0x0) r2 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) ioctl$EXT4_IOC_CHECKPOINT(r2, 0x4004662b, &(0x7f0000000100)=0x5) ioctl$AUTOFS_DEV_IOCTL_TIMEOUT(0xffffffffffffffff, 0xc018937a, &(0x7f0000001480)=ANY=[@ANYRES32=r0, @ANYBLOB="01040000000000002e2f66696c653000"]) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r3, 0xc08c5332, &(0x7f00000013c0)={0xffffffff, 0x6964, 0x0, 'queue1\x00', 0xff}) r4 = gettid() process_vm_writev(r4, &(0x7f0000002580)=[{&(0x7f0000000140)=""/89, 0x59}, {&(0x7f00000001c0)=""/175, 0xaf}, {&(0x7f0000000280)=""/4096, 0x1000}], 0x3, &(0x7f0000003840)=[{&(0x7f0000002640)=""/105, 0x69}, {0xfffffffffffffffe, 0x10}], 0x2, 0x0) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r1, 0xc08c5332, &(0x7f0000001280)={0x3, 0x5, 0x0, 'queue1\x00', 0x8}) r5 = fork() write$sndseq(r1, &(0x7f0000001340)=[{0x22, 0x8, 0x2, 0x3, @time={0x4}, {0x0, 0x1}, {0x6, 0x81}, @raw32={[0x800, 0x3, 0x9]}}, {0xe1, 0x7, 0xf8, 0xff, @tick=0x2, {0x3f}, {0x4, 0xf1}, @queue={0xff, {0x6, 0x9}}}, {0x4, 0x1, 0x9, 0x5, @time={0x7, 0x6}, {0x7c, 0x2}, {0x20, 0x6}, @connect={{0x0, 0xfd}, {0x98, 0x4}}}, {0x80, 0x4, 0x7, 0x7d, @time={0xfffff000, 0x9}, {0x81, 0x1f}, {0xaa}, @queue={0x5, {0xffffffe0, 0x3}}}], 0x70) r6 = syz_open_dev$vcsn(&(0x7f0000000040), 0x3, 0x2001) ioctl$LOOP_CTL_GET_FREE(r6, 0x4c82) ptrace$setopts(0x4206, r5, 0x0, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fork() fork() clone3(&(0x7f0000004c00)={0xc0002100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) 22:35:36 executing program 6: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) lsetxattr$security_evm(&(0x7f0000000240)='.\x00', &(0x7f0000000300), &(0x7f00000003c0)=@sha1={0x1, "bd2b5bce8b74aea700654a682479ac2c0852bc4d"}, 0x15, 0x3) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={&(0x7f0000000040), 0xb}, 0x0, 0x20, 0x0, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) r0 = fork() r1 = syz_open_procfs(r0, &(0x7f0000000000)='status\x00') r2 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x2, 0x0) pwrite64(r2, &(0x7f00000000c0), 0x0, 0x8040000) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x20, 0x3, 0x4, 0x1, 0x0, 0x8, 0x20620, 0x2, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x3f, 0x2, @perf_config_ext={0x240000000, 0x5}, 0x1400, 0x4, 0x8, 0x7, 0x9, 0x6, 0x6, 0x0, 0x1, 0x0, 0x8}, r0, 0xa, r2, 0x1) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r3, 0x6, 0x1e, &(0x7f0000000040)=0x1, 0x4) setsockopt$inet6_tcp_TCP_REPAIR(r3, 0x6, 0x13, &(0x7f00000018c0)=0x1, 0x4) connect$inet6(r3, &(0x7f0000000080)={0xa, 0x0, 0x0, @loopback}, 0x1c) openat$cgroup_ro(r1, &(0x7f0000000180)='blkio.throttle.io_serviced_recursive\x00', 0x0, 0x0) 22:35:36 executing program 0: perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000480)}}, 0x0, 0xffffffefffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0xd, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000500100000f000000000000000100000005000000000004000040000020000000dbf4655fdbf4655f0100ffff53ef010001000000dbf4655f000000000000000001000000000000000b0000008000000018000000c20500002b0200"/116, 0x74, 0x400}, {&(0x7f0000010100)="000000000000000000000000244b8e9b", 0x10, 0x4e0}, {&(0x7f0000010200)="01000000000005", 0x7, 0x560}, {&(0x7f0000010300)="020000000300000004000000", 0xc, 0x800}, {&(0x7f0000010400), 0x0, 0x1000}, {&(0x7f0000011500)="ed41000000080000dbf4655fdbf4655f", 0x10, 0x2080}, {0x0}, {0x0}, {0x0, 0x0, 0x10000}, {0x0}, {0x0}, {0x0, 0x0, 0x20000}, {0x0}], 0x0, &(0x7f0000012f00)) [ 1612.247222] loop7: detected capacity change from 0 to 2048 [ 1612.253315] loop0: detected capacity change from 0 to 512 [ 1612.261153] EXT4-fs (loop0): unsupported descriptor size 0 [ 1612.267761] EXT4-fs (loop7): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 1612.268578] EXT4-fs (loop7): group descriptors corrupted! 22:35:36 executing program 2: perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000480)}}, 0x0, 0xffffffefffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x100000, 0xe, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000500100000f000000000000000100000005000000000004000040000020000000dbf4655fdbf4655f0100ffff53ef010001000000dbf4655f000000000000000001000000000000000b0000008000000018000000c20500002b0200"/116, 0x74, 0x400}, {&(0x7f0000010100)="000000000000000000000000244b8e9b57f04b59aa229cc218853f9501004000", 0x20, 0x4e0}, {&(0x7f0000010200)="010000000000050040", 0x9, 0x560}, {&(0x7f0000010300)="020000000300000004", 0x9, 0x800}, {&(0x7f0000010400), 0x0, 0x1000}, {&(0x7f0000011500)="ed41000000080000dbf4655fdbf4655fdbf4655f00000000000004004000", 0x1e, 0x2080}, {0x0}, {0x0}, {&(0x7f0000011c00)="0b0000000c0001022e00000002000000f40702022e", 0x15, 0x10000}, {0x0}, {0x0}, {&(0x7f0000012400)="504d4d00504d4dffdbf4655f00000000647679756b6f762d676c6170746f70320000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000006c6f6f7033340075782f746573742f73797a5f6d6f756e745f696d6167655f650500"/123, 0x7b, 0x20000}, {0x0}, {0x0, 0x0, 0x38000}], 0x0, &(0x7f0000012f00)) 22:35:36 executing program 5: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) lsetxattr$security_evm(&(0x7f0000000240)='.\x00', &(0x7f0000000300), &(0x7f00000003c0)=@sha1={0x1, "bd2b5bce8b74aea700654a682479ac2c0852bc4d"}, 0x15, 0x3) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={&(0x7f0000000040), 0xb}, 0x0, 0x20, 0x0, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) r0 = fork() r1 = syz_open_procfs(r0, &(0x7f0000000000)='status\x00') r2 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x2, 0x0) pwrite64(r2, 0x0, 0x0, 0x8040000) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x20, 0x3, 0x4, 0x1, 0x0, 0x8, 0x20620, 0x2, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x3f, 0x2, @perf_config_ext={0x240000000, 0x5}, 0x1400, 0x4, 0x8, 0x7, 0x9, 0x6, 0x6, 0x0, 0x1, 0x0, 0x8}, r0, 0xa, r2, 0x1) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r3, 0x6, 0x1e, &(0x7f0000000040)=0x1, 0x4) connect$inet6(r3, &(0x7f0000000080)={0xa, 0x0, 0x0, @loopback}, 0x1c) openat$cgroup_ro(r1, &(0x7f0000000180)='blkio.throttle.io_serviced_recursive\x00', 0x0, 0x0) [ 1612.293066] loop4: detected capacity change from 0 to 2048 22:35:36 executing program 7: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000480)}}, 0x0, 0xffffffefffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x100000, 0xe, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000500100000f000000000000000100000005000000000004000040000020000000dbf4655fdbf4655f0100ffff53ef010001000000dbf4655f000000000000000001000000000000000b0000008000000018000000c20500002b0200"/116, 0x74, 0x400}, {&(0x7f0000010100)="000000000000000000000000244b8e9b57f04b59aa229cc218853f9501004000", 0x20, 0x4e0}, {&(0x7f0000010200)="010000000000050040", 0x9, 0x560}, {0x0, 0x0, 0x800}, {&(0x7f0000010400), 0x0, 0x1000}, {&(0x7f0000011500)="ed41000000080000dbf4655fdbf4655fdbf4655f00000000000004004000", 0x1e, 0x2080}, {0x0}, {0x0}, {&(0x7f0000011c00)="0b0000000c0001022e00000002000000f40702022e", 0x15, 0x10000}, {0x0}, {0x0}, {&(0x7f0000012400)="504d4d00504d4dffdbf4655f00000000647679756b6f762d676c6170746f70320000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000006c6f6f7033340075782f746573742f73797a5f6d6f756e745f696d6167655f650500"/123, 0x7b, 0x20000}, {0x0}, {0x0, 0x0, 0x38000}], 0x0, &(0x7f0000012f00)) [ 1612.339348] loop2: detected capacity change from 0 to 2048 [ 1612.352085] EXT4-fs (loop4): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 1612.353617] EXT4-fs (loop4): group descriptors corrupted! 22:35:36 executing program 0: perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000480)}}, 0x0, 0xffffffefffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0xd, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000500100000f000000000000000100000005000000000004000040000020000000dbf4655fdbf4655f0100ffff53ef010001000000dbf4655f000000000000000001000000000000000b0000008000000018000000c20500002b0200"/116, 0x74, 0x400}, {&(0x7f0000010100)="000000000000000000000000244b8e9b57f04b59aa229cc2", 0x18, 0x4e0}, {&(0x7f0000010200)="01000000000005", 0x7, 0x560}, {&(0x7f0000010300)="020000000300000004000000", 0xc, 0x800}, {&(0x7f0000010400), 0x0, 0x1000}, {&(0x7f0000011500)="ed41000000080000dbf4655fdbf4655f", 0x10, 0x2080}, {0x0}, {0x0}, {0x0, 0x0, 0x10000}, {0x0}, {0x0}, {0x0, 0x0, 0x20000}, {0x0}], 0x0, &(0x7f0000012f00)) [ 1612.420273] loop0: detected capacity change from 0 to 512 [ 1612.434184] EXT4-fs (loop0): unsupported descriptor size 0 22:35:37 executing program 1: r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, @perf_config_ext, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000000), 0x0) r2 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) ioctl$EXT4_IOC_CHECKPOINT(r2, 0x4004662b, &(0x7f0000000100)=0x5) ioctl$AUTOFS_DEV_IOCTL_TIMEOUT(0xffffffffffffffff, 0xc018937a, &(0x7f0000001480)=ANY=[@ANYRES32=r0, @ANYBLOB="01040000000000002e2f66696c653000"]) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r3, 0xc08c5332, &(0x7f00000013c0)={0xffffffff, 0x6964, 0x0, 'queue1\x00', 0xff}) r4 = gettid() process_vm_writev(r4, &(0x7f0000002580)=[{&(0x7f0000000140)=""/89, 0x59}, {&(0x7f00000001c0)=""/175, 0xaf}, {&(0x7f0000000280)=""/4096, 0x1000}], 0x3, &(0x7f0000003840)=[{&(0x7f0000002640)=""/105, 0x69}, {0xfffffffffffffffe, 0x10}], 0x2, 0x0) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r1, 0xc08c5332, &(0x7f0000001280)={0x3, 0x5, 0x0, 'queue1\x00', 0x8}) r5 = fork() write$sndseq(r1, &(0x7f0000001340)=[{0x22, 0x8, 0x2, 0x3, @time={0x4}, {0x0, 0x1}, {0x6, 0x81}, @raw32={[0x800, 0x3, 0x9]}}, {0xe1, 0x7, 0xf8, 0xff, @tick=0x2, {0x3f}, {0x4, 0xf1}, @queue={0xff, {0x6, 0x9}}}, {0x4, 0x1, 0x9, 0x5, @time={0x7, 0x6}, {0x7c, 0x2}, {0x20, 0x6}, @connect={{0x0, 0xfd}, {0x98, 0x4}}}, {0x80, 0x4, 0x7, 0x7d, @time={0xfffff000, 0x9}, {0x81, 0x1f}, {0xaa}, @queue={0x5, {0xffffffe0, 0x3}}}], 0x70) r6 = syz_open_dev$vcsn(&(0x7f0000000040), 0x3, 0x2001) ioctl$LOOP_CTL_GET_FREE(r6, 0x4c82) ptrace$setopts(0x4206, r5, 0x0, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fork() fork() clone3(&(0x7f0000004c00)={0xc0002100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) [ 1612.459163] EXT4-fs (loop2): mounted filesystem without journal. Quota mode: none. 22:35:37 executing program 0: perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000480)}}, 0x0, 0xffffffefffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0xd, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000500100000f000000000000000100000005000000000004000040000020000000dbf4655fdbf4655f0100ffff53ef010001000000dbf4655f000000000000000001000000000000000b0000008000000018000000c20500002b0200"/116, 0x74, 0x400}, {&(0x7f0000010100)="000000000000000000000000244b8e9b57f04b59aa229cc2", 0x18, 0x4e0}, {&(0x7f0000010200)="01000000000005", 0x7, 0x560}, {&(0x7f0000010300)="020000000300000004000000", 0xc, 0x800}, {&(0x7f0000010400), 0x0, 0x1000}, {&(0x7f0000011500)="ed41000000080000dbf4655fdbf4655f", 0x10, 0x2080}, {0x0}, {0x0}, {0x0, 0x0, 0x10000}, {0x0}, {0x0}, {0x0, 0x0, 0x20000}, {0x0}], 0x0, &(0x7f0000012f00)) [ 1612.495325] loop7: detected capacity change from 0 to 2048 [ 1612.500130] ext4 filesystem being mounted at /syzkaller-testdir307671421/syzkaller.SFQaEW/181/file0 supports timestamps until 2038 (0x7fffffff) [ 1612.500706] loop0: detected capacity change from 0 to 512 [ 1612.506605] EXT4-fs (loop0): unsupported descriptor size 0 [ 1612.558974] EXT4-fs (loop7): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 1612.560719] EXT4-fs (loop7): group descriptors corrupted! [ 1612.570988] EXT4-fs (loop2): unmounting filesystem. 22:35:55 executing program 1: r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, @perf_config_ext, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000000), 0x0) r2 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) ioctl$EXT4_IOC_CHECKPOINT(r2, 0x4004662b, &(0x7f0000000100)=0x5) ioctl$AUTOFS_DEV_IOCTL_TIMEOUT(0xffffffffffffffff, 0xc018937a, &(0x7f0000001480)=ANY=[@ANYBLOB, @ANYRES32=r0, @ANYBLOB="01040000000000002e2f66696c653000"]) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r3, 0xc08c5332, &(0x7f00000013c0)={0xffffffff, 0x6964, 0x0, 'queue1\x00', 0xff}) r4 = gettid() process_vm_writev(r4, &(0x7f0000002580)=[{&(0x7f0000000140)=""/89, 0x59}, {&(0x7f00000001c0)=""/175, 0xaf}, {&(0x7f0000000280)=""/4096, 0x1000}], 0x3, &(0x7f0000003840)=[{&(0x7f0000002640)=""/105, 0x69}, {0xfffffffffffffffe, 0x10}], 0x2, 0x0) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r1, 0xc08c5332, &(0x7f0000001280)={0x3, 0x5, 0x0, 'queue1\x00', 0x8}) r5 = fork() write$sndseq(r1, &(0x7f0000001340)=[{0x22, 0x8, 0x2, 0x3, @time={0x4}, {0x0, 0x1}, {0x6, 0x81}, @raw32={[0x800, 0x3, 0x9]}}, {0xe1, 0x7, 0xf8, 0xff, @tick=0x2, {0x3f}, {0x4, 0xf1}, @queue={0xff, {0x6, 0x9}}}, {0x4, 0x1, 0x9, 0x5, @time={0x7, 0x6}, {0x7c, 0x2}, {0x20, 0x6}, @connect={{0x0, 0xfd}, {0x98, 0x4}}}, {0x80, 0x4, 0x7, 0x7d, @time={0xfffff000, 0x9}, {0x81, 0x1f}, {0xaa}, @queue={0x5, {0xffffffe0, 0x3}}}], 0x70) r6 = syz_open_dev$vcsn(&(0x7f0000000040), 0x3, 0x2001) ioctl$LOOP_CTL_GET_FREE(r6, 0x4c82) ptrace$setopts(0x4206, r5, 0x0, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fork() fork() clone3(&(0x7f0000004c00)={0xc0002100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) 22:35:55 executing program 3: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) lsetxattr$security_evm(&(0x7f0000000240)='.\x00', &(0x7f0000000300), &(0x7f00000003c0)=@sha1={0x1, "bd2b5bce8b74aea700654a682479ac2c0852bc4d"}, 0x15, 0x3) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={&(0x7f0000000040), 0xb}, 0x0, 0x20, 0x0, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) r0 = fork() r1 = syz_open_procfs(r0, &(0x7f0000000000)='status\x00') r2 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x2, 0x0) pwrite64(r2, &(0x7f00000000c0)='9', 0x1, 0x8040000) perf_event_open(&(0x7f0000000100)={0x0, 0x80, 0x20, 0x3, 0x4, 0x1, 0x0, 0x8, 0x20620, 0x2, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x3f, 0x2, @perf_config_ext={0x240000000, 0x5}, 0x1400, 0x4, 0x8, 0x7, 0x9, 0x6, 0x6, 0x0, 0x1, 0x0, 0x8}, r0, 0xa, r2, 0x1) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r3, 0x6, 0x1e, &(0x7f0000000040)=0x1, 0x4) setsockopt$inet6_tcp_TCP_REPAIR(r3, 0x6, 0x13, &(0x7f00000018c0)=0x1, 0x4) connect$inet6(r3, &(0x7f0000000080)={0xa, 0x0, 0x0, @loopback}, 0x1c) openat$cgroup_ro(r1, &(0x7f0000000180)='blkio.throttle.io_serviced_recursive\x00', 0x0, 0x0) 22:35:55 executing program 0: perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000480)}}, 0x0, 0xffffffefffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0xd, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000500100000f000000000000000100000005000000000004000040000020000000dbf4655fdbf4655f0100ffff53ef010001000000dbf4655f000000000000000001000000000000000b0000008000000018000000c20500002b0200"/116, 0x74, 0x400}, {&(0x7f0000010100)="000000000000000000000000244b8e9b57f04b59aa229cc2", 0x18, 0x4e0}, {&(0x7f0000010200)="01000000000005", 0x7, 0x560}, {&(0x7f0000010300)="020000000300000004000000", 0xc, 0x800}, {&(0x7f0000010400), 0x0, 0x1000}, {&(0x7f0000011500)="ed41000000080000dbf4655fdbf4655f", 0x10, 0x2080}, {0x0}, {0x0}, {0x0, 0x0, 0x10000}, {0x0}, {0x0}, {0x0, 0x0, 0x20000}, {0x0}], 0x0, &(0x7f0000012f00)) 22:35:55 executing program 2: perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000480)}}, 0x0, 0xffffffefffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x100000, 0xe, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000500100000f000000000000000100000005000000000004000040000020000000dbf4655fdbf4655f0100ffff53ef010001000000dbf4655f000000000000000001000000000000000b0000008000000018000000c20500002b0200"/116, 0x74, 0x400}, {&(0x7f0000010100)="000000000000000000000000244b8e9b57f04b59aa229cc218853f9501004000", 0x20, 0x4e0}, {&(0x7f0000010200)="010000000000050040", 0x9, 0x560}, {&(0x7f0000010300)="020000000300000004", 0x9, 0x800}, {&(0x7f0000010400), 0x0, 0x1000}, {&(0x7f0000011500)="ed41000000080000dbf4655fdbf4655fdbf4655f00000000000004004000", 0x1e, 0x2080}, {0x0}, {0x0}, {&(0x7f0000011c00)="0b0000000c0001022e00000002000000f40702022e", 0x15, 0x10000}, {0x0}, {0x0}, {&(0x7f0000012400)="504d4d00504d4dffdbf4655f00000000647679756b6f762d676c6170746f70320000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000006c6f6f7033340075782f746573742f73797a5f6d6f756e745f696d6167655f650500"/123, 0x7b, 0x20000}, {0x0}, {0x0, 0x0, 0x38000}], 0x0, &(0x7f0000012f00)) 22:35:55 executing program 4: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000480)}}, 0x0, 0xffffffefffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x100000, 0xe, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000500100000f000000000000000100000005000000000004000040000020000000dbf4655fdbf4655f0100ffff53ef010001000000dbf4655f000000000000000001000000000000000b0000008000000018000000c20500002b0200"/116, 0x74, 0x400}, {&(0x7f0000010100)="000000000000000000000000244b8e9b57f04b59aa229cc218853f9501004000", 0x20, 0x4e0}, {&(0x7f0000010200)="010000000000050040", 0x9, 0x560}, {0x0, 0x0, 0x800}, {&(0x7f0000010400), 0x0, 0x1000}, {&(0x7f0000011500)="ed41000000080000dbf4655fdbf4655fdbf4655f00000000000004004000", 0x1e, 0x2080}, {0x0}, {0x0}, {&(0x7f0000011c00)="0b0000000c0001022e00000002000000f40702022e", 0x15, 0x10000}, {0x0}, {0x0}, {&(0x7f0000012400)="504d4d00504d4dffdbf4655f00000000647679756b6f762d676c6170746f70320000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000006c6f6f7033340075782f746573742f73797a5f6d6f756e745f696d6167655f650500"/123, 0x7b, 0x20000}, {0x0}, {0x0, 0x0, 0x38000}], 0x0, &(0x7f0000012f00)) 22:35:55 executing program 7: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000480)}}, 0x0, 0xffffffefffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x100000, 0xe, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000500100000f000000000000000100000005000000000004000040000020000000dbf4655fdbf4655f0100ffff53ef010001000000dbf4655f000000000000000001000000000000000b0000008000000018000000c20500002b0200"/116, 0x74, 0x400}, {&(0x7f0000010100)="000000000000000000000000244b8e9b57f04b59aa229cc218853f9501004000", 0x20, 0x4e0}, {&(0x7f0000010200)="010000000000050040", 0x9, 0x560}, {0x0, 0x0, 0x800}, {&(0x7f0000010400), 0x0, 0x1000}, {&(0x7f0000011500)="ed41000000080000dbf4655fdbf4655fdbf4655f00000000000004004000", 0x1e, 0x2080}, {0x0}, {0x0}, {&(0x7f0000011c00)="0b0000000c0001022e00000002000000f40702022e", 0x15, 0x10000}, {0x0}, {0x0}, {&(0x7f0000012400)="504d4d00504d4dffdbf4655f00000000647679756b6f762d676c6170746f70320000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000006c6f6f7033340075782f746573742f73797a5f6d6f756e745f696d6167655f650500"/123, 0x7b, 0x20000}, {0x0}, {0x0, 0x0, 0x38000}], 0x0, &(0x7f0000012f00)) 22:35:55 executing program 5: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) lsetxattr$security_evm(&(0x7f0000000240)='.\x00', &(0x7f0000000300), &(0x7f00000003c0)=@sha1={0x1, "bd2b5bce8b74aea700654a682479ac2c0852bc4d"}, 0x15, 0x3) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={&(0x7f0000000040), 0xb}, 0x0, 0x20, 0x0, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) r0 = fork() r1 = syz_open_procfs(r0, &(0x7f0000000000)='status\x00') r2 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x2, 0x0) pwrite64(r2, 0x0, 0x0, 0x8040000) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x20, 0x3, 0x4, 0x1, 0x0, 0x8, 0x20620, 0x2, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x3f, 0x2, @perf_config_ext={0x240000000, 0x5}, 0x1400, 0x4, 0x8, 0x7, 0x9, 0x6, 0x6, 0x0, 0x1, 0x0, 0x8}, r0, 0xa, r2, 0x1) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r3, 0x6, 0x1e, &(0x7f0000000040)=0x1, 0x4) connect$inet6(r3, &(0x7f0000000080)={0xa, 0x0, 0x0, @loopback}, 0x1c) openat$cgroup_ro(r1, &(0x7f0000000180)='blkio.throttle.io_serviced_recursive\x00', 0x0, 0x0) 22:35:55 executing program 6: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) lsetxattr$security_evm(&(0x7f0000000240)='.\x00', &(0x7f0000000300), &(0x7f00000003c0)=@sha1={0x1, "bd2b5bce8b74aea700654a682479ac2c0852bc4d"}, 0x15, 0x3) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={&(0x7f0000000040), 0xb}, 0x0, 0x20, 0x0, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) r0 = fork() r1 = syz_open_procfs(r0, &(0x7f0000000000)='status\x00') r2 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x2, 0x0) pwrite64(r2, &(0x7f00000000c0)='9', 0x1, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x20, 0x3, 0x4, 0x1, 0x0, 0x8, 0x20620, 0x2, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x3f, 0x2, @perf_config_ext={0x240000000, 0x5}, 0x1400, 0x4, 0x8, 0x7, 0x9, 0x6, 0x6, 0x0, 0x1, 0x0, 0x8}, r0, 0xa, r2, 0x1) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r3, 0x6, 0x1e, &(0x7f0000000040)=0x1, 0x4) setsockopt$inet6_tcp_TCP_REPAIR(r3, 0x6, 0x13, &(0x7f00000018c0)=0x1, 0x4) connect$inet6(r3, &(0x7f0000000080)={0xa, 0x0, 0x0, @loopback}, 0x1c) openat$cgroup_ro(r1, &(0x7f0000000180)='blkio.throttle.io_serviced_recursive\x00', 0x0, 0x0) [ 1631.028353] loop2: detected capacity change from 0 to 2048 [ 1631.028857] loop4: detected capacity change from 0 to 2048 [ 1631.035289] loop0: detected capacity change from 0 to 512 [ 1631.050590] EXT4-fs (loop0): unsupported descriptor size 0 [ 1631.065357] loop7: detected capacity change from 0 to 2048 [ 1631.065723] EXT4-fs (loop4): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 1631.067196] EXT4-fs (loop4): group descriptors corrupted! [ 1631.088026] EXT4-fs (loop7): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 1631.089863] EXT4-fs (loop7): group descriptors corrupted! [ 1631.121926] EXT4-fs (loop2): mounted filesystem without journal. Quota mode: none. [ 1631.125142] ext4 filesystem being mounted at /syzkaller-testdir307671421/syzkaller.SFQaEW/182/file0 supports timestamps until 2038 (0x7fffffff) 22:35:55 executing program 7: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000480)}}, 0x0, 0xffffffefffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x100000, 0xe, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000500100000f000000000000000100000005000000000004000040000020000000dbf4655fdbf4655f0100ffff53ef010001000000dbf4655f000000000000000001000000000000000b0000008000000018000000c20500002b0200"/116, 0x74, 0x400}, {&(0x7f0000010100)="000000000000000000000000244b8e9b57f04b59aa229cc218853f9501004000", 0x20, 0x4e0}, {&(0x7f0000010200)="010000000000050040", 0x9, 0x560}, {&(0x7f0000010300), 0x0, 0x800}, {&(0x7f0000010400), 0x0, 0x1000}, {&(0x7f0000011500)="ed41000000080000dbf4655fdbf4655fdbf4655f00000000000004004000", 0x1e, 0x2080}, {0x0}, {0x0}, {&(0x7f0000011c00)="0b0000000c0001022e00000002000000f40702022e", 0x15, 0x10000}, {0x0}, {0x0}, {&(0x7f0000012400)="504d4d00504d4dffdbf4655f00000000647679756b6f762d676c6170746f70320000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000006c6f6f7033340075782f746573742f73797a5f6d6f756e745f696d6167655f650500"/123, 0x7b, 0x20000}, {0x0}, {0x0, 0x0, 0x38000}], 0x0, &(0x7f0000012f00)) [ 1631.199255] EXT4-fs (loop2): unmounting filesystem. 22:35:55 executing program 2: perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000480)}}, 0x0, 0xffffffefffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x100000, 0xe, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000500100000f000000000000000100000005000000000004000040000020000000dbf4655fdbf4655f0100ffff53ef010001000000dbf4655f000000000000000001000000000000000b0000008000000018000000c20500002b0200"/116, 0x74, 0x400}, {&(0x7f0000010100)="000000000000000000000000244b8e9b57f04b59aa229cc218853f9501004000", 0x20, 0x4e0}, {&(0x7f0000010200)="010000000000050040", 0x9, 0x560}, {&(0x7f0000010300)="020000000300000004", 0x9, 0x800}, {&(0x7f0000010400), 0x0, 0x1000}, {&(0x7f0000011500)="ed41000000080000dbf4655fdbf4655fdbf4655f00000000000004004000", 0x1e, 0x2080}, {0x0}, {0x0}, {&(0x7f0000011c00)="0b0000000c0001022e00000002000000f40702022e", 0x15, 0x10000}, {0x0}, {0x0}, {&(0x7f0000012400)="504d4d00504d4dffdbf4655f00000000647679756b6f762d676c6170746f70320000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000006c6f6f7033340075782f746573742f73797a5f6d6f756e745f696d6167655f650500"/123, 0x7b, 0x20000}, {0x0}, {0x0, 0x0, 0x38000}], 0x0, &(0x7f0000012f00)) 22:35:55 executing program 0: perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000480)}}, 0x0, 0xffffffefffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0xd, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000500100000f000000000000000100000005000000000004000040000020000000dbf4655fdbf4655f0100ffff53ef010001000000dbf4655f000000000000000001000000000000000b0000008000000018000000c20500002b0200"/116, 0x74, 0x400}, {&(0x7f0000010100)="000000000000000000000000244b8e9b57f04b59aa229cc218853f95", 0x1c, 0x4e0}, {&(0x7f0000010200)="01000000000005", 0x7, 0x560}, {&(0x7f0000010300)="020000000300000004000000", 0xc, 0x800}, {&(0x7f0000010400), 0x0, 0x1000}, {&(0x7f0000011500)="ed41000000080000dbf4655fdbf4655f", 0x10, 0x2080}, {0x0}, {0x0}, {0x0, 0x0, 0x10000}, {0x0}, {0x0}, {0x0, 0x0, 0x20000}, {0x0}], 0x0, &(0x7f0000012f00)) 22:35:55 executing program 4: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000480)}}, 0x0, 0xffffffefffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x100000, 0xe, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000500100000f000000000000000100000005000000000004000040000020000000dbf4655fdbf4655f0100ffff53ef010001000000dbf4655f000000000000000001000000000000000b0000008000000018000000c20500002b0200"/116, 0x74, 0x400}, {&(0x7f0000010100)="000000000000000000000000244b8e9b57f04b59aa229cc218853f9501004000", 0x20, 0x4e0}, {&(0x7f0000010200)="010000000000050040", 0x9, 0x560}, {0x0, 0x0, 0x800}, {&(0x7f0000010400), 0x0, 0x1000}, {&(0x7f0000011500)="ed41000000080000dbf4655fdbf4655fdbf4655f00000000000004004000", 0x1e, 0x2080}, {0x0}, {0x0}, {&(0x7f0000011c00)="0b0000000c0001022e00000002000000f40702022e", 0x15, 0x10000}, {0x0}, {0x0}, {&(0x7f0000012400)="504d4d00504d4dffdbf4655f00000000647679756b6f762d676c6170746f70320000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000006c6f6f7033340075782f746573742f73797a5f6d6f756e745f696d6167655f650500"/123, 0x7b, 0x20000}, {0x0}, {0x0, 0x0, 0x38000}], 0x0, &(0x7f0000012f00)) [ 1631.242436] loop7: detected capacity change from 0 to 2048 [ 1631.288808] loop0: detected capacity change from 0 to 512 [ 1631.295310] loop2: detected capacity change from 0 to 2048 [ 1631.307654] EXT4-fs (loop0): unsupported descriptor size 0 [ 1631.321947] EXT4-fs (loop7): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 1631.323651] EXT4-fs (loop7): group descriptors corrupted! [ 1631.342968] EXT4-fs (loop2): mounted filesystem without journal. Quota mode: none. [ 1631.349060] ext4 filesystem being mounted at /syzkaller-testdir307671421/syzkaller.SFQaEW/183/file0 supports timestamps until 2038 (0x7fffffff) 22:35:55 executing program 1: r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, @perf_config_ext, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000000), 0x0) r2 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) ioctl$EXT4_IOC_CHECKPOINT(r2, 0x4004662b, &(0x7f0000000100)=0x5) ioctl$AUTOFS_DEV_IOCTL_TIMEOUT(0xffffffffffffffff, 0xc018937a, &(0x7f0000001480)=ANY=[@ANYBLOB, @ANYRES32=r0, @ANYBLOB="01040000000000002e2f66696c653000"]) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r3, 0xc08c5332, &(0x7f00000013c0)={0xffffffff, 0x6964, 0x0, 'queue1\x00', 0xff}) r4 = gettid() process_vm_writev(r4, &(0x7f0000002580)=[{&(0x7f0000000140)=""/89, 0x59}, {&(0x7f00000001c0)=""/175, 0xaf}, {&(0x7f0000000280)=""/4096, 0x1000}], 0x3, &(0x7f0000003840)=[{&(0x7f0000002640)=""/105, 0x69}, {0xfffffffffffffffe, 0x10}], 0x2, 0x0) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r1, 0xc08c5332, &(0x7f0000001280)={0x3, 0x5, 0x0, 'queue1\x00', 0x8}) r5 = fork() write$sndseq(r1, &(0x7f0000001340)=[{0x22, 0x8, 0x2, 0x3, @time={0x4}, {0x0, 0x1}, {0x6, 0x81}, @raw32={[0x800, 0x3, 0x9]}}, {0xe1, 0x7, 0xf8, 0xff, @tick=0x2, {0x3f}, {0x4, 0xf1}, @queue={0xff, {0x6, 0x9}}}, {0x4, 0x1, 0x9, 0x5, @time={0x7, 0x6}, {0x7c, 0x2}, {0x20, 0x6}, @connect={{0x0, 0xfd}, {0x98, 0x4}}}, {0x80, 0x4, 0x7, 0x7d, @time={0xfffff000, 0x9}, {0x81, 0x1f}, {0xaa}, @queue={0x5, {0xffffffe0, 0x3}}}], 0x70) r6 = syz_open_dev$vcsn(&(0x7f0000000040), 0x3, 0x2001) ioctl$LOOP_CTL_GET_FREE(r6, 0x4c82) ptrace$setopts(0x4206, r5, 0x0, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fork() fork() clone3(&(0x7f0000004c00)={0xc0002100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) [ 1631.365952] loop4: detected capacity change from 0 to 2048 22:35:55 executing program 0: perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000480)}}, 0x0, 0xffffffefffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0xd, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000500100000f000000000000000100000005000000000004000040000020000000dbf4655fdbf4655f0100ffff53ef010001000000dbf4655f000000000000000001000000000000000b0000008000000018000000c20500002b0200"/116, 0x74, 0x400}, {&(0x7f0000010100)="000000000000000000000000244b8e9b57f04b59aa229cc218853f95", 0x1c, 0x4e0}, {&(0x7f0000010200)="01000000000005", 0x7, 0x560}, {&(0x7f0000010300)="020000000300000004000000", 0xc, 0x800}, {&(0x7f0000010400), 0x0, 0x1000}, {&(0x7f0000011500)="ed41000000080000dbf4655fdbf4655f", 0x10, 0x2080}, {0x0}, {0x0}, {0x0, 0x0, 0x10000}, {0x0}, {0x0}, {0x0, 0x0, 0x20000}, {0x0}], 0x0, &(0x7f0000012f00)) [ 1631.393290] EXT4-fs (loop4): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 1631.394108] EXT4-fs (loop4): group descriptors corrupted! 22:35:55 executing program 2: perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000480)}}, 0x0, 0xffffffefffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x100000, 0xe, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000500100000f000000000000000100000005000000000004000040000020000000dbf4655fdbf4655f0100ffff53ef010001000000dbf4655f000000000000000001000000000000000b0000008000000018000000c20500002b0200"/116, 0x74, 0x400}, {&(0x7f0000010100)="000000000000000000000000244b8e9b57f04b59aa229cc218853f9501004000", 0x20, 0x4e0}, {&(0x7f0000010200)="010000000000050040", 0x9, 0x560}, {&(0x7f0000010300)="0200000003000000040000", 0xb, 0x800}, {&(0x7f0000010400), 0x0, 0x1000}, {&(0x7f0000011500)="ed41000000080000dbf4655fdbf4655fdbf4655f00000000000004004000", 0x1e, 0x2080}, {0x0}, {0x0}, {&(0x7f0000011c00)="0b0000000c0001022e00000002000000f40702022e", 0x15, 0x10000}, {0x0}, {0x0}, {&(0x7f0000012400)="504d4d00504d4dffdbf4655f00000000647679756b6f762d676c6170746f70320000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000006c6f6f7033340075782f746573742f73797a5f6d6f756e745f696d6167655f650500"/123, 0x7b, 0x20000}, {0x0}, {0x0, 0x0, 0x38000}], 0x0, &(0x7f0000012f00)) [ 1631.443431] EXT4-fs (loop2): unmounting filesystem. 22:35:56 executing program 7: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000480)}}, 0x0, 0xffffffefffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x100000, 0xe, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000500100000f000000000000000100000005000000000004000040000020000000dbf4655fdbf4655f0100ffff53ef010001000000dbf4655f000000000000000001000000000000000b0000008000000018000000c20500002b0200"/116, 0x74, 0x400}, {&(0x7f0000010100)="000000000000000000000000244b8e9b57f04b59aa229cc218853f9501004000", 0x20, 0x4e0}, {&(0x7f0000010200)="010000000000050040", 0x9, 0x560}, {&(0x7f0000010300), 0x0, 0x800}, {&(0x7f0000010400), 0x0, 0x1000}, {&(0x7f0000011500)="ed41000000080000dbf4655fdbf4655fdbf4655f00000000000004004000", 0x1e, 0x2080}, {0x0}, {0x0}, {&(0x7f0000011c00)="0b0000000c0001022e00000002000000f40702022e", 0x15, 0x10000}, {0x0}, {0x0}, {&(0x7f0000012400)="504d4d00504d4dffdbf4655f00000000647679756b6f762d676c6170746f70320000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000006c6f6f7033340075782f746573742f73797a5f6d6f756e745f696d6167655f650500"/123, 0x7b, 0x20000}, {0x0}, {0x0, 0x0, 0x38000}], 0x0, &(0x7f0000012f00)) 22:35:56 executing program 6: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) lsetxattr$security_evm(&(0x7f0000000240)='.\x00', &(0x7f0000000300), &(0x7f00000003c0)=@sha1={0x1, "bd2b5bce8b74aea700654a682479ac2c0852bc4d"}, 0x15, 0x3) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={&(0x7f0000000040), 0xb}, 0x0, 0x20, 0x0, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) r0 = fork() r1 = syz_open_procfs(r0, &(0x7f0000000000)='status\x00') r2 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x2, 0x0) pwrite64(r2, &(0x7f00000000c0)='9', 0x1, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x20, 0x3, 0x4, 0x1, 0x0, 0x8, 0x20620, 0x2, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x3f, 0x2, @perf_config_ext={0x240000000, 0x5}, 0x1400, 0x4, 0x8, 0x7, 0x9, 0x6, 0x6, 0x0, 0x1, 0x0, 0x8}, r0, 0xa, r2, 0x1) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r3, 0x6, 0x1e, &(0x7f0000000040)=0x1, 0x4) setsockopt$inet6_tcp_TCP_REPAIR(r3, 0x6, 0x13, &(0x7f00000018c0)=0x1, 0x4) connect$inet6(r3, &(0x7f0000000080)={0xa, 0x0, 0x0, @loopback}, 0x1c) openat$cgroup_ro(r1, &(0x7f0000000180)='blkio.throttle.io_serviced_recursive\x00', 0x0, 0x0) [ 1631.557160] loop2: detected capacity change from 0 to 2048 [ 1631.564354] loop7: detected capacity change from 0 to 2048 [ 1631.579722] EXT4-fs (loop7): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 1631.580593] EXT4-fs (loop7): group descriptors corrupted! [ 1631.595671] EXT4-fs (loop2): mounted filesystem without journal. Quota mode: none. [ 1631.597075] ext4 filesystem being mounted at /syzkaller-testdir307671421/syzkaller.SFQaEW/184/file0 supports timestamps until 2038 (0x7fffffff) 22:35:56 executing program 3: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) lsetxattr$security_evm(&(0x7f0000000240)='.\x00', &(0x7f0000000300), &(0x7f00000003c0)=@sha1={0x1, "bd2b5bce8b74aea700654a682479ac2c0852bc4d"}, 0x15, 0x3) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={&(0x7f0000000040), 0xb}, 0x0, 0x20, 0x0, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) r0 = fork() r1 = syz_open_procfs(r0, &(0x7f0000000000)='status\x00') r2 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x2, 0x0) pwrite64(r2, &(0x7f00000000c0)='9', 0x1, 0x8040000) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x3, 0x4, 0x1, 0x0, 0x8, 0x20620, 0x2, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x3f, 0x2, @perf_config_ext={0x240000000, 0x5}, 0x1400, 0x4, 0x8, 0x7, 0x9, 0x6, 0x6, 0x0, 0x1, 0x0, 0x8}, r0, 0xa, r2, 0x1) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r3, 0x6, 0x1e, &(0x7f0000000040)=0x1, 0x4) setsockopt$inet6_tcp_TCP_REPAIR(r3, 0x6, 0x13, &(0x7f00000018c0)=0x1, 0x4) connect$inet6(r3, &(0x7f0000000080)={0xa, 0x0, 0x0, @loopback}, 0x1c) openat$cgroup_ro(r1, &(0x7f0000000180)='blkio.throttle.io_serviced_recursive\x00', 0x0, 0x0) 22:35:56 executing program 4: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000480)}}, 0x0, 0xffffffefffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x100000, 0xe, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000500100000f000000000000000100000005000000000004000040000020000000dbf4655fdbf4655f0100ffff53ef010001000000dbf4655f000000000000000001000000000000000b0000008000000018000000c20500002b0200"/116, 0x74, 0x400}, {&(0x7f0000010100)="000000000000000000000000244b8e9b57f04b59aa229cc218853f9501004000", 0x20, 0x4e0}, {&(0x7f0000010200)="010000000000050040", 0x9, 0x560}, {&(0x7f0000010300), 0x0, 0x800}, {&(0x7f0000010400), 0x0, 0x1000}, {&(0x7f0000011500)="ed41000000080000dbf4655fdbf4655fdbf4655f00000000000004004000", 0x1e, 0x2080}, {0x0}, {0x0}, {&(0x7f0000011c00)="0b0000000c0001022e00000002000000f40702022e", 0x15, 0x10000}, {0x0}, {0x0}, {&(0x7f0000012400)="504d4d00504d4dffdbf4655f00000000647679756b6f762d676c6170746f70320000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000006c6f6f7033340075782f746573742f73797a5f6d6f756e745f696d6167655f650500"/123, 0x7b, 0x20000}, {0x0}, {0x0, 0x0, 0x38000}], 0x0, &(0x7f0000012f00)) 22:35:56 executing program 0: perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000480)}}, 0x0, 0xffffffefffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0xd, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000500100000f000000000000000100000005000000000004000040000020000000dbf4655fdbf4655f0100ffff53ef010001000000dbf4655f000000000000000001000000000000000b0000008000000018000000c20500002b0200"/116, 0x74, 0x400}, {&(0x7f0000010100)="000000000000000000000000244b8e9b57f04b59aa229cc218853f95", 0x1c, 0x4e0}, {&(0x7f0000010200)="01000000000005", 0x7, 0x560}, {&(0x7f0000010300)="020000000300000004000000", 0xc, 0x800}, {&(0x7f0000010400), 0x0, 0x1000}, {&(0x7f0000011500)="ed41000000080000dbf4655fdbf4655f", 0x10, 0x2080}, {0x0}, {0x0}, {0x0, 0x0, 0x10000}, {0x0}, {0x0}, {0x0, 0x0, 0x20000}, {0x0}], 0x0, &(0x7f0000012f00)) 22:35:56 executing program 5: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) lsetxattr$security_evm(&(0x7f0000000240)='.\x00', &(0x7f0000000300), &(0x7f00000003c0)=@sha1={0x1, "bd2b5bce8b74aea700654a682479ac2c0852bc4d"}, 0x15, 0x3) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={&(0x7f0000000040), 0xb}, 0x0, 0x20, 0x0, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) r0 = fork() r1 = syz_open_procfs(r0, &(0x7f0000000000)='status\x00') r2 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x2, 0x0) pwrite64(r2, &(0x7f00000000c0), 0x0, 0x8040000) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x20, 0x3, 0x4, 0x1, 0x0, 0x8, 0x20620, 0x2, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x3f, 0x2, @perf_config_ext={0x240000000, 0x5}, 0x1400, 0x4, 0x8, 0x7, 0x9, 0x6, 0x6, 0x0, 0x1, 0x0, 0x8}, r0, 0xa, r2, 0x1) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r3, 0x6, 0x1e, &(0x7f0000000040)=0x1, 0x4) connect$inet6(r3, &(0x7f0000000080)={0xa, 0x0, 0x0, @loopback}, 0x1c) openat$cgroup_ro(r1, &(0x7f0000000180)='blkio.throttle.io_serviced_recursive\x00', 0x0, 0x0) 22:35:56 executing program 2: perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000480)}}, 0x0, 0xffffffefffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x100000, 0xe, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000500100000f000000000000000100000005000000000004000040000020000000dbf4655fdbf4655f0100ffff53ef010001000000dbf4655f000000000000000001000000000000000b0000008000000018000000c20500002b0200"/116, 0x74, 0x400}, {&(0x7f0000010100)="000000000000000000000000244b8e9b57f04b59aa229cc218853f9501004000", 0x20, 0x4e0}, {&(0x7f0000010200)="010000000000050040", 0x9, 0x560}, {&(0x7f0000010300)="0200000003000000040000", 0xb, 0x800}, {&(0x7f0000010400), 0x0, 0x1000}, {&(0x7f0000011500)="ed41000000080000dbf4655fdbf4655fdbf4655f00000000000004004000", 0x1e, 0x2080}, {0x0}, {0x0}, {&(0x7f0000011c00)="0b0000000c0001022e00000002000000f40702022e", 0x15, 0x10000}, {0x0}, {0x0}, {&(0x7f0000012400)="504d4d00504d4dffdbf4655f00000000647679756b6f762d676c6170746f70320000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000006c6f6f7033340075782f746573742f73797a5f6d6f756e745f696d6167655f650500"/123, 0x7b, 0x20000}, {0x0}, {0x0, 0x0, 0x38000}], 0x0, &(0x7f0000012f00)) [ 1631.635035] EXT4-fs (loop2): unmounting filesystem. [ 1631.700955] loop0: detected capacity change from 0 to 512 [ 1631.714139] EXT4-fs (loop0): unsupported descriptor size 0 [ 1631.727171] loop4: detected capacity change from 0 to 2048 [ 1631.764702] EXT4-fs (loop4): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 1631.766247] EXT4-fs (loop4): group descriptors corrupted! [ 1631.816646] loop2: detected capacity change from 0 to 2048 [ 1631.899277] EXT4-fs (loop2): mounted filesystem without journal. Quota mode: none. [ 1631.907062] ext4 filesystem being mounted at /syzkaller-testdir307671421/syzkaller.SFQaEW/185/file0 supports timestamps until 2038 (0x7fffffff) [ 1631.985937] EXT4-fs (loop2): unmounting filesystem. 22:36:12 executing program 3: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) lsetxattr$security_evm(&(0x7f0000000240)='.\x00', &(0x7f0000000300), &(0x7f00000003c0)=@sha1={0x1, "bd2b5bce8b74aea700654a682479ac2c0852bc4d"}, 0x15, 0x3) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={&(0x7f0000000040), 0xb}, 0x0, 0x20, 0x0, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) r0 = fork() r1 = syz_open_procfs(r0, &(0x7f0000000000)='status\x00') r2 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x2, 0x0) pwrite64(r2, &(0x7f00000000c0)='9', 0x1, 0x8040000) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x3, 0x4, 0x1, 0x0, 0x8, 0x20620, 0x2, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x3f, 0x2, @perf_config_ext={0x240000000, 0x5}, 0x1400, 0x4, 0x8, 0x7, 0x9, 0x6, 0x6, 0x0, 0x1, 0x0, 0x8}, r0, 0xa, r2, 0x1) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r3, 0x6, 0x1e, &(0x7f0000000040)=0x1, 0x4) setsockopt$inet6_tcp_TCP_REPAIR(r3, 0x6, 0x13, &(0x7f00000018c0)=0x1, 0x4) connect$inet6(r3, &(0x7f0000000080)={0xa, 0x0, 0x0, @loopback}, 0x1c) openat$cgroup_ro(r1, &(0x7f0000000180)='blkio.throttle.io_serviced_recursive\x00', 0x0, 0x0) [ 1648.267021] loop7: detected capacity change from 0 to 2048 [ 1648.278631] EXT4-fs (loop7): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 1648.279386] EXT4-fs (loop7): group descriptors corrupted! 22:36:12 executing program 7: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000480)}}, 0x0, 0xffffffefffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x100000, 0xe, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000500100000f000000000000000100000005000000000004000040000020000000dbf4655fdbf4655f0100ffff53ef010001000000dbf4655f000000000000000001000000000000000b0000008000000018000000c20500002b0200"/116, 0x74, 0x400}, {&(0x7f0000010100)="000000000000000000000000244b8e9b57f04b59aa229cc218853f9501004000", 0x20, 0x4e0}, {&(0x7f0000010200)="010000000000050040", 0x9, 0x560}, {&(0x7f0000010300), 0x0, 0x800}, {&(0x7f0000010400), 0x0, 0x1000}, {&(0x7f0000011500)="ed41000000080000dbf4655fdbf4655fdbf4655f00000000000004004000", 0x1e, 0x2080}, {0x0}, {0x0}, {&(0x7f0000011c00)="0b0000000c0001022e00000002000000f40702022e", 0x15, 0x10000}, {0x0}, {0x0}, {&(0x7f0000012400)="504d4d00504d4dffdbf4655f00000000647679756b6f762d676c6170746f70320000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000006c6f6f7033340075782f746573742f73797a5f6d6f756e745f696d6167655f650500"/123, 0x7b, 0x20000}, {0x0}, {0x0, 0x0, 0x38000}], 0x0, &(0x7f0000012f00)) 22:36:12 executing program 2: perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000480)}}, 0x0, 0xffffffefffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x100000, 0xe, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000500100000f000000000000000100000005000000000004000040000020000000dbf4655fdbf4655f0100ffff53ef010001000000dbf4655f000000000000000001000000000000000b0000008000000018000000c20500002b0200"/116, 0x74, 0x400}, {&(0x7f0000010100)="000000000000000000000000244b8e9b57f04b59aa229cc218853f9501004000", 0x20, 0x4e0}, {&(0x7f0000010200)="010000000000050040", 0x9, 0x560}, {&(0x7f0000010300)="0200000003000000040000", 0xb, 0x800}, {&(0x7f0000010400), 0x0, 0x1000}, {&(0x7f0000011500)="ed41000000080000dbf4655fdbf4655fdbf4655f00000000000004004000", 0x1e, 0x2080}, {0x0}, {0x0}, {&(0x7f0000011c00)="0b0000000c0001022e00000002000000f40702022e", 0x15, 0x10000}, {0x0}, {0x0}, {&(0x7f0000012400)="504d4d00504d4dffdbf4655f00000000647679756b6f762d676c6170746f70320000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000006c6f6f7033340075782f746573742f73797a5f6d6f756e745f696d6167655f650500"/123, 0x7b, 0x20000}, {0x0}, {0x0, 0x0, 0x38000}], 0x0, &(0x7f0000012f00)) 22:36:12 executing program 4: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000480)}}, 0x0, 0xffffffefffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x100000, 0xe, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000500100000f000000000000000100000005000000000004000040000020000000dbf4655fdbf4655f0100ffff53ef010001000000dbf4655f000000000000000001000000000000000b0000008000000018000000c20500002b0200"/116, 0x74, 0x400}, {&(0x7f0000010100)="000000000000000000000000244b8e9b57f04b59aa229cc218853f9501004000", 0x20, 0x4e0}, {&(0x7f0000010200)="010000000000050040", 0x9, 0x560}, {&(0x7f0000010300), 0x0, 0x800}, {&(0x7f0000010400), 0x0, 0x1000}, {&(0x7f0000011500)="ed41000000080000dbf4655fdbf4655fdbf4655f00000000000004004000", 0x1e, 0x2080}, {0x0}, {0x0}, {&(0x7f0000011c00)="0b0000000c0001022e00000002000000f40702022e", 0x15, 0x10000}, {0x0}, {0x0}, {&(0x7f0000012400)="504d4d00504d4dffdbf4655f00000000647679756b6f762d676c6170746f70320000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000006c6f6f7033340075782f746573742f73797a5f6d6f756e745f696d6167655f650500"/123, 0x7b, 0x20000}, {0x0}, {0x0, 0x0, 0x38000}], 0x0, &(0x7f0000012f00)) 22:36:12 executing program 0: perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000480)}}, 0x0, 0xffffffefffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0xd, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000500100000f000000000000000100000005000000000004000040000020000000dbf4655fdbf4655f0100ffff53ef010001000000dbf4655f000000000000000001000000000000000b0000008000000018000000c20500002b0200"/116, 0x74, 0x400}, {&(0x7f0000010100)="000000000000000000000000244b8e9b57f04b59aa229cc218853f950100", 0x1e, 0x4e0}, {&(0x7f0000010200)="01000000000005", 0x7, 0x560}, {&(0x7f0000010300)="020000000300000004000000", 0xc, 0x800}, {&(0x7f0000010400), 0x0, 0x1000}, {&(0x7f0000011500)="ed41000000080000dbf4655fdbf4655f", 0x10, 0x2080}, {0x0}, {0x0}, {0x0, 0x0, 0x10000}, {0x0}, {0x0}, {0x0, 0x0, 0x20000}, {0x0}], 0x0, &(0x7f0000012f00)) 22:36:12 executing program 1: r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, @perf_config_ext, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000000), 0x0) r2 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) ioctl$EXT4_IOC_CHECKPOINT(r2, 0x4004662b, &(0x7f0000000100)=0x5) ioctl$AUTOFS_DEV_IOCTL_TIMEOUT(0xffffffffffffffff, 0xc018937a, &(0x7f0000001480)=ANY=[@ANYBLOB, @ANYRES32=r0, @ANYBLOB="01040000000000002e2f66696c653000"]) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r3, 0xc08c5332, &(0x7f00000013c0)={0xffffffff, 0x6964, 0x0, 'queue1\x00', 0xff}) r4 = gettid() process_vm_writev(r4, &(0x7f0000002580)=[{&(0x7f0000000140)=""/89, 0x59}, {&(0x7f00000001c0)=""/175, 0xaf}, {&(0x7f0000000280)=""/4096, 0x1000}], 0x3, &(0x7f0000003840)=[{&(0x7f0000002640)=""/105, 0x69}, {0xfffffffffffffffe, 0x10}], 0x2, 0x0) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r1, 0xc08c5332, &(0x7f0000001280)={0x3, 0x5, 0x0, 'queue1\x00', 0x8}) r5 = fork() write$sndseq(r1, &(0x7f0000001340)=[{0x22, 0x8, 0x2, 0x3, @time={0x4}, {0x0, 0x1}, {0x6, 0x81}, @raw32={[0x800, 0x3, 0x9]}}, {0xe1, 0x7, 0xf8, 0xff, @tick=0x2, {0x3f}, {0x4, 0xf1}, @queue={0xff, {0x6, 0x9}}}, {0x4, 0x1, 0x9, 0x5, @time={0x7, 0x6}, {0x7c, 0x2}, {0x20, 0x6}, @connect={{0x0, 0xfd}, {0x98, 0x4}}}, {0x80, 0x4, 0x7, 0x7d, @time={0xfffff000, 0x9}, {0x81, 0x1f}, {0xaa}, @queue={0x5, {0xffffffe0, 0x3}}}], 0x70) r6 = syz_open_dev$vcsn(&(0x7f0000000040), 0x3, 0x2001) ioctl$LOOP_CTL_GET_FREE(r6, 0x4c82) ptrace$setopts(0x4206, r5, 0x0, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fork() fork() clone3(&(0x7f0000004c00)={0xc0002100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) 22:36:12 executing program 5: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) lsetxattr$security_evm(&(0x7f0000000240)='.\x00', &(0x7f0000000300), &(0x7f00000003c0)=@sha1={0x1, "bd2b5bce8b74aea700654a682479ac2c0852bc4d"}, 0x15, 0x3) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={&(0x7f0000000040), 0xb}, 0x0, 0x20, 0x0, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) r0 = fork() r1 = syz_open_procfs(r0, &(0x7f0000000000)='status\x00') r2 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x2, 0x0) pwrite64(r2, &(0x7f00000000c0), 0x0, 0x8040000) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x20, 0x3, 0x4, 0x1, 0x0, 0x8, 0x20620, 0x2, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x3f, 0x2, @perf_config_ext={0x240000000, 0x5}, 0x1400, 0x4, 0x8, 0x7, 0x9, 0x6, 0x6, 0x0, 0x1, 0x0, 0x8}, r0, 0xa, r2, 0x1) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r3, 0x6, 0x1e, &(0x7f0000000040)=0x1, 0x4) connect$inet6(r3, &(0x7f0000000080)={0xa, 0x0, 0x0, @loopback}, 0x1c) openat$cgroup_ro(r1, &(0x7f0000000180)='blkio.throttle.io_serviced_recursive\x00', 0x0, 0x0) 22:36:12 executing program 6: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) lsetxattr$security_evm(&(0x7f0000000240)='.\x00', &(0x7f0000000300), &(0x7f00000003c0)=@sha1={0x1, "bd2b5bce8b74aea700654a682479ac2c0852bc4d"}, 0x15, 0x3) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={&(0x7f0000000040), 0xb}, 0x0, 0x20, 0x0, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) r0 = fork() r1 = syz_open_procfs(r0, &(0x7f0000000000)='status\x00') r2 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x2, 0x0) pwrite64(r2, &(0x7f00000000c0)='9', 0x1, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x20, 0x3, 0x4, 0x1, 0x0, 0x8, 0x20620, 0x2, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x3f, 0x2, @perf_config_ext={0x240000000, 0x5}, 0x1400, 0x4, 0x8, 0x7, 0x9, 0x6, 0x6, 0x0, 0x1, 0x0, 0x8}, r0, 0xa, r2, 0x1) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r3, 0x6, 0x1e, &(0x7f0000000040)=0x1, 0x4) setsockopt$inet6_tcp_TCP_REPAIR(r3, 0x6, 0x13, &(0x7f00000018c0)=0x1, 0x4) connect$inet6(r3, &(0x7f0000000080)={0xa, 0x0, 0x0, @loopback}, 0x1c) openat$cgroup_ro(r1, &(0x7f0000000180)='blkio.throttle.io_serviced_recursive\x00', 0x0, 0x0) [ 1648.310699] loop0: detected capacity change from 0 to 512 [ 1648.321622] loop2: detected capacity change from 0 to 2048 [ 1648.329698] loop4: detected capacity change from 0 to 2048 [ 1648.335081] EXT4-fs (loop0): unsupported descriptor size 0 [ 1648.349932] EXT4-fs (loop4): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 1648.350829] EXT4-fs (loop4): group descriptors corrupted! [ 1648.387920] EXT4-fs (loop2): mounted filesystem without journal. Quota mode: none. 22:36:12 executing program 4: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000480)}}, 0x0, 0xffffffefffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x100000, 0xe, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000500100000f000000000000000100000005000000000004000040000020000000dbf4655fdbf4655f0100ffff53ef010001000000dbf4655f000000000000000001000000000000000b0000008000000018000000c20500002b0200"/116, 0x74, 0x400}, {&(0x7f0000010100)="000000000000000000000000244b8e9b57f04b59aa229cc218853f9501004000", 0x20, 0x4e0}, {&(0x7f0000010200)="010000000000050040", 0x9, 0x560}, {&(0x7f0000010300), 0x0, 0x800}, {&(0x7f0000010400), 0x0, 0x1000}, {&(0x7f0000011500)="ed41000000080000dbf4655fdbf4655fdbf4655f00000000000004004000", 0x1e, 0x2080}, {0x0}, {0x0}, {&(0x7f0000011c00)="0b0000000c0001022e00000002000000f40702022e", 0x15, 0x10000}, {0x0}, {0x0}, {&(0x7f0000012400)="504d4d00504d4dffdbf4655f00000000647679756b6f762d676c6170746f70320000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000006c6f6f7033340075782f746573742f73797a5f6d6f756e745f696d6167655f650500"/123, 0x7b, 0x20000}, {0x0}, {0x0, 0x0, 0x38000}], 0x0, &(0x7f0000012f00)) [ 1648.393748] ext4 filesystem being mounted at /syzkaller-testdir307671421/syzkaller.SFQaEW/186/file0 supports timestamps until 2038 (0x7fffffff) 22:36:12 executing program 7: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000480)}}, 0x0, 0xffffffefffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x100000, 0xe, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000500100000f000000000000000100000005000000000004000040000020000000dbf4655fdbf4655f0100ffff53ef010001000000dbf4655f000000000000000001000000000000000b0000008000000018000000c20500002b0200"/116, 0x74, 0x400}, {&(0x7f0000010100)="000000000000000000000000244b8e9b57f04b59aa229cc218853f9501004000", 0x20, 0x4e0}, {&(0x7f0000010200)="010000000000050040", 0x9, 0x560}, {&(0x7f0000010300)="020000000300", 0x6, 0x800}, {&(0x7f0000010400), 0x0, 0x1000}, {&(0x7f0000011500)="ed41000000080000dbf4655fdbf4655fdbf4655f00000000000004004000", 0x1e, 0x2080}, {0x0}, {0x0}, {&(0x7f0000011c00)="0b0000000c0001022e00000002000000f40702022e", 0x15, 0x10000}, {0x0}, {0x0}, {&(0x7f0000012400)="504d4d00504d4dffdbf4655f00000000647679756b6f762d676c6170746f70320000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000006c6f6f7033340075782f746573742f73797a5f6d6f756e745f696d6167655f650500"/123, 0x7b, 0x20000}, {0x0}, {0x0, 0x0, 0x38000}], 0x0, &(0x7f0000012f00)) [ 1648.426819] loop4: detected capacity change from 0 to 2048 [ 1648.438568] EXT4-fs (loop4): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 1648.439256] EXT4-fs (loop4): group descriptors corrupted! [ 1648.440223] loop7: detected capacity change from 0 to 2048 [ 1648.455438] EXT4-fs (loop7): ext4_check_descriptors: Inode table for group 0 overlaps superblock [ 1648.456341] EXT4-fs (loop7): group descriptors corrupted! 22:36:13 executing program 0: perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000480)}}, 0x0, 0xffffffefffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0xd, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000500100000f000000000000000100000005000000000004000040000020000000dbf4655fdbf4655f0100ffff53ef010001000000dbf4655f000000000000000001000000000000000b0000008000000018000000c20500002b0200"/116, 0x74, 0x400}, {&(0x7f0000010100)="000000000000000000000000244b8e9b57f04b59aa229cc218853f950100", 0x1e, 0x4e0}, {&(0x7f0000010200)="01000000000005", 0x7, 0x560}, {&(0x7f0000010300)="020000000300000004000000", 0xc, 0x800}, {&(0x7f0000010400), 0x0, 0x1000}, {&(0x7f0000011500)="ed41000000080000dbf4655fdbf4655f", 0x10, 0x2080}, {0x0}, {0x0}, {0x0, 0x0, 0x10000}, {0x0}, {0x0}, {0x0, 0x0, 0x20000}, {0x0}], 0x0, &(0x7f0000012f00)) [ 1648.475389] EXT4-fs (loop2): unmounting filesystem. 22:36:13 executing program 2: perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000480)}}, 0x0, 0xffffffefffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x100000, 0xe, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000500100000f000000000000000100000005000000000004000040000020000000dbf4655fdbf4655f0100ffff53ef010001000000dbf4655f000000000000000001000000000000000b0000008000000018000000c20500002b0200"/116, 0x74, 0x400}, {&(0x7f0000010100)="000000000000000000000000244b8e9b57f04b59aa229cc218853f9501004000", 0x20, 0x4e0}, {&(0x7f0000010200)="010000000000050040", 0x9, 0x560}, {&(0x7f0000010300)="020000000300000004000000", 0xc}, {&(0x7f0000010400), 0x0, 0x1000}, {&(0x7f0000011500)="ed41000000080000dbf4655fdbf4655fdbf4655f00000000000004004000", 0x1e, 0x2080}, {0x0}, {0x0}, {&(0x7f0000011c00)="0b0000000c0001022e00000002000000f40702022e", 0x15, 0x10000}, {0x0}, {0x0}, {&(0x7f0000012400)="504d4d00504d4dffdbf4655f00000000647679756b6f762d676c6170746f70320000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000006c6f6f7033340075782f746573742f73797a5f6d6f756e745f696d6167655f650500"/123, 0x7b, 0x20000}, {0x0}, {0x0, 0x0, 0x38000}], 0x0, &(0x7f0000012f00)) [ 1648.528907] loop0: detected capacity change from 0 to 512 22:36:13 executing program 3: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) lsetxattr$security_evm(&(0x7f0000000240)='.\x00', &(0x7f0000000300), &(0x7f00000003c0)=@sha1={0x1, "bd2b5bce8b74aea700654a682479ac2c0852bc4d"}, 0x15, 0x3) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={&(0x7f0000000040), 0xb}, 0x0, 0x20, 0x0, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) r0 = fork() r1 = syz_open_procfs(r0, &(0x7f0000000000)='status\x00') r2 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x2, 0x0) pwrite64(r2, &(0x7f00000000c0)='9', 0x1, 0x8040000) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x3, 0x4, 0x1, 0x0, 0x8, 0x20620, 0x2, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x3f, 0x2, @perf_config_ext={0x240000000, 0x5}, 0x1400, 0x4, 0x8, 0x7, 0x9, 0x6, 0x6, 0x0, 0x1, 0x0, 0x8}, r0, 0xa, r2, 0x1) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r3, 0x6, 0x1e, &(0x7f0000000040)=0x1, 0x4) setsockopt$inet6_tcp_TCP_REPAIR(r3, 0x6, 0x13, &(0x7f00000018c0)=0x1, 0x4) connect$inet6(r3, &(0x7f0000000080)={0xa, 0x0, 0x0, @loopback}, 0x1c) openat$cgroup_ro(r1, &(0x7f0000000180)='blkio.throttle.io_serviced_recursive\x00', 0x0, 0x0) 22:36:13 executing program 4: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000480)}}, 0x0, 0xffffffefffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x100000, 0xe, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000500100000f000000000000000100000005000000000004000040000020000000dbf4655fdbf4655f0100ffff53ef010001000000dbf4655f000000000000000001000000000000000b0000008000000018000000c20500002b0200"/116, 0x74, 0x400}, {&(0x7f0000010100)="000000000000000000000000244b8e9b57f04b59aa229cc218853f9501004000", 0x20, 0x4e0}, {&(0x7f0000010200)="010000000000050040", 0x9, 0x560}, {&(0x7f0000010300)="020000000300", 0x6, 0x800}, {&(0x7f0000010400), 0x0, 0x1000}, {&(0x7f0000011500)="ed41000000080000dbf4655fdbf4655fdbf4655f00000000000004004000", 0x1e, 0x2080}, {0x0}, {0x0}, {&(0x7f0000011c00)="0b0000000c0001022e00000002000000f40702022e", 0x15, 0x10000}, {0x0}, {0x0}, {&(0x7f0000012400)="504d4d00504d4dffdbf4655f00000000647679756b6f762d676c6170746f70320000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000006c6f6f7033340075782f746573742f73797a5f6d6f756e745f696d6167655f650500"/123, 0x7b, 0x20000}, {0x0}, {0x0, 0x0, 0x38000}], 0x0, &(0x7f0000012f00)) [ 1648.546346] EXT4-fs (loop0): unsupported descriptor size 0 [ 1648.550880] loop2: detected capacity change from 0 to 2048 [ 1648.568122] EXT4-fs (loop2): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 1648.569034] EXT4-fs (loop2): group descriptors corrupted! [ 1648.603568] loop4: detected capacity change from 0 to 2048 [ 1648.615555] EXT4-fs (loop4): ext4_check_descriptors: Inode table for group 0 overlaps superblock [ 1648.616285] EXT4-fs (loop4): group descriptors corrupted! 