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", 0x1000}], 0x4, &(0x7f0000001980)=[{0xd8, 0xff, 0x9, "bd95db9e28201ea4b9acb1a3f200634187108069752a6105296d45f53d26626a7070735f004a705f7383c00ab7b48e0780d3a1ea693d10c9cc51f8e085648684c5acec573cf4a6133c4267dd15f9d4fe0a3383104cd36cafd0a8c5319161857ab91a1434ea0c198272d9073d265ba7ed57e4ffcbca210c549efd2290fe5e24f3dfeee440fa8c28659981565246e64b0a382b2ff8136a0b462ef1f5d340eb57051ecd909b2109f8866292ed5c10bd0509be04845c8a33cf56e34a0fa62f6e9975153756a1931a8c41"}, {0xc0, 0x108, 0x2cea, "1e6f469c89e2fdf92cee320a290a28710a54d0c7d8c7f0cb94df65f6b1f89454a2fedd9aff1c2cd841f7c11a2ec0972423fdc320457c83213a9c9ebca90eb190b92ba5c4fc77765fc149b362922166bb83ba480c922a902dc33807bca0f9cf5956889edf34e4e50f1864816caaf1940551c80d5f89e24127ba847661bcc41878d458b8cfeb902494549b5596c8ebd976ce90a4f565e3e9288f2b2bf19b3ddd2a113784eab173a5d0c335d1"}, {0x68, 0x115, 0x3, "f9684708cf9f12c14546039d47d7b72c7f9156c8d498f01c42eb3d3eaf309f98cf976313aa1d8c035485540a535872ab2d3c0616c6e073957a59dd8d5e2725d2c2a4985df91ad772b41d571560dc0dffbcf6efa8c4a2"}], 0x200}, 0x20008000) r2 = memfd_create(&(0x7f0000000400)='B\xdb/\x89\x03l\xdeb\xcb\xb54\xed\xbeLY\xb5Z\xe1\x12S\xf5G\xcc\xf3\xe9\x02h\v\xca(\x96\xe1C\xdf\x1c\xea\x85C\xfb\x10\x13\xfa\x03\x16\xcd\x17\xa2\x80\xa1z\xb4r\x95\xc3@\x9d\xa6\xf1\x92#}g\xd3`\xf7\xcez\xcb\xb3\x1a\xbb\xc48e\x8e\xb1&\xd1\x8a\xe6!\x7f\x8d\xea,qx\xa28\xbf\"\xc7e\x06L\xb06\xeb<$\xd7\xba\xe5\x01\x03\x94r\xab\xd4J\x03s\xaf\xf6A\xbfV\xfa\x1ew\x8d\xbf\x99I\x97\xd8\xd2\xe8\x11\xc4\x04\x00\x84\xd5i\xee\xaf\xae[E\x1f\xdd\xd7#rT+\xb621p\xaf[\x99\" 1\xeb\xc7)\xd2\x1dh\xf2\xd5s\xfd?\fa>\x9f;\xe5r\xe5\xbd\xb0|=\x8eZcPY\xf8\xbd\x13\xaa\x8b\xdf\xbc\x93u\xd5\xb0r\xfb\xde\xe7\xd9k\xe2\xc6\x1b\xf2o@&>\xf2M\xe7\x8c\xeb\xee\xf5\x02~\x85\x14\xf3\xc6v\xf15PE\x8c\xca\x16$\xc2\x01#\xb563\rbq\xbf64\xfaW\x17\xdfa\xe6\xca\x86\xd7\xf8\x81X\x9bg4\xc1\xdam\xcf=Rq6\xb0\xd4D=I\x1a\x0e\xd0\xabz\xe2\x19\x0fM\xad\xdco\xa4\xb2\x8c?\xc1\x10\xf273\xd00\xb3_\xe8\x9a*\xfcL\xea;\xc0\x9a\xdbx!N;\xb5x\t\xa4E\xbe\x93r\x04\xf5\xf0\xf5\x7f\x9a)\xf5\x1b\"\xa1\xd8\x06>\xc9\xe2r\xe9\xbb\xfe\xc0\b\x81\x98\x1c\xe2\xe0?\x8f\xa1\xbel\aN\x83@\xb1\x03)4A\x83\xd6\xcf\xf6\xb5\x82\xb7\x9dA\b$\xa2x\x8a@\xfaj~\xef\x93\xb1/L\x01\xe2\xba|\xf0\x01)PP\xcdl\x06\xfc\x15;qZ\xb1u\xc9\xd0\xd16~JEGm\xe4\x1e@\x9dG\xe4@\xdf\xba\'\x8b\x1cD\xc7\xec\xd1@}tR\xd9P\xf4N\xe3\xd8x\xa0\x91\x17\xc2}\x13\b\xca\t(Z\xa3_\xa1\x90\x15T\xa4\xe7%\x98\xa7\xfb\x8bp/eq\x93\xbf\x1f =|\xf3\xb1\xfcR\xd8\nM,\xcb%@\'\x15\x88\xd8\xad\f\x91|\x95\x8fq+\x98\x81W\xba\x9f\xe0elOt\xbd\by\r\x87\x1c\xba\xbd\x8e+S>\xb8\xe29\x91h^x\xfb`\x00\xdd/\xa6\xb1\x16=\xa1bw\xc5I\xb1\x00'/549, 0x2) r3 = socket$inet6(0xa, 0x1, 0xea9) preadv(r3, &(0x7f0000000340)=[{&(0x7f0000000300)=""/15, 0xf}], 0x1, 0x0, 0x8) r4 = socket$nl_generic(0x10, 0x3, 0x10) r5 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000080), 0xffffffffffffffff) r6 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_80211(r6, 0x8933, &(0x7f00000000c0)={'wlan1\x00', 0x0}) sendmsg$NL80211_CMD_SET_NOACK_MAP(r4, &(0x7f0000000600)={0x0, 0x0, &(0x7f00000005c0)={&(0x7f0000000580)={0x1c, r5, 0x501, 0x0, 0x0, {{}, {@val={0x8, 0x3, r7}, @void}}}, 0x1c}}, 0x0) sendmsg$NL80211_CMD_REGISTER_FRAME(r0, &(0x7f0000000240)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x4000000}, 0xc, &(0x7f0000000200)={&(0x7f0000000100)={0xe4, r5, 0x100, 0x70bd29, 0x25dfdbfd, {{}, {@void, @val={0xc, 0x99, {0x80000001, 0x52}}}}, [@NL80211_ATTR_FRAME_MATCH={0xc1, 0x5b, "1427edf53a50c2eb01389883558b956f264c52e5bae7808e93424e99b8e7ec56902c1d17aabeedcca7ba1b01cebd9bc93c8a23132b0fe9a8ed4e828fbe63a901a52c37303894fda5e18c78ed41887ff792543aa31cdc38c7c23a825bf0a685d4fc049f0796c65d4cefa2e1b029e7e72cd8c04a5bc7eb242cdb51cd024794e57ae5a81dfbb0d49aae8bb108a6fe31ba3de6c14262fc3fa67f691b8f2c03fe225ad3a86545f420fb84018fe4502e34474924d81267283998a64e08735422"}]}, 0xe4}, 0x1, 0x0, 0x0, 0x8000}, 0x4) fcntl$addseals(r2, 0x409, 0x0) 06:07:50 executing program 0: syncfs(0xffffffffffffffff) sendmsg$NL80211_CMD_DEL_TX_TS(0xffffffffffffffff, 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_SETPIPEFD(0xffffffffffffffff, 0xc0189378, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x10000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = memfd_create(&(0x7f0000000400)='B\xdb/\x89\x03l\xdeb\xcb\xb54\xed\xbeLY\xb5Z\xe1\x12S\xf5G\xcc\xf3\xe9\x02h\v\xca(\x96\xe1C\xdf\x1c\xea\x85C\xfb\x10\x13\xfa\x03\x16\xcd\x17\xa2\x80\xa1z\xb4r\x95\xc3@\x9d\xa6\xf1\x92#}g\xd3`\xf7\xcez\xcb\xb3\x1a\xbb\xc48e\x8e\xb1&\xd1\x8a\xe6!\x7f\x8d\xea,qx\xa28\xbf\"\xc7e\x06L\xb06\xeb<$\xd7\xba\xe5\x01\x03\x94r\xab\xd4J\x03s\xaf\xf6A\xbfV\xfa\x1ew\x8d\xbf\x99I\x97\xd8\xd2\xe8\x11\xc4\x04\x00\x84\xd5i\xee\xaf\xae[E\x1f\xdd\xd7#rT+\xb621p\xaf[\x99\" 1\xeb\xc7)\xd2\x1dh\xf2\xd5s\xfd?\fa>\x9f;\xe5r\xe5\xbd\xb0|=\x8eZcPY\xf8\xbd\x13\xaa\x8b\xdf\xbc\x93u\xd5\xb0r\xfb\xde\xe7\xd9k\xe2\xc6\x1b\xf2o@&>\xf2M\xe7\x8c\xeb\xee\xf5\x02~\x85\x14\xf3\xc6v\xf15PE\x8c\xca\x16$\xc2\x01#\xb563\rbq\xbf64\xfaW\x17\xdfa\xe6\xca\x86\xd7\xf8\x81X\x9bg4\xc1\xdam\xcf=Rq6\xb0\xd4D=I\x1a\x0e\xd0\xabz\xe2\x19\x0fM\xad\xdco\xa4\xb2\x8c?\xc1\x10\xf273\xd00\xb3_\xe8\x9a*\xfcL\xea;\xc0\x9a\xdbx!N;\xb5x\t\xa4E\xbe\x93r\x04\xf5\xf0\xf5\x7f\x9a)\xf5\x1b\"\xa1\xd8\x06>\xc9\xe2r\xe9\xbb\xfe\xc0\b\x81\x98\x1c\xe2\xe0?\x8f\xa1\xbel\aN\x83@\xb1\x03)4A\x83\xd6\xcf\xf6\xb5\x82\xb7\x9dA\b$\xa2x\x8a@\xfaj~\xef\x93\xb1/L\x01\xe2\xba|\xf0\x01)PP\xcdl\x06\xfc\x15;qZ\xb1u\xc9\xd0\xd16~JEGm\xe4\x1e@\x9dG\xe4@\xdf\xba\'\x8b\x1cD\xc7\xec\xd1@}tR\xd9P\xf4N\xe3\xd8x\xa0\x91\x17\xc2}\x13\b\xca\t(Z\xa3_\xa1\x90\x15T\xa4\xe7%\x98\xa7\xfb\x8bp/eq\x93\xbf\x1f =|\xf3\xb1\xfcR\xd8\nM,\xcb%@\'\x15\x88\xd8\xad\f\x91|\x95\x8fq+\x98\x81W\xba\x9f\xe0elOt\xbd\by\r\x87\x1c\xba\xbd\x8e+S>\xb8\xe29\x91h^x\xfb`\x00\xdd/\xa6\xb1\x16=\xa1bw\xc5I\xb1\x00'/549, 0x2) fcntl$addseals(r0, 0x409, 0x0) 06:07:50 executing program 7: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x100026, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000100000005000000000004000040000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000001000018000000c28500002b02", 0x66, 0x400}, {&(0x7f0000010100)="000000000000000000000000e8f7d2e8feeb4bf889ba053b02420ff8010040", 0x1f, 0x4e0}], 0x0, &(0x7f0000000140)=ANY=[]) 06:07:50 executing program 0: syncfs(0xffffffffffffffff) sendmsg$NL80211_CMD_DEL_TX_TS(0xffffffffffffffff, 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_SETPIPEFD(0xffffffffffffffff, 0xc0189378, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000080), 0xffffffffffffffff) r2 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_80211(r2, 0x8933, &(0x7f00000000c0)={'wlan1\x00', 0x0}) sendmsg$NL80211_CMD_SET_NOACK_MAP(r0, &(0x7f0000000600)={0x0, 0x0, &(0x7f00000005c0)={&(0x7f0000000580)={0x1c, r1, 0x501, 0x0, 0x0, {{}, {@val={0x8, 0x3, r3}, @void}}}, 0x1c}}, 0x0) r4 = socket$nl_generic(0x10, 0x3, 0x10) r5 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000080), 0xffffffffffffffff) r6 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_80211(r6, 0x8933, &(0x7f00000000c0)={'wlan1\x00', 0x0}) sendmsg$NL80211_CMD_SET_NOACK_MAP(r4, &(0x7f0000000600)={0x0, 0x0, &(0x7f00000005c0)={&(0x7f0000000580)={0x1c, r5, 0x501, 0x0, 0x0, {{}, {@val={0x8, 0x3, r7}, @void}}}, 0x1c}}, 0x0) sendmsg$NL80211_CMD_CONTROL_PORT_FRAME(0xffffffffffffffff, &(0x7f0000000100)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000040)={0x50, r1, 0x800, 0x70bd2b, 0x25dfdbfb, {{}, {@val={0x8, 0x3, r7}, @void}}, [@NL80211_ATTR_MAC={0xa, 0x6, @broadcast}, @NL80211_ATTR_CONTROL_PORT_ETHERTYPE={0x6}, @NL80211_ATTR_FRAME={0xe, 0x33, @ctrl_frame=@ack={{}, {0x6}, @device_b}}, @NL80211_ATTR_CONTROL_PORT_NO_ENCRYPT={0x4}, @NL80211_ATTR_MAC={0xa}]}, 0x50}}, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r8 = memfd_create(&(0x7f0000000400)='B\xdb/\x89\x03l\xdeb\xcb\xb54\xed\xbeLY\xb5Z\xe1\x12S\xf5G\xcc\xf3\xe9\x02h\v\xca(\x96\xe1C\xdf\x1c\xea\x85C\xfb\x10\x13\xfa\x03\x16\xcd\x17\xa2\x80\xa1z\xb4r\x95\xc3@\x9d\xa6\xf1\x92#}g\xd3`\xf7\xcez\xcb\xb3\x1a\xbb\xc48e\x8e\xb1&\xd1\x8a\xe6!\x7f\x8d\xea,qx\xa28\xbf\"\xc7e\x06L\xb06\xeb<$\xd7\xba\xe5\x01\x03\x94r\xab\xd4J\x03s\xaf\xf6A\xbfV\xfa\x1ew\x8d\xbf\x99I\x97\xd8\xd2\xe8\x11\xc4\x04\x00\x84\xd5i\xee\xaf\xae[E\x1f\xdd\xd7#rT+\xb621p\xaf[\x99\" 1\xeb\xc7)\xd2\x1dh\xf2\xd5s\xfd?\fa>\x9f;\xe5r\xe5\xbd\xb0|=\x8eZcPY\xf8\xbd\x13\xaa\x8b\xdf\xbc\x93u\xd5\xb0r\xfb\xde\xe7\xd9k\xe2\xc6\x1b\xf2o@&>\xf2M\xe7\x8c\xeb\xee\xf5\x02~\x85\x14\xf3\xc6v\xf15PE\x8c\xca\x16$\xc2\x01#\xb563\rbq\xbf64\xfaW\x17\xdfa\xe6\xca\x86\xd7\xf8\x81X\x9bg4\xc1\xdam\xcf=Rq6\xb0\xd4D=I\x1a\x0e\xd0\xabz\xe2\x19\x0fM\xad\xdco\xa4\xb2\x8c?\xc1\x10\xf273\xd00\xb3_\xe8\x9a*\xfcL\xea;\xc0\x9a\xdbx!N;\xb5x\t\xa4E\xbe\x93r\x04\xf5\xf0\xf5\x7f\x9a)\xf5\x1b\"\xa1\xd8\x06>\xc9\xe2r\xe9\xbb\xfe\xc0\b\x81\x98\x1c\xe2\xe0?\x8f\xa1\xbel\aN\x83@\xb1\x03)4A\x83\xd6\xcf\xf6\xb5\x82\xb7\x9dA\b$\xa2x\x8a@\xfaj~\xef\x93\xb1/L\x01\xe2\xba|\xf0\x01)PP\xcdl\x06\xfc\x15;qZ\xb1u\xc9\xd0\xd16~JEGm\xe4\x1e@\x9dG\xe4@\xdf\xba\'\x8b\x1cD\xc7\xec\xd1@}tR\xd9P\xf4N\xe3\xd8x\xa0\x91\x17\xc2}\x13\b\xca\t(Z\xa3_\xa1\x90\x15T\xa4\xe7%\x98\xa7\xfb\x8bp/eq\x93\xbf\x1f =|\xf3\xb1\xfcR\xd8\nM,\xcb%@\'\x15\x88\xd8\xad\f\x91|\x95\x8fq+\x98\x81W\xba\x9f\xe0elOt\xbd\by\r\x87\x1c\xba\xbd\x8e+S>\xb8\xe29\x91h^x\xfb`\x00\xdd/\xa6\xb1\x16=\xa1bw\xc5I\xb1\x00'/549, 0x2) fcntl$addseals(r8, 0x409, 0x0) [ 1986.107047] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 1986.110374] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 1986.113092] loop5: detected capacity change from 0 to 2175 [ 1986.115851] loop4: detected capacity change from 0 to 256 [ 1986.138398] EXT4-fs (loop5): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 1986.139969] EXT4-fs (loop5): group descriptors corrupted! [ 1986.141748] FAT-fs (loop4): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) 06:07:50 executing program 7: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x10003e, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000100000005000000000004000040000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000001000018000000c28500002b02", 0x66, 0x400}, {&(0x7f0000010100)="000000000000000000000000e8f7d2e8feeb4bf889ba053b02420ff8010040", 0x1f, 0x4e0}], 0x0, &(0x7f0000000140)=ANY=[]) [ 1986.183532] loop5: detected capacity change from 0 to 2175 [ 1986.218358] EXT4-fs (loop5): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 1986.219948] EXT4-fs (loop5): group descriptors corrupted! [ 1986.221194] loop7: detected capacity change from 0 to 2048 [ 1986.245267] EXT4-fs (loop7): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 1986.246166] EXT4-fs (loop7): group descriptors corrupted! 06:07:50 executing program 4: r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000040), 0xffffffffffffffff) syz_genetlink_get_family_id$ethtool(&(0x7f0000000100), 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_PAUSE_SET(0xffffffffffffffff, &(0x7f0000000440)={0x0, 0x0, 0x0}, 0x0) r2 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000080)='smaps\x00') pread64(r2, &(0x7f00000000c0)=""/98, 0x62, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x7fffffff) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(0xffffffffffffffff, 0xc0189374, &(0x7f0000000240)={{0x1, 0x1, 0x18, r0, {0x8}}, './file0\x00'}) dup3(0xffffffffffffffff, r2, 0x0) r3 = socket$inet_icmp_raw(0x2, 0x3, 0x1) syz_genetlink_get_family_id$ethtool(&(0x7f0000000180), r2) socket$nl_audit(0x10, 0x3, 0x9) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000040)={'wlan1\x00', 0x0}) sendmsg$inet(r3, &(0x7f0000000780)={&(0x7f0000000000)={0x2, 0x0, @local}, 0x10, &(0x7f00000003c0)=[{&(0x7f0000000300)="6fb9", 0xffeb}], 0x1, &(0x7f0000000700)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {r4, @remote, @broadcast}}}], 0x20}, 0x0) r5 = socket$inet_icmp_raw(0x2, 0x3, 0x1) socket$nl_audit(0x10, 0x3, 0x9) sendmsg$inet(r5, &(0x7f0000000780)={&(0x7f0000000000)={0x2, 0x0, @local}, 0x10, &(0x7f00000003c0)=[{&(0x7f0000000300)="6fb9", 0xffeb}], 0x1, &(0x7f0000000700)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @remote, @broadcast}}}], 0x20}, 0x0) sendmsg$ETHTOOL_MSG_LINKINFO_GET(r2, &(0x7f0000000200)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f00000001c0)={&(0x7f0000000340)=ANY=[@ANYBLOB='@\x00\x00\x00', @ANYRES16=r1, @ANYBLOB="000427bd7000ffdbdf25020000002c00018008000100", @ANYRES32=0x0, @ANYBLOB='\b\x00C\x00\x00\x00\x00\x00\b\x00!\x00', @ANYRES32=r4, @ANYBLOB="d5b921cac279671a02c4d90ed2cbc802c00000009852d9e901fb17000000000000", @ANYRES32=0x0], 0x40}, 0x1, 0x0, 0x0, 0x4}, 0xd0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000480), 0x1}, 0x603}, 0x0, 0xffffffefffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000040)=[{&(0x7f0000010000)="601c6d6b646f736689254300080120000400004000f8000020004000030000000000000001", 0x25}, {0x0, 0x0, 0x10000}], 0x0, &(0x7f0000000040)=ANY=[]) [ 1986.265920] loop7: detected capacity change from 0 to 2048 06:07:50 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000102000019000000900100000f000000000000000100000005000000000004000040000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000001000018000000c28500002b02", 0x66, 0x400}, {&(0x7f0000010100)="000000000000000000000000e8f7d2e8feeb4bf889ba053b02420ff8010040", 0x1f, 0x4e0}], 0x0, &(0x7f0000000140)=ANY=[]) [ 1986.279349] EXT4-fs (loop7): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 1986.280042] EXT4-fs (loop7): group descriptors corrupted! 06:07:50 executing program 1: pipe(&(0x7f0000000340)={0xffffffffffffffff}) pread64(r0, &(0x7f0000000440)=""/95, 0x5f, 0x6) execveat(r0, &(0x7f0000000080)='./file0\x00', &(0x7f00000001c0)=[&(0x7f00000000c0)='\x00', &(0x7f0000000180)='\x00'], &(0x7f0000000400)=[&(0x7f0000000200)='/dev/zero\x00', &(0x7f0000000240)='/dev/zero\x00', &(0x7f0000000300)='/dev/zero\x00'], 0x1000) socket$inet(0x2, 0x1, 0x0) perf_event_open(&(0x7f0000000100)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x22420, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ptrace$setopts(0x4200, 0x0, 0x5, 0x100050) perf_event_open(&(0x7f0000000280)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000004c00)={0xc0002100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) gettid() r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000), 0x380, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000000)='net/udp6\x00') read$hiddev(r2, &(0x7f0000001140)=""/212, 0xd4) fchmodat(r2, &(0x7f00000004c0)='./file0\x00', 0x0) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(r1, 0xc018937c, &(0x7f0000000380)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32=r0, @ANYBLOB="00000000000000002e2f66696cee8816"]) ioctl$TIOCSSOFTCAR(r3, 0x541a, &(0x7f00000003c0)=0x6) waitid$P_PIDFD(0x3, r1, &(0x7f0000000500), 0x2, &(0x7f0000000580)) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(r1, 0xc0189372, &(0x7f0000000040)={{0x1, 0x1, 0x18, r2, {0xffff}}, './file0\x00'}) [ 1986.379028] loop4: detected capacity change from 0 to 256 06:07:50 executing program 7: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x100046, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000100000005000000000004000040000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000001000018000000c28500002b02", 0x66, 0x400}, {&(0x7f0000010100)="000000000000000000000000e8f7d2e8feeb4bf889ba053b02420ff8010040", 0x1f, 0x4e0}], 0x0, &(0x7f0000000140)=ANY=[]) [ 1986.405732] FAT-fs (loop4): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) 06:07:50 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x900000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000100000005000000000004000040000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000001000018000000c28500002b02", 0x66, 0x400}, {&(0x7f0000010100)="000000000000000000000000e8f7d2e8feeb4bf889ba053b02420ff8010040", 0x1f, 0x4e0}], 0x0, &(0x7f0000000140)=ANY=[]) 06:07:50 executing program 0: syncfs(0xffffffffffffffff) sendmsg$NL80211_CMD_DEL_TX_TS(0xffffffffffffffff, 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_SETPIPEFD(0xffffffffffffffff, 0xc0189378, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000002780)={0xffffffffffffffff, 0xffffffffffffffff}) getsockopt$sock_buf(r0, 0x1, 0x3b, 0x0, &(0x7f0000000100)) r1 = fcntl$dupfd(r0, 0x406, 0xffffffffffffffff) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat2$dir(0xffffffffffffff9c, &(0x7f0000000200)='./file0\x00', &(0x7f0000000240)={0x200080, 0x34, 0x4}, 0x18) r3 = openat(r2, &(0x7f0000000300)='./file0\x00', 0x105c00, 0x80) faccessat2(0xffffffffffffffff, &(0x7f0000000340)='./file0\x00', 0x130, 0x1300) perf_event_open(&(0x7f0000000380)={0x0, 0x80, 0x8, 0x4, 0x6, 0x80, 0x0, 0x1, 0x200, 0x2, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x2, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x5, 0x1, @perf_config_ext={0x6, 0x3}, 0x80, 0x5cc5, 0x0, 0x3, 0x7, 0x8, 0xe1, 0x0, 0x9, 0x0, 0x8}, 0x0, 0xf, 0xffffffffffffffff, 0x7) r4 = memfd_create(&(0x7f0000000400)='B\xdb/\x89\x03l\xdeb\xcb\xb54\xed\xbeLY\xb5Z\xe1\x12S\xf5G\xcc\xf3\xe9\x02h\v\xca(\x96\xe1C\xdf\x1c\xea\x85C\xfb\x10\x13\xfa\x03\x16\xcd\x17\xa2\x80\xa1z\xb4r\x95\xc3@\x9d\xa6\xf1\x92#}g\xd3`\xf7\xcez\xcb\xb3\x1a\xbb\xc48e\x8e\xb1&\xd1\x8a\xe6!\x7f\x8d\xea,qx\xa28\xbf\"\xc7e\x06L\xb06\xeb<$\xd7\xba\xe5\x01\x03\x94r\xab\xd4J\x03s\xaf\xf6A\xbfV\xfa\x1ew\x8d\xbf\x99I\x97\xd8\xd2\xe8\x11\xc4\x04\x00\x84\xd5i\xee\xaf\xae[E\x1f\xdd\xd7#rT+\xb621p\xaf[\x99\" 1\xeb\xc7)\xd2\x1dh\xf2\xd5s\xfd?\fa>\x9f;\xe5r\xe5\xbd\xb0|=\x8eZcPY\xf8\xbd\x13\xaa\x8b\xdf\xbc\x93u\xd5\xb0r\xfb\xde\xe7\xd9k\xe2\xc6\x1b\xf2o@&>\xf2M\xe7\x8c\xeb\xee\xf5\x02~\x85\x14\xf3\xc6v\xf15PE\x8c\xca\x16$\xc2\x01#\xb563\rbq\xbf64\xfaW\x17\xdfa\xe6\xca\x86\xd7\xf8\x81X\x9bg4\xc1\xdam\xcf=Rq6\xb0\xd4D=I\x1a\x0e\xd0\xabz\xe2\x19\x0fM\xad\xdco\xa4\xb2\x8c?\xc1\x10\xf273\xd00\xb3_\xe8\x9a*\xfcL\xea;\xc0\x9a\xdbx!N;\xb5x\t\xa4E\xbe\x93r\x04\xf5\xf0\xf5\x7f\x9a)\xf5\x1b\"\xa1\xd8\x06>\xc9\xe2r\xe9\xbb\xfe\xc0\b\x81\x98\x1c\xe2\xe0?\x8f\xa1\xbel\aN\x83@\xb1\x03)4A\x83\xd6\xcf\xf6\xb5\x82\xb7\x9dA\b$\xa2x\x8a@\xfaj~\xef\x93\xb1/L\x01\xe2\xba|\xf0\x01)PP\xcdl\x06\xfc\x15;qZ\xb1u\xc9\xd0\xd16~JEGm\xe4\x1e@\x9dG\xe4@\xdf\xba\'\x8b\x1cD\xc7\xec\xd1@}tR\xd9P\xf4N\xe3\xd8x\xa0\x91\x17\xc2}\x13\b\xca\t(Z\xa3_\xa1\x90\x15T\xa4\xe7%\x98\xa7\xfb\x8bp/eq\x93\xbf\x1f =|\xf3\xb1\xfcR\xd8\nM,\xcb%@\'\x15\x88\xd8\xad\f\x91|\x95\x8fq+\x98\x81W\xba\x9f\xe0elOt\xbd\by\r\x87\x1c\xba\xbd\x8e+S>\xb8\xe29\x91h^x\xfb`\x00\xdd/\xa6\xb1\x16=\xa1bw\xc5I\xb1\x00'/549, 0x3) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000002780)={0xffffffffffffffff, 0xffffffffffffffff}) getsockopt$sock_buf(r5, 0x1, 0x3b, 0x0, &(0x7f0000000100)) ioctl$AUTOFS_DEV_IOCTL_TIMEOUT(r3, 0xc018937a, &(0x7f0000000640)={{0x1, 0x1, 0x18, r1, {0x10001}}, './file0\x00'}) ioctl$sock_SIOCGIFINDEX(r6, 0x8933, &(0x7f0000000680)={'sit0\x00'}) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r5, 0x81f8943c, &(0x7f0000000000)) fcntl$addseals(r4, 0x409, 0x0) [ 1986.442457] loop7: detected capacity change from 0 to 2048 06:07:50 executing program 4: r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000040), 0xffffffffffffffff) syz_genetlink_get_family_id$ethtool(&(0x7f0000000100), 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_PAUSE_SET(0xffffffffffffffff, &(0x7f0000000440)={0x0, 0x0, 0x0}, 0x0) r2 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000080)='smaps\x00') pread64(r2, &(0x7f00000000c0)=""/98, 0x62, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x7fffffff) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(0xffffffffffffffff, 0xc0189374, &(0x7f0000000240)={{0x1, 0x1, 0x18, r0, {0x8}}, './file0\x00'}) dup3(0xffffffffffffffff, r2, 0x0) r3 = socket$inet_icmp_raw(0x2, 0x3, 0x1) syz_genetlink_get_family_id$ethtool(&(0x7f0000000180), r2) socket$nl_audit(0x10, 0x3, 0x9) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000040)={'wlan1\x00', 0x0}) sendmsg$inet(r3, &(0x7f0000000780)={&(0x7f0000000000)={0x2, 0x0, @local}, 0x10, &(0x7f00000003c0)=[{&(0x7f0000000300)="6fb9", 0xffeb}], 0x1, &(0x7f0000000700)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {r4, @remote, @broadcast}}}], 0x20}, 0x0) r5 = socket$inet_icmp_raw(0x2, 0x3, 0x1) socket$nl_audit(0x10, 0x3, 0x9) sendmsg$inet(r5, &(0x7f0000000780)={&(0x7f0000000000)={0x2, 0x0, @local}, 0x10, &(0x7f00000003c0)=[{&(0x7f0000000300)="6fb9", 0xffeb}], 0x1, &(0x7f0000000700)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @remote, @broadcast}}}], 0x20}, 0x0) sendmsg$ETHTOOL_MSG_LINKINFO_GET(r2, &(0x7f0000000200)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f00000001c0)={&(0x7f0000000340)=ANY=[@ANYBLOB='@\x00\x00\x00', @ANYRES16=r1, @ANYBLOB="000427bd7000ffdbdf25020000002c00018008000100", @ANYRES32=0x0, @ANYBLOB='\b\x00C\x00\x00\x00\x00\x00\b\x00!\x00', @ANYRES32=r4, @ANYBLOB="d5b921cac279671a02c4d90ed2cbc802c00000009852d9e901fb17000000000000", @ANYRES32=0x0], 0x40}, 0x1, 0x0, 0x0, 0x4}, 0xd0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000480), 0x1}, 0x603}, 0x0, 0xffffffefffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000040)=[{&(0x7f0000010000)="601c6d6b646f736689254300080120000400004000f8000020004000030000000000000001", 0x25}, {0x0, 0x0, 0x10000}], 0x0, &(0x7f0000000040)=ANY=[]) [ 1986.501795] EXT4-fs (loop7): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 1986.503271] EXT4-fs (loop7): group descriptors corrupted! [ 1986.533687] loop7: detected capacity change from 0 to 2048 [ 1986.553178] loop5: detected capacity change from 0 to 18432 [ 1986.556762] EXT4-fs (loop7): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 1986.558219] EXT4-fs (loop7): group descriptors corrupted! [ 1986.578182] loop4: detected capacity change from 0 to 256 [ 1986.594959] EXT4-fs (loop5): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 1986.596468] EXT4-fs (loop5): group descriptors corrupted! [ 1986.605808] FAT-fs (loop4): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) [ 1986.618979] loop5: detected capacity change from 0 to 18432 [ 1986.636793] EXT4-fs (loop5): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 1986.638320] EXT4-fs (loop5): group descriptors corrupted! [ 1986.709594] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 1986.711849] misc raw-gadget: fail, usb_gadget_register_driver returned -16 06:08:06 executing program 1: pipe(&(0x7f0000000340)={0xffffffffffffffff}) pread64(r0, &(0x7f0000000440)=""/95, 0x5f, 0x6) execveat(r0, &(0x7f0000000080)='./file0\x00', &(0x7f00000001c0)=[&(0x7f00000000c0)='\x00', &(0x7f0000000180)='\x00'], &(0x7f0000000400)=[&(0x7f0000000200)='/dev/zero\x00', &(0x7f0000000240)='/dev/zero\x00', &(0x7f0000000300)='/dev/zero\x00'], 0x1000) socket$inet(0x2, 0x1, 0x0) perf_event_open(&(0x7f0000000100)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x22420, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ptrace$setopts(0x4200, 0x0, 0x5, 0x100050) perf_event_open(&(0x7f0000000280)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000004c00)={0xc0002100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) gettid() r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000), 0x380, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000000)='net/udp6\x00') read$hiddev(r2, &(0x7f0000001140)=""/212, 0xd4) fchmodat(r2, &(0x7f00000004c0)='./file0\x00', 0x0) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(r1, 0xc018937c, &(0x7f0000000380)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32=r0, @ANYBLOB="00000000000000002e2f66696cee8816"]) ioctl$TIOCSSOFTCAR(r3, 0x541a, &(0x7f00000003c0)=0x6) waitid$P_PIDFD(0x3, r1, &(0x7f0000000500), 0x2, &(0x7f0000000580)) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(r1, 0xc0189372, &(0x7f0000000040)={{0x1, 0x1, 0x18, r2, {0xffff}}, './file0\x00'}) 06:08:06 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000202000019000000900100000f000000000000000100000005000000000004000040000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000001000018000000c28500002b02", 0x66, 0x400}, {&(0x7f0000010100)="000000000000000000000000e8f7d2e8feeb4bf889ba053b02420ff8010040", 0x1f, 0x4e0}], 0x0, &(0x7f0000000140)=ANY=[]) 06:08:06 executing program 0: r0 = syz_genetlink_get_family_id$ieee802154(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$IEEE802154_ASSOCIATE_RESP(0xffffffffffffffff, &(0x7f0000000100)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x10000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000080)={0x28, r0, 0x100, 0x70bd27, 0x25dfdbfc, {}, [@IEEE802154_ATTR_COORD_HW_ADDR={0xc, 0x9, {0xaaaaaaaaaaaa0102}}, @IEEE802154_ATTR_STATUS={0x5, 0x3, 0x2}]}, 0x28}, 0x1, 0x0, 0x0, 0x4000}, 0x40000) syncfs(0xffffffffffffffff) sendmsg$NL80211_CMD_DEL_TX_TS(0xffffffffffffffff, 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_SETPIPEFD(0xffffffffffffffff, 0xc0189378, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x84094, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x800000000}, 0x0, 0x4, 0x0, 0x0, 0x100000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = memfd_create(&(0x7f0000000400)='B\xdb/\x89\x03l\xdeb\xcb\xb54\xed\xbeLY\xb5Z\xe1\x12S\xf5G\xcc\xf3\xe9\x02h\v\xca(\x96\xe1C\xdf\x1c\xea\x85C\xfb\x10\x13\xfa\x03\x16\xcd\x17\xa2\x80\xa1z\xb4r\x95\xc3@\x9d\xa6\xf1\x92#}g\xd3`\xf7\xcez\xcb\xb3\x1a\xbb\xc48e\x8e\xb1&\xd1\x8a\xe6!\x7f\x8d\xea,qx\xa28\xbf\"\xc7e\x06L\xb06\xeb<$\xd7\xba\xe5\x01\x03\x94r\xab\xd4J\x03s\xaf\xf6A\xbfV\xfa\x1ew\x8d\xbf\x99I\x97\xd8\xd2\xe8\x11\xc4\x04\x00\x84\xd5i\xee\xaf\xae[E\x1f\xdd\xd7#rT+\xb621p\xaf[\x99\" 1\xeb\xc7)\xd2\x1dh\xf2\xd5s\xfd?\fa>\x9f;\xe5r\xe5\xbd\xb0|=\x8eZcPY\xf8\xbd\x13\xaa\x8b\xdf\xbc\x93u\xd5\xb0r\xfb\xde\xe7\xd9k\xe2\xc6\x1b\xf2o@&>\xf2M\xe7\x8c\xeb\xee\xf5\x02~\x85\x14\xf3\xc6v\xf15PE\x8c\xca\x16$\xc2\x01#\xb563\rbq\xbf64\xfaW\x17\xdfa\xe6\xca\x86\xd7\xf8\x81X\x9bg4\xc1\xdam\xcf=Rq6\xb0\xd4D=I\x1a\x0e\xd0\xabz\xe2\x19\x0fM\xad\xdco\xa4\xb2\x8c?\xc1\x10\xf273\xd00\xb3_\xe8\x9a*\xfcL\xea;\xc0\x9a\xdbx!N;\xb5x\t\xa4E\xbe\x93r\x04\xf5\xf0\xf5\x7f\x9a)\xf5\x1b\"\xa1\xd8\x06>\xc9\xe2r\xe9\xbb\xfe\xc0\b\x81\x98\x1c\xe2\xe0?\x8f\xa1\xbel\aN\x83@\xb1\x03)4A\x83\xd6\xcf\xf6\xb5\x82\xb7\x9dA\b$\xa2x\x8a@\xfaj~\xef\x93\xb1/L\x01\xe2\xba|\xf0\x01)PP\xcdl\x06\xfc\x15;qZ\xb1u\xc9\xd0\xd16~JEGm\xe4\x1e@\x9dG\xe4@\xdf\xba\'\x8b\x1cD\xc7\xec\xd1@}tR\xd9P\xf4N\xe3\xd8x\xa0\x91\x17\xc2}\x13\b\xca\t(Z\xa3_\xa1\x90\x15T\xa4\xe7%\x98\xa7\xfb\x8bp/eq\x93\xbf\x1f =|\xf3\xb1\xfcR\xd8\nM,\xcb%@\'\x15\x88\xd8\xad\f\x91|\x95\x8fq+\x98\x81W\xba\x9f\xe0elOt\xbd\by\r\x87\x1c\xba\xbd\x8e+S>\xb8\xe29\x91h^x\xfb`\x00\xdd/\xa6\xb1\x16=\xa1bw\xc5I\xb1\x00'/549, 0x2) fcntl$addseals(r1, 0x409, 0x0) 06:08:06 executing program 6: ioctl$AUTOFS_DEV_IOCTL_CLOSEMOUNT(0xffffffffffffffff, 0xc0189375, 0x0) syz_genetlink_get_family_id$ethtool(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_PAUSE_SET(0xffffffffffffffff, 0x0, 0x0) r0 = perf_event_open$cgroup(&(0x7f00000000c0)={0x2, 0x80, 0x9c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) close_range(r0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0xffffffffffffffff, 0xffffffffffffffff, r0, 0x0) r1 = memfd_create(&(0x7f0000000400)='B\xdb/\x89\x03l\xdeb\xcb\xb54\xed\xbeLY\xb5Z\xe1\x12S\xf5G\xcc\xf3\xe9\x02h\v\xca(\x96\xe1C\xdf\x1c\xea\x85C\xfb\x10\x13\xfa\x03\x16\xcd\x17\xa2\x80\xa1z\xb4r\x95\xc3@\x9d\xa6\xf1\x92#}g\xd3`\xf7\xcez\xcb\xb3\x1a\xbb\xc48e\x8e\xb1&\xd1\x8a\xe6!\x7f\x8d\xea,qx\xa28\xbf\"\xc7e\x06L\xb06\xeb<$\xd7\xba\xe5\x01\x03\x94r\xab\xd4J\x03s\xaf\xf6A\xbfV\xfa\x1ew\x8d\xbf\x99I\x97\xd8\xd2\xe8\x11\xc4\x04\x00\x84\xd5i\xee\xaf\xae[E\x1f\xdd\xd7#rT+\xb621p\xaf[\x99\" 1\xeb\xc7)\xd2\x1dh\xf2\xd5s\xfd?\fa>\x9f;\xe5r\xe5\xbd\xb0|=\x8eZcPY\xf8\xbd\x13\xaa\x8b\xdf\xbc\x93u\xd5\xb0r\xfb\xde\xe7\xd9k\xe2\xc6\x1b\xf2o@&>\xf2M\xe7\x8c\xeb\xee\xf5\x02~\x85\x14\xf3\xc6v\xf15PE\x8c\xca\x16$\xc2\x01#\xb563\rbq\xbf64\xfaW\x17\xdfa\xe6\xca\x86\xd7\xf8\x81X\x9bg4\xc1\xdam\xcf=Rq6\xb0\xd4D=I\x1a\x0e\xd0\xabz\xe2\x19\x0fM\xad\xdco\xa4\xb2\x8c?\xc1\x10\xf273\xd00\xb3_\xe8\x9a*\xfcL\xea;\xc0\x9a\xdbx!N;\xb5x\t\xa4E\xbe\x93r\x04\xf5\xf0\xf5\x7f\x9a)\xf5\x1b\"\xa1\xd8\x06>\xc9\xe2r\xe9\xbb\xfe\xc0\b\x81\x98\x1c\xe2\xe0?\x8f\xa1\xbel\aN\x83@\xb1\x03)4A\x83\xd6\xcf\xf6\xb5\x82\xb7\x9dA\b$\xa2x\x8a@\xfaj~\xef\x93\xb1/L\x01\xe2\xba|\xf0\x01)PP\xcdl\x06\xfc\x15;qZ\xb1u\xc9\xd0\xd16~JEGm\xe4\x1e@\x9dG\xe4@\xdf\xba\'\x8b\x1cD\xc7\xec\xd1@}tR\xd9P\xf4N\xe3\xd8x\xa0\x91\x17\xc2}\x13\b\xca\t(Z\xa3_\xa1\x90\x15T\xa4\xe7%\x98\xa7\xfb\x8bp/eq\x93\xbf\x1f =|\xf3\xb1\xfcR\xd8\nM,\xcb%@\'\x15\x88\xd8\xad\f\x91|\x95\x8fq+\x98\x81W\xba\x9f\xe0elOt\xbd\by\r\x87\x1c\xba\xbd\x8e+S>\xb8\xe29\x91h^x\xfb`\x00\xdd/\xa6\xb1\x16=\xa1bw\xc5I\xb1\x00'/549, 0x2) fcntl$addseals(r1, 0x409, 0x0) 06:08:06 executing program 7: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x100048, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000100000005000000000004000040000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000001000018000000c28500002b02", 0x66, 0x400}, {&(0x7f0000010100)="000000000000000000000000e8f7d2e8feeb4bf889ba053b02420ff8010040", 0x1f, 0x4e0}], 0x0, &(0x7f0000000140)=ANY=[]) 06:08:06 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x1000000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000100000005000000000004000040000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000001000018000000c28500002b02", 0x66, 0x400}, {&(0x7f0000010100)="000000000000000000000000e8f7d2e8feeb4bf889ba053b02420ff8010040", 0x1f, 0x4e0}], 0x0, &(0x7f0000000140)=ANY=[]) 06:08:06 executing program 3: r0 = getpid() ioprio_get$pid(0x2, r0) r1 = getpid() ioprio_get$pid(0x2, r1) syz_mount_image$vfat(0x0, &(0x7f0000000040)='./file1\x00', 0x0, 0x0, &(0x7f00000000c0), 0x2002000, &(0x7f0000000400)=ANY=[@ANYRES16, @ANYBLOB="72e1af808ba473e6f37c85b113d8c4d9e1de4ed2968d2e01108c4795a941d14f6927393c8c3c458dd7454900d48719912efc18d580a8f841234284071012d7d5020eb5d56dc1ba5f1048adac4b928bf6cfd663b4cab43637cb979a9199a0246ec02345161783bc79585902603d7062084f05b744e31fcb4c3e81f3becabb7ad1fa5783f5e5e60ae912102fe8df0536bd074c03bd33742f35c5c44b5c3c9d693114367b7d966e"]) chdir(&(0x7f0000000140)='./file0\x00') ptrace$getenv(0x4201, r0, 0xfff, &(0x7f00000000c0)) openat(0xffffffffffffff9c, 0x0, 0x40c2, 0x0) r2 = perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x6, 0x0, 0xe}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r4 = fork() perf_event_open(&(0x7f0000000540)={0x4, 0x80, 0xeb, 0x0, 0x20, 0x0, 0x0, 0x2, 0x2820, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, @perf_config_ext={0xdc, 0x40}, 0x40000, 0x3, 0x8, 0x5, 0x6000000000000, 0x4, 0x5, 0x0, 0x3, 0x0, 0x3}, r4, 0x9, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000340)={0x0, 0x80, 0x2, 0x83, 0x1, 0x7, 0x0, 0x1f, 0x9ec17fc7a3e840c7, 0xc, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x9, 0x4, @perf_bp={&(0x7f0000000240), 0x1}, 0x404, 0x7, 0x3, 0x6, 0x800, 0x9, 0x3, 0x0, 0x7ff, 0x0, 0x9}, r4, 0x8, r2, 0x9) fork() setxattr$trusted_overlay_upper(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180), &(0x7f00000001c0)={0x0, 0xfb, 0x7a, 0x0, 0x2, "d54449275cb08faf62df87518e3ce16f", "9a61b461b0c63151b954990036d5e0163ceb48c6a801bb019e9e6fa7196a9372f804b9e9ca3fb3d85d1985d31346bbd5fd02b1c8223bf6388eb75498623e38ff88a99c5ce38698a32306b7d4e4b0fd4b03bfa568df17a42f725c6c33046b38b6e4a713dde1"}, 0x7a, 0x3) socket$nl_audit(0x10, 0x3, 0x9) chroot(&(0x7f0000000080)='./file1\x00') sendmsg$inet(r3, &(0x7f0000000780)={&(0x7f0000000000)={0x2, 0x0, @local}, 0x10, &(0x7f00000003c0)=[{&(0x7f0000000300)="6fb9", 0xffeb}], 0x1, &(0x7f0000000700)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @remote, @broadcast}}}], 0x20}, 0x0) 06:08:06 executing program 4: r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000040), 0xffffffffffffffff) syz_genetlink_get_family_id$ethtool(&(0x7f0000000100), 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_PAUSE_SET(0xffffffffffffffff, &(0x7f0000000440)={0x0, 0x0, 0x0}, 0x0) r2 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000080)='smaps\x00') pread64(r2, &(0x7f00000000c0)=""/98, 0x62, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x7fffffff) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(0xffffffffffffffff, 0xc0189374, &(0x7f0000000240)={{0x1, 0x1, 0x18, r0, {0x8}}, './file0\x00'}) dup3(0xffffffffffffffff, r2, 0x0) r3 = socket$inet_icmp_raw(0x2, 0x3, 0x1) syz_genetlink_get_family_id$ethtool(&(0x7f0000000180), r2) socket$nl_audit(0x10, 0x3, 0x9) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000040)={'wlan1\x00', 0x0}) sendmsg$inet(r3, &(0x7f0000000780)={&(0x7f0000000000)={0x2, 0x0, @local}, 0x10, &(0x7f00000003c0)=[{&(0x7f0000000300)="6fb9", 0xffeb}], 0x1, &(0x7f0000000700)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {r4, @remote, @broadcast}}}], 0x20}, 0x0) r5 = socket$inet_icmp_raw(0x2, 0x3, 0x1) socket$nl_audit(0x10, 0x3, 0x9) sendmsg$inet(r5, &(0x7f0000000780)={&(0x7f0000000000)={0x2, 0x0, @local}, 0x10, &(0x7f00000003c0)=[{&(0x7f0000000300)="6fb9", 0xffeb}], 0x1, &(0x7f0000000700)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @remote, @broadcast}}}], 0x20}, 0x0) sendmsg$ETHTOOL_MSG_LINKINFO_GET(r2, &(0x7f0000000200)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f00000001c0)={&(0x7f0000000340)=ANY=[@ANYBLOB='@\x00\x00\x00', @ANYRES16=r1, @ANYBLOB="000427bd7000ffdbdf25020000002c00018008000100", @ANYRES32=0x0, @ANYBLOB='\b\x00C\x00\x00\x00\x00\x00\b\x00!\x00', @ANYRES32=r4, @ANYBLOB="d5b921cac279671a02c4d90ed2cbc802c00000009852d9e901fb17000000000000", @ANYRES32=0x0], 0x40}, 0x1, 0x0, 0x0, 0x4}, 0xd0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000480), 0x1}, 0x603}, 0x0, 0xffffffefffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000040)=[{&(0x7f0000010000)="601c6d6b646f736689254300080120000400004000f8000020004000030000000000000001", 0x25}, {0x0, 0x0, 0x10000}], 0x0, &(0x7f0000000040)=ANY=[]) [ 2002.615589] loop5: detected capacity change from 0 to 32768 [ 2002.626364] loop7: detected capacity change from 0 to 2048 [ 2002.628020] loop4: detected capacity change from 0 to 256 [ 2002.640158] EXT4-fs (loop5): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 2002.640906] EXT4-fs (loop5): group descriptors corrupted! [ 2002.647519] EXT4-fs (loop7): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 2002.648189] EXT4-fs (loop7): group descriptors corrupted! [ 2002.651601] FAT-fs (loop4): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) [ 2002.662049] loop5: detected capacity change from 0 to 32768 06:08:06 executing program 6: ioctl$AUTOFS_DEV_IOCTL_CLOSEMOUNT(0xffffffffffffffff, 0xc0189375, 0x0) syz_genetlink_get_family_id$ethtool(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_PAUSE_SET(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x10c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) umount2(&(0x7f0000000000)='./file0\x00', 0x8) r0 = memfd_create(&(0x7f0000000400)='B\xdb/\x89\x03l\xdeb\xcb\xb54\xed\xbeLY\xb5Z\xe1\x12S\xf5G\xcc\xf3\xe9\x02h\v\xca(\x96\xe1C\xdf\x1c\xea\x85C\xfb\x10\x13\xfa\x03\x16\xcd\x17\xa2\x80\xa1z\xb4r\x95\xc3@\x9d\xa6\xf1\x92#}g\xd3`\xf7\xcez\xcb\xb3\x1a\xbb\xc48e\x8e\xb1&\xd1\x8a\xe6!\x7f\x8d\xea,qx\xa28\xbf\"\xc7e\x06L\xb06\xeb<$\xd7\xba\xe5\x01\x03\x94r\xab\xd4J\x03s\xaf\xf6A\xbfV\xfa\x1ew\x8d\xbf\x99I\x97\xd8\xd2\xe8\x11\xc4\x04\x00\x84\xd5i\xee\xaf\xae[E\x1f\xdd\xd7#rT+\xb621p\xaf[\x99\" 1\xeb\xc7)\xd2\x1dh\xf2\xd5s\xfd?\fa>\x9f;\xe5r\xe5\xbd\xb0|=\x8eZcPY\xf8\xbd\x13\xaa\x8b\xdf\xbc\x93u\xd5\xb0r\xfb\xde\xe7\xd9k\xe2\xc6\x1b\xf2o@&>\xf2M\xe7\x8c\xeb\xee\xf5\x02~\x85\x14\xf3\xc6v\xf15PE\x8c\xca\x16$\xc2\x01#\xb563\rbq\xbf64\xfaW\x17\xdfa\xe6\xca\x86\xd7\xf8\x81X\x9bg4\xc1\xdam\xcf=Rq6\xb0\xd4D=I\x1a\x0e\xd0\xabz\xe2\x19\x0fM\xad\xdco\xa4\xb2\x8c?\xc1\x10\xf273\xd00\xb3_\xe8\x9a*\xfcL\xea;\xc0\x9a\xdbx!N;\xb5x\t\xa4E\xbe\x93r\x04\xf5\xf0\xf5\x7f\x9a)\xf5\x1b\"\xa1\xd8\x06>\xc9\xe2r\xe9\xbb\xfe\xc0\b\x81\x98\x1c\xe2\xe0?\x8f\xa1\xbel\aN\x83@\xb1\x03)4A\x83\xd6\xcf\xf6\xb5\x82\xb7\x9dA\b$\xa2x\x8a@\xfaj~\xef\x93\xb1/L\x01\xe2\xba|\xf0\x01)PP\xcdl\x06\xfc\x15;qZ\xb1u\xc9\xd0\xd16~JEGm\xe4\x1e@\x9dG\xe4@\xdf\xba\'\x8b\x1cD\xc7\xec\xd1@}tR\xd9P\xf4N\xe3\xd8x\xa0\x91\x17\xc2}\x13\b\xca\t(Z\xa3_\xa1\x90\x15T\xa4\xe7%\x98\xa7\xfb\x8bp/eq\x93\xbf\x1f =|\xf3\xb1\xfcR\xd8\nM,\xcb%@\'\x15\x88\xd8\xad\f\x91|\x95\x8fq+\x98\x81W\xba\x9f\xe0elOt\xbd\by\r\x87\x1c\xba\xbd\x8e+S>\xb8\xe29\x91h^x\xfb`\x00\xdd/\xa6\xb1\x16=\xa1bw\xc5I\xb1\x00'/549, 0x2) fcntl$addseals(r0, 0x409, 0x0) [ 2002.674058] loop7: detected capacity change from 0 to 2048 [ 2002.703307] EXT4-fs (loop5): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 2002.704030] EXT4-fs (loop5): group descriptors corrupted! 06:08:07 executing program 4: r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000040), 0xffffffffffffffff) syz_genetlink_get_family_id$ethtool(&(0x7f0000000100), 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_PAUSE_SET(0xffffffffffffffff, &(0x7f0000000440)={0x0, 0x0, 0x0}, 0x0) r2 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000080)='smaps\x00') pread64(r2, &(0x7f00000000c0)=""/98, 0x62, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x7fffffff) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(0xffffffffffffffff, 0xc0189374, &(0x7f0000000240)={{0x1, 0x1, 0x18, r0, {0x8}}, './file0\x00'}) dup3(0xffffffffffffffff, r2, 0x0) r3 = socket$inet_icmp_raw(0x2, 0x3, 0x1) syz_genetlink_get_family_id$ethtool(&(0x7f0000000180), r2) socket$nl_audit(0x10, 0x3, 0x9) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000040)={'wlan1\x00', 0x0}) sendmsg$inet(r3, &(0x7f0000000780)={&(0x7f0000000000)={0x2, 0x0, @local}, 0x10, &(0x7f00000003c0)=[{&(0x7f0000000300)="6fb9", 0xffeb}], 0x1, &(0x7f0000000700)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {r4, @remote, @broadcast}}}], 0x20}, 0x0) r5 = socket$inet_icmp_raw(0x2, 0x3, 0x1) socket$nl_audit(0x10, 0x3, 0x9) sendmsg$inet(r5, &(0x7f0000000780)={&(0x7f0000000000)={0x2, 0x0, @local}, 0x10, &(0x7f00000003c0)=[{&(0x7f0000000300)="6fb9", 0xffeb}], 0x1, &(0x7f0000000700)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @remote, @broadcast}}}], 0x20}, 0x0) sendmsg$ETHTOOL_MSG_LINKINFO_GET(r2, &(0x7f0000000200)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f00000001c0)={&(0x7f0000000340)=ANY=[@ANYBLOB='@\x00\x00\x00', @ANYRES16=r1, @ANYBLOB="000427bd7000ffdbdf25020000002c00018008000100", @ANYRES32=0x0, @ANYBLOB='\b\x00C\x00\x00\x00\x00\x00\b\x00!\x00', @ANYRES32=r4, @ANYBLOB="d5b921cac279671a02c4d90ed2cbc802c00000009852d9e901fb17000000000000", @ANYBLOB], 0x40}, 0x1, 0x0, 0x0, 0x4}, 0xd0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000480), 0x1}, 0x603}, 0x0, 0xffffffefffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000040)=[{&(0x7f0000010000)="601c6d6b646f736689254300080120000400004000f8000020004000030000000000000001", 0x25}, {0x0, 0x0, 0x10000}], 0x0, &(0x7f0000000040)=ANY=[]) 06:08:07 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x5000000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000100000005000000000004000040000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000001000018000000c28500002b02", 0x66, 0x400}, {&(0x7f0000010100)="000000000000000000000000e8f7d2e8feeb4bf889ba053b02420ff8010040", 0x1f, 0x4e0}], 0x0, &(0x7f0000000140)=ANY=[]) 06:08:07 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000302000019000000900100000f000000000000000100000005000000000004000040000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000001000018000000c28500002b02", 0x66, 0x400}, {&(0x7f0000010100)="000000000000000000000000e8f7d2e8feeb4bf889ba053b02420ff8010040", 0x1f, 0x4e0}], 0x0, &(0x7f0000000140)=ANY=[]) [ 2002.813148] EXT4-fs (loop7): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 2002.814703] EXT4-fs (loop7): group descriptors corrupted! 06:08:07 executing program 0: syncfs(0xffffffffffffffff) sendmsg$NL80211_CMD_DEL_TX_TS(0xffffffffffffffff, 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_SETPIPEFD(0xffffffffffffffff, 0xc0189378, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0xb}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = memfd_create(&(0x7f0000000400)='B\xdb/\x89\x03l\xdeb\xcb\xb54\xed\xbeLY\xb5Z\xe1\x12S\xf5G\xcc\xf3\xe9\x02h\v\xca(\x96\xe1C\xdf\x1c\xea\x85C\xfb\x10\x13\xfa\x03\x16\xcd\x17\xa2\x80\xa1z\xb4r\x95\xc3@\x9d\xa6\xf1\x92#}g\xd3`\xf7\xcez\xcb\xb3\x1a\xbb\xc48e\x8e\xb1&\xd1\x8a\xe6!\x7f\x8d\xea,qx\xa28\xbf\"\xc7e\x06L\xb06\xeb<$\xd7\xba\xe5\x01\x03\x94r\xab\xd4J\x03s\xaf\xf6A\xbfV\xfa\x1ew\x8d\xbf\x99I\x97\xd8\xd2\xe8\x11\xc4\x04\x00\x84\xd5i\xee\xaf\xae[E\x1f\xdd\xd7#rT+\xb621p\xaf[\x99\" 1\xeb\xc7)\xd2\x1dh\xf2\xd5s\xfd?\fa>\x9f;\xe5r\xe5\xbd\xb0|=\x8eZcPY\xf8\xbd\x13\xaa\x8b\xdf\xbc\x93u\xd5\xb0r\xfb\xde\xe7\xd9k\xe2\xc6\x1b\xf2o@&>\xf2M\xe7\x8c\xeb\xee\xf5\x02~\x85\x14\xf3\xc6v\xf15PE\x8c\xca\x16$\xc2\x01#\xb563\rbq\xbf64\xfaW\x17\xdfa\xe6\xca\x86\xd7\xf8\x81X\x9bg4\xc1\xdam\xcf=Rq6\xb0\xd4D=I\x1a\x0e\xd0\xabz\xe2\x19\x0fM\xad\xdco\xa4\xb2\x8c?\xc1\x10\xf273\xd00\xb3_\xe8\x9a*\xfcL\xea;\xc0\x9a\xdbx!N;\xb5x\t\xa4E\xbe\x93r\x04\xf5\xf0\xf5\x7f\x9a)\xf5\x1b\"\xa1\xd8\x06>\xc9\xe2r\xe9\xbb\xfe\xc0\b\x81\x98\x1c\xe2\xe0?\x8f\xa1\xbel\aN\x83@\xb1\x03)4A\x83\xd6\xcf\xf6\xb5\x82\xb7\x9dA\b$\xa2x\x8a@\xfaj~\xef\x93\xb1/L\x01\xe2\xba|\xf0\x01)PP\xcdl\x06\xfc\x15;qZ\xb1u\xc9\xd0\xd16~JEGm\xe4\x1e@\x9dG\xe4@\xdf\xba\'\x8b\x1cD\xc7\xec\xd1@}tR\xd9P\xf4N\xe3\xd8x\xa0\x91\x17\xc2}\x13\b\xca\t(Z\xa3_\xa1\x90\x15T\xa4\xe7%\x98\xa7\xfb\x8bp/eq\x93\xbf\x1f =|\xf3\xb1\xfcR\xd8\nM,\xcb%@\'\x15\x88\xd8\xad\f\x91|\x95\x8fq+\x98\x81W\xba\x9f\xe0elOt\xbd\by\r\x87\x1c\xba\xbd\x8e+S>\xb8\xe29\x91h^x\xfb`\x00\xdd/\xa6\xb1\x16=\xa1bw\xc5I\xb1\x00'/549, 0x2) fcntl$addseals(r0, 0x409, 0x0) 06:08:07 executing program 6: ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_CLIENT(0xffffffffffffffff, 0x404c534a, &(0x7f0000000100)={0x40, 0x80000000, 0x2}) sendmsg$ETHTOOL_MSG_WOL_SET(0xffffffffffffffff, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x80}, 0xc, &(0x7f0000000080)={&(0x7f0000000d80)={0x704, 0x0, 0x100, 0x70bd28, 0x25dfdbfe, {}, [@ETHTOOL_A_WOL_MODES={0x118, 0x2, 0x0, 0x1, [@ETHTOOL_A_BITSET_VALUE={0xfe, 0x4, "3a692db603bb3047179868d42063282f1b0f92af37f0baa4c51fb37c6ac27d0ccfa319461085fcda3a87ef971ac28f7b1d379cec84daed39ff246c6032f86cd9a4a517faace773ba618de2f16478268635b6627af6bcd51449dfd5b2df9209eb70573d89539d663bfc322b9ecbaf713da2c01e7af040e8e1b9469ee9a89bae5758c23eb38b9ae93350dd04b9c015f8b5d16d9e0b21a96b36a30793e8bc7f2b1511e92ab288eea0c69c09bce33de9b08f005463a9bdfb1a4b1f7483410a069b794522ba3b39246712d29479d86fbdd0ee2e85ae6a3fff69a1155dba97277b0a95200d64d53f0879e4b47b101bf9589ce9c73674508dab960943c6"}, @ETHTOOL_A_BITSET_SIZE={0x8, 0x2, 0x1}, @ETHTOOL_A_BITSET_SIZE={0x8, 0x2, 0x3ff}, @ETHTOOL_A_BITSET_NOMASK={0x4}]}, @ETHTOOL_A_WOL_SOPASS={0x59, 0x3, "b3665963bce779817466ce5a2570629648d69201163d44c9b3e4419879767e6a8ded3858832b105626649bd0fa8c2bad8ccf6067f2417b90181c80ca3528927ac86c09f7fa87d16b107a33fdf4c630e6e72fcb0087"}, @ETHTOOL_A_WOL_SOPASS={0x22, 0x3, "2b2882f8fb7128ccb068732322a8fe0bac8ff7240221491528d113116997"}, @ETHTOOL_A_WOL_MODES={0x504, 0x2, 0x0, 0x1, [@ETHTOOL_A_BITSET_BITS={0x284, 0x3, 0x0, 0x1, [{0xc, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x7fffffff}]}, {0x30, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x401}, @ETHTOOL_A_BITSET_BIT_NAME={0x5, 0x2, '\x00'}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x1}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x4}]}, {0x14, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_NAME={0x8, 0x2, '\x8cH\x00\x00'}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x1f}]}, {0x230, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_NAME={0x6, 0x2, '[\x00'}, @ETHTOOL_A_BITSET_BIT_NAME={0x220, 0x2, 'B\xdb/\x89\x03l\xdeb\xcb\xb54\xed\xbeLY\xb5Z\xe1\x12S\xf5G\xcc\xf3\xe9\x02h\v\xca(\x96\xe1C\xdf\x1c\xea\x85C\xfb\x10\x13\xfa\x03\x16\xcd\x17\xa2\x80\xa1z\xb4r\x95\xc3@\x9d\xa6\xf1\x92#}g\xd3`\xf7\xcez\xcb\xb3\x1a\xbb\xc48e\x8e\xb1&\xd1\x8a\xe6!\x7f\x8d\xea,qx\xa28\xbf\"\xc7e\x06L\xb06\xeb<$\xd7\xba\xe5\x01\x03\x94r\xab\xd4J\x03s\xaf\xf6A\xbfV\xfa\x1ew\x8d\xbf\x99I\x97\xd8\xd2\xe8\x11\xc4\x04\x00\x84\xd5i\xee\xaf\xae[E\x1f\xdd\xd7#rT+\xb621p\xaf[\x99\" 1\xeb\xc7)\xd2\x1dh\xf2\xd5s\xfd?\fa>\x9f;\xe5r\xe5\xbd\xb0|=\x8eZcPY\xf8\xbd\x13\xaa\x8b\xdf\xbc\x93u\xd5\xb0r\xfb\xde\xe7\xd9k\xe2\xc6\x1b\xf2o@&>\xf2M\xe7\x8c\xeb\xee\xf5\x02~\x85\x14\xf3\xc6v\xf15PE\x8c\xca\x16$\xc2\x01#\xb563\rbq\xbf64\xfaW\x17\xdfa\xe6\xca\x86\xd7\xf8\x81X\x9bg4\xc1\xdam\xcf=Rq6\xb0\xd4D=I\x1a\x0e\xd0\xabz\xe2\x19\x0fM\xad\xdco\xa4\xb2\x8c?\xc1\x10\xf273\xd00\xb3_\xe8\x9a*\xfcL\xea;\xc0\x9a\xdbx!N;\xb5x\t\xa4E\xbe\x93r\x04\xf5\xf0\xf5\x7f\x9a)\xf5\x1b\"\xa1\xd8\x06>\xc9\xe2r\xe9\xbb\xfe\xc0\b\x81\x98\x1c\xe2\xe0?\x8f\xa1\xbel\aN\x83@\xb1\x03)4A\x83\xd6\xcf\xf6\xb5\x82\xb7\x9dA\b$\xa2x\x8a@\xfaj~\xef\x93\xb1/L\x01\xe2\xba|\xf0\x01)PP\xcdl\x06\xfc\x15;qZ\xb1u\xc9\xd0\xd16~JEGm\xe4\x1e@\x9dG\xe4@\xdf\xba\'\x8b\x1cD\xc7\xec\xd1@}tR\xd9P\xf4N\xe3\xd8x\xa0\x91\x17\xc2}\x13\b\xca\t(Z\xa3_\xa1\x90\x15T\xa4\xe7%\x98\xa7\xfb\x8bp/eq\x93\xbf\x1f =|\xf3\xb1\xfcR\xd8\nM,\xcb%@\'\x15\x88\xd8\xad\f\x91|\x95\x8fq+\x98\x81W\xba\x9f\xe0elOt\xbd\by\r\x87\x1c\xba\xbd\x8e+S>\xb8\xe29\x91h^x\xfb`\x00\xdd/\xa6\xb1\x16=\xa1bw\xc5I\xb1\x00'}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}]}]}, @ETHTOOL_A_BITSET_BITS={0x27c, 0x3, 0x0, 0x1, [{0x40, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x9}, @ETHTOOL_A_BITSET_BIT_NAME={0x9, 0x2, '\',,{\x00'}, @ETHTOOL_A_BITSET_BIT_NAME={0xd, 0x2, '@\'$l$\xa6:(]'}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x10e}, @ETHTOOL_A_BITSET_BIT_NAME={0x6, 0x2, ']\x00'}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x8}]}, {0x238, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x5}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x5}, @ETHTOOL_A_BITSET_BIT_NAME={0x220, 0x2, 'B\xdb/\x89\x03l\xdeb\xcb\xb54\xed\xbeLY\xb5Z\xe1\x12S\xf5G\xcc\xf3\xe9\x02h\v\xca(\x96\xe1C\xdf\x1c\xea\x85C\xfb\x10\x13\xfa\x03\x16\xcd\x17\xa2\x80\xa1z\xb4r\x95\xc3@\x9d\xa6\xf1\x92#}g\xd3`\xf7\xcez\xcb\xb3\x1a\xbb\xc48e\x8e\xb1&\xd1\x8a\xe6!\x7f\x8d\xea,qx\xa28\xbf\"\xc7e\x06L\xb06\xeb<$\xd7\xba\xe5\x01\x03\x94r\xab\xd4J\x03s\xaf\xf6A\xbfV\xfa\x1ew\x8d\xbf\x99I\x97\xd8\xd2\xe8\x11\xc4\x04\x00\x84\xd5i\xee\xaf\xae[E\x1f\xdd\xd7#rT+\xb621p\xaf[\x99\" 1\xeb\xc7)\xd2\x1dh\xf2\xd5s\xfd?\fa>\x9f;\xe5r\xe5\xbd\xb0|=\x8eZcPY\xf8\xbd\x13\xaa\x8b\xdf\xbc\x93u\xd5\xb0r\xfb\xde\xe7\xd9k\xe2\xc6\x1b\xf2o@&>\xf2M\xe7\x8c\xeb\xee\xf5\x02~\x85\x14\xf3\xc6v\xf15PE\x8c\xca\x16$\xc2\x01#\xb563\rbq\xbf64\xfaW\x17\xdfa\xe6\xca\x86\xd7\xf8\x81X\x9bg4\xc1\xdam\xcf=Rq6\xb0\xd4D=I\x1a\x0e\xd0\xabz\xe2\x19\x0fM\xad\xdco\xa4\xb2\x8c?\xc1\x10\xf273\xd00\xb3_\xe8\x9a*\xfcL\xea;\xc0\x9a\xdbx!N;\xb5x\t\xa4E\xbe\x93r\x04\xf5\xf0\xf5\x7f\x9a)\xf5\x1b\"\xa1\xd8\x06>\xc9\xe2r\xe9\xbb\xfe\xc0\b\x81\x98\x1c\xe2\xe0?\x8f\xa1\xbel\aN\x83@\xb1\x03)4A\x83\xd6\xcf\xf6\xb5\x82\xb7\x9dA\b$\xa2x\x8a@\xfaj~\xef\x93\xb1/L\x01\xe2\xba|\xf0\x01)PP\xcdl\x06\xfc\x15;qZ\xb1u\xc9\xd0\xd16~JEGm\xe4\x1e@\x9dG\xe4@\xdf\xba\'\x8b\x1cD\xc7\xec\xd1@}tR\xd9P\xf4N\xe3\xd8x\xa0\x91\x17\xc2}\x13\b\xca\t(Z\xa3_\xa1\x90\x15T\xa4\xe7%\x98\xa7\xfb\x8bp/eq\x93\xbf\x1f =|\xf3\xb1\xfcR\xd8\nM,\xcb%@\'\x15\x88\xd8\xad\f\x91|\x95\x8fq+\x98\x81W\xba\x9f\xe0elOt\xbd\by\r\x87\x1c\xba\xbd\x8e+S>\xb8\xe29\x91h^x\xfb`\x00\xdd/\xa6\xb1\x16=\xa1bw\xc5I\xb1\x00'}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}]}]}]}, @ETHTOOL_A_WOL_SOPASS={0x54, 0x3, "0ad7225d1b33d8c8e10c1392b11b01f35f06586f4af942886ae247408206fc612c97b275a5aee61776adc9c344f6b6558cdeba63b6e5430cae4a877655d08075368c73fb1b40f831454791512c1b22df"}]}, 0x704}, 0x1, 0x0, 0x0, 0x4000}, 0x48000) ioctl$AUTOFS_DEV_IOCTL_CLOSEMOUNT(0xffffffffffffffff, 0xc0189375, 0x0) syz_genetlink_get_family_id$ethtool(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_PAUSE_SET(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x3}, 0x4806, 0x0, 0x0, 0x0, 0x0, 0xfffffffc, 0x1010}, 0x0, 0x3, 0xffffffffffffffff, 0x0) r0 = fork() perf_event_open(&(0x7f0000000540)={0x4, 0x80, 0xeb, 0x0, 0x20, 0x0, 0x0, 0x2, 0x2820, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, @perf_config_ext={0xdc, 0x40}, 0x40000, 0x3, 0x8, 0x5, 0x6000000000000, 0x4, 0x5, 0x0, 0x3, 0x0, 0x3}, r0, 0x9, 0xffffffffffffffff, 0x0) sched_rr_get_interval(r0, &(0x7f0000000240)) perf_event_open(&(0x7f00000001c0)={0x2, 0x80, 0x0, 0xff, 0x6, 0x44, 0x0, 0x7, 0x8010, 0x2, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x4, @perf_bp={&(0x7f0000000180), 0x8}, 0x0, 0x3, 0x8ed, 0x5, 0x6, 0x71150132, 0x3, 0x0, 0x5, 0x0, 0x8}, r0, 0x9, 0xffffffffffffffff, 0x2) r1 = memfd_create(&(0x7f0000000400)='B\xdb/\x89\x03l\xdeb\xcb\xb54\xed\xbeLY\xb5Z\xe1\x12S\xf5G\xcc\xf3\xe9\x02h\v\xca(\x96\xe1C\xdf\x1c\xea\x85C\xfb\x10\x13\xfa\x03\x16\xcd\x17\xa2\x80\xa1z\xb4r\x95\xc3@\x9d\xa6\xf1\x92#}g\xd3`\xf7\xcez\xcb\xb3\x1a\xbb\xc48e\x8e\xb1&\xd1\x8a\xe6!\x7f\x8d\xea,qx\xa28\xbf\"\xc7e\x06L\xb06\xeb<$\xd7\xba\xe5\x01\x03\x94r\xab\xd4J\x03s\xaf\xf6A\xbfV\xfa\x1ew\x8d\xbf\x99I\x97\xd8\xd2\xe8\x11\xc4\x04\x00\x84\xd5i\xee\xaf\xae[E\x1f\xdd\xd7#rT+\xb621p\xaf[\x99\" 1\xeb\xc7)\xd2\x1dh\xf2\xd5s\xfd?\fa>\x9f;\xe5r\xe5\xbd\xb0|=\x8eZcPY\xf8\xbd\x13\xaa\x8b\xdf\xbc\x93u\xd5\xb0r\xfb\xde\xe7\xd9k\xe2\xc6\x1b\xf2o@&>\xf2M\xe7\x8c\xeb\xee\xf5\x02~\x85\x14\xf3\xc6v\xf15PE\x8c\xca\x16$\xc2\x01#\xb563\rbq\xbf64\xfaW\x17\xdfa\xe6\xca\x86\xd7\xf8\x81X\x9bg4\xc1\xdam\xcf=Rq6\xb0\xd4D=I\x1a\x0e\xd0\xabz\xe2\x19\x0fM\xad\xdco\xa4\xb2\x8c?\xc1\x10\xf273\xd00\xb3_\xe8\x9a*\xfcL\xea;\xc0\x9a\xdbx!N;\xb5x\t\xa4E\xbe\x93r\x04\xf5\xf0\xf5\x7f\x9a)\xf5\x1b\"\xa1\xd8\x06>\xc9\xe2r\xe9\xbb\xfe\xc0\b\x81\x98\x1c\xe2\xe0?\x8f\xa1\xbel\aN\x83@\xb1\x03)4A\x83\xd6\xcf\xf6\xb5\x82\xb7\x9dA\b$\xa2x\x8a@\xfaj~\xef\x93\xb1/L\x01\xe2\xba|\xf0\x01)PP\xcdl\x06\xfc\x15;qZ\xb1u\xc9\xd0\xd16~JEGm\xe4\x1e@\x9dG\xe4@\xdf\xba\'\x8b\x1cD\xc7\xec\xd1@}tR\xd9P\xf4N\xe3\xd8x\xa0\x91\x17\xc2}\x13\b\xca\t(Z\xa3_\xa1\x90\x15T\xa4\xe7%\x98\xa7\xfb\x8bp/eq\x93\xbf\x1f =|\xf3\xb1\xfcR\xd8\nM,\xcb%@\'\x15\x88\xd8\xad\f\x91|\x95\x8fq+\x98\x81W\xba\x9f\xe0elOt\xbd\by\r\x87\x1c\xba\xbd\x8e+S>\xb8\xe29\x91h^x\xfb`\x00\xdd/\xa6\xb1\x16=\xa1bw\xc5I\xb1\x00'/549, 0x2) fcntl$addseals(r1, 0x409, 0x0) [ 2002.877719] loop5: detected capacity change from 0 to 163840 [ 2002.909563] EXT4-fs (loop5): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 2002.911081] EXT4-fs (loop5): group descriptors corrupted! [ 2002.936233] loop4: detected capacity change from 0 to 256 [ 2002.945306] loop5: detected capacity change from 0 to 163840 06:08:07 executing program 7: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x10004c, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000100000005000000000004000040000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000001000018000000c28500002b02", 0x66, 0x400}, {&(0x7f0000010100)="000000000000000000000000e8f7d2e8feeb4bf889ba053b02420ff8010040", 0x1f, 0x4e0}], 0x0, &(0x7f0000000140)=ANY=[]) [ 2002.977239] EXT4-fs (loop5): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 2002.978560] EXT4-fs (loop5): group descriptors corrupted! [ 2002.992597] FAT-fs (loop4): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) [ 2003.173156] loop7: detected capacity change from 0 to 2048 [ 2003.252815] EXT4-fs (loop7): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 2003.254358] EXT4-fs (loop7): group descriptors corrupted! [ 2003.268599] loop7: detected capacity change from 0 to 2048 [ 2003.284325] EXT4-fs (loop7): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 2003.285876] EXT4-fs (loop7): group descriptors corrupted! 06:08:23 executing program 7: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x100055, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000100000005000000000004000040000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000001000018000000c28500002b02", 0x66, 0x400}, {&(0x7f0000010100)="000000000000000000000000e8f7d2e8feeb4bf889ba053b02420ff8010040", 0x1f, 0x4e0}], 0x0, &(0x7f0000000140)=ANY=[]) 06:08:23 executing program 6: syz_genetlink_get_family_id$ethtool(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_PAUSE_SET(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = memfd_create(&(0x7f0000000400)='B\xdb/\x89\x03l\xdeb\xcb\xb54\xed\xbeLY\xb5Z\xe1\x12S\xf5G\xcc\xf3\xe9\x02h\v\xca(\x96\xe1C\xdf\x1c\xea\x85C\xfb\x10\x13\xfa\x03\x16\xcd\x17\xa2\x80\xa1z\xb4r\x95\xc3@\x9d\xa6\xf1\x92#}g\xd3`\xf7\xcez\xcb\xb3\x1a\xbb\xc48e\x8e\xb1&\xd1\x8a\xe6!\x7f\x8d\xea,qx\xa28\xbf\"\xc7e\x06L\xb06\xeb<$\xd7\xba\xe5\x01\x03\x94r\xab\xd4J\x03s\xaf\xf6A\xbfV\xfa\x1ew\x8d\xbf\x99I\x97\xd8\xd2\xe8\x11\xc4\x04\x00\x84\xd5i\xee\xaf\xae[E\x1f\xdd\xd7#rT+\xb621p\xaf[\x99\" 1\xeb\xc7)\xd2\x1dh\xf2\xd5s\xfd?\fa>\x9f;\xe5r\xe5\xbd\xb0|=\x8eZcPY\xf8\xbd\x13\xaa\x8b\xdf\xbc\x93u\xd5\xb0r\xfb\xde\xe7\xd9k\xe2\xc6\x1b\xf2o@&>\xf2M\xe7\x8c\xeb\xee\xf5\x02~\x85\x14\xf3\xc6v\xf15PE\x8c\xca\x16$\xc2\x01#\xb563\rbq\xbf64\xfaW\x17\xdfa\xe6\xca\x86\xd7\xf8\x81X\x9bg4\xc1\xdam\xcf=Rq6\xb0\xd4D=I\x1a\x0e\xd0\xabz\xe2\x19\x0fM\xad\xdco\xa4\xb2\x8c?\xc1\x10\xf273\xd00\xb3_\xe8\x9a*\xfcL\xea;\xc0\x9a\xdbx!N;\xb5x\t\xa4E\xbe\x93r\x04\xf5\xf0\xf5\x7f\x9a)\xf5\x1b\"\xa1\xd8\x06>\xc9\xe2r\xe9\xbb\xfe\xc0\b\x81\x98\x1c\xe2\xe0?\x8f\xa1\xbel\aN\x83@\xb1\x03)4A\x83\xd6\xcf\xf6\xb5\x82\xb7\x9dA\b$\xa2x\x8a@\xfaj~\xef\x93\xb1/L\x01\xe2\xba|\xf0\x01)PP\xcdl\x06\xfc\x15;qZ\xb1u\xc9\xd0\xd16~JEGm\xe4\x1e@\x9dG\xe4@\xdf\xba\'\x8b\x1cD\xc7\xec\xd1@}tR\xd9P\xf4N\xe3\xd8x\xa0\x91\x17\xc2}\x13\b\xca\t(Z\xa3_\xa1\x90\x15T\xa4\xe7%\x98\xa7\xfb\x8bp/eq\x93\xbf\x1f =|\xf3\xb1\xfcR\xd8\nM,\xcb%@\'\x15\x88\xd8\xad\f\x91|\x95\x8fq+\x98\x81W\xba\x9f\xe0elOt\xbd\by\r\x87\x1c\xba\xbd\x8e+S>\xb8\xe29\x91h^x\xfb`\x00\xdd/\xa6\xb1\x16=\xa1bw\xc5I\xb1\x00'/549, 0x2) fcntl$addseals(r0, 0x409, 0x0) 06:08:23 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8000000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000100000005000000000004000040000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000001000018000000c28500002b02", 0x66, 0x400}, {&(0x7f0000010100)="000000000000000000000000e8f7d2e8feeb4bf889ba053b02420ff8010040", 0x1f, 0x4e0}], 0x0, &(0x7f0000000140)=ANY=[]) 06:08:23 executing program 4: r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000040), 0xffffffffffffffff) syz_genetlink_get_family_id$ethtool(&(0x7f0000000100), 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_PAUSE_SET(0xffffffffffffffff, &(0x7f0000000440)={0x0, 0x0, 0x0}, 0x0) r2 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000080)='smaps\x00') pread64(r2, &(0x7f00000000c0)=""/98, 0x62, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x7fffffff) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(0xffffffffffffffff, 0xc0189374, &(0x7f0000000240)={{0x1, 0x1, 0x18, r0, {0x8}}, './file0\x00'}) dup3(0xffffffffffffffff, r2, 0x0) r3 = socket$inet_icmp_raw(0x2, 0x3, 0x1) syz_genetlink_get_family_id$ethtool(&(0x7f0000000180), r2) socket$nl_audit(0x10, 0x3, 0x9) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000040)={'wlan1\x00', 0x0}) sendmsg$inet(r3, &(0x7f0000000780)={&(0x7f0000000000)={0x2, 0x0, @local}, 0x10, &(0x7f00000003c0)=[{&(0x7f0000000300)="6fb9", 0xffeb}], 0x1, &(0x7f0000000700)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {r4, @remote, @broadcast}}}], 0x20}, 0x0) r5 = socket$inet_icmp_raw(0x2, 0x3, 0x1) socket$nl_audit(0x10, 0x3, 0x9) sendmsg$inet(r5, &(0x7f0000000780)={&(0x7f0000000000)={0x2, 0x0, @local}, 0x10, &(0x7f00000003c0)=[{&(0x7f0000000300)="6fb9", 0xffeb}], 0x1, &(0x7f0000000700)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @remote, @broadcast}}}], 0x20}, 0x0) sendmsg$ETHTOOL_MSG_LINKINFO_GET(r2, &(0x7f0000000200)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f00000001c0)={&(0x7f0000000340)=ANY=[@ANYBLOB='@\x00\x00\x00', @ANYRES16=r1, @ANYBLOB="000427bd7000ffdbdf25020000002c00018008000100", @ANYRES32=0x0, @ANYBLOB='\b\x00C\x00\x00\x00\x00\x00\b\x00!\x00', @ANYRES32=r4, @ANYBLOB="d5b921cac279671a02c4d90ed2cbc802c00000009852d9e901fb17000000000000", @ANYBLOB], 0x40}, 0x1, 0x0, 0x0, 0x4}, 0xd0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000480), 0x1}, 0x603}, 0x0, 0xffffffefffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000040)=[{&(0x7f0000010000)="601c6d6b646f736689254300080120000400004000f8000020004000030000000000000001", 0x25}, {0x0, 0x0, 0x10000}], 0x0, &(0x7f0000000040)=ANY=[]) 06:08:23 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000402000019000000900100000f000000000000000100000005000000000004000040000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000001000018000000c28500002b02", 0x66, 0x400}, {&(0x7f0000010100)="000000000000000000000000e8f7d2e8feeb4bf889ba053b02420ff8010040", 0x1f, 0x4e0}], 0x0, &(0x7f0000000140)=ANY=[]) 06:08:23 executing program 3: r0 = getpid() ioprio_get$pid(0x2, r0) r1 = getpid() ioprio_get$pid(0x2, r1) syz_mount_image$vfat(0x0, &(0x7f0000000040)='./file1\x00', 0x0, 0x0, &(0x7f00000000c0), 0x2002000, &(0x7f0000000400)=ANY=[@ANYRES16, @ANYBLOB="72e1af808ba473e6f37c85b113d8c4d9e1de4ed2968d2e01108c4795a941d14f6927393c8c3c458dd7454900d48719912efc18d580a8f841234284071012d7d5020eb5d56dc1ba5f1048adac4b928bf6cfd663b4cab43637cb979a9199a0246ec02345161783bc79585902603d7062084f05b744e31fcb4c3e81f3becabb7ad1fa5783f5e5e60ae912102fe8df0536bd074c03bd33742f35c5c44b5c3c9d693114367b7d966e"]) chdir(&(0x7f0000000140)='./file0\x00') ptrace$getenv(0x4201, r0, 0xfff, &(0x7f00000000c0)) openat(0xffffffffffffff9c, 0x0, 0x40c2, 0x0) r2 = perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x6, 0x0, 0xe}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r4 = fork() perf_event_open(&(0x7f0000000540)={0x4, 0x80, 0xeb, 0x0, 0x20, 0x0, 0x0, 0x2, 0x2820, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, @perf_config_ext={0xdc, 0x40}, 0x40000, 0x3, 0x8, 0x5, 0x6000000000000, 0x4, 0x5, 0x0, 0x3, 0x0, 0x3}, r4, 0x9, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000340)={0x0, 0x80, 0x2, 0x83, 0x1, 0x7, 0x0, 0x1f, 0x9ec17fc7a3e840c7, 0xc, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x9, 0x4, @perf_bp={&(0x7f0000000240), 0x1}, 0x404, 0x7, 0x3, 0x6, 0x800, 0x9, 0x3, 0x0, 0x7ff, 0x0, 0x9}, r4, 0x8, r2, 0x9) fork() setxattr$trusted_overlay_upper(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180), &(0x7f00000001c0)={0x0, 0xfb, 0x7a, 0x0, 0x2, "d54449275cb08faf62df87518e3ce16f", "9a61b461b0c63151b954990036d5e0163ceb48c6a801bb019e9e6fa7196a9372f804b9e9ca3fb3d85d1985d31346bbd5fd02b1c8223bf6388eb75498623e38ff88a99c5ce38698a32306b7d4e4b0fd4b03bfa568df17a42f725c6c33046b38b6e4a713dde1"}, 0x7a, 0x3) socket$nl_audit(0x10, 0x3, 0x9) chroot(&(0x7f0000000080)='./file1\x00') sendmsg$inet(r3, &(0x7f0000000780)={&(0x7f0000000000)={0x2, 0x0, @local}, 0x10, &(0x7f00000003c0)=[{&(0x7f0000000300)="6fb9", 0xffeb}], 0x1, &(0x7f0000000700)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @remote, @broadcast}}}], 0x20}, 0x0) 06:08:23 executing program 0: syncfs(0xffffffffffffffff) sendmsg$NL80211_CMD_DEL_TX_TS(0xffffffffffffffff, 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_SETPIPEFD(0xffffffffffffffff, 0xc0189378, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = getpgrp(0xffffffffffffffff) perf_event_open(&(0x7f00000017c0)={0x2, 0x80, 0x3f, 0x3, 0xff, 0xff, 0x0, 0x7, 0x1000, 0x2, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x20, 0x0, @perf_config_ext={0x7f, 0x2}, 0x46024, 0x100, 0xfffffefc, 0x9, 0xbd, 0x9, 0x6, 0x0, 0x2, 0x0, 0x7fff}, r0, 0x6, 0xffffffffffffffff, 0x8) r1 = memfd_create(&(0x7f0000000400)='B\xdb/\x89\x03l\xdeb\xcb\xb54\xed\xbeLY\xb5Z\xe1\x12S\xf5G\xcc\xf3\xe9\x02h\v\xca(\x96\xe1C\xdf\x1c\xea\x85C\xfb\x10\x13\xfa\x03\x16\xcd\x17\xa2\x80\xa1z\xb4r\x95\xc3@\x9d\xa6\xf1\x92#}g\xd3`\xf7\xcez\xcb\xb3\x1a\xbb\xc48e\x8e\xb1&\xd1\x8a\xe6!\x7f\x8d\xea,qx\xa28\xbf\"\xc7e\x06L\xb06\xeb<$\xd7\xba\xe5\x01\x03\x94r\xab\xd4J\x03s\xaf\xf6A\xbfV\xfa\x1ew\x8d\xbf\x99I\x97\xd8\xd2\xe8\x11\xc4\x04\x00\x84\xd5i\xee\xaf\xae[E\x1f\xdd\xd7#rT+\xb621p\xaf[\x99\" 1\xeb\xc7)\xd2\x1dh\xf2\xd5s\xfd?\fa>\x9f;\xe5r\xe5\xbd\xb0|=\x8eZcPY\xf8\xbd\x13\xaa\x8b\xdf\xbc\x93u\xd5\xb0r\xfb\xde\xe7\xd9k\xe2\xc6\x1b\xf2o@&>\xf2M\xe7\x8c\xeb\xee\xf5\x02~\x85\x14\xf3\xc6v\xf15PE\x8c\xca\x16$\xc2\x01#\xb563\rbq\xbf64\xfaW\x17\xdfa\xe6\xca\x86\xd7\xf8\x81X\x9bg4\xc1\xdam\xcf=Rq6\xb0\xd4D=I\x1a\x0e\xd0\xabz\xe2\x19\x0fM\xad\xdco\xa4\xb2\x8c?\xc1\x10\xf273\xd00\xb3_\xe8\x9a*\xfcL\xea;\xc0\x9a\xdbx!N;\xb5x\t\xa4E\xbe\x93r\x04\xf5\xf0\xf5\x7f\x9a)\xf5\x1b\"\xa1\xd8\x06>\xc9\xe2r\xe9\xbb\xfe\xc0\b\x81\x98\x1c\xe2\xe0?\x8f\xa1\xbel\aN\x83@\xb1\x03)4A\x83\xd6\xcf\xf6\xb5\x82\xb7\x9dA\b$\xa2x\x8a@\xfaj~\xef\x93\xb1/L\x01\xe2\xba|\xf0\x01)PP\xcdl\x06\xfc\x15;qZ\xb1u\xc9\xd0\xd16~JEGm\xe4\x1e@\x9dG\xe4@\xdf\xba\'\x8b\x1cD\xc7\xec\xd1@}tR\xd9P\xf4N\xe3\xd8x\xa0\x91\x17\xc2}\x13\b\xca\t(Z\xa3_\xa1\x90\x15T\xa4\xe7%\x98\xa7\xfb\x8bp/eq\x93\xbf\x1f =|\xf3\xb1\xfcR\xd8\nM,\xcb%@\'\x15\x88\xd8\xad\f\x91|\x95\x8fq+\x98\x81W\xba\x9f\xe0elOt\xbd\by\r\x87\x1c\xba\xbd\x8e+S>\xb8\xe29\x91h^x\xfb`\x00\xdd/\xa6\xb1\x16=\xa1bw\xc5I\xb1\x00'/549, 0x2) fcntl$addseals(r1, 0x409, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000002780)={0xffffffffffffffff, 0xffffffffffffffff}) getsockopt$sock_buf(r2, 0x1, 0x3b, 0x0, &(0x7f0000000100)) pwritev(r2, &(0x7f0000001740)=[{&(0x7f0000000000)="9ea30d2fb977b607076d8f21f0dcef938a3f", 0x12}, {&(0x7f0000000040)="d8924f86e42594b7952bfdade40340d60cfa2e19cbc2e4fe4794e7ba3909f2bf745fda5a82958077b118e12598c89be8363364455f8c557d0eb07d223a", 0x3d}, {&(0x7f0000000640)="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", 0x1000}, {&(0x7f0000000080)="df2aca4242701b4dc8a4be8869a9f7822a327a11917676e254c41d79c024cb559d0c27db073bd4d066922699a6310b3dc5366cfaf485f93e71aa0fb54dc7a1d4a39d769882629c5c295a788e2ec146e7583de1cbf4b724a085410c1353e16d12d3ae43b9ebfd546a781710b81bdd75349fee43a02e418f04307e9e3c7bc2f8dee21496520603", 0x86}, {&(0x7f0000000140)="7fe3c769ac7b0640e9a40419c67f4c65e1c99777568f5ac5e82a18b177c2bb1aae5c7dc2ce7afb62ec0b9f6a21d515bdd7f113aba8f0374163879ea48a7bacaf153038edc54e8d12c2f3d512f319d79563817f376da8ffda6c2aaecbf299f169090e1428e48acb80dccd873faebefcb3b5c8c47a3760dbd5aa6b673a134f84c420a3a28a45fd00a5edf588d8e63af0eee8f8b12764f0d0a6b3975cc11d6f5ef284fbe32762b2ce13d96972584af778c1331451b370e4c7d7584adc8bdbef8b5634a00c5423601ab5d23b4305aa912a08a2e1371a2914eb19", 0xd8}, {&(0x7f0000000240)="c27662fc741231f198", 0x9}, {&(0x7f0000000300)="ec501a8b4fcc6d61fcaa832cfb2953068a05784413a3bcabd95a7ac10a3a884a00b88077cbd94fdd11dbe92dd4c8d78d7ac676d812c989a78599454851f6127d4819cbc5c21edfd8308821c6996629a05d5046a7828fe3dedfbdb0d674da6c49904483c2d84802935e5ae75ac1e94da66cde19f1710795d7e6cd0f8eca2fb0f8513be5f96570246cb6c6adccb98a676a34da5ebcb3294720ee53accbfdcf36b2ef1e2b9b274c8b252dac5e1895adc0736f0d29606cad7802996186184f130ce2e8b071d9f7c31d2396721d306622c4593a24babba1db95b3eac4b59b1459e0f9c25ed3", 0xe3}, {&(0x7f0000001640)="39dea30ec0323b5aaa404580157eb420f75acfc62a4be012ab3f1e9457e67f3859b7c0918bf21664f27ff0142c21c7249dd3f42344295e0667193df6006dca0de22d55e910c888ac0f2be7765102d9673678388a6a17ef1bb030ca5b916a8f376a0fe892ac9929bf09e62c8cd3b6c3178958f040413da30e9bc98ea0f075e91293145c7efa2b986db84e5d269789c51aa3db13422151063df08d9010e333b8f053fbb9b06587e55a8a76e17b539670282c3e1b12436f9a3486c957407ac9dd893f05f7e0665873ed06781576bccf25a3f83a3a5de54cdee43bd33662e23c5486850d661ae1bd85f713e74e125f3d", 0xee}], 0x8, 0x57d, 0x6) 06:08:23 executing program 1: pipe(&(0x7f0000000340)={0xffffffffffffffff}) pread64(r0, &(0x7f0000000440)=""/95, 0x5f, 0x6) execveat(r0, &(0x7f0000000080)='./file0\x00', &(0x7f00000001c0)=[&(0x7f00000000c0)='\x00', &(0x7f0000000180)='\x00'], &(0x7f0000000400)=[&(0x7f0000000200)='/dev/zero\x00', &(0x7f0000000240)='/dev/zero\x00', &(0x7f0000000300)='/dev/zero\x00'], 0x1000) socket$inet(0x2, 0x1, 0x0) perf_event_open(&(0x7f0000000100)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x22420, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ptrace$setopts(0x4200, 0x0, 0x5, 0x100050) perf_event_open(&(0x7f0000000280)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000004c00)={0xc0002100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) gettid() r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000), 0x380, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000000)='net/udp6\x00') read$hiddev(r2, &(0x7f0000001140)=""/212, 0xd4) fchmodat(r2, &(0x7f00000004c0)='./file0\x00', 0x0) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(r1, 0xc018937c, &(0x7f0000000380)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32=r0, @ANYBLOB="00000000000000002e2f66696cee8816"]) ioctl$TIOCSSOFTCAR(r3, 0x541a, &(0x7f00000003c0)=0x6) waitid$P_PIDFD(0x3, r1, &(0x7f0000000500), 0x2, &(0x7f0000000580)) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(r1, 0xc0189372, &(0x7f0000000040)={{0x1, 0x1, 0x18, r2, {0xffff}}, './file0\x00'}) [ 2019.180032] loop7: detected capacity change from 0 to 2048 [ 2019.194163] EXT4-fs (loop7): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 2019.195131] EXT4-fs (loop7): group descriptors corrupted! 06:08:23 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000502000019000000900100000f000000000000000100000005000000000004000040000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000001000018000000c28500002b02", 0x66, 0x400}, {&(0x7f0000010100)="000000000000000000000000e8f7d2e8feeb4bf889ba053b02420ff8010040", 0x1f, 0x4e0}], 0x0, &(0x7f0000000140)=ANY=[]) [ 2019.223494] loop7: detected capacity change from 0 to 2048 [ 2019.233864] EXT4-fs (loop7): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 2019.234556] EXT4-fs (loop7): group descriptors corrupted! [ 2019.236884] loop5: detected capacity change from 0 to 262144 [ 2019.272824] EXT4-fs (loop5): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 2019.273546] EXT4-fs (loop5): group descriptors corrupted! [ 2019.288115] loop4: detected capacity change from 0 to 256 [ 2019.291254] loop5: detected capacity change from 0 to 262144 [ 2019.310907] EXT4-fs (loop5): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 2019.311725] EXT4-fs (loop5): group descriptors corrupted! 06:08:23 executing program 7: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x100060, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000100000005000000000004000040000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000001000018000000c28500002b02", 0x66, 0x400}, {&(0x7f0000010100)="000000000000000000000000e8f7d2e8feeb4bf889ba053b02420ff8010040", 0x1f, 0x4e0}], 0x0, &(0x7f0000000140)=ANY=[]) [ 2019.347305] FAT-fs (loop4): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) 06:08:23 executing program 6: ioctl$AUTOFS_DEV_IOCTL_CLOSEMOUNT(0xffffffffffffffff, 0xc0189375, 0x0) syz_genetlink_get_family_id$ethtool(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_PAUSE_SET(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = memfd_create(&(0x7f0000000400)='B\xdb/\x89\x03l\xdeb\xcb\xb54\xed\xbeLY\xb5Z\xe1\x12S\xf5G\xcc\xf3\xe9\x02h\v\xca(\x96\xe1C\xdf\x1c\xea\x85C\xfb\x10\x13\xfa\x03\x16\xcd\x17\xa2\x80\xa1z\xb4r\x95\xc3@\x9d\xa6\xf1\x92#}g\xd3`\xf7\xcez\xcb\xb3\x1a\xbb\xc48e\x8e\xb1&\xd1\x8a\xe6!\x7f\x8d\xea,qx\xa28\xbf\"\xc7e\x06L\xb06\xeb<$\xd7\xba\xe5\x01\x03\x94r\xab\xd4J\x03s\xaf\xf6A\xbfV\xfa\x1ew\x8d\xbf\x99I\x97\xd8\xd2\xe8\x11\xc4\x04\x00\x84\xd5i\xee\xaf\xae[E\x1f\xdd\xd7#rT+\xb621p\xaf[\x99\" 1\xeb\xc7)\xd2\x1dh\xf2\xd5s\xfd?\fa>\x9f;\xe5r\xe5\xbd\xb0|=\x8eZcPY\xf8\xbd\x13\xaa\x8b\xdf\xbc\x93u\xd5\xb0r\xfb\xde\xe7\xd9k\xe2\xc6\x1b\xf2o@&>\xf2M\xe7\x8c\xeb\xee\xf5\x02~\x85\x14\xf3\xc6v\xf15PE\x8c\xca\x16$\xc2\x01#\xb563\rbq\xbf64\xfaW\x17\xdfa\xe6\xca\x86\xd7\xf8\x81X\x9bg4\xc1\xdam\xcf=Rq6\xb0\xd4D=I\x1a\x0e\xd0\xabz\xe2\x19\x0fM\xad\xdco\xa4\xb2\x8c?\xc1\x10\xf273\xd00\xb3_\xe8\x9a*\xfcL\xea;\xc0\x9a\xdbx!N;\xb5x\t\xa4E\xbe\x93r\x04\xf5\xf0\xf5\x7f\x9a)\xf5\x1b\"\xa1\xd8\x06>\xc9\xe2r\xe9\xbb\xfe\xc0\b\x81\x98\x1c\xe2\xe0?\x8f\xa1\xbel\aN\x83@\xb1\x03)4A\x83\xd6\xcf\xf6\xb5\x82\xb7\x9dA\b$\xa2x\x8a@\xfaj~\xef\x93\xb1/L\x01\xe2\xba|\xf0\x01)PP\xcdl\x06\xfc\x15;qZ\xb1u\xc9\xd0\xd16~JEGm\xe4\x1e@\x9dG\xe4@\xdf\xba\'\x8b\x1cD\xc7\xec\xd1@}tR\xd9P\xf4N\xe3\xd8x\xa0\x91\x17\xc2}\x13\b\xca\t(Z\xa3_\xa1\x90\x15T\xa4\xe7%\x98\xa7\xfb\x8bp/eq\x93\xbf\x1f =|\xf3\xb1\xfcR\xd8\nM,\xcb%@\'\x15\x88\xd8\xad\f\x91|\x95\x8fq+\x98\x81W\xba\x9f\xe0elOt\xbd\by\r\x87\x1c\xba\xbd\x8e+S>\xb8\xe29\x91h^x\xfb`\x00\xdd/\xa6\xb1\x16=\xa1bw\xc5I\xb1\x00'/549, 0x2) fcntl$addseals(r0, 0x409, 0x0) socket$nl_generic(0x10, 0x3, 0x10) 06:08:23 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xb000000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000100000005000000000004000040000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000001000018000000c28500002b02", 0x66, 0x400}, {&(0x7f0000010100)="000000000000000000000000e8f7d2e8feeb4bf889ba053b02420ff8010040", 0x1f, 0x4e0}], 0x0, &(0x7f0000000140)=ANY=[]) [ 2019.385940] loop7: detected capacity change from 0 to 2048 [ 2019.395934] EXT4-fs (loop7): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 2019.396831] EXT4-fs (loop7): group descriptors corrupted! [ 2019.407275] loop7: detected capacity change from 0 to 2048 [ 2019.413636] EXT4-fs (loop7): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 2019.414348] EXT4-fs (loop7): group descriptors corrupted! 