22:36:32 executing program 3: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) lsetxattr$security_evm(&(0x7f0000000240)='.\x00', &(0x7f0000000300), &(0x7f00000003c0)=@sha1={0x1, "bd2b5bce8b74aea700654a682479ac2c0852bc4d"}, 0x15, 0x3) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={&(0x7f0000000040), 0xb}, 0x0, 0x20, 0x0, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) r0 = fork() r1 = syz_open_procfs(r0, &(0x7f0000000000)='status\x00') r2 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x2, 0x0) pwrite64(r2, &(0x7f00000000c0)='9', 0x1, 0x8040000) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x20, 0x0, 0x4, 0x1, 0x0, 0x8, 0x20620, 0x2, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x3f, 0x2, @perf_config_ext={0x240000000, 0x5}, 0x1400, 0x4, 0x8, 0x7, 0x9, 0x6, 0x6, 0x0, 0x1, 0x0, 0x8}, r0, 0xa, r2, 0x1) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r3, 0x6, 0x1e, &(0x7f0000000040)=0x1, 0x4) setsockopt$inet6_tcp_TCP_REPAIR(r3, 0x6, 0x13, &(0x7f00000018c0)=0x1, 0x4) connect$inet6(r3, &(0x7f0000000080)={0xa, 0x0, 0x0, @loopback}, 0x1c) openat$cgroup_ro(r1, &(0x7f0000000180)='blkio.throttle.io_serviced_recursive\x00', 0x0, 0x0) 22:36:32 executing program 7: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000480)}}, 0x0, 0xffffffefffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x100000, 0xe, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000500100000f000000000000000100000005000000000004000040000020000000dbf4655fdbf4655f0100ffff53ef010001000000dbf4655f000000000000000001000000000000000b0000008000000018000000c20500002b0200"/116, 0x74, 0x400}, {&(0x7f0000010100)="000000000000000000000000244b8e9b57f04b59aa229cc218853f9501004000", 0x20, 0x4e0}, {&(0x7f0000010200)="010000000000050040", 0x9, 0x560}, {&(0x7f0000010300)="020000000300", 0x6, 0x800}, {&(0x7f0000010400), 0x0, 0x1000}, {&(0x7f0000011500)="ed41000000080000dbf4655fdbf4655fdbf4655f00000000000004004000", 0x1e, 0x2080}, {0x0}, {0x0}, {&(0x7f0000011c00)="0b0000000c0001022e00000002000000f40702022e", 0x15, 0x10000}, {0x0}, {0x0}, {&(0x7f0000012400)="504d4d00504d4dffdbf4655f00000000647679756b6f762d676c6170746f70320000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000006c6f6f7033340075782f746573742f73797a5f6d6f756e745f696d6167655f650500"/123, 0x7b, 0x20000}, {0x0}, {0x0, 0x0, 0x38000}], 0x0, &(0x7f0000012f00)) 22:36:32 executing program 6: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) lsetxattr$security_evm(&(0x7f0000000240)='.\x00', &(0x7f0000000300), &(0x7f00000003c0)=@sha1={0x1, "bd2b5bce8b74aea700654a682479ac2c0852bc4d"}, 0x15, 0x3) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={&(0x7f0000000040), 0xb}, 0x0, 0x20, 0x0, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) r0 = fork() r1 = syz_open_procfs(r0, &(0x7f0000000000)='status\x00') r2 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x2, 0x0) pwrite64(r2, &(0x7f00000000c0)='9', 0x1, 0x8040000) perf_event_open(0x0, r0, 0xa, r2, 0x1) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r3, 0x6, 0x1e, &(0x7f0000000040)=0x1, 0x4) setsockopt$inet6_tcp_TCP_REPAIR(r3, 0x6, 0x13, &(0x7f00000018c0)=0x1, 0x4) connect$inet6(r3, &(0x7f0000000080)={0xa, 0x0, 0x0, @loopback}, 0x1c) openat$cgroup_ro(r1, &(0x7f0000000180)='blkio.throttle.io_serviced_recursive\x00', 0x0, 0x0) 22:36:32 executing program 2: perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000480)}}, 0x0, 0xffffffefffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x100000, 0xe, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000500100000f000000000000000100000005000000000004000040000020000000dbf4655fdbf4655f0100ffff53ef010001000000dbf4655f000000000000000001000000000000000b0000008000000018000000c20500002b0200"/116, 0x74, 0x400}, {&(0x7f0000010100)="000000000000000000000000244b8e9b57f04b59aa229cc218853f9501004000", 0x20, 0x4e0}, {&(0x7f0000010200)="010000000000050040", 0x9, 0x560}, {&(0x7f0000010300)="020000000300000004000000", 0xc}, {&(0x7f0000010400), 0x0, 0x1000}, {&(0x7f0000011500)="ed41000000080000dbf4655fdbf4655fdbf4655f00000000000004004000", 0x1e, 0x2080}, {0x0}, {0x0}, {&(0x7f0000011c00)="0b0000000c0001022e00000002000000f40702022e", 0x15, 0x10000}, {0x0}, {0x0}, {&(0x7f0000012400)="504d4d00504d4dffdbf4655f00000000647679756b6f762d676c6170746f70320000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000006c6f6f7033340075782f746573742f73797a5f6d6f756e745f696d6167655f650500"/123, 0x7b, 0x20000}, {0x0}, {0x0, 0x0, 0x38000}], 0x0, &(0x7f0000012f00)) 22:36:32 executing program 1: r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, @perf_config_ext, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000000), 0x0) r2 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) ioctl$EXT4_IOC_CHECKPOINT(r2, 0x4004662b, &(0x7f0000000100)=0x5) ioctl$AUTOFS_DEV_IOCTL_TIMEOUT(0xffffffffffffffff, 0xc018937a, &(0x7f0000001480)=ANY=[@ANYBLOB="010000fe04f804f32d1ae95f4d8fd9ce99ff00010000001800000059a5a91fc707002c3e05f0bcf35234dd60eedec3d5f1b58f0d41f6996d0df70b25316c86b91cf6440f87695b3e2bf9118d7b986e6dd6169cde2d7b35569ff3c18ea708da093a5e297fd2ec2322a167617fa6662e65407cedfd90d2ee90deccf04f2c85b215e5090cb50628f934703c2d", @ANYRES32=r0, @ANYBLOB="01040000000000002e2f66696c653000"]) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r3, 0xc08c5332, &(0x7f00000013c0)={0xffffffff, 0x6964, 0x0, 'queue1\x00', 0xff}) r4 = gettid() process_vm_writev(r4, &(0x7f0000002580)=[{&(0x7f0000000140)=""/89, 0x59}, {&(0x7f00000001c0)=""/175, 0xaf}, {&(0x7f0000000280)=""/4096, 0x1000}], 0x3, &(0x7f0000003840)=[{&(0x7f0000002640)=""/105, 0x69}, {0xfffffffffffffffe, 0x10}], 0x2, 0x0) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r1, 0xc08c5332, &(0x7f0000001280)={0x3, 0x5, 0x0, 'queue1\x00', 0x8}) r5 = fork() write$sndseq(r1, &(0x7f0000001340)=[{0x22, 0x8, 0x2, 0x3, @time={0x4}, {0x0, 0x1}, {0x6, 0x81}, @raw32={[0x800, 0x3, 0x9]}}, {0xe1, 0x7, 0xf8, 0xff, @tick=0x2, {0x3f}, {0x4, 0xf1}, @queue={0xff, {0x6, 0x9}}}, {0x4, 0x1, 0x9, 0x5, @time={0x7, 0x6}, {0x7c, 0x2}, {0x20, 0x6}, @connect={{0x0, 0xfd}, {0x98, 0x4}}}, {0x80, 0x4, 0x7, 0x7d, @time={0xfffff000, 0x9}, {0x81, 0x1f}, {0xaa}, @queue={0x5, {0xffffffe0, 0x3}}}], 0x70) r6 = syz_open_dev$vcsn(&(0x7f0000000040), 0x3, 0x2001) ioctl$LOOP_CTL_GET_FREE(r6, 0x4c82) ptrace$setopts(0x4206, r5, 0x0, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fork() fork() clone3(&(0x7f0000004c00)={0xc0002100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) 22:36:32 executing program 0: perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000480)}}, 0x0, 0xffffffefffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0xd, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000500100000f000000000000000100000005000000000004000040000020000000dbf4655fdbf4655f0100ffff53ef010001000000dbf4655f000000000000000001000000000000000b0000008000000018000000c20500002b0200"/116, 0x74, 0x400}, {&(0x7f0000010100)="000000000000000000000000244b8e9b57f04b59aa229cc218853f950100", 0x1e, 0x4e0}, {&(0x7f0000010200)="01000000000005", 0x7, 0x560}, {&(0x7f0000010300)="020000000300000004000000", 0xc, 0x800}, {&(0x7f0000010400), 0x0, 0x1000}, {&(0x7f0000011500)="ed41000000080000dbf4655fdbf4655f", 0x10, 0x2080}, {0x0}, {0x0}, {0x0, 0x0, 0x10000}, {0x0}, {0x0}, {0x0, 0x0, 0x20000}, {0x0}], 0x0, &(0x7f0000012f00)) 22:36:32 executing program 5: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) lsetxattr$security_evm(&(0x7f0000000240)='.\x00', &(0x7f0000000300), &(0x7f00000003c0)=@sha1={0x1, "bd2b5bce8b74aea700654a682479ac2c0852bc4d"}, 0x15, 0x3) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={&(0x7f0000000040), 0xb}, 0x0, 0x20, 0x0, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) r0 = fork() r1 = syz_open_procfs(r0, &(0x7f0000000000)='status\x00') r2 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x2, 0x0) pwrite64(r2, &(0x7f00000000c0), 0x0, 0x8040000) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x20, 0x3, 0x4, 0x1, 0x0, 0x8, 0x20620, 0x2, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x3f, 0x2, @perf_config_ext={0x240000000, 0x5}, 0x1400, 0x4, 0x8, 0x7, 0x9, 0x6, 0x6, 0x0, 0x1, 0x0, 0x8}, r0, 0xa, r2, 0x1) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r3, 0x6, 0x1e, &(0x7f0000000040)=0x1, 0x4) connect$inet6(r3, &(0x7f0000000080)={0xa, 0x0, 0x0, @loopback}, 0x1c) openat$cgroup_ro(r1, &(0x7f0000000180)='blkio.throttle.io_serviced_recursive\x00', 0x0, 0x0) 22:36:32 executing program 4: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000480)}}, 0x0, 0xffffffefffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x100000, 0xe, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000500100000f000000000000000100000005000000000004000040000020000000dbf4655fdbf4655f0100ffff53ef010001000000dbf4655f000000000000000001000000000000000b0000008000000018000000c20500002b0200"/116, 0x74, 0x400}, {&(0x7f0000010100)="000000000000000000000000244b8e9b57f04b59aa229cc218853f9501004000", 0x20, 0x4e0}, {&(0x7f0000010200)="010000000000050040", 0x9, 0x560}, {&(0x7f0000010300)="020000000300", 0x6, 0x800}, {&(0x7f0000010400), 0x0, 0x1000}, {&(0x7f0000011500)="ed41000000080000dbf4655fdbf4655fdbf4655f00000000000004004000", 0x1e, 0x2080}, {0x0}, {0x0}, {&(0x7f0000011c00)="0b0000000c0001022e00000002000000f40702022e", 0x15, 0x10000}, {0x0}, {0x0}, {&(0x7f0000012400)="504d4d00504d4dffdbf4655f00000000647679756b6f762d676c6170746f70320000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000006c6f6f7033340075782f746573742f73797a5f6d6f756e745f696d6167655f650500"/123, 0x7b, 0x20000}, {0x0}, {0x0, 0x0, 0x38000}], 0x0, &(0x7f0000012f00)) [ 1668.401711] loop7: detected capacity change from 0 to 2048 [ 1668.402149] loop2: detected capacity change from 0 to 2048 [ 1668.438960] EXT4-fs (loop2): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 1668.440654] EXT4-fs (loop2): group descriptors corrupted! [ 1668.447360] loop0: detected capacity change from 0 to 512 [ 1668.456708] EXT4-fs (loop7): ext4_check_descriptors: Inode table for group 0 overlaps superblock [ 1668.458289] EXT4-fs (loop7): group descriptors corrupted! [ 1668.483914] loop4: detected capacity change from 0 to 2048 [ 1668.485685] EXT4-fs (loop0): unsupported descriptor size 0 [ 1668.528931] EXT4-fs (loop4): ext4_check_descriptors: Inode table for group 0 overlaps superblock [ 1668.530402] EXT4-fs (loop4): group descriptors corrupted! 22:36:33 executing program 2: perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000480)}}, 0x0, 0xffffffefffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x100000, 0xe, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000500100000f000000000000000100000005000000000004000040000020000000dbf4655fdbf4655f0100ffff53ef010001000000dbf4655f000000000000000001000000000000000b0000008000000018000000c20500002b0200"/116, 0x74, 0x400}, {&(0x7f0000010100)="000000000000000000000000244b8e9b57f04b59aa229cc218853f9501004000", 0x20, 0x4e0}, {&(0x7f0000010200)="010000000000050040", 0x9, 0x560}, {&(0x7f0000010300)="020000000300000004000000", 0xc}, {&(0x7f0000010400), 0x0, 0x1000}, {&(0x7f0000011500)="ed41000000080000dbf4655fdbf4655fdbf4655f00000000000004004000", 0x1e, 0x2080}, {0x0}, {0x0}, {&(0x7f0000011c00)="0b0000000c0001022e00000002000000f40702022e", 0x15, 0x10000}, {0x0}, {0x0}, {&(0x7f0000012400)="504d4d00504d4dffdbf4655f00000000647679756b6f762d676c6170746f70320000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000006c6f6f7033340075782f746573742f73797a5f6d6f756e745f696d6167655f650500"/123, 0x7b, 0x20000}, {0x0}, {0x0, 0x0, 0x38000}], 0x0, &(0x7f0000012f00)) 22:36:33 executing program 7: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000480)}}, 0x0, 0xffffffefffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x100000, 0xe, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000500100000f000000000000000100000005000000000004000040000020000000dbf4655fdbf4655f0100ffff53ef010001000000dbf4655f000000000000000001000000000000000b0000008000000018000000c20500002b0200"/116, 0x74, 0x400}, {&(0x7f0000010100)="000000000000000000000000244b8e9b57f04b59aa229cc218853f9501004000", 0x20, 0x4e0}, {&(0x7f0000010200)="010000000000050040", 0x9, 0x560}, {&(0x7f0000010300)="020000000300", 0x6, 0x800}, {&(0x7f0000010400), 0x0, 0x1000}, {&(0x7f0000011500)="ed41000000080000dbf4655fdbf4655fdbf4655f00000000000004004000", 0x1e, 0x2080}, {0x0}, {0x0}, {&(0x7f0000011c00)="0b0000000c0001022e00000002000000f40702022e", 0x15, 0x10000}, {0x0}, {0x0}, {&(0x7f0000012400)="504d4d00504d4dffdbf4655f00000000647679756b6f762d676c6170746f70320000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000006c6f6f7033340075782f746573742f73797a5f6d6f756e745f696d6167655f650500"/123, 0x7b, 0x20000}, {0x0}, {0x0, 0x0, 0x38000}], 0x0, &(0x7f0000012f00)) 22:36:33 executing program 0: perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000480)}}, 0x0, 0xffffffefffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0xd, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000500100000f000000000000000100000005000000000004000040000020000000dbf4655fdbf4655f0100ffff53ef010001000000dbf4655f000000000000000001000000000000000b0000008000000018000000c20500002b0200"/116, 0x74, 0x400}, {&(0x7f0000010100)="000000000000000000000000244b8e9b57f04b59aa229cc218853f95010040", 0x1f, 0x4e0}, {&(0x7f0000010200)="01000000000005", 0x7, 0x560}, {&(0x7f0000010300)="020000000300000004000000", 0xc, 0x800}, {&(0x7f0000010400), 0x0, 0x1000}, {&(0x7f0000011500)="ed41000000080000dbf4655fdbf4655f", 0x10, 0x2080}, {0x0}, {0x0}, {0x0, 0x0, 0x10000}, {0x0}, {0x0}, {0x0, 0x0, 0x20000}, {0x0}], 0x0, &(0x7f0000012f00)) 22:36:33 executing program 4: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000480)}}, 0x0, 0xffffffefffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x100000, 0xe, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000500100000f000000000000000100000005000000000004000040000020000000dbf4655fdbf4655f0100ffff53ef010001000000dbf4655f000000000000000001000000000000000b0000008000000018000000c20500002b0200"/116, 0x74, 0x400}, {&(0x7f0000010100)="000000000000000000000000244b8e9b57f04b59aa229cc218853f9501004000", 0x20, 0x4e0}, {&(0x7f0000010200)="010000000000050040", 0x9, 0x560}, {&(0x7f0000010300)="020000000300", 0x6, 0x800}, {&(0x7f0000010400), 0x0, 0x1000}, {&(0x7f0000011500)="ed41000000080000dbf4655fdbf4655fdbf4655f00000000000004004000", 0x1e, 0x2080}, {0x0}, {0x0}, {&(0x7f0000011c00)="0b0000000c0001022e00000002000000f40702022e", 0x15, 0x10000}, {0x0}, {0x0}, {&(0x7f0000012400)="504d4d00504d4dffdbf4655f00000000647679756b6f762d676c6170746f70320000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000006c6f6f7033340075782f746573742f73797a5f6d6f756e745f696d6167655f650500"/123, 0x7b, 0x20000}, {0x0}, {0x0, 0x0, 0x38000}], 0x0, &(0x7f0000012f00)) [ 1668.783624] loop2: detected capacity change from 0 to 2048 [ 1668.833431] loop7: detected capacity change from 0 to 2048 [ 1668.835302] EXT4-fs (loop2): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 1668.836878] EXT4-fs (loop2): group descriptors corrupted! [ 1668.876749] EXT4-fs (loop7): ext4_check_descriptors: Inode table for group 0 overlaps superblock [ 1668.878247] EXT4-fs (loop7): group descriptors corrupted! [ 1668.882326] loop0: detected capacity change from 0 to 512 [ 1668.917850] loop4: detected capacity change from 0 to 2048 [ 1668.921352] EXT4-fs (loop0): bad geometry: block count 512 exceeds size of device (128 blocks) [ 1668.968101] EXT4-fs (loop4): ext4_check_descriptors: Inode table for group 0 overlaps superblock [ 1668.969654] EXT4-fs (loop4): group descriptors corrupted! 22:36:33 executing program 2: perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000480)}}, 0x0, 0xffffffefffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x100000, 0xd, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000500100000f000000000000000100000005000000000004000040000020000000dbf4655fdbf4655f0100ffff53ef010001000000dbf4655f000000000000000001000000000000000b0000008000000018000000c20500002b0200"/116, 0x74, 0x400}, {&(0x7f0000010100)="000000000000000000000000244b8e9b57f04b59aa229cc218853f9501004000", 0x20, 0x4e0}, {&(0x7f0000010300)="020000000300000004000000", 0xc, 0x800}, {&(0x7f0000010400), 0x0, 0x1000}, {&(0x7f0000011500)="ed41000000080000dbf4655fdbf4655fdbf4655f00000000000004004000", 0x1e, 0x2080}, {0x0}, {0x0}, {&(0x7f0000011c00)="0b0000000c0001022e00000002000000f40702022e", 0x15, 0x10000}, {0x0}, {0x0}, {&(0x7f0000012400)="504d4d00504d4dffdbf4655f00000000647679756b6f762d676c6170746f70320000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000006c6f6f7033340075782f746573742f73797a5f6d6f756e745f696d6167655f650500"/123, 0x7b, 0x20000}, {0x0}, {0x0, 0x0, 0x38000}], 0x0, &(0x7f0000012f00)) 22:36:33 executing program 1: r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, @perf_config_ext, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000000), 0x0) r2 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) ioctl$EXT4_IOC_CHECKPOINT(r2, 0x4004662b, &(0x7f0000000100)=0x5) ioctl$AUTOFS_DEV_IOCTL_TIMEOUT(0xffffffffffffffff, 0xc018937a, &(0x7f0000001480)=ANY=[@ANYBLOB="010000fe04f804f32d1ae95f4d8fd9ce99ff00010000001800000059a5a91fc707002c3e05f0bcf35234dd60eedec3d5f1b58f0d41f6996d0df70b25316c86b91cf6440f87695b3e2bf9118d7b986e6dd6169cde2d7b35569ff3c18ea708da093a5e297fd2ec2322a167617fa6662e65407cedfd90d2ee90deccf04f2c85b215e5090cb50628f934703c2d", @ANYRES32=r0, @ANYBLOB="01040000000000002e2f66696c653000"]) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r3, 0xc08c5332, &(0x7f00000013c0)={0xffffffff, 0x6964, 0x0, 'queue1\x00', 0xff}) r4 = gettid() process_vm_writev(r4, &(0x7f0000002580)=[{&(0x7f0000000140)=""/89, 0x59}, {&(0x7f00000001c0)=""/175, 0xaf}, {&(0x7f0000000280)=""/4096, 0x1000}], 0x3, &(0x7f0000003840)=[{&(0x7f0000002640)=""/105, 0x69}, {0xfffffffffffffffe, 0x10}], 0x2, 0x0) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r1, 0xc08c5332, &(0x7f0000001280)={0x3, 0x5, 0x0, 'queue1\x00', 0x8}) r5 = fork() write$sndseq(r1, &(0x7f0000001340)=[{0x22, 0x8, 0x2, 0x3, @time={0x4}, {0x0, 0x1}, {0x6, 0x81}, @raw32={[0x800, 0x3, 0x9]}}, {0xe1, 0x7, 0xf8, 0xff, @tick=0x2, {0x3f}, {0x4, 0xf1}, @queue={0xff, {0x6, 0x9}}}, {0x4, 0x1, 0x9, 0x5, @time={0x7, 0x6}, {0x7c, 0x2}, {0x20, 0x6}, @connect={{0x0, 0xfd}, {0x98, 0x4}}}, {0x80, 0x4, 0x7, 0x7d, @time={0xfffff000, 0x9}, {0x81, 0x1f}, {0xaa}, @queue={0x5, {0xffffffe0, 0x3}}}], 0x70) r6 = syz_open_dev$vcsn(&(0x7f0000000040), 0x3, 0x2001) ioctl$LOOP_CTL_GET_FREE(r6, 0x4c82) ptrace$setopts(0x4206, r5, 0x0, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fork() fork() clone3(&(0x7f0000004c00)={0xc0002100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) 22:36:33 executing program 6: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) lsetxattr$security_evm(&(0x7f0000000240)='.\x00', &(0x7f0000000300), &(0x7f00000003c0)=@sha1={0x1, "bd2b5bce8b74aea700654a682479ac2c0852bc4d"}, 0x15, 0x3) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={&(0x7f0000000040), 0xb}, 0x0, 0x20, 0x0, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) r0 = fork() r1 = syz_open_procfs(r0, &(0x7f0000000000)='status\x00') r2 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x2, 0x0) pwrite64(r2, &(0x7f00000000c0)='9', 0x1, 0x8040000) perf_event_open(0x0, r0, 0xa, r2, 0x1) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r3, 0x6, 0x1e, &(0x7f0000000040)=0x1, 0x4) setsockopt$inet6_tcp_TCP_REPAIR(r3, 0x6, 0x13, &(0x7f00000018c0)=0x1, 0x4) connect$inet6(r3, &(0x7f0000000080)={0xa, 0x0, 0x0, @loopback}, 0x1c) openat$cgroup_ro(r1, &(0x7f0000000180)='blkio.throttle.io_serviced_recursive\x00', 0x0, 0x0) 22:36:33 executing program 3: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) lsetxattr$security_evm(&(0x7f0000000240)='.\x00', &(0x7f0000000300), &(0x7f00000003c0)=@sha1={0x1, "bd2b5bce8b74aea700654a682479ac2c0852bc4d"}, 0x15, 0x3) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={&(0x7f0000000040), 0xb}, 0x0, 0x20, 0x0, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) r0 = fork() r1 = syz_open_procfs(r0, &(0x7f0000000000)='status\x00') r2 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x2, 0x0) pwrite64(r2, &(0x7f00000000c0)='9', 0x1, 0x8040000) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x20, 0x0, 0x4, 0x1, 0x0, 0x8, 0x20620, 0x2, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x3f, 0x2, @perf_config_ext={0x240000000, 0x5}, 0x1400, 0x4, 0x8, 0x7, 0x9, 0x6, 0x6, 0x0, 0x1, 0x0, 0x8}, r0, 0xa, r2, 0x1) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r3, 0x6, 0x1e, &(0x7f0000000040)=0x1, 0x4) setsockopt$inet6_tcp_TCP_REPAIR(r3, 0x6, 0x13, &(0x7f00000018c0)=0x1, 0x4) connect$inet6(r3, &(0x7f0000000080)={0xa, 0x0, 0x0, @loopback}, 0x1c) openat$cgroup_ro(r1, &(0x7f0000000180)='blkio.throttle.io_serviced_recursive\x00', 0x0, 0x0) 22:36:33 executing program 7: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000480)}}, 0x0, 0xffffffefffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x100000, 0xe, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000500100000f000000000000000100000005000000000004000040000020000000dbf4655fdbf4655f0100ffff53ef010001000000dbf4655f000000000000000001000000000000000b0000008000000018000000c20500002b0200"/116, 0x74, 0x400}, {&(0x7f0000010100)="000000000000000000000000244b8e9b57f04b59aa229cc218853f9501004000", 0x20, 0x4e0}, {&(0x7f0000010200)="010000000000050040", 0x9, 0x560}, {&(0x7f0000010300)="020000000300000004", 0x9, 0x800}, {&(0x7f0000010400), 0x0, 0x1000}, {&(0x7f0000011500)="ed41000000080000dbf4655fdbf4655fdbf4655f00000000000004004000", 0x1e, 0x2080}, {0x0}, {0x0}, {&(0x7f0000011c00)="0b0000000c0001022e00000002000000f40702022e", 0x15, 0x10000}, {0x0}, {0x0}, {&(0x7f0000012400)="504d4d00504d4dffdbf4655f00000000647679756b6f762d676c6170746f70320000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000006c6f6f7033340075782f746573742f73797a5f6d6f756e745f696d6167655f650500"/123, 0x7b, 0x20000}, {0x0}, {0x0, 0x0, 0x38000}], 0x0, &(0x7f0000012f00)) 22:36:33 executing program 0: perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000480)}}, 0x0, 0xffffffefffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0xd, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000500100000f000000000000000100000005000000000004000040000020000000dbf4655fdbf4655f0100ffff53ef010001000000dbf4655f000000000000000001000000000000000b0000008000000018000000c20500002b0200"/116, 0x74, 0x400}, {&(0x7f0000010100)="000000000000000000000000244b8e9b57f04b59aa229cc218853f95010040", 0x1f, 0x4e0}, {&(0x7f0000010200)="01000000000005", 0x7, 0x560}, {&(0x7f0000010300)="020000000300000004000000", 0xc, 0x800}, {&(0x7f0000010400), 0x0, 0x1000}, {&(0x7f0000011500)="ed41000000080000dbf4655fdbf4655f", 0x10, 0x2080}, {0x0}, {0x0}, {0x0, 0x0, 0x10000}, {0x0}, {0x0}, {0x0, 0x0, 0x20000}, {0x0}], 0x0, &(0x7f0000012f00)) [ 1669.131347] loop2: detected capacity change from 0 to 2048 [ 1669.177828] EXT4-fs warning (device loop2): read_mmp_block:106: Error -117 while reading MMP block 0 [ 1669.209087] loop7: detected capacity change from 0 to 2048 [ 1669.242371] loop0: detected capacity change from 0 to 512 [ 1669.262626] EXT4-fs (loop0): bad geometry: block count 512 exceeds size of device (128 blocks) [ 1669.317226] EXT4-fs (loop7): mounted filesystem without journal. Quota mode: none. [ 1669.323023] ext4 filesystem being mounted at /syzkaller-testdir391614100/syzkaller.1GCODk/199/file0 supports timestamps until 2038 (0x7fffffff) [ 1669.369730] EXT4-fs (loop7): unmounting filesystem. 22:36:50 executing program 3: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) lsetxattr$security_evm(&(0x7f0000000240)='.\x00', &(0x7f0000000300), &(0x7f00000003c0)=@sha1={0x1, "bd2b5bce8b74aea700654a682479ac2c0852bc4d"}, 0x15, 0x3) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={&(0x7f0000000040), 0xb}, 0x0, 0x20, 0x0, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) r0 = fork() r1 = syz_open_procfs(r0, &(0x7f0000000000)='status\x00') r2 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x2, 0x0) pwrite64(r2, &(0x7f00000000c0)='9', 0x1, 0x8040000) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x20, 0x0, 0x4, 0x1, 0x0, 0x8, 0x20620, 0x2, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x3f, 0x2, @perf_config_ext={0x240000000, 0x5}, 0x1400, 0x4, 0x8, 0x7, 0x9, 0x6, 0x6, 0x0, 0x1, 0x0, 0x8}, r0, 0xa, r2, 0x1) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r3, 0x6, 0x1e, &(0x7f0000000040)=0x1, 0x4) setsockopt$inet6_tcp_TCP_REPAIR(r3, 0x6, 0x13, &(0x7f00000018c0)=0x1, 0x4) connect$inet6(r3, &(0x7f0000000080)={0xa, 0x0, 0x0, @loopback}, 0x1c) openat$cgroup_ro(r1, &(0x7f0000000180)='blkio.throttle.io_serviced_recursive\x00', 0x0, 0x0) 22:36:50 executing program 6: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) lsetxattr$security_evm(&(0x7f0000000240)='.\x00', &(0x7f0000000300), &(0x7f00000003c0)=@sha1={0x1, "bd2b5bce8b74aea700654a682479ac2c0852bc4d"}, 0x15, 0x3) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={&(0x7f0000000040), 0xb}, 0x0, 0x20, 0x0, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) r0 = fork() r1 = syz_open_procfs(r0, &(0x7f0000000000)='status\x00') r2 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x2, 0x0) pwrite64(r2, &(0x7f00000000c0)='9', 0x1, 0x8040000) perf_event_open(0x0, r0, 0xa, r2, 0x1) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r3, 0x6, 0x1e, &(0x7f0000000040)=0x1, 0x4) setsockopt$inet6_tcp_TCP_REPAIR(r3, 0x6, 0x13, &(0x7f00000018c0)=0x1, 0x4) connect$inet6(r3, &(0x7f0000000080)={0xa, 0x0, 0x0, @loopback}, 0x1c) openat$cgroup_ro(r1, &(0x7f0000000180)='blkio.throttle.io_serviced_recursive\x00', 0x0, 0x0) 22:36:50 executing program 4: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000480)}}, 0x0, 0xffffffefffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x100000, 0xe, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000500100000f000000000000000100000005000000000004000040000020000000dbf4655fdbf4655f0100ffff53ef010001000000dbf4655f000000000000000001000000000000000b0000008000000018000000c20500002b0200"/116, 0x74, 0x400}, {&(0x7f0000010100)="000000000000000000000000244b8e9b57f04b59aa229cc218853f9501004000", 0x20, 0x4e0}, {&(0x7f0000010200)="010000000000050040", 0x9, 0x560}, {&(0x7f0000010300)="020000000300000004", 0x9, 0x800}, {&(0x7f0000010400), 0x0, 0x1000}, {&(0x7f0000011500)="ed41000000080000dbf4655fdbf4655fdbf4655f00000000000004004000", 0x1e, 0x2080}, {0x0}, {0x0}, {&(0x7f0000011c00)="0b0000000c0001022e00000002000000f40702022e", 0x15, 0x10000}, {0x0}, {0x0}, {&(0x7f0000012400)="504d4d00504d4dffdbf4655f00000000647679756b6f762d676c6170746f70320000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000006c6f6f7033340075782f746573742f73797a5f6d6f756e745f696d6167655f650500"/123, 0x7b, 0x20000}, {0x0}, {0x0, 0x0, 0x38000}], 0x0, &(0x7f0000012f00)) 22:36:50 executing program 5: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) lsetxattr$security_evm(&(0x7f0000000240)='.\x00', &(0x7f0000000300), &(0x7f00000003c0)=@sha1={0x1, "bd2b5bce8b74aea700654a682479ac2c0852bc4d"}, 0x15, 0x3) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={&(0x7f0000000040), 0xb}, 0x0, 0x20, 0x0, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) r0 = fork() r1 = syz_open_procfs(r0, &(0x7f0000000000)='status\x00') r2 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x2, 0x0) pwrite64(r2, &(0x7f00000000c0)='9', 0x1, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x20, 0x3, 0x4, 0x1, 0x0, 0x8, 0x20620, 0x2, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x3f, 0x2, @perf_config_ext={0x240000000, 0x5}, 0x1400, 0x4, 0x8, 0x7, 0x9, 0x6, 0x6, 0x0, 0x1, 0x0, 0x8}, r0, 0xa, r2, 0x1) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r3, 0x6, 0x1e, &(0x7f0000000040)=0x1, 0x4) connect$inet6(r3, &(0x7f0000000080)={0xa, 0x0, 0x0, @loopback}, 0x1c) openat$cgroup_ro(r1, &(0x7f0000000180)='blkio.throttle.io_serviced_recursive\x00', 0x0, 0x0) 22:36:50 executing program 2: perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000480)}}, 0x0, 0xffffffefffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x100000, 0xd, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000500100000f000000000000000100000005000000000004000040000020000000dbf4655fdbf4655f0100ffff53ef010001000000dbf4655f000000000000000001000000000000000b0000008000000018000000c20500002b0200"/116, 0x74, 0x400}, {&(0x7f0000010100)="000000000000000000000000244b8e9b57f04b59aa229cc218853f9501004000", 0x20, 0x4e0}, {&(0x7f0000010300)="020000000300000004000000", 0xc, 0x800}, {&(0x7f0000010400), 0x0, 0x1000}, {&(0x7f0000011500)="ed41000000080000dbf4655fdbf4655fdbf4655f00000000000004004000", 0x1e, 0x2080}, {0x0}, {0x0}, {&(0x7f0000011c00)="0b0000000c0001022e00000002000000f40702022e", 0x15, 0x10000}, {0x0}, {0x0}, {&(0x7f0000012400)="504d4d00504d4dffdbf4655f00000000647679756b6f762d676c6170746f70320000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000006c6f6f7033340075782f746573742f73797a5f6d6f756e745f696d6167655f650500"/123, 0x7b, 0x20000}, {0x0}, {0x0, 0x0, 0x38000}], 0x0, &(0x7f0000012f00)) 22:36:50 executing program 0: perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000480)}}, 0x0, 0xffffffefffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0xd, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000500100000f000000000000000100000005000000000004000040000020000000dbf4655fdbf4655f0100ffff53ef010001000000dbf4655f000000000000000001000000000000000b0000008000000018000000c20500002b0200"/116, 0x74, 0x400}, {&(0x7f0000010100)="000000000000000000000000244b8e9b57f04b59aa229cc218853f95010040", 0x1f, 0x4e0}, {&(0x7f0000010200)="01000000000005", 0x7, 0x560}, {&(0x7f0000010300)="020000000300000004000000", 0xc, 0x800}, {&(0x7f0000010400), 0x0, 0x1000}, {&(0x7f0000011500)="ed41000000080000dbf4655fdbf4655f", 0x10, 0x2080}, {0x0}, {0x0}, {0x0, 0x0, 0x10000}, {0x0}, {0x0}, {0x0, 0x0, 0x20000}, {0x0}], 0x0, &(0x7f0000012f00)) 22:36:50 executing program 7: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000480)}}, 0x0, 0xffffffefffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x100000, 0xe, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000500100000f000000000000000100000005000000000004000040000020000000dbf4655fdbf4655f0100ffff53ef010001000000dbf4655f000000000000000001000000000000000b0000008000000018000000c20500002b0200"/116, 0x74, 0x400}, {&(0x7f0000010100)="000000000000000000000000244b8e9b57f04b59aa229cc218853f9501004000", 0x20, 0x4e0}, {&(0x7f0000010200)="010000000000050040", 0x9, 0x560}, {&(0x7f0000010300)="020000000300000004", 0x9, 0x800}, {&(0x7f0000010400), 0x0, 0x1000}, {&(0x7f0000011500)="ed41000000080000dbf4655fdbf4655fdbf4655f00000000000004004000", 0x1e, 0x2080}, {0x0}, {0x0}, {&(0x7f0000011c00)="0b0000000c0001022e00000002000000f40702022e", 0x15, 0x10000}, {0x0}, {0x0}, {&(0x7f0000012400)="504d4d00504d4dffdbf4655f00000000647679756b6f762d676c6170746f70320000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000006c6f6f7033340075782f746573742f73797a5f6d6f756e745f696d6167655f650500"/123, 0x7b, 0x20000}, {0x0}, {0x0, 0x0, 0x38000}], 0x0, &(0x7f0000012f00)) 22:36:50 executing program 1: r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, @perf_config_ext, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000000), 0x0) r2 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) ioctl$EXT4_IOC_CHECKPOINT(r2, 0x4004662b, &(0x7f0000000100)=0x5) ioctl$AUTOFS_DEV_IOCTL_TIMEOUT(0xffffffffffffffff, 0xc018937a, &(0x7f0000001480)=ANY=[@ANYBLOB="010000fe04f804f32d1ae95f4d8fd9ce99ff00010000001800000059a5a91fc707002c3e05f0bcf35234dd60eedec3d5f1b58f0d41f6996d0df70b25316c86b91cf6440f87695b3e2bf9118d7b986e6dd6169cde2d7b35569ff3c18ea708da093a5e297fd2ec2322a167617fa6662e65407cedfd90d2ee90deccf04f2c85b215e5090cb50628f934703c2d", @ANYRES32=r0, @ANYBLOB="01040000000000002e2f66696c653000"]) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r3, 0xc08c5332, &(0x7f00000013c0)={0xffffffff, 0x6964, 0x0, 'queue1\x00', 0xff}) r4 = gettid() process_vm_writev(r4, &(0x7f0000002580)=[{&(0x7f0000000140)=""/89, 0x59}, {&(0x7f00000001c0)=""/175, 0xaf}, {&(0x7f0000000280)=""/4096, 0x1000}], 0x3, &(0x7f0000003840)=[{&(0x7f0000002640)=""/105, 0x69}, {0xfffffffffffffffe, 0x10}], 0x2, 0x0) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r1, 0xc08c5332, &(0x7f0000001280)={0x3, 0x5, 0x0, 'queue1\x00', 0x8}) r5 = fork() write$sndseq(r1, &(0x7f0000001340)=[{0x22, 0x8, 0x2, 0x3, @time={0x4}, {0x0, 0x1}, {0x6, 0x81}, @raw32={[0x800, 0x3, 0x9]}}, {0xe1, 0x7, 0xf8, 0xff, @tick=0x2, {0x3f}, {0x4, 0xf1}, @queue={0xff, {0x6, 0x9}}}, {0x4, 0x1, 0x9, 0x5, @time={0x7, 0x6}, {0x7c, 0x2}, {0x20, 0x6}, @connect={{0x0, 0xfd}, {0x98, 0x4}}}, {0x80, 0x4, 0x7, 0x7d, @time={0xfffff000, 0x9}, {0x81, 0x1f}, {0xaa}, @queue={0x5, {0xffffffe0, 0x3}}}], 0x70) r6 = syz_open_dev$vcsn(&(0x7f0000000040), 0x3, 0x2001) ioctl$LOOP_CTL_GET_FREE(r6, 0x4c82) ptrace$setopts(0x4206, r5, 0x0, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fork() fork() clone3(&(0x7f0000004c00)={0xc0002100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) [ 1685.740199] loop4: detected capacity change from 0 to 2048 [ 1685.741321] loop2: detected capacity change from 0 to 2048 [ 1685.745291] loop7: detected capacity change from 0 to 2048 [ 1685.745387] loop0: detected capacity change from 0 to 512 [ 1685.757316] EXT4-fs warning (device loop2): read_mmp_block:106: Error -117 while reading MMP block 0 [ 1685.761425] EXT4-fs (loop0): bad geometry: block count 512 exceeds size of device (128 blocks) 22:36:50 executing program 2: perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000480)}}, 0x0, 0xffffffefffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x100000, 0xd, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000500100000f000000000000000100000005000000000004000040000020000000dbf4655fdbf4655f0100ffff53ef010001000000dbf4655f000000000000000001000000000000000b0000008000000018000000c20500002b0200"/116, 0x74, 0x400}, {&(0x7f0000010100)="000000000000000000000000244b8e9b57f04b59aa229cc218853f9501004000", 0x20, 0x4e0}, {&(0x7f0000010300)="020000000300000004000000", 0xc, 0x800}, {&(0x7f0000010400), 0x0, 0x1000}, {&(0x7f0000011500)="ed41000000080000dbf4655fdbf4655fdbf4655f00000000000004004000", 0x1e, 0x2080}, {0x0}, {0x0}, {&(0x7f0000011c00)="0b0000000c0001022e00000002000000f40702022e", 0x15, 0x10000}, {0x0}, {0x0}, {&(0x7f0000012400)="504d4d00504d4dffdbf4655f00000000647679756b6f762d676c6170746f70320000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000006c6f6f7033340075782f746573742f73797a5f6d6f756e745f696d6167655f650500"/123, 0x7b, 0x20000}, {0x0}, {0x0, 0x0, 0x38000}], 0x0, &(0x7f0000012f00)) [ 1685.862974] EXT4-fs (loop7): mounted filesystem without journal. Quota mode: none. 22:36:50 executing program 0: perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000480)}}, 0x0, 0xffffffefffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0xd, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000500100000f000000000000000100000005000000000004000040000020000000dbf4655fdbf4655f0100ffff53ef010001000000dbf4655f000000000000000001000000000000000b0000008000000018000000c20500002b0200"/116, 0x74, 0x400}, {&(0x7f0000010100)="000000000000000000000000244b8e9b57f04b59aa229cc218853f9501004000", 0x20}, {&(0x7f0000010200)="01000000000005", 0x7, 0x560}, {&(0x7f0000010300)="020000000300000004000000", 0xc, 0x800}, {&(0x7f0000010400), 0x0, 0x1000}, {&(0x7f0000011500)="ed41000000080000dbf4655fdbf4655f", 0x10, 0x2080}, {0x0}, {0x0}, {0x0, 0x0, 0x10000}, {0x0}, {0x0}, {0x0, 0x0, 0x20000}, {0x0}], 0x0, &(0x7f0000012f00)) [ 1685.883330] ext4 filesystem being mounted at /syzkaller-testdir391614100/syzkaller.1GCODk/200/file0 supports timestamps until 2038 (0x7fffffff) [ 1685.886261] EXT4-fs (loop4): mounted filesystem without journal. Quota mode: none. [ 1685.910848] ext4 filesystem being mounted at /syzkaller-testdir967783826/syzkaller.dhcxYf/196/file0 supports timestamps until 2038 (0x7fffffff) 22:36:50 executing program 3: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) lsetxattr$security_evm(&(0x7f0000000240)='.\x00', &(0x7f0000000300), &(0x7f00000003c0)=@sha1={0x1, "bd2b5bce8b74aea700654a682479ac2c0852bc4d"}, 0x15, 0x3) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={&(0x7f0000000040), 0xb}, 0x0, 0x20, 0x0, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) r0 = fork() r1 = syz_open_procfs(r0, &(0x7f0000000000)='status\x00') r2 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x2, 0x0) pwrite64(r2, &(0x7f00000000c0)='9', 0x1, 0x8040000) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x20, 0x3, 0x0, 0x1, 0x0, 0x8, 0x20620, 0x2, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x3f, 0x2, @perf_config_ext={0x240000000, 0x5}, 0x1400, 0x4, 0x8, 0x7, 0x9, 0x6, 0x6, 0x0, 0x1, 0x0, 0x8}, r0, 0xa, r2, 0x1) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r3, 0x6, 0x1e, &(0x7f0000000040)=0x1, 0x4) setsockopt$inet6_tcp_TCP_REPAIR(r3, 0x6, 0x13, &(0x7f00000018c0)=0x1, 0x4) connect$inet6(r3, &(0x7f0000000080)={0xa, 0x0, 0x0, @loopback}, 0x1c) openat$cgroup_ro(r1, &(0x7f0000000180)='blkio.throttle.io_serviced_recursive\x00', 0x0, 0x0) [ 1686.031234] loop2: detected capacity change from 0 to 2048 [ 1686.049676] loop0: detected capacity change from 0 to 512 [ 1686.052771] EXT4-fs warning (device loop2): read_mmp_block:106: Error -117 while reading MMP block 0 [ 1686.069861] EXT4-fs (loop0): unsupported descriptor size 0 22:36:50 executing program 4: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000480)}}, 0x0, 0xffffffefffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x100000, 0xe, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000500100000f000000000000000100000005000000000004000040000020000000dbf4655fdbf4655f0100ffff53ef010001000000dbf4655f000000000000000001000000000000000b0000008000000018000000c20500002b0200"/116, 0x74, 0x400}, {&(0x7f0000010100)="000000000000000000000000244b8e9b57f04b59aa229cc218853f9501004000", 0x20, 0x4e0}, {&(0x7f0000010200)="010000000000050040", 0x9, 0x560}, {&(0x7f0000010300)="020000000300000004", 0x9, 0x800}, {&(0x7f0000010400), 0x0, 0x1000}, {&(0x7f0000011500)="ed41000000080000dbf4655fdbf4655fdbf4655f00000000000004004000", 0x1e, 0x2080}, {0x0}, {0x0}, {&(0x7f0000011c00)="0b0000000c0001022e00000002000000f40702022e", 0x15, 0x10000}, {0x0}, {0x0}, {&(0x7f0000012400)="504d4d00504d4dffdbf4655f00000000647679756b6f762d676c6170746f70320000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000006c6f6f7033340075782f746573742f73797a5f6d6f756e745f696d6167655f650500"/123, 0x7b, 0x20000}, {0x0}, {0x0, 0x0, 0x38000}], 0x0, &(0x7f0000012f00)) [ 1686.143542] EXT4-fs (loop4): unmounting filesystem. [ 1686.152241] EXT4-fs (loop7): unmounting filesystem. [ 1686.292013] loop4: detected capacity change from 0 to 2048 [ 1686.360226] EXT4-fs (loop4): mounted filesystem without journal. Quota mode: none. [ 1686.367264] ext4 filesystem being mounted at /syzkaller-testdir967783826/syzkaller.dhcxYf/197/file0 supports timestamps until 2038 (0x7fffffff) [ 1686.432269] EXT4-fs (loop4): unmounting filesystem. 22:37:09 executing program 4: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000480)}}, 0x0, 0xffffffefffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x100000, 0xe, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000500100000f000000000000000100000005000000000004000040000020000000dbf4655fdbf4655f0100ffff53ef010001000000dbf4655f000000000000000001000000000000000b0000008000000018000000c20500002b0200"/116, 0x74, 0x400}, {&(0x7f0000010100)="000000000000000000000000244b8e9b57f04b59aa229cc218853f9501004000", 0x20, 0x4e0}, {&(0x7f0000010200)="010000000000050040", 0x9, 0x560}, {&(0x7f0000010300)="020000000300000004", 0x9, 0x800}, {&(0x7f0000010400), 0x0, 0x1000}, {&(0x7f0000011500)="ed41000000080000dbf4655fdbf4655fdbf4655f00000000000004004000", 0x1e, 0x2080}, {0x0}, {0x0}, {&(0x7f0000011c00)="0b0000000c0001022e00000002000000f40702022e", 0x15, 0x10000}, {0x0}, {0x0}, {&(0x7f0000012400)="504d4d00504d4dffdbf4655f00000000647679756b6f762d676c6170746f70320000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000006c6f6f7033340075782f746573742f73797a5f6d6f756e745f696d6167655f650500"/123, 0x7b, 0x20000}, {0x0}, {0x0, 0x0, 0x38000}], 0x0, &(0x7f0000012f00)) 22:37:09 executing program 0: perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000480)}}, 0x0, 0xffffffefffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0xd, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000500100000f000000000000000100000005000000000004000040000020000000dbf4655fdbf4655f0100ffff53ef010001000000dbf4655f000000000000000001000000000000000b0000008000000018000000c20500002b0200"/116, 0x74, 0x400}, {&(0x7f0000010100)="000000000000000000000000244b8e9b57f04b59aa229cc218853f9501004000", 0x20}, {&(0x7f0000010200)="01000000000005", 0x7, 0x560}, {&(0x7f0000010300)="020000000300000004000000", 0xc, 0x800}, {&(0x7f0000010400), 0x0, 0x1000}, {&(0x7f0000011500)="ed41000000080000dbf4655fdbf4655f", 0x10, 0x2080}, {0x0}, {0x0}, {0x0, 0x0, 0x10000}, {0x0}, {0x0}, {0x0, 0x0, 0x20000}, {0x0}], 0x0, &(0x7f0000012f00)) 22:37:09 executing program 6: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) lsetxattr$security_evm(&(0x7f0000000240)='.\x00', &(0x7f0000000300), &(0x7f00000003c0)=@sha1={0x1, "bd2b5bce8b74aea700654a682479ac2c0852bc4d"}, 0x15, 0x3) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={&(0x7f0000000040), 0xb}, 0x0, 0x20, 0x0, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) r0 = fork() r1 = syz_open_procfs(r0, &(0x7f0000000000)='status\x00') r2 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x2, 0x0) pwrite64(r2, &(0x7f00000000c0)='9', 0x1, 0x8040000) perf_event_open(&(0x7f0000000100)={0x0, 0x80, 0x20, 0x3, 0x4, 0x1, 0x0, 0x8, 0x20620, 0x2, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x3f, 0x2, @perf_config_ext={0x240000000, 0x5}, 0x1400, 0x4, 0x8, 0x7, 0x9, 0x6, 0x6, 0x0, 0x1, 0x0, 0x8}, r0, 0xa, r2, 0x1) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r3, 0x6, 0x1e, &(0x7f0000000040)=0x1, 0x4) setsockopt$inet6_tcp_TCP_REPAIR(r3, 0x6, 0x13, &(0x7f00000018c0)=0x1, 0x4) connect$inet6(r3, &(0x7f0000000080)={0xa, 0x0, 0x0, @loopback}, 0x1c) openat$cgroup_ro(r1, &(0x7f0000000180)='blkio.throttle.io_serviced_recursive\x00', 0x0, 0x0) [ 1704.708941] loop4: detected capacity change from 0 to 2048 22:37:09 executing program 5: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) lsetxattr$security_evm(&(0x7f0000000240)='.\x00', &(0x7f0000000300), &(0x7f00000003c0)=@sha1={0x1, "bd2b5bce8b74aea700654a682479ac2c0852bc4d"}, 0x15, 0x3) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={&(0x7f0000000040), 0xb}, 0x0, 0x20, 0x0, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) r0 = fork() r1 = syz_open_procfs(r0, &(0x7f0000000000)='status\x00') r2 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x2, 0x0) pwrite64(r2, &(0x7f00000000c0)='9', 0x1, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x20, 0x3, 0x4, 0x1, 0x0, 0x8, 0x20620, 0x2, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x3f, 0x2, @perf_config_ext={0x240000000, 0x5}, 0x1400, 0x4, 0x8, 0x7, 0x9, 0x6, 0x6, 0x0, 0x1, 0x0, 0x8}, r0, 0xa, r2, 0x1) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r3, 0x6, 0x1e, &(0x7f0000000040)=0x1, 0x4) connect$inet6(r3, &(0x7f0000000080)={0xa, 0x0, 0x0, @loopback}, 0x1c) openat$cgroup_ro(r1, &(0x7f0000000180)='blkio.throttle.io_serviced_recursive\x00', 0x0, 0x0) 22:37:09 executing program 7: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000480)}}, 0x0, 0xffffffefffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x100000, 0xe, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000500100000f000000000000000100000005000000000004000040000020000000dbf4655fdbf4655f0100ffff53ef010001000000dbf4655f000000000000000001000000000000000b0000008000000018000000c20500002b0200"/116, 0x74, 0x400}, {&(0x7f0000010100)="000000000000000000000000244b8e9b57f04b59aa229cc218853f9501004000", 0x20, 0x4e0}, {&(0x7f0000010200)="010000000000050040", 0x9, 0x560}, {&(0x7f0000010300)="020000000300000004", 0x9, 0x800}, {&(0x7f0000010400), 0x0, 0x1000}, {&(0x7f0000011500)="ed41000000080000dbf4655fdbf4655fdbf4655f00000000000004004000", 0x1e, 0x2080}, {0x0}, {0x0}, {&(0x7f0000011c00)="0b0000000c0001022e00000002000000f40702022e", 0x15, 0x10000}, {0x0}, {0x0}, {&(0x7f0000012400)="504d4d00504d4dffdbf4655f00000000647679756b6f762d676c6170746f70320000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000006c6f6f7033340075782f746573742f73797a5f6d6f756e745f696d6167655f650500"/123, 0x7b, 0x20000}, {0x0}, {0x0, 0x0, 0x38000}], 0x0, &(0x7f0000012f00)) 22:37:09 executing program 2: perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000480)}}, 0x0, 0xffffffefffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x100000, 0xe, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000500100000f000000000000000100000005000000000004000040000020000000dbf4655fdbf4655f0100ffff53ef010001000000dbf4655f000000000000000001000000000000000b0000008000000018000000c20500002b0200"/116, 0x74, 0x400}, {&(0x7f0000010100)="000000000000000000000000244b8e9b57f04b59aa229cc218853f9501004000", 0x20, 0x4e0}, {0x0, 0x0, 0x560}, {&(0x7f0000010300)="020000000300000004000000", 0xc, 0x800}, {&(0x7f0000010400), 0x0, 0x1000}, {&(0x7f0000011500)="ed41000000080000dbf4655fdbf4655fdbf4655f00000000000004004000", 0x1e, 0x2080}, {0x0}, {0x0}, {&(0x7f0000011c00)="0b0000000c0001022e00000002000000f40702022e", 0x15, 0x10000}, {0x0}, {0x0}, {&(0x7f0000012400)="504d4d00504d4dffdbf4655f00000000647679756b6f762d676c6170746f70320000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000006c6f6f7033340075782f746573742f73797a5f6d6f756e745f696d6167655f650500"/123, 0x7b, 0x20000}, {0x0}, {0x0, 0x0, 0x38000}], 0x0, &(0x7f0000012f00)) 22:37:09 executing program 3: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) lsetxattr$security_evm(&(0x7f0000000240)='.\x00', &(0x7f0000000300), &(0x7f00000003c0)=@sha1={0x1, "bd2b5bce8b74aea700654a682479ac2c0852bc4d"}, 0x15, 0x3) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={&(0x7f0000000040), 0xb}, 0x0, 0x20, 0x0, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) r0 = fork() r1 = syz_open_procfs(r0, &(0x7f0000000000)='status\x00') r2 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x2, 0x0) pwrite64(r2, &(0x7f00000000c0)='9', 0x1, 0x8040000) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x20, 0x3, 0x0, 0x1, 0x0, 0x8, 0x20620, 0x2, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x3f, 0x2, @perf_config_ext={0x240000000, 0x5}, 0x1400, 0x4, 0x8, 0x7, 0x9, 0x6, 0x6, 0x0, 0x1, 0x0, 0x8}, r0, 0xa, r2, 0x1) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r3, 0x6, 0x1e, &(0x7f0000000040)=0x1, 0x4) setsockopt$inet6_tcp_TCP_REPAIR(r3, 0x6, 0x13, &(0x7f00000018c0)=0x1, 0x4) connect$inet6(r3, &(0x7f0000000080)={0xa, 0x0, 0x0, @loopback}, 0x1c) openat$cgroup_ro(r1, &(0x7f0000000180)='blkio.throttle.io_serviced_recursive\x00', 0x0, 0x0) 22:37:09 executing program 1: r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, @perf_config_ext, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000000), 0x0) r2 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) ioctl$EXT4_IOC_CHECKPOINT(r2, 0x4004662b, &(0x7f0000000100)=0x5) ioctl$AUTOFS_DEV_IOCTL_TIMEOUT(0xffffffffffffffff, 0xc018937a, &(0x7f0000001480)=ANY=[@ANYBLOB="010000fe04f804f32d1ae95f4d8fd9ce99ff00010000001800000059a5a91fc707002c3e05f0bcf35234dd60eedec3d5f1b58f0d41f6996d0df70b25316c86b91cf6440f87695b3e2bf9118d7b986e6dd6169cde2d7b35569ff3c18ea708da093a5e297fd2ec2322a167617fa6662e65407cedfd90d2ee90deccf04f2c85b215e5090cb50628f934703c2db873b5eb9a2e276f987493cc445a8474761879f6df5a5233b80656c014a59590366f77d5104d838160f3f8f304bbfb07a672117635569099d752c2b724b38b74a3b0e2c4dd", @ANYRES32=r0, @ANYBLOB="01040000000000002e2f66696c653000"]) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r3, 0xc08c5332, &(0x7f00000013c0)={0xffffffff, 0x6964, 0x0, 'queue1\x00', 0xff}) r4 = gettid() process_vm_writev(r4, &(0x7f0000002580)=[{&(0x7f0000000140)=""/89, 0x59}, {&(0x7f00000001c0)=""/175, 0xaf}, {&(0x7f0000000280)=""/4096, 0x1000}], 0x3, &(0x7f0000003840)=[{&(0x7f0000002640)=""/105, 0x69}, {0xfffffffffffffffe, 0x10}], 0x2, 0x0) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r1, 0xc08c5332, &(0x7f0000001280)={0x3, 0x5, 0x0, 'queue1\x00', 0x8}) r5 = fork() write$sndseq(r1, &(0x7f0000001340)=[{0x22, 0x8, 0x2, 0x3, @time={0x4}, {0x0, 0x1}, {0x6, 0x81}, @raw32={[0x800, 0x3, 0x9]}}, {0xe1, 0x7, 0xf8, 0xff, @tick=0x2, {0x3f}, {0x4, 0xf1}, @queue={0xff, {0x6, 0x9}}}, {0x4, 0x1, 0x9, 0x5, @time={0x7, 0x6}, {0x7c, 0x2}, {0x20, 0x6}, @connect={{0x0, 0xfd}, {0x98, 0x4}}}, {0x80, 0x4, 0x7, 0x7d, @time={0xfffff000, 0x9}, {0x81, 0x1f}, {0xaa}, @queue={0x5, {0xffffffe0, 0x3}}}], 0x70) r6 = syz_open_dev$vcsn(&(0x7f0000000040), 0x3, 0x2001) ioctl$LOOP_CTL_GET_FREE(r6, 0x4c82) ptrace$setopts(0x4206, r5, 0x0, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fork() fork() clone3(&(0x7f0000004c00)={0xc0002100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) [ 1704.731046] loop2: detected capacity change from 0 to 2048 [ 1704.738091] EXT4-fs warning (device loop2): read_mmp_block:106: Error -117 while reading MMP block 0 [ 1704.750309] loop0: detected capacity change from 0 to 512 [ 1704.758073] EXT4-fs (loop4): mounted filesystem without journal. Quota mode: none. [ 1704.759262] ext4 filesystem being mounted at /syzkaller-testdir967783826/syzkaller.dhcxYf/198/file0 supports timestamps until 2038 (0x7fffffff) [ 1704.789016] EXT4-fs (loop0): unsupported descriptor size 0 [ 1704.802030] loop7: detected capacity change from 0 to 2048 22:37:09 executing program 2: perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000480)}}, 0x0, 0xffffffefffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x100000, 0xe, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000500100000f000000000000000100000005000000000004000040000020000000dbf4655fdbf4655f0100ffff53ef010001000000dbf4655f000000000000000001000000000000000b0000008000000018000000c20500002b0200"/116, 0x74, 0x400}, {&(0x7f0000010100)="000000000000000000000000244b8e9b57f04b59aa229cc218853f9501004000", 0x20, 0x4e0}, {0x0, 0x0, 0x560}, {&(0x7f0000010300)="020000000300000004000000", 0xc, 0x800}, {&(0x7f0000010400), 0x0, 0x1000}, {&(0x7f0000011500)="ed41000000080000dbf4655fdbf4655fdbf4655f00000000000004004000", 0x1e, 0x2080}, {0x0}, {0x0}, {&(0x7f0000011c00)="0b0000000c0001022e00000002000000f40702022e", 0x15, 0x10000}, {0x0}, {0x0}, {&(0x7f0000012400)="504d4d00504d4dffdbf4655f00000000647679756b6f762d676c6170746f70320000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000006c6f6f7033340075782f746573742f73797a5f6d6f756e745f696d6167655f650500"/123, 0x7b, 0x20000}, {0x0}, {0x0, 0x0, 0x38000}], 0x0, &(0x7f0000012f00)) 22:37:09 executing program 4: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000480)}}, 0x0, 0xffffffefffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x100000, 0xe, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000500100000f000000000000000100000005000000000004000040000020000000dbf4655fdbf4655f0100ffff53ef010001000000dbf4655f000000000000000001000000000000000b0000008000000018000000c20500002b0200"/116, 0x74, 0x400}, {&(0x7f0000010100)="000000000000000000000000244b8e9b57f04b59aa229cc218853f9501004000", 0x20, 0x4e0}, {&(0x7f0000010200)="010000000000050040", 0x9, 0x560}, {&(0x7f0000010300)="0200000003000000040000", 0xb, 0x800}, {&(0x7f0000010400), 0x0, 0x1000}, {&(0x7f0000011500)="ed41000000080000dbf4655fdbf4655fdbf4655f00000000000004004000", 0x1e, 0x2080}, {0x0}, {0x0}, {&(0x7f0000011c00)="0b0000000c0001022e00000002000000f40702022e", 0x15, 0x10000}, {0x0}, {0x0}, {&(0x7f0000012400)="504d4d00504d4dffdbf4655f00000000647679756b6f762d676c6170746f70320000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000006c6f6f7033340075782f746573742f73797a5f6d6f756e745f696d6167655f650500"/123, 0x7b, 0x20000}, {0x0}, {0x0, 0x0, 0x38000}], 0x0, &(0x7f0000012f00)) [ 1704.826396] EXT4-fs (loop4): unmounting filesystem. [ 1704.867241] EXT4-fs (loop7): mounted filesystem without journal. Quota mode: none. [ 1704.869242] ext4 filesystem being mounted at /syzkaller-testdir391614100/syzkaller.1GCODk/201/file0 supports timestamps until 2038 (0x7fffffff) 22:37:09 executing program 0: perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000480)}}, 0x0, 0xffffffefffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0xd, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000500100000f000000000000000100000005000000000004000040000020000000dbf4655fdbf4655f0100ffff53ef010001000000dbf4655f000000000000000001000000000000000b0000008000000018000000c20500002b0200"/116, 0x74, 0x400}, {&(0x7f0000010100)="000000000000000000000000244b8e9b57f04b59aa229cc218853f9501004000", 0x20}, {&(0x7f0000010200)="01000000000005", 0x7, 0x560}, {&(0x7f0000010300)="020000000300000004000000", 0xc, 0x800}, {&(0x7f0000010400), 0x0, 0x1000}, {&(0x7f0000011500)="ed41000000080000dbf4655fdbf4655f", 0x10, 0x2080}, {0x0}, {0x0}, {0x0, 0x0, 0x10000}, {0x0}, {0x0}, {0x0, 0x0, 0x20000}, {0x0}], 0x0, &(0x7f0000012f00)) [ 1704.918638] EXT4-fs (loop7): unmounting filesystem. 22:37:09 executing program 7: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000480)}}, 0x0, 0xffffffefffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x100000, 0xe, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000500100000f000000000000000100000005000000000004000040000020000000dbf4655fdbf4655f0100ffff53ef010001000000dbf4655f000000000000000001000000000000000b0000008000000018000000c20500002b0200"/116, 0x74, 0x400}, {&(0x7f0000010100)="000000000000000000000000244b8e9b57f04b59aa229cc218853f9501004000", 0x20, 0x4e0}, {&(0x7f0000010200)="010000000000050040", 0x9, 0x560}, {&(0x7f0000010300)="0200000003000000040000", 0xb, 0x800}, {&(0x7f0000010400), 0x0, 0x1000}, {&(0x7f0000011500)="ed41000000080000dbf4655fdbf4655fdbf4655f00000000000004004000", 0x1e, 0x2080}, {0x0}, {0x0}, {&(0x7f0000011c00)="0b0000000c0001022e00000002000000f40702022e", 0x15, 0x10000}, {0x0}, {0x0}, {&(0x7f0000012400)="504d4d00504d4dffdbf4655f00000000647679756b6f762d676c6170746f70320000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000006c6f6f7033340075782f746573742f73797a5f6d6f756e745f696d6167655f650500"/123, 0x7b, 0x20000}, {0x0}, {0x0, 0x0, 0x38000}], 0x0, &(0x7f0000012f00)) [ 1704.983376] loop4: detected capacity change from 0 to 2048 [ 1704.993385] loop0: detected capacity change from 0 to 512 [ 1705.000164] loop2: detected capacity change from 0 to 2048 [ 1705.003114] loop7: detected capacity change from 0 to 2048 [ 1705.011201] EXT4-fs (loop0): unsupported descriptor size 0 [ 1705.032945] EXT4-fs (loop4): mounted filesystem without journal. Quota mode: none. [ 1705.034331] ext4 filesystem being mounted at /syzkaller-testdir967783826/syzkaller.dhcxYf/199/file0 supports timestamps until 2038 (0x7fffffff) [ 1705.052866] EXT4-fs (loop7): mounted filesystem without journal. Quota mode: none. [ 1705.054075] ext4 filesystem being mounted at /syzkaller-testdir391614100/syzkaller.1GCODk/202/file0 supports timestamps until 2038 (0x7fffffff) [ 1705.061353] EXT4-fs warning (device loop2): read_mmp_block:106: Error -117 while reading MMP block 0 22:37:09 executing program 0: perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000480)}}, 0x0, 0xffffffefffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0xc, &(0x7f0000000200)=[{&(0x7f0000010100)="000000000000000000000000244b8e9b57f04b59aa229cc218853f9501004000", 0x20, 0x4e0}, {&(0x7f0000010200)="01000000000005", 0x7, 0x560}, {&(0x7f0000010300)="020000000300000004000000", 0xc, 0x800}, {&(0x7f0000010400), 0x0, 0x1000}, {&(0x7f0000011500)="ed41000000080000dbf4655fdbf4655f", 0x10, 0x2080}, {0x0}, {0x0}, {0x0, 0x0, 0x10000}, {0x0}, {0x0}, {0x0, 0x0, 0x20000}, {0x0}], 0x0, &(0x7f0000012f00)) 22:37:09 executing program 4: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000480)}}, 0x0, 0xffffffefffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x100000, 0xe, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000500100000f000000000000000100000005000000000004000040000020000000dbf4655fdbf4655f0100ffff53ef010001000000dbf4655f000000000000000001000000000000000b0000008000000018000000c20500002b0200"/116, 0x74, 0x400}, {&(0x7f0000010100)="000000000000000000000000244b8e9b57f04b59aa229cc218853f9501004000", 0x20, 0x4e0}, {&(0x7f0000010200)="010000000000050040", 0x9, 0x560}, {&(0x7f0000010300)="0200000003000000040000", 0xb, 0x800}, {&(0x7f0000010400), 0x0, 0x1000}, {&(0x7f0000011500)="ed41000000080000dbf4655fdbf4655fdbf4655f00000000000004004000", 0x1e, 0x2080}, {0x0}, {0x0}, {&(0x7f0000011c00)="0b0000000c0001022e00000002000000f40702022e", 0x15, 0x10000}, {0x0}, {0x0}, {&(0x7f0000012400)="504d4d00504d4dffdbf4655f00000000647679756b6f762d676c6170746f70320000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000006c6f6f7033340075782f746573742f73797a5f6d6f756e745f696d6167655f650500"/123, 0x7b, 0x20000}, {0x0}, {0x0, 0x0, 0x38000}], 0x0, &(0x7f0000012f00)) [ 1705.130193] EXT4-fs (loop4): unmounting filesystem. [ 1705.147861] EXT4-fs (loop7): unmounting filesystem. 22:37:09 executing program 7: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000480)}}, 0x0, 0xffffffefffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x100000, 0xe, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000500100000f000000000000000100000005000000000004000040000020000000dbf4655fdbf4655f0100ffff53ef010001000000dbf4655f000000000000000001000000000000000b0000008000000018000000c20500002b0200"/116, 0x74, 0x400}, {&(0x7f0000010100)="000000000000000000000000244b8e9b57f04b59aa229cc218853f9501004000", 0x20, 0x4e0}, {&(0x7f0000010200)="010000000000050040", 0x9, 0x560}, {&(0x7f0000010300)="0200000003000000040000", 0xb, 0x800}, {&(0x7f0000010400), 0x0, 0x1000}, {&(0x7f0000011500)="ed41000000080000dbf4655fdbf4655fdbf4655f00000000000004004000", 0x1e, 0x2080}, {0x0}, {0x0}, {&(0x7f0000011c00)="0b0000000c0001022e00000002000000f40702022e", 0x15, 0x10000}, {0x0}, {0x0}, {&(0x7f0000012400)="504d4d00504d4dffdbf4655f00000000647679756b6f762d676c6170746f70320000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000006c6f6f7033340075782f746573742f73797a5f6d6f756e745f696d6167655f650500"/123, 0x7b, 0x20000}, {0x0}, {0x0, 0x0, 0x38000}], 0x0, &(0x7f0000012f00)) 22:37:09 executing program 1: r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, @perf_config_ext, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000000), 0x0) r2 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) ioctl$EXT4_IOC_CHECKPOINT(r2, 0x4004662b, &(0x7f0000000100)=0x5) ioctl$AUTOFS_DEV_IOCTL_TIMEOUT(0xffffffffffffffff, 0xc018937a, &(0x7f0000001480)=ANY=[@ANYBLOB="010000fe04f804f32d1ae95f4d8fd9ce99ff00010000001800000059a5a91fc707002c3e05f0bcf35234dd60eedec3d5f1b58f0d41f6996d0df70b25316c86b91cf6440f87695b3e2bf9118d7b986e6dd6169cde2d7b35569ff3c18ea708da093a5e297fd2ec2322a167617fa6662e65407cedfd90d2ee90deccf04f2c85b215e5090cb50628f934703c2db873b5eb9a2e276f987493cc445a8474761879f6df5a5233b80656c014a59590366f77d5104d838160f3f8f304bbfb07a672117635569099d752c2b724b38b74a3b0e2c4dd", @ANYRES32=r0, @ANYBLOB="01040000000000002e2f66696c653000"]) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r3, 0xc08c5332, &(0x7f00000013c0)={0xffffffff, 0x6964, 0x0, 'queue1\x00', 0xff}) r4 = gettid() process_vm_writev(r4, &(0x7f0000002580)=[{&(0x7f0000000140)=""/89, 0x59}, {&(0x7f00000001c0)=""/175, 0xaf}, {&(0x7f0000000280)=""/4096, 0x1000}], 0x3, &(0x7f0000003840)=[{&(0x7f0000002640)=""/105, 0x69}, {0xfffffffffffffffe, 0x10}], 0x2, 0x0) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r1, 0xc08c5332, &(0x7f0000001280)={0x3, 0x5, 0x0, 'queue1\x00', 0x8}) r5 = fork() write$sndseq(r1, &(0x7f0000001340)=[{0x22, 0x8, 0x2, 0x3, @time={0x4}, {0x0, 0x1}, {0x6, 0x81}, @raw32={[0x800, 0x3, 0x9]}}, {0xe1, 0x7, 0xf8, 0xff, @tick=0x2, {0x3f}, {0x4, 0xf1}, @queue={0xff, {0x6, 0x9}}}, {0x4, 0x1, 0x9, 0x5, @time={0x7, 0x6}, {0x7c, 0x2}, {0x20, 0x6}, @connect={{0x0, 0xfd}, {0x98, 0x4}}}, {0x80, 0x4, 0x7, 0x7d, @time={0xfffff000, 0x9}, {0x81, 0x1f}, {0xaa}, @queue={0x5, {0xffffffe0, 0x3}}}], 0x70) r6 = syz_open_dev$vcsn(&(0x7f0000000040), 0x3, 0x2001) ioctl$LOOP_CTL_GET_FREE(r6, 0x4c82) ptrace$setopts(0x4206, r5, 0x0, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fork() fork() clone3(&(0x7f0000004c00)={0xc0002100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) 22:37:09 executing program 5: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) lsetxattr$security_evm(&(0x7f0000000240)='.\x00', &(0x7f0000000300), &(0x7f00000003c0)=@sha1={0x1, "bd2b5bce8b74aea700654a682479ac2c0852bc4d"}, 0x15, 0x3) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={&(0x7f0000000040), 0xb}, 0x0, 0x20, 0x0, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) r0 = fork() r1 = syz_open_procfs(r0, &(0x7f0000000000)='status\x00') r2 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x2, 0x0) pwrite64(r2, &(0x7f00000000c0)='9', 0x1, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x20, 0x3, 0x4, 0x1, 0x0, 0x8, 0x20620, 0x2, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x3f, 0x2, @perf_config_ext={0x240000000, 0x5}, 0x1400, 0x4, 0x8, 0x7, 0x9, 0x6, 0x6, 0x0, 0x1, 0x0, 0x8}, r0, 0xa, r2, 0x1) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r3, 0x6, 0x1e, &(0x7f0000000040)=0x1, 0x4) connect$inet6(r3, &(0x7f0000000080)={0xa, 0x0, 0x0, @loopback}, 0x1c) openat$cgroup_ro(r1, &(0x7f0000000180)='blkio.throttle.io_serviced_recursive\x00', 0x0, 0x0) 22:37:09 executing program 2: perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000480)}}, 0x0, 0xffffffefffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x100000, 0xe, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000500100000f000000000000000100000005000000000004000040000020000000dbf4655fdbf4655f0100ffff53ef010001000000dbf4655f000000000000000001000000000000000b0000008000000018000000c20500002b0200"/116, 0x74, 0x400}, {&(0x7f0000010100)="000000000000000000000000244b8e9b57f04b59aa229cc218853f9501004000", 0x20, 0x4e0}, {0x0, 0x0, 0x560}, {&(0x7f0000010300)="020000000300000004000000", 0xc, 0x800}, {&(0x7f0000010400), 0x0, 0x1000}, {&(0x7f0000011500)="ed41000000080000dbf4655fdbf4655fdbf4655f00000000000004004000", 0x1e, 0x2080}, {0x0}, {0x0}, {&(0x7f0000011c00)="0b0000000c0001022e00000002000000f40702022e", 0x15, 0x10000}, {0x0}, {0x0}, {&(0x7f0000012400)="504d4d00504d4dffdbf4655f00000000647679756b6f762d676c6170746f70320000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000006c6f6f7033340075782f746573742f73797a5f6d6f756e745f696d6167655f650500"/123, 0x7b, 0x20000}, {0x0}, {0x0, 0x0, 0x38000}], 0x0, &(0x7f0000012f00)) [ 1705.211938] loop0: detected capacity change from 0 to 512 [ 1705.249898] loop4: detected capacity change from 0 to 2048 [ 1705.260668] loop7: detected capacity change from 0 to 2048 [ 1705.266813] EXT4-fs (loop0): VFS: Can't find ext4 filesystem 22:37:09 executing program 6: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) lsetxattr$security_evm(&(0x7f0000000240)='.\x00', &(0x7f0000000300), &(0x7f00000003c0)=@sha1={0x1, "bd2b5bce8b74aea700654a682479ac2c0852bc4d"}, 0x15, 0x3) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={&(0x7f0000000040), 0xb}, 0x0, 0x20, 0x0, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) r0 = fork() r1 = syz_open_procfs(r0, &(0x7f0000000000)='status\x00') r2 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x2, 0x0) pwrite64(r2, &(0x7f00000000c0)='9', 0x1, 0x8040000) perf_event_open(&(0x7f0000000100)={0x0, 0x80, 0x20, 0x3, 0x4, 0x1, 0x0, 0x8, 0x20620, 0x2, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x3f, 0x2, @perf_config_ext={0x240000000, 0x5}, 0x1400, 0x4, 0x8, 0x7, 0x9, 0x6, 0x6, 0x0, 0x1, 0x0, 0x8}, r0, 0xa, r2, 0x1) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r3, 0x6, 0x1e, &(0x7f0000000040)=0x1, 0x4) setsockopt$inet6_tcp_TCP_REPAIR(r3, 0x6, 0x13, &(0x7f00000018c0)=0x1, 0x4) connect$inet6(r3, &(0x7f0000000080)={0xa, 0x0, 0x0, @loopback}, 0x1c) openat$cgroup_ro(r1, &(0x7f0000000180)='blkio.throttle.io_serviced_recursive\x00', 0x0, 0x0) [ 1705.295849] EXT4-fs (loop4): mounted filesystem without journal. Quota mode: none. [ 1705.297231] ext4 filesystem being mounted at /syzkaller-testdir967783826/syzkaller.dhcxYf/200/file0 supports timestamps until 2038 (0x7fffffff) [ 1705.307900] EXT4-fs (loop7): mounted filesystem without journal. Quota mode: none. [ 1705.309204] ext4 filesystem being mounted at /syzkaller-testdir391614100/syzkaller.1GCODk/203/file0 supports timestamps until 2038 (0x7fffffff) 22:37:09 executing program 2: perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000480)}}, 0x0, 0xffffffefffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x100000, 0xe, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000500100000f000000000000000100000005000000000004000040000020000000dbf4655fdbf4655f0100ffff53ef010001000000dbf4655f000000000000000001000000000000000b0000008000000018000000c20500002b0200"/116, 0x74, 0x400}, {&(0x7f0000010100)="000000000000000000000000244b8e9b57f04b59aa229cc218853f9501004000", 0x20, 0x4e0}, {&(0x7f0000010200), 0x0, 0x560}, {&(0x7f0000010300)="020000000300000004000000", 0xc, 0x800}, {&(0x7f0000010400), 0x0, 0x1000}, {&(0x7f0000011500)="ed41000000080000dbf4655fdbf4655fdbf4655f00000000000004004000", 0x1e, 0x2080}, {0x0}, {0x0}, {&(0x7f0000011c00)="0b0000000c0001022e00000002000000f40702022e", 0x15, 0x10000}, {0x0}, {0x0}, {&(0x7f0000012400)="504d4d00504d4dffdbf4655f00000000647679756b6f762d676c6170746f70320000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000006c6f6f7033340075782f746573742f73797a5f6d6f756e745f696d6167655f650500"/123, 0x7b, 0x20000}, {0x0}, {0x0, 0x0, 0x38000}], 0x0, &(0x7f0000012f00)) [ 1705.372423] EXT4-fs (loop4): unmounting filesystem. [ 1705.381664] EXT4-fs (loop7): unmounting filesystem. [ 1705.474850] loop2: detected capacity change from 0 to 2048 [ 1705.499938] EXT4-fs warning (device loop2): read_mmp_block:106: Error -117 while reading MMP block 0 22:37:29 executing program 1: r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, @perf_config_ext, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000000), 0x0) r2 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) ioctl$EXT4_IOC_CHECKPOINT(r2, 0x4004662b, &(0x7f0000000100)=0x5) ioctl$AUTOFS_DEV_IOCTL_TIMEOUT(0xffffffffffffffff, 0xc018937a, &(0x7f0000001480)=ANY=[@ANYBLOB="010000fe04f804f32d1ae95f4d8fd9ce99ff00010000001800000059a5a91fc707002c3e05f0bcf35234dd60eedec3d5f1b58f0d41f6996d0df70b25316c86b91cf6440f87695b3e2bf9118d7b986e6dd6169cde2d7b35569ff3c18ea708da093a5e297fd2ec2322a167617fa6662e65407cedfd90d2ee90deccf04f2c85b215e5090cb50628f934703c2db873b5eb9a2e276f987493cc445a8474761879f6df5a5233b80656c014a59590366f77d5104d838160f3f8f304bbfb07a672117635569099d752c2b724b38b74a3b0e2c4dd", @ANYRES32=r0, @ANYBLOB="01040000000000002e2f66696c653000"]) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r3, 0xc08c5332, &(0x7f00000013c0)={0xffffffff, 0x6964, 0x0, 'queue1\x00', 0xff}) r4 = gettid() process_vm_writev(r4, &(0x7f0000002580)=[{&(0x7f0000000140)=""/89, 0x59}, {&(0x7f00000001c0)=""/175, 0xaf}, {&(0x7f0000000280)=""/4096, 0x1000}], 0x3, &(0x7f0000003840)=[{&(0x7f0000002640)=""/105, 0x69}, {0xfffffffffffffffe, 0x10}], 0x2, 0x0) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r1, 0xc08c5332, &(0x7f0000001280)={0x3, 0x5, 0x0, 'queue1\x00', 0x8}) r5 = fork() write$sndseq(r1, &(0x7f0000001340)=[{0x22, 0x8, 0x2, 0x3, @time={0x4}, {0x0, 0x1}, {0x6, 0x81}, @raw32={[0x800, 0x3, 0x9]}}, {0xe1, 0x7, 0xf8, 0xff, @tick=0x2, {0x3f}, {0x4, 0xf1}, @queue={0xff, {0x6, 0x9}}}, {0x4, 0x1, 0x9, 0x5, @time={0x7, 0x6}, {0x7c, 0x2}, {0x20, 0x6}, @connect={{0x0, 0xfd}, {0x98, 0x4}}}, {0x80, 0x4, 0x7, 0x7d, @time={0xfffff000, 0x9}, {0x81, 0x1f}, {0xaa}, @queue={0x5, {0xffffffe0, 0x3}}}], 0x70) r6 = syz_open_dev$vcsn(&(0x7f0000000040), 0x3, 0x2001) ioctl$LOOP_CTL_GET_FREE(r6, 0x4c82) ptrace$setopts(0x4206, r5, 0x0, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fork() fork() clone3(&(0x7f0000004c00)={0xc0002100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) 22:37:29 executing program 6: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) lsetxattr$security_evm(&(0x7f0000000240)='.\x00', &(0x7f0000000300), &(0x7f00000003c0)=@sha1={0x1, "bd2b5bce8b74aea700654a682479ac2c0852bc4d"}, 0x15, 0x3) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={&(0x7f0000000040), 0xb}, 0x0, 0x20, 0x0, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) r0 = fork() r1 = syz_open_procfs(r0, &(0x7f0000000000)='status\x00') r2 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x2, 0x0) pwrite64(r2, &(0x7f00000000c0)='9', 0x1, 0x8040000) perf_event_open(&(0x7f0000000100)={0x0, 0x80, 0x20, 0x3, 0x4, 0x1, 0x0, 0x8, 0x20620, 0x2, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x3f, 0x2, @perf_config_ext={0x240000000, 0x5}, 0x1400, 0x4, 0x8, 0x7, 0x9, 0x6, 0x6, 0x0, 0x1, 0x0, 0x8}, r0, 0xa, r2, 0x1) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r3, 0x6, 0x1e, &(0x7f0000000040)=0x1, 0x4) setsockopt$inet6_tcp_TCP_REPAIR(r3, 0x6, 0x13, &(0x7f00000018c0)=0x1, 0x4) connect$inet6(r3, &(0x7f0000000080)={0xa, 0x0, 0x0, @loopback}, 0x1c) openat$cgroup_ro(r1, &(0x7f0000000180)='blkio.throttle.io_serviced_recursive\x00', 0x0, 0x0) 22:37:29 executing program 4: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000480)}}, 0x0, 0xffffffefffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x100000, 0xe, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000500100000f000000000000000100000005000000000004000040000020000000dbf4655fdbf4655f0100ffff53ef010001000000dbf4655f000000000000000001000000000000000b0000008000000018000000c20500002b0200"/116, 0x74, 0x400}, {&(0x7f0000010100)="000000000000000000000000244b8e9b57f04b59aa229cc218853f9501004000", 0x20, 0x4e0}, {&(0x7f0000010200)="010000000000050040", 0x9, 0x560}, {&(0x7f0000010300)="0200000003000000040000", 0xb, 0x800}, {&(0x7f0000010400), 0x0, 0x1000}, {&(0x7f0000011500)="ed41000000080000dbf4655fdbf4655fdbf4655f00000000000004004000", 0x1e, 0x2080}, {0x0}, {0x0}, {&(0x7f0000011c00)="0b0000000c0001022e00000002000000f40702022e", 0x15, 0x10000}, {0x0}, {0x0}, {&(0x7f0000012400)="504d4d00504d4dffdbf4655f00000000647679756b6f762d676c6170746f70320000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000006c6f6f7033340075782f746573742f73797a5f6d6f756e745f696d6167655f650500"/123, 0x7b, 0x20000}, {0x0}, {0x0, 0x0, 0x38000}], 0x0, &(0x7f0000012f00)) 22:37:29 executing program 3: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) lsetxattr$security_evm(&(0x7f0000000240)='.\x00', &(0x7f0000000300), &(0x7f00000003c0)=@sha1={0x1, "bd2b5bce8b74aea700654a682479ac2c0852bc4d"}, 0x15, 0x3) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={&(0x7f0000000040), 0xb}, 0x0, 0x20, 0x0, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) r0 = fork() r1 = syz_open_procfs(r0, &(0x7f0000000000)='status\x00') r2 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x2, 0x0) pwrite64(r2, &(0x7f00000000c0)='9', 0x1, 0x8040000) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x20, 0x3, 0x0, 0x1, 0x0, 0x8, 0x20620, 0x2, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x3f, 0x2, @perf_config_ext={0x240000000, 0x5}, 0x1400, 0x4, 0x8, 0x7, 0x9, 0x6, 0x6, 0x0, 0x1, 0x0, 0x8}, r0, 0xa, r2, 0x1) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r3, 0x6, 0x1e, &(0x7f0000000040)=0x1, 0x4) setsockopt$inet6_tcp_TCP_REPAIR(r3, 0x6, 0x13, &(0x7f00000018c0)=0x1, 0x4) connect$inet6(r3, &(0x7f0000000080)={0xa, 0x0, 0x0, @loopback}, 0x1c) openat$cgroup_ro(r1, &(0x7f0000000180)='blkio.throttle.io_serviced_recursive\x00', 0x0, 0x0) 22:37:29 executing program 0: perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000480)}}, 0x0, 0xffffffefffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0xc, &(0x7f0000000200)=[{&(0x7f0000010100)="000000000000000000000000244b8e9b57f04b59aa229cc218853f9501004000", 0x20, 0x4e0}, {&(0x7f0000010200)="01000000000005", 0x7, 0x560}, {&(0x7f0000010300)="020000000300000004000000", 0xc, 0x800}, {&(0x7f0000010400), 0x0, 0x1000}, {&(0x7f0000011500)="ed41000000080000dbf4655fdbf4655f", 0x10, 0x2080}, {0x0}, {0x0}, {0x0, 0x0, 0x10000}, {0x0}, {0x0}, {0x0, 0x0, 0x20000}, {0x0}], 0x0, &(0x7f0000012f00)) 22:37:29 executing program 7: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000480)}}, 0x0, 0xffffffefffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x100000, 0xe, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000500100000f000000000000000100000005000000000004000040000020000000dbf4655fdbf4655f0100ffff53ef010001000000dbf4655f000000000000000001000000000000000b0000008000000018000000c20500002b0200"/116, 0x74, 0x400}, {&(0x7f0000010100)="000000000000000000000000244b8e9b57f04b59aa229cc218853f9501004000", 0x20, 0x4e0}, {&(0x7f0000010200)="010000000000050040", 0x9, 0x560}, {&(0x7f0000010300)="0200000003000000040000", 0xb, 0x800}, {&(0x7f0000010400), 0x0, 0x1000}, {&(0x7f0000011500)="ed41000000080000dbf4655fdbf4655fdbf4655f00000000000004004000", 0x1e, 0x2080}, {0x0}, {0x0}, {&(0x7f0000011c00)="0b0000000c0001022e00000002000000f40702022e", 0x15, 0x10000}, {0x0}, {0x0}, {&(0x7f0000012400)="504d4d00504d4dffdbf4655f00000000647679756b6f762d676c6170746f70320000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000006c6f6f7033340075782f746573742f73797a5f6d6f756e745f696d6167655f650500"/123, 0x7b, 0x20000}, {0x0}, {0x0, 0x0, 0x38000}], 0x0, &(0x7f0000012f00)) 22:37:29 executing program 2: perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000480)}}, 0x0, 0xffffffefffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x100000, 0xe, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000500100000f000000000000000100000005000000000004000040000020000000dbf4655fdbf4655f0100ffff53ef010001000000dbf4655f000000000000000001000000000000000b0000008000000018000000c20500002b0200"/116, 0x74, 0x400}, {&(0x7f0000010100)="000000000000000000000000244b8e9b57f04b59aa229cc218853f9501004000", 0x20, 0x4e0}, {&(0x7f0000010200), 0x0, 0x560}, {&(0x7f0000010300)="020000000300000004000000", 0xc, 0x800}, {&(0x7f0000010400), 0x0, 0x1000}, {&(0x7f0000011500)="ed41000000080000dbf4655fdbf4655fdbf4655f00000000000004004000", 0x1e, 0x2080}, {0x0}, {0x0}, {&(0x7f0000011c00)="0b0000000c0001022e00000002000000f40702022e", 0x15, 0x10000}, {0x0}, {0x0}, {&(0x7f0000012400)="504d4d00504d4dffdbf4655f00000000647679756b6f762d676c6170746f70320000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000006c6f6f7033340075782f746573742f73797a5f6d6f756e745f696d6167655f650500"/123, 0x7b, 0x20000}, {0x0}, {0x0, 0x0, 0x38000}], 0x0, &(0x7f0000012f00)) 22:37:30 executing program 5: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) lsetxattr$security_evm(&(0x7f0000000240)='.\x00', &(0x7f0000000300), &(0x7f00000003c0)=@sha1={0x1, "bd2b5bce8b74aea700654a682479ac2c0852bc4d"}, 0x15, 0x3) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={&(0x7f0000000040), 0xb}, 0x0, 0x20, 0x0, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) r0 = fork() r1 = syz_open_procfs(r0, &(0x7f0000000000)='status\x00') r2 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x2, 0x0) pwrite64(r2, &(0x7f00000000c0)='9', 0x1, 0x8040000) perf_event_open(0x0, r0, 0xa, r2, 0x1) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r3, 0x6, 0x1e, &(0x7f0000000040)=0x1, 0x4) connect$inet6(r3, &(0x7f0000000080)={0xa, 0x0, 0x0, @loopback}, 0x1c) openat$cgroup_ro(r1, &(0x7f0000000180)='blkio.throttle.io_serviced_recursive\x00', 0x0, 0x0) [ 1725.505387] loop0: detected capacity change from 0 to 512 [ 1725.506643] loop4: detected capacity change from 0 to 2048 [ 1725.512029] loop7: detected capacity change from 0 to 2048 [ 1725.522417] loop2: detected capacity change from 0 to 2048 [ 1725.534737] EXT4-fs (loop0): VFS: Can't find ext4 filesystem [ 1725.555140] EXT4-fs warning (device loop2): read_mmp_block:106: Error -117 while reading MMP block 0 [ 1725.611992] EXT4-fs (loop7): mounted filesystem without journal. Quota mode: none. [ 1725.615261] EXT4-fs (loop4): mounted filesystem without journal. Quota mode: none. [ 1725.623307] ext4 filesystem being mounted at /syzkaller-testdir391614100/syzkaller.1GCODk/204/file0 supports timestamps until 2038 (0x7fffffff) [ 1725.648717] ext4 filesystem being mounted at /syzkaller-testdir967783826/syzkaller.dhcxYf/201/file0 supports timestamps until 2038 (0x7fffffff) 22:37:30 executing program 0: perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000480)}}, 0x0, 0xffffffefffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0xc, &(0x7f0000000200)=[{&(0x7f0000010100)="000000000000000000000000244b8e9b57f04b59aa229cc218853f9501004000", 0x20, 0x4e0}, {&(0x7f0000010200)="01000000000005", 0x7, 0x560}, {&(0x7f0000010300)="020000000300000004000000", 0xc, 0x800}, {&(0x7f0000010400), 0x0, 0x1000}, {&(0x7f0000011500)="ed41000000080000dbf4655fdbf4655f", 0x10, 0x2080}, {0x0}, {0x0}, {0x0, 0x0, 0x10000}, {0x0}, {0x0}, {0x0, 0x0, 0x20000}, {0x0}], 0x0, &(0x7f0000012f00)) [ 1725.707013] loop0: detected capacity change from 0 to 512 [ 1725.713700] EXT4-fs (loop0): VFS: Can't find ext4 filesystem 22:37:30 executing program 2: perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000480)}}, 0x0, 0xffffffefffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x100000, 0xe, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000500100000f000000000000000100000005000000000004000040000020000000dbf4655fdbf4655f0100ffff53ef010001000000dbf4655f000000000000000001000000000000000b0000008000000018000000c20500002b0200"/116, 0x74, 0x400}, {&(0x7f0000010100)="000000000000000000000000244b8e9b57f04b59aa229cc218853f9501004000", 0x20, 0x4e0}, {&(0x7f0000010200), 0x0, 0x560}, {&(0x7f0000010300)="020000000300000004000000", 0xc, 0x800}, {&(0x7f0000010400), 0x0, 0x1000}, {&(0x7f0000011500)="ed41000000080000dbf4655fdbf4655fdbf4655f00000000000004004000", 0x1e, 0x2080}, {0x0}, {0x0}, {&(0x7f0000011c00)="0b0000000c0001022e00000002000000f40702022e", 0x15, 0x10000}, {0x0}, {0x0}, {&(0x7f0000012400)="504d4d00504d4dffdbf4655f00000000647679756b6f762d676c6170746f70320000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000006c6f6f7033340075782f746573742f73797a5f6d6f756e745f696d6167655f650500"/123, 0x7b, 0x20000}, {0x0}, {0x0, 0x0, 0x38000}], 0x0, &(0x7f0000012f00)) 22:37:30 executing program 0: perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000480)}}, 0x0, 0xffffffefffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0xd, &(0x7f0000000200)=[{0x0, 0x0, 0x400}, {&(0x7f0000010100)="000000000000000000000000244b8e9b57f04b59aa229cc218853f9501004000", 0x20, 0x4e0}, {&(0x7f0000010200)="01000000000005", 0x7, 0x560}, {&(0x7f0000010300)="020000000300000004000000", 0xc, 0x800}, {&(0x7f0000010400), 0x0, 0x1000}, {&(0x7f0000011500)="ed41000000080000dbf4655fdbf4655f", 0x10, 0x2080}, {0x0}, {0x0}, {0x0, 0x0, 0x10000}, {0x0}, {0x0}, {0x0, 0x0, 0x20000}, {0x0}], 0x0, &(0x7f0000012f00)) [ 1725.844294] EXT4-fs (loop4): unmounting filesystem. [ 1725.847981] EXT4-fs (loop7): unmounting filesystem. 22:37:30 executing program 7: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000480)}}, 0x0, 0xffffffefffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x100000, 0xe, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000500100000f000000000000000100000005000000000004000040000020000000dbf4655fdbf4655f0100ffff53ef010001000000dbf4655f000000000000000001000000000000000b0000008000000018000000c20500002b0200"/116, 0x74, 0x400}, {&(0x7f0000010100)="000000000000000000000000244b8e9b57f04b59aa229cc218853f9501004000", 0x20, 0x4e0}, {&(0x7f0000010200)="010000000000050040", 0x9, 0x560}, {&(0x7f0000010300)="020000000300000004000000", 0xc}, {&(0x7f0000010400), 0x0, 0x1000}, {&(0x7f0000011500)="ed41000000080000dbf4655fdbf4655fdbf4655f00000000000004004000", 0x1e, 0x2080}, {0x0}, {0x0}, {&(0x7f0000011c00)="0b0000000c0001022e00000002000000f40702022e", 0x15, 0x10000}, {0x0}, {0x0}, {&(0x7f0000012400)="504d4d00504d4dffdbf4655f00000000647679756b6f762d676c6170746f70320000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000006c6f6f7033340075782f746573742f73797a5f6d6f756e745f696d6167655f650500"/123, 0x7b, 0x20000}, {0x0}, {0x0, 0x0, 0x38000}], 0x0, &(0x7f0000012f00)) 22:37:30 executing program 4: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000480)}}, 0x0, 0xffffffefffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x100000, 0xe, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000500100000f000000000000000100000005000000000004000040000020000000dbf4655fdbf4655f0100ffff53ef010001000000dbf4655f000000000000000001000000000000000b0000008000000018000000c20500002b0200"/116, 0x74, 0x400}, {&(0x7f0000010100)="000000000000000000000000244b8e9b57f04b59aa229cc218853f9501004000", 0x20, 0x4e0}, {&(0x7f0000010200)="010000000000050040", 0x9, 0x560}, {&(0x7f0000010300)="020000000300000004000000", 0xc}, {&(0x7f0000010400), 0x0, 0x1000}, {&(0x7f0000011500)="ed41000000080000dbf4655fdbf4655fdbf4655f00000000000004004000", 0x1e, 0x2080}, {0x0}, {0x0}, {&(0x7f0000011c00)="0b0000000c0001022e00000002000000f40702022e", 0x15, 0x10000}, {0x0}, {0x0}, {&(0x7f0000012400)="504d4d00504d4dffdbf4655f00000000647679756b6f762d676c6170746f70320000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000006c6f6f7033340075782f746573742f73797a5f6d6f756e745f696d6167655f650500"/123, 0x7b, 0x20000}, {0x0}, {0x0, 0x0, 0x38000}], 0x0, &(0x7f0000012f00)) [ 1725.886817] loop2: detected capacity change from 0 to 2048 [ 1725.944172] EXT4-fs warning (device loop2): read_mmp_block:106: Error -117 while reading MMP block 0 [ 1725.950764] loop0: detected capacity change from 0 to 512 22:37:30 executing program 1: r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, @perf_config_ext, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000000), 0x0) r2 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) ioctl$EXT4_IOC_CHECKPOINT(r2, 0x4004662b, &(0x7f0000000100)=0x5) ioctl$AUTOFS_DEV_IOCTL_TIMEOUT(0xffffffffffffffff, 0xc018937a, &(0x7f0000001480)=ANY=[@ANYBLOB="010000fe04f804f32d1ae95f4d8fd9ce99ff00010000001800000059a5a91fc707002c3e05f0bcf35234dd60eedec3d5f1b58f0d41f6996d0df70b25316c86b91cf6440f87695b3e2bf9118d7b986e6dd6169cde2d7b35569ff3c18ea708da093a5e297fd2ec2322a167617fa6662e65407cedfd90d2ee90deccf04f2c85b215e5090cb50628f934703c2db873b5eb9a2e276f987493cc445a8474761879f6df5a5233b80656c014a59590366f77d5104d838160f3f8f304bbfb07a672117635569099d752c2b724b38b74a3b0e2c4dd54619ff2e05de8c58ace02796bd997ccfd3fbf04c5bb7420f2656931eb46c8e72d17fd", @ANYRES32=r0, @ANYBLOB="01040000000000002e2f66696c653000"]) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r3, 0xc08c5332, &(0x7f00000013c0)={0xffffffff, 0x6964, 0x0, 'queue1\x00', 0xff}) r4 = gettid() process_vm_writev(r4, &(0x7f0000002580)=[{&(0x7f0000000140)=""/89, 0x59}, {&(0x7f00000001c0)=""/175, 0xaf}, {&(0x7f0000000280)=""/4096, 0x1000}], 0x3, &(0x7f0000003840)=[{&(0x7f0000002640)=""/105, 0x69}, {0xfffffffffffffffe, 0x10}], 0x2, 0x0) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r1, 0xc08c5332, &(0x7f0000001280)={0x3, 0x5, 0x0, 'queue1\x00', 0x8}) r5 = fork() write$sndseq(r1, &(0x7f0000001340)=[{0x22, 0x8, 0x2, 0x3, @time={0x4}, {0x0, 0x1}, {0x6, 0x81}, @raw32={[0x800, 0x3, 0x9]}}, {0xe1, 0x7, 0xf8, 0xff, @tick=0x2, {0x3f}, {0x4, 0xf1}, @queue={0xff, {0x6, 0x9}}}, {0x4, 0x1, 0x9, 0x5, @time={0x7, 0x6}, {0x7c, 0x2}, {0x20, 0x6}, @connect={{0x0, 0xfd}, {0x98, 0x4}}}, {0x80, 0x4, 0x7, 0x7d, @time={0xfffff000, 0x9}, {0x81, 0x1f}, {0xaa}, @queue={0x5, {0xffffffe0, 0x3}}}], 0x70) r6 = syz_open_dev$vcsn(&(0x7f0000000040), 0x3, 0x2001) ioctl$LOOP_CTL_GET_FREE(r6, 0x4c82) ptrace$setopts(0x4206, r5, 0x0, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fork() fork() clone3(&(0x7f0000004c00)={0xc0002100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) [ 1725.981849] loop7: detected capacity change from 0 to 2048 [ 1725.984600] EXT4-fs (loop0): VFS: Can't find ext4 filesystem [ 1726.002908] EXT4-fs (loop7): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 1726.003950] EXT4-fs (loop7): group descriptors corrupted! [ 1726.020336] loop4: detected capacity change from 0 to 2048 [ 1726.048770] EXT4-fs (loop4): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 1726.049812] EXT4-fs (loop4): group descriptors corrupted! 22:37:30 executing program 3: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) lsetxattr$security_evm(&(0x7f0000000240)='.\x00', &(0x7f0000000300), &(0x7f00000003c0)=@sha1={0x1, "bd2b5bce8b74aea700654a682479ac2c0852bc4d"}, 0x15, 0x3) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={&(0x7f0000000040), 0xb}, 0x0, 0x20, 0x0, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) r0 = fork() r1 = syz_open_procfs(r0, &(0x7f0000000000)='status\x00') r2 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x2, 0x0) pwrite64(r2, &(0x7f00000000c0)='9', 0x1, 0x8040000) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x20, 0x3, 0x4, 0x0, 0x0, 0x8, 0x20620, 0x2, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x3f, 0x2, @perf_config_ext={0x240000000, 0x5}, 0x1400, 0x4, 0x8, 0x7, 0x9, 0x6, 0x6, 0x0, 0x1, 0x0, 0x8}, r0, 0xa, r2, 0x1) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r3, 0x6, 0x1e, &(0x7f0000000040)=0x1, 0x4) setsockopt$inet6_tcp_TCP_REPAIR(r3, 0x6, 0x13, &(0x7f00000018c0)=0x1, 0x4) connect$inet6(r3, &(0x7f0000000080)={0xa, 0x0, 0x0, @loopback}, 0x1c) openat$cgroup_ro(r1, &(0x7f0000000180)='blkio.throttle.io_serviced_recursive\x00', 0x0, 0x0) 22:37:30 executing program 5: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) lsetxattr$security_evm(&(0x7f0000000240)='.\x00', &(0x7f0000000300), &(0x7f00000003c0)=@sha1={0x1, "bd2b5bce8b74aea700654a682479ac2c0852bc4d"}, 0x15, 0x3) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={&(0x7f0000000040), 0xb}, 0x0, 0x20, 0x0, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) r0 = fork() r1 = syz_open_procfs(r0, &(0x7f0000000000)='status\x00') r2 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x2, 0x0) pwrite64(r2, &(0x7f00000000c0)='9', 0x1, 0x8040000) perf_event_open(0x0, r0, 0xa, r2, 0x1) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r3, 0x6, 0x1e, &(0x7f0000000040)=0x1, 0x4) connect$inet6(r3, &(0x7f0000000080)={0xa, 0x0, 0x0, @loopback}, 0x1c) openat$cgroup_ro(r1, &(0x7f0000000180)='blkio.throttle.io_serviced_recursive\x00', 0x0, 0x0) 22:37:30 executing program 6: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) lsetxattr$security_evm(&(0x7f0000000240)='.\x00', &(0x7f0000000300), &(0x7f00000003c0)=@sha1={0x1, "bd2b5bce8b74aea700654a682479ac2c0852bc4d"}, 0x15, 0x3) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={&(0x7f0000000040), 0xb}, 0x0, 0x20, 0x0, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) r0 = fork() r1 = syz_open_procfs(r0, &(0x7f0000000000)='status\x00') r2 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x2, 0x0) pwrite64(r2, &(0x7f00000000c0)='9', 0x1, 0x8040000) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x3, 0x4, 0x1, 0x0, 0x8, 0x20620, 0x2, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x3f, 0x2, @perf_config_ext={0x240000000, 0x5}, 0x1400, 0x4, 0x8, 0x7, 0x9, 0x6, 0x6, 0x0, 0x1, 0x0, 0x8}, r0, 0xa, r2, 0x1) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r3, 0x6, 0x1e, &(0x7f0000000040)=0x1, 0x4) setsockopt$inet6_tcp_TCP_REPAIR(r3, 0x6, 0x13, &(0x7f00000018c0)=0x1, 0x4) connect$inet6(r3, &(0x7f0000000080)={0xa, 0x0, 0x0, @loopback}, 0x1c) openat$cgroup_ro(r1, &(0x7f0000000180)='blkio.throttle.io_serviced_recursive\x00', 0x0, 0x0) 22:37:30 executing program 7: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000480)}}, 0x0, 0xffffffefffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x100000, 0xe, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000500100000f000000000000000100000005000000000004000040000020000000dbf4655fdbf4655f0100ffff53ef010001000000dbf4655f000000000000000001000000000000000b0000008000000018000000c20500002b0200"/116, 0x74, 0x400}, {&(0x7f0000010100)="000000000000000000000000244b8e9b57f04b59aa229cc218853f9501004000", 0x20, 0x4e0}, {&(0x7f0000010200)="010000000000050040", 0x9, 0x560}, {&(0x7f0000010300)="020000000300000004000000", 0xc}, {&(0x7f0000010400), 0x0, 0x1000}, {&(0x7f0000011500)="ed41000000080000dbf4655fdbf4655fdbf4655f00000000000004004000", 0x1e, 0x2080}, {0x0}, {0x0}, {&(0x7f0000011c00)="0b0000000c0001022e00000002000000f40702022e", 0x15, 0x10000}, {0x0}, {0x0}, {&(0x7f0000012400)="504d4d00504d4dffdbf4655f00000000647679756b6f762d676c6170746f70320000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000006c6f6f7033340075782f746573742f73797a5f6d6f756e745f696d6167655f650500"/123, 0x7b, 0x20000}, {0x0}, {0x0, 0x0, 0x38000}], 0x0, &(0x7f0000012f00)) [ 1726.224055] loop7: detected capacity change from 0 to 2048 [ 1726.247320] EXT4-fs (loop7): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 1726.248643] EXT4-fs (loop7): group descriptors corrupted! 22:37:47 executing program 4: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000480)}}, 0x0, 0xffffffefffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x100000, 0xe, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000500100000f000000000000000100000005000000000004000040000020000000dbf4655fdbf4655f0100ffff53ef010001000000dbf4655f000000000000000001000000000000000b0000008000000018000000c20500002b0200"/116, 0x74, 0x400}, {&(0x7f0000010100)="000000000000000000000000244b8e9b57f04b59aa229cc218853f9501004000", 0x20, 0x4e0}, {&(0x7f0000010200)="010000000000050040", 0x9, 0x560}, {&(0x7f0000010300)="020000000300000004000000", 0xc}, {&(0x7f0000010400), 0x0, 0x1000}, {&(0x7f0000011500)="ed41000000080000dbf4655fdbf4655fdbf4655f00000000000004004000", 0x1e, 0x2080}, {0x0}, {0x0}, {&(0x7f0000011c00)="0b0000000c0001022e00000002000000f40702022e", 0x15, 0x10000}, {0x0}, {0x0}, {&(0x7f0000012400)="504d4d00504d4dffdbf4655f00000000647679756b6f762d676c6170746f70320000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000006c6f6f7033340075782f746573742f73797a5f6d6f756e745f696d6167655f650500"/123, 0x7b, 0x20000}, {0x0}, {0x0, 0x0, 0x38000}], 0x0, &(0x7f0000012f00)) 22:37:47 executing program 6: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) lsetxattr$security_evm(&(0x7f0000000240)='.\x00', &(0x7f0000000300), &(0x7f00000003c0)=@sha1={0x1, "bd2b5bce8b74aea700654a682479ac2c0852bc4d"}, 0x15, 0x3) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={&(0x7f0000000040), 0xb}, 0x0, 0x20, 0x0, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) r0 = fork() r1 = syz_open_procfs(r0, &(0x7f0000000000)='status\x00') r2 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x2, 0x0) pwrite64(r2, &(0x7f00000000c0)='9', 0x1, 0x8040000) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x3, 0x4, 0x1, 0x0, 0x8, 0x20620, 0x2, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x3f, 0x2, @perf_config_ext={0x240000000, 0x5}, 0x1400, 0x4, 0x8, 0x7, 0x9, 0x6, 0x6, 0x0, 0x1, 0x0, 0x8}, r0, 0xa, r2, 0x1) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r3, 0x6, 0x1e, &(0x7f0000000040)=0x1, 0x4) setsockopt$inet6_tcp_TCP_REPAIR(r3, 0x6, 0x13, &(0x7f00000018c0)=0x1, 0x4) connect$inet6(r3, &(0x7f0000000080)={0xa, 0x0, 0x0, @loopback}, 0x1c) openat$cgroup_ro(r1, &(0x7f0000000180)='blkio.throttle.io_serviced_recursive\x00', 0x0, 0x0) 22:37:47 executing program 5: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) lsetxattr$security_evm(&(0x7f0000000240)='.\x00', &(0x7f0000000300), &(0x7f00000003c0)=@sha1={0x1, "bd2b5bce8b74aea700654a682479ac2c0852bc4d"}, 0x15, 0x3) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={&(0x7f0000000040), 0xb}, 0x0, 0x20, 0x0, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) r0 = fork() r1 = syz_open_procfs(r0, &(0x7f0000000000)='status\x00') r2 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x2, 0x0) pwrite64(r2, &(0x7f00000000c0)='9', 0x1, 0x8040000) perf_event_open(0x0, r0, 0xa, r2, 0x1) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r3, 0x6, 0x1e, &(0x7f0000000040)=0x1, 0x4) connect$inet6(r3, &(0x7f0000000080)={0xa, 0x0, 0x0, @loopback}, 0x1c) openat$cgroup_ro(r1, &(0x7f0000000180)='blkio.throttle.io_serviced_recursive\x00', 0x0, 0x0) 22:37:47 executing program 7: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000480)}}, 0x0, 0xffffffefffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x100000, 0xe, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000500100000f000000000000000100000005000000000004000040000020000000dbf4655fdbf4655f0100ffff53ef010001000000dbf4655f000000000000000001000000000000000b0000008000000018000000c20500002b0200"/116, 0x74, 0x400}, {&(0x7f0000010100)="000000000000000000000000244b8e9b57f04b59aa229cc218853f9501004000", 0x20, 0x4e0}, {&(0x7f0000010200)="010000000000050040", 0x9, 0x560}, {&(0x7f0000010300)="020000000300000004000000", 0xc}, {&(0x7f0000010400), 0x0, 0x1000}, {&(0x7f0000011500)="ed41000000080000dbf4655fdbf4655fdbf4655f00000000000004004000", 0x1e, 0x2080}, {0x0}, {0x0}, {&(0x7f0000011c00)="0b0000000c0001022e00000002000000f40702022e", 0x15, 0x10000}, {0x0}, {0x0}, {&(0x7f0000012400)="504d4d00504d4dffdbf4655f00000000647679756b6f762d676c6170746f70320000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000006c6f6f7033340075782f746573742f73797a5f6d6f756e745f696d6167655f650500"/123, 0x7b, 0x20000}, {0x0}, {0x0, 0x0, 0x38000}], 0x0, &(0x7f0000012f00)) 22:37:47 executing program 1: r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, @perf_config_ext, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000000), 0x0) r2 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) ioctl$EXT4_IOC_CHECKPOINT(r2, 0x4004662b, &(0x7f0000000100)=0x5) ioctl$AUTOFS_DEV_IOCTL_TIMEOUT(0xffffffffffffffff, 0xc018937a, &(0x7f0000001480)=ANY=[@ANYBLOB="010000fe04f804f32d1ae95f4d8fd9ce99ff00010000001800000059a5a91fc707002c3e05f0bcf35234dd60eedec3d5f1b58f0d41f6996d0df70b25316c86b91cf6440f87695b3e2bf9118d7b986e6dd6169cde2d7b35569ff3c18ea708da093a5e297fd2ec2322a167617fa6662e65407cedfd90d2ee90deccf04f2c85b215e5090cb50628f934703c2db873b5eb9a2e276f987493cc445a8474761879f6df5a5233b80656c014a59590366f77d5104d838160f3f8f304bbfb07a672117635569099d752c2b724b38b74a3b0e2c4dd54619ff2e05de8c58ace02796bd997ccfd3fbf04c5bb7420f2656931eb46c8e72d17fd", @ANYRES32=r0, @ANYBLOB="01040000000000002e2f66696c653000"]) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r3, 0xc08c5332, &(0x7f00000013c0)={0xffffffff, 0x6964, 0x0, 'queue1\x00', 0xff}) r4 = gettid() process_vm_writev(r4, &(0x7f0000002580)=[{&(0x7f0000000140)=""/89, 0x59}, {&(0x7f00000001c0)=""/175, 0xaf}, {&(0x7f0000000280)=""/4096, 0x1000}], 0x3, &(0x7f0000003840)=[{&(0x7f0000002640)=""/105, 0x69}, {0xfffffffffffffffe, 0x10}], 0x2, 0x0) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r1, 0xc08c5332, &(0x7f0000001280)={0x3, 0x5, 0x0, 'queue1\x00', 0x8}) r5 = fork() write$sndseq(r1, &(0x7f0000001340)=[{0x22, 0x8, 0x2, 0x3, @time={0x4}, {0x0, 0x1}, {0x6, 0x81}, @raw32={[0x800, 0x3, 0x9]}}, {0xe1, 0x7, 0xf8, 0xff, @tick=0x2, {0x3f}, {0x4, 0xf1}, @queue={0xff, {0x6, 0x9}}}, {0x4, 0x1, 0x9, 0x5, @time={0x7, 0x6}, {0x7c, 0x2}, {0x20, 0x6}, @connect={{0x0, 0xfd}, {0x98, 0x4}}}, {0x80, 0x4, 0x7, 0x7d, @time={0xfffff000, 0x9}, {0x81, 0x1f}, {0xaa}, @queue={0x5, {0xffffffe0, 0x3}}}], 0x70) r6 = syz_open_dev$vcsn(&(0x7f0000000040), 0x3, 0x2001) ioctl$LOOP_CTL_GET_FREE(r6, 0x4c82) ptrace$setopts(0x4206, r5, 0x0, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fork() fork() clone3(&(0x7f0000004c00)={0xc0002100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) 22:37:47 executing program 3: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) lsetxattr$security_evm(&(0x7f0000000240)='.\x00', &(0x7f0000000300), &(0x7f00000003c0)=@sha1={0x1, "bd2b5bce8b74aea700654a682479ac2c0852bc4d"}, 0x15, 0x3) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={&(0x7f0000000040), 0xb}, 0x0, 0x20, 0x0, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) r0 = fork() r1 = syz_open_procfs(r0, &(0x7f0000000000)='status\x00') r2 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x2, 0x0) pwrite64(r2, &(0x7f00000000c0)='9', 0x1, 0x8040000) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x20, 0x3, 0x4, 0x0, 0x0, 0x8, 0x20620, 0x2, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x3f, 0x2, @perf_config_ext={0x240000000, 0x5}, 0x1400, 0x4, 0x8, 0x7, 0x9, 0x6, 0x6, 0x0, 0x1, 0x0, 0x8}, r0, 0xa, r2, 0x1) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r3, 0x6, 0x1e, &(0x7f0000000040)=0x1, 0x4) setsockopt$inet6_tcp_TCP_REPAIR(r3, 0x6, 0x13, &(0x7f00000018c0)=0x1, 0x4) connect$inet6(r3, &(0x7f0000000080)={0xa, 0x0, 0x0, @loopback}, 0x1c) openat$cgroup_ro(r1, &(0x7f0000000180)='blkio.throttle.io_serviced_recursive\x00', 0x0, 0x0) 22:37:47 executing program 0: perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000480)}}, 0x0, 0xffffffefffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0xd, &(0x7f0000000200)=[{0x0, 0x0, 0x400}, {&(0x7f0000010100)="000000000000000000000000244b8e9b57f04b59aa229cc218853f9501004000", 0x20, 0x4e0}, {&(0x7f0000010200)="01000000000005", 0x7, 0x560}, {&(0x7f0000010300)="020000000300000004000000", 0xc, 0x800}, {&(0x7f0000010400), 0x0, 0x1000}, {&(0x7f0000011500)="ed41000000080000dbf4655fdbf4655f", 0x10, 0x2080}, {0x0}, {0x0}, {0x0, 0x0, 0x10000}, {0x0}, {0x0}, {0x0, 0x0, 0x20000}, {0x0}], 0x0, &(0x7f0000012f00)) 22:37:47 executing program 2: perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000480)}}, 0x0, 0xffffffefffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x100000, 0xe, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000500100000f000000000000000100000005000000000004000040000020000000dbf4655fdbf4655f0100ffff53ef010001000000dbf4655f000000000000000001000000000000000b0000008000000018000000c20500002b0200"/116, 0x74, 0x400}, {&(0x7f0000010100)="000000000000000000000000244b8e9b57f04b59aa229cc218853f9501004000", 0x20, 0x4e0}, {&(0x7f0000010200)="0100000000", 0x5, 0x560}, {&(0x7f0000010300)="020000000300000004000000", 0xc, 0x800}, {&(0x7f0000010400), 0x0, 0x1000}, {&(0x7f0000011500)="ed41000000080000dbf4655fdbf4655fdbf4655f00000000000004004000", 0x1e, 0x2080}, {0x0}, {0x0}, {&(0x7f0000011c00)="0b0000000c0001022e00000002000000f40702022e", 0x15, 0x10000}, {0x0}, {0x0}, {&(0x7f0000012400)="504d4d00504d4dffdbf4655f00000000647679756b6f762d676c6170746f70320000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000006c6f6f7033340075782f746573742f73797a5f6d6f756e745f696d6167655f650500"/123, 0x7b, 0x20000}, {0x0}, {0x0, 0x0, 0x38000}], 0x0, &(0x7f0000012f00)) [ 1742.675387] loop4: detected capacity change from 0 to 2048 [ 1742.679359] loop2: detected capacity change from 0 to 2048 [ 1742.694278] loop0: detected capacity change from 0 to 512 [ 1742.694665] EXT4-fs warning (device loop2): read_mmp_block:106: Error -117 while reading MMP block 0 [ 1742.696309] EXT4-fs (loop4): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 1742.697209] EXT4-fs (loop4): group descriptors corrupted! [ 1742.730283] EXT4-fs (loop0): VFS: Can't find ext4 filesystem [ 1742.735791] loop7: detected capacity change from 0 to 2048 [ 1742.775989] EXT4-fs (loop7): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 1742.777532] EXT4-fs (loop7): group descriptors corrupted! 22:38:05 executing program 5: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) lsetxattr$security_evm(&(0x7f0000000240)='.\x00', &(0x7f0000000300), &(0x7f00000003c0)=@sha1={0x1, "bd2b5bce8b74aea700654a682479ac2c0852bc4d"}, 0x15, 0x3) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={&(0x7f0000000040), 0xb}, 0x0, 0x20, 0x0, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) r0 = fork() r1 = syz_open_procfs(r0, &(0x7f0000000000)='status\x00') r2 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x2, 0x0) pwrite64(r2, &(0x7f00000000c0)='9', 0x1, 0x8040000) perf_event_open(&(0x7f0000000100)={0x0, 0x80, 0x20, 0x3, 0x4, 0x1, 0x0, 0x8, 0x20620, 0x2, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x3f, 0x2, @perf_config_ext={0x240000000, 0x5}, 0x1400, 0x4, 0x8, 0x7, 0x9, 0x6, 0x6, 0x0, 0x1, 0x0, 0x8}, r0, 0xa, r2, 0x1) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r3, 0x6, 0x1e, &(0x7f0000000040)=0x1, 0x4) connect$inet6(r3, &(0x7f0000000080)={0xa, 0x0, 0x0, @loopback}, 0x1c) openat$cgroup_ro(r1, &(0x7f0000000180)='blkio.throttle.io_serviced_recursive\x00', 0x0, 0x0) 22:38:05 executing program 2: perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000480)}}, 0x0, 0xffffffefffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x100000, 0xe, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000500100000f000000000000000100000005000000000004000040000020000000dbf4655fdbf4655f0100ffff53ef010001000000dbf4655f000000000000000001000000000000000b0000008000000018000000c20500002b0200"/116, 0x74, 0x400}, {&(0x7f0000010100)="000000000000000000000000244b8e9b57f04b59aa229cc218853f9501004000", 0x20, 0x4e0}, {&(0x7f0000010200)="0100000000", 0x5, 0x560}, {&(0x7f0000010300)="020000000300000004000000", 0xc, 0x800}, {&(0x7f0000010400), 0x0, 0x1000}, {&(0x7f0000011500)="ed41000000080000dbf4655fdbf4655fdbf4655f00000000000004004000", 0x1e, 0x2080}, {0x0}, {0x0}, {&(0x7f0000011c00)="0b0000000c0001022e00000002000000f40702022e", 0x15, 0x10000}, {0x0}, {0x0}, {&(0x7f0000012400)="504d4d00504d4dffdbf4655f00000000647679756b6f762d676c6170746f70320000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000006c6f6f7033340075782f746573742f73797a5f6d6f756e745f696d6167655f650500"/123, 0x7b, 0x20000}, {0x0}, {0x0, 0x0, 0x38000}], 0x0, &(0x7f0000012f00)) 22:38:05 executing program 7: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000480)}}, 0x0, 0xffffffefffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x100000, 0xd, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000500100000f000000000000000100000005000000000004000040000020000000dbf4655fdbf4655f0100ffff53ef010001000000dbf4655f000000000000000001000000000000000b0000008000000018000000c20500002b0200"/116, 0x74, 0x400}, {&(0x7f0000010100)="000000000000000000000000244b8e9b57f04b59aa229cc218853f9501004000", 0x20, 0x4e0}, {&(0x7f0000010300)="020000000300000004000000", 0xc, 0x800}, {&(0x7f0000010400), 0x0, 0x1000}, {&(0x7f0000011500)="ed41000000080000dbf4655fdbf4655fdbf4655f00000000000004004000", 0x1e, 0x2080}, {0x0}, {0x0}, {&(0x7f0000011c00)="0b0000000c0001022e00000002000000f40702022e", 0x15, 0x10000}, {0x0}, {0x0}, {&(0x7f0000012400)="504d4d00504d4dffdbf4655f00000000647679756b6f762d676c6170746f70320000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000006c6f6f7033340075782f746573742f73797a5f6d6f756e745f696d6167655f650500"/123, 0x7b, 0x20000}, {0x0}, {0x0, 0x0, 0x38000}], 0x0, &(0x7f0000012f00)) 22:38:05 executing program 1: r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, @perf_config_ext, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000000), 0x0) r2 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) ioctl$EXT4_IOC_CHECKPOINT(r2, 0x4004662b, &(0x7f0000000100)=0x5) ioctl$AUTOFS_DEV_IOCTL_TIMEOUT(0xffffffffffffffff, 0xc018937a, &(0x7f0000001480)=ANY=[@ANYBLOB="010000fe04f804f32d1ae95f4d8fd9ce99ff00010000001800000059a5a91fc707002c3e05f0bcf35234dd60eedec3d5f1b58f0d41f6996d0df70b25316c86b91cf6440f87695b3e2bf9118d7b986e6dd6169cde2d7b35569ff3c18ea708da093a5e297fd2ec2322a167617fa6662e65407cedfd90d2ee90deccf04f2c85b215e5090cb50628f934703c2db873b5eb9a2e276f987493cc445a8474761879f6df5a5233b80656c014a59590366f77d5104d838160f3f8f304bbfb07a672117635569099d752c2b724b38b74a3b0e2c4dd54619ff2e05de8c58ace02796bd997ccfd3fbf04c5bb7420f2656931eb46c8e72d17fd", @ANYRES32=r0, @ANYBLOB="01040000000000002e2f66696c653000"]) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r3, 0xc08c5332, &(0x7f00000013c0)={0xffffffff, 0x6964, 0x0, 'queue1\x00', 0xff}) r4 = gettid() process_vm_writev(r4, &(0x7f0000002580)=[{&(0x7f0000000140)=""/89, 0x59}, {&(0x7f00000001c0)=""/175, 0xaf}, {&(0x7f0000000280)=""/4096, 0x1000}], 0x3, &(0x7f0000003840)=[{&(0x7f0000002640)=""/105, 0x69}, {0xfffffffffffffffe, 0x10}], 0x2, 0x0) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r1, 0xc08c5332, &(0x7f0000001280)={0x3, 0x5, 0x0, 'queue1\x00', 0x8}) r5 = fork() write$sndseq(r1, &(0x7f0000001340)=[{0x22, 0x8, 0x2, 0x3, @time={0x4}, {0x0, 0x1}, {0x6, 0x81}, @raw32={[0x800, 0x3, 0x9]}}, {0xe1, 0x7, 0xf8, 0xff, @tick=0x2, {0x3f}, {0x4, 0xf1}, @queue={0xff, {0x6, 0x9}}}, {0x4, 0x1, 0x9, 0x5, @time={0x7, 0x6}, {0x7c, 0x2}, {0x20, 0x6}, @connect={{0x0, 0xfd}, {0x98, 0x4}}}, {0x80, 0x4, 0x7, 0x7d, @time={0xfffff000, 0x9}, {0x81, 0x1f}, {0xaa}, @queue={0x5, {0xffffffe0, 0x3}}}], 0x70) r6 = syz_open_dev$vcsn(&(0x7f0000000040), 0x3, 0x2001) ioctl$LOOP_CTL_GET_FREE(r6, 0x4c82) ptrace$setopts(0x4206, r5, 0x0, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fork() fork() clone3(&(0x7f0000004c00)={0xc0002100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) 22:38:05 executing program 4: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000480)}}, 0x0, 0xffffffefffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x100000, 0xe, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000500100000f000000000000000100000005000000000004000040000020000000dbf4655fdbf4655f0100ffff53ef010001000000dbf4655f000000000000000001000000000000000b0000008000000018000000c20500002b0200"/116, 0x74, 0x400}, {&(0x7f0000010100)="000000000000000000000000244b8e9b57f04b59aa229cc218853f9501004000", 0x20, 0x4e0}, {&(0x7f0000010200)="010000000000050040", 0x9, 0x560}, {&(0x7f0000010300)="020000000300000004000000", 0xc}, {&(0x7f0000010400), 0x0, 0x1000}, {&(0x7f0000011500)="ed41000000080000dbf4655fdbf4655fdbf4655f00000000000004004000", 0x1e, 0x2080}, {0x0}, {0x0}, {&(0x7f0000011c00)="0b0000000c0001022e00000002000000f40702022e", 0x15, 0x10000}, {0x0}, {0x0}, {&(0x7f0000012400)="504d4d00504d4dffdbf4655f00000000647679756b6f762d676c6170746f70320000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000006c6f6f7033340075782f746573742f73797a5f6d6f756e745f696d6167655f650500"/123, 0x7b, 0x20000}, {0x0}, {0x0, 0x0, 0x38000}], 0x0, &(0x7f0000012f00)) 22:38:05 executing program 0: perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000480)}}, 0x0, 0xffffffefffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0xd, &(0x7f0000000200)=[{0x0, 0x0, 0x400}, {&(0x7f0000010100)="000000000000000000000000244b8e9b57f04b59aa229cc218853f9501004000", 0x20, 0x4e0}, {&(0x7f0000010200)="01000000000005", 0x7, 0x560}, {&(0x7f0000010300)="020000000300000004000000", 0xc, 0x800}, {&(0x7f0000010400), 0x0, 0x1000}, {&(0x7f0000011500)="ed41000000080000dbf4655fdbf4655f", 0x10, 0x2080}, {0x0}, {0x0}, {0x0, 0x0, 0x10000}, {0x0}, {0x0}, {0x0, 0x0, 0x20000}, {0x0}], 0x0, &(0x7f0000012f00)) 22:38:05 executing program 3: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) lsetxattr$security_evm(&(0x7f0000000240)='.\x00', &(0x7f0000000300), &(0x7f00000003c0)=@sha1={0x1, "bd2b5bce8b74aea700654a682479ac2c0852bc4d"}, 0x15, 0x3) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={&(0x7f0000000040), 0xb}, 0x0, 0x20, 0x0, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) r0 = fork() r1 = syz_open_procfs(r0, &(0x7f0000000000)='status\x00') r2 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x2, 0x0) pwrite64(r2, &(0x7f00000000c0)='9', 0x1, 0x8040000) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x20, 0x3, 0x4, 0x0, 0x0, 0x8, 0x20620, 0x2, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x3f, 0x2, @perf_config_ext={0x240000000, 0x5}, 0x1400, 0x4, 0x8, 0x7, 0x9, 0x6, 0x6, 0x0, 0x1, 0x0, 0x8}, r0, 0xa, r2, 0x1) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r3, 0x6, 0x1e, &(0x7f0000000040)=0x1, 0x4) setsockopt$inet6_tcp_TCP_REPAIR(r3, 0x6, 0x13, &(0x7f00000018c0)=0x1, 0x4) connect$inet6(r3, &(0x7f0000000080)={0xa, 0x0, 0x0, @loopback}, 0x1c) openat$cgroup_ro(r1, &(0x7f0000000180)='blkio.throttle.io_serviced_recursive\x00', 0x0, 0x0) 22:38:05 executing program 6: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) lsetxattr$security_evm(&(0x7f0000000240)='.\x00', &(0x7f0000000300), &(0x7f00000003c0)=@sha1={0x1, "bd2b5bce8b74aea700654a682479ac2c0852bc4d"}, 0x15, 0x3) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={&(0x7f0000000040), 0xb}, 0x0, 0x20, 0x0, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) r0 = fork() r1 = syz_open_procfs(r0, &(0x7f0000000000)='status\x00') r2 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x2, 0x0) pwrite64(r2, &(0x7f00000000c0)='9', 0x1, 0x8040000) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x3, 0x4, 0x1, 0x0, 0x8, 0x20620, 0x2, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x3f, 0x2, @perf_config_ext={0x240000000, 0x5}, 0x1400, 0x4, 0x8, 0x7, 0x9, 0x6, 0x6, 0x0, 0x1, 0x0, 0x8}, r0, 0xa, r2, 0x1) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r3, 0x6, 0x1e, &(0x7f0000000040)=0x1, 0x4) setsockopt$inet6_tcp_TCP_REPAIR(r3, 0x6, 0x13, &(0x7f00000018c0)=0x1, 0x4) connect$inet6(r3, &(0x7f0000000080)={0xa, 0x0, 0x0, @loopback}, 0x1c) openat$cgroup_ro(r1, &(0x7f0000000180)='blkio.throttle.io_serviced_recursive\x00', 0x0, 0x0) [ 1760.818246] loop2: detected capacity change from 0 to 2048 [ 1760.832793] loop0: detected capacity change from 0 to 512 [ 1760.837326] loop4: detected capacity change from 0 to 2048 [ 1760.847335] EXT4-fs warning (device loop2): read_mmp_block:106: Error -117 while reading MMP block 0 [ 1760.853388] EXT4-fs (loop0): VFS: Can't find ext4 filesystem [ 1760.856681] EXT4-fs (loop4): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 1760.857940] EXT4-fs (loop4): group descriptors corrupted! [ 1760.874055] loop7: detected capacity change from 0 to 2048 [ 1760.921116] EXT4-fs warning (device loop7): read_mmp_block:106: Error -117 while reading MMP block 0 22:38:05 executing program 0: perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000480)}}, 0x0, 0xffffffefffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0xd, &(0x7f0000000200)=[{&(0x7f0000010000), 0x0, 0x400}, {&(0x7f0000010100)="000000000000000000000000244b8e9b57f04b59aa229cc218853f9501004000", 0x20, 0x4e0}, {&(0x7f0000010200)="01000000000005", 0x7, 0x560}, {&(0x7f0000010300)="020000000300000004000000", 0xc, 0x800}, {&(0x7f0000010400), 0x0, 0x1000}, {&(0x7f0000011500)="ed41000000080000dbf4655fdbf4655f", 0x10, 0x2080}, {0x0}, {0x0}, {0x0, 0x0, 0x10000}, {0x0}, {0x0}, {0x0, 0x0, 0x20000}, {0x0}], 0x0, &(0x7f0000012f00)) 22:38:05 executing program 2: perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000480)}}, 0x0, 0xffffffefffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x100000, 0xe, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000500100000f000000000000000100000005000000000004000040000020000000dbf4655fdbf4655f0100ffff53ef010001000000dbf4655f000000000000000001000000000000000b0000008000000018000000c20500002b0200"/116, 0x74, 0x400}, {&(0x7f0000010100)="000000000000000000000000244b8e9b57f04b59aa229cc218853f9501004000", 0x20, 0x4e0}, {&(0x7f0000010200)="0100000000", 0x5, 0x560}, {&(0x7f0000010300)="020000000300000004000000", 0xc, 0x800}, {&(0x7f0000010400), 0x0, 0x1000}, {&(0x7f0000011500)="ed41000000080000dbf4655fdbf4655fdbf4655f00000000000004004000", 0x1e, 0x2080}, {0x0}, {0x0}, {&(0x7f0000011c00)="0b0000000c0001022e00000002000000f40702022e", 0x15, 0x10000}, {0x0}, {0x0}, {&(0x7f0000012400)="504d4d00504d4dffdbf4655f00000000647679756b6f762d676c6170746f70320000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000006c6f6f7033340075782f746573742f73797a5f6d6f756e745f696d6167655f650500"/123, 0x7b, 0x20000}, {0x0}, {0x0, 0x0, 0x38000}], 0x0, &(0x7f0000012f00)) 22:38:05 executing program 4: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000480)}}, 0x0, 0xffffffefffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x100000, 0xd, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000500100000f000000000000000100000005000000000004000040000020000000dbf4655fdbf4655f0100ffff53ef010001000000dbf4655f000000000000000001000000000000000b0000008000000018000000c20500002b0200"/116, 0x74, 0x400}, {&(0x7f0000010100)="000000000000000000000000244b8e9b57f04b59aa229cc218853f9501004000", 0x20, 0x4e0}, {&(0x7f0000010300)="020000000300000004000000", 0xc, 0x800}, {&(0x7f0000010400), 0x0, 0x1000}, {&(0x7f0000011500)="ed41000000080000dbf4655fdbf4655fdbf4655f00000000000004004000", 0x1e, 0x2080}, {0x0}, {0x0}, {&(0x7f0000011c00)="0b0000000c0001022e00000002000000f40702022e", 0x15, 0x10000}, {0x0}, {0x0}, {&(0x7f0000012400)="504d4d00504d4dffdbf4655f00000000647679756b6f762d676c6170746f70320000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000006c6f6f7033340075782f746573742f73797a5f6d6f756e745f696d6167655f650500"/123, 0x7b, 0x20000}, {0x0}, {0x0, 0x0, 0x38000}], 0x0, &(0x7f0000012f00)) [ 1761.063878] loop0: detected capacity change from 0 to 512 [ 1761.073284] loop2: detected capacity change from 0 to 2048 [ 1761.080437] EXT4-fs (loop0): VFS: Can't find ext4 filesystem [ 1761.086349] loop4: detected capacity change from 0 to 2048 22:38:05 executing program 7: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000480)}}, 0x0, 0xffffffefffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x100000, 0xd, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000500100000f000000000000000100000005000000000004000040000020000000dbf4655fdbf4655f0100ffff53ef010001000000dbf4655f000000000000000001000000000000000b0000008000000018000000c20500002b0200"/116, 0x74, 0x400}, {&(0x7f0000010100)="000000000000000000000000244b8e9b57f04b59aa229cc218853f9501004000", 0x20, 0x4e0}, {&(0x7f0000010300)="020000000300000004000000", 0xc, 0x800}, {&(0x7f0000010400), 0x0, 0x1000}, {&(0x7f0000011500)="ed41000000080000dbf4655fdbf4655fdbf4655f00000000000004004000", 0x1e, 0x2080}, {0x0}, {0x0}, {&(0x7f0000011c00)="0b0000000c0001022e00000002000000f40702022e", 0x15, 0x10000}, {0x0}, {0x0}, {&(0x7f0000012400)="504d4d00504d4dffdbf4655f00000000647679756b6f762d676c6170746f70320000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000006c6f6f7033340075782f746573742f73797a5f6d6f756e745f696d6167655f650500"/123, 0x7b, 0x20000}, {0x0}, {0x0, 0x0, 0x38000}], 0x0, &(0x7f0000012f00)) [ 1761.106290] EXT4-fs warning (device loop4): read_mmp_block:106: Error -117 while reading MMP block 0 22:38:05 executing program 0: perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000480)}}, 0x0, 0xffffffefffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0xd, &(0x7f0000000200)=[{&(0x7f0000010000), 0x0, 0x400}, {&(0x7f0000010100)="000000000000000000000000244b8e9b57f04b59aa229cc218853f9501004000", 0x20, 0x4e0}, {&(0x7f0000010200)="01000000000005", 0x7, 0x560}, {&(0x7f0000010300)="020000000300000004000000", 0xc, 0x800}, {&(0x7f0000010400), 0x0, 0x1000}, {&(0x7f0000011500)="ed41000000080000dbf4655fdbf4655f", 0x10, 0x2080}, {0x0}, {0x0}, {0x0, 0x0, 0x10000}, {0x0}, {0x0}, {0x0, 0x0, 0x20000}, {0x0}], 0x0, &(0x7f0000012f00)) [ 1761.177065] EXT4-fs warning (device loop2): read_mmp_block:106: Error -117 while reading MMP block 0 22:38:05 executing program 4: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000480)}}, 0x0, 0xffffffefffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x100000, 0xd, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000500100000f000000000000000100000005000000000004000040000020000000dbf4655fdbf4655f0100ffff53ef010001000000dbf4655f000000000000000001000000000000000b0000008000000018000000c20500002b0200"/116, 0x74, 0x400}, {&(0x7f0000010100)="000000000000000000000000244b8e9b57f04b59aa229cc218853f9501004000", 0x20, 0x4e0}, {&(0x7f0000010300)="020000000300000004000000", 0xc, 0x800}, {&(0x7f0000010400), 0x0, 0x1000}, {&(0x7f0000011500)="ed41000000080000dbf4655fdbf4655fdbf4655f00000000000004004000", 0x1e, 0x2080}, {0x0}, {0x0}, {&(0x7f0000011c00)="0b0000000c0001022e00000002000000f40702022e", 0x15, 0x10000}, {0x0}, {0x0}, {&(0x7f0000012400)="504d4d00504d4dffdbf4655f00000000647679756b6f762d676c6170746f70320000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000006c6f6f7033340075782f746573742f73797a5f6d6f756e745f696d6167655f650500"/123, 0x7b, 0x20000}, {0x0}, {0x0, 0x0, 0x38000}], 0x0, &(0x7f0000012f00)) [ 1761.278178] loop0: detected capacity change from 0 to 512 22:38:05 executing program 5: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) lsetxattr$security_evm(&(0x7f0000000240)='.