06:08:23 executing program 3: r0 = getpid() ioprio_get$pid(0x2, r0) r1 = getpid() ioprio_get$pid(0x2, r1) syz_mount_image$vfat(0x0, &(0x7f0000000040)='./file1\x00', 0x0, 0x0, &(0x7f00000000c0), 0x2002000, &(0x7f0000000400)=ANY=[@ANYRES16, @ANYBLOB="72e1af808ba473e6f37c85b113d8c4d9e1de4ed2968d2e01108c4795a941d14f6927393c8c3c458dd7454900d48719912efc18d580a8f841234284071012d7d5020eb5d56dc1ba5f1048adac4b928bf6cfd663b4cab43637cb979a9199a0246ec02345161783bc79585902603d7062084f05b744e31fcb4c3e81f3becabb7ad1fa5783f5e5e60ae912102fe8df0536bd074c03bd33742f35c5c44b5c3c9d693114367b7d966e"]) chdir(&(0x7f0000000140)='./file0\x00') ptrace$getenv(0x4201, r0, 0xfff, &(0x7f00000000c0)) openat(0xffffffffffffff9c, 0x0, 0x40c2, 0x0) r2 = perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x6, 0x0, 0xe}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r4 = fork() perf_event_open(&(0x7f0000000540)={0x4, 0x80, 0xeb, 0x0, 0x20, 0x0, 0x0, 0x2, 0x2820, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, @perf_config_ext={0xdc, 0x40}, 0x40000, 0x3, 0x8, 0x5, 0x6000000000000, 0x4, 0x5, 0x0, 0x3, 0x0, 0x3}, r4, 0x9, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000340)={0x0, 0x80, 0x2, 0x83, 0x1, 0x7, 0x0, 0x1f, 0x9ec17fc7a3e840c7, 0xc, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x9, 0x4, @perf_bp={&(0x7f0000000240), 0x1}, 0x404, 0x7, 0x3, 0x6, 0x800, 0x9, 0x3, 0x0, 0x7ff, 0x0, 0x9}, r4, 0x8, r2, 0x9) fork() setxattr$trusted_overlay_upper(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180), &(0x7f00000001c0)={0x0, 0xfb, 0x7a, 0x0, 0x2, "d54449275cb08faf62df87518e3ce16f", "9a61b461b0c63151b954990036d5e0163ceb48c6a801bb019e9e6fa7196a9372f804b9e9ca3fb3d85d1985d31346bbd5fd02b1c8223bf6388eb75498623e38ff88a99c5ce38698a32306b7d4e4b0fd4b03bfa568df17a42f725c6c33046b38b6e4a713dde1"}, 0x7a, 0x3) socket$nl_audit(0x10, 0x3, 0x9) chroot(&(0x7f0000000080)='./file1\x00') sendmsg$inet(r3, &(0x7f0000000780)={&(0x7f0000000000)={0x2, 0x0, @local}, 0x10, &(0x7f00000003c0)=[{&(0x7f0000000300)="6fb9", 0xffeb}], 0x1, &(0x7f0000000700)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @remote, @broadcast}}}], 0x20}, 0x0) 06:08:23 executing program 7: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x100068, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000100000005000000000004000040000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000001000018000000c28500002b02", 0x66, 0x400}, {&(0x7f0000010100)="000000000000000000000000e8f7d2e8feeb4bf889ba053b02420ff8010040", 0x1f, 0x4e0}], 0x0, &(0x7f0000000140)=ANY=[]) 06:08:23 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000602000019000000900100000f000000000000000100000005000000000004000040000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000001000018000000c28500002b02", 0x66, 0x400}, {&(0x7f0000010100)="000000000000000000000000e8f7d2e8feeb4bf889ba053b02420ff8010040", 0x1f, 0x4e0}], 0x0, &(0x7f0000000140)=ANY=[]) 06:08:23 executing program 1: pipe(&(0x7f0000000340)={0xffffffffffffffff}) pread64(r0, &(0x7f0000000440)=""/95, 0x5f, 0x6) execveat(r0, &(0x7f0000000080)='./file0\x00', &(0x7f00000001c0)=[&(0x7f00000000c0)='\x00', &(0x7f0000000180)='\x00'], &(0x7f0000000400)=[&(0x7f0000000200)='/dev/zero\x00', &(0x7f0000000240)='/dev/zero\x00', &(0x7f0000000300)='/dev/zero\x00'], 0x1000) socket$inet(0x2, 0x1, 0x0) perf_event_open(&(0x7f0000000100)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x22420, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ptrace$setopts(0x4200, 0x0, 0x5, 0x100050) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000004c00)={0xc0002100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) gettid() r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000), 0x380, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000000)='net/udp6\x00') read$hiddev(r2, &(0x7f0000001140)=""/212, 0xd4) fchmodat(r2, &(0x7f00000004c0)='./file0\x00', 0x0) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(r1, 0xc018937c, &(0x7f0000000380)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32=r0, @ANYBLOB="00000000000000002e2f66696cee8816"]) ioctl$TIOCSSOFTCAR(r3, 0x541a, &(0x7f00000003c0)=0x6) waitid$P_PIDFD(0x3, r1, &(0x7f0000000500), 0x2, &(0x7f0000000580)) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(r1, 0xc0189372, &(0x7f0000000040)={{0x1, 0x1, 0x18, r2, {0xffff}}, './file0\x00'}) 06:08:23 executing program 4: r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000040), 0xffffffffffffffff) syz_genetlink_get_family_id$ethtool(&(0x7f0000000100), 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_PAUSE_SET(0xffffffffffffffff, &(0x7f0000000440)={0x0, 0x0, 0x0}, 0x0) r2 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000080)='smaps\x00') pread64(r2, &(0x7f00000000c0)=""/98, 0x62, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x7fffffff) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(0xffffffffffffffff, 0xc0189374, &(0x7f0000000240)={{0x1, 0x1, 0x18, r0, {0x8}}, './file0\x00'}) dup3(0xffffffffffffffff, r2, 0x0) r3 = socket$inet_icmp_raw(0x2, 0x3, 0x1) syz_genetlink_get_family_id$ethtool(&(0x7f0000000180), r2) socket$nl_audit(0x10, 0x3, 0x9) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000040)={'wlan1\x00', 0x0}) sendmsg$inet(r3, &(0x7f0000000780)={&(0x7f0000000000)={0x2, 0x0, @local}, 0x10, &(0x7f00000003c0)=[{&(0x7f0000000300)="6fb9", 0xffeb}], 0x1, &(0x7f0000000700)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {r4, @remote, @broadcast}}}], 0x20}, 0x0) r5 = socket$inet_icmp_raw(0x2, 0x3, 0x1) socket$nl_audit(0x10, 0x3, 0x9) sendmsg$inet(r5, &(0x7f0000000780)={&(0x7f0000000000)={0x2, 0x0, @local}, 0x10, &(0x7f00000003c0)=[{&(0x7f0000000300)="6fb9", 0xffeb}], 0x1, &(0x7f0000000700)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @remote, @broadcast}}}], 0x20}, 0x0) sendmsg$ETHTOOL_MSG_LINKINFO_GET(r2, &(0x7f0000000200)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f00000001c0)={&(0x7f0000000340)=ANY=[@ANYBLOB='@\x00\x00\x00', @ANYRES16=r1, @ANYBLOB="000427bd7000ffdbdf25020000002c00018008000100", @ANYRES32=0x0, @ANYBLOB='\b\x00C\x00\x00\x00\x00\x00\b\x00!\x00', @ANYRES32=r4, @ANYBLOB="d5b921cac279671a02c4d90ed2cbc802c00000009852d9e901fb17000000000000", @ANYBLOB], 0x40}, 0x1, 0x0, 0x0, 0x4}, 0xd0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000480), 0x1}, 0x603}, 0x0, 0xffffffefffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000040)=[{&(0x7f0000010000)="601c6d6b646f736689254300080120000400004000f8000020004000030000000000000001", 0x25}, {0x0, 0x0, 0x10000}], 0x0, &(0x7f0000000040)=ANY=[]) [ 2019.560298] loop5: detected capacity change from 0 to 264192 [ 2019.562735] loop7: detected capacity change from 0 to 2048 [ 2019.584353] EXT4-fs (loop5): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 2019.585762] EXT4-fs (loop5): group descriptors corrupted! [ 2019.604948] EXT4-fs (loop7): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 2019.606259] EXT4-fs (loop7): group descriptors corrupted! [ 2019.613723] loop5: detected capacity change from 0 to 264192 06:08:23 executing program 6: ioctl$AUTOFS_DEV_IOCTL_CLOSEMOUNT(0xffffffffffffffff, 0xc0189375, 0x0) syz_genetlink_get_family_id$ethtool(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_PAUSE_SET(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = memfd_create(&(0x7f0000000400)='B\xdb/\x89\x03l\xdeb\xcb\xb54\xed\xbeLY\xb5Z\xe1\x12S\xf5G\xcc\xf3\xe9\x02h\v\xca(\x96\xe1C\xdf\x1c\xea\x85C\xfb\x10\x13\xfa\x03\x16\xcd\x17\xa2\x80\xa1z\xb4r\x95\xc3@\x9d\xa6\xf1\x92#}g\xd3`\xf7\xcez\xcb\xb3\x1a\xbb\xc48e\x8e\xb1&\xd1\x8a\xe6!\x7f\x8d\xea,qx\xa28\xbf\"\xc7e\x06L\xb06\xeb<$\xd7\xba\xe5\x01\x03\x94r\xab\xd4J\x03s\xaf\xf6A\xbfV\xfa\x1ew\x8d\xbf\x99I\x97\xd8\xd2\xe8\x11\xc4\x04\x00\x84\xd5i\xee\xaf\xae[E\x1f\xdd\xd7#rT+\xb621p\xaf[\x99\" 1\xeb\xc7)\xd2\x1dh\xf2\xd5s\xfd?\fa>\x9f;\xe5r\xe5\xbd\xb0|=\x8eZcPY\xf8\xbd\x13\xaa\x8b\xdf\xbc\x93u\xd5\xb0r\xfb\xde\xe7\xd9k\xe2\xc6\x1b\xf2o@&>\xf2M\xe7\x8c\xeb\xee\xf5\x02~\x85\x14\xf3\xc6v\xf15PE\x8c\xca\x16$\xc2\x01#\xb563\rbq\xbf64\xfaW\x17\xdfa\xe6\xca\x86\xd7\xf8\x81X\x9bg4\xc1\xdam\xcf=Rq6\xb0\xd4D=I\x1a\x0e\xd0\xabz\xe2\x19\x0fM\xad\xdco\xa4\xb2\x8c?\xc1\x10\xf273\xd00\xb3_\xe8\x9a*\xfcL\xea;\xc0\x9a\xdbx!N;\xb5x\t\xa4E\xbe\x93r\x04\xf5\xf0\xf5\x7f\x9a)\xf5\x1b\"\xa1\xd8\x06>\xc9\xe2r\xe9\xbb\xfe\xc0\b\x81\x98\x1c\xe2\xe0?\x8f\xa1\xbel\aN\x83@\xb1\x03)4A\x83\xd6\xcf\xf6\xb5\x82\xb7\x9dA\b$\xa2x\x8a@\xfaj~\xef\x93\xb1/L\x01\xe2\xba|\xf0\x01)PP\xcdl\x06\xfc\x15;qZ\xb1u\xc9\xd0\xd16~JEGm\xe4\x1e@\x9dG\xe4@\xdf\xba\'\x8b\x1cD\xc7\xec\xd1@}tR\xd9P\xf4N\xe3\xd8x\xa0\x91\x17\xc2}\x13\b\xca\t(Z\xa3_\xa1\x90\x15T\xa4\xe7%\x98\xa7\xfb\x8bp/eq\x93\xbf\x1f =|\xf3\xb1\xfcR\xd8\nM,\xcb%@\'\x15\x88\xd8\xad\f\x91|\x95\x8fq+\x98\x81W\xba\x9f\xe0elOt\xbd\by\r\x87\x1c\xba\xbd\x8e+S>\xb8\xe29\x91h^x\xfb`\x00\xdd/\xa6\xb1\x16=\xa1bw\xc5I\xb1\x00'/549, 0x3) fcntl$addseals(r0, 0x409, 0x0) [ 2019.633990] loop4: detected capacity change from 0 to 256 [ 2019.646538] EXT4-fs (loop5): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 2019.648324] EXT4-fs (loop5): group descriptors corrupted! [ 2019.655138] FAT-fs (loop4): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) 06:08:24 executing program 0: syncfs(0xffffffffffffffff) sendmsg$NL80211_CMD_DEL_TX_TS(0xffffffffffffffff, 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_SETPIPEFD(0xffffffffffffffff, 0xc0189378, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = memfd_create(&(0x7f0000000400)='B\xdb/\x89\x03l\xdeb\xcb\xb54\xed\xbeLY\xb5Z\xe1\x12S\xf5G\xcc\xf3\xe9\x02h\v\xca(\x96\xe1C\xdf\x1c\xea\x85C\xfb\x10\x13\xfa\x03\x16\xcd\x17\xa2\x80\xa1z\xb4r\x95\xc3@\x9d\xa6\xf1\x92#}g\xd3`\xf7\xcez\xcb\xb3\x1a\xbb\xc48e\x8e\xb1&\xd1\x8a\xe6!\x7f\x8d\xea,qx\xa28\xbf\"\xc7e\x06L\xb06\xeb<$\xd7\xba\xe5\x01\x03\x94r\xab\xd4J\x03s\xaf\xf6A\xbfV\xfa\x1ew\x8d\xbf\x99I\x97\xd8\xd2\xe8\x11\xc4\x04\x00\x84\xd5i\xee\xaf\xae[E\x1f\xdd\xd7#rT+\xb621p\xaf[\x99\" 1\xeb\xc7)\xd2\x1dh\xf2\xd5s\xfd?\fa>\x9f;\xe5r\xe5\xbd\xb0|=\x8eZcPY\xf8\xbd\x13\xaa\x8b\xdf\xbc\x93u\xd5\xb0r\xfb\xde\xe7\xd9k\xe2\xc6\x1b\xf2o@&>\xf2M\xe7\x8c\xeb\xee\xf5\x02~\x85\x14\xf3\xc6v\xf15PE\x8c\xca\x16$\xc2\x01#\xb563\rbq\xbf64\xfaW\x17\xdfa\xe6\xca\x86\xd7\xf8\x81X\x9bg4\xc1\xdam\xcf=Rq6\xb0\xd4D=I\x1a\x0e\xd0\xabz\xe2\x19\x0fM\xad\xdco\xa4\xb2\x8c?\xc1\x10\xf273\xd00\xb3_\xe8\x9a*\xfcL\xea;\xc0\x9a\xdbx!N;\xb5x\t\xa4E\xbe\x93r\x04\xf5\xf0\xf5\x7f\x9a)\xf5\x1b\"\xa1\xd8\x06>\xc9\xe2r\xe9\xbb\xfe\xc0\b\x81\x98\x1c\xe2\xe0?\x8f\xa1\xbel\aN\x83@\xb1\x03)4A\x83\xd6\xcf\xf6\xb5\x82\xb7\x9dA\b$\xa2x\x8a@\xfaj~\xef\x93\xb1/L\x01\xe2\xba|\xf0\x01)PP\xcdl\x06\xfc\x15;qZ\xb1u\xc9\xd0\xd16~JEGm\xe4\x1e@\x9dG\xe4@\xdf\xba\'\x8b\x1cD\xc7\xec\xd1@}tR\xd9P\xf4N\xe3\xd8x\xa0\x91\x17\xc2}\x13\b\xca\t(Z\xa3_\xa1\x90\x15T\xa4\xe7%\x98\xa7\xfb\x8bp/eq\x93\xbf\x1f =|\xf3\xb1\xfcR\xd8\nM,\xcb%@\'\x15\x88\xd8\xad\f\x91|\x95\x8fq+\x98\x81W\xba\x9f\xe0elOt\xbd\by\r\x87\x1c\xba\xbd\x8e+S>\xb8\xe29\x91h^x\xfb`\x00\xdd/\xa6\xb1\x16=\xa1bw\xc5I\xb1\x00'/549, 0x2) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000002780)={0xffffffffffffffff, 0xffffffffffffffff}) getsockopt$sock_buf(r1, 0x1, 0x3b, 0x0, &(0x7f0000000100)) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000002780)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$NL80211_CMD_SET_TX_BITRATE_MASK(0xffffffffffffffff, &(0x7f0000000140)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x10}, 0xc, &(0x7f00000000c0)={&(0x7f0000000640)={0x143c, 0x0, 0x310, 0x70bd28, 0x25dfdbfb, {{}, {@void, @val={0xc, 0x99, {0x3ff, 0x25}}}}, [@NL80211_ATTR_TX_RATES={0x184, 0x5a, 0x0, 0x1, [@NL80211_BAND_2GHZ={0x88, 0x0, 0x0, 0x1, [@NL80211_TXRATE_GI={0x5}, @NL80211_TXRATE_VHT={0x14, 0x3, {[0x6, 0x4, 0x40, 0x9, 0xff, 0x400, 0x3, 0x1]}}, @NL80211_TXRATE_GI={0x5}, @NL80211_TXRATE_HT={0x17, 0x2, [{0x7, 0x1}, {0x6, 0x5}, {0x6, 0x5}, {0x5, 0x2}, {0x2, 0x8}, {0x6, 0xa}, {0x0, 0x2}, {0x7, 0x2}, {0x6, 0x5}, {0x3, 0x9}, {0x0, 0xa}, {0x1, 0xa}, {0x1, 0x1}, {0x2, 0x8}, {0x7, 0x1}, {0x2, 0x4}, {0x6, 0x5}, {0x6, 0x6}, {0x6, 0x3}]}, @NL80211_TXRATE_HT={0x41, 0x2, [{0x4, 0x7}, {0x2, 0x9}, {0x2, 0x3}, {0x3, 0x2}, {0x0, 0x4}, {0x0, 0x4}, {0x3, 0x9}, {0x3, 0x1}, {0x4, 0x7}, {0x0, 0x6}, {0x0, 0x7}, {0x4, 0x1}, {0x0, 0x2}, {}, {0x3, 0x7}, {0x0, 0x6}, {0x3, 0xa}, {0x2, 0x9}, {0x3, 0x5}, {0x1, 0x3}, {0x2, 0x6}, {0x6, 0x4}, {0x5, 0x8}, {0x5}, {0x6, 0x5}, {0x4, 0x8}, {0x1}, {0x3, 0x1}, {0x4, 0x4}, {0x1, 0x5}, {0x6}, {0x1, 0x2}, {0x1, 0x1}, {0x4, 0x4}, {0x6, 0x5}, {0x0, 0x5}, {0x6}, {}, {0x0, 0x1}, {0x1, 0x2}, {0x3, 0x2}, {0x7, 0x4}, {}, {0x3, 0x8}, {0x7}, {0x6, 0x7}, {0x0, 0xa}, {0x2}, {0x2, 0x6}, {0x6, 0x8}, {0x3}, {0x0, 0x9}, {0x5, 0x7}, {0x2, 0x8}, {0x0, 0xa}, {0x4, 0x5}, {0x3, 0x5}, {}, {0x0, 0x8}, {0x0, 0x6}, {0x1, 0x2}]}, @NL80211_TXRATE_HT={0x4}]}, @NL80211_BAND_5GHZ={0x54, 0x1, 0x0, 0x1, [@NL80211_TXRATE_LEGACY={0xb, 0x1, [0x12, 0x5, 0x1b, 0x30, 0x5, 0x2, 0xb]}, @NL80211_TXRATE_HT={0x44, 0x2, [{0x7, 0x6}, {0x6, 0xa}, {0x6, 0x3}, {0x0, 0x5}, {0x5, 0x1}, {0x5, 0x5}, {0x5, 0x5}, {0x2, 0x6}, {0x7, 0x6}, {0x3, 0x3}, {0x7, 0x6}, {0x1}, {0x5, 0x6}, {0x6, 0x6}, {0x3, 0x3}, {0x7}, {0x1, 0x8}, {0x3, 0x2}, {0x7, 0x6}, {0x3, 0x6}, {0x4, 0x6}, {0x6, 0x8}, {0x1, 0x7}, {0x0, 0x5}, {0x5, 0x2}, {0x0, 0x8}, {0x7, 0x5}, {0x0, 0x4}, {0x5, 0x6}, {0x3, 0xa}, {0x3, 0x9}, {0x3, 0x1}, {0x7, 0x3}, {}, {0x0, 0x3}, {0x7, 0x8}, {0x2, 0x9}, {0x7, 0x5}, {0x1, 0x9}, {0x2, 0xa}, {0x2, 0x1}, {0x1, 0xa}, {0x0, 0x7}, {0x5, 0x8}, {}, {0x2, 0x9}, {0x0, 0x3}, {0x3, 0x5}, {0x6, 0x6}, {0x6, 0x3}, {0x1, 0x7}, {0x5}, {0x7, 0x9}, {0x4, 0x5}, {0x2, 0x8}, {0x0, 0x3}, {0x1, 0x7}, {0x7, 0x3}, {0x5, 0x5}, {0x6, 0x5}, {0x5, 0x9}, {0x5, 0x4}, {0x6, 0x9}, {0x2, 0x1}]}]}, @NL80211_BAND_5GHZ={0x30, 0x1, 0x0, 0x1, [@NL80211_TXRATE_GI={0x5, 0x4, 0x2}, @NL80211_TXRATE_LEGACY={0x24, 0x1, [0x18, 0x7e, 0x2, 0x2, 0x5, 0x1b, 0x12, 0x3, 0x24, 0x60, 0x3, 0x1b, 0x36, 0x36, 0xb, 0x3, 0x2, 0x60, 0x4b, 0x24, 0x36, 0x4, 0x6c, 0x12, 0x4, 0x36, 0x60, 0x1b, 0x1b, 0x24, 0x60, 0x3]}]}, @NL80211_BAND_6GHZ={0x74, 0x3, 0x0, 0x1, [@NL80211_TXRATE_VHT={0x14, 0x3, {[0x2, 0xfff, 0x20, 0x20, 0xc4c4, 0x8001, 0xffff, 0x8]}}, @NL80211_TXRATE_GI={0x5, 0x4, 0x1}, @NL80211_TXRATE_VHT={0x14, 0x3, {[0x200, 0x401, 0x0, 0xfc, 0x80, 0xc1, 0xac]}}, @NL80211_TXRATE_HT={0x2a, 0x2, [{0x3, 0x5}, {0x7, 0xa}, {0x0, 0x1}, {0x1, 0x8}, {0x0, 0x3}, {0x2, 0x7}, {0x0, 0x1}, {0x7, 0x8}, {0x0, 0x4}, {0x2, 0x9}, {0x6, 0x4}, {}, {0x5, 0x2}, {0x5, 0x8}, {0x5, 0x5}, {0x0, 0xa}, {0x6}, {0x1, 0x5}, {0x3, 0x3}, {0x1, 0x6}, {0x0, 0x3}, {0x7, 0x6}, {0x7, 0x6}, {0x5, 0xa}, {0x7, 0x3}, {0x5, 0x3}, {0x4, 0x5}, {0x4, 0x6}, {0x1, 0x1}, {0x7, 0x5}, {0x1, 0x8}, {0x6, 0x4}, {0x4}, {0x7, 0x8}, {0x0, 0x2}, {0x2, 0x6}, {0x1}, {0x1, 0x6}]}, @NL80211_TXRATE_HT={0x8, 0x2, [{0x1, 0x8}, {0x4, 0x3}, {0x0, 0x6}, {0x2, 0x9}]}, @NL80211_TXRATE_LEGACY={0xa, 0x1, [0x21, 0x36, 0x5, 0x3, 0x5e, 0x2]}]}]}, @NL80211_ATTR_TX_RATES={0x230, 0x5a, 0x0, 0x1, [@NL80211_BAND_60GHZ={0xe4, 0x2, 0x0, 0x1, [@NL80211_TXRATE_VHT={0x14, 0x3, {[0x8, 0x8001, 0xa52, 0x1, 0x4, 0x0, 0x1, 0x1]}}, @NL80211_TXRATE_GI={0x5}, @NL80211_TXRATE_HT={0x2a, 0x2, [{0x2, 0x8}, {0x2}, {0x6, 0x8}, {0x4, 0x3}, {0x1}, {0x5, 0x9}, {0x4, 0x7}, {0x6, 0x8}, {0x0, 0x4}, {0x5, 0x7}, {0x7, 0x6}, {0x1, 0x5}, {0x3, 0x6}, {0x7, 0x5}, {0x3}, {0x5}, {0x1, 0xa}, {0x7}, {0x0, 0xa}, {0x2, 0x8}, {0x1, 0xa}, {0x3, 0x5}, {0x2, 0x1}, {0x1, 0x7}, {0x0, 0x5}, {0x5, 0x5}, {0x3, 0xa}, {0x3, 0x1}, {0x2, 0x1}, {0x1, 0x9}, {0x2, 0x1}, {0x1, 0x6}, {0x2, 0xa}, {0x1}, {0x1, 0xa}, {0x3, 0xa}, {0x7, 0x7}, {0x4, 0x2}]}, @NL80211_TXRATE_HT={0x9, 0x2, [{0x0, 0x1}, {0x7, 0x5}, {0x0, 0x7}, {0x7, 0x9}, {0x1, 0x4}]}, @NL80211_TXRATE_VHT={0x14, 0x3, {[0x0, 0x0, 0x0, 0x800, 0x3, 0x7, 0x7ff]}}, @NL80211_TXRATE_VHT={0x14, 0x3, {[0x0, 0x2, 0x9, 0x90, 0x2, 0xfff, 0x20, 0xffe1]}}, @NL80211_TXRATE_LEGACY={0x23, 0x1, [0x6, 0x30, 0x48, 0x16, 0x1, 0x18, 0x48, 0x18, 0x55, 0x6, 0x16, 0x2, 0x4, 0x16, 0xb, 0x5, 0x48, 0x1, 0x1, 0x16, 0x24, 0x60, 0x6, 0x30, 0x46, 0x48, 0x3, 0x4b, 0x12, 0x1b, 0x24]}, @NL80211_TXRATE_LEGACY={0xf, 0x1, [0x18, 0x0, 0x18, 0x18, 0x9, 0xb, 0x12, 0x42, 0x24, 0x12, 0x36]}, @NL80211_TXRATE_VHT={0x14, 0x3, {[0x81, 0x9, 0x2, 0x7, 0x0, 0x0, 0x3, 0x3]}}, @NL80211_TXRATE_LEGACY={0x1c, 0x1, [0x24, 0x1, 0x30, 0x24, 0x48, 0x30, 0x2, 0x13, 0x6c, 0x12, 0xb, 0x24, 0xc, 0x6, 0x2, 0x30, 0xfd, 0x16, 0x1, 0x60, 0x60, 0x48, 0xf, 0x2]}]}, @NL80211_BAND_60GHZ={0x60, 0x2, 0x0, 0x1, [@NL80211_TXRATE_VHT={0x14, 0x3, {[0x81, 0x195, 0x9886, 0x6, 0xa03, 0x0, 0xfff, 0x7]}}, @NL80211_TXRATE_GI={0x5, 0x4, 0x1}, @NL80211_TXRATE_HT={0x18, 0x2, [{0x7, 0x6}, {0x3, 0x9}, {0x6, 0x4}, {0x1, 0xa}, {0x6, 0x3}, {}, {0x3, 0x7}, {0x0, 0x8}, {0x3, 0xd}, {0x6, 0x8}, {0x6, 0x8}, {0x1, 0x3}, {0x2, 0x8}, {0x6, 0x5}, {0x5, 0x2}, {0x2, 0x1}, {0x1, 0x5}, {0x7, 0x9}, {0x6, 0x7}, {0x5}]}, @NL80211_TXRATE_HT={0x28, 0x2, [{0x5, 0x2}, {0x1, 0x4}, {0x5, 0x6}, {0x1, 0x1}, {0x0, 0x9}, {0x3, 0x1}, {0x6, 0x6}, {0x5, 0x4}, {0x1, 0x7}, {0x3, 0x3}, {0x5, 0x3}, {0x5, 0x7}, {0x6, 0xa}, {0x1, 0xa}, {0x7, 0x2}, {0x4, 0x9}, {0x6, 0x8}, {0x7, 0x8}, {0x5, 0x3}, {0x1, 0x3}, {0x5, 0x2}, {0x4, 0x7}, {0x2, 0xa}, {0x0, 0x1}, {0x3, 0x1}, {0x0, 0x5}, {0x1, 0x7}, {0x5, 0x1}, {0x1, 0x5}, {0x2, 0xa}, {0x3, 0x4}, {0x5, 0x8}, {}, {0x0, 0xa}, {0x3, 0x8}, {0x7}]}]}, @NL80211_BAND_5GHZ={0x34, 0x1, 0x0, 0x1, [@NL80211_TXRATE_LEGACY={0xc, 0x1, [0x12, 0x3, 0x6, 0x5, 0x24, 0x1b, 0x6f, 0xb]}, @NL80211_TXRATE_LEGACY={0x24, 0x1, [0x1a, 0x5, 0xb, 0x36, 0x1, 0x2, 0x9, 0xb, 0x16, 0x3, 0x18, 0x4, 0x24, 0x0, 0xb, 0x6c, 0x9, 0x18, 0x1b, 0x1b, 0x30, 0x48, 0x41, 0x1b, 0x18, 0x60, 0x1b, 0x24, 0x24, 0x36, 0x6, 0x12]}]}, @NL80211_BAND_60GHZ={0x5c, 0x2, 0x0, 0x1, [@NL80211_TXRATE_HT={0x22, 0x2, [{0x2, 0x1}, {0x1}, {0x0, 0x9}, {0x4, 0x8}, {0x6, 0x6}, {0x2, 0x2}, {0x1, 0x7}, {0x1, 0x7}, {0x1, 0x3}, {0x1, 0x4}, {0x5, 0x3}, {0x7, 0x2}, {0x6, 0x2}, {0x1, 0x8}, {0x5, 0x7}, {0x1, 0x6}, {0x4, 0x4}, {0x0, 0x6}, {0x5, 0xa}, {0x1, 0x1}, {0x1, 0x1}, {0x5, 0x8}, {0x4, 0x5}, {0x4, 0x5}, {0x6, 0x7}, {0x5, 0x1}, {0x1, 0x1}, {0x4, 0x7}, {0x1, 0x9}, {0x5, 0x4}]}, @NL80211_TXRATE_LEGACY={0x1d, 0x1, [0x3, 0x3, 0x1, 0x24, 0x3, 0x6, 0x5, 0x9, 0x4, 0x24, 0x4, 0x12, 0x3, 0x36, 0x6c, 0x18, 0x60, 0x60, 0x30, 0x36, 0xc, 0x6c, 0x5, 0x5, 0x1b]}, @NL80211_TXRATE_VHT={0x14, 0x3, {[0x9, 0x4, 0x8, 0x259a, 0x312, 0x9, 0x1, 0x200]}}]}, @NL80211_BAND_6GHZ={0x58, 0x3, 0x0, 0x1, [@NL80211_TXRATE_VHT={0x14, 0x3, {[0xf1b, 0x0, 0x6, 0x1ff, 0x3, 0x5, 0x0, 0x3ff]}}, @NL80211_TXRATE_HT={0x21, 0x2, [{0x5, 0x6}, {0x0, 0x4}, {0x0, 0x1}, {0x0, 0x7}, {0x1, 0x6}, {0x1, 0x8}, {0x1, 0x4}, {0x0, 0x1}, {0x0, 0x4}, {0x7, 0x6}, {0x7, 0x1}, {0x1, 0x6}, {0x2}, {0x6, 0xa}, {0x7, 0x6}, {0x7, 0x7}, {0x6, 0x9}, {0x5, 0x6}, {0x6, 0x1}, {0x6, 0x8}, {0x0, 0x4}, {0x7, 0x8}, {0x1, 0x2}, {0x0, 0x9}, {0x6, 0x5}, {0x7, 0x2}, {0x7, 0x3}, {0x5, 0x7}, {0x5, 0x4}]}, @NL80211_TXRATE_VHT={0x14, 0x3, {[0x3, 0x2f, 0x9, 0x8f52, 0x7, 0x400, 0x7, 0x7]}}, @NL80211_TXRATE_GI={0x5}]}]}, @NL80211_ATTR_TX_RATES={0x98, 0x5a, 0x0, 0x1, [@NL80211_BAND_2GHZ={0x94, 0x0, 0x0, 0x1, [@NL80211_TXRATE_LEGACY={0x20, 0x1, [0x60, 0x24, 0x4, 0x12, 0x0, 0x1, 0x1b, 0x16, 0x6c, 0x1b, 0x18, 0x1b, 0x55, 0xc, 0x18, 0x2, 0x4, 0x1b, 0x16, 0x6, 0x3, 0x24, 0x6c, 0x2, 0x24, 0x30, 0x18, 0x3]}, @NL80211_TXRATE_VHT={0x14, 0x3, {[0x80, 0xff, 0xf46e, 0x5f, 0x243, 0x5, 0x8, 0xc518]}}, @NL80211_TXRATE_VHT={0x14, 0x3, {[0x8000, 0x773, 0x80, 0x6, 0x7ff, 0x2, 0x2, 0x8]}}, @NL80211_TXRATE_HT={0x45, 0x2, [{0x3}, {0x2, 0x8}, {0x4, 0x7}, {0x7, 0x9}, {0x4, 0x6}, {0x0, 0x9}, {0x0, 0x6}, {0x4, 0x3}, {0x0, 0xa}, {0x2, 0x1}, {0x2, 0x5}, {0x5, 0x9}, {0x6, 0x3}, {0x3, 0x7}, {0x1, 0x7}, {0x0, 0x8}, {0x1, 0x6}, {0x7, 0x4}, {0x6, 0x1}, {0x3, 0x1}, {0x3, 0x5}, {0x7}, {0x0, 0x3}, {0x1}, {0x0, 0x5}, {0x0, 0x8}, {}, {0x1, 0x7}, {0x6, 0x3}, {0x2, 0x7}, {0x1, 0x6}, {0x4, 0x4}, {0x4, 0x9}, {0x0, 0x4}, {0x1, 0x7}, {0x6, 0x5}, {0x7, 0x3}, {0x1, 0x6}, {0x0, 0xa}, {0x4, 0x5}, {0x2, 0x8}, {0x6, 0x8}, {0x0, 0x5}, {0x7, 0x3}, {0x4, 0xa}, {0x1, 0xa}, {0x1, 0x9}, {}, {0x7, 0xa}, {0x2, 0x3}, {0x2}, {0x4}, {0x6, 0xa}, {0x5}, {0x6, 0x4}, {0x6, 0x3}, {0x7}, {0x7, 0x7}, {0x5, 0x8}, {0x5, 0x2}, {0x0, 0x8}, {0x7, 0x2}, {0x5}, {0x3}, {0x2, 0x6}]}]}]}, @NL80211_ATTR_TX_RATES={0x274, 0x5a, 0x0, 0x1, [@NL80211_BAND_2GHZ={0xb4, 0x0, 0x0, 0x1, [@NL80211_TXRATE_VHT={0x14, 0x3, {[0x3, 0xf59, 0x3f, 0x206, 0x800, 0x5, 0x1000, 0x4]}}, @NL80211_TXRATE_GI={0x5}, @NL80211_TXRATE_HT={0x3e, 0x2, [{0x1, 0x7}, {0x0, 0x7}, {0x4, 0x9}, {0x2, 0x3}, {0x5, 0x4}, {0x2, 0x3}, {0x2, 0x2}, {0x1, 0x1}, {0x7, 0x9}, {0x1, 0x5}, {0x1, 0x5}, {0x4, 0x9}, {0x1, 0x7}, {0x5, 0x2}, {0x6, 0xa}, {0x1, 0x3}, {0x1, 0x2}, {0x2, 0x2}, {0x2, 0x2}, {0x0, 0x7}, {0x1, 0x1}, {0x4, 0x5}, {0x1, 0x1}, {0x1, 0x5}, {0x3, 0x7}, {0x2, 0x2}, {0x3, 0x2}, {0x0, 0x4}, {0x7}, {0x3, 0x7}, {0x2, 0x8}, {0x3, 0x9}, {0x6, 0x3}, {0x3, 0x5}, {0x1, 0x8}, {0x4, 0x8}, {0x7, 0x7}, {0x2, 0x8}, {0x5}, {0x1, 0x4}, {0x0, 0x4}, {0x3, 0x6}, {0x5, 0x1}, {0x1, 0x7}, {0x7, 0x8}, {0x6, 0x7}, {0x3, 0x2}, {0x2, 0x7}, {0x5, 0x1}, {}, {0x0, 0x1}, {0x6, 0x6}, {0x0, 0x9}, {0x5, 0x2}, {0x6, 0x2}, {0x6, 0x2}, {0x1, 0x4}, {0x3, 0x7}]}, @NL80211_TXRATE_GI={0x5, 0x4, 0x1}, @NL80211_TXRATE_GI={0x5, 0x4, 0x1}, @NL80211_TXRATE_HT={0x2e, 0x2, [{0x0, 0x9}, {0x0, 0x9}, {0x7, 0x4}, {0x4, 0x8}, {0x3, 0x2}, {0x7, 0x8}, {0x3, 0x4}, {0x1, 0x2}, {0x0, 0x9}, {0x4, 0x3}, {0x0, 0x5}, {0x5, 0x8}, {0x7, 0x7}, {0x1, 0x5}, {0x2, 0x3}, {0x0, 0x2}, {0x7, 0xa}, {0x7, 0x6}, {0x7, 0x4}, {0x2, 0x3}, {0x0, 0x2}, {0x7, 0x7}, {}, {0x4, 0x9}, {0x2, 0x9}, {0x5, 0x5}, {0x0, 0x8}, {0x4, 0x7}, {0x4, 0x2}, {0x1, 0x3}, {0x0, 0x7}, {0x1, 0x5}, {0x3, 0x4}, {0x3, 0x7}, {0x3, 0x7}, {0x5, 0x9}, {0x0, 0x5}, {0x0, 0xa}, {0x7, 0x8}, {0x6, 0xa}, {0x3, 0xa}, {0x2, 0x8}]}, @NL80211_TXRATE_VHT={0x14, 0x3, {[0x3, 0x400, 0x6, 0x3, 0xbf87, 0xe, 0xb61d, 0x1000]}}]}, @NL80211_BAND_6GHZ={0x64, 0x3, 0x0, 0x1, [@NL80211_TXRATE_HT={0x7, 0x2, [{0x7, 0x1}, {0x1, 0x9}, {0x7, 0x8}]}, @NL80211_TXRATE_HT={0x9, 0x2, [{0x4, 0x7}, {0x5, 0x9}, {0x4, 0xa}, {0x1, 0x3}, {0x1, 0x9}]}, @NL80211_TXRATE_VHT={0x14, 0x3, {[0x0, 0x30c4, 0x2, 0xffff, 0x3, 0x1ff, 0x1000, 0x8]}}, @NL80211_TXRATE_VHT={0x14, 0x3, {[0xbf, 0x7, 0xffff, 0x4, 0x0, 0xbdd, 0x9, 0x8]}}, @NL80211_TXRATE_LEGACY={0x19, 0x1, [0x24, 0x24, 0x4, 0x2e, 0x30, 0xc, 0xb, 0x1, 0x36, 0x48, 0x4f, 0x6, 0x1, 0x12, 0x24, 0x3, 0x9, 0x36, 0x6c, 0x9, 0x3b]}, @NL80211_TXRATE_GI={0x5, 0x4, 0x2}]}, @NL80211_BAND_60GHZ={0x34, 0x2, 0x0, 0x1, [@NL80211_TXRATE_LEGACY={0x1b, 0x1, [0x16, 0xf, 0x5, 0x4, 0x28, 0x18, 0x24, 0x4, 0x1, 0x18, 0x12, 0x4, 0x3, 0x4, 0x18, 0x3, 0x30, 0x1, 0x2, 0x6c, 0x3, 0x24, 0x36]}, @NL80211_TXRATE_VHT={0x14, 0x3, {[0x6, 0xa, 0x5, 0x7a0b, 0x1, 0xffff, 0x4, 0x8]}}]}, @NL80211_BAND_6GHZ={0x2c, 0x3, 0x0, 0x1, [@NL80211_TXRATE_HT={0x15, 0x2, [{0x5, 0x2}, {0x3, 0x9}, {0x2, 0x5}, {0x3, 0x1}, {0x6, 0x2}, {0x6}, {0x0, 0xa}, {0x3, 0x2}, {0x1, 0x2}, {0x4, 0x3}, {0x7, 0x3}, {0x2, 0x9}, {0x7, 0x6}, {0x5, 0xa}, {0x4, 0x6}, {0x6, 0x4}, {0x7, 0x5}]}, @NL80211_TXRATE_GI={0x5, 0x4, 0x2}, @NL80211_TXRATE_GI={0x5, 0x4, 0x2}]}, @NL80211_BAND_60GHZ={0x58, 0x2, 0x0, 0x1, [@NL80211_TXRATE_VHT={0x14, 0x3, {[0x4, 0x3, 0xffff, 0xce, 0x81, 0x4, 0x1, 0x5]}}, @NL80211_TXRATE_LEGACY={0xc, 0x1, [0x18, 0x60, 0x18, 0x30, 0x16, 0x18, 0x1b, 0x1]}, @NL80211_TXRATE_VHT={0x14, 0x3, {[0x5ae9, 0x400, 0x2, 0x7f, 0x0, 0x9, 0x9, 0x40]}}, @NL80211_TXRATE_LEGACY={0x1d, 0x1, [0x5, 0x60, 0xc, 0x16, 0x0, 0x1, 0x1, 0x36, 0x9, 0x6c, 0x9, 0x73, 0x1, 0xc, 0x9, 0x5, 0x9, 0x6c, 0x6c, 0x9, 0x4, 0x60, 0x9, 0x48, 0x18]}]}, @NL80211_BAND_6GHZ={0x54, 0x3, 0x0, 0x1, [@NL80211_TXRATE_LEGACY={0xa, 0x1, [0x4, 0x30, 0x6, 0x4, 0x30, 0xb]}, @NL80211_TXRATE_HT={0x2c, 0x2, [{0x7, 0x6}, {0x3, 0x1}, {0x2, 0x2}, {0x1}, {0x6, 0x9}, {0x1, 0x6}, {0x2, 0x6}, {0x7, 0x5}, {0x3, 0x9}, {0x0, 0x6}, {0x1, 0xa}, {0x5, 0x1}, {0x0, 0x4}, {0x1, 0x3}, {0x3, 0xa}, {0x3, 0x4}, {0x1}, {0x4, 0x6}, {0x7, 0x1}, {0x4, 0x7}, {0x1}, {0x1, 0x6}, {0x1, 0xa}, {0x6, 0x9}, {0x4, 0x4}, {0x7, 0xa}, {0x6, 0x4}, {0x1, 0x4}, {0x3, 0x6}, {0x3}, {0x5, 0x1}, {0x6}, {0x0, 0xa}, {0x3, 0x4}, {0x0, 0x2}, {0x1, 0x9}, {0x0, 0x7}, {0x0, 0x9}, {0x4, 0x9}, {0x3, 0x5}]}, @NL80211_TXRATE_LEGACY={0xf, 0x1, [0xb, 0x0, 0x2, 0xb, 0x2, 0x16, 0x12, 0x4, 0x12, 0x9, 0x1]}, @NL80211_TXRATE_GI={0x5, 0x4, 0x1}]}, @NL80211_BAND_5GHZ={0x2c, 0x1, 0x0, 0x1, [@NL80211_TXRATE_LEGACY={0x9, 0x1, [0xb, 0x1b, 0x2, 0x2, 0x12]}, @NL80211_TXRATE_GI={0x5, 0x4, 0x2}, @NL80211_TXRATE_VHT={0x14, 0x3, {[0x0, 0xfc01, 0x49d1, 0x8, 0x3, 0x6, 0x7f, 0x1]}}]}, @NL80211_BAND_5GHZ={0x20, 0x1, 0x0, 0x1, [@NL80211_TXRATE_GI={0x5, 0x4, 0x1}, @NL80211_TXRATE_HT={0x4}, @NL80211_TXRATE_LEGACY={0xd, 0x1, [0x0, 0x2, 0x5, 0x24, 0x1, 0x6, 0x2, 0x60, 0x3]}]}]}, @NL80211_ATTR_TX_RATES={0x45c, 0x5a, 0x0, 0x1, [@NL80211_BAND_60GHZ={0x94, 0x2, 0x0, 0x1, [@NL80211_TXRATE_HT={0x27, 0x2, [{0x2, 0x6}, {0x4}, {0x6, 0x4}, {0x5, 0x4}, {0x3, 0x2}, {0x5, 0x9}, {0x5, 0x1}, {0x2, 0x9}, {0x1, 0x6}, {0x6, 0x4}, {0x5, 0x9}, {0x0, 0x8}, {0x5, 0x6}, {0x5, 0x5}, {0x7, 0x7}, {0x0, 0x9}, {0x0, 0x5}, {0x1, 0x1}, {0x5, 0xa}, {0x0, 0x6}, {0x5, 0x1}, {0x0, 0x4}, {0x2, 0x4}, {0x7, 0x4}, {0x1, 0xa}, {0x5, 0x6}, {0x1, 0x1}, {0x4}, {0x2}, {0x0, 0x1}, {0x2}, {0x6}, {0x3, 0x1}, {0x5, 0x3}, {0x3, 0x3}]}, @NL80211_TXRATE_HT={0x4b, 0x2, [{0x0, 0x8}, {0x1, 0x8}, {0x7, 0x7}, {0x2, 0x3}, {0x1, 0x4}, {0x5, 0x2}, {0x2, 0x3}, {0x1, 0x7}, {0x7, 0x3}, {0x0, 0x2}, {0x4, 0x7}, {0x0, 0x8}, {0x1, 0x2}, {0x1, 0xa}, {0x3, 0x8}, {0x2, 0xa}, {0x0, 0xa}, {0x7, 0x8}, {0x6, 0x9}, {0x2, 0x6}, {0x0, 0x7}, {0x1, 0x6}, {0x5}, {0x1}, {0x0, 0x3}, {0x6, 0x3}, {0x6, 0x9}, {0x0, 0x4}, {0x0, 0x6}, {0x5, 0x4}, {0x1, 0x4}, {0x5, 0x5}, {0x1, 0x6}, {0x0, 0x2}, {0x5}, {0x0, 0x5}, {0x7, 0x2}, {0x0, 0x5}, {}, {0x3, 0x8}, {0x7}, {0x3, 0x5}, {0x4, 0x7}, {0x3, 0x7}, {0x0, 0x3}, {0x2, 0x2}, {0x1, 0x8}, {0x6, 0x4}, {0x1, 0x1}, {0x0, 0xa}, {0x1, 0x3}, {0x7, 0x7}, {0x2, 0x1}, {0x5, 0x2}, {0x4, 0x2}, {0x4, 0x6}, {0x1, 0x6}, {0x4, 0x8}, {0x0, 0xa}, {0x0, 0xa}, {0x1, 0xa}, {0x5, 0x5}, {0x2, 0x4}, {0x3, 0x5}, {0x1, 0x1}, {0x3}, {0x0, 0x7}, {0x1, 0xa}, {0x7, 0x7}, {0x2, 0x9}, {0x0, 0xa}]}, @NL80211_TXRATE_VHT={0x14, 0x3, {[0x1, 0x8, 0x8000, 0x7f, 0xfff, 0x5, 0x5, 0xfa9f]}}, @NL80211_TXRATE_GI={0x5}]}, @NL80211_BAND_2GHZ={0x24, 0x0, 0x0, 0x1, [@NL80211_TXRATE_LEGACY={0x16, 0x1, [0x48, 0x4, 0x30, 0x5, 0x1, 0x2, 0x6c, 0x48, 0x30, 0x2, 0xb, 0xa, 0x5, 0x1b, 0x24, 0xb, 0x6c, 0x48]}, @NL80211_TXRATE_GI={0x5}]}, @NL80211_BAND_5GHZ={0x34, 0x1, 0x0, 0x1, [@NL80211_TXRATE_GI={0x5}, @NL80211_TXRATE_LEGACY={0x15, 0x1, [0x2, 0x1b, 0x30, 0x18, 0x6c, 0x3, 0x16, 0x16, 0x0, 0x30, 0x6, 0x9, 0x9, 0x1a, 0x60, 0x24, 0x0]}, @NL80211_TXRATE_LEGACY={0x10, 0x1, [0x12, 0x3, 0x4, 0x18, 0x17, 0x6c, 0x12, 0x60, 0x48, 0x2, 0xb, 0x4]}]}, @NL80211_BAND_6GHZ={0x68, 0x3, 0x0, 0x1, [@NL80211_TXRATE_VHT={0x14, 0x3, {[0x9, 0x6, 0x40, 0x8, 0xcd5, 0x80, 0x3, 0x9]}}, @NL80211_TXRATE_VHT={0x14, 0x3, {[0x1, 0x8, 0x8, 0x4, 0x1000, 0x9, 0x1, 0x5]}}, @NL80211_TXRATE_VHT={0x14, 0x3, {[0xfffb, 0x4, 0x4, 0x7, 0x20, 0x5, 0x8, 0x9]}}, @NL80211_TXRATE_VHT={0x14, 0x3, {[0x7, 0x3f, 0x5, 0x1, 0x6, 0x4]}}, @NL80211_TXRATE_VHT={0x14, 0x3, {[0x7, 0xffff, 0x7, 0x5a, 0x0, 0x2, 0x7ff, 0x9]}}]}, @NL80211_BAND_5GHZ={0x90, 0x1, 0x0, 0x1, [@NL80211_TXRATE_GI={0x5}, @NL80211_TXRATE_LEGACY={0x5, 0x1, [0x12]}, @NL80211_TXRATE_HT={0x2f, 0x2, [{0x6, 0x6}, {0x4, 0x7}, {0x6, 0x3}, {0x5, 0x3}, {0x1, 0x2}, {0x5, 0x9}, {0x0, 0x6}, {0x6, 0x8}, {0x7}, {0x6, 0x1}, {0x2, 0x3}, {0x2, 0x7}, {0x6, 0xa}, {0x2, 0x3}, {0x6, 0x3}, {0x7, 0x3}, {0x3, 0x3}, {0x4, 0x1}, {0x2, 0x9}, {0x1, 0x2}, {0x1, 0x8}, {0x7, 0x8}, {0x1, 0x6}, {0x1, 0x1}, {0x5, 0x3}, {0x0, 0x2}, {0x6, 0x4}, {0x4, 0x1}, {0x6, 0x7}, {0x4, 0x7}, {0x3, 0xa}, {0x0, 0x4}, {0x2, 0x7}, {0x6, 0x5}, {0x3, 0xa}, {0x7, 0x5}, {0x7, 0x1}, {0x2, 0x2}, {0x0, 0x5}, {0x0, 0x7}, {0x2, 0x8}, {0x1, 0x3}, {0x4, 0x6}]}, @NL80211_TXRATE_VHT={0x14, 0x3, {[0x20, 0x9, 0x5, 0x7, 0x401, 0x1, 0x4]}}, @NL80211_TXRATE_LEGACY={0x21, 0x1, [0x36, 0x1, 0x18, 0x18, 0x36, 0x9, 0x3c, 0x4, 0x0, 0x72, 0x12, 0x1, 0x36, 0x3, 0x4, 0x60, 0x9, 0x1, 0x12, 0x1, 0x31, 0x24, 0x9, 0x4, 0x36, 0x6, 0xc, 0x24, 0x24]}, @NL80211_TXRATE_VHT={0x14, 0x3, {[0x1, 0x8, 0x4, 0x81, 0x0, 0x6, 0x1, 0xfff]}}]}, @NL80211_BAND_2GHZ={0xb4, 0x0, 0x0, 0x1, [@NL80211_TXRATE_HT={0x36, 0x2, [{0x1, 0x3}, {0x5, 0xa}, {}, {0x6}, {0x7, 0x5}, {0x6, 0x6}, {0x0, 0x9}, {0x2, 0x4}, {0x2, 0x1}, {0x5, 0x7}, {0x4}, {0x0, 0xa}, {0x0, 0x3}, {0x0, 0xa}, {0x4, 0x1}, {0x7, 0x7}, {0x5, 0x9}, {0x0, 0x4}, {0x5, 0x1}, {0x1, 0x8}, {0x6, 0x9}, {0x7, 0x4}, {0x7, 0x9}, {0x4, 0x6}, {0x0, 0x1}, {0x4, 0x7}, {0x7, 0x1}, {0x3, 0x4}, {0x3, 0x8}, {0x3, 0x7}, {0x1, 0x2}, {0x1, 0x6}, {0x3, 0x1}, {0x5, 0x5}, {0x7, 0x7}, {0x7, 0xa}, {0x7, 0x6}, {0x6, 0x6}, {0x0, 0x6}, {0x2, 0x8}, {0x7}, {0x0, 0x3}, {0x0, 0x2}, {0x4, 0x1}, {0x2, 0x1}, {0x5, 0x4}, {0x4, 0x8}, {0x1, 0x8}, {0x4, 0x1}, {0x1, 0x3}]}, @NL80211_TXRATE_VHT={0x14, 0x3, {[0x1, 0x4c, 0x1, 0xfc00, 0x2, 0x2, 0x748e, 0x354]}}, @NL80211_TXRATE_HT={0x50, 0x2, [{0x1, 0xa}, {0x6, 0x1}, {}, {0x3, 0x9}, {0x4, 0x3}, {0x4, 0x1}, {0x3, 0x1}, {0x1}, {0x2, 0x3}, {0x0, 0x1}, {0x3}, {0x7, 0x3}, {0x3, 0xa}, {0x1, 0x7}, {0x0, 0x6}, {0x6, 0x7}, {0x7, 0x6}, {0x0, 0x6}, {0x4, 0x2}, {0x3, 0xa}, {0x0, 0xa}, {0x2, 0x5}, {0x0, 0x9}, {0x4}, {0x5, 0x4}, {0x0, 0x6}, {0x6, 0x6}, {0x6, 0xa}, {0x3, 0x1}, {}, {0x2, 0x7}, {0x2, 0xa}, {0x5, 0x5}, {0x0, 0x5}, {0x3, 0x2}, {0x0, 0x3}, {0x0, 0x9}, {0x4, 0x4}, {0x7, 0x3}, {0x6, 0x7}, {0x5, 0x4}, {0x0, 0x8}, {0x6, 0x4}, {0x6, 0x2}, {0x5, 0x9}, {}, {0x0, 0x8}, {0x7, 0x3}, {0x7, 0x5}, {0x6, 0x7}, {0x5, 0x3}, {0x0, 0x3}, {0x5, 0xa}, {0x6, 0x2}, {0x3, 0x2}, {0x3, 0x3}, {0x4, 0x8}, {0x1, 0xa}, {0x0, 0x1}, {0x6, 0x1}, {0x7, 0x8}, {0x1}, {0x0, 0xa}, {0x0, 0x3}, {0x0, 0x5}, {0x3, 0x9}, {0x7, 0x1}, {0x2, 0x6}, {0x4, 0x1}, {0x0, 0xa}, {0x1, 0x4}, {0x7}, {0x1, 0xa}, {0x2, 0x3}, {0x4, 0x9}, {0x5, 0x5}]}, @NL80211_TXRATE_VHT={0x14, 0x3, {[0x5, 0x2, 0x4, 0x0, 0x7fff, 0xf2, 0x9]}}]}, @NL80211_BAND_2GHZ={0xd4, 0x0, 0x0, 0x1, [@NL80211_TXRATE_LEGACY={0x5, 0x1, [0xc]}, @NL80211_TXRATE_LEGACY={0xa, 0x1, [0x6c, 0x1, 0x18, 0x1, 0x9, 0x16]}, @NL80211_TXRATE_LEGACY={0x23, 0x1, [0xf, 0x6, 0x6c, 0x30, 0x9, 0x60, 0x4, 0x1b, 0x5, 0x9, 0x48, 0xc, 0x0, 0x5, 0x60, 0x2, 0x2, 0x18, 0x1, 0x4, 0x3, 0x48, 0x30, 0x12, 0x24, 0x3, 0x6, 0x12, 0x6, 0x6, 0x0]}, @NL80211_TXRATE_VHT={0x14, 0x3, {[0x77ef, 0x81e5, 0x7ff, 0xffff, 0xfffc, 0x7, 0xfffe, 0x6]}}, @NL80211_TXRATE_VHT={0x14, 0x3, {[0xffff, 0x5ab, 0x7fff, 0x8, 0x3, 0x9, 0x8001, 0x7]}}, @NL80211_TXRATE_VHT={0x14, 0x3, {[0x1, 0x7, 0x800, 0x9, 0x7fff, 0xc7c, 0x80, 0x200]}}, @NL80211_TXRATE_HT={0x40, 0x2, [{0x6, 0x6}, {0x1, 0xa}, {0x3, 0x3}, {0x7, 0x5}, {0x0, 0x7}, {0x5, 0x3}, {0x0, 0x4}, {0x6, 0x1}, {0x1, 0x6}, {0x3, 0xa}, {0x4, 0x3}, {0x7, 0x5}, {0x2, 0x3}, {0x7}, {0x5, 0x2}, {0x1, 0x9}, {0x0, 0x2}, {0x0, 0x4}, {0x1, 0x1}, {0x3}, {0x4, 0x8}, {0x3, 0x5}, {0x6}, {0x3, 0x2}, {0x7, 0x3}, {0x0, 0x8}, {0x4, 0x6}, {0x2, 0x6}, {0x6, 0x2}, {0x2, 0x2}, {0x3, 0x3}, {0x0, 0x2}, {0x0, 0x3}, {0x6, 0x6}, {0x5, 0x6}, {0x3, 0x1}, {0x0, 0x3}, {0x1, 0xa}, {0x6, 0x1}, {0x3, 0x9}, {0x1, 0x7}, {0x5, 0x2}, {0x7}, {0x6, 0x4}, {0x3, 0x2}, {0x6, 0x4}, {0x5, 0xa}, {0x1, 0x7}, {0x5}, {0x7, 0x7}, {0x0, 0x2}, {0x0, 0x9}, {0x0, 0x2}, {0x3, 0x9}, {0x4, 0x5}, {0x4, 0x3}, {0x1}, {0x6, 0x1}, {0x2, 0x9}, {0x3, 0x4}]}, @NL80211_TXRATE_HT={0xb, 0x2, [{0x0, 0x6}, {0x1, 0x9}, {0x3, 0x7}, {0x0, 0x8}, {0x0, 0x9}, {0x1, 0x5}, {0x5, 0x1}]}, @NL80211_TXRATE_HT={0xf, 0x2, [{0x1, 0x3}, {0x0, 0x2}, {0x3, 0x7}, {0x4, 0x6}, {0x2, 0x2}, {0x5, 0x9}, {0x6, 0xa}, {0x5, 0x6}, {0x1, 0x3}, {0x3}, {0x2, 0x8}]}]}, @NL80211_BAND_6GHZ={0xec, 0x3, 0x0, 0x1, [@NL80211_TXRATE_HT={0x1e, 0x2, [{0x0, 0x6}, {0x5}, {0x0, 0x4}, {0x6, 0x7}, {0x1, 0x9}, {0x0, 0x1f}, {0x0, 0x5}, {0x7, 0x4}, {0x4, 0xa}, {0x4, 0xa}, {0x1, 0x3}, {0x1, 0x6}, {0x6, 0x6}, {0x3, 0x5}, {0x3, 0x3}, {0x6, 0x9}, {0x1, 0x2}, {0x3, 0x4}, {0x1, 0x8}, {0x7, 0x3}, {0x0, 0x8}, {0x2, 0x9}, {0x1, 0x7}, {0x3, 0x2}, {0x4, 0x2}, {0x5}]}, @NL80211_TXRATE_LEGACY={0x12, 0x1, [0x1b, 0x30, 0x30, 0x6c, 0xb, 0x2, 0x36, 0x3c, 0x24, 0x2, 0x9, 0x2, 0x3, 0x16]}, @NL80211_TXRATE_GI={0x5, 0x4, 0x2}, @NL80211_TXRATE_HT={0x48, 0x2, [{0x6, 0x3}, {0x3, 0x2}, {0x1, 0x9}, {0x1, 0x8}, {0x5, 0x6}, {0x4, 0x9}, {0x4, 0x5}, {0x2, 0x3}, {0x1}, {0x1, 0x8}, {0x4, 0x1}, {0x5, 0x2}, {0x0, 0x2}, {0x4, 0x3}, {0x0, 0x9}, {0x4, 0x1}, {0x0, 0x8}, {0x5, 0xa}, {0x6, 0x8}, {0x3, 0xa}, {0x6}, {0x3, 0x2}, {0x5}, {0x6, 0x4}, {0x0, 0x4}, {0x6, 0x1}, {0x4, 0x1}, {0x7, 0x9}, {0x5, 0x4}, {0x5, 0x3}, {0x3}, {0x6, 0x4}, {0x0, 0x9}, {0x3, 0x2}, {0x4, 0x7}, {0x7, 0x2}, {0x4, 0x2}, {0x1}, {0x1, 0x9}, {0x1, 0x8}, {0x5, 0x5}, {0x0, 0xa}, {0x0, 0x1}, {0x6, 0x3}, {0x7, 0x9}, {0x5, 0xa}, {0x2, 0x1}, {0x3, 0x7}, {0x3, 0x8}, {0x1, 0x8}, {0x1, 0x2}, {0x1, 0xa}, {0x7}, {0x4, 0x8}, {0x1, 0x5}, {0x4, 0x2}, {0x6, 0x3}, {0x5, 0x5}, {0x1, 0x3}, {0x6, 0x4}, {0x4, 0x1}, {0x4}, {0x5, 0x7}, {0x7, 0x2}, {0x0, 0x8}, {0x1, 0x9}, {0x5, 0x7}, {0x1, 0x5}]}, @NL80211_TXRATE_LEGACY={0x1a, 0x1, [0xb, 0x36, 0x24, 0x4c, 0x2, 0x36, 0x12, 0x30, 0x3, 0x1c, 0x1, 0x6c, 0x16, 0x1, 0x3, 0x1b, 0x3, 0x6, 0x60, 0x1b, 0x5, 0x6c]}, @NL80211_TXRATE_HT={0x18, 0x2, [{0x5, 0x3}, {0x7, 0x2}, {0x1, 0x1}, {0x0, 0x9}, {0x5, 0x9}, {0x1, 0x6}, {0x5, 0x3}, {0x7, 0x6}, {0x4, 0x3}, {0x1, 0x2}, {0x7, 0x7}, {0x3, 0x1}, {0x6}, {0x1, 0xa}, {0x7, 0x3}, {0x7, 0x3}, {0x3, 0x3}, {0x5, 0x5}, {0x2, 0x2}, {0x1, 0x5}]}, @NL80211_TXRATE_GI={0x5}, @NL80211_TXRATE_HT={0x25, 0x2, [{0x2, 0x2}, {0x6, 0x2}, {0x7, 0x9}, {0x7}, {0x0, 0x1}, {0x3, 0xa}, {0x5, 0x3}, {0x3, 0x7}, {0x4, 0x7}, {0x1, 0x9}, {0x3, 0x2}, {0x6, 0x4}, {0x3, 0x6}, {0x7, 0x9}, {0x2, 0x6}, {0x4, 0x3}, {0x7, 0x6}, {0x0, 0x1}, {0x6, 0x8}, {0x2, 0x3}, {0x4, 0x5}, {0x4, 0x2}, {0x1, 0x8}, {0x4, 0xa}, {0x0, 0x7}, {0x1, 0x9}, {0x1, 0xa}, {0x1, 0x3}, {0x7, 0x9}, {0x7, 0x4}, {}, {0x1, 0x4}, {0x3, 0x5}]}]}]}, @NL80211_ATTR_TX_RATES={0x4}, @NL80211_ATTR_TX_RATES={0x3c, 0x5a, 0x0, 0x1, [@NL80211_BAND_2GHZ={0x38, 0x0, 0x0, 0x1, [@NL80211_TXRATE_LEGACY={0x17, 0x1, [0x0, 0x6c, 0x44, 0x24, 0x1b, 0x36, 0x6, 0x11, 0x3, 0x18, 0x18, 0x24, 0x16, 0x60, 0x1, 0x6, 0x6, 0x5, 0x2]}, @NL80211_TXRATE_VHT={0x14, 0x3, {[0x792b, 0x660a, 0x200, 0x1, 0x7fff, 0x9, 0x5, 0x1]}}, @NL80211_TXRATE_GI={0x5, 0x4, 0x1}]}]}, @NL80211_ATTR_TX_RATES={0x188, 0x5a, 0x0, 0x1, [@NL80211_BAND_2GHZ={0xa8, 0x0, 0x0, 0x1, [@NL80211_TXRATE_LEGACY={0xc, 0x1, [0x6, 0x1, 0x1, 0x1, 0x36, 0x6, 0xc, 0x18]}, @NL80211_TXRATE_VHT={0x14, 0x3, {[0x9, 0xfffe, 0x7, 0x1bb6, 0xf9ed, 0x0, 0x20, 0x5]}}, @NL80211_TXRATE_GI={0x5, 0x4, 0x2}, @NL80211_TXRATE_HT={0x20, 0x2, [{0x6, 0x3}, {0x0, 0x3}, {0x5, 0x5}, {0x7, 0x5}, {0x7, 0x2}, {0x4, 0x4}, {0x5, 0xa}, {0x7, 0x1}, {}, {0x6, 0x7}, {0x6, 0x5}, {0x2, 0x2}, {0x0, 0x3}, {0x1}, {0x7, 0x6}, {0x2, 0x5}, {0x5, 0xa}, {0x1, 0x6}, {0x4, 0x8}, {0x5, 0xa}, {0x0, 0x2}, {0x6, 0x1}, {0x7, 0x2}, {0x4, 0x9}, {0x0, 0x9}, {0x6}, {0x3, 0x9}, {0x1, 0x3}]}, @NL80211_TXRATE_LEGACY={0xe, 0x1, [0x6c, 0x6c, 0x60, 0x0, 0x6c, 0x6, 0x48, 0x4, 0x24, 0x0]}, @NL80211_TXRATE_LEGACY={0xf, 0x1, [0x0, 0x18, 0x2, 0x3, 0x2, 0x6, 0xc, 0xff66a991d9f7f1c0, 0xc, 0x16, 0x5]}, @NL80211_TXRATE_HT={0x28, 0x2, [{0x5, 0x3}, {0x1, 0x5}, {0x4, 0x3}, {0x3, 0x8}, {0x7, 0x6}, {0x0, 0x1}, {0x5, 0x9}, {0x1, 0xa}, {0x6, 0x3}, {0x7, 0x2}, {0x5, 0x6}, {0x0, 0x3}, {0x1, 0x8}, {0x6, 0x3}, {0x7, 0x5}, {0x3, 0x2}, {0x3, 0x3}, {0x3, 0x3}, {0x1, 0x9}, {0x5, 0x5}, {0x7, 0x8}, {0x0, 0x4}, {0x5, 0x8}, {0x0, 0x2}, {0x2, 0x7}, {0x2, 0xa}, {0x4, 0x5}, {0x6, 0x1}, {0x2, 0x5}, {0x6, 0x9}, {0x3, 0x9}, {0x1, 0x5}, {0x6, 0xa}, {0x0, 0x7}, {0x7, 0x3}, {0x4, 0x9}]}, @NL80211_TXRATE_HT={0x9, 0x2, [{0x7, 0x1}, {0x0, 0x2}, {0x7, 0x3}, {0x7, 0xa}, {0x0, 0x6}]}, @NL80211_TXRATE_GI={0x5, 0x4, 0x2}]}, @NL80211_BAND_5GHZ={0xa4, 0x1, 0x0, 0x1, [@NL80211_TXRATE_GI={0x5}, @NL80211_TXRATE_VHT={0x14, 0x3, {[0x3, 0x8, 0xff, 0x6, 0x858, 0x5f, 0x0, 0x1]}}, @NL80211_TXRATE_VHT={0x14, 0x3, {[0x1f, 0x1f, 0x4, 0x8, 0x100, 0x7ff, 0xff, 0xc259]}}, @NL80211_TXRATE_GI={0x5, 0x4, 0x2}, @NL80211_TXRATE_GI={0x5, 0x4, 0x2}, @NL80211_TXRATE_LEGACY={0x11, 0x1, [0xc47e88482b022842, 0x2, 0x1b, 0x16, 0x24, 0x9, 0x48, 0x9, 0x9, 0x1b, 0x30, 0x2, 0x60]}, @NL80211_TXRATE_HT={0x37, 0x2, [{0x1, 0x7}, {0x0, 0x2}, {0x5, 0x1}, {0x6, 0xa}, {0x6, 0x5}, {0x0, 0x8}, {0x6, 0x9}, {0x2, 0x2}, {0x0, 0x1}, {0x5, 0x9}, {0x4, 0x1}, {0x6, 0x6}, {0x3, 0x1}, {0x0, 0x3}, {0x3, 0x2}, {0x5, 0x2}, {0x2, 0x3}, {0x7, 0x5}, {0x5, 0x5}, {0x1, 0x1}, {0x2, 0x1}, {0x6, 0x3}, {0x0, 0xa}, {0x7, 0x3}, {0x2}, {0x5, 0x8}, {0x0, 0x5}, {0x6, 0x6}, {0x1}, {0x1, 0x4}, {0x1, 0xa}, {0x3, 0x4}, {0x4, 0x6}, {0x1, 0x1}, {0x6, 0x4}, {0x3, 0x5}, {0x5, 0xa}, {0x3, 0x1}, {0x6, 0x6}, {0x6, 0xa}, {0x5, 0x2}, {0x4}, {0x5, 0x6}, {0x0, 0x8}, {0x2, 0x1}, {}, {0x0, 0xa}, {0x4, 0x4}, {0x5, 0x3}, {0x4, 0x4}, {0x1, 0x7}]}, @NL80211_TXRATE_VHT={0x14, 0x3, {[0x7ff, 0xc, 0x1, 0x9, 0x80, 0x101, 0xffff, 0xe10]}}]}, @NL80211_BAND_2GHZ={0x38, 0x0, 0x0, 0x1, [@NL80211_TXRATE_VHT={0x14, 0x3, {[0x8000, 0x0, 0x5, 0xfe01, 0x9, 0x7ff, 0x0, 0x5]}}, @NL80211_TXRATE_HT={0x1e, 0x2, [{0x7, 0x2}, {0x3, 0x3}, {0x4, 0x7}, {0x6}, {0x5, 0x3}, {}, {0x2, 0xa}, {0x4, 0x9}, {0x5, 0x6}, {0x5, 0x6}, {0x3, 0x6}, {0x3, 0x5}, {0x3, 0x2}, {0x4, 0x7}, {0x4, 0x2}, {0x5, 0x3}, {}, {0x6, 0x7}, {0x2, 0x1}, {0x5, 0x8}, {0x0, 0xa}, {0x3, 0x2}, {0x5, 0x4}, {0x7}, {0x0, 0x6}, {0x3, 0x3}]}]}]}, @NL80211_ATTR_TX_RATES={0x620, 0x5a, 0x0, 0x1, [@NL80211_BAND_60GHZ={0xa8, 0x2, 0x0, 0x1, [@NL80211_TXRATE_HT={0x2c, 0x2, [{0x4, 0xa}, {0x4, 0x6}, {0x2, 0x7}, {0x7, 0x1}, {0x1, 0x7}, {0x0, 0x5}, {0x7, 0x9}, {0x0, 0x4}, {0x0, 0x4}, {0x6, 0x9}, {0x2, 0x5}, {0x0, 0x3}, {0x3, 0x4}, {0x5, 0xa}, {0x2, 0x6}, {0x6, 0x4}, {0x2, 0x8}, {0x3, 0x7}, {0x2}, {0x7, 0x7}, {0x0, 0x6}, {0x6, 0x6}, {0x1, 0x7}, {0x3}, {0x4, 0x4}, {0x5, 0x9}, {0x2}, {0x0, 0x6}, {0x1, 0x5}, {0x1, 0x4}, {0x1, 0x7}, {0x4, 0x3}, {0x5, 0x7}, {0x1, 0xa}, {0x4, 0x5}, {0x7, 0x1}, {0x6, 0x5}, {0x3, 0x9}, {0x4, 0x2}, {0x3, 0xa}]}, @NL80211_TXRATE_HT={0x33, 0x2, [{0x5, 0xa}, {0x7, 0x3}, {0x5, 0x1}, {0x0, 0x8}, {0x2, 0x6}, {0x6, 0x8}, {0x6, 0x7}, {0x2}, {0x2, 0x7}, {0x5, 0x7}, {0x4, 0x9}, {0x0, 0x3}, {0x1, 0x1}, {0x3, 0x9}, {0x2, 0x1}, {0x6, 0x7}, {0x2, 0x9}, {0x7, 0x1}, {0x7, 0x5}, {0x2}, {0x1, 0x8}, {0x4, 0x6}, {0x0, 0xa}, {0x1, 0x4}, {0x2, 0x4}, {0x7, 0x2}, {0x4}, {0x1, 0x7}, {0x7, 0x9}, {0x4, 0x4}, {0x1, 0x9}, {0x6, 0x8}, {0x6, 0x8}, {0x2, 0x8}, {0x7, 0xa}, {0x3, 0x2}, {0x5, 0x3}, {0x0, 0x7}, {0x1, 0x1}, {0x6, 0x9}, {0x0, 0x4}, {0x1, 0x1}, {0x7, 0x2}, {0x0, 0x2}, {0x5, 0x8}, {}, {0x4, 0x4}]}, @NL80211_TXRATE_LEGACY={0x1f, 0x1, [0x2, 0x35, 0x18, 0x1, 0x6c, 0xc, 0xc, 0x24, 0x7f, 0x6, 0x24, 0x16, 0x9, 0x24, 0x2, 0xc, 0x6c, 0x60, 0x36, 0x1, 0x4, 0x12, 0x16, 0x30, 0x48, 0x60, 0x1]}, @NL80211_TXRATE_HT={0x22, 0x2, [{0x0, 0x7}, {0x3, 0x2}, {0x6, 0x7}, {0x5, 0x6}, {0x4, 0x3}, {0x6, 0xa}, {0x7, 0x6}, {0x3, 0x3}, {}, {0x7, 0x5}, {0x0, 0x8}, {0x4, 0x7}, {0x1, 0x8}, {0x7, 0xa}, {0x1, 0x7}, {0x7, 0x8}, {0x6, 0x1}, {0x6, 0x6}, {0x0, 0x7}, {0x0, 0x5}, {0x2, 0xa}, {0x7, 0xa}, {0x5, 0xa}, {0x7, 0x9}, {0x6, 0x2}, {0x1, 0x3}, {0x0, 0x6}, {0x4, 0xa}, {0x0, 0x9}, {0x2}]}]}, @NL80211_BAND_60GHZ={0x48, 0x2, 0x0, 0x1, [@NL80211_TXRATE_VHT={0x14, 0x3, {[0x40, 0x0, 0x6, 0x7, 0x0, 0xff, 0x8, 0x7]}}, @NL80211_TXRATE_GI={0x5, 0x4, 0x3}, @NL80211_TXRATE_VHT={0x14, 0x3, {[0x0, 0x7, 0x9, 0x7fff, 0x6, 0x1000, 0x8, 0x3f]}}, @NL80211_TXRATE_LEGACY={0x13, 0x1, [0x24, 0x12, 0x2, 0x6, 0x18, 0x30, 0x36, 0x16, 0xc, 0x4, 0x6c, 0x30, 0x4, 0x60, 0x2]}]}, @NL80211_BAND_6GHZ={0x88, 0x3, 0x0, 0x1, [@NL80211_TXRATE_HT={0x1b, 0x2, [{0x3, 0x2}, {0x1, 0x2}, {0x1, 0x7}, {0x7, 0x5}, {0x7, 0x7}, {0x6, 0x2}, {0x0, 0x9}, {0x2, 0x7}, {0x5, 0x8}, {0x1, 0x7}, {0x5, 0xa}, {0x0, 0x1}, {0x5, 0x5}, {0x6, 0x3}, {0x0, 0x4}, {0x6, 0x6}, {0x0, 0x9}, {0x7, 0x2}, {0x5, 0x3}, {0x1, 0x3}, {0x2, 0x7}, {0x0, 0x6}, {0x3, 0x6}]}, @NL80211_TXRATE_GI={0x5}, @NL80211_TXRATE_LEGACY={0x8, 0x1, [0xc, 0x2, 0x5, 0x4]}, @NL80211_TXRATE_HT={0x2b, 0x2, [{0x0, 0x5}, {0x6, 0x5}, {0x4, 0xa}, {0x1, 0x7}, {0x5, 0xa}, {0x4, 0x6}, {0x1, 0x8}, {0x3, 0xa}, {0x6, 0x6}, {0x5, 0x7}, {0x7, 0x4}, {0x0, 0x9}, {0x0, 0x4}, {0x0, 0x7}, {0x5, 0x5}, {0x0, 0x4}, {}, {0x6, 0xa}, {0x1, 0x3}, {0x0, 0x5}, {0x3, 0x7}, {0x1}, {0x5, 0x2}, {0x0, 0x5}, {0x7, 0x2}, {0x6, 0x9}, {0x1, 0x8}, {0x5, 0xa}, {0x2, 0x9}, {0x7, 0x1}, {0x5, 0x7}, {0x3, 0x1}, {0x2, 0x3}, {0x5}, {0x0, 0x4}, {0x1, 0x5}, {0x6, 0x5}, {0x0, 0x1}, {0x6, 0xa}]}, @NL80211_TXRATE_LEGACY={0x4}, @NL80211_TXRATE_VHT={0x14, 0x3, {[0x2, 0x20, 0x7f, 0x100, 0x9, 0x1f, 0x7, 0x9]}}, @NL80211_TXRATE_VHT={0x14, 0x3, {[0x5, 0x100, 0x0, 0x5, 0x6, 0x0, 0x9, 0x8]}}]}, @NL80211_BAND_2GHZ={0xe0, 0x0, 0x0, 0x1, [@NL80211_TXRATE_LEGACY={0x1d, 0x1, [0x16, 0x60, 0x3, 0x5, 0x16, 0x5, 0x2, 0x9, 0x6, 0xc, 0x0, 0x3, 0x60, 0x1, 0x18, 0x1, 0x6c, 0x1b, 0x48, 0x8235d04bdfd5203a, 0x24, 0x1b, 0xc, 0x48, 0xc]}, @NL80211_TXRATE_LEGACY={0x21, 0x1, [0x9, 0x6c, 0x30, 0x6c, 0x6, 0x6c, 0x36, 0x24, 0x9, 0x1b, 0x14, 0x6c, 0x4, 0x24, 0x18, 0xc, 0x2, 0x1b, 0x37196a13fe1d3f71, 0x18, 0x36, 0x6c, 0x1, 0x24, 0x2, 0x7b, 0x9, 0x0, 0x12]}, @NL80211_TXRATE_HT={0x3f, 0x2, [{0x5, 0x9}, {0x7, 0x7}, {0x4, 0x2}, {0x6, 0x7}, {0x0, 0x9}, {0x6}, {0x4, 0x1}, {0x0, 0x9}, {0x6, 0x8}, {0x2, 0x6}, {0x4, 0x6}, {0x2, 0x2}, {0x1, 0x9}, {0x1, 0x3}, {0x7, 0x3}, {0x6, 0x8}, {0x7, 0x1}, {0x0, 0x3}, {0x1, 0x3}, {0x6}, {0x2, 0xa}, {0x5, 0x4}, {0x3, 0x1}, {0x3, 0x2}, {0x4, 0x8}, {0x3}, {0x5, 0xa}, {0x6, 0x7}, {0x3, 0x8}, {0x7, 0x8}, {0x3, 0x9}, {0x0, 0xa}, {0x3, 0xa}, {0x3, 0x6}, {0x4, 0x3}, {0x0, 0x8}, {0x1}, {0x6, 0x9}, {0x6, 0x9}, {0x7, 0x6}, {0x3, 0xa}, {0x1, 0x2}, {0x1, 0x9}, {0x5, 0x4}, {0x1, 0x3}, {0x5, 0xa}, {0x0, 0x1}, {0x3, 0x7}, {0x0, 0x8}, {0x7}, {0x0, 0x7}, {0x1, 0x2}, {0x1, 0x9}, {0x5, 0x5}, {0x4, 0x9}, {0x1, 0xa}, {0x2, 0x8}, {0x1, 0x5}, {0x2}]}, @NL80211_TXRATE_LEGACY={0x1a, 0x1, [0x5, 0xb, 0xc, 0x24, 0x4, 0x4, 0x0, 0x2, 0x7ce3bb923afc0749, 0x5, 0x6c, 0x60, 0x12, 0x4, 0x60, 0xc, 0x4, 0x5, 0x9, 0x12, 0x9, 0x1]}, @NL80211_TXRATE_LEGACY={0x4}, @NL80211_TXRATE_VHT={0x14, 0x3, {[0x8, 0x400, 0x3, 0xfff7, 0x400, 0x80, 0x0, 0xb947]}}, @NL80211_TXRATE_GI={0x5, 0x4, 0x1}, @NL80211_TXRATE_GI={0x5}, @NL80211_TXRATE_VHT={0x14, 0x3, {[0x3, 0x0, 0x8001, 0xfe9a, 0x34ba, 0x81, 0x3ff, 0xfeff]}}]}, @NL80211_BAND_2GHZ={0x28, 0x0, 0x0, 0x1, [@NL80211_TXRATE_LEGACY={0x23, 0x1, [0x3, 0x48, 0x12, 0x18, 0x3, 0x41, 0x1b, 0x12, 0x16, 0x24, 0x30, 0x0, 0x60, 0x0, 0x3, 0x3, 0x36, 0x24, 0xb, 0x9, 0x48, 0x1b, 0xb, 0x36, 0x1, 0x6, 0x2, 0x30, 0x4, 0x18, 0x2]}]}, @NL80211_BAND_6GHZ={0x11c, 0x3, 0x0, 0x1, [@NL80211_TXRATE_HT={0x34, 0x2, [{0x2, 0x6}, {0x5}, {0x1}, {0x2, 0x1}, {0x7, 0x6}, {0x6, 0x1}, {0x1, 0x4}, {0x4, 0x4}, {0x2, 0xa}, {0x0, 0x2}, {0x2, 0x5}, {0x6, 0x7}, {0x1, 0x8}, {0x0, 0x4}, {0x2, 0x1}, {0x1}, {0x0, 0x7}, {0x4, 0x7}, {0x7, 0xa}, {0x0, 0x8}, {0x2, 0x1}, {0x1, 0xa}, {0x0, 0x6}, {0x1}, {0x5, 0x3}, {0x0, 0x2}, {0x6, 0x8}, {0x1}, {0x4, 0x9}, {0x7, 0x1}, {0x6}, {0x7}, {0x7, 0x5}, {0x7, 0x2}, {0x4, 0x1}, {0x0, 0x2}, {0x7}, {0x2, 0xa}, {0x1, 0x5}, {0x4, 0x9}, {0x3}, {0x4, 0x2}, {0x5, 0x3}, {0x4, 0x3}, {0x3, 0x5}, {0x7, 0x9}, {0x1, 0x8}, {0x7}]}, @NL80211_TXRATE_HT={0x35, 0x2, [{0x7, 0xa}, {0x1, 0x1}, {0x1, 0x2}, {0x4, 0x9}, {0x5, 0x7}, {0x5, 0x5}, {0x4, 0x9}, {0x1, 0x5}, {0x3}, {0x0, 0x1}, {0x1, 0xa}, {0x2, 0x2}, {0x6}, {0x7, 0x4}, {0x1, 0x9}, {0x6, 0x6}, {0x5, 0x1}, {0x1, 0x8}, {0x6, 0x7}, {0x7, 0x8}, {0x1}, {0x6, 0x6}, {0x2, 0x1}, {0x2, 0x6}, {0x0, 0xa}, {0x2, 0x5}, {0x2, 0x8}, {0x7, 0x3}, {0x2, 0x9}, {0x3, 0x4}, {0x7, 0x8}, {0x1, 0xa}, {0x5, 0x2}, {0x1, 0x9}, {0x6, 0xa}, {0x6, 0x9}, {0x4, 0x7}, {0x7, 0x7}, {0x0, 0x6}, {0x1, 0x3}, {0x5, 0x6}, {0x2, 0x9}, {0x2, 0x5}, {0x4, 0x7}, {0x3, 0x4}, {0x6, 0x1}, {0x5, 0x4}, {0x0, 0x8}, {0x0, 0x5}]}, @NL80211_TXRATE_LEGACY={0x1b, 0x1, [0x60, 0x6c, 0x9, 0x60, 0x3, 0x1b, 0x6c, 0x16, 0x3, 0x16, 0x1b, 0x3, 0x5, 0xb, 0x3, 0x3, 0x16, 0xc, 0x6c, 0x6, 0x4, 0x18, 0x1b]}, @NL80211_TXRATE_HT={0x21, 0x2, [{0x0, 0x5}, {0x5, 0x6}, {0x3, 0x9}, {0x3, 0x5}, {0x4, 0x5}, {0x3, 0x3}, {0x6, 0x2}, {0x7, 0x1}, {0x2, 0x4}, {0x1, 0x9}, {0x0, 0x6}, {0x5, 0x8}, {0x4, 0x5}, {0x4, 0x2}, {0x1, 0x7}, {0x0, 0xa}, {0x4, 0x4}, {0x7, 0x5}, {0x7, 0x5}, {0x0, 0x6}, {0x0, 0x3}, {0x4, 0x6}, {0x0, 0x2}, {0x0, 0x2}, {0x7, 0x8}, {0x0, 0x8}, {0x1, 0xa}, {0x2, 0x8}, {0x2, 0x5}]}, @NL80211_TXRATE_LEGACY={0x14, 0x1, [0xc, 0x5, 0x4, 0x3, 0x60, 0x18, 0x16, 0x24, 0x9, 0x16, 0x24, 0x9, 0x6, 0x18, 0x2, 0x9]}, @NL80211_TXRATE_GI={0x5, 0x4, 0x1}, @NL80211_TXRATE_GI={0x5, 0x4, 0x1}, @NL80211_TXRATE_HT={0xe, 0x2, [{0x2, 0x5}, {0x1, 0x3}, {0x0, 0x6}, {0x7, 0x1}, {0x4, 0x5}, {0x3, 0x6}, {0x0, 0x4}, {0x6, 0x5}, {0x0, 0x1}, {0x6}]}, @NL80211_TXRATE_HT={0xa, 0x2, [{0x1}, {0x2, 0x9}, {0x4, 0x1}, {0x7, 0x2}, {0x6, 0x8}, {0x2}]}, @NL80211_TXRATE_HT={0x29, 0x2, [{0x6, 0x2}, {0x5, 0x3}, {0x1, 0x9}, {0x3, 0x3}, {0x0, 0x2}, {0x6, 0x6}, {0x5, 0x6}, {0x2, 0x9}, {0x3, 0x4}, {0x6, 0x3}, {0x1, 0xa}, {0x4}, {0x1, 0x3}, {0x4, 0x8}, {0x0, 0x1}, {0x4, 0x6}, {0x6}, {0x3, 0x8}, {0x2}, {}, {0x3, 0x6}, {0x2, 0x7}, {0x4, 0x1}, {0x4, 0x4}, {0x0, 0x3}, {0x7, 0x1}, {0x0, 0x4}, {0x0, 0x9}, {0x3, 0x2}, {0x0, 0x2}, {0x2, 0x4}, {0x0, 0x1}, {0x2, 0x2}, {0x4, 0x3}, {0x4, 0x3}, {0x3, 0x4}, {0x4, 0x3}]}]}, @NL80211_BAND_6GHZ={0x168, 0x3, 0x0, 0x1, [@NL80211_TXRATE_HT={0x11, 0x2, [{0x3, 0x4}, {0x5, 0x2}, {0x0, 0x9}, {0x2, 0x5}, {0x2, 0x3}, {0x2, 0x2}, {0x1, 0x3}, {0x5, 0x2}, {0x0, 0x8}, {0x2, 0x1}, {0x6, 0x1}, {0x2, 0xa}, {0x2, 0x6}]}, @NL80211_TXRATE_HT={0x3e, 0x2, [{0x3, 0x5}, {0x5}, {0x6, 0x2}, {0x3, 0x1}, {0x5}, {0x0, 0x4}, {0x2, 0x5}, {0x3, 0x8}, {0x4, 0x6}, {0x1, 0xa}, {0x0, 0x8}, {0x0, 0x3}, {0x5, 0x4}, {0x2, 0x6}, {0x6, 0x8}, {0x5, 0x9}, {0x0, 0x2}, {0x1, 0x7}, {0x0, 0x5}, {0x6}, {0x3}, {0x5, 0x5}, {0x6, 0x2}, {0x6, 0x4}, {0x4, 0x5}, {0x1, 0x7}, {0x2, 0x5}, {0x1, 0x8}, {0x0, 0x6}, {0x4, 0x1}, {0x6, 0x7}, {0x5, 0x1}, {0x4, 0x1}, {0x5}, {0x7, 0x7}, {0x3, 0x4}, {0x2, 0x2}, {0x2, 0x1}, {0x7, 0x1}, {0x5, 0x4}, {0x7, 0xa}, {0x5, 0x2}, {0x3, 0x7}, {0x0, 0x1}, {0x0, 0x9}, {0x4}, {0x4, 0x8}, {0x6, 0x3}, {0x6, 0x9}, {0x5, 0x6}, {0x4, 0x9}, {0x5, 0x8}, {0x1, 0x1}, {0x0, 0x6}, {0x4, 0xa}, {0x4, 0x7}, {0x1, 0x9}, {0x7, 0x2}]}, @NL80211_TXRATE_LEGACY={0x5, 0x1, [0x24]}, @NL80211_TXRATE_LEGACY={0x21, 0x1, [0x4, 0x6, 0x30, 0x3, 0x6c, 0x30, 0x2, 0x36, 0x4, 0x6, 0x1, 0x18, 0x12, 0x6, 0x2, 0x4, 0x49, 0x16, 0x2, 0xc, 0x1b, 0x6, 0x0, 0x18, 0x6c, 0x4, 0x5, 0x5, 0x30]}, @NL80211_TXRATE_VHT={0x14, 0x3, {[0xff01, 0x6, 0x80, 0x0, 0x4, 0x6, 0x8, 0x1]}}, @NL80211_TXRATE_HT={0x3b, 0x2, [{0x4, 0x9}, {0x3, 0x5}, {0x2, 0xa}, {0x7, 0x9}, {0x4, 0x1}, {0x6, 0x2}, {0x6, 0x9}, {0x0, 0x4}, {0x0, 0x1}, {0x3, 0x2}, {0x3, 0x2}, {0x1, 0x6}, {0x2, 0x7}, {0x0, 0x6}, {0x5, 0x1}, {0x7, 0x3}, {0x6, 0x7}, {0x4, 0xd}, {0x4, 0x3}, {0x7, 0x2}, {0x3}, {0x5, 0x2}, {0x4, 0x2}, {0x5, 0x6}, {0x0, 0x3}, {0x3}, {0x1, 0x6}, {0x5, 0xa}, {}, {0x6, 0x7}, {0x0, 0x2}, {0x6, 0x8}, {0x3, 0x4}, {0x0, 0x5}, {0x4, 0x4}, {0x1, 0x2}, {0x0, 0x7}, {0x2, 0x4}, {0x3, 0x6}, {0x1, 0x1}, {0x0, 0x2}, {0x0, 0x7}, {0x7, 0x5}, {0x0, 0x3}, {0x6, 0x8}, {0x0, 0xa}, {0x7, 0x5}, {0x0, 0x7}, {0x3, 0xa}, {0x7, 0x8}, {0x2, 0x4}, {0x2, 0x1}, {0x2, 0x7}, {0x7, 0x6}, {0x7, 0x1}]}, @NL80211_TXRATE_HT={0x3e, 0x2, [{0x3, 0x7}, {0x4, 0x4}, {0x2, 0x5}, {0x0, 0x6}, {0x0, 0x2}, {0x7, 0x6}, {0x4, 0x8}, {0x6, 0x8}, {0x4, 0x5}, {0x0, 0x3}, {0x6, 0x3}, {0x0, 0x1}, {0x0, 0x3}, {0x2, 0x9}, {0x6, 0xa}, {0x1, 0x3}, {0x4, 0x1}, {0x4, 0x6}, {0x7, 0x5}, {0x3, 0x8}, {0x4, 0xa}, {0x1, 0x9}, {0x6}, {0x5, 0x9}, {0x2, 0x6}, {0x5, 0x9}, {0x6, 0x2}, {0x6, 0x4}, {0x5, 0x2}, {0x7, 0x4}, {0x4, 0x4}, {0x4, 0x6}, {0x5, 0x4}, {0x0, 0x3}, {}, {0x0, 0x4}, {0x5, 0x9}, {0x1, 0x7}, {0x3, 0x8}, {0x4, 0x6}, {0x3}, {0x3, 0x4}, {0x1, 0x4}, {0x4, 0x4}, {0x6, 0x9}, {0x5}, {0x7, 0x5}, {0x2, 0x7}, {0x1, 0x2}, {0x6, 0x5}, {0x2}, {0x4}, {0x7, 0x9}, {0x4, 0x1}, {0x3, 0x6}, {0x1, 0x4}, {0x5, 0x3}, {0x1, 0x5}]}, @NL80211_TXRATE_GI={0x5}, @NL80211_TXRATE_HT={0x38, 0x2, [{0x5, 0x8}, {0x3, 0xa}, {0x1, 0x8}, {0x4, 0x3}, {0x3, 0x3}, {0x4, 0x5}, {0x7, 0x2}, {0x1, 0x9}, {0x1, 0x8}, {0x3, 0x2}, {0x5, 0x5}, {0x0, 0x1}, {0x7, 0x6}, {0x5, 0x9}, {}, {0x7, 0xa}, {0x3, 0x6}, {0x0, 0x7}, {0x0, 0x3}, {}, {0x1, 0x9}, {0x6, 0x3}, {0x3, 0x1}, {}, {0x4, 0x7}, {0x0, 0x2}, {0x1}, {0x1, 0x5}, {0x0, 0xa}, {0x1, 0x8}, {0x2, 0x2}, {0x0, 0x9}, {0x0, 0x7}, {0x7, 0x8}, {0x7, 0x1}, {0x2, 0x9}, {0x1}, {0x2, 0x6}, {0x2, 0x6}, {0x2, 0x9}, {0x0, 0x9}, {0x2, 0x3}, {0x5}, {0x5, 0x9}, {0x1, 0x1}, {0x3, 0x1}, {0x1, 0x8}, {0x1, 0x3}, {0x3, 0x9}, {0x7, 0x7}, {0x4, 0x3}, {0x3, 0x9}]}, @NL80211_TXRATE_VHT={0x14, 0x3, {[0x2, 0x7f, 0xfa89, 0xdf5a, 0xc8, 0x0, 0xfc00, 0x14e]}}]}, @NL80211_BAND_6GHZ={0x68, 0x3, 0x0, 0x1, [@NL80211_TXRATE_GI={0x5, 0x4, 0x1}, @NL80211_TXRATE_GI={0x5, 0x4, 0x2}, @NL80211_TXRATE_GI={0x5, 0x4, 0x2}, @NL80211_TXRATE_LEGACY={0x7, 0x1, [0x30, 0xb, 0x36]}, @NL80211_TXRATE_LEGACY={0x1d, 0x1, [0x1, 0x1b, 0x1, 0xc, 0x70, 0xc, 0x12, 0x18, 0x36, 0xc, 0x6, 0x9, 0x4, 0x12, 0x4e, 0xb, 0x48, 0x1, 0x36, 0x24, 0xb, 0x6, 0x5, 0x60, 0x2]}, @NL80211_TXRATE_HT={0x24, 0x2, [{0x2, 0x6}, {0x3, 0x7}, {0x6, 0x6}, {0x0, 0x2}, {0x4, 0xa}, {0x4, 0x9}, {0x7, 0x6}, {0x7, 0x5}, {0x1, 0x7}, {0x2}, {0x2, 0x6}, {0x6, 0x5}, {0x2, 0x5}, {0x4, 0x9}, {0x3, 0x4}, {0x6, 0x4}, {0x5, 0xa}, {0x4, 0x5}, {0x4, 0x4}, {0x6, 0x7}, {0x1, 0x2}, {0x1, 0xa}, {0x7, 0xa}, {0x7, 0x6}, {0x1, 0x7}, {0x7, 0x4}, {0x6, 0x3}, {0x2, 0x7}, {0x7, 0x9}, {0x7, 0x2}, {0x2}, {0x0, 0x6}]}]}, @NL80211_BAND_60GHZ={0xb0, 0x2, 0x0, 0x1, [@NL80211_TXRATE_HT={0x1a, 0x2, [{0x6, 0x2}, {0x1, 0x2}, {0x4, 0x7}, {0x2, 0x7}, {0x1, 0x9}, {0x4, 0x1}, {0x5, 0x8}, {0x0, 0x3}, {0x0, 0x5}, {0x2, 0xa}, {}, {0x5, 0x1}, {0x7, 0x3}, {0x5, 0x4}, {0x4, 0x5}, {0x5, 0xa}, {0x2, 0x2}, {0x0, 0x2}, {0x7, 0x9}, {0x3, 0x7}, {0x5}, {0x0, 0x2}]}, @NL80211_TXRATE_LEGACY={0x1c, 0x1, [0x6c, 0x6c, 0x0, 0x48, 0x3, 0x9, 0x6, 0x2, 0x12, 0x6c, 0x5, 0x9, 0xb, 0x12, 0x18, 0xc, 0x6c, 0xc, 0x2, 0x48, 0x36, 0x16, 0x9, 0x6c]}, @NL80211_TXRATE_GI={0x5, 0x4, 0x1}, @NL80211_TXRATE_LEGACY={0x1d, 0x1, [0x36, 0x12, 0x12, 0x36, 0x9, 0xc, 0x5, 0x5, 0x1, 0x65, 0x48, 0x5, 0x12, 0x4, 0x5, 0x9, 0x1, 0x30, 0x5, 0x30, 0x16, 0x3, 0x30, 0x60, 0x6c]}, @NL80211_TXRATE_HT={0x7, 0x2, [{0x2, 0x9}, {0x1, 0x8}, {0x7, 0x5}]}, @NL80211_TXRATE_GI={0x5, 0x4, 0x3}, @NL80211_TXRATE_VHT={0x14, 0x3, {[0x94, 0x0, 0x5, 0x1, 0x7f, 0x38, 0x1, 0x7ff]}}, @NL80211_TXRATE_HT={0x28, 0x2, [{0x2, 0xa}, {0x3, 0xa}, {0x1, 0x4}, {0x4, 0x9}, {0x5, 0x6}, {0x2, 0x9}, {0x1, 0x4}, {0x4, 0x9}, {0x5, 0x5}, {0x2, 0x4}, {0x6, 0x2}, {0x0, 0x7}, {0x1, 0x4}, {0x2, 0x5}, {0x3, 0x2}, {0x0, 0x7}, {0x5, 0x4}, {0x0, 0x2}, {0x2, 0x8}, {0x5, 0x3}, {0x1, 0x2}, {0x4, 0x7}, {0x5}, {0x3}, {0x1, 0x4}, {0x4, 0x8}, {0x6, 0x3}, {0x3, 0x3}, {0x0, 0x7}, {0x0, 0x5}, {0x0, 0x1}, {0x5, 0x7}, {0x6, 0x1}, {0x1, 0x8}, {0x2, 0x7}, {0x2}]}]}]}, @NL80211_ATTR_TX_RATES={0x118, 0x5a, 0x0, 0x1, [@NL80211_BAND_2GHZ={0xc, 0x0, 0x0, 0x1, [@NL80211_TXRATE_GI={0x5, 0x4, 0x1}]}, @NL80211_BAND_60GHZ={0x20, 0x2, 0x0, 0x1, [@NL80211_TXRATE_GI={0x5, 0x4, 0x1}, @NL80211_TXRATE_VHT={0x14, 0x3, {[0xb0e, 0x3, 0x9, 0x200, 0x3ff, 0x9, 0x0, 0x1ff]}}]}, @NL80211_BAND_5GHZ={0x38, 0x1, 0x0, 0x1, [@NL80211_TXRATE_VHT={0x14, 0x3, {[0x81, 0xfff9, 0x8, 0x759, 0x6, 0x7, 0x4c2, 0x32]}}, @NL80211_TXRATE_HT={0x15, 0x2, [{0x1, 0x8}, {0x2, 0x4}, {0x6, 0x6}, {0x3, 0x8}, {0x1, 0x1}, {0x1, 0x6}, {0x1, 0x2}, {0x0, 0x7}, {0x5, 0x6}, {0x0, 0x8}, {0x1, 0x5}, {0x3}, {0x7, 0x2}, {0x7, 0xa}, {0x0, 0x7}, {0x1, 0x3}, {0x2, 0x5}]}, @NL80211_TXRATE_GI={0x5}]}, @NL80211_BAND_2GHZ={0xc, 0x0, 0x0, 0x1, [@NL80211_TXRATE_GI={0x5, 0x4, 0x2}]}, @NL80211_BAND_60GHZ={0x68, 0x2, 0x0, 0x1, [@NL80211_TXRATE_HT={0x22, 0x2, [{0x3, 0x6}, {0x5, 0xa}, {0x5, 0x3}, {0x2, 0x3}, {0x4, 0x6}, {0x3, 0x5}, {0x0, 0x4}, {0x2, 0x5}, {0x7, 0x3}, {0x4, 0x2}, {0x1, 0x5}, {0x7, 0x6}, {0x0, 0x2}, {0x5, 0x7}, {0x1, 0x7}, {0x0, 0xa}, {0x7}, {0x6, 0x1}, {0x7, 0x1}, {0x1, 0x1}, {0x1, 0xa}, {0x2, 0xa}, {0x7, 0x1}, {0x1, 0x7}, {0x5, 0xa}, {0x4, 0x8}, {0x7, 0x4}, {0x1, 0x1}, {0x2, 0xa}, {0x5, 0x6}]}, @NL80211_TXRATE_LEGACY={0x1e, 0x1, [0x60, 0x2, 0xb, 0x1, 0x16, 0x48, 0x4, 0x1, 0x12, 0x3, 0x36, 0xc, 0x18, 0x24, 0x12, 0x3, 0x5, 0x12, 0x2, 0x4, 0x24, 0x6d, 0x9, 0x6c, 0x30, 0x1]}, @NL80211_TXRATE_HT={0x1e, 0x2, [{0x1, 0x4}, {0x0, 0x8}, {0x0, 0x9}, {0x5, 0xa}, {0x3, 0x8}, {0x1, 0x2}, {0x4, 0x8}, {0x5, 0x2}, {0x2, 0x7}, {0x5, 0x9}, {0x7, 0x6}, {0x2, 0x7}, {0x1, 0x3}, {0x1, 0x1}, {0x1, 0x1}, {0x2, 0x8}, {0x6, 0x1}, {0x2, 0x3}, {0x7, 0x3}, {0x6, 0x4}, {0x6, 0x8}, {0x2, 0x9}, {0x7, 0x6}, {0x6, 0x6}, {0x3, 0x5}, {0x4}]}]}, @NL80211_BAND_2GHZ={0x30, 0x0, 0x0, 0x1, [@NL80211_TXRATE_LEGACY={0x18, 0x1, [0x2, 0x0, 0x36, 0x48, 0x9, 0x1b, 0x36, 0x18, 0x1, 0x74, 0x6, 0x24, 0x6, 0x0, 0x16, 0xb, 0xc, 0x24, 0x3, 0x1e]}, @NL80211_TXRATE_LEGACY={0x11, 0x1, [0x16, 0x2, 0x21, 0x48, 0x18, 0x16, 0x9, 0x1b, 0x1b, 0x6a, 0x1, 0x9, 0xb]}]}, @NL80211_BAND_2GHZ={0xc, 0x0, 0x0, 0x1, [@NL80211_TXRATE_GI={0x5, 0x4, 0x1}]}]}]}, 0x143c}, 0x1, 0x0, 0x0, 0x8000}, 0x4004048) getsockopt$sock_buf(r2, 0x1, 0x3b, 0x0, &(0x7f0000000100)) splice(r1, &(0x7f0000000000)=0x32, r2, &(0x7f0000000040)=0x7, 0x1, 0xc) fcntl$addseals(r0, 0x409, 0x0) 06:08:24 executing program 4: r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000040), 0xffffffffffffffff) syz_genetlink_get_family_id$ethtool(&(0x7f0000000100), 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_PAUSE_SET(0xffffffffffffffff, &(0x7f0000000440)={0x0, 0x0, 0x0}, 0x0) r2 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000080)='smaps\x00') pread64(r2, &(0x7f00000000c0)=""/98, 0x62, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x7fffffff) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(0xffffffffffffffff, 0xc0189374, &(0x7f0000000240)={{0x1, 0x1, 0x18, r0, {0x8}}, './file0\x00'}) dup3(0xffffffffffffffff, r2, 0x0) r3 = socket$inet_icmp_raw(0x2, 0x3, 0x1) syz_genetlink_get_family_id$ethtool(&(0x7f0000000180), r2) socket$nl_audit(0x10, 0x3, 0x9) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000040)={'wlan1\x00', 0x0}) sendmsg$inet(r3, &(0x7f0000000780)={&(0x7f0000000000)={0x2, 0x0, @local}, 0x10, &(0x7f00000003c0)=[{&(0x7f0000000300)="6fb9", 0xffeb}], 0x1, &(0x7f0000000700)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {r4, @remote, @broadcast}}}], 0x20}, 0x0) r5 = socket$inet_icmp_raw(0x2, 0x3, 0x1) socket$nl_audit(0x10, 0x3, 0x9) sendmsg$inet(r5, &(0x7f0000000780)={&(0x7f0000000000)={0x2, 0x0, @local}, 0x10, &(0x7f00000003c0)=[{&(0x7f0000000300)="6fb9", 0xffeb}], 0x1, &(0x7f0000000700)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @remote, @broadcast}}}], 0x20}, 0x0) sendmsg$ETHTOOL_MSG_LINKINFO_GET(r2, &(0x7f0000000200)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f00000001c0)={&(0x7f0000000340)=ANY=[@ANYBLOB='@\x00\x00\x00', @ANYRES16=r1, @ANYBLOB="000427bd7000ffdbdf25020000002c00018008000100", @ANYRES32=0x0, @ANYBLOB='\b\x00C\x00\x00\x00\x00\x00\b\x00!\x00', @ANYRES32=r4, @ANYRES32=0x0, @ANYBLOB], 0x40}, 0x1, 0x0, 0x0, 0x4}, 0xd0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000480), 0x1}, 0x603}, 0x0, 0xffffffefffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000040)=[{&(0x7f0000010000)="601c6d6b646f736689254300080120000400004000f8000020004000030000000000000001", 0x25}, {0x0, 0x0, 0x10000}], 0x0, &(0x7f0000000040)=ANY=[]) [ 2019.827015] loop4: detected capacity change from 0 to 256 06:08:24 executing program 1: pipe(&(0x7f0000000340)={0xffffffffffffffff}) pread64(r0, &(0x7f0000000440)=""/95, 0x5f, 0x6) execveat(r0, &(0x7f0000000080)='./file0\x00', &(0x7f00000001c0)=[&(0x7f00000000c0)='\x00', &(0x7f0000000180)='\x00'], &(0x7f0000000400)=[&(0x7f0000000200)='/dev/zero\x00', &(0x7f0000000240)='/dev/zero\x00', &(0x7f0000000300)='/dev/zero\x00'], 0x1000) socket$inet(0x2, 0x1, 0x0) perf_event_open(&(0x7f0000000100)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x22420, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ptrace$setopts(0x4200, 0x0, 0x5, 0x100050) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000004c00)={0xc0002100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) gettid() r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000), 0x380, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000000)='net/udp6\x00') read$hiddev(r2, &(0x7f0000001140)=""/212, 0xd4) fchmodat(r2, &(0x7f00000004c0)='./file0\x00', 0x0) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(r1, 0xc018937c, &(0x7f0000000380)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32=r0, @ANYBLOB="00000000000000002e2f66696cee8816"]) ioctl$TIOCSSOFTCAR(r3, 0x541a, &(0x7f00000003c0)=0x6) waitid$P_PIDFD(0x3, r1, &(0x7f0000000500), 0x2, &(0x7f0000000580)) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(r1, 0xc0189372, &(0x7f0000000040)={{0x1, 0x1, 0x18, r2, {0xffff}}, './file0\x00'}) 06:08:24 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000702000019000000900100000f000000000000000100000005000000000004000040000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000001000018000000c28500002b02", 0x66, 0x400}, {&(0x7f0000010100)="000000000000000000000000e8f7d2e8feeb4bf889ba053b02420ff8010040", 0x1f, 0x4e0}], 0x0, &(0x7f0000000140)=ANY=[]) [ 2019.854807] FAT-fs (loop4): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) 06:08:24 executing program 3: r0 = getpid() ioprio_get$pid(0x2, r0) r1 = getpid() ioprio_get$pid(0x2, r1) syz_mount_image$vfat(0x0, &(0x7f0000000040)='./file1\x00', 0x0, 0x0, &(0x7f00000000c0), 0x2002000, &(0x7f0000000400)=ANY=[@ANYRES16, @ANYBLOB="72e1af808ba473e6f37c85b113d8c4d9e1de4ed2968d2e01108c4795a941d14f6927393c8c3c458dd7454900d48719912efc18d580a8f841234284071012d7d5020eb5d56dc1ba5f1048adac4b928bf6cfd663b4cab43637cb979a9199a0246ec02345161783bc79585902603d7062084f05b744e31fcb4c3e81f3becabb7ad1fa5783f5e5e60ae912102fe8df0536bd074c03bd33742f35c5c44b5c3c9d693114367b7d966e"]) chdir(&(0x7f0000000140)='./file0\x00') ptrace$getenv(0x4201, r0, 0xfff, &(0x7f00000000c0)) openat(0xffffffffffffff9c, &(0x7f0000000000)='./file2\x00', 0x0, 0x0) r2 = perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x6, 0x0, 0xe}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r4 = fork() perf_event_open(&(0x7f0000000540)={0x4, 0x80, 0xeb, 0x0, 0x20, 0x0, 0x0, 0x2, 0x2820, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, @perf_config_ext={0xdc, 0x40}, 0x40000, 0x3, 0x8, 0x5, 0x6000000000000, 0x4, 0x5, 0x0, 0x3, 0x0, 0x3}, r4, 0x9, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000340)={0x0, 0x80, 0x2, 0x83, 0x1, 0x7, 0x0, 0x1f, 0x9ec17fc7a3e840c7, 0xc, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x9, 0x4, @perf_bp={&(0x7f0000000240), 0x1}, 0x404, 0x7, 0x3, 0x6, 0x800, 0x9, 0x3, 0x0, 0x7ff, 0x0, 0x9}, r4, 0x8, r2, 0x9) fork() setxattr$trusted_overlay_upper(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180), &(0x7f00000001c0)={0x0, 0xfb, 0x7a, 0x0, 0x2, "d54449275cb08faf62df87518e3ce16f", "9a61b461b0c63151b954990036d5e0163ceb48c6a801bb019e9e6fa7196a9372f804b9e9ca3fb3d85d1985d31346bbd5fd02b1c8223bf6388eb75498623e38ff88a99c5ce38698a32306b7d4e4b0fd4b03bfa568df17a42f725c6c33046b38b6e4a713dde1"}, 0x7a, 0x3) socket$nl_audit(0x10, 0x3, 0x9) chroot(&(0x7f0000000080)='./file1\x00') sendmsg$inet(r3, &(0x7f0000000780)={&(0x7f0000000000)={0x2, 0x0, @local}, 0x10, &(0x7f00000003c0)=[{&(0x7f0000000300)="6fb9", 0xffeb}], 0x1, &(0x7f0000000700)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @remote, @broadcast}}}], 0x20}, 0x0) 06:08:42 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xffffff7f, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000100000005000000000004000040000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000001000018000000c28500002b02", 0x66, 0x400}, {&(0x7f0000010100)="000000000000000000000000e8f7d2e8feeb4bf889ba053b02420ff8010040", 0x1f, 0x4e0}], 0x0, &(0x7f0000000140)=ANY=[]) 06:08:42 executing program 6: ioctl$AUTOFS_DEV_IOCTL_CLOSEMOUNT(0xffffffffffffffff, 0xc0189375, 0x0) syz_genetlink_get_family_id$ethtool(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_PAUSE_SET(0xffffffffffffffff, 0x0, 0x0) r0 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000080), 0xffffffffffffffff) sendmsg$NL80211_CMD_DEAUTHENTICATE(0xffffffffffffffff, &(0x7f00000001c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x10000}, 0xc, &(0x7f0000000180)={&(0x7f00000000c0)={0x8c, r0, 0x100, 0x70bd29, 0x25dfdbfb, {{}, {@val={0x8}, @val={0xc, 0x99, {0x7, 0x2a}}}}, [@NL80211_ATTR_REASON_CODE={0x6, 0x36, 0x1}, @NL80211_ATTR_MAC={0xa, 0x6, @from_mac=@device_b}, @NL80211_ATTR_IE={0x4a, 0x2a, [@ssid={0x0, 0x6, @default_ibss_ssid}, @erp={0x2a, 0x1, {0x0, 0x0, 0x1}}, @mic={0x8c, 0x10, {0x7b4, "4f57980ba266", @short="a0992e3fd2c2956d"}}, @mesh_id={0x72, 0x6}, @mesh_id={0x72, 0x6}, @dsss={0x3, 0x1, 0x8}, @mesh_config={0x71, 0x7, {0xffffffffffffffff, 0x0, 0x1, 0x0, 0x2, 0xd0, 0x21}}, @mesh_config={0x71, 0x7, {0xffffffffffffffff, 0x1, 0x1, 0x0, 0x0, 0x1, 0x20}}, @ibss={0x6, 0x2, 0x8}]}, @NL80211_ATTR_LOCAL_STATE_CHANGE={0x4}]}, 0x8c}, 0x1, 0x0, 0x0, 0x2000}, 0x20000000) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = memfd_create(&(0x7f0000000400)='B\xdb/\x89\x03l\xdeb\xcb\xb54\xed\xbeLY\xb5Z\xe1\x12S\xf5G\xcc\xf3\xe9\x02h\v\xca(\x96\xe1C\xdf\x1c\xea\x85C\xfb\x10\x13\xfa\x03\x16\xcd\x17\xa2\x80\xa1z\xb4r\x95\xc3@\x9d\xa6\xf1\x92#}g\xd3`\xf7\xcez\xcb\xb3\x1a\xbb\xc48e\x8e\xb1&\xd1\x8a\xe6!\x7f\x8d\xea,qx\xa28\xbf\"\xc7e\x06L\xb06\xeb<$\xd7\xba\xe5\x01\x03\x94r\xab\xd4J\x03s\xaf\xf6A\xbfV\xfa\x1ew\x8d\xbf\x99I\x97\xd8\xd2\xe8\x11\xc4\x04\x00\x84\xd5i\xee\xaf\xae[E\x1f\xdd\xd7#rT+\xb621p\xaf[\x99\" 1\xeb\xc7)\xd2\x1dh\xf2\xd5s\xfd?\fa>\x9f;\xe5r\xe5\xbd\xb0|=\x8eZcPY\xf8\xbd\x13\xaa\x8b\xdf\xbc\x93u\xd5\xb0r\xfb\xde\xe7\xd9k\xe2\xc6\x1b\xf2o@&>\xf2M\xe7\x8c\xeb\xee\xf5\x02~\x85\x14\xf3\xc6v\xf15PE\x8c\xca\x16$\xc2\x01#\xb563\rbq\xbf64\xfaW\x17\xdfa\xe6\xca\x86\xd7\xf8\x81X\x9bg4\xc1\xdam\xcf=Rq6\xb0\xd4D=I\x1a\x0e\xd0\xabz\xe2\x19\x0fM\xad\xdco\xa4\xb2\x8c?\xc1\x10\xf273\xd00\xb3_\xe8\x9a*\xfcL\xea;\xc0\x9a\xdbx!N;\xb5x\t\xa4E\xbe\x93r\x04\xf5\xf0\xf5\x7f\x9a)\xf5\x1b\"\xa1\xd8\x06>\xc9\xe2r\xe9\xbb\xfe\xc0\b\x81\x98\x1c\xe2\xe0?\x8f\xa1\xbel\aN\x83@\xb1\x03)4A\x83\xd6\xcf\xf6\xb5\x82\xb7\x9dA\b$\xa2x\x8a@\xfaj~\xef\x93\xb1/L\x01\xe2\xba|\xf0\x01)PP\xcdl\x06\xfc\x15;qZ\xb1u\xc9\xd0\xd16~JEGm\xe4\x1e@\x9dG\xe4@\xdf\xba\'\x8b\x1cD\xc7\xec\xd1@}tR\xd9P\xf4N\xe3\xd8x\xa0\x91\x17\xc2}\x13\b\xca\t(Z\xa3_\xa1\x90\x15T\xa4\xe7%\x98\xa7\xfb\x8bp/eq\x93\xbf\x1f =|\xf3\xb1\xfcR\xd8\nM,\xcb%@\'\x15\x88\xd8\xad\f\x91|\x95\x8fq+\x98\x81W\xba\x9f\xe0elOt\xbd\by\r\x87\x1c\xba\xbd\x8e+S>\xb8\xe29\x91h^x\xfb`\x00\xdd/\xa6\xb1\x16=\xa1bw\xc5I\xb1\x00'/549, 0x2) fcntl$addseals(r1, 0x409, 0x0) 06:08:42 executing program 1: pipe(&(0x7f0000000340)={0xffffffffffffffff}) pread64(r0, &(0x7f0000000440)=""/95, 0x5f, 0x6) execveat(r0, &(0x7f0000000080)='./file0\x00', &(0x7f00000001c0)=[&(0x7f00000000c0)='\x00', &(0x7f0000000180)='\x00'], &(0x7f0000000400)=[&(0x7f0000000200)='/dev/zero\x00', &(0x7f0000000240)='/dev/zero\x00', &(0x7f0000000300)='/dev/zero\x00'], 0x1000) socket$inet(0x2, 0x1, 0x0) perf_event_open(&(0x7f0000000100)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x22420, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ptrace$setopts(0x4200, 0x0, 0x5, 0x100050) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000004c00)={0xc0002100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) gettid() r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000), 0x380, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000000)='net/udp6\x00') read$hiddev(r2, &(0x7f0000001140)=""/212, 0xd4) fchmodat(r2, &(0x7f00000004c0)='./file0\x00', 0x0) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(r1, 0xc018937c, &(0x7f0000000380)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32=r0, @ANYBLOB="00000000000000002e2f66696cee8816"]) ioctl$TIOCSSOFTCAR(r3, 0x541a, &(0x7f00000003c0)=0x6) waitid$P_PIDFD(0x3, r1, &(0x7f0000000500), 0x2, &(0x7f0000000580)) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(r1, 0xc0189372, &(0x7f0000000040)={{0x1, 0x1, 0x18, r2, {0xffff}}, './file0\x00'}) 06:08:42 executing program 3: r0 = getpid() ioprio_get$pid(0x2, r0) r1 = getpid() ioprio_get$pid(0x2, r1) syz_mount_image$vfat(0x0, &(0x7f0000000040)='./file1\x00', 0x0, 0x0, &(0x7f00000000c0), 0x2002000, &(0x7f0000000400)=ANY=[@ANYRES16, @ANYBLOB="72e1af808ba473e6f37c85b113d8c4d9e1de4ed2968d2e01108c4795a941d14f6927393c8c3c458dd7454900d48719912efc18d580a8f841234284071012d7d5020eb5d56dc1ba5f1048adac4b928bf6cfd663b4cab43637cb979a9199a0246ec02345161783bc79585902603d7062084f05b744e31fcb4c3e81f3becabb7ad1fa5783f5e5e60ae912102fe8df0536bd074c03bd33742f35c5c44b5c3c9d693114367b7d966e"]) chdir(&(0x7f0000000140)='./file0\x00') ptrace$getenv(0x4201, r0, 0xfff, &(0x7f00000000c0)) openat(0xffffffffffffff9c, &(0x7f0000000000)='./file2\x00', 0x0, 0x0) r2 = perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x6, 0x0, 0xe}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r4 = fork() perf_event_open(&(0x7f0000000540)={0x4, 0x80, 0xeb, 0x0, 0x20, 0x0, 0x0, 0x2, 0x2820, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, @perf_config_ext={0xdc, 0x40}, 0x40000, 0x3, 0x8, 0x5, 0x6000000000000, 0x4, 0x5, 0x0, 0x3, 0x0, 0x3}, r4, 0x9, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000340)={0x0, 0x80, 0x2, 0x83, 0x1, 0x7, 0x0, 0x1f, 0x9ec17fc7a3e840c7, 0xc, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x9, 0x4, @perf_bp={&(0x7f0000000240), 0x1}, 0x404, 0x7, 0x3, 0x6, 0x800, 0x9, 0x3, 0x0, 0x7ff, 0x0, 0x9}, r4, 0x8, r2, 0x9) fork() setxattr$trusted_overlay_upper(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180), &(0x7f00000001c0)={0x0, 0xfb, 0x7a, 0x0, 0x2, "d54449275cb08faf62df87518e3ce16f", "9a61b461b0c63151b954990036d5e0163ceb48c6a801bb019e9e6fa7196a9372f804b9e9ca3fb3d85d1985d31346bbd5fd02b1c8223bf6388eb75498623e38ff88a99c5ce38698a32306b7d4e4b0fd4b03bfa568df17a42f725c6c33046b38b6e4a713dde1"}, 0x7a, 0x3) socket$nl_audit(0x10, 0x3, 0x9) chroot(&(0x7f0000000080)='./file1\x00') sendmsg$inet(r3, &(0x7f0000000780)={&(0x7f0000000000)={0x2, 0x0, @local}, 0x10, &(0x7f00000003c0)=[{&(0x7f0000000300)="6fb9", 0xffeb}], 0x1, &(0x7f0000000700)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @remote, @broadcast}}}], 0x20}, 0x0) 06:08:42 executing program 4: r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000040), 0xffffffffffffffff) syz_genetlink_get_family_id$ethtool(&(0x7f0000000100), 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_PAUSE_SET(0xffffffffffffffff, &(0x7f0000000440)={0x0, 0x0, 0x0}, 0x0) r2 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000080)='smaps\x00') pread64(r2, &(0x7f00000000c0)=""/98, 0x62, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x7fffffff) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(0xffffffffffffffff, 0xc0189374, &(0x7f0000000240)={{0x1, 0x1, 0x18, r0, {0x8}}, './file0\x00'}) dup3(0xffffffffffffffff, r2, 0x0) r3 = socket$inet_icmp_raw(0x2, 0x3, 0x1) syz_genetlink_get_family_id$ethtool(&(0x7f0000000180), r2) socket$nl_audit(0x10, 0x3, 0x9) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000040)={'wlan1\x00', 0x0}) sendmsg$inet(r3, &(0x7f0000000780)={&(0x7f0000000000)={0x2, 0x0, @local}, 0x10, &(0x7f00000003c0)=[{&(0x7f0000000300)="6fb9", 0xffeb}], 0x1, &(0x7f0000000700)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {r4, @remote, @broadcast}}}], 0x20}, 0x0) r5 = socket$inet_icmp_raw(0x2, 0x3, 0x1) socket$nl_audit(0x10, 0x3, 0x9) sendmsg$inet(r5, &(0x7f0000000780)={&(0x7f0000000000)={0x2, 0x0, @local}, 0x10, &(0x7f00000003c0)=[{&(0x7f0000000300)="6fb9", 0xffeb}], 0x1, &(0x7f0000000700)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @remote, @broadcast}}}], 0x20}, 0x0) sendmsg$ETHTOOL_MSG_LINKINFO_GET(r2, &(0x7f0000000200)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f00000001c0)={&(0x7f0000000340)=ANY=[@ANYBLOB='@\x00\x00\x00', @ANYRES16=r1, @ANYBLOB="000427bd7000ffdbdf25020000002c00018008000100", @ANYRES32=0x0, @ANYBLOB='\b\x00C\x00\x00\x00\x00\x00\b\x00!\x00', @ANYRES32=r4, @ANYRES32=0x0, @ANYBLOB], 0x40}, 0x1, 0x0, 0x0, 0x4}, 0xd0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000480), 0x1}, 0x603}, 0x0, 0xffffffefffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000040)=[{&(0x7f0000010000)="601c6d6b646f736689254300080120000400004000f8000020004000030000000000000001", 0x25}, {0x0, 0x0, 0x10000}], 0x0, &(0x7f0000000040)=ANY=[]) 06:08:42 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="200000001802000019000000900100000f000000000000000100000005000000000004000040000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000001000018000000c28500002b02", 0x66, 0x400}, {&(0x7f0000010100)="000000000000000000000000e8f7d2e8feeb4bf889ba053b02420ff8010040", 0x1f, 0x4e0}], 0x0, &(0x7f0000000140)=ANY=[]) 06:08:42 executing program 0: syncfs(0xffffffffffffffff) r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x4042, 0x0) io_setup(0x2, &(0x7f0000000000)=0x0) openat$cgroup_ro(r0, &(0x7f0000000180)='blkio.bfq.io_merged\x00', 0x0, 0x0) r2 = eventfd2(0x0, 0x0) io_submit(r1, 0x1, &(0x7f0000001a00)=[&(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, r0, 0x0, 0x0, 0x0, 0x0, 0x1, r2}]) io_setup(0xd29, &(0x7f0000000780)=0x0) io_submit(r3, 0x2, &(0x7f0000000300)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, r0, 0x0}, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0, r0, 0x0, 0x0, 0x0, 0x0, 0x3, r0}]) r4 = eventfd(0xb8) io_submit(r3, 0x1, &(0x7f00000000c0)=[&(0x7f0000000080)={0x0, 0x0, 0x0, 0x8, 0x1ff, 0xffffffffffffffff, &(0x7f0000000000)="3d5e7b91cfc8609ccce6832603cd3b740aebb9fb67e06a1f53a5016f0f7740d9f5b6c4ba3b8ba9b1687de9cb6b077c9004d8eb3605ff575adad68260d766b447d1cb438c0e4412fb7cbba5936c5bc3b79804", 0x52, 0xb23, 0x0, 0x2, r4}]) sendmsg$NL80211_CMD_DEL_TX_TS(0xffffffffffffffff, 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_SETPIPEFD(0xffffffffffffffff, 0xc0189378, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r5 = openat$dir(0xffffffffffffff9c, &(0x7f0000000140)='./file1\x00', 0x501000, 0x0) write$binfmt_elf32(r5, &(0x7f0000000640)=ANY=[@ANYBLOB="7f454c4603090104010000000000000002000300010000003402000038000000b70300000800000002002000020002008508ff03000000000500000001000100060000000100000004000000030000000700001300000000000000700900000005000000000400000cfb00005d00000067df5a75ff030000db55fc2fe192acde4b120cc847993338f6ee02e38a704f246db2778af2ac30fc948012fc420d5de998ca2f0bf01d1705aa85f7d0bd8401357d74c3543cb1d668d00b9b54f11c6782f5ae615259b74a80ab535a49e615f39d7ccfc93e319c903a8c30f61c00000000000000"], 0xe2) r6 = memfd_create(&(0x7f0000000400)='B\xdb/\x89\x03l\xdeb\xcb\xb54\xed\xbeLY\xb5Z\xe1\x12S\xf5G\xcc\xf3\xe9\x02h\v\xca(\x96\xe1C\xdf\x1c\xea\x85C\xfb\x10\x13\xfa\x03\x16\xcd\x17\xa2\x80\xa1z\xb4r\x95\xc3@\x9d\xa6\xf1\x92#}g\xd3`\xf7\xcez\xcb\xb3\x1a\xbb\xc48e\x8e\xb1&\xd1\x8a\xe6!\x7f\x8d\xea,qx\xa28\xbf\"\xc7e\x06L\xb06\xeb<$\xd7\xba\xe5\x01\x03\x94r\xab\xd4J\x03s\xaf\xf6A\xbfV\xfa\x1ew\x8d\xbf\x99I\x97\xd8\xd2\xe8\x11\xc4\x04\x00\x84\xd5i\xee\xaf\xae[E\x1f\xdd\xd7#rT+\xb621p\xaf[\x99\" 1\xeb\xc7)\xd2\x1dh\xf2\xd5s\xfd?\fa>\x9f;\xe5r\xe5\xbd\xb0|=\x8eZcPY\xf8\xbd\x13\xaa\x8b\xdf\xbc\x93u\xd5\xb0r\xfb\xde\xe7\xd9k\xe2\xc6\x1b\xf2o@&>\xf2M\xe7\x8c\xeb\xee\xf5\x02~\x85\x14\xf3\xc6v\xf15PE\x8c\xca\x16$\xc2\x01#\xb563\rbq\xbf64\xfaW\x17\xdfa\xe6\xca\x86\xd7\xf8\x81X\x9bg4\xc1\xdam\xcf=Rq6\xb0\xd4D=I\x1a\x0e\xd0\xabz\xe2\x19\x0fM\xad\xdco\xa4\xb2\x8c?\xc1\x10\xf273\xd00\xb3_\xe8\x9a*\xfcL\xea;\xc0\x9a\xdbx!N;\xb5x\t\xa4E\xbe\x93r\x04\xf5\xf0\xf5\x7f\x9a)\xf5\x1b\"\xa1\xd8\x06>\xc9\xe2r\xe9\xbb\xfe\xc0\b\x81\x98\x1c\xe2\xe0?\x8f\xa1\xbel\aN\x83@\xb1\x03)4A\x83\xd6\xcf\xf6\xb5\x82\xb7\x9dA\b$\xa2x\x8a@\xfaj~\xef\x93\xb1/L\x01\xe2\xba|\xf0\x01)PP\xcdl\x06\xfc\x15;qZ\xb1u\xc9\xd0\xd16~JEGm\xe4\x1e@\x9dG\xe4@\xdf\xba\'\x8b\x1cD\xc7\xec\xd1@}tR\xd9P\xf4N\xe3\xd8x\xa0\x91\x17\xc2}\x13\b\xca\t(Z\xa3_\xa1\x90\x15T\xa4\xe7%\x98\xa7\xfb\x8bp/eq\x93\xbf\x1f =|\xf3\xb1\xfcR\xd8\nM,\xcb%@\'\x15\x88\xd8\xad\f\x91|\x95\x8fq+\x98\x81W\xba\x9f\xe0elOt\xbd\by\r\x87\x1c\xba\xbd\x8e+S>\xb8\xe29\x91h^x\xfb`\x00\xdd/\xa6\xb1\x16=\xa1bw\xc5I\xb1\x00'/549, 0x2) fcntl$addseals(r6, 0x409, 0x0) 06:08:42 executing program 7: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x10006c, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000100000005000000000004000040000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000001000018000000c28500002b02", 0x66, 0x400}, {&(0x7f0000010100)="000000000000000000000000e8f7d2e8feeb4bf889ba053b02420ff8010040", 0x1f, 0x4e0}], 0x0, &(0x7f0000000140)=ANY=[]) [ 2038.704729] loop5: detected capacity change from 0 to 264192 [ 2038.723079] EXT4-fs (loop5): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 2038.723834] EXT4-fs (loop5): group descriptors corrupted! [ 2038.737296] loop5: detected capacity change from 0 to 264192 [ 2038.747870] EXT4-fs (loop5): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 2038.748535] EXT4-fs (loop5): group descriptors corrupted! [ 2038.751903] loop7: detected capacity change from 0 to 2048 [ 2038.774986] EXT4-fs (loop7): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 2038.776492] EXT4-fs (loop7): group descriptors corrupted! 