\x00', &(0x7f0000000300), &(0x7f00000003c0)=@sha1={0x1, "bd2b5bce8b74aea700654a682479ac2c0852bc4d"}, 0x15, 0x3) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={&(0x7f0000000040), 0xb}, 0x0, 0x20, 0x0, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) r0 = fork() r1 = syz_open_procfs(r0, &(0x7f0000000000)='status\x00') r2 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x2, 0x0) pwrite64(r2, &(0x7f00000000c0)='9', 0x1, 0x8040000) perf_event_open(&(0x7f0000000100)={0x0, 0x80, 0x20, 0x3, 0x4, 0x1, 0x0, 0x8, 0x20620, 0x2, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x3f, 0x2, @perf_config_ext={0x240000000, 0x5}, 0x1400, 0x4, 0x8, 0x7, 0x9, 0x6, 0x6, 0x0, 0x1, 0x0, 0x8}, r0, 0xa, r2, 0x1) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r3, 0x6, 0x1e, &(0x7f0000000040)=0x1, 0x4) connect$inet6(r3, &(0x7f0000000080)={0xa, 0x0, 0x0, @loopback}, 0x1c) openat$cgroup_ro(r1, &(0x7f0000000180)='blkio.throttle.io_serviced_recursive\x00', 0x0, 0x0) [ 1761.303803] EXT4-fs (loop0): VFS: Can't find ext4 filesystem [ 1761.315319] loop7: detected capacity change from 0 to 2048 [ 1761.320941] loop4: detected capacity change from 0 to 2048 [ 1761.353222] EXT4-fs warning (device loop7): read_mmp_block:106: Error -117 while reading MMP block 0 22:38:05 executing program 2: perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000480)}}, 0x0, 0xffffffefffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x100000, 0xe, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000500100000f000000000000000100000005000000000004000040000020000000dbf4655fdbf4655f0100ffff53ef010001000000dbf4655f000000000000000001000000000000000b0000008000000018000000c20500002b0200"/116, 0x74, 0x400}, {&(0x7f0000010100)="000000000000000000000000244b8e9b57f04b59aa229cc218853f9501004000", 0x20, 0x4e0}, {&(0x7f0000010200)="01000000000005", 0x7, 0x560}, {&(0x7f0000010300)="020000000300000004000000", 0xc, 0x800}, {&(0x7f0000010400), 0x0, 0x1000}, {&(0x7f0000011500)="ed41000000080000dbf4655fdbf4655fdbf4655f00000000000004004000", 0x1e, 0x2080}, {0x0}, {0x0}, {&(0x7f0000011c00)="0b0000000c0001022e00000002000000f40702022e", 0x15, 0x10000}, {0x0}, {0x0}, {&(0x7f0000012400)="504d4d00504d4dffdbf4655f00000000647679756b6f762d676c6170746f70320000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000006c6f6f7033340075782f746573742f73797a5f6d6f756e745f696d6167655f650500"/123, 0x7b, 0x20000}, {0x0}, {0x0, 0x0, 0x38000}], 0x0, &(0x7f0000012f00)) [ 1761.376217] EXT4-fs warning (device loop4): read_mmp_block:106: Error -117 while reading MMP block 0 22:38:05 executing program 1: r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, @perf_config_ext, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000000), 0x0) r2 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) ioctl$EXT4_IOC_CHECKPOINT(r2, 0x4004662b, &(0x7f0000000100)=0x5) ioctl$AUTOFS_DEV_IOCTL_TIMEOUT(0xffffffffffffffff, 0xc018937a, &(0x7f0000001480)=ANY=[@ANYBLOB="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", @ANYRES32=r0, @ANYBLOB="01040000000000002e2f66696c653000"]) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r3, 0xc08c5332, &(0x7f00000013c0)={0xffffffff, 0x6964, 0x0, 'queue1\x00', 0xff}) r4 = gettid() process_vm_writev(r4, &(0x7f0000002580)=[{&(0x7f0000000140)=""/89, 0x59}, {&(0x7f00000001c0)=""/175, 0xaf}, {&(0x7f0000000280)=""/4096, 0x1000}], 0x3, &(0x7f0000003840)=[{&(0x7f0000002640)=""/105, 0x69}, {0xfffffffffffffffe, 0x10}], 0x2, 0x0) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r1, 0xc08c5332, &(0x7f0000001280)={0x3, 0x5, 0x0, 'queue1\x00', 0x8}) r5 = fork() write$sndseq(r1, &(0x7f0000001340)=[{0x22, 0x8, 0x2, 0x3, @time={0x4}, {0x0, 0x1}, {0x6, 0x81}, @raw32={[0x800, 0x3, 0x9]}}, {0xe1, 0x7, 0xf8, 0xff, @tick=0x2, {0x3f}, {0x4, 0xf1}, @queue={0xff, {0x6, 0x9}}}, {0x4, 0x1, 0x9, 0x5, @time={0x7, 0x6}, {0x7c, 0x2}, {0x20, 0x6}, @connect={{0x0, 0xfd}, {0x98, 0x4}}}, {0x80, 0x4, 0x7, 0x7d, @time={0xfffff000, 0x9}, {0x81, 0x1f}, {0xaa}, @queue={0x5, {0xffffffe0, 0x3}}}], 0x70) r6 = syz_open_dev$vcsn(&(0x7f0000000040), 0x3, 0x2001) ioctl$LOOP_CTL_GET_FREE(r6, 0x4c82) ptrace$setopts(0x4206, r5, 0x0, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fork() fork() clone3(&(0x7f0000004c00)={0xc0002100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) 22:38:06 executing program 0: perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000480)}}, 0x0, 0xffffffefffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0xd, &(0x7f0000000200)=[{&(0x7f0000010000), 0x0, 0x400}, {&(0x7f0000010100)="000000000000000000000000244b8e9b57f04b59aa229cc218853f9501004000", 0x20, 0x4e0}, {&(0x7f0000010200)="01000000000005", 0x7, 0x560}, {&(0x7f0000010300)="020000000300000004000000", 0xc, 0x800}, {&(0x7f0000010400), 0x0, 0x1000}, {&(0x7f0000011500)="ed41000000080000dbf4655fdbf4655f", 0x10, 0x2080}, {0x0}, {0x0}, {0x0, 0x0, 0x10000}, {0x0}, {0x0}, {0x0, 0x0, 0x20000}, {0x0}], 0x0, &(0x7f0000012f00)) 22:38:06 executing program 3: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) lsetxattr$security_evm(&(0x7f0000000240)='.\x00', &(0x7f0000000300), &(0x7f00000003c0)=@sha1={0x1, "bd2b5bce8b74aea700654a682479ac2c0852bc4d"}, 0x15, 0x3) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={&(0x7f0000000040), 0xb}, 0x0, 0x20, 0x0, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) r0 = fork() r1 = syz_open_procfs(r0, &(0x7f0000000000)='status\x00') r2 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x2, 0x0) pwrite64(r2, &(0x7f00000000c0)='9', 0x1, 0x8040000) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x20, 0x3, 0x4, 0x1, 0x0, 0x0, 0x20620, 0x2, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x3f, 0x2, @perf_config_ext={0x240000000, 0x5}, 0x1400, 0x4, 0x8, 0x7, 0x9, 0x6, 0x6, 0x0, 0x1, 0x0, 0x8}, r0, 0xa, r2, 0x1) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r3, 0x6, 0x1e, &(0x7f0000000040)=0x1, 0x4) setsockopt$inet6_tcp_TCP_REPAIR(r3, 0x6, 0x13, &(0x7f00000018c0)=0x1, 0x4) connect$inet6(r3, &(0x7f0000000080)={0xa, 0x0, 0x0, @loopback}, 0x1c) openat$cgroup_ro(r1, &(0x7f0000000180)='blkio.throttle.io_serviced_recursive\x00', 0x0, 0x0) 22:38:06 executing program 7: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000480)}}, 0x0, 0xffffffefffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x100000, 0xd, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000500100000f000000000000000100000005000000000004000040000020000000dbf4655fdbf4655f0100ffff53ef010001000000dbf4655f000000000000000001000000000000000b0000008000000018000000c20500002b0200"/116, 0x74, 0x400}, {&(0x7f0000010100)="000000000000000000000000244b8e9b57f04b59aa229cc218853f9501004000", 0x20, 0x4e0}, {&(0x7f0000010300)="020000000300000004000000", 0xc, 0x800}, {&(0x7f0000010400), 0x0, 0x1000}, {&(0x7f0000011500)="ed41000000080000dbf4655fdbf4655fdbf4655f00000000000004004000", 0x1e, 0x2080}, {0x0}, {0x0}, {&(0x7f0000011c00)="0b0000000c0001022e00000002000000f40702022e", 0x15, 0x10000}, {0x0}, {0x0}, {&(0x7f0000012400)="504d4d00504d4dffdbf4655f00000000647679756b6f762d676c6170746f70320000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000006c6f6f7033340075782f746573742f73797a5f6d6f756e745f696d6167655f650500"/123, 0x7b, 0x20000}, {0x0}, {0x0, 0x0, 0x38000}], 0x0, &(0x7f0000012f00)) [ 1761.522761] loop2: detected capacity change from 0 to 2048 22:38:06 executing program 4: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000480)}}, 0x0, 0xffffffefffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x100000, 0xd, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000500100000f000000000000000100000005000000000004000040000020000000dbf4655fdbf4655f0100ffff53ef010001000000dbf4655f000000000000000001000000000000000b0000008000000018000000c20500002b0200"/116, 0x74, 0x400}, {&(0x7f0000010100)="000000000000000000000000244b8e9b57f04b59aa229cc218853f9501004000", 0x20, 0x4e0}, {&(0x7f0000010300)="020000000300000004000000", 0xc, 0x800}, {&(0x7f0000010400), 0x0, 0x1000}, {&(0x7f0000011500)="ed41000000080000dbf4655fdbf4655fdbf4655f00000000000004004000", 0x1e, 0x2080}, {0x0}, {0x0}, {&(0x7f0000011c00)="0b0000000c0001022e00000002000000f40702022e", 0x15, 0x10000}, {0x0}, {0x0}, {&(0x7f0000012400)="504d4d00504d4dffdbf4655f00000000647679756b6f762d676c6170746f70320000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000006c6f6f7033340075782f746573742f73797a5f6d6f756e745f696d6167655f650500"/123, 0x7b, 0x20000}, {0x0}, {0x0, 0x0, 0x38000}], 0x0, &(0x7f0000012f00)) [ 1761.566090] EXT4-fs warning (device loop2): read_mmp_block:106: Error -117 while reading MMP block 0 22:38:06 executing program 6: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) lsetxattr$security_evm(&(0x7f0000000240)='.\x00', &(0x7f0000000300), &(0x7f00000003c0)=@sha1={0x1, "bd2b5bce8b74aea700654a682479ac2c0852bc4d"}, 0x15, 0x3) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={&(0x7f0000000040), 0xb}, 0x0, 0x20, 0x0, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) r0 = fork() r1 = syz_open_procfs(r0, &(0x7f0000000000)='status\x00') r2 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x2, 0x0) pwrite64(r2, &(0x7f00000000c0)='9', 0x1, 0x8040000) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x20, 0x0, 0x4, 0x1, 0x0, 0x8, 0x20620, 0x2, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x3f, 0x2, @perf_config_ext={0x240000000, 0x5}, 0x1400, 0x4, 0x8, 0x7, 0x9, 0x6, 0x6, 0x0, 0x1, 0x0, 0x8}, r0, 0xa, r2, 0x1) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r3, 0x6, 0x1e, &(0x7f0000000040)=0x1, 0x4) setsockopt$inet6_tcp_TCP_REPAIR(r3, 0x6, 0x13, &(0x7f00000018c0)=0x1, 0x4) connect$inet6(r3, &(0x7f0000000080)={0xa, 0x0, 0x0, @loopback}, 0x1c) openat$cgroup_ro(r1, &(0x7f0000000180)='blkio.throttle.io_serviced_recursive\x00', 0x0, 0x0) [ 1761.663986] loop0: detected capacity change from 0 to 512 [ 1761.669328] loop7: detected capacity change from 0 to 2048 [ 1761.705985] EXT4-fs (loop0): VFS: Can't find ext4 filesystem [ 1761.708818] loop4: detected capacity change from 0 to 2048 [ 1761.719865] EXT4-fs warning (device loop7): read_mmp_block:106: Error -117 while reading MMP block 0 [ 1761.755020] EXT4-fs warning (device loop4): read_mmp_block:106: Error -117 while reading MMP block 0 22:38:23 executing program 6: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) lsetxattr$security_evm(&(0x7f0000000240)='.\x00', &(0x7f0000000300), &(0x7f00000003c0)=@sha1={0x1, "bd2b5bce8b74aea700654a682479ac2c0852bc4d"}, 0x15, 0x3) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={&(0x7f0000000040), 0xb}, 0x0, 0x20, 0x0, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) r0 = fork() r1 = syz_open_procfs(r0, &(0x7f0000000000)='status\x00') r2 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x2, 0x0) pwrite64(r2, &(0x7f00000000c0)='9', 0x1, 0x8040000) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x20, 0x0, 0x4, 0x1, 0x0, 0x8, 0x20620, 0x2, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x3f, 0x2, @perf_config_ext={0x240000000, 0x5}, 0x1400, 0x4, 0x8, 0x7, 0x9, 0x6, 0x6, 0x0, 0x1, 0x0, 0x8}, r0, 0xa, r2, 0x1) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r3, 0x6, 0x1e, &(0x7f0000000040)=0x1, 0x4) setsockopt$inet6_tcp_TCP_REPAIR(r3, 0x6, 0x13, &(0x7f00000018c0)=0x1, 0x4) connect$inet6(r3, &(0x7f0000000080)={0xa, 0x0, 0x0, @loopback}, 0x1c) openat$cgroup_ro(r1, &(0x7f0000000180)='blkio.throttle.io_serviced_recursive\x00', 0x0, 0x0) 22:38:23 executing program 2: perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000480)}}, 0x0, 0xffffffefffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x100000, 0xe, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000500100000f000000000000000100000005000000000004000040000020000000dbf4655fdbf4655f0100ffff53ef010001000000dbf4655f000000000000000001000000000000000b0000008000000018000000c20500002b0200"/116, 0x74, 0x400}, {&(0x7f0000010100)="000000000000000000000000244b8e9b57f04b59aa229cc218853f9501004000", 0x20, 0x4e0}, {&(0x7f0000010200)="01000000000005", 0x7, 0x560}, {&(0x7f0000010300)="020000000300000004000000", 0xc, 0x800}, {&(0x7f0000010400), 0x0, 0x1000}, {&(0x7f0000011500)="ed41000000080000dbf4655fdbf4655fdbf4655f00000000000004004000", 0x1e, 0x2080}, {0x0}, {0x0}, {&(0x7f0000011c00)="0b0000000c0001022e00000002000000f40702022e", 0x15, 0x10000}, {0x0}, {0x0}, {&(0x7f0000012400)="504d4d00504d4dffdbf4655f00000000647679756b6f762d676c6170746f70320000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000006c6f6f7033340075782f746573742f73797a5f6d6f756e745f696d6167655f650500"/123, 0x7b, 0x20000}, {0x0}, {0x0, 0x0, 0x38000}], 0x0, &(0x7f0000012f00)) 22:38:23 executing program 3: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) lsetxattr$security_evm(&(0x7f0000000240)='.\x00', &(0x7f0000000300), &(0x7f00000003c0)=@sha1={0x1, "bd2b5bce8b74aea700654a682479ac2c0852bc4d"}, 0x15, 0x3) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={&(0x7f0000000040), 0xb}, 0x0, 0x20, 0x0, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) r0 = fork() r1 = syz_open_procfs(r0, &(0x7f0000000000)='status\x00') r2 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x2, 0x0) pwrite64(r2, &(0x7f00000000c0)='9', 0x1, 0x8040000) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x20, 0x3, 0x4, 0x1, 0x0, 0x0, 0x20620, 0x2, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x3f, 0x2, @perf_config_ext={0x240000000, 0x5}, 0x1400, 0x4, 0x8, 0x7, 0x9, 0x6, 0x6, 0x0, 0x1, 0x0, 0x8}, r0, 0xa, r2, 0x1) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r3, 0x6, 0x1e, &(0x7f0000000040)=0x1, 0x4) setsockopt$inet6_tcp_TCP_REPAIR(r3, 0x6, 0x13, &(0x7f00000018c0)=0x1, 0x4) connect$inet6(r3, &(0x7f0000000080)={0xa, 0x0, 0x0, @loopback}, 0x1c) openat$cgroup_ro(r1, &(0x7f0000000180)='blkio.throttle.io_serviced_recursive\x00', 0x0, 0x0) 22:38:23 executing program 4: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000480)}}, 0x0, 0xffffffefffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x100000, 0xe, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000500100000f000000000000000100000005000000000004000040000020000000dbf4655fdbf4655f0100ffff53ef010001000000dbf4655f000000000000000001000000000000000b0000008000000018000000c20500002b0200"/116, 0x74, 0x400}, {&(0x7f0000010100)="000000000000000000000000244b8e9b57f04b59aa229cc218853f9501004000", 0x20, 0x4e0}, {0x0, 0x0, 0x560}, {&(0x7f0000010300)="020000000300000004000000", 0xc, 0x800}, {&(0x7f0000010400), 0x0, 0x1000}, {&(0x7f0000011500)="ed41000000080000dbf4655fdbf4655fdbf4655f00000000000004004000", 0x1e, 0x2080}, {0x0}, {0x0}, {&(0x7f0000011c00)="0b0000000c0001022e00000002000000f40702022e", 0x15, 0x10000}, {0x0}, {0x0}, {&(0x7f0000012400)="504d4d00504d4dffdbf4655f00000000647679756b6f762d676c6170746f70320000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000006c6f6f7033340075782f746573742f73797a5f6d6f756e745f696d6167655f650500"/123, 0x7b, 0x20000}, {0x0}, {0x0, 0x0, 0x38000}], 0x0, &(0x7f0000012f00)) 22:38:23 executing program 0: perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000480)}}, 0x0, 0xffffffefffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0xd, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000500100000f000000000000000100000005000000000004000040000020000000dbf4655fdbf4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000010100)="000000000000000000000000244b8e9b57f04b59aa229cc218853f9501004000", 0x20, 0x4e0}, {&(0x7f0000010200)="01000000000005", 0x7, 0x560}, {&(0x7f0000010300)="020000000300000004000000", 0xc, 0x800}, {&(0x7f0000010400), 0x0, 0x1000}, {&(0x7f0000011500)="ed41000000080000dbf4655fdbf4655f", 0x10, 0x2080}, {0x0}, {0x0}, {0x0, 0x0, 0x10000}, {0x0}, {0x0}, {0x0, 0x0, 0x20000}, {0x0}], 0x0, &(0x7f0000012f00)) 22:38:23 executing program 7: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000480)}}, 0x0, 0xffffffefffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x100000, 0xe, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000500100000f000000000000000100000005000000000004000040000020000000dbf4655fdbf4655f0100ffff53ef010001000000dbf4655f000000000000000001000000000000000b0000008000000018000000c20500002b0200"/116, 0x74, 0x400}, {&(0x7f0000010100)="000000000000000000000000244b8e9b57f04b59aa229cc218853f9501004000", 0x20, 0x4e0}, {0x0, 0x0, 0x560}, {&(0x7f0000010300)="020000000300000004000000", 0xc, 0x800}, {&(0x7f0000010400), 0x0, 0x1000}, {&(0x7f0000011500)="ed41000000080000dbf4655fdbf4655fdbf4655f00000000000004004000", 0x1e, 0x2080}, {0x0}, {0x0}, {&(0x7f0000011c00)="0b0000000c0001022e00000002000000f40702022e", 0x15, 0x10000}, {0x0}, {0x0}, {&(0x7f0000012400)="504d4d00504d4dffdbf4655f00000000647679756b6f762d676c6170746f70320000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000006c6f6f7033340075782f746573742f73797a5f6d6f756e745f696d6167655f650500"/123, 0x7b, 0x20000}, {0x0}, {0x0, 0x0, 0x38000}], 0x0, &(0x7f0000012f00)) 22:38:23 executing program 1: r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, @perf_config_ext, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000000), 0x0) r2 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) ioctl$EXT4_IOC_CHECKPOINT(r2, 0x4004662b, &(0x7f0000000100)=0x5) ioctl$AUTOFS_DEV_IOCTL_TIMEOUT(0xffffffffffffffff, 0xc018937a, &(0x7f0000001480)=ANY=[@ANYBLOB="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", @ANYRES32=r0, @ANYBLOB="01040000000000002e2f66696c653000"]) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r3, 0xc08c5332, &(0x7f00000013c0)={0xffffffff, 0x6964, 0x0, 'queue1\x00', 0xff}) r4 = gettid() process_vm_writev(r4, &(0x7f0000002580)=[{&(0x7f0000000140)=""/89, 0x59}, {&(0x7f00000001c0)=""/175, 0xaf}, {&(0x7f0000000280)=""/4096, 0x1000}], 0x3, &(0x7f0000003840)=[{&(0x7f0000002640)=""/105, 0x69}, {0xfffffffffffffffe, 0x10}], 0x2, 0x0) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r1, 0xc08c5332, &(0x7f0000001280)={0x3, 0x5, 0x0, 'queue1\x00', 0x8}) r5 = fork() write$sndseq(r1, &(0x7f0000001340)=[{0x22, 0x8, 0x2, 0x3, @time={0x4}, {0x0, 0x1}, {0x6, 0x81}, @raw32={[0x800, 0x3, 0x9]}}, {0xe1, 0x7, 0xf8, 0xff, @tick=0x2, {0x3f}, {0x4, 0xf1}, @queue={0xff, {0x6, 0x9}}}, {0x4, 0x1, 0x9, 0x5, @time={0x7, 0x6}, {0x7c, 0x2}, {0x20, 0x6}, @connect={{0x0, 0xfd}, {0x98, 0x4}}}, {0x80, 0x4, 0x7, 0x7d, @time={0xfffff000, 0x9}, {0x81, 0x1f}, {0xaa}, @queue={0x5, {0xffffffe0, 0x3}}}], 0x70) r6 = syz_open_dev$vcsn(&(0x7f0000000040), 0x3, 0x2001) ioctl$LOOP_CTL_GET_FREE(r6, 0x4c82) ptrace$setopts(0x4206, r5, 0x0, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fork() fork() clone3(&(0x7f0000004c00)={0xc0002100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) 22:38:23 executing program 5: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) lsetxattr$security_evm(&(0x7f0000000240)='.\x00', &(0x7f0000000300), &(0x7f00000003c0)=@sha1={0x1, "bd2b5bce8b74aea700654a682479ac2c0852bc4d"}, 0x15, 0x3) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={&(0x7f0000000040), 0xb}, 0x0, 0x20, 0x0, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) r0 = fork() r1 = syz_open_procfs(r0, &(0x7f0000000000)='status\x00') r2 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x2, 0x0) pwrite64(r2, &(0x7f00000000c0)='9', 0x1, 0x8040000) perf_event_open(&(0x7f0000000100)={0x0, 0x80, 0x20, 0x3, 0x4, 0x1, 0x0, 0x8, 0x20620, 0x2, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x3f, 0x2, @perf_config_ext={0x240000000, 0x5}, 0x1400, 0x4, 0x8, 0x7, 0x9, 0x6, 0x6, 0x0, 0x1, 0x0, 0x8}, r0, 0xa, r2, 0x1) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r3, 0x6, 0x1e, &(0x7f0000000040)=0x1, 0x4) connect$inet6(r3, &(0x7f0000000080)={0xa, 0x0, 0x0, @loopback}, 0x1c) openat$cgroup_ro(r1, &(0x7f0000000180)='blkio.throttle.io_serviced_recursive\x00', 0x0, 0x0) [ 1778.667954] loop7: detected capacity change from 0 to 2048 [ 1778.677672] loop4: detected capacity change from 0 to 2048 [ 1778.685703] EXT4-fs warning (device loop4): read_mmp_block:106: Error -117 while reading MMP block 0 [ 1778.687091] EXT4-fs warning (device loop7): read_mmp_block:106: Error -117 while reading MMP block 0 [ 1778.736725] loop2: detected capacity change from 0 to 2048 [ 1778.742000] loop0: detected capacity change from 0 to 512 [ 1778.787103] EXT4-fs (loop0): fragment/cluster size (32768) != block size (2048) [ 1778.805707] EXT4-fs warning (device loop2): read_mmp_block:106: Error -117 while reading MMP block 0 22:38:23 executing program 4: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000480)}}, 0x0, 0xffffffefffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x100000, 0xe, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000500100000f000000000000000100000005000000000004000040000020000000dbf4655fdbf4655f0100ffff53ef010001000000dbf4655f000000000000000001000000000000000b0000008000000018000000c20500002b0200"/116, 0x74, 0x400}, {&(0x7f0000010100)="000000000000000000000000244b8e9b57f04b59aa229cc218853f9501004000", 0x20, 0x4e0}, {0x0, 0x0, 0x560}, {&(0x7f0000010300)="020000000300000004000000", 0xc, 0x800}, {&(0x7f0000010400), 0x0, 0x1000}, {&(0x7f0000011500)="ed41000000080000dbf4655fdbf4655fdbf4655f00000000000004004000", 0x1e, 0x2080}, {0x0}, {0x0}, {&(0x7f0000011c00)="0b0000000c0001022e00000002000000f40702022e", 0x15, 0x10000}, {0x0}, {0x0}, {&(0x7f0000012400)="504d4d00504d4dffdbf4655f00000000647679756b6f762d676c6170746f70320000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000006c6f6f7033340075782f746573742f73797a5f6d6f756e745f696d6167655f650500"/123, 0x7b, 0x20000}, {0x0}, {0x0, 0x0, 0x38000}], 0x0, &(0x7f0000012f00)) 22:38:23 executing program 7: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000480)}}, 0x0, 0xffffffefffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x100000, 0xe, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000500100000f000000000000000100000005000000000004000040000020000000dbf4655fdbf4655f0100ffff53ef010001000000dbf4655f000000000000000001000000000000000b0000008000000018000000c20500002b0200"/116, 0x74, 0x400}, {&(0x7f0000010100)="000000000000000000000000244b8e9b57f04b59aa229cc218853f9501004000", 0x20, 0x4e0}, {0x0, 0x0, 0x560}, {&(0x7f0000010300)="020000000300000004000000", 0xc, 0x800}, {&(0x7f0000010400), 0x0, 0x1000}, {&(0x7f0000011500)="ed41000000080000dbf4655fdbf4655fdbf4655f00000000000004004000", 0x1e, 0x2080}, {0x0}, {0x0}, {&(0x7f0000011c00)="0b0000000c0001022e00000002000000f40702022e", 0x15, 0x10000}, {0x0}, {0x0}, {&(0x7f0000012400)="504d4d00504d4dffdbf4655f00000000647679756b6f762d676c6170746f70320000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000006c6f6f7033340075782f746573742f73797a5f6d6f756e745f696d6167655f650500"/123, 0x7b, 0x20000}, {0x0}, {0x0, 0x0, 0x38000}], 0x0, &(0x7f0000012f00)) 22:38:23 executing program 2: perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000480)}}, 0x0, 0xffffffefffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x100000, 0xe, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000500100000f000000000000000100000005000000000004000040000020000000dbf4655fdbf4655f0100ffff53ef010001000000dbf4655f000000000000000001000000000000000b0000008000000018000000c20500002b0200"/116, 0x74, 0x400}, {&(0x7f0000010100)="000000000000000000000000244b8e9b57f04b59aa229cc218853f9501004000", 0x20, 0x4e0}, {&(0x7f0000010200)="01000000000005", 0x7, 0x560}, {&(0x7f0000010300)="020000000300000004000000", 0xc, 0x800}, {&(0x7f0000010400), 0x0, 0x1000}, {&(0x7f0000011500)="ed41000000080000dbf4655fdbf4655fdbf4655f00000000000004004000", 0x1e, 0x2080}, {0x0}, {0x0}, {&(0x7f0000011c00)="0b0000000c0001022e00000002000000f40702022e", 0x15, 0x10000}, {0x0}, {0x0}, {&(0x7f0000012400)="504d4d00504d4dffdbf4655f00000000647679756b6f762d676c6170746f70320000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000006c6f6f7033340075782f746573742f73797a5f6d6f756e745f696d6167655f650500"/123, 0x7b, 0x20000}, {0x0}, {0x0, 0x0, 0x38000}], 0x0, &(0x7f0000012f00)) 22:38:23 executing program 6: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) lsetxattr$security_evm(&(0x7f0000000240)='.\x00', &(0x7f0000000300), &(0x7f00000003c0)=@sha1={0x1, "bd2b5bce8b74aea700654a682479ac2c0852bc4d"}, 0x15, 0x3) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={&(0x7f0000000040), 0xb}, 0x0, 0x20, 0x0, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) r0 = fork() r1 = syz_open_procfs(r0, &(0x7f0000000000)='status\x00') r2 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x2, 0x0) pwrite64(r2, &(0x7f00000000c0)='9', 0x1, 0x8040000) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x20, 0x0, 0x4, 0x1, 0x0, 0x8, 0x20620, 0x2, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x3f, 0x2, @perf_config_ext={0x240000000, 0x5}, 0x1400, 0x4, 0x8, 0x7, 0x9, 0x6, 0x6, 0x0, 0x1, 0x0, 0x8}, r0, 0xa, r2, 0x1) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r3, 0x6, 0x1e, &(0x7f0000000040)=0x1, 0x4) setsockopt$inet6_tcp_TCP_REPAIR(r3, 0x6, 0x13, &(0x7f00000018c0)=0x1, 0x4) connect$inet6(r3, &(0x7f0000000080)={0xa, 0x0, 0x0, @loopback}, 0x1c) openat$cgroup_ro(r1, &(0x7f0000000180)='blkio.throttle.io_serviced_recursive\x00', 0x0, 0x0) 22:38:23 executing program 0: perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000480)}}, 0x0, 0xffffffefffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0xd, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000500100000f000000000000000100000005000000000004000040000020000000dbf4655fdbf4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000010100)="000000000000000000000000244b8e9b57f04b59aa229cc218853f9501004000", 0x20, 0x4e0}, {&(0x7f0000010200)="01000000000005", 0x7, 0x560}, {&(0x7f0000010300)="020000000300000004000000", 0xc, 0x800}, {&(0x7f0000010400), 0x0, 0x1000}, {&(0x7f0000011500)="ed41000000080000dbf4655fdbf4655f", 0x10, 0x2080}, {0x0}, {0x0}, {0x0, 0x0, 0x10000}, {0x0}, {0x0}, {0x0, 0x0, 0x20000}, {0x0}], 0x0, &(0x7f0000012f00)) [ 1778.947216] loop7: detected capacity change from 0 to 2048 [ 1778.965925] loop4: detected capacity change from 0 to 2048 [ 1778.967965] EXT4-fs warning (device loop7): read_mmp_block:106: Error -117 while reading MMP block 0 [ 1778.978910] loop2: detected capacity change from 0 to 2048 [ 1778.989765] EXT4-fs warning (device loop4): read_mmp_block:106: Error -117 while reading MMP block 0 22:38:23 executing program 1: r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, @perf_config_ext, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000000), 0x0) r2 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) ioctl$EXT4_IOC_CHECKPOINT(r2, 0x4004662b, &(0x7f0000000100)=0x5) ioctl$AUTOFS_DEV_IOCTL_TIMEOUT(0xffffffffffffffff, 0xc018937a, &(0x7f0000001480)=ANY=[@ANYBLOB="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", @ANYRES32=r0, @ANYBLOB="01040000000000002e2f66696c653000"]) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r3, 0xc08c5332, &(0x7f00000013c0)={0xffffffff, 0x6964, 0x0, 'queue1\x00', 0xff}) r4 = gettid() process_vm_writev(r4, &(0x7f0000002580)=[{&(0x7f0000000140)=""/89, 0x59}, {&(0x7f00000001c0)=""/175, 0xaf}, {&(0x7f0000000280)=""/4096, 0x1000}], 0x3, &(0x7f0000003840)=[{&(0x7f0000002640)=""/105, 0x69}, {0xfffffffffffffffe, 0x10}], 0x2, 0x0) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r1, 0xc08c5332, &(0x7f0000001280)={0x3, 0x5, 0x0, 'queue1\x00', 0x8}) r5 = fork() write$sndseq(r1, &(0x7f0000001340)=[{0x22, 0x8, 0x2, 0x3, @time={0x4}, {0x0, 0x1}, {0x6, 0x81}, @raw32={[0x800, 0x3, 0x9]}}, {0xe1, 0x7, 0xf8, 0xff, @tick=0x2, {0x3f}, {0x4, 0xf1}, @queue={0xff, {0x6, 0x9}}}, {0x4, 0x1, 0x9, 0x5, @time={0x7, 0x6}, {0x7c, 0x2}, {0x20, 0x6}, @connect={{0x0, 0xfd}, {0x98, 0x4}}}, {0x80, 0x4, 0x7, 0x7d, @time={0xfffff000, 0x9}, {0x81, 0x1f}, {0xaa}, @queue={0x5, {0xffffffe0, 0x3}}}], 0x70) r6 = syz_open_dev$vcsn(&(0x7f0000000040), 0x3, 0x2001) ioctl$LOOP_CTL_GET_FREE(r6, 0x4c82) ptrace$setopts(0x4206, r5, 0x0, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fork() fork() clone3(&(0x7f0000004c00)={0xc0002100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) [ 1779.007869] EXT4-fs warning (device loop2): read_mmp_block:106: Error -117 while reading MMP block 0 [ 1779.009435] loop0: detected capacity change from 0 to 512 [ 1779.027636] EXT4-fs (loop0): fragment/cluster size (32768) != block size (2048) 22:38:23 executing program 5: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) lsetxattr$security_evm(&(0x7f0000000240)='.\x00', &(0x7f0000000300), &(0x7f00000003c0)=@sha1={0x1, "bd2b5bce8b74aea700654a682479ac2c0852bc4d"}, 0x15, 0x3) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={&(0x7f0000000040), 0xb}, 0x0, 0x20, 0x0, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) r0 = fork() r1 = syz_open_procfs(r0, &(0x7f0000000000)='status\x00') r2 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x2, 0x0) pwrite64(r2, &(0x7f00000000c0)='9', 0x1, 0x8040000) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x3, 0x4, 0x1, 0x0, 0x8, 0x20620, 0x2, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x3f, 0x2, @perf_config_ext={0x240000000, 0x5}, 0x1400, 0x4, 0x8, 0x7, 0x9, 0x6, 0x6, 0x0, 0x1, 0x0, 0x8}, r0, 0xa, r2, 0x1) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r3, 0x6, 0x1e, &(0x7f0000000040)=0x1, 0x4) connect$inet6(r3, &(0x7f0000000080)={0xa, 0x0, 0x0, @loopback}, 0x1c) openat$cgroup_ro(r1, &(0x7f0000000180)='blkio.throttle.io_serviced_recursive\x00', 0x0, 0x0) [ 1796.072029] loop7: detected capacity change from 0 to 2048 22:38:40 executing program 5: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) lsetxattr$security_evm(&(0x7f0000000240)='.\x00', &(0x7f0000000300), &(0x7f00000003c0)=@sha1={0x1, "bd2b5bce8b74aea700654a682479ac2c0852bc4d"}, 0x15, 0x3) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={&(0x7f0000000040), 0xb}, 0x0, 0x20, 0x0, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) r0 = fork() r1 = syz_open_procfs(r0, &(0x7f0000000000)='status\x00') r2 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x2, 0x0) pwrite64(r2, &(0x7f00000000c0)='9', 0x1, 0x8040000) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x3, 0x4, 0x1, 0x0, 0x8, 0x20620, 0x2, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x3f, 0x2, @perf_config_ext={0x240000000, 0x5}, 0x1400, 0x4, 0x8, 0x7, 0x9, 0x6, 0x6, 0x0, 0x1, 0x0, 0x8}, r0, 0xa, r2, 0x1) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r3, 0x6, 0x1e, &(0x7f0000000040)=0x1, 0x4) connect$inet6(r3, &(0x7f0000000080)={0xa, 0x0, 0x0, @loopback}, 0x1c) openat$cgroup_ro(r1, &(0x7f0000000180)='blkio.throttle.io_serviced_recursive\x00', 0x0, 0x0) 22:38:40 executing program 7: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000480)}}, 0x0, 0xffffffefffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x100000, 0xe, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000500100000f000000000000000100000005000000000004000040000020000000dbf4655fdbf4655f0100ffff53ef010001000000dbf4655f000000000000000001000000000000000b0000008000000018000000c20500002b0200"/116, 0x74, 0x400}, {&(0x7f0000010100)="000000000000000000000000244b8e9b57f04b59aa229cc218853f9501004000", 0x20, 0x4e0}, {0x0, 0x0, 0x560}, {&(0x7f0000010300)="020000000300000004000000", 0xc, 0x800}, {&(0x7f0000010400), 0x0, 0x1000}, {&(0x7f0000011500)="ed41000000080000dbf4655fdbf4655fdbf4655f00000000000004004000", 0x1e, 0x2080}, {0x0}, {0x0}, {&(0x7f0000011c00)="0b0000000c0001022e00000002000000f40702022e", 0x15, 0x10000}, {0x0}, {0x0}, {&(0x7f0000012400)="504d4d00504d4dffdbf4655f00000000647679756b6f762d676c6170746f70320000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000006c6f6f7033340075782f746573742f73797a5f6d6f756e745f696d6167655f650500"/123, 0x7b, 0x20000}, {0x0}, {0x0, 0x0, 0x38000}], 0x0, &(0x7f0000012f00)) 22:38:40 executing program 6: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) lsetxattr$security_evm(&(0x7f0000000240)='.\x00', &(0x7f0000000300), &(0x7f00000003c0)=@sha1={0x1, "bd2b5bce8b74aea700654a682479ac2c0852bc4d"}, 0x15, 0x3) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={&(0x7f0000000040), 0xb}, 0x0, 0x20, 0x0, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) r0 = fork() r1 = syz_open_procfs(r0, &(0x7f0000000000)='status\x00') r2 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x2, 0x0) pwrite64(r2, &(0x7f00000000c0)='9', 0x1, 0x8040000) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x20, 0x3, 0x0, 0x1, 0x0, 0x8, 0x20620, 0x2, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x3f, 0x2, @perf_config_ext={0x240000000, 0x5}, 0x1400, 0x4, 0x8, 0x7, 0x9, 0x6, 0x6, 0x0, 0x1, 0x0, 0x8}, r0, 0xa, r2, 0x1) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r3, 0x6, 0x1e, &(0x7f0000000040)=0x1, 0x4) setsockopt$inet6_tcp_TCP_REPAIR(r3, 0x6, 0x13, &(0x7f00000018c0)=0x1, 0x4) connect$inet6(r3, &(0x7f0000000080)={0xa, 0x0, 0x0, @loopback}, 0x1c) openat$cgroup_ro(r1, &(0x7f0000000180)='blkio.throttle.io_serviced_recursive\x00', 0x0, 0x0) 22:38:40 executing program 4: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000480)}}, 0x0, 0xffffffefffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x100000, 0xe, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000500100000f000000000000000100000005000000000004000040000020000000dbf4655fdbf4655f0100ffff53ef010001000000dbf4655f000000000000000001000000000000000b0000008000000018000000c20500002b0200"/116, 0x74, 0x400}, {&(0x7f0000010100)="000000000000000000000000244b8e9b57f04b59aa229cc218853f9501004000", 0x20, 0x4e0}, {0x0, 0x0, 0x560}, {&(0x7f0000010300)="020000000300000004000000", 0xc, 0x800}, {&(0x7f0000010400), 0x0, 0x1000}, {&(0x7f0000011500)="ed41000000080000dbf4655fdbf4655fdbf4655f00000000000004004000", 0x1e, 0x2080}, {0x0}, {0x0}, {&(0x7f0000011c00)="0b0000000c0001022e00000002000000f40702022e", 0x15, 0x10000}, {0x0}, {0x0}, {&(0x7f0000012400)="504d4d00504d4dffdbf4655f00000000647679756b6f762d676c6170746f70320000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000006c6f6f7033340075782f746573742f73797a5f6d6f756e745f696d6167655f650500"/123, 0x7b, 0x20000}, {0x0}, {0x0, 0x0, 0x38000}], 0x0, &(0x7f0000012f00)) 22:38:40 executing program 2: perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000480)}}, 0x0, 0xffffffefffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x100000, 0xe, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000500100000f000000000000000100000005000000000004000040000020000000dbf4655fdbf4655f0100ffff53ef010001000000dbf4655f000000000000000001000000000000000b0000008000000018000000c20500002b0200"/116, 0x74, 0x400}, {&(0x7f0000010100)="000000000000000000000000244b8e9b57f04b59aa229cc218853f9501004000", 0x20, 0x4e0}, {&(0x7f0000010200)="0100000000000500", 0x8, 0x560}, {&(0x7f0000010300)="020000000300000004000000", 0xc, 0x800}, {&(0x7f0000010400), 0x0, 0x1000}, {&(0x7f0000011500)="ed41000000080000dbf4655fdbf4655fdbf4655f00000000000004004000", 0x1e, 0x2080}, {0x0}, {0x0}, {&(0x7f0000011c00)="0b0000000c0001022e00000002000000f40702022e", 0x15, 0x10000}, {0x0}, {0x0}, {&(0x7f0000012400)="504d4d00504d4dffdbf4655f00000000647679756b6f762d676c6170746f70320000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000006c6f6f7033340075782f746573742f73797a5f6d6f756e745f696d6167655f650500"/123, 0x7b, 0x20000}, {0x0}, {0x0, 0x0, 0x38000}], 0x0, &(0x7f0000012f00)) 22:38:40 executing program 0: perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000480)}}, 0x0, 0xffffffefffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0xd, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000500100000f000000000000000100000005000000000004000040000020000000dbf4655fdbf4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000010100)="000000000000000000000000244b8e9b57f04b59aa229cc218853f9501004000", 0x20, 0x4e0}, {&(0x7f0000010200)="01000000000005", 0x7, 0x560}, {&(0x7f0000010300)="020000000300000004000000", 0xc, 0x800}, {&(0x7f0000010400), 0x0, 0x1000}, {&(0x7f0000011500)="ed41000000080000dbf4655fdbf4655f", 0x10, 0x2080}, {0x0}, {0x0}, {0x0, 0x0, 0x10000}, {0x0}, {0x0}, {0x0, 0x0, 0x20000}, {0x0}], 0x0, &(0x7f0000012f00)) 22:38:40 executing program 3: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) lsetxattr$security_evm(&(0x7f0000000240)='.\x00', &(0x7f0000000300), &(0x7f00000003c0)=@sha1={0x1, "bd2b5bce8b74aea700654a682479ac2c0852bc4d"}, 0x15, 0x3) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={&(0x7f0000000040), 0xb}, 0x0, 0x20, 0x0, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) r0 = fork() r1 = syz_open_procfs(r0, &(0x7f0000000000)='status\x00') r2 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x2, 0x0) pwrite64(r2, &(0x7f00000000c0)='9', 0x1, 0x8040000) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x20, 0x3, 0x4, 0x1, 0x0, 0x0, 0x20620, 0x2, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x3f, 0x2, @perf_config_ext={0x240000000, 0x5}, 0x1400, 0x4, 0x8, 0x7, 0x9, 0x6, 0x6, 0x0, 0x1, 0x0, 0x8}, r0, 0xa, r2, 0x1) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r3, 0x6, 0x1e, &(0x7f0000000040)=0x1, 0x4) setsockopt$inet6_tcp_TCP_REPAIR(r3, 0x6, 0x13, &(0x7f00000018c0)=0x1, 0x4) connect$inet6(r3, &(0x7f0000000080)={0xa, 0x0, 0x0, @loopback}, 0x1c) openat$cgroup_ro(r1, &(0x7f0000000180)='blkio.throttle.io_serviced_recursive\x00', 0x0, 0x0) 22:38:40 executing program 1: r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, @perf_config_ext, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000000), 0x0) r2 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) ioctl$EXT4_IOC_CHECKPOINT(r2, 0x4004662b, &(0x7f0000000100)=0x5) ioctl$AUTOFS_DEV_IOCTL_TIMEOUT(0xffffffffffffffff, 0xc018937a, &(0x7f0000001480)=ANY=[@ANYBLOB="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", @ANYRES32=r0, @ANYBLOB="01040000000000002e2f66696c653000"]) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r3, 0xc08c5332, &(0x7f00000013c0)={0xffffffff, 0x6964, 0x0, 'queue1\x00', 0xff}) r4 = gettid() process_vm_writev(r4, &(0x7f0000002580)=[{&(0x7f0000000140)=""/89, 0x59}, {&(0x7f00000001c0)=""/175, 0xaf}, {&(0x7f0000000280)=""/4096, 0x1000}], 0x3, &(0x7f0000003840)=[{&(0x7f0000002640)=""/105, 0x69}, {0xfffffffffffffffe, 0x10}], 0x2, 0x0) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r1, 0xc08c5332, &(0x7f0000001280)={0x3, 0x5, 0x0, 'queue1\x00', 0x8}) r5 = fork() write$sndseq(r1, &(0x7f0000001340)=[{0x22, 0x8, 0x2, 0x3, @time={0x4}, {0x0, 0x1}, {0x6, 0x81}, @raw32={[0x800, 0x3, 0x9]}}, {0xe1, 0x7, 0xf8, 0xff, @tick=0x2, {0x3f}, {0x4, 0xf1}, @queue={0xff, {0x6, 0x9}}}, {0x4, 0x1, 0x9, 0x5, @time={0x7, 0x6}, {0x7c, 0x2}, {0x20, 0x6}, @connect={{0x0, 0xfd}, {0x98, 0x4}}}, {0x80, 0x4, 0x7, 0x7d, @time={0xfffff000, 0x9}, {0x81, 0x1f}, {0xaa}, @queue={0x5, {0xffffffe0, 0x3}}}], 0x70) r6 = syz_open_dev$vcsn(&(0x7f0000000040), 0x3, 0x2001) ioctl$LOOP_CTL_GET_FREE(r6, 0x4c82) ptrace$setopts(0x4206, r5, 0x0, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fork() fork() clone3(&(0x7f0000004c00)={0xc0002100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) [ 1796.093632] EXT4-fs warning (device loop7): read_mmp_block:106: Error -117 while reading MMP block 0 22:38:40 executing program 7: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000480)}}, 0x0, 0xffffffefffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x100000, 0xe, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000500100000f000000000000000100000005000000000004000040000020000000dbf4655fdbf4655f0100ffff53ef010001000000dbf4655f000000000000000001000000000000000b0000008000000018000000c20500002b0200"/116, 0x74, 0x400}, {&(0x7f0000010100)="000000000000000000000000244b8e9b57f04b59aa229cc218853f9501004000", 0x20, 0x4e0}, {&(0x7f0000010200), 0x0, 0x560}, {&(0x7f0000010300)="020000000300000004000000", 0xc, 0x800}, {&(0x7f0000010400), 0x0, 0x1000}, {&(0x7f0000011500)="ed41000000080000dbf4655fdbf4655fdbf4655f00000000000004004000", 0x1e, 0x2080}, {0x0}, {0x0}, {&(0x7f0000011c00)="0b0000000c0001022e00000002000000f40702022e", 0x15, 0x10000}, {0x0}, {0x0}, {&(0x7f0000012400)="504d4d00504d4dffdbf4655f00000000647679756b6f762d676c6170746f70320000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000006c6f6f7033340075782f746573742f73797a5f6d6f756e745f696d6167655f650500"/123, 0x7b, 0x20000}, {0x0}, {0x0, 0x0, 0x38000}], 0x0, &(0x7f0000012f00)) [ 1796.165681] loop2: detected capacity change from 0 to 2048 [ 1796.182812] loop4: detected capacity change from 0 to 2048 [ 1796.187724] loop0: detected capacity change from 0 to 512 [ 1796.208390] EXT4-fs warning (device loop2): read_mmp_block:106: Error -117 while reading MMP block 0 [ 1796.223023] EXT4-fs (loop0): fragment/cluster size (32768) != block size (2048) [ 1796.240288] EXT4-fs warning (device loop4): read_mmp_block:106: Error -117 while reading MMP block 0 [ 1796.308364] loop7: detected capacity change from 0 to 2048 22:38:40 executing program 0: perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000480)}}, 0x0, 0xffffffefffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0xd, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000500100000f000000000000000100000005000000000004000040000020000000dbf4655fdbf4655f0100ffff53ef010001000000dbf4655f000000000000000001000000000000000b0000", 0x57, 0x400}, {&(0x7f0000010100)="000000000000000000000000244b8e9b57f04b59aa229cc218853f9501004000", 0x20, 0x4e0}, {&(0x7f0000010200)="01000000000005", 0x7, 0x560}, {&(0x7f0000010300)="020000000300000004000000", 0xc, 0x800}, {&(0x7f0000010400), 0x0, 0x1000}, {&(0x7f0000011500)="ed41000000080000dbf4655fdbf4655f", 0x10, 0x2080}, {0x0}, {0x0}, {0x0, 0x0, 0x10000}, {0x0}, {0x0}, {0x0, 0x0, 0x20000}, {0x0}], 0x0, &(0x7f0000012f00)) [ 1796.382770] EXT4-fs warning (device loop7): read_mmp_block:106: Error -117 while reading MMP block 0 22:38:40 executing program 2: perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000480)}}, 0x0, 0xffffffefffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x100000, 0xe, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000500100000f000000000000000100000005000000000004000040000020000000dbf4655fdbf4655f0100ffff53ef010001000000dbf4655f000000000000000001000000000000000b0000008000000018000000c20500002b0200"/116, 0x74, 0x400}, {&(0x7f0000010100)="000000000000000000000000244b8e9b57f04b59aa229cc218853f9501004000", 0x20, 0x4e0}, {&(0x7f0000010200)="0100000000000500", 0x8, 0x560}, {&(0x7f0000010300)="020000000300000004000000", 0xc, 0x800}, {&(0x7f0000010400), 0x0, 0x1000}, {&(0x7f0000011500)="ed41000000080000dbf4655fdbf4655fdbf4655f00000000000004004000", 0x1e, 0x2080}, {0x0}, {0x0}, {&(0x7f0000011c00)="0b0000000c0001022e00000002000000f40702022e", 0x15, 0x10000}, {0x0}, {0x0}, {&(0x7f0000012400)="504d4d00504d4dffdbf4655f00000000647679756b6f762d676c6170746f70320000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000006c6f6f7033340075782f746573742f73797a5f6d6f756e745f696d6167655f650500"/123, 0x7b, 0x20000}, {0x0}, {0x0, 0x0, 0x38000}], 0x0, &(0x7f0000012f00)) 22:38:40 executing program 4: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000480)}}, 0x0, 0xffffffefffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x100000, 0xe, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000500100000f000000000000000100000005000000000004000040000020000000dbf4655fdbf4655f0100ffff53ef010001000000dbf4655f000000000000000001000000000000000b0000008000000018000000c20500002b0200"/116, 0x74, 0x400}, {&(0x7f0000010100)="000000000000000000000000244b8e9b57f04b59aa229cc218853f9501004000", 0x20, 0x4e0}, {&(0x7f0000010200), 0x0, 0x560}, {&(0x7f0000010300)="020000000300000004000000", 0xc, 0x800}, {&(0x7f0000010400), 0x0, 0x1000}, {&(0x7f0000011500)="ed41000000080000dbf4655fdbf4655fdbf4655f00000000000004004000", 0x1e, 0x2080}, {0x0}, {0x0}, {&(0x7f0000011c00)="0b0000000c0001022e00000002000000f40702022e", 0x15, 0x10000}, {0x0}, {0x0}, {&(0x7f0000012400)="504d4d00504d4dffdbf4655f00000000647679756b6f762d676c6170746f70320000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000006c6f6f7033340075782f746573742f73797a5f6d6f756e745f696d6167655f650500"/123, 0x7b, 0x20000}, {0x0}, {0x0, 0x0, 0x38000}], 0x0, &(0x7f0000012f00)) 22:38:41 executing program 7: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000480)}}, 0x0, 0xffffffefffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x100000, 0xe, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000500100000f000000000000000100000005000000000004000040000020000000dbf4655fdbf4655f0100ffff53ef010001000000dbf4655f000000000000000001000000000000000b0000008000000018000000c20500002b0200"/116, 0x74, 0x400}, {&(0x7f0000010100)="000000000000000000000000244b8e9b57f04b59aa229cc218853f9501004000", 0x20, 0x4e0}, {&(0x7f0000010200), 0x0, 0x560}, {&(0x7f0000010300)="020000000300000004000000", 0xc, 0x800}, {&(0x7f0000010400), 0x0, 0x1000}, {&(0x7f0000011500)="ed41000000080000dbf4655fdbf4655fdbf4655f00000000000004004000", 0x1e, 0x2080}, {0x0}, {0x0}, {&(0x7f0000011c00)="0b0000000c0001022e00000002000000f40702022e", 0x15, 0x10000}, {0x0}, {0x0}, {&(0x7f0000012400)="504d4d00504d4dffdbf4655f00000000647679756b6f762d676c6170746f70320000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000006c6f6f7033340075782f746573742f73797a5f6d6f756e745f696d6167655f650500"/123, 0x7b, 0x20000}, {0x0}, {0x0, 0x0, 0x38000}], 0x0, &(0x7f0000012f00)) [ 1796.577000] loop0: detected capacity change from 0 to 512 22:38:41 executing program 5: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) lsetxattr$security_evm(&(0x7f0000000240)='.\x00', &(0x7f0000000300), &(0x7f00000003c0)=@sha1={0x1, "bd2b5bce8b74aea700654a682479ac2c0852bc4d"}, 0x15, 0x3) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={&(0x7f0000000040), 0xb}, 0x0, 0x20, 0x0, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) r0 = fork() r1 = syz_open_procfs(r0, &(0x7f0000000000)='status\x00') r2 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x2, 0x0) pwrite64(r2, &(0x7f00000000c0)='9', 0x1, 0x8040000) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x3, 0x4, 0x1, 0x0, 0x8, 0x20620, 0x2, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x3f, 0x2, @perf_config_ext={0x240000000, 0x5}, 0x1400, 0x4, 0x8, 0x7, 0x9, 0x6, 0x6, 0x0, 0x1, 0x0, 0x8}, r0, 0xa, r2, 0x1) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r3, 0x6, 0x1e, &(0x7f0000000040)=0x1, 0x4) connect$inet6(r3, &(0x7f0000000080)={0xa, 0x0, 0x0, @loopback}, 0x1c) openat$cgroup_ro(r1, &(0x7f0000000180)='blkio.throttle.io_serviced_recursive\x00', 0x0, 0x0) [ 1796.598863] loop4: detected capacity change from 0 to 2048 [ 1796.615005] EXT4-fs (loop0): unsupported inode size: 0 [ 1796.616030] EXT4-fs (loop0): blocksize: 2048 [ 1796.618384] loop2: detected capacity change from 0 to 2048 [ 1796.641275] EXT4-fs warning (device loop4): read_mmp_block:106: Error -117 while reading MMP block 0 22:38:41 executing program 1: r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, @perf_config_ext, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000000), 0x0) r2 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) ioctl$EXT4_IOC_CHECKPOINT(r2, 0x4004662b, &(0x7f0000000100)=0x5) ioctl$AUTOFS_DEV_IOCTL_TIMEOUT(0xffffffffffffffff, 0xc018937a, &(0x7f0000001480)=ANY=[@ANYBLOB="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", @ANYRES32=r0, @ANYBLOB="01040000000000002e2f66696c653000"]) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r3, 0xc08c5332, &(0x7f00000013c0)={0xffffffff, 0x6964, 0x0, 'queue1\x00', 0xff}) r4 = gettid() process_vm_writev(r4, &(0x7f0000002580)=[{&(0x7f0000000140)=""/89, 0x59}, {&(0x7f00000001c0)=""/175, 0xaf}, {&(0x7f0000000280)=""/4096, 0x1000}], 0x3, &(0x7f0000003840)=[{&(0x7f0000002640)=""/105, 0x69}, {0xfffffffffffffffe, 0x10}], 0x2, 0x0) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r1, 0xc08c5332, &(0x7f0000001280)={0x3, 0x5, 0x0, 'queue1\x00', 0x8}) r5 = fork() write$sndseq(r1, &(0x7f0000001340)=[{0x22, 0x8, 0x2, 0x3, @time={0x4}, {0x0, 0x1}, {0x6, 0x81}, @raw32={[0x800, 0x3, 0x9]}}, {0xe1, 0x7, 0xf8, 0xff, @tick=0x2, {0x3f}, {0x4, 0xf1}, @queue={0xff, {0x6, 0x9}}}, {0x4, 0x1, 0x9, 0x5, @time={0x7, 0x6}, {0x7c, 0x2}, {0x20, 0x6}, @connect={{0x0, 0xfd}, {0x98, 0x4}}}, {0x80, 0x4, 0x7, 0x7d, @time={0xfffff000, 0x9}, {0x81, 0x1f}, {0xaa}, @queue={0x5, {0xffffffe0, 0x3}}}], 0x70) r6 = syz_open_dev$vcsn(&(0x7f0000000040), 0x3, 0x2001) ioctl$LOOP_CTL_GET_FREE(r6, 0x4c82) ptrace$setopts(0x4206, r5, 0x0, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fork() fork() clone3(&(0x7f0000004c00)={0xc0002100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) [ 1796.661771] EXT4-fs warning (device loop2): read_mmp_block:106: Error -117 while reading MMP block 0 [ 1796.701733] loop7: detected capacity change from 0 to 2048 [ 1796.737971] EXT4-fs warning (device loop7): read_mmp_block:106: Error -117 while reading MMP block 0 22:38:41 executing program 0: perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000480)}}, 0x0, 0xffffffefffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0xd, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000500100000f000000000000000100000005000000000004000040000020000000dbf4655fdbf4655f0100ffff53ef010001000000dbf4655f000000000000000001000000000000000b0000", 0x57, 0x400}, {&(0x7f0000010100)="000000000000000000000000244b8e9b57f04b59aa229cc218853f9501004000", 0x20, 0x4e0}, {&(0x7f0000010200)="01000000000005", 0x7, 0x560}, {&(0x7f0000010300)="020000000300000004000000", 0xc, 0x800}, {&(0x7f0000010400), 0x0, 0x1000}, {&(0x7f0000011500)="ed41000000080000dbf4655fdbf4655f", 0x10, 0x2080}, {0x0}, {0x0}, {0x0, 0x0, 0x10000}, {0x0}, {0x0}, {0x0, 0x0, 0x20000}, {0x0}], 0x0, &(0x7f0000012f00)) 22:38:41 executing program 4: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000480)}}, 0x0, 0xffffffefffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x100000, 0xe, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000500100000f000000000000000100000005000000000004000040000020000000dbf4655fdbf4655f0100ffff53ef010001000000dbf4655f000000000000000001000000000000000b0000008000000018000000c20500002b0200"/116, 0x74, 0x400}, {&(0x7f0000010100)="000000000000000000000000244b8e9b57f04b59aa229cc218853f9501004000", 0x20, 0x4e0}, {&(0x7f0000010200), 0x0, 0x560}, {&(0x7f0000010300)="020000000300000004000000", 0xc, 0x800}, {&(0x7f0000010400), 0x0, 0x1000}, {&(0x7f0000011500)="ed41000000080000dbf4655fdbf4655fdbf4655f00000000000004004000", 0x1e, 0x2080}, {0x0}, {0x0}, {&(0x7f0000011c00)="0b0000000c0001022e00000002000000f40702022e", 0x15, 0x10000}, {0x0}, {0x0}, {&(0x7f0000012400)="504d4d00504d4dffdbf4655f00000000647679756b6f762d676c6170746f70320000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000006c6f6f7033340075782f746573742f73797a5f6d6f756e745f696d6167655f650500"/123, 0x7b, 0x20000}, {0x0}, {0x0, 0x0, 0x38000}], 0x0, &(0x7f0000012f00)) [ 1796.932056] loop0: detected capacity change from 0 to 512 [ 1796.946208] loop4: detected capacity change from 0 to 2048 [ 1796.978720] EXT4-fs (loop0): unsupported inode size: 0 [ 1796.980053] EXT4-fs (loop0): blocksize: 2048 [ 1796.989155] EXT4-fs warning (device loop4): read_mmp_block:106: Error -117 while reading MMP block 0 22:39:00 executing program 1: r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, @perf_config_ext, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000000), 0x0) r2 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) ioctl$EXT4_IOC_CHECKPOINT(r2, 0x4004662b, &(0x7f0000000100)=0x5) ioctl$AUTOFS_DEV_IOCTL_TIMEOUT(0xffffffffffffffff, 0xc018937a, &(0x7f0000001480)=ANY=[@ANYBLOB="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", @ANYRES32=r0, @ANYBLOB="01040000000000002e2f66696c653000"]) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r3, 0xc08c5332, &(0x7f00000013c0)={0xffffffff, 0x6964, 0x0, 'queue1\x00', 0xff}) r4 = gettid() process_vm_writev(r4, &(0x7f0000002580)=[{&(0x7f0000000140)=""/89, 0x59}, {&(0x7f00000001c0)=""/175, 0xaf}, {&(0x7f0000000280)=""/4096, 0x1000}], 0x3, &(0x7f0000003840)=[{&(0x7f0000002640)=""/105, 0x69}, {0xfffffffffffffffe, 0x10}], 0x2, 0x0) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r1, 0xc08c5332, &(0x7f0000001280)={0x3, 0x5, 0x0, 'queue1\x00', 0x8}) r5 = fork() write$sndseq(r1, &(0x7f0000001340)=[{0x22, 0x8, 0x2, 0x3, @time={0x4}, {0x0, 0x1}, {0x6, 0x81}, @raw32={[0x800, 0x3, 0x9]}}, {0xe1, 0x7, 0xf8, 0xff, @tick=0x2, {0x3f}, {0x4, 0xf1}, @queue={0xff, {0x6, 0x9}}}, {0x4, 0x1, 0x9, 0x5, @time={0x7, 0x6}, {0x7c, 0x2}, {0x20, 0x6}, @connect={{0x0, 0xfd}, {0x98, 0x4}}}, {0x80, 0x4, 0x7, 0x7d, @time={0xfffff000, 0x9}, {0x81, 0x1f}, {0xaa}, @queue={0x5, {0xffffffe0, 0x3}}}], 0x70) r6 = syz_open_dev$vcsn(&(0x7f0000000040), 0x3, 0x2001) ioctl$LOOP_CTL_GET_FREE(r6, 0x4c82) ptrace$setopts(0x4206, r5, 0x0, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fork() fork() clone3(&(0x7f0000004c00)={0xc0002100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) 22:39:00 executing program 2: perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000480)}}, 0x0, 0xffffffefffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x100000, 0xe, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000500100000f000000000000000100000005000000000004000040000020000000dbf4655fdbf4655f0100ffff53ef010001000000dbf4655f000000000000000001000000000000000b0000008000000018000000c20500002b0200"/116, 0x74, 0x400}, {&(0x7f0000010100)="000000000000000000000000244b8e9b57f04b59aa229cc218853f9501004000", 0x20, 0x4e0}, {&(0x7f0000010200)="0100000000000500", 0x8, 0x560}, {&(0x7f0000010300)="020000000300000004000000", 0xc, 0x800}, {&(0x7f0000010400), 0x0, 0x1000}, {&(0x7f0000011500)="ed41000000080000dbf4655fdbf4655fdbf4655f00000000000004004000", 0x1e, 0x2080}, {0x0}, {0x0}, {&(0x7f0000011c00)="0b0000000c0001022e00000002000000f40702022e", 0x15, 0x10000}, {0x0}, {0x0}, {&(0x7f0000012400)="504d4d00504d4dffdbf4655f00000000647679756b6f762d676c6170746f70320000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000006c6f6f7033340075782f746573742f73797a5f6d6f756e745f696d6167655f650500"/123, 0x7b, 0x20000}, {0x0}, {0x0, 0x0, 0x38000}], 0x0, &(0x7f0000012f00)) 22:39:00 executing program 5: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) lsetxattr$security_evm(&(0x7f0000000240)='.