06:08:43 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="200000001c02000019000000900100000f000000000000000100000005000000000004000040000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000001000018000000c28500002b02", 0x66, 0x400}, {&(0x7f0000010100)="000000000000000000000000e8f7d2e8feeb4bf889ba053b02420ff8010040", 0x1f, 0x4e0}], 0x0, &(0x7f0000000140)=ANY=[]) [ 2038.786068] loop4: detected capacity change from 0 to 256 [ 2038.821940] loop7: detected capacity change from 0 to 2048 [ 2038.823978] FAT-fs (loop4): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) [ 2038.844564] EXT4-fs (loop7): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 2038.846257] EXT4-fs (loop7): group descriptors corrupted! 06:08:43 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x100000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000100000005000000000004000040000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000001000018000000c28500002b02", 0x66, 0x400}, {&(0x7f0000010100)="000000000000000000000000e8f7d2e8feeb4bf889ba053b02420ff8010040", 0x1f, 0x4e0}], 0x0, &(0x7f0000000140)=ANY=[]) [ 2038.915758] loop5: detected capacity change from 0 to 2048 [ 2038.926803] EXT4-fs (loop5): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 2038.927573] EXT4-fs (loop5): group descriptors corrupted! [ 2038.958604] loop5: detected capacity change from 0 to 2048 [ 2038.965138] EXT4-fs (loop5): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 2038.965950] EXT4-fs (loop5): group descriptors corrupted! 06:08:58 executing program 0: syncfs(0xffffffffffffffff) sendmsg$NL80211_CMD_DEL_TX_TS(0xffffffffffffffff, 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_SETPIPEFD(0xffffffffffffffff, 0xc0189378, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0xff, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x6}, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8001}, 0x0, 0xfffffffffffffffc, 0xffffffffffffffff, 0xa) r0 = memfd_create(&(0x7f0000000400)='B\xdb/\x89\x03l\xdeb\xcb\xb54\xed\xbeLY\xb5Z\xe1\x12S\xf5G\xcc\xf3\xe9\x02h\v\xca(\x96\xe1C\xdf\x1c\xea\x85C\xfb\x10\x13\xfa\x03\x16\xcd\x17\xa2\x80\xa1z\xb4r\x95\xc3@\x9d\xa6\xf1\x92#}g\xd3`\xf7\xcez\xcb\xb3\x1a\xbb\xc48e\x8e\xb1&\xd1\x8a\xe6!\x7f\x8d\xea,qx\xa28\xbf\"\xc7e\x06L\xb06\xeb<$\xd7\xba\xe5\x01\x03\x94r\xab\xd4J\x03s\xaf\xf6A\xbfV\xfa\x1ew\x8d\xbf\x99I\x97\xd8\xd2\xe8\x11\xc4\x04\x00\x84\xd5i\xee\xaf\xae[E\x1f\xdd\xd7#rT+\xb621p\xaf[\x99\" 1\xeb\xc7)\xd2\x1dh\xf2\xd5s\xfd?\fa>\x9f;\xe5r\xe5\xbd\xb0|=\x8eZcPY\xf8\xbd\x13\xaa\x8b\xdf\xbc\x93u\xd5\xb0r\xfb\xde\xe7\xd9k\xe2\xc6\x1b\xf2o@&>\xf2M\xe7\x8c\xeb\xee\xf5\x02~\x85\x14\xf3\xc6v\xf15PE\x8c\xca\x16$\xc2\x01#\xb563\rbq\xbf64\xfaW\x17\xdfa\xe6\xca\x86\xd7\xf8\x81X\x9bg4\xc1\xdam\xcf=Rq6\xb0\xd4D=I\x1a\x0e\xd0\xabz\xe2\x19\x0fM\xad\xdco\xa4\xb2\x8c?\xc1\x10\xf273\xd00\xb3_\xe8\x9a*\xfcL\xea;\xc0\x9a\xdbx!N;\xb5x\t\xa4E\xbe\x93r\x04\xf5\xf0\xf5\x7f\x9a)\xf5\x1b\"\xa1\xd8\x06>\xc9\xe2r\xe9\xbb\xfe\xc0\b\x81\x98\x1c\xe2\xe0?\x8f\xa1\xbel\aN\x83@\xb1\x03)4A\x83\xd6\xcf\xf6\xb5\x82\xb7\x9dA\b$\xa2x\x8a@\xfaj~\xef\x93\xb1/L\x01\xe2\xba|\xf0\x01)PP\xcdl\x06\xfc\x15;qZ\xb1u\xc9\xd0\xd16~JEGm\xe4\x1e@\x9dG\xe4@\xdf\xba\'\x8b\x1cD\xc7\xec\xd1@}tR\xd9P\xf4N\xe3\xd8x\xa0\x91\x17\xc2}\x13\b\xca\t(Z\xa3_\xa1\x90\x15T\xa4\xe7%\x98\xa7\xfb\x8bp/eq\x93\xbf\x1f =|\xf3\xb1\xfcR\xd8\nM,\xcb%@\'\x15\x88\xd8\xad\f\x91|\x95\x8fq+\x98\x81W\xba\x9f\xe0elOt\xbd\by\r\x87\x1c\xba\xbd\x8e+S>\xb8\xe29\x91h^x\xfb`\x00\xdd/\xa6\xb1\x16=\xa1bw\xc5I\xb1\x00'/549, 0x2) fcntl$addseals(r0, 0x409, 0x0) 06:08:58 executing program 4: r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000040), 0xffffffffffffffff) syz_genetlink_get_family_id$ethtool(&(0x7f0000000100), 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_PAUSE_SET(0xffffffffffffffff, &(0x7f0000000440)={0x0, 0x0, 0x0}, 0x0) r2 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000080)='smaps\x00') pread64(r2, &(0x7f00000000c0)=""/98, 0x62, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x7fffffff) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(0xffffffffffffffff, 0xc0189374, &(0x7f0000000240)={{0x1, 0x1, 0x18, r0, {0x8}}, './file0\x00'}) dup3(0xffffffffffffffff, r2, 0x0) r3 = socket$inet_icmp_raw(0x2, 0x3, 0x1) syz_genetlink_get_family_id$ethtool(&(0x7f0000000180), r2) socket$nl_audit(0x10, 0x3, 0x9) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000040)={'wlan1\x00', 0x0}) sendmsg$inet(r3, &(0x7f0000000780)={&(0x7f0000000000)={0x2, 0x0, @local}, 0x10, &(0x7f00000003c0)=[{&(0x7f0000000300)="6fb9", 0xffeb}], 0x1, &(0x7f0000000700)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {r4, @remote, @broadcast}}}], 0x20}, 0x0) r5 = socket$inet_icmp_raw(0x2, 0x3, 0x1) socket$nl_audit(0x10, 0x3, 0x9) sendmsg$inet(r5, &(0x7f0000000780)={&(0x7f0000000000)={0x2, 0x0, @local}, 0x10, &(0x7f00000003c0)=[{&(0x7f0000000300)="6fb9", 0xffeb}], 0x1, &(0x7f0000000700)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @remote, @broadcast}}}], 0x20}, 0x0) sendmsg$ETHTOOL_MSG_LINKINFO_GET(r2, &(0x7f0000000200)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f00000001c0)={&(0x7f0000000340)=ANY=[@ANYBLOB='@\x00\x00\x00', @ANYRES16=r1, @ANYBLOB="000427bd7000ffdbdf25020000002c00018008000100", @ANYRES32=0x0, @ANYBLOB='\b\x00C\x00\x00\x00\x00\x00\b\x00!\x00', @ANYRES32=r4, @ANYRES32=0x0, @ANYBLOB], 0x40}, 0x1, 0x0, 0x0, 0x4}, 0xd0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000480), 0x1}, 0x603}, 0x0, 0xffffffefffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000040)=[{&(0x7f0000010000)="601c6d6b646f736689254300080120000400004000f8000020004000030000000000000001", 0x25}, {0x0, 0x0, 0x10000}], 0x0, &(0x7f0000000040)=ANY=[]) 06:08:58 executing program 6: ioctl$AUTOFS_DEV_IOCTL_CLOSEMOUNT(0xffffffffffffffff, 0xc0189375, 0x0) syz_genetlink_get_family_id$ethtool(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_PAUSE_SET(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = memfd_create(&(0x7f0000000400)='B\xdb/\x89\x03l\xdeb\xcb\xb54\xed\xbeLY\xb5Z\xe1\x12S\xf5G\xcc\xf3\xe9\x02h\v\xca(\x96\xe1C\xdf\x1c\xea\x85C\xfb\x10\x13\xfa\x03\x16\xcd\x17\xa2\x80\xa1z\xb4r\x95\xc3@\x9d\xa6\xf1\x92#}g\xd3`\xf7\xcez\xcb\xb3\x1a\xbb\xc48e\x8e\xb1&\xd1\x8a\xe6!\x7f\x8d\xea,qx\xa28\xbf\"\xc7e\x06L\xb06\xeb<$\xd7\xba\xe5\x01\x03\x94r\xab\xd4J\x03s\xaf\xf6A\xbfV\xfa\x1ew\x8d\xbf\x99I\x97\xd8\xd2\xe8\x11\xc4\x04\x00\x84\xd5i\xee\xaf\xae[E\x1f\xdd\xd7#rT+\xb621p\xaf[\x99\" 1\xeb\xc7)\xd2\x1dh\xf2\xd5s\xfd?\fa>\x9f;\xe5r\xe5\xbd\xb0|=\x8eZcPY\xf8\xbd\x13\xaa\x8b\xdf\xbc\x93u\xd5\xb0r\xfb\xde\xe7\xd9k\xe2\xc6\x1b\xf2o@&>\xf2M\xe7\x8c\xeb\xee\xf5\x02~\x85\x14\xf3\xc6v\xf15PE\x8c\xca\x16$\xc2\x01#\xb563\rbq\xbf64\xfaW\x17\xdfa\xe6\xca\x86\xd7\xf8\x81X\x9bg4\xc1\xdam\xcf=Rq6\xb0\xd4D=I\x1a\x0e\xd0\xabz\xe2\x19\x0fM\xad\xdco\xa4\xb2\x8c?\xc1\x10\xf273\xd00\xb3_\xe8\x9a*\xfcL\xea;\xc0\x9a\xdbx!N;\xb5x\t\xa4E\xbe\x93r\x04\xf5\xf0\xf5\x7f\x9a)\xf5\x1b\"\xa1\xd8\x06>\xc9\xe2r\xe9\xbb\xfe\xc0\b\x81\x98\x1c\xe2\xe0?\x8f\xa1\xbel\aN\x83@\xb1\x03)4A\x83\xd6\xcf\xf6\xb5\x82\xb7\x9dA\b$\xa2x\x8a@\xfaj~\xef\x93\xb1/L\x01\xe2\xba|\xf0\x01)PP\xcdl\x06\xfc\x15;qZ\xb1u\xc9\xd0\xd16~JEGm\xe4\x1e@\x9dG\xe4@\xdf\xba\'\x8b\x1cD\xc7\xec\xd1@}tR\xd9P\xf4N\xe3\xd8x\xa0\x91\x17\xc2}\x13\b\xca\t(Z\xa3_\xa1\x90\x15T\xa4\xe7%\x98\xa7\xfb\x8bp/eq\x93\xbf\x1f =|\xf3\xb1\xfcR\xd8\nM,\xcb%@\'\x15\x88\xd8\xad\f\x91|\x95\x8fq+\x98\x81W\xba\x9f\xe0elOt\xbd\by\r\x87\x1c\xba\xbd\x8e+S>\xb8\xe29\x91h^x\xfb`\x00\xdd/\xa6\xb1\x16=\xa1bw\xc5I\xb1\x00'/549, 0x2) fcntl$addseals(r0, 0x409, 0x0) r1 = openat$null(0xffffffffffffff9c, &(0x7f0000000000), 0x8182, 0x0) r2 = syz_genetlink_get_family_id$tipc(&(0x7f00000000c0), 0xffffffffffffffff) r3 = openat(0xffffffffffffff9c, &(0x7f0000000180)='./file1\x00', 0x4042, 0x0) pwrite64(r3, &(0x7f0000000000)='y', 0xfffffe5f, 0x8040000) r4 = syz_genetlink_get_family_id$tipc(&(0x7f00000001c0), r3) sendmsg$TIPC_CMD_ENABLE_BEARER(r3, &(0x7f0000000300)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f0000000240)={&(0x7f0000000200)=ANY=[@ANYBLOB='4\x00\x00\x00', @ANYRES16=r4, @ANYBLOB="000000000000014100008878fc01fa4d779ee174ea96430000000a"], 0x34}, 0x1, 0x0, 0x0, 0x800}, 0x4004010) sendmsg$TIPC_CMD_SHOW_STATS(r1, &(0x7f0000000300)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f0000000240)={&(0x7f0000000200)={0x1c, r4, 0x8, 0x70bd28, 0x25dfdbfb, {}, ["", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x40000c0}, 0x4c051) setsockopt$netlink_NETLINK_RX_RING(r3, 0x10e, 0x6, &(0x7f0000000380)={0x6, 0x9, 0x1ff, 0x245}, 0x10) sendmsg$TIPC_CMD_GET_REMOTE_MNG(r1, &(0x7f0000000180)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x200}, 0xc, &(0x7f0000000140)={&(0x7f0000000100)={0x1c, r2, 0x8, 0x70bd29, 0x25dfdbff}, 0x1c}, 0x1, 0x0, 0x0, 0x4000000}, 0x20000000) open$dir(&(0x7f0000000340)='./file1\x00', 0x100842, 0x40) 06:08:58 executing program 3: r0 = getpid() ioprio_get$pid(0x2, r0) r1 = getpid() ioprio_get$pid(0x2, r1) syz_mount_image$vfat(0x0, &(0x7f0000000040)='./file1\x00', 0x0, 0x0, &(0x7f00000000c0), 0x2002000, &(0x7f0000000400)=ANY=[@ANYRES16, @ANYBLOB="72e1af808ba473e6f37c85b113d8c4d9e1de4ed2968d2e01108c4795a941d14f6927393c8c3c458dd7454900d48719912efc18d580a8f841234284071012d7d5020eb5d56dc1ba5f1048adac4b928bf6cfd663b4cab43637cb979a9199a0246ec02345161783bc79585902603d7062084f05b744e31fcb4c3e81f3becabb7ad1fa5783f5e5e60ae912102fe8df0536bd074c03bd33742f35c5c44b5c3c9d693114367b7d966e"]) chdir(&(0x7f0000000140)='./file0\x00') ptrace$getenv(0x4201, r0, 0xfff, &(0x7f00000000c0)) openat(0xffffffffffffff9c, &(0x7f0000000000)='./file2\x00', 0x0, 0x0) r2 = perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x6, 0x0, 0xe}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r4 = fork() perf_event_open(&(0x7f0000000540)={0x4, 0x80, 0xeb, 0x0, 0x20, 0x0, 0x0, 0x2, 0x2820, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, @perf_config_ext={0xdc, 0x40}, 0x40000, 0x3, 0x8, 0x5, 0x6000000000000, 0x4, 0x5, 0x0, 0x3, 0x0, 0x3}, r4, 0x9, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000340)={0x0, 0x80, 0x2, 0x83, 0x1, 0x7, 0x0, 0x1f, 0x9ec17fc7a3e840c7, 0xc, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x9, 0x4, @perf_bp={&(0x7f0000000240), 0x1}, 0x404, 0x7, 0x3, 0x6, 0x800, 0x9, 0x3, 0x0, 0x7ff, 0x0, 0x9}, r4, 0x8, r2, 0x9) fork() setxattr$trusted_overlay_upper(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180), &(0x7f00000001c0)={0x0, 0xfb, 0x7a, 0x0, 0x2, "d54449275cb08faf62df87518e3ce16f", "9a61b461b0c63151b954990036d5e0163ceb48c6a801bb019e9e6fa7196a9372f804b9e9ca3fb3d85d1985d31346bbd5fd02b1c8223bf6388eb75498623e38ff88a99c5ce38698a32306b7d4e4b0fd4b03bfa568df17a42f725c6c33046b38b6e4a713dde1"}, 0x7a, 0x3) socket$nl_audit(0x10, 0x3, 0x9) chroot(&(0x7f0000000080)='./file1\x00') sendmsg$inet(r3, &(0x7f0000000780)={&(0x7f0000000000)={0x2, 0x0, @local}, 0x10, &(0x7f00000003c0)=[{&(0x7f0000000300)="6fb9", 0xffeb}], 0x1, &(0x7f0000000700)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @remote, @broadcast}}}], 0x20}, 0x0) 06:08:58 executing program 1: pipe(&(0x7f0000000340)={0xffffffffffffffff}) pread64(r0, &(0x7f0000000440)=""/95, 0x5f, 0x6) execveat(r0, &(0x7f0000000080)='./file0\x00', &(0x7f00000001c0)=[&(0x7f00000000c0)='\x00', &(0x7f0000000180)='\x00'], &(0x7f0000000400)=[&(0x7f0000000200)='/dev/zero\x00', &(0x7f0000000240)='/dev/zero\x00', &(0x7f0000000300)='/dev/zero\x00'], 0x1000) socket$inet(0x2, 0x1, 0x0) perf_event_open(&(0x7f0000000100)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x22420, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ptrace$setopts(0x4200, 0x0, 0x5, 0x100050) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000004c00)={0xc0002100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) gettid() r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000), 0x380, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000000)='net/udp6\x00') read$hiddev(r2, &(0x7f0000001140)=""/212, 0xd4) fchmodat(r2, &(0x7f00000004c0)='./file0\x00', 0x0) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(r1, 0xc018937c, &(0x7f0000000380)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32=r0, @ANYBLOB="00000000000000002e2f66696cee8816"]) ioctl$TIOCSSOFTCAR(r3, 0x541a, &(0x7f00000003c0)=0x6) waitid$P_PIDFD(0x3, r1, &(0x7f0000000500), 0x2, &(0x7f0000000580)) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(r1, 0xc0189372, &(0x7f0000000040)={{0x1, 0x1, 0x18, r2, {0xffff}}, './file0\x00'}) 06:08:58 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="200000001f02000019000000900100000f000000000000000100000005000000000004000040000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000001000018000000c28500002b02", 0x66, 0x400}, {&(0x7f0000010100)="000000000000000000000000e8f7d2e8feeb4bf889ba053b02420ff8010040", 0x1f, 0x4e0}], 0x0, &(0x7f0000000140)=ANY=[]) 06:08:58 executing program 7: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x100074, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000100000005000000000004000040000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000001000018000000c28500002b02", 0x66, 0x400}, {&(0x7f0000010100)="000000000000000000000000e8f7d2e8feeb4bf889ba053b02420ff8010040", 0x1f, 0x4e0}], 0x0, &(0x7f0000000140)=ANY=[]) 06:08:58 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x100000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000100000005000000000004000040000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000001000018000000c28500002b02", 0x66, 0x400}, {&(0x7f0000010100)="000000000000000000000000e8f7d2e8feeb4bf889ba053b02420ff8010040", 0x1f, 0x4e0}], 0x0, &(0x7f0000000140)=ANY=[]) [ 2054.359381] loop7: detected capacity change from 0 to 2048 [ 2054.374249] EXT4-fs (loop7): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 2054.374957] EXT4-fs (loop7): group descriptors corrupted! [ 2054.387015] loop5: detected capacity change from 0 to 2048 [ 2054.396454] loop7: detected capacity change from 0 to 2048 [ 2054.403346] EXT4-fs (loop5): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 2054.404077] EXT4-fs (loop5): group descriptors corrupted! [ 2054.409838] EXT4-fs (loop7): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 2054.410654] EXT4-fs (loop7): group descriptors corrupted! [ 2054.419588] loop5: detected capacity change from 0 to 2048 [ 2054.420977] loop4: detected capacity change from 0 to 256 [ 2054.434929] EXT4-fs (loop5): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 2054.435720] EXT4-fs (loop5): group descriptors corrupted! [ 2054.465220] FAT-fs (loop4): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) 06:08:58 executing program 7: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x10007a, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000100000005000000000004000040000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000001000018000000c28500002b02", 0x66, 0x400}, {&(0x7f0000010100)="000000000000000000000000e8f7d2e8feeb4bf889ba053b02420ff8010040", 0x1f, 0x4e0}], 0x0, &(0x7f0000000140)=ANY=[]) 06:08:58 executing program 0: syncfs(0xffffffffffffffff) sendmsg$NL80211_CMD_DEL_TX_TS(0xffffffffffffffff, 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_SETPIPEFD(0xffffffffffffffff, 0xc0189378, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0xc5, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0xfffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xe) r0 = memfd_create(&(0x7f0000000400)='B\xdb/\x89\x03l\xdeb\xcb\xb54\xed\xbeLY\xb5Z\xe1\x12S\xf5G\xcc\xf3\xe9\x02h\v\xca(\x96\xe1C\xdf\x1c\xea\x85C\xfb\x10\x13\xfa\x03\x16\xcd\x17\xa2\x80\xa1z\xb4r\x95\xc3@\x9d\xa6\xf1\x92#}g\xd3`\xf7\xcez\xcb\xb3\x1a\xbb\xc48e\x8e\xb1&\xd1\x8a\xe6!\x7f\x8d\xea,qx\xa28\xbf\"\xc7e\x06L\xb06\xeb<$\xd7\xba\xe5\x01\x03\x94r\xab\xd4J\x03s\xaf\xf6A\xbfV\xfa\x1ew\x8d\xbf\x99I\x97\xd8\xd2\xe8\x11\xc4\x04\x00\x84\xd5i\xee\xaf\xae[E\x1f\xdd\xd7#rT+\xb621p\xaf[\x99\" 1\xeb\xc7)\xd2\x1dh\xf2\xd5s\xfd?\fa>\x9f;\xe5r\xe5\xbd\xb0|=\x8eZcPY\xf8\xbd\x13\xaa\x8b\xdf\xbc\x93u\xd5\xb0r\xfb\xde\xe7\xd9k\xe2\xc6\x1b\xf2o@&>\xf2M\xe7\x8c\xeb\xee\xf5\x02~\x85\x14\xf3\xc6v\xf15PE\x8c\xca\x16$\xc2\x01#\xb563\rbq\xbf64\xfaW\x17\xdfa\xe6\xca\x86\xd7\xf8\x81X\x9bg4\xc1\xdam\xcf=Rq6\xb0\xd4D=I\x1a\x0e\xd0\xabz\xe2\x19\x0fM\xad\xdco\xa4\xb2\x8c?\xc1\x10\xf273\xd00\xb3_\xe8\x9a*\xfcL\xea;\xc0\x9a\xdbx!N;\xb5x\t\xa4E\xbe\x93r\x04\xf5\xf0\xf5\x7f\x9a)\xf5\x1b\"\xa1\xd8\x06>\xc9\xe2r\xe9\xbb\xfe\xc0\b\x81\x98\x1c\xe2\xe0?\x8f\xa1\xbel\aN\x83@\xb1\x03)4A\x83\xd6\xcf\xf6\xb5\x82\xb7\x9dA\b$\xa2x\x8a@\xfaj~\xef\x93\xb1/L\x01\xe2\xba|\xf0\x01)PP\xcdl\x06\xfc\x15;qZ\xb1u\xc9\xd0\xd16~JEGm\xe4\x1e@\x9dG\xe4@\xdf\xba\'\x8b\x1cD\xc7\xec\xd1@}tR\xd9P\xf4N\xe3\xd8x\xa0\x91\x17\xc2}\x13\b\xca\t(Z\xa3_\xa1\x90\x15T\xa4\xe7%\x98\xa7\xfb\x8bp/eq\x93\xbf\x1f =|\xf3\xb1\xfcR\xd8\nM,\xcb%@\'\x15\x88\xd8\xad\f\x91|\x95\x8fq+\x98\x81W\xba\x9f\xe0elOt\xbd\by\r\x87\x1c\xba\xbd\x8e+S>\xb8\xe29\x91h^x\xfb`\x00\xdd/\xa6\xb1\x16=\xa1bw\xc5I\xb1\x00'/549, 0x2) fcntl$addseals(r0, 0x409, 0x0) r1 = openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000000), 0x44100, 0x0) write$binfmt_aout(r1, &(0x7f0000000640)={{0x10b, 0xf, 0x52, 0x1e2, 0x297, 0x7035ab31, 0x264, 0x1}, "0e645e3e5a11c466248cffdcacd77d6850430dad3e7adebe00ef82b2c82871d6507aad8045dc7c9581a2d42eb7b5e64d7a1c956aa44651cda91aafd024a8cb169903729048e8badb00de631b0b6a98bf6e2c12a470d3607ebb5bf67c14debaae3551a92ed4e5ed47ea44e4b0a1dcd8e5fa7faa5052", ['\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00']}, 0xa95) 06:08:58 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x100000, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000100000005000000000004000040000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000001000018000000c28500002b02", 0x66, 0x400}, {&(0x7f0000010100)="000000000000000000000000e8f7d2e8feeb4bf889ba053b02420ff8010040", 0x1f, 0x4e0}], 0x0, &(0x7f0000000140)=ANY=[]) 06:08:58 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="200000006502000019000000900100000f000000000000000100000005000000000004000040000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000001000018000000c28500002b02", 0x66, 0x400}, {&(0x7f0000010100)="000000000000000000000000e8f7d2e8feeb4bf889ba053b02420ff8010040", 0x1f, 0x4e0}], 0x0, &(0x7f0000000140)=ANY=[]) 06:08:58 executing program 4: r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000040), 0xffffffffffffffff) syz_genetlink_get_family_id$ethtool(&(0x7f0000000100), 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_PAUSE_SET(0xffffffffffffffff, &(0x7f0000000440)={0x0, 0x0, 0x0}, 0x0) r2 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000080)='smaps\x00') pread64(r2, &(0x7f00000000c0)=""/98, 0x62, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x7fffffff) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(0xffffffffffffffff, 0xc0189374, &(0x7f0000000240)={{0x1, 0x1, 0x18, r0, {0x8}}, './file0\x00'}) dup3(0xffffffffffffffff, r2, 0x0) r3 = socket$inet_icmp_raw(0x2, 0x3, 0x1) syz_genetlink_get_family_id$ethtool(&(0x7f0000000180), r2) socket$nl_audit(0x10, 0x3, 0x9) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000040)={'wlan1\x00', 0x0}) sendmsg$inet(r3, &(0x7f0000000780)={&(0x7f0000000000)={0x2, 0x0, @local}, 0x10, &(0x7f00000003c0)=[{&(0x7f0000000300)="6fb9", 0xffeb}], 0x1, &(0x7f0000000700)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {r4, @remote, @broadcast}}}], 0x20}, 0x0) r5 = socket$inet_icmp_raw(0x2, 0x3, 0x1) socket$nl_audit(0x10, 0x3, 0x9) sendmsg$inet(r5, &(0x7f0000000780)={&(0x7f0000000000)={0x2, 0x0, @local}, 0x10, &(0x7f00000003c0)=[{&(0x7f0000000300)="6fb9", 0xffeb}], 0x1, &(0x7f0000000700)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @remote, @broadcast}}}], 0x20}, 0x0) sendmsg$ETHTOOL_MSG_LINKINFO_GET(r2, &(0x7f0000000200)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f00000001c0)={&(0x7f0000000340)=ANY=[@ANYBLOB='@\x00\x00\x00', @ANYRES16=r1, @ANYBLOB="000427bd7000ffdbdf25020000002c00018008000100", @ANYRES32=0x0, @ANYBLOB='\b\x00C\x00\x00\x00\x00\x00\b\x00!\x00', @ANYRES32=r4, @ANYBLOB, @ANYRES32=0x0, @ANYBLOB], 0x40}, 0x1, 0x0, 0x0, 0x4}, 0xd0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000480), 0x1}, 0x603}, 0x0, 0xffffffefffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000040)=[{&(0x7f0000010000)="601c6d6b646f736689254300080120000400004000f8000020004000030000000000000001", 0x25}, {0x0, 0x0, 0x10000}], 0x0, &(0x7f0000000040)=ANY=[]) [ 2054.606033] loop7: detected capacity change from 0 to 2048 [ 2054.629940] EXT4-fs (loop7): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 2054.630638] EXT4-fs (loop7): group descriptors corrupted! [ 2054.650146] loop7: detected capacity change from 0 to 2048 [ 2054.667860] EXT4-fs (loop7): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 2054.669061] EXT4-fs (loop7): group descriptors corrupted! [ 2054.670806] loop5: detected capacity change from 0 to 2048 [ 2054.716644] EXT4-fs (loop5): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 2054.717909] EXT4-fs (loop5): group descriptors corrupted! 06:08:59 executing program 0: syncfs(0xffffffffffffffff) sendmsg$NL80211_CMD_DEL_TX_TS(0xffffffffffffffff, 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_SETPIPEFD(0xffffffffffffffff, 0xc0189378, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = memfd_create(&(0x7f0000000400)='B\xdb/\x89\x03l\xdeb\xcb\xb54\xed\xbeLY\xb5Z\xe1\x12S\xf5G\xcc\xf3\xe9\x02h\v\xca(\x96\xe1C\xdf\x1c\xea\x85C\xfb\x10\x13\xfa\x03\x16\xcd\x17\xa2\x80\xa1z\xb4r\x95\xc3@\x9d\xa6\xf1\x92#}g\xd3`\xf7\xcez\xcb\xb3\x1a\xbb\xc48e\x8e\xb1&\xd1\x8a\xe6!\x7f\x8d\xea,qx\xa28\xbf\"\xc7e\x06L\xb06\xeb<$\xd7\xba\xe5\x01\x03\x94r\xab\xd4J\x03s\xaf\xf6A\xbfV\xfa\x1ew\x8d\xbf\x99I\x97\xd8\xd2\xe8\x11\xc4\x04\x00\x84\xd5i\xee\xaf\xae[E\x1f\xdd\xd7#rT+\xb621p\xaf[\x99\" 1\xeb\xc7)\xd2\x1dh\xf2\xd5s\xfd?\fa>\x9f;\xe5r\xe5\xbd\xb0|=\x8eZcPY\xf8\xbd\x13\xaa\x8b\xdf\xbc\x93u\xd5\xb0r\xfb\xde\xe7\xd9k\xe2\xc6\x1b\xf2o@&>\xf2M\xe7\x8c\xeb\xee\xf5\x02~\x85\x14\xf3\xc6v\xf15PE\x8c\xca\x16$\xc2\x01#\xb563\rbq\xbf64\xfaW\x17\xdfa\xe6\xca\x86\xd7\xf8\x81X\x9bg4\xc1\xdam\xcf=Rq6\xb0\xd4D=I\x1a\x0e\xd0\xabz\xe2\x19\x0fM\xad\xdco\xa4\xb2\x8c?\xc1\x10\xf273\xd00\xb3_\xe8\x9a*\xfcL\xea;\xc0\x9a\xdbx!N;\xb5x\t\xa4E\xbe\x93r\x04\xf5\xf0\xf5\x7f\x9a)\xf5\x1b\"\xa1\xd8\x06>\xc9\xe2r\xe9\xbb\xfe\xc0\b\x81\x98\x1c\xe2\xe0?\x8f\xa1\xbel\aN\x83@\xb1\x03)4A\x83\xd6\xcf\xf6\xb5\x82\xb7\x9dA\b$\xa2x\x8a@\xfaj~\xef\x93\xb1/L\x01\xe2\xba|\xf0\x01)PP\xcdl\x06\xfc\x15;qZ\xb1u\xc9\xd0\xd16~JEGm\xe4\x1e@\x9dG\xe4@\xdf\xba\'\x8b\x1cD\xc7\xec\xd1@}tR\xd9P\xf4N\xe3\xd8x\xa0\x91\x17\xc2}\x13\b\xca\t(Z\xa3_\xa1\x90\x15T\xa4\xe7%\x98\xa7\xfb\x8bp/eq\x93\xbf\x1f =|\xf3\xb1\xfcR\xd8\nM,\xcb%@\'\x15\x88\xd8\xad\f\x91|\x95\x8fq+\x98\x81W\xba\x9f\xe0elOt\xbd\by\r\x87\x1c\xba\xbd\x8e+S>\xb8\xe29\x91h^x\xfb`\x00\xdd/\xa6\xb1\x16=\xa1bw\xc5I\xb1\x00'/549, 0x2) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='net/mcfilter6\x00') socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000002780)={0xffffffffffffffff, 0xffffffffffffffff}) getsockopt$sock_buf(r2, 0x1, 0x3b, 0x0, &(0x7f0000000100)) ioctl$EXT4_IOC_CHECKPOINT(r2, 0x4004662b, &(0x7f0000000040)=0x5) sendmsg$DEVLINK_CMD_PORT_UNSPLIT(r1, &(0x7f0000000240)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x4000000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000140)={0xf4, 0x0, 0x400, 0x70bd26, 0x25dfdbfe, {}, [{{@nsim={{0xe}, {0xf, 0x2, {'netdevsim', 0x0}}}, {0x8, 0x3, 0x1}}}, {{@pci={{0x8}, {0x11}}, {0x8, 0x3, 0x1}}}, {{@pci={{0x8}, {0x11}}, {0x8, 0x3, 0x3}}}, {{@nsim={{0xe}, {0xf, 0x2, {'netdevsim', 0x0}}}, {0x8, 0x3, 0x1}}}, {{@pci={{0x8}, {0x11}}, {0x8, 0x3, 0x2}}}, {{@pci={{0x8}, {0x11}}, {0x8, 0x3, 0x1}}}]}, 0xf4}, 0x1, 0x0, 0x0, 0x1}, 0x40408d0) fcntl$addseals(r0, 0x409, 0x0) [ 2054.741161] loop4: detected capacity change from 0 to 256 [ 2054.748369] loop5: detected capacity change from 0 to 2048 06:08:59 executing program 1: pipe(&(0x7f0000000340)={0xffffffffffffffff}) pread64(r0, &(0x7f0000000440)=""/95, 0x5f, 0x6) execveat(r0, &(0x7f0000000080)='./file0\x00', &(0x7f00000001c0)=[&(0x7f00000000c0)='\x00', &(0x7f0000000180)='\x00'], &(0x7f0000000400)=[&(0x7f0000000200)='/dev/zero\x00', &(0x7f0000000240)='/dev/zero\x00', &(0x7f0000000300)='/dev/zero\x00'], 0x1000) socket$inet(0x2, 0x1, 0x0) perf_event_open(&(0x7f0000000100)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x22420, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ptrace$setopts(0x4200, 0x0, 0x5, 0x100050) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000004c00)={0xc0002100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) gettid() r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000), 0x380, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000000)='net/udp6\x00') read$hiddev(r2, &(0x7f0000001140)=""/212, 0xd4) fchmodat(r2, &(0x7f00000004c0)='./file0\x00', 0x0) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(r1, 0xc018937c, &(0x7f0000000380)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32=r0, @ANYBLOB="00000000000000002e2f66696cee8816"]) ioctl$TIOCSSOFTCAR(r3, 0x541a, &(0x7f00000003c0)=0x6) waitid$P_PIDFD(0x3, r1, &(0x7f0000000500), 0x2, &(0x7f0000000580)) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(r1, 0xc0189372, &(0x7f0000000040)={{0x1, 0x1, 0x18, r2, {0xffff}}, './file0\x00'}) [ 2054.799879] FAT-fs (loop4): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) 06:08:59 executing program 7: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x100090, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000100000005000000000004000040000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000001000018000000c28500002b02", 0x66, 0x400}, {&(0x7f0000010100)="000000000000000000000000e8f7d2e8feeb4bf889ba053b02420ff8010040", 0x1f, 0x4e0}], 0x0, &(0x7f0000000140)=ANY=[]) 06:08:59 executing program 3: r0 = getpid() ioprio_get$pid(0x2, r0) r1 = getpid() ioprio_get$pid(0x2, r1) syz_mount_image$vfat(0x0, &(0x7f0000000040)='./file1\x00', 0x0, 0x0, &(0x7f00000000c0), 0x2002000, &(0x7f0000000400)=ANY=[@ANYRES16, @ANYBLOB="72e1af808ba473e6f37c85b113d8c4d9e1de4ed2968d2e01108c4795a941d14f6927393c8c3c458dd7454900d48719912efc18d580a8f841234284071012d7d5020eb5d56dc1ba5f1048adac4b928bf6cfd663b4cab43637cb979a9199a0246ec02345161783bc79585902603d7062084f05b744e31fcb4c3e81f3becabb7ad1fa5783f5e5e60ae912102fe8df0536bd074c03bd33742f35c5c44b5c3c9d693114367b7d966e"]) chdir(&(0x7f0000000140)='./file0\x00') ptrace$getenv(0x4201, r0, 0xfff, &(0x7f00000000c0)) openat(0xffffffffffffff9c, &(0x7f0000000000)='./file2\x00', 0x40c2, 0x0) r2 = perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r4 = fork() perf_event_open(&(0x7f0000000540)={0x4, 0x80, 0xeb, 0x0, 0x20, 0x0, 0x0, 0x2, 0x2820, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, @perf_config_ext={0xdc, 0x40}, 0x40000, 0x3, 0x8, 0x5, 0x6000000000000, 0x4, 0x5, 0x0, 0x3, 0x0, 0x3}, r4, 0x9, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000340)={0x0, 0x80, 0x2, 0x83, 0x1, 0x7, 0x0, 0x1f, 0x9ec17fc7a3e840c7, 0xc, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x9, 0x4, @perf_bp={&(0x7f0000000240), 0x1}, 0x404, 0x7, 0x3, 0x6, 0x800, 0x9, 0x3, 0x0, 0x7ff, 0x0, 0x9}, r4, 0x8, r2, 0x9) fork() setxattr$trusted_overlay_upper(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180), &(0x7f00000001c0)={0x0, 0xfb, 0x7a, 0x0, 0x2, "d54449275cb08faf62df87518e3ce16f", "9a61b461b0c63151b954990036d5e0163ceb48c6a801bb019e9e6fa7196a9372f804b9e9ca3fb3d85d1985d31346bbd5fd02b1c8223bf6388eb75498623e38ff88a99c5ce38698a32306b7d4e4b0fd4b03bfa568df17a42f725c6c33046b38b6e4a713dde1"}, 0x7a, 0x3) socket$nl_audit(0x10, 0x3, 0x9) chroot(&(0x7f0000000080)='./file1\x00') sendmsg$inet(r3, &(0x7f0000000780)={&(0x7f0000000000)={0x2, 0x0, @local}, 0x10, &(0x7f00000003c0)=[{&(0x7f0000000300)="6fb9", 0xffeb}], 0x1, &(0x7f0000000700)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @remote, @broadcast}}}], 0x20}, 0x0) [ 2054.820731] EXT4-fs (loop5): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 2054.822091] EXT4-fs (loop5): group descriptors corrupted! 06:08:59 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="200000006602000019000000900100000f000000000000000100000005000000000004000040000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000001000018000000c28500002b02", 0x66, 0x400}, {&(0x7f0000010100)="000000000000000000000000e8f7d2e8feeb4bf889ba053b02420ff8010040", 0x1f, 0x4e0}], 0x0, &(0x7f0000000140)=ANY=[]) 06:08:59 executing program 6: ioctl$AUTOFS_DEV_IOCTL_CLOSEMOUNT(0xffffffffffffffff, 0xc0189375, 0x0) syz_genetlink_get_family_id$ethtool(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_PAUSE_SET(0xffffffffffffffff, 0x0, 0x50) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = memfd_create(&(0x7f0000000400)='B\xdb/\x89\x03l\xdeb\xcb\xb54\xed\xbeLY\xb5Z\xe1\x12S\xf5G\xcc\xf3\xe9\x02h\v\xca(\x96\xe1C\xdf\x1c\xea\x85C\xfb\x10\x13\xfa\x03\x16\xcd\x17\xa2\x80\xa1z\xb4r\x95\xc3@\x9d\xa6\xf1\x92#}g\xd3`\xf7\xcez\xcb\xb3\x1a\xbb\xc48e\x8e\xb1&\xd1\x8a\xe6!\x7f\x8d\xea,qx\xa28\xbf\"\xc7e\x06L\xb06\xeb<$\xd7\xba\xe5\x01\x03\x94r\xab\xd4J\x03s\xaf\xf6A\xbfV\xfa\x1ew\x8d\xbf\x99I\x97\xd8\xd2\xe8\x11\xc4\x04\x00\x84\xd5i\xee\xaf\xae[E\x1f\xdd\xd7#rT+\xb621p\xaf[\x99\" 1\xeb\xc7)\xd2\x1dh\xf2\xd5s\xfd?\fa>\x9f;\xe5r\xe5\xbd\xb0|=\x8eZcPY\xf8\xbd\x13\xaa\x8b\xdf\xbc\x93u\xd5\xb0r\xfb\xde\xe7\xd9k\xe2\xc6\x1b\xf2o@&>\xf2M\xe7\x8c\xeb\xee\xf5\x02~\x85\x14\xf3\xc6v\xf15PE\x8c\xca\x16$\xc2\x01#\xb563\rbq\xbf64\xfaW\x17\xdfa\xe6\xca\x86\xd7\xf8\x81X\x9bg4\xc1\xdam\xcf=Rq6\xb0\xd4D=I\x1a\x0e\xd0\xabz\xe2\x19\x0fM\xad\xdco\xa4\xb2\x8c?\xc1\x10\xf273\xd00\xb3_\xe8\x9a*\xfcL\xea;\xc0\x9a\xdbx!N;\xb5x\t\xa4E\xbe\x93r\x04\xf5\xf0\xf5\x7f\x9a)\xf5\x1b\"\xa1\xd8\x06>\xc9\xe2r\xe9\xbb\xfe\xc0\b\x81\x98\x1c\xe2\xe0?\x8f\xa1\xbel\aN\x83@\xb1\x03)4A\x83\xd6\xcf\xf6\xb5\x82\xb7\x9dA\b$\xa2x\x8a@\xfaj~\xef\x93\xb1/L\x01\xe2\xba|\xf0\x01)PP\xcdl\x06\xfc\x15;qZ\xb1u\xc9\xd0\xd16~JEGm\xe4\x1e@\x9dG\xe4@\xdf\xba\'\x8b\x1cD\xc7\xec\xd1@}tR\xd9P\xf4N\xe3\xd8x\xa0\x91\x17\xc2}\x13\b\xca\t(Z\xa3_\xa1\x90\x15T\xa4\xe7%\x98\xa7\xfb\x8bp/eq\x93\xbf\x1f =|\xf3\xb1\xfcR\xd8\nM,\xcb%@\'\x15\x88\xd8\xad\f\x91|\x95\x8fq+\x98\x81W\xba\x9f\xe0elOt\xbd\by\r\x87\x1c\xba\xbd\x8e+S>\xb8\xe29\x91h^x\xfb`\x00\xdd/\xa6\xb1\x16=\xa1bw\xc5I\xb1\x00'/549, 0x2) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x101342, 0x0) write$binfmt_aout(r1, &(0x7f0000000c40)=ANY=[], 0x820) r2 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x0, 0x0) sendfile(r1, r2, 0x0, 0x7fffffff) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000002780)={0xffffffffffffffff, 0xffffffffffffffff}) getsockopt$sock_buf(r3, 0x1, 0x3b, 0x0, &(0x7f0000000100)) fsconfig$FSCONFIG_SET_FD(r1, 0x5, &(0x7f0000000000)='ethtool\x00', 0x0, r3) fcntl$addseals(r0, 0x409, 0x0) 06:08:59 executing program 4: r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000040), 0xffffffffffffffff) syz_genetlink_get_family_id$ethtool(&(0x7f0000000100), 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_PAUSE_SET(0xffffffffffffffff, &(0x7f0000000440)={0x0, 0x0, 0x0}, 0x0) r2 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000080)='smaps\x00') pread64(r2, &(0x7f00000000c0)=""/98, 0x62, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x7fffffff) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(0xffffffffffffffff, 0xc0189374, &(0x7f0000000240)={{0x1, 0x1, 0x18, r0, {0x8}}, './file0\x00'}) dup3(0xffffffffffffffff, r2, 0x0) r3 = socket$inet_icmp_raw(0x2, 0x3, 0x1) syz_genetlink_get_family_id$ethtool(&(0x7f0000000180), r2) socket$nl_audit(0x10, 0x3, 0x9) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000040)={'wlan1\x00', 0x0}) sendmsg$inet(r3, &(0x7f0000000780)={&(0x7f0000000000)={0x2, 0x0, @local}, 0x10, &(0x7f00000003c0)=[{&(0x7f0000000300)="6fb9", 0xffeb}], 0x1, &(0x7f0000000700)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {r4, @remote, @broadcast}}}], 0x20}, 0x0) r5 = socket$inet_icmp_raw(0x2, 0x3, 0x1) socket$nl_audit(0x10, 0x3, 0x9) sendmsg$inet(r5, &(0x7f0000000780)={&(0x7f0000000000)={0x2, 0x0, @local}, 0x10, &(0x7f00000003c0)=[{&(0x7f0000000300)="6fb9", 0xffeb}], 0x1, &(0x7f0000000700)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @remote, @broadcast}}}], 0x20}, 0x0) sendmsg$ETHTOOL_MSG_LINKINFO_GET(r2, &(0x7f0000000200)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f00000001c0)={&(0x7f0000000340)=ANY=[@ANYBLOB='@\x00\x00\x00', @ANYRES16=r1, @ANYBLOB="000427bd7000ffdbdf25020000002c00018008000100", @ANYRES32=0x0, @ANYBLOB='\b\x00C\x00\x00\x00\x00\x00\b\x00!\x00', @ANYRES32=r4, @ANYBLOB, @ANYRES32=0x0, @ANYBLOB], 0x40}, 0x1, 0x0, 0x0, 0x4}, 0xd0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000480), 0x1}, 0x603}, 0x0, 0xffffffefffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000040)=[{&(0x7f0000010000)="601c6d6b646f736689254300080120000400004000f8000020004000030000000000000001", 0x25}, {0x0, 0x0, 0x10000}], 0x0, &(0x7f0000000040)=ANY=[]) [ 2055.066011] loop4: detected capacity change from 0 to 256 [ 2055.100257] FAT-fs (loop4): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) 06:09:14 executing program 1: pipe(&(0x7f0000000340)={0xffffffffffffffff}) pread64(r0, &(0x7f0000000440)=""/95, 0x5f, 0x6) execveat(r0, &(0x7f0000000080)='./file0\x00', &(0x7f00000001c0)=[&(0x7f00000000c0)='\x00', &(0x7f0000000180)='\x00'], &(0x7f0000000400)=[&(0x7f0000000200)='/dev/zero\x00', &(0x7f0000000240)='/dev/zero\x00', &(0x7f0000000300)='/dev/zero\x00'], 0x1000) socket$inet(0x2, 0x1, 0x0) perf_event_open(&(0x7f0000000100)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x22420, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ptrace$setopts(0x4200, 0x0, 0x5, 0x100050) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000004c00)={0xc0002100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) gettid() r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000), 0x380, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000000)='net/udp6\x00') read$hiddev(r2, &(0x7f0000001140)=""/212, 0xd4) fchmodat(r2, &(0x7f00000004c0)='./file0\x00', 0x0) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(r1, 0xc018937c, &(0x7f0000000380)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32=r0, @ANYBLOB="00000000000000002e2f66696cee8816"]) ioctl$TIOCSSOFTCAR(r3, 0x541a, &(0x7f00000003c0)=0x6) waitid$P_PIDFD(0x3, r1, &(0x7f0000000500), 0x2, &(0x7f0000000580)) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(r1, 0xc0189372, &(0x7f0000000040)={{0x1, 0x1, 0x18, r2, {0xffff}}, './file0\x00'}) 06:09:14 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x100000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000100000005000000000004000040000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000001000018000000c28500002b02", 0x66, 0x400}, {&(0x7f0000010100)="000000000000000000000000e8f7d2e8feeb4bf889ba053b02420ff8010040", 0x1f, 0x4e0}], 0x0, &(0x7f0000000140)=ANY=[]) 06:09:14 executing program 4: r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000040), 0xffffffffffffffff) syz_genetlink_get_family_id$ethtool(&(0x7f0000000100), 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_PAUSE_SET(0xffffffffffffffff, &(0x7f0000000440)={0x0, 0x0, 0x0}, 0x0) r2 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000080)='smaps\x00') pread64(r2, &(0x7f00000000c0)=""/98, 0x62, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x7fffffff) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(0xffffffffffffffff, 0xc0189374, &(0x7f0000000240)={{0x1, 0x1, 0x18, r0, {0x8}}, './file0\x00'}) dup3(0xffffffffffffffff, r2, 0x0) r3 = socket$inet_icmp_raw(0x2, 0x3, 0x1) syz_genetlink_get_family_id$ethtool(&(0x7f0000000180), r2) socket$nl_audit(0x10, 0x3, 0x9) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000040)={'wlan1\x00', 0x0}) sendmsg$inet(r3, &(0x7f0000000780)={&(0x7f0000000000)={0x2, 0x0, @local}, 0x10, &(0x7f00000003c0)=[{&(0x7f0000000300)="6fb9", 0xffeb}], 0x1, &(0x7f0000000700)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {r4, @remote, @broadcast}}}], 0x20}, 0x0) r5 = socket$inet_icmp_raw(0x2, 0x3, 0x1) socket$nl_audit(0x10, 0x3, 0x9) sendmsg$inet(r5, &(0x7f0000000780)={&(0x7f0000000000)={0x2, 0x0, @local}, 0x10, &(0x7f00000003c0)=[{&(0x7f0000000300)="6fb9", 0xffeb}], 0x1, &(0x7f0000000700)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @remote, @broadcast}}}], 0x20}, 0x0) sendmsg$ETHTOOL_MSG_LINKINFO_GET(r2, &(0x7f0000000200)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f00000001c0)={&(0x7f0000000340)=ANY=[@ANYBLOB='@\x00\x00\x00', @ANYRES16=r1, @ANYBLOB="000427bd7000ffdbdf25020000002c00018008000100", @ANYRES32=0x0, @ANYBLOB='\b\x00C\x00\x00\x00\x00\x00\b\x00!\x00', @ANYRES32=r4, @ANYBLOB, @ANYRES32=0x0, @ANYBLOB], 0x40}, 0x1, 0x0, 0x0, 0x4}, 0xd0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000480), 0x1}, 0x603}, 0x0, 0xffffffefffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000040)=[{&(0x7f0000010000)="601c6d6b646f736689254300080120000400004000f8000020004000030000000000000001", 0x25}, {0x0, 0x0, 0x10000}], 0x0, &(0x7f0000000040)=ANY=[]) 06:09:14 executing program 0: syncfs(0xffffffffffffffff) sendmsg$NL80211_CMD_DEL_TX_TS(0xffffffffffffffff, 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_SETPIPEFD(0xffffffffffffffff, 0xc0189378, 0x0) r0 = syz_open_dev$tty20(0xc, 0x4, 0x0) ioctl$TIOCL_GETKMSGREDIRECT(r0, 0x541c, &(0x7f0000000000)) ioctl$TIOCL_SETSEL(r0, 0x541c, &(0x7f0000000000)={0x2, {0x2, 0x3, 0x447, 0x0, 0x6de2, 0x10}}) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$ieee802154(&(0x7f0000000040), r1) ioctl$sock_SIOCGIFINDEX_802154(r1, 0x8933, &(0x7f0000000080)={'wpan1\x00', 0x0}) sendmsg$IEEE802154_LLSEC_ADD_DEV(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)={0x1c, r2, 0x601, 0x0, 0x0, {0x24}, [@IEEE802154_ATTR_DEV_INDEX={0x8, 0x2, r3}]}, 0x1c}}, 0x0) sendmsg$NLBL_UNLABEL_C_STATICADDDEF(r1, &(0x7f0000000200)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x800000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000640)=ANY=[@ANYBLOB="a4000000ac455a2d33cacc7772b71a418462c4013a434aee86acb54b44279ec21155f68c33dff35309f53beeb0fd8f79f8e361d974faa71e973f188034f1120d7a2ec20309050a85aa2fca076a2462aef6439fcd18ca079bada584791b77bb9870c74b7d39436f52e06a3cfc88806d9384ed6e18b350a2470fec6d393ea00db612035f5180800094b50cf94912fe7619afbf782999d4ee0ba15de3598154eaedb676fcb3508cbe6acd86371f714b8322214a74a25122c9a34095ceca10644edade5869717bc62882d98b3ae34a4f283231cea4351f7fd854d4bf00f27cc6aa8f5ba00f20987831735bfa7f8d3506000000097a575547afb0d3911e39c23cf5762bc1f14b10357f567745e4bd1b11c17c07f4940a6cf15f54325b1ad93875ec42b2ad66b07fbd5f794df993e8690a57c4324dc0a37856798e7f9dceabd1", @ANYRES16=0x0, @ANYBLOB="00032cbd7000fcdbdf250600000014000300200100000000000000000000000000012600070073797374656d5f753a6f626a6563745f723a6c6f67696e5f657865635f743a73300000003000070073797374656d5f753a6f626a6563745f723a6465766963656b69745f706f7765725f657865635f743a7330002400070073797374656d5f753a6f626a6563745f723a6574635f6d61696c5f743a733000"], 0xa4}, 0x1, 0x0, 0x0, 0x804}, 0x4000000) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000002780)={0xffffffffffffffff, 0xffffffffffffffff}) getsockopt$sock_buf(r4, 0x1, 0x3b, 0x0, &(0x7f0000000100)) socketpair$unix(0x1, 0x7, 0x0, &(0x7f0000002780)={0xffffffffffffffff, 0xffffffffffffffff}) getsockopt$sock_buf(r5, 0x1, 0x3b, 0x0, &(0x7f0000000100)) ioctl$F2FS_IOC_MOVE_RANGE(r4, 0xc020f509, &(0x7f0000000040)={r5, 0x6ab2, 0x3f, 0xfffffffffffffffa}) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x7, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r6 = memfd_create(&(0x7f0000000400)='B\xdb/\x89\x03l\xdeb\xcb\xb54\xed\xbeLY\xb5Z\xe1\x12S\xf5G\xcc\xf3\xe9\x02h\v\xca(\x96\xe1C\xdf\x1c\xea\x85C\xfb\x10\x13\xfa\x03\x16\xcd\x17\xa2\x80\xa1z\xb4r\x95\xc3@\x9d\xa6\xf1\x92#}g\xd3`\xf7\xcez\xcb\xb3\x1a\xbb\xc48e\x8e\xb1&\xd1\x8a\xe6!\x7f\x8d\xea,qx\xa28\xbf\"\xc7e\x06L\xb06\xeb<$\xd7\xba\xe5\x01\x03\x94r\xab\xd4J\x03s\xaf\xf6A\xbfV\xfa\x1ew\x8d\xbf\x99I\x97\xd8\xd2\xe8\x11\xc4\x04\x00\x84\xd5i\xee\xaf\xae[E\x1f\xdd\xd7#rT+\xb621p\xaf[\x99\" 1\xeb\xc7)\xd2\x1dh\xf2\xd5s\xfd?\fa>\x9f;\xe5r\xe5\xbd\xb0|=\x8eZcPY\xf8\xbd\x13\xaa\x8b\xdf\xbc\x93u\xd5\xb0r\xfb\xde\xe7\xd9k\xe2\xc6\x1b\xf2o@&>\xf2M\xe7\x8c\xeb\xee\xf5\x02~\x85\x14\xf3\xc6v\xf15PE\x8c\xca\x16$\xc2\x01#\xb563\rbq\xbf64\xfaW\x17\xdfa\xe6\xca\x86\xd7\xf8\x81X\x9bg4\xc1\xdam\xcf=Rq6\xb0\xd4D=I\x1a\x0e\xd0\xabz\xe2\x19\x0fM\xad\xdco\xa4\xb2\x8c?\xc1\x10\xf273\xd00\xb3_\xe8\x9a*\xfcL\xea;\xc0\x9a\xdbx!N;\xb5x\t\xa4E\xbe\x93r\x04\xf5\xf0\xf5\x7f\x9a)\xf5\x1b\"\xa1\xd8\x06>\xc9\xe2r\xe9\xbb\xfe\xc0\b\x81\x98\x1c\xe2\xe0?\x8f\xa1\xbel\aN\x83@\xb1\x03)4A\x83\xd6\xcf\xf6\xb5\x82\xb7\x9dA\b$\xa2x\x8a@\xfaj~\xef\x93\xb1/L\x01\xe2\xba|\xf0\x01)PP\xcdl\x06\xfc\x15;qZ\xb1u\xc9\xd0\xd16~JEGm\xe4\x1e@\x9dG\xe4@\xdf\xba\'\x8b\x1cD\xc7\xec\xd1@}tR\xd9P\xf4N\xe3\xd8x\xa0\x91\x17\xc2}\x13\b\xca\t(Z\xa3_\xa1\x90\x15T\xa4\xe7%\x98\xa7\xfb\x8bp/eq\x93\xbf\x1f =|\xf3\xb1\xfcR\xd8\nM,\xcb%@\'\x15\x88\xd8\xad\f\x91|\x95\x8fq+\x98\x81W\xba\x9f\xe0elOt\xbd\by\r\x87\x1c\xba\xbd\x8e+S>\xb8\xe29\x91h^x\xfb`\x00\xdd/\xa6\xb1\x16=\xa1bw\xc5I\xb1\x00'/549, 0x2) fcntl$addseals(r6, 0x409, 0x4) 06:09:14 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="200000048002000019000000900100000f000000000000000100000005000000000004000040000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000001000018000000c28500002b02", 0x66, 0x400}, {&(0x7f0000010100)="000000000000000000000000e8f7d2e8feeb4bf889ba053b02420ff8010040", 0x1f, 0x4e0}], 0x0, &(0x7f0000000140)=ANY=[]) 06:09:14 executing program 3: r0 = getpid() ioprio_get$pid(0x2, r0) r1 = getpid() ioprio_get$pid(0x2, r1) syz_mount_image$vfat(0x0, &(0x7f0000000040)='./file1\x00', 0x0, 0x0, &(0x7f00000000c0), 0x2002000, &(0x7f0000000400)=ANY=[@ANYRES16, @ANYBLOB="72e1af808ba473e6f37c85b113d8c4d9e1de4ed2968d2e01108c4795a941d14f6927393c8c3c458dd7454900d48719912efc18d580a8f841234284071012d7d5020eb5d56dc1ba5f1048adac4b928bf6cfd663b4cab43637cb979a9199a0246ec02345161783bc79585902603d7062084f05b744e31fcb4c3e81f3becabb7ad1fa5783f5e5e60ae912102fe8df0536bd074c03bd33742f35c5c44b5c3c9d693114367b7d966e"]) chdir(&(0x7f0000000140)='./file0\x00') ptrace$getenv(0x4201, r0, 0xfff, &(0x7f00000000c0)) openat(0xffffffffffffff9c, &(0x7f0000000000)='./file2\x00', 0x40c2, 0x0) r2 = perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r4 = fork() perf_event_open(&(0x7f0000000540)={0x4, 0x80, 0xeb, 0x0, 0x20, 0x0, 0x0, 0x2, 0x2820, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, @perf_config_ext={0xdc, 0x40}, 0x40000, 0x3, 0x8, 0x5, 0x6000000000000, 0x4, 0x5, 0x0, 0x3, 0x0, 0x3}, r4, 0x9, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000340)={0x0, 0x80, 0x2, 0x83, 0x1, 0x7, 0x0, 0x1f, 0x9ec17fc7a3e840c7, 0xc, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x9, 0x4, @perf_bp={&(0x7f0000000240), 0x1}, 0x404, 0x7, 0x3, 0x6, 0x800, 0x9, 0x3, 0x0, 0x7ff, 0x0, 0x9}, r4, 0x8, r2, 0x9) fork() setxattr$trusted_overlay_upper(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180), &(0x7f00000001c0)={0x0, 0xfb, 0x7a, 0x0, 0x2, "d54449275cb08faf62df87518e3ce16f", "9a61b461b0c63151b954990036d5e0163ceb48c6a801bb019e9e6fa7196a9372f804b9e9ca3fb3d85d1985d31346bbd5fd02b1c8223bf6388eb75498623e38ff88a99c5ce38698a32306b7d4e4b0fd4b03bfa568df17a42f725c6c33046b38b6e4a713dde1"}, 0x7a, 0x3) socket$nl_audit(0x10, 0x3, 0x9) chroot(&(0x7f0000000080)='./file1\x00') sendmsg$inet(r3, &(0x7f0000000780)={&(0x7f0000000000)={0x2, 0x0, @local}, 0x10, &(0x7f00000003c0)=[{&(0x7f0000000300)="6fb9", 0xffeb}], 0x1, &(0x7f0000000700)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @remote, @broadcast}}}], 0x20}, 0x0) 06:09:14 executing program 6: ioctl$AUTOFS_DEV_IOCTL_CLOSEMOUNT(0xffffffffffffffff, 0xc0189375, 0x0) syz_genetlink_get_family_id$ethtool(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_PAUSE_SET(0xffffffffffffffff, 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x101342, 0x0) write$binfmt_aout(r0, &(0x7f0000000c40)=ANY=[], 0x820) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x7fffffff) openat(r1, &(0x7f0000000000)='./file0\x00', 0x200000, 0xab) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = memfd_create(&(0x7f0000000400)='B\xdb/\x89\x03l\xdeb\xcb\xb54\xed\xbeLY\xb5Z\xe1\x12S\xf5G\xcc\xf3\xe9\x02h\v\xca(\x96\xe1C\xdf\x1c\xea\x85C\xfb\x10\x13\xfa\x03\x16\xcd\x17\xa2\x80\xa1z\xb4r\x95\xc3@\x9d\xa6\xf1\x92#}g\xd3`\xf7\xcez\xcb\xb3\x1a\xbb\xc48e\x8e\xb1&\xd1\x8a\xe6!\x7f\x8d\xea,qx\xa28\xbf\"\xc7e\x06L\xb06\xeb<$\xd7\xba\xe5\x01\x03\x94r\xab\xd4J\x03s\xaf\xf6A\xbfV\xfa\x1ew\x8d\xbf\x99I\x97\xd8\xd2\xe8\x11\xc4\x04\x00\x84\xd5i\xee\xaf\xae[E\x1f\xdd\xd7#rT+\xb621p\xaf[\x99\" 1\xeb\xc7)\xd2\x1dh\xf2\xd5s\xfd?\fa>\x9f;\xe5r\xe5\xbd\xb0|=\x8eZcPY\xf8\xbd\x13\xaa\x8b\xdf\xbc\x93u\xd5\xb0r\xfb\xde\xe7\xd9k\xe2\xc6\x1b\xf2o@&>\xf2M\xe7\x8c\xeb\xee\xf5\x02~\x85\x14\xf3\xc6v\xf15PE\x8c\xca\x16$\xc2\x01#\xb563\rbq\xbf64\xfaW\x17\xdfa\xe6\xca\x86\xd7\xf8\x81X\x9bg4\xc1\xdam\xcf=Rq6\xb0\xd4D=I\x1a\x0e\xd0\xabz\xe2\x19\x0fM\xad\xdco\xa4\xb2\x8c?\xc1\x10\xf273\xd00\xb3_\xe8\x9a*\xfcL\xea;\xc0\x9a\xdbx!N;\xb5x\t\xa4E\xbe\x93r\x04\xf5\xf0\xf5\x7f\x9a)\xf5\x1b\"\xa1\xd8\x06>\xc9\xe2r\xe9\xbb\xfe\xc0\b\x81\x98\x1c\xe2\xe0?\x8f\xa1\xbel\aN\x83@\xb1\x03)4A\x83\xd6\xcf\xf6\xb5\x82\xb7\x9dA\b$\xa2x\x8a@\xfaj~\xef\x93\xb1/L\x01\xe2\xba|\xf0\x01)PP\xcdl\x06\xfc\x15;qZ\xb1u\xc9\xd0\xd16~JEGm\xe4\x1e@\x9dG\xe4@\xdf\xba\'\x8b\x1cD\xc7\xec\xd1@}tR\xd9P\xf4N\xe3\xd8x\xa0\x91\x17\xc2}\x13\b\xca\t(Z\xa3_\xa1\x90\x15T\xa4\xe7%\x98\xa7\xfb\x8bp/eq\x93\xbf\x1f =|\xf3\xb1\xfcR\xd8\nM,\xcb%@\'\x15\x88\xd8\xad\f\x91|\x95\x8fq+\x98\x81W\xba\x9f\xe0elOt\xbd\by\r\x87\x1c\xba\xbd\x8e+S>\xb8\xe29\x91h^x\xfb`\x00\xdd/\xa6\xb1\x16=\xa1bw\xc5I\xb1\x00'/549, 0x2) fcntl$addseals(r2, 0x409, 0x0) 06:09:14 executing program 7: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x1000fe, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000100000005000000000004000040000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000001000018000000c28500002b02", 0x66, 0x400}, {&(0x7f0000010100)="000000000000000000000000e8f7d2e8feeb4bf889ba053b02420ff8010040", 0x1f, 0x4e0}], 0x0, &(0x7f0000000140)=ANY=[]) [ 2070.618536] loop7: detected capacity change from 0 to 2048 [ 2070.634009] loop5: detected capacity change from 0 to 2048 [ 2070.639986] EXT4-fs (loop7): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 2070.640707] EXT4-fs (loop7): group descriptors corrupted! [ 2070.655090] loop7: detected capacity change from 0 to 2048 [ 2070.666553] EXT4-fs (loop5): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 2070.667341] EXT4-fs (loop5): group descriptors corrupted! [ 2070.676611] loop5: detected capacity change from 0 to 2048 [ 2070.677167] EXT4-fs (loop7): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 2070.677182] EXT4-fs (loop7): group descriptors corrupted! [ 2070.681371] loop4: detected capacity change from 0 to 256 [ 2070.693495] EXT4-fs (loop5): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 2070.693511] EXT4-fs (loop5): group descriptors corrupted! [ 2070.723926] FAT-fs (loop4): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) 06:09:15 executing program 7: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x100300, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000100000005000000000004000040000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000001000018000000c28500002b02", 0x66, 0x400}, {&(0x7f0000010100)="000000000000000000000000e8f7d2e8feeb4bf889ba053b02420ff8010040", 0x1f, 0x4e0}], 0x0, &(0x7f0000000140)=ANY=[]) 06:09:15 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x100000, 0x8, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000100000005000000000004000040000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000001000018000000c28500002b02", 0x66, 0x400}, {&(0x7f0000010100)="000000000000000000000000e8f7d2e8feeb4bf889ba053b02420ff8010040", 0x1f, 0x4e0}], 0x0, &(0x7f0000000140)=ANY=[]) 06:09:15 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="20ffffff8c02000019000000900100000f000000000000000100000005000000000004000040000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000001000018000000c28500002b02", 0x66, 0x400}, {&(0x7f0000010100)="000000000000000000000000e8f7d2e8feeb4bf889ba053b02420ff8010040", 0x1f, 0x4e0}], 0x0, &(0x7f0000000140)=ANY=[]) 06:09:15 executing program 4: r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000040), 0xffffffffffffffff) syz_genetlink_get_family_id$ethtool(&(0x7f0000000100), 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_PAUSE_SET(0xffffffffffffffff, &(0x7f0000000440)={0x0, 0x0, 0x0}, 0x0) r2 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000080)='smaps\x00') pread64(r2, &(0x7f00000000c0)=""/98, 0x62, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x7fffffff) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(0xffffffffffffffff, 0xc0189374, &(0x7f0000000240)={{0x1, 0x1, 0x18, r0, {0x8}}, './file0\x00'}) dup3(0xffffffffffffffff, r2, 0x0) r3 = socket$inet_icmp_raw(0x2, 0x3, 0x1) syz_genetlink_get_family_id$ethtool(&(0x7f0000000180), r2) socket$nl_audit(0x10, 0x3, 0x9) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000040)={'wlan1\x00', 0x0}) sendmsg$inet(r3, &(0x7f0000000780)={&(0x7f0000000000)={0x2, 0x0, @local}, 0x10, &(0x7f00000003c0)=[{&(0x7f0000000300)="6fb9", 0xffeb}], 0x1, &(0x7f0000000700)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {r4, @remote, @broadcast}}}], 0x20}, 0x0) r5 = socket$inet_icmp_raw(0x2, 0x3, 0x1) socket$nl_audit(0x10, 0x3, 0x9) sendmsg$inet(r5, &(0x7f0000000780)={&(0x7f0000000000)={0x2, 0x0, @local}, 0x10, &(0x7f00000003c0)=[{&(0x7f0000000300)="6fb9", 0xffeb}], 0x1, &(0x7f0000000700)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @remote, @broadcast}}}], 0x20}, 0x0) sendmsg$ETHTOOL_MSG_LINKINFO_GET(r2, &(0x7f0000000200)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f00000001c0)={&(0x7f0000000340)=ANY=[@ANYBLOB='@\x00\x00\x00', @ANYRES16=r1, @ANYBLOB="000427bd7000ffdbdf25020000002c00018008000100", @ANYRES32=0x0, @ANYBLOB='\b\x00C\x00\x00\x00\x00\x00\b\x00!\x00', @ANYRES32=r4, @ANYBLOB="d5b921cac279671a02c4d90ed2cbc802c0", @ANYRES32=0x0, @ANYBLOB], 0x40}, 0x1, 0x0, 0x0, 0x4}, 0xd0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000480), 0x1}, 0x603}, 0x0, 0xffffffefffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000040)=[{&(0x7f0000010000)="601c6d6b646f736689254300080120000400004000f8000020004000030000000000000001", 0x25}, {0x0, 0x0, 0x10000}], 0x0, &(0x7f0000000040)=ANY=[]) [ 2070.861236] loop5: detected capacity change from 0 to 2048 06:09:15 executing program 3: r0 = getpid() ioprio_get$pid(0x2, r0) r1 = getpid() ioprio_get$pid(0x2, r1) syz_mount_image$vfat(0x0, &(0x7f0000000040)='./file1\x00', 0x0, 0x0, &(0x7f00000000c0), 0x2002000, &(0x7f0000000400)=ANY=[@ANYRES16, @ANYBLOB="72e1af808ba473e6f37c85b113d8c4d9e1de4ed2968d2e01108c4795a941d14f6927393c8c3c458dd7454900d48719912efc18d580a8f841234284071012d7d5020eb5d56dc1ba5f1048adac4b928bf6cfd663b4cab43637cb979a9199a0246ec02345161783bc79585902603d7062084f05b744e31fcb4c3e81f3becabb7ad1fa5783f5e5e60ae912102fe8df0536bd074c03bd33742f35c5c44b5c3c9d693114367b7d966e"]) chdir(&(0x7f0000000140)='./file0\x00') ptrace$getenv(0x4201, r0, 0xfff, &(0x7f00000000c0)) openat(0xffffffffffffff9c, &(0x7f0000000000)='./file2\x00', 0x40c2, 0x0) r2 = perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r4 = fork() perf_event_open(&(0x7f0000000540)={0x4, 0x80, 0xeb, 0x0, 0x20, 0x0, 0x0, 0x2, 0x2820, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, @perf_config_ext={0xdc, 0x40}, 0x40000, 0x3, 0x8, 0x5, 0x6000000000000, 0x4, 0x5, 0x0, 0x3, 0x0, 0x3}, r4, 0x9, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000340)={0x0, 0x80, 0x2, 0x83, 0x1, 0x7, 0x0, 0x1f, 0x9ec17fc7a3e840c7, 0xc, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x9, 0x4, @perf_bp={&(0x7f0000000240), 0x1}, 0x404, 0x7, 0x3, 0x6, 0x800, 0x9, 0x3, 0x0, 0x7ff, 0x0, 0x9}, r4, 0x8, r2, 0x9) fork() setxattr$trusted_overlay_upper(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180), &(0x7f00000001c0)={0x0, 0xfb, 0x7a, 0x0, 0x2, "d54449275cb08faf62df87518e3ce16f", "9a61b461b0c63151b954990036d5e0163ceb48c6a801bb019e9e6fa7196a9372f804b9e9ca3fb3d85d1985d31346bbd5fd02b1c8223bf6388eb75498623e38ff88a99c5ce38698a32306b7d4e4b0fd4b03bfa568df17a42f725c6c33046b38b6e4a713dde1"}, 0x7a, 0x3) socket$nl_audit(0x10, 0x3, 0x9) chroot(&(0x7f0000000080)='./file1\x00') sendmsg$inet(r3, &(0x7f0000000780)={&(0x7f0000000000)={0x2, 0x0, @local}, 0x10, &(0x7f00000003c0)=[{&(0x7f0000000300)="6fb9", 0xffeb}], 0x1, &(0x7f0000000700)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @remote, @broadcast}}}], 0x20}, 0x0) 06:09:15 executing program 1: pipe(&(0x7f0000000340)={0xffffffffffffffff}) pread64(r0, &(0x7f0000000440)=""/95, 0x5f, 0x6) execveat(r0, &(0x7f0000000080)='./file0\x00', &(0x7f00000001c0)=[&(0x7f00000000c0)='\x00', &(0x7f0000000180)='\x00'], &(0x7f0000000400)=[&(0x7f0000000200)='/dev/zero\x00', &(0x7f0000000240)='/dev/zero\x00', &(0x7f0000000300)='/dev/zero\x00'], 0x1000) socket$inet(0x2, 0x1, 0x0) perf_event_open(&(0x7f0000000100)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x22420, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ptrace$setopts(0x4200, 0x0, 0x5, 0x100050) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(0x0, 0x0) gettid() r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000), 0x380, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000000)='net/udp6\x00') read$hiddev(r2, &(0x7f0000001140)=""/212, 0xd4) fchmodat(r2, &(0x7f00000004c0)='./file0\x00', 0x0) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(r1, 0xc018937c, &(0x7f0000000380)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32=r0, @ANYBLOB="00000000000000002e2f66696cee8816"]) ioctl$TIOCSSOFTCAR(r3, 0x541a, &(0x7f00000003c0)=0x6) waitid$P_PIDFD(0x3, r1, &(0x7f0000000500), 0x2, &(0x7f0000000580)) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(r1, 0xc0189372, &(0x7f0000000040)={{0x1, 0x1, 0x18, r2, {0xffff}}, './file0\x00'}) [ 2070.939519] EXT4-fs (loop5): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 2070.940838] EXT4-fs (loop5): group descriptors corrupted! [ 2070.973179] loop7: detected capacity change from 0 to 2049 [ 2070.983360] loop5: detected capacity change from 0 to 2048 [ 2071.022244] EXT4-fs (loop7): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 2071.023695] EXT4-fs (loop7): group descriptors corrupted! 06:09:15 executing program 1: pipe(&(0x7f0000000340)={0xffffffffffffffff}) pread64(r0, &(0x7f0000000440)=""/95, 0x5f, 0x6) execveat(r0, &(0x7f0000000080)='./file0\x00', &(0x7f00000001c0)=[&(0x7f00000000c0)='\x00', &(0x7f0000000180)='\x00'], &(0x7f0000000400)=[&(0x7f0000000200)='/dev/zero\x00', &(0x7f0000000240)='/dev/zero\x00', &(0x7f0000000300)='/dev/zero\x00'], 0x1000) socket$inet(0x2, 0x1, 0x0) perf_event_open(&(0x7f0000000100)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x22420, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ptrace$setopts(0x4200, 0x0, 0x5, 0x100050) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(0x0, 0x0) gettid() r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000), 0x380, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000000)='net/udp6\x00') read$hiddev(r2, &(0x7f0000001140)=""/212, 0xd4) fchmodat(r2, &(0x7f00000004c0)='./file0\x00', 0x0) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(r1, 0xc018937c, &(0x7f0000000380)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32=r0, @ANYBLOB="00000000000000002e2f66696cee8816"]) ioctl$TIOCSSOFTCAR(r3, 0x541a, &(0x7f00000003c0)=0x6) waitid$P_PIDFD(0x3, r1, &(0x7f0000000500), 0x2, &(0x7f0000000580)) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(r1, 0xc0189372, &(0x7f0000000040)={{0x1, 0x1, 0x18, r2, {0xffff}}, './file0\x00'}) [ 2071.032702] EXT4-fs (loop5): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 2071.033980] EXT4-fs (loop5): group descriptors corrupted! 06:09:15 executing program 0: syncfs(0xffffffffffffffff) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000002780)={0xffffffffffffffff, 0xffffffffffffffff}) getsockopt$sock_buf(r0, 0x1, 0x3b, 0x0, &(0x7f0000000100)) tee(r0, 0xffffffffffffffff, 0x14b, 0xe) sendmsg$NL80211_CMD_DEL_TX_TS(0xffffffffffffffff, 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_SETPIPEFD(0xffffffffffffffff, 0xc0189378, 0x0) perf_event_open(&(0x7f0000000280)={0x2, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x2000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x20}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = memfd_create(&(0x7f0000000400)='B\xdb/\x89\x03l\xdeb\xcb\xb54\xed\xbeLY\xb5Z\xe1\x12S\xf5G\xcc\xf3\xe9\x02h\v\xca(\x96\xe1C\xdf\x1c\xea\x85C\xfb\x10\x13\xfa\x03\x16\xcd\x17\xa2\x80\xa1z\xb4r\x95\xc3@\x9d\xa6\xf1\x92#}g\xd3`\xf7\xcez\xcb\xb3\x1a\xbb\xc48e\x8e\xb1&\xd1\x8a\xe6!\x7f\x8d\xea,qx\xa28\xbf\"\xc7e\x06L\xb06\xeb<$\xd7\xba\xe5\x01\x03\x94r\xab\xd4J\x03s\xaf\xf6A\xbfV\xfa\x1ew\x8d\xbf\x99I\x97\xd8\xd2\xe8\x11\xc4\x04\x00\x84\xd5i\xee\xaf\xae[E\x1f\xdd\xd7#rT+\xb621p\xaf[\x99\" 1\xeb\xc7)\xd2\x1dh\xf2\xd5s\xfd?\fa>\x9f;\xe5r\xe5\xbd\xb0|=\x8eZcPY\xf8\xbd\x13\xaa\x8b\xdf\xbc\x93u\xd5\xb0r\xfb\xde\xe7\xd9k\xe2\xc6\x1b\xf2o@&>\xf2M\xe7\x8c\xeb\xee\xf5\x02~\x85\x14\xf3\xc6v\xf15PE\x8c\xca\x16$\xc2\x01#\xb563\rbq\xbf64\xfaW\x17\xdfa\xe6\xca\x86\xd7\xf8\x81X\x9bg4\xc1\xdam\xcf=Rq6\xb0\xd4D=I\x1a\x0e\xd0\xabz\xe2\x19\x0fM\xad\xdco\xa4\xb2\x8c?\xc1\x10\xf273\xd00\xb3_\xe8\x9a*\xfcL\xea;\xc0\x9a\xdbx!N;\xb5x\t\xa4E\xbe\x93r\x04\xf5\xf0\xf5\x7f\x9a)\xf5\x1b\"\xa1\xd8\x06>\xc9\xe2r\xe9\xbb\xfe\xc0\b\x81\x98\x1c\xe2\xe0?\x8f\xa1\xbel\aN\x83@\xb1\x03)4A\x83\xd6\xcf\xf6\xb5\x82\xb7\x9dA\b$\xa2x\x8a@\xfaj~\xef\x93\xb1/L\x01\xe2\xba|\xf0\x01)PP\xcdl\x06\xfc\x15;qZ\xb1u\xc9\xd0\xd16~JEGm\xe4\x1e@\x9dG\xe4@\xdf\xba\'\x8b\x1cD\xc7\xec\xd1@}tR\xd9P\xf4N\xe3\xd8x\xa0\x91\x17\xc2}\x13\b\xca\t(Z\xa3_\xa1\x90\x15T\xa4\xe7%\x98\xa7\xfb\x8bp/eq\x93\xbf\x1f =|\xf3\xb1\xfcR\xd8\nM,\xcb%@\'\x15\x88\xd8\xad\f\x91|\x95\x8fq+\x98\x81W\xba\x9f\xe0elOt\xbd\by\r\x87\x1c\xba\xbd\x8e+S>\xb8\xe29\x91h^x\xfb`\x00\xdd/\xa6\xb1\x16=\xa1bw\xc5I\xb1\x00'/549, 0x2) fcntl$addseals(r1, 0x409, 0x0) 06:09:15 executing program 3: r0 = getpid() ioprio_get$pid(0x2, r0) r1 = getpid() ioprio_get$pid(0x2, r1) syz_mount_image$vfat(0x0, &(0x7f0000000040)='./file1\x00', 0x0, 0x0, &(0x7f00000000c0), 0x2002000, &(0x7f0000000400)=ANY=[@ANYRES16, @ANYBLOB="72e1af808ba473e6f37c85b113d8c4d9e1de4ed2968d2e01108c4795a941d14f6927393c8c3c458dd7454900d48719912efc18d580a8f841234284071012d7d5020eb5d56dc1ba5f1048adac4b928bf6cfd663b4cab43637cb979a9199a0246ec02345161783bc79585902603d7062084f05b744e31fcb4c3e81f3becabb7ad1fa5783f5e5e60ae912102fe8df0536bd074c03bd33742f35c5c44b5c3c9d693114367b7d966e"]) chdir(&(0x7f0000000140)='./file0\x00') ptrace$getenv(0x4201, r0, 0xfff, &(0x7f00000000c0)) openat(0xffffffffffffff9c, &(0x7f0000000000)='./file2\x00', 0x40c2, 0x0) r2 = perf_event_open(&(0x7f0000000280)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x6, 0x0, 0xe}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r4 = fork() perf_event_open(&(0x7f0000000540)={0x4, 0x80, 0xeb, 0x0, 0x20, 0x0, 0x0, 0x2, 0x2820, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, @perf_config_ext={0xdc, 0x40}, 0x40000, 0x3, 0x8, 0x5, 0x6000000000000, 0x4, 0x5, 0x0, 0x3, 0x0, 0x3}, r4, 0x9, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000340)={0x0, 0x80, 0x2, 0x83, 0x1, 0x7, 0x0, 0x1f, 0x9ec17fc7a3e840c7, 0xc, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x9, 0x4, @perf_bp={&(0x7f0000000240), 0x1}, 0x404, 0x7, 0x3, 0x6, 0x800, 0x9, 0x3, 0x0, 0x7ff, 0x0, 0x9}, r4, 0x8, r2, 0x9) fork() setxattr$trusted_overlay_upper(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180), &(0x7f00000001c0)={0x0, 0xfb, 0x7a, 0x0, 0x2, "d54449275cb08faf62df87518e3ce16f", "9a61b461b0c63151b954990036d5e0163ceb48c6a801bb019e9e6fa7196a9372f804b9e9ca3fb3d85d1985d31346bbd5fd02b1c8223bf6388eb75498623e38ff88a99c5ce38698a32306b7d4e4b0fd4b03bfa568df17a42f725c6c33046b38b6e4a713dde1"}, 0x7a, 0x3) socket$nl_audit(0x10, 0x3, 0x9) chroot(&(0x7f0000000080)='./file1\x00') sendmsg$inet(r3, &(0x7f0000000780)={&(0x7f0000000000)={0x2, 0x0, @local}, 0x10, &(0x7f00000003c0)=[{&(0x7f0000000300)="6fb9", 0xffeb}], 0x1, &(0x7f0000000700)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @remote, @broadcast}}}], 0x20}, 0x0) 06:09:15 executing program 1: pipe(&(0x7f0000000340)={0xffffffffffffffff}) pread64(r0, &(0x7f0000000440)=""/95, 0x5f, 0x6) execveat(r0, &(0x7f0000000080)='./file0\x00', &(0x7f00000001c0)=[&(0x7f00000000c0)='\x00', &(0x7f0000000180)='\x00'], &(0x7f0000000400)=[&(0x7f0000000200)='/dev/zero\x00', &(0x7f0000000240)='/dev/zero\x00', &(0x7f0000000300)='/dev/zero\x00'], 0x1000) socket$inet(0x2, 0x1, 0x0) perf_event_open(&(0x7f0000000100)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x22420, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ptrace$setopts(0x4200, 0x0, 0x5, 0x100050) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(0x0, 0x0) gettid() r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000), 0x380, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000000)='net/udp6\x00') read$hiddev(r2, &(0x7f0000001140)=""/212, 0xd4) fchmodat(r2, &(0x7f00000004c0)='./file0\x00', 0x0) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(r1, 0xc018937c, &(0x7f0000000380)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32=r0, @ANYBLOB="00000000000000002e2f66696cee8816"]) ioctl$TIOCSSOFTCAR(r3, 0x541a, &(0x7f00000003c0)=0x6) waitid$P_PIDFD(0x3, r1, &(0x7f0000000500), 0x2, &(0x7f0000000580)) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(r1, 0xc0189372, &(0x7f0000000040)={{0x1, 0x1, 0x18, r2, {0xffff}}, './file0\x00'}) [ 2071.167323] loop4: detected capacity change from 0 to 256 06:09:15 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="20000009c002000019000000900100000f000000000000000100000005000000000004000040000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000001000018000000c28500002b02", 0x66, 0x400}, {&(0x7f0000010100)="000000000000000000000000e8f7d2e8feeb4bf889ba053b02420ff8010040", 0x1f, 0x4e0}], 0x0, &(0x7f0000000140)=ANY=[]) 06:09:15 executing program 7: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x1003c0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000100000005000000000004000040000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000001000018000000c28500002b02", 0x66, 0x400}, {&(0x7f0000010100)="000000000000000000000000e8f7d2e8feeb4bf889ba053b02420ff8010040", 0x1f, 0x4e0}], 0x0, &(0x7f0000000140)=ANY=[]) 06:09:15 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x100000, 0xe, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000100000005000000000004000040000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000001000018000000c28500002b02", 0x66, 0x400}, {&(0x7f0000010100)="000000000000000000000000e8f7d2e8feeb4bf889ba053b02420ff8010040", 0x1f, 0x4e0}], 0x0, &(0x7f0000000140)=ANY=[]) [ 2071.262923] FAT-fs (loop4): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) [ 2071.332996] loop7: detected capacity change from 0 to 2049 [ 2071.355447] EXT4-fs (loop7): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 2071.356141] EXT4-fs (loop7): group descriptors corrupted! [ 2071.369751] loop7: detected capacity change from 0 to 2049 [ 2071.380906] EXT4-fs (loop7): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 2071.382422] EXT4-fs (loop7): group descriptors corrupted! 06:09:15 executing program 3: r0 = getpid() ioprio_get$pid(0x2, r0) r1 = getpid() ioprio_get$pid(0x2, r1) syz_mount_image$vfat(0x0, &(0x7f0000000040)='./file1\x00', 0x0, 0x0, &(0x7f00000000c0), 0x2002000, &(0x7f0000000400)=ANY=[@ANYRES16, @ANYBLOB="72e1af808ba473e6f37c85b113d8c4d9e1de4ed2968d2e01108c4795a941d14f6927393c8c3c458dd7454900d48719912efc18d580a8f841234284071012d7d5020eb5d56dc1ba5f1048adac4b928bf6cfd663b4cab43637cb979a9199a0246ec02345161783bc79585902603d7062084f05b744e31fcb4c3e81f3becabb7ad1fa5783f5e5e60ae912102fe8df0536bd074c03bd33742f35c5c44b5c3c9d693114367b7d966e"]) chdir(&(0x7f0000000140)='./file0\x00') ptrace$getenv(0x4201, r0, 0xfff, &(0x7f00000000c0)) openat(0xffffffffffffff9c, &(0x7f0000000000)='./file2\x00', 0x40c2, 0x0) r2 = perf_event_open(&(0x7f0000000280)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x6, 0x0, 0xe}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r4 = fork() perf_event_open(&(0x7f0000000540)={0x4, 0x80, 0xeb, 0x0, 0x20, 0x0, 0x0, 0x2, 0x2820, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, @perf_config_ext={0xdc, 0x40}, 0x40000, 0x3, 0x8, 0x5, 0x6000000000000, 0x4, 0x5, 0x0, 0x3, 0x0, 0x3}, r4, 0x9, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000340)={0x0, 0x80, 0x2, 0x83, 0x1, 0x7, 0x0, 0x1f, 0x9ec17fc7a3e840c7, 0xc, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x9, 0x4, @perf_bp={&(0x7f0000000240), 0x1}, 0x404, 0x7, 0x3, 0x6, 0x800, 0x9, 0x3, 0x0, 0x7ff, 0x0, 0x9}, r4, 0x8, r2, 0x9) fork() setxattr$trusted_overlay_upper(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180), &(0x7f00000001c0)={0x0, 0xfb, 0x7a, 0x0, 0x2, "d54449275cb08faf62df87518e3ce16f", "9a61b461b0c63151b954990036d5e0163ceb48c6a801bb019e9e6fa7196a9372f804b9e9ca3fb3d85d1985d31346bbd5fd02b1c8223bf6388eb75498623e38ff88a99c5ce38698a32306b7d4e4b0fd4b03bfa568df17a42f725c6c33046b38b6e4a713dde1"}, 0x7a, 0x3) socket$nl_audit(0x10, 0x3, 0x9) chroot(&(0x7f0000000080)='./file1\x00') sendmsg$inet(r3, &(0x7f0000000780)={&(0x7f0000000000)={0x2, 0x0, @local}, 0x10, &(0x7f00000003c0)=[{&(0x7f0000000300)="6fb9", 0xffeb}], 0x1, &(0x7f0000000700)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @remote, @broadcast}}}], 0x20}, 0x0) [ 2071.454236] loop5: detected capacity change from 0 to 2048 [ 2071.509681] EXT4-fs (loop5): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 2071.511044] EXT4-fs (loop5): group descriptors corrupted! [ 2071.540924] loop5: detected capacity change from 0 to 2048 [ 2071.556979] EXT4-fs (loop5): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 2071.558309] EXT4-fs (loop5): group descriptors corrupted! 06:09:32 executing program 1: pipe(&(0x7f0000000340)={0xffffffffffffffff}) pread64(r0, &(0x7f0000000440)=""/95, 0x5f, 0x6) execveat(r0, &(0x7f0000000080)='./file0\x00', &(0x7f00000001c0)=[&(0x7f00000000c0)='\x00', &(0x7f0000000180)='\x00'], &(0x7f0000000400)=[&(0x7f0000000200)='/dev/zero\x00', &(0x7f0000000240)='/dev/zero\x00', &(0x7f0000000300)='/dev/zero\x00'], 0x1000) socket$inet(0x2, 0x1, 0x0) perf_event_open(&(0x7f0000000100)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x22420, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ptrace$setopts(0x4200, 0x0, 0x5, 0x100050) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000004c00)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) gettid() r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000), 0x380, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000000)='net/udp6\x00') read$hiddev(r2, &(0x7f0000001140)=""/212, 0xd4) fchmodat(r2, &(0x7f00000004c0)='./file0\x00', 0x0) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(r1, 0xc018937c, &(0x7f0000000380)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32=r0, @ANYBLOB="00000000000000002e2f66696cee8816"]) ioctl$TIOCSSOFTCAR(r3, 0x541a, &(0x7f00000003c0)=0x6) waitid$P_PIDFD(0x3, r1, &(0x7f0000000500), 0x2, &(0x7f0000000580)) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(r1, 0xc0189372, &(0x7f0000000040)={{0x1, 0x1, 0x18, r2, {0xffff}}, './file0\x00'}) 06:09:32 executing program 3: r0 = getpid() ioprio_get$pid(0x2, r0) r1 = getpid() ioprio_get$pid(0x2, r1) syz_mount_image$vfat(0x0, &(0x7f0000000040)='./file1\x00', 0x0, 0x0, &(0x7f00000000c0), 0x2002000, &(0x7f0000000400)=ANY=[@ANYRES16, @ANYBLOB="72e1af808ba473e6f37c85b113d8c4d9e1de4ed2968d2e01108c4795a941d14f6927393c8c3c458dd7454900d48719912efc18d580a8f841234284071012d7d5020eb5d56dc1ba5f1048adac4b928bf6cfd663b4cab43637cb979a9199a0246ec02345161783bc79585902603d7062084f05b744e31fcb4c3e81f3becabb7ad1fa5783f5e5e60ae912102fe8df0536bd074c03bd33742f35c5c44b5c3c9d693114367b7d966e"]) chdir(&(0x7f0000000140)='./file0\x00') ptrace$getenv(0x4201, r0, 0xfff, &(0x7f00000000c0)) openat(0xffffffffffffff9c, &(0x7f0000000000)='./file2\x00', 0x40c2, 0x0) r2 = perf_event_open(&(0x7f0000000280)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x6, 0x0, 0xe}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r4 = fork() perf_event_open(&(0x7f0000000540)={0x4, 0x80, 0xeb, 0x0, 0x20, 0x0, 0x0, 0x2, 0x2820, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, @perf_config_ext={0xdc, 0x40}, 0x40000, 0x3, 0x8, 0x5, 0x6000000000000, 0x4, 0x5, 0x0, 0x3, 0x0, 0x3}, r4, 0x9, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000340)={0x0, 0x80, 0x2, 0x83, 0x1, 0x7, 0x0, 0x1f, 0x9ec17fc7a3e840c7, 0xc, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x9, 0x4, @perf_bp={&(0x7f0000000240), 0x1}, 0x404, 0x7, 0x3, 0x6, 0x800, 0x9, 0x3, 0x0, 0x7ff, 0x0, 0x9}, r4, 0x8, r2, 0x9) fork() setxattr$trusted_overlay_upper(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180), &(0x7f00000001c0)={0x0, 0xfb, 0x7a, 0x0, 0x2, "d54449275cb08faf62df87518e3ce16f", "9a61b461b0c63151b954990036d5e0163ceb48c6a801bb019e9e6fa7196a9372f804b9e9ca3fb3d85d1985d31346bbd5fd02b1c8223bf6388eb75498623e38ff88a99c5ce38698a32306b7d4e4b0fd4b03bfa568df17a42f725c6c33046b38b6e4a713dde1"}, 0x7a, 0x3) socket$nl_audit(0x10, 0x3, 0x9) chroot(&(0x7f0000000080)='./file1\x00') sendmsg$inet(r3, &(0x7f0000000780)={&(0x7f0000000000)={0x2, 0x0, @local}, 0x10, &(0x7f00000003c0)=[{&(0x7f0000000300)="6fb9", 0xffeb}], 0x1, &(0x7f0000000700)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @remote, @broadcast}}}], 0x20}, 0x0) 06:09:32 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x100000, 0x10, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000100000005000000000004000040000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000001000018000000c28500002b02", 0x66, 0x400}, {&(0x7f0000010100)="000000000000000000000000e8f7d2e8feeb4bf889ba053b02420ff8010040", 0x1f, 0x4e0}], 0x0, &(0x7f0000000140)=ANY=[]) 06:09:32 executing program 0: syncfs(0xffffffffffffffff) sendmsg$NL80211_CMD_DEL_TX_TS(0xffffffffffffffff, 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_SETPIPEFD(0xffffffffffffffff, 0xc0189378, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000080)='/sys/module/pata_oldpiix', 0x100, 0x140) perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0x4, 0x35, 0x69, 0x80, 0x0, 0x9, 0x20010, 0x5, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x20, 0x2, @perf_config_ext={0x6, 0x5}, 0x400, 0x5, 0x6, 0x8, 0x6, 0x8, 0x6, 0x0, 0x1e0c, 0x0, 0x8000}, 0xffffffffffffffff, 0xa, r0, 0x4) r1 = memfd_create(&(0x7f0000000400)='B\xdb/\x89\x03l\xdeb\xcb\xb54\xed\xbeLY\xb5Z\xe1\x12S\xf5G\xcc\xf3\xe9\x02h\v\xca(\x96\xe1C\xdf\x1c\xea\x85C\xfb\x10\x13\xfa\x03\x16\xcd\x17\xa2\x80\xa1z\xb4r\x95\xc3@\x9d\xa6\xf1\x92#}g\xd3`\xf7\xcez\xcb\xb3\x1a\xbb\xc48e\x8e\xb1&\xd1\x8a\xe6!\x7f\x8d\xea,qx\xa28\xbf\"\xc7e\x06L\xb06\xeb<$\xd7\xba\xe5\x01\x03\x94r\xab\xd4J\x03s\xaf\xf6A\xbfV\xfa\x1ew\x8d\xbf\x99I\x97\xd8\xd2\xe8\x11\xc4\x04\x00\x84\xd5i\xee\xaf\xae[E\x1f\xdd\xd7#rT+\xb621p\xaf[\x99\" 1\xeb\xc7)\xd2\x1dh\xf2\xd5s\xfd?\fa>\x9f;\xe5r\xe5\xbd\xb0|=\x8eZcPY\xf8\xbd\x13\xaa\x8b\xdf\xbc\x93u\xd5\xb0r\xfb\xde\xe7\xd9k\xe2\xc6\x1b\xf2o@&>\xf2M\xe7\x8c\xeb\xee\xf5\x02~\x85\x14\xf3\xc6v\xf15PE\x8c\xca\x16$\xc2\x01#\xb563\rbq\xbf64\xfaW\x17\xdfa\xe6\xca\x86\xd7\xf8\x81X\x9bg4\xc1\xdam\xcf=Rq6\xb0\xd4D=I\x1a\x0e\xd0\xabz\xe2\x19\x0fM\xad\xdco\xa4\xb2\x8c?\xc1\x10\xf273\xd00\xb3_\xe8\x9a*\xfcL\xea;\xc0\x9a\xdbx!N;\xb5x\t\xa4E\xbe\x93r\x04\xf5\xf0\xf5\x7f\x9a)\xf5\x1b\"\xa1\xd8\x06>\xc9\xe2r\xe9\xbb\xfe\xc0\b\x81\x98\x1c\xe2\xe0?\x8f\xa1\xbel\aN\x83@\xb1\x03)4A\x83\xd6\xcf\xf6\xb5\x82\xb7\x9dA\b$\xa2x\x8a@\xfaj~\xef\x93\xb1/L\x01\xe2\xba|\xf0\x01)PP\xcdl\x06\xfc\x15;qZ\xb1u\xc9\xd0\xd16~JEGm\xe4\x1e@\x9dG\xe4@\xdf\xba\'\x8b\x1cD\xc7\xec\xd1@}tR\xd9P\xf4N\xe3\xd8x\xa0\x91\x17\xc2}\x13\b\xca\t(Z\xa3_\xa1\x90\x15T\xa4\xe7%\x98\xa7\xfb\x8bp/eq\x93\xbf\x1f =|\xf3\xb1\xfcR\xd8\nM,\xcb%@\'\x15\x88\xd8\xad\f\x91|\x95\x8fq+\x98\x81W\xba\x9f\xe0elOt\xbd\by\r\x87\x1c\xba\xbd\x8e+S>\xb8\xe29\x91h^x\xfb`\x00\xdd/\xa6\xb1\x16=\xa1bw\xc5I\xb1\x00'/549, 0x2) fcntl$addseals(r1, 0x409, 0x0) 06:09:32 executing program 7: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x100410, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000100000005000000000004000040000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000001000018000000c28500002b02", 0x66, 0x400}, {&(0x7f0000010100)="000000000000000000000000e8f7d2e8feeb4bf889ba053b02420ff8010040", 0x1f, 0x4e0}], 0x0, &(0x7f0000000140)=ANY=[]) 06:09:32 executing program 4: r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000040), 0xffffffffffffffff) syz_genetlink_get_family_id$ethtool(&(0x7f0000000100), 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_PAUSE_SET(0xffffffffffffffff, &(0x7f0000000440)={0x0, 0x0, 0x0}, 0x0) r2 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000080)='smaps\x00') pread64(r2, &(0x7f00000000c0)=""/98, 0x62, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x7fffffff) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(0xffffffffffffffff, 0xc0189374, &(0x7f0000000240)={{0x1, 0x1, 0x18, r0, {0x8}}, './file0\x00'}) dup3(0xffffffffffffffff, r2, 0x0) r3 = socket$inet_icmp_raw(0x2, 0x3, 0x1) syz_genetlink_get_family_id$ethtool(&(0x7f0000000180), r2) socket$nl_audit(0x10, 0x3, 0x9) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000040)={'wlan1\x00', 0x0}) sendmsg$inet(r3, &(0x7f0000000780)={&(0x7f0000000000)={0x2, 0x0, @local}, 0x10, &(0x7f00000003c0)=[{&(0x7f0000000300)="6fb9", 0xffeb}], 0x1, &(0x7f0000000700)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {r4, @remote, @broadcast}}}], 0x20}, 0x0) r5 = socket$inet_icmp_raw(0x2, 0x3, 0x1) socket$nl_audit(0x10, 0x3, 0x9) sendmsg$inet(r5, &(0x7f0000000780)={&(0x7f0000000000)={0x2, 0x0, @local}, 0x10, &(0x7f00000003c0)=[{&(0x7f0000000300)="6fb9", 0xffeb}], 0x1, &(0x7f0000000700)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @remote, @broadcast}}}], 0x20}, 0x0) sendmsg$ETHTOOL_MSG_LINKINFO_GET(r2, &(0x7f0000000200)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f00000001c0)={&(0x7f0000000340)=ANY=[@ANYBLOB='@\x00\x00\x00', @ANYRES16=r1, @ANYBLOB="000427bd7000ffdbdf25020000002c00018008000100", @ANYRES32=0x0, @ANYBLOB='\b\x00C\x00\x00\x00\x00\x00\b\x00!\x00', @ANYRES32=r4, @ANYBLOB="d5b921cac279671a02c4d90ed2cbc802c0", @ANYRES32=0x0, @ANYBLOB], 0x40}, 0x1, 0x0, 0x0, 0x4}, 0xd0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000480), 0x1}, 0x603}, 0x0, 0xffffffefffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000040)=[{&(0x7f0000010000)="601c6d6b646f736689254300080120000400004000f8000020004000030000000000000001", 0x25}, {0x0, 0x0, 0x10000}], 0x0, &(0x7f0000000040)=ANY=[]) 06:09:32 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="20fffffff602000019000000900100000f000000000000000100000005000000000004000040000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000001000018000000c28500002b02", 0x66, 0x400}, {&(0x7f0000010100)="000000000000000000000000e8f7d2e8feeb4bf889ba053b02420ff8010040", 0x1f, 0x4e0}], 0x0, &(0x7f0000000140)=ANY=[]) 06:09:32 executing program 6: ioctl$AUTOFS_DEV_IOCTL_CLOSEMOUNT(0xffffffffffffffff, 0xc0189375, 0x0) syz_genetlink_get_family_id$ethtool(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_PAUSE_SET(0xffffffffffffffff, 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_ISMOUNTPOINT(0xffffffffffffffff, 0xc018937e, &(0x7f0000000000)=ANY=[@ANYBLOB="0900003600000018000000", @ANYRES32=0xffffffffffffffff, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00./file0\x00']) r1 = syz_genetlink_get_family_id$tipc(&(0x7f00000000c0), 0xffffffffffffffff) sendmsg$TIPC_CMD_GET_LINKS(r0, &(0x7f0000000180)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x10000}, 0xc, &(0x7f0000000140)={&(0x7f0000000100)={0x24, r1, 0x8, 0x70bd26, 0x25dfdbfe, {{}, {}, {0x8, 0x11, 0x6}}, [""]}, 0x24}, 0x1, 0x0, 0x0, 0x44044}, 0x4) r2 = getpgrp(0xffffffffffffffff) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0xfe, 0x0, 0x2, 0x9edac7e253f3c317, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x802, 0x0, 0x0, 0x8, 0xfffffffffffffffc, 0xfffffffe}, r2, 0xe, 0xffffffffffffffff, 0x0) r3 = memfd_create(&(0x7f0000000400)='B\xdb/\x89\x03l\xdeb\xcb\xb54\xed\xbeLY\xb5Z\xe1\x12S\xf5G\xcc\xf3\xe9\x02h\v\xca(\x96\xe1C\xdf\x1c\xea\x85C\xfb\x10\x13\xfa\x03\x16\xcd\x17\xa2\x80\xa1z\xb4r\x95\xc3@\x9d\xa6\xf1\x92#}g\xd3`\xf7\xcez\xcb\xb3\x1a\xbb\xc48e\x8e\xb1&\xd1\x8a\xe6!\x7f\x8d\xea,qx\xa28\xbf\"\xc7e\x06L\xb06\xeb<$\xd7\xba\xe5\x01\x03\x94r\xab\xd4J\x03s\xaf\xf6A\xbfV\xfa\x1ew\x8d\xbf\x99I\x97\xd8\xd2\xe8\x11\xc4\x04\x00\x84\xd5i\xee\xaf\xae[E\x1f\xdd\xd7#rT+\xb621p\xaf[\x99\" 1\xeb\xc7)\xd2\x1dh\xf2\xd5s\xfd?\fa>\x9f;\xe5r\xe5\xbd\xb0|=\x8eZcPY\xf8\xbd\x13\xaa\x8b\xdf\xbc\x93u\xd5\xb0r\xfb\xde\xe7\xd9k\xe2\xc6\x1b\xf2o@&>\xf2M\xe7\x8c\xeb\xee\xf5\x02~\x85\x14\xf3\xc6v\xf15PE\x8c\xca\x16$\xc2\x01#\xb563\rbq\xbf64\xfaW\x17\xdfa\xe6\xca\x86\xd7\xf8\x81X\x9bg4\xc1\xdam\xcf=Rq6\xb0\xd4D=I\x1a\x0e\xd0\xabz\xe2\x19\x0fM\xad\xdco\xa4\xb2\x8c?\xc1\x10\xf273\xd00\xb3_\xe8\x9a*\xfcL\xea;\xc0\x9a\xdbx!N;\xb5x\t\xa4E\xbe\x93r\x04\xf5\xf0\xf5\x7f\x9a)\xf5\x1b\"\xa1\xd8\x06>\xc9\xe2r\xe9\xbb\xfe\xc0\b\x81\x98\x1c\xe2\xe0?\x8f\xa1\xbel\aN\x83@\xb1\x03)4A\x83\xd6\xcf\xf6\xb5\x82\xb7\x9dA\b$\xa2x\x8a@\xfaj~\xef\x93\xb1/L\x01\xe2\xba|\xf0\x01)PP\xcdl\x06\xfc\x15;qZ\xb1u\xc9\xd0\xd16~JEGm\xe4\x1e@\x9dG\xe4@\xdf\xba\'\x8b\x1cD\xc7\xec\xd1@}tR\xd9P\xf4N\xe3\xd8x\xa0\x91\x17\xc2}\x13\b\xca\t(Z\xa3_\xa1\x90\x15T\xa4\xe7%\x98\xa7\xfb\x8bp/eq\x93\xbf\x1f =|\xf3\xb1\xfcR\xd8\nM,\xcb%@\'\x15\x88\xd8\xad\f\x91|\x95\x8fq+\x98\x81W\xba\x9f\xe0elOt\xbd\by\r\x87\x1c\xba\xbd\x8e+S>\xb8\xe29\x91h^x\xfb`\x00\xdd/\xa6\xb1\x16=\xa1bw\xc5I\xb1\x00'/549, 0x2) r4 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x101342, 0x0) write$binfmt_aout(r4, &(0x7f0000000c40)=ANY=[], 0x820) r5 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x0, 0x0) sendfile(r4, r5, 0x0, 0x7fffffff) openat(r4, &(0x7f00000001c0)='./file0\x00', 0x101201, 0x2e) fcntl$addseals(r3, 0x409, 0x0) [ 2087.757452] loop5: detected capacity change from 0 to 2048 [ 2087.808707] loop7: detected capacity change from 0 to 2050 [ 2087.814690] EXT4-fs (loop5): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 2087.815800] EXT4-fs (loop5): group descriptors corrupted! [ 2087.835307] loop5: detected capacity change from 0 to 2048 [ 2087.843237] loop4: detected capacity change from 0 to 256 [ 2087.846538] EXT4-fs (loop7): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 2087.847705] EXT4-fs (loop7): group descriptors corrupted! [ 2087.856482] EXT4-fs (loop5): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 2087.857662] EXT4-fs (loop5): group descriptors corrupted! [ 2087.890777] loop7: detected capacity change from 0 to 2050 [ 2087.916344] EXT4-fs (loop7): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 2087.917434] EXT4-fs (loop7): group descriptors corrupted! [ 2087.947374] FAT-fs (loop4): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) 06:09:32 executing program 0: syncfs(0xffffffffffffffff) sendmsg$NL80211_CMD_DEL_TX_TS(0xffffffffffffffff, 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_SETPIPEFD(0xffffffffffffffff, 0xc0189378, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = memfd_create(&(0x7f0000000400)='B\xdb/\x89\x03l\xdeb\xcb\xb54\xed\xbeLY\xb5Z\xe1\x12S\xf5G\xcc\xf3\xe9\x02h\v\xca(\x96\xe1C\xdf\x1c\xea\x85C\xfb\x10\x13\xfa\x03\x16\xcd\x17\xa2\x80\xa1z\xb4r\x95\xc3@\x9d\xa6\xf1\x92#}g\xd3`\xf7\xcez\xcb\xb3\x1a\xbb\xc48e\x8e\xb1&\xd1\x8a\xe6!\x7f\x8d\xea,qx\xa28\xbf\"\xc7e\x06L\xb06\xeb<$\xd7\xba\xe5\x01\x03\x94r\xab\xd4J\x03s\xaf\xf6A\xbfV\xfa\x1ew\x8d\xbf\x99I\x97\xd8\xd2\xe8\x11\xc4\x04\x00\x84\xd5i\xee\xaf\xae[E\x1f\xdd\xd7#rT+\xb621p\xaf[\x99\" 1\xeb\xc7)\xd2\x1dh\xf2\xd5s\xfd?\fa>\x9f;\xe5r\xe5\xbd\xb0|=\x8eZcPY\xf8\xbd\x13\xaa\x8b\xdf\xbc\x93u\xd5\xb0r\xfb\xde\xe7\xd9k\xe2\xc6\x1b\xf2o@&>\xf2M\xe7\x8c\xeb\xee\xf5\x02~\x85\x14\xf3\xc6v\xf15PE\x8c\xca\x16$\xc2\x01#\xb563\rbq\xbf64\xfaW\x17\xdfa\xe6\xca\x86\xd7\xf8\x81X\x9bg4\xc1\xdam\xcf=Rq6\xb0\xd4D=I\x1a\x0e\xd0\xabz\xe2\x19\x0fM\xad\xdco\xa4\xb2\x8c?\xc1\x10\xf273\xd00\xb3_\xe8\x9a*\xfcL\xea;\xc0\x9a\xdbx!N;\xb5x\t\xa4E\xbe\x93r\x04\xf5\xf0\xf5\x7f\x9a)\xf5\x1b\"\xa1\xd8\x06>\xc9\xe2r\xe9\xbb\xfe\xc0\b\x81\x98\x1c\xe2\xe0?\x8f\xa1\xbel\aN\x83@\xb1\x03)4A\x83\xd6\xcf\xf6\xb5\x82\xb7\x9dA\b$\xa2x\x8a@\xfaj~\xef\x93\xb1/L\x01\xe2\xba|\xf0\x01)PP\xcdl\x06\xfc\x15;qZ\xb1u\xc9\xd0\xd16~JEGm\xe4\x1e@\x9dG\xe4@\xdf\xba\'\x8b\x1cD\xc7\xec\xd1@}tR\xd9P\xf4N\xe3\xd8x\xa0\x91\x17\xc2}\x13\b\xca\t(Z\xa3_\xa1\x90\x15T\xa4\xe7%\x98\xa7\xfb\x8bp/eq\x93\xbf\x1f =|\xf3\xb1\xfcR\xd8\nM,\xcb%@\'\x15\x88\xd8\xad\f\x91|\x95\x8fq+\x98\x81W\xba\x9f\xe0elOt\xbd\by\r\x87\x1c\xba\xbd\x8e+S>\xb8\xe29\x91h^x\xfb`\x00\xdd/\xa6\xb1\x16=\xa1bw\xc5I\xb1\x00'/549, 0x2) fcntl$addseals(r0, 0x409, 0x0) mmap(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x1, 0x10010, r0, 0xe0e91000) 06:09:32 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x100000, 0x14, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000100000005000000000004000040000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000001000018000000c28500002b02", 0x66, 0x400}, {&(0x7f0000010100)="000000000000000000000000e8f7d2e8feeb4bf889ba053b02420ff8010040", 0x1f, 0x4e0}], 0x0, &(0x7f0000000140)=ANY=[]) 06:09:32 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="20fffffdfc02000019000000900100000f000000000000000100000005000000000004000040000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000001000018000000c28500002b02", 0x66, 0x400}, {&(0x7f0000010100)="000000000000000000000000e8f7d2e8feeb4bf889ba053b02420ff8010040", 0x1f, 0x4e0}], 0x0, &(0x7f0000000140)=ANY=[]) 06:09:32 executing program 7: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x100500, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000100000005000000000004000040000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000001000018000000c28500002b02", 0x66, 0x400}, {&(0x7f0000010100)="000000000000000000000000e8f7d2e8feeb4bf889ba053b02420ff8010040", 0x1f, 0x4e0}], 0x0, &(0x7f0000000140)=ANY=[]) [ 2088.166154] loop5: detected capacity change from 0 to 2048 [ 2088.212553] EXT4-fs (loop5): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 2088.214310] EXT4-fs (loop5): group descriptors corrupted! [ 2088.243586] loop7: detected capacity change from 0 to 2050 [ 2088.251672] loop5: detected capacity change from 0 to 2048 [ 2088.261837] EXT4-fs (loop5): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 2088.262828] EXT4-fs (loop5): group descriptors corrupted! [ 2088.307506] EXT4-fs (loop7): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 2088.309557] EXT4-fs (loop7): group descriptors corrupted! [ 2088.378750] loop7: detected capacity change from 0 to 2050 [ 2088.418500] EXT4-fs (loop7): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 2088.420095] EXT4-fs (loop7): group descriptors corrupted! 06:09:50 executing program 1: pipe(&(0x7f0000000340)={0xffffffffffffffff}) pread64(r0, &(0x7f0000000440)=""/95, 0x5f, 0x6) execveat(r0, &(0x7f0000000080)='./file0\x00', &(0x7f00000001c0)=[&(0x7f00000000c0)='\x00', &(0x7f0000000180)='\x00'], &(0x7f0000000400)=[&(0x7f0000000200)='/dev/zero\x00', &(0x7f0000000240)='/dev/zero\x00', &(0x7f0000000300)='/dev/zero\x00'], 0x1000) socket$inet(0x2, 0x1, 0x0) perf_event_open(&(0x7f0000000100)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x22420, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ptrace$setopts(0x4200, 0x0, 0x5, 0x100050) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000004c00)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) gettid() r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000), 0x380, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000000)='net/udp6\x00') read$hiddev(r2, &(0x7f0000001140)=""/212, 0xd4) fchmodat(r2, &(0x7f00000004c0)='./file0\x00', 0x0) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(r1, 0xc018937c, &(0x7f0000000380)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32=r0, @ANYBLOB="00000000000000002e2f66696cee8816"]) ioctl$TIOCSSOFTCAR(r3, 0x541a, &(0x7f00000003c0)=0x6) waitid$P_PIDFD(0x3, r1, &(0x7f0000000500), 0x2, &(0x7f0000000580)) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(r1, 0xc0189372, &(0x7f0000000040)={{0x1, 0x1, 0x18, r2, {0xffff}}, './file0\x00'}) 06:09:50 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x100000, 0x26, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000100000005000000000004000040000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000001000018000000c28500002b02", 0x66, 0x400}, {&(0x7f0000010100)="000000000000000000000000e8f7d2e8feeb4bf889ba053b02420ff8010040", 0x1f, 0x4e0}], 0x0, &(0x7f0000000140)=ANY=[]) 06:09:50 executing program 6: ioctl$AUTOFS_DEV_IOCTL_CLOSEMOUNT(0xffffffffffffffff, 0xc0189375, 0x0) syz_genetlink_get_family_id$ethtool(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_PAUSE_SET(0xffffffffffffffff, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$IEEE802154_LLSEC_LIST_KEY(r1, &(0x7f0000000100)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x1000000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000080)={0x14, 0x0, 0x8, 0x0, 0x25dfdbfb, {}, ["", "", "", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x1}, 0x4000010) ioctl$F2FS_IOC_RELEASE_COMPRESS_BLOCKS(r0, 0x8008f512, &(0x7f0000000140)) r2 = memfd_create(&(0x7f0000000400)='B\xdb/\x89\x03l\xdeb\xcb\xb54\xed\xbeLY\xb5Z\xe1\x12S\xf5G\xcc\xf3\xe9\x02h\v\xca(\x96\xe1C\xdf\x1c\xea\x85C\xfb\x10\x13\xfa\x03\x16\xcd\x17\xa2\x80\xa1z\xb4r\x95\xc3@\x9d\xa6\xf1\x92#}g\xd3`\xf7\xcez\xcb\xb3\x1a\xbb\xc48e\x8e\xb1&\xd1\x8a\xe6!\x7f\x8d\xea,qx\xa28\xbf\"\xc7e\x06L\xb06\xeb<$\xd7\xba\xe5\x01\x03\x94r\xab\xd4J\x03s\xaf\xf6A\xbfV\xfa\x1ew\x8d\xbf\x99I\x97\xd8\xd2\xe8\x11\xc4\x04\x00\x84\xd5i\xee\xaf\xae[E\x1f\xdd\xd7#rT+\xb621p\xaf[\x99\" 1\xeb\xc7)\xd2\x1dh\xf2\xd5s\xfd?\fa>\x9f;\xe5r\xe5\xbd\xb0|=\x8eZcPY\xf8\xbd\x13\xaa\x8b\xdf\xbc\x93u\xd5\xb0r\xfb\xde\xe7\xd9k\xe2\xc6\x1b\xf2o@&>\xf2M\xe7\x8c\xeb\xee\xf5\x02~\x85\x14\xf3\xc6v\xf15PE\x8c\xca\x16$\xc2\x01#\xb563\rbq\xbf64\xfaW\x17\xdfa\xe6\xca\x86\xd7\xf8\x81X\x9bg4\xc1\xdam\xcf=Rq6\xb0\xd4D=I\x1a\x0e\xd0\xabz\xe2\x19\x0fM\xad\xdco\xa4\xb2\x8c?\xc1\x10\xf273\xd00\xb3_\xe8\x9a*\xfcL\xea;\xc0\x9a\xdbx!N;\xb5x\t\xa4E\xbe\x93r\x04\xf5\xf0\xf5\x7f\x9a)\xf5\x1b\"\xa1\xd8\x06>\xc9\xe2r\xe9\xbb\xfe\xc0\b\x81\x98\x1c\xe2\xe0?\x8f\xa1\xbel\aN\x83@\xb1\x03)4A\x83\xd6\xcf\xf6\xb5\x82\xb7\x9dA\b$\xa2x\x8a@\xfaj~\xef\x93\xb1/L\x01\xe2\xba|\xf0\x01)PP\xcdl\x06\xfc\x15;qZ\xb1u\xc9\xd0\xd16~JEGm\xe4\x1e@\x9dG\xe4@\xdf\xba\'\x8b\x1cD\xc7\xec\xd1@}tR\xd9P\xf4N\xe3\xd8x\xa0\x91\x17\xc2}\x13\b\xca\t(Z\xa3_\xa1\x90\x15T\xa4\xe7%\x98\xa7\xfb\x8bp/eq\x93\xbf\x1f =|\xf3\xb1\xfcR\xd8\nM,\xcb%@\'\x15\x88\xd8\xad\f\x91|\x95\x8fq+\x98\x81W\xba\x9f\xe0elOt\xbd\by\r\x87\x1c\xba\xbd\x8e+S>\xb8\xe29\x91h^x\xfb`\x00\xdd/\xa6\xb1\x16=\xa1bw\xc5I\xb1\x00'/549, 0x2) fcntl$addseals(r2, 0x409, 0x0) 06:09:50 executing program 3: r0 = getpid() ioprio_get$pid(0x2, r0) r1 = getpid() ioprio_get$pid(0x2, r1) syz_mount_image$vfat(0x0, &(0x7f0000000040)='./file1\x00', 0x0, 0x0, &(0x7f00000000c0), 0x2002000, &(0x7f0000000400)=ANY=[@ANYRES16, @ANYBLOB="72e1af808ba473e6f37c85b113d8c4d9e1de4ed2968d2e01108c4795a941d14f6927393c8c3c458dd7454900d48719912efc18d580a8f841234284071012d7d5020eb5d56dc1ba5f1048adac4b928bf6cfd663b4cab43637cb979a9199a0246ec02345161783bc79585902603d7062084f05b744e31fcb4c3e81f3becabb7ad1fa5783f5e5e60ae912102fe8df0536bd074c03bd33742f35c5c44b5c3c9d693114367b7d966e"]) chdir(&(0x7f0000000140)='./file0\x00') ptrace$getenv(0x4201, r0, 0xfff, &(0x7f00000000c0)) openat(0xffffffffffffff9c, &(0x7f0000000000)='./file2\x00', 0x40c2, 0x0) r2 = perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x6, 0x0, 0xe}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r4 = fork() perf_event_open(&(0x7f0000000540)={0x4, 0x80, 0xeb, 0x0, 0x20, 0x0, 0x0, 0x2, 0x2820, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, @perf_config_ext={0xdc, 0x40}, 0x40000, 0x3, 0x8, 0x5, 0x6000000000000, 0x4, 0x5, 0x0, 0x3, 0x0, 0x3}, r4, 0x9, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000340)={0x0, 0x80, 0x2, 0x83, 0x1, 0x7, 0x0, 0x1f, 0x9ec17fc7a3e840c7, 0xc, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x9, 0x4, @perf_bp={&(0x7f0000000240), 0x1}, 0x404, 0x7, 0x3, 0x6, 0x800, 0x9, 0x3, 0x0, 0x7ff, 0x0, 0x9}, r4, 0x8, r2, 0x9) fork() setxattr$trusted_overlay_upper(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180), &(0x7f00000001c0)={0x0, 0xfb, 0x7a, 0x0, 0x2, "d54449275cb08faf62df87518e3ce16f", "9a61b461b0c63151b954990036d5e0163ceb48c6a801bb019e9e6fa7196a9372f804b9e9ca3fb3d85d1985d31346bbd5fd02b1c8223bf6388eb75498623e38ff88a99c5ce38698a32306b7d4e4b0fd4b03bfa568df17a42f725c6c33046b38b6e4a713dde1"}, 0x7a, 0x3) socket$nl_audit(0x10, 0x3, 0x9) chroot(&(0x7f0000000080)='./file1\x00') sendmsg$inet(r3, &(0x7f0000000780)={&(0x7f0000000000)={0x2, 0x0, @local}, 0x10, &(0x7f00000003c0)=[{&(0x7f0000000300)="6fb9", 0xffeb}], 0x1, &(0x7f0000000700)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @remote, @broadcast}}}], 0x20}, 0x0) 06:09:50 executing program 0: syncfs(0xffffffffffffffff) sendmsg$NL80211_CMD_DEL_TX_TS(0xffffffffffffffff, 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_SETPIPEFD(0xffffffffffffffff, 0xc0189378, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = memfd_create(&(0x7f0000000400)='B\xdb/\x89\x03l\xdeb\xcb\xb54\xed\xbeLY\xb5Z\xe1\x12S\xf5G\xcc\xf3\xe9\x02h\v\xca(\x96\xe1C\xdf\x1c\xea\x85C\xfb\x10\x13\xfa\x03\x16\xcd\x17\xa2\x80\xa1z\xb4r\x95\xc3@\x9d\xa6\xf1\x92#}g\xd3`\xf7\xcez\xcb\xb3\x1a\xbb\xc48e\x8e\xb1&\xd1\x8a\xe6!\x7f\x8d\xea,qx\xa28\xbf\"\xc7e\x06L\xb06\xeb<$\xd7\xba\xe5\x01\x03\x94r\xab\xd4J\x03s\xaf\xf6A\xbfV\xfa\x1ew\x8d\xbf\x99I\x97\xd8\xd2\xe8\x11\xc4\x04\x00\x84\xd5i\xee\xaf\xae[E\x1f\xdd\xd7#rT+\xb621p\xaf[\x99\" 1\xeb\xc7)\xd2\x1dh\xf2\xd5s\xfd?\fa>\x9f;\xe5r\xe5\xbd\xb0|=\x8eZcPY\xf8\xbd\x13\xaa\x8b\xdf\xbc\x93u\xd5\xb0r\xfb\xde\xe7\xd9k\xe2\xc6\x1b\xf2o@&>\xf2M\xe7\x8c\xeb\xee\xf5\x02~\x85\x14\xf3\xc6v\xf15PE\x8c\xca\x16$\xc2\x01#\xb563\rbq\xbf64\xfaW\x17\xdfa\xe6\xca\x86\xd7\xf8\x81X\x9bg4\xc1\xdam\xcf=Rq6\xb0\xd4D=I\x1a\x0e\xd0\xabz\xe2\x19\x0fM\xad\xdco\xa4\xb2\x8c?\xc1\x10\xf273\xd00\xb3_\xe8\x9a*\xfcL\xea;\xc0\x9a\xdbx!N;\xb5x\t\xa4E\xbe\x93r\x04\xf5\xf0\xf5\x7f\x9a)\xf5\x1b\"\xa1\xd8\x06>\xc9\xe2r\xe9\xbb\xfe\xc0\b\x81\x98\x1c\xe2\xe0?\x8f\xa1\xbel\aN\x83@\xb1\x03)4A\x83\xd6\xcf\xf6\xb5\x82\xb7\x9dA\b$\xa2x\x8a@\xfaj~\xef\x93\xb1/L\x01\xe2\xba|\xf0\x01)PP\xcdl\x06\xfc\x15;qZ\xb1u\xc9\xd0\xd16~JEGm\xe4\x1e@\x9dG\xe4@\xdf\xba\'\x8b\x1cD\xc7\xec\xd1@}tR\xd9P\xf4N\xe3\xd8x\xa0\x91\x17\xc2}\x13\b\xca\t(Z\xa3_\xa1\x90\x15T\xa4\xe7%\x98\xa7\xfb\x8bp/eq\x93\xbf\x1f =|\xf3\xb1\xfcR\xd8\nM,\xcb%@\'\x15\x88\xd8\xad\f\x91|\x95\x8fq+\x98\x81W\xba\x9f\xe0elOt\xbd\by\r\x87\x1c\xba\xbd\x8e+S>\xb8\xe29\x91h^x\xfb`\x00\xdd/\xa6\xb1\x16=\xa1bw\xc5I\xb1\x00'/549, 0x2) r1 = accept$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x0, @local}, &(0x7f0000000040)=0x10) write$binfmt_aout(r1, &(0x7f0000000640)={{0x107, 0x5, 0x0, 0x354, 0x109, 0x3, 0x2fb, 0xd9a4}, "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", ['\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00']}, 0x1a20) fcntl$addseals(r0, 0x409, 0x0) 06:09:50 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="20fffffffe02000019000000900100000f000000000000000100000005000000000004000040000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000001000018000000c28500002b02", 0x66, 0x400}, {&(0x7f0000010100)="000000000000000000000000e8f7d2e8feeb4bf889ba053b02420ff8010040", 0x1f, 0x4e0}], 0x0, &(0x7f0000000140)=ANY=[]) 06:09:50 executing program 7: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x100600, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000100000005000000000004000040000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000001000018000000c28500002b02", 0x66, 0x400}, {&(0x7f0000010100)="000000000000000000000000e8f7d2e8feeb4bf889ba053b02420ff8010040", 0x1f, 0x4e0}], 0x0, &(0x7f0000000140)=ANY=[]) 06:09:50 executing program 4: r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000040), 0xffffffffffffffff) syz_genetlink_get_family_id$ethtool(&(0x7f0000000100), 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_PAUSE_SET(0xffffffffffffffff, &(0x7f0000000440)={0x0, 0x0, 0x0}, 0x0) r2 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000080)='smaps\x00') pread64(r2, &(0x7f00000000c0)=""/98, 0x62, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x7fffffff) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(0xffffffffffffffff, 0xc0189374, &(0x7f0000000240)={{0x1, 0x1, 0x18, r0, {0x8}}, './file0\x00'}) dup3(0xffffffffffffffff, r2, 0x0) r3 = socket$inet_icmp_raw(0x2, 0x3, 0x1) syz_genetlink_get_family_id$ethtool(&(0x7f0000000180), r2) socket$nl_audit(0x10, 0x3, 0x9) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000040)={'wlan1\x00', 0x0}) sendmsg$inet(r3, &(0x7f0000000780)={&(0x7f0000000000)={0x2, 0x0, @local}, 0x10, &(0x7f00000003c0)=[{&(0x7f0000000300)="6fb9", 0xffeb}], 0x1, &(0x7f0000000700)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {r4, @remote, @broadcast}}}], 0x20}, 0x0) r5 = socket$inet_icmp_raw(0x2, 0x3, 0x1) socket$nl_audit(0x10, 0x3, 0x9) sendmsg$inet(r5, &(0x7f0000000780)={&(0x7f0000000000)={0x2, 0x0, @local}, 0x10, &(0x7f00000003c0)=[{&(0x7f0000000300)="6fb9", 0xffeb}], 0x1, &(0x7f0000000700)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @remote, @broadcast}}}], 0x20}, 0x0) sendmsg$ETHTOOL_MSG_LINKINFO_GET(r2, &(0x7f0000000200)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f00000001c0)={&(0x7f0000000340)=ANY=[@ANYBLOB='@\x00\x00\x00', @ANYRES16=r1, @ANYBLOB="000427bd7000ffdbdf25020000002c00018008000100", @ANYRES32=0x0, @ANYBLOB='\b\x00C\x00\x00\x00\x00\x00\b\x00!\x00', @ANYRES32=r4, @ANYBLOB="d5b921cac279671a02c4d90ed2cbc802c0", @ANYRES32=0x0, @ANYBLOB], 0x40}, 0x1, 0x0, 0x0, 0x4}, 0xd0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000480), 0x1}, 0x603}, 0x0, 0xffffffefffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000040)=[{&(0x7f0000010000)="601c6d6b646f736689254300080120000400004000f8000020004000030000000000000001", 0x25}, {0x0, 0x0, 0x10000}], 0x0, &(0x7f0000000040)=ANY=[]) [ 2105.897078] loop7: detected capacity change from 0 to 2051 [ 2105.905227] loop5: detected capacity change from 0 to 2048 [ 2105.917776] EXT4-fs (loop7): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 2105.918628] EXT4-fs (loop7): group descriptors corrupted! [ 2105.932198] loop7: detected capacity change from 0 to 2051 [ 2105.943703] EXT4-fs (loop7): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 2105.944479] EXT4-fs (loop7): group descriptors corrupted! [ 2105.949145] EXT4-fs (loop5): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 2105.950503] EXT4-fs (loop5): group descriptors corrupted! 06:09:50 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="2000f0ffff02000019000000900100000f000000000000000100000005000000000004000040000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000001000018000000c28500002b02", 0x66, 0x400}, {&(0x7f0000010100)="000000000000000000000000e8f7d2e8feeb4bf889ba053b02420ff8010040", 0x1f, 0x4e0}], 0x0, &(0x7f0000000140)=ANY=[]) [ 2105.977353] loop5: detected capacity change from 0 to 2048 [ 2105.986068] loop4: detected capacity change from 0 to 256 [ 2106.009327] EXT4-fs (loop5): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 2106.010945] EXT4-fs (loop5): group descriptors corrupted! [ 2106.030683] FAT-fs (loop4): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) 06:10:06 executing program 1: pipe(&(0x7f0000000340)={0xffffffffffffffff}) pread64(r0, &(0x7f0000000440)=""/95, 0x5f, 0x6) execveat(r0, &(0x7f0000000080)='./file0\x00', &(0x7f00000001c0)=[&(0x7f00000000c0)='\x00', &(0x7f0000000180)='\x00'], &(0x7f0000000400)=[&(0x7f0000000200)='/dev/zero\x00', &(0x7f0000000240)='/dev/zero\x00', &(0x7f0000000300)='/dev/zero\x00'], 0x1000) socket$inet(0x2, 0x1, 0x0) perf_event_open(&(0x7f0000000100)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x22420, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ptrace$setopts(0x4200, 0x0, 0x5, 0x100050) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000004c00)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) gettid() r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000), 0x380, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000000)='net/udp6\x00') read$hiddev(r2, &(0x7f0000001140)=""/212, 0xd4) fchmodat(r2, &(0x7f00000004c0)='./file0\x00', 0x0) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(r1, 0xc018937c, &(0x7f0000000380)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32=r0, @ANYBLOB="00000000000000002e2f66696cee8816"]) ioctl$TIOCSSOFTCAR(r3, 0x541a, &(0x7f00000003c0)=0x6) waitid$P_PIDFD(0x3, r1, &(0x7f0000000500), 0x2, &(0x7f0000000580)) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(r1, 0xc0189372, &(0x7f0000000040)={{0x1, 0x1, 0x18, r2, {0xffff}}, './file0\x00'}) 06:10:06 executing program 4: r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000040), 0xffffffffffffffff) syz_genetlink_get_family_id$ethtool(&(0x7f0000000100), 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_PAUSE_SET(0xffffffffffffffff, &(0x7f0000000440)={0x0, 0x0, 0x0}, 0x0) r2 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000080)='smaps\x00') pread64(r2, &(0x7f00000000c0)=""/98, 0x62, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x7fffffff) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(0xffffffffffffffff, 0xc0189374, &(0x7f0000000240)={{0x1, 0x1, 0x18, r0, {0x8}}, './file0\x00'}) dup3(0xffffffffffffffff, r2, 0x0) r3 = socket$inet_icmp_raw(0x2, 0x3, 0x1) syz_genetlink_get_family_id$ethtool(&(0x7f0000000180), r2) socket$nl_audit(0x10, 0x3, 0x9) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000040)={'wlan1\x00', 0x0}) sendmsg$inet(r3, &(0x7f0000000780)={&(0x7f0000000000)={0x2, 0x0, @local}, 0x10, &(0x7f00000003c0)=[{&(0x7f0000000300)="6fb9", 0xffeb}], 0x1, &(0x7f0000000700)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {r4, @remote, @broadcast}}}], 0x20}, 0x0) r5 = socket$inet_icmp_raw(0x2, 0x3, 0x1) socket$nl_audit(0x10, 0x3, 0x9) sendmsg$inet(r5, &(0x7f0000000780)={&(0x7f0000000000)={0x2, 0x0, @local}, 0x10, &(0x7f00000003c0)=[{&(0x7f0000000300)="6fb9", 0xffeb}], 0x1, &(0x7f0000000700)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @remote, @broadcast}}}], 0x20}, 0x0) sendmsg$ETHTOOL_MSG_LINKINFO_GET(r2, &(0x7f0000000200)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f00000001c0)={&(0x7f0000000340)=ANY=[@ANYBLOB='@\x00\x00\x00', @ANYRES16=r1, @ANYBLOB="000427bd7000ffdbdf25020000002c00018008000100", @ANYRES32=0x0, @ANYBLOB='\b\x00C\x00\x00\x00\x00\x00\b\x00!\x00', @ANYRES32=r4, @ANYBLOB="d5b921cac279671a02c4d90ed2cbc802c00000009852d9e901", @ANYRES32=0x0, @ANYBLOB], 0x40}, 0x1, 0x0, 0x0, 0x4}, 0xd0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000480), 0x1}, 0x603}, 0x0, 0xffffffefffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000040)=[{&(0x7f0000010000)="601c6d6b646f736689254300080120000400004000f8000020004000030000000000000001", 0x25}, {0x0, 0x0, 0x10000}], 0x0, &(0x7f0000000040)=ANY=[]) 06:10:06 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x100000, 0x46, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000100000005000000000004000040000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000001000018000000c28500002b02", 0x66, 0x400}, {&(0x7f0000010100)="000000000000000000000000e8f7d2e8feeb4bf889ba053b02420ff8010040", 0x1f, 0x4e0}], 0x0, &(0x7f0000000140)=ANY=[]) 06:10:06 executing program 7: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x100700, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000100000005000000000004000040000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000001000018000000c28500002b02", 0x66, 0x400}, {&(0x7f0000010100)="000000000000000000000000e8f7d2e8feeb4bf889ba053b02420ff8010040", 0x1f, 0x4e0}], 0x0, &(0x7f0000000140)=ANY=[]) 06:10:06 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="20fcfdffff02000019000000900100000f000000000000000100000005000000000004000040000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000001000018000000c28500002b02", 0x66, 0x400}, {&(0x7f0000010100)="000000000000000000000000e8f7d2e8feeb4bf889ba053b02420ff8010040", 0x1f, 0x4e0}], 0x0, &(0x7f0000000140)=ANY=[]) 06:10:06 executing program 6: ioctl$AUTOFS_DEV_IOCTL_CLOSEMOUNT(0xffffffffffffffff, 0xc0189375, 0x0) syz_genetlink_get_family_id$ethtool(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_PAUSE_SET(0xffffffffffffffff, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0xfffffffffffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$AUTOFS_DEV_IOCTL_ISMOUNTPOINT(0xffffffffffffffff, 0xc018937e, &(0x7f0000000000)={{0x1, 0x1, 0x18, r0, @out_args}, './file0\x00'}) sendmsg$TIPC_NL_MEDIA_GET(r1, &(0x7f0000000140)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x40000}, 0xc, &(0x7f0000000100)={&(0x7f00000000c0)={0x20, 0x0, 0x300, 0x70bd28, 0x25dfdbfe, {}, [@TIPC_NLA_MON={0xc, 0x9, 0x0, 0x1, [@TIPC_NLA_MON_REF={0x8, 0x2, 0x3ff}]}]}, 0x20}, 0x1, 0x0, 0x0, 0x40001}, 0x8004) r2 = memfd_create(&(0x7f0000000400)='B\xdb/\x89\x03l\xdeb\xcb\xb54\xed\xbeLY\xb5Z\xe1\x12S\xf5G\xcc\xf3\xe9\x02h\v\xca(\x96\xe1C\xdf\x1c\xea\x85C\xfb\x10\x13\xfa\x03\x16\xcd\x17\xa2\x80\xa1z\xb4r\x95\xc3@\x9d\xa6\xf1\x92#}g\xd3`\xf7\xcez\xcb\xb3\x1a\xbb\xc48e\x8e\xb1&\xd1\x8a\xe6!\x7f\x8d\xea,qx\xa28\xbf\"\xc7e\x06L\xb06\xeb<$\xd7\xba\xe5\x01\x03\x94r\xab\xd4J\x03s\xaf\xf6A\xbfV\xfa\x1ew\x8d\xbf\x99I\x97\xd8\xd2\xe8\x11\xc4\x04\x00\x84\xd5i\xee\xaf\xae[E\x1f\xdd\xd7#rT+\xb621p\xaf[\x99\" 1\xeb\xc7)\xd2\x1dh\xf2\xd5s\xfd?\fa>\x9f;\xe5r\xe5\xbd\xb0|=\x8eZcPY\xf8\xbd\x13\xaa\x8b\xdf\xbc\x93u\xd5\xb0r\xfb\xde\xe7\xd9k\xe2\xc6\x1b\xf2o@&>\xf2M\xe7\x8c\xeb\xee\xf5\x02~\x85\x14\xf3\xc6v\xf15PE\x8c\xca\x16$\xc2\x01#\xb563\rbq\xbf64\xfaW\x17\xdfa\xe6\xca\x86\xd7\xf8\x81X\x9bg4\xc1\xdam\xcf=Rq6\xb0\xd4D=I\x1a\x0e\xd0\xabz\xe2\x19\x0fM\xad\xdco\xa4\xb2\x8c?\xc1\x10\xf273\xd00\xb3_\xe8\x9a*\xfcL\xea;\xc0\x9a\xdbx!N;\xb5x\t\xa4E\xbe\x93r\x04\xf5\xf0\xf5\x7f\x9a)\xf5\x1b\"\xa1\xd8\x06>\xc9\xe2r\xe9\xbb\xfe\xc0\b\x81\x98\x1c\xe2\xe0?\x8f\xa1\xbel\aN\x83@\xb1\x03)4A\x83\xd6\xcf\xf6\xb5\x82\xb7\x9dA\b$\xa2x\x8a@\xfaj~\xef\x93\xb1/L\x01\xe2\xba|\xf0\x01)PP\xcdl\x06\xfc\x15;qZ\xb1u\xc9\xd0\xd16~JEGm\xe4\x1e@\x9dG\xe4@\xdf\xba\'\x8b\x1cD\xc7\xec\xd1@}tR\xd9P\xf4N\xe3\xd8x\xa0\x91\x17\xc2}\x13\b\xca\t(Z\xa3_\xa1\x90\x15T\xa4\xe7%\x98\xa7\xfb\x8bp/eq\x93\xbf\x1f =|\xf3\xb1\xfcR\xd8\nM,\xcb%@\'\x15\x88\xd8\xad\f\x91|\x95\x8fq+\x98\x81W\xba\x9f\xe0elOt\xbd\by\r\x87\x1c\xba\xbd\x8e+S>\xb8\xe29\x91h^x\xfb`\x00\xdd/\xa6\xb1\x16=\xa1bw\xc5I\xb1\x00'/549, 0x2) fcntl$addseals(r2, 0x409, 0x0) r3 = perf_event_open$cgroup(&(0x7f0000000300)={0x4, 0x80, 0x98, 0x8, 0x7, 0x0, 0x0, 0x1f, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x4b, 0x4, @perf_bp={&(0x7f0000000200), 0x2}, 0x600, 0x6, 0x7, 0x9, 0x40, 0x7, 0xe3, 0x0, 0x4, 0x0, 0x7fffffff}, r1, 0xd, r0, 0x3) perf_event_open(&(0x7f0000000180)={0x5, 0x80, 0x3, 0x1, 0x6, 0x4, 0x0, 0x8, 0x50, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1000, 0x4, @perf_config_ext={0x6, 0x1}, 0x8, 0x80000000, 0x8000, 0x1, 0x7, 0x9, 0x2, 0x0, 0x7fff, 0x0, 0xffffffffffffff01}, 0xffffffffffffffff, 0xe, r3, 0x8) 06:10:06 executing program 3: r0 = getpid() ioprio_get$pid(0x2, r0) r1 = getpid() ioprio_get$pid(0x2, r1) syz_mount_image$vfat(0x0, &(0x7f0000000040)='./file1\x00', 0x0, 0x0, &(0x7f00000000c0), 0x2002000, &(0x7f0000000400)=ANY=[@ANYRES16, @ANYBLOB="72e1af808ba473e6f37c85b113d8c4d9e1de4ed2968d2e01108c4795a941d14f6927393c8c3c458dd7454900d48719912efc18d580a8f841234284071012d7d5020eb5d56dc1ba5f1048adac4b928bf6cfd663b4cab43637cb979a9199a0246ec02345161783bc79585902603d7062084f05b744e31fcb4c3e81f3becabb7ad1fa5783f5e5e60ae912102fe8df0536bd074c03bd33742f35c5c44b5c3c9d693114367b7d966e"]) chdir(&(0x7f0000000140)='./file0\x00') ptrace$getenv(0x4201, r0, 0xfff, &(0x7f00000000c0)) openat(0xffffffffffffff9c, &(0x7f0000000000)='./file2\x00', 0x40c2, 0x0) r2 = perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x6, 0x0, 0xe}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r4 = fork() perf_event_open(&(0x7f0000000540)={0x4, 0x80, 0xeb, 0x0, 0x20, 0x0, 0x0, 0x2, 0x2820, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, @perf_config_ext={0xdc, 0x40}, 0x40000, 0x3, 0x8, 0x5, 0x6000000000000, 0x4, 0x5, 0x0, 0x3, 0x0, 0x3}, r4, 0x9, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000340)={0x0, 0x80, 0x2, 0x83, 0x1, 0x7, 0x0, 0x1f, 0x9ec17fc7a3e840c7, 0xc, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x9, 0x4, @perf_bp={&(0x7f0000000240), 0x1}, 0x404, 0x7, 0x3, 0x6, 0x800, 0x9, 0x3, 0x0, 0x7ff, 0x0, 0x9}, r4, 0x8, r2, 0x9) fork() setxattr$trusted_overlay_upper(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180), &(0x7f00000001c0)={0x0, 0xfb, 0x7a, 0x0, 0x2, "d54449275cb08faf62df87518e3ce16f", "9a61b461b0c63151b954990036d5e0163ceb48c6a801bb019e9e6fa7196a9372f804b9e9ca3fb3d85d1985d31346bbd5fd02b1c8223bf6388eb75498623e38ff88a99c5ce38698a32306b7d4e4b0fd4b03bfa568df17a42f725c6c33046b38b6e4a713dde1"}, 0x7a, 0x3) socket$nl_audit(0x10, 0x3, 0x9) chroot(&(0x7f0000000080)='./file1\x00') sendmsg$inet(r3, &(0x7f0000000780)={&(0x7f0000000000)={0x2, 0x0, @local}, 0x10, &(0x7f00000003c0)=[{&(0x7f0000000300)="6fb9", 0xffeb}], 0x1, &(0x7f0000000700)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @remote, @broadcast}}}], 0x20}, 0x0) [ 2121.929474] loop5: detected capacity change from 0 to 2048 06:10:06 executing program 0: syncfs(0xffffffffffffffff) sendmsg$NL80211_CMD_DEL_TX_TS(0xffffffffffffffff, 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_SETPIPEFD(0xffffffffffffffff, 0xc0189378, 0x0) r0 = perf_event_open(&(0x7f0000000300)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x4002, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000200), 0xf}, 0x10084, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0xffffffffffffffff}, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xa) perf_event_open(&(0x7f0000000040)={0x5, 0x80, 0x20, 0x1, 0x1, 0x6, 0x0, 0x0, 0xca00, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={&(0x7f0000000000), 0x4}, 0x410, 0x100000001, 0x8, 0x4, 0xa2, 0x9, 0x9, 0x0, 0x7fffffff, 0x0, 0xfff}, 0xffffffffffffffff, 0xffffffffffffffff, r0, 0x8) socketpair(0x1f, 0xa, 0x80000000, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$ETHTOOL_MSG_LINKINFO_SET(r1, &(0x7f00000001c0)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x200}, 0xc, &(0x7f0000000180)={&(0x7f0000000140)={0x24, 0x0, 0x400, 0x70bd2b, 0x25dfdbfd, {}, [@ETHTOOL_A_LINKINFO_PORT={0x5, 0x2, 0x3}, @ETHTOOL_A_LINKINFO_TP_MDIX_CTRL={0x5, 0x5, 0x7f}]}, 0x24}, 0x1, 0x0, 0x0, 0x48004}, 0x80) r2 = memfd_create(&(0x7f0000000400)='B\xdb/\x89\x03l\xdeb\xcb\xb54\xed\xbeLY\xb5Z\xe1\x12S\xf5G\xcc\xf3\xe9\x02h\v\xca(\x96\xe1C\xdf\x1c\xea\x85C\xfb\x10\x13\xfa\x03\x16\xcd\x17\xa2\x80\xa1z\xb4r\x95\xc3@\x9d\xa6\xf1\x92#}g\xd3`\xf7\xcez\xcb\xb3\x1a\xbb\xc48e\x8e\xb1&\xd1\x8a\xe6!\x7f\x8d\xea,qx\xa28\xbf\"\xc7e\x06L\xb06\xeb<$\xd7\xba\xe5\x01\x03\x94r\xab\xd4J\x03s\xaf\xf6A\xbfV\xfa\x1ew\x8d\xbf\x99I\x97\xd8\xd2\xe8\x11\xc4\x04\x00\x84\xd5i\xee\xaf\xae[E\x1f\xdd\xd7#rT+\xb621p\xaf[\x99\" 1\xeb\xc7)\xd2\x1dh\xf2\xd5s\xfd?\fa>\x9f;\xe5r\xe5\xbd\xb0|=\x8eZcPY\xf8\xbd\x13\xaa\x8b\xdf\xbc\x93u\xd5\xb0r\xfb\xde\xe7\xd9k\xe2\xc6\x1b\xf2o@&>\xf2M\xe7\x8c\xeb\xee\xf5\x02~\x85\x14\xf3\xc6v\xf15PE\x8c\xca\x16$\xc2\x01#\xb563\rbq\xbf64\xfaW\x17\xdfa\xe6\xca\x86\xd7\xf8\x81X\x9bg4\xc1\xdam\xcf=Rq6\xb0\xd4D=I\x1a\x0e\xd0\xabz\xe2\x19\x0fM\xad\xdco\xa4\xb2\x8c?\xc1\x10\xf273\xd00\xb3_\xe8\x9a*\xfcL\xea;\xc0\x9a\xdbx!N;\xb5x\t\xa4E\xbe\x93r\x04\xf5\xf0\xf5\x7f\x9a)\xf5\x1b\"\xa1\xd8\x06>\xc9\xe2r\xe9\xbb\xfe\xc0\b\x81\x98\x1c\xe2\xe0?\x8f\xa1\xbel\aN\x83@\xb1\x03)4A\x83\xd6\xcf\xf6\xb5\x82\xb7\x9dA\b$\xa2x\x8a@\xfaj~\xef\x93\xb1/L\x01\xe2\xba|\xf0\x01)PP\xcdl\x06\xfc\x15;qZ\xb1u\xc9\xd0\xd16~JEGm\xe4\x1e@\x9dG\xe4@\xdf\xba\'\x8b\x1cD\xc7\xec\xd1@}tR\xd9P\xf4N\xe3\xd8x\xa0\x91\x17\xc2}\x13\b\xca\t(Z\xa3_\xa1\x90\x15T\xa4\xe7%\x98\xa7\xfb\x8bp/eq\x93\xbf\x1f =|\xf3\xb1\xfcR\xd8\nM,\xcb%@\'\x15\x88\xd8\xad\f\x91|\x95\x8fq+\x98\x81W\xba\x9f\xe0elOt\xbd\by\r\x87\x1c\xba\xbd\x8e+S>\xb8\xe29\x91h^x\xfb`\x00\xdd/\xa6\xb1\x16=\xa1bw\xc5I\xb1\x00'/549, 0x2) fcntl$addseals(r2, 0x409, 0x0) [ 2121.941222] EXT4-fs (loop5): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 2121.942707] EXT4-fs (loop5): group descriptors corrupted! [ 2121.989219] loop5: detected capacity change from 0 to 2048 [ 2121.993132] loop7: detected capacity change from 0 to 2051 [ 2122.019832] EXT4-fs (loop5): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 2122.021359] EXT4-fs (loop5): group descriptors corrupted! [ 2122.031932] EXT4-fs (loop7): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 2122.033260] EXT4-fs (loop7): group descriptors corrupted! [ 2122.062367] loop7: detected capacity change from 0 to 2051 [ 2122.071975] loop4: detected capacity change from 0 to 256 [ 2122.085533] EXT4-fs (loop7): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 2122.086824] EXT4-fs (loop7): group descriptors corrupted! 06:10:06 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="208cffffff02000019000000900100000f000000000000000100000005000000000004000040000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000001000018000000c28500002b02", 0x66, 0x400}, {&(0x7f0000010100)="000000000000000000000000e8f7d2e8feeb4bf889ba053b02420ff8010040", 0x1f, 0x4e0}], 0x0, &(0x7f0000000140)=ANY=[]) [ 2122.121081] FAT-fs (loop4): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) 06:10:06 executing program 0: syncfs(0xffffffffffffffff) sendmsg$NL80211_CMD_DEL_TX_TS(0xffffffffffffffff, 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_SETPIPEFD(0xffffffffffffffff, 0xc0189378, 0x0) r0 = perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = memfd_create(&(0x7f0000000400)='B\xdb/\x89\x03l\xdeb\xcb\xb54\xed\xbeLY\xb5Z\xe1\x12S\xf5G\xcc\xf3\xe9\x02h\v\xca(\x96\xe1C\xdf\x1c\xea\x85C\xfb\x10\x13\xfa\x03\x16\xcd\x17\xa2\x80\xa1z\xb4r\x95\xc3@\x9d\xa6\xf1\x92#}g\xd3`\xf7\xcez\xcb\xb3\x1a\xbb\xc48e\x8e\xb1&\xd1\x8a\xe6!\x7f\x8d\xea,qx\xa28\xbf\"\xc7e\x06L\xb06\xeb<$\xd7\xba\xe5\x01\x03\x94r\xab\xd4J\x03s\xaf\xf6A\xbfV\xfa\x1ew\x8d\xbf\x99I\x97\xd8\xd2\xe8\x11\xc4\x04\x00\x84\xd5i\xee\xaf\xae[E\x1f\xdd\xd7#rT+\xb621p\xaf[\x99\" 1\xeb\xc7)\xd2\x1dh\xf2\xd5s\xfd?\fa>\x9f;\xe5r\xe5\xbd\xb0|=\x8eZcPY\xf8\xbd\x13\xaa\x8b\xdf\xbc\x93u\xd5\xb0r\xfb\xde\xe7\xd9k\xe2\xc6\x1b\xf2o@&>\xf2M\xe7\x8c\xeb\xee\xf5\x02~\x85\x14\xf3\xc6v\xf15PE\x8c\xca\x16$\xc2\x01#\xb563\rbq\xbf64\xfaW\x17\xdfa\xe6\xca\x86\xd7\xf8\x81X\x9bg4\xc1\xdam\xcf=Rq6\xb0\xd4D=I\x1a\x0e\xd0\xabz\xe2\x19\x0fM\xad\xdco\xa4\xb2\x8c?\xc1\x10\xf273\xd00\xb3_\xe8\x9a*\xfcL\xea;\xc0\x9a\xdbx!N;\xb5x\t\xa4E\xbe\x93r\x04\xf5\xf0\xf5\x7f\x9a)\xf5\x1b\"\xa1\xd8\x06>\xc9\xe2r\xe9\xbb\xfe\xc0\b\x81\x98\x1c\xe2\xe0?\x8f\xa1\xbel\aN\x83@\xb1\x03)4A\x83\xd6\xcf\xf6\xb5\x82\xb7\x9dA\b$\xa2x\x8a@\xfaj~\xef\x93\xb1/L\x01\xe2\xba|\xf0\x01)PP\xcdl\x06\xfc\x15;qZ\xb1u\xc9\xd0\xd16~JEGm\xe4\x1e@\x9dG\xe4@\xdf\xba\'\x8b\x1cD\xc7\xec\xd1@}tR\xd9P\xf4N\xe3\xd8x\xa0\x91\x17\xc2}\x13\b\xca\t(Z\xa3_\xa1\x90\x15T\xa4\xe7%\x98\xa7\xfb\x8bp/eq\x93\xbf\x1f =|\xf3\xb1\xfcR\xd8\nM,\xcb%@\'\x15\x88\xd8\xad\f\x91|\x95\x8fq+\x98\x81W\xba\x9f\xe0elOt\xbd\by\r\x87\x1c\xba\xbd\x8e+S>\xb8\xe29\x91h^x\xfb`\x00\xdd/\xa6\xb1\x16=\xa1bw\xc5I\xb1\x00'/549, 0x2) fcntl$addseals(r1, 0x409, 0x0) fcntl$addseals(r0, 0x409, 0xb) removexattr(&(0x7f0000000000)='./file0\x00', &(0x7f0000000640)=ANY=[@ANYBLOB="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"]) 06:10:06 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x100000, 0x7fe, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000100000005000000000004000040000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000001000018000000c28500002b02", 0x66, 0x400}, {&(0x7f0000010100)="000000000000000000000000e8f7d2e8feeb4bf889ba053b02420ff8010040", 0x1f, 0x4e0}], 0x0, &(0x7f0000000140)=ANY=[]) 06:10:06 executing program 7: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x1007f8, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000100000005000000000004000040000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000001000018000000c28500002b02", 0x66, 0x400}, {&(0x7f0000010100)="000000000000000000000000e8f7d2e8feeb4bf889ba053b02420ff8010040", 0x1f, 0x4e0}], 0x0, &(0x7f0000000140)=ANY=[]) 06:10:06 executing program 4: r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000040), 0xffffffffffffffff) syz_genetlink_get_family_id$ethtool(&(0x7f0000000100), 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_PAUSE_SET(0xffffffffffffffff, &(0x7f0000000440)={0x0, 0x0, 0x0}, 0x0) r2 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000080)='smaps\x00') pread64(r2, &(0x7f00000000c0)=""/98, 0x62, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x7fffffff) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(0xffffffffffffffff, 0xc0189374, &(0x7f0000000240)={{0x1, 0x1, 0x18, r0, {0x8}}, './file0\x00'}) dup3(0xffffffffffffffff, r2, 0x0) r3 = socket$inet_icmp_raw(0x2, 0x3, 0x1) syz_genetlink_get_family_id$ethtool(&(0x7f0000000180), r2) socket$nl_audit(0x10, 0x3, 0x9) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000040)={'wlan1\x00', 0x0}) sendmsg$inet(r3, &(0x7f0000000780)={&(0x7f0000000000)={0x2, 0x0, @local}, 0x10, &(0x7f00000003c0)=[{&(0x7f0000000300)="6fb9", 0xffeb}], 0x1, &(0x7f0000000700)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {r4, @remote, @broadcast}}}], 0x20}, 0x0) r5 = socket$inet_icmp_raw(0x2, 0x3, 0x1) socket$nl_audit(0x10, 0x3, 0x9) sendmsg$inet(r5, &(0x7f0000000780)={&(0x7f0000000000)={0x2, 0x0, @local}, 0x10, &(0x7f00000003c0)=[{&(0x7f0000000300)="6fb9", 0xffeb}], 0x1, &(0x7f0000000700)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @remote, @broadcast}}}], 0x20}, 0x0) sendmsg$ETHTOOL_MSG_LINKINFO_GET(r2, &(0x7f0000000200)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f00000001c0)={&(0x7f0000000340)=ANY=[@ANYBLOB='@\x00\x00\x00', @ANYRES16=r1, @ANYBLOB="000427bd7000ffdbdf25020000002c00018008000100", @ANYRES32=0x0, @ANYBLOB='\b\x00C\x00\x00\x00\x00\x00\b\x00!\x00', @ANYRES32=r4, @ANYBLOB="d5b921cac279671a02c4d90ed2cbc802c00000009852d9e901", @ANYRES32=0x0, @ANYBLOB], 0x40}, 0x1, 0x0, 0x0, 0x4}, 0xd0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000480), 0x1}, 0x603}, 0x0, 0xffffffefffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000040)=[{&(0x7f0000010000)="601c6d6b646f736689254300080120000400004000f8000020004000030000000000000001", 0x25}, {0x0, 0x0, 0x10000}], 0x0, &(0x7f0000000040)=ANY=[]) [ 2122.342326] loop7: detected capacity change from 0 to 2051 [ 2122.382632] EXT4-fs (loop7): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock 06:10:06 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="20f6ffffff02000019000000900100000f000000000000000100000005000000000004000040000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000001000018000000c28500002b02", 0x66, 0x400}, {&(0x7f0000010100)="000000000000000000000000e8f7d2e8feeb4bf889ba053b02420ff8010040", 0x1f, 0x4e0}], 0x0, &(0x7f0000000140)=ANY=[]) [ 2122.384085] EXT4-fs (loop7): group descriptors corrupted! [ 2122.401357] loop7: detected capacity change from 0 to 2051 [ 2122.412284] loop5: detected capacity change from 0 to 2048 [ 2122.428535] EXT4-fs (loop7): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 2122.429852] EXT4-fs (loop7): group descriptors corrupted! [ 2122.434560] EXT4-fs (loop5): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 2122.435880] EXT4-fs (loop5): group descriptors corrupted! 06:10:06 executing program 1: pipe(&(0x7f0000000340)={0xffffffffffffffff}) pread64(r0, &(0x7f0000000440)=""/95, 0x5f, 0x6) execveat(r0, &(0x7f0000000080)='./file0\x00', &(0x7f00000001c0)=[&(0x7f00000000c0)='\x00', &(0x7f0000000180)='\x00'], &(0x7f0000000400)=[&(0x7f0000000200)='/dev/zero\x00', &(0x7f0000000240)='/dev/zero\x00', &(0x7f0000000300)='/dev/zero\x00'], 0x1000) socket$inet(0x2, 0x1, 0x0) perf_event_open(&(0x7f0000000100)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x22420, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ptrace$setopts(0x4200, 0x0, 0x5, 0x100050) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000004c00)={0xc0002100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) gettid() r1 = openat$zero(0xffffffffffffff9c, 0x0, 0x380, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000000)='net/udp6\x00') read$hiddev(r2, &(0x7f0000001140)=""/212, 0xd4) fchmodat(r2, &(0x7f00000004c0)='./file0\x00', 0x0) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(r1, 0xc018937c, &(0x7f0000000380)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32=r0, @ANYBLOB="00000000000000002e2f66696cee8816"]) ioctl$TIOCSSOFTCAR(r3, 0x541a, &(0x7f00000003c0)=0x6) waitid$P_PIDFD(0x3, r1, &(0x7f0000000500), 0x2, &(0x7f0000000580)) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(r1, 0xc0189372, &(0x7f0000000040)={{0x1, 0x1, 0x18, r2, {0xffff}}, './file0\x00'}) [ 2122.486181] loop4: detected capacity change from 0 to 256 06:10:06 executing program 0: syncfs(0xffffffffffffffff) sendmsg$NL80211_CMD_DEL_TX_TS(0xffffffffffffffff, 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_SETPIPEFD(0xffffffffffffffff, 0xc0189378, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = memfd_create(&(0x7f0000000400)='B\xdb/\x89\x03l\xdeb\xcb\xb54\xed\xbeLY\xb5Z\xe1\x12S\xf5G\xcc\xf3\xe9\x02h\v\xca(\x96\xe1C\xdf\x1c\xea\x85C\xfb\x10\x13\xfa\x03\x16\xcd\x17\xa2\x80\xa1z\xb4r\x95\xc3@\x9d\xa6\xf1\x92#}g\xd3`\xf7\xcez\xcb\xb3\x1a\xbb\xc48e\x8e\xb1&\xd1\x8a\xe6!\x7f\x8d\xea,qx\xa28\xbf\"\xc7e\x06L\xb06\xeb<$\xd7\xba\xe5\x01\x03\x94r\xab\xd4J\x03s\xaf\xf6A\xbfV\xfa\x1ew\x8d\xbf\x99I\x97\xd8\xd2\xe8\x11\xc4\x04\x00\x84\xd5i\xee\xaf\xae[E\x1f\xdd\xd7#rT+\xb621p\xaf[\x99\" 1\xeb\xc7)\xd2\x1dh\xf2\xd5s\xfd?\fa>\x9f;\xe5r\xe5\xbd\xb0|=\x8eZcPY\xf8\xbd\x13\xaa\x8b\xdf\xbc\x93u\xd5\xb0r\xfb\xde\xe7\xd9k\xe2\xc6\x1b\xf2o@&>\xf2M\xe7\x8c\xeb\xee\xf5\x02~\x85\x14\xf3\xc6v\xf15PE\x8c\xca\x16$\xc2\x01#\xb563\rbq\xbf64\xfaW\x17\xdfa\xe6\xca\x86\xd7\xf8\x81X\x9bg4\xc1\xdam\xcf=Rq6\xb0\xd4D=I\x1a\x0e\xd0\xabz\xe2\x19\x0fM\xad\xdco\xa4\xb2\x8c?\xc1\x10\xf273\xd00\xb3_\xe8\x9a*\xfcL\xea;\xc0\x9a\xdbx!N;\xb5x\t\xa4E\xbe\x93r\x04\xf5\xf0\xf5\x7f\x9a)\xf5\x1b\"\xa1\xd8\x06>\xc9\xe2r\xe9\xbb\xfe\xc0\b\x81\x98\x1c\xe2\xe0?\x8f\xa1\xbel\aN\x83@\xb1\x03)4A\x83\xd6\xcf\xf6\xb5\x82\xb7\x9dA\b$\xa2x\x8a@\xfaj~\xef\x93\xb1/L\x01\xe2\xba|\xf0\x01)PP\xcdl\x06\xfc\x15;qZ\xb1u\xc9\xd0\xd16~JEGm\xe4\x1e@\x9dG\xe4@\xdf\xba\'\x8b\x1cD\xc7\xec\xd1@}tR\xd9P\xf4N\xe3\xd8x\xa0\x91\x17\xc2}\x13\b\xca\t(Z\xa3_\xa1\x90\x15T\xa4\xe7%\x98\xa7\xfb\x8bp/eq\x93\xbf\x1f =|\xf3\xb1\xfcR\xd8\nM,\xcb%@\'\x15\x88\xd8\xad\f\x91|\x95\x8fq+\x98\x81W\xba\x9f\xe0elOt\xbd\by\r\x87\x1c\xba\xbd\x8e+S>\xb8\xe29\x91h^x\xfb`\x00\xdd/\xa6\xb1\x16=\xa1bw\xc5I\xb1\x00'/549, 0x2) pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000180), r1) ioctl$sock_SIOCGIFINDEX_80211(r2, 0x8933, &(0x7f00000001c0)={'wlan0\x00', 0x0}) sendmsg$NL80211_CMD_SET_BEACON(r1, &(0x7f0000000240)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x440000}, 0xc, &(0x7f0000000200)={&(0x7f0000000640)=ANY=[@ANYBLOB="74140000", @ANYRES16=r3, @ANYBLOB="20022abd7000ffdbdf250e00000008000300", @ANYRES32=r4, @ANYBLOB="0c00990008000000670000006f0191002996df10b050d6f12a33a2ee8082441509c4ee49f60fe2c2bf4eebf94c2eda3a1285f1a2ca96927018614e7ff107095be4596dad75a5647a2ca67052375393c9fd1e251f290e46a564baa064c80a49ce048b07b021426fa70a8a08e4d1ab8c09d0bedc563b55c7435efd02094fb5350ae3d2be8470769c96c5d5bb62f58425492e530d53b5782aaba0b493c167a393ae368bcadbcc6d78b4b69c7f5c730f70996c5173ff9bad04d5de4caeca71bdf200196aaa925eb351cccb5f90b65a5e8c3aebbeb002f5d3c5986601a563839dbdc2eb2e628b73da03014d05dfdbf28ab10bfbef5fa08b82819ccb8553777656285e63d577fdab4a93a198d176e8fdb7d5d89b0febc006e096d4fa5ea8a88e60cac7d6183e51e515d839d75f2c7f1a51a731c67954917d1b5056e9f95e474912e68fbeb48fa70db578ebd3960ab62885d4c5e17bcd76dce46fb9a1b1eaf3808add5c4c76711e4f56156270e5fc3877dc3ef40431a30413bc005670b4cd0022002a000014f181c01178461b0a32bd13befa62c5db95b54efe0406040409000900000008100e8004100200eb081d04fdc5476228658518944830861c67520d2e024b032584506912128e03ef0cba9894bf4d957d7a31a599fa9b7dde3f17555d943429474957cd299a0aa296f5bc8673413f190e8ffa2f3b2daee5b6f2e64ef6d5faebc5a3d74c074da35889ce9d18205e1979934aa5d3ea6fc4a8d3331a1414eff5ae6981ebed390e48de43a78265ba0932ba866bbcf066262ded7a905fc6d3df1ebeb8d2edeead3c3a60c680764e8bb52958d842b012dc08a3941b3159e87b8b72a2aa44147c5906f32b86216e2647409513d37cbabbf147b9f27a9913f67ebfa55cae1957a835526cc99637f03a629a2260f73822148da16d2ba7d86b3f0fe1f56ea535f916926625c8940be1f589f947eb76403506c85e716d610c4b8dab074f5047fa11112164060cdd58bd19508d004e0d75398674f6e54c885f83562f5a9408f873ff57eec74ea8d093b74100fd48c8ebaeedeb7b5f25d57d6362343a29debf76829e6bc8a77f21e451a0ea24d521a9b63761c94c21b74eeae882efe5ebbdaa2feea8310dd62e75aac806e0ac7af09a12ed1ea8b0253dab69b6818566070e129579f66dfc62158c8d0513e0629e6572362e28154d1112b25e72cb09ef2386a040d6f985ea78188f542212efbc76ea1a4b38a4de442f1f317c6b37465f1f9fc192edce62ecb8c10d84f8b4644d68b904a3f72b3e38f307fc70a4ec682636302d1620bdf7da6f1d3aa284bcdaf8b192df6226bfd772dedd97e6e362f657fade4423ed1c73fbcc90147174c94ce41cbb1c7914f551f9f9587367854a3eda6205466918a8f79a32f1471263f438a52dad92ae7a3c675f913c307b7f784ccf4b0fc0f3a8a847d0e21011de9b6760f9828c0724fb9a33b4f92e9c89365ecfed6fd8462d07a073dcda25a65ba58116af32813b246193412ca8530cb5c11d6474e1a437e369bb4843bbc7d3a1253df4c7a6211da190a8329bab47cc7e73540ab55d8a2a160d7b3062f0699c80fc8aec68099d1aeae6a9e3f5af20ebc26e3626deb224549c3626deec8c0d62d9fed1f15092da262d4fde358919a53c9ee4be88436b2772d691e6d97b7354ce7de7f2781d4f8e096fc7329aff7e03396cfc6d37656a533c2476a318de650964b9550aa937ec0eb2c0dea80ebbb4bf0bae856b470c89786a35d1bd2aa466c3efaa57c0acd9fdc3fd7f8c2d3698075e98207ea304199a9c53c7a890cece8559d03b5d7402451736850128af71a5414f721e2928136748d3d302360cbb97bb060bf44750af5cedbde6bc678e146ac127ad05defcb071433b79ae23b982097a51249f6c031e62bdaa8fe6d15536a8689145370459781ea665979f40fb71da1acc2b1e1f5e78dfd706406277d7c7521a3f548502eb70d725b3cc099218b7ba2325cab4c94fe3a0cf4c3642bbdfd7032a3776195a8438f85fa56f9f24bcdb979fa53242b1c42126a8de5da1fea733ea8d25b24048f0e19ba4efcfdf684c1d12170d575b7eeb2aad50859f75c855e748fd9785d0f19c6ac9d7aea1a08f4095c67cc2440363e9b8b0c58d1c62600ff51eac62349397bfe6e30a2bda1d3c8307a5b642001ddc589bb6ac7afe7a877f03adab1c40b39d54ccfd245b59731e9caa3e3656c1e6e7750c2f23654ce8f78806b5f02e6d913f852b12623327fe645e28475b093a11fa17a1de1fd6e9f3eb8b181345aacda318b9d269717d9d3801000000b97a6fe09e6452fbaaad8a923a73b06a08b656617dee4be7b71e334703ebb3a277c09af906199aa25960d82e9cd4445f0d2fda8cd22dc4c4450730a0fd042392cbfed89b564f4bde197d460048565886df6b24a696bb7a7fb0d3f56b1c2e0a24532aa5afca3459eb39bed9b5884c42cd3203d0c692a5cadcd1a421d69ca6427455607083a1e2ecfda3fedcf07ec4caaf6cb86028c2eb2c24d73863ae48398a68737ae01b850fdd3671139aa150d68285a9efaefc8b13be060ae99e751da05e69b60fd695be478bb80bd61c381c2c575ffd410446522e8196a88d9a1da5222d6c78dfd9c452ec5f29d55fb2b32b9bf72fa5f429b8b4fe303c7a729e9284b9599d6d15e62a181bfee99ff77ec6e700be67682b989908b2cb9bce7eafc09ff60b6b7114ab9db12c4b38a59eda9bd5185574c925c679f6b78bdeddd30ffce71fddbeb131cf478ff18f816ed4ed01f534ac8b231035dcf5ce6df143b11d87fcba3073530a8943040e9a5185f1356c42e3812463a7afa89a3a0c7e9f05c76ccd3f0765f2fdb89a167546992808e6ddb573aa6caccb79cb07dadb4ba2139e00ad5a5c69559efb12ede411d40235d962557c24188d26ba280c67ab812640f203ee6de99a93014b2de8b5c10e8ca95f67ca04e85c003cdfc73128116367ad76ab78b1f3d4214245672f0adf4723c4f0fb2d9b40d9cfac73708439cf6954af7def363340ad71a611051050b5ddb679ec2512876605baaec9847ee4182245f96b9c62913ef4be29127f0e15e2ee001a67a748a5abfc99dea5ea23dd3fae6ccc9d3ff9fe5fb07d0336c0909896aab4c7c7fa88ff3322697ed5e800625a01ff0b0d7c1a1b4d660693f1d44148c9189fcd4357fbac253929aa6c063250f65270b9393858f685f8e5fea1b6c235dd66df77346440119f1495cd8a8ac7db3a8ba159a8e4e1d806756a8467cf1a53b8f5c9e814e65705e03bd4794591ce6763c2a7f8a0f59160a0774233d5855d6553e44000f57b50303a1c9d63c8ded3b29193b3ae7ffb0d0c783ebc71bf81aa1e25b561439df56f42605f8d826a08525b2eb67f87733835b703b353afc8f87f616f407cef51cdc6b9b8ea9d20a39d19cf56bfc655ee0ac670f01d14904387cc0a9d23f8613187c9b9f03c36c26f65ae90ab8a7c9b380dca761223db72a3f7d78306140e1f80c9daf02d05a4a7bbebbfc1d4111d525a4bb4e19ca13750a9ee03fe4cf9f97ed1f47dd883b5929e2cf9860ce397974f8ee34d0617964dd5481e337d889cf14a540e50ae6a4e1dab78986d4d13bb39ef741b841dd050466414197b575ca8608f5b9e188e642a86a0615d9e8745fca6e67010a0877833455ebd4aa068b9e9b3dc65e3d81284041ff1dc6fc06ae4f2ea086cc3bb57962d1a55fdde54194cba9b9a8b356fb879240a363dc75b866ac8c9ff444a4fccacb5fe889557ec642f31eb58eac8b559d091da0ed7d4602be395816ff23f3bb0534bebe94e8b52dadee26825bcb90eafccf159f35875b0dd6d05d06f0caa39bc8e127e7b2a9f6f8dd8ce4f6c9666a80b4fe1d04fe32731a6ec5ac48b0eb6fc1b9e9fabb6accc3b749f8b8a0a786cd31be7574f00d427d31b2191f3651b3486bbcd41dfa51d3b0e69fbe4b2fef6d789f802b075f3c06bfb732bf5698e8a4e0db05ee852546b083004f8c88300e9fc1bb7403acf1c4c147cd6595cb46d0b75b966f46abd7774a2a567a0e4caea3d6bbcc5c1a2deb265f09a96bb2aa3ed15bdd95e0b6902c1a79ea59dd0c3691e6dadd45a6c2bfaa4e0c5b98ea5ee13447e6c0e752ee3a97206571b147b33b0dde69b503007802f431963bf5027d7298c4e7b2855d012c5af933539b30f249677eb427075ccf0afb3c8213ee36d9191e821cac587ed896319740393d693ce496e647ced9a1b1b95e8847dfa9e435756c2a5cb1eacbfa39098476389a0e769491559d56fb4053cbf4f53c59b923466e178143edcc438fbe79388a032703f19f224ece4ee77f703044f0acbcbbaf3777feb0bc14d9b1cde2318ea97ee01883914e957653e3ab503900e3f2bca0515151bdd4b9ddeb859778a780b5013c8cf52da8662894e3d1b8709ea71fbaf89ff373359cd8b71d45c0e7726d0996d2333ac75f8fb666b44ad29147b5915ecb95909b2de39f1cba5abb3900ebe5b1c1636057d6fe397fb73a0b4840bcfa4df6011211921ee8723c9634ddfed8eb9cc793adbb48f70278ead59f003a11f53a01da5f92d023aa69a06a3e646ac921c3b8b9e092c1c1d90823facf7bfa0e1d089fd9e5cce8db9b348995019a32a4070e22ad02fb0418b5a24ee3d99b1686da88e6d3668d93c559485c300f1250edaa6a07a759c8c9d3123eea8b592ef4008387e9f761089ffce25a17c8a757f2fee7958a38942e41651b4cc9d7ced2d073f1c3ddb5b4cc5239f5380ddda61ba3cda7b9f69919f1f93491fb9c50fa8785fa0de6b345ac3b7f6bae9441b7efb2c26258064aa6db2352a3056837485d1013891cb0c99189c3bff460816ca2dff7d80848a19e481dc0a9cda55a90bdf7bd0dd233a327673eb7389e49cfdf0de5d2cf8ae750c7f44db0b578cab4de46c42ff44dd295087a3dec8c94c4a8599175cb2ab3fc4f170e10f179ab00f0106329d8b26724caae079b24daa892b06b0235569c5f7fce405314f3ab5290ae3501a7f5dbd8dffc10901fabcffbdb3b0f5000348449da65b9d91ccdfc47fc50a52b3afa4ed2f198a0d0b0684ad67f7aadb3118ac63449c0e126ebf7eed7cbbc0bd971f5e03ace8189cfbdf058ae16f608b400c86756ac9bc2445a5621ef90f0886199ab00e02760dd3cf721833d226e3f2c0f73b0100d34faa4d4ce7a4daa8603c1f834a36f2f03a5722ed9d41eb7ef2a053a9e9eccf80cde571c84792658543cccebd0dbdab4e902ff99dba563ab80d02836af4db2d360302c84d71d51232da1977e7489df45dfe0bb77835d9e2fe7fa9f3e368d0de4b4c833418d6c42fb88e32c22bd70cc12b7d4b7a93ed518c7bb5acbac2ac49828f62e1e5f6213042849ea665a7613969d75df5274a70293c4cd3479df96deb775979fce5b5892c264b610ae604a467983ec40197becf1a6b19ccad39f95c37096aa428163723a23eea3756d3f1b98d34ce99ac6f3d4c38a1c45410d63b499e748f13e9ccac2190e5065e9e24f175f31df936f38d1ee1b7b27ed209773ea88bb4a2f082705b0f4a56c0cf9884af3744397e72c5bad74cb6ca7c25eab19fb238b04b94c39a0703eff5b71b6e8e80b029080c5c29e1995125e6e5621d2d88fae8384bb821ce18300475f37e1cabfcc995b9986a5dc580432cbe564d5814a30d6d1e58086cbeeda3652f6672047bf51cfa9ceae565206f181dcd4682bc3240ac5c97da10ff278530c8a6358794288a9fd083b405d5cc587f05cd3f757d04919f0fae7557a1d132a2fcd489313f899d3e4b15c7e01ddaad7fd677abe5786698afe42b8aaea511af5880296c20fe4bc420cf83b44a1dda64e2acce449b5aac3db6b18a18d3cbfba9f2754285146e9034f8d69e369914e389abde4495fb5ea16c36139a7997c7c06ce3607dbcd086b81c2cd7a43eb0fc89f5097742019c00b131137ce04890e18439c4c8718a39bc0910a35f21c9e790a3a091e45f56435b7b14f61bf2c531a1ce43b74a35ef6c7cb7de96fd5e461f8893e74c032a58e53f13e6fdc9680843b8a9ac251ed51f926ddc5edaff5e59b02b595c2f8fe32107c5ad64e2eb7b697fb993a6027da21012507a40fd58aa2709099ce2db6a81b4380bff1c65cc0686b6ce233e2e9138a758ec644c2f936dac810e1a060c84fa53332423f26d1c97614b1536b171ae8e05dea7a43ea57010a9d52939fe01e4fcde19dac1f80da25ee6952f14fc9524316deb00010d762088e70efa156bd32ec215ccb268fd206f3018337eca6db6d229a59fe26246d3ce515e7b2e8690874e7a4a6a0980155336414967c734ac98476279586ff26bbf474a7af5001ed171658dc69a0ff753ae18ee34b2b43dc43076ebbdf5674cf008141428b9bec0b0fb6ac808f8e4bb60694ba007002a003e0100009c0080000301348262433702d9570000ffffffffffff0400000008021100000102000000020000000600080211000000feffffff0008021100000007000000050802110000000300000001ffffffffffff000040020008021100000002000000000802110000017e030000010812b61204d3a46c8583254003aa08021100000106000000ffffffffffff03000000373e000008021100000100ffffff0a020e008090a500080211000000ffffffffffff50505050505013000c0041c0050000000000000000005c000107850081b0030592040608090700c1ff05e1814cff0ab2f28bc391a30fc7541e7958f1177ffe1d357decfdd0ec0e5a4a118575d9db23a8b94c9b14e3ae6703c8dcec06e7c1851c3b2c6971f1a7fcb2508ea969e73a119e73f609d0b43c4687bb12d64652cf7ff01294099aad2d2ef53ddaf4f5a6b8848b64203b16bf006b63f5bc0bc4e8d3cee850934fee877964a1e7223f05e6873ede6f30767e463ab1791c4ca8ab2d4c13c5da32472c35973b0fe8933ffc8880470ba30dbf0b2923c0f6102100e958ea62527527d0549b32b835c6cb5c5fefaabb8edcece1f56e9e13e05cce5a522bd8a75287de900315d96a766d99a679250301092a2a01073c040009b3ff7206030303030303ddd283ec6a5ca4eed03f289f91501664359c26aa289147138508c52a0054df3a99e311de22179a909982b5247e9645622298d8bc9a64b8f5043d4930f501bdb3b047de0c435fdef4f22a14b0591b49ef9084d3980f94cb1da9fa31b5dd22974bb8668a916cdf4700f86564a92301990f9387edbbe4d683758610ff9dcd290f3c688ab0f5cd4caf88b3e8f58d320fb7bea15bf415aea2d219025aaf2ee39d395192b9023088ff2bf34232bf84bc26c02384990a627c9ae431207673a2984586a5d85983fb357a2f5bc40ba454abbb1976725f337e0000"], 0x1474}, 0x1, 0x0, 0x0, 0x20000080}, 0x4000000) perf_event_open(&(0x7f00000000c0)={0x3, 0x80, 0xda, 0x1, 0x3, 0x8, 0x0, 0x10000, 0x200, 0x2, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x3, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x40e, 0x4, @perf_bp={&(0x7f0000000080), 0x1}, 0x450, 0x800, 0xe4, 0x5, 0x100000000, 0x1000, 0x6, 0x0, 0x7, 0x0, 0x20}, 0x0, 0xe, 0xffffffffffffffff, 0x8) r5 = fsopen(&(0x7f0000000040)='nfs4\x00', 0x1) ioctl$FS_IOC_RESVSP(r0, 0x40305828, &(0x7f0000000300)={0x0, 0x0, 0x7, 0xfc}) fcntl$addseals(r5, 0x409, 0x0) 06:10:06 executing program 3: r0 = getpid() ioprio_get$pid(0x2, r0) r1 = getpid() ioprio_get$pid(0x2, r1) syz_mount_image$vfat(0x0, &(0x7f0000000040)='./file1\x00', 0x0, 0x0, &(0x7f00000000c0), 0x2002000, &(0x7f0000000400)=ANY=[@ANYRES16, @ANYBLOB="72e1af808ba473e6f37c85b113d8c4d9e1de4ed2968d2e01108c4795a941d14f6927393c8c3c458dd7454900d48719912efc18d580a8f841234284071012d7d5020eb5d56dc1ba5f1048adac4b928bf6cfd663b4cab43637cb979a9199a0246ec02345161783bc79585902603d7062084f05b744e31fcb4c3e81f3becabb7ad1fa5783f5e5e60ae912102fe8df0536bd074c03bd33742f35c5c44b5c3c9d693114367b7d966e"]) chdir(&(0x7f0000000140)='./file0\x00') ptrace$getenv(0x4201, r0, 0xfff, &(0x7f00000000c0)) openat(0xffffffffffffff9c, &(0x7f0000000000)='./file2\x00', 0x40c2, 0x0) r2 = perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x6, 0x0, 0xe}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r4 = fork() perf_event_open(&(0x7f0000000540)={0x4, 0x80, 0xeb, 0x0, 0x20, 0x0, 0x0, 0x2, 0x2820, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, @perf_config_ext={0xdc, 0x40}, 0x40000, 0x3, 0x8, 0x5, 0x6000000000000, 0x4, 0x5, 0x0, 0x3, 0x0, 0x3}, r4, 0x9, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000340)={0x0, 0x80, 0x2, 0x83, 0x1, 0x7, 0x0, 0x1f, 0x9ec17fc7a3e840c7, 0xc, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x9, 0x4, @perf_bp={&(0x7f0000000240), 0x1}, 0x404, 0x7, 0x3, 0x6, 0x800, 0x9, 0x3, 0x0, 0x7ff, 0x0, 0x9}, r4, 0x8, r2, 0x9) fork() setxattr$trusted_overlay_upper(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180), &(0x7f00000001c0)={0x0, 0xfb, 0x7a, 0x0, 0x2, "d54449275cb08faf62df87518e3ce16f", "9a61b461b0c63151b954990036d5e0163ceb48c6a801bb019e9e6fa7196a9372f804b9e9ca3fb3d85d1985d31346bbd5fd02b1c8223bf6388eb75498623e38ff88a99c5ce38698a32306b7d4e4b0fd4b03bfa568df17a42f725c6c33046b38b6e4a713dde1"}, 0x7a, 0x3) socket$nl_audit(0x10, 0x3, 0x9) chroot(&(0x7f0000000080)='./file1\x00') sendmsg$inet(r3, &(0x7f0000000780)={&(0x7f0000000000)={0x2, 0x0, @local}, 0x10, &(0x7f00000003c0)=[{&(0x7f0000000300)="6fb9", 0xffeb}], 0x1, &(0x7f0000000700)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @remote, @broadcast}}}], 0x20}, 0x0) [ 2122.536631] FAT-fs (loop4): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) 06:10:22 executing program 3: r0 = getpid() ioprio_get$pid(0x2, r0) r1 = getpid() ioprio_get$pid(0x2, r1) syz_mount_image$vfat(0x0, &(0x7f0000000040)='./file1\x00', 0x0, 0x0, &(0x7f00000000c0), 0x2002000, &(0x7f0000000400)=ANY=[@ANYRES16, @ANYBLOB="72e1af808ba473e6f37c85b113d8c4d9e1de4ed2968d2e01108c4795a941d14f6927393c8c3c458dd7454900d48719912efc18d580a8f841234284071012d7d5020eb5d56dc1ba5f1048adac4b928bf6cfd663b4cab43637cb979a9199a0246ec02345161783bc79585902603d7062084f05b744e31fcb4c3e81f3becabb7ad1fa5783f5e5e60ae912102fe8df0536bd074c03bd33742f35c5c44b5c3c9d693114367b7d966e"]) chdir(&(0x7f0000000140)='./file0\x00') ptrace$getenv(0x4201, r0, 0xfff, &(0x7f00000000c0)) openat(0xffffffffffffff9c, &(0x7f0000000000)='./file2\x00', 0x40c2, 0x0) r2 = perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0xe}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r4 = fork() perf_event_open(&(0x7f0000000540)={0x4, 0x80, 0xeb, 0x0, 0x20, 0x0, 0x0, 0x2, 0x2820, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, @perf_config_ext={0xdc, 0x40}, 0x40000, 0x3, 0x8, 0x5, 0x6000000000000, 0x4, 0x5, 0x0, 0x3, 0x0, 0x3}, r4, 0x9, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000340)={0x0, 0x80, 0x2, 0x83, 0x1, 0x7, 0x0, 0x1f, 0x9ec17fc7a3e840c7, 0xc, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x9, 0x4, @perf_bp={&(0x7f0000000240), 0x1}, 0x404, 0x7, 0x3, 0x6, 0x800, 0x9, 0x3, 0x0, 0x7ff, 0x0, 0x9}, r4, 0x8, r2, 0x9) fork() setxattr$trusted_overlay_upper(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180), &(0x7f00000001c0)={0x0, 0xfb, 0x7a, 0x0, 0x2, "d54449275cb08faf62df87518e3ce16f", "9a61b461b0c63151b954990036d5e0163ceb48c6a801bb019e9e6fa7196a9372f804b9e9ca3fb3d85d1985d31346bbd5fd02b1c8223bf6388eb75498623e38ff88a99c5ce38698a32306b7d4e4b0fd4b03bfa568df17a42f725c6c33046b38b6e4a713dde1"}, 0x7a, 0x3) socket$nl_audit(0x10, 0x3, 0x9) chroot(&(0x7f0000000080)='./file1\x00') sendmsg$inet(r3, &(0x7f0000000780)={&(0x7f0000000000)={0x2, 0x0, @local}, 0x10, &(0x7f00000003c0)=[{&(0x7f0000000300)="6fb9", 0xffeb}], 0x1, &(0x7f0000000700)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @remote, @broadcast}}}], 0x20}, 0x0) 06:10:22 executing program 7: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x1007fc, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000100000005000000000004000040000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000001000018000000c28500002b02", 0x66, 0x400}, {&(0x7f0000010100)="000000000000000000000000e8f7d2e8feeb4bf889ba053b02420ff8010040", 0x1f, 0x4e0}], 0x0, &(0x7f0000000140)=ANY=[]) 06:10:22 executing program 1: pipe(&(0x7f0000000340)={0xffffffffffffffff}) pread64(r0, &(0x7f0000000440)=""/95, 0x5f, 0x6) execveat(r0, &(0x7f0000000080)='./file0\x00', &(0x7f00000001c0)=[&(0x7f00000000c0)='\x00', &(0x7f0000000180)='\x00'], &(0x7f0000000400)=[&(0x7f0000000200)='/dev/zero\x00', &(0x7f0000000240)='/dev/zero\x00', &(0x7f0000000300)='/dev/zero\x00'], 0x1000) socket$inet(0x2, 0x1, 0x0) perf_event_open(&(0x7f0000000100)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x22420, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ptrace$setopts(0x4200, 0x0, 0x5, 0x100050) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000004c00)={0xc0002100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) gettid() r1 = openat$zero(0xffffffffffffff9c, 0x0, 0x380, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000000)='net/udp6\x00') read$hiddev(r2, &(0x7f0000001140)=""/212, 0xd4) fchmodat(r2, &(0x7f00000004c0)='./file0\x00', 0x0) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(r1, 0xc018937c, &(0x7f0000000380)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32=r0, @ANYBLOB="00000000000000002e2f66696cee8816"]) ioctl$TIOCSSOFTCAR(r3, 0x541a, &(0x7f00000003c0)=0x6) waitid$P_PIDFD(0x3, r1, &(0x7f0000000500), 0x2, &(0x7f0000000580)) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(r1, 0xc0189372, &(0x7f0000000040)={{0x1, 0x1, 0x18, r2, {0xffff}}, './file0\x00'}) 06:10:22 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="20feffffff02000019000000900100000f000000000000000100000005000000000004000040000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000001000018000000c28500002b02", 0x66, 0x400}, {&(0x7f0000010100)="000000000000000000000000e8f7d2e8feeb4bf889ba053b02420ff8010040", 0x1f, 0x4e0}], 0x0, &(0x7f0000000140)=ANY=[]) 06:10:22 executing program 6: ioctl$AUTOFS_DEV_IOCTL_CLOSEMOUNT(0xffffffffffffffff, 0xc0189375, 0x0) syz_genetlink_get_family_id$ethtool(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_PAUSE_SET(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = memfd_create(&(0x7f00000009c0)='B\xdb/\x89\x03l\xdeb\xcb\xb54\xed\xbeLY\xb5Z\xe1\x12S\xf5G\xcc\xf3\xe9\x02h\v\xca(\x96\xe1C\xdf\x1c\xea\x85C\xfb\x10\x13\xfa\x03\x16\xcd\x17\xa2\x80\xa1z\xb4r\x95\xc3}g\xd3`\xf7\xcez\xcb\xb3\x1a\xbb\xc48e\x8e\xb1&\xd1\x8a\xe6!\x7f\x8d\xea\x9f;\xe5r\xe5\xbd\xb0|=\x8eZcPY\xcd\xcb\x13\xaa\x8b\xdf\xbc\x93u\xd5\xb0r\xfb\xde\xe7\xd9k\xe2\xc6\x1b\xf2o@&>\xf2M\xe7\x8c\xeb\xee\xf5\x02~\x85\x14\xf3\xc6v\xf15PE\x8c\xca\x16$\xc2\x01#\xb563\rbq\xbf64\xfaW\x17\xdfa\xe6\xca\x86\xd7\xf8\x81X\x9bg4\xc1\xdam\xcf=RT6\xb0\xd4D=I\x1a\x0e\xd0\xabz\xe2\x19\x0fM\xad\xdco\xa4\xb2\x8c?\xc1\x10\xf273\xd00\xb3_\xe8\x9a*\xfcL\xa1\xa5\x9fNg:GP\x010\xea;\xc0\x9a\xdbx!N;\xb5x\t\xa4E\xbe\x93r\x04\xf5\xf0\xf5\x7f\x9a)\xf5\x1b\"\xa1\xd8\x06>\xc9\xe2r\xe9\xbb\xfe\xc0\b\x81\x98\x1c\xe2\xe0?\x8f\xa1\xbel\aN\x83@\xb1\x03)4A\x83\xd6\xcf\xf6\xb5\x82\xb7\x9dA\b$\xa2x\x8a@\xfaj~\xef\x93\xb1/L\x01\xe2\xba|\xf0\x01)PP\xcdl\x06\xfc\x15;qZ\xb1u\xc9\xd0\xd16~JEGm\xe4\x1e@\x9dG\xe4@\xdf\xce\'\x8b\x1cD\xc7\xec\xd1@}tR\xd9P\xf4N\xe3\xd8x\xa0\x91\x17\xc2}\x13\b\xca\t(Z\xa3_\xa1\x90\x15T\xa4\xe7%\x98\xaf\xfb\x8bp/eq\xff\xff\xff\xff\x00\x00\x00\x00\xfcR\xd8\nM,\xcb%@\'\x15\x88\xd8\xad\f\x91|\x95\x8fq+\x98\x81W\xba\x9f\xe0elOt\xbd\by\r\x87\x1c\xba\xbd\x8e+S>\xb8\xe29\x91i^x\xfb`\x00\xdd/\xa6\xb1\x16=\xf7\xa3VL\xf2\x00\x00\x00\f\xddz[\xa5M\x0e\x9f<~e\xd4\xc8,P\xaa\xcd\xc9\xbe\xfdf.~\x0468E7i\x91$\xa1Kh\x84\x17\xb1\x01\x10`\x19D\x97y\xd0\x04\xd0\x8c\xad\xf4\x9bV\x00\x00\x00\x00\x00\x00\x00\x00\xf1\xd8\xab\xb5h(\"8~\xc7\x8d\x96\x02\xc7R2\xde\xf7_,~\xe9\a\xd3%\x95\x80\xb4\a\xd7\xb3\xd0A4\x92lO\xd8\xfd\x96jz\x93_M\x1e\x19x)\xe3\xdchX\x843o\xc27\x1a}<\xe4\xdf&\xc3\xb1\x7f#\xb1\xcf-\xec&\x11c\xf0:\x94$Lu6Z%\x9d\xcf\xd8y\xdfE\'\xff\xd30\xb5\xb8\x14\xa4\xeb\xe7.6i\xed\xd0(\xd8\xaf\xa8\xc7\x86\x88M\xed.\xa1u\x9f\xec\x8d\x8e\xa9\x98\x96Z\xb1\"N\xac\xaes\x04\x00\x00\x00\x00\x00\x00\x00\x00\x01\xabOy\x8d\xebz)\x1c\x89{\x81T4\x16\x83\r\x1eO\xf7\xc8\xb0\x1a\xd7\x84\xff)\xd7!\xa6\xfez\xbd\xd26\x96\xe3Ob\xf5\x82\x15ny4\x9f\x1c\xbc\xcb\xfc_\t7\xd1\x9c\x99\xc9(\'\x9d.