\x00', &(0x7f0000000300), &(0x7f00000003c0)=@sha1={0x1, "bd2b5bce8b74aea700654a682479ac2c0852bc4d"}, 0x15, 0x3) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={&(0x7f0000000040), 0xb}, 0x0, 0x20, 0x0, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) r0 = fork() r1 = syz_open_procfs(r0, &(0x7f0000000000)='status\x00') r2 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x2, 0x0) pwrite64(r2, &(0x7f00000000c0)='9', 0x1, 0x8040000) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x20, 0x0, 0x4, 0x1, 0x0, 0x8, 0x20620, 0x2, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x3f, 0x2, @perf_config_ext={0x240000000, 0x5}, 0x1400, 0x4, 0x8, 0x7, 0x9, 0x6, 0x6, 0x0, 0x1, 0x0, 0x8}, r0, 0xa, r2, 0x1) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r3, 0x6, 0x1e, &(0x7f0000000040)=0x1, 0x4) connect$inet6(r3, &(0x7f0000000080)={0xa, 0x0, 0x0, @loopback}, 0x1c) openat$cgroup_ro(r1, &(0x7f0000000180)='blkio.throttle.io_serviced_recursive\x00', 0x0, 0x0) 22:39:00 executing program 7: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000480)}}, 0x0, 0xffffffefffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x100000, 0xe, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000500100000f000000000000000100000005000000000004000040000020000000dbf4655fdbf4655f0100ffff53ef010001000000dbf4655f000000000000000001000000000000000b0000008000000018000000c20500002b0200"/116, 0x74, 0x400}, {&(0x7f0000010100)="000000000000000000000000244b8e9b57f04b59aa229cc218853f9501004000", 0x20, 0x4e0}, {&(0x7f0000010200), 0x0, 0x560}, {&(0x7f0000010300)="020000000300000004000000", 0xc, 0x800}, {&(0x7f0000010400), 0x0, 0x1000}, {&(0x7f0000011500)="ed41000000080000dbf4655fdbf4655fdbf4655f00000000000004004000", 0x1e, 0x2080}, {0x0}, {0x0}, {&(0x7f0000011c00)="0b0000000c0001022e00000002000000f40702022e", 0x15, 0x10000}, {0x0}, {0x0}, {&(0x7f0000012400)="504d4d00504d4dffdbf4655f00000000647679756b6f762d676c6170746f70320000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000006c6f6f7033340075782f746573742f73797a5f6d6f756e745f696d6167655f650500"/123, 0x7b, 0x20000}, {0x0}, {0x0, 0x0, 0x38000}], 0x0, &(0x7f0000012f00)) 22:39:00 executing program 6: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) lsetxattr$security_evm(&(0x7f0000000240)='.\x00', &(0x7f0000000300), &(0x7f00000003c0)=@sha1={0x1, "bd2b5bce8b74aea700654a682479ac2c0852bc4d"}, 0x15, 0x3) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={&(0x7f0000000040), 0xb}, 0x0, 0x20, 0x0, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) r0 = fork() r1 = syz_open_procfs(r0, &(0x7f0000000000)='status\x00') r2 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x2, 0x0) pwrite64(r2, &(0x7f00000000c0)='9', 0x1, 0x8040000) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x20, 0x3, 0x0, 0x1, 0x0, 0x8, 0x20620, 0x2, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x3f, 0x2, @perf_config_ext={0x240000000, 0x5}, 0x1400, 0x4, 0x8, 0x7, 0x9, 0x6, 0x6, 0x0, 0x1, 0x0, 0x8}, r0, 0xa, r2, 0x1) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r3, 0x6, 0x1e, &(0x7f0000000040)=0x1, 0x4) setsockopt$inet6_tcp_TCP_REPAIR(r3, 0x6, 0x13, &(0x7f00000018c0)=0x1, 0x4) connect$inet6(r3, &(0x7f0000000080)={0xa, 0x0, 0x0, @loopback}, 0x1c) openat$cgroup_ro(r1, &(0x7f0000000180)='blkio.throttle.io_serviced_recursive\x00', 0x0, 0x0) 22:39:00 executing program 3: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) lsetxattr$security_evm(&(0x7f0000000240)='.\x00', &(0x7f0000000300), &(0x7f00000003c0)=@sha1={0x1, "bd2b5bce8b74aea700654a682479ac2c0852bc4d"}, 0x15, 0x3) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={&(0x7f0000000040), 0xb}, 0x0, 0x20, 0x0, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) r0 = fork() r1 = syz_open_procfs(r0, &(0x7f0000000000)='status\x00') r2 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x2, 0x0) pwrite64(r2, &(0x7f00000000c0)='9', 0x1, 0x8040000) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x20, 0x3, 0x4, 0x1, 0x0, 0x8, 0x0, 0x2, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x3f, 0x2, @perf_config_ext={0x240000000, 0x5}, 0x1400, 0x4, 0x8, 0x7, 0x9, 0x6, 0x6, 0x0, 0x1, 0x0, 0x8}, r0, 0xa, r2, 0x1) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r3, 0x6, 0x1e, &(0x7f0000000040)=0x1, 0x4) setsockopt$inet6_tcp_TCP_REPAIR(r3, 0x6, 0x13, &(0x7f00000018c0)=0x1, 0x4) connect$inet6(r3, &(0x7f0000000080)={0xa, 0x0, 0x0, @loopback}, 0x1c) openat$cgroup_ro(r1, &(0x7f0000000180)='blkio.throttle.io_serviced_recursive\x00', 0x0, 0x0) 22:39:00 executing program 4: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000480)}}, 0x0, 0xffffffefffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x100000, 0xe, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000500100000f000000000000000100000005000000000004000040000020000000dbf4655fdbf4655f0100ffff53ef010001000000dbf4655f000000000000000001000000000000000b0000008000000018000000c20500002b0200"/116, 0x74, 0x400}, {&(0x7f0000010100)="000000000000000000000000244b8e9b57f04b59aa229cc218853f9501004000", 0x20, 0x4e0}, {&(0x7f0000010200), 0x0, 0x560}, {&(0x7f0000010300)="020000000300000004000000", 0xc, 0x800}, {&(0x7f0000010400), 0x0, 0x1000}, {&(0x7f0000011500)="ed41000000080000dbf4655fdbf4655fdbf4655f00000000000004004000", 0x1e, 0x2080}, {0x0}, {0x0}, {&(0x7f0000011c00)="0b0000000c0001022e00000002000000f40702022e", 0x15, 0x10000}, {0x0}, {0x0}, {&(0x7f0000012400)="504d4d00504d4dffdbf4655f00000000647679756b6f762d676c6170746f70320000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000006c6f6f7033340075782f746573742f73797a5f6d6f756e745f696d6167655f650500"/123, 0x7b, 0x20000}, {0x0}, {0x0, 0x0, 0x38000}], 0x0, &(0x7f0000012f00)) 22:39:00 executing program 0: perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000480)}}, 0x0, 0xffffffefffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0xd, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000500100000f000000000000000100000005000000000004000040000020000000dbf4655fdbf4655f0100ffff53ef010001000000dbf4655f000000000000000001000000000000000b0000", 0x57, 0x400}, {&(0x7f0000010100)="000000000000000000000000244b8e9b57f04b59aa229cc218853f9501004000", 0x20, 0x4e0}, {&(0x7f0000010200)="01000000000005", 0x7, 0x560}, {&(0x7f0000010300)="020000000300000004000000", 0xc, 0x800}, {&(0x7f0000010400), 0x0, 0x1000}, {&(0x7f0000011500)="ed41000000080000dbf4655fdbf4655f", 0x10, 0x2080}, {0x0}, {0x0}, {0x0, 0x0, 0x10000}, {0x0}, {0x0}, {0x0, 0x0, 0x20000}, {0x0}], 0x0, &(0x7f0000012f00)) [ 1815.865784] loop2: detected capacity change from 0 to 2048 [ 1815.874009] EXT4-fs warning (device loop2): read_mmp_block:106: Error -117 while reading MMP block 0 [ 1815.935742] loop2: detected capacity change from 0 to 2048 22:39:00 executing program 2: perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000480)}}, 0x0, 0xffffffefffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x100000, 0xe, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000500100000f000000000000000100000005000000000004000040000020000000dbf4655fdbf4655f0100ffff53ef010001000000dbf4655f000000000000000001000000000000000b0000008000000018000000c20500002b0200"/116, 0x74, 0x400}, {&(0x7f0000010100)="000000000000000000000000244b8e9b57f04b59aa229cc218853f9501004000", 0x20, 0x4e0}, {&(0x7f0000010200)="010000000000050040", 0x9}, {&(0x7f0000010300)="020000000300000004000000", 0xc, 0x800}, {&(0x7f0000010400), 0x0, 0x1000}, {&(0x7f0000011500)="ed41000000080000dbf4655fdbf4655fdbf4655f00000000000004004000", 0x1e, 0x2080}, {0x0}, {0x0}, {&(0x7f0000011c00)="0b0000000c0001022e00000002000000f40702022e", 0x15, 0x10000}, {0x0}, {0x0}, {&(0x7f0000012400)="504d4d00504d4dffdbf4655f00000000647679756b6f762d676c6170746f70320000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000006c6f6f7033340075782f746573742f73797a5f6d6f756e745f696d6167655f650500"/123, 0x7b, 0x20000}, {0x0}, {0x0, 0x0, 0x38000}], 0x0, &(0x7f0000012f00)) [ 1815.942335] EXT4-fs warning (device loop2): read_mmp_block:106: Error -117 while reading MMP block 0 [ 1815.945334] loop4: detected capacity change from 0 to 2048 [ 1815.947040] loop0: detected capacity change from 0 to 512 [ 1815.951277] loop7: detected capacity change from 0 to 2048 [ 1815.964132] EXT4-fs (loop0): unsupported inode size: 0 [ 1815.964660] EXT4-fs (loop0): blocksize: 2048 [ 1815.977340] EXT4-fs warning (device loop7): read_mmp_block:106: Error -117 while reading MMP block 0 [ 1815.984293] EXT4-fs warning (device loop4): read_mmp_block:106: Error -117 while reading MMP block 0 22:39:00 executing program 2: perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000480)}}, 0x0, 0xffffffefffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x100000, 0xe, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000500100000f000000000000000100000005000000000004000040000020000000dbf4655fdbf4655f0100ffff53ef010001000000dbf4655f000000000000000001000000000000000b0000008000000018000000c20500002b0200"/116, 0x74, 0x400}, {&(0x7f0000010100)="000000000000000000000000244b8e9b57f04b59aa229cc218853f9501004000", 0x20, 0x4e0}, {&(0x7f0000010200)="010000000000050040", 0x9}, {&(0x7f0000010300)="020000000300000004000000", 0xc, 0x800}, {&(0x7f0000010400), 0x0, 0x1000}, {&(0x7f0000011500)="ed41000000080000dbf4655fdbf4655fdbf4655f00000000000004004000", 0x1e, 0x2080}, {0x0}, {0x0}, {&(0x7f0000011c00)="0b0000000c0001022e00000002000000f40702022e", 0x15, 0x10000}, {0x0}, {0x0}, {&(0x7f0000012400)="504d4d00504d4dffdbf4655f00000000647679756b6f762d676c6170746f70320000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000006c6f6f7033340075782f746573742f73797a5f6d6f756e745f696d6167655f650500"/123, 0x7b, 0x20000}, {0x0}, {0x0, 0x0, 0x38000}], 0x0, &(0x7f0000012f00)) 22:39:00 executing program 0: perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000480)}}, 0x0, 0xffffffefffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0xd, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000500100000f000000000000000100000005000000000004000040000020000000dbf4655fdbf4655f0100ffff53ef010001000000dbf4655f000000000000000001000000000000000b0000008000000018000000c20500002b02", 0x66, 0x400}, {&(0x7f0000010100)="000000000000000000000000244b8e9b57f04b59aa229cc218853f9501004000", 0x20, 0x4e0}, {&(0x7f0000010200)="01000000000005", 0x7, 0x560}, {&(0x7f0000010300)="020000000300000004000000", 0xc, 0x800}, {&(0x7f0000010400), 0x0, 0x1000}, {&(0x7f0000011500)="ed41000000080000dbf4655fdbf4655f", 0x10, 0x2080}, {0x0}, {0x0}, {0x0, 0x0, 0x10000}, {0x0}, {0x0}, {0x0, 0x0, 0x20000}, {0x0}], 0x0, &(0x7f0000012f00)) [ 1816.092136] loop2: detected capacity change from 0 to 2048 [ 1816.120137] EXT4-fs warning (device loop2): read_mmp_block:106: Error -117 while reading MMP block 0 [ 1816.137992] loop0: detected capacity change from 0 to 512 22:39:00 executing program 7: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000480)}}, 0x0, 0xffffffefffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x100000, 0xe, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000500100000f000000000000000100000005000000000004000040000020000000dbf4655fdbf4655f0100ffff53ef010001000000dbf4655f000000000000000001000000000000000b0000008000000018000000c20500002b0200"/116, 0x74, 0x400}, {&(0x7f0000010100)="000000000000000000000000244b8e9b57f04b59aa229cc218853f9501004000", 0x20, 0x4e0}, {&(0x7f0000010200)="0100000000", 0x5, 0x560}, {&(0x7f0000010300)="020000000300000004000000", 0xc, 0x800}, {&(0x7f0000010400), 0x0, 0x1000}, {&(0x7f0000011500)="ed41000000080000dbf4655fdbf4655fdbf4655f00000000000004004000", 0x1e, 0x2080}, {0x0}, {0x0}, {&(0x7f0000011c00)="0b0000000c0001022e00000002000000f40702022e", 0x15, 0x10000}, {0x0}, {0x0}, {&(0x7f0000012400)="504d4d00504d4dffdbf4655f00000000647679756b6f762d676c6170746f70320000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000006c6f6f7033340075782f746573742f73797a5f6d6f756e745f696d6167655f650500"/123, 0x7b, 0x20000}, {0x0}, {0x0, 0x0, 0x38000}], 0x0, &(0x7f0000012f00)) [ 1816.222898] EXT4-fs (loop0): bad geometry: block count 512 exceeds size of device (128 blocks) [ 1816.324978] loop7: detected capacity change from 0 to 2048 [ 1816.356920] EXT4-fs warning (device loop7): read_mmp_block:106: Error -117 while reading MMP block 0 22:39:19 executing program 7: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000480)}}, 0x0, 0xffffffefffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x100000, 0xe, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000500100000f000000000000000100000005000000000004000040000020000000dbf4655fdbf4655f0100ffff53ef010001000000dbf4655f000000000000000001000000000000000b0000008000000018000000c20500002b0200"/116, 0x74, 0x400}, {&(0x7f0000010100)="000000000000000000000000244b8e9b57f04b59aa229cc218853f9501004000", 0x20, 0x4e0}, {&(0x7f0000010200)="0100000000", 0x5, 0x560}, {&(0x7f0000010300)="020000000300000004000000", 0xc, 0x800}, {&(0x7f0000010400), 0x0, 0x1000}, {&(0x7f0000011500)="ed41000000080000dbf4655fdbf4655fdbf4655f00000000000004004000", 0x1e, 0x2080}, {0x0}, {0x0}, {&(0x7f0000011c00)="0b0000000c0001022e00000002000000f40702022e", 0x15, 0x10000}, {0x0}, {0x0}, {&(0x7f0000012400)="504d4d00504d4dffdbf4655f00000000647679756b6f762d676c6170746f70320000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000006c6f6f7033340075782f746573742f73797a5f6d6f756e745f696d6167655f650500"/123, 0x7b, 0x20000}, {0x0}, {0x0, 0x0, 0x38000}], 0x0, &(0x7f0000012f00)) 22:39:19 executing program 5: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) lsetxattr$security_evm(&(0x7f0000000240)='.\x00', &(0x7f0000000300), &(0x7f00000003c0)=@sha1={0x1, "bd2b5bce8b74aea700654a682479ac2c0852bc4d"}, 0x15, 0x3) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={&(0x7f0000000040), 0xb}, 0x0, 0x20, 0x0, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) r0 = fork() r1 = syz_open_procfs(r0, &(0x7f0000000000)='status\x00') r2 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x2, 0x0) pwrite64(r2, &(0x7f00000000c0)='9', 0x1, 0x8040000) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x20, 0x0, 0x4, 0x1, 0x0, 0x8, 0x20620, 0x2, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x3f, 0x2, @perf_config_ext={0x240000000, 0x5}, 0x1400, 0x4, 0x8, 0x7, 0x9, 0x6, 0x6, 0x0, 0x1, 0x0, 0x8}, r0, 0xa, r2, 0x1) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r3, 0x6, 0x1e, &(0x7f0000000040)=0x1, 0x4) connect$inet6(r3, &(0x7f0000000080)={0xa, 0x0, 0x0, @loopback}, 0x1c) openat$cgroup_ro(r1, &(0x7f0000000180)='blkio.throttle.io_serviced_recursive\x00', 0x0, 0x0) 22:39:19 executing program 3: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) lsetxattr$security_evm(&(0x7f0000000240)='.\x00', &(0x7f0000000300), &(0x7f00000003c0)=@sha1={0x1, "bd2b5bce8b74aea700654a682479ac2c0852bc4d"}, 0x15, 0x3) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={&(0x7f0000000040), 0xb}, 0x0, 0x20, 0x0, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) r0 = fork() r1 = syz_open_procfs(r0, &(0x7f0000000000)='status\x00') r2 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x2, 0x0) pwrite64(r2, &(0x7f00000000c0)='9', 0x1, 0x8040000) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x20, 0x3, 0x4, 0x1, 0x0, 0x8, 0x0, 0x2, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x3f, 0x2, @perf_config_ext={0x240000000, 0x5}, 0x1400, 0x4, 0x8, 0x7, 0x9, 0x6, 0x6, 0x0, 0x1, 0x0, 0x8}, r0, 0xa, r2, 0x1) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r3, 0x6, 0x1e, &(0x7f0000000040)=0x1, 0x4) setsockopt$inet6_tcp_TCP_REPAIR(r3, 0x6, 0x13, &(0x7f00000018c0)=0x1, 0x4) connect$inet6(r3, &(0x7f0000000080)={0xa, 0x0, 0x0, @loopback}, 0x1c) openat$cgroup_ro(r1, &(0x7f0000000180)='blkio.throttle.io_serviced_recursive\x00', 0x0, 0x0) 22:39:19 executing program 1: r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, @perf_config_ext, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000000), 0x0) r2 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) ioctl$EXT4_IOC_CHECKPOINT(r2, 0x4004662b, &(0x7f0000000100)=0x5) ioctl$AUTOFS_DEV_IOCTL_TIMEOUT(0xffffffffffffffff, 0xc018937a, &(0x7f0000001480)=ANY=[@ANYBLOB="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", @ANYRES32=r0, @ANYBLOB="01040000000000002e2f66696c653000"]) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r3, 0xc08c5332, &(0x7f00000013c0)={0xffffffff, 0x6964, 0x0, 'queue1\x00', 0xff}) r4 = gettid() process_vm_writev(r4, &(0x7f0000002580)=[{&(0x7f0000000140)=""/89, 0x59}, {&(0x7f00000001c0)=""/175, 0xaf}, {&(0x7f0000000280)=""/4096, 0x1000}], 0x3, &(0x7f0000003840)=[{&(0x7f0000002640)=""/105, 0x69}, {0xfffffffffffffffe, 0x10}], 0x2, 0x0) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r1, 0xc08c5332, &(0x7f0000001280)={0x3, 0x5, 0x0, 'queue1\x00', 0x8}) r5 = fork() write$sndseq(r1, &(0x7f0000001340)=[{0x22, 0x8, 0x2, 0x3, @time={0x4}, {0x0, 0x1}, {0x6, 0x81}, @raw32={[0x800, 0x3, 0x9]}}, {0xe1, 0x7, 0xf8, 0xff, @tick=0x2, {0x3f}, {0x4, 0xf1}, @queue={0xff, {0x6, 0x9}}}, {0x4, 0x1, 0x9, 0x5, @time={0x7, 0x6}, {0x7c, 0x2}, {0x20, 0x6}, @connect={{0x0, 0xfd}, {0x98, 0x4}}}, {0x80, 0x4, 0x7, 0x7d, @time={0xfffff000, 0x9}, {0x81, 0x1f}, {0xaa}, @queue={0x5, {0xffffffe0, 0x3}}}], 0x70) r6 = syz_open_dev$vcsn(&(0x7f0000000040), 0x3, 0x2001) ioctl$LOOP_CTL_GET_FREE(r6, 0x4c82) ptrace$setopts(0x4206, r5, 0x0, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fork() fork() clone3(&(0x7f0000004c00)={0xc0002100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) 22:39:19 executing program 2: perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000480)}}, 0x0, 0xffffffefffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x100000, 0xe, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000500100000f000000000000000100000005000000000004000040000020000000dbf4655fdbf4655f0100ffff53ef010001000000dbf4655f000000000000000001000000000000000b0000008000000018000000c20500002b0200"/116, 0x74, 0x400}, {&(0x7f0000010100)="000000000000000000000000244b8e9b57f04b59aa229cc218853f9501004000", 0x20, 0x4e0}, {&(0x7f0000010200)="010000000000050040", 0x9}, {&(0x7f0000010300)="020000000300000004000000", 0xc, 0x800}, {&(0x7f0000010400), 0x0, 0x1000}, {&(0x7f0000011500)="ed41000000080000dbf4655fdbf4655fdbf4655f00000000000004004000", 0x1e, 0x2080}, {0x0}, {0x0}, {&(0x7f0000011c00)="0b0000000c0001022e00000002000000f40702022e", 0x15, 0x10000}, {0x0}, {0x0}, {&(0x7f0000012400)="504d4d00504d4dffdbf4655f00000000647679756b6f762d676c6170746f70320000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000006c6f6f7033340075782f746573742f73797a5f6d6f756e745f696d6167655f650500"/123, 0x7b, 0x20000}, {0x0}, {0x0, 0x0, 0x38000}], 0x0, &(0x7f0000012f00)) 22:39:19 executing program 4: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000480)}}, 0x0, 0xffffffefffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x100000, 0xe, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000500100000f000000000000000100000005000000000004000040000020000000dbf4655fdbf4655f0100ffff53ef010001000000dbf4655f000000000000000001000000000000000b0000008000000018000000c20500002b0200"/116, 0x74, 0x400}, {&(0x7f0000010100)="000000000000000000000000244b8e9b57f04b59aa229cc218853f9501004000", 0x20, 0x4e0}, {&(0x7f0000010200)="0100000000", 0x5, 0x560}, {&(0x7f0000010300)="020000000300000004000000", 0xc, 0x800}, {&(0x7f0000010400), 0x0, 0x1000}, {&(0x7f0000011500)="ed41000000080000dbf4655fdbf4655fdbf4655f00000000000004004000", 0x1e, 0x2080}, {0x0}, {0x0}, {&(0x7f0000011c00)="0b0000000c0001022e00000002000000f40702022e", 0x15, 0x10000}, {0x0}, {0x0}, {&(0x7f0000012400)="504d4d00504d4dffdbf4655f00000000647679756b6f762d676c6170746f70320000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000006c6f6f7033340075782f746573742f73797a5f6d6f756e745f696d6167655f650500"/123, 0x7b, 0x20000}, {0x0}, {0x0, 0x0, 0x38000}], 0x0, &(0x7f0000012f00)) 22:39:19 executing program 6: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) lsetxattr$security_evm(&(0x7f0000000240)='.\x00', &(0x7f0000000300), &(0x7f00000003c0)=@sha1={0x1, "bd2b5bce8b74aea700654a682479ac2c0852bc4d"}, 0x15, 0x3) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={&(0x7f0000000040), 0xb}, 0x0, 0x20, 0x0, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) r0 = fork() r1 = syz_open_procfs(r0, &(0x7f0000000000)='status\x00') r2 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x2, 0x0) pwrite64(r2, &(0x7f00000000c0)='9', 0x1, 0x8040000) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x20, 0x3, 0x0, 0x1, 0x0, 0x8, 0x20620, 0x2, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x3f, 0x2, @perf_config_ext={0x240000000, 0x5}, 0x1400, 0x4, 0x8, 0x7, 0x9, 0x6, 0x6, 0x0, 0x1, 0x0, 0x8}, r0, 0xa, r2, 0x1) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r3, 0x6, 0x1e, &(0x7f0000000040)=0x1, 0x4) setsockopt$inet6_tcp_TCP_REPAIR(r3, 0x6, 0x13, &(0x7f00000018c0)=0x1, 0x4) connect$inet6(r3, &(0x7f0000000080)={0xa, 0x0, 0x0, @loopback}, 0x1c) openat$cgroup_ro(r1, &(0x7f0000000180)='blkio.throttle.io_serviced_recursive\x00', 0x0, 0x0) 22:39:19 executing program 0: perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000480)}}, 0x0, 0xffffffefffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0xd, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000500100000f000000000000000100000005000000000004000040000020000000dbf4655fdbf4655f0100ffff53ef010001000000dbf4655f000000000000000001000000000000000b0000008000000018000000c20500002b02", 0x66, 0x400}, {&(0x7f0000010100)="000000000000000000000000244b8e9b57f04b59aa229cc218853f9501004000", 0x20, 0x4e0}, {&(0x7f0000010200)="01000000000005", 0x7, 0x560}, {&(0x7f0000010300)="020000000300000004000000", 0xc, 0x800}, {&(0x7f0000010400), 0x0, 0x1000}, {&(0x7f0000011500)="ed41000000080000dbf4655fdbf4655f", 0x10, 0x2080}, {0x0}, {0x0}, {0x0, 0x0, 0x10000}, {0x0}, {0x0}, {0x0, 0x0, 0x20000}, {0x0}], 0x0, &(0x7f0000012f00)) [ 1835.075786] loop7: detected capacity change from 0 to 2048 [ 1835.090101] EXT4-fs warning (device loop7): read_mmp_block:106: Error -117 while reading MMP block 0 [ 1835.107186] loop4: detected capacity change from 0 to 2048 [ 1835.112198] loop0: detected capacity change from 0 to 512 [ 1835.112551] loop2: detected capacity change from 0 to 2048 [ 1835.124487] EXT4-fs warning (device loop2): read_mmp_block:106: Error -117 while reading MMP block 0 22:39:19 executing program 7: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000480)}}, 0x0, 0xffffffefffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x100000, 0xe, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000500100000f000000000000000100000005000000000004000040000020000000dbf4655fdbf4655f0100ffff53ef010001000000dbf4655f000000000000000001000000000000000b0000008000000018000000c20500002b0200"/116, 0x74, 0x400}, {&(0x7f0000010100)="000000000000000000000000244b8e9b57f04b59aa229cc218853f9501004000", 0x20, 0x4e0}, {&(0x7f0000010200)="0100000000", 0x5, 0x560}, {&(0x7f0000010300)="020000000300000004000000", 0xc, 0x800}, {&(0x7f0000010400), 0x0, 0x1000}, {&(0x7f0000011500)="ed41000000080000dbf4655fdbf4655fdbf4655f00000000000004004000", 0x1e, 0x2080}, {0x0}, {0x0}, {&(0x7f0000011c00)="0b0000000c0001022e00000002000000f40702022e", 0x15, 0x10000}, {0x0}, {0x0}, {&(0x7f0000012400)="504d4d00504d4dffdbf4655f00000000647679756b6f762d676c6170746f70320000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000006c6f6f7033340075782f746573742f73797a5f6d6f756e745f696d6167655f650500"/123, 0x7b, 0x20000}, {0x0}, {0x0, 0x0, 0x38000}], 0x0, &(0x7f0000012f00)) [ 1835.137396] EXT4-fs warning (device loop4): read_mmp_block:106: Error -117 while reading MMP block 0 [ 1835.158706] loop7: detected capacity change from 0 to 2048 [ 1835.171042] EXT4-fs (loop0): bad geometry: block count 512 exceeds size of device (128 blocks) [ 1835.183186] EXT4-fs warning (device loop7): read_mmp_block:106: Error -117 while reading MMP block 0 22:39:19 executing program 4: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000480)}}, 0x0, 0xffffffefffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x100000, 0xe, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000500100000f000000000000000100000005000000000004000040000020000000dbf4655fdbf4655f0100ffff53ef010001000000dbf4655f000000000000000001000000000000000b0000008000000018000000c20500002b0200"/116, 0x74, 0x400}, {&(0x7f0000010100)="000000000000000000000000244b8e9b57f04b59aa229cc218853f9501004000", 0x20, 0x4e0}, {&(0x7f0000010200)="0100000000", 0x5, 0x560}, {&(0x7f0000010300)="020000000300000004000000", 0xc, 0x800}, {&(0x7f0000010400), 0x0, 0x1000}, {&(0x7f0000011500)="ed41000000080000dbf4655fdbf4655fdbf4655f00000000000004004000", 0x1e, 0x2080}, {0x0}, {0x0}, {&(0x7f0000011c00)="0b0000000c0001022e00000002000000f40702022e", 0x15, 0x10000}, {0x0}, {0x0}, {&(0x7f0000012400)="504d4d00504d4dffdbf4655f00000000647679756b6f762d676c6170746f70320000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000006c6f6f7033340075782f746573742f73797a5f6d6f756e745f696d6167655f650500"/123, 0x7b, 0x20000}, {0x0}, {0x0, 0x0, 0x38000}], 0x0, &(0x7f0000012f00)) 22:39:19 executing program 2: perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000480)}}, 0x0, 0xffffffefffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x100000, 0xd, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000500100000f000000000000000100000005000000000004000040000020000000dbf4655fdbf4655f0100ffff53ef010001000000dbf4655f000000000000000001000000000000000b0000008000000018000000c20500002b0200"/116, 0x74, 0x400}, {&(0x7f0000010200)="010000000000050040", 0x9, 0x560}, {&(0x7f0000010300)="020000000300000004000000", 0xc, 0x800}, {&(0x7f0000010400), 0x0, 0x1000}, {&(0x7f0000011500)="ed41000000080000dbf4655fdbf4655fdbf4655f00000000000004004000", 0x1e, 0x2080}, {0x0}, {0x0}, {&(0x7f0000011c00)="0b0000000c0001022e00000002000000f40702022e", 0x15, 0x10000}, {0x0}, {0x0}, {&(0x7f0000012400)="504d4d00504d4dffdbf4655f00000000647679756b6f762d676c6170746f70320000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000006c6f6f7033340075782f746573742f73797a5f6d6f756e745f696d6167655f650500"/123, 0x7b, 0x20000}, {0x0}, {0x0, 0x0, 0x38000}], 0x0, &(0x7f0000012f00)) 22:39:19 executing program 7: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000480)}}, 0x0, 0xffffffefffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x100000, 0xe, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000500100000f000000000000000100000005000000000004000040000020000000dbf4655fdbf4655f0100ffff53ef010001000000dbf4655f000000000000000001000000000000000b0000008000000018000000c20500002b0200"/116, 0x74, 0x400}, {&(0x7f0000010100)="000000000000000000000000244b8e9b57f04b59aa229cc218853f9501004000", 0x20, 0x4e0}, {&(0x7f0000010200)="01000000000005", 0x7, 0x560}, {&(0x7f0000010300)="020000000300000004000000", 0xc, 0x800}, {&(0x7f0000010400), 0x0, 0x1000}, {&(0x7f0000011500)="ed41000000080000dbf4655fdbf4655fdbf4655f00000000000004004000", 0x1e, 0x2080}, {0x0}, {0x0}, {&(0x7f0000011c00)="0b0000000c0001022e00000002000000f40702022e", 0x15, 0x10000}, {0x0}, {0x0}, {&(0x7f0000012400)="504d4d00504d4dffdbf4655f00000000647679756b6f762d676c6170746f70320000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000006c6f6f7033340075782f746573742f73797a5f6d6f756e745f696d6167655f650500"/123, 0x7b, 0x20000}, {0x0}, {0x0, 0x0, 0x38000}], 0x0, &(0x7f0000012f00)) 22:39:19 executing program 0: perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000480)}}, 0x0, 0xffffffefffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0xd, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000500100000f000000000000000100000005000000000004000040000020000000dbf4655fdbf4655f0100ffff53ef010001000000dbf4655f000000000000000001000000000000000b0000008000000018000000c20500002b02", 0x66, 0x400}, {&(0x7f0000010100)="000000000000000000000000244b8e9b57f04b59aa229cc218853f9501004000", 0x20, 0x4e0}, {&(0x7f0000010200)="01000000000005", 0x7, 0x560}, {&(0x7f0000010300)="020000000300000004000000", 0xc, 0x800}, {&(0x7f0000010400), 0x0, 0x1000}, {&(0x7f0000011500)="ed41000000080000dbf4655fdbf4655f", 0x10, 0x2080}, {0x0}, {0x0}, {0x0, 0x0, 0x10000}, {0x0}, {0x0}, {0x0, 0x0, 0x20000}, {0x0}], 0x0, &(0x7f0000012f00)) [ 1835.454892] loop0: detected capacity change from 0 to 512 [ 1835.487343] loop2: detected capacity change from 0 to 2048 [ 1835.492379] EXT4-fs (loop0): bad geometry: block count 512 exceeds size of device (128 blocks) [ 1835.510947] loop4: detected capacity change from 0 to 2048 [ 1835.532888] EXT4-fs (loop2): unsupported descriptor size 0 [ 1835.549169] loop7: detected capacity change from 0 to 2048 22:39:20 executing program 1: r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, @perf_config_ext, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000000), 0x0) r2 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) ioctl$EXT4_IOC_CHECKPOINT(r2, 0x4004662b, &(0x7f0000000100)=0x5) ioctl$AUTOFS_DEV_IOCTL_TIMEOUT(0xffffffffffffffff, 0xc018937a, &(0x7f0000001480)=ANY=[@ANYBLOB="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", @ANYRES32=r0, @ANYBLOB="01040000000000002e2f66696c653000"]) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r3, 0xc08c5332, &(0x7f00000013c0)={0xffffffff, 0x6964, 0x0, 'queue1\x00', 0xff}) r4 = gettid() process_vm_writev(r4, &(0x7f0000002580)=[{&(0x7f0000000140)=""/89, 0x59}, {&(0x7f00000001c0)=""/175, 0xaf}, {&(0x7f0000000280)=""/4096, 0x1000}], 0x3, &(0x7f0000003840)=[{&(0x7f0000002640)=""/105, 0x69}, {0xfffffffffffffffe, 0x10}], 0x2, 0x0) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r1, 0xc08c5332, &(0x7f0000001280)={0x3, 0x5, 0x0, 'queue1\x00', 0x8}) r5 = fork() write$sndseq(r1, &(0x7f0000001340)=[{0x22, 0x8, 0x2, 0x3, @time={0x4}, {0x0, 0x1}, {0x6, 0x81}, @raw32={[0x800, 0x3, 0x9]}}, {0xe1, 0x7, 0xf8, 0xff, @tick=0x2, {0x3f}, {0x4, 0xf1}, @queue={0xff, {0x6, 0x9}}}, {0x4, 0x1, 0x9, 0x5, @time={0x7, 0x6}, {0x7c, 0x2}, {0x20, 0x6}, @connect={{0x0, 0xfd}, {0x98, 0x4}}}, {0x80, 0x4, 0x7, 0x7d, @time={0xfffff000, 0x9}, {0x81, 0x1f}, {0xaa}, @queue={0x5, {0xffffffe0, 0x3}}}], 0x70) r6 = syz_open_dev$vcsn(&(0x7f0000000040), 0x3, 0x2001) ioctl$LOOP_CTL_GET_FREE(r6, 0x4c82) ptrace$setopts(0x4206, r5, 0x0, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fork() fork() clone3(&(0x7f0000004c00)={0xc0002100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) [ 1835.579281] EXT4-fs warning (device loop4): read_mmp_block:106: Error -117 while reading MMP block 0 [ 1835.609086] EXT4-fs warning (device loop7): read_mmp_block:106: Error -117 while reading MMP block 0 22:39:20 executing program 0: perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000480)}}, 0x0, 0xffffffefffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0xd, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000500100000f000000000000000100000005000000000004000040000020000000dbf4655fdbf4655f0100ffff53ef010001000000dbf4655f000000000000000001000000000000000b0000008000000018000000c20500002b0200000000000000", 0x6d, 0x400}, {&(0x7f0000010100)="000000000000000000000000244b8e9b57f04b59aa229cc218853f9501004000", 0x20, 0x4e0}, {&(0x7f0000010200)="01000000000005", 0x7, 0x560}, {&(0x7f0000010300)="020000000300000004000000", 0xc, 0x800}, {&(0x7f0000010400), 0x0, 0x1000}, {&(0x7f0000011500)="ed41000000080000dbf4655fdbf4655f", 0x10, 0x2080}, {0x0}, {0x0}, {0x0, 0x0, 0x10000}, {0x0}, {0x0}, {0x0, 0x0, 0x20000}, {0x0}], 0x0, &(0x7f0000012f00)) 22:39:20 executing program 2: perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000480)}}, 0x0, 0xffffffefffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x100000, 0xd, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000500100000f000000000000000100000005000000000004000040000020000000dbf4655fdbf4655f0100ffff53ef010001000000dbf4655f000000000000000001000000000000000b0000008000000018000000c20500002b0200"/116, 0x74, 0x400}, {&(0x7f0000010200)="010000000000050040", 0x9, 0x560}, {&(0x7f0000010300)="020000000300000004000000", 0xc, 0x800}, {&(0x7f0000010400), 0x0, 0x1000}, {&(0x7f0000011500)="ed41000000080000dbf4655fdbf4655fdbf4655f00000000000004004000", 0x1e, 0x2080}, {0x0}, {0x0}, {&(0x7f0000011c00)="0b0000000c0001022e00000002000000f40702022e", 0x15, 0x10000}, {0x0}, {0x0}, {&(0x7f0000012400)="504d4d00504d4dffdbf4655f00000000647679756b6f762d676c6170746f70320000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000006c6f6f7033340075782f746573742f73797a5f6d6f756e745f696d6167655f650500"/123, 0x7b, 0x20000}, {0x0}, {0x0, 0x0, 0x38000}], 0x0, &(0x7f0000012f00)) 22:39:20 executing program 4: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000480)}}, 0x0, 0xffffffefffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x100000, 0xe, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000500100000f000000000000000100000005000000000004000040000020000000dbf4655fdbf4655f0100ffff53ef010001000000dbf4655f000000000000000001000000000000000b0000008000000018000000c20500002b0200"/116, 0x74, 0x400}, {&(0x7f0000010100)="000000000000000000000000244b8e9b57f04b59aa229cc218853f9501004000", 0x20, 0x4e0}, {&(0x7f0000010200)="0100000000", 0x5, 0x560}, {&(0x7f0000010300)="020000000300000004000000", 0xc, 0x800}, {&(0x7f0000010400), 0x0, 0x1000}, {&(0x7f0000011500)="ed41000000080000dbf4655fdbf4655fdbf4655f00000000000004004000", 0x1e, 0x2080}, {0x0}, {0x0}, {&(0x7f0000011c00)="0b0000000c0001022e00000002000000f40702022e", 0x15, 0x10000}, {0x0}, {0x0}, {&(0x7f0000012400)="504d4d00504d4dffdbf4655f00000000647679756b6f762d676c6170746f70320000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000006c6f6f7033340075782f746573742f73797a5f6d6f756e745f696d6167655f650500"/123, 0x7b, 0x20000}, {0x0}, {0x0, 0x0, 0x38000}], 0x0, &(0x7f0000012f00)) 22:39:20 executing program 5: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) lsetxattr$security_evm(&(0x7f0000000240)='.\x00', &(0x7f0000000300), &(0x7f00000003c0)=@sha1={0x1, "bd2b5bce8b74aea700654a682479ac2c0852bc4d"}, 0x15, 0x3) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={&(0x7f0000000040), 0xb}, 0x0, 0x20, 0x0, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) r0 = fork() r1 = syz_open_procfs(r0, &(0x7f0000000000)='status\x00') r2 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x2, 0x0) pwrite64(r2, &(0x7f00000000c0)='9', 0x1, 0x8040000) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x20, 0x0, 0x4, 0x1, 0x0, 0x8, 0x20620, 0x2, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x3f, 0x2, @perf_config_ext={0x240000000, 0x5}, 0x1400, 0x4, 0x8, 0x7, 0x9, 0x6, 0x6, 0x0, 0x1, 0x0, 0x8}, r0, 0xa, r2, 0x1) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r3, 0x6, 0x1e, &(0x7f0000000040)=0x1, 0x4) connect$inet6(r3, &(0x7f0000000080)={0xa, 0x0, 0x0, @loopback}, 0x1c) openat$cgroup_ro(r1, &(0x7f0000000180)='blkio.throttle.io_serviced_recursive\x00', 0x0, 0x0) 22:39:20 executing program 3: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) lsetxattr$security_evm(&(0x7f0000000240)='.\x00', &(0x7f0000000300), &(0x7f00000003c0)=@sha1={0x1, "bd2b5bce8b74aea700654a682479ac2c0852bc4d"}, 0x15, 0x3) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={&(0x7f0000000040), 0xb}, 0x0, 0x20, 0x0, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) r0 = fork() r1 = syz_open_procfs(r0, &(0x7f0000000000)='status\x00') r2 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x2, 0x0) pwrite64(r2, &(0x7f00000000c0)='9', 0x1, 0x8040000) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x20, 0x3, 0x4, 0x1, 0x0, 0x8, 0x0, 0x2, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x3f, 0x2, @perf_config_ext={0x240000000, 0x5}, 0x1400, 0x4, 0x8, 0x7, 0x9, 0x6, 0x6, 0x0, 0x1, 0x0, 0x8}, r0, 0xa, r2, 0x1) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r3, 0x6, 0x1e, &(0x7f0000000040)=0x1, 0x4) setsockopt$inet6_tcp_TCP_REPAIR(r3, 0x6, 0x13, &(0x7f00000018c0)=0x1, 0x4) connect$inet6(r3, &(0x7f0000000080)={0xa, 0x0, 0x0, @loopback}, 0x1c) openat$cgroup_ro(r1, &(0x7f0000000180)='blkio.throttle.io_serviced_recursive\x00', 0x0, 0x0) 22:39:20 executing program 7: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000480)}}, 0x0, 0xffffffefffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x100000, 0xe, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000500100000f000000000000000100000005000000000004000040000020000000dbf4655fdbf4655f0100ffff53ef010001000000dbf4655f000000000000000001000000000000000b0000008000000018000000c20500002b0200"/116, 0x74, 0x400}, {&(0x7f0000010100)="000000000000000000000000244b8e9b57f04b59aa229cc218853f9501004000", 0x20, 0x4e0}, {&(0x7f0000010200)="01000000000005", 0x7, 0x560}, {&(0x7f0000010300)="020000000300000004000000", 0xc, 0x800}, {&(0x7f0000010400), 0x0, 0x1000}, {&(0x7f0000011500)="ed41000000080000dbf4655fdbf4655fdbf4655f00000000000004004000", 0x1e, 0x2080}, {0x0}, {0x0}, {&(0x7f0000011c00)="0b0000000c0001022e00000002000000f40702022e", 0x15, 0x10000}, {0x0}, {0x0}, {&(0x7f0000012400)="504d4d00504d4dffdbf4655f00000000647679756b6f762d676c6170746f70320000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000006c6f6f7033340075782f746573742f73797a5f6d6f756e745f696d6167655f650500"/123, 0x7b, 0x20000}, {0x0}, {0x0, 0x0, 0x38000}], 0x0, &(0x7f0000012f00)) 22:39:20 executing program 6: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) lsetxattr$security_evm(&(0x7f0000000240)='.\x00', &(0x7f0000000300), &(0x7f00000003c0)=@sha1={0x1, "bd2b5bce8b74aea700654a682479ac2c0852bc4d"}, 0x15, 0x3) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={&(0x7f0000000040), 0xb}, 0x0, 0x20, 0x0, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) r0 = fork() r1 = syz_open_procfs(r0, &(0x7f0000000000)='status\x00') r2 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x2, 0x0) pwrite64(r2, &(0x7f00000000c0)='9', 0x1, 0x8040000) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x20, 0x3, 0x4, 0x0, 0x0, 0x8, 0x20620, 0x2, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x3f, 0x2, @perf_config_ext={0x240000000, 0x5}, 0x1400, 0x4, 0x8, 0x7, 0x9, 0x6, 0x6, 0x0, 0x1, 0x0, 0x8}, r0, 0xa, r2, 0x1) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r3, 0x6, 0x1e, &(0x7f0000000040)=0x1, 0x4) setsockopt$inet6_tcp_TCP_REPAIR(r3, 0x6, 0x13, &(0x7f00000018c0)=0x1, 0x4) connect$inet6(r3, &(0x7f0000000080)={0xa, 0x0, 0x0, @loopback}, 0x1c) openat$cgroup_ro(r1, &(0x7f0000000180)='blkio.throttle.io_serviced_recursive\x00', 0x0, 0x0) [ 1835.817894] loop0: detected capacity change from 0 to 512 [ 1835.859579] EXT4-fs (loop0): bad geometry: block count 512 exceeds size of device (128 blocks) [ 1835.896009] loop2: detected capacity change from 0 to 2048 [ 1835.931258] loop4: detected capacity change from 0 to 2048 [ 1835.939106] EXT4-fs (loop2): unsupported descriptor size 0 [ 1835.946843] loop7: detected capacity change from 0 to 2048 [ 1835.983977] EXT4-fs warning (device loop7): read_mmp_block:106: Error -117 while reading MMP block 0 [ 1835.999169] EXT4-fs warning (device loop4): read_mmp_block:106: Error -117 while reading MMP block 0 22:39:20 executing program 0: perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000480)}}, 0x0, 0xffffffefffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0xd, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000500100000f000000000000000100000005000000000004000040000020000000dbf4655fdbf4655f0100ffff53ef010001000000dbf4655f000000000000000001000000000000000b0000008000000018000000c20500002b0200000000000000", 0x6d, 0x400}, {&(0x7f0000010100)="000000000000000000000000244b8e9b57f04b59aa229cc218853f9501004000", 0x20, 0x4e0}, {&(0x7f0000010200)="01000000000005", 0x7, 0x560}, {&(0x7f0000010300)="020000000300000004000000", 0xc, 0x800}, {&(0x7f0000010400), 0x0, 0x1000}, {&(0x7f0000011500)="ed41000000080000dbf4655fdbf4655f", 0x10, 0x2080}, {0x0}, {0x0}, {0x0, 0x0, 0x10000}, {0x0}, {0x0}, {0x0, 0x0, 0x20000}, {0x0}], 0x0, &(0x7f0000012f00)) 22:39:20 executing program 2: perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000480)}}, 0x0, 0xffffffefffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x100000, 0xd, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000500100000f000000000000000100000005000000000004000040000020000000dbf4655fdbf4655f0100ffff53ef010001000000dbf4655f000000000000000001000000000000000b0000008000000018000000c20500002b0200"/116, 0x74, 0x400}, {&(0x7f0000010200)="010000000000050040", 0x9, 0x560}, {&(0x7f0000010300)="020000000300000004000000", 0xc, 0x800}, {&(0x7f0000010400), 0x0, 0x1000}, {&(0x7f0000011500)="ed41000000080000dbf4655fdbf4655fdbf4655f00000000000004004000", 0x1e, 0x2080}, {0x0}, {0x0}, {&(0x7f0000011c00)="0b0000000c0001022e00000002000000f40702022e", 0x15, 0x10000}, {0x0}, {0x0}, {&(0x7f0000012400)="504d4d00504d4dffdbf4655f00000000647679756b6f762d676c6170746f70320000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000006c6f6f7033340075782f746573742f73797a5f6d6f756e745f696d6167655f650500"/123, 0x7b, 0x20000}, {0x0}, {0x0, 0x0, 0x38000}], 0x0, &(0x7f0000012f00)) 22:39:20 executing program 7: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000480)}}, 0x0, 0xffffffefffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x100000, 0xe, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000500100000f000000000000000100000005000000000004000040000020000000dbf4655fdbf4655f0100ffff53ef010001000000dbf4655f000000000000000001000000000000000b0000008000000018000000c20500002b0200"/116, 0x74, 0x400}, {&(0x7f0000010100)="000000000000000000000000244b8e9b57f04b59aa229cc218853f9501004000", 0x20, 0x4e0}, {&(0x7f0000010200)="01000000000005", 0x7, 0x560}, {&(0x7f0000010300)="020000000300000004000000", 0xc, 0x800}, {&(0x7f0000010400), 0x0, 0x1000}, {&(0x7f0000011500)="ed41000000080000dbf4655fdbf4655fdbf4655f00000000000004004000", 0x1e, 0x2080}, {0x0}, {0x0}, {&(0x7f0000011c00)="0b0000000c0001022e00000002000000f40702022e", 0x15, 0x10000}, {0x0}, {0x0}, {&(0x7f0000012400)="504d4d00504d4dffdbf4655f00000000647679756b6f762d676c6170746f70320000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000006c6f6f7033340075782f746573742f73797a5f6d6f756e745f696d6167655f650500"/123, 0x7b, 0x20000}, {0x0}, {0x0, 0x0, 0x38000}], 0x0, &(0x7f0000012f00)) 22:39:20 executing program 4: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000480)}}, 0x0, 0xffffffefffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x100000, 0xe, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000500100000f000000000000000100000005000000000004000040000020000000dbf4655fdbf4655f0100ffff53ef010001000000dbf4655f000000000000000001000000000000000b0000008000000018000000c20500002b0200"/116, 0x74, 0x400}, {&(0x7f0000010100)="000000000000000000000000244b8e9b57f04b59aa229cc218853f9501004000", 0x20, 0x4e0}, {&(0x7f0000010200)="01000000000005", 0x7, 0x560}, {&(0x7f0000010300)="020000000300000004000000", 0xc, 0x800}, {&(0x7f0000010400), 0x0, 0x1000}, {&(0x7f0000011500)="ed41000000080000dbf4655fdbf4655fdbf4655f00000000000004004000", 0x1e, 0x2080}, {0x0}, {0x0}, {&(0x7f0000011c00)="0b0000000c0001022e00000002000000f40702022e", 0x15, 0x10000}, {0x0}, {0x0}, {&(0x7f0000012400)="504d4d00504d4dffdbf4655f00000000647679756b6f762d676c6170746f70320000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000006c6f6f7033340075782f746573742f73797a5f6d6f756e745f696d6167655f650500"/123, 0x7b, 0x20000}, {0x0}, {0x0, 0x0, 0x38000}], 0x0, &(0x7f0000012f00)) [ 1836.220059] loop0: detected capacity change from 0 to 512 [ 1836.258418] EXT4-fs (loop0): bad geometry: block count 512 exceeds size of device (128 blocks) [ 1836.301371] loop2: detected capacity change from 0 to 2048 [ 1836.334677] loop7: detected capacity change from 0 to 2048 [ 1836.341762] EXT4-fs (loop2): unsupported descriptor size 0 [ 1836.352987] loop4: detected capacity change from 0 to 2048 [ 1836.382870] EXT4-fs warning (device loop4): read_mmp_block:106: Error -117 while reading MMP block 0 [ 1836.391005] EXT4-fs warning (device loop7): read_mmp_block:106: Error -117 while reading MMP block 0 22:39:37 executing program 2: perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000480)}}, 0x0, 0xffffffefffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x100000, 0xe, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000500100000f000000000000000100000005000000000004000040000020000000dbf4655fdbf4655f0100ffff53ef010001000000dbf4655f000000000000000001000000000000000b0000008000000018000000c20500002b0200"/116, 0x74, 0x400}, {0x0, 0x0, 0x4e0}, {&(0x7f0000010200)="010000000000050040", 0x9, 0x560}, {&(0x7f0000010300)="020000000300000004000000", 0xc, 0x800}, {&(0x7f0000010400), 0x0, 0x1000}, {&(0x7f0000011500)="ed41000000080000dbf4655fdbf4655fdbf4655f00000000000004004000", 0x1e, 0x2080}, {0x0}, {0x0}, {&(0x7f0000011c00)="0b0000000c0001022e00000002000000f40702022e", 0x15, 0x10000}, {0x0}, {0x0}, {&(0x7f0000012400)="504d4d00504d4dffdbf4655f00000000647679756b6f762d676c6170746f70320000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000006c6f6f7033340075782f746573742f73797a5f6d6f756e745f696d6167655f650500"/123, 0x7b, 0x20000}, {0x0}, {0x0, 0x0, 0x38000}], 0x0, &(0x7f0000012f00)) 22:39:37 executing program 1: r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, @perf_config_ext, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000000), 0x0) r2 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) ioctl$EXT4_IOC_CHECKPOINT(r2, 0x4004662b, &(0x7f0000000100)=0x5) ioctl$AUTOFS_DEV_IOCTL_TIMEOUT(0xffffffffffffffff, 0xc018937a, &(0x7f0000001480)=ANY=[@ANYBLOB="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", @ANYRES32=r0, @ANYBLOB="01040000000000002e2f66696c653000"]) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r3, 0xc08c5332, &(0x7f00000013c0)={0xffffffff, 0x6964, 0x0, 'queue1\x00', 0xff}) r4 = gettid() process_vm_writev(r4, &(0x7f0000002580)=[{&(0x7f0000000140)=""/89, 0x59}, {&(0x7f00000001c0)=""/175, 0xaf}, {&(0x7f0000000280)=""/4096, 0x1000}], 0x3, &(0x7f0000003840)=[{&(0x7f0000002640)=""/105, 0x69}, {0xfffffffffffffffe, 0x10}], 0x2, 0x0) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r1, 0xc08c5332, &(0x7f0000001280)={0x3, 0x5, 0x0, 'queue1\x00', 0x8}) r5 = fork() write$sndseq(r1, &(0x7f0000001340)=[{0x22, 0x8, 0x2, 0x3, @time={0x4}, {0x0, 0x1}, {0x6, 0x81}, @raw32={[0x800, 0x3, 0x9]}}, {0xe1, 0x7, 0xf8, 0xff, @tick=0x2, {0x3f}, {0x4, 0xf1}, @queue={0xff, {0x6, 0x9}}}, {0x4, 0x1, 0x9, 0x5, @time={0x7, 0x6}, {0x7c, 0x2}, {0x20, 0x6}, @connect={{0x0, 0xfd}, {0x98, 0x4}}}, {0x80, 0x4, 0x7, 0x7d, @time={0xfffff000, 0x9}, {0x81, 0x1f}, {0xaa}, @queue={0x5, {0xffffffe0, 0x3}}}], 0x70) r6 = syz_open_dev$vcsn(&(0x7f0000000040), 0x3, 0x2001) ioctl$LOOP_CTL_GET_FREE(r6, 0x4c82) ptrace$setopts(0x4206, r5, 0x0, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fork() fork() clone3(&(0x7f0000004c00)={0xc0002100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) 22:39:37 executing program 0: perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000480)}}, 0x0, 0xffffffefffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0xd, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000500100000f000000000000000100000005000000000004000040000020000000dbf4655fdbf4655f0100ffff53ef010001000000dbf4655f000000000000000001000000000000000b0000008000000018000000c20500002b0200000000000000", 0x6d, 0x400}, {&(0x7f0000010100)="000000000000000000000000244b8e9b57f04b59aa229cc218853f9501004000", 0x20, 0x4e0}, {&(0x7f0000010200)="01000000000005", 0x7, 0x560}, {&(0x7f0000010300)="020000000300000004000000", 0xc, 0x800}, {&(0x7f0000010400), 0x0, 0x1000}, {&(0x7f0000011500)="ed41000000080000dbf4655fdbf4655f", 0x10, 0x2080}, {0x0}, {0x0}, {0x0, 0x0, 0x10000}, {0x0}, {0x0}, {0x0, 0x0, 0x20000}, {0x0}], 0x0, &(0x7f0000012f00)) 22:39:37 executing program 3: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) lsetxattr$security_evm(&(0x7f0000000240)='.\x00', &(0x7f0000000300), &(0x7f00000003c0)=@sha1={0x1, "bd2b5bce8b74aea700654a682479ac2c0852bc4d"}, 0x15, 0x3) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={&(0x7f0000000040), 0xb}, 0x0, 0x20, 0x0, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) r0 = fork() r1 = syz_open_procfs(r0, &(0x7f0000000000)='status\x00') r2 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x2, 0x0) pwrite64(r2, &(0x7f00000000c0)='9', 0x1, 0x8040000) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x20, 0x3, 0x4, 0x1, 0x0, 0x8, 0x20620, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x3f, 0x2, @perf_config_ext={0x240000000, 0x5}, 0x1400, 0x4, 0x8, 0x7, 0x9, 0x6, 0x6, 0x0, 0x1, 0x0, 0x8}, r0, 0xa, r2, 0x1) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r3, 0x6, 0x1e, &(0x7f0000000040)=0x1, 0x4) setsockopt$inet6_tcp_TCP_REPAIR(r3, 0x6, 0x13, &(0x7f00000018c0)=0x1, 0x4) connect$inet6(r3, &(0x7f0000000080)={0xa, 0x0, 0x0, @loopback}, 0x1c) openat$cgroup_ro(r1, &(0x7f0000000180)='blkio.throttle.io_serviced_recursive\x00', 0x0, 0x0) 22:39:37 executing program 5: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) lsetxattr$security_evm(&(0x7f0000000240)='.\x00', &(0x7f0000000300), &(0x7f00000003c0)=@sha1={0x1, "bd2b5bce8b74aea700654a682479ac2c0852bc4d"}, 0x15, 0x3) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={&(0x7f0000000040), 0xb}, 0x0, 0x20, 0x0, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) r0 = fork() r1 = syz_open_procfs(r0, &(0x7f0000000000)='status\x00') r2 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x2, 0x0) pwrite64(r2, &(0x7f00000000c0)='9', 0x1, 0x8040000) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x20, 0x3, 0x0, 0x1, 0x0, 0x8, 0x20620, 0x2, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x3f, 0x2, @perf_config_ext={0x240000000, 0x5}, 0x1400, 0x4, 0x8, 0x7, 0x9, 0x6, 0x6, 0x0, 0x1, 0x0, 0x8}, r0, 0xa, r2, 0x1) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r3, 0x6, 0x1e, &(0x7f0000000040)=0x1, 0x4) connect$inet6(r3, &(0x7f0000000080)={0xa, 0x0, 0x0, @loopback}, 0x1c) openat$cgroup_ro(r1, &(0x7f0000000180)='blkio.throttle.io_serviced_recursive\x00', 0x0, 0x0) 22:39:37 executing program 4: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000480)}}, 0x0, 0xffffffefffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x100000, 0xe, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000500100000f000000000000000100000005000000000004000040000020000000dbf4655fdbf4655f0100ffff53ef010001000000dbf4655f000000000000000001000000000000000b0000008000000018000000c20500002b0200"/116, 0x74, 0x400}, {&(0x7f0000010100)="000000000000000000000000244b8e9b57f04b59aa229cc218853f9501004000", 0x20, 0x4e0}, {&(0x7f0000010200)="01000000000005", 0x7, 0x560}, {&(0x7f0000010300)="020000000300000004000000", 0xc, 0x800}, {&(0x7f0000010400), 0x0, 0x1000}, {&(0x7f0000011500)="ed41000000080000dbf4655fdbf4655fdbf4655f00000000000004004000", 0x1e, 0x2080}, {0x0}, {0x0}, {&(0x7f0000011c00)="0b0000000c0001022e00000002000000f40702022e", 0x15, 0x10000}, {0x0}, {0x0}, {&(0x7f0000012400)="504d4d00504d4dffdbf4655f00000000647679756b6f762d676c6170746f70320000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000006c6f6f7033340075782f746573742f73797a5f6d6f756e745f696d6167655f650500"/123, 0x7b, 0x20000}, {0x0}, {0x0, 0x0, 0x38000}], 0x0, &(0x7f0000012f00)) 22:39:37 executing program 7: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000480)}}, 0x0, 0xffffffefffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x100000, 0xe, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000500100000f000000000000000100000005000000000004000040000020000000dbf4655fdbf4655f0100ffff53ef010001000000dbf4655f000000000000000001000000000000000b0000008000000018000000c20500002b0200"/116, 0x74, 0x400}, {&(0x7f0000010100)="000000000000000000000000244b8e9b57f04b59aa229cc218853f9501004000", 0x20, 0x4e0}, {&(0x7f0000010200)="0100000000000500", 0x8, 0x560}, {&(0x7f0000010300)="020000000300000004000000", 0xc, 0x800}, {&(0x7f0000010400), 0x0, 0x1000}, {&(0x7f0000011500)="ed41000000080000dbf4655fdbf4655fdbf4655f00000000000004004000", 0x1e, 0x2080}, {0x0}, {0x0}, {&(0x7f0000011c00)="0b0000000c0001022e00000002000000f40702022e", 0x15, 0x10000}, {0x0}, {0x0}, {&(0x7f0000012400)="504d4d00504d4dffdbf4655f00000000647679756b6f762d676c6170746f70320000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000006c6f6f7033340075782f746573742f73797a5f6d6f756e745f696d6167655f650500"/123, 0x7b, 0x20000}, {0x0}, {0x0, 0x0, 0x38000}], 0x0, &(0x7f0000012f00)) 22:39:37 executing program 6: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) lsetxattr$security_evm(&(0x7f0000000240)='.\x00', &(0x7f0000000300), &(0x7f00000003c0)=@sha1={0x1, "bd2b5bce8b74aea700654a682479ac2c0852bc4d"}, 0x15, 0x3) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={&(0x7f0000000040), 0xb}, 0x0, 0x20, 0x0, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) r0 = fork() r1 = syz_open_procfs(r0, &(0x7f0000000000)='status\x00') r2 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x2, 0x0) pwrite64(r2, &(0x7f00000000c0)='9', 0x1, 0x8040000) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x20, 0x3, 0x4, 0x0, 0x0, 0x8, 0x20620, 0x2, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x3f, 0x2, @perf_config_ext={0x240000000, 0x5}, 0x1400, 0x4, 0x8, 0x7, 0x9, 0x6, 0x6, 0x0, 0x1, 0x0, 0x8}, r0, 0xa, r2, 0x1) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r3, 0x6, 0x1e, &(0x7f0000000040)=0x1, 0x4) setsockopt$inet6_tcp_TCP_REPAIR(r3, 0x6, 0x13, &(0x7f00000018c0)=0x1, 0x4) connect$inet6(r3, &(0x7f0000000080)={0xa, 0x0, 0x0, @loopback}, 0x1c) openat$cgroup_ro(r1, &(0x7f0000000180)='blkio.throttle.io_serviced_recursive\x00', 0x0, 0x0) [ 1853.255107] loop2: detected capacity change from 0 to 2048 [ 1853.260719] loop7: detected capacity change from 0 to 2048 [ 1853.261080] loop4: detected capacity change from 0 to 2048 [ 1853.272136] EXT4-fs warning (device loop7): read_mmp_block:106: Error -117 while reading MMP block 0 [ 1853.280065] EXT4-fs warning (device loop4): read_mmp_block:106: Error -117 while reading MMP block 0 [ 1853.297683] EXT4-fs (loop2): unsupported descriptor size 0 [ 1853.304971] loop0: detected capacity change from 0 to 512 22:39:37 executing program 7: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000480)}}, 0x0, 0xffffffefffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x100000, 0xe, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000500100000f000000000000000100000005000000000004000040000020000000dbf4655fdbf4655f0100ffff53ef010001000000dbf4655f000000000000000001000000000000000b0000008000000018000000c20500002b0200"/116, 0x74, 0x400}, {&(0x7f0000010100)="000000000000000000000000244b8e9b57f04b59aa229cc218853f9501004000", 0x20, 0x4e0}, {&(0x7f0000010200)="0100000000000500", 0x8, 0x560}, {&(0x7f0000010300)="020000000300000004000000", 0xc, 0x800}, {&(0x7f0000010400), 0x0, 0x1000}, {&(0x7f0000011500)="ed41000000080000dbf4655fdbf4655fdbf4655f00000000000004004000", 0x1e, 0x2080}, {0x0}, {0x0}, {&(0x7f0000011c00)="0b0000000c0001022e00000002000000f40702022e", 0x15, 0x10000}, {0x0}, {0x0}, {&(0x7f0000012400)="504d4d00504d4dffdbf4655f00000000647679756b6f762d676c6170746f70320000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000006c6f6f7033340075782f746573742f73797a5f6d6f756e745f696d6167655f650500"/123, 0x7b, 0x20000}, {0x0}, {0x0, 0x0, 0x38000}], 0x0, &(0x7f0000012f00)) [ 1853.345724] EXT4-fs (loop0): bad geometry: block count 512 exceeds size of device (128 blocks) 22:39:37 executing program 4: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000480)}}, 0x0, 0xffffffefffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x100000, 0xe, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000500100000f000000000000000100000005000000000004000040000020000000dbf4655fdbf4655f0100ffff53ef010001000000dbf4655f000000000000000001000000000000000b0000008000000018000000c20500002b0200"/116, 0x74, 0x400}, {&(0x7f0000010100)="000000000000000000000000244b8e9b57f04b59aa229cc218853f9501004000", 0x20, 0x4e0}, {&(0x7f0000010200)="01000000000005", 0x7, 0x560}, {&(0x7f0000010300)="020000000300000004000000", 0xc, 0x800}, {&(0x7f0000010400), 0x0, 0x1000}, {&(0x7f0000011500)="ed41000000080000dbf4655fdbf4655fdbf4655f00000000000004004000", 0x1e, 0x2080}, {0x0}, {0x0}, {&(0x7f0000011c00)="0b0000000c0001022e00000002000000f40702022e", 0x15, 0x10000}, {0x0}, {0x0}, {&(0x7f0000012400)="504d4d00504d4dffdbf4655f00000000647679756b6f762d676c6170746f70320000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000006c6f6f7033340075782f746573742f73797a5f6d6f756e745f696d6167655f650500"/123, 0x7b, 0x20000}, {0x0}, {0x0, 0x0, 0x38000}], 0x0, &(0x7f0000012f00)) 22:39:38 executing program 2: perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000480)}}, 0x0, 0xffffffefffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x100000, 0xe, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000500100000f000000000000000100000005000000000004000040000020000000dbf4655fdbf4655f0100ffff53ef010001000000dbf4655f000000000000000001000000000000000b0000008000000018000000c20500002b0200"/116, 0x74, 0x400}, {0x0, 0x0, 0x4e0}, {&(0x7f0000010200)="010000000000050040", 0x9, 0x560}, {&(0x7f0000010300)="020000000300000004000000", 0xc, 0x800}, {&(0x7f0000010400), 0x0, 0x1000}, {&(0x7f0000011500)="ed41000000080000dbf4655fdbf4655fdbf4655f00000000000004004000", 0x1e, 0x2080}, {0x0}, {0x0}, {&(0x7f0000011c00)="0b0000000c0001022e00000002000000f40702022e", 0x15, 0x10000}, {0x0}, {0x0}, {&(0x7f0000012400)="504d4d00504d4dffdbf4655f00000000647679756b6f762d676c6170746f70320000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000006c6f6f7033340075782f746573742f73797a5f6d6f756e745f696d6167655f650500"/123, 0x7b, 0x20000}, {0x0}, {0x0, 0x0, 0x38000}], 0x0, &(0x7f0000012f00)) 22:39:38 executing program 0: perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000480)}}, 0x0, 0xffffffefffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0xd, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000500100000f000000000000000100000005000000000004000040000020000000dbf4655fdbf4655f0100ffff53ef010001000000dbf4655f000000000000000001000000000000000b0000008000000018000000c20500002b0200"/113, 0x71, 0x400}, {&(0x7f0000010100)="000000000000000000000000244b8e9b57f04b59aa229cc218853f9501004000", 0x20, 0x4e0}, {&(0x7f0000010200)="01000000000005", 0x7, 0x560}, {&(0x7f0000010300)="020000000300000004000000", 0xc, 0x800}, {&(0x7f0000010400), 0x0, 0x1000}, {&(0x7f0000011500)="ed41000000080000dbf4655fdbf4655f", 0x10, 0x2080}, {0x0}, {0x0}, {0x0, 0x0, 0x10000}, {0x0}, {0x0}, {0x0, 0x0, 0x20000}, {0x0}], 0x0, &(0x7f0000012f00)) [ 1853.500194] loop7: detected capacity change from 0 to 2048 [ 1853.505304] loop4: detected capacity change from 0 to 2048 [ 1853.509229] loop2: detected capacity change from 0 to 2048 [ 1853.526386] EXT4-fs (loop2): unsupported descriptor size 0 [ 1853.546090] EXT4-fs warning (device loop7): read_mmp_block:106: Error -117 while reading MMP block 0 22:39:38 executing program 3: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) lsetxattr$security_evm(&(0x7f0000000240)='.