\xae\xb4](\xf9\x90\x8f\xa8\xc6\xf8\x81\x92\xcd\v\x8d\xbf\xfeCs\x9f\x0e\xf0\xfc\xe8lZ\xcc\x13Q\xa1\xb7$\xf2:\xae4V\xd2\xa1S\x8b|\x1fq*u\xe5H+\xa8Gm\x7fp\xc3\x17\a5\f\xc24I\xc4\xbdW\xdb\xb0\x8c\xb8\x89\xf4\x9b\xdc\xba^\xfd\xe5j\xdc\x9f^1\xa7J\xa5\xd4\xae\xfc\xe6\x05\xd9\xdd\x98\x1fK\xfa\xd3GM\xf4\x1b\xcd,\x832\xf1\x85\xa6J\xffY 2*\xca-&\xb5\xff\x83\xac\xd1\x88z\xc6-7;\xca\xb8\xca\xe1j\x1f]{\xdc\\\x97\xb9\x13\xb6x\xc5\xa3\xb2\x01\xc7)Bt]\xab\x8fE-\xe2772\x06J;\xd02\x97On:-\xbejt\x8f\"F_\xb5m\x88\x13\xd5\'yS\xa5v-$\xff@:a\x82\x1a\xf4A\xa7\xc8\x8ce\x89\xf4\xa1\x90\xcb\xdc\xcb\xdal\xe3d\x95\x1as\x10\x12\x9ed|\xe7>\xb5K\x82S\x88\xca\v@\x96\b\xdf\xe0\xc2*\\k\xfc;\x1fhF\x8f\x7f\xdb\'\xf2\xbc\xc3\xf2F\xa2\xe2\xc6\f\xf3/\xff6>\xd2f\xbb\x1c\"\nqT`\xd0G+&DSHK\x15\x8b\x06\x16\x1a\';\x061\xd4\x03k\xfe\xc0\x93\x04\xd7\x80B;\x02\r%{VTC\xe1\xae\xbe\xd3w\xe1\xaf', 0x7) r1 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_80211(r1, 0x8933, &(0x7f00000000c0)={'wlan1\x00'}) r2 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_STRSET_GET(0xffffffffffffffff, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000080)={0xc0, r2, 0x1, 0x0, 0x0, {}, [@ETHTOOL_A_STRSET_STRINGSETS={0x10, 0x2, 0x0, 0x1, [{0xc, 0x1, 0x0, 0x1, [@ETHTOOL_A_STRINGSET_ID={0x8}]}]}, @ETHTOOL_A_STRSET_HEADER={0x24, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}]}, @ETHTOOL_A_STRSET_HEADER={0x28, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth0_vlan\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8}, @ETHTOOL_A_HEADER_FLAGS={0x8}]}, @ETHTOOL_A_STRSET_STRINGSETS={0x50, 0x2, 0x0, 0x1, [{0x2c, 0x1, 0x0, 0x1, [@ETHTOOL_A_STRINGSET_ID={0x8}, @ETHTOOL_A_STRINGSET_ID={0x8}, @ETHTOOL_A_STRINGSET_ID={0x8}, @ETHTOOL_A_STRINGSET_ID={0x8}, @ETHTOOL_A_STRINGSET_ID={0x8}]}, {0x14, 0x1, 0x0, 0x1, [@ETHTOOL_A_STRINGSET_ID={0x8}, @ETHTOOL_A_STRINGSET_ID={0x8}]}, {0xc, 0x1, 0x0, 0x1, [@ETHTOOL_A_STRINGSET_ID={0x8}]}]}]}, 0xc0}}, 0x0) sendmsg$ETHTOOL_MSG_PAUSE_SET(r1, &(0x7f0000000240)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000200)={&(0x7f00000001c0)={0x1c, r2, 0x800, 0x70bd25, 0x25dfdbfe, {}, [@ETHTOOL_A_PAUSE_RX={0x5}]}, 0x1c}, 0x1, 0x0, 0x0, 0x4004004}, 0x8004) r3 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r4 = socket$nl_audit(0x10, 0x3, 0x9) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f0000000040)={'wlan1\x00', 0x0}) sendmsg$inet(r3, &(0x7f0000000780)={&(0x7f0000000000)={0x2, 0x0, @local}, 0x10, &(0x7f00000003c0)=[{&(0x7f0000000300)="6fb9", 0xffeb}], 0x1, &(0x7f0000000700)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {r5, @remote, @broadcast}}}], 0x20}, 0x0) r6 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r7 = socket$nl_audit(0x10, 0x3, 0x9) ioctl$sock_SIOCGIFINDEX(r7, 0x8933, &(0x7f0000000040)={'wlan1\x00', 0x0}) sendmsg$inet(r6, &(0x7f0000000780)={&(0x7f0000000000)={0x2, 0x0, @local}, 0x10, &(0x7f00000003c0)=[{&(0x7f0000000300)="6fb9", 0xffeb}], 0x1, &(0x7f0000000700)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {r8, @remote, @broadcast}}}], 0x20}, 0x0) sendmsg$BATADV_CMD_GET_TRANSTABLE_LOCAL(r1, &(0x7f0000000140)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f0000000100)={&(0x7f0000000080)=ANY=[@ANYBLOB='\\\x00\x00\x00', @ANYRES16=0x0, @ANYBLOB="009f5b669e97f68af92506000000050037000100000008000300", @ANYRES32=r5, @ANYBLOB="080031000900000008002c002b0b000005002f000100000008003400ff03000008000300", @ANYRES32=r8, @ANYBLOB="080039000400000005002d0000000000"], 0x5c}, 0x1, 0x0, 0x0, 0x4004080}, 0x20000090) fcntl$addseals(r0, 0x409, 0x0) 06:10:22 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x100000, 0xff01, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000100000005000000000004000040000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000001000018000000c28500002b02", 0x66, 0x400}, {&(0x7f0000010100)="000000000000000000000000e8f7d2e8feeb4bf889ba053b02420ff8010040", 0x1f, 0x4e0}], 0x0, &(0x7f0000000140)=ANY=[]) 06:10:22 executing program 4: r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000040), 0xffffffffffffffff) syz_genetlink_get_family_id$ethtool(&(0x7f0000000100), 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_PAUSE_SET(0xffffffffffffffff, &(0x7f0000000440)={0x0, 0x0, 0x0}, 0x0) r2 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000080)='smaps\x00') pread64(r2, &(0x7f00000000c0)=""/98, 0x62, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x7fffffff) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(0xffffffffffffffff, 0xc0189374, &(0x7f0000000240)={{0x1, 0x1, 0x18, r0, {0x8}}, './file0\x00'}) dup3(0xffffffffffffffff, r2, 0x0) r3 = socket$inet_icmp_raw(0x2, 0x3, 0x1) syz_genetlink_get_family_id$ethtool(&(0x7f0000000180), r2) socket$nl_audit(0x10, 0x3, 0x9) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000040)={'wlan1\x00', 0x0}) sendmsg$inet(r3, &(0x7f0000000780)={&(0x7f0000000000)={0x2, 0x0, @local}, 0x10, &(0x7f00000003c0)=[{&(0x7f0000000300)="6fb9", 0xffeb}], 0x1, &(0x7f0000000700)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {r4, @remote, @broadcast}}}], 0x20}, 0x0) r5 = socket$inet_icmp_raw(0x2, 0x3, 0x1) socket$nl_audit(0x10, 0x3, 0x9) sendmsg$inet(r5, &(0x7f0000000780)={&(0x7f0000000000)={0x2, 0x0, @local}, 0x10, &(0x7f00000003c0)=[{&(0x7f0000000300)="6fb9", 0xffeb}], 0x1, &(0x7f0000000700)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @remote, @broadcast}}}], 0x20}, 0x0) sendmsg$ETHTOOL_MSG_LINKINFO_GET(r2, &(0x7f0000000200)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f00000001c0)={&(0x7f0000000340)=ANY=[@ANYBLOB='@\x00\x00\x00', @ANYRES16=r1, @ANYBLOB="000427bd7000ffdbdf25020000002c00018008000100", @ANYRES32=0x0, @ANYBLOB='\b\x00C\x00\x00\x00\x00\x00\b\x00!\x00', @ANYRES32=r4, @ANYBLOB="d5b921cac279671a02c4d90ed2cbc802c00000009852d9e901", @ANYRES32=0x0, @ANYBLOB], 0x40}, 0x1, 0x0, 0x0, 0x4}, 0xd0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000480), 0x1}, 0x603}, 0x0, 0xffffffefffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000040)=[{&(0x7f0000010000)="601c6d6b646f736689254300080120000400004000f8000020004000030000000000000001", 0x25}, {0x0, 0x0, 0x10000}], 0x0, &(0x7f0000000040)=ANY=[]) 06:10:22 executing program 0: pipe(&(0x7f0000000340)={0xffffffffffffffff}) pread64(r0, &(0x7f0000000440)=""/95, 0x5f, 0x6) execveat(r0, &(0x7f0000000080)='./file0\x00', &(0x7f00000001c0)=[&(0x7f00000000c0)='\x00', &(0x7f0000000180)='\x00'], &(0x7f0000000400)=[&(0x7f0000000200)='/dev/zero\x00', &(0x7f0000000240)='/dev/zero\x00', &(0x7f0000000300)='/dev/zero\x00'], 0x1000) socket$inet(0x2, 0x1, 0x0) perf_event_open(&(0x7f0000000100)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x22420, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ptrace$setopts(0x4200, 0x0, 0x5, 0x100050) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000004c00)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) gettid() r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000), 0x380, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000000)='net/udp6\x00') read$hiddev(r2, &(0x7f0000001140)=""/212, 0xd4) fchmodat(r2, &(0x7f00000004c0)='./file0\x00', 0x0) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(r1, 0xc018937c, &(0x7f0000000380)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32=r0, @ANYBLOB="00000000000000002e2f66696cee8816"]) ioctl$TIOCSSOFTCAR(r3, 0x541a, &(0x7f00000003c0)=0x6) waitid$P_PIDFD(0x3, r1, &(0x7f0000000500), 0x2, &(0x7f0000000580)) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(r1, 0xc0189372, &(0x7f0000000040)={{0x1, 0x1, 0x18, r2, {0xffff}}, './file0\x00'}) [ 2138.713311] loop7: detected capacity change from 0 to 2051 [ 2138.723462] EXT4-fs (loop7): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 2138.724164] EXT4-fs (loop7): group descriptors corrupted! [ 2138.734730] loop7: detected capacity change from 0 to 2051 [ 2138.757220] EXT4-fs (loop7): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 2138.757606] loop4: detected capacity change from 0 to 256 [ 2138.757919] EXT4-fs (loop7): group descriptors corrupted! [ 2138.816277] FAT-fs (loop4): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) 06:10:23 executing program 7: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x100900, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000100000005000000000004000040000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000001000018000000c28500002b02", 0x66, 0x400}, {&(0x7f0000010100)="000000000000000000000000e8f7d2e8feeb4bf889ba053b02420ff8010040", 0x1f, 0x4e0}], 0x0, &(0x7f0000000140)=ANY=[]) 06:10:23 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000001000019000000900100000f000000000000000100000005000000000004000040000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000001000018000000c28500002b02", 0x66, 0x400}, {&(0x7f0000010100)="000000000000000000000000e8f7d2e8feeb4bf889ba053b02420ff8010040", 0x1f, 0x4e0}], 0x0, &(0x7f0000000140)=ANY=[]) 06:10:23 executing program 0: pipe(&(0x7f0000000340)={0xffffffffffffffff}) pread64(r0, &(0x7f0000000440)=""/95, 0x5f, 0x6) execveat(r0, &(0x7f0000000080)='./file0\x00', &(0x7f00000001c0)=[&(0x7f00000000c0)='\x00', &(0x7f0000000180)='\x00'], &(0x7f0000000400)=[&(0x7f0000000200)='/dev/zero\x00', &(0x7f0000000240)='/dev/zero\x00', &(0x7f0000000300)='/dev/zero\x00'], 0x1000) socket$inet(0x2, 0x1, 0x0) perf_event_open(&(0x7f0000000100)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x22420, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ptrace$setopts(0x4200, 0x0, 0x5, 0x100050) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000004c00)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) gettid() r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000), 0x380, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000000)='net/udp6\x00') read$hiddev(r2, &(0x7f0000001140)=""/212, 0xd4) fchmodat(r2, &(0x7f00000004c0)='./file0\x00', 0x0) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(r1, 0xc018937c, &(0x7f0000000380)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32=r0, @ANYBLOB="00000000000000002e2f66696cee8816"]) ioctl$TIOCSSOFTCAR(r3, 0x541a, &(0x7f00000003c0)=0x6) waitid$P_PIDFD(0x3, r1, &(0x7f0000000500), 0x2, &(0x7f0000000580)) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(r1, 0xc0189372, &(0x7f0000000040)={{0x1, 0x1, 0x18, r2, {0xffff}}, './file0\x00'}) [ 2138.930079] loop7: detected capacity change from 0 to 2052 [ 2138.987537] EXT4-fs (loop7): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 2138.989047] EXT4-fs (loop7): group descriptors corrupted! 06:10:23 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="200002000002000019000000900100000f000000000000000100000005000000000004000040000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000001000018000000c28500002b02", 0x66, 0x400}, {&(0x7f0000010100)="000000000000000000000000e8f7d2e8feeb4bf889ba053b02420ff8010040", 0x1f, 0x4e0}], 0x0, &(0x7f0000000140)=ANY=[]) 06:10:23 executing program 4: r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000040), 0xffffffffffffffff) syz_genetlink_get_family_id$ethtool(&(0x7f0000000100), 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_PAUSE_SET(0xffffffffffffffff, &(0x7f0000000440)={0x0, 0x0, 0x0}, 0x0) r2 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000080)='smaps\x00') pread64(r2, &(0x7f00000000c0)=""/98, 0x62, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x7fffffff) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(0xffffffffffffffff, 0xc0189374, &(0x7f0000000240)={{0x1, 0x1, 0x18, r0, {0x8}}, './file0\x00'}) dup3(0xffffffffffffffff, r2, 0x0) r3 = socket$inet_icmp_raw(0x2, 0x3, 0x1) syz_genetlink_get_family_id$ethtool(&(0x7f0000000180), r2) socket$nl_audit(0x10, 0x3, 0x9) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000040)={'wlan1\x00', 0x0}) sendmsg$inet(r3, &(0x7f0000000780)={&(0x7f0000000000)={0x2, 0x0, @local}, 0x10, &(0x7f00000003c0)=[{&(0x7f0000000300)="6fb9", 0xffeb}], 0x1, &(0x7f0000000700)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {r4, @remote, @broadcast}}}], 0x20}, 0x0) r5 = socket$inet_icmp_raw(0x2, 0x3, 0x1) socket$nl_audit(0x10, 0x3, 0x9) sendmsg$inet(r5, &(0x7f0000000780)={&(0x7f0000000000)={0x2, 0x0, @local}, 0x10, &(0x7f00000003c0)=[{&(0x7f0000000300)="6fb9", 0xffeb}], 0x1, &(0x7f0000000700)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @remote, @broadcast}}}], 0x20}, 0x0) sendmsg$ETHTOOL_MSG_LINKINFO_GET(r2, &(0x7f0000000200)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f00000001c0)={&(0x7f0000000340)=ANY=[@ANYBLOB='@\x00\x00\x00', @ANYRES16=r1, @ANYBLOB="000427bd7000ffdbdf25020000002c00018008000100", @ANYRES32=0x0, @ANYBLOB='\b\x00C\x00\x00\x00\x00\x00\b\x00!\x00', @ANYRES32=r4, @ANYBLOB="d5b921cac279671a02c4d90ed2cbc802c00000009852d9e901fb170000", @ANYRES32=0x0, @ANYBLOB], 0x40}, 0x1, 0x0, 0x0, 0x4}, 0xd0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000480), 0x1}, 0x603}, 0x0, 0xffffffefffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000040)=[{&(0x7f0000010000)="601c6d6b646f736689254300080120000400004000f8000020004000030000000000000001", 0x25}, {0x0, 0x0, 0x10000}], 0x0, &(0x7f0000000040)=ANY=[]) 06:10:23 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="200003000002000019000000900100000f000000000000000100000005000000000004000040000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000001000018000000c28500002b02", 0x66, 0x400}, {&(0x7f0000010100)="000000000000000000000000e8f7d2e8feeb4bf889ba053b02420ff8010040", 0x1f, 0x4e0}], 0x0, &(0x7f0000000140)=ANY=[]) 06:10:23 executing program 3: r0 = getpid() ioprio_get$pid(0x2, r0) r1 = getpid() ioprio_get$pid(0x2, r1) syz_mount_image$vfat(0x0, &(0x7f0000000040)='./file1\x00', 0x0, 0x0, &(0x7f00000000c0), 0x2002000, &(0x7f0000000400)=ANY=[@ANYRES16, @ANYBLOB="72e1af808ba473e6f37c85b113d8c4d9e1de4ed2968d2e01108c4795a941d14f6927393c8c3c458dd7454900d48719912efc18d580a8f841234284071012d7d5020eb5d56dc1ba5f1048adac4b928bf6cfd663b4cab43637cb979a9199a0246ec02345161783bc79585902603d7062084f05b744e31fcb4c3e81f3becabb7ad1fa5783f5e5e60ae912102fe8df0536bd074c03bd33742f35c5c44b5c3c9d693114367b7d966e"]) chdir(&(0x7f0000000140)='./file0\x00') ptrace$getenv(0x4201, r0, 0xfff, &(0x7f00000000c0)) openat(0xffffffffffffff9c, &(0x7f0000000000)='./file2\x00', 0x40c2, 0x0) r2 = perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0xe}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r4 = fork() perf_event_open(&(0x7f0000000540)={0x4, 0x80, 0xeb, 0x0, 0x20, 0x0, 0x0, 0x2, 0x2820, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, @perf_config_ext={0xdc, 0x40}, 0x40000, 0x3, 0x8, 0x5, 0x6000000000000, 0x4, 0x5, 0x0, 0x3, 0x0, 0x3}, r4, 0x9, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000340)={0x0, 0x80, 0x2, 0x83, 0x1, 0x7, 0x0, 0x1f, 0x9ec17fc7a3e840c7, 0xc, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x9, 0x4, @perf_bp={&(0x7f0000000240), 0x1}, 0x404, 0x7, 0x3, 0x6, 0x800, 0x9, 0x3, 0x0, 0x7ff, 0x0, 0x9}, r4, 0x8, r2, 0x9) fork() setxattr$trusted_overlay_upper(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180), &(0x7f00000001c0)={0x0, 0xfb, 0x7a, 0x0, 0x2, "d54449275cb08faf62df87518e3ce16f", "9a61b461b0c63151b954990036d5e0163ceb48c6a801bb019e9e6fa7196a9372f804b9e9ca3fb3d85d1985d31346bbd5fd02b1c8223bf6388eb75498623e38ff88a99c5ce38698a32306b7d4e4b0fd4b03bfa568df17a42f725c6c33046b38b6e4a713dde1"}, 0x7a, 0x3) socket$nl_audit(0x10, 0x3, 0x9) chroot(&(0x7f0000000080)='./file1\x00') sendmsg$inet(r3, &(0x7f0000000780)={&(0x7f0000000000)={0x2, 0x0, @local}, 0x10, &(0x7f00000003c0)=[{&(0x7f0000000300)="6fb9", 0xffeb}], 0x1, &(0x7f0000000700)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @remote, @broadcast}}}], 0x20}, 0x0) [ 2139.284991] loop4: detected capacity change from 0 to 256 [ 2139.320968] FAT-fs (loop4): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) [ 2139.512813] loop5: detected capacity change from 0 to 2048 [ 2139.516063] EXT4-fs (loop5): VFS: Can't find ext4 filesystem 06:10:40 executing program 6: ioctl$AUTOFS_DEV_IOCTL_CLOSEMOUNT(0xffffffffffffffff, 0xc0189375, 0x0) syz_genetlink_get_family_id$ethtool(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_PAUSE_SET(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = memfd_create(&(0x7f0000000400)='B\xdb/\x89\x03l\xdeb\xcb\xb54\xed\xbeLY\xb5Z\xe1\x12S\xf5G\xcc\xf3\xe9\x02h\v\xca(\x96\xe1C\xdf\x1c\xea\x85C\xfb\x10\x13\xfa\x03\x16\xcd\x17\xa2\x80\xa1z\xb4r\x95\xc3@\x9d\xa6\xf1\x92#}g\xd3`\xf7\xcez\xcb\xb3\x1a\xbb\xc48e\x8e\xb1&\xd1\x8a\xe6!\x7f\x8d\xea,qx\xa28\xbf\"\xc7e\x06L\xb06\xeb<$\xd7\xba\xe5\x01\x03\x94r\xab\xd4J\x03s\xaf\xf6A\xbfV\xfa\x1ew\x8d\xbf\x99I\x97\xd8\xd2\xe8\x11\xc4\x04\x00\x84\xd5i\xee\xaf\xae[E\x1f\xdd\xd7#rT+\xb621p\xaf[\x99\" 1\xeb\xc7)\xd2\x1dh\xf2\xd5s\xfd?\fa>\x9f;\xe5r\xe5\xbd\xb0|=\x8eZcPY\xf8\xbd\x13\xaa\x8b\xdf\xbc\x93u\xd5\xb0r\xfb\xde\xe7\xd9k\xe2\xc6\x1b\xf2o@&>\xf2M\xe7\x8c\xeb\xee\xf5\x02~\x85\x14\xf3\xc6v\xf15PE\x8c\xca\x16$\xc2\x01#\xb563\rbq\xbf64\xfaW\x17\xdfa\xe6\xca\x86\xd7\xf8\x81X\x9bg4\xc1\xdam\xcf=Rq6\xb0\xd4D=I\x1a\x0e\xd0\xabz\xe2\x19\x0fM\xad\xdco\xa4\xb2\x8c?\xc1\x10\xf273\xd00\xb3_\xe8\x9a*\xfcL\xea;\xc0\x9a\xdbx!N;\xb5x\t\xa4E\xbe\x93r\x04\xf5\xf0\xf5\x7f\x9a)\xf5\x1b\"\xa1\xd8\x06>\xc9\xe2r\xe9\xbb\xfe\xc0\b\x81\x98\x1c\xe2\xe0?\x8f\xa1\xbel\aN\x83@\xb1\x03)4A\x83\xd6\xcf\xf6\xb5\x82\xb7\x9dA\b$\xa2x\x8a@\xfaj~\xef\x93\xb1/L\x01\xe2\xba|\xf0\x01)PP\xcdl\x06\xfc\x15;qZ\xb1u\xc9\xd0\xd16~JEGm\xe4\x1e@\x9dG\xe4@\xdf\xba\'\x8b\x1cD\xc7\xec\xd1@}tR\xd9P\xf4N\xe3\xd8x\xa0\x91\x17\xc2}\x13\b\xca\t(Z\xa3_\xa1\x90\x15T\xa4\xe7%\x98\xa7\xfb\x8bp/eq\x93\xbf\x1f =|\xf3\xb1\xfcR\xd8\nM,\xcb%@\'\x15\x88\xd8\xad\f\x91|\x95\x8fq+\x98\x81W\xba\x9f\xe0elOt\xbd\by\r\x87\x1c\xba\xbd\x8e+S>\xb8\xe29\x91h^x\xfb`\x00\xdd/\xa6\xb1\x16=\xa1bw\xc5I\xb1\x00'/549, 0x2) fcntl$addseals(r0, 0x409, 0x0) 06:10:40 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x100000, 0x80000, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000100000005000000000004000040000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000001000018000000c28500002b02", 0x66, 0x400}, {&(0x7f0000010100)="000000000000000000000000e8f7d2e8feeb4bf889ba053b02420ff8010040", 0x1f, 0x4e0}], 0x0, &(0x7f0000000140)=ANY=[]) 06:10:40 executing program 3: r0 = getpid() ioprio_get$pid(0x2, r0) r1 = getpid() ioprio_get$pid(0x2, r1) syz_mount_image$vfat(0x0, &(0x7f0000000040)='./file1\x00', 0x0, 0x0, &(0x7f00000000c0), 0x2002000, &(0x7f0000000400)=ANY=[@ANYRES16, @ANYBLOB="72e1af808ba473e6f37c85b113d8c4d9e1de4ed2968d2e01108c4795a941d14f6927393c8c3c458dd7454900d48719912efc18d580a8f841234284071012d7d5020eb5d56dc1ba5f1048adac4b928bf6cfd663b4cab43637cb979a9199a0246ec02345161783bc79585902603d7062084f05b744e31fcb4c3e81f3becabb7ad1fa5783f5e5e60ae912102fe8df0536bd074c03bd33742f35c5c44b5c3c9d693114367b7d966e"]) chdir(&(0x7f0000000140)='./file0\x00') ptrace$getenv(0x4201, r0, 0xfff, &(0x7f00000000c0)) openat(0xffffffffffffff9c, &(0x7f0000000000)='./file2\x00', 0x40c2, 0x0) r2 = perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0xe}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r4 = fork() perf_event_open(&(0x7f0000000540)={0x4, 0x80, 0xeb, 0x0, 0x20, 0x0, 0x0, 0x2, 0x2820, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, @perf_config_ext={0xdc, 0x40}, 0x40000, 0x3, 0x8, 0x5, 0x6000000000000, 0x4, 0x5, 0x0, 0x3, 0x0, 0x3}, r4, 0x9, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000340)={0x0, 0x80, 0x2, 0x83, 0x1, 0x7, 0x0, 0x1f, 0x9ec17fc7a3e840c7, 0xc, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x9, 0x4, @perf_bp={&(0x7f0000000240), 0x1}, 0x404, 0x7, 0x3, 0x6, 0x800, 0x9, 0x3, 0x0, 0x7ff, 0x0, 0x9}, r4, 0x8, r2, 0x9) fork() setxattr$trusted_overlay_upper(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180), &(0x7f00000001c0)={0x0, 0xfb, 0x7a, 0x0, 0x2, "d54449275cb08faf62df87518e3ce16f", "9a61b461b0c63151b954990036d5e0163ceb48c6a801bb019e9e6fa7196a9372f804b9e9ca3fb3d85d1985d31346bbd5fd02b1c8223bf6388eb75498623e38ff88a99c5ce38698a32306b7d4e4b0fd4b03bfa568df17a42f725c6c33046b38b6e4a713dde1"}, 0x7a, 0x3) socket$nl_audit(0x10, 0x3, 0x9) chroot(&(0x7f0000000080)='./file1\x00') sendmsg$inet(r3, &(0x7f0000000780)={&(0x7f0000000000)={0x2, 0x0, @local}, 0x10, &(0x7f00000003c0)=[{&(0x7f0000000300)="6fb9", 0xffeb}], 0x1, &(0x7f0000000700)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @remote, @broadcast}}}], 0x20}, 0x0) 06:10:40 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="200004000002000019000000900100000f000000000000000100000005000000000004000040000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000001000018000000c28500002b02", 0x66, 0x400}, {&(0x7f0000010100)="000000000000000000000000e8f7d2e8feeb4bf889ba053b02420ff8010040", 0x1f, 0x4e0}], 0x0, &(0x7f0000000140)=ANY=[]) 06:10:40 executing program 1: pipe(&(0x7f0000000340)={0xffffffffffffffff}) pread64(r0, &(0x7f0000000440)=""/95, 0x5f, 0x6) execveat(r0, &(0x7f0000000080)='./file0\x00', &(0x7f00000001c0)=[&(0x7f00000000c0)='\x00', &(0x7f0000000180)='\x00'], &(0x7f0000000400)=[&(0x7f0000000200)='/dev/zero\x00', &(0x7f0000000240)='/dev/zero\x00', &(0x7f0000000300)='/dev/zero\x00'], 0x1000) socket$inet(0x2, 0x1, 0x0) perf_event_open(&(0x7f0000000100)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x22420, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ptrace$setopts(0x4200, 0x0, 0x5, 0x100050) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000004c00)={0xc0002100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) gettid() r1 = openat$zero(0xffffffffffffff9c, 0x0, 0x380, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000000)='net/udp6\x00') read$hiddev(r2, &(0x7f0000001140)=""/212, 0xd4) fchmodat(r2, &(0x7f00000004c0)='./file0\x00', 0x0) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(r1, 0xc018937c, &(0x7f0000000380)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32=r0, @ANYBLOB="00000000000000002e2f66696cee8816"]) ioctl$TIOCSSOFTCAR(r3, 0x541a, &(0x7f00000003c0)=0x6) waitid$P_PIDFD(0x3, r1, &(0x7f0000000500), 0x2, &(0x7f0000000580)) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(r1, 0xc0189372, &(0x7f0000000040)={{0x1, 0x1, 0x18, r2, {0xffff}}, './file0\x00'}) 06:10:40 executing program 4: r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000040), 0xffffffffffffffff) syz_genetlink_get_family_id$ethtool(&(0x7f0000000100), 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_PAUSE_SET(0xffffffffffffffff, &(0x7f0000000440)={0x0, 0x0, 0x0}, 0x0) r2 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000080)='smaps\x00') pread64(r2, &(0x7f00000000c0)=""/98, 0x62, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x7fffffff) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(0xffffffffffffffff, 0xc0189374, &(0x7f0000000240)={{0x1, 0x1, 0x18, r0, {0x8}}, './file0\x00'}) dup3(0xffffffffffffffff, r2, 0x0) r3 = socket$inet_icmp_raw(0x2, 0x3, 0x1) syz_genetlink_get_family_id$ethtool(&(0x7f0000000180), r2) socket$nl_audit(0x10, 0x3, 0x9) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000040)={'wlan1\x00', 0x0}) sendmsg$inet(r3, &(0x7f0000000780)={&(0x7f0000000000)={0x2, 0x0, @local}, 0x10, &(0x7f00000003c0)=[{&(0x7f0000000300)="6fb9", 0xffeb}], 0x1, &(0x7f0000000700)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {r4, @remote, @broadcast}}}], 0x20}, 0x0) r5 = socket$inet_icmp_raw(0x2, 0x3, 0x1) socket$nl_audit(0x10, 0x3, 0x9) sendmsg$inet(r5, &(0x7f0000000780)={&(0x7f0000000000)={0x2, 0x0, @local}, 0x10, &(0x7f00000003c0)=[{&(0x7f0000000300)="6fb9", 0xffeb}], 0x1, &(0x7f0000000700)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @remote, @broadcast}}}], 0x20}, 0x0) sendmsg$ETHTOOL_MSG_LINKINFO_GET(r2, &(0x7f0000000200)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f00000001c0)={&(0x7f0000000340)=ANY=[@ANYBLOB='@\x00\x00\x00', @ANYRES16=r1, @ANYBLOB="000427bd7000ffdbdf25020000002c00018008000100", @ANYRES32=0x0, @ANYBLOB='\b\x00C\x00\x00\x00\x00\x00\b\x00!\x00', @ANYRES32=r4, @ANYBLOB="d5b921cac279671a02c4d90ed2cbc802c00000009852d9e901fb170000", @ANYRES32=0x0, @ANYBLOB], 0x40}, 0x1, 0x0, 0x0, 0x4}, 0xd0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000480), 0x1}, 0x603}, 0x0, 0xffffffefffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000040)=[{&(0x7f0000010000)="601c6d6b646f736689254300080120000400004000f8000020004000030000000000000001", 0x25}, {0x0, 0x0, 0x10000}], 0x0, &(0x7f0000000040)=ANY=[]) 06:10:40 executing program 7: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x100a00, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000100000005000000000004000040000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000001000018000000c28500002b02", 0x66, 0x400}, {&(0x7f0000010100)="000000000000000000000000e8f7d2e8feeb4bf889ba053b02420ff8010040", 0x1f, 0x4e0}], 0x0, &(0x7f0000000140)=ANY=[]) 06:10:40 executing program 0: ioctl$AUTOFS_DEV_IOCTL_CLOSEMOUNT(0xffffffffffffffff, 0xc0189375, 0x0) syz_genetlink_get_family_id$ethtool(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_PAUSE_SET(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = memfd_create(&(0x7f00000009c0)='B\xdb/\x89\x03l\xdeb\xcb\xb54\xed\xbeLY\xb5Z\xe1\x12S\xf5G\xcc\xf3\xe9\x02h\v\xca(\x96\xe1C\xdf\x1c\xea\x85C\xfb\x10\x13\xfa\x03\x16\xcd\x17\xa2\x80\xa1z\xb4r\x95\xc3}g\xd3`\xf7\xcez\xcb\xb3\x1a\xbb\xc48e\x8e\xb1&\xd1\x8a\xe6!\x7f\x8d\xea\x9f;\xe5r\xe5\xbd\xb0|=\x8eZcPY\xcd\xcb\x13\xaa\x8b\xdf\xbc\x93u\xd5\xb0r\xfb\xde\xe7\xd9k\xe2\xc6\x1b\xf2o@&>\xf2M\xe7\x8c\xeb\xee\xf5\x02~\x85\x14\xf3\xc6v\xf15PE\x8c\xca\x16$\xc2\x01#\xb563\rbq\xbf64\xfaW\x17\xdfa\xe6\xca\x86\xd7\xf8\x81X\x9bg4\xc1\xdam\xcf=RT6\xb0\xd4D=I\x1a\x0e\xd0\xabz\xe2\x19\x0fM\xad\xdco\xa4\xb2\x8c?\xc1\x10\xf273\xd00\xb3_\xe8\x9a*\xfcL\xa1\xa5\x9fNg:GP\x010\xea;\xc0\x9a\xdbx!N;\xb5x\t\xa4E\xbe\x93r\x04\xf5\xf0\xf5\x7f\x9a)\xf5\x1b\"\xa1\xd8\x06>\xc9\xe2r\xe9\xbb\xfe\xc0\b\x81\x98\x1c\xe2\xe0?\x8f\xa1\xbel\aN\x83@\xb1\x03)4A\x83\xd6\xcf\xf6\xb5\x82\xb7\x9dA\b$\xa2x\x8a@\xfaj~\xef\x93\xb1/L\x01\xe2\xba|\xf0\x01)PP\xcdl\x06\xfc\x15;qZ\xb1u\xc9\xd0\xd16~JEGm\xe4\x1e@\x9dG\xe4@\xdf\xce\'\x8b\x1cD\xc7\xec\xd1@}tR\xd9P\xf4N\xe3\xd8x\xa0\x91\x17\xc2}\x13\b\xca\t(Z\xa3_\xa1\x90\x15T\xa4\xe7%\x98\xaf\xfb\x8bp/eq\xff\xff\xff\xff\x00\x00\x00\x00\xfcR\xd8\nM,\xcb%@\'\x15\x88\xd8\xad\f\x91|\x95\x8fq+\x98\x81W\xba\x9f\xe0elOt\xbd\by\r\x87\x1c\xba\xbd\x8e+S>\xb8\xe29\x91i^x\xfb`\x00\xdd/\xa6\xb1\x16=\xf7\xa3VL\xf2\x00\x00\x00\f\xddz[\xa5M\x0e\x9f<~e\xd4\xc8,P\xaa\xcd\xc9\xbe\xfdf.~\x0468E7i\x91$\xa1Kh\x84\x17\xb1\x01\x10`\x19D\x97y\xd0\x04\xd0\x8c\xad\xf4\x9bV\x00\x00\x00\x00\x00\x00\x00\x00\xf1\xd8\xab\xb5h(\"8~\xc7\x8d\x96\x02\xc7R2\xde\xf7_,~\xe9\a\xd3%\x95\x80\xb4\a\xd7\xb3\xd0A4\x92lO\xd8\xfd\x96jz\x93_M\x1e\x19x)\xe3\xdchX\x843o\xc27\x1a}<\xe4\xdf&\xc3\xb1\x7f#\xb1\xcf-\xec&\x11c\xf0:\x94$Lu6Z%\x9d\xcf\xd8y\xdfE\'\xff\xd30\xb5\xb8\x14\xa4\xeb\xe7.6i\xed\xd0(\xd8\xaf\xa8\xc7\x86\x88M\xed.\xa1u\x9f\xec\x8d\x8e\xa9\x98\x96Z\xb1\"N\xac\xaes\x04\x00\x00\x00\x00\x00\x00\x00\x00\x01\xabOy\x8d\xebz)\x1c\x89{\x81T4\x16\x83\r\x1eO\xf7\xc8\xb0\x1a\xd7\x84\xff)\xd7!\xa6\xfez\xbd\xd26\x96\xe3Ob\xf5\x82\x15ny4\x9f\x1c\xbc\xcb\xfc_\t7\xd1\x9c\x99\xc9(\'\x9d.\xae\xb4](\xf9\x90\x8f\xa8\xc6\xf8\x81\x92\xcd\v\x8d\xbf\xfeCs\x9f\x0e\xf0\xfc\xe8lZ\xcc\x13Q\xa1\xb7$\xf2:\xae4V\xd2\xa1S\x8b|\x1fq*u\xe5H+\xa8Gm\x7fp\xc3\x17\a5\f\xc24I\xc4\xbdW\xdb\xb0\x8c\xb8\x89\xf4\x9b\xdc\xba^\xfd\xe5j\xdc\x9f^1\xa7J\xa5\xd4\xae\xfc\xe6\x05\xd9\xdd\x98\x1fK\xfa\xd3GM\xf4\x1b\xcd,\x832\xf1\x85\xa6J\xffY 2*\xca-&\xb5\xff\x83\xac\xd1\x88z\xc6-7;\xca\xb8\xca\xe1j\x1f]{\xdc\\\x97\xb9\x13\xb6x\xc5\xa3\xb2\x01\xc7)Bt]\xab\x8fE-\xe2772\x06J;\xd02\x97On:-\xbejt\x8f\"F_\xb5m\x88\x13\xd5\'yS\xa5v-$\xff@:a\x82\x1a\xf4A\xa7\xc8\x8ce\x89\xf4\xa1\x90\xcb\xdc\xcb\xdal\xe3d\x95\x1as\x10\x12\x9ed|\xe7>\xb5K\x82S\x88\xca\v@\x96\b\xdf\xe0\xc2*\\k\xfc;\x1fhF\x8f\x7f\xdb\'\xf2\xbc\xc3\xf2F\xa2\xe2\xc6\f\xf3/\xff6>\xd2f\xbb\x1c\"\nqT`\xd0G+&DSHK\x15\x8b\x06\x16\x1a\';\x061\xd4\x03k\xfe\xc0\x93\x04\xd7\x80B;\x02\r%{VTC\xe1\xae\xbe\xd3w\xe1\xaf', 0x7) r1 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_80211(r1, 0x8933, &(0x7f00000000c0)={'wlan1\x00'}) r2 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_STRSET_GET(0xffffffffffffffff, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000080)={0xc0, r2, 0x1, 0x0, 0x0, {}, [@ETHTOOL_A_STRSET_STRINGSETS={0x10, 0x2, 0x0, 0x1, [{0xc, 0x1, 0x0, 0x1, [@ETHTOOL_A_STRINGSET_ID={0x8}]}]}, @ETHTOOL_A_STRSET_HEADER={0x24, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}]}, @ETHTOOL_A_STRSET_HEADER={0x28, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth0_vlan\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8}, @ETHTOOL_A_HEADER_FLAGS={0x8}]}, @ETHTOOL_A_STRSET_STRINGSETS={0x50, 0x2, 0x0, 0x1, [{0x2c, 0x1, 0x0, 0x1, [@ETHTOOL_A_STRINGSET_ID={0x8}, @ETHTOOL_A_STRINGSET_ID={0x8}, @ETHTOOL_A_STRINGSET_ID={0x8}, @ETHTOOL_A_STRINGSET_ID={0x8}, @ETHTOOL_A_STRINGSET_ID={0x8}]}, {0x14, 0x1, 0x0, 0x1, [@ETHTOOL_A_STRINGSET_ID={0x8}, @ETHTOOL_A_STRINGSET_ID={0x8}]}, {0xc, 0x1, 0x0, 0x1, [@ETHTOOL_A_STRINGSET_ID={0x8}]}]}]}, 0xc0}}, 0x0) sendmsg$ETHTOOL_MSG_PAUSE_SET(r1, &(0x7f0000000240)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000200)={&(0x7f00000001c0)={0x1c, r2, 0x800, 0x70bd25, 0x25dfdbfe, {}, [@ETHTOOL_A_PAUSE_RX={0x5}]}, 0x1c}, 0x1, 0x0, 0x0, 0x4004004}, 0x8004) r3 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r4 = socket$nl_audit(0x10, 0x3, 0x9) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f0000000040)={'wlan1\x00', 0x0}) sendmsg$inet(r3, &(0x7f0000000780)={&(0x7f0000000000)={0x2, 0x0, @local}, 0x10, &(0x7f00000003c0)=[{&(0x7f0000000300)="6fb9", 0xffeb}], 0x1, &(0x7f0000000700)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {r5, @remote, @broadcast}}}], 0x20}, 0x0) r6 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r7 = socket$nl_audit(0x10, 0x3, 0x9) ioctl$sock_SIOCGIFINDEX(r7, 0x8933, &(0x7f0000000040)={'wlan1\x00', 0x0}) sendmsg$inet(r6, &(0x7f0000000780)={&(0x7f0000000000)={0x2, 0x0, @local}, 0x10, &(0x7f00000003c0)=[{&(0x7f0000000300)="6fb9", 0xffeb}], 0x1, &(0x7f0000000700)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {r8, @remote, @broadcast}}}], 0x20}, 0x0) sendmsg$BATADV_CMD_GET_TRANSTABLE_LOCAL(r1, &(0x7f0000000140)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f0000000100)={&(0x7f0000000080)=ANY=[@ANYBLOB='\\\x00\x00\x00', @ANYRES16=0x0, @ANYBLOB="009f5b669e97f68af92506000000050037000100000008000300", @ANYRES32=r5, @ANYBLOB="080031000900000008002c002b0b000005002f000100000008003400ff03000008000300", @ANYRES32=r8, @ANYBLOB="080039000400000005002d0000000000"], 0x5c}, 0x1, 0x0, 0x0, 0x4004080}, 0x20000090) fcntl$addseals(r0, 0x409, 0x0) [ 2156.069276] loop7: detected capacity change from 0 to 2053 [ 2156.122625] EXT4-fs (loop7): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 2156.123945] EXT4-fs (loop7): group descriptors corrupted! [ 2156.127915] loop4: detected capacity change from 0 to 256 [ 2156.155802] loop7: detected capacity change from 0 to 2053 [ 2156.182255] FAT-fs (loop4): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) [ 2156.189261] EXT4-fs (loop7): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 2156.190765] EXT4-fs (loop7): group descriptors corrupted! 06:10:40 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="200005000002000019000000900100000f000000000000000100000005000000000004000040000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000001000018000000c28500002b02", 0x66, 0x400}, {&(0x7f0000010100)="000000000000000000000000e8f7d2e8feeb4bf889ba053b02420ff8010040", 0x1f, 0x4e0}], 0x0, &(0x7f0000000140)=ANY=[]) 06:10:40 executing program 6: ioctl$AUTOFS_DEV_IOCTL_CLOSEMOUNT(0xffffffffffffffff, 0xc0189375, 0x0) r0 = openat$full(0xffffffffffffff9c, &(0x7f0000000000), 0x400, 0x0) ioctl$AUTOFS_DEV_IOCTL_CLOSEMOUNT(r0, 0xc0189375, &(0x7f0000000080)={{0x1, 0x1, 0x18, r0}, './file0\x00'}) syz_genetlink_get_family_id$ethtool(&(0x7f0000000040), r1) write$binfmt_aout(r0, &(0x7f0000000640)={{0x10b, 0xe7, 0x2, 0x24e, 0x1fc, 0x1, 0x251, 0x1}, "f7cefe6caa38e5bd8246485743014122eb0a7c0d0004452800a7dc494ba747d7f3a1ba0a4b7966044333bd62", ['\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00']}, 0x74c) sendmsg$ETHTOOL_MSG_PAUSE_SET(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x9) memfd_create(&(0x7f0000000400)='B\xdb/\x89\x03l\xdeb\xcb\xb54\xed\xbeLY\xb5Z\xe1\x12S\xf5G\xcc\xf3\xe9\x02h\v\xca(\x96\xe1C\xdf\x1c\xea\x85C\xfb\x10\x13\xfa\x03\x16\xcd\x17\xa2\x80\xa1z\xb4r\x95\xc3@\x9d\xa6\xf1\x92#}g\xd3`\xf7\xcez\xcb\xb3\x1a\xbb\xc48e\x8e\xb1&\xd1\x8a\xe6!\x7f\x8d\xea,qx\xa28\xbf\"\xc7e\x06L\xb06\xeb<$\xd7\xba\xe5\x01\x03\x94r\xab\xd4J\x03s\xaf\xf6A\xbfV\xfa\x1ew\x8d\xbf\x99I\x97\xd8\xd2\xe8\x11\xc4\x04\x00\x84\xd5i\xee\xaf\xae[E\x1f\xdd\xd7#rT+\xb621p\xaf[\x99\" 1\xeb\xc7)\xd2\x1dh\xf2\xd5s\xfd?\fa>\x9f;\xe5r\xe5\xbd\xb0|=\x8eZcPY\xf8\xbd\x13\xaa\x8b\xdf\xbc\x93u\xd5\xb0r\xfb\xde\xe7\xd9k\xe2\xc6\x1b\xf2o@&>\xf2M\xe7\x8c\xeb\xee\xf5\x02~\x85\x14\xf3\xc6v\xf15PE\x8c\xca\x16$\xc2\x01#\xb563\rbq\xbf64\xfaW\x17\xdfa\xe6\xca\x86\xd7\xf8\x81X\x9bg4\xc1\xdam\xcf=Rq6\xb0\xd4D=I\x1a\x0e\xd0\xabz\xe2\x19\x0fM\xad\xdco\xa4\xb2\x8c?\xc1\x10\xf273\xd00\xb3_\xe8\x9a*\xfcL\xea;\xc0\x9a\xdbx!N;\xb5x\t\xa4E\xbe\x93r\x04\xf5\xf0\xf5\x7f\x9a)\xf5\x1b\"\xa1\xd8\x06>\xc9\xe2r\xe9\xbb\xfe\xc0\b\x81\x98\x1c\xe2\xe0?\x8f\xa1\xbel\aN\x83@\xb1\x03)4A\x83\xd6\xcf\xf6\xb5\x82\xb7\x9dA\b$\xa2x\x8a@\xfaj~\xef\x93\xb1/L\x01\xe2\xba|\xf0\x01)PP\xcdl\x06\xfc\x15;qZ\xb1u\xc9\xd0\xd16~JEGm\xe4\x1e@\x9dG\xe4@\xdf\xba\'\x8b\x1cD\xc7\xec\xd1@}tR\xd9P\xf4N\xe3\xd8x\xa0\x91\x17\xc2}\x13\b\xca\t(Z\xa3_\xa1\x90\x15T\xa4\xe7%\x98\xa7\xfb\x8bp/eq\x93\xbf\x1f =|\xf3\xb1\xfcR\xd8\nM,\xcb%@\'\x15\x88\xd8\xad\f\x91|\x95\x8fq+\x98\x81W\xba\x9f\xe0elOt\xbd\by\r\x87\x1c\xba\xbd\x8e+S>\xb8\xe29\x91h^x\xfb`\x00\xdd/\xa6\xb1\x16=\xa1bw\xc5I\xb1\x00'/549, 0x2) 06:10:40 executing program 1: pipe(&(0x7f0000000340)={0xffffffffffffffff}) pread64(r0, &(0x7f0000000440)=""/95, 0x5f, 0x6) execveat(r0, &(0x7f0000000080)='./file0\x00', &(0x7f00000001c0)=[&(0x7f00000000c0)='\x00', &(0x7f0000000180)='\x00'], &(0x7f0000000400)=[&(0x7f0000000200)='/dev/zero\x00', &(0x7f0000000240)='/dev/zero\x00', &(0x7f0000000300)='/dev/zero\x00'], 0x1000) socket$inet(0x2, 0x1, 0x0) perf_event_open(&(0x7f0000000100)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x22420, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ptrace$setopts(0x4200, 0x0, 0x5, 0x100050) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000004c00)={0xc0002100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) gettid() r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000000)='net/udp6\x00') read$hiddev(r2, &(0x7f0000001140)=""/212, 0xd4) fchmodat(r2, &(0x7f00000004c0)='./file0\x00', 0x0) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(r1, 0xc018937c, &(0x7f0000000380)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32=r0, @ANYBLOB="00000000000000002e2f66696cee8816"]) ioctl$TIOCSSOFTCAR(r3, 0x541a, &(0x7f00000003c0)=0x6) waitid$P_PIDFD(0x3, r1, &(0x7f0000000500), 0x2, &(0x7f0000000580)) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(r1, 0xc0189372, &(0x7f0000000040)={{0x1, 0x1, 0x18, r2, {0xffff}}, './file0\x00'}) 06:10:40 executing program 0: pipe(&(0x7f0000000340)={0xffffffffffffffff}) pread64(r0, &(0x7f0000000440)=""/95, 0x5f, 0x6) execveat(r0, &(0x7f0000000080)='./file0\x00', &(0x7f00000001c0)=[&(0x7f00000000c0)='\x00', &(0x7f0000000180)='\x00'], &(0x7f0000000400)=[&(0x7f0000000200)='/dev/zero\x00', &(0x7f0000000240)='/dev/zero\x00', &(0x7f0000000300)='/dev/zero\x00'], 0x1000) socket$inet(0x2, 0x1, 0x0) perf_event_open(&(0x7f0000000100)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x22420, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ptrace$setopts(0x4200, 0x0, 0x5, 0x100050) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000004c00)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) gettid() r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000), 0x380, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000000)='net/udp6\x00') read$hiddev(r2, &(0x7f0000001140)=""/212, 0xd4) fchmodat(r2, &(0x7f00000004c0)='./file0\x00', 0x0) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(r1, 0xc018937c, &(0x7f0000000380)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32=r0, @ANYBLOB="00000000000000002e2f66696cee8816"]) ioctl$TIOCSSOFTCAR(r3, 0x541a, &(0x7f00000003c0)=0x6) waitid$P_PIDFD(0x3, r1, &(0x7f0000000500), 0x2, &(0x7f0000000580)) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(r1, 0xc0189372, &(0x7f0000000040)={{0x1, 0x1, 0x18, r2, {0xffff}}, './file0\x00'}) 06:10:40 executing program 7: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x100b00, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000100000005000000000004000040000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000001000018000000c28500002b02", 0x66, 0x400}, {&(0x7f0000010100)="000000000000000000000000e8f7d2e8feeb4bf889ba053b02420ff8010040", 0x1f, 0x4e0}], 0x0, &(0x7f0000000140)=ANY=[]) 06:10:40 executing program 3: r0 = getpid() ioprio_get$pid(0x2, r0) r1 = getpid() ioprio_get$pid(0x2, r1) syz_mount_image$vfat(0x0, &(0x7f0000000040)='./file1\x00', 0x0, 0x0, &(0x7f00000000c0), 0x2002000, &(0x7f0000000400)=ANY=[@ANYRES16, @ANYBLOB="72e1af808ba473e6f37c85b113d8c4d9e1de4ed2968d2e01108c4795a941d14f6927393c8c3c458dd7454900d48719912efc18d580a8f841234284071012d7d5020eb5d56dc1ba5f1048adac4b928bf6cfd663b4cab43637cb979a9199a0246ec02345161783bc79585902603d7062084f05b744e31fcb4c3e81f3becabb7ad1fa5783f5e5e60ae912102fe8df0536bd074c03bd33742f35c5c44b5c3c9d693114367b7d966e"]) chdir(&(0x7f0000000140)='./file0\x00') ptrace$getenv(0x4201, r0, 0xfff, &(0x7f00000000c0)) openat(0xffffffffffffff9c, &(0x7f0000000000)='./file2\x00', 0x40c2, 0x0) r2 = perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x6}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r4 = fork() perf_event_open(&(0x7f0000000540)={0x4, 0x80, 0xeb, 0x0, 0x20, 0x0, 0x0, 0x2, 0x2820, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, @perf_config_ext={0xdc, 0x40}, 0x40000, 0x3, 0x8, 0x5, 0x6000000000000, 0x4, 0x5, 0x0, 0x3, 0x0, 0x3}, r4, 0x9, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000340)={0x0, 0x80, 0x2, 0x83, 0x1, 0x7, 0x0, 0x1f, 0x9ec17fc7a3e840c7, 0xc, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x9, 0x4, @perf_bp={&(0x7f0000000240), 0x1}, 0x404, 0x7, 0x3, 0x6, 0x800, 0x9, 0x3, 0x0, 0x7ff, 0x0, 0x9}, r4, 0x8, r2, 0x9) fork() setxattr$trusted_overlay_upper(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180), &(0x7f00000001c0)={0x0, 0xfb, 0x7a, 0x0, 0x2, "d54449275cb08faf62df87518e3ce16f", "9a61b461b0c63151b954990036d5e0163ceb48c6a801bb019e9e6fa7196a9372f804b9e9ca3fb3d85d1985d31346bbd5fd02b1c8223bf6388eb75498623e38ff88a99c5ce38698a32306b7d4e4b0fd4b03bfa568df17a42f725c6c33046b38b6e4a713dde1"}, 0x7a, 0x3) socket$nl_audit(0x10, 0x3, 0x9) chroot(&(0x7f0000000080)='./file1\x00') sendmsg$inet(r3, &(0x7f0000000780)={&(0x7f0000000000)={0x2, 0x0, @local}, 0x10, &(0x7f00000003c0)=[{&(0x7f0000000300)="6fb9", 0xffeb}], 0x1, &(0x7f0000000700)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @remote, @broadcast}}}], 0x20}, 0x0) 06:10:40 executing program 4: r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000040), 0xffffffffffffffff) syz_genetlink_get_family_id$ethtool(&(0x7f0000000100), 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_PAUSE_SET(0xffffffffffffffff, &(0x7f0000000440)={0x0, 0x0, 0x0}, 0x0) r2 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000080)='smaps\x00') pread64(r2, &(0x7f00000000c0)=""/98, 0x62, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x7fffffff) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(0xffffffffffffffff, 0xc0189374, &(0x7f0000000240)={{0x1, 0x1, 0x18, r0, {0x8}}, './file0\x00'}) dup3(0xffffffffffffffff, r2, 0x0) r3 = socket$inet_icmp_raw(0x2, 0x3, 0x1) syz_genetlink_get_family_id$ethtool(&(0x7f0000000180), r2) socket$nl_audit(0x10, 0x3, 0x9) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000040)={'wlan1\x00', 0x0}) sendmsg$inet(r3, &(0x7f0000000780)={&(0x7f0000000000)={0x2, 0x0, @local}, 0x10, &(0x7f00000003c0)=[{&(0x7f0000000300)="6fb9", 0xffeb}], 0x1, &(0x7f0000000700)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {r4, @remote, @broadcast}}}], 0x20}, 0x0) r5 = socket$inet_icmp_raw(0x2, 0x3, 0x1) socket$nl_audit(0x10, 0x3, 0x9) sendmsg$inet(r5, &(0x7f0000000780)={&(0x7f0000000000)={0x2, 0x0, @local}, 0x10, &(0x7f00000003c0)=[{&(0x7f0000000300)="6fb9", 0xffeb}], 0x1, &(0x7f0000000700)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @remote, @broadcast}}}], 0x20}, 0x0) sendmsg$ETHTOOL_MSG_LINKINFO_GET(r2, &(0x7f0000000200)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f00000001c0)={&(0x7f0000000340)=ANY=[@ANYBLOB='@\x00\x00\x00', @ANYRES16=r1, @ANYBLOB="000427bd7000ffdbdf25020000002c00018008000100", @ANYRES32=0x0, @ANYBLOB='\b\x00C\x00\x00\x00\x00\x00\b\x00!\x00', @ANYRES32=r4, @ANYBLOB="d5b921cac279671a02c4d90ed2cbc802c00000009852d9e901fb170000", @ANYRES32=0x0, @ANYBLOB], 0x40}, 0x1, 0x0, 0x0, 0x4}, 0xd0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000480), 0x1}, 0x603}, 0x0, 0xffffffefffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000040)=[{&(0x7f0000010000)="601c6d6b646f736689254300080120000400004000f8000020004000030000000000000001", 0x25}, {0x0, 0x0, 0x10000}], 0x0, &(0x7f0000000040)=ANY=[]) 06:10:40 executing program 1: pipe(&(0x7f0000000340)={0xffffffffffffffff}) pread64(r0, &(0x7f0000000440)=""/95, 0x5f, 0x6) execveat(r0, &(0x7f0000000080)='./file0\x00', &(0x7f00000001c0)=[&(0x7f00000000c0)='\x00', &(0x7f0000000180)='\x00'], &(0x7f0000000400)=[&(0x7f0000000200)='/dev/zero\x00', &(0x7f0000000240)='/dev/zero\x00', &(0x7f0000000300)='/dev/zero\x00'], 0x1000) socket$inet(0x2, 0x1, 0x0) perf_event_open(&(0x7f0000000100)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x22420, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ptrace$setopts(0x4200, 0x0, 0x5, 0x100050) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000004c00)={0xc0002100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) gettid() r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000000)='net/udp6\x00') read$hiddev(r2, &(0x7f0000001140)=""/212, 0xd4) fchmodat(r2, &(0x7f00000004c0)='./file0\x00', 0x0) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(r1, 0xc018937c, &(0x7f0000000380)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32=r0, @ANYBLOB="00000000000000002e2f66696cee8816"]) ioctl$TIOCSSOFTCAR(r3, 0x541a, &(0x7f00000003c0)=0x6) waitid$P_PIDFD(0x3, r1, &(0x7f0000000500), 0x2, &(0x7f0000000580)) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(r1, 0xc0189372, &(0x7f0000000040)={{0x1, 0x1, 0x18, r2, {0xffff}}, './file0\x00'}) [ 2156.492777] loop7: detected capacity change from 0 to 2053 06:10:40 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="200006000002000019000000900100000f000000000000000100000005000000000004000040000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000001000018000000c28500002b02", 0x66, 0x400}, {&(0x7f0000010100)="000000000000000000000000e8f7d2e8feeb4bf889ba053b02420ff8010040", 0x1f, 0x4e0}], 0x0, &(0x7f0000000140)=ANY=[]) [ 2156.514756] EXT4-fs (loop7): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 2156.516064] EXT4-fs (loop7): group descriptors corrupted! [ 2156.522255] loop4: detected capacity change from 0 to 256 06:10:40 executing program 6: ioctl$AUTOFS_DEV_IOCTL_CLOSEMOUNT(0xffffffffffffffff, 0xc0189375, 0x0) syz_genetlink_get_family_id$ethtool(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_PAUSE_SET(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x5, 0x0, 0x0, 0x0, 0x4, 0x400, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext={0x1a, 0x7fffffff}, 0x0, 0x0, 0x495, 0x0, 0x0, 0x0, 0x0, 0x0, 0x938, 0x0, 0xfffffffffffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = memfd_create(&(0x7f0000000400)='B\xdb/\x89\x03l\xdeb\xcb\xb54\xed\xbeLY\xb5Z\xe1\x12S\xf5G\xcc\xf3\xe9\x02h\v\xca(\x96\xe1C\xdf\x1c\xea\x85C\xfb\x10\x13\xfa\x03\x16\xcd\x17\xa2\x80\xa1z\xb4r\x95\xc3@\x9d\xa6\xf1\x92#}g\xd3`\xf7\xcez\xcb\xb3\x1a\xbb\xc48e\x8e\xb1&\xd1\x8a\xe6!\x7f\x8d\xea,qx\xa28\xbf\"\xc7e\x06L\xb06\xeb<$\xd7\xba\xe5\x01\x03\x94r\xab\xd4J\x03s\xaf\xf6A\xbfV\xfa\x1ew\x8d\xbf\x99I\x97\xd8\xd2\xe8\x11\xc4\x04\x00\x84\xd5i\xee\xaf\xae[E\x1f\xdd\xd7#rT+\xb621p\xaf[\x99\" 1\xeb\xc7)\xd2\x1dh\xf2\xd5s\xfd?\fa>\x9f;\xe5r\xe5\xbd\xb0|=\x8eZcPY\xf8\xbd\x13\xaa\x8b\xdf\xbc\x93u\xd5\xb0r\xfb\xde\xe7\xd9k\xe2\xc6\x1b\xf2o@&>\xf2M\xe7\x8c\xeb\xee\xf5\x02~\x85\x14\xf3\xc6v\xf15PE\x8c\xca\x16$\xc2\x01#\xb563\rbq\xbf64\xfaW\x17\xdfa\xe6\xca\x86\xd7\xf8\x81X\x9bg4\xc1\xdam\xcf=Rq6\xb0\xd4D=I\x1a\x0e\xd0\xabz\xe2\x19\x0fM\xad\xdco\xa4\xb2\x8c?\xc1\x10\xf273\xd00\xb3_\xe8\x9a*\xfcL\xea;\xc0\x9a\xdbx!N;\xb5x\t\xa4E\xbe\x93r\x04\xf5\xf0\xf5\x7f\x9a)\xf5\x1b\"\xa1\xd8\x06>\xc9\xe2r\xe9\xbb\xfe\xc0\b\x81\x98\x1c\xe2\xe0?\x8f\xa1\xbel\aN\x83@\xb1\x03)4A\x83\xd6\xcf\xf6\xb5\x82\xb7\x9dA\b$\xa2x\x8a@\xfaj~\xef\x93\xb1/L\x01\xe2\xba|\xf0\x01)PP\xcdl\x06\xfc\x15;qZ\xb1u\xc9\xd0\xd16~JEGm\xe4\x1e@\x9dG\xe4@\xdf\xba\'\x8b\x1cD\xc7\xec\xd1@}tR\xd9P\xf4N\xe3\xd8x\xa0\x91\x17\xc2}\x13\b\xca\t(Z\xa3_\xa1\x90\x15T\xa4\xe7%\x98\xa7\xfb\x8bp/eq\x93\xbf\x1f =|\xf3\xb1\xfcR\xd8\nM,\xcb%@\'\x15\x88\xd8\xad\f\x91|\x95\x8fq+\x98\x81W\xba\x9f\xe0elOt\xbd\by\r\x87\x1c\xba\xbd\x8e+S>\xb8\xe29\x91h^x\xfb`\x00\xdd/\xa6\xb1\x16=\xa1bw\xc5I\xb1\x00'/549, 0x2) fcntl$addseals(r0, 0x409, 0x0) [ 2156.568335] FAT-fs (loop4): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) 06:10:59 executing program 0: pipe(&(0x7f0000000340)={0xffffffffffffffff}) pread64(r0, &(0x7f0000000440)=""/95, 0x5f, 0x6) execveat(r0, &(0x7f0000000080)='./file0\x00', &(0x7f00000001c0)=[&(0x7f00000000c0)='\x00', &(0x7f0000000180)='\x00'], &(0x7f0000000400)=[&(0x7f0000000200)='/dev/zero\x00', &(0x7f0000000240)='/dev/zero\x00', &(0x7f0000000300)='/dev/zero\x00'], 0x1000) socket$inet(0x2, 0x1, 0x0) perf_event_open(&(0x7f0000000100)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x22420, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ptrace$setopts(0x4200, 0x0, 0x5, 0x100050) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000004c00)={0xc0002100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) gettid() r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000000)='net/udp6\x00') read$hiddev(r2, &(0x7f0000001140)=""/212, 0xd4) fchmodat(r2, &(0x7f00000004c0)='./file0\x00', 0x0) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(r1, 0xc018937c, &(0x7f0000000380)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32=r0, @ANYBLOB="00000000000000002e2f66696cee8816"]) ioctl$TIOCSSOFTCAR(r3, 0x541a, &(0x7f00000003c0)=0x6) waitid$P_PIDFD(0x3, r1, &(0x7f0000000500), 0x2, &(0x7f0000000580)) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(r1, 0xc0189372, &(0x7f0000000040)={{0x1, 0x1, 0x18, r2, {0xffff}}, './file0\x00'}) 06:10:59 executing program 4: r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000040), 0xffffffffffffffff) syz_genetlink_get_family_id$ethtool(&(0x7f0000000100), 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_PAUSE_SET(0xffffffffffffffff, &(0x7f0000000440)={0x0, 0x0, 0x0}, 0x0) r2 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000080)='smaps\x00') pread64(r2, &(0x7f00000000c0)=""/98, 0x62, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x7fffffff) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(0xffffffffffffffff, 0xc0189374, &(0x7f0000000240)={{0x1, 0x1, 0x18, r0, {0x8}}, './file0\x00'}) dup3(0xffffffffffffffff, r2, 0x0) r3 = socket$inet_icmp_raw(0x2, 0x3, 0x1) syz_genetlink_get_family_id$ethtool(&(0x7f0000000180), r2) socket$nl_audit(0x10, 0x3, 0x9) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000040)={'wlan1\x00', 0x0}) sendmsg$inet(r3, &(0x7f0000000780)={&(0x7f0000000000)={0x2, 0x0, @local}, 0x10, &(0x7f00000003c0)=[{&(0x7f0000000300)="6fb9", 0xffeb}], 0x1, &(0x7f0000000700)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {r4, @remote, @broadcast}}}], 0x20}, 0x0) r5 = socket$inet_icmp_raw(0x2, 0x3, 0x1) socket$nl_audit(0x10, 0x3, 0x9) sendmsg$inet(r5, &(0x7f0000000780)={&(0x7f0000000000)={0x2, 0x0, @local}, 0x10, &(0x7f00000003c0)=[{&(0x7f0000000300)="6fb9", 0xffeb}], 0x1, &(0x7f0000000700)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @remote, @broadcast}}}], 0x20}, 0x0) sendmsg$ETHTOOL_MSG_LINKINFO_GET(r2, &(0x7f0000000200)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f00000001c0)={&(0x7f0000000340)=ANY=[@ANYBLOB='@\x00\x00\x00', @ANYRES16=r1, @ANYBLOB="000427bd7000ffdbdf25020000002c00018008000100", @ANYRES32=0x0, @ANYBLOB='\b\x00C\x00\x00\x00\x00\x00\b\x00!\x00', @ANYRES32=r4, @ANYBLOB="d5b921cac279671a02c4d90ed2cbc802c00000009852d9e901fb1700000000", @ANYRES32=0x0, @ANYBLOB], 0x40}, 0x1, 0x0, 0x0, 0x4}, 0xd0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000480), 0x1}, 0x603}, 0x0, 0xffffffefffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000040)=[{&(0x7f0000010000)="601c6d6b646f736689254300080120000400004000f8000020004000030000000000000001", 0x25}, {0x0, 0x0, 0x10000}], 0x0, &(0x7f0000000040)=ANY=[]) 06:10:59 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x100000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="050000000002000019000000900100000f000000000000000100000005000000000004000040000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000001000018000000c28500002b02", 0x66, 0x400}, {&(0x7f0000010100)="000000000000000000000000e8f7d2e8feeb4bf889ba053b02420ff8010040", 0x1f, 0x4e0}], 0x0, &(0x7f0000000140)=ANY=[]) 06:10:59 executing program 1: pipe(&(0x7f0000000340)={0xffffffffffffffff}) pread64(r0, &(0x7f0000000440)=""/95, 0x5f, 0x6) execveat(r0, &(0x7f0000000080)='./file0\x00', &(0x7f00000001c0)=[&(0x7f00000000c0)='\x00', &(0x7f0000000180)='\x00'], &(0x7f0000000400)=[&(0x7f0000000200)='/dev/zero\x00', &(0x7f0000000240)='/dev/zero\x00', &(0x7f0000000300)='/dev/zero\x00'], 0x1000) socket$inet(0x2, 0x1, 0x0) perf_event_open(&(0x7f0000000100)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x22420, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ptrace$setopts(0x4200, 0x0, 0x5, 0x100050) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000004c00)={0xc0002100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) gettid() r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000000)='net/udp6\x00') read$hiddev(r2, &(0x7f0000001140)=""/212, 0xd4) fchmodat(r2, &(0x7f00000004c0)='./file0\x00', 0x0) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(r1, 0xc018937c, &(0x7f0000000380)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32=r0, @ANYBLOB="00000000000000002e2f66696cee8816"]) ioctl$TIOCSSOFTCAR(r3, 0x541a, &(0x7f00000003c0)=0x6) waitid$P_PIDFD(0x3, r1, &(0x7f0000000500), 0x2, &(0x7f0000000580)) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(r1, 0xc0189372, &(0x7f0000000040)={{0x1, 0x1, 0x18, r2, {0xffff}}, './file0\x00'}) 06:10:59 executing program 3: r0 = getpid() ioprio_get$pid(0x2, r0) r1 = getpid() ioprio_get$pid(0x2, r1) syz_mount_image$vfat(0x0, &(0x7f0000000040)='./file1\x00', 0x0, 0x0, &(0x7f00000000c0), 0x2002000, &(0x7f0000000400)=ANY=[@ANYRES16, @ANYBLOB="72e1af808ba473e6f37c85b113d8c4d9e1de4ed2968d2e01108c4795a941d14f6927393c8c3c458dd7454900d48719912efc18d580a8f841234284071012d7d5020eb5d56dc1ba5f1048adac4b928bf6cfd663b4cab43637cb979a9199a0246ec02345161783bc79585902603d7062084f05b744e31fcb4c3e81f3becabb7ad1fa5783f5e5e60ae912102fe8df0536bd074c03bd33742f35c5c44b5c3c9d693114367b7d966e"]) chdir(&(0x7f0000000140)='./file0\x00') ptrace$getenv(0x4201, r0, 0xfff, &(0x7f00000000c0)) openat(0xffffffffffffff9c, &(0x7f0000000000)='./file2\x00', 0x40c2, 0x0) r2 = perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x6}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r4 = fork() perf_event_open(&(0x7f0000000540)={0x4, 0x80, 0xeb, 0x0, 0x20, 0x0, 0x0, 0x2, 0x2820, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, @perf_config_ext={0xdc, 0x40}, 0x40000, 0x3, 0x8, 0x5, 0x6000000000000, 0x4, 0x5, 0x0, 0x3, 0x0, 0x3}, r4, 0x9, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000340)={0x0, 0x80, 0x2, 0x83, 0x1, 0x7, 0x0, 0x1f, 0x9ec17fc7a3e840c7, 0xc, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x9, 0x4, @perf_bp={&(0x7f0000000240), 0x1}, 0x404, 0x7, 0x3, 0x6, 0x800, 0x9, 0x3, 0x0, 0x7ff, 0x0, 0x9}, r4, 0x8, r2, 0x9) fork() setxattr$trusted_overlay_upper(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180), &(0x7f00000001c0)={0x0, 0xfb, 0x7a, 0x0, 0x2, "d54449275cb08faf62df87518e3ce16f", "9a61b461b0c63151b954990036d5e0163ceb48c6a801bb019e9e6fa7196a9372f804b9e9ca3fb3d85d1985d31346bbd5fd02b1c8223bf6388eb75498623e38ff88a99c5ce38698a32306b7d4e4b0fd4b03bfa568df17a42f725c6c33046b38b6e4a713dde1"}, 0x7a, 0x3) socket$nl_audit(0x10, 0x3, 0x9) chroot(&(0x7f0000000080)='./file1\x00') sendmsg$inet(r3, &(0x7f0000000780)={&(0x7f0000000000)={0x2, 0x0, @local}, 0x10, &(0x7f00000003c0)=[{&(0x7f0000000300)="6fb9", 0xffeb}], 0x1, &(0x7f0000000700)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @remote, @broadcast}}}], 0x20}, 0x0) 06:10:59 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="200007000002000019000000900100000f000000000000000100000005000000000004000040000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000001000018000000c28500002b02", 0x66, 0x400}, {&(0x7f0000010100)="000000000000000000000000e8f7d2e8feeb4bf889ba053b02420ff8010040", 0x1f, 0x4e0}], 0x0, &(0x7f0000000140)=ANY=[]) 06:10:59 executing program 6: ioctl$AUTOFS_DEV_IOCTL_CLOSEMOUNT(0xffffffffffffffff, 0xc0189375, 0x0) syz_genetlink_get_family_id$ethtool(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_PAUSE_SET(0xffffffffffffffff, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = memfd_create(&(0x7f0000000400)='B\xdb/\x89\x03l\xdeb\xcb\xb54\xed\xbeLY\xb5Z\xe1\x12S\xf5G\xcc\xf3\xe9\x02h\v\xca(\x96\xe1C\xdf\x1c\xea\x85C\xfb\x10\x13\xfa\x03\x16\xcd\x17\xa2\x80\xa1z\xb4r\x95\xc3@\x9d\xa6\xf1\x92#}g\xd3`\xf7\xcez\xcb\xb3\x1a\xbb\xc48e\x8e\xb1&\xd1\x8a\xe6!\x7f\x8d\xea,qx\xa28\xbf\"\xc7e\x06L\xb06\xeb<$\xd7\xba\xe5\x01\x03\x94r\xab\xd4J\x03s\xaf\xf6A\xbfV\xfa\x1ew\x8d\xbf\x99I\x97\xd8\xd2\xe8\x11\xc4\x04\x00\x84\xd5i\xee\xaf\xae[E\x1f\xdd\xd7#rT+\xb621p\xaf[\x99\" 1\xeb\xc7)\xd2\x1dh\xf2\xd5s\xfd?\fa>\x9f;\xe5r\xe5\xbd\xb0|=\x8eZcPY\xf8\xbd\x13\xaa\x8b\xdf\xbc\x93u\xd5\xb0r\xfb\xde\xe7\xd9k\xe2\xc6\x1b\xf2o@&>\xf2M\xe7\x8c\xeb\xee\xf5\x02~\x85\x14\xf3\xc6v\xf15PE\x8c\xca\x16$\xc2\x01#\xb563\rbq\xbf64\xfaW\x17\xdfa\xe6\xca\x86\xd7\xf8\x81X\x9bg4\xc1\xdam\xcf=Rq6\xb0\xd4D=I\x1a\x0e\xd0\xabz\xe2\x19\x0fM\xad\xdco\xa4\xb2\x8c?\xc1\x10\xf273\xd00\xb3_\xe8\x9a*\xfcL\xea;\xc0\x9a\xdbx!N;\xb5x\t\xa4E\xbe\x93r\x04\xf5\xf0\xf5\x7f\x9a)\xf5\x1b\"\xa1\xd8\x06>\xc9\xe2r\xe9\xbb\xfe\xc0\b\x81\x98\x1c\xe2\xe0?\x8f\xa1\xbel\aN\x83@\xb1\x03)4A\x83\xd6\xcf\xf6\xb5\x82\xb7\x9dA\b$\xa2x\x8a@\xfaj~\xef\x93\xb1/L\x01\xe2\xba|\xf0\x01)PP\xcdl\x06\xfc\x15;qZ\xb1u\xc9\xd0\xd16~JEGm\xe4\x1e@\x9dG\xe4@\xdf\xba\'\x8b\x1cD\xc7\xec\xd1@}tR\xd9P\xf4N\xe3\xd8x\xa0\x91\x17\xc2}\x13\b\xca\t(Z\xa3_\xa1\x90\x15T\xa4\xe7%\x98\xa7\xfb\x8bp/eq\x93\xbf\x1f =|\xf3\xb1\xfcR\xd8\nM,\xcb%@\'\x15\x88\xd8\xad\f\x91|\x95\x8fq+\x98\x81W\xba\x9f\xe0elOt\xbd\by\r\x87\x1c\xba\xbd\x8e+S>\xb8\xe29\x91h^x\xfb`\x00\xdd/\xa6\xb1\x16=\xa1bw\xc5I\xb1\x00'/549, 0x2) dup(r1) fcntl$addseals(0xffffffffffffffff, 0x409, 0x2) ioctl$VFAT_IOCTL_READDIR_BOTH(r0, 0x82307201, &(0x7f0000000640)=[{0x0, 0x0, 0x100}, {0x0, 0x0, 0x100}]) 06:10:59 executing program 7: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x100bd0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000100000005000000000004000040000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000001000018000000c28500002b02", 0x66, 0x400}, {&(0x7f0000010100)="000000000000000000000000e8f7d2e8feeb4bf889ba053b02420ff8010040", 0x1f, 0x4e0}], 0x0, &(0x7f0000000140)=ANY=[]) [ 2175.427961] loop5: detected capacity change from 0 to 2048 [ 2175.452228] EXT4-fs (loop5): inodes count not valid: 5 vs 32 [ 2175.454726] loop7: detected capacity change from 0 to 2053 [ 2175.476714] loop5: detected capacity change from 0 to 2048 [ 2175.481880] EXT4-fs (loop7): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 2175.483332] EXT4-fs (loop7): group descriptors corrupted! [ 2175.495995] EXT4-fs (loop5): inodes count not valid: 5 vs 32 [ 2175.506358] loop4: detected capacity change from 0 to 256 [ 2175.515849] loop7: detected capacity change from 0 to 2053 [ 2175.536697] EXT4-fs (loop7): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 2175.537995] EXT4-fs (loop7): group descriptors corrupted! [ 2175.553272] FAT-fs (loop4): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) 06:10:59 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="200008000002000019000000900100000f000000000000000100000005000000000004000040000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000001000018000000c28500002b02", 0x66, 0x400}, {&(0x7f0000010100)="000000000000000000000000e8f7d2e8feeb4bf889ba053b02420ff8010040", 0x1f, 0x4e0}], 0x0, &(0x7f0000000140)=ANY=[]) 06:10:59 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x100000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="060000000002000019000000900100000f000000000000000100000005000000000004000040000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000001000018000000c28500002b02", 0x66, 0x400}, {&(0x7f0000010100)="000000000000000000000000e8f7d2e8feeb4bf889ba053b02420ff8010040", 0x1f, 0x4e0}], 0x0, &(0x7f0000000140)=ANY=[]) 06:10:59 executing program 6: ioctl$AUTOFS_DEV_IOCTL_CLOSEMOUNT(0xffffffffffffffff, 0xc0189375, 0x0) r0 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_PAUSE_SET(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000000), 0xa000, 0x0) r2 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r3 = socket$nl_audit(0x10, 0x3, 0x9) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000000040)={'wlan1\x00', 0x0}) sendmsg$inet(r2, &(0x7f0000000780)={&(0x7f0000000000)={0x2, 0x0, @local}, 0x10, &(0x7f00000003c0)=[{&(0x7f0000000300)="6fb9", 0xffeb}], 0x1, &(0x7f0000000700)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {r4, @remote, @broadcast}}}], 0x20}, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000003400)=[{{&(0x7f0000000100)=@can={0x1d, 0x0}, 0x80, &(0x7f0000000300)=[{&(0x7f0000000180)=""/232, 0xe8}], 0x1}, 0x1}, {{&(0x7f0000000340)=@ieee802154={0x24, @short}, 0x80, &(0x7f0000000a00)=[{&(0x7f0000000640)=""/95, 0x5f}, {&(0x7f00000006c0)=""/199, 0xc7}, {&(0x7f00000007c0)=""/120, 0x78}, {&(0x7f0000000840)=""/139, 0x8b}, {&(0x7f0000000900)=""/227, 0xe3}], 0x5, &(0x7f0000000a80)=""/92, 0x5c}, 0x9}, {{&(0x7f0000000b00)=@isdn, 0x80, &(0x7f0000001ec0)=[{&(0x7f0000000b80)=""/117, 0x75}, {&(0x7f0000000c00)=""/4096, 0x1000}, {&(0x7f0000001c00)=""/185, 0xb9}, {&(0x7f00000003c0)=""/27, 0x1b}, {&(0x7f0000001cc0)=""/237, 0xed}, {&(0x7f0000001dc0)=""/212, 0xd4}], 0x6, &(0x7f0000001f40)=""/89, 0x59}, 0x6}, {{&(0x7f0000001fc0)=@nfc, 0x80, &(0x7f0000003380)=[{&(0x7f0000002040)=""/141, 0x8d}, {&(0x7f0000002100)=""/212, 0xd4}, {&(0x7f0000002200)=""/228, 0xe4}, {&(0x7f0000002300)=""/4096, 0x1000}, {&(0x7f0000003300)=""/115, 0x73}], 0x5}, 0x1}], 0x4, 0x10062, &(0x7f0000003500)) r6 = socket$nl_route(0x10, 0x3, 0x0) setsockopt$netlink_NETLINK_CAP_ACK(r6, 0x10e, 0xa, &(0x7f00000000c0), 0x4) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(0xffffffffffffffff, 0x89f0, &(0x7f0000003940)={'tunl0\x00', &(0x7f00000038c0)={'gretap0\x00', 0x0, 0x17, 0x8000, 0x9, 0x800, {{0x13, 0x4, 0x1, 0x8, 0x4c, 0x65, 0x0, 0x7f, 0x2f, 0x0, @local, @multicast1, {[@rr={0x7, 0xf, 0x2b, [@rand_addr=0x64010100, @rand_addr=0x64010101, @private=0xa010102]}, @ra={0x94, 0x4}, @end, @ra={0x94, 0x4}, @generic={0x44, 0x10, "86f7be7fa6512f83629c91af6c92"}, @generic={0x88, 0x4, "d759"}, @ssrr={0x89, 0xb, 0xbe, [@loopback, @broadcast]}]}}}}}) recvmmsg(0xffffffffffffffff, &(0x7f0000008b00)=[{{&(0x7f0000003980)=@nfc, 0x80, &(0x7f0000003a80)=[{&(0x7f0000003a00)=""/46, 0x2e}, {&(0x7f0000003a40)=""/32, 0x20}], 0x2, &(0x7f0000003ac0)=""/192, 0xc0}, 0x10100}, {{&(0x7f0000003b80)=@ethernet={0x0, @local}, 0x80, &(0x7f0000005040)=[{&(0x7f0000003c00)=""/149, 0x95}, {&(0x7f0000003cc0)=""/187, 0xbb}, {&(0x7f0000003d80)=""/206, 0xce}, {&(0x7f0000003e80)=""/60, 0x3c}, {&(0x7f0000003ec0)=""/4096, 0x1000}, {&(0x7f0000004ec0)=""/120, 0x78}, {&(0x7f0000004f40)=""/144, 0x90}, {&(0x7f0000005000)}], 0x8}, 0x8}, {{&(0x7f00000050c0)=@ethernet={0x0, @multicast}, 0x80, &(0x7f0000006340)=[{&(0x7f0000005140)=""/34, 0x22}, {&(0x7f0000005180)=""/4096, 0x1000}, {&(0x7f0000006180)=""/73, 0x49}, {&(0x7f0000006200)=""/221, 0xdd}, {&(0x7f0000006300)=""/62, 0x3e}], 0x5, &(0x7f00000063c0)=""/57, 0x39}, 0x3}, {{0x0, 0x0, &(0x7f0000006740)=[{&(0x7f0000006400)=""/254, 0xfe}, {&(0x7f0000006500)=""/203, 0xcb}, {&(0x7f0000006600)=""/82, 0x52}, {&(0x7f0000006680)=""/179, 0xb3}], 0x4, &(0x7f0000006780)=""/221, 0xdd}, 0x2}, {{&(0x7f0000006880)=@xdp, 0x80, &(0x7f0000006a40)=[{&(0x7f0000006900)=""/116, 0x74}, {&(0x7f0000006980)=""/174, 0xae}], 0x2, &(0x7f0000006a80)=""/167, 0xa7}, 0x8c}, {{&(0x7f0000006b40)=@qipcrtr, 0x80, &(0x7f0000007d00)=[{&(0x7f0000006bc0)=""/93, 0x5d}, {&(0x7f0000006c40)=""/37, 0x25}, {&(0x7f0000006c80)=""/4096, 0x1000}, {&(0x7f0000007c80)=""/125, 0x7d}], 0x4, &(0x7f0000007d40)=""/153, 0x99}, 0x8}, {{0x0, 0x0, &(0x7f0000008300)=[{&(0x7f0000007e00)=""/197, 0xc5}, {&(0x7f0000007f00)=""/48, 0x30}, {&(0x7f0000007f40)=""/178, 0xb2}, {&(0x7f0000008000)=""/9, 0x9}, {&(0x7f0000008040)=""/56, 0x38}, {&(0x7f0000008080)=""/250, 0xfa}, {&(0x7f0000008180)=""/249, 0xf9}, {&(0x7f0000008280)=""/69, 0x45}], 0x8, &(0x7f0000008380)=""/34, 0x22}, 0x7}, {{&(0x7f00000083c0)=@rc={0x1f, @fixed}, 0x80, &(0x7f0000008900)=[{&(0x7f0000008440)=""/223, 0xdf}, {&(0x7f0000008540)=""/170, 0xaa}, {&(0x7f0000008600)=""/203, 0xcb}, {&(0x7f0000008700)=""/109, 0x6d}, {&(0x7f0000008780)=""/31, 0x1f}, {&(0x7f00000087c0)=""/26, 0x1a}, {&(0x7f0000008800)=""/104, 0x68}, {&(0x7f0000008880)=""/77, 0x4d}], 0x8}, 0x3}, {{&(0x7f0000008980)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, 0x80, &(0x7f0000008a40)=[{&(0x7f0000008a00)=""/60, 0x3c}], 0x1, &(0x7f0000008a80)=""/123, 0x7b}, 0x10001}], 0x9, 0x0, 0x0) ioctl$sock_ipv6_tunnel_SIOCDELPRL(0xffffffffffffffff, 0x89f6, &(0x7f0000008dc0)={'ip6tnl0\x00', &(0x7f0000008d40)={'ip6_vti0\x00', 0x0, 0x4, 0x5, 0xfd, 0x7ff, 0x0, @empty, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}, 0x1, 0x80, 0x9, 0x1}}) sendmsg$ETHTOOL_MSG_LINKINFO_GET(r1, &(0x7f0000009000)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000008fc0)={&(0x7f0000008e00)={0x188, r0, 0x10, 0x70bd28, 0x25dfdbfe, {}, [@HEADER={0x2c, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x3}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r4}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}]}, @HEADER={0x14, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8}, @ETHTOOL_A_HEADER_FLAGS={0x8}]}, @HEADER={0x14, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r5}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}]}, @HEADER={0x6c, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'ip_vti0\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'syzkaller1\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x3}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth1_to_hsr\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'vlan1\x00'}]}, @HEADER={0x14, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r7}]}, @HEADER={0x3c, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'bridge_slave_0\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'wlan1\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r8}]}, @HEADER={0x48, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'sit0\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'wlan1\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8}]}, @HEADER={0x1c, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r9}, @ETHTOOL_A_HEADER_FLAGS={0x8}, @ETHTOOL_A_HEADER_FLAGS={0x8}]}]}, 0x188}, 0x1, 0x0, 0x0, 0x8080}, 0xc045) r10 = memfd_create(&(0x7f0000000400)='B\xdb/\x89\x03l\xdeb\xcb\xb54\xed\xbeLY\xb5Z\xe1\x12S\xf5G\xcc\xf3\xe9\x02h\v\xca(\x96\xe1C\xdf\x1c\xea\x85C\xfb\x10\x13\xfa\x03\x16\xcd\x17\xa2\x80\xa1z\xb4r\x95\xc3@\x9d\xa6\xf1\x92#}g\xd3`\xf7\xcez\xcb\xb3\x1a\xbb\xc48e\x8e\xb1&\xd1\x8a\xe6!\x7f\x8d\xea,qx\xa28\xbf\"\xc7e\x06L\xb06\xeb<$\xd7\xba\xe5\x01\x03\x94r\xab\xd4J\x03s\xaf\xf6A\xbfV\xfa\x1ew\x8d\xbf\x99I\x97\xd8\xd2\xe8\x11\xc4\x04\x00\x84\xd5i\xee\xaf\xae[E\x1f\xdd\xd7#rT+\xb621p\xaf[\x99\" 1\xeb\xc7)\xd2\x1dh\xf2\xd5s\xfd?\fa>\x9f;\xe5r\xe5\xbd\xb0|=\x8eZcPY\xf8\xbd\x13\xaa\x8b\xdf\xbc\x93u\xd5\xb0r\xfb\xde\xe7\xd9k\xe2\xc6\x1b\xf2o@&>\xf2M\xe7\x8c\xeb\xee\xf5\x02~\x85\x14\xf3\xc6v\xf15PE\x8c\xca\x16$\xc2\x01#\xb563\rbq\xbf64\xfaW\x17\xdfa\xe6\xca\x86\xd7\xf8\x81X\x9bg4\xc1\xdam\xcf=Rq6\xb0\xd4D=I\x1a\x0e\xd0\xabz\xe2\x19\x0fM\xad\xdco\xa4\xb2\x8c?\xc1\x10\xf273\xd00\xb3_\xe8\x9a*\xfcL\xea;\xc0\x9a\xdbx!N;\xb5x\t\xa4E\xbe\x93r\x04\xf5\xf0\xf5\x7f\x9a)\xf5\x1b\"\xa1\xd8\x06>\xc9\xe2r\xe9\xbb\xfe\xc0\b\x81\x98\x1c\xe2\xe0?\x8f\xa1\xbel\aN\x83@\xb1\x03)4A\x83\xd6\xcf\xf6\xb5\x82\xb7\x9dA\b$\xa2x\x8a@\xfaj~\xef\x93\xb1/L\x01\xe2\xba|\xf0\x01)PP\xcdl\x06\xfc\x15;qZ\xb1u\xc9\xd0\xd16~JEGm\xe4\x1e@\x9dG\xe4@\xdf\xba\'\x8b\x1cD\xc7\xec\xd1@}tR\xd9P\xf4N\xe3\xd8x\xa0\x91\x17\xc2}\x13\b\xca\t(Z\xa3_\xa1\x90\x15T\xa4\xe7%\x98\xa7\xfb\x8bp/eq\x93\xbf\x1f =|\xf3\xb1\xfcR\xd8\nM,\xcb%@\'\x15\x88\xd8\xad\f\x91|\x95\x8fq+\x98\x81W\xba\x9f\xe0elOt\xbd\by\r\x87\x1c\xba\xbd\x8e+S>\xb8\xe29\x91h^x\xfb`\x00\xdd/\xa6\xb1\x16=\xa1bw\xc5I\xb1\x00'/549, 0x2) fcntl$addseals(r10, 0x409, 0x0) 06:10:59 executing program 7: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x100bd1, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000100000005000000000004000040000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000001000018000000c28500002b02", 0x66, 0x400}, {&(0x7f0000010100)="000000000000000000000000e8f7d2e8feeb4bf889ba053b02420ff8010040", 0x1f, 0x4e0}], 0x0, &(0x7f0000000140)=ANY=[]) 06:11:00 executing program 4: r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000040), 0xffffffffffffffff) syz_genetlink_get_family_id$ethtool(&(0x7f0000000100), 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_PAUSE_SET(0xffffffffffffffff, &(0x7f0000000440)={0x0, 0x0, 0x0}, 0x0) r2 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000080)='smaps\x00') pread64(r2, &(0x7f00000000c0)=""/98, 0x62, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x7fffffff) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(0xffffffffffffffff, 0xc0189374, &(0x7f0000000240)={{0x1, 0x1, 0x18, r0, {0x8}}, './file0\x00'}) dup3(0xffffffffffffffff, r2, 0x0) r3 = socket$inet_icmp_raw(0x2, 0x3, 0x1) syz_genetlink_get_family_id$ethtool(&(0x7f0000000180), r2) socket$nl_audit(0x10, 0x3, 0x9) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000040)={'wlan1\x00', 0x0}) sendmsg$inet(r3, &(0x7f0000000780)={&(0x7f0000000000)={0x2, 0x0, @local}, 0x10, &(0x7f00000003c0)=[{&(0x7f0000000300)="6fb9", 0xffeb}], 0x1, &(0x7f0000000700)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {r4, @remote, @broadcast}}}], 0x20}, 0x0) r5 = socket$inet_icmp_raw(0x2, 0x3, 0x1) socket$nl_audit(0x10, 0x3, 0x9) sendmsg$inet(r5, &(0x7f0000000780)={&(0x7f0000000000)={0x2, 0x0, @local}, 0x10, &(0x7f00000003c0)=[{&(0x7f0000000300)="6fb9", 0xffeb}], 0x1, &(0x7f0000000700)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @remote, @broadcast}}}], 0x20}, 0x0) sendmsg$ETHTOOL_MSG_LINKINFO_GET(r2, &(0x7f0000000200)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f00000001c0)={&(0x7f0000000340)=ANY=[@ANYBLOB='@\x00\x00\x00', @ANYRES16=r1, @ANYBLOB="000427bd7000ffdbdf25020000002c00018008000100", @ANYRES32=0x0, @ANYBLOB='\b\x00C\x00\x00\x00\x00\x00\b\x00!\x00', @ANYRES32=r4, @ANYBLOB="d5b921cac279671a02c4d90ed2cbc802c00000009852d9e901fb1700000000", @ANYRES32=0x0, @ANYBLOB], 0x40}, 0x1, 0x0, 0x0, 0x4}, 0xd0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000480), 0x1}, 0x603}, 0x0, 0xffffffefffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000040)=[{&(0x7f0000010000)="601c6d6b646f736689254300080120000400004000f8000020004000030000000000000001", 0x25}, {0x0, 0x0, 0x10000}], 0x0, &(0x7f0000000040)=ANY=[]) [ 2175.785773] loop5: detected capacity change from 0 to 2048 [ 2175.827999] loop7: detected capacity change from 0 to 2053 [ 2175.830101] EXT4-fs (loop5): inodes count not valid: 6 vs 32 [ 2175.841648] EXT4-fs (loop7): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 2175.842343] EXT4-fs (loop7): group descriptors corrupted! [ 2175.845275] loop5: detected capacity change from 0 to 2048 [ 2175.875759] loop7: detected capacity change from 0 to 2053 [ 2175.877981] EXT4-fs (loop5): inodes count not valid: 6 vs 32 [ 2175.882087] EXT4-fs (loop7): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 2175.882804] EXT4-fs (loop7): group descriptors corrupted! 06:11:00 executing program 1: pipe(&(0x7f0000000340)={0xffffffffffffffff}) pread64(r0, &(0x7f0000000440)=""/95, 0x5f, 0x6) execveat(r0, &(0x7f0000000080)='./file0\x00', &(0x7f00000001c0)=[&(0x7f00000000c0)='\x00', &(0x7f0000000180)='\x00'], &(0x7f0000000400)=[&(0x7f0000000200)='/dev/zero\x00', &(0x7f0000000240)='/dev/zero\x00', &(0x7f0000000300)='/dev/zero\x00'], 0x1000) socket$inet(0x2, 0x1, 0x0) perf_event_open(&(0x7f0000000100)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x22420, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ptrace$setopts(0x4200, 0x0, 0x5, 0x100050) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000004c00)={0xc0002100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) gettid() r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000), 0x380, 0x0) r2 = syz_open_procfs(0x0, 0x0) read$hiddev(r2, &(0x7f0000001140)=""/212, 0xd4) fchmodat(r2, &(0x7f00000004c0)='./file0\x00', 0x0) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(r1, 0xc018937c, &(0x7f0000000380)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32=r0, @ANYBLOB="00000000000000002e2f66696cee8816"]) ioctl$TIOCSSOFTCAR(r3, 0x541a, &(0x7f00000003c0)=0x6) waitid$P_PIDFD(0x3, r1, &(0x7f0000000500), 0x2, &(0x7f0000000580)) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(r1, 0xc0189372, &(0x7f0000000040)={{0x1, 0x1, 0x18, r2, {0xffff}}, './file0\x00'}) 06:11:00 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="200018000002000019000000900100000f000000000000000100000005000000000004000040000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000001000018000000c28500002b02", 0x66, 0x400}, {&(0x7f0000010100)="000000000000000000000000e8f7d2e8feeb4bf889ba053b02420ff8010040", 0x1f, 0x4e0}], 0x0, &(0x7f0000000140)=ANY=[]) [ 2175.968345] loop4: detected capacity change from 0 to 256 [ 2176.028268] FAT-fs (loop4): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) 06:11:16 executing program 3: r0 = getpid() ioprio_get$pid(0x2, r0) r1 = getpid() ioprio_get$pid(0x2, r1) syz_mount_image$vfat(0x0, &(0x7f0000000040)='./file1\x00', 0x0, 0x0, &(0x7f00000000c0), 0x2002000, &(0x7f0000000400)=ANY=[@ANYRES16, @ANYBLOB="72e1af808ba473e6f37c85b113d8c4d9e1de4ed2968d2e01108c4795a941d14f6927393c8c3c458dd7454900d48719912efc18d580a8f841234284071012d7d5020eb5d56dc1ba5f1048adac4b928bf6cfd663b4cab43637cb979a9199a0246ec02345161783bc79585902603d7062084f05b744e31fcb4c3e81f3becabb7ad1fa5783f5e5e60ae912102fe8df0536bd074c03bd33742f35c5c44b5c3c9d693114367b7d966e"]) chdir(&(0x7f0000000140)='./file0\x00') ptrace$getenv(0x4201, r0, 0xfff, &(0x7f00000000c0)) openat(0xffffffffffffff9c, &(0x7f0000000000)='./file2\x00', 0x40c2, 0x0) r2 = perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x6}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r4 = fork() perf_event_open(&(0x7f0000000540)={0x4, 0x80, 0xeb, 0x0, 0x20, 0x0, 0x0, 0x2, 0x2820, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, @perf_config_ext={0xdc, 0x40}, 0x40000, 0x3, 0x8, 0x5, 0x6000000000000, 0x4, 0x5, 0x0, 0x3, 0x0, 0x3}, r4, 0x9, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000340)={0x0, 0x80, 0x2, 0x83, 0x1, 0x7, 0x0, 0x1f, 0x9ec17fc7a3e840c7, 0xc, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x9, 0x4, @perf_bp={&(0x7f0000000240), 0x1}, 0x404, 0x7, 0x3, 0x6, 0x800, 0x9, 0x3, 0x0, 0x7ff, 0x0, 0x9}, r4, 0x8, r2, 0x9) fork() setxattr$trusted_overlay_upper(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180), &(0x7f00000001c0)={0x0, 0xfb, 0x7a, 0x0, 0x2, "d54449275cb08faf62df87518e3ce16f", "9a61b461b0c63151b954990036d5e0163ceb48c6a801bb019e9e6fa7196a9372f804b9e9ca3fb3d85d1985d31346bbd5fd02b1c8223bf6388eb75498623e38ff88a99c5ce38698a32306b7d4e4b0fd4b03bfa568df17a42f725c6c33046b38b6e4a713dde1"}, 0x7a, 0x3) socket$nl_audit(0x10, 0x3, 0x9) chroot(&(0x7f0000000080)='./file1\x00') sendmsg$inet(r3, &(0x7f0000000780)={&(0x7f0000000000)={0x2, 0x0, @local}, 0x10, &(0x7f00000003c0)=[{&(0x7f0000000300)="6fb9", 0xffeb}], 0x1, &(0x7f0000000700)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @remote, @broadcast}}}], 0x20}, 0x0) 06:11:16 executing program 4: r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000040), 0xffffffffffffffff) syz_genetlink_get_family_id$ethtool(&(0x7f0000000100), 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_PAUSE_SET(0xffffffffffffffff, &(0x7f0000000440)={0x0, 0x0, 0x0}, 0x0) r2 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000080)='smaps\x00') pread64(r2, &(0x7f00000000c0)=""/98, 0x62, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x7fffffff) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(0xffffffffffffffff, 0xc0189374, &(0x7f0000000240)={{0x1, 0x1, 0x18, r0, {0x8}}, './file0\x00'}) dup3(0xffffffffffffffff, r2, 0x0) r3 = socket$inet_icmp_raw(0x2, 0x3, 0x1) syz_genetlink_get_family_id$ethtool(&(0x7f0000000180), r2) socket$nl_audit(0x10, 0x3, 0x9) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000040)={'wlan1\x00', 0x0}) sendmsg$inet(r3, &(0x7f0000000780)={&(0x7f0000000000)={0x2, 0x0, @local}, 0x10, &(0x7f00000003c0)=[{&(0x7f0000000300)="6fb9", 0xffeb}], 0x1, &(0x7f0000000700)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {r4, @remote, @broadcast}}}], 0x20}, 0x0) r5 = socket$inet_icmp_raw(0x2, 0x3, 0x1) socket$nl_audit(0x10, 0x3, 0x9) sendmsg$inet(r5, &(0x7f0000000780)={&(0x7f0000000000)={0x2, 0x0, @local}, 0x10, &(0x7f00000003c0)=[{&(0x7f0000000300)="6fb9", 0xffeb}], 0x1, &(0x7f0000000700)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @remote, @broadcast}}}], 0x20}, 0x0) sendmsg$ETHTOOL_MSG_LINKINFO_GET(r2, &(0x7f0000000200)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f00000001c0)={&(0x7f0000000340)=ANY=[@ANYBLOB='@\x00\x00\x00', @ANYRES16=r1, @ANYBLOB="000427bd7000ffdbdf25020000002c00018008000100", @ANYRES32=0x0, @ANYBLOB='\b\x00C\x00\x00\x00\x00\x00\b\x00!