\x00', &(0x7f0000000300), &(0x7f00000003c0)=@sha1={0x1, "bd2b5bce8b74aea700654a682479ac2c0852bc4d"}, 0x15, 0x3) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={&(0x7f0000000040), 0xb}, 0x0, 0x20, 0x0, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) r0 = fork() r1 = syz_open_procfs(r0, &(0x7f0000000000)='status\x00') r2 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x2, 0x0) pwrite64(r2, &(0x7f00000000c0)='9', 0x1, 0x8040000) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x20, 0x3, 0x4, 0x1, 0x0, 0x8, 0x20620, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x3f, 0x2, @perf_config_ext={0x240000000, 0x5}, 0x1400, 0x4, 0x8, 0x7, 0x9, 0x6, 0x6, 0x0, 0x1, 0x0, 0x8}, r0, 0xa, r2, 0x1) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r3, 0x6, 0x1e, &(0x7f0000000040)=0x1, 0x4) setsockopt$inet6_tcp_TCP_REPAIR(r3, 0x6, 0x13, &(0x7f00000018c0)=0x1, 0x4) connect$inet6(r3, &(0x7f0000000080)={0xa, 0x0, 0x0, @loopback}, 0x1c) openat$cgroup_ro(r1, &(0x7f0000000180)='blkio.throttle.io_serviced_recursive\x00', 0x0, 0x0) [ 1853.587946] EXT4-fs warning (device loop4): read_mmp_block:106: Error -117 while reading MMP block 0 [ 1853.646167] loop0: detected capacity change from 0 to 512 [ 1853.662162] EXT4-fs (loop0): bad geometry: block count 512 exceeds size of device (128 blocks) 22:39:55 executing program 3: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) lsetxattr$security_evm(&(0x7f0000000240)='.\x00', &(0x7f0000000300), &(0x7f00000003c0)=@sha1={0x1, "bd2b5bce8b74aea700654a682479ac2c0852bc4d"}, 0x15, 0x3) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={&(0x7f0000000040), 0xb}, 0x0, 0x20, 0x0, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) r0 = fork() r1 = syz_open_procfs(r0, &(0x7f0000000000)='status\x00') r2 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x2, 0x0) pwrite64(r2, &(0x7f00000000c0)='9', 0x1, 0x8040000) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x20, 0x3, 0x4, 0x1, 0x0, 0x8, 0x20620, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x3f, 0x2, @perf_config_ext={0x240000000, 0x5}, 0x1400, 0x4, 0x8, 0x7, 0x9, 0x6, 0x6, 0x0, 0x1, 0x0, 0x8}, r0, 0xa, r2, 0x1) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r3, 0x6, 0x1e, &(0x7f0000000040)=0x1, 0x4) setsockopt$inet6_tcp_TCP_REPAIR(r3, 0x6, 0x13, &(0x7f00000018c0)=0x1, 0x4) connect$inet6(r3, &(0x7f0000000080)={0xa, 0x0, 0x0, @loopback}, 0x1c) openat$cgroup_ro(r1, &(0x7f0000000180)='blkio.throttle.io_serviced_recursive\x00', 0x0, 0x0) [ 1871.420020] loop7: detected capacity change from 0 to 2048 [ 1871.428903] EXT4-fs warning (device loop7): read_mmp_block:106: Error -117 while reading MMP block 0 [ 1871.443959] loop0: detected capacity change from 0 to 512 22:39:55 executing program 5: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) lsetxattr$security_evm(&(0x7f0000000240)='.\x00', &(0x7f0000000300), &(0x7f00000003c0)=@sha1={0x1, "bd2b5bce8b74aea700654a682479ac2c0852bc4d"}, 0x15, 0x3) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={&(0x7f0000000040), 0xb}, 0x0, 0x20, 0x0, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) r0 = fork() r1 = syz_open_procfs(r0, &(0x7f0000000000)='status\x00') r2 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x2, 0x0) pwrite64(r2, &(0x7f00000000c0)='9', 0x1, 0x8040000) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x20, 0x3, 0x0, 0x1, 0x0, 0x8, 0x20620, 0x2, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x3f, 0x2, @perf_config_ext={0x240000000, 0x5}, 0x1400, 0x4, 0x8, 0x7, 0x9, 0x6, 0x6, 0x0, 0x1, 0x0, 0x8}, r0, 0xa, r2, 0x1) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r3, 0x6, 0x1e, &(0x7f0000000040)=0x1, 0x4) connect$inet6(r3, &(0x7f0000000080)={0xa, 0x0, 0x0, @loopback}, 0x1c) openat$cgroup_ro(r1, &(0x7f0000000180)='blkio.throttle.io_serviced_recursive\x00', 0x0, 0x0) 22:39:55 executing program 0: perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000480)}}, 0x0, 0xffffffefffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0xd, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000500100000f000000000000000100000005000000000004000040000020000000dbf4655fdbf4655f0100ffff53ef010001000000dbf4655f000000000000000001000000000000000b0000008000000018000000c20500002b0200"/113, 0x71, 0x400}, {&(0x7f0000010100)="000000000000000000000000244b8e9b57f04b59aa229cc218853f9501004000", 0x20, 0x4e0}, {&(0x7f0000010200)="01000000000005", 0x7, 0x560}, {&(0x7f0000010300)="020000000300000004000000", 0xc, 0x800}, {&(0x7f0000010400), 0x0, 0x1000}, {&(0x7f0000011500)="ed41000000080000dbf4655fdbf4655f", 0x10, 0x2080}, {0x0}, {0x0}, {0x0, 0x0, 0x10000}, {0x0}, {0x0}, {0x0, 0x0, 0x20000}, {0x0}], 0x0, &(0x7f0000012f00)) 22:39:55 executing program 4: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000480)}}, 0x0, 0xffffffefffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x100000, 0xe, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000500100000f000000000000000100000005000000000004000040000020000000dbf4655fdbf4655f0100ffff53ef010001000000dbf4655f000000000000000001000000000000000b0000008000000018000000c20500002b0200"/116, 0x74, 0x400}, {&(0x7f0000010100)="000000000000000000000000244b8e9b57f04b59aa229cc218853f9501004000", 0x20, 0x4e0}, {&(0x7f0000010200)="0100000000000500", 0x8, 0x560}, {&(0x7f0000010300)="020000000300000004000000", 0xc, 0x800}, {&(0x7f0000010400), 0x0, 0x1000}, {&(0x7f0000011500)="ed41000000080000dbf4655fdbf4655fdbf4655f00000000000004004000", 0x1e, 0x2080}, {0x0}, {0x0}, {&(0x7f0000011c00)="0b0000000c0001022e00000002000000f40702022e", 0x15, 0x10000}, {0x0}, {0x0}, {&(0x7f0000012400)="504d4d00504d4dffdbf4655f00000000647679756b6f762d676c6170746f70320000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000006c6f6f7033340075782f746573742f73797a5f6d6f756e745f696d6167655f650500"/123, 0x7b, 0x20000}, {0x0}, {0x0, 0x0, 0x38000}], 0x0, &(0x7f0000012f00)) 22:39:55 executing program 2: perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000480)}}, 0x0, 0xffffffefffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x100000, 0xe, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000500100000f000000000000000100000005000000000004000040000020000000dbf4655fdbf4655f0100ffff53ef010001000000dbf4655f000000000000000001000000000000000b0000008000000018000000c20500002b0200"/116, 0x74, 0x400}, {0x0, 0x0, 0x4e0}, {&(0x7f0000010200)="010000000000050040", 0x9, 0x560}, {&(0x7f0000010300)="020000000300000004000000", 0xc, 0x800}, {&(0x7f0000010400), 0x0, 0x1000}, {&(0x7f0000011500)="ed41000000080000dbf4655fdbf4655fdbf4655f00000000000004004000", 0x1e, 0x2080}, {0x0}, {0x0}, {&(0x7f0000011c00)="0b0000000c0001022e00000002000000f40702022e", 0x15, 0x10000}, {0x0}, {0x0}, {&(0x7f0000012400)="504d4d00504d4dffdbf4655f00000000647679756b6f762d676c6170746f70320000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000006c6f6f7033340075782f746573742f73797a5f6d6f756e745f696d6167655f650500"/123, 0x7b, 0x20000}, {0x0}, {0x0, 0x0, 0x38000}], 0x0, &(0x7f0000012f00)) 22:39:55 executing program 7: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000480)}}, 0x0, 0xffffffefffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x100000, 0xe, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000500100000f000000000000000100000005000000000004000040000020000000dbf4655fdbf4655f0100ffff53ef010001000000dbf4655f000000000000000001000000000000000b0000008000000018000000c20500002b0200"/116, 0x74, 0x400}, {&(0x7f0000010100)="000000000000000000000000244b8e9b57f04b59aa229cc218853f9501004000", 0x20, 0x4e0}, {&(0x7f0000010200)="0100000000000500", 0x8, 0x560}, {&(0x7f0000010300)="020000000300000004000000", 0xc, 0x800}, {&(0x7f0000010400), 0x0, 0x1000}, {&(0x7f0000011500)="ed41000000080000dbf4655fdbf4655fdbf4655f00000000000004004000", 0x1e, 0x2080}, {0x0}, {0x0}, {&(0x7f0000011c00)="0b0000000c0001022e00000002000000f40702022e", 0x15, 0x10000}, {0x0}, {0x0}, {&(0x7f0000012400)="504d4d00504d4dffdbf4655f00000000647679756b6f762d676c6170746f70320000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000006c6f6f7033340075782f746573742f73797a5f6d6f756e745f696d6167655f650500"/123, 0x7b, 0x20000}, {0x0}, {0x0, 0x0, 0x38000}], 0x0, &(0x7f0000012f00)) 22:39:55 executing program 1: r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, @perf_config_ext, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000000), 0x0) r2 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) ioctl$EXT4_IOC_CHECKPOINT(r2, 0x4004662b, &(0x7f0000000100)=0x5) ioctl$AUTOFS_DEV_IOCTL_TIMEOUT(0xffffffffffffffff, 0xc018937a, &(0x7f0000001480)=ANY=[@ANYBLOB="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", @ANYRES32=r0, @ANYBLOB="01040000000000002e2f66696c653000"]) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r3, 0xc08c5332, &(0x7f00000013c0)={0xffffffff, 0x6964, 0x0, 'queue1\x00', 0xff}) r4 = gettid() process_vm_writev(r4, &(0x7f0000002580)=[{&(0x7f0000000140)=""/89, 0x59}, {&(0x7f00000001c0)=""/175, 0xaf}, {&(0x7f0000000280)=""/4096, 0x1000}], 0x3, &(0x7f0000003840)=[{&(0x7f0000002640)=""/105, 0x69}, {0xfffffffffffffffe, 0x10}], 0x2, 0x0) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r1, 0xc08c5332, &(0x7f0000001280)={0x3, 0x5, 0x0, 'queue1\x00', 0x8}) r5 = fork() write$sndseq(r1, &(0x7f0000001340)=[{0x22, 0x8, 0x2, 0x3, @time={0x4}, {0x0, 0x1}, {0x6, 0x81}, @raw32={[0x800, 0x3, 0x9]}}, {0xe1, 0x7, 0xf8, 0xff, @tick=0x2, {0x3f}, {0x4, 0xf1}, @queue={0xff, {0x6, 0x9}}}, {0x4, 0x1, 0x9, 0x5, @time={0x7, 0x6}, {0x7c, 0x2}, {0x20, 0x6}, @connect={{0x0, 0xfd}, {0x98, 0x4}}}, {0x80, 0x4, 0x7, 0x7d, @time={0xfffff000, 0x9}, {0x81, 0x1f}, {0xaa}, @queue={0x5, {0xffffffe0, 0x3}}}], 0x70) r6 = syz_open_dev$vcsn(&(0x7f0000000040), 0x3, 0x2001) ioctl$LOOP_CTL_GET_FREE(r6, 0x4c82) ptrace$setopts(0x4206, r5, 0x0, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fork() fork() clone3(&(0x7f0000004c00)={0xc0002100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) 22:39:55 executing program 6: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) lsetxattr$security_evm(&(0x7f0000000240)='.\x00', &(0x7f0000000300), &(0x7f00000003c0)=@sha1={0x1, "bd2b5bce8b74aea700654a682479ac2c0852bc4d"}, 0x15, 0x3) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={&(0x7f0000000040), 0xb}, 0x0, 0x20, 0x0, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) r0 = fork() r1 = syz_open_procfs(r0, &(0x7f0000000000)='status\x00') r2 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x2, 0x0) pwrite64(r2, &(0x7f00000000c0)='9', 0x1, 0x8040000) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x20, 0x3, 0x4, 0x0, 0x0, 0x8, 0x20620, 0x2, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x3f, 0x2, @perf_config_ext={0x240000000, 0x5}, 0x1400, 0x4, 0x8, 0x7, 0x9, 0x6, 0x6, 0x0, 0x1, 0x0, 0x8}, r0, 0xa, r2, 0x1) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r3, 0x6, 0x1e, &(0x7f0000000040)=0x1, 0x4) setsockopt$inet6_tcp_TCP_REPAIR(r3, 0x6, 0x13, &(0x7f00000018c0)=0x1, 0x4) connect$inet6(r3, &(0x7f0000000080)={0xa, 0x0, 0x0, @loopback}, 0x1c) openat$cgroup_ro(r1, &(0x7f0000000180)='blkio.throttle.io_serviced_recursive\x00', 0x0, 0x0) [ 1871.451865] EXT4-fs (loop0): bad geometry: block count 512 exceeds size of device (128 blocks) [ 1871.472373] loop2: detected capacity change from 0 to 2048 [ 1871.494341] EXT4-fs (loop2): unsupported descriptor size 0 22:39:56 executing program 7: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000480)}}, 0x0, 0xffffffefffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x100000, 0xe, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000500100000f000000000000000100000005000000000004000040000020000000dbf4655fdbf4655f0100ffff53ef010001000000dbf4655f000000000000000001000000000000000b0000008000000018000000c20500002b0200"/116, 0x74, 0x400}, {&(0x7f0000010100)="000000000000000000000000244b8e9b57f04b59aa229cc218853f9501004000", 0x20, 0x4e0}, {&(0x7f0000010200)="010000000000050040", 0x9}, {&(0x7f0000010300)="020000000300000004000000", 0xc, 0x800}, {&(0x7f0000010400), 0x0, 0x1000}, {&(0x7f0000011500)="ed41000000080000dbf4655fdbf4655fdbf4655f00000000000004004000", 0x1e, 0x2080}, {0x0}, {0x0}, {&(0x7f0000011c00)="0b0000000c0001022e00000002000000f40702022e", 0x15, 0x10000}, {0x0}, {0x0}, {&(0x7f0000012400)="504d4d00504d4dffdbf4655f00000000647679756b6f762d676c6170746f70320000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000006c6f6f7033340075782f746573742f73797a5f6d6f756e745f696d6167655f650500"/123, 0x7b, 0x20000}, {0x0}, {0x0, 0x0, 0x38000}], 0x0, &(0x7f0000012f00)) [ 1871.502940] loop4: detected capacity change from 0 to 2048 [ 1871.539915] EXT4-fs warning (device loop4): read_mmp_block:106: Error -117 while reading MMP block 0 22:39:56 executing program 0: perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000480)}}, 0x0, 0xffffffefffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0xd, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000500100000f000000000000000100000005000000000004000040000020000000dbf4655fdbf4655f0100ffff53ef010001000000dbf4655f000000000000000001000000000000000b0000008000000018000000c20500002b0200"/113, 0x71, 0x400}, {&(0x7f0000010100)="000000000000000000000000244b8e9b57f04b59aa229cc218853f9501004000", 0x20, 0x4e0}, {&(0x7f0000010200)="01000000000005", 0x7, 0x560}, {&(0x7f0000010300)="020000000300000004000000", 0xc, 0x800}, {&(0x7f0000010400), 0x0, 0x1000}, {&(0x7f0000011500)="ed41000000080000dbf4655fdbf4655f", 0x10, 0x2080}, {0x0}, {0x0}, {0x0, 0x0, 0x10000}, {0x0}, {0x0}, {0x0, 0x0, 0x20000}, {0x0}], 0x0, &(0x7f0000012f00)) [ 1871.579854] loop7: detected capacity change from 0 to 2048 22:39:56 executing program 2: perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000480)}}, 0x0, 0xffffffefffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x100000, 0xe, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000500100000f000000000000000100000005000000000004000040000020000000dbf4655fdbf4655f0100ffff53ef010001000000dbf4655f000000000000000001000000000000000b0000008000000018000000c20500002b0200"/116, 0x74, 0x400}, {&(0x7f0000010100), 0x0, 0x4e0}, {&(0x7f0000010200)="010000000000050040", 0x9, 0x560}, {&(0x7f0000010300)="020000000300000004000000", 0xc, 0x800}, {&(0x7f0000010400), 0x0, 0x1000}, {&(0x7f0000011500)="ed41000000080000dbf4655fdbf4655fdbf4655f00000000000004004000", 0x1e, 0x2080}, {0x0}, {0x0}, {&(0x7f0000011c00)="0b0000000c0001022e00000002000000f40702022e", 0x15, 0x10000}, {0x0}, {0x0}, {&(0x7f0000012400)="504d4d00504d4dffdbf4655f00000000647679756b6f762d676c6170746f70320000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000006c6f6f7033340075782f746573742f73797a5f6d6f756e745f696d6167655f650500"/123, 0x7b, 0x20000}, {0x0}, {0x0, 0x0, 0x38000}], 0x0, &(0x7f0000012f00)) [ 1871.608763] EXT4-fs warning (device loop7): read_mmp_block:106: Error -117 while reading MMP block 0 22:39:56 executing program 1: r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, @perf_config_ext, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000000), 0x0) r2 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) ioctl$EXT4_IOC_CHECKPOINT(r2, 0x4004662b, &(0x7f0000000100)=0x5) ioctl$AUTOFS_DEV_IOCTL_TIMEOUT(0xffffffffffffffff, 0xc018937a, &(0x7f0000001480)=ANY=[@ANYBLOB="010000fe04f804f32d1ae95f4d8fd9ce99ff00010000001800000059a5a91fc707002c3e05f0bcf35234dd60eedec3d5f1b58f0d41f6996d0df70b25316c86b91cf6440f87695b3e2bf9118d7b986e6dd6169cde2d7b35569ff3c18ea708da093a5e297fd2ec2322a167617fa6662e65407cedfd90d2ee90deccf04f2c85b215e5090cb50628f934703c2db873b5eb9a2e276f987493cc445a8474761879f6df5a5233b80656c014a59590366f77d5104d838160f3f8f304bbfb07a672117635569099d752c2b724b38b74a3b0e2c4dd54619ff2e05de8c58ace02796bd997ccfd3fbf04c5bb7420f2656931eb46c8e72d17fd9b33dd84ff6fab17ff995be40bf9a47cdde574665966c721e5f265d3aaac1788", @ANYRES32=r0, @ANYBLOB="01040000000000002e2f66696c653000"]) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r3, 0xc08c5332, &(0x7f00000013c0)={0xffffffff, 0x6964, 0x0, 'queue1\x00', 0xff}) r4 = gettid() process_vm_writev(r4, &(0x7f0000002580)=[{&(0x7f0000000140)=""/89, 0x59}, {&(0x7f00000001c0)=""/175, 0xaf}, {&(0x7f0000000280)=""/4096, 0x1000}], 0x3, &(0x7f0000003840)=[{&(0x7f0000002640)=""/105, 0x69}, {0xfffffffffffffffe, 0x10}], 0x2, 0x0) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r1, 0xc08c5332, &(0x7f0000001280)={0x3, 0x5, 0x0, 'queue1\x00', 0x8}) r5 = fork() write$sndseq(r1, &(0x7f0000001340)=[{0x22, 0x8, 0x2, 0x3, @time={0x4}, {0x0, 0x1}, {0x6, 0x81}, @raw32={[0x800, 0x3, 0x9]}}, {0xe1, 0x7, 0xf8, 0xff, @tick=0x2, {0x3f}, {0x4, 0xf1}, @queue={0xff, {0x6, 0x9}}}, {0x4, 0x1, 0x9, 0x5, @time={0x7, 0x6}, {0x7c, 0x2}, {0x20, 0x6}, @connect={{0x0, 0xfd}, {0x98, 0x4}}}, {0x80, 0x4, 0x7, 0x7d, @time={0xfffff000, 0x9}, {0x81, 0x1f}, {0xaa}, @queue={0x5, {0xffffffe0, 0x3}}}], 0x70) r6 = syz_open_dev$vcsn(&(0x7f0000000040), 0x3, 0x2001) ioctl$LOOP_CTL_GET_FREE(r6, 0x4c82) ptrace$setopts(0x4206, r5, 0x0, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fork() fork() clone3(&(0x7f0000004c00)={0xc0002100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) [ 1871.656004] loop0: detected capacity change from 0 to 512 [ 1871.689298] EXT4-fs (loop0): bad geometry: block count 512 exceeds size of device (128 blocks) 22:39:56 executing program 7: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000480)}}, 0x0, 0xffffffefffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x100000, 0xe, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000500100000f000000000000000100000005000000000004000040000020000000dbf4655fdbf4655f0100ffff53ef010001000000dbf4655f000000000000000001000000000000000b0000008000000018000000c20500002b0200"/116, 0x74, 0x400}, {&(0x7f0000010100)="000000000000000000000000244b8e9b57f04b59aa229cc218853f9501004000", 0x20, 0x4e0}, {&(0x7f0000010200)="010000000000050040", 0x9}, {&(0x7f0000010300)="020000000300000004000000", 0xc, 0x800}, {&(0x7f0000010400), 0x0, 0x1000}, {&(0x7f0000011500)="ed41000000080000dbf4655fdbf4655fdbf4655f00000000000004004000", 0x1e, 0x2080}, {0x0}, {0x0}, {&(0x7f0000011c00)="0b0000000c0001022e00000002000000f40702022e", 0x15, 0x10000}, {0x0}, {0x0}, {&(0x7f0000012400)="504d4d00504d4dffdbf4655f00000000647679756b6f762d676c6170746f70320000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000006c6f6f7033340075782f746573742f73797a5f6d6f756e745f696d6167655f650500"/123, 0x7b, 0x20000}, {0x0}, {0x0, 0x0, 0x38000}], 0x0, &(0x7f0000012f00)) 22:39:56 executing program 4: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000480)}}, 0x0, 0xffffffefffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x100000, 0xe, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000500100000f000000000000000100000005000000000004000040000020000000dbf4655fdbf4655f0100ffff53ef010001000000dbf4655f000000000000000001000000000000000b0000008000000018000000c20500002b0200"/116, 0x74, 0x400}, {&(0x7f0000010100)="000000000000000000000000244b8e9b57f04b59aa229cc218853f9501004000", 0x20, 0x4e0}, {&(0x7f0000010200)="0100000000000500", 0x8, 0x560}, {&(0x7f0000010300)="020000000300000004000000", 0xc, 0x800}, {&(0x7f0000010400), 0x0, 0x1000}, {&(0x7f0000011500)="ed41000000080000dbf4655fdbf4655fdbf4655f00000000000004004000", 0x1e, 0x2080}, {0x0}, {0x0}, {&(0x7f0000011c00)="0b0000000c0001022e00000002000000f40702022e", 0x15, 0x10000}, {0x0}, {0x0}, {&(0x7f0000012400)="504d4d00504d4dffdbf4655f00000000647679756b6f762d676c6170746f70320000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000006c6f6f7033340075782f746573742f73797a5f6d6f756e745f696d6167655f650500"/123, 0x7b, 0x20000}, {0x0}, {0x0, 0x0, 0x38000}], 0x0, &(0x7f0000012f00)) [ 1871.789380] loop2: detected capacity change from 0 to 2048 [ 1871.822931] EXT4-fs (loop2): unsupported descriptor size 0 22:39:56 executing program 0: perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000480)}}, 0x0, 0xffffffefffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0xd, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000500100000f000000000000000100000005000000000004000040000020000000dbf4655fdbf4655f0100ffff53ef010001000000dbf4655f000000000000000001000000000000000b0000008000000018000000c20500002b0200"/115, 0x73, 0x400}, {&(0x7f0000010100)="000000000000000000000000244b8e9b57f04b59aa229cc218853f9501004000", 0x20, 0x4e0}, {&(0x7f0000010200)="01000000000005", 0x7, 0x560}, {&(0x7f0000010300)="020000000300000004000000", 0xc, 0x800}, {&(0x7f0000010400), 0x0, 0x1000}, {&(0x7f0000011500)="ed41000000080000dbf4655fdbf4655f", 0x10, 0x2080}, {0x0}, {0x0}, {0x0, 0x0, 0x10000}, {0x0}, {0x0}, {0x0, 0x0, 0x20000}, {0x0}], 0x0, &(0x7f0000012f00)) 22:39:56 executing program 3: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) lsetxattr$security_evm(&(0x7f0000000240)='.\x00', &(0x7f0000000300), &(0x7f00000003c0)=@sha1={0x1, "bd2b5bce8b74aea700654a682479ac2c0852bc4d"}, 0x15, 0x3) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={&(0x7f0000000040), 0xb}, 0x0, 0x20, 0x0, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) r0 = fork() r1 = syz_open_procfs(r0, &(0x7f0000000000)='status\x00') r2 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x2, 0x0) pwrite64(r2, &(0x7f00000000c0)='9', 0x1, 0x8040000) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x20, 0x3, 0x4, 0x1, 0x0, 0x8, 0x20620, 0x2, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x3f, 0x2, @perf_config_ext={0x240000000, 0x5}, 0x1400, 0x4, 0x8, 0x7, 0x9, 0x6, 0x6, 0x0, 0x1, 0x0, 0x8}, r0, 0xa, r2, 0x1) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r3, 0x6, 0x1e, &(0x7f0000000040)=0x1, 0x4) setsockopt$inet6_tcp_TCP_REPAIR(r3, 0x6, 0x13, &(0x7f00000018c0)=0x1, 0x4) connect$inet6(r3, &(0x7f0000000080)={0xa, 0x0, 0x0, @loopback}, 0x1c) openat$cgroup_ro(r1, &(0x7f0000000180)='blkio.throttle.io_serviced_recursive\x00', 0x0, 0x0) [ 1871.937196] loop4: detected capacity change from 0 to 2048 22:39:56 executing program 7: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000480)}}, 0x0, 0xffffffefffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x100000, 0xe, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000500100000f000000000000000100000005000000000004000040000020000000dbf4655fdbf4655f0100ffff53ef010001000000dbf4655f000000000000000001000000000000000b0000008000000018000000c20500002b0200"/116, 0x74, 0x400}, {&(0x7f0000010100)="000000000000000000000000244b8e9b57f04b59aa229cc218853f9501004000", 0x20, 0x4e0}, {&(0x7f0000010200)="010000000000050040", 0x9}, {&(0x7f0000010300)="020000000300000004000000", 0xc, 0x800}, {&(0x7f0000010400), 0x0, 0x1000}, {&(0x7f0000011500)="ed41000000080000dbf4655fdbf4655fdbf4655f00000000000004004000", 0x1e, 0x2080}, {0x0}, {0x0}, {&(0x7f0000011c00)="0b0000000c0001022e00000002000000f40702022e", 0x15, 0x10000}, {0x0}, {0x0}, {&(0x7f0000012400)="504d4d00504d4dffdbf4655f00000000647679756b6f762d676c6170746f70320000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000006c6f6f7033340075782f746573742f73797a5f6d6f756e745f696d6167655f650500"/123, 0x7b, 0x20000}, {0x0}, {0x0, 0x0, 0x38000}], 0x0, &(0x7f0000012f00)) [ 1872.000068] loop0: detected capacity change from 0 to 512 [ 1872.007057] EXT4-fs warning (device loop4): read_mmp_block:106: Error -117 while reading MMP block 0 [ 1872.037889] EXT4-fs (loop0): bad geometry: block count 512 exceeds size of device (128 blocks) [ 1872.112361] loop7: detected capacity change from 0 to 2048 [ 1872.143745] EXT4-fs warning (device loop7): read_mmp_block:106: Error -117 while reading MMP block 0 22:39:56 executing program 5: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) lsetxattr$security_evm(&(0x7f0000000240)='.\x00', &(0x7f0000000300), &(0x7f00000003c0)=@sha1={0x1, "bd2b5bce8b74aea700654a682479ac2c0852bc4d"}, 0x15, 0x3) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={&(0x7f0000000040), 0xb}, 0x0, 0x20, 0x0, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) r0 = fork() r1 = syz_open_procfs(r0, &(0x7f0000000000)='status\x00') r2 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x2, 0x0) pwrite64(r2, &(0x7f00000000c0)='9', 0x1, 0x8040000) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x20, 0x3, 0x0, 0x1, 0x0, 0x8, 0x20620, 0x2, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x3f, 0x2, @perf_config_ext={0x240000000, 0x5}, 0x1400, 0x4, 0x8, 0x7, 0x9, 0x6, 0x6, 0x0, 0x1, 0x0, 0x8}, r0, 0xa, r2, 0x1) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r3, 0x6, 0x1e, &(0x7f0000000040)=0x1, 0x4) connect$inet6(r3, &(0x7f0000000080)={0xa, 0x0, 0x0, @loopback}, 0x1c) openat$cgroup_ro(r1, &(0x7f0000000180)='blkio.throttle.io_serviced_recursive\x00', 0x0, 0x0) 22:39:56 executing program 2: perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000480)}}, 0x0, 0xffffffefffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x100000, 0xe, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000500100000f000000000000000100000005000000000004000040000020000000dbf4655fdbf4655f0100ffff53ef010001000000dbf4655f000000000000000001000000000000000b0000008000000018000000c20500002b0200"/116, 0x74, 0x400}, {&(0x7f0000010100), 0x0, 0x4e0}, {&(0x7f0000010200)="010000000000050040", 0x9, 0x560}, {&(0x7f0000010300)="020000000300000004000000", 0xc, 0x800}, {&(0x7f0000010400), 0x0, 0x1000}, {&(0x7f0000011500)="ed41000000080000dbf4655fdbf4655fdbf4655f00000000000004004000", 0x1e, 0x2080}, {0x0}, {0x0}, {&(0x7f0000011c00)="0b0000000c0001022e00000002000000f40702022e", 0x15, 0x10000}, {0x0}, {0x0}, {&(0x7f0000012400)="504d4d00504d4dffdbf4655f00000000647679756b6f762d676c6170746f70320000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000006c6f6f7033340075782f746573742f73797a5f6d6f756e745f696d6167655f650500"/123, 0x7b, 0x20000}, {0x0}, {0x0, 0x0, 0x38000}], 0x0, &(0x7f0000012f00)) 22:39:56 executing program 0: perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000480)}}, 0x0, 0xffffffefffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0xd, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000500100000f000000000000000100000005000000000004000040000020000000dbf4655fdbf4655f0100ffff53ef010001000000dbf4655f000000000000000001000000000000000b0000008000000018000000c20500002b0200"/115, 0x73, 0x400}, {&(0x7f0000010100)="000000000000000000000000244b8e9b57f04b59aa229cc218853f9501004000", 0x20, 0x4e0}, {&(0x7f0000010200)="01000000000005", 0x7, 0x560}, {&(0x7f0000010300)="020000000300000004000000", 0xc, 0x800}, {&(0x7f0000010400), 0x0, 0x1000}, {&(0x7f0000011500)="ed41000000080000dbf4655fdbf4655f", 0x10, 0x2080}, {0x0}, {0x0}, {0x0, 0x0, 0x10000}, {0x0}, {0x0}, {0x0, 0x0, 0x20000}, {0x0}], 0x0, &(0x7f0000012f00)) 22:39:56 executing program 4: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000480)}}, 0x0, 0xffffffefffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x100000, 0xe, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000500100000f000000000000000100000005000000000004000040000020000000dbf4655fdbf4655f0100ffff53ef010001000000dbf4655f000000000000000001000000000000000b0000008000000018000000c20500002b0200"/116, 0x74, 0x400}, {&(0x7f0000010100)="000000000000000000000000244b8e9b57f04b59aa229cc218853f9501004000", 0x20, 0x4e0}, {&(0x7f0000010200)="0100000000000500", 0x8, 0x560}, {&(0x7f0000010300)="020000000300000004000000", 0xc, 0x800}, {&(0x7f0000010400), 0x0, 0x1000}, {&(0x7f0000011500)="ed41000000080000dbf4655fdbf4655fdbf4655f00000000000004004000", 0x1e, 0x2080}, {0x0}, {0x0}, {&(0x7f0000011c00)="0b0000000c0001022e00000002000000f40702022e", 0x15, 0x10000}, {0x0}, {0x0}, {&(0x7f0000012400)="504d4d00504d4dffdbf4655f00000000647679756b6f762d676c6170746f70320000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000006c6f6f7033340075782f746573742f73797a5f6d6f756e745f696d6167655f650500"/123, 0x7b, 0x20000}, {0x0}, {0x0, 0x0, 0x38000}], 0x0, &(0x7f0000012f00)) [ 1872.319948] loop0: detected capacity change from 0 to 512 [ 1872.324062] loop2: detected capacity change from 0 to 2048 [ 1872.355102] EXT4-fs (loop2): unsupported descriptor size 0 [ 1872.365150] loop4: detected capacity change from 0 to 2048 [ 1872.369064] EXT4-fs (loop0): bad geometry: block count 512 exceeds size of device (128 blocks) [ 1872.410955] EXT4-fs warning (device loop4): read_mmp_block:106: Error -117 while reading MMP block 0 22:40:15 executing program 5: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) lsetxattr$security_evm(&(0x7f0000000240)='.\x00', &(0x7f0000000300), &(0x7f00000003c0)=@sha1={0x1, "bd2b5bce8b74aea700654a682479ac2c0852bc4d"}, 0x15, 0x3) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={&(0x7f0000000040), 0xb}, 0x0, 0x20, 0x0, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) r0 = fork() r1 = syz_open_procfs(r0, &(0x7f0000000000)='status\x00') r2 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x2, 0x0) pwrite64(r2, &(0x7f00000000c0)='9', 0x1, 0x8040000) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x20, 0x3, 0x4, 0x0, 0x0, 0x8, 0x20620, 0x2, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x3f, 0x2, @perf_config_ext={0x240000000, 0x5}, 0x1400, 0x4, 0x8, 0x7, 0x9, 0x6, 0x6, 0x0, 0x1, 0x0, 0x8}, r0, 0xa, r2, 0x1) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r3, 0x6, 0x1e, &(0x7f0000000040)=0x1, 0x4) connect$inet6(r3, &(0x7f0000000080)={0xa, 0x0, 0x0, @loopback}, 0x1c) openat$cgroup_ro(r1, &(0x7f0000000180)='blkio.throttle.io_serviced_recursive\x00', 0x0, 0x0) 22:40:15 executing program 3: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) lsetxattr$security_evm(&(0x7f0000000240)='.\x00', &(0x7f0000000300), &(0x7f00000003c0)=@sha1={0x1, "bd2b5bce8b74aea700654a682479ac2c0852bc4d"}, 0x15, 0x3) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={&(0x7f0000000040), 0xb}, 0x0, 0x20, 0x0, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) r0 = fork() r1 = syz_open_procfs(r0, &(0x7f0000000000)='status\x00') r2 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x2, 0x0) pwrite64(r2, &(0x7f00000000c0)='9', 0x1, 0x8040000) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x20, 0x3, 0x4, 0x1, 0x0, 0x8, 0x20620, 0x2, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x3f, 0x2, @perf_config_ext={0x240000000, 0x5}, 0x1400, 0x4, 0x8, 0x7, 0x9, 0x6, 0x6, 0x0, 0x1, 0x0, 0x8}, r0, 0xa, r2, 0x1) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r3, 0x6, 0x1e, &(0x7f0000000040)=0x1, 0x4) setsockopt$inet6_tcp_TCP_REPAIR(r3, 0x6, 0x13, &(0x7f00000018c0)=0x1, 0x4) connect$inet6(r3, &(0x7f0000000080)={0xa, 0x0, 0x0, @loopback}, 0x1c) openat$cgroup_ro(r1, &(0x7f0000000180)='blkio.throttle.io_serviced_recursive\x00', 0x0, 0x0) 22:40:15 executing program 6: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) lsetxattr$security_evm(&(0x7f0000000240)='.\x00', &(0x7f0000000300), &(0x7f00000003c0)=@sha1={0x1, "bd2b5bce8b74aea700654a682479ac2c0852bc4d"}, 0x15, 0x3) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={&(0x7f0000000040), 0xb}, 0x0, 0x20, 0x0, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) r0 = fork() r1 = syz_open_procfs(r0, &(0x7f0000000000)='status\x00') r2 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x2, 0x0) pwrite64(r2, &(0x7f00000000c0)='9', 0x1, 0x8040000) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x20, 0x3, 0x4, 0x1, 0x0, 0x0, 0x20620, 0x2, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x3f, 0x2, @perf_config_ext={0x240000000, 0x5}, 0x1400, 0x4, 0x8, 0x7, 0x9, 0x6, 0x6, 0x0, 0x1, 0x0, 0x8}, r0, 0xa, r2, 0x1) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r3, 0x6, 0x1e, &(0x7f0000000040)=0x1, 0x4) setsockopt$inet6_tcp_TCP_REPAIR(r3, 0x6, 0x13, &(0x7f00000018c0)=0x1, 0x4) connect$inet6(r3, &(0x7f0000000080)={0xa, 0x0, 0x0, @loopback}, 0x1c) openat$cgroup_ro(r1, &(0x7f0000000180)='blkio.throttle.io_serviced_recursive\x00', 0x0, 0x0) 22:40:15 executing program 2: perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000480)}}, 0x0, 0xffffffefffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x100000, 0xe, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000500100000f000000000000000100000005000000000004000040000020000000dbf4655fdbf4655f0100ffff53ef010001000000dbf4655f000000000000000001000000000000000b0000008000000018000000c20500002b0200"/116, 0x74, 0x400}, {&(0x7f0000010100), 0x0, 0x4e0}, {&(0x7f0000010200)="010000000000050040", 0x9, 0x560}, {&(0x7f0000010300)="020000000300000004000000", 0xc, 0x800}, {&(0x7f0000010400), 0x0, 0x1000}, {&(0x7f0000011500)="ed41000000080000dbf4655fdbf4655fdbf4655f00000000000004004000", 0x1e, 0x2080}, {0x0}, {0x0}, {&(0x7f0000011c00)="0b0000000c0001022e00000002000000f40702022e", 0x15, 0x10000}, {0x0}, {0x0}, {&(0x7f0000012400)="504d4d00504d4dffdbf4655f00000000647679756b6f762d676c6170746f70320000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000006c6f6f7033340075782f746573742f73797a5f6d6f756e745f696d6167655f650500"/123, 0x7b, 0x20000}, {0x0}, {0x0, 0x0, 0x38000}], 0x0, &(0x7f0000012f00)) 22:40:15 executing program 7: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000480)}}, 0x0, 0xffffffefffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x100000, 0xd, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000500100000f000000000000000100000005000000000004000040000020000000dbf4655fdbf4655f0100ffff53ef010001000000dbf4655f000000000000000001000000000000000b0000008000000018000000c20500002b0200"/116, 0x74, 0x400}, {&(0x7f0000010200)="010000000000050040", 0x9, 0x560}, {&(0x7f0000010300)="020000000300000004000000", 0xc, 0x800}, {&(0x7f0000010400), 0x0, 0x1000}, {&(0x7f0000011500)="ed41000000080000dbf4655fdbf4655fdbf4655f00000000000004004000", 0x1e, 0x2080}, {0x0}, {0x0}, {&(0x7f0000011c00)="0b0000000c0001022e00000002000000f40702022e", 0x15, 0x10000}, {0x0}, {0x0}, {&(0x7f0000012400)="504d4d00504d4dffdbf4655f00000000647679756b6f762d676c6170746f70320000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000006c6f6f7033340075782f746573742f73797a5f6d6f756e745f696d6167655f650500"/123, 0x7b, 0x20000}, {0x0}, {0x0, 0x0, 0x38000}], 0x0, &(0x7f0000012f00)) 22:40:15 executing program 1: r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, @perf_config_ext, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000000), 0x0) r2 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) ioctl$EXT4_IOC_CHECKPOINT(r2, 0x4004662b, &(0x7f0000000100)=0x5) ioctl$AUTOFS_DEV_IOCTL_TIMEOUT(0xffffffffffffffff, 0xc018937a, &(0x7f0000001480)=ANY=[@ANYBLOB="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", @ANYRES32=r0, @ANYBLOB="01040000000000002e2f66696c653000"]) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r3, 0xc08c5332, &(0x7f00000013c0)={0xffffffff, 0x6964, 0x0, 'queue1\x00', 0xff}) r4 = gettid() process_vm_writev(r4, &(0x7f0000002580)=[{&(0x7f0000000140)=""/89, 0x59}, {&(0x7f00000001c0)=""/175, 0xaf}, {&(0x7f0000000280)=""/4096, 0x1000}], 0x3, &(0x7f0000003840)=[{&(0x7f0000002640)=""/105, 0x69}, {0xfffffffffffffffe, 0x10}], 0x2, 0x0) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r1, 0xc08c5332, &(0x7f0000001280)={0x3, 0x5, 0x0, 'queue1\x00', 0x8}) r5 = fork() write$sndseq(r1, &(0x7f0000001340)=[{0x22, 0x8, 0x2, 0x3, @time={0x4}, {0x0, 0x1}, {0x6, 0x81}, @raw32={[0x800, 0x3, 0x9]}}, {0xe1, 0x7, 0xf8, 0xff, @tick=0x2, {0x3f}, {0x4, 0xf1}, @queue={0xff, {0x6, 0x9}}}, {0x4, 0x1, 0x9, 0x5, @time={0x7, 0x6}, {0x7c, 0x2}, {0x20, 0x6}, @connect={{0x0, 0xfd}, {0x98, 0x4}}}, {0x80, 0x4, 0x7, 0x7d, @time={0xfffff000, 0x9}, {0x81, 0x1f}, {0xaa}, @queue={0x5, {0xffffffe0, 0x3}}}], 0x70) r6 = syz_open_dev$vcsn(&(0x7f0000000040), 0x3, 0x2001) ioctl$LOOP_CTL_GET_FREE(r6, 0x4c82) ptrace$setopts(0x4206, r5, 0x0, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fork() fork() clone3(&(0x7f0000004c00)={0xc0002100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) 22:40:15 executing program 4: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000480)}}, 0x0, 0xffffffefffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x100000, 0xe, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000500100000f000000000000000100000005000000000004000040000020000000dbf4655fdbf4655f0100ffff53ef010001000000dbf4655f000000000000000001000000000000000b0000008000000018000000c20500002b0200"/116, 0x74, 0x400}, {&(0x7f0000010100)="000000000000000000000000244b8e9b57f04b59aa229cc218853f9501004000", 0x20, 0x4e0}, {&(0x7f0000010200)="010000000000050040", 0x9}, {&(0x7f0000010300)="020000000300000004000000", 0xc, 0x800}, {&(0x7f0000010400), 0x0, 0x1000}, {&(0x7f0000011500)="ed41000000080000dbf4655fdbf4655fdbf4655f00000000000004004000", 0x1e, 0x2080}, {0x0}, {0x0}, {&(0x7f0000011c00)="0b0000000c0001022e00000002000000f40702022e", 0x15, 0x10000}, {0x0}, {0x0}, {&(0x7f0000012400)="504d4d00504d4dffdbf4655f00000000647679756b6f762d676c6170746f70320000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000006c6f6f7033340075782f746573742f73797a5f6d6f756e745f696d6167655f650500"/123, 0x7b, 0x20000}, {0x0}, {0x0, 0x0, 0x38000}], 0x0, &(0x7f0000012f00)) 22:40:15 executing program 0: perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000480)}}, 0x0, 0xffffffefffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0xd, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000500100000f000000000000000100000005000000000004000040000020000000dbf4655fdbf4655f0100ffff53ef010001000000dbf4655f000000000000000001000000000000000b0000008000000018000000c20500002b0200"/115, 0x73, 0x400}, {&(0x7f0000010100)="000000000000000000000000244b8e9b57f04b59aa229cc218853f9501004000", 0x20, 0x4e0}, {&(0x7f0000010200)="01000000000005", 0x7, 0x560}, {&(0x7f0000010300)="020000000300000004000000", 0xc, 0x800}, {&(0x7f0000010400), 0x0, 0x1000}, {&(0x7f0000011500)="ed41000000080000dbf4655fdbf4655f", 0x10, 0x2080}, {0x0}, {0x0}, {0x0, 0x0, 0x10000}, {0x0}, {0x0}, {0x0, 0x0, 0x20000}, {0x0}], 0x0, &(0x7f0000012f00)) [ 1891.182746] loop7: detected capacity change from 0 to 2048 [ 1891.187319] loop4: detected capacity change from 0 to 2048 [ 1891.201280] EXT4-fs (loop7): unsupported descriptor size 0 [ 1891.201456] loop0: detected capacity change from 0 to 512 [ 1891.203270] loop2: detected capacity change from 0 to 2048 [ 1891.205344] EXT4-fs warning (device loop4): read_mmp_block:106: Error -117 while reading MMP block 0 [ 1891.238643] EXT4-fs (loop0): bad geometry: block count 512 exceeds size of device (128 blocks) [ 1891.246714] EXT4-fs (loop2): unsupported descriptor size 0 22:40:15 executing program 7: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000480)}}, 0x0, 0xffffffefffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x100000, 0xd, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000500100000f000000000000000100000005000000000004000040000020000000dbf4655fdbf4655f0100ffff53ef010001000000dbf4655f000000000000000001000000000000000b0000008000000018000000c20500002b0200"/116, 0x74, 0x400}, {&(0x7f0000010200)="010000000000050040", 0x9, 0x560}, {&(0x7f0000010300)="020000000300000004000000", 0xc, 0x800}, {&(0x7f0000010400), 0x0, 0x1000}, {&(0x7f0000011500)="ed41000000080000dbf4655fdbf4655fdbf4655f00000000000004004000", 0x1e, 0x2080}, {0x0}, {0x0}, {&(0x7f0000011c00)="0b0000000c0001022e00000002000000f40702022e", 0x15, 0x10000}, {0x0}, {0x0}, {&(0x7f0000012400)="504d4d00504d4dffdbf4655f00000000647679756b6f762d676c6170746f70320000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000006c6f6f7033340075782f746573742f73797a5f6d6f756e745f696d6167655f650500"/123, 0x7b, 0x20000}, {0x0}, {0x0, 0x0, 0x38000}], 0x0, &(0x7f0000012f00)) 22:40:15 executing program 4: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000480)}}, 0x0, 0xffffffefffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x100000, 0xe, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000500100000f000000000000000100000005000000000004000040000020000000dbf4655fdbf4655f0100ffff53ef010001000000dbf4655f000000000000000001000000000000000b0000008000000018000000c20500002b0200"/116, 0x74, 0x400}, {&(0x7f0000010100)="000000000000000000000000244b8e9b57f04b59aa229cc218853f9501004000", 0x20, 0x4e0}, {&(0x7f0000010200)="010000000000050040", 0x9}, {&(0x7f0000010300)="020000000300000004000000", 0xc, 0x800}, {&(0x7f0000010400), 0x0, 0x1000}, {&(0x7f0000011500)="ed41000000080000dbf4655fdbf4655fdbf4655f00000000000004004000", 0x1e, 0x2080}, {0x0}, {0x0}, {&(0x7f0000011c00)="0b0000000c0001022e00000002000000f40702022e", 0x15, 0x10000}, {0x0}, {0x0}, {&(0x7f0000012400)="504d4d00504d4dffdbf4655f00000000647679756b6f762d676c6170746f70320000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000006c6f6f7033340075782f746573742f73797a5f6d6f756e745f696d6167655f650500"/123, 0x7b, 0x20000}, {0x0}, {0x0, 0x0, 0x38000}], 0x0, &(0x7f0000012f00)) [ 1891.369205] loop4: detected capacity change from 0 to 2048 [ 1891.371902] loop7: detected capacity change from 0 to 2048 [ 1891.391552] EXT4-fs (loop7): unsupported descriptor size 0 [ 1891.395749] EXT4-fs warning (device loop4): read_mmp_block:106: Error -117 while reading MMP block 0 22:40:15 executing program 2: perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000480)}}, 0x0, 0xffffffefffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x100000, 0xe, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000500100000f000000000000000100000005000000000004000040000020000000dbf4655fdbf4655f0100ffff53ef010001000000dbf4655f000000000000000001000000000000000b0000008000000018000000c20500002b0200"/116, 0x74, 0x400}, {&(0x7f0000010100)="000000000000000000000000244b8e9b", 0x10, 0x4e0}, {&(0x7f0000010200)="010000000000050040", 0x9, 0x560}, {&(0x7f0000010300)="020000000300000004000000", 0xc, 0x800}, {&(0x7f0000010400), 0x0, 0x1000}, {&(0x7f0000011500)="ed41000000080000dbf4655fdbf4655fdbf4655f00000000000004004000", 0x1e, 0x2080}, {0x0}, {0x0}, {&(0x7f0000011c00)="0b0000000c0001022e00000002000000f40702022e", 0x15, 0x10000}, {0x0}, {0x0}, {&(0x7f0000012400)="504d4d00504d4dffdbf4655f00000000647679756b6f762d676c6170746f70320000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000006c6f6f7033340075782f746573742f73797a5f6d6f756e745f696d6167655f650500"/123, 0x7b, 0x20000}, {0x0}, {0x0, 0x0, 0x38000}], 0x0, &(0x7f0000012f00)) 22:40:16 executing program 1: r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, @perf_config_ext, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000000), 0x0) r2 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) ioctl$EXT4_IOC_CHECKPOINT(r2, 0x4004662b, &(0x7f0000000100)=0x5) ioctl$AUTOFS_DEV_IOCTL_TIMEOUT(0xffffffffffffffff, 0xc018937a, &(0x7f0000001480)=ANY=[@ANYBLOB="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", @ANYRES32=r0, @ANYBLOB="01040000000000002e2f66696c653000"]) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r3, 0xc08c5332, &(0x7f00000013c0)={0xffffffff, 0x6964, 0x0, 'queue1\x00', 0xff}) r4 = gettid() process_vm_writev(r4, &(0x7f0000002580)=[{&(0x7f0000000140)=""/89, 0x59}, {&(0x7f00000001c0)=""/175, 0xaf}, {&(0x7f0000000280)=""/4096, 0x1000}], 0x3, &(0x7f0000003840)=[{&(0x7f0000002640)=""/105, 0x69}, {0xfffffffffffffffe, 0x10}], 0x2, 0x0) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r1, 0xc08c5332, &(0x7f0000001280)={0x3, 0x5, 0x0, 'queue1\x00', 0x8}) r5 = fork() write$sndseq(r1, &(0x7f0000001340)=[{0x22, 0x8, 0x2, 0x3, @time={0x4}, {0x0, 0x1}, {0x6, 0x81}, @raw32={[0x800, 0x3, 0x9]}}, {0xe1, 0x7, 0xf8, 0xff, @tick=0x2, {0x3f}, {0x4, 0xf1}, @queue={0xff, {0x6, 0x9}}}, {0x4, 0x1, 0x9, 0x5, @time={0x7, 0x6}, {0x7c, 0x2}, {0x20, 0x6}, @connect={{0x0, 0xfd}, {0x98, 0x4}}}, {0x80, 0x4, 0x7, 0x7d, @time={0xfffff000, 0x9}, {0x81, 0x1f}, {0xaa}, @queue={0x5, {0xffffffe0, 0x3}}}], 0x70) r6 = syz_open_dev$vcsn(&(0x7f0000000040), 0x3, 0x2001) ioctl$LOOP_CTL_GET_FREE(r6, 0x4c82) ptrace$setopts(0x4206, r5, 0x0, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fork() fork() clone3(&(0x7f0000004c00)={0xc0002100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) 22:40:16 executing program 0: perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000480)}}, 0x0, 0xffffffefffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0xd, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000500100000f000000000000000100000005000000000004000040000020000000dbf4655fdbf4655f0100ffff53ef010001000000dbf4655f000000000000000001000000000000000b0000008000000018000000c20500002b0200"/116, 0x74}, {&(0x7f0000010100)="000000000000000000000000244b8e9b57f04b59aa229cc218853f9501004000", 0x20, 0x4e0}, {&(0x7f0000010200)="01000000000005", 0x7, 0x560}, {&(0x7f0000010300)="020000000300000004000000", 0xc, 0x800}, {&(0x7f0000010400), 0x0, 0x1000}, {&(0x7f0000011500)="ed41000000080000dbf4655fdbf4655f", 0x10, 0x2080}, {0x0}, {0x0}, {0x0, 0x0, 0x10000}, {0x0}, {0x0}, {0x0, 0x0, 0x20000}, {0x0}], 0x0, &(0x7f0000012f00)) 22:40:16 executing program 7: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000480)}}, 0x0, 0xffffffefffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x100000, 0xd, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000500100000f000000000000000100000005000000000004000040000020000000dbf4655fdbf4655f0100ffff53ef010001000000dbf4655f000000000000000001000000000000000b0000008000000018000000c20500002b0200"/116, 0x74, 0x400}, {&(0x7f0000010200)="010000000000050040", 0x9, 0x560}, {&(0x7f0000010300)="020000000300000004000000", 0xc, 0x800}, {&(0x7f0000010400), 0x0, 0x1000}, {&(0x7f0000011500)="ed41000000080000dbf4655fdbf4655fdbf4655f00000000000004004000", 0x1e, 0x2080}, {0x0}, {0x0}, {&(0x7f0000011c00)="0b0000000c0001022e00000002000000f40702022e", 0x15, 0x10000}, {0x0}, {0x0}, {&(0x7f0000012400)="504d4d00504d4dffdbf4655f00000000647679756b6f762d676c6170746f70320000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000006c6f6f7033340075782f746573742f73797a5f6d6f756e745f696d6167655f650500"/123, 0x7b, 0x20000}, {0x0}, {0x0, 0x0, 0x38000}], 0x0, &(0x7f0000012f00)) 22:40:16 executing program 4: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000480)}}, 0x0, 0xffffffefffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x100000, 0xe, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000500100000f000000000000000100000005000000000004000040000020000000dbf4655fdbf4655f0100ffff53ef010001000000dbf4655f000000000000000001000000000000000b0000008000000018000000c20500002b0200"/116, 0x74, 0x400}, {&(0x7f0000010100)="000000000000000000000000244b8e9b57f04b59aa229cc218853f9501004000", 0x20, 0x4e0}, {&(0x7f0000010200)="010000000000050040", 0x9}, {&(0x7f0000010300)="020000000300000004000000", 0xc, 0x800}, {&(0x7f0000010400), 0x0, 0x1000}, {&(0x7f0000011500)="ed41000000080000dbf4655fdbf4655fdbf4655f00000000000004004000", 0x1e, 0x2080}, {0x0}, {0x0}, {&(0x7f0000011c00)="0b0000000c0001022e00000002000000f40702022e", 0x15, 0x10000}, {0x0}, {0x0}, {&(0x7f0000012400)="504d4d00504d4dffdbf4655f00000000647679756b6f762d676c6170746f70320000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000006c6f6f7033340075782f746573742f73797a5f6d6f756e745f696d6167655f650500"/123, 0x7b, 0x20000}, {0x0}, {0x0, 0x0, 0x38000}], 0x0, &(0x7f0000012f00)) [ 1891.522063] loop2: detected capacity change from 0 to 2048 [ 1891.523135] loop0: detected capacity change from 0 to 512 [ 1891.539038] EXT4-fs (loop0): VFS: Can't find ext4 filesystem 22:40:16 executing program 3: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) lsetxattr$security_evm(&(0x7f0000000240)='.\x00', &(0x7f0000000300), &(0x7f00000003c0)=@sha1={0x1, "bd2b5bce8b74aea700654a682479ac2c0852bc4d"}, 0x15, 0x3) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={&(0x7f0000000040), 0xb}, 0x0, 0x20, 0x0, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) r0 = fork() r1 = syz_open_procfs(r0, &(0x7f0000000000)='status\x00') r2 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x2, 0x0) pwrite64(r2, &(0x7f00000000c0)='9', 0x1, 0x8040000) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x20, 0x3, 0x4, 0x1, 0x0, 0x8, 0x20620, 0x2, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x3f, 0x2, @perf_config_ext={0x240000000, 0x5}, 0x1400, 0x4, 0x8, 0x7, 0x9, 0x6, 0x6, 0x0, 0x1, 0x0, 0x8}, r0, 0xa, r2, 0x1) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r3, 0x6, 0x1e, &(0x7f0000000040)=0x1, 0x4) setsockopt$inet6_tcp_TCP_REPAIR(r3, 0x6, 0x13, &(0x7f00000018c0)=0x1, 0x4) connect$inet6(r3, &(0x7f0000000080)={0xa, 0x0, 0x0, @loopback}, 0x1c) openat$cgroup_ro(r1, &(0x7f0000000180)='blkio.throttle.io_serviced_recursive\x00', 0x0, 0x0) [ 1891.575849] loop4: detected capacity change from 0 to 2048 [ 1891.593218] EXT4-fs warning (device loop4): read_mmp_block:106: Error -117 while reading MMP block 0 [ 1891.605030] EXT4-fs (loop2): unsupported descriptor size 0 22:40:16 executing program 5: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) lsetxattr$security_evm(&(0x7f0000000240)='.\x00', &(0x7f0000000300), &(0x7f00000003c0)=@sha1={0x1, "bd2b5bce8b74aea700654a682479ac2c0852bc4d"}, 0x15, 0x3) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={&(0x7f0000000040), 0xb}, 0x0, 0x20, 0x0, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) r0 = fork() r1 = syz_open_procfs(r0, &(0x7f0000000000)='status\x00') r2 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x2, 0x0) pwrite64(r2, &(0x7f00000000c0)='9', 0x1, 0x8040000) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x20, 0x3, 0x4, 0x0, 0x0, 0x8, 0x20620, 0x2, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x3f, 0x2, @perf_config_ext={0x240000000, 0x5}, 0x1400, 0x4, 0x8, 0x7, 0x9, 0x6, 0x6, 0x0, 0x1, 0x0, 0x8}, r0, 0xa, r2, 0x1) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r3, 0x6, 0x1e, &(0x7f0000000040)=0x1, 0x4) connect$inet6(r3, &(0x7f0000000080)={0xa, 0x0, 0x0, @loopback}, 0x1c) openat$cgroup_ro(r1, &(0x7f0000000180)='blkio.throttle.io_serviced_recursive\x00', 0x0, 0x0) 22:40:16 executing program 7: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000480)}}, 0x0, 0xffffffefffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x100000, 0xe, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000500100000f000000000000000100000005000000000004000040000020000000dbf4655fdbf4655f0100ffff53ef010001000000dbf4655f000000000000000001000000000000000b0000008000000018000000c20500002b0200"/116, 0x74, 0x400}, {0x0, 0x0, 0x4e0}, {&(0x7f0000010200)="010000000000050040", 0x9, 0x560}, {&(0x7f0000010300)="020000000300000004000000", 0xc, 0x800}, {&(0x7f0000010400), 0x0, 0x1000}, {&(0x7f0000011500)="ed41000000080000dbf4655fdbf4655fdbf4655f00000000000004004000", 0x1e, 0x2080}, {0x0}, {0x0}, {&(0x7f0000011c00)="0b0000000c0001022e00000002000000f40702022e", 0x15, 0x10000}, {0x0}, {0x0}, {&(0x7f0000012400)="504d4d00504d4dffdbf4655f00000000647679756b6f762d676c6170746f70320000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000006c6f6f7033340075782f746573742f73797a5f6d6f756e745f696d6167655f650500"/123, 0x7b, 0x20000}, {0x0}, {0x0, 0x0, 0x38000}], 0x0, &(0x7f0000012f00)) [ 1891.821364] loop7: detected capacity change from 0 to 2048 [ 1891.835183] EXT4-fs (loop7): unsupported descriptor size 0 22:40:35 executing program 7: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000480)}}, 0x0, 0xffffffefffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x100000, 0xe, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000500100000f000000000000000100000005000000000004000040000020000000dbf4655fdbf4655f0100ffff53ef010001000000dbf4655f000000000000000001000000000000000b0000008000000018000000c20500002b0200"/116, 0x74, 0x400}, {0x0, 0x0, 0x4e0}, {&(0x7f0000010200)="010000000000050040", 0x9, 0x560}, {&(0x7f0000010300)="020000000300000004000000", 0xc, 0x800}, {&(0x7f0000010400), 0x0, 0x1000}, {&(0x7f0000011500)="ed41000000080000dbf4655fdbf4655fdbf4655f00000000000004004000", 0x1e, 0x2080}, {0x0}, {0x0}, {&(0x7f0000011c00)="0b0000000c0001022e00000002000000f40702022e", 0x15, 0x10000}, {0x0}, {0x0}, {&(0x7f0000012400)="504d4d00504d4dffdbf4655f00000000647679756b6f762d676c6170746f70320000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000006c6f6f7033340075782f746573742f73797a5f6d6f756e745f696d6167655f650500"/123, 0x7b, 0x20000}, {0x0}, {0x0, 0x0, 0x38000}], 0x0, &(0x7f0000012f00)) 22:40:35 executing program 6: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) lsetxattr$security_evm(&(0x7f0000000240)='.\x00', &(0x7f0000000300), &(0x7f00000003c0)=@sha1={0x1, "bd2b5bce8b74aea700654a682479ac2c0852bc4d"}, 0x15, 0x3) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={&(0x7f0000000040), 0xb}, 0x0, 0x20, 0x0, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) r0 = fork() r1 = syz_open_procfs(r0, &(0x7f0000000000)='status\x00') r2 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x2, 0x0) pwrite64(r2, &(0x7f00000000c0)='9', 0x1, 0x8040000) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x20, 0x3, 0x4, 0x1, 0x0, 0x0, 0x20620, 0x2, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x3f, 0x2, @perf_config_ext={0x240000000, 0x5}, 0x1400, 0x4, 0x8, 0x7, 0x9, 0x6, 0x6, 0x0, 0x1, 0x0, 0x8}, r0, 0xa, r2, 0x1) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r3, 0x6, 0x1e, &(0x7f0000000040)=0x1, 0x4) setsockopt$inet6_tcp_TCP_REPAIR(r3, 0x6, 0x13, &(0x7f00000018c0)=0x1, 0x4) connect$inet6(r3, &(0x7f0000000080)={0xa, 0x0, 0x0, @loopback}, 0x1c) openat$cgroup_ro(r1, &(0x7f0000000180)='blkio.throttle.io_serviced_recursive\x00', 0x0, 0x0) 22:40:35 executing program 5: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) lsetxattr$security_evm(&(0x7f0000000240)='.\x00', &(0x7f0000000300), &(0x7f00000003c0)=@sha1={0x1, "bd2b5bce8b74aea700654a682479ac2c0852bc4d"}, 0x15, 0x3) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={&(0x7f0000000040), 0xb}, 0x0, 0x20, 0x0, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) r0 = fork() r1 = syz_open_procfs(r0, &(0x7f0000000000)='status\x00') r2 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x2, 0x0) pwrite64(r2, &(0x7f00000000c0)='9', 0x1, 0x8040000) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x20, 0x3, 0x4, 0x0, 0x0, 0x8, 0x20620, 0x2, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x3f, 0x2, @perf_config_ext={0x240000000, 0x5}, 0x1400, 0x4, 0x8, 0x7, 0x9, 0x6, 0x6, 0x0, 0x1, 0x0, 0x8}, r0, 0xa, r2, 0x1) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r3, 0x6, 0x1e, &(0x7f0000000040)=0x1, 0x4) connect$inet6(r3, &(0x7f0000000080)={0xa, 0x0, 0x0, @loopback}, 0x1c) openat$cgroup_ro(r1, &(0x7f0000000180)='blkio.throttle.io_serviced_recursive\x00', 0x0, 0x0) 22:40:35 executing program 4: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000480)}}, 0x0, 0xffffffefffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x100000, 0xd, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000500100000f000000000000000100000005000000000004000040000020000000dbf4655fdbf4655f0100ffff53ef010001000000dbf4655f000000000000000001000000000000000b0000008000000018000000c20500002b0200"/116, 0x74, 0x400}, {&(0x7f0000010200)="010000000000050040", 0x9, 0x560}, {&(0x7f0000010300)="020000000300000004000000", 0xc, 0x800}, {&(0x7f0000010400), 0x0, 0x1000}, {&(0x7f0000011500)="ed41000000080000dbf4655fdbf4655fdbf4655f00000000000004004000", 0x1e, 0x2080}, {0x0}, {0x0}, {&(0x7f0000011c00)="0b0000000c0001022e00000002000000f40702022e", 0x15, 0x10000}, {0x0}, {0x0}, {&(0x7f0000012400)="504d4d00504d4dffdbf4655f00000000647679756b6f762d676c6170746f70320000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000006c6f6f7033340075782f746573742f73797a5f6d6f756e745f696d6167655f650500"/123, 0x7b, 0x20000}, {0x0}, {0x0, 0x0, 0x38000}], 0x0, &(0x7f0000012f00)) 22:40:35 executing program 0: perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000480)}}, 0x0, 0xffffffefffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0xd, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000500100000f000000000000000100000005000000000004000040000020000000dbf4655fdbf4655f0100ffff53ef010001000000dbf4655f000000000000000001000000000000000b0000008000000018000000c20500002b0200"/116, 0x74}, {&(0x7f0000010100)="000000000000000000000000244b8e9b57f04b59aa229cc218853f9501004000", 0x20, 0x4e0}, {&(0x7f0000010200)="01000000000005", 0x7, 0x560}, {&(0x7f0000010300)="020000000300000004000000", 0xc, 0x800}, {&(0x7f0000010400), 0x0, 0x1000}, {&(0x7f0000011500)="ed41000000080000dbf4655fdbf4655f", 0x10, 0x2080}, {0x0}, {0x0}, {0x0, 0x0, 0x10000}, {0x0}, {0x0}, {0x0, 0x0, 0x20000}, {0x0}], 0x0, &(0x7f0000012f00)) 22:40:35 executing program 2: perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000480)}}, 0x0, 0xffffffefffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x100000, 0xe, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000500100000f000000000000000100000005000000000004000040000020000000dbf4655fdbf4655f0100ffff53ef010001000000dbf4655f000000000000000001000000000000000b0000008000000018000000c20500002b0200"/116, 0x74, 0x400}, {&(0x7f0000010100)="000000000000000000000000244b8e9b", 0x10, 0x4e0}, {&(0x7f0000010200)="010000000000050040", 0x9, 0x560}, {&(0x7f0000010300)="020000000300000004000000", 0xc, 0x800}, {&(0x7f0000010400), 0x0, 0x1000}, {&(0x7f0000011500)="ed41000000080000dbf4655fdbf4655fdbf4655f00000000000004004000", 0x1e, 0x2080}, {0x0}, {0x0}, {&(0x7f0000011c00)="0b0000000c0001022e00000002000000f40702022e", 0x15, 0x10000}, {0x0}, {0x0}, {&(0x7f0000012400)="504d4d00504d4dffdbf4655f00000000647679756b6f762d676c6170746f70320000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000006c6f6f7033340075782f746573742f73797a5f6d6f756e745f696d6167655f650500"/123, 0x7b, 0x20000}, {0x0}, {0x0, 0x0, 0x38000}], 0x0, &(0x7f0000012f00)) 22:40:35 executing program 3: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) lsetxattr$security_evm(&(0x7f0000000240)='.