\x00', @ANYRES32=r4, @ANYBLOB="d5b921cac279671a02c4d90ed2cbc802c00000009852d9e901fb1700000000", @ANYRES32=0x0, @ANYBLOB], 0x40}, 0x1, 0x0, 0x0, 0x4}, 0xd0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000480), 0x1}, 0x603}, 0x0, 0xffffffefffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000040)=[{&(0x7f0000010000)="601c6d6b646f736689254300080120000400004000f8000020004000030000000000000001", 0x25}, {0x0, 0x0, 0x10000}], 0x0, &(0x7f0000000040)=ANY=[]) 06:11:16 executing program 1: pipe(&(0x7f0000000340)={0xffffffffffffffff}) pread64(r0, &(0x7f0000000440)=""/95, 0x5f, 0x6) execveat(r0, &(0x7f0000000080)='./file0\x00', &(0x7f00000001c0)=[&(0x7f00000000c0)='\x00', &(0x7f0000000180)='\x00'], &(0x7f0000000400)=[&(0x7f0000000200)='/dev/zero\x00', &(0x7f0000000240)='/dev/zero\x00', &(0x7f0000000300)='/dev/zero\x00'], 0x1000) socket$inet(0x2, 0x1, 0x0) perf_event_open(&(0x7f0000000100)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x22420, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ptrace$setopts(0x4200, 0x0, 0x5, 0x100050) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000004c00)={0xc0002100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) gettid() r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000), 0x380, 0x0) r2 = syz_open_procfs(0x0, 0x0) read$hiddev(r2, &(0x7f0000001140)=""/212, 0xd4) fchmodat(r2, &(0x7f00000004c0)='./file0\x00', 0x0) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(r1, 0xc018937c, &(0x7f0000000380)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32=r0, @ANYBLOB="00000000000000002e2f66696cee8816"]) ioctl$TIOCSSOFTCAR(r3, 0x541a, &(0x7f00000003c0)=0x6) waitid$P_PIDFD(0x3, r1, &(0x7f0000000500), 0x2, &(0x7f0000000580)) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(r1, 0xc0189372, &(0x7f0000000040)={{0x1, 0x1, 0x18, r2, {0xffff}}, './file0\x00'}) 06:11:16 executing program 6: ioctl$AUTOFS_DEV_IOCTL_CLOSEMOUNT(0xffffffffffffffff, 0xc0189375, 0x0) syz_genetlink_get_family_id$ethtool(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_PAUSE_SET(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = memfd_create(&(0x7f0000000640)='B\xdb/\x89\x03l\xdeb\xcb\xb54\xed\xbeLY\xb5Z\xe1\x12S\xf5G\xcc\xf3\xe9\x02h\v\xca(\x96\xe1C\xdf\x1c\xea\x85C\xfb\x10\x13\xfa\x03\x16\xcd\x17\xa2\x80\xa1z\xb4r\x95\xc3@\x9d\xa6\xf1\x92#}g\xd3`\xf7\xcez\xcb\xb3\x1a\xbb\xc48e\x8e\xb1&\xd1\x8a\xe6!\x7f\x8d\xea,qx\xa28\xbf\"\xc7e\x06L\xb06\xeb<$\xd7\xba\xe5\x01\x03\x94r\xab\xd4J\x03s\xaf\xf6A\xbfV\xfa\x1ew\x8d\xbf\x99I\x97\xd8\xd2\xe8\x11\xc4\x04\x00\x84\xd5i\xee\xaf\xae[E\x1f\xdd\xd7#rT+\xb621p\xaf[\x99\" 1\xeb\xc7)\xd2\x1dh\xf2\xd5s\xfd?\fa>\x9f;\xe5r\xe5\xbd\xb0|=\x8eZcPY\xf8\xbd\x13\xaa\x8b\xdf\xbc\x93u\xd5\xb0r\xfb\xde\xe7\xd9k\xe2\xc6\x1b\xf2o@&>\xf2M\xe7\x8c\xeb\xee\xf5\x02~\x85\x14\xf3\xc6v\xf15PE\x8c\xca\x16$\xc2\x01#\xb563\rbq\xbf64\xfaW\x17\xdfa\xe6\xca\x86\xd7\xf8\x81X\x9bg4\xc1\xdam\xcf=Rq6\xb0\xd4D=I\x1a\x0e\xd0\xabz\xe2\x19\x0fM\xad\xdco\xa4\xb2\x8c?\xc1\x10\xf273\xd00\xb3_\xe8\x9a*\xfcL\xea;\xc0\x9a\xdbx!N;\xb5x\t\xa4E\xbe\x93r\x04\xf5\xf0\xf5\x7f\x9a)\xf5\x1b\"\xa1\xd8\x06>\xc9\xe2r\xe9\xbb\xfe\xc0\b\x81\x98\x1c\xe2\xe0?\x8f\xa1\xbel\aN\x83@\xb1\x03)4A\x83\xd6\xcf\xf6\xb5\x82\xb7\x9dA\b$\xa2x\x8a@\xfaj~\xef\x93\xb1/L\x01\xe2\xba|\xf0\x01)PP\xcdl\x06\xfc\x15;qZ\xb1u\xc9\xd0\xd16~JEGm\xe4\x1e@\x9dG\xe4@\xdf\xba\'\x8b\x1cD\xc7\xec\xd1@}tR\xd9P\xf4N\xe3\xd8x\xa0\x91\x17\xc2}\x13\b\xca\t(Z\xa3_\xa1\x90\x15T\xa4\xe7%\x98\xa7\xfb\x8bp/eq\x93\xbf\x1f =|\xf3\xb1\xfcR\xd8\nM,\xcb%@\'\x15\x88\xd8\xad\f\x91|\x95\x8fq+\x98\x81W\xba\x9f\xe0elOt\xbd\by\r\x87\x1c\xba\xbd\x8e+S>\xb8\xe29\x91h^x\xfb`\x00\xdd/\xa6\xb1\x16=\xa1bw\xc5I\xb1\x00'/549, 0x5) fcntl$addseals(r0, 0x409, 0x0) 06:11:16 executing program 0: ioctl$AUTOFS_DEV_IOCTL_CLOSEMOUNT(0xffffffffffffffff, 0xc0189375, 0x0) r0 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_PAUSE_SET(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000000), 0xa000, 0x0) r2 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r3 = socket$nl_audit(0x10, 0x3, 0x9) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000000040)={'wlan1\x00', 0x0}) sendmsg$inet(r2, &(0x7f0000000780)={&(0x7f0000000000)={0x2, 0x0, @local}, 0x10, &(0x7f00000003c0)=[{&(0x7f0000000300)="6fb9", 0xffeb}], 0x1, &(0x7f0000000700)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {r4, @remote, @broadcast}}}], 0x20}, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000003400)=[{{&(0x7f0000000100)=@can={0x1d, 0x0}, 0x80, &(0x7f0000000300)=[{&(0x7f0000000180)=""/232, 0xe8}], 0x1}, 0x1}, {{&(0x7f0000000340)=@ieee802154={0x24, @short}, 0x80, &(0x7f0000000a00)=[{&(0x7f0000000640)=""/95, 0x5f}, {&(0x7f00000006c0)=""/199, 0xc7}, {&(0x7f00000007c0)=""/120, 0x78}, {&(0x7f0000000840)=""/139, 0x8b}, {&(0x7f0000000900)=""/227, 0xe3}], 0x5, &(0x7f0000000a80)=""/92, 0x5c}, 0x9}, {{&(0x7f0000000b00)=@isdn, 0x80, &(0x7f0000001ec0)=[{&(0x7f0000000b80)=""/117, 0x75}, {&(0x7f0000000c00)=""/4096, 0x1000}, {&(0x7f0000001c00)=""/185, 0xb9}, {&(0x7f00000003c0)=""/27, 0x1b}, {&(0x7f0000001cc0)=""/237, 0xed}, {&(0x7f0000001dc0)=""/212, 0xd4}], 0x6, &(0x7f0000001f40)=""/89, 0x59}, 0x6}, {{&(0x7f0000001fc0)=@nfc, 0x80, &(0x7f0000003380)=[{&(0x7f0000002040)=""/141, 0x8d}, {&(0x7f0000002100)=""/212, 0xd4}, {&(0x7f0000002200)=""/228, 0xe4}, {&(0x7f0000002300)=""/4096, 0x1000}, {&(0x7f0000003300)=""/115, 0x73}], 0x5}, 0x1}], 0x4, 0x10062, &(0x7f0000003500)) r6 = socket$nl_route(0x10, 0x3, 0x0) setsockopt$netlink_NETLINK_CAP_ACK(r6, 0x10e, 0xa, &(0x7f00000000c0), 0x4) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(0xffffffffffffffff, 0x89f0, &(0x7f0000003940)={'tunl0\x00', &(0x7f00000038c0)={'gretap0\x00', 0x0, 0x17, 0x8000, 0x9, 0x800, {{0x13, 0x4, 0x1, 0x8, 0x4c, 0x65, 0x0, 0x7f, 0x2f, 0x0, @local, @multicast1, {[@rr={0x7, 0xf, 0x2b, [@rand_addr=0x64010100, @rand_addr=0x64010101, @private=0xa010102]}, @ra={0x94, 0x4}, @end, @ra={0x94, 0x4}, @generic={0x44, 0x10, "86f7be7fa6512f83629c91af6c92"}, @generic={0x88, 0x4, "d759"}, @ssrr={0x89, 0xb, 0xbe, [@loopback, @broadcast]}]}}}}}) recvmmsg(0xffffffffffffffff, &(0x7f0000008b00)=[{{&(0x7f0000003980)=@nfc, 0x80, &(0x7f0000003a80)=[{&(0x7f0000003a00)=""/46, 0x2e}, {&(0x7f0000003a40)=""/32, 0x20}], 0x2, &(0x7f0000003ac0)=""/192, 0xc0}, 0x10100}, {{&(0x7f0000003b80)=@ethernet={0x0, @local}, 0x80, &(0x7f0000005040)=[{&(0x7f0000003c00)=""/149, 0x95}, {&(0x7f0000003cc0)=""/187, 0xbb}, {&(0x7f0000003d80)=""/206, 0xce}, {&(0x7f0000003e80)=""/60, 0x3c}, {&(0x7f0000003ec0)=""/4096, 0x1000}, {&(0x7f0000004ec0)=""/120, 0x78}, {&(0x7f0000004f40)=""/144, 0x90}, {&(0x7f0000005000)}], 0x8}, 0x8}, {{&(0x7f00000050c0)=@ethernet={0x0, @multicast}, 0x80, &(0x7f0000006340)=[{&(0x7f0000005140)=""/34, 0x22}, {&(0x7f0000005180)=""/4096, 0x1000}, {&(0x7f0000006180)=""/73, 0x49}, {&(0x7f0000006200)=""/221, 0xdd}, {&(0x7f0000006300)=""/62, 0x3e}], 0x5, &(0x7f00000063c0)=""/57, 0x39}, 0x3}, {{0x0, 0x0, &(0x7f0000006740)=[{&(0x7f0000006400)=""/254, 0xfe}, {&(0x7f0000006500)=""/203, 0xcb}, {&(0x7f0000006600)=""/82, 0x52}, {&(0x7f0000006680)=""/179, 0xb3}], 0x4, &(0x7f0000006780)=""/221, 0xdd}, 0x2}, {{&(0x7f0000006880)=@xdp, 0x80, &(0x7f0000006a40)=[{&(0x7f0000006900)=""/116, 0x74}, {&(0x7f0000006980)=""/174, 0xae}], 0x2, &(0x7f0000006a80)=""/167, 0xa7}, 0x8c}, {{&(0x7f0000006b40)=@qipcrtr, 0x80, &(0x7f0000007d00)=[{&(0x7f0000006bc0)=""/93, 0x5d}, {&(0x7f0000006c40)=""/37, 0x25}, {&(0x7f0000006c80)=""/4096, 0x1000}, {&(0x7f0000007c80)=""/125, 0x7d}], 0x4, &(0x7f0000007d40)=""/153, 0x99}, 0x8}, {{0x0, 0x0, &(0x7f0000008300)=[{&(0x7f0000007e00)=""/197, 0xc5}, {&(0x7f0000007f00)=""/48, 0x30}, {&(0x7f0000007f40)=""/178, 0xb2}, {&(0x7f0000008000)=""/9, 0x9}, {&(0x7f0000008040)=""/56, 0x38}, {&(0x7f0000008080)=""/250, 0xfa}, {&(0x7f0000008180)=""/249, 0xf9}, {&(0x7f0000008280)=""/69, 0x45}], 0x8, &(0x7f0000008380)=""/34, 0x22}, 0x7}, {{&(0x7f00000083c0)=@rc={0x1f, @fixed}, 0x80, &(0x7f0000008900)=[{&(0x7f0000008440)=""/223, 0xdf}, {&(0x7f0000008540)=""/170, 0xaa}, {&(0x7f0000008600)=""/203, 0xcb}, {&(0x7f0000008700)=""/109, 0x6d}, {&(0x7f0000008780)=""/31, 0x1f}, {&(0x7f00000087c0)=""/26, 0x1a}, {&(0x7f0000008800)=""/104, 0x68}, {&(0x7f0000008880)=""/77, 0x4d}], 0x8}, 0x3}, {{&(0x7f0000008980)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, 0x80, &(0x7f0000008a40)=[{&(0x7f0000008a00)=""/60, 0x3c}], 0x1, &(0x7f0000008a80)=""/123, 0x7b}, 0x10001}], 0x9, 0x0, 0x0) ioctl$sock_ipv6_tunnel_SIOCDELPRL(0xffffffffffffffff, 0x89f6, &(0x7f0000008dc0)={'ip6tnl0\x00', &(0x7f0000008d40)={'ip6_vti0\x00', 0x0, 0x4, 0x5, 0xfd, 0x7ff, 0x0, @empty, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}, 0x1, 0x80, 0x9, 0x1}}) sendmsg$ETHTOOL_MSG_LINKINFO_GET(r1, &(0x7f0000009000)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000008fc0)={&(0x7f0000008e00)={0x188, r0, 0x10, 0x70bd28, 0x25dfdbfe, {}, [@HEADER={0x2c, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x3}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r4}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}]}, @HEADER={0x14, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8}, @ETHTOOL_A_HEADER_FLAGS={0x8}]}, @HEADER={0x14, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r5}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}]}, @HEADER={0x6c, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'ip_vti0\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'syzkaller1\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x3}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth1_to_hsr\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'vlan1\x00'}]}, @HEADER={0x14, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r7}]}, @HEADER={0x3c, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'bridge_slave_0\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'wlan1\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r8}]}, @HEADER={0x48, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'sit0\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'wlan1\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8}]}, @HEADER={0x1c, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r9}, @ETHTOOL_A_HEADER_FLAGS={0x8}, @ETHTOOL_A_HEADER_FLAGS={0x8}]}]}, 0x188}, 0x1, 0x0, 0x0, 0x8080}, 0xc045) r10 = memfd_create(&(0x7f0000000400)='B\xdb/\x89\x03l\xdeb\xcb\xb54\xed\xbeLY\xb5Z\xe1\x12S\xf5G\xcc\xf3\xe9\x02h\v\xca(\x96\xe1C\xdf\x1c\xea\x85C\xfb\x10\x13\xfa\x03\x16\xcd\x17\xa2\x80\xa1z\xb4r\x95\xc3@\x9d\xa6\xf1\x92#}g\xd3`\xf7\xcez\xcb\xb3\x1a\xbb\xc48e\x8e\xb1&\xd1\x8a\xe6!\x7f\x8d\xea,qx\xa28\xbf\"\xc7e\x06L\xb06\xeb<$\xd7\xba\xe5\x01\x03\x94r\xab\xd4J\x03s\xaf\xf6A\xbfV\xfa\x1ew\x8d\xbf\x99I\x97\xd8\xd2\xe8\x11\xc4\x04\x00\x84\xd5i\xee\xaf\xae[E\x1f\xdd\xd7#rT+\xb621p\xaf[\x99\" 1\xeb\xc7)\xd2\x1dh\xf2\xd5s\xfd?\fa>\x9f;\xe5r\xe5\xbd\xb0|=\x8eZcPY\xf8\xbd\x13\xaa\x8b\xdf\xbc\x93u\xd5\xb0r\xfb\xde\xe7\xd9k\xe2\xc6\x1b\xf2o@&>\xf2M\xe7\x8c\xeb\xee\xf5\x02~\x85\x14\xf3\xc6v\xf15PE\x8c\xca\x16$\xc2\x01#\xb563\rbq\xbf64\xfaW\x17\xdfa\xe6\xca\x86\xd7\xf8\x81X\x9bg4\xc1\xdam\xcf=Rq6\xb0\xd4D=I\x1a\x0e\xd0\xabz\xe2\x19\x0fM\xad\xdco\xa4\xb2\x8c?\xc1\x10\xf273\xd00\xb3_\xe8\x9a*\xfcL\xea;\xc0\x9a\xdbx!N;\xb5x\t\xa4E\xbe\x93r\x04\xf5\xf0\xf5\x7f\x9a)\xf5\x1b\"\xa1\xd8\x06>\xc9\xe2r\xe9\xbb\xfe\xc0\b\x81\x98\x1c\xe2\xe0?\x8f\xa1\xbel\aN\x83@\xb1\x03)4A\x83\xd6\xcf\xf6\xb5\x82\xb7\x9dA\b$\xa2x\x8a@\xfaj~\xef\x93\xb1/L\x01\xe2\xba|\xf0\x01)PP\xcdl\x06\xfc\x15;qZ\xb1u\xc9\xd0\xd16~JEGm\xe4\x1e@\x9dG\xe4@\xdf\xba\'\x8b\x1cD\xc7\xec\xd1@}tR\xd9P\xf4N\xe3\xd8x\xa0\x91\x17\xc2}\x13\b\xca\t(Z\xa3_\xa1\x90\x15T\xa4\xe7%\x98\xa7\xfb\x8bp/eq\x93\xbf\x1f =|\xf3\xb1\xfcR\xd8\nM,\xcb%@\'\x15\x88\xd8\xad\f\x91|\x95\x8fq+\x98\x81W\xba\x9f\xe0elOt\xbd\by\r\x87\x1c\xba\xbd\x8e+S>\xb8\xe29\x91h^x\xfb`\x00\xdd/\xa6\xb1\x16=\xa1bw\xc5I\xb1\x00'/549, 0x2) fcntl$addseals(r10, 0x409, 0x0) 06:11:16 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x100000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="070000000002000019000000900100000f000000000000000100000005000000000004000040000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000001000018000000c28500002b02", 0x66, 0x400}, {&(0x7f0000010100)="000000000000000000000000e8f7d2e8feeb4bf889ba053b02420ff8010040", 0x1f, 0x4e0}], 0x0, &(0x7f0000000140)=ANY=[]) 06:11:16 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="20001c000002000019000000900100000f000000000000000100000005000000000004000040000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000001000018000000c28500002b02", 0x66, 0x400}, {&(0x7f0000010100)="000000000000000000000000e8f7d2e8feeb4bf889ba053b02420ff8010040", 0x1f, 0x4e0}], 0x0, &(0x7f0000000140)=ANY=[]) 06:11:16 executing program 7: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x100c00, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000100000005000000000004000040000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000001000018000000c28500002b02", 0x66, 0x400}, {&(0x7f0000010100)="000000000000000000000000e8f7d2e8feeb4bf889ba053b02420ff8010040", 0x1f, 0x4e0}], 0x0, &(0x7f0000000140)=ANY=[]) [ 2192.176918] loop5: detected capacity change from 0 to 2048 [ 2192.197722] EXT4-fs (loop5): inodes count not valid: 7 vs 32 [ 2192.216285] loop7: detected capacity change from 0 to 2054 [ 2192.225587] loop5: detected capacity change from 0 to 2048 [ 2192.228105] loop4: detected capacity change from 0 to 256 [ 2192.236969] EXT4-fs (loop5): inodes count not valid: 7 vs 32 [ 2192.246674] EXT4-fs (loop7): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 2192.248130] EXT4-fs (loop7): group descriptors corrupted! 06:11:16 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="200065000002000019000000900100000f000000000000000100000005000000000004000040000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000001000018000000c28500002b02", 0x66, 0x400}, {&(0x7f0000010100)="000000000000000000000000e8f7d2e8feeb4bf889ba053b02420ff8010040", 0x1f, 0x4e0}], 0x0, &(0x7f0000000140)=ANY=[]) [ 2192.275312] loop7: detected capacity change from 0 to 2054 [ 2192.280000] FAT-fs (loop4): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) [ 2192.300051] EXT4-fs (loop7): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 2192.301462] EXT4-fs (loop7): group descriptors corrupted! 06:11:16 executing program 6: ioctl$AUTOFS_DEV_IOCTL_CLOSEMOUNT(0xffffffffffffffff, 0xc0189375, 0x0) syz_genetlink_get_family_id$ethtool(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_PAUSE_SET(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = memfd_create(&(0x7f0000000400)='B\xdb/\x89\x03l\xdeb\xcb\xb54\xed\xbeLY\xb5Z\xe1\x12S\xf5G\xcc\xf3\xe9\x02h\v\xca(\x96\xe1C\xdf\x1c\xea\x85C\xfb\x10\x13\xfa\x03\x16\xcd\x17\xa2\x80\xa1z\xb4r\x95\xc3@\x9d\xa6\xf1\x92#}g\xd3`\xf7\xcez\xcb\xb3\x1a\xbb\xc48e\x8e\xb1&\xd1\x8a\xe6!\x7f\x8d\xea,qx\xa28\xbf\"\xc7e\x06L\xb06\xeb<$\xd7\xba\xe5\x01\x03\x94r\xab\xd4J\x03s\xaf\xf6A\xbfV\xfa\x1ew\x8d\xbf\x99I\x97\xd8\xd2\xe8\x11\xc4\x04\x00\x84\xd5i\xee\xaf\xae[E\x1f\xdd\xd7#rT+\xb621p\xaf[\x99\" 1\xeb\xc7)\xd2\x1dh\xf2\xd5s\xfd?\fa>\x9f;\xe5r\xe5\xbd\xb0|=\x8eZcPY\xf8\xbd\x13\xaa\x8b\xdf\xbc\x93u\xd5\xb0r\xfb\xde\xe7\xd9k\xe2\xc6\x1b\xf2o@&>\xf2M\xe7\x8c\xeb\xee\xf5\x02~\x85\x14\xf3\xc6v\xf15PE\x8c\xca\x16$\xc2\x01#\xb563\rbq\xbf64\xfaW\x17\xdfa\xe6\xca\x86\xd7\xf8\x81X\x9bg4\xc1\xdam\xcf=Rq6\xb0\xd4D=I\x1a\x0e\xd0\xabz\xe2\x19\x0fM\xad\xdco\xa4\xb2\x8c?\xc1\x10\xf273\xd00\xb3_\xe8\x9a*\xfcL\xea;\xc0\x9a\xdbx!N;\xb5x\t\xa4E\xbe\x93r\x04\xf5\xf0\xf5\x7f\x9a)\xf5\x1b\"\xa1\xd8\x06>\xc9\xe2r\xe9\xbb\xfe\xc0\b\x81\x98\x1c\xe2\xe0?\x8f\xa1\xbel\aN\x83@\xb1\x03)4A\x83\xd6\xcf\xf6\xb5\x82\xb7\x9dA\b$\xa2x\x8a@\xfaj~\xef\x93\xb1/L\x01\xe2\xba|\xf0\x01)PP\xcdl\x06\xfc\x15;qZ\xb1u\xc9\xd0\xd16~JEGm\xe4\x1e@\x9dG\xe4@\xdf\xba\'\x8b\x1cD\xc7\xec\xd1@}tR\xd9P\xf4N\xe3\xd8x\xa0\x91\x17\xc2}\x13\b\xca\t(Z\xa3_\xa1\x90\x15T\xa4\xe7%\x98\xa7\xfb\x8bp/eq\x93\xbf\x1f =|\xf3\xb1\xfcR\xd8\nM,\xcb%@\'\x15\x88\xd8\xad\f\x91|\x95\x8fq+\x98\x81W\xba\x9f\xe0elOt\xbd\by\r\x87\x1c\xba\xbd\x8e+S>\xb8\xe29\x91h^x\xfb`\x00\xdd/\xa6\xb1\x16=\xa1bw\xc5I\xb1\x00'/549, 0x2) fcntl$addseals(r0, 0x409, 0x0) 06:11:16 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x100000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="080000000002000019000000900100000f000000000000000100000005000000000004000040000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000001000018000000c28500002b02", 0x66, 0x400}, {&(0x7f0000010100)="000000000000000000000000e8f7d2e8feeb4bf889ba053b02420ff8010040", 0x1f, 0x4e0}], 0x0, &(0x7f0000000140)=ANY=[]) 06:11:16 executing program 1: pipe(&(0x7f0000000340)={0xffffffffffffffff}) pread64(r0, &(0x7f0000000440)=""/95, 0x5f, 0x6) execveat(r0, &(0x7f0000000080)='./file0\x00', &(0x7f00000001c0)=[&(0x7f00000000c0)='\x00', &(0x7f0000000180)='\x00'], &(0x7f0000000400)=[&(0x7f0000000200)='/dev/zero\x00', &(0x7f0000000240)='/dev/zero\x00', &(0x7f0000000300)='/dev/zero\x00'], 0x1000) socket$inet(0x2, 0x1, 0x0) perf_event_open(&(0x7f0000000100)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x22420, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ptrace$setopts(0x4200, 0x0, 0x5, 0x100050) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000004c00)={0xc0002100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) gettid() r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000), 0x380, 0x0) r2 = syz_open_procfs(0x0, 0x0) read$hiddev(r2, &(0x7f0000001140)=""/212, 0xd4) fchmodat(r2, &(0x7f00000004c0)='./file0\x00', 0x0) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(r1, 0xc018937c, &(0x7f0000000380)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32=r0, @ANYBLOB="00000000000000002e2f66696cee8816"]) ioctl$TIOCSSOFTCAR(r3, 0x541a, &(0x7f00000003c0)=0x6) waitid$P_PIDFD(0x3, r1, &(0x7f0000000500), 0x2, &(0x7f0000000580)) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(r1, 0xc0189372, &(0x7f0000000040)={{0x1, 0x1, 0x18, r2, {0xffff}}, './file0\x00'}) 06:11:16 executing program 0: pipe(&(0x7f0000000340)={0xffffffffffffffff}) pread64(r0, &(0x7f0000000440)=""/95, 0x5f, 0x6) execveat(r0, &(0x7f0000000080)='./file0\x00', &(0x7f00000001c0)=[&(0x7f00000000c0)='\x00', &(0x7f0000000180)='\x00'], &(0x7f0000000400)=[&(0x7f0000000200)='/dev/zero\x00', &(0x7f0000000240)='/dev/zero\x00', &(0x7f0000000300)='/dev/zero\x00'], 0x1000) socket$inet(0x2, 0x1, 0x0) perf_event_open(&(0x7f0000000100)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x22420, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ptrace$setopts(0x4200, 0x0, 0x5, 0x100050) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000004c00)={0xc0002100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) gettid() r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000), 0x380, 0x0) r2 = syz_open_procfs(0x0, 0x0) read$hiddev(r2, &(0x7f0000001140)=""/212, 0xd4) fchmodat(r2, &(0x7f00000004c0)='./file0\x00', 0x0) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(r1, 0xc018937c, &(0x7f0000000380)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32=r0, @ANYBLOB="00000000000000002e2f66696cee8816"]) ioctl$TIOCSSOFTCAR(r3, 0x541a, &(0x7f00000003c0)=0x6) waitid$P_PIDFD(0x3, r1, &(0x7f0000000500), 0x2, &(0x7f0000000580)) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(r1, 0xc0189372, &(0x7f0000000040)={{0x1, 0x1, 0x18, r2, {0xffff}}, './file0\x00'}) 06:11:16 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="200066000002000019000000900100000f000000000000000100000005000000000004000040000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000001000018000000c28500002b02", 0x66, 0x400}, {&(0x7f0000010100)="000000000000000000000000e8f7d2e8feeb4bf889ba053b02420ff8010040", 0x1f, 0x4e0}], 0x0, &(0x7f0000000140)=ANY=[]) 06:11:16 executing program 4: r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000040), 0xffffffffffffffff) syz_genetlink_get_family_id$ethtool(&(0x7f0000000100), 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_PAUSE_SET(0xffffffffffffffff, &(0x7f0000000440)={0x0, 0x0, 0x0}, 0x0) r2 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000080)='smaps\x00') pread64(r2, &(0x7f00000000c0)=""/98, 0x62, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x7fffffff) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(0xffffffffffffffff, 0xc0189374, &(0x7f0000000240)={{0x1, 0x1, 0x18, r0, {0x8}}, './file0\x00'}) dup3(0xffffffffffffffff, r2, 0x0) r3 = socket$inet_icmp_raw(0x2, 0x3, 0x1) syz_genetlink_get_family_id$ethtool(&(0x7f0000000180), r2) socket$nl_audit(0x10, 0x3, 0x9) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000040)={'wlan1\x00', 0x0}) sendmsg$inet(r3, &(0x7f0000000780)={&(0x7f0000000000)={0x2, 0x0, @local}, 0x10, &(0x7f00000003c0)=[{&(0x7f0000000300)="6fb9", 0xffeb}], 0x1, &(0x7f0000000700)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {r4, @remote, @broadcast}}}], 0x20}, 0x0) r5 = socket$inet_icmp_raw(0x2, 0x3, 0x1) socket$nl_audit(0x10, 0x3, 0x9) sendmsg$inet(r5, &(0x7f0000000780)={&(0x7f0000000000)={0x2, 0x0, @local}, 0x10, &(0x7f00000003c0)=[{&(0x7f0000000300)="6fb9", 0xffeb}], 0x1, &(0x7f0000000700)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @remote, @broadcast}}}], 0x20}, 0x0) sendmsg$ETHTOOL_MSG_LINKINFO_GET(r2, &(0x7f0000000200)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f00000001c0)={&(0x7f0000000340)=ANY=[@ANYBLOB='@\x00\x00\x00', @ANYRES16=r1, @ANYBLOB="000427bd7000ffdbdf25020000002c00018008000100", @ANYRES32=0x0, @ANYBLOB='\b\x00C\x00\x00\x00\x00\x00\b\x00!\x00', @ANYRES32=r4, @ANYBLOB="d5b921cac279671a02c4d90ed2cbc802c00000009852d9e901fb170000000000", @ANYRES32=0x0, @ANYBLOB], 0x40}, 0x1, 0x0, 0x0, 0x4}, 0xd0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000480), 0x1}, 0x603}, 0x0, 0xffffffefffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000040)=[{&(0x7f0000010000)="601c6d6b646f736689254300080120000400004000f8000020004000030000000000000001", 0x25}, {0x0, 0x0, 0x10000}], 0x0, &(0x7f0000000040)=ANY=[]) 06:11:16 executing program 7: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x100d00, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000100000005000000000004000040000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000001000018000000c28500002b02", 0x66, 0x400}, {&(0x7f0000010100)="000000000000000000000000e8f7d2e8feeb4bf889ba053b02420ff8010040", 0x1f, 0x4e0}], 0x0, &(0x7f0000000140)=ANY=[]) [ 2192.490781] loop5: detected capacity change from 0 to 2048 [ 2192.522293] loop4: detected capacity change from 0 to 256 [ 2192.528668] EXT4-fs (loop5): inodes count not valid: 8 vs 32 [ 2192.536289] FAT-fs (loop4): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) [ 2192.554384] loop5: detected capacity change from 0 to 2048 [ 2192.587160] EXT4-fs (loop5): inodes count not valid: 8 vs 32 [ 2192.617357] loop7: detected capacity change from 0 to 2054 [ 2192.655483] EXT4-fs (loop7): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 2192.656754] EXT4-fs (loop7): group descriptors corrupted! [ 2192.679708] loop7: detected capacity change from 0 to 2054 [ 2192.704056] EXT4-fs (loop7): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 2192.705301] EXT4-fs (loop7): group descriptors corrupted! 06:11:35 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="2000f0000002000019000000900100000f000000000000000100000005000000000004000040000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000001000018000000c28500002b02", 0x66, 0x400}, {&(0x7f0000010100)="000000000000000000000000e8f7d2e8feeb4bf889ba053b02420ff8010040", 0x1f, 0x4e0}], 0x0, &(0x7f0000000140)=ANY=[]) 06:11:35 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x100000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="0a0000000002000019000000900100000f000000000000000100000005000000000004000040000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000001000018000000c28500002b02", 0x66, 0x400}, {&(0x7f0000010100)="000000000000000000000000e8f7d2e8feeb4bf889ba053b02420ff8010040", 0x1f, 0x4e0}], 0x0, &(0x7f0000000140)=ANY=[]) 06:11:35 executing program 4: r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000040), 0xffffffffffffffff) syz_genetlink_get_family_id$ethtool(&(0x7f0000000100), 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_PAUSE_SET(0xffffffffffffffff, &(0x7f0000000440)={0x0, 0x0, 0x0}, 0x0) r2 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000080)='smaps\x00') pread64(r2, &(0x7f00000000c0)=""/98, 0x62, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x7fffffff) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(0xffffffffffffffff, 0xc0189374, &(0x7f0000000240)={{0x1, 0x1, 0x18, r0, {0x8}}, './file0\x00'}) dup3(0xffffffffffffffff, r2, 0x0) r3 = socket$inet_icmp_raw(0x2, 0x3, 0x1) syz_genetlink_get_family_id$ethtool(&(0x7f0000000180), r2) socket$nl_audit(0x10, 0x3, 0x9) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000040)={'wlan1\x00', 0x0}) sendmsg$inet(r3, &(0x7f0000000780)={&(0x7f0000000000)={0x2, 0x0, @local}, 0x10, &(0x7f00000003c0)=[{&(0x7f0000000300)="6fb9", 0xffeb}], 0x1, &(0x7f0000000700)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {r4, @remote, @broadcast}}}], 0x20}, 0x0) r5 = socket$inet_icmp_raw(0x2, 0x3, 0x1) socket$nl_audit(0x10, 0x3, 0x9) sendmsg$inet(r5, &(0x7f0000000780)={&(0x7f0000000000)={0x2, 0x0, @local}, 0x10, &(0x7f00000003c0)=[{&(0x7f0000000300)="6fb9", 0xffeb}], 0x1, &(0x7f0000000700)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @remote, @broadcast}}}], 0x20}, 0x0) sendmsg$ETHTOOL_MSG_LINKINFO_GET(r2, &(0x7f0000000200)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f00000001c0)={&(0x7f0000000340)=ANY=[@ANYBLOB='@\x00\x00\x00', @ANYRES16=r1, @ANYBLOB="000427bd7000ffdbdf25020000002c00018008000100", @ANYRES32=0x0, @ANYBLOB='\b\x00C\x00\x00\x00\x00\x00\b\x00!\x00', @ANYRES32=r4, @ANYBLOB="d5b921cac279671a02c4d90ed2cbc802c00000009852d9e901fb170000000000", @ANYRES32=0x0, @ANYBLOB], 0x40}, 0x1, 0x0, 0x0, 0x4}, 0xd0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000480), 0x1}, 0x603}, 0x0, 0xffffffefffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000040)=[{&(0x7f0000010000)="601c6d6b646f736689254300080120000400004000f8000020004000030000000000000001", 0x25}, {0x0, 0x0, 0x10000}], 0x0, &(0x7f0000000040)=ANY=[]) 06:11:35 executing program 0: r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000040), 0xffffffffffffffff) syz_genetlink_get_family_id$ethtool(&(0x7f0000000100), 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_PAUSE_SET(0xffffffffffffffff, &(0x7f0000000440)={0x0, 0x0, 0x0}, 0x0) r2 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000080)='smaps\x00') pread64(r2, &(0x7f00000000c0)=""/98, 0x62, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x7fffffff) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(0xffffffffffffffff, 0xc0189374, &(0x7f0000000240)={{0x1, 0x1, 0x18, r0, {0x8}}, './file0\x00'}) dup3(0xffffffffffffffff, r2, 0x0) r3 = socket$inet_icmp_raw(0x2, 0x3, 0x1) syz_genetlink_get_family_id$ethtool(&(0x7f0000000180), r2) socket$nl_audit(0x10, 0x3, 0x9) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000040)={'wlan1\x00', 0x0}) sendmsg$inet(r3, &(0x7f0000000780)={&(0x7f0000000000)={0x2, 0x0, @local}, 0x10, &(0x7f00000003c0)=[{&(0x7f0000000300)="6fb9", 0xffeb}], 0x1, &(0x7f0000000700)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {r4, @remote, @broadcast}}}], 0x20}, 0x0) r5 = socket$inet_icmp_raw(0x2, 0x3, 0x1) socket$nl_audit(0x10, 0x3, 0x9) sendmsg$inet(r5, &(0x7f0000000780)={&(0x7f0000000000)={0x2, 0x0, @local}, 0x10, &(0x7f00000003c0)=[{&(0x7f0000000300)="6fb9", 0xffeb}], 0x1, &(0x7f0000000700)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @remote, @broadcast}}}], 0x20}, 0x0) sendmsg$ETHTOOL_MSG_LINKINFO_GET(r2, &(0x7f0000000200)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f00000001c0)={&(0x7f0000000340)=ANY=[@ANYBLOB='@\x00\x00\x00', @ANYRES16=r1, @ANYBLOB="000427bd7000ffdbdf25020000002c00018008000100", @ANYRES32=0x0, @ANYBLOB='\b\x00C\x00\x00\x00\x00\x00\b\x00!\x00', @ANYRES32=r4, @ANYBLOB="d5b921cac279671a02c4d90ed2cbc802c00000009852d9e901fb1700000000", @ANYRES32=0x0, @ANYBLOB], 0x40}, 0x1, 0x0, 0x0, 0x4}, 0xd0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000480), 0x1}, 0x603}, 0x0, 0xffffffefffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000040)=[{&(0x7f0000010000)="601c6d6b646f736689254300080120000400004000f8000020004000030000000000000001", 0x25}, {0x0, 0x0, 0x10000}], 0x0, &(0x7f0000000040)=ANY=[]) 06:11:35 executing program 6: ioctl$AUTOFS_DEV_IOCTL_CLOSEMOUNT(0xffffffffffffffff, 0xc0189375, 0x0) syz_genetlink_get_family_id$ethtool(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_PAUSE_SET(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = memfd_create(&(0x7f0000000400)='B\xdb/\x89\x03l\xdeb\xcb\xb54\xed\xbeLY\xb5Z\xe1\x12S\xf5G\xcc\xf3\xe9\x02h\v\xca(\x96\xe1C\xdf\x1c\xea\x85C\xfb\x10\x13\xfa\x03\x16\xcd\x17\xa2\x80\xa1z\xb4r\x95\xc3@\x9d\xa6\xf1\x92#}g\xd3`\xf7\xcez\xcb\xb3\x1a\xbb\xc48e\x8e\xb1&\xd1\x8a\xe6!\x7f\x8d\xea,qx\xa28\xbf\"\xc7e\x06L\xb06\xeb<$\xd7\xba\xe5\x01\x03\x94r\xab\xd4J\x03s\xaf\xf6A\xbfV\xfa\x1ew\x8d\xbf\x99I\x97\xd8\xd2\xe8\x11\xc4\x04\x00\x84\xd5i\xee\xaf\xae[E\x1f\xdd\xd7#rT+\xb621p\xaf[\x99\" 1\xeb\xc7)\xd2\x1dh\xf2\xd5s\xfd?\fa>\x9f;\xe5r\xe5\xbd\xb0|=\x8eZcPY\xf8\xbd\x13\xaa\x8b\xdf\xbc\x93u\xd5\xb0r\xfb\xde\xe7\xd9k\xe2\xc6\x1b\xf2o@&>\xf2M\xe7\x8c\xeb\xee\xf5\x02~\x85\x14\xf3\xc6v\xf15PE\x8c\xca\x16$\xc2\x01#\xb563\rbq\xbf64\xfaW\x17\xdfa\xe6\xca\x86\xd7\xf8\x81X\x9bg4\xc1\xdam\xcf=Rq6\xb0\xd4D=I\x1a\x0e\xd0\xabz\xe2\x19\x0fM\xad\xdco\xa4\xb2\x8c?\xc1\x10\xf273\xd00\xb3_\xe8\x9a*\xfcL\xea;\xc0\x9a\xdbx!N;\xb5x\t\xa4E\xbe\x93r\x04\xf5\xf0\xf5\x7f\x9a)\xf5\x1b\"\xa1\xd8\x06>\xc9\xe2r\xe9\xbb\xfe\xc0\b\x81\x98\x1c\xe2\xe0?\x8f\xa1\xbel\aN\x83@\xb1\x03)4A\x83\xd6\xcf\xf6\xb5\x82\xb7\x9dA\b$\xa2x\x8a@\xfaj~\xef\x93\xb1/L\x01\xe2\xba|\xf0\x01)PP\xcdl\x06\xfc\x15;qZ\xb1u\xc9\xd0\xd16~JEGm\xe4\x1e@\x9dG\xe4@\xdf\xba\'\x8b\x1cD\xc7\xec\xd1@}tR\xd9P\xf4N\xe3\xd8x\xa0\x91\x17\xc2}\x13\b\xca\t(Z\xa3_\xa1\x90\x15T\xa4\xe7%\x98\xa7\xfb\x8bp/eq\x93\xbf\x1f =|\xf3\xb1\xfcR\xd8\nM,\xcb%@\'\x15\x88\xd8\xad\f\x91|\x95\x8fq+\x98\x81W\xba\x9f\xe0elOt\xbd\by\r\x87\x1c\xba\xbd\x8e+S>\xb8\xe29\x91h^x\xfb`\x00\xdd/\xa6\xb1\x16=\xa1bw\xc5I\xb1\x00'/549, 0x2) openat(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x80, 0x2) fcntl$addseals(r0, 0x409, 0x0) 06:11:35 executing program 1: pipe(&(0x7f0000000340)={0xffffffffffffffff}) pread64(r0, &(0x7f0000000440)=""/95, 0x5f, 0x6) execveat(r0, &(0x7f0000000080)='./file0\x00', &(0x7f00000001c0)=[&(0x7f00000000c0)='\x00', &(0x7f0000000180)='\x00'], &(0x7f0000000400)=[&(0x7f0000000200)='/dev/zero\x00', &(0x7f0000000240)='/dev/zero\x00', &(0x7f0000000300)='/dev/zero\x00'], 0x1000) socket$inet(0x2, 0x1, 0x0) perf_event_open(&(0x7f0000000100)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x22420, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ptrace$setopts(0x4200, 0x0, 0x5, 0x100050) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000004c00)={0xc0002100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) gettid() r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000), 0x380, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000000)='net/udp6\x00') read$hiddev(0xffffffffffffffff, &(0x7f0000001140)=""/212, 0xd4) fchmodat(r2, &(0x7f00000004c0)='./file0\x00', 0x0) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(r1, 0xc018937c, &(0x7f0000000380)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32=r0, @ANYBLOB="00000000000000002e2f66696cee8816"]) ioctl$TIOCSSOFTCAR(r3, 0x541a, &(0x7f00000003c0)=0x6) waitid$P_PIDFD(0x3, r1, &(0x7f0000000500), 0x2, &(0x7f0000000580)) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(r1, 0xc0189372, &(0x7f0000000040)={{0x1, 0x1, 0x18, r2, {0xffff}}, './file0\x00'}) 06:11:35 executing program 7: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x100f00, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000100000005000000000004000040000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000001000018000000c28500002b02", 0x66, 0x400}, {&(0x7f0000010100)="000000000000000000000000e8f7d2e8feeb4bf889ba053b02420ff8010040", 0x1f, 0x4e0}], 0x0, &(0x7f0000000140)=ANY=[]) 06:11:35 executing program 3: r0 = getpid() ioprio_get$pid(0x2, r0) r1 = getpid() ioprio_get$pid(0x2, r1) syz_mount_image$vfat(0x0, &(0x7f0000000040)='./file1\x00', 0x0, 0x0, &(0x7f00000000c0), 0x2002000, &(0x7f0000000400)=ANY=[@ANYRES16, @ANYBLOB="72e1af808ba473e6f37c85b113d8c4d9e1de4ed2968d2e01108c4795a941d14f6927393c8c3c458dd7454900d48719912efc18d580a8f841234284071012d7d5020eb5d56dc1ba5f1048adac4b928bf6cfd663b4cab43637cb979a9199a0246ec02345161783bc79585902603d7062084f05b744e31fcb4c3e81f3becabb7ad1fa5783f5e5e60ae912102fe8df0536bd074c03bd33742f35c5c44b5c3c9d693114367b7d966e"]) chdir(&(0x7f0000000140)='./file0\x00') ptrace$getenv(0x4201, r0, 0xfff, &(0x7f00000000c0)) openat(0xffffffffffffff9c, &(0x7f0000000000)='./file2\x00', 0x40c2, 0x0) r2 = perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x6, 0x0, 0xe}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r3 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r4 = fork() perf_event_open(&(0x7f0000000540)={0x4, 0x80, 0xeb, 0x0, 0x20, 0x0, 0x0, 0x2, 0x2820, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, @perf_config_ext={0xdc, 0x40}, 0x40000, 0x3, 0x8, 0x5, 0x6000000000000, 0x4, 0x5, 0x0, 0x3, 0x0, 0x3}, r4, 0x9, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000340)={0x0, 0x80, 0x2, 0x83, 0x1, 0x7, 0x0, 0x1f, 0x9ec17fc7a3e840c7, 0xc, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x9, 0x4, @perf_bp={&(0x7f0000000240), 0x1}, 0x404, 0x7, 0x3, 0x6, 0x800, 0x9, 0x3, 0x0, 0x7ff, 0x0, 0x9}, r4, 0x8, r2, 0x9) fork() setxattr$trusted_overlay_upper(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180), &(0x7f00000001c0)={0x0, 0xfb, 0x7a, 0x0, 0x2, "d54449275cb08faf62df87518e3ce16f", "9a61b461b0c63151b954990036d5e0163ceb48c6a801bb019e9e6fa7196a9372f804b9e9ca3fb3d85d1985d31346bbd5fd02b1c8223bf6388eb75498623e38ff88a99c5ce38698a32306b7d4e4b0fd4b03bfa568df17a42f725c6c33046b38b6e4a713dde1"}, 0x7a, 0x3) socket$nl_audit(0x10, 0x3, 0x9) chroot(&(0x7f0000000080)='./file1\x00') sendmsg$inet(r3, &(0x7f0000000780)={&(0x7f0000000000)={0x2, 0x0, @local}, 0x10, &(0x7f00000003c0)=[{&(0x7f0000000300)="6fb9", 0xffeb}], 0x1, &(0x7f0000000700)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @remote, @broadcast}}}], 0x20}, 0x0) [ 2210.883705] loop5: detected capacity change from 0 to 2048 06:11:35 executing program 6: ioctl$AUTOFS_DEV_IOCTL_CLOSEMOUNT(0xffffffffffffffff, 0xc0189375, 0x0) sendmsg$ETHTOOL_MSG_PAUSE_SET(0xffffffffffffffff, 0x0, 0x4000010) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = memfd_create(&(0x7f0000000400)='B\xdb/\x89\x03l\xdeb\xcb\xb54\xed\xbeLY\xb5Z\xe1\x12S\xf5G\xcc\xf3\xe9\x02h\v\xca(\x96\xe1C\xdf\x1c\xea\x85C\xfb\x10\x13\xfa\x03\x16\xcd\x17\xa2\x80\xa1z\xb4r\x95\xc3@\x9d\xa6\xf1\x92#}g\xd3`\xf7\xcez\xcb\xb3\x1a\xbb\xc48e\x8e\xb1&\xd1\x8a\xe6!\x7f\x8d\xea,qx\xa28\xbf\"\xc7e\x06L\xb06\xeb<$\xd7\xba\xe5\x01\x03\x94r\xab\xd4J\x03s\xaf\xf6A\xbfV\xfa\x1ew\x8d\xbf\x99I\x97\xd8\xd2\xe8\x11\xc4\x04\x00\x84\xd5i\xee\xaf\xae[E\x1f\xdd\xd7#rT+\xb621p\xaf[\x99\" 1\xeb\xc7)\xd2\x1dh\xf2\xd5s\xfd?\fa>\x9f;\xe5r\xe5\xbd\xb0|=\x8eZcPY\xf8\xbd\x13\xaa\x8b\xdf\xbc\x93u\xd5\xb0r\xfb\xde\xe7\xd9k\xe2\xc6\x1b\xf2o@&>\xf2M\xe7\x8c\xeb\xee\xf5\x02~\x85\x14\xf3\xc6v\xf15PE\x8c\xca\x16$\xc2\x01#\xb563\rbq\xbf64\xfaW\x17\xdfa\xe6\xca\x86\xd7\xf8\x81X\x9bg4\xc1\xdam\xcf=Rq6\xb0\xd4D=I\x1a\x0e\xd0\xabz\xe2\x19\x0fM\xad\xdco\xa4\xb2\x8c?\xc1\x10\xf273\xd00\xb3_\xe8\x9a*\xfcL\xea;\xc0\x9a\xdbx!N;\xb5x\t\xa4E\xbe\x93r\x04\xf5\xf0\xf5\x7f\x9a)\xf5\x1b\"\xa1\xd8\x06>\xc9\xe2r\xe9\xbb\xfe\xc0\b\x81\x98\x1c\xe2\xe0?\x8f\xa1\xbel\aN\x83@\xb1\x03)4A\x83\xd6\xcf\xf6\xb5\x82\xb7\x9dA\b$\xa2x\x8a@\xfaj~\xef\x93\xb1/L\x01\xe2\xba|\xf0\x01)PP\xcdl\x06\xfc\x15;qZ\xb1u\xc9\xd0\xd16~JEGm\xe4\x1e@\x9dG\xe4@\xdf\xba\'\x8b\x1cD\xc7\xec\xd1@}tR\xd9P\xf4N\xe3\xd8x\xa0\x91\x17\xc2}\x13\b\xca\t(Z\xa3_\xa1\x90\x15T\xa4\xe7%\x98\xa7\xfb\x8bp/eq\x93\xbf\x1f =|\xf3\xb1\xfcR\xd8\nM,\xcb%@\'\x15\x88\xd8\xad\f\x91|\x95\x8fq+\x98\x81W\xba\x9f\xe0elOt\xbd\by\r\x87\x1c\xba\xbd\x8e+S>\xb8\xe29\x91h^x\xfb`\x00\xdd/\xa6\xb1\x16=\xa1bw\xc5I\xb1\x00'/549, 0x2) fcntl$addseals(r0, 0x409, 0x0) [ 2210.899382] EXT4-fs (loop5): inodes count not valid: 10 vs 32 [ 2210.917007] loop5: detected capacity change from 0 to 2048 [ 2210.926998] EXT4-fs (loop5): inodes count not valid: 10 vs 32 [ 2210.939291] loop7: detected capacity change from 0 to 2055 [ 2210.978468] EXT4-fs (loop7): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 2210.979775] EXT4-fs (loop7): group descriptors corrupted! 06:11:35 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x100000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="0d0000000002000019000000900100000f000000000000000100000005000000000004000040000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000001000018000000c28500002b02", 0x66, 0x400}, {&(0x7f0000010100)="000000000000000000000000e8f7d2e8feeb4bf889ba053b02420ff8010040", 0x1f, 0x4e0}], 0x0, &(0x7f0000000140)=ANY=[]) 06:11:35 executing program 0: r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000040), 0xffffffffffffffff) syz_genetlink_get_family_id$ethtool(&(0x7f0000000100), 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_PAUSE_SET(0xffffffffffffffff, &(0x7f0000000440)={0x0, 0x0, 0x0}, 0x0) r2 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000080)='smaps\x00') pread64(r2, &(0x7f00000000c0)=""/98, 0x62, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x7fffffff) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(0xffffffffffffffff, 0xc0189374, &(0x7f0000000240)={{0x1, 0x1, 0x18, r0, {0x8}}, './file0\x00'}) dup3(0xffffffffffffffff, r2, 0x0) r3 = socket$inet_icmp_raw(0x2, 0x3, 0x1) syz_genetlink_get_family_id$ethtool(&(0x7f0000000180), r2) socket$nl_audit(0x10, 0x3, 0x9) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000040)={'wlan1\x00', 0x0}) sendmsg$inet(r3, &(0x7f0000000780)={&(0x7f0000000000)={0x2, 0x0, @local}, 0x10, &(0x7f00000003c0)=[{&(0x7f0000000300)="6fb9", 0xffeb}], 0x1, &(0x7f0000000700)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {r4, @remote, @broadcast}}}], 0x20}, 0x0) r5 = socket$inet_icmp_raw(0x2, 0x3, 0x1) socket$nl_audit(0x10, 0x3, 0x9) sendmsg$inet(r5, &(0x7f0000000780)={&(0x7f0000000000)={0x2, 0x0, @local}, 0x10, &(0x7f00000003c0)=[{&(0x7f0000000300)="6fb9", 0xffeb}], 0x1, &(0x7f0000000700)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @remote, @broadcast}}}], 0x20}, 0x0) sendmsg$ETHTOOL_MSG_LINKINFO_GET(r2, &(0x7f0000000200)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f00000001c0)={&(0x7f0000000340)=ANY=[@ANYBLOB='@\x00\x00\x00', @ANYRES16=r1, @ANYBLOB="000427bd7000ffdbdf25020000002c00018008000100", @ANYRES32=0x0, @ANYBLOB='\b\x00C\x00\x00\x00\x00\x00\b\x00!\x00', @ANYRES32=r4, @ANYBLOB="d5b921cac279671a02c4d90ed2cbc802c00000009852d9e901fb1700000000", @ANYRES32=0x0, @ANYBLOB], 0x40}, 0x1, 0x0, 0x0, 0x4}, 0xd0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000480), 0x1}, 0x603}, 0x0, 0xffffffefffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000040)=[{&(0x7f0000010000)="601c6d6b646f736689254300080120000400004000f8000020004000030000000000000001", 0x25}, {0x0, 0x0, 0x10000}], 0x0, &(0x7f0000000040)=ANY=[]) [ 2211.011764] loop7: detected capacity change from 0 to 2055 [ 2211.018119] loop4: detected capacity change from 0 to 256 [ 2211.039324] EXT4-fs (loop7): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 2211.040686] EXT4-fs (loop7): group descriptors corrupted! 06:11:35 executing program 6: ioctl$AUTOFS_DEV_IOCTL_CLOSEMOUNT(0xffffffffffffffff, 0xc0189375, 0x0) syz_genetlink_get_family_id$ethtool(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_PAUSE_SET(0xffffffffffffffff, 0x0, 0x0) r0 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000080), 0xffffffffffffffff) sendmsg$NL80211_CMD_TDLS_CHANNEL_SWITCH(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f0000000200)={&(0x7f00000000c0)={0x108, r0, 0x4, 0x70bd25, 0x25dfdbfb, {{}, {@val={0x8}, @val={0xc, 0x99, {0x5, 0x72}}}}, [@chandef_params=[@NL80211_ATTR_WIPHY_CHANNEL_TYPE={0x8}, @NL80211_ATTR_WIPHY_FREQ_OFFSET={0x8, 0x122, 0x352}, @NL80211_ATTR_WIPHY_FREQ_OFFSET={0x8, 0x122, 0x34}, @NL80211_ATTR_CENTER_FREQ1={0x8, 0xa0, 0x4}, @NL80211_ATTR_CENTER_FREQ2={0x8, 0xa1, 0x30000}, @NL80211_ATTR_CENTER_FREQ1={0x8, 0xa0, 0xb1}, @NL80211_ATTR_WIPHY_CHANNEL_TYPE={0x8, 0x27, 0x3}, @NL80211_ATTR_WIPHY_CHANNEL_TYPE={0x8, 0x27, 0x2}, @NL80211_ATTR_WIPHY_CHANNEL_TYPE={0x8, 0x27, 0x2}, @NL80211_ATTR_WIPHY_FREQ={0x8, 0x26, @random=0x96c}], @chandef_params=[@NL80211_ATTR_WIPHY_EDMG_CHANNELS={0x5, 0x118, 0x31}], @chandef_params=[@NL80211_ATTR_CENTER_FREQ1={0x8, 0xa0, 0x96}, @NL80211_ATTR_WIPHY_EDMG_CHANNELS={0x5, 0x118, 0x34}, @NL80211_ATTR_CENTER_FREQ1={0x8, 0xa0, 0x8}, @NL80211_ATTR_WIPHY_CHANNEL_TYPE={0x8, 0x27, 0x3}, @NL80211_ATTR_WIPHY_FREQ_OFFSET={0x8, 0x122, 0x41}, @NL80211_ATTR_WIPHY_EDMG_BW_CONFIG={0x5, 0x119, 0x6}, @NL80211_ATTR_WIPHY_EDMG_BW_CONFIG={0x5, 0x119, 0x1}, @NL80211_ATTR_CENTER_FREQ1={0x8, 0xa0, 0xbac5}], @NL80211_ATTR_OPER_CLASS={0x5}, @NL80211_ATTR_OPER_CLASS={0x5, 0xd6, 0x3f}, @NL80211_ATTR_OPER_CLASS={0x5, 0xd6, 0x2}, @NL80211_ATTR_MAC={0xa}, @chandef_params=[@NL80211_ATTR_CHANNEL_WIDTH={0x8, 0x9f, 0x2}, @NL80211_ATTR_CHANNEL_WIDTH={0x8, 0x9f, 0x2}, @NL80211_ATTR_WIPHY_EDMG_BW_CONFIG={0x5, 0x119, 0xc}], @NL80211_ATTR_MAC={0xa, 0x6, @device_b}]}, 0x108}, 0x1, 0x0, 0x0, 0x4008000}, 0x40040000) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = memfd_create(&(0x7f0000000400)='B\xdb/\x89\x03l\xdeb\xcb\xb54\xed\xbeLY\xb5Z\xe1\x12S\xf5G\xcc\xf3\xe9\x02h\v\xca(\x96\xe1C\xdf\x1c\xea\x85C\xfb\x10\x13\xfa\x03\x16\xcd\x17\xa2\x80\xa1z\xb4r\x95\xc3@\x9d\xa6\xf1\x92#}g\xd3`\xf7\xcez\xcb\xb3\x1a\xbb\xc48e\x8e\xb1&\xd1\x8a\xe6!\x7f\x8d\xea,qx\xa28\xbf\"\xc7e\x06L\xb06\xeb<$\xd7\xba\xe5\x01\x03\x94r\xab\xd4J\x03s\xaf\xf6A\xbfV\xfa\x1ew\x8d\xbf\x99I\x97\xd8\xd2\xe8\x11\xc4\x04\x00\x84\xd5i\xee\xaf\xae[E\x1f\xdd\xd7#rT+\xb621p\xaf[\x99\" 1\xeb\xc7)\xd2\x1dh\xf2\xd5s\xfd?\fa>\x9f;\xe5r\xe5\xbd\xb0|=\x8eZcPY\xf8\xbd\x13\xaa\x8b\xdf\xbc\x93u\xd5\xb0r\xfb\xde\xe7\xd9k\xe2\xc6\x1b\xf2o@&>\xf2M\xe7\x8c\xeb\xee\xf5\x02~\x85\x14\xf3\xc6v\xf15PE\x8c\xca\x16$\xc2\x01#\xb563\rbq\xbf64\xfaW\x17\xdfa\xe6\xca\x86\xd7\xf8\x81X\x9bg4\xc1\xdam\xcf=Rq6\xb0\xd4D=I\x1a\x0e\xd0\xabz\xe2\x19\x0fM\xad\xdco\xa4\xb2\x8c?\xc1\x10\xf273\xd00\xb3_\xe8\x9a*\xfcL\xea;\xc0\x9a\xdbx!N;\xb5x\t\xa4E\xbe\x93r\x04\xf5\xf0\xf5\x7f\x9a)\xf5\x1b\"\xa1\xd8\x06>\xc9\xe2r\xe9\xbb\xfe\xc0\b\x81\x98\x1c\xe2\xe0?\x8f\xa1\xbel\aN\x83@\xb1\x03)4A\x83\xd6\xcf\xf6\xb5\x82\xb7\x9dA\b$\xa2x\x8a@\xfaj~\xef\x93\xb1/L\x01\xe2\xba|\xf0\x01)PP\xcdl\x06\xfc\x15;qZ\xb1u\xc9\xd0\xd16~JEGm\xe4\x1e@\x9dG\xe4@\xdf\xba\'\x8b\x1cD\xc7\xec\xd1@}tR\xd9P\xf4N\xe3\xd8x\xa0\x91\x17\xc2}\x13\b\xca\t(Z\xa3_\xa1\x90\x15T\xa4\xe7%\x98\xa7\xfb\x8bp/eq\x93\xbf\x1f =|\xf3\xb1\xfcR\xd8\nM,\xcb%@\'\x15\x88\xd8\xad\f\x91|\x95\x8fq+\x98\x81W\xba\x9f\xe0elOt\xbd\by\r\x87\x1c\xba\xbd\x8e+S>\xb8\xe29\x91h^x\xfb`\x00\xdd/\xa6\xb1\x16=\xa1bw\xc5I\xb1\x00'/549, 0x2) fcntl$addseals(r1, 0x409, 0x0) 06:11:35 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="2000fe000002000019000000900100000f000000000000000100000005000000000004000040000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000001000018000000c28500002b02", 0x66, 0x400}, {&(0x7f0000010100)="000000000000000000000000e8f7d2e8feeb4bf889ba053b02420ff8010040", 0x1f, 0x4e0}], 0x0, &(0x7f0000000140)=ANY=[]) [ 2211.083694] FAT-fs (loop4): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) [ 2211.149721] loop5: detected capacity change from 0 to 2048 [ 2211.185068] EXT4-fs (loop5): inodes count not valid: 13 vs 32 [ 2211.192688] loop5: detected capacity change from 0 to 2048 [ 2211.201385] EXT4-fs (loop5): inodes count not valid: 13 vs 32 06:11:35 executing program 7: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x101004, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000100000005000000000004000040000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000001000018000000c28500002b02", 0x66, 0x400}, {&(0x7f0000010100)="000000000000000000000000e8f7d2e8feeb4bf889ba053b02420ff8010040", 0x1f, 0x4e0}], 0x0, &(0x7f0000000140)=ANY=[]) 06:11:35 executing program 1: pipe(&(0x7f0000000340)={0xffffffffffffffff}) pread64(r0, &(0x7f0000000440)=""/95, 0x5f, 0x6) execveat(r0, &(0x7f0000000080)='./file0\x00', &(0x7f00000001c0)=[&(0x7f00000000c0)='\x00', &(0x7f0000000180)='\x00'], &(0x7f0000000400)=[&(0x7f0000000200)='/dev/zero\x00', &(0x7f0000000240)='/dev/zero\x00', &(0x7f0000000300)='/dev/zero\x00'], 0x1000) socket$inet(0x2, 0x1, 0x0) perf_event_open(&(0x7f0000000100)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x22420, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ptrace$setopts(0x4200, 0x0, 0x5, 0x100050) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000004c00)={0xc0002100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) gettid() r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000), 0x380, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000000)='net/udp6\x00') read$hiddev(0xffffffffffffffff, &(0x7f0000001140)=""/212, 0xd4) fchmodat(r2, &(0x7f00000004c0)='./file0\x00', 0x0) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(r1, 0xc018937c, &(0x7f0000000380)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32=r0, @ANYBLOB="00000000000000002e2f66696cee8816"]) ioctl$TIOCSSOFTCAR(r3, 0x541a, &(0x7f00000003c0)=0x6) waitid$P_PIDFD(0x3, r1, &(0x7f0000000500), 0x2, &(0x7f0000000580)) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(r1, 0xc0189372, &(0x7f0000000040)={{0x1, 0x1, 0x18, r2, {0xffff}}, './file0\x00'}) 06:11:35 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="200000030002000019000000900100000f000000000000000100000005000000000004000040000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000001000018000000c28500002b02", 0x66, 0x400}, {&(0x7f0000010100)="000000000000000000000000e8f7d2e8feeb4bf889ba053b02420ff8010040", 0x1f, 0x4e0}], 0x0, &(0x7f0000000140)=ANY=[]) 06:11:35 executing program 6: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x100000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="0a0000000002000019000000900100000f000000000000000100000005000000000004000040000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000001000018000000c28500002b02", 0x66, 0x400}, {&(0x7f0000010100)="000000000000000000000000e8f7d2e8feeb4bf889ba053b02420ff8010040", 0x1f, 0x4e0}], 0x0, &(0x7f0000000140)=ANY=[]) [ 2211.270937] loop6: detected capacity change from 0 to 2048 [ 2211.304307] EXT4-fs (loop6): inodes count not valid: 10 vs 32 [ 2211.377863] loop7: detected capacity change from 0 to 2056 [ 2211.386310] EXT4-fs (loop7): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 2211.387091] EXT4-fs (loop7): group descriptors corrupted! [ 2211.407979] loop7: detected capacity change from 0 to 2056 [ 2211.414238] EXT4-fs (loop7): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 2211.414984] EXT4-fs (loop7): group descriptors corrupted! 06:11:53 executing program 7: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x101020, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000100000005000000000004000040000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000001000018000000c28500002b02", 0x66, 0x400}, {&(0x7f0000010100)="000000000000000000000000e8f7d2e8feeb4bf889ba053b02420ff8010040", 0x1f, 0x4e0}], 0x0, &(0x7f0000000140)=ANY=[]) 06:11:53 executing program 0: r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000040), 0xffffffffffffffff) syz_genetlink_get_family_id$ethtool(&(0x7f0000000100), 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_PAUSE_SET(0xffffffffffffffff, &(0x7f0000000440)={0x0, 0x0, 0x0}, 0x0) r2 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000080)='smaps\x00') pread64(r2, &(0x7f00000000c0)=""/98, 0x62, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x7fffffff) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(0xffffffffffffffff, 0xc0189374, &(0x7f0000000240)={{0x1, 0x1, 0x18, r0, {0x8}}, './file0\x00'}) dup3(0xffffffffffffffff, r2, 0x0) r3 = socket$inet_icmp_raw(0x2, 0x3, 0x1) syz_genetlink_get_family_id$ethtool(&(0x7f0000000180), r2) socket$nl_audit(0x10, 0x3, 0x9) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000040)={'wlan1\x00', 0x0}) sendmsg$inet(r3, &(0x7f0000000780)={&(0x7f0000000000)={0x2, 0x0, @local}, 0x10, &(0x7f00000003c0)=[{&(0x7f0000000300)="6fb9", 0xffeb}], 0x1, &(0x7f0000000700)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {r4, @remote, @broadcast}}}], 0x20}, 0x0) r5 = socket$inet_icmp_raw(0x2, 0x3, 0x1) socket$nl_audit(0x10, 0x3, 0x9) sendmsg$inet(r5, &(0x7f0000000780)={&(0x7f0000000000)={0x2, 0x0, @local}, 0x10, &(0x7f00000003c0)=[{&(0x7f0000000300)="6fb9", 0xffeb}], 0x1, &(0x7f0000000700)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @remote, @broadcast}}}], 0x20}, 0x0) sendmsg$ETHTOOL_MSG_LINKINFO_GET(r2, &(0x7f0000000200)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f00000001c0)={&(0x7f0000000340)=ANY=[@ANYBLOB='@\x00\x00\x00', @ANYRES16=r1, @ANYBLOB="000427bd7000ffdbdf25020000002c00018008000100", @ANYRES32=0x0, @ANYBLOB='\b\x00C\x00\x00\x00\x00\x00\b\x00!\x00', @ANYRES32=r4, @ANYBLOB="d5b921cac279671a02c4d90ed2cbc802c00000009852d9e901fb1700000000", @ANYRES32=0x0, @ANYBLOB], 0x40}, 0x1, 0x0, 0x0, 0x4}, 0xd0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000480), 0x1}, 0x603}, 0x0, 0xffffffefffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000040)=[{&(0x7f0000010000)="601c6d6b646f736689254300080120000400004000f8000020004000030000000000000001", 0x25}, {0x0, 0x0, 0x10000}], 0x0, &(0x7f0000000040)=ANY=[]) 06:11:53 executing program 3: r0 = getpid() ioprio_get$pid(0x2, r0) r1 = getpid() ioprio_get$pid(0x2, r1) syz_mount_image$vfat(0x0, &(0x7f0000000040)='./file1\x00', 0x0, 0x0, &(0x7f00000000c0), 0x2002000, &(0x7f0000000400)=ANY=[@ANYRES16, @ANYBLOB="72e1af808ba473e6f37c85b113d8c4d9e1de4ed2968d2e01108c4795a941d14f6927393c8c3c458dd7454900d48719912efc18d580a8f841234284071012d7d5020eb5d56dc1ba5f1048adac4b928bf6cfd663b4cab43637cb979a9199a0246ec02345161783bc79585902603d7062084f05b744e31fcb4c3e81f3becabb7ad1fa5783f5e5e60ae912102fe8df0536bd074c03bd33742f35c5c44b5c3c9d693114367b7d966e"]) chdir(&(0x7f0000000140)='./file0\x00') ptrace$getenv(0x4201, r0, 0xfff, &(0x7f00000000c0)) openat(0xffffffffffffff9c, &(0x7f0000000000)='./file2\x00', 0x40c2, 0x0) r2 = perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x6, 0x0, 0xe}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r3 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r4 = fork() perf_event_open(&(0x7f0000000540)={0x4, 0x80, 0xeb, 0x0, 0x20, 0x0, 0x0, 0x2, 0x2820, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, @perf_config_ext={0xdc, 0x40}, 0x40000, 0x3, 0x8, 0x5, 0x6000000000000, 0x4, 0x5, 0x0, 0x3, 0x0, 0x3}, r4, 0x9, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000340)={0x0, 0x80, 0x2, 0x83, 0x1, 0x7, 0x0, 0x1f, 0x9ec17fc7a3e840c7, 0xc, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x9, 0x4, @perf_bp={&(0x7f0000000240), 0x1}, 0x404, 0x7, 0x3, 0x6, 0x800, 0x9, 0x3, 0x0, 0x7ff, 0x0, 0x9}, r4, 0x8, r2, 0x9) fork() setxattr$trusted_overlay_upper(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180), &(0x7f00000001c0)={0x0, 0xfb, 0x7a, 0x0, 0x2, "d54449275cb08faf62df87518e3ce16f", "9a61b461b0c63151b954990036d5e0163ceb48c6a801bb019e9e6fa7196a9372f804b9e9ca3fb3d85d1985d31346bbd5fd02b1c8223bf6388eb75498623e38ff88a99c5ce38698a32306b7d4e4b0fd4b03bfa568df17a42f725c6c33046b38b6e4a713dde1"}, 0x7a, 0x3) socket$nl_audit(0x10, 0x3, 0x9) chroot(&(0x7f0000000080)='./file1\x00') sendmsg$inet(r3, &(0x7f0000000780)={&(0x7f0000000000)={0x2, 0x0, @local}, 0x10, &(0x7f00000003c0)=[{&(0x7f0000000300)="6fb9", 0xffeb}], 0x1, &(0x7f0000000700)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @remote, @broadcast}}}], 0x20}, 0x0) 06:11:53 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="200080040002000019000000900100000f000000000000000100000005000000000004000040000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000001000018000000c28500002b02", 0x66, 0x400}, {&(0x7f0000010100)="000000000000000000000000e8f7d2e8feeb4bf889ba053b02420ff8010040", 0x1f, 0x4e0}], 0x0, &(0x7f0000000140)=ANY=[]) 06:11:53 executing program 4: r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000040), 0xffffffffffffffff) syz_genetlink_get_family_id$ethtool(&(0x7f0000000100), 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_PAUSE_SET(0xffffffffffffffff, &(0x7f0000000440)={0x0, 0x0, 0x0}, 0x0) r2 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000080)='smaps\x00') pread64(r2, &(0x7f00000000c0)=""/98, 0x62, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x7fffffff) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(0xffffffffffffffff, 0xc0189374, &(0x7f0000000240)={{0x1, 0x1, 0x18, r0, {0x8}}, './file0\x00'}) dup3(0xffffffffffffffff, r2, 0x0) r3 = socket$inet_icmp_raw(0x2, 0x3, 0x1) syz_genetlink_get_family_id$ethtool(&(0x7f0000000180), r2) socket$nl_audit(0x10, 0x3, 0x9) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000040)={'wlan1\x00', 0x0}) sendmsg$inet(r3, &(0x7f0000000780)={&(0x7f0000000000)={0x2, 0x0, @local}, 0x10, &(0x7f00000003c0)=[{&(0x7f0000000300)="6fb9", 0xffeb}], 0x1, &(0x7f0000000700)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {r4, @remote, @broadcast}}}], 0x20}, 0x0) r5 = socket$inet_icmp_raw(0x2, 0x3, 0x1) socket$nl_audit(0x10, 0x3, 0x9) sendmsg$inet(r5, &(0x7f0000000780)={&(0x7f0000000000)={0x2, 0x0, @local}, 0x10, &(0x7f00000003c0)=[{&(0x7f0000000300)="6fb9", 0xffeb}], 0x1, &(0x7f0000000700)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @remote, @broadcast}}}], 0x20}, 0x0) sendmsg$ETHTOOL_MSG_LINKINFO_GET(r2, &(0x7f0000000200)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f00000001c0)={&(0x7f0000000340)=ANY=[@ANYBLOB='@\x00\x00\x00', @ANYRES16=r1, @ANYBLOB="000427bd7000ffdbdf25020000002c00018008000100", @ANYRES32=0x0, @ANYBLOB='\b\x00C\x00\x00\x00\x00\x00\b\x00!\x00', @ANYRES32=r4, @ANYBLOB="d5b921cac279671a02c4d90ed2cbc802c00000009852d9e901fb170000000000", @ANYRES32=0x0, @ANYBLOB], 0x40}, 0x1, 0x0, 0x0, 0x4}, 0xd0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000480), 0x1}, 0x603}, 0x0, 0xffffffefffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000040)=[{&(0x7f0000010000)="601c6d6b646f736689254300080120000400004000f8000020004000030000000000000001", 0x25}, {0x0, 0x0, 0x10000}], 0x0, &(0x7f0000000040)=ANY=[]) 06:11:53 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x100000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="0e0000000002000019000000900100000f000000000000000100000005000000000004000040000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000001000018000000c28500002b02", 0x66, 0x400}, {&(0x7f0000010100)="000000000000000000000000e8f7d2e8feeb4bf889ba053b02420ff8010040", 0x1f, 0x4e0}], 0x0, &(0x7f0000000140)=ANY=[]) 06:11:53 executing program 6: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x100000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="0a0000000002000019000000900100000f000000000000000100000005000000000004000040000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000001000018000000c28500002b02", 0x66, 0x400}, {&(0x7f0000010100)="000000000000000000000000e8f7d2e8feeb4bf889ba053b02420ff8010040", 0x1f, 0x4e0}], 0x0, &(0x7f0000000140)=ANY=[]) 06:11:53 executing program 1: pipe(&(0x7f0000000340)={0xffffffffffffffff}) pread64(r0, &(0x7f0000000440)=""/95, 0x5f, 0x6) execveat(r0, &(0x7f0000000080)='./file0\x00', &(0x7f00000001c0)=[&(0x7f00000000c0)='\x00', &(0x7f0000000180)='\x00'], &(0x7f0000000400)=[&(0x7f0000000200)='/dev/zero\x00', &(0x7f0000000240)='/dev/zero\x00', &(0x7f0000000300)='/dev/zero\x00'], 0x1000) socket$inet(0x2, 0x1, 0x0) perf_event_open(&(0x7f0000000100)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x22420, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ptrace$setopts(0x4200, 0x0, 0x5, 0x100050) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000004c00)={0xc0002100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) gettid() r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000), 0x380, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000000)='net/udp6\x00') read$hiddev(0xffffffffffffffff, &(0x7f0000001140)=""/212, 0xd4) fchmodat(r2, &(0x7f00000004c0)='./file0\x00', 0x0) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(r1, 0xc018937c, &(0x7f0000000380)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32=r0, @ANYBLOB="00000000000000002e2f66696cee8816"]) ioctl$TIOCSSOFTCAR(r3, 0x541a, &(0x7f00000003c0)=0x6) waitid$P_PIDFD(0x3, r1, &(0x7f0000000500), 0x2, &(0x7f0000000580)) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(r1, 0xc0189372, &(0x7f0000000040)={{0x1, 0x1, 0x18, r2, {0xffff}}, './file0\x00'}) [ 2229.630340] loop6: detected capacity change from 0 to 2048 [ 2229.638514] loop5: detected capacity change from 0 to 2048 [ 2229.640506] loop7: detected capacity change from 0 to 2056 [ 2229.668769] EXT4-fs (loop6): inodes count not valid: 10 vs 32 [ 2229.670785] EXT4-fs (loop5): inodes count not valid: 14 vs 32 [ 2229.678689] EXT4-fs (loop7): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 2229.680040] EXT4-fs (loop7): group descriptors corrupted! [ 2229.706899] loop4: detected capacity change from 0 to 256 [ 2229.707529] loop5: detected capacity change from 0 to 2048 [ 2229.722949] loop7: detected capacity change from 0 to 2056 [ 2229.735663] EXT4-fs (loop5): inodes count not valid: 14 vs 32 [ 2229.746765] EXT4-fs (loop7): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 2229.748311] EXT4-fs (loop7): group descriptors corrupted! [ 2229.767658] FAT-fs (loop4): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) 06:11:54 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="200000050002000019000000900100000f000000000000000100000005000000000004000040000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000001000018000000c28500002b02", 0x66, 0x400}, {&(0x7f0000010100)="000000000000000000000000e8f7d2e8feeb4bf889ba053b02420ff8010040", 0x1f, 0x4e0}], 0x0, &(0x7f0000000140)=ANY=[]) 06:11:54 executing program 6: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x100000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="0a0000000002000019000000900100000f000000000000000100000005000000000004000040000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000001000018000000c28500002b02", 0x66, 0x400}, {&(0x7f0000010100)="000000000000000000000000e8f7d2e8feeb4bf889ba053b02420ff8010040", 0x1f, 0x4e0}], 0x0, &(0x7f0000000140)=ANY=[]) 06:11:54 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x100000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="250000000002000019000000900100000f000000000000000100000005000000000004000040000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000001000018000000c28500002b02", 0x66, 0x400}, {&(0x7f0000010100)="000000000000000000000000e8f7d2e8feeb4bf889ba053b02420ff8010040", 0x1f, 0x4e0}], 0x0, &(0x7f0000000140)=ANY=[]) 06:11:54 executing program 7: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x101100, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000100000005000000000004000040000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000001000018000000c28500002b02", 0x66, 0x400}, {&(0x7f0000010100)="000000000000000000000000e8f7d2e8feeb4bf889ba053b02420ff8010040", 0x1f, 0x4e0}], 0x0, &(0x7f0000000140)=ANY=[]) 06:11:54 executing program 0: pipe(&(0x7f0000000340)={0xffffffffffffffff}) pread64(r0, &(0x7f0000000440)=""/95, 0x5f, 0x6) execveat(r0, &(0x7f0000000080)='./file0\x00', &(0x7f00000001c0)=[&(0x7f00000000c0)='\x00', &(0x7f0000000180)='\x00'], &(0x7f0000000400)=[&(0x7f0000000200)='/dev/zero\x00', &(0x7f0000000240)='/dev/zero\x00', &(0x7f0000000300)='/dev/zero\x00'], 0x1000) socket$inet(0x2, 0x1, 0x0) perf_event_open(&(0x7f0000000100)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x22420, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ptrace$setopts(0x4200, 0x0, 0x5, 0x100050) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000004c00)={0xc0002100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) gettid() r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000000)='net/udp6\x00') read$hiddev(r2, &(0x7f0000001140)=""/212, 0xd4) fchmodat(r2, &(0x7f00000004c0)='./file0\x00', 0x0) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(r1, 0xc018937c, &(0x7f0000000380)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32=r0, @ANYBLOB="00000000000000002e2f66696cee8816"]) ioctl$TIOCSSOFTCAR(r3, 0x541a, &(0x7f00000003c0)=0x6) waitid$P_PIDFD(0x3, r1, &(0x7f0000000500), 0x2, &(0x7f0000000580)) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(r1, 0xc0189372, &(0x7f0000000040)={{0x1, 0x1, 0x18, r2, {0xffff}}, './file0\x00'}) 06:11:54 executing program 4: r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000040), 0xffffffffffffffff) syz_genetlink_get_family_id$ethtool(&(0x7f0000000100), 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_PAUSE_SET(0xffffffffffffffff, &(0x7f0000000440)={0x0, 0x0, 0x0}, 0x0) r2 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000080)='smaps\x00') pread64(r2, &(0x7f00000000c0)=""/98, 0x62, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x7fffffff) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(0xffffffffffffffff, 0xc0189374, &(0x7f0000000240)={{0x1, 0x1, 0x18, r0, {0x8}}, './file0\x00'}) dup3(0xffffffffffffffff, r2, 0x0) r3 = socket$inet_icmp_raw(0x2, 0x3, 0x1) syz_genetlink_get_family_id$ethtool(&(0x7f0000000180), r2) socket$nl_audit(0x10, 0x3, 0x9) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000040)={'wlan1\x00', 0x0}) sendmsg$inet(r3, &(0x7f0000000780)={&(0x7f0000000000)={0x2, 0x0, @local}, 0x10, &(0x7f00000003c0)=[{&(0x7f0000000300)="6fb9", 0xffeb}], 0x1, &(0x7f0000000700)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {r4, @remote, @broadcast}}}], 0x20}, 0x0) r5 = socket$inet_icmp_raw(0x2, 0x3, 0x1) socket$nl_audit(0x10, 0x3, 0x9) sendmsg$inet(r5, &(0x7f0000000780)={&(0x7f0000000000)={0x2, 0x0, @local}, 0x10, &(0x7f00000003c0)=[{&(0x7f0000000300)="6fb9", 0xffeb}], 0x1, &(0x7f0000000700)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @remote, @broadcast}}}], 0x20}, 0x0) sendmsg$ETHTOOL_MSG_LINKINFO_GET(r2, &(0x7f0000000200)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f00000001c0)={&(0x7f0000000340)=ANY=[@ANYBLOB='@\x00\x00\x00', @ANYRES16=r1, @ANYBLOB="000427bd7000ffdbdf25020000002c00018008000100", @ANYRES32=0x0, @ANYBLOB='\b\x00C\x00\x00\x00\x00\x00\b\x00!\x00', @ANYBLOB="d5b921cac279671a02c4d90ed2cbc802c00000009852d9e901fb17000000000000", @ANYRES32=0x0, @ANYBLOB], 0x40}, 0x1, 0x0, 0x0, 0x4}, 0xd0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000480), 0x1}, 0x603}, 0x0, 0xffffffefffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000040)=[{&(0x7f0000010000)="601c6d6b646f736689254300080120000400004000f8000020004000030000000000000001", 0x25}, {0x0, 0x0, 0x10000}], 0x0, &(0x7f0000000040)=ANY=[]) [ 2229.979238] loop6: detected capacity change from 0 to 2048 [ 2230.009355] loop5: detected capacity change from 0 to 2048 [ 2230.025582] EXT4-fs (loop6): inodes count not valid: 10 vs 32 [ 2230.046092] EXT4-fs (loop5): inodes count not valid: 37 vs 32 06:11:54 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="200000060002000019000000900100000f000000000000000100000005000000000004000040000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000001000018000000c28500002b02", 0x66, 0x400}, {&(0x7f0000010100)="000000000000000000000000e8f7d2e8feeb4bf889ba053b02420ff8010040", 0x1f, 0x4e0}], 0x0, &(0x7f0000000140)=ANY=[]) 06:11:54 executing program 1: pipe(&(0x7f0000000340)={0xffffffffffffffff}) pread64(r0, &(0x7f0000000440)=""/95, 0x5f, 0x6) execveat(r0, &(0x7f0000000080)='./file0\x00', &(0x7f00000001c0)=[&(0x7f00000000c0)='\x00', &(0x7f0000000180)='\x00'], &(0x7f0000000400)=[&(0x7f0000000200)='/dev/zero\x00', &(0x7f0000000240)='/dev/zero\x00', &(0x7f0000000300)='/dev/zero\x00'], 0x1000) socket$inet(0x2, 0x1, 0x0) perf_event_open(&(0x7f0000000100)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x22420, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ptrace$setopts(0x4200, 0x0, 0x5, 0x100050) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000004c00)={0xc0002100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) gettid() r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000), 0x380, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000000)='net/udp6\x00') read$hiddev(r2, 0x0, 0x0) fchmodat(r2, &(0x7f00000004c0)='./file0\x00', 0x0) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(r1, 0xc018937c, &(0x7f0000000380)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32=r0, @ANYBLOB="00000000000000002e2f66696cee8816"]) ioctl$TIOCSSOFTCAR(r3, 0x541a, &(0x7f00000003c0)=0x6) waitid$P_PIDFD(0x3, r1, &(0x7f0000000500), 0x2, &(0x7f0000000580)) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(r1, 0xc0189372, &(0x7f0000000040)={{0x1, 0x1, 0x18, r2, {0xffff}}, './file0\x00'}) [ 2230.075051] loop5: detected capacity change from 0 to 2048 [ 2230.097472] EXT4-fs (loop5): inodes count not valid: 37 vs 32 [ 2230.104141] loop7: detected capacity change from 0 to 2056 [ 2230.135681] EXT4-fs (loop7): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 2230.137200] EXT4-fs (loop7): group descriptors corrupted! [ 2230.169284] loop7: detected capacity change from 0 to 2056 [ 2230.207738] EXT4-fs (loop7): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 2230.209137] EXT4-fs (loop7): group descriptors corrupted! [ 2230.226717] loop4: detected capacity change from 0 to 256 [ 2230.270286] FAT-fs (loop4): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) [ 2246.482133] loop7: detected capacity change from 0 to 2064 06:12:10 executing program 6: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x100000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="0a0000000002000019000000900100000f000000000000000100000005000000000004000040000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000001000018000000c28500002b02", 0x66, 0x400}, {&(0x7f0000010100)="000000000000000000000000e8f7d2e8feeb4bf889ba053b02420ff8010040", 0x1f, 0x4e0}], 0x0, &(0x7f0000000140)=ANY=[]) 06:12:10 executing program 1: pipe(&(0x7f0000000340)={0xffffffffffffffff}) pread64(r0, &(0x7f0000000440)=""/95, 0x5f, 0x6) execveat(r0, &(0x7f0000000080)='./file0\x00', &(0x7f00000001c0)=[&(0x7f00000000c0)='\x00', &(0x7f0000000180)='\x00'], &(0x7f0000000400)=[&(0x7f0000000200)='/dev/zero\x00', &(0x7f0000000240)='/dev/zero\x00', &(0x7f0000000300)='/dev/zero\x00'], 0x1000) socket$inet(0x2, 0x1, 0x0) perf_event_open(&(0x7f0000000100)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x22420, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ptrace$setopts(0x4200, 0x0, 0x5, 0x100050) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000004c00)={0xc0002100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) gettid() r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000), 0x380, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000000)='net/udp6\x00') read$hiddev(r2, 0x0, 0x0) fchmodat(r2, &(0x7f00000004c0)='./file0\x00', 0x0) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(r1, 0xc018937c, &(0x7f0000000380)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32=r0, @ANYBLOB="00000000000000002e2f66696cee8816"]) ioctl$TIOCSSOFTCAR(r3, 0x541a, &(0x7f00000003c0)=0x6) waitid$P_PIDFD(0x3, r1, &(0x7f0000000500), 0x2, &(0x7f0000000580)) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(r1, 0xc0189372, &(0x7f0000000040)={{0x1, 0x1, 0x18, r2, {0xffff}}, './file0\x00'}) 06:12:10 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x100bd0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000100000005000000000004000040000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000001000018000000c28500002b02", 0x66, 0x400}, {&(0x7f0000010100)="000000000000000000000000e8f7d2e8feeb4bf889ba053b02420ff8010040", 0x1f, 0x4e0}], 0x0, &(0x7f0000000140)=ANY=[]) 06:12:10 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="200000070002000019000000900100000f000000000000000100000005000000000004000040000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000001000018000000c28500002b02", 0x66, 0x400}, {&(0x7f0000010100)="000000000000000000000000e8f7d2e8feeb4bf889ba053b02420ff8010040", 0x1f, 0x4e0}], 0x0, &(0x7f0000000140)=ANY=[]) 06:12:10 executing program 3: r0 = getpid() ioprio_get$pid(0x2, r0) r1 = getpid() ioprio_get$pid(0x2, r1) syz_mount_image$vfat(0x0, &(0x7f0000000040)='./file1\x00', 0x0, 0x0, &(0x7f00000000c0), 0x2002000, &(0x7f0000000400)=ANY=[@ANYRES16, @ANYBLOB="72e1af808ba473e6f37c85b113d8c4d9e1de4ed2968d2e01108c4795a941d14f6927393c8c3c458dd7454900d48719912efc18d580a8f841234284071012d7d5020eb5d56dc1ba5f1048adac4b928bf6cfd663b4cab43637cb979a9199a0246ec02345161783bc79585902603d7062084f05b744e31fcb4c3e81f3becabb7ad1fa5783f5e5e60ae912102fe8df0536bd074c03bd33742f35c5c44b5c3c9d693114367b7d966e"]) chdir(&(0x7f0000000140)='./file0\x00') ptrace$getenv(0x4201, r0, 0xfff, &(0x7f00000000c0)) openat(0xffffffffffffff9c, &(0x7f0000000000)='./file2\x00', 0x40c2, 0x0) r2 = perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x6, 0x0, 0xe}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r3 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r4 = fork() perf_event_open(&(0x7f0000000540)={0x4, 0x80, 0xeb, 0x0, 0x20, 0x0, 0x0, 0x2, 0x2820, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, @perf_config_ext={0xdc, 0x40}, 0x40000, 0x3, 0x8, 0x5, 0x6000000000000, 0x4, 0x5, 0x0, 0x3, 0x0, 0x3}, r4, 0x9, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000340)={0x0, 0x80, 0x2, 0x83, 0x1, 0x7, 0x0, 0x1f, 0x9ec17fc7a3e840c7, 0xc, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x9, 0x4, @perf_bp={&(0x7f0000000240), 0x1}, 0x404, 0x7, 0x3, 0x6, 0x800, 0x9, 0x3, 0x0, 0x7ff, 0x0, 0x9}, r4, 0x8, r2, 0x9) fork() setxattr$trusted_overlay_upper(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180), &(0x7f00000001c0)={0x0, 0xfb, 0x7a, 0x0, 0x2, "d54449275cb08faf62df87518e3ce16f", "9a61b461b0c63151b954990036d5e0163ceb48c6a801bb019e9e6fa7196a9372f804b9e9ca3fb3d85d1985d31346bbd5fd02b1c8223bf6388eb75498623e38ff88a99c5ce38698a32306b7d4e4b0fd4b03bfa568df17a42f725c6c33046b38b6e4a713dde1"}, 0x7a, 0x3) socket$nl_audit(0x10, 0x3, 0x9) chroot(&(0x7f0000000080)='./file1\x00') sendmsg$inet(r3, &(0x7f0000000780)={&(0x7f0000000000)={0x2, 0x0, @local}, 0x10, &(0x7f00000003c0)=[{&(0x7f0000000300)="6fb9", 0xffeb}], 0x1, &(0x7f0000000700)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @remote, @broadcast}}}], 0x20}, 0x0) 06:12:10 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x100000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="260000000002000019000000900100000f000000000000000100000005000000000004000040000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000001000018000000c28500002b02", 0x66, 0x400}, {&(0x7f0000010100)="000000000000000000000000e8f7d2e8feeb4bf889ba053b02420ff8010040", 0x1f, 0x4e0}], 0x0, &(0x7f0000000140)=ANY=[]) 06:12:10 executing program 7: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x102000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000100000005000000000004000040000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000001000018000000c28500002b02", 0x66, 0x400}, {&(0x7f0000010100)="000000000000000000000000e8f7d2e8feeb4bf889ba053b02420ff8010040", 0x1f, 0x4e0}], 0x0, &(0x7f0000000140)=ANY=[]) 06:12:10 executing program 4: r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000040), 0xffffffffffffffff) syz_genetlink_get_family_id$ethtool(&(0x7f0000000100), 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_PAUSE_SET(0xffffffffffffffff, &(0x7f0000000440)={0x0, 0x0, 0x0}, 0x0) r2 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000080)='smaps\x00') pread64(r2, &(0x7f00000000c0)=""/98, 0x62, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x7fffffff) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(0xffffffffffffffff, 0xc0189374, &(0x7f0000000240)={{0x1, 0x1, 0x18, r0, {0x8}}, './file0\x00'}) dup3(0xffffffffffffffff, r2, 0x0) r3 = socket$inet_icmp_raw(0x2, 0x3, 0x1) syz_genetlink_get_family_id$ethtool(&(0x7f0000000180), r2) socket$nl_audit(0x10, 0x3, 0x9) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000040)={'wlan1\x00', 0x0}) sendmsg$inet(r3, &(0x7f0000000780)={&(0x7f0000000000)={0x2, 0x0, @local}, 0x10, &(0x7f00000003c0)=[{&(0x7f0000000300)="6fb9", 0xffeb}], 0x1, &(0x7f0000000700)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {r4, @remote, @broadcast}}}], 0x20}, 0x0) r5 = socket$inet_icmp_raw(0x2, 0x3, 0x1) socket$nl_audit(0x10, 0x3, 0x9) sendmsg$inet(r5, &(0x7f0000000780)={&(0x7f0000000000)={0x2, 0x0, @local}, 0x10, &(0x7f00000003c0)=[{&(0x7f0000000300)="6fb9", 0xffeb}], 0x1, &(0x7f0000000700)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @remote, @broadcast}}}], 0x20}, 0x0) sendmsg$ETHTOOL_MSG_LINKINFO_GET(r2, &(0x7f0000000200)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f00000001c0)={&(0x7f0000000340)=ANY=[@ANYBLOB='@\x00\x00\x00', @ANYRES16=r1, @ANYBLOB="000427bd7000ffdbdf25020000002c00018008000100", @ANYRES32=0x0, @ANYBLOB='\b\x00C\x00\x00\x00\x00\x00\b\x00!\x00', @ANYBLOB="d5b921cac279671a02c4d90ed2cbc802c00000009852d9e901fb17000000000000", @ANYRES32=0x0, @ANYBLOB], 0x40}, 0x1, 0x0, 0x0, 0x4}, 0xd0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000480), 0x1}, 0x603}, 0x0, 0xffffffefffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000040)=[{&(0x7f0000010000)="601c6d6b646f736689254300080120000400004000f8000020004000030000000000000001", 0x25}, {0x0, 0x0, 0x10000}], 0x0, &(0x7f0000000040)=ANY=[]) [ 2246.490653] EXT4-fs (loop7): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 2246.491347] EXT4-fs (loop7): group descriptors corrupted! [ 2246.523671] loop7: detected capacity change from 0 to 2064 [ 2246.526802] EXT4-fs (loop7): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 2246.527554] EXT4-fs (loop7): group descriptors corrupted! [ 2246.547342] loop5: detected capacity change from 0 to 2048 06:12:10 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x100000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="050000000002000019000000900100000f000000000000000100000005000000000004000040000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000001000018000000c28500002b02", 0x66, 0x400}, {&(0x7f0000010100)="000000000000000000000000e8f7d2e8feeb4bf889ba053b02420ff8010040", 0x1f, 0x4e0}], 0x0, &(0x7f0000000140)=ANY=[]) [ 2246.573322] EXT4-fs (loop5): inodes count not valid: 38 vs 32 [ 2246.577304] loop6: detected capacity change from 0 to 2048 [ 2246.592960] loop4: detected capacity change from 0 to 256 [ 2246.596261] loop5: detected capacity change from 0 to 2048 06:12:10 executing program 7: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x102010, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000100000005000000000004000040000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000001000018000000c28500002b02", 0x66, 0x400}, {&(0x7f0000010100)="000000000000000000000000e8f7d2e8feeb4bf889ba053b02420ff8010040", 0x1f, 0x4e0}], 0x0, &(0x7f0000000140)=ANY=[]) [ 2246.612495] EXT4-fs (loop5): inodes count not valid: 38 vs 32 [ 2246.625507] FAT-fs (loop4): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) [ 2246.676272] loop7: detected capacity change from 0 to 2064 06:12:10 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x100000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="2f0000000002000019000000900100000f000000000000000100000005000000000004000040000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000001000018000000c28500002b02", 0x66, 0x400}, {&(0x7f0000010100)="000000000000000000000000e8f7d2e8feeb4bf889ba053b02420ff8010040", 0x1f, 0x4e0}], 0x0, &(0x7f0000000140)=ANY=[]) [ 2246.692573] EXT4-fs (loop7): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 2246.693297] EXT4-fs (loop7): group descriptors corrupted! [ 2246.708731] loop7: detected capacity change from 0 to 2064 [ 2246.732265] EXT4-fs (loop7): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 2246.733059] EXT4-fs (loop7): group descriptors corrupted! [ 2246.771318] loop5: detected capacity change from 0 to 2048 06:12:11 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="2000c0090002000019000000900100000f000000000000000100000005000000000004000040000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000001000018000000c28500002b02", 0x66, 0x400}, {&(0x7f0000010100)="000000000000000000000000e8f7d2e8feeb4bf889ba053b02420ff8010040", 0x1f, 0x4e0}], 0x0, &(0x7f0000000140)=ANY=[]) [ 2246.790120] EXT4-fs (loop5): inodes count not valid: 47 vs 32 06:12:11 executing program 4: r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000040), 0xffffffffffffffff) syz_genetlink_get_family_id$ethtool(&(0x7f0000000100), 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_PAUSE_SET(0xffffffffffffffff, &(0x7f0000000440)={0x0, 0x0, 0x0}, 0x0) r2 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000080)='smaps\x00') pread64(r2, &(0x7f00000000c0)=""/98, 0x62, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x7fffffff) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(0xffffffffffffffff, 0xc0189374, &(0x7f0000000240)={{0x1, 0x1, 0x18, r0, {0x8}}, './file0\x00'}) dup3(0xffffffffffffffff, r2, 0x0) r3 = socket$inet_icmp_raw(0x2, 0x3, 0x1) syz_genetlink_get_family_id$ethtool(&(0x7f0000000180), r2) socket$nl_audit(0x10, 0x3, 0x9) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000040)={'wlan1\x00', 0x0}) sendmsg$inet(r3, &(0x7f0000000780)={&(0x7f0000000000)={0x2, 0x0, @local}, 0x10, &(0x7f00000003c0)=[{&(0x7f0000000300)="6fb9", 0xffeb}], 0x1, &(0x7f0000000700)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {r4, @remote, @broadcast}}}], 0x20}, 0x0) r5 = socket$inet_icmp_raw(0x2, 0x3, 0x1) socket$nl_audit(0x10, 0x3, 0x9) sendmsg$inet(r5, &(0x7f0000000780)={&(0x7f0000000000)={0x2, 0x0, @local}, 0x10, &(0x7f00000003c0)=[{&(0x7f0000000300)="6fb9", 0xffeb}], 0x1, &(0x7f0000000700)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @remote, @broadcast}}}], 0x20}, 0x0) sendmsg$ETHTOOL_MSG_LINKINFO_GET(r2, &(0x7f0000000200)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f00000001c0)={&(0x7f0000000340)=ANY=[@ANYBLOB='@\x00\x00\x00', @ANYRES16=r1, @ANYBLOB="000427bd7000ffdbdf25020000002c00018008000100", @ANYRES32=0x0, @ANYBLOB='\b\x00C\x00\x00\x00\x00\x00\b\x00!\x00', @ANYBLOB="d5b921cac279671a02c4d90ed2cbc802c00000009852d9e901fb17000000000000", @ANYRES32=0x0, @ANYBLOB], 0x40}, 0x1, 0x0, 0x0, 0x4}, 0xd0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000480), 0x1}, 0x603}, 0x0, 0xffffffefffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000040)=[{&(0x7f0000010000)="601c6d6b646f736689254300080120000400004000f8000020004000030000000000000001", 0x25}, {0x0, 0x0, 0x10000}], 0x0, &(0x7f0000000040)=ANY=[]) 06:12:11 executing program 0: pipe(&(0x7f0000000340)={0xffffffffffffffff}) pread64(r0, &(0x7f0000000440)=""/95, 0x5f, 0x6) execveat(r0, &(0x7f0000000080)='./file0\x00', &(0x7f00000001c0)=[&(0x7f00000000c0)='\x00', &(0x7f0000000180)='\x00'], &(0x7f0000000400)=[&(0x7f0000000200)='/dev/zero\x00', &(0x7f0000000240)='/dev/zero\x00', &(0x7f0000000300)='/dev/zero\x00'], 0x1000) socket$inet(0x2, 0x1, 0x0) perf_event_open(&(0x7f0000000100)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x22420, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ptrace$setopts(0x4200, 0x0, 0x5, 0x100050) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000004c00)={0xc0002100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) gettid() r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000000)='net/udp6\x00') read$hiddev(r2, &(0x7f0000001140)=""/212, 0xd4) fchmodat(r2, &(0x7f00000004c0)='./file0\x00', 0x0) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(r1, 0xc018937c, &(0x7f0000000380)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32=r0, @ANYBLOB="00000000000000002e2f66696cee8816"]) ioctl$TIOCSSOFTCAR(r3, 0x541a, &(0x7f00000003c0)=0x6) waitid$P_PIDFD(0x3, r1, &(0x7f0000000500), 0x2, &(0x7f0000000580)) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(r1, 0xc0189372, &(0x7f0000000040)={{0x1, 0x1, 0x18, r2, {0xffff}}, './file0\x00'}) 06:12:11 executing program 6: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x100000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="0a0000000002000019000000900100000f000000000000000100000005000000000004000040000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000001000018000000c28500002b02", 0x66, 0x400}, {&(0x7f0000010100)="000000000000000000000000e8f7d2e8feeb4bf889ba053b02420ff8010040", 0x1f, 0x4e0}], 0x0, &(0x7f0000000140)=ANY=[]) [ 2246.803169] loop5: detected capacity change from 0 to 2048 [ 2246.815882] EXT4-fs (loop5): inodes count not valid: 47 vs 32 [ 2246.864625] loop6: detected capacity change from 0 to 2048 [ 2246.920378] loop4: detected capacity change from 0 to 256 [ 2246.966583] FAT-fs (loop4): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) 06:12:26 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x100000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="460000000002000019000000900100000f000000000000000100000005000000000004000040000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000001000018000000c28500002b02", 0x66, 0x400}, {&(0x7f0000010100)="000000000000000000000000e8f7d2e8feeb4bf889ba053b02420ff8010040", 0x1f, 0x4e0}], 0x0, &(0x7f0000000140)=ANY=[]) 06:12:26 executing program 7: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x102600, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000100000005000000000004000040000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000001000018000000c28500002b02", 0x66, 0x400}, {&(0x7f0000010100)="000000000000000000000000e8f7d2e8feeb4bf889ba053b02420ff8010040", 0x1f, 0x4e0}], 0x0, &(0x7f0000000140)=ANY=[]) 06:12:26 executing program 4: r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000040), 0xffffffffffffffff) syz_genetlink_get_family_id$ethtool(&(0x7f0000000100), 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_PAUSE_SET(0xffffffffffffffff, &(0x7f0000000440)={0x0, 0x0, 0x0}, 0x0) r2 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000080)='smaps\x00') pread64(r2, &(0x7f00000000c0)=""/98, 0x62, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x7fffffff) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(0xffffffffffffffff, 0xc0189374, &(0x7f0000000240)={{0x1, 0x1, 0x18, r0, {0x8}}, './file0\x00'}) dup3(0xffffffffffffffff, r2, 0x0) r3 = socket$inet_icmp_raw(0x2, 0x3, 0x1) syz_genetlink_get_family_id$ethtool(&(0x7f0000000180), r2) socket$nl_audit(0x10, 0x3, 0x9) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000040)={'wlan1\x00', 0x0}) sendmsg$inet(r3, &(0x7f0000000780)={&(0x7f0000000000)={0x2, 0x0, @local}, 0x10, &(0x7f00000003c0)=[{&(0x7f0000000300)="6fb9", 0xffeb}], 0x1, &(0x7f0000000700)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {r4, @remote, @broadcast}}}], 0x20}, 0x0) r5 = socket$inet_icmp_raw(0x2, 0x3, 0x1) socket$nl_audit(0x10, 0x3, 0x9) sendmsg$inet(r5, &(0x7f0000000780)={&(0x7f0000000000)={0x2, 0x0, @local}, 0x10, &(0x7f00000003c0)=[{&(0x7f0000000300)="6fb9", 0xffeb}], 0x1, &(0x7f0000000700)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @remote, @broadcast}}}], 0x20}, 0x0) sendmsg$ETHTOOL_MSG_LINKINFO_GET(r2, &(0x7f0000000200)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f00000001c0)={&(0x7f0000000340)=ANY=[@ANYBLOB='@\x00\x00\x00', @ANYRES16=r1, @ANYBLOB="000427bd7000ffdbdf25020000002c00018008000100", @ANYRES32=0x0, @ANYBLOB='\b\x00C\x00\x00\x00\x00\x00\b\x00!\x00', @ANYRES32, @ANYBLOB="d5b921cac279671a02c4d90ed2cbc802c00000009852d9e901fb17000000000000", @ANYRES32=0x0, @ANYBLOB], 0x40}, 0x1, 0x0, 0x0, 0x4}, 0xd0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000480), 0x1}, 0x603}, 0x0, 0xffffffefffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000040)=[{&(0x7f0000010000)="601c6d6b646f736689254300080120000400004000f8000020004000030000000000000001", 0x25}, {0x0, 0x0, 0x10000}], 0x0, &(0x7f0000000040)=ANY=[]) 06:12:26 executing program 0: syncfs(0xffffffffffffffff) sendmsg$NL80211_CMD_DEL_TX_TS(0xffffffffffffffff, 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_SETPIPEFD(0xffffffffffffffff, 0xc0189378, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = memfd_create(&(0x7f0000000400)='B\xdb/\x89\x03l\xdeb\xcb\xb54\xed\xbeLY\xb5Z\xe1\x12S\xf5G\xcc\xf3\xe9\x02h\v\xca(\x96\xe1C\xdf\x1c\xea\x85C\xfb\x10\x13\xfa\x03\x16\xcd\x17\xa2\x80\xa1z\xb4r\x95\xc3@\x9d\xa6\xf1\x92#}g\xd3`\xf7\xcez\xcb\xb3\x1a\xbb\xc48e\x8e\xb1&\xd1\x8a\xe6!\x7f\x8d\xea,qx\xa28\xbf\"\xc7e\x06L\xb06\xeb<$\xd7\xba\xe5\x01\x03\x94r\xab\xd4J\x03s\xaf\xf6A\xbfV\xfa\x1ew\x8d\xbf\x99I\x97\xd8\xd2\xe8\x11\xc4\x04\x00\x84\xd5i\xee\xaf\xae[E\x1f\xdd\xd7#rT+\xb621p\xaf[\x99\" 1\xeb\xc7)\xd2\x1dh\xf2\xd5s\xfd?\fa>\x9f;\xe5r\xe5\xbd\xb0|=\x8eZcPY\xf8\xbd\x13\xaa\x8b\xdf\xbc\x93u\xd5\xb0r\xfb\xde\xe7\xd9k\xe2\xc6\x1b\xf2o@&>\xf2M\xe7\x8c\xeb\xee\xf5\x02~\x85\x14\xf3\xc6v\xf15PE\x8c\xca\x16$\xc2\x01#\xb563\rbq\xbf64\xfaW\x17\xdfa\xe6\xca\x86\xd7\xf8\x81X\x9bg4\xc1\xdam\xcf=Rq6\xb0\xd4D=I\x1a\x0e\xd0\xabz\xe2\x19\x0fM\xad\xdco\xa4\xb2\x8c?\xc1\x10\xf273\xd00\xb3_\xe8\x9a*\xfcL\xea;\xc0\x9a\xdbx!N;\xb5x\t\xa4E\xbe\x93r\x04\xf5\xf0\xf5\x7f\x9a)\xf5\x1b\"\xa1\xd8\x06>\xc9\xe2r\xe9\xbb\xfe\xc0\b\x81\x98\x1c\xe2\xe0?\x8f\xa1\xbel\aN\x83@\xb1\x03)4A\x83\xd6\xcf\xf6\xb5\x82\xb7\x9dA\b$\xa2x\x8a@\xfaj~\xef\x93\xb1/L\x01\xe2\xba|\xf0\x01)PP\xcdl\x06\xfc\x15;qZ\xb1u\xc9\xd0\xd16~JEGm\xe4\x1e@\x9dG\xe4@\xdf\xba\'\x8b\x1cD\xc7\xec\xd1@}tR\xd9P\xf4N\xe3\xd8x\xa0\x91\x17\xc2}\x13\b\xca\t(Z\xa3_\xa1\x90\x15T\xa4\xe7%\x98\xa7\xfb\x8bp/eq\x93\xbf\x1f =|\xf3\xb1\xfcR\xd8\nM,\xcb%@\'\x15\x88\xd8\xad\f\x91|\x95\x8fq+\x98\x81W\xba\x9f\xe0elOt\xbd\by\r\x87\x1c\xba\xbd\x8e+S>\xb8\xe29\x91h^x\xfb`\x00\xdd/\xa6\xb1\x16=\xa1bw\xc5I\xb1\x00'/549, 0x2) fcntl$addseals(r0, 0x409, 0x0) mmap(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x1, 0x10010, r0, 0xe0e91000) 06:12:26 executing program 1: pipe(&(0x7f0000000340)={0xffffffffffffffff}) pread64(r0, &(0x7f0000000440)=""/95, 0x5f, 0x6) execveat(r0, &(0x7f0000000080)='./file0\x00', &(0x7f00000001c0)=[&(0x7f00000000c0)='\x00', &(0x7f0000000180)='\x00'], &(0x7f0000000400)=[&(0x7f0000000200)='/dev/zero\x00', &(0x7f0000000240)='/dev/zero\x00', &(0x7f0000000300)='/dev/zero\x00'], 0x1000) socket$inet(0x2, 0x1, 0x0) perf_event_open(&(0x7f0000000100)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x22420, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ptrace$setopts(0x4200, 0x0, 0x5, 0x100050) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000004c00)={0xc0002100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) gettid() r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000), 0x380, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000000)='net/udp6\x00') read$hiddev(r2, 0x0, 0x0) fchmodat(r2, &(0x7f00000004c0)='./file0\x00', 0x0) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(r1, 0xc018937c, &(0x7f0000000380)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32=r0, @ANYBLOB="00000000000000002e2f66696cee8816"]) ioctl$TIOCSSOFTCAR(r3, 0x541a, &(0x7f00000003c0)=0x6) waitid$P_PIDFD(0x3, r1, &(0x7f0000000500), 0x2, &(0x7f0000000580)) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(r1, 0xc0189372, &(0x7f0000000040)={{0x1, 0x1, 0x18, r2, {0xffff}}, './file0\x00'}) 06:12:26 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="200000180002000019000000900100000f000000000000000100000005000000000004000040000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000001000018000000c28500002b02", 0x66, 0x400}, {&(0x7f0000010100)="000000000000000000000000e8f7d2e8feeb4bf889ba053b02420ff8010040", 0x1f, 0x4e0}], 0x0, &(0x7f0000000140)=ANY=[]) 06:12:26 executing program 6: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x100000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="0a0000000002000019000000900100000f000000000000000100000005000000000004000040000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000001000018000000c28500002b02", 0x66, 0x400}, {&(0x7f0000010100)="000000000000000000000000e8f7d2e8feeb4bf889ba053b02420ff8010040", 0x1f, 0x4e0}], 0x0, &(0x7f0000000140)=ANY=[]) 06:12:26 executing program 3: r0 = getpid() ioprio_get$pid(0x2, r0) r1 = getpid() ioprio_get$pid(0x2, r1) syz_mount_image$vfat(0x0, &(0x7f0000000040)='./file1\x00', 0x0, 0x0, &(0x7f00000000c0), 0x2002000, &(0x7f0000000400)=ANY=[@ANYRES16, @ANYBLOB="72e1af808ba473e6f37c85b113d8c4d9e1de4ed2968d2e01108c4795a941d14f6927393c8c3c458dd7454900d48719912efc18d580a8f841234284071012d7d5020eb5d56dc1ba5f1048adac4b928bf6cfd663b4cab43637cb979a9199a0246ec02345161783bc79585902603d7062084f05b744e31fcb4c3e81f3becabb7ad1fa5783f5e5e60ae912102fe8df0536bd074c03bd33742f35c5c44b5c3c9d693114367b7d966e"]) chdir(&(0x7f0000000140)='./file0\x00') ptrace$getenv(0x4201, r0, 0xfff, &(0x7f00000000c0)) openat(0xffffffffffffff9c, &(0x7f0000000000)='./file2\x00', 0x40c2, 0x0) r2 = perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x6, 0x0, 0xe}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r4 = fork() perf_event_open(0x0, r4, 0x9, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000340)={0x0, 0x80, 0x2, 0x83, 0x1, 0x7, 0x0, 0x1f, 0x9ec17fc7a3e840c7, 0xc, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x9, 0x4, @perf_bp={&(0x7f0000000240), 0x1}, 0x404, 0x7, 0x3, 0x6, 0x800, 0x9, 0x3, 0x0, 0x7ff, 0x0, 0x9}, r4, 0x8, r2, 0x9) fork() setxattr$trusted_overlay_upper(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180), &(0x7f00000001c0)={0x0, 0xfb, 0x7a, 0x0, 0x2, "d54449275cb08faf62df87518e3ce16f", "9a61b461b0c63151b954990036d5e0163ceb48c6a801bb019e9e6fa7196a9372f804b9e9ca3fb3d85d1985d31346bbd5fd02b1c8223bf6388eb75498623e38ff88a99c5ce38698a32306b7d4e4b0fd4b03bfa568df17a42f725c6c33046b38b6e4a713dde1"}, 0x7a, 0x3) socket$nl_audit(0x10, 0x3, 0x9) chroot(&(0x7f0000000080)='./file1\x00') sendmsg$inet(r3, &(0x7f0000000780)={&(0x7f0000000000)={0x2, 0x0, @local}, 0x10, &(0x7f00000003c0)=[{&(0x7f0000000300)="6fb9", 0xffeb}], 0x1, &(0x7f0000000700)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @remote, @broadcast}}}], 0x20}, 0x0) [ 2262.065360] loop6: detected capacity change from 0 to 2048 06:12:26 executing program 6: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', 0x0, 0x100000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="0a0000000002000019000000900100000f000000000000000100000005000000000004000040000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000001000018000000c28500002b02", 0x66, 0x400}, {&(0x7f0000010100)="000000000000000000000000e8f7d2e8feeb4bf889ba053b02420ff8010040", 0x1f, 0x4e0}], 0x0, &(0x7f0000000140)=ANY=[]) [ 2262.102557] loop4: detected capacity change from 0 to 256 [ 2262.120484] loop7: detected capacity change from 0 to 2067 [ 2262.128780] FAT-fs (loop4): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) [ 2262.148856] EXT4-fs (loop7): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 2262.149865] EXT4-fs (loop7): group descriptors corrupted! [ 2262.152560] loop5: detected capacity change from 0 to 2048 [ 2262.171897] loop7: detected capacity change from 0 to 2067 [ 2262.174707] loop6: detected capacity change from 0 to 2048 [ 2262.185551] EXT4-fs (loop5): inodes count not valid: 70 vs 32 [ 2262.187696] EXT4-fs (loop7): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 2262.188704] EXT4-fs (loop7): group descriptors corrupted! 06:12:26 executing program 4: r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000040), 0xffffffffffffffff) syz_genetlink_get_family_id$ethtool(&(0x7f0000000100), 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_PAUSE_SET(0xffffffffffffffff, &(0x7f0000000440)={0x0, 0x0, 0x0}, 0x0) r2 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000080)='smaps\x00') pread64(r2, &(0x7f00000000c0)=""/98, 0x62, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x7fffffff) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(0xffffffffffffffff, 0xc0189374, &(0x7f0000000240)={{0x1, 0x1, 0x18, r0, {0x8}}, './file0\x00'}) dup3(0xffffffffffffffff, r2, 0x0) r3 = socket$inet_icmp_raw(0x2, 0x3, 0x1) syz_genetlink_get_family_id$ethtool(&(0x7f0000000180), r2) socket$nl_audit(0x10, 0x3, 0x9) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000040)={'wlan1\x00', 0x0}) sendmsg$inet(r3, &(0x7f0000000780)={&(0x7f0000000000)={0x2, 0x0, @local}, 0x10, &(0x7f00000003c0)=[{&(0x7f0000000300)="6fb9", 0xffeb}], 0x1, &(0x7f0000000700)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {r4, @remote, @broadcast}}}], 0x20}, 0x0) r5 = socket$inet_icmp_raw(0x2, 0x3, 0x1) socket$nl_audit(0x10, 0x3, 0x9) sendmsg$inet(r5, &(0x7f0000000780)={&(0x7f0000000000)={0x2, 0x0, @local}, 0x10, &(0x7f00000003c0)=[{&(0x7f0000000300)="6fb9", 0xffeb}], 0x1, &(0x7f0000000700)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @remote, @broadcast}}}], 0x20}, 0x0) sendmsg$ETHTOOL_MSG_LINKINFO_GET(r2, &(0x7f0000000200)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f00000001c0)={&(0x7f0000000340)=ANY=[@ANYBLOB='@\x00\x00\x00', @ANYRES16=r1, @ANYBLOB="000427bd7000ffdbdf25020000002c00018008000100", @ANYRES32=0x0, @ANYBLOB='\b\x00C\x00\x00\x00\x00\x00\b\x00!\x00', @ANYRES32, @ANYBLOB="d5b921cac279671a02c4d90ed2cbc802c00000009852d9e901fb17000000000000", @ANYRES32=0x0, @ANYBLOB], 0x40}, 0x1, 0x0, 0x0, 0x4}, 0xd0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000480), 0x1}, 0x603}, 0x0, 0xffffffefffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000040)=[{&(0x7f0000010000)="601c6d6b646f736689254300080120000400004000f8000020004000030000000000000001", 0x25}, {0x0, 0x0, 0x10000}], 0x0, &(0x7f0000000040)=ANY=[]) [ 2262.215700] loop5: detected capacity change from 0 to 2048 [ 2262.242285] EXT4-fs (loop5): inodes count not valid: 70 vs 32 06:12:26 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="2000001c0002000019000000900100000f000000000000000100000005000000000004000040000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000001000018000000c28500002b02", 0x66, 0x400}, {&(0x7f0000010100)="000000000000000000000000e8f7d2e8feeb4bf889ba053b02420ff8010040", 0x1f, 0x4e0}], 0x0, &(0x7f0000000140)=ANY=[]) 06:12:26 executing program 7: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x103e00, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000100000005000000000004000040000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000001000018000000c28500002b02", 0x66, 0x400}, {&(0x7f0000010100)="000000000000000000000000e8f7d2e8feeb4bf889ba053b02420ff8010040", 0x1f, 0x4e0}], 0x0, &(0x7f0000000140)=ANY=[]) 06:12:26 executing program 0: pipe(&(0x7f0000000340)={0xffffffffffffffff}) pread64(r0, &(0x7f0000000440)=""/95, 0x5f, 0x6) execveat(r0, &(0x7f0000000080)='./file0\x00', &(0x7f00000001c0)=[&(0x7f00000000c0)='\x00', &(0x7f0000000180)='\x00'], &(0x7f0000000400)=[&(0x7f0000000200)='/dev/zero\x00', &(0x7f0000000240)='/dev/zero\x00', &(0x7f0000000300)='/dev/zero\x00'], 0x1000) socket$inet(0x2, 0x1, 0x0) perf_event_open(&(0x7f0000000100)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x22420, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ptrace$setopts(0x4200, 0x0, 0x5, 0x100050) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(0x0, 0x0) gettid() r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000), 0x380, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000000)='net/udp6\x00') read$hiddev(r2, &(0x7f0000001140)=""/212, 0xd4) fchmodat(r2, &(0x7f00000004c0)='./file0\x00', 0x0) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(r1, 0xc018937c, &(0x7f0000000380)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32=r0, @ANYBLOB="00000000000000002e2f66696cee8816"]) ioctl$TIOCSSOFTCAR(r3, 0x541a, &(0x7f00000003c0)=0x6) waitid$P_PIDFD(0x3, r1, &(0x7f0000000500), 0x2, &(0x7f0000000580)) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(r1, 0xc0189372, &(0x7f0000000040)={{0x1, 0x1, 0x18, r2, {0xffff}}, './file0\x00'}) [ 2262.303045] loop4: detected capacity change from 0 to 256 [ 2262.329257] FAT-fs (loop4): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) [ 2262.355040] loop7: detected capacity change from 0 to 2079 06:12:26 executing program 6: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', 0x0, 0x100000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="0a0000000002000019000000900100000f000000000000000100000005000000000004000040000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000001000018000000c28500002b02", 0x66, 0x400}, {&(0x7f0000010100)="000000000000000000000000e8f7d2e8feeb4bf889ba053b02420ff8010040", 0x1f, 0x4e0}], 0x0, &(0x7f0000000140)=ANY=[]) [ 2262.383052] EXT4-fs (loop7): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 2262.384058] EXT4-fs (loop7): group descriptors corrupted! [ 2262.393838] loop7: detected capacity change from 0 to 2079 [ 2262.411059] EXT4-fs (loop7): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 2262.412072] EXT4-fs (loop7): group descriptors corrupted! 06:12:26 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x100000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="004000000002000019000000900100000f000000000000000100000005000000000004000040000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000001000018000000c28500002b02", 0x66, 0x400}, {&(0x7f0000010100)="000000000000000000000000e8f7d2e8feeb4bf889ba053b02420ff8010040", 0x1f, 0x4e0}], 0x0, &(0x7f0000000140)=ANY=[]) [ 2262.437505] loop6: detected capacity change from 0 to 2048 06:12:26 executing program 4: r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000040), 0xffffffffffffffff) syz_genetlink_get_family_id$ethtool(&(0x7f0000000100), 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_PAUSE_SET(0xffffffffffffffff, &(0x7f0000000440)={0x0, 0x0, 0x0}, 0x0) r2 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000080)='smaps\x00') pread64(r2, &(0x7f00000000c0)=""/98, 0x62, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x7fffffff) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(0xffffffffffffffff, 0xc0189374, &(0x7f0000000240)={{0x1, 0x1, 0x18, r0, {0x8}}, './file0\x00'}) dup3(0xffffffffffffffff, r2, 0x0) r3 = socket$inet_icmp_raw(0x2, 0x3, 0x1) syz_genetlink_get_family_id$ethtool(&(0x7f0000000180), r2) socket$nl_audit(0x10, 0x3, 0x9) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000040)={'wlan1\x00', 0x0}) sendmsg$inet(r3, &(0x7f0000000780)={&(0x7f0000000000)={0x2, 0x0, @local}, 0x10, &(0x7f00000003c0)=[{&(0x7f0000000300)="6fb9", 0xffeb}], 0x1, &(0x7f0000000700)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {r4, @remote, @broadcast}}}], 0x20}, 0x0) r5 = socket$inet_icmp_raw(0x2, 0x3, 0x1) socket$nl_audit(0x10, 0x3, 0x9) sendmsg$inet(r5, &(0x7f0000000780)={&(0x7f0000000000)={0x2, 0x0, @local}, 0x10, &(0x7f00000003c0)=[{&(0x7f0000000300)="6fb9", 0xffeb}], 0x1, &(0x7f0000000700)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @remote, @broadcast}}}], 0x20}, 0x0) sendmsg$ETHTOOL_MSG_LINKINFO_GET(r2, &(0x7f0000000200)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f00000001c0)={&(0x7f0000000340)=ANY=[@ANYBLOB='@\x00\x00\x00', @ANYRES16=r1, @ANYBLOB="000427bd7000ffdbdf25020000002c00018008000100", @ANYRES32=0x0, @ANYBLOB='\b\x00C\x00\x00\x00\x00\x00\b\x00!\x00', @ANYRES32, @ANYBLOB="d5b921cac279671a02c4d90ed2cbc802c00000009852d9e901fb17000000000000", @ANYRES32=0x0, @ANYBLOB], 0x40}, 0x1, 0x0, 0x0, 0x4}, 0xd0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000480), 0x1}, 0x603}, 0x0, 0xffffffefffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000040)=[{&(0x7f0000010000)="601c6d6b646f736689254300080120000400004000f8000020004000030000000000000001", 0x25}, {0x0, 0x0, 0x10000}], 0x0, &(0x7f0000000040)=ANY=[]) 06:12:26 executing program 3: r0 = getpid() ioprio_get$pid(0x2, r0) r1 = getpid() ioprio_get$pid(0x2, r1) syz_mount_image$vfat(0x0, &(0x7f0000000040)='./file1\x00', 0x0, 0x0, &(0x7f00000000c0), 0x2002000, &(0x7f0000000400)=ANY=[@ANYRES16, @ANYBLOB="72e1af808ba473e6f37c85b113d8c4d9e1de4ed2968d2e01108c4795a941d14f6927393c8c3c458dd7454900d48719912efc18d580a8f841234284071012d7d5020eb5d56dc1ba5f1048adac4b928bf6cfd663b4cab43637cb979a9199a0246ec02345161783bc79585902603d7062084f05b744e31fcb4c3e81f3becabb7ad1fa5783f5e5e60ae912102fe8df0536bd074c03bd33742f35c5c44b5c3c9d693114367b7d966e"]) chdir(&(0x7f0000000140)='./file0\x00') ptrace$getenv(0x4201, r0, 0xfff, &(0x7f00000000c0)) openat(0xffffffffffffff9c, &(0x7f0000000000)='./file2\x00', 0x40c2, 0x0) r2 = perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x6, 0x0, 0xe}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r4 = fork() perf_event_open(0x0, r4, 0x9, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000340)={0x0, 0x80, 0x2, 0x83, 0x1, 0x7, 0x0, 0x1f, 0x9ec17fc7a3e840c7, 0xc, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x9, 0x4, @perf_bp={&(0x7f0000000240), 0x1}, 0x404, 0x7, 0x3, 0x6, 0x800, 0x9, 0x3, 0x0, 0x7ff, 0x0, 0x9}, r4, 0x8, r2, 0x9) fork() setxattr$trusted_overlay_upper(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180), &(0x7f00000001c0)={0x0, 0xfb, 0x7a, 0x0, 0x2, "d54449275cb08faf62df87518e3ce16f", "9a61b461b0c63151b954990036d5e0163ceb48c6a801bb019e9e6fa7196a9372f804b9e9ca3fb3d85d1985d31346bbd5fd02b1c8223bf6388eb75498623e38ff88a99c5ce38698a32306b7d4e4b0fd4b03bfa568df17a42f725c6c33046b38b6e4a713dde1"}, 0x7a, 0x3) socket$nl_audit(0x10, 0x3, 0x9) chroot(&(0x7f0000000080)='./file1\x00') sendmsg$inet(r3, &(0x7f0000000780)={&(0x7f0000000000)={0x2, 0x0, @local}, 0x10, &(0x7f00000003c0)=[{&(0x7f0000000300)="6fb9", 0xffeb}], 0x1, &(0x7f0000000700)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @remote, @broadcast}}}], 0x20}, 0x0) [ 2262.552821] loop5: detected capacity change from 0 to 2048 [ 2262.563312] EXT4-fs (loop5): inodes count not valid: 16384 vs 32 [ 2262.575856] loop5: detected capacity change from 0 to 2048 [ 2262.581244] EXT4-fs (loop5): inodes count not valid: 16384 vs 32 [ 2262.605699] loop4: detected capacity change from 0 to 256 [ 2262.660684] FAT-fs (loop4): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) [ 2280.447622] loop6: detected capacity change from 0 to 2048 [ 2280.449315] loop7: detected capacity change from 0 to 2079 [ 2280.456294] EXT4-fs (loop7): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 2280.457097] EXT4-fs (loop7): group descriptors corrupted! [ 2280.462259] loop4: detected capacity change from 0 to 256 [ 2280.474444] loop7: detected capacity change from 0 to 2079 [ 2280.480016] EXT4-fs (loop7): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 2280.480727] EXT4-fs (loop7): group descriptors corrupted! 06:12:44 executing program 3: r0 = getpid() ioprio_get$pid(0x2, r0) r1 = getpid() ioprio_get$pid(0x2, r1) syz_mount_image$vfat(0x0, &(0x7f0000000040)='./file1\x00', 0x0, 0x0, &(0x7f00000000c0), 0x2002000, &(0x7f0000000400)=ANY=[@ANYRES16, @ANYBLOB="72e1af808ba473e6f37c85b113d8c4d9e1de4ed2968d2e01108c4795a941d14f6927393c8c3c458dd7454900d48719912efc18d580a8f841234284071012d7d5020eb5d56dc1ba5f1048adac4b928bf6cfd663b4cab43637cb979a9199a0246ec02345161783bc79585902603d7062084f05b744e31fcb4c3e81f3becabb7ad1fa5783f5e5e60ae912102fe8df0536bd074c03bd33742f35c5c44b5c3c9d693114367b7d966e"]) chdir(&(0x7f0000000140)='./file0\x00') ptrace$getenv(0x4201, r0, 0xfff, &(0x7f00000000c0)) openat(0xffffffffffffff9c, &(0x7f0000000000)='./file2\x00', 0x40c2, 0x0) r2 = perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x6, 0x0, 0xe}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r4 = fork() perf_event_open(0x0, r4, 0x9, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000340)={0x0, 0x80, 0x2, 0x83, 0x1, 0x7, 0x0, 0x1f, 0x9ec17fc7a3e840c7, 0xc, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x9, 0x4, @perf_bp={&(0x7f0000000240), 0x1}, 0x404, 0x7, 0x3, 0x6, 0x800, 0x9, 0x3, 0x0, 0x7ff, 0x0, 0x9}, r4, 0x8, r2, 0x9) fork() setxattr$trusted_overlay_upper(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180), &(0x7f00000001c0)={0x0, 0xfb, 0x7a, 0x0, 0x2, "d54449275cb08faf62df87518e3ce16f", "9a61b461b0c63151b954990036d5e0163ceb48c6a801bb019e9e6fa7196a9372f804b9e9ca3fb3d85d1985d31346bbd5fd02b1c8223bf6388eb75498623e38ff88a99c5ce38698a32306b7d4e4b0fd4b03bfa568df17a42f725c6c33046b38b6e4a713dde1"}, 0x7a, 0x3) socket$nl_audit(0x10, 0x3, 0x9) chroot(&(0x7f0000000080)='./file1\x00') sendmsg$inet(r3, &(0x7f0000000780)={&(0x7f0000000000)={0x2, 0x0, @local}, 0x10, &(0x7f00000003c0)=[{&(0x7f0000000300)="6fb9", 0xffeb}], 0x1, &(0x7f0000000700)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @remote, @broadcast}}}], 0x20}, 0x0) 06:12:44 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="2000001f0002000019000000900100000f000000000000000100000005000000000004000040000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000001000018000000c28500002b02", 0x66, 0x400}, {&(0x7f0000010100)="000000000000000000000000e8f7d2e8feeb4bf889ba053b02420ff8010040", 0x1f, 0x4e0}], 0x0, &(0x7f0000000140)=ANY=[]) 06:12:44 executing program 4: r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000040), 0xffffffffffffffff) syz_genetlink_get_family_id$ethtool(&(0x7f0000000100), 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_PAUSE_SET(0xffffffffffffffff, &(0x7f0000000440)={0x0, 0x0, 0x0}, 0x0) r2 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000080)='smaps\x00') pread64(r2, &(0x7f00000000c0)=""/98, 0x62, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x7fffffff) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(0xffffffffffffffff, 0xc0189374, &(0x7f0000000240)={{0x1, 0x1, 0x18, r0, {0x8}}, './file0\x00'}) dup3(0xffffffffffffffff, r2, 0x0) r3 = socket$inet_icmp_raw(0x2, 0x3, 0x1) syz_genetlink_get_family_id$ethtool(&(0x7f0000000180), r2) socket$nl_audit(0x10, 0x3, 0x9) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000040)={'wlan1\x00', 0x0}) sendmsg$inet(r3, &(0x7f0000000780)={&(0x7f0000000000)={0x2, 0x0, @local}, 0x10, &(0x7f00000003c0)=[{&(0x7f0000000300)="6fb9", 0xffeb}], 0x1, &(0x7f0000000700)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {r4, @remote, @broadcast}}}], 0x20}, 0x0) r5 = socket$inet_icmp_raw(0x2, 0x3, 0x1) socket$nl_audit(0x10, 0x3, 0x9) sendmsg$inet(r5, &(0x7f0000000780)={&(0x7f0000000000)={0x2, 0x0, @local}, 0x10, &(0x7f00000003c0)=[{&(0x7f0000000300)="6fb9", 0xffeb}], 0x1, &(0x7f0000000700)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @remote, @broadcast}}}], 0x20}, 0x0) sendmsg$ETHTOOL_MSG_LINKINFO_GET(r2, &(0x7f0000000200)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f00000001c0)={&(0x7f0000000340)=ANY=[@ANYBLOB='@\x00\x00\x00', @ANYRES16=r1, @ANYBLOB="000427bd7000ffdbdf25020000002c00018008000100", @ANYRES32=0x0, @ANYRES32=r4, @ANYBLOB="d5b921cac279671a02c4d90ed2cbc802c00000009852d9e901fb17000000000000", @ANYRES32=0x0, @ANYBLOB], 0x40}, 0x1, 0x0, 0x0, 0x4}, 0xd0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000480), 0x1}, 0x603}, 0x0, 0xffffffefffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000040)=[{&(0x7f0000010000)="601c6d6b646f736689254300080120000400004000f8000020004000030000000000000001", 0x25}, {0x0, 0x0, 0x10000}], 0x0, &(0x7f0000000040)=ANY=[]) 06:12:44 executing program 1: pipe(&(0x7f0000000340)={0xffffffffffffffff}) pread64(r0, &(0x7f0000000440)=""/95, 0x5f, 0x6) execveat(r0, &(0x7f0000000080)='./file0\x00', &(0x7f00000001c0)=[&(0x7f00000000c0)='\x00', &(0x7f0000000180)='\x00'], &(0x7f0000000400)=[&(0x7f0000000200)='/dev/zero\x00', &(0x7f0000000240)='/dev/zero\x00', &(0x7f0000000300)='/dev/zero\x00'], 0x1000) socket$inet(0x2, 0x1, 0x0) perf_event_open(&(0x7f0000000100)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x22420, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ptrace$setopts(0x4200, 0x0, 0x5, 0x100050) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000004c00)={0xc0002100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) gettid() r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000), 0x380, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000000)='net/udp6\x00') read$hiddev(r2, &(0x7f0000001140)=""/212, 0xd4) fchmodat(0xffffffffffffffff, &(0x7f00000004c0)='./file0\x00', 0x0) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(r1, 0xc018937c, &(0x7f0000000380)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32=r0, @ANYBLOB="00000000000000002e2f66696cee8816"]) ioctl$TIOCSSOFTCAR(r3, 0x541a, &(0x7f00000003c0)=0x6) waitid$P_PIDFD(0x3, r1, &(0x7f0000000500), 0x2, &(0x7f0000000580)) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(r1, 0xc0189372, &(0x7f0000000040)={{0x1, 0x1, 0x18, r2, {0xffff}}, './file0\x00'}) 06:12:44 executing program 6: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', 0x0, 0x100000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="0a0000000002000019000000900100000f000000000000000100000005000000000004000040000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000001000018000000c28500002b02", 0x66, 0x400}, {&(0x7f0000010100)="000000000000000000000000e8f7d2e8feeb4bf889ba053b02420ff8010040", 0x1f, 0x4e0}], 0x0, &(0x7f0000000140)=ANY=[]) 06:12:44 executing program 7: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x103f00, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000100000005000000000004000040000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000001000018000000c28500002b02", 0x66, 0x400}, {&(0x7f0000010100)="000000000000000000000000e8f7d2e8feeb4bf889ba053b02420ff8010040", 0x1f, 0x4e0}], 0x0, &(0x7f0000000140)=ANY=[]) 06:12:44 executing program 0: syz_usb_connect_ath9k(0x3, 0x5a, &(0x7f0000000080)={{0x12, 0x1, 0x200, 0xff, 0xff, 0xff, 0x40, 0xcf3, 0x9271, 0x108, 0x1, 0x2, 0x3, 0x1, [{{0x9, 0x2, 0x77}}]}}, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000002480)='fd/3\x00') ioctl$TIOCGWINSZ(r0, 0x40045506, 0x0) ioctl$AUTOFS_DEV_IOCTL_CLOSEMOUNT(0xffffffffffffffff, 0xc0189375, 0x0) syz_genetlink_get_family_id$ethtool(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_PAUSE_SET(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x20001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = accept$inet6(r0, &(0x7f0000000380)={0xa, 0x0, 0x0, @private2}, &(0x7f00000003c0)=0x1c) [ 2280.487938] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 2280.492319] misc raw-gadget: fail, usb_gadget_register_driver returned -16 sendmsg(r1, &(0x7f0000001b80)={&(0x7f0000000640)=@pptp={0x18, 0x2, {0x2, @loopback}}, 0x80, &(0x7f0000001940)=[{&(0x7f00000006c0)="1c50a0868c55780d0e40a352ce376969626312529461f1e88c7ef253902dc848ba14d5022f53c1958ac4bb0b1c7ff6b90fcc96519005375a77e12b0a23cfc4040dc836747c54c4c8f3cfcec739f58583a7a2b662e65187cab052b68d16792d26", 0x60}, {&(0x7f0000000740)="2a8728046f7b6bbbfedf0e4e66aa066cd3ec6e88f0d8af5794e003340347c99001864da729c8e51cbfb315c042debaa2be94b50d6b3198240d32a2689038b1740a5cd8e94f1a18773a9d44f4d880953834c7407d387da1d78e1c8dd547aefee08e362852323119b5d655235493fab5d32f18f921f29acb37a4893acff1122d1efc5b6ad85016ca634f7f191524ff7973150bbc9dc4c29c0ef6630681e44e5ddd89c2b53683dc1b3e3196f0d48fb22861050830e0617e05f680ccaffacb482822d7e9a2edbbcca5bb285ee9b78b0cbc33c87f2af747ed5a576e4352c296c363325465b8f22c94c8a4160b5b674759995da69bc8a7", 0xf4}, {&(0x7f0000000840)="505c5b7b441f3c8e8f0cf3136f9e746f3f8234d1952ff4a14fbe67124b179b8a5464eb2e91de250db06e7919a6b9296dacfd766c7c2145cf498893db874b46a51ee381ee971b33853f77bb98551401f7f670fcd58318ba1f99a0e21d234416053da316ee12f61f157bb3196f5d79e8513b8519ce967b46dfb91d75f86ab52e71bf343f70b38196f8d82e03c05e66e7bbc6bba6191e1f1f46746821337c3f7950630a9d888d6a473f0a0638e45ce6207f3e822def14b1d1476fc327942125c57c289f60a8d855c60ca953ef2b2c420e33d753bf3bbe21dab562bc", 0xda}, {&(0x7f0000000940)="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", 0x1000}], 0x4, &(0x7f0000001980)=[{0xd8, 0xff, 0x9, "bd95db9e28201ea4b9acb1a3f200634187108069752a6105296d45f53d26626a7070735f004a705f7383c00ab7b48e0780d3a1ea693d10c9cc51f8e085648684c5acec573cf4a6133c4267dd15f9d4fe0a3383104cd36cafd0a8c5319161857ab91a1434ea0c198272d9073d265ba7ed57e4ffcbca210c549efd2290fe5e24f3dfeee440fa8c28659981565246e64b0a382b2ff8136a0b462ef1f5d340eb57051ecd909b2109f8866292ed5c10bd0509be04845c8a33cf56e34a0fa62f6e9975153756a1931a8c41"}, {0xc0, 0x108, 0x2cea, "1e6f469c89e2fdf92cee320a290a28710a54d0c7d8c7f0cb94df65f6b1f89454a2fedd9aff1c2cd841f7c11a2ec0972423fdc320457c83213a9c9ebca90eb190b92ba5c4fc77765fc149b362922166bb83ba480c922a902dc33807bca0f9cf5956889edf34e4e50f1864816caaf1940551c80d5f89e24127ba847661bcc41878d458b8cfeb902494549b5596c8ebd976ce90a4f565e3e9288f2b2bf19b3ddd2a113784eab173a5d0c335d1"}, {0x68, 0x115, 0x3, "f9684708cf9f12c14546039d47d7b72c7f9156c8d498f01c42eb3d3eaf309f98cf976313aa1d8c035485540a535872ab2d3c0616c6e073957a59dd8d5e2725d2c2a4985df91ad772b41d571560dc0dffbcf6efa8c4a2"}], 0x200}, 0x20008000) r2 = memfd_create(&(0x7f0000000400)='B\xdb/\x89\x03l\xdeb\xcb\xb54\xed\xbeLY\xb5Z\xe1\x12S\xf5G\xcc\xf3\xe9\x02h\v\xca(\x96\xe1C\xdf\x1c\xea\x85C\xfb\x10\x13\xfa\x03\x16\xcd\x17\xa2\x80\xa1z\xb4r\x95\xc3@\x9d\xa6\xf1\x92#}g\xd3`\xf7\xcez\xcb\xb3\x1a\xbb\xc48e\x8e\xb1&\xd1\x8a\xe6!\x7f\x8d\xea,qx\xa28\xbf\"\xc7e\x06L\xb06\xeb<$\xd7\xba\xe5\x01\x03\x94r\xab\xd4J\x03s\xaf\xf6A\xbfV\xfa\x1ew\x8d\xbf\x99I\x97\xd8\xd2\xe8\x11\xc4\x04\x00\x84\xd5i\xee\xaf\xae[E\x1f\xdd\xd7#rT+\xb621p\xaf[\x99\" 1\xeb\xc7)\xd2\x1dh\xf2\xd5s\xfd?\fa>\x9f;\xe5r\xe5\xbd\xb0|=\x8eZcPY\xf8\xbd\x13\xaa\x8b\xdf\xbc\x93u\xd5\xb0r\xfb\xde\xe7\xd9k\xe2\xc6\x1b\xf2o@&>\xf2M\xe7\x8c\xeb\xee\xf5\x02~\x85\x14\xf3\xc6v\xf15PE\x8c\xca\x16$\xc2\x01#\xb563\rbq\xbf64\xfaW\x17\xdfa\xe6\xca\x86\xd7\xf8\x81X\x9bg4\xc1\xdam\xcf=Rq6\xb0\xd4D=I\x1a\x0e\xd0\xabz\xe2\x19\x0fM\xad\xdco\xa4\xb2\x8c?\xc1\x10\xf273\xd00\xb3_\xe8\x9a*\xfcL\xea;\xc0\x9a\xdbx!N;\xb5x\t\xa4E\xbe\x93r\x04\xf5\xf0\xf5\x7f\x9a)\xf5\x1b\"\xa1\xd8\x06>\xc9\xe2r\xe9\xbb\xfe\xc0\b\x81\x98\x1c\xe2\xe0?\x8f\xa1\xbel\aN\x83@\xb1\x03)4A\x83\xd6\xcf\xf6\xb5\x82\xb7\x9dA\b$\xa2x\x8a@\xfaj~\xef\x93\xb1/L\x01\xe2\xba|\xf0\x01)PP\xcdl\x06\xfc\x15;qZ\xb1u\xc9\xd0\xd16~JEGm\xe4\x1e@\x9dG\xe4@\xdf\xba\'\x8b\x1cD\xc7\xec\xd1@}tR\xd9P\xf4N\xe3\xd8x\xa0\x91\x17\xc2}\x13\b\xca\t(Z\xa3_\xa1\x90\x15T\xa4\xe7%\x98\xa7\xfb\x8bp/eq\x93\xbf\x1f =|\xf3\xb1\xfcR\xd8\nM,\xcb%@\'\x15\x88\xd8\xad\f\x91|\x95\x8fq+\x98\x81W\xba\x9f\xe0elOt\xbd\by\r\x87\x1c\xba\xbd\x8e+S>\xb8\xe29\x91h^x\xfb`\x00\xdd/\xa6\xb1\x16=\xa1bw\xc5I\xb1\x00'/549, 0x2) r3 = socket$inet6(0xa, 0x1, 0xea9) preadv(r3, &(0x7f0000000340)=[{&(0x7f0000000300)=""/15, 0xf}], 0x1, 0x0, 0x8) r4 = socket$nl_generic(0x10, 0x3, 0x10) r5 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000080), 0xffffffffffffffff) r6 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_80211(r6, 0x8933, &(0x7f00000000c0)={'wlan1\x00', 0x0}) sendmsg$NL80211_CMD_SET_NOACK_MAP(r4, &(0x7f0000000600)={0x0, 0x0, &(0x7f00000005c0)={&(0x7f0000000580)={0x1c, r5, 0x501, 0x0, 0x0, {{}, {@val={0x8, 0x3, r7}, @void}}}, 0x1c}}, 0x0) sendmsg$NL80211_CMD_REGISTER_FRAME(r0, &(0x7f0000000240)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x4000000}, 0xc, &(0x7f0000000200)={&(0x7f0000000100)={0xe4, r5, 0x100, 0x70bd29, 0x25dfdbfd, {{}, {@void, @val={0xc, 0x99, {0x80000001, 0x52}}}}, [@NL80211_ATTR_FRAME_MATCH={0xc1, 0x5b, "1427edf53a50c2eb01389883558b956f264c52e5bae7808e93424e99b8e7ec56902c1d17aabeedcca7ba1b01cebd9bc93c8a23132b0fe9a8ed4e828fbe63a901a52c37303894fda5e18c78ed41887ff792543aa31cdc38c7c23a825bf0a685d4fc049f0796c65d4cefa2e1b029e7e72cd8c04a5bc7eb242cdb51cd024794e57ae5a81dfbb0d49aae8bb108a6fe31ba3de6c14262fc3fa67f691b8f2c03fe225ad3a86545f420fb84018fe4502e34474924d81267283998a64e08735422"}]}, 0xe4}, 0x1, 0x0, 0x0, 0x8000}, 0x4) fcntl$addseals(r2, 0x409, 0x0) 06:12:44 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x100000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="200200000002000019000000900100000f000000000000000100000005000000000004000040000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000001000018000000c28500002b02", 0x66, 0x400}, {&(0x7f0000010100)="000000000000000000000000e8f7d2e8feeb4bf889ba053b02420ff8010040", 0x1f, 0x4e0}], 0x0, &(0x7f0000000140)=ANY=[]) [ 2280.510193] FAT-fs (loop4): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) [ 2280.525091] loop5: detected capacity change from 0 to 2048 06:12:44 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="200000200002000019000000900100000f000000000000000100000005000000000004000040000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000001000018000000c28500002b02", 0x66, 0x400}, {&(0x7f0000010100)="000000000000000000000000e8f7d2e8feeb4bf889ba053b02420ff8010040", 0x1f, 0x4e0}], 0x0, &(0x7f0000000140)=ANY=[]) [ 2280.561339] EXT4-fs (loop5): inodes count not valid: 544 vs 32 06:12:44 executing program 7: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x104000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000100000005000000000004000040000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000001000018000000c28500002b02", 0x66, 0x400}, {&(0x7f0000010100)="000000000000000000000000e8f7d2e8feeb4bf889ba053b02420ff8010040", 0x1f, 0x4e0}], 0x0, &(0x7f0000000140)=ANY=[]) [ 2280.596284] loop5: detected capacity change from 0 to 2048 [ 2280.604060] loop7: detected capacity change from 0 to 2080 06:12:44 executing program 4: r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000040), 0xffffffffffffffff) syz_genetlink_get_family_id$ethtool(&(0x7f0000000100), 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_PAUSE_SET(0xffffffffffffffff, &(0x7f0000000440)={0x0, 0x0, 0x0}, 0x0) r2 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000080)='smaps\x00') pread64(r2, &(0x7f00000000c0)=""/98, 0x62, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x7fffffff) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(0xffffffffffffffff, 0xc0189374, &(0x7f0000000240)={{0x1, 0x1, 0x18, r0, {0x8}}, './file0\x00'}) dup3(0xffffffffffffffff, r2, 0x0) r3 = socket$inet_icmp_raw(0x2, 0x3, 0x1) syz_genetlink_get_family_id$ethtool(&(0x7f0000000180), r2) socket$nl_audit(0x10, 0x3, 0x9) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000040)={'wlan1\x00', 0x0}) sendmsg$inet(r3, &(0x7f0000000780)={&(0x7f0000000000)={0x2, 0x0, @local}, 0x10, &(0x7f00000003c0)=[{&(0x7f0000000300)="6fb9", 0xffeb}], 0x1, &(0x7f0000000700)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {r4, @remote, @broadcast}}}], 0x20}, 0x0) r5 = socket$inet_icmp_raw(0x2, 0x3, 0x1) socket$nl_audit(0x10, 0x3, 0x9) sendmsg$inet(r5, &(0x7f0000000780)={&(0x7f0000000000)={0x2, 0x0, @local}, 0x10, &(0x7f00000003c0)=[{&(0x7f0000000300)="6fb9", 0xffeb}], 0x1, &(0x7f0000000700)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @remote, @broadcast}}}], 0x20}, 0x0) sendmsg$ETHTOOL_MSG_LINKINFO_GET(r2, &(0x7f0000000200)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f00000001c0)={&(0x7f0000000340)=ANY=[@ANYBLOB='@\x00\x00\x00', @ANYRES16=r1, @ANYBLOB="000427bd7000ffdbdf25020000002c00018008000100", @ANYRES32=0x0, @ANYRES32=r4, @ANYBLOB="d5b921cac279671a02c4d90ed2cbc802c00000009852d9e901fb17000000000000", @ANYRES32=0x0, @ANYBLOB], 0x40}, 0x1, 0x0, 0x0, 0x4}, 0xd0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000480), 0x1}, 0x603}, 0x0, 0xffffffefffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000040)=[{&(0x7f0000010000)="601c6d6b646f736689254300080120000400004000f8000020004000030000000000000001", 0x25}, {0x0, 0x0, 0x10000}], 0x0, &(0x7f0000000040)=ANY=[]) [ 2280.614894] EXT4-fs (loop7): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 2280.615693] EXT4-fs (loop7): group descriptors corrupted! [ 2280.621358] EXT4-fs (loop5): inodes count not valid: 544 vs 32 [ 2280.636457] loop7: detected capacity change from 0 to 2080 [ 2280.643104] EXT4-fs (loop7): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 2280.643921] EXT4-fs (loop7): group descriptors corrupted! 06:12:44 executing program 6: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="0a0000000002000019000000900100000f000000000000000100000005000000000004000040000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000001000018000000c28500002b02", 0x66, 0x400}, {&(0x7f0000010100)="000000000000000000000000e8f7d2e8feeb4bf889ba053b02420ff8010040", 0x1f, 0x4e0}], 0x0, &(0x7f0000000140)=ANY=[]) [ 2280.679973] loop6: detected capacity change from 0 to 4 [ 2280.689570] EXT4-fs (loop6): bad geometry: block count 512 exceeds size of device (1 blocks) [ 2280.743850] loop4: detected capacity change from 0 to 256 [ 2280.783169] FAT-fs (loop4): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) 06:13:05 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x100000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="200200000002000019000000900100000f000000000000000100000005000000000004000040000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000001000018000000c28500002b02", 0x66, 0x400}, {&(0x7f0000010100)="000000000000000000000000e8f7d2e8feeb4bf889ba053b02420ff8010040", 0x1f, 0x4e0}], 0x0, &(0x7f0000000140)=ANY=[]) 06:13:05 executing program 1: pipe(&(0x7f0000000340)={0xffffffffffffffff}) pread64(r0, &(0x7f0000000440)=""/95, 0x5f, 0x6) execveat(r0, &(0x7f0000000080)='./file0\x00', &(0x7f00000001c0)=[&(0x7f00000000c0)='\x00', &(0x7f0000000180)='\x00'], &(0x7f0000000400)=[&(0x7f0000000200)='/dev/zero\x00', &(0x7f0000000240)='/dev/zero\x00', &(0x7f0000000300)='/dev/zero\x00'], 0x1000) socket$inet(0x2, 0x1, 0x0) perf_event_open(&(0x7f0000000100)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x22420, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ptrace$setopts(0x4200, 0x0, 0x5, 0x100050) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000004c00)={0xc0002100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) gettid() r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000), 0x380, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000000)='net/udp6\x00') read$hiddev(r2, &(0x7f0000001140)=""/212, 0xd4) fchmodat(0xffffffffffffffff, &(0x7f00000004c0)='./file0\x00', 0x0) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(r1, 0xc018937c, &(0x7f0000000380)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32=r0, @ANYBLOB="00000000000000002e2f66696cee8816"]) ioctl$TIOCSSOFTCAR(r3, 0x541a, &(0x7f00000003c0)=0x6) waitid$P_PIDFD(0x3, r1, &(0x7f0000000500), 0x2, &(0x7f0000000580)) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(r1, 0xc0189372, &(0x7f0000000040)={{0x1, 0x1, 0x18, r2, {0xffff}}, './file0\x00'}) 06:13:05 executing program 7: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x104600, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000100000005000000000004000040000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000001000018000000c28500002b02", 0x66, 0x400}, {&(0x7f0000010100)="000000000000000000000000e8f7d2e8feeb4bf889ba053b02420ff8010040", 0x1f, 0x4e0}], 0x0, &(0x7f0000000140)=ANY=[]) 06:13:05 executing program 6: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="0a0000000002000019000000900100000f000000000000000100000005000000000004000040000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000001000018000000c28500002b02", 0x66, 0x400}, {&(0x7f0000010100)="000000000000000000000000e8f7d2e8feeb4bf889ba053b02420ff8010040", 0x1f, 0x4e0}], 0x0, &(0x7f0000000140)=ANY=[]) 06:13:05 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="200000650002000019000000900100000f000000000000000100000005000000000004000040000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000001000018000000c28500002b02", 0x66, 0x400}, {&(0x7f0000010100)="000000000000000000000000e8f7d2e8feeb4bf889ba053b02420ff8010040", 0x1f, 0x4e0}], 0x0, &(0x7f0000000140)=ANY=[]) 06:13:05 executing program 4: r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000040), 0xffffffffffffffff) syz_genetlink_get_family_id$ethtool(&(0x7f0000000100), 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_PAUSE_SET(0xffffffffffffffff, &(0x7f0000000440)={0x0, 0x0, 0x0}, 0x0) r2 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000080)='smaps\x00') pread64(r2, &(0x7f00000000c0)=""/98, 0x62, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x7fffffff) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(0xffffffffffffffff, 0xc0189374, &(0x7f0000000240)={{0x1, 0x1, 0x18, r0, {0x8}}, './file0\x00'}) dup3(0xffffffffffffffff, r2, 0x0) r3 = socket$inet_icmp_raw(0x2, 0x3, 0x1) syz_genetlink_get_family_id$ethtool(&(0x7f0000000180), r2) socket$nl_audit(0x10, 0x3, 0x9) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000040)={'wlan1\x00', 0x0}) sendmsg$inet(r3, &(0x7f0000000780)={&(0x7f0000000000)={0x2, 0x0, @local}, 0x10, &(0x7f00000003c0)=[{&(0x7f0000000300)="6fb9", 0xffeb}], 0x1, &(0x7f0000000700)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {r4, @remote, @broadcast}}}], 0x20}, 0x0) r5 = socket$inet_icmp_raw(0x2, 0x3, 0x1) socket$nl_audit(0x10, 0x3, 0x9) sendmsg$inet(r5, &(0x7f0000000780)={&(0x7f0000000000)={0x2, 0x0, @local}, 0x10, &(0x7f00000003c0)=[{&(0x7f0000000300)="6fb9", 0xffeb}], 0x1, &(0x7f0000000700)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @remote, @broadcast}}}], 0x20}, 0x0) sendmsg$ETHTOOL_MSG_LINKINFO_GET(r2, &(0x7f0000000200)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f00000001c0)={&(0x7f0000000340)=ANY=[@ANYBLOB='@\x00\x00\x00', @ANYRES16=r1, @ANYBLOB="000427bd7000ffdbdf25020000002c00018008000100", @ANYRES32=0x0, @ANYRES32=r4, @ANYBLOB="d5b921cac279671a02c4d90ed2cbc802c00000009852d9e901fb17000000000000", @ANYRES32=0x0, @ANYBLOB], 0x40}, 0x1, 0x0, 0x0, 0x4}, 0xd0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000480), 0x1}, 0x603}, 0x0, 0xffffffefffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000040)=[{&(0x7f0000010000)="601c6d6b646f736689254300080120000400004000f8000020004000030000000000000001", 0x25}, {0x0, 0x0, 0x10000}], 0x0, &(0x7f0000000040)=ANY=[]) 06:13:05 executing program 3: r0 = getpid() ioprio_get$pid(0x2, r0) r1 = getpid() ioprio_get$pid(0x2, r1) syz_mount_image$vfat(0x0, &(0x7f0000000040)='./file1\x00', 0x0, 0x0, &(0x7f00000000c0), 0x2002000, &(0x7f0000000400)=ANY=[@ANYRES16, @ANYBLOB="72e1af808ba473e6f37c85b113d8c4d9e1de4ed2968d2e01108c4795a941d14f6927393c8c3c458dd7454900d48719912efc18d580a8f841234284071012d7d5020eb5d56dc1ba5f1048adac4b928bf6cfd663b4cab43637cb979a9199a0246ec02345161783bc79585902603d7062084f05b744e31fcb4c3e81f3becabb7ad1fa5783f5e5e60ae912102fe8df0536bd074c03bd33742f35c5c44b5c3c9d693114367b7d966e"]) chdir(&(0x7f0000000140)='./file0\x00') ptrace$getenv(0x4201, r0, 0xfff, &(0x7f00000000c0)) openat(0xffffffffffffff9c, &(0x7f0000000000)='./file2\x00', 0x40c2, 0x0) r2 = perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x6, 0x0, 0xe}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r4 = fork() perf_event_open(&(0x7f0000000540)={0x0, 0x80, 0xeb, 0x0, 0x20, 0x0, 0x0, 0x2, 0x2820, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, @perf_config_ext={0xdc, 0x40}, 0x40000, 0x3, 0x8, 0x5, 0x6000000000000, 0x4, 0x5, 0x0, 0x3, 0x0, 0x3}, r4, 0x9, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000340)={0x0, 0x80, 0x2, 0x83, 0x1, 0x7, 0x0, 0x1f, 0x9ec17fc7a3e840c7, 0xc, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x9, 0x4, @perf_bp={&(0x7f0000000240), 0x1}, 0x404, 0x7, 0x3, 0x6, 0x800, 0x9, 0x3, 0x0, 0x7ff, 0x0, 0x9}, r4, 0x8, r2, 0x9) fork() setxattr$trusted_overlay_upper(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180), &(0x7f00000001c0)={0x0, 0xfb, 0x7a, 0x0, 0x2, "d54449275cb08faf62df87518e3ce16f", "9a61b461b0c63151b954990036d5e0163ceb48c6a801bb019e9e6fa7196a9372f804b9e9ca3fb3d85d1985d31346bbd5fd02b1c8223bf6388eb75498623e38ff88a99c5ce38698a32306b7d4e4b0fd4b03bfa568df17a42f725c6c33046b38b6e4a713dde1"}, 0x7a, 0x3) socket$nl_audit(0x10, 0x3, 0x9) chroot(&(0x7f0000000080)='./file1\x00') sendmsg$inet(r3, &(0x7f0000000780)={&(0x7f0000000000)={0x2, 0x0, @local}, 0x10, &(0x7f00000003c0)=[{&(0x7f0000000300)="6fb9", 0xffeb}], 0x1, &(0x7f0000000700)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @remote, @broadcast}}}], 0x20}, 0x0) 06:13:05 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x100000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="200300000002000019000000900100000f000000000000000100000005000000000004000040000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000001000018000000c28500002b02", 0x66, 0x400}, {&(0x7f0000010100)="000000000000000000000000e8f7d2e8feeb4bf889ba053b02420ff8010040", 0x1f, 0x4e0}], 0x0, &(0x7f0000000140)=ANY=[]) [ 2301.445465] loop7: detected capacity change from 0 to 2083 [ 2301.449834] loop6: detected capacity change from 0 to 4 [ 2301.480965] EXT4-fs (loop7): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 2301.482295] EXT4-fs (loop7): group descriptors corrupted! [ 2301.483860] EXT4-fs (loop6): bad geometry: block count 512 exceeds size of device (1 blocks) [ 2301.485733] loop5: detected capacity change from 0 to 2048 [ 2301.506856] EXT4-fs (loop5): inodes count not valid: 800 vs 32 [ 2301.512505] loop7: detected capacity change from 0 to 2083 [ 2301.515216] loop4: detected capacity change from 0 to 256 [ 2301.527213] loop5: detected capacity change from 0 to 2048 [ 2301.540649] EXT4-fs (loop7): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 2301.542040] EXT4-fs (loop7): group descriptors corrupted! [ 2301.546931] EXT4-fs (loop5): inodes count not valid: 800 vs 32 [ 2301.566139] FAT-fs (loop4): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) 06:13:05 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="200000660002000019000000900100000f000000000000000100000005000000000004000040000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000001000018000000c28500002b02", 0x66, 0x400}, {&(0x7f0000010100)="000000000000000000000000e8f7d2e8feeb4bf889ba053b02420ff8010040", 0x1f, 0x4e0}], 0x0, &(0x7f0000000140)=ANY=[]) 06:13:05 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x900000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000100000005000000000004000040000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000001000018000000c28500002b02", 0x66, 0x400}, {&(0x7f0000010100)="000000000000000000000000e8f7d2e8feeb4bf889ba053b02420ff8010040", 0x1f, 0x4e0}], 0x0, &(0x7f0000000140)=ANY=[]) 06:13:05 executing program 6: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="0a0000000002000019000000900100000f000000000000000100000005000000000004000040000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000001000018000000c28500002b02", 0x66, 0x400}, {&(0x7f0000010100)="000000000000000000000000e8f7d2e8feeb4bf889ba053b02420ff8010040", 0x1f, 0x4e0}], 0x0, &(0x7f0000000140)=ANY=[]) 06:13:06 executing program 7: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x104800, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000100000005000000000004000040000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000001000018000000c28500002b02", 0x66, 0x400}, {&(0x7f0000010100)="000000000000000000000000e8f7d2e8feeb4bf889ba053b02420ff8010040", 0x1f, 0x4e0}], 0x0, &(0x7f0000000140)=ANY=[]) 06:13:06 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x100000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="200400000002000019000000900100000f000000000000000100000005000000000004000040000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000001000018000000c28500002b02", 0x66, 0x400}, {&(0x7f0000010100)="000000000000000000000000e8f7d2e8feeb4bf889ba053b02420ff8010040", 0x1f, 0x4e0}], 0x0, &(0x7f0000000140)=ANY=[]) [ 2301.742886] loop6: detected capacity change from 0 to 4 [ 2301.771492] EXT4-fs (loop6): bad geometry: block count 512 exceeds size of device (1 blocks) 06:13:06 executing program 4: r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000040), 0xffffffffffffffff) syz_genetlink_get_family_id$ethtool(&(0x7f0000000100), 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_PAUSE_SET(0xffffffffffffffff, &(0x7f0000000440)={0x0, 0x0, 0x0}, 0x0) r2 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000080)='smaps\x00') pread64(r2, &(0x7f00000000c0)=""/98, 0x62, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x7fffffff) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(0xffffffffffffffff, 0xc0189374, &(0x7f0000000240)={{0x1, 0x1, 0x18, r0, {0x8}}, './file0\x00'}) dup3(0xffffffffffffffff, r2, 0x0) r3 = socket$inet_icmp_raw(0x2, 0x3, 0x1) syz_genetlink_get_family_id$ethtool(&(0x7f0000000180), r2) socket$nl_audit(0x10, 0x3, 0x9) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000040)={'wlan1\x00', 0x0}) sendmsg$inet(r3, &(0x7f0000000780)={&(0x7f0000000000)={0x2, 0x0, @local}, 0x10, &(0x7f00000003c0)=[{&(0x7f0000000300)="6fb9", 0xffeb}], 0x1, &(0x7f0000000700)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {r4, @remote, @broadcast}}}], 0x20}, 0x0) r5 = socket$inet_icmp_raw(0x2, 0x3, 0x1) socket$nl_audit(0x10, 0x3, 0x9) sendmsg$inet(r5, &(0x7f0000000780)={&(0x7f0000000000)={0x2, 0x0, @local}, 0x10, &(0x7f00000003c0)=[{&(0x7f0000000300)="6fb9", 0xffeb}], 0x1, &(0x7f0000000700)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @remote, @broadcast}}}], 0x20}, 0x0) sendmsg$ETHTOOL_MSG_LINKINFO_GET(r2, &(0x7f0000000200)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f00000001c0)={&(0x7f0000000340)=ANY=[@ANYBLOB='@\x00\x00\x00', @ANYRES16=r1, @ANYBLOB="000427bd7000ffdbdf25020000002c00018008000100", @ANYRES32=0x0, @ANYBLOB, @ANYRES32=r4, @ANYBLOB="d5b921cac279671a02c4d90ed2cbc802c00000009852d9e901fb17000000000000", @ANYRES32=0x0, @ANYBLOB], 0x40}, 0x1, 0x0, 0x0, 0x4}, 0xd0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000480), 0x1}, 0x603}, 0x0, 0xffffffefffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000040)=[{&(0x7f0000010000)="601c6d6b646f736689254300080120000400004000f8000020004000030000000000000001", 0x25}, {0x0, 0x0, 0x10000}], 0x0, &(0x7f0000000040)=ANY=[]) [ 2301.890075] loop7: detected capacity change from 0 to 2084 [ 2301.903227] loop5: detected capacity change from 0 to 2048 06:13:06 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="200004800002000019000000900100000f000000000000000100000005000000000004000040000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000001000018000000c28500002b02", 0x66, 0x400}, {&(0x7f0000010100)="000000000000000000000000e8f7d2e8feeb4bf889ba053b02420ff8010040", 0x1f, 0x4e0}], 0x0, &(0x7f0000000140)=ANY=[]) [ 2301.978024] EXT4-fs (loop7): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 2301.979477] EXT4-fs (loop7): group descriptors corrupted! [ 2301.984244] EXT4-fs (loop5): inodes count not valid: 1056 vs 32 [ 2301.998598] loop5: detected capacity change from 0 to 2048 06:13:06 executing program 6: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x100000, 0x0, 0x0, 0x0, &(0x7f0000000140)=ANY=[]) 06:13:06 executing program 1: pipe(&(0x7f0000000340)={0xffffffffffffffff}) pread64(r0, &(0x7f0000000440)=""/95, 0x5f, 0x6) execveat(r0, &(0x7f0000000080)='./file0\x00', &(0x7f00000001c0)=[&(0x7f00000000c0)='\x00', &(0x7f0000000180)='\x00'], &(0x7f0000000400)=[&(0x7f0000000200)='/dev/zero\x00', &(0x7f0000000240)='/dev/zero\x00', &(0x7f0000000300)='/dev/zero\x00'], 0x1000) socket$inet(0x2, 0x1, 0x0) perf_event_open(&(0x7f0000000100)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x22420, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ptrace$setopts(0x4200, 0x0, 0x5, 0x100050) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000004c00)={0xc0002100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) gettid() r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000), 0x380, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000000)='net/udp6\x00') read$hiddev(r2, &(0x7f0000001140)=""/212, 0xd4) fchmodat(0xffffffffffffffff, &(0x7f00000004c0)='./file0\x00', 0x0) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(r1, 0xc018937c, &(0x7f0000000380)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32=r0, @ANYBLOB="00000000000000002e2f66696cee8816"]) ioctl$TIOCSSOFTCAR(r3, 0x541a, &(0x7f00000003c0)=0x6) waitid$P_PIDFD(0x3, r1, &(0x7f0000000500), 0x2, &(0x7f0000000580)) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(r1, 0xc0189372, &(0x7f0000000040)={{0x1, 0x1, 0x18, r2, {0xffff}}, './file0\x00'}) [ 2302.022151] EXT4-fs (loop5): inodes count not valid: 1056 vs 32 06:13:06 executing program 0: pipe(&(0x7f0000000340)={0xffffffffffffffff}) pread64(r0, &(0x7f0000000440)=""/95, 0x5f, 0x6) execveat(r0, &(0x7f0000000080)='./file0\x00', &(0x7f00000001c0)=[&(0x7f00000000c0)='\x00', &(0x7f0000000180)='\x00'], &(0x7f0000000400)=[&(0x7f0000000200)='/dev/zero\x00', &(0x7f0000000240)='/dev/zero\x00', &(0x7f0000000300)='/dev/zero\x00'], 0x1000) socket$inet(0x2, 0x1, 0x0) perf_event_open(&(0x7f0000000100)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x22420, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ptrace$setopts(0x4200, 0x0, 0x5, 0x100050) perf_event_open(&(0x7f0000000280)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000004c00)={0xc0002100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) gettid() r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000), 0x380, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000000)='net/udp6\x00') read$hiddev(r2, &(0x7f0000001140)=""/212, 0xd4) fchmodat(r2, &(0x7f00000004c0)='./file0\x00', 0x0) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(r1, 0xc018937c, &(0x7f0000000380)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32=r0, @ANYBLOB="00000000000000002e2f66696cee8816"]) ioctl$TIOCSSOFTCAR(r3, 0x541a, &(0x7f00000003c0)=0x6) waitid$P_PIDFD(0x3, r1, &(0x7f0000000500), 0x2, &(0x7f0000000580)) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(r1, 0xc0189372, &(0x7f0000000040)={{0x1, 0x1, 0x18, r2, {0xffff}}, './file0\x00'}) [ 2302.054312] loop4: detected capacity change from 0 to 256 [ 2302.063440] No source specified 06:13:06 executing program 3: r0 = getpid() ioprio_get$pid(0x2, r0) r1 = getpid() ioprio_get$pid(0x2, r1) syz_mount_image$vfat(0x0, &(0x7f0000000040)='./file1\x00', 0x0, 0x0, &(0x7f00000000c0), 0x2002000, &(0x7f0000000400)=ANY=[@ANYRES16, @ANYBLOB="72e1af808ba473e6f37c85b113d8c4d9e1de4ed2968d2e01108c4795a941d14f6927393c8c3c458dd7454900d48719912efc18d580a8f841234284071012d7d5020eb5d56dc1ba5f1048adac4b928bf6cfd663b4cab43637cb979a9199a0246ec02345161783bc79585902603d7062084f05b744e31fcb4c3e81f3becabb7ad1fa5783f5e5e60ae912102fe8df0536bd074c03bd33742f35c5c44b5c3c9d693114367b7d966e"]) chdir(&(0x7f0000000140)='./file0\x00') ptrace$getenv(0x4201, r0, 0xfff, &(0x7f00000000c0)) openat(0xffffffffffffff9c, &(0x7f0000000000)='./file2\x00', 0x40c2, 0x0) r2 = perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x6, 0x0, 0xe}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r4 = fork() perf_event_open(&(0x7f0000000540)={0x0, 0x80, 0xeb, 0x0, 0x20, 0x0, 0x0, 0x2, 0x2820, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, @perf_config_ext={0xdc, 0x40}, 0x40000, 0x3, 0x8, 0x5, 0x6000000000000, 0x4, 0x5, 0x0, 0x3, 0x0, 0x3}, r4, 0x9, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000340)={0x0, 0x80, 0x2, 0x83, 0x1, 0x7, 0x0, 0x1f, 0x9ec17fc7a3e840c7, 0xc, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x9, 0x4, @perf_bp={&(0x7f0000000240), 0x1}, 0x404, 0x7, 0x3, 0x6, 0x800, 0x9, 0x3, 0x0, 0x7ff, 0x0, 0x9}, r4, 0x8, r2, 0x9) fork() setxattr$trusted_overlay_upper(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180), &(0x7f00000001c0)={0x0, 0xfb, 0x7a, 0x0, 0x2, "d54449275cb08faf62df87518e3ce16f", "9a61b461b0c63151b954990036d5e0163ceb48c6a801bb019e9e6fa7196a9372f804b9e9ca3fb3d85d1985d31346bbd5fd02b1c8223bf6388eb75498623e38ff88a99c5ce38698a32306b7d4e4b0fd4b03bfa568df17a42f725c6c33046b38b6e4a713dde1"}, 0x7a, 0x3) socket$nl_audit(0x10, 0x3, 0x9) chroot(&(0x7f0000000080)='./file1\x00') sendmsg$inet(r3, &(0x7f0000000780)={&(0x7f0000000000)={0x2, 0x0, @local}, 0x10, &(0x7f00000003c0)=[{&(0x7f0000000300)="6fb9", 0xffeb}], 0x1, &(0x7f0000000700)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @remote, @broadcast}}}], 0x20}, 0x0) 06:13:06 executing program 7: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x104c00, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000100000005000000000004000040000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000001000018000000c28500002b02", 0x66, 0x400}, {&(0x7f0000010100)="000000000000000000000000e8f7d2e8feeb4bf889ba053b02420ff8010040", 0x1f, 0x4e0}], 0x0, &(0x7f0000000140)=ANY=[]) [ 2302.126566] FAT-fs (loop4): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) 06:13:06 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x100000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="200500000002000019000000900100000f000000000000000100000005000000000004000040000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000001000018000000c28500002b02", 0x66, 0x400}, {&(0x7f0000010100)="000000000000000000000000e8f7d2e8feeb4bf889ba053b02420ff8010040", 0x1f, 0x4e0}], 0x0, &(0x7f0000000140)=ANY=[]) 06:13:06 executing program 6: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x100000, 0x0, 0x0, 0x0, &(0x7f0000000140)=ANY=[]) 06:13:06 