\x00', &(0x7f0000000300), &(0x7f00000003c0)=@sha1={0x1, "bd2b5bce8b74aea700654a682479ac2c0852bc4d"}, 0x15, 0x3) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={&(0x7f0000000040), 0xb}, 0x0, 0x20, 0x0, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) r0 = fork() r1 = syz_open_procfs(r0, &(0x7f0000000000)='status\x00') r2 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x2, 0x0) pwrite64(r2, &(0x7f00000000c0)='9', 0x1, 0x8040000) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x20, 0x3, 0x4, 0x1, 0x0, 0x8, 0x20620, 0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x3f, 0x2, @perf_config_ext={0x240000000, 0x5}, 0x1400, 0x4, 0x8, 0x7, 0x9, 0x6, 0x6, 0x0, 0x1, 0x0, 0x8}, r0, 0xa, r2, 0x1) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r3, 0x6, 0x1e, &(0x7f0000000040)=0x1, 0x4) setsockopt$inet6_tcp_TCP_REPAIR(r3, 0x6, 0x13, &(0x7f00000018c0)=0x1, 0x4) connect$inet6(r3, &(0x7f0000000080)={0xa, 0x0, 0x0, @loopback}, 0x1c) openat$cgroup_ro(r1, &(0x7f0000000180)='blkio.throttle.io_serviced_recursive\x00', 0x0, 0x0) 22:40:35 executing program 1: r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, @perf_config_ext, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000000), 0x0) r2 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) ioctl$EXT4_IOC_CHECKPOINT(r2, 0x4004662b, &(0x7f0000000100)=0x5) ioctl$AUTOFS_DEV_IOCTL_TIMEOUT(0xffffffffffffffff, 0xc018937a, &(0x7f0000001480)=ANY=[@ANYBLOB="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", @ANYRES32=r0, @ANYBLOB="01040000000000002e2f66696c653000"]) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r3, 0xc08c5332, &(0x7f00000013c0)={0xffffffff, 0x6964, 0x0, 'queue1\x00', 0xff}) r4 = gettid() process_vm_writev(r4, &(0x7f0000002580)=[{&(0x7f0000000140)=""/89, 0x59}, {&(0x7f00000001c0)=""/175, 0xaf}, {&(0x7f0000000280)=""/4096, 0x1000}], 0x3, &(0x7f0000003840)=[{&(0x7f0000002640)=""/105, 0x69}, {0xfffffffffffffffe, 0x10}], 0x2, 0x0) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r1, 0xc08c5332, &(0x7f0000001280)={0x3, 0x5, 0x0, 'queue1\x00', 0x8}) r5 = fork() write$sndseq(r1, &(0x7f0000001340)=[{0x22, 0x8, 0x2, 0x3, @time={0x4}, {0x0, 0x1}, {0x6, 0x81}, @raw32={[0x800, 0x3, 0x9]}}, {0xe1, 0x7, 0xf8, 0xff, @tick=0x2, {0x3f}, {0x4, 0xf1}, @queue={0xff, {0x6, 0x9}}}, {0x4, 0x1, 0x9, 0x5, @time={0x7, 0x6}, {0x7c, 0x2}, {0x20, 0x6}, @connect={{0x0, 0xfd}, {0x98, 0x4}}}, {0x80, 0x4, 0x7, 0x7d, @time={0xfffff000, 0x9}, {0x81, 0x1f}, {0xaa}, @queue={0x5, {0xffffffe0, 0x3}}}], 0x70) r6 = syz_open_dev$vcsn(&(0x7f0000000040), 0x3, 0x2001) ioctl$LOOP_CTL_GET_FREE(r6, 0x4c82) ptrace$setopts(0x4206, r5, 0x0, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fork() fork() clone3(&(0x7f0000004c00)={0xc0002100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) [ 1911.257209] loop0: detected capacity change from 0 to 512 [ 1911.260254] loop4: detected capacity change from 0 to 2048 [ 1911.262069] loop7: detected capacity change from 0 to 2048 [ 1911.267312] loop2: detected capacity change from 0 to 2048 [ 1911.291599] EXT4-fs (loop4): unsupported descriptor size 0 [ 1911.292524] EXT4-fs (loop0): VFS: Can't find ext4 filesystem [ 1911.299098] EXT4-fs (loop2): unsupported descriptor size 0 [ 1911.320823] EXT4-fs (loop7): unsupported descriptor size 0 22:40:36 executing program 4: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000480)}}, 0x0, 0xffffffefffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x100000, 0xd, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000500100000f000000000000000100000005000000000004000040000020000000dbf4655fdbf4655f0100ffff53ef010001000000dbf4655f000000000000000001000000000000000b0000008000000018000000c20500002b0200"/116, 0x74, 0x400}, {&(0x7f0000010200)="010000000000050040", 0x9, 0x560}, {&(0x7f0000010300)="020000000300000004000000", 0xc, 0x800}, {&(0x7f0000010400), 0x0, 0x1000}, {&(0x7f0000011500)="ed41000000080000dbf4655fdbf4655fdbf4655f00000000000004004000", 0x1e, 0x2080}, {0x0}, {0x0}, {&(0x7f0000011c00)="0b0000000c0001022e00000002000000f40702022e", 0x15, 0x10000}, {0x0}, {0x0}, {&(0x7f0000012400)="504d4d00504d4dffdbf4655f00000000647679756b6f762d676c6170746f70320000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000006c6f6f7033340075782f746573742f73797a5f6d6f756e745f696d6167655f650500"/123, 0x7b, 0x20000}, {0x0}, {0x0, 0x0, 0x38000}], 0x0, &(0x7f0000012f00)) 22:40:36 executing program 0: perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000480)}}, 0x0, 0xffffffefffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0xd, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000500100000f000000000000000100000005000000000004000040000020000000dbf4655fdbf4655f0100ffff53ef010001000000dbf4655f000000000000000001000000000000000b0000008000000018000000c20500002b0200"/116, 0x74}, {&(0x7f0000010100)="000000000000000000000000244b8e9b57f04b59aa229cc218853f9501004000", 0x20, 0x4e0}, {&(0x7f0000010200)="01000000000005", 0x7, 0x560}, {&(0x7f0000010300)="020000000300000004000000", 0xc, 0x800}, {&(0x7f0000010400), 0x0, 0x1000}, {&(0x7f0000011500)="ed41000000080000dbf4655fdbf4655f", 0x10, 0x2080}, {0x0}, {0x0}, {0x0, 0x0, 0x10000}, {0x0}, {0x0}, {0x0, 0x0, 0x20000}, {0x0}], 0x0, &(0x7f0000012f00)) [ 1911.608892] loop4: detected capacity change from 0 to 2048 [ 1911.615704] loop0: detected capacity change from 0 to 512 [ 1911.645813] EXT4-fs (loop0): VFS: Can't find ext4 filesystem [ 1911.647579] EXT4-fs (loop4): unsupported descriptor size 0 [ 1928.614268] loop2: detected capacity change from 0 to 2048 [ 1928.622324] EXT4-fs (loop2): unsupported descriptor size 0 22:40:53 executing program 5: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) lsetxattr$security_evm(&(0x7f0000000240)='.\x00', &(0x7f0000000300), &(0x7f00000003c0)=@sha1={0x1, "bd2b5bce8b74aea700654a682479ac2c0852bc4d"}, 0x15, 0x3) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={&(0x7f0000000040), 0xb}, 0x0, 0x20, 0x0, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) r0 = fork() r1 = syz_open_procfs(r0, &(0x7f0000000000)='status\x00') r2 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x2, 0x0) pwrite64(r2, &(0x7f00000000c0)='9', 0x1, 0x8040000) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x20, 0x3, 0x4, 0x1, 0x0, 0x0, 0x20620, 0x2, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x3f, 0x2, @perf_config_ext={0x240000000, 0x5}, 0x1400, 0x4, 0x8, 0x7, 0x9, 0x6, 0x6, 0x0, 0x1, 0x0, 0x8}, r0, 0xa, r2, 0x1) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r3, 0x6, 0x1e, &(0x7f0000000040)=0x1, 0x4) connect$inet6(r3, &(0x7f0000000080)={0xa, 0x0, 0x0, @loopback}, 0x1c) openat$cgroup_ro(r1, &(0x7f0000000180)='blkio.throttle.io_serviced_recursive\x00', 0x0, 0x0) 22:40:53 executing program 7: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000480)}}, 0x0, 0xffffffefffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x100000, 0xe, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000500100000f000000000000000100000005000000000004000040000020000000dbf4655fdbf4655f0100ffff53ef010001000000dbf4655f000000000000000001000000000000000b0000008000000018000000c20500002b0200"/116, 0x74, 0x400}, {0x0, 0x0, 0x4e0}, {&(0x7f0000010200)="010000000000050040", 0x9, 0x560}, {&(0x7f0000010300)="020000000300000004000000", 0xc, 0x800}, {&(0x7f0000010400), 0x0, 0x1000}, {&(0x7f0000011500)="ed41000000080000dbf4655fdbf4655fdbf4655f00000000000004004000", 0x1e, 0x2080}, {0x0}, {0x0}, {&(0x7f0000011c00)="0b0000000c0001022e00000002000000f40702022e", 0x15, 0x10000}, {0x0}, {0x0}, {&(0x7f0000012400)="504d4d00504d4dffdbf4655f00000000647679756b6f762d676c6170746f70320000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000006c6f6f7033340075782f746573742f73797a5f6d6f756e745f696d6167655f650500"/123, 0x7b, 0x20000}, {0x0}, {0x0, 0x0, 0x38000}], 0x0, &(0x7f0000012f00)) 22:40:53 executing program 6: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) lsetxattr$security_evm(&(0x7f0000000240)='.\x00', &(0x7f0000000300), &(0x7f00000003c0)=@sha1={0x1, "bd2b5bce8b74aea700654a682479ac2c0852bc4d"}, 0x15, 0x3) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={&(0x7f0000000040), 0xb}, 0x0, 0x20, 0x0, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) r0 = fork() r1 = syz_open_procfs(r0, &(0x7f0000000000)='status\x00') r2 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x2, 0x0) pwrite64(r2, &(0x7f00000000c0)='9', 0x1, 0x8040000) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x20, 0x3, 0x4, 0x1, 0x0, 0x0, 0x20620, 0x2, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x3f, 0x2, @perf_config_ext={0x240000000, 0x5}, 0x1400, 0x4, 0x8, 0x7, 0x9, 0x6, 0x6, 0x0, 0x1, 0x0, 0x8}, r0, 0xa, r2, 0x1) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r3, 0x6, 0x1e, &(0x7f0000000040)=0x1, 0x4) setsockopt$inet6_tcp_TCP_REPAIR(r3, 0x6, 0x13, &(0x7f00000018c0)=0x1, 0x4) connect$inet6(r3, &(0x7f0000000080)={0xa, 0x0, 0x0, @loopback}, 0x1c) openat$cgroup_ro(r1, &(0x7f0000000180)='blkio.throttle.io_serviced_recursive\x00', 0x0, 0x0) 22:40:53 executing program 0: perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000480)}}, 0x0, 0xffffffefffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0xd, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000500100000f000000000000000100000005000000000004000040000020000000dbf4655fdbf4655f0100ffff53ef010001000000dbf4655f000000000000000001000000000000000b0000008000000018000000c20500002b0200"/116, 0x74, 0x400}, {&(0x7f0000010100)="000000000000000000000000244b8e9b57f04b59aa229cc218853f9501004000", 0x20, 0x4e0}, {&(0x7f0000010200)="01000000000005", 0x7, 0x560}, {&(0x7f0000010300)="020000000300000004000000", 0xc, 0x800}, {&(0x7f0000010400), 0x0, 0x1000}, {&(0x7f0000011500)="ed41000000080000dbf4655fdbf4655f", 0x10, 0x2080}, {0x0}, {0x0}, {0x0, 0x0, 0x10000}, {0x0}, {0x0}, {0x0, 0x0, 0x20000}, {0x0}], 0x0, 0x0) 22:40:53 executing program 2: perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000480)}}, 0x0, 0xffffffefffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x100000, 0xe, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000500100000f000000000000000100000005000000000004000040000020000000dbf4655fdbf4655f0100ffff53ef010001000000dbf4655f000000000000000001000000000000000b0000008000000018000000c20500002b0200"/116, 0x74, 0x400}, {&(0x7f0000010100)="000000000000000000000000244b8e9b", 0x10, 0x4e0}, {&(0x7f0000010200)="010000000000050040", 0x9, 0x560}, {&(0x7f0000010300)="020000000300000004000000", 0xc, 0x800}, {&(0x7f0000010400), 0x0, 0x1000}, {&(0x7f0000011500)="ed41000000080000dbf4655fdbf4655fdbf4655f00000000000004004000", 0x1e, 0x2080}, {0x0}, {0x0}, {&(0x7f0000011c00)="0b0000000c0001022e00000002000000f40702022e", 0x15, 0x10000}, {0x0}, {0x0}, {&(0x7f0000012400)="504d4d00504d4dffdbf4655f00000000647679756b6f762d676c6170746f70320000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000006c6f6f7033340075782f746573742f73797a5f6d6f756e745f696d6167655f650500"/123, 0x7b, 0x20000}, {0x0}, {0x0, 0x0, 0x38000}], 0x0, &(0x7f0000012f00)) 22:40:53 executing program 1: r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, @perf_config_ext, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000000), 0x0) r2 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) ioctl$EXT4_IOC_CHECKPOINT(r2, 0x4004662b, &(0x7f0000000100)=0x5) ioctl$AUTOFS_DEV_IOCTL_TIMEOUT(0xffffffffffffffff, 0xc018937a, &(0x7f0000001480)=ANY=[@ANYBLOB="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", @ANYRES32=r0, @ANYBLOB="01040000000000002e2f66696c653000"]) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r3, 0xc08c5332, &(0x7f00000013c0)={0xffffffff, 0x6964, 0x0, 'queue1\x00', 0xff}) r4 = gettid() process_vm_writev(r4, &(0x7f0000002580)=[{&(0x7f0000000140)=""/89, 0x59}, {&(0x7f00000001c0)=""/175, 0xaf}, {&(0x7f0000000280)=""/4096, 0x1000}], 0x3, &(0x7f0000003840)=[{&(0x7f0000002640)=""/105, 0x69}, {0xfffffffffffffffe, 0x10}], 0x2, 0x0) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r1, 0xc08c5332, &(0x7f0000001280)={0x3, 0x5, 0x0, 'queue1\x00', 0x8}) r5 = fork() write$sndseq(r1, &(0x7f0000001340)=[{0x22, 0x8, 0x2, 0x3, @time={0x4}, {0x0, 0x1}, {0x6, 0x81}, @raw32={[0x800, 0x3, 0x9]}}, {0xe1, 0x7, 0xf8, 0xff, @tick=0x2, {0x3f}, {0x4, 0xf1}, @queue={0xff, {0x6, 0x9}}}, {0x4, 0x1, 0x9, 0x5, @time={0x7, 0x6}, {0x7c, 0x2}, {0x20, 0x6}, @connect={{0x0, 0xfd}, {0x98, 0x4}}}, {0x80, 0x4, 0x7, 0x7d, @time={0xfffff000, 0x9}, {0x81, 0x1f}, {0xaa}, @queue={0x5, {0xffffffe0, 0x3}}}], 0x70) r6 = syz_open_dev$vcsn(&(0x7f0000000040), 0x3, 0x2001) ioctl$LOOP_CTL_GET_FREE(r6, 0x4c82) ptrace$setopts(0x4206, r5, 0x0, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fork() fork() clone3(&(0x7f0000004c00)={0xc0002100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) 22:40:53 executing program 3: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) lsetxattr$security_evm(&(0x7f0000000240)='.\x00', &(0x7f0000000300), &(0x7f00000003c0)=@sha1={0x1, "bd2b5bce8b74aea700654a682479ac2c0852bc4d"}, 0x15, 0x3) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={&(0x7f0000000040), 0xb}, 0x0, 0x20, 0x0, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) r0 = fork() r1 = syz_open_procfs(r0, &(0x7f0000000000)='status\x00') r2 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x2, 0x0) pwrite64(r2, &(0x7f00000000c0)='9', 0x1, 0x8040000) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x20, 0x3, 0x4, 0x1, 0x0, 0x8, 0x20620, 0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x3f, 0x2, @perf_config_ext={0x240000000, 0x5}, 0x1400, 0x4, 0x8, 0x7, 0x9, 0x6, 0x6, 0x0, 0x1, 0x0, 0x8}, r0, 0xa, r2, 0x1) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r3, 0x6, 0x1e, &(0x7f0000000040)=0x1, 0x4) setsockopt$inet6_tcp_TCP_REPAIR(r3, 0x6, 0x13, &(0x7f00000018c0)=0x1, 0x4) connect$inet6(r3, &(0x7f0000000080)={0xa, 0x0, 0x0, @loopback}, 0x1c) openat$cgroup_ro(r1, &(0x7f0000000180)='blkio.throttle.io_serviced_recursive\x00', 0x0, 0x0) 22:40:53 executing program 4: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000480)}}, 0x0, 0xffffffefffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x100000, 0xd, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000500100000f000000000000000100000005000000000004000040000020000000dbf4655fdbf4655f0100ffff53ef010001000000dbf4655f000000000000000001000000000000000b0000008000000018000000c20500002b0200"/116, 0x74, 0x400}, {&(0x7f0000010200)="010000000000050040", 0x9, 0x560}, {&(0x7f0000010300)="020000000300000004000000", 0xc, 0x800}, {&(0x7f0000010400), 0x0, 0x1000}, {&(0x7f0000011500)="ed41000000080000dbf4655fdbf4655fdbf4655f00000000000004004000", 0x1e, 0x2080}, {0x0}, {0x0}, {&(0x7f0000011c00)="0b0000000c0001022e00000002000000f40702022e", 0x15, 0x10000}, {0x0}, {0x0}, {&(0x7f0000012400)="504d4d00504d4dffdbf4655f00000000647679756b6f762d676c6170746f70320000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000006c6f6f7033340075782f746573742f73797a5f6d6f756e745f696d6167655f650500"/123, 0x7b, 0x20000}, {0x0}, {0x0, 0x0, 0x38000}], 0x0, &(0x7f0000012f00)) [ 1928.647734] loop7: detected capacity change from 0 to 2048 [ 1928.662186] loop0: detected capacity change from 0 to 512 [ 1928.670683] EXT4-fs (loop7): unsupported descriptor size 0 22:40:53 executing program 2: perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000480)}}, 0x0, 0xffffffefffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x100000, 0xe, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000500100000f000000000000000100000005000000000004000040000020000000dbf4655fdbf4655f0100ffff53ef010001000000dbf4655f000000000000000001000000000000000b0000008000000018000000c20500002b0200"/116, 0x74, 0x400}, {&(0x7f0000010100)="000000000000000000000000244b8e9b57f04b59aa229cc2", 0x18, 0x4e0}, {&(0x7f0000010200)="010000000000050040", 0x9, 0x560}, {&(0x7f0000010300)="020000000300000004000000", 0xc, 0x800}, {&(0x7f0000010400), 0x0, 0x1000}, {&(0x7f0000011500)="ed41000000080000dbf4655fdbf4655fdbf4655f00000000000004004000", 0x1e, 0x2080}, {0x0}, {0x0}, {&(0x7f0000011c00)="0b0000000c0001022e00000002000000f40702022e", 0x15, 0x10000}, {0x0}, {0x0}, {&(0x7f0000012400)="504d4d00504d4dffdbf4655f00000000647679756b6f762d676c6170746f70320000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000006c6f6f7033340075782f746573742f73797a5f6d6f756e745f696d6167655f650500"/123, 0x7b, 0x20000}, {0x0}, {0x0, 0x0, 0x38000}], 0x0, &(0x7f0000012f00)) [ 1928.706033] loop4: detected capacity change from 0 to 2048 [ 1928.745753] EXT4-fs (loop4): unsupported descriptor size 0 22:40:53 executing program 0: perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000480)}}, 0x0, 0xffffffefffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0xd, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000500100000f000000000000000100000005000000000004000040000020000000dbf4655fdbf4655f0100ffff53ef010001000000dbf4655f000000000000000001000000000000000b0000008000000018000000c20500002b0200"/116, 0x74, 0x400}, {&(0x7f0000010100)="000000000000000000000000244b8e9b57f04b59aa229cc218853f9501004000", 0x20, 0x4e0}, {&(0x7f0000010200)="01000000000005", 0x7, 0x560}, {&(0x7f0000010300)="020000000300000004000000", 0xc, 0x800}, {&(0x7f0000010400), 0x0, 0x1000}, {&(0x7f0000011500)="ed41000000080000dbf4655fdbf4655f", 0x10, 0x2080}, {0x0}, {0x0}, {0x0, 0x0, 0x10000}, {0x0}, {0x0}, {0x0, 0x0, 0x20000}, {0x0}], 0x0, 0x0) 22:40:53 executing program 7: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000480)}}, 0x0, 0xffffffefffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x100000, 0xe, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000500100000f000000000000000100000005000000000004000040000020000000dbf4655fdbf4655f0100ffff53ef010001000000dbf4655f000000000000000001000000000000000b0000008000000018000000c20500002b0200"/116, 0x74, 0x400}, {&(0x7f0000010100), 0x0, 0x4e0}, {&(0x7f0000010200)="010000000000050040", 0x9, 0x560}, {&(0x7f0000010300)="020000000300000004000000", 0xc, 0x800}, {&(0x7f0000010400), 0x0, 0x1000}, {&(0x7f0000011500)="ed41000000080000dbf4655fdbf4655fdbf4655f00000000000004004000", 0x1e, 0x2080}, {0x0}, {0x0}, {&(0x7f0000011c00)="0b0000000c0001022e00000002000000f40702022e", 0x15, 0x10000}, {0x0}, {0x0}, {&(0x7f0000012400)="504d4d00504d4dffdbf4655f00000000647679756b6f762d676c6170746f70320000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000006c6f6f7033340075782f746573742f73797a5f6d6f756e745f696d6167655f650500"/123, 0x7b, 0x20000}, {0x0}, {0x0, 0x0, 0x38000}], 0x0, &(0x7f0000012f00)) [ 1928.829998] loop2: detected capacity change from 0 to 2048 [ 1928.849679] loop7: detected capacity change from 0 to 2048 [ 1928.867190] EXT4-fs (loop7): unsupported descriptor size 0 22:40:53 executing program 4: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000480)}}, 0x0, 0xffffffefffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x100000, 0xe, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000500100000f000000000000000100000005000000000004000040000020000000dbf4655fdbf4655f0100ffff53ef010001000000dbf4655f000000000000000001000000000000000b0000008000000018000000c20500002b0200"/116, 0x74, 0x400}, {0x0, 0x0, 0x4e0}, {&(0x7f0000010200)="010000000000050040", 0x9, 0x560}, {&(0x7f0000010300)="020000000300000004000000", 0xc, 0x800}, {&(0x7f0000010400), 0x0, 0x1000}, {&(0x7f0000011500)="ed41000000080000dbf4655fdbf4655fdbf4655f00000000000004004000", 0x1e, 0x2080}, {0x0}, {0x0}, {&(0x7f0000011c00)="0b0000000c0001022e00000002000000f40702022e", 0x15, 0x10000}, {0x0}, {0x0}, {&(0x7f0000012400)="504d4d00504d4dffdbf4655f00000000647679756b6f762d676c6170746f70320000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000006c6f6f7033340075782f746573742f73797a5f6d6f756e745f696d6167655f650500"/123, 0x7b, 0x20000}, {0x0}, {0x0, 0x0, 0x38000}], 0x0, &(0x7f0000012f00)) [ 1928.881051] EXT4-fs (loop2): unsupported descriptor size 0 [ 1928.982188] loop0: detected capacity change from 0 to 512 [ 1929.011824] loop4: detected capacity change from 0 to 2048 [ 1929.035988] EXT4-fs (loop4): unsupported descriptor size 0 22:41:19 executing program 1: r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, @perf_config_ext, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000000), 0x0) r2 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) ioctl$EXT4_IOC_CHECKPOINT(r2, 0x4004662b, &(0x7f0000000100)=0x5) ioctl$AUTOFS_DEV_IOCTL_TIMEOUT(0xffffffffffffffff, 0xc018937a, &(0x7f0000001480)=ANY=[@ANYBLOB="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", @ANYRES32=r0, @ANYBLOB="01040000000000002e2f66696c653000"]) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(0xffffffffffffffff, 0xc08c5332, &(0x7f00000013c0)={0xffffffff, 0x6964, 0x0, 'queue1\x00', 0xff}) r3 = gettid() process_vm_writev(r3, &(0x7f0000002580)=[{&(0x7f0000000140)=""/89, 0x59}, {&(0x7f00000001c0)=""/175, 0xaf}, {&(0x7f0000000280)=""/4096, 0x1000}], 0x3, &(0x7f0000003840)=[{&(0x7f0000002640)=""/105, 0x69}, {0xfffffffffffffffe, 0x10}], 0x2, 0x0) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r1, 0xc08c5332, &(0x7f0000001280)={0x3, 0x5, 0x0, 'queue1\x00', 0x8}) r4 = fork() write$sndseq(r1, &(0x7f0000001340)=[{0x22, 0x8, 0x2, 0x3, @time={0x4}, {0x0, 0x1}, {0x6, 0x81}, @raw32={[0x800, 0x3, 0x9]}}, {0xe1, 0x7, 0xf8, 0xff, @tick=0x2, {0x3f}, {0x4, 0xf1}, @queue={0xff, {0x6, 0x9}}}, {0x4, 0x1, 0x9, 0x5, @time={0x7, 0x6}, {0x7c, 0x2}, {0x20, 0x6}, @connect={{0x0, 0xfd}, {0x98, 0x4}}}, {0x80, 0x4, 0x7, 0x7d, @time={0xfffff000, 0x9}, {0x81, 0x1f}, {0xaa}, @queue={0x5, {0xffffffe0, 0x3}}}], 0x70) r5 = syz_open_dev$vcsn(&(0x7f0000000040), 0x3, 0x2001) ioctl$LOOP_CTL_GET_FREE(r5, 0x4c82) ptrace$setopts(0x4206, r4, 0x0, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fork() fork() clone3(&(0x7f0000004c00)={0xc0002100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) 22:41:19 executing program 3: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) lsetxattr$security_evm(&(0x7f0000000240)='.\x00', &(0x7f0000000300), &(0x7f00000003c0)=@sha1={0x1, "bd2b5bce8b74aea700654a682479ac2c0852bc4d"}, 0x15, 0x3) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={&(0x7f0000000040), 0xb}, 0x0, 0x20, 0x0, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) r0 = fork() r1 = syz_open_procfs(r0, &(0x7f0000000000)='status\x00') r2 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x2, 0x0) pwrite64(r2, &(0x7f00000000c0)='9', 0x1, 0x8040000) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x20, 0x3, 0x4, 0x1, 0x0, 0x8, 0x20620, 0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x3f, 0x2, @perf_config_ext={0x240000000, 0x5}, 0x1400, 0x4, 0x8, 0x7, 0x9, 0x6, 0x6, 0x0, 0x1, 0x0, 0x8}, r0, 0xa, r2, 0x1) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r3, 0x6, 0x1e, &(0x7f0000000040)=0x1, 0x4) setsockopt$inet6_tcp_TCP_REPAIR(r3, 0x6, 0x13, &(0x7f00000018c0)=0x1, 0x4) connect$inet6(r3, &(0x7f0000000080)={0xa, 0x0, 0x0, @loopback}, 0x1c) openat$cgroup_ro(r1, &(0x7f0000000180)='blkio.throttle.io_serviced_recursive\x00', 0x0, 0x0) 22:41:19 executing program 5: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) lsetxattr$security_evm(&(0x7f0000000240)='.\x00', &(0x7f0000000300), &(0x7f00000003c0)=@sha1={0x1, "bd2b5bce8b74aea700654a682479ac2c0852bc4d"}, 0x15, 0x3) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={&(0x7f0000000040), 0xb}, 0x0, 0x20, 0x0, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) r0 = fork() r1 = syz_open_procfs(r0, &(0x7f0000000000)='status\x00') r2 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x2, 0x0) pwrite64(r2, &(0x7f00000000c0)='9', 0x1, 0x8040000) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x20, 0x3, 0x4, 0x1, 0x0, 0x0, 0x20620, 0x2, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x3f, 0x2, @perf_config_ext={0x240000000, 0x5}, 0x1400, 0x4, 0x8, 0x7, 0x9, 0x6, 0x6, 0x0, 0x1, 0x0, 0x8}, r0, 0xa, r2, 0x1) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r3, 0x6, 0x1e, &(0x7f0000000040)=0x1, 0x4) connect$inet6(r3, &(0x7f0000000080)={0xa, 0x0, 0x0, @loopback}, 0x1c) openat$cgroup_ro(r1, &(0x7f0000000180)='blkio.throttle.io_serviced_recursive\x00', 0x0, 0x0) 22:41:19 executing program 4: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000480)}}, 0x0, 0xffffffefffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x100000, 0xe, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000500100000f000000000000000100000005000000000004000040000020000000dbf4655fdbf4655f0100ffff53ef010001000000dbf4655f000000000000000001000000000000000b0000008000000018000000c20500002b0200"/116, 0x74, 0x400}, {0x0, 0x0, 0x4e0}, {&(0x7f0000010200)="010000000000050040", 0x9, 0x560}, {&(0x7f0000010300)="020000000300000004000000", 0xc, 0x800}, {&(0x7f0000010400), 0x0, 0x1000}, {&(0x7f0000011500)="ed41000000080000dbf4655fdbf4655fdbf4655f00000000000004004000", 0x1e, 0x2080}, {0x0}, {0x0}, {&(0x7f0000011c00)="0b0000000c0001022e00000002000000f40702022e", 0x15, 0x10000}, {0x0}, {0x0}, {&(0x7f0000012400)="504d4d00504d4dffdbf4655f00000000647679756b6f762d676c6170746f70320000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000006c6f6f7033340075782f746573742f73797a5f6d6f756e745f696d6167655f650500"/123, 0x7b, 0x20000}, {0x0}, {0x0, 0x0, 0x38000}], 0x0, &(0x7f0000012f00)) 22:41:19 executing program 7: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000480)}}, 0x0, 0xffffffefffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x100000, 0xe, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000500100000f000000000000000100000005000000000004000040000020000000dbf4655fdbf4655f0100ffff53ef010001000000dbf4655f000000000000000001000000000000000b0000008000000018000000c20500002b0200"/116, 0x74, 0x400}, {&(0x7f0000010100), 0x0, 0x4e0}, {&(0x7f0000010200)="010000000000050040", 0x9, 0x560}, {&(0x7f0000010300)="020000000300000004000000", 0xc, 0x800}, {&(0x7f0000010400), 0x0, 0x1000}, {&(0x7f0000011500)="ed41000000080000dbf4655fdbf4655fdbf4655f00000000000004004000", 0x1e, 0x2080}, {0x0}, {0x0}, {&(0x7f0000011c00)="0b0000000c0001022e00000002000000f40702022e", 0x15, 0x10000}, {0x0}, {0x0}, {&(0x7f0000012400)="504d4d00504d4dffdbf4655f00000000647679756b6f762d676c6170746f70320000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000006c6f6f7033340075782f746573742f73797a5f6d6f756e745f696d6167655f650500"/123, 0x7b, 0x20000}, {0x0}, {0x0, 0x0, 0x38000}], 0x0, &(0x7f0000012f00)) 22:41:19 executing program 2: perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000480)}}, 0x0, 0xffffffefffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x100000, 0xe, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000500100000f000000000000000100000005000000000004000040000020000000dbf4655fdbf4655f0100ffff53ef010001000000dbf4655f000000000000000001000000000000000b0000008000000018000000c20500002b0200"/116, 0x74, 0x400}, {&(0x7f0000010100)="000000000000000000000000244b8e9b57f04b59aa229cc2", 0x18, 0x4e0}, {&(0x7f0000010200)="010000000000050040", 0x9, 0x560}, {&(0x7f0000010300)="020000000300000004000000", 0xc, 0x800}, {&(0x7f0000010400), 0x0, 0x1000}, {&(0x7f0000011500)="ed41000000080000dbf4655fdbf4655fdbf4655f00000000000004004000", 0x1e, 0x2080}, {0x0}, {0x0}, {&(0x7f0000011c00)="0b0000000c0001022e00000002000000f40702022e", 0x15, 0x10000}, {0x0}, {0x0}, {&(0x7f0000012400)="504d4d00504d4dffdbf4655f00000000647679756b6f762d676c6170746f70320000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000006c6f6f7033340075782f746573742f73797a5f6d6f756e745f696d6167655f650500"/123, 0x7b, 0x20000}, {0x0}, {0x0, 0x0, 0x38000}], 0x0, &(0x7f0000012f00)) 22:41:19 executing program 6: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) lsetxattr$security_evm(&(0x7f0000000240)='.\x00', &(0x7f0000000300), &(0x7f00000003c0)=@sha1={0x1, "bd2b5bce8b74aea700654a682479ac2c0852bc4d"}, 0x15, 0x3) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={&(0x7f0000000040), 0xb}, 0x0, 0x20, 0x0, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) r0 = fork() r1 = syz_open_procfs(r0, &(0x7f0000000000)='status\x00') r2 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x2, 0x0) pwrite64(r2, &(0x7f00000000c0)='9', 0x1, 0x8040000) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x20, 0x3, 0x4, 0x1, 0x0, 0x8, 0x0, 0x2, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x3f, 0x2, @perf_config_ext={0x240000000, 0x5}, 0x1400, 0x4, 0x8, 0x7, 0x9, 0x6, 0x6, 0x0, 0x1, 0x0, 0x8}, r0, 0xa, r2, 0x1) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r3, 0x6, 0x1e, &(0x7f0000000040)=0x1, 0x4) setsockopt$inet6_tcp_TCP_REPAIR(r3, 0x6, 0x13, &(0x7f00000018c0)=0x1, 0x4) connect$inet6(r3, &(0x7f0000000080)={0xa, 0x0, 0x0, @loopback}, 0x1c) openat$cgroup_ro(r1, &(0x7f0000000180)='blkio.throttle.io_serviced_recursive\x00', 0x0, 0x0) 22:41:19 executing program 0: perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000480)}}, 0x0, 0xffffffefffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0xd, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000500100000f000000000000000100000005000000000004000040000020000000dbf4655fdbf4655f0100ffff53ef010001000000dbf4655f000000000000000001000000000000000b0000008000000018000000c20500002b0200"/116, 0x74, 0x400}, {&(0x7f0000010100)="000000000000000000000000244b8e9b57f04b59aa229cc218853f9501004000", 0x20, 0x4e0}, {&(0x7f0000010200)="01000000000005", 0x7, 0x560}, {&(0x7f0000010300)="020000000300000004000000", 0xc, 0x800}, {&(0x7f0000010400), 0x0, 0x1000}, {&(0x7f0000011500)="ed41000000080000dbf4655fdbf4655f", 0x10, 0x2080}, {0x0}, {0x0}, {0x0, 0x0, 0x10000}, {0x0}, {0x0}, {0x0, 0x0, 0x20000}, {0x0}], 0x0, 0x0) [ 1955.527161] loop4: detected capacity change from 0 to 2048 [ 1955.539423] loop0: detected capacity change from 0 to 512 [ 1955.543816] loop2: detected capacity change from 0 to 2048 [ 1955.548176] loop7: detected capacity change from 0 to 2048 [ 1955.571405] EXT4-fs (loop4): unsupported descriptor size 0 [ 1955.586265] EXT4-fs (loop7): unsupported descriptor size 0 [ 1955.586956] EXT4-fs (loop2): unsupported descriptor size 0 22:41:20 executing program 7: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000480)}}, 0x0, 0xffffffefffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x100000, 0xe, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000500100000f000000000000000100000005000000000004000040000020000000dbf4655fdbf4655f0100ffff53ef010001000000dbf4655f000000000000000001000000000000000b0000008000000018000000c20500002b0200"/116, 0x74, 0x400}, {&(0x7f0000010100), 0x0, 0x4e0}, {&(0x7f0000010200)="010000000000050040", 0x9, 0x560}, {&(0x7f0000010300)="020000000300000004000000", 0xc, 0x800}, {&(0x7f0000010400), 0x0, 0x1000}, {&(0x7f0000011500)="ed41000000080000dbf4655fdbf4655fdbf4655f00000000000004004000", 0x1e, 0x2080}, {0x0}, {0x0}, {&(0x7f0000011c00)="0b0000000c0001022e00000002000000f40702022e", 0x15, 0x10000}, {0x0}, {0x0}, {&(0x7f0000012400)="504d4d00504d4dffdbf4655f00000000647679756b6f762d676c6170746f70320000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000006c6f6f7033340075782f746573742f73797a5f6d6f756e745f696d6167655f650500"/123, 0x7b, 0x20000}, {0x0}, {0x0, 0x0, 0x38000}], 0x0, &(0x7f0000012f00)) 22:41:20 executing program 4: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000480)}}, 0x0, 0xffffffefffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x100000, 0xe, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000500100000f000000000000000100000005000000000004000040000020000000dbf4655fdbf4655f0100ffff53ef010001000000dbf4655f000000000000000001000000000000000b0000008000000018000000c20500002b0200"/116, 0x74, 0x400}, {0x0, 0x0, 0x4e0}, {&(0x7f0000010200)="010000000000050040", 0x9, 0x560}, {&(0x7f0000010300)="020000000300000004000000", 0xc, 0x800}, {&(0x7f0000010400), 0x0, 0x1000}, {&(0x7f0000011500)="ed41000000080000dbf4655fdbf4655fdbf4655f00000000000004004000", 0x1e, 0x2080}, {0x0}, {0x0}, {&(0x7f0000011c00)="0b0000000c0001022e00000002000000f40702022e", 0x15, 0x10000}, {0x0}, {0x0}, {&(0x7f0000012400)="504d4d00504d4dffdbf4655f00000000647679756b6f762d676c6170746f70320000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000006c6f6f7033340075782f746573742f73797a5f6d6f756e745f696d6167655f650500"/123, 0x7b, 0x20000}, {0x0}, {0x0, 0x0, 0x38000}], 0x0, &(0x7f0000012f00)) 22:41:20 executing program 2: perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000480)}}, 0x0, 0xffffffefffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x100000, 0xe, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000500100000f000000000000000100000005000000000004000040000020000000dbf4655fdbf4655f0100ffff53ef010001000000dbf4655f000000000000000001000000000000000b0000008000000018000000c20500002b0200"/116, 0x74, 0x400}, {&(0x7f0000010100)="000000000000000000000000244b8e9b57f04b59aa229cc2", 0x18, 0x4e0}, {&(0x7f0000010200)="010000000000050040", 0x9, 0x560}, {&(0x7f0000010300)="020000000300000004000000", 0xc, 0x800}, {&(0x7f0000010400), 0x0, 0x1000}, {&(0x7f0000011500)="ed41000000080000dbf4655fdbf4655fdbf4655f00000000000004004000", 0x1e, 0x2080}, {0x0}, {0x0}, {&(0x7f0000011c00)="0b0000000c0001022e00000002000000f40702022e", 0x15, 0x10000}, {0x0}, {0x0}, {&(0x7f0000012400)="504d4d00504d4dffdbf4655f00000000647679756b6f762d676c6170746f70320000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000006c6f6f7033340075782f746573742f73797a5f6d6f756e745f696d6167655f650500"/123, 0x7b, 0x20000}, {0x0}, {0x0, 0x0, 0x38000}], 0x0, &(0x7f0000012f00)) 22:41:20 executing program 5: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) lsetxattr$security_evm(&(0x7f0000000240)='.\x00', &(0x7f0000000300), &(0x7f00000003c0)=@sha1={0x1, "bd2b5bce8b74aea700654a682479ac2c0852bc4d"}, 0x15, 0x3) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={&(0x7f0000000040), 0xb}, 0x0, 0x20, 0x0, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) r0 = fork() r1 = syz_open_procfs(r0, &(0x7f0000000000)='status\x00') r2 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x2, 0x0) pwrite64(r2, &(0x7f00000000c0)='9', 0x1, 0x8040000) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x20, 0x3, 0x4, 0x1, 0x0, 0x0, 0x20620, 0x2, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x3f, 0x2, @perf_config_ext={0x240000000, 0x5}, 0x1400, 0x4, 0x8, 0x7, 0x9, 0x6, 0x6, 0x0, 0x1, 0x0, 0x8}, r0, 0xa, r2, 0x1) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r3, 0x6, 0x1e, &(0x7f0000000040)=0x1, 0x4) connect$inet6(r3, &(0x7f0000000080)={0xa, 0x0, 0x0, @loopback}, 0x1c) openat$cgroup_ro(r1, &(0x7f0000000180)='blkio.throttle.io_serviced_recursive\x00', 0x0, 0x0) [ 1955.939106] loop4: detected capacity change from 0 to 2048 [ 1955.946887] loop7: detected capacity change from 0 to 2048 [ 1955.950183] loop2: detected capacity change from 0 to 2048 [ 1955.987852] EXT4-fs (loop7): unsupported descriptor size 0 [ 1955.993967] EXT4-fs (loop2): unsupported descriptor size 0 [ 1955.998033] EXT4-fs (loop4): unsupported descriptor size 0 22:41:20 executing program 1: r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, @perf_config_ext, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000000), 0x0) r2 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) ioctl$EXT4_IOC_CHECKPOINT(r2, 0x4004662b, &(0x7f0000000100)=0x5) ioctl$AUTOFS_DEV_IOCTL_TIMEOUT(0xffffffffffffffff, 0xc018937a, &(0x7f0000001480)=ANY=[@ANYBLOB="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", @ANYRES32=r0, @ANYBLOB="01040000000000002e2f66696c653000"]) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(0xffffffffffffffff, 0xc08c5332, &(0x7f00000013c0)={0xffffffff, 0x6964, 0x0, 'queue1\x00', 0xff}) r3 = gettid() process_vm_writev(r3, &(0x7f0000002580)=[{&(0x7f0000000140)=""/89, 0x59}, {&(0x7f00000001c0)=""/175, 0xaf}, {&(0x7f0000000280)=""/4096, 0x1000}], 0x3, &(0x7f0000003840)=[{&(0x7f0000002640)=""/105, 0x69}, {0xfffffffffffffffe, 0x10}], 0x2, 0x0) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r1, 0xc08c5332, &(0x7f0000001280)={0x3, 0x5, 0x0, 'queue1\x00', 0x8}) r4 = fork() write$sndseq(r1, &(0x7f0000001340)=[{0x22, 0x8, 0x2, 0x3, @time={0x4}, {0x0, 0x1}, {0x6, 0x81}, @raw32={[0x800, 0x3, 0x9]}}, {0xe1, 0x7, 0xf8, 0xff, @tick=0x2, {0x3f}, {0x4, 0xf1}, @queue={0xff, {0x6, 0x9}}}, {0x4, 0x1, 0x9, 0x5, @time={0x7, 0x6}, {0x7c, 0x2}, {0x20, 0x6}, @connect={{0x0, 0xfd}, {0x98, 0x4}}}, {0x80, 0x4, 0x7, 0x7d, @time={0xfffff000, 0x9}, {0x81, 0x1f}, {0xaa}, @queue={0x5, {0xffffffe0, 0x3}}}], 0x70) r5 = syz_open_dev$vcsn(&(0x7f0000000040), 0x3, 0x2001) ioctl$LOOP_CTL_GET_FREE(r5, 0x4c82) ptrace$setopts(0x4206, r4, 0x0, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fork() fork() clone3(&(0x7f0000004c00)={0xc0002100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) 22:41:20 executing program 3: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) lsetxattr$security_evm(&(0x7f0000000240)='.\x00', &(0x7f0000000300), &(0x7f00000003c0)=@sha1={0x1, "bd2b5bce8b74aea700654a682479ac2c0852bc4d"}, 0x15, 0x3) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={&(0x7f0000000040), 0xb}, 0x0, 0x20, 0x0, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) r0 = fork() r1 = syz_open_procfs(r0, &(0x7f0000000000)='status\x00') r2 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x2, 0x0) pwrite64(r2, &(0x7f00000000c0)='9', 0x1, 0x8040000) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x20, 0x3, 0x4, 0x1, 0x0, 0x8, 0x20620, 0x2, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x3f, 0x2, @perf_config_ext={0x240000000, 0x5}, 0x1400, 0x4, 0x8, 0x7, 0x9, 0x6, 0x6, 0x0, 0x1, 0x0, 0x8}, r0, 0xa, r2, 0x1) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r3, 0x6, 0x1e, &(0x7f0000000040)=0x1, 0x4) setsockopt$inet6_tcp_TCP_REPAIR(r3, 0x6, 0x13, &(0x7f00000018c0)=0x1, 0x4) connect$inet6(r3, &(0x7f0000000080)={0xa, 0x0, 0x0, @loopback}, 0x1c) openat$cgroup_ro(r1, &(0x7f0000000180)='blkio.throttle.io_serviced_recursive\x00', 0x0, 0x0) 22:41:20 executing program 6: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) lsetxattr$security_evm(&(0x7f0000000240)='.\x00', &(0x7f0000000300), &(0x7f00000003c0)=@sha1={0x1, "bd2b5bce8b74aea700654a682479ac2c0852bc4d"}, 0x15, 0x3) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={&(0x7f0000000040), 0xb}, 0x0, 0x20, 0x0, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) r0 = fork() r1 = syz_open_procfs(r0, &(0x7f0000000000)='status\x00') r2 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x2, 0x0) pwrite64(r2, &(0x7f00000000c0)='9', 0x1, 0x8040000) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x20, 0x3, 0x4, 0x1, 0x0, 0x8, 0x0, 0x2, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x3f, 0x2, @perf_config_ext={0x240000000, 0x5}, 0x1400, 0x4, 0x8, 0x7, 0x9, 0x6, 0x6, 0x0, 0x1, 0x0, 0x8}, r0, 0xa, r2, 0x1) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r3, 0x6, 0x1e, &(0x7f0000000040)=0x1, 0x4) setsockopt$inet6_tcp_TCP_REPAIR(r3, 0x6, 0x13, &(0x7f00000018c0)=0x1, 0x4) connect$inet6(r3, &(0x7f0000000080)={0xa, 0x0, 0x0, @loopback}, 0x1c) openat$cgroup_ro(r1, &(0x7f0000000180)='blkio.throttle.io_serviced_recursive\x00', 0x0, 0x0) 22:41:20 executing program 7: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000480)}}, 0x0, 0xffffffefffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x100000, 0xe, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000500100000f000000000000000100000005000000000004000040000020000000dbf4655fdbf4655f0100ffff53ef010001000000dbf4655f000000000000000001000000000000000b0000008000000018000000c20500002b0200"/116, 0x74, 0x400}, {&(0x7f0000010100)="000000000000000000000000244b8e9b", 0x10, 0x4e0}, {&(0x7f0000010200)="010000000000050040", 0x9, 0x560}, {&(0x7f0000010300)="020000000300000004000000", 0xc, 0x800}, {&(0x7f0000010400), 0x0, 0x1000}, {&(0x7f0000011500)="ed41000000080000dbf4655fdbf4655fdbf4655f00000000000004004000", 0x1e, 0x2080}, {0x0}, {0x0}, {&(0x7f0000011c00)="0b0000000c0001022e00000002000000f40702022e", 0x15, 0x10000}, {0x0}, {0x0}, {&(0x7f0000012400)="504d4d00504d4dffdbf4655f00000000647679756b6f762d676c6170746f70320000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000006c6f6f7033340075782f746573742f73797a5f6d6f756e745f696d6167655f650500"/123, 0x7b, 0x20000}, {0x0}, {0x0, 0x0, 0x38000}], 0x0, &(0x7f0000012f00)) 22:41:20 executing program 4: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000480)}}, 0x0, 0xffffffefffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x100000, 0xe, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000500100000f000000000000000100000005000000000004000040000020000000dbf4655fdbf4655f0100ffff53ef010001000000dbf4655f000000000000000001000000000000000b0000008000000018000000c20500002b0200"/116, 0x74, 0x400}, {&(0x7f0000010100), 0x0, 0x4e0}, {&(0x7f0000010200)="010000000000050040", 0x9, 0x560}, {&(0x7f0000010300)="020000000300000004000000", 0xc, 0x800}, {&(0x7f0000010400), 0x0, 0x1000}, {&(0x7f0000011500)="ed41000000080000dbf4655fdbf4655fdbf4655f00000000000004004000", 0x1e, 0x2080}, {0x0}, {0x0}, {&(0x7f0000011c00)="0b0000000c0001022e00000002000000f40702022e", 0x15, 0x10000}, {0x0}, {0x0}, {&(0x7f0000012400)="504d4d00504d4dffdbf4655f00000000647679756b6f762d676c6170746f70320000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000006c6f6f7033340075782f746573742f73797a5f6d6f756e745f696d6167655f650500"/123, 0x7b, 0x20000}, {0x0}, {0x0, 0x0, 0x38000}], 0x0, &(0x7f0000012f00)) [ 1956.273263] loop7: detected capacity change from 0 to 2048 [ 1956.292250] loop4: detected capacity change from 0 to 2048 [ 1956.308222] EXT4-fs (loop7): unsupported descriptor size 0 [ 1956.321270] EXT4-fs (loop4): unsupported descriptor size 0 22:41:36 executing program 6: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) lsetxattr$security_evm(&(0x7f0000000240)='.\x00', &(0x7f0000000300), &(0x7f00000003c0)=@sha1={0x1, "bd2b5bce8b74aea700654a682479ac2c0852bc4d"}, 0x15, 0x3) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={&(0x7f0000000040), 0xb}, 0x0, 0x20, 0x0, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) r0 = fork() r1 = syz_open_procfs(r0, &(0x7f0000000000)='status\x00') r2 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x2, 0x0) pwrite64(r2, &(0x7f00000000c0)='9', 0x1, 0x8040000) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x20, 0x3, 0x4, 0x1, 0x0, 0x8, 0x0, 0x2, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x3f, 0x2, @perf_config_ext={0x240000000, 0x5}, 0x1400, 0x4, 0x8, 0x7, 0x9, 0x6, 0x6, 0x0, 0x1, 0x0, 0x8}, r0, 0xa, r2, 0x1) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r3, 0x6, 0x1e, &(0x7f0000000040)=0x1, 0x4) setsockopt$inet6_tcp_TCP_REPAIR(r3, 0x6, 0x13, &(0x7f00000018c0)=0x1, 0x4) connect$inet6(r3, &(0x7f0000000080)={0xa, 0x0, 0x0, @loopback}, 0x1c) openat$cgroup_ro(r1, &(0x7f0000000180)='blkio.throttle.io_serviced_recursive\x00', 0x0, 0x0) 22:41:36 executing program 3: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) lsetxattr$security_evm(&(0x7f0000000240)='.\x00', &(0x7f0000000300), &(0x7f00000003c0)=@sha1={0x1, "bd2b5bce8b74aea700654a682479ac2c0852bc4d"}, 0x15, 0x3) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={&(0x7f0000000040), 0xb}, 0x0, 0x20, 0x0, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) r0 = fork() r1 = syz_open_procfs(r0, &(0x7f0000000000)='status\x00') r2 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x2, 0x0) pwrite64(r2, &(0x7f00000000c0)='9', 0x1, 0x8040000) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x20, 0x3, 0x4, 0x1, 0x0, 0x8, 0x20620, 0x2, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x3f, 0x2, @perf_config_ext={0x240000000, 0x5}, 0x1400, 0x4, 0x8, 0x7, 0x9, 0x6, 0x6, 0x0, 0x1, 0x0, 0x8}, r0, 0xa, r2, 0x1) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r3, 0x6, 0x1e, &(0x7f0000000040)=0x1, 0x4) setsockopt$inet6_tcp_TCP_REPAIR(r3, 0x6, 0x13, &(0x7f00000018c0)=0x1, 0x4) connect$inet6(r3, &(0x7f0000000080)={0xa, 0x0, 0x0, @loopback}, 0x1c) openat$cgroup_ro(r1, &(0x7f0000000180)='blkio.throttle.io_serviced_recursive\x00', 0x0, 0x0) 22:41:36 executing program 2: perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000480)}}, 0x0, 0xffffffefffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x100000, 0xe, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000500100000f000000000000000100000005000000000004000040000020000000dbf4655fdbf4655f0100ffff53ef010001000000dbf4655f000000000000000001000000000000000b0000008000000018000000c20500002b0200"/116, 0x74, 0x400}, {&(0x7f0000010100)="000000000000000000000000244b8e9b57f04b59aa229cc218853f95", 0x1c, 0x4e0}, {&(0x7f0000010200)="010000000000050040", 0x9, 0x560}, {&(0x7f0000010300)="020000000300000004000000", 0xc, 0x800}, {&(0x7f0000010400), 0x0, 0x1000}, {&(0x7f0000011500)="ed41000000080000dbf4655fdbf4655fdbf4655f00000000000004004000", 0x1e, 0x2080}, {0x0}, {0x0}, {&(0x7f0000011c00)="0b0000000c0001022e00000002000000f40702022e", 0x15, 0x10000}, {0x0}, {0x0}, {&(0x7f0000012400)="504d4d00504d4dffdbf4655f00000000647679756b6f762d676c6170746f70320000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000006c6f6f7033340075782f746573742f73797a5f6d6f756e745f696d6167655f650500"/123, 0x7b, 0x20000}, {0x0}, {0x0, 0x0, 0x38000}], 0x0, &(0x7f0000012f00)) [ 1971.605182] loop7: detected capacity change from 0 to 2048 22:41:36 executing program 7: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000480)}}, 0x0, 0xffffffefffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x100000, 0xe, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000500100000f000000000000000100000005000000000004000040000020000000dbf4655fdbf4655f0100ffff53ef010001000000dbf4655f000000000000000001000000000000000b0000008000000018000000c20500002b0200"/116, 0x74, 0x400}, {&(0x7f0000010100)="000000000000000000000000244b8e9b", 0x10, 0x4e0}, {&(0x7f0000010200)="010000000000050040", 0x9, 0x560}, {&(0x7f0000010300)="020000000300000004000000", 0xc, 0x800}, {&(0x7f0000010400), 0x0, 0x1000}, {&(0x7f0000011500)="ed41000000080000dbf4655fdbf4655fdbf4655f00000000000004004000", 0x1e, 0x2080}, {0x0}, {0x0}, {&(0x7f0000011c00)="0b0000000c0001022e00000002000000f40702022e", 0x15, 0x10000}, {0x0}, {0x0}, {&(0x7f0000012400)="504d4d00504d4dffdbf4655f00000000647679756b6f762d676c6170746f70320000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000006c6f6f7033340075782f746573742f73797a5f6d6f756e745f696d6167655f650500"/123, 0x7b, 0x20000}, {0x0}, {0x0, 0x0, 0x38000}], 0x0, &(0x7f0000012f00)) 22:41:36 executing program 0: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000480)}}, 0x0, 0xffffffefffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x100000, 0xe, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000500100000f000000000000000100000005000000000004000040000020000000dbf4655fdbf4655f0100ffff53ef010001000000dbf4655f000000000000000001000000000000000b0000008000000018000000c20500002b0200"/116, 0x74, 0x400}, {0x0, 0x0, 0x4e0}, {&(0x7f0000010200)="010000000000050040", 0x9, 0x560}, {&(0x7f0000010300)="020000000300000004000000", 0xc, 0x800}, {&(0x7f0000010400), 0x0, 0x1000}, {&(0x7f0000011500)="ed41000000080000dbf4655fdbf4655fdbf4655f00000000000004004000", 0x1e, 0x2080}, {0x0}, {0x0}, {&(0x7f0000011c00)="0b0000000c0001022e00000002000000f40702022e", 0x15, 0x10000}, {0x0}, {0x0}, {&(0x7f0000012400)="504d4d00504d4dffdbf4655f00000000647679756b6f762d676c6170746f70320000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000006c6f6f7033340075782f746573742f73797a5f6d6f756e745f696d6167655f650500"/123, 0x7b, 0x20000}, {0x0}, {0x0, 0x0, 0x38000}], 0x0, &(0x7f0000012f00)) 22:41:36 executing program 5: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) lsetxattr$security_evm(&(0x7f0000000240)='.\x00', &(0x7f0000000300), &(0x7f00000003c0)=@sha1={0x1, "bd2b5bce8b74aea700654a682479ac2c0852bc4d"}, 0x15, 0x3) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={&(0x7f0000000040), 0xb}, 0x0, 0x20, 0x0, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) r0 = fork() r1 = syz_open_procfs(r0, &(0x7f0000000000)='status\x00') r2 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x2, 0x0) pwrite64(r2, &(0x7f00000000c0)='9', 0x1, 0x8040000) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x20, 0x3, 0x4, 0x1, 0x0, 0x8, 0x0, 0x2, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x3f, 0x2, @perf_config_ext={0x240000000, 0x5}, 0x1400, 0x4, 0x8, 0x7, 0x9, 0x6, 0x6, 0x0, 0x1, 0x0, 0x8}, r0, 0xa, r2, 0x1) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r3, 0x6, 0x1e, &(0x7f0000000040)=0x1, 0x4) connect$inet6(r3, &(0x7f0000000080)={0xa, 0x0, 0x0, @loopback}, 0x1c) openat$cgroup_ro(r1, &(0x7f0000000180)='blkio.throttle.io_serviced_recursive\x00', 0x0, 0x0) 22:41:36 executing program 4: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000480)}}, 0x0, 0xffffffefffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x100000, 0xe, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000500100000f000000000000000100000005000000000004000040000020000000dbf4655fdbf4655f0100ffff53ef010001000000dbf4655f000000000000000001000000000000000b0000008000000018000000c20500002b0200"/116, 0x74, 0x400}, {&(0x7f0000010100), 0x0, 0x4e0}, {&(0x7f0000010200)="010000000000050040", 0x9, 0x560}, {&(0x7f0000010300)="020000000300000004000000", 0xc, 0x800}, {&(0x7f0000010400), 0x0, 0x1000}, {&(0x7f0000011500)="ed41000000080000dbf4655fdbf4655fdbf4655f00000000000004004000", 0x1e, 0x2080}, {0x0}, {0x0}, {&(0x7f0000011c00)="0b0000000c0001022e00000002000000f40702022e", 0x15, 0x10000}, {0x0}, {0x0}, {&(0x7f0000012400)="504d4d00504d4dffdbf4655f00000000647679756b6f762d676c6170746f70320000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000006c6f6f7033340075782f746573742f73797a5f6d6f756e745f696d6167655f650500"/123, 0x7b, 0x20000}, {0x0}, {0x0, 0x0, 0x38000}], 0x0, &(0x7f0000012f00)) 22:41:36 executing program 1: r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, @perf_config_ext, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000000), 0x0) r2 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) ioctl$EXT4_IOC_CHECKPOINT(r2, 0x4004662b, &(0x7f0000000100)=0x5) ioctl$AUTOFS_DEV_IOCTL_TIMEOUT(0xffffffffffffffff, 0xc018937a, &(0x7f0000001480)=ANY=[@ANYBLOB="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", @ANYRES32=r0, @ANYBLOB="01040000000000002e2f66696c653000"]) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(0xffffffffffffffff, 0xc08c5332, &(0x7f00000013c0)={0xffffffff, 0x6964, 0x0, 'queue1\x00', 0xff}) r3 = gettid() process_vm_writev(r3, &(0x7f0000002580)=[{&(0x7f0000000140)=""/89, 0x59}, {&(0x7f00000001c0)=""/175, 0xaf}, {&(0x7f0000000280)=""/4096, 0x1000}], 0x3, &(0x7f0000003840)=[{&(0x7f0000002640)=""/105, 0x69}, {0xfffffffffffffffe, 0x10}], 0x2, 0x0) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r1, 0xc08c5332, &(0x7f0000001280)={0x3, 0x5, 0x0, 'queue1\x00', 0x8}) r4 = fork() write$sndseq(r1, &(0x7f0000001340)=[{0x22, 0x8, 0x2, 0x3, @time={0x4}, {0x0, 0x1}, {0x6, 0x81}, @raw32={[0x800, 0x3, 0x9]}}, {0xe1, 0x7, 0xf8, 0xff, @tick=0x2, {0x3f}, {0x4, 0xf1}, @queue={0xff, {0x6, 0x9}}}, {0x4, 0x1, 0x9, 0x5, @time={0x7, 0x6}, {0x7c, 0x2}, {0x20, 0x6}, @connect={{0x0, 0xfd}, {0x98, 0x4}}}, {0x80, 0x4, 0x7, 0x7d, @time={0xfffff000, 0x9}, {0x81, 0x1f}, {0xaa}, @queue={0x5, {0xffffffe0, 0x3}}}], 0x70) r5 = syz_open_dev$vcsn(&(0x7f0000000040), 0x3, 0x2001) ioctl$LOOP_CTL_GET_FREE(r5, 0x4c82) ptrace$setopts(0x4206, r4, 0x0, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fork() fork() clone3(&(0x7f0000004c00)={0xc0002100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) [ 1971.624070] loop0: detected capacity change from 0 to 2048 [ 1971.628103] loop2: detected capacity change from 0 to 2048 [ 1971.632583] loop4: detected capacity change from 0 to 2048 [ 1971.643995] EXT4-fs (loop2): unsupported descriptor size 0 [ 1971.644022] EXT4-fs (loop7): unsupported descriptor size 0 [ 1971.645583] EXT4-fs (loop4): unsupported descriptor size 0 [ 1971.648563] EXT4-fs (loop0): unsupported descriptor size 0 22:41:36 executing program 4: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000480)}}, 0x0, 0xffffffefffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x100000, 0xe, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000500100000f000000000000000100000005000000000004000040000020000000dbf4655fdbf4655f0100ffff53ef010001000000dbf4655f000000000000000001000000000000000b0000008000000018000000c20500002b0200"/116, 0x74, 0x400}, {&(0x7f0000010100), 0x0, 0x4e0}, {&(0x7f0000010200)="010000000000050040", 0x9, 0x560}, {&(0x7f0000010300)="020000000300000004000000", 0xc, 0x800}, {&(0x7f0000010400), 0x0, 0x1000}, {&(0x7f0000011500)="ed41000000080000dbf4655fdbf4655fdbf4655f00000000000004004000", 0x1e, 0x2080}, {0x0}, {0x0}, {&(0x7f0000011c00)="0b0000000c0001022e00000002000000f40702022e", 0x15, 0x10000}, {0x0}, {0x0}, {&(0x7f0000012400)="504d4d00504d4dffdbf4655f00000000647679756b6f762d676c6170746f70320000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000006c6f6f7033340075782f746573742f73797a5f6d6f756e745f696d6167655f650500"/123, 0x7b, 0x20000}, {0x0}, {0x0, 0x0, 0x38000}], 0x0, &(0x7f0000012f00)) 22:41:36 executing program 2: perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000480)}}, 0x0, 0xffffffefffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x100000, 0xe, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000500100000f000000000000000100000005000000000004000040000020000000dbf4655fdbf4655f0100ffff53ef010001000000dbf4655f000000000000000001000000000000000b0000008000000018000000c20500002b0200"/116, 0x74, 0x400}, {&(0x7f0000010100)="000000000000000000000000244b8e9b57f04b59aa229cc218853f95", 0x1c, 0x4e0}, {&(0x7f0000010200)="010000000000050040", 0x9, 0x560}, {&(0x7f0000010300)="020000000300000004000000", 0xc, 0x800}, {&(0x7f0000010400), 0x0, 0x1000}, {&(0x7f0000011500)="ed41000000080000dbf4655fdbf4655fdbf4655f00000000000004004000", 0x1e, 0x2080}, {0x0}, {0x0}, {&(0x7f0000011c00)="0b0000000c0001022e00000002000000f40702022e", 0x15, 0x10000}, {0x0}, {0x0}, {&(0x7f0000012400)="504d4d00504d4dffdbf4655f00000000647679756b6f762d676c6170746f70320000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000006c6f6f7033340075782f746573742f73797a5f6d6f756e745f696d6167655f650500"/123, 0x7b, 0x20000}, {0x0}, {0x0, 0x0, 0x38000}], 0x0, &(0x7f0000012f00)) 22:41:36 executing program 0: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000480)}}, 0x0, 0xffffffefffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x100000, 0xe, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000500100000f000000000000000100000005000000000004000040000020000000dbf4655fdbf4655f0100ffff53ef010001000000dbf4655f000000000000000001000000000000000b0000008000000018000000c20500002b0200"/116, 0x74, 0x400}, {0x0, 0x0, 0x4e0}, {&(0x7f0000010200)="010000000000050040", 0x9, 0x560}, {&(0x7f0000010300)="020000000300000004000000", 0xc, 0x800}, {&(0x7f0000010400), 0x0, 0x1000}, {&(0x7f0000011500)="ed41000000080000dbf4655fdbf4655fdbf4655f00000000000004004000", 0x1e, 0x2080}, {0x0}, {0x0}, {&(0x7f0000011c00)="0b0000000c0001022e00000002000000f40702022e", 0x15, 0x10000}, {0x0}, {0x0}, {&(0x7f0000012400)="504d4d00504d4dffdbf4655f00000000647679756b6f762d676c6170746f70320000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000006c6f6f7033340075782f746573742f73797a5f6d6f756e745f696d6167655f650500"/123, 0x7b, 0x20000}, {0x0}, {0x0, 0x0, 0x38000}], 0x0, &(0x7f0000012f00)) 22:41:36 executing program 7: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000480)}}, 0x0, 0xffffffefffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x100000, 0xe, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000500100000f000000000000000100000005000000000004000040000020000000dbf4655fdbf4655f0100ffff53ef010001000000dbf4655f000000000000000001000000000000000b0000008000000018000000c20500002b0200"/116, 0x74, 0x400}, {&(0x7f0000010100)="000000000000000000000000244b8e9b", 0x10, 0x4e0}, {&(0x7f0000010200)="010000000000050040", 0x9, 0x560}, {&(0x7f0000010300)="020000000300000004000000", 0xc, 0x800}, {&(0x7f0000010400), 0x0, 0x1000}, {&(0x7f0000011500)="ed41000000080000dbf4655fdbf4655fdbf4655f00000000000004004000", 0x1e, 0x2080}, {0x0}, {0x0}, {&(0x7f0000011c00)="0b0000000c0001022e00000002000000f40702022e", 0x15, 0x10000}, {0x0}, {0x0}, {&(0x7f0000012400)="504d4d00504d4dffdbf4655f00000000647679756b6f762d676c6170746f70320000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000006c6f6f7033340075782f746573742f73797a5f6d6f756e745f696d6167655f650500"/123, 0x7b, 0x20000}, {0x0}, {0x0, 0x0, 0x38000}], 0x0, &(0x7f0000012f00)) [ 1971.796963] loop2: detected capacity change from 0 to 2048 [ 1971.816821] loop4: detected capacity change from 0 to 2048 [ 1971.820110] EXT4-fs (loop2): unsupported descriptor size 0 [ 1971.839821] EXT4-fs (loop4): unsupported descriptor size 0 [ 1971.859086] loop7: detected capacity change from 0 to 2048 [ 1971.862853] loop0: detected capacity change from 0 to 2048 [ 1971.875145] EXT4-fs (loop7): unsupported descriptor size 0 [ 1971.947810] EXT4-fs (loop0): unsupported descriptor size 0 22:41:51 executing program 3: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) lsetxattr$security_evm(&(0x7f0000000240)='.\x00', &(0x7f0000000300), &(0x7f00000003c0)=@sha1={0x1, "bd2b5bce8b74aea700654a682479ac2c0852bc4d"}, 0x15, 0x3) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={&(0x7f0000000040), 0xb}, 0x0, 0x20, 0x0, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) r0 = fork() r1 = syz_open_procfs(r0, &(0x7f0000000000)='status\x00') r2 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x2, 0x0) pwrite64(r2, &(0x7f00000000c0)='9', 0x1, 0x8040000) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x20, 0x3, 0x4, 0x1, 0x0, 0x8, 0x20620, 0x2, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x3f, 0x2, @perf_config_ext={0x240000000, 0x5}, 0x1400, 0x4, 0x8, 0x7, 0x9, 0x6, 0x6, 0x0, 0x1, 0x0, 0x8}, r0, 0xa, r2, 0x1) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r3, 0x6, 0x1e, &(0x7f0000000040)=0x1, 0x4) setsockopt$inet6_tcp_TCP_REPAIR(r3, 0x6, 0x13, &(0x7f00000018c0)=0x1, 0x4) connect$inet6(r3, &(0x7f0000000080)={0xa, 0x0, 0x0, @loopback}, 0x1c) openat$cgroup_ro(r1, &(0x7f0000000180)='blkio.throttle.io_serviced_recursive\x00', 0x0, 0x0) 22:41:51 executing program 2: perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000480)}}, 0x0, 0xffffffefffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x100000, 0xe, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000500100000f000000000000000100000005000000000004000040000020000000dbf4655fdbf4655f0100ffff53ef010001000000dbf4655f000000000000000001000000000000000b0000008000000018000000c20500002b0200"/116, 0x74, 0x400}, {&(0x7f0000010100)="000000000000000000000000244b8e9b57f04b59aa229cc218853f95", 0x1c, 0x4e0}, {&(0x7f0000010200)="010000000000050040", 0x9, 0x560}, {&(0x7f0000010300)="020000000300000004000000", 0xc, 0x800}, {&(0x7f0000010400), 0x0, 0x1000}, {&(0x7f0000011500)="ed41000000080000dbf4655fdbf4655fdbf4655f00000000000004004000", 0x1e, 0x2080}, {0x0}, {0x0}, {&(0x7f0000011c00)="0b0000000c0001022e00000002000000f40702022e", 0x15, 0x10000}, {0x0}, {0x0}, {&(0x7f0000012400)="504d4d00504d4dffdbf4655f00000000647679756b6f762d676c6170746f70320000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000006c6f6f7033340075782f746573742f73797a5f6d6f756e745f696d6167655f650500"/123, 0x7b, 0x20000}, {0x0}, {0x0, 0x0, 0x38000}], 0x0, &(0x7f0000012f00)) 22:41:51 executing program 1: r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, @perf_config_ext, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000000), 0x0) r2 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) ioctl$EXT4_IOC_CHECKPOINT(r2, 0x4004662b, &(0x7f0000000100)=0x5) ioctl$AUTOFS_DEV_IOCTL_TIMEOUT(0xffffffffffffffff, 0xc018937a, &(0x7f0000001480)=ANY=[@ANYBLOB="010000fe04f804f32d1ae95f4d8fd9ce99ff00010000001800000059a5a91fc707002c3e05f0bcf35234dd60eedec3d5f1b58f0d41f6996d0df70b25316c86b91cf6440f87695b3e2bf9118d7b986e6dd6169cde2d7b35569ff3c18ea708da093a5e297fd2ec2322a167617fa6662e65407cedfd90d2ee90deccf04f2c85b215e5090cb50628f934703c2db873b5eb9a2e276f987493cc445a8474761879f6df5a5233b80656c014a59590366f77d5104d838160f3f8f304bbfb07a672117635569099d752c2b724b38b74a3b0e2c4dd54619ff2e05de8c58ace02796bd997ccfd3fbf04c5bb7420f2656931eb46c8e72d17fd9b33dd84ff6fab17ff995be40bf9a47cdde574665966c721e5f265d3aaac1788c3ea", @ANYRES32=r0, @ANYBLOB="01040000000000002e2f66696c653000"]) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r3, 0xc08c5332, 0x0) r4 = gettid() process_vm_writev(r4, &(0x7f0000002580)=[{&(0x7f0000000140)=""/89, 0x59}, {&(0x7f00000001c0)=""/175, 0xaf}, {&(0x7f0000000280)=""/4096, 0x1000}], 0x3, &(0x7f0000003840)=[{&(0x7f0000002640)=""/105, 0x69}, {0xfffffffffffffffe, 0x10}], 0x2, 0x0) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r1, 0xc08c5332, &(0x7f0000001280)={0x3, 0x5, 0x0, 'queue1\x00', 0x8}) r5 = fork() write$sndseq(r1, &(0x7f0000001340)=[{0x22, 0x8, 0x2, 0x3, @time={0x4}, {0x0, 0x1}, {0x6, 0x81}, @raw32={[0x800, 0x3, 0x9]}}, {0xe1, 0x7, 0xf8, 0xff, @tick=0x2, {0x3f}, {0x4, 0xf1}, @queue={0xff, {0x6, 0x9}}}, {0x4, 0x1, 0x9, 0x5, @time={0x7, 0x6}, {0x7c, 0x2}, {0x20, 0x6}, @connect={{0x0, 0xfd}, {0x98, 0x4}}}, {0x80, 0x4, 0x7, 0x7d, @time={0xfffff000, 0x9}, {0x81, 0x1f}, {0xaa}, @queue={0x5, {0xffffffe0, 0x3}}}], 0x70) r6 = syz_open_dev$vcsn(&(0x7f0000000040), 0x3, 0x2001) ioctl$LOOP_CTL_GET_FREE(r6, 0x4c82) ptrace$setopts(0x4206, r5, 0x0, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fork() fork() clone3(&(0x7f0000004c00)={0xc0002100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) 22:41:51 executing program 5: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) lsetxattr$security_evm(&(0x7f0000000240)='.\x00', &(0x7f0000000300), &(0x7f00000003c0)=@sha1={0x1, "bd2b5bce8b74aea700654a682479ac2c0852bc4d"}, 0x15, 0x3) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={&(0x7f0000000040), 0xb}, 0x0, 0x20, 0x0, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) r0 = fork() r1 = syz_open_procfs(r0, &(0x7f0000000000)='status\x00') r2 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x2, 0x0) pwrite64(r2, &(0x7f00000000c0)='9', 0x1, 0x8040000) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x20, 0x3, 0x4, 0x1, 0x0, 0x8, 0x0, 0x2, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x3f, 0x2, @perf_config_ext={0x240000000, 0x5}, 0x1400, 0x4, 0x8, 0x7, 0x9, 0x6, 0x6, 0x0, 0x1, 0x0, 0x8}, r0, 0xa, r2, 0x1) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r3, 0x6, 0x1e, &(0x7f0000000040)=0x1, 0x4) connect$inet6(r3, &(0x7f0000000080)={0xa, 0x0, 0x0, @loopback}, 0x1c) openat$cgroup_ro(r1, &(0x7f0000000180)='blkio.throttle.io_serviced_recursive\x00', 0x0, 0x0) 22:41:51 executing program 4: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000480)}}, 0x0, 0xffffffefffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x100000, 0xe, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000500100000f000000000000000100000005000000000004000040000020000000dbf4655fdbf4655f0100ffff53ef010001000000dbf4655f000000000000000001000000000000000b0000008000000018000000c20500002b0200"/116, 0x74, 0x400}, {&(0x7f0000010100)="000000000000000000000000244b8e9b", 0x10, 0x4e0}, {&(0x7f0000010200)="010000000000050040", 0x9, 0x560}, {&(0x7f0000010300)="020000000300000004000000", 0xc, 0x800}, {&(0x7f0000010400), 0x0, 0x1000}, {&(0x7f0000011500)="ed41000000080000dbf4655fdbf4655fdbf4655f00000000000004004000", 0x1e, 0x2080}, {0x0}, {0x0}, {&(0x7f0000011c00)="0b0000000c0001022e00000002000000f40702022e", 0x15, 0x10000}, {0x0}, {0x0}, {&(0x7f0000012400)="504d4d00504d4dffdbf4655f00000000647679756b6f762d676c6170746f70320000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000006c6f6f7033340075782f746573742f73797a5f6d6f756e745f696d6167655f650500"/123, 0x7b, 0x20000}, {0x0}, {0x0, 0x0, 0x38000}], 0x0, &(0x7f0000012f00)) 22:41:51 executing program 7: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000480)}}, 0x0, 0xffffffefffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x100000, 0xe, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000500100000f000000000000000100000005000000000004000040000020000000dbf4655fdbf4655f0100ffff53ef010001000000dbf4655f000000000000000001000000000000000b0000008000000018000000c20500002b0200"/116, 0x74, 0x400}, {&(0x7f0000010100)="000000000000000000000000244b8e9b57f04b59aa229cc2", 0x18, 0x4e0}, {&(0x7f0000010200)="010000000000050040", 0x9, 0x560}, {&(0x7f0000010300)="020000000300000004000000", 0xc, 0x800}, {&(0x7f0000010400), 0x0, 0x1000}, {&(0x7f0000011500)="ed41000000080000dbf4655fdbf4655fdbf4655f00000000000004004000", 0x1e, 0x2080}, {0x0}, {0x0}, {&(0x7f0000011c00)="0b0000000c0001022e00000002000000f40702022e", 0x15, 0x10000}, {0x0}, {0x0}, {&(0x7f0000012400)="504d4d00504d4dffdbf4655f00000000647679756b6f762d676c6170746f70320000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000006c6f6f7033340075782f746573742f73797a5f6d6f756e745f696d6167655f650500"/123, 0x7b, 0x20000}, {0x0}, {0x0, 0x0, 0x38000}], 0x0, &(0x7f0000012f00)) 22:41:51 executing program 6: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) lsetxattr$security_evm(&(0x7f0000000240)='.\x00', &(0x7f0000000300), &(0x7f00000003c0)=@sha1={0x1, "bd2b5bce8b74aea700654a682479ac2c0852bc4d"}, 0x15, 0x3) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={&(0x7f0000000040), 0xb}, 0x0, 0x20, 0x0, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) r0 = fork() r1 = syz_open_procfs(r0, &(0x7f0000000000)='status\x00') r2 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x2, 0x0) pwrite64(r2, &(0x7f00000000c0)='9', 0x1, 0x8040000) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x20, 0x3, 0x4, 0x1, 0x0, 0x8, 0x20620, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x3f, 0x2, @perf_config_ext={0x240000000, 0x5}, 0x1400, 0x4, 0x8, 0x7, 0x9, 0x6, 0x6, 0x0, 0x1, 0x0, 0x8}, r0, 0xa, r2, 0x1) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r3, 0x6, 0x1e, &(0x7f0000000040)=0x1, 0x4) setsockopt$inet6_tcp_TCP_REPAIR(r3, 0x6, 0x13, &(0x7f00000018c0)=0x1, 0x4) connect$inet6(r3, &(0x7f0000000080)={0xa, 0x0, 0x0, @loopback}, 0x1c) openat$cgroup_ro(r1, &(0x7f0000000180)='blkio.throttle.io_serviced_recursive\x00', 0x0, 0x0) 22:41:51 executing program 0: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000480)}}, 0x0, 0xffffffefffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x100000, 0xe, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000500100000f000000000000000100000005000000000004000040000020000000dbf4655fdbf4655f0100ffff53ef010001000000dbf4655f000000000000000001000000000000000b0000008000000018000000c20500002b0200"/116, 0x74, 0x400}, {0x0, 0x0, 0x4e0}, {&(0x7f0000010200)="010000000000050040", 0x9, 0x560}, {&(0x7f0000010300)="020000000300000004000000", 0xc, 0x800}, {&(0x7f0000010400), 0x0, 0x1000}, {&(0x7f0000011500)="ed41000000080000dbf4655fdbf4655fdbf4655f00000000000004004000", 0x1e, 0x2080}, {0x0}, {0x0}, {&(0x7f0000011c00)="0b0000000c0001022e00000002000000f40702022e", 0x15, 0x10000}, {0x0}, {0x0}, {&(0x7f0000012400)="504d4d00504d4dffdbf4655f00000000647679756b6f762d676c6170746f70320000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000006c6f6f7033340075782f746573742f73797a5f6d6f756e745f696d6167655f650500"/123, 0x7b, 0x20000}, {0x0}, {0x0, 0x0, 0x38000}], 0x0, &(0x7f0000012f00)) [ 1987.183220] loop7: detected capacity change from 0 to 2048 [ 1987.183417] loop2: detected capacity change from 0 to 2048 [ 1987.200022] loop0: detected capacity change from 0 to 2048 [ 1987.206427] EXT4-fs (loop2): unsupported descriptor size 0 [ 1987.218966] EXT4-fs (loop0): unsupported descriptor size 0 [ 1987.229605] EXT4-fs (loop7): unsupported descriptor size 0 [ 1987.235949] loop4: detected capacity change from 0 to 2048 [ 1987.265367] EXT4-fs (loop4): unsupported descriptor size 0 22:41:51 executing program 2: perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000480)}}, 0x0, 0xffffffefffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x100000, 0xe, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000500100000f000000000000000100000005000000000004000040000020000000dbf4655fdbf4655f0100ffff53ef010001000000dbf4655f000000000000000001000000000000000b0000008000000018000000c20500002b0200"/116, 0x74, 0x400}, {&(0x7f0000010100)="000000000000000000000000244b8e9b57f04b59aa229cc218853f950100", 0x1e, 0x4e0}, {&(0x7f0000010200)="010000000000050040", 0x9, 0x560}, {&(0x7f0000010300)="020000000300000004000000", 0xc, 0x800}, {&(0x7f0000010400), 0x0, 0x1000}, {&(0x7f0000011500)="ed41000000080000dbf4655fdbf4655fdbf4655f00000000000004004000", 0x1e, 0x2080}, {0x0}, {0x0}, {&(0x7f0000011c00)="0b0000000c0001022e00000002000000f40702022e", 0x15, 0x10000}, {0x0}, {0x0}, {&(0x7f0000012400)="504d4d00504d4dffdbf4655f00000000647679756b6f762d676c6170746f70320000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000006c6f6f7033340075782f746573742f73797a5f6d6f756e745f696d6167655f650500"/123, 0x7b, 0x20000}, {0x0}, {0x0, 0x0, 0x38000}], 0x0, &(0x7f0000012f00)) 22:41:51 executing program 0: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x100000, 0xe, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000500100000f000000000000000100000005000000000004000040000020000000dbf4655fdbf4655f0100ffff53ef010001000000dbf4655f000000000000000001000000000000000b0000008000000018000000c20500002b0200"/116, 0x74, 0x400}, {0x0, 0x0, 0x4e0}, {&(0x7f0000010200)="010000000000050040", 0x9, 0x560}, {&(0x7f0000010300)="020000000300000004000000", 0xc, 0x800}, {&(0x7f0000010400), 0x0, 0x1000}, {&(0x7f0000011500)="ed41000000080000dbf4655fdbf4655fdbf4655f00000000000004004000", 0x1e, 0x2080}, {0x0}, {0x0}, {&(0x7f0000011c00)="0b0000000c0001022e00000002000000f40702022e", 0x15, 0x10000}, {0x0}, {0x0}, {&(0x7f0000012400)="504d4d00504d4dffdbf4655f00000000647679756b6f762d676c6170746f70320000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000006c6f6f7033340075782f746573742f73797a5f6d6f756e745f696d6167655f650500"/123, 0x7b, 0x20000}, {0x0}, {0x0, 0x0, 0x38000}], 0x0, &(0x7f0000012f00)) 22:41:51 executing program 7: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000480)}}, 0x0, 0xffffffefffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x100000, 0xe, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000500100000f000000000000000100000005000000000004000040000020000000dbf4655fdbf4655f0100ffff53ef010001000000dbf4655f000000000000000001000000000000000b0000008000000018000000c20500002b0200"/116, 0x74, 0x400}, {&(0x7f0000010100)="000000000000000000000000244b8e9b57f04b59aa229cc2", 0x18, 0x4e0}, {&(0x7f0000010200)="010000000000050040", 0x9, 0x560}, {&(0x7f0000010300)="020000000300000004000000", 0xc, 0x800}, {&(0x7f0000010400), 0x0, 0x1000}, {&(0x7f0000011500)="ed41000000080000dbf4655fdbf4655fdbf4655f00000000000004004000", 0x1e, 0x2080}, {0x0}, {0x0}, {&(0x7f0000011c00)="0b0000000c0001022e00000002000000f40702022e", 0x15, 0x10000}, {0x0}, {0x0}, {&(0x7f0000012400)="504d4d00504d4dffdbf4655f00000000647679756b6f762d676c6170746f70320000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000006c6f6f7033340075782f746573742f73797a5f6d6f756e745f696d6167655f650500"/123, 0x7b, 0x20000}, {0x0}, {0x0, 0x0, 0x38000}], 0x0, &(0x7f0000012f00)) [ 1987.387351] loop2: detected capacity change from 0 to 2048 [ 1987.410633] EXT4-fs (loop2): unsupported descriptor size 0 22:41:51 executing program 4: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000480)}}, 0x0, 0xffffffefffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x100000, 0xe, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000500100000f000000000000000100000005000000000004000040000020000000dbf4655fdbf4655f0100ffff53ef010001000000dbf4655f000000000000000001000000000000000b0000008000000018000000c20500002b0200"/116, 0x74, 0x400}, {&(0x7f0000010100)="000000000000000000000000244b8e9b", 0x10, 0x4e0}, {&(0x7f0000010200)="010000000000050040", 0x9, 0x560}, {&(0x7f0000010300)="020000000300000004000000", 0xc, 0x800}, {&(0x7f0000010400), 0x0, 0x1000}, {&(0x7f0000011500)="ed41000000080000dbf4655fdbf4655fdbf4655f00000000000004004000", 0x1e, 0x2080}, {0x0}, {0x0}, {&(0x7f0000011c00)="0b0000000c0001022e00000002000000f40702022e", 0x15, 0x10000}, {0x0}, {0x0}, {&(0x7f0000012400)="504d4d00504d4dffdbf4655f00000000647679756b6f762d676c6170746f70320000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000006c6f6f7033340075782f746573742f73797a5f6d6f756e745f696d6167655f650500"/123, 0x7b, 0x20000}, {0x0}, {0x0, 0x0, 0x38000}], 0x0, &(0x7f0000012f00)) [ 1987.460885] loop7: detected capacity change from 0 to 2048 [ 1987.471519] loop0: detected capacity change from 0 to 2048 [ 1987.493612] EXT4-fs (loop7): unsupported descriptor size 0 [ 1987.507413] EXT4-fs (loop0): unsupported descriptor size 0 22:41:52 executing program 2: perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000480)}}, 0x0, 0xffffffefffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x100000, 0xe, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000500100000f000000000000000100000005000000000004000040000020000000dbf4655fdbf4655f0100ffff53ef010001000000dbf4655f000000000000000001000000000000000b0000008000000018000000c20500002b0200"/116, 0x74, 0x400}, {&(0x7f0000010100)="000000000000000000000000244b8e9b57f04b59aa229cc218853f950100", 0x1e, 0x4e0}, {&(0x7f0000010200)="010000000000050040", 0x9, 0x560}, {&(0x7f0000010300)="020000000300000004000000", 0xc, 0x800}, {&(0x7f0000010400), 0x0, 0x1000}, {&(0x7f0000011500)="ed41000000080000dbf4655fdbf4655fdbf4655f00000000000004004000", 0x1e, 0x2080}, {0x0}, {0x0}, {&(0x7f0000011c00)="0b0000000c0001022e00000002000000f40702022e", 0x15, 0x10000}, {0x0}, {0x0}, {&(0x7f0000012400)="504d4d00504d4dffdbf4655f00000000647679756b6f762d676c6170746f70320000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000006c6f6f7033340075782f746573742f73797a5f6d6f756e745f696d6167655f650500"/123, 0x7b, 0x20000}, {0x0}, {0x0, 0x0, 0x38000}], 0x0, &(0x7f0000012f00)) 22:41:52 executing program 5: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) lsetxattr$security_evm(&(0x7f0000000240)='.\x00', &(0x7f0000000300), &(0x7f00000003c0)=@sha1={0x1, "bd2b5bce8b74aea700654a682479ac2c0852bc4d"}, 0x15, 0x3) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={&(0x7f0000000040), 0xb}, 0x0, 0x20, 0x0, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) r0 = fork() r1 = syz_open_procfs(r0, &(0x7f0000000000)='status\x00') r2 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x2, 0x0) pwrite64(r2, &(0x7f00000000c0)='9', 0x1, 0x8040000) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x20, 0x3, 0x4, 0x1, 0x0, 0x8, 0x0, 0x2, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x3f, 0x2, @perf_config_ext={0x240000000, 0x5}, 0x1400, 0x4, 0x8, 0x7, 0x9, 0x6, 0x6, 0x0, 0x1, 0x0, 0x8}, r0, 0xa, r2, 0x1) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r3, 0x6, 0x1e, &(0x7f0000000040)=0x1, 0x4) connect$inet6(r3, &(0x7f0000000080)={0xa, 0x0, 0x0, @loopback}, 0x1c) openat$cgroup_ro(r1, &(0x7f0000000180)='blkio.throttle.io_serviced_recursive\x00', 0x0, 0x0) 22:41:52 executing program 6: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) lsetxattr$security_evm(&(0x7f0000000240)='.\x00', &(0x7f0000000300), &(0x7f00000003c0)=@sha1={0x1, "bd2b5bce8b74aea700654a682479ac2c0852bc4d"}, 0x15, 0x3) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={&(0x7f0000000040), 0xb}, 0x0, 0x20, 0x0, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) r0 = fork() r1 = syz_open_procfs(r0, &(0x7f0000000000)='status\x00') r2 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x2, 0x0) pwrite64(r2, &(0x7f00000000c0)='9', 0x1, 0x8040000) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x20, 0x3, 0x4, 0x1, 0x0, 0x8, 0x20620, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x3f, 0x2, @perf_config_ext={0x240000000, 0x5}, 0x1400, 0x4, 0x8, 0x7, 0x9, 0x6, 0x6, 0x0, 0x1, 0x0, 0x8}, r0, 0xa, r2, 0x1) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r3, 0x6, 0x1e, &(0x7f0000000040)=0x1, 0x4) setsockopt$inet6_tcp_TCP_REPAIR(r3, 0x6, 0x13, &(0x7f00000018c0)=0x1, 0x4) connect$inet6(r3, &(0x7f0000000080)={0xa, 0x0, 0x0, @loopback}, 0x1c) openat$cgroup_ro(r1, &(0x7f0000000180)='blkio.throttle.io_serviced_recursive\x00', 0x0, 0x0) [ 1987.569812] loop2: detected capacity change from 0 to 2048 [ 1987.588890] EXT4-fs (loop2): unsupported descriptor size 0 22:41:52 executing program 7: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000480)}}, 0x0, 0xffffffefffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x100000, 0xe, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000500100000f000000000000000100000005000000000004000040000020000000dbf4655fdbf4655f0100ffff53ef010001000000dbf4655f000000000000000001000000000000000b0000008000000018000000c20500002b0200"/116, 0x74, 0x400}, {&(0x7f0000010100)="000000000000000000000000244b8e9b57f04b59aa229cc2", 0x18, 0x4e0}, {&(0x7f0000010200)="010000000000050040", 0x9, 0x560}, {&(0x7f0000010300)="020000000300000004000000", 0xc, 0x800}, {&(0x7f0000010400), 0x0, 0x1000}, {&(0x7f0000011500)="ed41000000080000dbf4655fdbf4655fdbf4655f00000000000004004000", 0x1e, 0x2080}, {0x0}, {0x0}, {&(0x7f0000011c00)="0b0000000c0001022e00000002000000f40702022e", 0x15, 0x10000}, {0x0}, {0x0}, {&(0x7f0000012400)="504d4d00504d4dffdbf4655f00000000647679756b6f762d676c6170746f70320000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000006c6f6f7033340075782f746573742f73797a5f6d6f756e745f696d6167655f650500"/123, 0x7b, 0x20000}, {0x0}, {0x0, 0x0, 0x38000}], 0x0, &(0x7f0000012f00)) [ 1987.626699] loop4: detected capacity change from 0 to 2048 [ 1987.663739] EXT4-fs (loop4): unsupported descriptor size 0 [ 1987.762323] loop7: detected capacity change from 0 to 2048 [ 1987.774811] EXT4-fs (loop7): unsupported descriptor size 0 22:41:52 executing program 3: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) lsetxattr$security_evm(&(0x7f0000000240)='.\x00', &(0x7f0000000300), &(0x7f00000003c0)=@sha1={0x1, "bd2b5bce8b74aea700654a682479ac2c0852bc4d"}, 0x15, 0x3) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={&(0x7f0000000040), 0xb}, 0x0, 0x20, 0x0, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) r0 = fork() r1 = syz_open_procfs(r0, &(0x7f0000000000)='status\x00') r2 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x2, 0x0) pwrite64(r2, &(0x7f00000000c0)='9', 0x1, 0x8040000) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x20, 0x3, 0x4, 0x1, 0x0, 0x8, 0x20620, 0x2, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x3f, 0x2, @perf_config_ext={0x240000000, 0x5}, 0x1400, 0x4, 0x8, 0x7, 0x9, 0x6, 0x6, 0x0, 0x1, 0x0, 0x8}, r0, 0xa, r2, 0x1) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r3, 0x6, 0x1e, &(0x7f0000000040)=0x1, 0x4) setsockopt$inet6_tcp_TCP_REPAIR(r3, 0x6, 0x13, &(0x7f00000018c0)=0x1, 0x4) connect$inet6(r3, &(0x7f0000000080)={0xa, 0x0, 0x0, @loopback}, 0x1c) openat$cgroup_ro(r1, &(0x7f0000000180)='blkio.throttle.io_serviced_recursive\x00', 0x0, 0x0) 22:41:52 executing program 2: perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000480)}}, 0x0, 0xffffffefffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x100000, 0xe, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000500100000f000000000000000100000005000000000004000040000020000000dbf4655fdbf4655f0100ffff53ef010001000000dbf4655f000000000000000001000000000000000b0000008000000018000000c20500002b0200"/116, 0x74, 0x400}, {&(0x7f0000010100)="000000000000000000000000244b8e9b57f04b59aa229cc218853f950100", 0x1e, 0x4e0}, {&(0x7f0000010200)="010000000000050040", 0x9, 0x560}, {&(0x7f0000010300)="020000000300000004000000", 0xc, 0x800}, {&(0x7f0000010400), 0x0, 0x1000}, {&(0x7f0000011500)="ed41000000080000dbf4655fdbf4655fdbf4655f00000000000004004000", 0x1e, 0x2080}, {0x0}, {0x0}, {&(0x7f0000011c00)="0b0000000c0001022e00000002000000f40702022e", 0x15, 0x10000}, {0x0}, {0x0}, {&(0x7f0000012400)="504d4d00504d4dffdbf4655f00000000647679756b6f762d676c6170746f70320000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000006c6f6f7033340075782f746573742f73797a5f6d6f756e745f696d6167655f650500"/123, 0x7b, 0x20000}, {0x0}, {0x0, 0x0, 0x38000}], 0x0, &(0x7f0000012f00)) 22:41:52 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x100000, 0xe, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000500100000f000000000000000100000005000000000004000040000020000000dbf4655fdbf4655f0100ffff53ef010001000000dbf4655f000000000000000001000000000000000b0000008000000018000000c20500002b0200"/116, 0x74, 0x400}, {0x0, 0x0, 0x4e0}, {&(0x7f0000010200)="010000000000050040", 0x9, 0x560}, {&(0x7f0000010300)="020000000300000004000000", 0xc, 0x800}, {&(0x7f0000010400), 0x0, 0x1000}, {&(0x7f0000011500)="ed41000000080000dbf4655fdbf4655fdbf4655f00000000000004004000", 0x1e, 0x2080}, {0x0}, {0x0}, {&(0x7f0000011c00)="0b0000000c0001022e00000002000000f40702022e", 0x15, 0x10000}, {0x0}, {0x0}, {&(0x7f0000012400)="504d4d00504d4dffdbf4655f00000000647679756b6f762d676c6170746f70320000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000006c6f6f7033340075782f746573742f73797a5f6d6f756e745f696d6167655f650500"/123, 0x7b, 0x20000}, {0x0}, {0x0, 0x0, 0x38000}], 0x0, &(0x7f0000012f00)) 22:41:52 executing program 1: r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, @perf_config_ext, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000000), 0x0) r2 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) ioctl$EXT4_IOC_CHECKPOINT(r2, 0x4004662b, &(0x7f0000000100)=0x5) ioctl$AUTOFS_DEV_IOCTL_TIMEOUT(0xffffffffffffffff, 0xc018937a, &(0x7f0000001480)=ANY=[@ANYBLOB="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", @ANYRES32=r0, @ANYBLOB="01040000000000002e2f66696c653000"]) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r3, 0xc08c5332, 0x0) r4 = gettid() process_vm_writev(r4, &(0x7f0000002580)=[{&(0x7f0000000140)=""/89, 0x59}, {&(0x7f00000001c0)=""/175, 0xaf}, {&(0x7f0000000280)=""/4096, 0x1000}], 0x3, &(0x7f0000003840)=[{&(0x7f0000002640)=""/105, 0x69}, {0xfffffffffffffffe, 0x10}], 0x2, 0x0) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r1, 0xc08c5332, &(0x7f0000001280)={0x3, 0x5, 0x0, 'queue1\x00', 0x8}) r5 = fork() write$sndseq(r1, &(0x7f0000001340)=[{0x22, 0x8, 0x2, 0x3, @time={0x4}, {0x0, 0x1}, {0x6, 0x81}, @raw32={[0x800, 0x3, 0x9]}}, {0xe1, 0x7, 0xf8, 0xff, @tick=0x2, {0x3f}, {0x4, 0xf1}, @queue={0xff, {0x6, 0x9}}}, {0x4, 0x1, 0x9, 0x5, @time={0x7, 0x6}, {0x7c, 0x2}, {0x20, 0x6}, @connect={{0x0, 0xfd}, {0x98, 0x4}}}, {0x80, 0x4, 0x7, 0x7d, @time={0xfffff000, 0x9}, {0x81, 0x1f}, {0xaa}, @queue={0x5, {0xffffffe0, 0x3}}}], 0x70) r6 = syz_open_dev$vcsn(&(0x7f0000000040), 0x3, 0x2001) ioctl$LOOP_CTL_GET_FREE(r6, 0x4c82) ptrace$setopts(0x4206, r5, 0x0, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fork() fork() clone3(&(0x7f0000004c00)={0xc0002100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) 22:41:52 executing program 4: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000480)}}, 0x0, 0xffffffefffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x100000, 0xe, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000500100000f000000000000000100000005000000000004000040000020000000dbf4655fdbf4655f0100ffff53ef010001000000dbf4655f000000000000000001000000000000000b0000008000000018000000c20500002b0200"/116, 0x74, 0x400}, {&(0x7f0000010100)="000000000000000000000000244b8e9b", 0x10, 0x4e0}, {&(0x7f0000010200)="010000000000050040", 0x9, 0x560}, {&(0x7f0000010300)="020000000300000004000000", 0xc, 0x800}, {&(0x7f0000010400), 0x0, 0x1000}, {&(0x7f0000011500)="ed41000000080000dbf4655fdbf4655fdbf4655f00000000000004004000", 0x1e, 0x2080}, {0x0}, {0x0}, {&(0x7f0000011c00)="0b0000000c0001022e00000002000000f40702022e", 0x15, 0x10000}, {0x0}, {0x0}, {&(0x7f0000012400)="504d4d00504d4dffdbf4655f00000000647679756b6f762d676c6170746f70320000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000006c6f6f7033340075782f746573742f73797a5f6d6f756e745f696d6167655f650500"/123, 0x7b, 0x20000}, {0x0}, {0x0, 0x0, 0x38000}], 0x0, &(0x7f0000012f00)) [ 1987.865080] loop2: detected capacity change from 0 to 2048 [ 1987.895922] loop4: detected capacity change from 0 to 2048 [ 1987.906708] EXT4-fs (loop2): unsupported descriptor size 0 [ 1987.909929] EXT4-fs (loop4): unsupported descriptor size 0 [ 1987.950749] loop0: detected capacity change from 0 to 2048 [ 1987.968604] EXT4-fs (loop0): unsupported descriptor size 0 22:42:08 executing program 1: r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, @perf_config_ext, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000000), 0x0) r2 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) ioctl$EXT4_IOC_CHECKPOINT(r2, 0x4004662b, &(0x7f0000000100)=0x5) ioctl$AUTOFS_DEV_IOCTL_TIMEOUT(0xffffffffffffffff, 0xc018937a, &(0x7f0000001480)=ANY=[@ANYBLOB="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", @ANYRES32=r0, @ANYBLOB="01040000000000002e2f66696c653000"]) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r3, 0xc08c5332, 0x0) r4 = gettid() process_vm_writev(r4, &(0x7f0000002580)=[{&(0x7f0000000140)=""/89, 0x59}, {&(0x7f00000001c0)=""/175, 0xaf}, {&(0x7f0000000280)=""/4096, 0x1000}], 0x3, &(0x7f0000003840)=[{&(0x7f0000002640)=""/105, 0x69}, {0xfffffffffffffffe, 0x10}], 0x2, 0x0) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r1, 0xc08c5332, &(0x7f0000001280)={0x3, 0x5, 0x0, 'queue1\x00', 0x8}) r5 = fork() write$sndseq(r1, &(0x7f0000001340)=[{0x22, 0x8, 0x2, 0x3, @time={0x4}, {0x0, 0x1}, {0x6, 0x81}, @raw32={[0x800, 0x3, 0x9]}}, {0xe1, 0x7, 0xf8, 0xff, @tick=0x2, {0x3f}, {0x4, 0xf1}, @queue={0xff, {0x6, 0x9}}}, {0x4, 0x1, 0x9, 0x5, @time={0x7, 0x6}, {0x7c, 0x2}, {0x20, 0x6}, @connect={{0x0, 0xfd}, {0x98, 0x4}}}, {0x80, 0x4, 0x7, 0x7d, @time={0xfffff000, 0x9}, {0x81, 0x1f}, {0xaa}, @queue={0x5, {0xffffffe0, 0x3}}}], 0x70) r6 = syz_open_dev$vcsn(&(0x7f0000000040), 0x3, 0x2001) ioctl$LOOP_CTL_GET_FREE(r6, 0x4c82) ptrace$setopts(0x4206, r5, 0x0, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fork() fork() clone3(&(0x7f0000004c00)={0xc0002100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) 22:42:08 executing program 5: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) lsetxattr$security_evm(&(0x7f0000000240)='.\x00', &(0x7f0000000300), &(0x7f00000003c0)=@sha1={0x1, "bd2b5bce8b74aea700654a682479ac2c0852bc4d"}, 0x15, 0x3) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={&(0x7f0000000040), 0xb}, 0x0, 0x20, 0x0, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) r0 = fork() r1 = syz_open_procfs(r0, &(0x7f0000000000)='status\x00') r2 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x2, 0x0) pwrite64(r2, &(0x7f00000000c0)='9', 0x1, 0x8040000) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x20, 0x3, 0x4, 0x1, 0x0, 0x8, 0x20620, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x3f, 0x2, @perf_config_ext={0x240000000, 0x5}, 0x1400, 0x4, 0x8, 0x7, 0x9, 0x6, 0x6, 0x0, 0x1, 0x0, 0x8}, r0, 0xa, r2, 0x1) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r3, 0x6, 0x1e, &(0x7f0000000040)=0x1, 0x4) connect$inet6(r3, &(0x7f0000000080)={0xa, 0x0, 0x0, @loopback}, 0x1c) openat$cgroup_ro(r1, &(0x7f0000000180)='blkio.throttle.io_serviced_recursive\x00', 0x0, 0x0) 22:42:08 executing program 3: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) lsetxattr$security_evm(&(0x7f0000000240)='.\x00', &(0x7f0000000300), &(0x7f00000003c0)=@sha1={0x1, "bd2b5bce8b74aea700654a682479ac2c0852bc4d"}, 0x15, 0x3) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={&(0x7f0000000040), 0xb}, 0x0, 0x20, 0x0, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) r0 = fork() r1 = syz_open_procfs(r0, &(0x7f0000000000)='status\x00') r2 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x2, 0x0) pwrite64(r2, &(0x7f00000000c0)='9', 0x1, 0x8040000) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x20, 0x3, 0x4, 0x1, 0x0, 0x8, 0x20620, 0x2, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x3f, 0x2, @perf_config_ext={0x240000000, 0x5}, 0x1400, 0x4, 0x8, 0x7, 0x9, 0x6, 0x6, 0x0, 0x1, 0x0, 0x8}, r0, 0xa, r2, 0x1) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r3, 0x6, 0x1e, &(0x7f0000000040)=0x1, 0x4) setsockopt$inet6_tcp_TCP_REPAIR(r3, 0x6, 0x13, &(0x7f00000018c0)=0x1, 0x4) connect$inet6(r3, &(0x7f0000000080)={0xa, 0x0, 0x0, @loopback}, 0x1c) openat$cgroup_ro(r1, &(0x7f0000000180)='blkio.throttle.io_serviced_recursive\x00', 0x0, 0x0) 22:42:08 executing program 4: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000480)}}, 0x0, 0xffffffefffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x100000, 0xe, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000500100000f000000000000000100000005000000000004000040000020000000dbf4655fdbf4655f0100ffff53ef010001000000dbf4655f000000000000000001000000000000000b0000008000000018000000c20500002b0200"/116, 0x74, 0x400}, {&(0x7f0000010100)="000000000000000000000000244b8e9b57f04b59aa229cc2", 0x18, 0x4e0}, {&(0x7f0000010200)="010000000000050040", 0x9, 0x560}, {&(0x7f0000010300)="020000000300000004000000", 0xc, 0x800}, {&(0x7f0000010400), 0x0, 0x1000}, {&(0x7f0000011500)="ed41000000080000dbf4655fdbf4655fdbf4655f00000000000004004000", 0x1e, 0x2080}, {0x0}, {0x0}, {&(0x7f0000011c00)="0b0000000c0001022e00000002000000f40702022e", 0x15, 0x10000}, {0x0}, {0x0}, {&(0x7f0000012400)="504d4d00504d4dffdbf4655f00000000647679756b6f762d676c6170746f70320000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000006c6f6f7033340075782f746573742f73797a5f6d6f756e745f696d6167655f650500"/123, 0x7b, 0x20000}, {0x0}, {0x0, 0x0, 0x38000}], 0x0, &(0x7f0000012f00)) 22:42:08 executing program 7: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000480)}}, 0x0, 0xffffffefffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x100000, 0xe, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000500100000f000000000000000100000005000000000004000040000020000000dbf4655fdbf4655f0100ffff53ef010001000000dbf4655f000000000000000001000000000000000b0000008000000018000000c20500002b0200"/116, 0x74, 0x400}, {&(0x7f0000010100)="000000000000000000000000244b8e9b57f04b59aa229cc218853f95", 0x1c, 0x4e0}, {&(0x7f0000010200)="010000000000050040", 0x9, 0x560}, {&(0x7f0000010300)="020000000300000004000000", 0xc, 0x800}, {&(0x7f0000010400), 0x0, 0x1000}, {&(0x7f0000011500)="ed41000000080000dbf4655fdbf4655fdbf4655f00000000000004004000", 0x1e, 0x2080}, {0x0}, {0x0}, {&(0x7f0000011c00)="0b0000000c0001022e00000002000000f40702022e", 0x15, 0x10000}, {0x0}, {0x0}, {&(0x7f0000012400)="504d4d00504d4dffdbf4655f00000000647679756b6f762d676c6170746f70320000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000006c6f6f7033340075782f746573742f73797a5f6d6f756e745f696d6167655f650500"/123, 0x7b, 0x20000}, {0x0}, {0x0, 0x0, 0x38000}], 0x0, &(0x7f0000012f00)) 22:42:08 executing program 6: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) lsetxattr$security_evm(&(0x7f0000000240)='.\x00', &(0x7f0000000300), &(0x7f00000003c0)=@sha1={0x1, "bd2b5bce8b74aea700654a682479ac2c0852bc4d"}, 0x15, 0x3) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={&(0x7f0000000040), 0xb}, 0x0, 0x20, 0x0, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) r0 = fork() r1 = syz_open_procfs(r0, &(0x7f0000000000)='status\x00') r2 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x2, 0x0) pwrite64(r2, &(0x7f00000000c0)='9', 0x1, 0x8040000) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x20, 0x3, 0x4, 0x1, 0x0, 0x8, 0x20620, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x3f, 0x2, @perf_config_ext={0x240000000, 0x5}, 0x1400, 0x4, 0x8, 0x7, 0x9, 0x6, 0x6, 0x0, 0x1, 0x0, 0x8}, r0, 0xa, r2, 0x1) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r3, 0x6, 0x1e, &(0x7f0000000040)=0x1, 0x4) setsockopt$inet6_tcp_TCP_REPAIR(r3, 0x6, 0x13, &(0x7f00000018c0)=0x1, 0x4) connect$inet6(r3, &(0x7f0000000080)={0xa, 0x0, 0x0, @loopback}, 0x1c) openat$cgroup_ro(r1, &(0x7f0000000180)='blkio.throttle.io_serviced_recursive\x00', 0x0, 0x0) 22:42:08 executing program 2: perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000480)}}, 0x0, 0xffffffefffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x100000, 0xe, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000500100000f000000000000000100000005000000000004000040000020000000dbf4655fdbf4655f0100ffff53ef010001000000dbf4655f000000000000000001000000000000000b0000008000000018000000c20500002b0200"/116, 0x74, 0x400}, {&(0x7f0000010100)="000000000000000000000000244b8e9b57f04b59aa229cc218853f95010040", 0x1f, 0x4e0}, {&(0x7f0000010200)="010000000000050040", 0x9, 0x560}, {&(0x7f0000010300)="020000000300000004000000", 0xc, 0x800}, {&(0x7f0000010400), 0x0, 0x1000}, {&(0x7f0000011500)="ed41000000080000dbf4655fdbf4655fdbf4655f00000000000004004000", 0x1e, 0x2080}, {0x0}, {0x0}, {&(0x7f0000011c00)="0b0000000c0001022e00000002000000f40702022e", 0x15, 0x10000}, {0x0}, {0x0}, {&(0x7f0000012400)="504d4d00504d4dffdbf4655f00000000647679756b6f762d676c6170746f70320000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000006c6f6f7033340075782f746573742f73797a5f6d6f756e745f696d6167655f650500"/123, 0x7b, 0x20000}, {0x0}, {0x0, 0x0, 0x38000}], 0x0, &(0x7f0000012f00)) 22:42:08 executing program 0: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x100000, 0xe, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000500100000f000000000000000100000005000000000004000040000020000000dbf4655fdbf4655f0100ffff53ef010001000000dbf4655f000000000000000001000000000000000b0000008000000018000000c20500002b0200"/116, 0x74, 0x400}, {0x0, 0x0, 0x4e0}, {&(0x7f0000010200)="010000000000050040", 0x9, 0x560}, {&(0x7f0000010300)="020000000300000004000000", 0xc, 0x800}, {&(0x7f0000010400), 0x0, 0x1000}, {&(0x7f0000011500)="ed41000000080000dbf4655fdbf4655fdbf4655f00000000000004004000", 0x1e, 0x2080}, {0x0}, {0x0}, {&(0x7f0000011c00)="0b0000000c0001022e00000002000000f40702022e", 0x15, 0x10000}, {0x0}, {0x0}, {&(0x7f0000012400)="504d4d00504d4dffdbf4655f00000000647679756b6f762d676c6170746f70320000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000006c6f6f7033340075782f746573742f73797a5f6d6f756e745f696d6167655f650500"/123, 0x7b, 0x20000}, {0x0}, {0x0, 0x0, 0x38000}], 0x0, &(0x7f0000012f00)) [ 2004.345072] loop0: detected capacity change from 0 to 2048 [ 2004.347091] loop7: detected capacity change from 0 to 2048 [ 2004.408426] EXT4-fs (loop7): unsupported descriptor size 0 [ 2004.410875] loop2: detected capacity change from 0 to 2048 22:42:08 executing program 0: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x100000, 0xe, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000500100000f000000000000000100000005000000000004000040000020000000dbf4655fdbf4655f0100ffff53ef010001000000dbf4655f000000000000000001000000000000000b0000008000000018000000c20500002b0200"/116, 0x74, 0x400}, {0x0, 0x0, 0x4e0}, {&(0x7f0000010200)="010000000000050040", 0x9, 0x560}, {&(0x7f0000010300)="020000000300000004000000", 0xc, 0x800}, {&(0x7f0000010400), 0x0, 0x1000}, {&(0x7f0000011500)="ed41000000080000dbf4655fdbf4655fdbf4655f00000000000004004000", 0x1e, 0x2080}, {0x0}, {0x0}, {&(0x7f0000011c00)="0b0000000c0001022e00000002000000f40702022e", 0x15, 0x10000}, {0x0}, {0x0}, {&(0x7f0000012400)="504d4d00504d4dffdbf4655f00000000647679756b6f762d676c6170746f70320000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000006c6f6f7033340075782f746573742f73797a5f6d6f756e745f696d6167655f650500"/123, 0x7b, 0x20000}, {0x0}, {0x0, 0x0, 0x38000}], 0x0, &(0x7f0000012f00)) [ 2004.437290] loop4: detected capacity change from 0 to 2048 [ 2004.462099] EXT4-fs (loop2): mounted filesystem without journal. Quota mode: none. [ 2004.468861] ext4 filesystem being mounted at /syzkaller-testdir307671421/syzkaller.SFQaEW/232/file0 supports timestamps until 2038 (0x7fffffff) [ 2004.482560] EXT4-fs (loop4): unsupported descriptor size 0 22:42:09 executing program 7: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000480)}}, 0x0, 0xffffffefffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x100000, 0xe, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000500100000f000000000000000100000005000000000004000040000020000000dbf4655fdbf4655f0100ffff53ef010001000000dbf4655f000000000000000001000000000000000b0000008000000018000000c20500002b0200"/116, 0x74, 0x400}, {&(0x7f0000010100)="000000000000000000000000244b8e9b57f04b59aa229cc218853f95", 0x1c, 0x4e0}, {&(0x7f0000010200)="010000000000050040", 0x9, 0x560}, {&(0x7f0000010300)="020000000300000004000000", 0xc, 0x800}, {&(0x7f0000010400), 0x0, 0x1000}, {&(0x7f0000011500)="ed41000000080000dbf4655fdbf4655fdbf4655f00000000000004004000", 0x1e, 0x2080}, {0x0}, {0x0}, {&(0x7f0000011c00)="0b0000000c0001022e00000002000000f40702022e", 0x15, 0x10000}, {0x0}, {0x0}, {&(0x7f0000012400)="504d4d00504d4dffdbf4655f00000000647679756b6f762d676c6170746f70320000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000006c6f6f7033340075782f746573742f73797a5f6d6f756e745f696d6167655f650500"/123, 0x7b, 0x20000}, {0x0}, {0x0, 0x0, 0x38000}], 0x0, &(0x7f0000012f00)) [ 2004.535996] EXT4-fs (loop2): unmounting filesystem. [ 2004.553111] loop0: detected capacity change from 0 to 2048 22:42:09 executing program 2: perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000480)}}, 0x0, 0xffffffefffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x100000, 0xe, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000500100000f000000000000000100000005000000000004000040000020000000dbf4655fdbf4655f0100ffff53ef010001000000dbf4655f000000000000000001000000000000000b0000008000000018000000c20500002b0200"/116, 0x74, 0x400}, {&(0x7f0000010100)="000000000000000000000000244b8e9b57f04b59aa229cc218853f95010040", 0x1f, 0x4e0}, {&(0x7f0000010200)="010000000000050040", 0x9, 0x560}, {&(0x7f0000010300)="020000000300000004000000", 0xc, 0x800}, {&(0x7f0000010400), 0x0, 0x1000}, {&(0x7f0000011500)="ed41000000080000dbf4655fdbf4655fdbf4655f00000000000004004000", 0x1e, 0x2080}, {0x0}, {0x0}, {&(0x7f0000011c00)="0b0000000c0001022e00000002000000f40702022e", 0x15, 0x10000}, {0x0}, {0x0}, {&(0x7f0000012400)="504d4d00504d4dffdbf4655f00000000647679756b6f762d676c6170746f70320000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000006c6f6f7033340075782f746573742f73797a5f6d6f756e745f696d6167655f650500"/123, 0x7b, 0x20000}, {0x0}, {0x0, 0x0, 0x38000}], 0x0, &(0x7f0000012f00)) [ 2004.621972] loop7: detected capacity change from 0 to 2048 22:42:09 executing program 4: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000480)}}, 0x0, 0xffffffefffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x100000, 0xe, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000500100000f000000000000000100000005000000000004000040000020000000dbf4655fdbf4655f0100ffff53ef010001000000dbf4655f000000000000000001000000000000000b0000008000000018000000c20500002b0200"/116, 0x74, 0x400}, {&(0x7f0000010100)="000000000000000000000000244b8e9b57f04b59aa229cc2", 0x18, 0x4e0}, {&(0x7f0000010200)="010000000000050040", 0x9, 0x560}, {&(0x7f0000010300)="020000000300000004000000", 0xc, 0x800}, {&(0x7f0000010400), 0x0, 0x1000}, {&(0x7f0000011500)="ed41000000080000dbf4655fdbf4655fdbf4655f00000000000004004000", 0x1e, 0x2080}, {0x0}, {0x0}, {&(0x7f0000011c00)="0b0000000c0001022e00000002000000f40702022e", 0x15, 0x10000}, {0x0}, {0x0}, {&(0x7f0000012400)="504d4d00504d4dffdbf4655f00000000647679756b6f762d676c6170746f70320000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000006c6f6f7033340075782f746573742f73797a5f6d6f756e745f696d6167655f650500"/123, 0x7b, 0x20000}, {0x0}, {0x0, 0x0, 0x38000}], 0x0, &(0x7f0000012f00)) [ 2004.655171] loop2: detected capacity change from 0 to 2048 [ 2004.685631] EXT4-fs (loop7): unsupported descriptor size 0 22:42:09 executing program 1: r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, @perf_config_ext, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000000), 0x0) r2 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) ioctl$EXT4_IOC_CHECKPOINT(r2, 0x4004662b, &(0x7f0000000100)=0x5) ioctl$AUTOFS_DEV_IOCTL_TIMEOUT(0xffffffffffffffff, 0xc018937a, &(0x7f0000001480)=ANY=[@ANYBLOB="010000fe04f804f32d1ae95f4d8fd9ce99ff00010000001800000059a5a91fc707002c3e05f0bcf35234dd60eedec3d5f1b58f0d41f6996d0df70b25316c86b91cf6440f87695b3e2bf9118d7b986e6dd6169cde2d7b35569ff3c18ea708da093a5e297fd2ec2322a167617fa6662e65407cedfd90d2ee90deccf04f2c85b215e5090cb50628f934703c2db873b5eb9a2e276f987493cc445a8474761879f6df5a5233b80656c014a59590366f77d5104d838160f3f8f304bbfb07a672117635569099d752c2b724b38b74a3b0e2c4dd54619ff2e05de8c58ace02796bd997ccfd3fbf04c5bb7420f2656931eb46c8e72d17fd9b33dd84ff6fab17ff995be40bf9a47cdde574665966c721e5f265d3aaac1788c3ea", @ANYRES32=r0, @ANYBLOB="01040000000000002e2f66696c653000"]) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r3, 0xc08c5332, &(0x7f00000013c0)={0x0, 0x6964, 0x0, 'queue1\x00', 0xff}) r4 = gettid() process_vm_writev(r4, &(0x7f0000002580)=[{&(0x7f0000000140)=""/89, 0x59}, {&(0x7f00000001c0)=""/175, 0xaf}, {&(0x7f0000000280)=""/4096, 0x1000}], 0x3, &(0x7f0000003840)=[{&(0x7f0000002640)=""/105, 0x69}, {0xfffffffffffffffe, 0x10}], 0x2, 0x0) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r1, 0xc08c5332, &(0x7f0000001280)={0x3, 0x5, 0x0, 'queue1\x00', 0x8}) r5 = fork() write$sndseq(r1, &(0x7f0000001340)=[{0x22, 0x8, 0x2, 0x3, @time={0x4}, {0x0, 0x1}, {0x6, 0x81}, @raw32={[0x800, 0x3, 0x9]}}, {0xe1, 0x7, 0xf8, 0xff, @tick=0x2, {0x3f}, {0x4, 0xf1}, @queue={0xff, {0x6, 0x9}}}, {0x4, 0x1, 0x9, 0x5, @time={0x7, 0x6}, {0x7c, 0x2}, {0x20, 0x6}, @connect={{0x0, 0xfd}, {0x98, 0x4}}}, {0x80, 0x4, 0x7, 0x7d, @time={0xfffff000, 0x9}, {0x81, 0x1f}, {0xaa}, @queue={0x5, {0xffffffe0, 0x3}}}], 0x70) r6 = syz_open_dev$vcsn(&(0x7f0000000040), 0x3, 0x2001) ioctl$LOOP_CTL_GET_FREE(r6, 0x4c82) ptrace$setopts(0x4206, r5, 0x0, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fork() fork() clone3(&(0x7f0000004c00)={0xc0002100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) [ 2004.717124] EXT4-fs (loop2): mounted filesystem without journal. Quota mode: none. [ 2004.718731] ext4 filesystem being mounted at /syzkaller-testdir307671421/syzkaller.SFQaEW/233/file0 supports timestamps until 2038 (0x7fffffff) [ 2004.773111] loop4: detected capacity change from 0 to 2048 [ 2004.787751] EXT4-fs (loop2): unmounting filesystem. [ 2004.817888] EXT4-fs (loop4): unsupported descriptor size 0 [ 2005.959167] ================================================================== [ 2005.960173] BUG: KASAN: use-after-free in __lock_acquire+0x42c9/0x5e70 [ 2005.961059] Read of size 8 at addr ffff888015f53968 by task syz-executor/58536 [ 2005.962050] [ 2005.962291] CPU: 1 PID: 58536 Comm: syz-executor Not tainted 6.0.0-rc3-next-20220829 #1 [ 2005.963378] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS rel-1.14.0-0-g155821a1990b-prebuilt.qemu.org 04/01/2014 [ 2005.964912] Call Trace: [ 2005.965270] [ 2005.965585] dump_stack_lvl+0x8b/0xb3 [ 2005.966125] print_report.cold+0x5e/0x5e5 [ 2005.966707] ? __lock_acquire+0x42c9/0x5e70 [ 2005.967324] kasan_report+0xb1/0x1c0 [ 2005.967870] ? __lock_acquire+0x42c9/0x5e70 [ 2005.968507] __lock_acquire+0x42c9/0x5e70 [ 2005.969110] ? lock_chain_count+0x20/0x20 [ 2005.969706] ? lockdep_hardirqs_on_prepare+0x410/0x410 [ 2005.970443] ? lockdep_hardirqs_on_prepare+0x410/0x410 [ 2005.971186] ? finish_task_switch.isra.0+0x22d/0x8a0 [ 2005.972141] lock_acquire+0x1a2/0x530 [ 2005.973205] ? kmemleak_scan+0x21d/0x16f0 [ 2005.974214] ? lock_release+0x750/0x750 [ 2005.974782] ? rcu_read_lock_sched_held+0x3e/0x80 [ 2005.975456] ? trace_rcu_dyntick+0x1a7/0x250 [ 2005.976105] ? ct_nmi_exit+0x119/0x1c0 [ 2005.976665] _raw_spin_lock_irq+0x32/0x50 [ 2005.977240] ? kmemleak_scan+0x21d/0x16f0 [ 2005.977814] kmemleak_scan+0x21d/0x16f0 [ 2005.978361] ? paint_ptr+0xc0/0xc0 [ 2005.978862] ? strncpy_from_user+0x204/0x3e0 [ 2005.979500] kmemleak_write+0x570/0x680 [ 2005.980064] ? kmemleak_scan+0x16f0/0x16f0 [ 2005.980655] ? debugfs_file_get+0x1ce/0x450 [ 2005.981276] ? debugfs_file_put+0xd0/0xd0 [ 2005.981862] full_proxy_write+0x11d/0x190 [ 2005.982451] vfs_write+0x2cb/0xd90 [ 2005.982956] ? full_proxy_poll+0x180/0x180 [ 2005.983562] ? __ia32_sys_pread64+0x220/0x220 [ 2005.984208] ? lock_release+0x3b2/0x750 [ 2005.984776] ? syscall_enter_from_user_mode+0x1d/0x50 [ 2005.985498] ? __fget_light+0x212/0x280 [ 2005.986066] ksys_write+0x127/0x250 [ 2005.986605] ? __ia32_sys_read+0xb0/0xb0 [ 2005.987196] ? syscall_enter_from_user_mode+0x1d/0x50 [ 2005.987937] ? syscall_enter_from_user_mode+0x1d/0x50 [ 2005.988686] do_syscall_64+0x3b/0x90 [ 2005.989227] entry_SYSCALL_64_after_hwframe+0x63/0xcd [ 2005.989971] RIP: 0033:0x7fb5c504d5c3 [ 2005.990500] Code: 16 00 00 00 eb ae 90 b8 6e 00 00 00 eb a6 e8 44 ef 04 00 0f 1f 40 00 64 8b 04 25 18 00 00 00 85 c0 75 14 b8 01 00 00 00 0f 05 <48> 3d 00 f0 ff ff 77 55 c3 0f 1f 40 00 48 83 ec 28 48 89 54 24 18 [ 2005.992986] RSP: 002b:00007fffc35ae388 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 2005.994020] RAX: ffffffffffffffda RBX: 00007fffc35ae9c8 RCX: 00007fb5c504d5c3 [ 2005.994995] RDX: 0000000000000004 RSI: 00007fb5c5103ed9 RDI: 0000000000000003 [ 2005.995977] RBP: 0000000000000002 R08: 00000000000007d4 R09: 00007fffc35da080 [ 2005.996977] R10: 00007fffc35da090 R11: 0000000000000246 R12: 00000000fffffff6 [ 2005.997980] R13: 00007fffc35afef1 R14: 0000000000000000 R15: 00000000001e9725 [ 2005.998984] [ 2005.999319] [ 2005.999564] Allocated by task 58131: [ 2006.000101] kasan_save_stack+0x1e/0x40 [ 2006.000681] __kasan_slab_alloc+0x66/0x80 [ 2006.001278] kmem_cache_alloc+0x1b1/0x3e0 [ 2006.001866] __create_object.isra.0+0x3d/0xc10 [ 2006.002512] kmem_cache_alloc_lru+0x2ce/0x720 [ 2006.003167] __d_alloc+0x31/0x9a0 [ 2006.003674] d_alloc+0x46/0x1c0 [ 2006.004164] __lookup_hash+0xcc/0x190 [ 2006.004721] filename_create+0x1d6/0x4a0 [ 2006.005300] do_symlinkat+0xc4/0x2a0 [ 2006.005838] __x64_sys_symlink+0x75/0x90 [ 2006.006415] do_syscall_64+0x3b/0x90 [ 2006.006946] entry_SYSCALL_64_after_hwframe+0x63/0xcd [ 2006.007686] [ 2006.007927] Freed by task 13: [ 2006.008374] kasan_save_stack+0x1e/0x40 [ 2006.008944] kasan_set_track+0x21/0x30 [ 2006.009505] kasan_set_free_info+0x20/0x40 [ 2006.010111] __kasan_slab_free+0x108/0x190 [ 2006.010715] kmem_cache_free+0xf7/0x610 [ 2006.011282] rcu_core+0x7e2/0x2080 [ 2006.011791] __do_softirq+0x1c8/0x8d0 [ 2006.012350] [ 2006.012596] Last potentially related work creation: [ 2006.013282] kasan_save_stack+0x1e/0x40 [ 2006.013850] __kasan_record_aux_stack+0x97/0xb0 [ 2006.014520] call_rcu+0x6a/0xa30 [ 2006.015012] kmem_cache_free+0xbd/0x610 [ 2006.015585] rcu_core+0x7e2/0x2080 [ 2006.016095] __do_softirq+0x1c8/0x8d0 [ 2006.016650] [ 2006.016891] Second to last potentially related work creation: [ 2006.017705] kasan_save_stack+0x1e/0x40 [ 2006.018270] __kasan_record_aux_stack+0x97/0xb0 [ 2006.018942] call_rcu+0x6a/0xa30 [ 2006.019433] __kmem_cache_free+0x91/0x400 [ 2006.020041] simple_xattr_set+0x3f0/0x610 [ 2006.020650] __vfs_setxattr+0x115/0x180 [ 2006.021213] __vfs_setxattr_noperm+0x125/0x600 [ 2006.021869] __vfs_setxattr_locked+0x1d3/0x260 [ 2006.022521] vfs_setxattr+0x110/0x3c0 [ 2006.023070] setxattr+0x14d/0x170 [ 2006.023571] path_setxattr+0x19b/0x1d0 [ 2006.024138] __x64_sys_setxattr+0xc0/0x160 [ 2006.024749] do_syscall_64+0x3b/0x90 [ 2006.025284] entry_SYSCALL_64_after_hwframe+0x63/0xcd [ 2006.026025] [ 2006.026273] The buggy address belongs to the object at ffff888015f53950 [ 2006.026273] which belongs to the cache kmemleak_object of size 368 [ 2006.027971] The buggy address is located 24 bytes inside of [ 2006.027971] 368-byte region [ffff888015f53950, ffff888015f53ac0) [ 2006.029484] [ 2006.029725] The buggy address belongs to the physical page: [ 2006.030455] page:0000000088664743 refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x15f52 [ 2006.031685] head:0000000088664743 order:1 compound_mapcount:0 compound_pincount:0 [ 2006.032669] flags: 0x100000000010200(slab|head|node=0|zone=1) [ 2006.033444] raw: 0100000000010200 ffffea0000366d00 dead000000000004 ffff888007c4f780 [ 2006.034452] raw: 0000000000000000 0000000000120012 00000001ffffffff 0000000000000000 [ 2006.035448] page dumped because: kasan: bad access detected [ 2006.036189] [ 2006.036420] Memory state around the buggy address: [ 2006.037075] ffff888015f53800: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 2006.038076] ffff888015f53880: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 2006.039064] >ffff888015f53900: fb fb fc fc fc fc fc fc fc fc fa fb fb fb fb fb [ 2006.040060] ^ [ 2006.040951] ffff888015f53980: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 2006.041929] ffff888015f53a00: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 2006.042902] ================================================================== [ 2006.043868] Disabling lock debugging due to kernel taint VM DIAGNOSIS: 22:42:10 Registers: info registers vcpu 0 RAX=0000000080000001 RBX=00007f4629256d77 RCX=0000000080000001 RDX=ffff888015e43580 RSI=ffffffff8134e397 RDI=0000000000000006 RBP=00007f4629256d77 RSP=ffff8880449cfa20 R8 =0000000000000006 R9 =00007f4629256d77 R10=ffffffffffffffff R11=000000000003603d R12=ffffffffffffffff R13=0000000000000000 R14=ffff888015e43580 R15=dffffc0000000000 RIP=ffffffff8145daed RFL=00000217 [----APC] CPL=0 II=0 A20=1 SMM=0 HLT=0 ES =0000 0000000000000000 00000000 00000000 CS =0010 0000000000000000 ffffffff 00a09b00 DPL=0 CS64 [-RA] SS =0018 0000000000000000 ffffffff 00c09300 DPL=0 DS [-WA] DS =0000 0000000000000000 00000000 00000000 FS =0000 00007f4628da28c0 00000000 00000000 GS =0000 ffff88806ce00000 00000000 00000000 LDT=0000 fffffe0000000000 00000000 00000000 TR =0040 fffffe0000003000 00004087 00008b00 DPL=0 TSS64-busy GDT= fffffe0000001000 0000007f IDT= fffffe0000000000 00000fff CR0=80050033 CR2=0000558b7f1cff70 CR3=000000004b394000 CR4=00350ef0 DR0=0000000000000000 DR1=0000000000000000 DR2=0000000000000000 DR3=0000000000000000 DR6=00000000ffff4ff0 DR7=0000000000000400 EFER=0000000000000d01 FCW=037f FSW=0000 [ST=0] FTW=00 MXCSR=00001f80 FPR0=0000000000000000 0000 FPR1=0000000000000000 0000 FPR2=0000000000000000 0000 FPR3=0000000000000000 0000 FPR4=0000000000000000 0000 FPR5=0000000000000000 0000 FPR6=0000000000000000 0000 FPR7=0000000000000000 0000 YMM00=0000000000000000 0000000000000000 2c2c2c2c2c2c2c2c 2c2c2c2c2c2c2c2c YMM01=0000000000000000 0000000000000000 00000000ff000000 0000000000000000 YMM02=0000000000000000 0000000000000000 00000000ff000000 0000000000000000 YMM03=0000000000000000 0000000000000000 747269762f736563 697665642f737973 YMM04=0000000000000000 0000000000000000 2f2f2f2f2f2f2f2f 2f2f2f2f2f2f2f2f YMM05=0000000000000000 0000000000000000 0000000000000000 0000000000000000 YMM06=0000000000000000 0000000000000000 0000558b7f1e4c40 0000000300000007 YMM07=0000000000000000 0000000000000000 0000000000000000 0000000000000000 YMM08=0000000000000000 0000000000000000 703e2d73004c4149 54494e495f544e45 YMM09=0000000000000000 0000000000000000 0000000000000000 0000000000000000 YMM10=0000000000000000 0000000000000000 0000002000000000 0000002000000000 YMM11=0000000000000000 0000000000000000 0000000000000000 0000000000000000 YMM12=0000000000000000 0000000000000000 0000000000000000 0000000000000000 YMM13=0000000000000000 0000000000000000 0000000000000000 0000000000000000 YMM14=0000000000000000 0000000000000000 0000000000000000 0000000000000000 YMM15=0000000000000000 0000000000000000 0000000000000000 0000000000000000 info registers vcpu 1 RAX=0000000000000061 RBX=00000000000003f8 RCX=0000000000000000 RDX=00000000000003f8 RSI=ffffffff824487a1 RDI=ffffffff8763bc20 RBP=ffffffff8763bbe0 RSP=ffff88804330f268 R8 =0000000000000001 R9 =000000000000000a R10=0000000000000061 R11=0000000000000001 R12=0000000000000061 R13=ffffffff8763bbe0 R14=0000000000000010 R15=ffffffff82448790 RIP=ffffffff824487f9 RFL=00000002 [-------] CPL=0 II=0 A20=1 SMM=0 HLT=0 ES =0000 0000000000000000 00000000 00000000 CS =0010 0000000000000000 ffffffff 00a09b00 DPL=0 CS64 [-RA] SS =0018 0000000000000000 ffffffff 00c09300 DPL=0 DS [-WA] DS =0000 0000000000000000 00000000 00000000 FS =0000 00005555558b5400 00000000 00000000 GS =0000 ffff88806cf00000 00000000 00000000 LDT=0000 fffffe0000000000 00000000 00000000 TR =0040 fffffe000004a000 00004087 00008b00 DPL=0 TSS64-busy GDT= fffffe0000048000 0000007f IDT= fffffe0000000000 00000fff CR0=80050033 CR2=00007f4628466344 CR3=0000000043cc2000 CR4=00350ee0 DR0=0000000000000000 DR1=0000000000000000 DR2=0000000000000000 DR3=0000000000000000 DR6=00000000ffff4ff0 DR7=0000000000000400 EFER=0000000000000d01 FCW=037f FSW=0000 [ST=0] FTW=00 MXCSR=00001f80 FPR0=0000000000000000 0000 FPR1=0000000000000000 0000 FPR2=0000000000000000 0000 FPR3=0000000000000000 0000 FPR4=0000000000000000 0000 FPR5=0000000000000000 0000 FPR6=0000000000000000 0000 FPR7=0000000000000000 0000 YMM00=0000000000000000 0000000000000000 0000000000000000 0000000000000000 YMM01=0000000000000000 0000000000000000 ffff000000000000 ff00000000000000 YMM02=0000000000000000 0000000000000000 ffffff0f0e0d0c0b 0a09080706050403 YMM03=0000000000000000 0000000000000000 696e656420737365 636341002f737973 YMM04=0000000000000000 0000000000000000 000000333d524f4e 494d00373d524f4a YMM05=0000000000000000 0000000000000000 3d5145534b534944 006b7369643d4550 YMM06=0000000000000000 0000000000000000 3d454d414e564544 00303d444955555f YMM07=0000000000000000 0000000000000000 5953425553003370 6f6f6c2f6b636f6c YMM08=0000000000000000 0000000000000000 49006d756e203c20 69000a313a56000a YMM09=0000000000000000 0000000000000000 0000000000000000 0000000000000000 YMM10=0000000000000000 0000000000000000 0000002000000000 0000002000000000 YMM11=0000000000000000 0000000000000000 0000000000000000 0000000000000000 YMM12=0000000000000000 0000000000000000 0000000000000000 0000000000000000 YMM13=0000000000000000 0000000000000000 0000000000000000 0000000000000000 YMM14=0000000000000000 0000000000000000 0000000000000000 0000000000000000 YMM15=0000000000000000 0000000000000000 0000000000000000 0000000000000000