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="200009c00002000019000000900100000f000000000000000100000005000000000004000040000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000001000018000000c28500002b02", 0x66, 0x400}, {&(0x7f0000010100)="000000000000000000000000e8f7d2e8feeb4bf889ba053b02420ff8010040", 0x1f, 0x4e0}], 0x0, &(0x7f0000000140)=ANY=[]) [ 2302.270788] loop7: detected capacity change from 0 to 2086 [ 2302.293980] EXT4-fs (loop7): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 2302.295476] EXT4-fs (loop7): group descriptors corrupted! [ 2302.304175] loop5: detected capacity change from 0 to 2048 [ 2302.313643] EXT4-fs (loop5): inodes count not valid: 1312 vs 32 [ 2302.321812] loop7: detected capacity change from 0 to 2086 [ 2302.335297] EXT4-fs (loop7): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 2302.336690] EXT4-fs (loop7): group descriptors corrupted! [ 2302.339109] loop5: detected capacity change from 0 to 2048 [ 2302.353114] No source specified [ 2302.369362] EXT4-fs (loop5): inodes count not valid: 1312 vs 32 06:13:23 executing program 6: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x100000, 0x0, 0x0, 0x0, &(0x7f0000000140)=ANY=[]) 06:13:23 executing program 0: pipe(&(0x7f0000000340)={0xffffffffffffffff}) pread64(r0, &(0x7f0000000440)=""/95, 0x5f, 0x6) execveat(r0, &(0x7f0000000080)='./file0\x00', &(0x7f00000001c0)=[&(0x7f00000000c0)='\x00', &(0x7f0000000180)='\x00'], &(0x7f0000000400)=[&(0x7f0000000200)='/dev/zero\x00', &(0x7f0000000240)='/dev/zero\x00', &(0x7f0000000300)='/dev/zero\x00'], 0x1000) socket$inet(0x2, 0x1, 0x0) perf_event_open(&(0x7f0000000100)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x22420, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ptrace$setopts(0x4200, 0x0, 0x5, 0x100050) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000004c00)={0xc0002100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) gettid() r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000), 0x380, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000000)='net/udp6\x00') read$hiddev(r2, &(0x7f0000001140)=""/212, 0xd4) fchmodat(0xffffffffffffffff, &(0x7f00000004c0)='./file0\x00', 0x0) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(r1, 0xc018937c, &(0x7f0000000380)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32=r0, @ANYBLOB="00000000000000002e2f66696cee8816"]) ioctl$TIOCSSOFTCAR(r3, 0x541a, &(0x7f00000003c0)=0x6) waitid$P_PIDFD(0x3, r1, &(0x7f0000000500), 0x2, &(0x7f0000000580)) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(r1, 0xc0189372, &(0x7f0000000040)={{0x1, 0x1, 0x18, r2, {0xffff}}, './file0\x00'}) 06:13:23 executing program 3: r0 = getpid() ioprio_get$pid(0x2, r0) r1 = getpid() ioprio_get$pid(0x2, r1) syz_mount_image$vfat(0x0, &(0x7f0000000040)='./file1\x00', 0x0, 0x0, &(0x7f00000000c0), 0x2002000, &(0x7f0000000400)=ANY=[@ANYRES16, @ANYBLOB="72e1af808ba473e6f37c85b113d8c4d9e1de4ed2968d2e01108c4795a941d14f6927393c8c3c458dd7454900d48719912efc18d580a8f841234284071012d7d5020eb5d56dc1ba5f1048adac4b928bf6cfd663b4cab43637cb979a9199a0246ec02345161783bc79585902603d7062084f05b744e31fcb4c3e81f3becabb7ad1fa5783f5e5e60ae912102fe8df0536bd074c03bd33742f35c5c44b5c3c9d693114367b7d966e"]) chdir(&(0x7f0000000140)='./file0\x00') ptrace$getenv(0x4201, r0, 0xfff, &(0x7f00000000c0)) openat(0xffffffffffffff9c, &(0x7f0000000000)='./file2\x00', 0x40c2, 0x0) r2 = perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x6, 0x0, 0xe}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r4 = fork() perf_event_open(&(0x7f0000000540)={0x0, 0x80, 0xeb, 0x0, 0x20, 0x0, 0x0, 0x2, 0x2820, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, @perf_config_ext={0xdc, 0x40}, 0x40000, 0x3, 0x8, 0x5, 0x6000000000000, 0x4, 0x5, 0x0, 0x3, 0x0, 0x3}, r4, 0x9, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000340)={0x0, 0x80, 0x2, 0x83, 0x1, 0x7, 0x0, 0x1f, 0x9ec17fc7a3e840c7, 0xc, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x9, 0x4, @perf_bp={&(0x7f0000000240), 0x1}, 0x404, 0x7, 0x3, 0x6, 0x800, 0x9, 0x3, 0x0, 0x7ff, 0x0, 0x9}, r4, 0x8, r2, 0x9) fork() setxattr$trusted_overlay_upper(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180), &(0x7f00000001c0)={0x0, 0xfb, 0x7a, 0x0, 0x2, "d54449275cb08faf62df87518e3ce16f", "9a61b461b0c63151b954990036d5e0163ceb48c6a801bb019e9e6fa7196a9372f804b9e9ca3fb3d85d1985d31346bbd5fd02b1c8223bf6388eb75498623e38ff88a99c5ce38698a32306b7d4e4b0fd4b03bfa568df17a42f725c6c33046b38b6e4a713dde1"}, 0x7a, 0x3) socket$nl_audit(0x10, 0x3, 0x9) chroot(&(0x7f0000000080)='./file1\x00') sendmsg$inet(r3, &(0x7f0000000780)={&(0x7f0000000000)={0x2, 0x0, @local}, 0x10, &(0x7f00000003c0)=[{&(0x7f0000000300)="6fb9", 0xffeb}], 0x1, &(0x7f0000000700)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @remote, @broadcast}}}], 0x20}, 0x0) 06:13:23 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x100000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="200600000002000019000000900100000f000000000000000100000005000000000004000040000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000001000018000000c28500002b02", 0x66, 0x400}, {&(0x7f0000010100)="000000000000000000000000e8f7d2e8feeb4bf889ba053b02420ff8010040", 0x1f, 0x4e0}], 0x0, &(0x7f0000000140)=ANY=[]) 06:13:23 executing program 4: r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000040), 0xffffffffffffffff) syz_genetlink_get_family_id$ethtool(&(0x7f0000000100), 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_PAUSE_SET(0xffffffffffffffff, &(0x7f0000000440)={0x0, 0x0, 0x0}, 0x0) r2 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000080)='smaps\x00') pread64(r2, &(0x7f00000000c0)=""/98, 0x62, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x7fffffff) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(0xffffffffffffffff, 0xc0189374, &(0x7f0000000240)={{0x1, 0x1, 0x18, r0, {0x8}}, './file0\x00'}) dup3(0xffffffffffffffff, r2, 0x0) r3 = socket$inet_icmp_raw(0x2, 0x3, 0x1) syz_genetlink_get_family_id$ethtool(&(0x7f0000000180), r2) socket$nl_audit(0x10, 0x3, 0x9) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000040)={'wlan1\x00', 0x0}) sendmsg$inet(r3, &(0x7f0000000780)={&(0x7f0000000000)={0x2, 0x0, @local}, 0x10, &(0x7f00000003c0)=[{&(0x7f0000000300)="6fb9", 0xffeb}], 0x1, &(0x7f0000000700)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {r4, @remote, @broadcast}}}], 0x20}, 0x0) r5 = socket$inet_icmp_raw(0x2, 0x3, 0x1) socket$nl_audit(0x10, 0x3, 0x9) sendmsg$inet(r5, &(0x7f0000000780)={&(0x7f0000000000)={0x2, 0x0, @local}, 0x10, &(0x7f00000003c0)=[{&(0x7f0000000300)="6fb9", 0xffeb}], 0x1, &(0x7f0000000700)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @remote, @broadcast}}}], 0x20}, 0x0) sendmsg$ETHTOOL_MSG_LINKINFO_GET(r2, &(0x7f0000000200)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f00000001c0)={&(0x7f0000000340)=ANY=[@ANYBLOB='@\x00\x00\x00', @ANYRES16=r1, @ANYBLOB="000427bd7000ffdbdf25020000002c00018008000100", @ANYRES32=0x0, @ANYBLOB, @ANYRES32=r4, @ANYBLOB="d5b921cac279671a02c4d90ed2cbc802c00000009852d9e901fb17000000000000", @ANYRES32=0x0, @ANYBLOB], 0x40}, 0x1, 0x0, 0x0, 0x4}, 0xd0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000480), 0x1}, 0x603}, 0x0, 0xffffffefffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000040)=[{&(0x7f0000010000)="601c6d6b646f736689254300080120000400004000f8000020004000030000000000000001", 0x25}, {0x0, 0x0, 0x10000}], 0x0, &(0x7f0000000040)=ANY=[]) [ 2318.884342] loop5: detected capacity change from 0 to 2048 [ 2318.885239] loop7: detected capacity change from 0 to 2090 06:13:23 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="200000f00002000019000000900100000f000000000000000100000005000000000004000040000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000001000018000000c28500002b02", 0x66, 0x400}, {&(0x7f0000010100)="000000000000000000000000e8f7d2e8feeb4bf889ba053b02420ff8010040", 0x1f, 0x4e0}], 0x0, &(0x7f0000000140)=ANY=[]) 06:13:23 executing program 1: pipe(&(0x7f0000000340)={0xffffffffffffffff}) pread64(r0, &(0x7f0000000440)=""/95, 0x5f, 0x6) execveat(r0, &(0x7f0000000080)='./file0\x00', &(0x7f00000001c0)=[&(0x7f00000000c0)='\x00', &(0x7f0000000180)='\x00'], &(0x7f0000000400)=[&(0x7f0000000200)='/dev/zero\x00', &(0x7f0000000240)='/dev/zero\x00', &(0x7f0000000300)='/dev/zero\x00'], 0x1000) socket$inet(0x2, 0x1, 0x0) perf_event_open(&(0x7f0000000100)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x22420, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ptrace$setopts(0x4200, 0x0, 0x5, 0x100050) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000004c00)={0xc0002100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) gettid() r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000), 0x380, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000000)='net/udp6\x00') read$hiddev(r2, &(0x7f0000001140)=""/212, 0xd4) fchmodat(r2, 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(r1, 0xc018937c, &(0x7f0000000380)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32=r0, @ANYBLOB="00000000000000002e2f66696cee8816"]) ioctl$TIOCSSOFTCAR(r3, 0x541a, &(0x7f00000003c0)=0x6) waitid$P_PIDFD(0x3, r1, &(0x7f0000000500), 0x2, &(0x7f0000000580)) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(r1, 0xc0189372, &(0x7f0000000040)={{0x1, 0x1, 0x18, r2, {0xffff}}, './file0\x00'}) 06:13:23 executing program 7: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x105500, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000100000005000000000004000040000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000001000018000000c28500002b02", 0x66, 0x400}, {&(0x7f0000010100)="000000000000000000000000e8f7d2e8feeb4bf889ba053b02420ff8010040", 0x1f, 0x4e0}], 0x0, &(0x7f0000000140)=ANY=[]) [ 2318.891047] EXT4-fs (loop7): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 2318.891816] EXT4-fs (loop7): group descriptors corrupted! [ 2318.900968] No source specified [ 2318.914585] loop7: detected capacity change from 0 to 2090 [ 2318.927058] EXT4-fs (loop7): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 2318.927922] EXT4-fs (loop7): group descriptors corrupted! [ 2318.938248] EXT4-fs (loop5): inodes count not valid: 1568 vs 32 [ 2318.958034] loop5: detected capacity change from 0 to 2048 [ 2318.980091] EXT4-fs (loop5): inodes count not valid: 1568 vs 32 06:13:23 executing program 6: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x100000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="0a0000000002000019000000900100000f000000000000000100000005000000000004000040000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000001000018000000c28500002b02", 0x66, 0x400}], 0x0, &(0x7f0000000140)=ANY=[]) [ 2318.993971] loop4: detected capacity change from 0 to 256 06:13:23 executing program 7: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x106000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000100000005000000000004000040000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000001000018000000c28500002b02", 0x66, 0x400}, {&(0x7f0000010100)="000000000000000000000000e8f7d2e8feeb4bf889ba053b02420ff8010040", 0x1f, 0x4e0}], 0x0, &(0x7f0000000140)=ANY=[]) 06:13:23 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="2000fffe0002000019000000900100000f000000000000000100000005000000000004000040000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000001000018000000c28500002b02", 0x66, 0x400}, {&(0x7f0000010100)="000000000000000000000000e8f7d2e8feeb4bf889ba053b02420ff8010040", 0x1f, 0x4e0}], 0x0, &(0x7f0000000140)=ANY=[]) [ 2319.018778] FAT-fs (loop4): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) [ 2319.080085] loop7: detected capacity change from 0 to 2096 [ 2319.100475] EXT4-fs (loop7): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 2319.101225] EXT4-fs (loop7): group descriptors corrupted! 06:13:23 executing program 4: r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000040), 0xffffffffffffffff) syz_genetlink_get_family_id$ethtool(&(0x7f0000000100), 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_PAUSE_SET(0xffffffffffffffff, &(0x7f0000000440)={0x0, 0x0, 0x0}, 0x0) r2 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000080)='smaps\x00') pread64(r2, &(0x7f00000000c0)=""/98, 0x62, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x7fffffff) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(0xffffffffffffffff, 0xc0189374, &(0x7f0000000240)={{0x1, 0x1, 0x18, r0, {0x8}}, './file0\x00'}) dup3(0xffffffffffffffff, r2, 0x0) r3 = socket$inet_icmp_raw(0x2, 0x3, 0x1) syz_genetlink_get_family_id$ethtool(&(0x7f0000000180), r2) socket$nl_audit(0x10, 0x3, 0x9) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000040)={'wlan1\x00', 0x0}) sendmsg$inet(r3, &(0x7f0000000780)={&(0x7f0000000000)={0x2, 0x0, @local}, 0x10, &(0x7f00000003c0)=[{&(0x7f0000000300)="6fb9", 0xffeb}], 0x1, &(0x7f0000000700)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {r4, @remote, @broadcast}}}], 0x20}, 0x0) r5 = socket$inet_icmp_raw(0x2, 0x3, 0x1) socket$nl_audit(0x10, 0x3, 0x9) sendmsg$inet(r5, &(0x7f0000000780)={&(0x7f0000000000)={0x2, 0x0, @local}, 0x10, &(0x7f00000003c0)=[{&(0x7f0000000300)="6fb9", 0xffeb}], 0x1, &(0x7f0000000700)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @remote, @broadcast}}}], 0x20}, 0x0) sendmsg$ETHTOOL_MSG_LINKINFO_GET(r2, &(0x7f0000000200)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f00000001c0)={&(0x7f0000000340)=ANY=[@ANYBLOB='@\x00\x00\x00', @ANYRES16=r1, @ANYBLOB="000427bd7000ffdbdf25020000002c00018008000100", @ANYRES32=0x0, @ANYBLOB, @ANYRES32=r4, @ANYBLOB="d5b921cac279671a02c4d90ed2cbc802c00000009852d9e901fb17000000000000", @ANYRES32=0x0, @ANYBLOB], 0x40}, 0x1, 0x0, 0x0, 0x4}, 0xd0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000480), 0x1}, 0x603}, 0x0, 0xffffffefffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000040)=[{&(0x7f0000010000)="601c6d6b646f736689254300080120000400004000f8000020004000030000000000000001", 0x25}, {0x0, 0x0, 0x10000}], 0x0, &(0x7f0000000040)=ANY=[]) 06:13:23 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x100000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="200700000002000019000000900100000f000000000000000100000005000000000004000040000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000001000018000000c28500002b02", 0x66, 0x400}, {&(0x7f0000010100)="000000000000000000000000e8f7d2e8feeb4bf889ba053b02420ff8010040", 0x1f, 0x4e0}], 0x0, &(0x7f0000000140)=ANY=[]) [ 2319.140094] loop6: detected capacity change from 0 to 2048 06:13:23 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="2000feff0002000019000000900100000f000000000000000100000005000000000004000040000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000001000018000000c28500002b02", 0x66, 0x400}, {&(0x7f0000010100)="000000000000000000000000e8f7d2e8feeb4bf889ba053b02420ff8010040", 0x1f, 0x4e0}], 0x0, &(0x7f0000000140)=ANY=[]) [ 2319.206066] EXT4-fs (loop6): unsupported descriptor size 0 [ 2319.226632] loop5: detected capacity change from 0 to 2048 [ 2319.235748] loop4: detected capacity change from 0 to 256 [ 2319.242286] EXT4-fs (loop5): inodes count not valid: 1824 vs 32 [ 2319.251257] loop5: detected capacity change from 0 to 2048 [ 2319.251828] FAT-fs (loop4): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) [ 2319.262734] EXT4-fs (loop5): inodes count not valid: 1824 vs 32 06:13:41 executing program 3: r0 = getpid() ioprio_get$pid(0x2, r0) r1 = getpid() ioprio_get$pid(0x2, r1) syz_mount_image$vfat(0x0, &(0x7f0000000040)='./file1\x00', 0x0, 0x0, &(0x7f00000000c0), 0x2002000, &(0x7f0000000400)=ANY=[@ANYRES16, @ANYBLOB="72e1af808ba473e6f37c85b113d8c4d9e1de4ed2968d2e01108c4795a941d14f6927393c8c3c458dd7454900d48719912efc18d580a8f841234284071012d7d5020eb5d56dc1ba5f1048adac4b928bf6cfd663b4cab43637cb979a9199a0246ec02345161783bc79585902603d7062084f05b744e31fcb4c3e81f3becabb7ad1fa5783f5e5e60ae912102fe8df0536bd074c03bd33742f35c5c44b5c3c9d693114367b7d966e"]) chdir(&(0x7f0000000140)='./file0\x00') ptrace$getenv(0x4201, r0, 0xfff, &(0x7f00000000c0)) openat(0xffffffffffffff9c, &(0x7f0000000000)='./file2\x00', 0x40c2, 0x0) r2 = perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x6, 0x0, 0xe}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r4 = fork() perf_event_open(&(0x7f0000000540)={0x4, 0x80, 0x0, 0x0, 0x20, 0x0, 0x0, 0x2, 0x2820, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, @perf_config_ext={0xdc, 0x40}, 0x40000, 0x3, 0x8, 0x5, 0x6000000000000, 0x4, 0x5, 0x0, 0x3, 0x0, 0x3}, r4, 0x9, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000340)={0x0, 0x80, 0x2, 0x83, 0x1, 0x7, 0x0, 0x1f, 0x9ec17fc7a3e840c7, 0xc, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x9, 0x4, @perf_bp={&(0x7f0000000240), 0x1}, 0x404, 0x7, 0x3, 0x6, 0x800, 0x9, 0x3, 0x0, 0x7ff, 0x0, 0x9}, r4, 0x8, r2, 0x9) fork() setxattr$trusted_overlay_upper(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180), &(0x7f00000001c0)={0x0, 0xfb, 0x7a, 0x0, 0x2, "d54449275cb08faf62df87518e3ce16f", "9a61b461b0c63151b954990036d5e0163ceb48c6a801bb019e9e6fa7196a9372f804b9e9ca3fb3d85d1985d31346bbd5fd02b1c8223bf6388eb75498623e38ff88a99c5ce38698a32306b7d4e4b0fd4b03bfa568df17a42f725c6c33046b38b6e4a713dde1"}, 0x7a, 0x3) socket$nl_audit(0x10, 0x3, 0x9) chroot(&(0x7f0000000080)='./file1\x00') sendmsg$inet(r3, &(0x7f0000000780)={&(0x7f0000000000)={0x2, 0x0, @local}, 0x10, &(0x7f00000003c0)=[{&(0x7f0000000300)="6fb9", 0xffeb}], 0x1, &(0x7f0000000700)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @remote, @broadcast}}}], 0x20}, 0x0) 06:13:41 executing program 1: pipe(&(0x7f0000000340)={0xffffffffffffffff}) pread64(r0, &(0x7f0000000440)=""/95, 0x5f, 0x6) execveat(r0, &(0x7f0000000080)='./file0\x00', &(0x7f00000001c0)=[&(0x7f00000000c0)='\x00', &(0x7f0000000180)='\x00'], &(0x7f0000000400)=[&(0x7f0000000200)='/dev/zero\x00', &(0x7f0000000240)='/dev/zero\x00', &(0x7f0000000300)='/dev/zero\x00'], 0x1000) socket$inet(0x2, 0x1, 0x0) perf_event_open(&(0x7f0000000100)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x22420, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ptrace$setopts(0x4200, 0x0, 0x5, 0x100050) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000004c00)={0xc0002100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) gettid() r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000), 0x380, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000000)='net/udp6\x00') read$hiddev(r2, &(0x7f0000001140)=""/212, 0xd4) fchmodat(r2, 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(r1, 0xc018937c, &(0x7f0000000380)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32=r0, @ANYBLOB="00000000000000002e2f66696cee8816"]) ioctl$TIOCSSOFTCAR(r3, 0x541a, &(0x7f00000003c0)=0x6) waitid$P_PIDFD(0x3, r1, &(0x7f0000000500), 0x2, &(0x7f0000000580)) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(r1, 0xc0189372, &(0x7f0000000040)={{0x1, 0x1, 0x18, r2, {0xffff}}, './file0\x00'}) 06:13:41 executing program 0: r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_genetlink_get_family_id$ethtool(&(0x7f0000000040), 0xffffffffffffffff) syz_genetlink_get_family_id$ethtool(&(0x7f0000000100), 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_PAUSE_SET(0xffffffffffffffff, &(0x7f0000000440)={0x0, 0x0, 0x0}, 0x0) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000080)='smaps\x00') pread64(r1, &(0x7f00000000c0)=""/98, 0x62, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x7fffffff) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(0xffffffffffffffff, 0xc0189374, &(0x7f0000000240)={{0x1, 0x1, 0x18, r0, {0x8}}, './file0\x00'}) dup3(0xffffffffffffffff, r1, 0x0) r2 = socket$inet_icmp_raw(0x2, 0x3, 0x1) syz_genetlink_get_family_id$ethtool(&(0x7f0000000180), r1) socket$nl_audit(0x10, 0x3, 0x9) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000040)={'wlan1\x00', 0x0}) sendmsg$inet(r2, &(0x7f0000000780)={&(0x7f0000000000)={0x2, 0x0, @local}, 0x10, &(0x7f00000003c0)=[{&(0x7f0000000300)="6fb9", 0xffeb}], 0x1, &(0x7f0000000700)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {r3, @remote, @broadcast}}}], 0x20}, 0x0) r4 = socket$inet_icmp_raw(0x2, 0x3, 0x1) socket$nl_audit(0x10, 0x3, 0x9) sendmsg$inet(r4, &(0x7f0000000780)={&(0x7f0000000000)={0x2, 0x0, @local}, 0x10, &(0x7f00000003c0)=[{&(0x7f0000000300)="6fb9", 0xffeb}], 0x1, &(0x7f0000000700)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @remote, @broadcast}}}], 0x20}, 0x0) sendmsg$ETHTOOL_MSG_LINKINFO_GET(r1, &(0x7f0000000200)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f00000001c0)={0x0, 0x40}, 0x1, 0x0, 0x0, 0x4}, 0xd0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000480), 0x1}, 0x603}, 0x0, 0xffffffefffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000040)=[{&(0x7f0000010000)="601c6d6b646f736689254300080120000400004000f8000020004000030000000000000001", 0x25}, {0x0, 0x0, 0x10000}], 0x0, &(0x7f0000000040)=ANY=[]) 06:13:41 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x100000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="200800000002000019000000900100000f000000000000000100000005000000000004000040000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000001000018000000c28500002b02", 0x66, 0x400}, {&(0x7f0000010100)="000000000000000000000000e8f7d2e8feeb4bf889ba053b02420ff8010040", 0x1f, 0x4e0}], 0x0, &(0x7f0000000140)=ANY=[]) 06:13:41 executing program 7: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x106800, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000100000005000000000004000040000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000001000018000000c28500002b02", 0x66, 0x400}, {&(0x7f0000010100)="000000000000000000000000e8f7d2e8feeb4bf889ba053b02420ff8010040", 0x1f, 0x4e0}], 0x0, &(0x7f0000000140)=ANY=[]) 06:13:41 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000003000019000000900100000f000000000000000100000005000000000004000040000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000001000018000000c28500002b02", 0x66, 0x400}, {&(0x7f0000010100)="000000000000000000000000e8f7d2e8feeb4bf889ba053b02420ff8010040", 0x1f, 0x4e0}], 0x0, &(0x7f0000000140)=ANY=[]) 06:13:41 executing program 4: r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000040), 0xffffffffffffffff) syz_genetlink_get_family_id$ethtool(&(0x7f0000000100), 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_PAUSE_SET(0xffffffffffffffff, &(0x7f0000000440)={0x0, 0x0, 0x0}, 0x0) r2 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000080)='smaps\x00') pread64(r2, &(0x7f00000000c0)=""/98, 0x62, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x7fffffff) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(0xffffffffffffffff, 0xc0189374, &(0x7f0000000240)={{0x1, 0x1, 0x18, r0, {0x8}}, './file0\x00'}) dup3(0xffffffffffffffff, r2, 0x0) r3 = socket$inet_icmp_raw(0x2, 0x3, 0x1) syz_genetlink_get_family_id$ethtool(&(0x7f0000000180), r2) socket$nl_audit(0x10, 0x3, 0x9) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000040)={'wlan1\x00', 0x0}) sendmsg$inet(r3, &(0x7f0000000780)={&(0x7f0000000000)={0x2, 0x0, @local}, 0x10, &(0x7f00000003c0)=[{&(0x7f0000000300)="6fb9", 0xffeb}], 0x1, &(0x7f0000000700)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {r4, @remote, @broadcast}}}], 0x20}, 0x0) r5 = socket$inet_icmp_raw(0x2, 0x3, 0x1) socket$nl_audit(0x10, 0x3, 0x9) sendmsg$inet(r5, &(0x7f0000000780)={&(0x7f0000000000)={0x2, 0x0, @local}, 0x10, &(0x7f00000003c0)=[{&(0x7f0000000300)="6fb9", 0xffeb}], 0x1, &(0x7f0000000700)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @remote, @broadcast}}}], 0x20}, 0x0) sendmsg$ETHTOOL_MSG_LINKINFO_GET(r2, &(0x7f0000000200)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f00000001c0)={&(0x7f0000000340)=ANY=[@ANYBLOB='@\x00\x00\x00', @ANYRES16=r1, @ANYBLOB="000427bd7000ffdbdf25020000002c00018008000100", @ANYRES32=0x0, @ANYBLOB='\b\x00C\x00\x00\x00', @ANYRES32=r4, @ANYBLOB="d5b921cac279671a02c4d90ed2cbc802c00000009852d9e901fb17000000000000", @ANYRES32=0x0, @ANYBLOB], 0x40}, 0x1, 0x0, 0x0, 0x4}, 0xd0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000480), 0x1}, 0x603}, 0x0, 0xffffffefffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000040)=[{&(0x7f0000010000)="601c6d6b646f736689254300080120000400004000f8000020004000030000000000000001", 0x25}, {0x0, 0x0, 0x10000}], 0x0, &(0x7f0000000040)=ANY=[]) 06:13:41 executing program 6: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x100000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="0a0000000002000019000000900100000f000000000000000100000005000000000004000040000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000001000018000000c28500002b02", 0x66, 0x400}], 0x0, &(0x7f0000000140)=ANY=[]) [ 2336.769926] loop6: detected capacity change from 0 to 2048 [ 2336.776862] loop7: detected capacity change from 0 to 2100 [ 2336.779886] loop5: detected capacity change from 0 to 2048 [ 2336.786905] EXT4-fs (loop6): unsupported descriptor size 0 [ 2336.797243] EXT4-fs (loop7): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 2336.797979] EXT4-fs (loop7): group descriptors corrupted! [ 2336.800651] EXT4-fs (loop5): inodes count not valid: 2080 vs 32 [ 2336.809031] loop7: detected capacity change from 0 to 2100 [ 2336.810238] loop5: detected capacity change from 0 to 2048 [ 2336.813318] loop4: detected capacity change from 0 to 256 [ 2336.823088] EXT4-fs (loop7): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 2336.823849] EXT4-fs (loop7): group descriptors corrupted! [ 2336.824382] EXT4-fs (loop5): inodes count not valid: 2080 vs 32 [ 2336.834272] FAT-fs (loop4): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) 06:13:41 executing program 6: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x100000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="0a0000000002000019000000900100000f000000000000000100000005000000000004000040000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000001000018000000c28500002b02", 0x66, 0x400}], 0x0, &(0x7f0000000140)=ANY=[]) 06:13:41 executing program 7: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x106c00, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000100000005000000000004000040000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000001000018000000c28500002b02", 0x66, 0x400}, {&(0x7f0000010100)="000000000000000000000000e8f7d2e8feeb4bf889ba053b02420ff8010040", 0x1f, 0x4e0}], 0x0, &(0x7f0000000140)=ANY=[]) 06:13:41 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x100000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="200900000002000019000000900100000f000000000000000100000005000000000004000040000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000001000018000000c28500002b02", 0x66, 0x400}, {&(0x7f0000010100)="000000000000000000000000e8f7d2e8feeb4bf889ba053b02420ff8010040", 0x1f, 0x4e0}], 0x0, &(0x7f0000000140)=ANY=[]) 06:13:41 executing program 4: r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000040), 0xffffffffffffffff) syz_genetlink_get_family_id$ethtool(&(0x7f0000000100), 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_PAUSE_SET(0xffffffffffffffff, &(0x7f0000000440)={0x0, 0x0, 0x0}, 0x0) r2 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000080)='smaps\x00') pread64(r2, &(0x7f00000000c0)=""/98, 0x62, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x7fffffff) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(0xffffffffffffffff, 0xc0189374, &(0x7f0000000240)={{0x1, 0x1, 0x18, r0, {0x8}}, './file0\x00'}) dup3(0xffffffffffffffff, r2, 0x0) r3 = socket$inet_icmp_raw(0x2, 0x3, 0x1) syz_genetlink_get_family_id$ethtool(&(0x7f0000000180), r2) socket$nl_audit(0x10, 0x3, 0x9) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000040)={'wlan1\x00', 0x0}) sendmsg$inet(r3, &(0x7f0000000780)={&(0x7f0000000000)={0x2, 0x0, @local}, 0x10, &(0x7f00000003c0)=[{&(0x7f0000000300)="6fb9", 0xffeb}], 0x1, &(0x7f0000000700)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {r4, @remote, @broadcast}}}], 0x20}, 0x0) r5 = socket$inet_icmp_raw(0x2, 0x3, 0x1) socket$nl_audit(0x10, 0x3, 0x9) sendmsg$inet(r5, &(0x7f0000000780)={&(0x7f0000000000)={0x2, 0x0, @local}, 0x10, &(0x7f00000003c0)=[{&(0x7f0000000300)="6fb9", 0xffeb}], 0x1, &(0x7f0000000700)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @remote, @broadcast}}}], 0x20}, 0x0) sendmsg$ETHTOOL_MSG_LINKINFO_GET(r2, &(0x7f0000000200)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f00000001c0)={&(0x7f0000000340)=ANY=[@ANYBLOB='@\x00\x00\x00', @ANYRES16=r1, @ANYBLOB="000427bd7000ffdbdf25020000002c00018008000100", @ANYRES32=0x0, @ANYBLOB='\b\x00C\x00\x00\x00', @ANYRES32=r4, @ANYBLOB="d5b921cac279671a02c4d90ed2cbc802c00000009852d9e901fb17000000000000", @ANYRES32=0x0, @ANYBLOB], 0x40}, 0x1, 0x0, 0x0, 0x4}, 0xd0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000480), 0x1}, 0x603}, 0x0, 0xffffffefffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000040)=[{&(0x7f0000010000)="601c6d6b646f736689254300080120000400004000f8000020004000030000000000000001", 0x25}, {0x0, 0x0, 0x10000}], 0x0, &(0x7f0000000040)=ANY=[]) 06:13:41 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000006000019000000900100000f000000000000000100000005000000000004000040000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000001000018000000c28500002b02", 0x66, 0x400}, {&(0x7f0000010100)="000000000000000000000000e8f7d2e8feeb4bf889ba053b02420ff8010040", 0x1f, 0x4e0}], 0x0, &(0x7f0000000140)=ANY=[]) [ 2336.933828] loop6: detected capacity change from 0 to 2048 [ 2336.946935] EXT4-fs (loop6): unsupported descriptor size 0 [ 2336.958348] loop7: detected capacity change from 0 to 2102 [ 2336.971637] EXT4-fs (loop7): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 2336.972343] EXT4-fs (loop7): group descriptors corrupted! [ 2336.987596] loop7: detected capacity change from 0 to 2102 [ 2337.003589] EXT4-fs (loop7): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 2337.004308] EXT4-fs (loop7): group descriptors corrupted! [ 2337.027878] loop4: detected capacity change from 0 to 256 [ 2337.044649] FAT-fs (loop4): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) [ 2337.055341] loop5: detected capacity change from 0 to 2048 [ 2337.078697] EXT4-fs (loop5): inodes count not valid: 2336 vs 32 [ 2337.096856] loop5: detected capacity change from 0 to 2048 [ 2337.117087] EXT4-fs (loop5): inodes count not valid: 2336 vs 32 06:13:59 executing program 6: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x100000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="0a0000000002000019000000900100000f000000000000000100000005000000000004000040000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000001000018000000c28500002b02", 0x66, 0x400}, {0x0, 0x0, 0x4e0}], 0x0, &(0x7f0000000140)=ANY=[]) 06:13:59 executing program 7: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x107400, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000100000005000000000004000040000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000001000018000000c28500002b02", 0x66, 0x400}, {&(0x7f0000010100)="000000000000000000000000e8f7d2e8feeb4bf889ba053b02420ff8010040", 0x1f, 0x4e0}], 0x0, &(0x7f0000000140)=ANY=[]) 06:13:59 executing program 3: r0 = getpid() ioprio_get$pid(0x2, r0) r1 = getpid() ioprio_get$pid(0x2, r1) syz_mount_image$vfat(0x0, &(0x7f0000000040)='./file1\x00', 0x0, 0x0, &(0x7f00000000c0), 0x2002000, &(0x7f0000000400)=ANY=[@ANYRES16, @ANYBLOB="72e1af808ba473e6f37c85b113d8c4d9e1de4ed2968d2e01108c4795a941d14f6927393c8c3c458dd7454900d48719912efc18d580a8f841234284071012d7d5020eb5d56dc1ba5f1048adac4b928bf6cfd663b4cab43637cb979a9199a0246ec02345161783bc79585902603d7062084f05b744e31fcb4c3e81f3becabb7ad1fa5783f5e5e60ae912102fe8df0536bd074c03bd33742f35c5c44b5c3c9d693114367b7d966e"]) chdir(&(0x7f0000000140)='./file0\x00') ptrace$getenv(0x4201, r0, 0xfff, &(0x7f00000000c0)) openat(0xffffffffffffff9c, &(0x7f0000000000)='./file2\x00', 0x40c2, 0x0) r2 = perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x6, 0x0, 0xe}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r4 = fork() perf_event_open(&(0x7f0000000540)={0x4, 0x80, 0x0, 0x0, 0x20, 0x0, 0x0, 0x2, 0x2820, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, @perf_config_ext={0xdc, 0x40}, 0x40000, 0x3, 0x8, 0x5, 0x6000000000000, 0x4, 0x5, 0x0, 0x3, 0x0, 0x3}, r4, 0x9, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000340)={0x0, 0x80, 0x2, 0x83, 0x1, 0x7, 0x0, 0x1f, 0x9ec17fc7a3e840c7, 0xc, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x9, 0x4, @perf_bp={&(0x7f0000000240), 0x1}, 0x404, 0x7, 0x3, 0x6, 0x800, 0x9, 0x3, 0x0, 0x7ff, 0x0, 0x9}, r4, 0x8, r2, 0x9) fork() setxattr$trusted_overlay_upper(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180), &(0x7f00000001c0)={0x0, 0xfb, 0x7a, 0x0, 0x2, "d54449275cb08faf62df87518e3ce16f", "9a61b461b0c63151b954990036d5e0163ceb48c6a801bb019e9e6fa7196a9372f804b9e9ca3fb3d85d1985d31346bbd5fd02b1c8223bf6388eb75498623e38ff88a99c5ce38698a32306b7d4e4b0fd4b03bfa568df17a42f725c6c33046b38b6e4a713dde1"}, 0x7a, 0x3) socket$nl_audit(0x10, 0x3, 0x9) chroot(&(0x7f0000000080)='./file1\x00') sendmsg$inet(r3, &(0x7f0000000780)={&(0x7f0000000000)={0x2, 0x0, @local}, 0x10, &(0x7f00000003c0)=[{&(0x7f0000000300)="6fb9", 0xffeb}], 0x1, &(0x7f0000000700)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @remote, @broadcast}}}], 0x20}, 0x0) 06:13:59 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x100000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="200a00000002000019000000900100000f000000000000000100000005000000000004000040000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000001000018000000c28500002b02", 0x66, 0x400}, {&(0x7f0000010100)="000000000000000000000000e8f7d2e8feeb4bf889ba053b02420ff8010040", 0x1f, 0x4e0}], 0x0, &(0x7f0000000140)=ANY=[]) 06:13:59 executing program 4: r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000040), 0xffffffffffffffff) syz_genetlink_get_family_id$ethtool(&(0x7f0000000100), 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_PAUSE_SET(0xffffffffffffffff, &(0x7f0000000440)={0x0, 0x0, 0x0}, 0x0) r2 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000080)='smaps\x00') pread64(r2, &(0x7f00000000c0)=""/98, 0x62, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x7fffffff) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(0xffffffffffffffff, 0xc0189374, &(0x7f0000000240)={{0x1, 0x1, 0x18, r0, {0x8}}, './file0\x00'}) dup3(0xffffffffffffffff, r2, 0x0) r3 = socket$inet_icmp_raw(0x2, 0x3, 0x1) syz_genetlink_get_family_id$ethtool(&(0x7f0000000180), r2) socket$nl_audit(0x10, 0x3, 0x9) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000040)={'wlan1\x00', 0x0}) sendmsg$inet(r3, &(0x7f0000000780)={&(0x7f0000000000)={0x2, 0x0, @local}, 0x10, &(0x7f00000003c0)=[{&(0x7f0000000300)="6fb9", 0xffeb}], 0x1, &(0x7f0000000700)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {r4, @remote, @broadcast}}}], 0x20}, 0x0) r5 = socket$inet_icmp_raw(0x2, 0x3, 0x1) socket$nl_audit(0x10, 0x3, 0x9) sendmsg$inet(r5, &(0x7f0000000780)={&(0x7f0000000000)={0x2, 0x0, @local}, 0x10, &(0x7f00000003c0)=[{&(0x7f0000000300)="6fb9", 0xffeb}], 0x1, &(0x7f0000000700)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @remote, @broadcast}}}], 0x20}, 0x0) sendmsg$ETHTOOL_MSG_LINKINFO_GET(r2, &(0x7f0000000200)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f00000001c0)={&(0x7f0000000340)=ANY=[@ANYBLOB='@\x00\x00\x00', @ANYRES16=r1, @ANYBLOB="000427bd7000ffdbdf25020000002c00018008000100", @ANYRES32=0x0, @ANYBLOB='\b\x00C\x00\x00\x00', @ANYRES32=r4, @ANYBLOB="d5b921cac279671a02c4d90ed2cbc802c00000009852d9e901fb17000000000000", @ANYRES32=0x0, @ANYBLOB], 0x40}, 0x1, 0x0, 0x0, 0x4}, 0xd0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000480), 0x1}, 0x603}, 0x0, 0xffffffefffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000040)=[{&(0x7f0000010000)="601c6d6b646f736689254300080120000400004000f8000020004000030000000000000001", 0x25}, {0x0, 0x0, 0x10000}], 0x0, &(0x7f0000000040)=ANY=[]) 06:13:59 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000007000019000000900100000f000000000000000100000005000000000004000040000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000001000018000000c28500002b02", 0x66, 0x400}, {&(0x7f0000010100)="000000000000000000000000e8f7d2e8feeb4bf889ba053b02420ff8010040", 0x1f, 0x4e0}], 0x0, &(0x7f0000000140)=ANY=[]) 06:13:59 executing program 1: pipe(&(0x7f0000000340)={0xffffffffffffffff}) pread64(r0, &(0x7f0000000440)=""/95, 0x5f, 0x6) execveat(r0, &(0x7f0000000080)='./file0\x00', &(0x7f00000001c0)=[&(0x7f00000000c0)='\x00', &(0x7f0000000180)='\x00'], &(0x7f0000000400)=[&(0x7f0000000200)='/dev/zero\x00', &(0x7f0000000240)='/dev/zero\x00', &(0x7f0000000300)='/dev/zero\x00'], 0x1000) socket$inet(0x2, 0x1, 0x0) perf_event_open(&(0x7f0000000100)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x22420, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ptrace$setopts(0x4200, 0x0, 0x5, 0x100050) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000004c00)={0xc0002100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) gettid() r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000), 0x380, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000000)='net/udp6\x00') read$hiddev(r2, &(0x7f0000001140)=""/212, 0xd4) fchmodat(r2, 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(r1, 0xc018937c, &(0x7f0000000380)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32=r0, @ANYBLOB="00000000000000002e2f66696cee8816"]) ioctl$TIOCSSOFTCAR(r3, 0x541a, &(0x7f00000003c0)=0x6) waitid$P_PIDFD(0x3, r1, &(0x7f0000000500), 0x2, &(0x7f0000000580)) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(r1, 0xc0189372, &(0x7f0000000040)={{0x1, 0x1, 0x18, r2, {0xffff}}, './file0\x00'}) 06:13:59 executing program 0: pipe(&(0x7f0000000340)={0xffffffffffffffff}) pread64(r0, &(0x7f0000000440)=""/95, 0x5f, 0x6) execveat(r0, &(0x7f0000000080)='./file0\x00', &(0x7f00000001c0)=[&(0x7f00000000c0)='\x00', &(0x7f0000000180)='\x00'], &(0x7f0000000400)=[&(0x7f0000000200)='/dev/zero\x00', &(0x7f0000000240)='/dev/zero\x00', &(0x7f0000000300)='/dev/zero\x00'], 0x1000) socket$inet(0x2, 0x1, 0x0) perf_event_open(&(0x7f0000000100)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x22420, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ptrace$setopts(0x4200, 0x0, 0x5, 0x100050) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000004c00)={0xc0002100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) gettid() r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000), 0x380, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000000)='net/udp6\x00') read$hiddev(r2, &(0x7f0000001140)=""/212, 0xd4) fchmodat(r2, &(0x7f00000004c0)='./file0\x00', 0x0) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(r1, 0xc018937c, &(0x7f0000000380)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32=r0, @ANYBLOB="00000000000000002e2f66696cee8816"]) ioctl$TIOCSSOFTCAR(r3, 0x541a, &(0x7f00000003c0)=0x6) waitid$P_PIDFD(0x3, r1, &(0x7f0000000500), 0x2, &(0x7f0000000580)) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(r1, 0xc0189372, &(0x7f0000000040)={{0x1, 0x1, 0x18, r2, {0xffff}}, './file0\x00'}) [ 2355.153196] loop7: detected capacity change from 0 to 2106 [ 2355.160596] loop6: detected capacity change from 0 to 2048 [ 2355.168812] loop5: detected capacity change from 0 to 2048 [ 2355.172846] EXT4-fs (loop7): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 2355.174269] EXT4-fs (loop7): group descriptors corrupted! [ 2355.183645] EXT4-fs (loop5): inodes count not valid: 2592 vs 32 [ 2355.195797] EXT4-fs (loop6): unsupported descriptor size 0 [ 2355.207802] loop7: detected capacity change from 0 to 2106 [ 2355.214695] loop4: detected capacity change from 0 to 256 [ 2355.222018] loop5: detected capacity change from 0 to 2048 [ 2355.235785] EXT4-fs (loop7): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 2355.237232] EXT4-fs (loop7): group descriptors corrupted! [ 2355.243992] EXT4-fs (loop5): inodes count not valid: 2592 vs 32 [ 2355.293311] FAT-fs (loop4): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) 06:13:59 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000f000019000000900100000f000000000000000100000005000000000004000040000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000001000018000000c28500002b02", 0x66, 0x400}, {&(0x7f0000010100)="000000000000000000000000e8f7d2e8feeb4bf889ba053b02420ff8010040", 0x1f, 0x4e0}], 0x0, &(0x7f0000000140)=ANY=[]) 06:13:59 executing program 6: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x100000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="0a0000000002000019000000900100000f000000000000000100000005000000000004000040000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000001000018000000c28500002b02", 0x66, 0x400}, {0x0, 0x0, 0x4e0}], 0x0, &(0x7f0000000140)=ANY=[]) 06:13:59 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x100000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="200b00000002000019000000900100000f000000000000000100000005000000000004000040000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000001000018000000c28500002b02", 0x66, 0x400}, {&(0x7f0000010100)="000000000000000000000000e8f7d2e8feeb4bf889ba053b02420ff8010040", 0x1f, 0x4e0}], 0x0, &(0x7f0000000140)=ANY=[]) 06:13:59 executing program 7: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x107a00, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000100000005000000000004000040000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000001000018000000c28500002b02", 0x66, 0x400}, {&(0x7f0000010100)="000000000000000000000000e8f7d2e8feeb4bf889ba053b02420ff8010040", 0x1f, 0x4e0}], 0x0, &(0x7f0000000140)=ANY=[]) 06:13:59 executing program 4: r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000040), 0xffffffffffffffff) syz_genetlink_get_family_id$ethtool(&(0x7f0000000100), 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_PAUSE_SET(0xffffffffffffffff, &(0x7f0000000440)={0x0, 0x0, 0x0}, 0x0) r2 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000080)='smaps\x00') pread64(r2, &(0x7f00000000c0)=""/98, 0x62, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x7fffffff) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(0xffffffffffffffff, 0xc0189374, &(0x7f0000000240)={{0x1, 0x1, 0x18, r0, {0x8}}, './file0\x00'}) dup3(0xffffffffffffffff, r2, 0x0) r3 = socket$inet_icmp_raw(0x2, 0x3, 0x1) syz_genetlink_get_family_id$ethtool(&(0x7f0000000180), r2) socket$nl_audit(0x10, 0x3, 0x9) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000040)={'wlan1\x00', 0x0}) sendmsg$inet(r3, &(0x7f0000000780)={&(0x7f0000000000)={0x2, 0x0, @local}, 0x10, &(0x7f00000003c0)=[{&(0x7f0000000300)="6fb9", 0xffeb}], 0x1, &(0x7f0000000700)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {r4, @remote, @broadcast}}}], 0x20}, 0x0) r5 = socket$inet_icmp_raw(0x2, 0x3, 0x1) socket$nl_audit(0x10, 0x3, 0x9) sendmsg$inet(r5, &(0x7f0000000780)={&(0x7f0000000000)={0x2, 0x0, @local}, 0x10, &(0x7f00000003c0)=[{&(0x7f0000000300)="6fb9", 0xffeb}], 0x1, &(0x7f0000000700)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @remote, @broadcast}}}], 0x20}, 0x0) sendmsg$ETHTOOL_MSG_LINKINFO_GET(r2, &(0x7f0000000200)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f00000001c0)={&(0x7f0000000340)=ANY=[@ANYBLOB='@\x00\x00\x00', @ANYRES16=r1, @ANYBLOB="000427bd7000ffdbdf25020000002c00018008000100", @ANYRES32=0x0, @ANYBLOB='\b\x00C\x00\x00\x00\x00\x00\b', @ANYRES32=r4, @ANYBLOB="d5b921cac279671a02c4d90ed2cbc802c00000009852d9e901fb17000000000000", @ANYRES32=0x0, @ANYBLOB], 0x40}, 0x1, 0x0, 0x0, 0x4}, 0xd0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000480), 0x1}, 0x603}, 0x0, 0xffffffefffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000040)=[{&(0x7f0000010000)="601c6d6b646f736689254300080120000400004000f8000020004000030000000000000001", 0x25}, {0x0, 0x0, 0x10000}], 0x0, &(0x7f0000000040)=ANY=[]) [ 2355.504470] loop7: detected capacity change from 0 to 2109 [ 2355.506527] loop6: detected capacity change from 0 to 2048 [ 2355.515080] loop5: detected capacity change from 0 to 2048 [ 2355.539759] EXT4-fs (loop6): unsupported descriptor size 0 [ 2355.547147] EXT4-fs (loop7): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 2355.548541] EXT4-fs (loop7): group descriptors corrupted! [ 2355.553207] EXT4-fs (loop5): inodes count not valid: 2848 vs 32 [ 2355.576363] loop5: detected capacity change from 0 to 2048 [ 2355.605518] EXT4-fs (loop5): inodes count not valid: 2848 vs 32 06:13:59 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="200000020002000019000000900100000f000000000000000100000005000000000004000040000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000001000018000000c28500002b02", 0x66, 0x400}, {&(0x7f0000010100)="000000000000000000000000e8f7d2e8feeb4bf889ba053b02420ff8010040", 0x1f, 0x4e0}], 0x0, &(0x7f0000000140)=ANY=[]) [ 2355.671047] loop4: detected capacity change from 0 to 256 [ 2355.721063] FAT-fs (loop4): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) [ 2372.194511] loop6: detected capacity change from 0 to 2048 06:14:16 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="200000030002000019000000900100000f000000000000000100000005000000000004000040000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000001000018000000c28500002b02", 0x66, 0x400}, {&(0x7f0000010100)="000000000000000000000000e8f7d2e8feeb4bf889ba053b02420ff8010040", 0x1f, 0x4e0}], 0x0, &(0x7f0000000140)=ANY=[]) 06:14:16 executing program 7: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x109000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000100000005000000000004000040000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000001000018000000c28500002b02", 0x66, 0x400}, {&(0x7f0000010100)="000000000000000000000000e8f7d2e8feeb4bf889ba053b02420ff8010040", 0x1f, 0x4e0}], 0x0, &(0x7f0000000140)=ANY=[]) 06:14:16 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x100009, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000100000005000000000004000040000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000001000018000000c28500002b02", 0x66, 0x400}, {&(0x7f0000010100)="000000000000000000000000e8f7d2e8feeb4bf889ba053b02420ff8010040", 0x1f, 0x4e0}], 0x0, &(0x7f0000000140)=ANY=[]) 06:14:16 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x100000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="200c00000002000019000000900100000f000000000000000100000005000000000004000040000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000001000018000000c28500002b02", 0x66, 0x400}, {&(0x7f0000010100)="000000000000000000000000e8f7d2e8feeb4bf889ba053b02420ff8010040", 0x1f, 0x4e0}], 0x0, &(0x7f0000000140)=ANY=[]) 06:14:16 executing program 6: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x100000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="0a0000000002000019000000900100000f000000000000000100000005000000000004000040000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000001000018000000c28500002b02", 0x66, 0x400}, {0x0, 0x0, 0x4e0}], 0x0, &(0x7f0000000140)=ANY=[]) 06:14:16 executing program 3: r0 = getpid() ioprio_get$pid(0x2, r0) r1 = getpid() ioprio_get$pid(0x2, r1) syz_mount_image$vfat(0x0, &(0x7f0000000040)='./file1\x00', 0x0, 0x0, &(0x7f00000000c0), 0x2002000, &(0x7f0000000400)=ANY=[@ANYRES16, @ANYBLOB="72e1af808ba473e6f37c85b113d8c4d9e1de4ed2968d2e01108c4795a941d14f6927393c8c3c458dd7454900d48719912efc18d580a8f841234284071012d7d5020eb5d56dc1ba5f1048adac4b928bf6cfd663b4cab43637cb979a9199a0246ec02345161783bc79585902603d7062084f05b744e31fcb4c3e81f3becabb7ad1fa5783f5e5e60ae912102fe8df0536bd074c03bd33742f35c5c44b5c3c9d693114367b7d966e"]) chdir(&(0x7f0000000140)='./file0\x00') ptrace$getenv(0x4201, r0, 0xfff, &(0x7f00000000c0)) openat(0xffffffffffffff9c, &(0x7f0000000000)='./file2\x00', 0x40c2, 0x0) r2 = perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x6, 0x0, 0xe}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r4 = fork() perf_event_open(&(0x7f0000000540)={0x4, 0x80, 0x0, 0x0, 0x20, 0x0, 0x0, 0x2, 0x2820, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, @perf_config_ext={0xdc, 0x40}, 0x40000, 0x3, 0x8, 0x5, 0x6000000000000, 0x4, 0x5, 0x0, 0x3, 0x0, 0x3}, r4, 0x9, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000340)={0x0, 0x80, 0x2, 0x83, 0x1, 0x7, 0x0, 0x1f, 0x9ec17fc7a3e840c7, 0xc, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x9, 0x4, @perf_bp={&(0x7f0000000240), 0x1}, 0x404, 0x7, 0x3, 0x6, 0x800, 0x9, 0x3, 0x0, 0x7ff, 0x0, 0x9}, r4, 0x8, r2, 0x9) fork() setxattr$trusted_overlay_upper(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180), &(0x7f00000001c0)={0x0, 0xfb, 0x7a, 0x0, 0x2, "d54449275cb08faf62df87518e3ce16f", "9a61b461b0c63151b954990036d5e0163ceb48c6a801bb019e9e6fa7196a9372f804b9e9ca3fb3d85d1985d31346bbd5fd02b1c8223bf6388eb75498623e38ff88a99c5ce38698a32306b7d4e4b0fd4b03bfa568df17a42f725c6c33046b38b6e4a713dde1"}, 0x7a, 0x3) socket$nl_audit(0x10, 0x3, 0x9) chroot(&(0x7f0000000080)='./file1\x00') sendmsg$inet(r3, &(0x7f0000000780)={&(0x7f0000000000)={0x2, 0x0, @local}, 0x10, &(0x7f00000003c0)=[{&(0x7f0000000300)="6fb9", 0xffeb}], 0x1, &(0x7f0000000700)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @remote, @broadcast}}}], 0x20}, 0x0) 06:14:16 executing program 1: pipe(&(0x7f0000000340)={0xffffffffffffffff}) pread64(r0, &(0x7f0000000440)=""/95, 0x5f, 0x6) execveat(r0, &(0x7f0000000080)='./file0\x00', &(0x7f00000001c0)=[&(0x7f00000000c0)='\x00', &(0x7f0000000180)='\x00'], &(0x7f0000000400)=[&(0x7f0000000200)='/dev/zero\x00', &(0x7f0000000240)='/dev/zero\x00', &(0x7f0000000300)='/dev/zero\x00'], 0x1000) socket$inet(0x2, 0x1, 0x0) perf_event_open(&(0x7f0000000100)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x22420, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ptrace$setopts(0x4200, 0x0, 0x5, 0x100050) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000004c00)={0xc0002100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) gettid() r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000), 0x380, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000000)='net/udp6\x00') read$hiddev(r2, &(0x7f0000001140)=""/212, 0xd4) fchmodat(r2, &(0x7f00000004c0)='./file0\x00', 0x0) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(0xffffffffffffffff, 0xc018937c, &(0x7f0000000380)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32=r0, @ANYBLOB="00000000000000002e2f66696cee8816"]) ioctl$TIOCSSOFTCAR(r3, 0x541a, &(0x7f00000003c0)=0x6) waitid$P_PIDFD(0x3, r1, &(0x7f0000000500), 0x2, &(0x7f0000000580)) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(r1, 0xc0189372, &(0x7f0000000040)={{0x1, 0x1, 0x18, r2, {0xffff}}, './file0\x00'}) 06:14:16 executing program 4: r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000040), 0xffffffffffffffff) syz_genetlink_get_family_id$ethtool(&(0x7f0000000100), 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_PAUSE_SET(0xffffffffffffffff, &(0x7f0000000440)={0x0, 0x0, 0x0}, 0x0) r2 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000080)='smaps\x00') pread64(r2, &(0x7f00000000c0)=""/98, 0x62, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x7fffffff) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(0xffffffffffffffff, 0xc0189374, &(0x7f0000000240)={{0x1, 0x1, 0x18, r0, {0x8}}, './file0\x00'}) dup3(0xffffffffffffffff, r2, 0x0) r3 = socket$inet_icmp_raw(0x2, 0x3, 0x1) syz_genetlink_get_family_id$ethtool(&(0x7f0000000180), r2) socket$nl_audit(0x10, 0x3, 0x9) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000040)={'wlan1\x00', 0x0}) sendmsg$inet(r3, &(0x7f0000000780)={&(0x7f0000000000)={0x2, 0x0, @local}, 0x10, &(0x7f00000003c0)=[{&(0x7f0000000300)="6fb9", 0xffeb}], 0x1, &(0x7f0000000700)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {r4, @remote, @broadcast}}}], 0x20}, 0x0) r5 = socket$inet_icmp_raw(0x2, 0x3, 0x1) socket$nl_audit(0x10, 0x3, 0x9) sendmsg$inet(r5, &(0x7f0000000780)={&(0x7f0000000000)={0x2, 0x0, @local}, 0x10, &(0x7f00000003c0)=[{&(0x7f0000000300)="6fb9", 0xffeb}], 0x1, &(0x7f0000000700)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @remote, @broadcast}}}], 0x20}, 0x0) sendmsg$ETHTOOL_MSG_LINKINFO_GET(r2, &(0x7f0000000200)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f00000001c0)={&(0x7f0000000340)=ANY=[@ANYBLOB='@\x00\x00\x00', @ANYRES16=r1, @ANYBLOB="000427bd7000ffdbdf25020000002c00018008000100", @ANYRES32=0x0, @ANYBLOB='\b\x00C\x00\x00\x00\x00\x00\b', @ANYRES32=r4, @ANYBLOB="d5b921cac279671a02c4d90ed2cbc802c00000009852d9e901fb17000000000000", @ANYRES32=0x0, @ANYBLOB], 0x40}, 0x1, 0x0, 0x0, 0x4}, 0xd0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000480), 0x1}, 0x603}, 0x0, 0xffffffefffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000040)=[{&(0x7f0000010000)="601c6d6b646f736689254300080120000400004000f8000020004000030000000000000001", 0x25}, {0x0, 0x0, 0x10000}], 0x0, &(0x7f0000000040)=ANY=[]) [ 2372.204679] EXT4-fs (loop6): unsupported descriptor size 0 [ 2372.234270] loop7: detected capacity change from 0 to 2120 [ 2372.249653] EXT4-fs (loop7): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 2372.250295] EXT4-fs (loop7): group descriptors corrupted! 06:14:16 executing program 6: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x100000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="0a0000000002000019000000900100000f000000000000000100000005000000000004000040000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000001000018000000c28500002b02", 0x66, 0x400}, {&(0x7f0000010100), 0x0, 0x4e0}], 0x0, &(0x7f0000000140)=ANY=[]) [ 2372.271689] loop5: detected capacity change from 0 to 2048 [ 2372.278732] loop7: detected capacity change from 0 to 2120 [ 2372.294889] EXT4-fs (loop7): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 2372.295610] EXT4-fs (loop7): group descriptors corrupted! [ 2372.298016] EXT4-fs (loop5): inodes count not valid: 3104 vs 32 [ 2372.325874] loop5: detected capacity change from 0 to 2048 [ 2372.338264] loop4: detected capacity change from 0 to 256 06:14:16 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="200000040002000019000000900100000f000000000000000100000005000000000004000040000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000001000018000000c28500002b02", 0x66, 0x400}, {&(0x7f0000010100)="000000000000000000000000e8f7d2e8feeb4bf889ba053b02420ff8010040", 0x1f, 0x4e0}], 0x0, &(0x7f0000000140)=ANY=[]) [ 2372.355834] EXT4-fs (loop5): inodes count not valid: 3104 vs 32 [ 2372.363932] loop6: detected capacity change from 0 to 2048 06:14:16 executing program 0: pipe(&(0x7f0000000340)={0xffffffffffffffff}) pread64(r0, &(0x7f0000000440)=""/95, 0x5f, 0x6) execveat(r0, &(0x7f0000000080)='./file0\x00', &(0x7f00000001c0)=[&(0x7f00000000c0)='\x00', &(0x7f0000000180)='\x00'], &(0x7f0000000400)=[&(0x7f0000000200)='/dev/zero\x00', &(0x7f0000000240)='/dev/zero\x00', &(0x7f0000000300)='/dev/zero\x00'], 0x1000) socket$inet(0x2, 0x1, 0x0) perf_event_open(&(0x7f0000000100)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x22420, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ptrace$setopts(0x4200, 0x0, 0x0, 0x100050) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000004c00)={0xc0002100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) gettid() r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000), 0x380, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000000)='net/udp6\x00') read$hiddev(r2, &(0x7f0000001140)=""/212, 0xd4) fchmodat(r2, &(0x7f00000004c0)='./file0\x00', 0x0) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(r1, 0xc018937c, &(0x7f0000000380)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32=r0, @ANYBLOB="00000000000000002e2f66696cee8816"]) ioctl$TIOCSSOFTCAR(r3, 0x541a, &(0x7f00000003c0)=0x6) waitid$P_PIDFD(0x3, r1, &(0x7f0000000500), 0x2, &(0x7f0000000580)) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(r1, 0xc0189372, &(0x7f0000000040)={{0x1, 0x1, 0x18, r2, {0xffff}}, './file0\x00'}) [ 2372.400650] FAT-fs (loop4): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) [ 2372.409209] EXT4-fs (loop6): unsupported descriptor size 0 06:14:16 executing program 7: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x10c003, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000100000005000000000004000040000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000001000018000000c28500002b02", 0x66, 0x400}, {&(0x7f0000010100)="000000000000000000000000e8f7d2e8feeb4bf889ba053b02420ff8010040", 0x1f, 0x4e0}], 0x0, &(0x7f0000000140)=ANY=[]) 06:14:16 executing program 1: pipe(&(0x7f0000000340)={0xffffffffffffffff}) pread64(r0, &(0x7f0000000440)=""/95, 0x5f, 0x6) execveat(r0, &(0x7f0000000080)='./file0\x00', &(0x7f00000001c0)=[&(0x7f00000000c0)='\x00', &(0x7f0000000180)='\x00'], &(0x7f0000000400)=[&(0x7f0000000200)='/dev/zero\x00', &(0x7f0000000240)='/dev/zero\x00', &(0x7f0000000300)='/dev/zero\x00'], 0x1000) socket$inet(0x2, 0x1, 0x0) perf_event_open(&(0x7f0000000100)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x22420, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ptrace$setopts(0x4200, 0x0, 0x5, 0x100050) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000004c00)={0xc0002100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) gettid() r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000), 0x380, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000000)='net/udp6\x00') read$hiddev(r2, &(0x7f0000001140)=""/212, 0xd4) fchmodat(r2, &(0x7f00000004c0)='./file0\x00', 0x0) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(0xffffffffffffffff, 0xc018937c, &(0x7f0000000380)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32=r0, @ANYBLOB="00000000000000002e2f66696cee8816"]) ioctl$TIOCSSOFTCAR(r3, 0x541a, &(0x7f00000003c0)=0x6) waitid$P_PIDFD(0x3, r1, &(0x7f0000000500), 0x2, &(0x7f0000000580)) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(r1, 0xc0189372, &(0x7f0000000040)={{0x1, 0x1, 0x18, r2, {0xffff}}, './file0\x00'}) 06:14:16 executing program 6: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x100000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="0a0000000002000019000000900100000f000000000000000100000005000000000004000040000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000001000018000000c28500002b02", 0x66, 0x400}, {&(0x7f0000010100), 0x0, 0x4e0}], 0x0, &(0x7f0000000140)=ANY=[]) 06:14:16 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="200000050002000019000000900100000f000000000000000100000005000000000004000040000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000001000018000000c28500002b02", 0x66, 0x400}, {&(0x7f0000010100)="000000000000000000000000e8f7d2e8feeb4bf889ba053b02420ff8010040", 0x1f, 0x4e0}], 0x0, &(0x7f0000000140)=ANY=[]) 06:14:16 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x100000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="200d00000002000019000000900100000f000000000000000100000005000000000004000040000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000001000018000000c28500002b02", 0x66, 0x400}, {&(0x7f0000010100)="000000000000000000000000e8f7d2e8feeb4bf889ba053b02420ff8010040", 0x1f, 0x4e0}], 0x0, &(0x7f0000000140)=ANY=[]) [ 2372.538310] loop6: detected capacity change from 0 to 2048 [ 2372.552080] EXT4-fs (loop6): unsupported descriptor size 0 06:14:16 executing program 3: r0 = getpid() ioprio_get$pid(0x2, r0) r1 = getpid() ioprio_get$pid(0x2, r1) syz_mount_image$vfat(0x0, &(0x7f0000000040)='./file1\x00', 0x0, 0x0, &(0x7f00000000c0), 0x2002000, &(0x7f0000000400)=ANY=[@ANYRES16, @ANYBLOB="72e1af808ba473e6f37c85b113d8c4d9e1de4ed2968d2e01108c4795a941d14f6927393c8c3c458dd7454900d48719912efc18d580a8f841234284071012d7d5020eb5d56dc1ba5f1048adac4b928bf6cfd663b4cab43637cb979a9199a0246ec02345161783bc79585902603d7062084f05b744e31fcb4c3e81f3becabb7ad1fa5783f5e5e60ae912102fe8df0536bd074c03bd33742f35c5c44b5c3c9d693114367b7d966e"]) chdir(&(0x7f0000000140)='./file0\x00') ptrace$getenv(0x4201, r0, 0xfff, &(0x7f00000000c0)) openat(0xffffffffffffff9c, &(0x7f0000000000)='./file2\x00', 0x40c2, 0x0) r2 = perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x6, 0x0, 0xe}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r4 = fork() perf_event_open(&(0x7f0000000540)={0x4, 0x80, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x2, 0x2820, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, @perf_config_ext={0xdc, 0x40}, 0x40000, 0x3, 0x8, 0x5, 0x6000000000000, 0x4, 0x5, 0x0, 0x3, 0x0, 0x3}, r4, 0x9, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000340)={0x0, 0x80, 0x2, 0x83, 0x1, 0x7, 0x0, 0x1f, 0x9ec17fc7a3e840c7, 0xc, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x9, 0x4, @perf_bp={&(0x7f0000000240), 0x1}, 0x404, 0x7, 0x3, 0x6, 0x800, 0x9, 0x3, 0x0, 0x7ff, 0x0, 0x9}, r4, 0x8, r2, 0x9) fork() setxattr$trusted_overlay_upper(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180), &(0x7f00000001c0)={0x0, 0xfb, 0x7a, 0x0, 0x2, "d54449275cb08faf62df87518e3ce16f", "9a61b461b0c63151b954990036d5e0163ceb48c6a801bb019e9e6fa7196a9372f804b9e9ca3fb3d85d1985d31346bbd5fd02b1c8223bf6388eb75498623e38ff88a99c5ce38698a32306b7d4e4b0fd4b03bfa568df17a42f725c6c33046b38b6e4a713dde1"}, 0x7a, 0x3) socket$nl_audit(0x10, 0x3, 0x9) chroot(&(0x7f0000000080)='./file1\x00') sendmsg$inet(r3, &(0x7f0000000780)={&(0x7f0000000000)={0x2, 0x0, @local}, 0x10, &(0x7f00000003c0)=[{&(0x7f0000000300)="6fb9", 0xffeb}], 0x1, &(0x7f0000000700)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @remote, @broadcast}}}], 0x20}, 0x0) [ 2372.573585] loop7: detected capacity change from 0 to 2144 06:14:16 executing program 4: r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000040), 0xffffffffffffffff) syz_genetlink_get_family_id$ethtool(&(0x7f0000000100), 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_PAUSE_SET(0xffffffffffffffff, &(0x7f0000000440)={0x0, 0x0, 0x0}, 0x0) r2 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000080)='smaps\x00') pread64(r2, &(0x7f00000000c0)=""/98, 0x62, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x7fffffff) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(0xffffffffffffffff, 0xc0189374, &(0x7f0000000240)={{0x1, 0x1, 0x18, r0, {0x8}}, './file0\x00'}) dup3(0xffffffffffffffff, r2, 0x0) r3 = socket$inet_icmp_raw(0x2, 0x3, 0x1) syz_genetlink_get_family_id$ethtool(&(0x7f0000000180), r2) socket$nl_audit(0x10, 0x3, 0x9) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000040)={'wlan1\x00', 0x0}) sendmsg$inet(r3, &(0x7f0000000780)={&(0x7f0000000000)={0x2, 0x0, @local}, 0x10, &(0x7f00000003c0)=[{&(0x7f0000000300)="6fb9", 0xffeb}], 0x1, &(0x7f0000000700)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {r4, @remote, @broadcast}}}], 0x20}, 0x0) r5 = socket$inet_icmp_raw(0x2, 0x3, 0x1) socket$nl_audit(0x10, 0x3, 0x9) sendmsg$inet(r5, &(0x7f0000000780)={&(0x7f0000000000)={0x2, 0x0, @local}, 0x10, &(0x7f00000003c0)=[{&(0x7f0000000300)="6fb9", 0xffeb}], 0x1, &(0x7f0000000700)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @remote, @broadcast}}}], 0x20}, 0x0) sendmsg$ETHTOOL_MSG_LINKINFO_GET(r2, &(0x7f0000000200)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f00000001c0)={&(0x7f0000000340)=ANY=[@ANYBLOB='@\x00\x00\x00', @ANYRES16=r1, @ANYBLOB="000427bd7000ffdbdf25020000002c00018008000100", @ANYRES32=0x0, @ANYBLOB='\b\x00C\x00\x00\x00\x00\x00\b', @ANYRES32=r4, @ANYBLOB="d5b921cac279671a02c4d90ed2cbc802c00000009852d9e901fb17000000000000", @ANYRES32=0x0, @ANYBLOB], 0x40}, 0x1, 0x0, 0x0, 0x4}, 0xd0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000480), 0x1}, 0x603}, 0x0, 0xffffffefffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000040)=[{&(0x7f0000010000)="601c6d6b646f736689254300080120000400004000f8000020004000030000000000000001", 0x25}, {0x0, 0x0, 0x10000}], 0x0, &(0x7f0000000040)=ANY=[]) [ 2372.617801] EXT4-fs (loop7): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 2372.619443] EXT4-fs (loop7): group descriptors corrupted! [ 2372.653259] loop7: detected capacity change from 0 to 2144 [ 2372.675515] EXT4-fs (loop7): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 2372.676878] EXT4-fs (loop7): group descriptors corrupted! [ 2372.684120] loop5: detected capacity change from 0 to 2048 [ 2372.714016] EXT4-fs (loop5): inodes count not valid: 3360 vs 32 [ 2372.743180] loop5: detected capacity change from 0 to 2048 [ 2372.758911] EXT4-fs (loop5): inodes count not valid: 3360 vs 32 [ 2372.759955] loop4: detected capacity change from 0 to 256 [ 2372.782625] FAT-fs (loop4): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) 06:14:33 executing program 0: ioctl$AUTOFS_DEV_IOCTL_CLOSEMOUNT(0xffffffffffffffff, 0xc0189375, 0x0) r0 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_PAUSE_SET(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x8000000000000000}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = memfd_create(&(0x7f0000000400)='B\xdb/\x89\x03l\xdeb\xcb\xb54\xed\xbeLY\xb5Z\xe1\x12S\xf5G\xcc\xf3\xe9\x02h\v\xca(\x96\xe1C\xdf\x1c\xea\x85C\xfb\x10\x13\xfa\x03\x16\xcd\x17\xa2\x80\xa1z\xb4r\x95\xc3@\x9d\xa6\xf1\x92#}g\xd3`\xf7\xcez\xcb\xb3\x1a\xbb\xc48e\x8e\xb1&\xd1\x8a\xe6!\x7f\x8d\xea,qx\xa28\xbf\"\xc7e\x06L\xb06\xeb<$\xd7\xba\xe5\x01\x03\x94r\xab\xd4J\x03s\xaf\xf6A\xbfV\xfa\x1ew\x8d\xbf\x99I\x97\xd8\xd2\xe8\x11\xc4\x04\x00\x84\xd5i\xee\xaf\xae[E\x1f\xdd\xd7#rT+\xb621p\xaf[\x99\" 1\xeb\xc7)\xd2\x1dh\xf2\xd5s\xfd?\fa>\x9f;\xe5r\xe5\xbd\xb0|=\x8eZcPY\xf8\xbd\x13\xaa\x8b\xdf\xbc\x93u\xd5\xb0r\xfb\xde\xe7\xd9k\xe2\xc6\x1b\xf2o@&>\xf2M\xe7\x8c\xeb\xee\xf5\x02~\x85\x14\xf3\xc6v\xf15PE\x8c\xca\x16$\xc2\x01#\xb563\rbq\xbf64\xfaW\x17\xdfa\xe6\xca\x86\xd7\xf8\x81X\x9bg4\xc1\xdam\xcf=Rq6\xb0\xd4D=I\x1a\x0e\xd0\xabz\xe2\x19\x0fM\xad\xdco\xa4\xb2\x8c?\xc1\x10\xf273\xd00\xb3_\xe8\x9a*\xfcL\xea;\xc0\x9a\xdbx!N;\xb5x\t\xa4E\xbe\x93r\x04\xf5\xf0\xf5\x7f\x9a)\xf5\x1b\"\xa1\xd8\x06>\xc9\xe2r\xe9\xbb\xfe\xc0\b\x81\x98\x1c\xe2\xe0?\x8f\xa1\xbel\aN\x83@\xb1\x03)4A\x83\xd6\xcf\xf6\xb5\x82\xb7\x9dA\b$\xa2x\x8a@\xfaj~\xef\x93\xb1/L\x01\xe2\xba|\xf0\x01)PP\xcdl\x06\xfc\x15;qZ\xb1u\xc9\xd0\xd16~JEGm\xe4\x1e@\x9dG\xe4@\xdf\xba\'\x8b\x1cD\xc7\xec\xd1@}tR\xd9P\xf4N\xe3\xd8x\xa0\x91\x17\xc2}\x13\b\xca\t(Z\xa3_\xa1\x90\x15T\xa4\xe7%\x98\xa7\xfb\x8bp/eq\x93\xbf\x1f =|\xf3\xb1\xfcR\xd8\nM,\xcb%@\'\x15\x88\xd8\xad\f\x91|\x95\x8fq+\x98\x81W\xba\x9f\xe0elOt\xbd\by\r\x87\x1c\xba\xbd\x8e+S>\xb8\xe29\x91h^x\xfb`\x00\xdd/\xa6\xb1\x16=\xa1bw\xc5I\xb1\x00'/549, 0x2) prctl$PR_SET_MM(0x23, 0x8, &(0x7f0000ffb000/0x3000)=nil) r2 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000001c00)='cmdline\x00') pread64(r2, &(0x7f0000001c40)=""/4099, 0xfffffd6f, 0x0) r3 = signalfd4(0xffffffffffffffff, &(0x7f0000000000)={[0x2d4]}, 0x8, 0x800) r4 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r5 = socket$nl_audit(0x10, 0x3, 0x9) ioctl$sock_SIOCGIFINDEX(r5, 0x8933, &(0x7f0000000040)={'wlan1\x00', 0x0}) sendmsg$inet(r4, &(0x7f0000000780)={&(0x7f0000000000)={0x2, 0x0, @local}, 0x10, &(0x7f00000003c0)=[{&(0x7f0000000300)="6fb9", 0xffeb}], 0x1, &(0x7f0000000700)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {r6, @remote, @broadcast}}}], 0x20}, 0x0) r7 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r8 = socket$nl_audit(0x10, 0x3, 0x9) ioctl$sock_SIOCGIFINDEX(r8, 0x8933, &(0x7f0000000040)={'wlan1\x00', 0x0}) sendmsg$inet(r7, &(0x7f0000000780)={&(0x7f0000000000)={0x2, 0x0, @local}, 0x10, &(0x7f00000003c0)=[{&(0x7f0000000300)="6fb9", 0xffeb}], 0x1, &(0x7f0000000700)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {r9, @remote, @broadcast}}}], 0x20}, 0x0) sendmsg$ETHTOOL_MSG_WOL_GET(r3, &(0x7f0000000180)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000000140)={&(0x7f00000000c0)={0x70, r0, 0x200, 0x70bd2c, 0x25dfdbfe, {}, [@HEADER={0xc, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}]}, @HEADER={0x50, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r6}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_FLAGS={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth1_to_batadv\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r9}]}]}, 0x70}, 0x1, 0x0, 0x0, 0x20004010}, 0x4040) fcntl$addseals(r1, 0x409, 0x0) 06:14:33 executing program 6: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x100000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="0a0000000002000019000000900100000f000000000000000100000005000000000004000040000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000001000018000000c28500002b02", 0x66, 0x400}, {&(0x7f0000010100), 0x0, 0x4e0}], 0x0, &(0x7f0000000140)=ANY=[]) [ 2388.911910] loop7: detected capacity change from 0 to 2152 [ 2388.914971] loop6: detected capacity change from 0 to 2048 [ 2388.921199] EXT4-fs (loop7): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 2388.921938] EXT4-fs (loop7): group descriptors corrupted! 06:14:33 executing program 3: r0 = getpid() ioprio_get$pid(0x2, r0) r1 = getpid() ioprio_get$pid(0x2, r1) syz_mount_image$vfat(0x0, &(0x7f0000000040)='./file1\x00', 0x0, 0x0, &(0x7f00000000c0), 0x2002000, &(0x7f0000000400)=ANY=[@ANYRES16, @ANYBLOB="72e1af808ba473e6f37c85b113d8c4d9e1de4ed2968d2e01108c4795a941d14f6927393c8c3c458dd7454900d48719912efc18d580a8f841234284071012d7d5020eb5d56dc1ba5f1048adac4b928bf6cfd663b4cab43637cb979a9199a0246ec02345161783bc79585902603d7062084f05b744e31fcb4c3e81f3becabb7ad1fa5783f5e5e60ae912102fe8df0536bd074c03bd33742f35c5c44b5c3c9d693114367b7d966e"]) chdir(&(0x7f0000000140)='./file0\x00') ptrace$getenv(0x4201, r0, 0xfff, &(0x7f00000000c0)) openat(0xffffffffffffff9c, &(0x7f0000000000)='./file2\x00', 0x40c2, 0x0) r2 = perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x6, 0x0, 0xe}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r4 = fork() perf_event_open(&(0x7f0000000540)={0x4, 0x80, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x2, 0x2820, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, @perf_config_ext={0xdc, 0x40}, 0x40000, 0x3, 0x8, 0x5, 0x6000000000000, 0x4, 0x5, 0x0, 0x3, 0x0, 0x3}, r4, 0x9, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000340)={0x0, 0x80, 0x2, 0x83, 0x1, 0x7, 0x0, 0x1f, 0x9ec17fc7a3e840c7, 0xc, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x9, 0x4, @perf_bp={&(0x7f0000000240), 0x1}, 0x404, 0x7, 0x3, 0x6, 0x800, 0x9, 0x3, 0x0, 0x7ff, 0x0, 0x9}, r4, 0x8, r2, 0x9) fork() setxattr$trusted_overlay_upper(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180), &(0x7f00000001c0)={0x0, 0xfb, 0x7a, 0x0, 0x2, "d54449275cb08faf62df87518e3ce16f", "9a61b461b0c63151b954990036d5e0163ceb48c6a801bb019e9e6fa7196a9372f804b9e9ca3fb3d85d1985d31346bbd5fd02b1c8223bf6388eb75498623e38ff88a99c5ce38698a32306b7d4e4b0fd4b03bfa568df17a42f725c6c33046b38b6e4a713dde1"}, 0x7a, 0x3) socket$nl_audit(0x10, 0x3, 0x9) chroot(&(0x7f0000000080)='./file1\x00') sendmsg$inet(r3, &(0x7f0000000780)={&(0x7f0000000000)={0x2, 0x0, @local}, 0x10, &(0x7f00000003c0)=[{&(0x7f0000000300)="6fb9", 0xffeb}], 0x1, &(0x7f0000000700)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @remote, @broadcast}}}], 0x20}, 0x0) 06:14:33 executing program 7: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x10d00b, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000100000005000000000004000040000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000001000018000000c28500002b02", 0x66, 0x400}, {&(0x7f0000010100)="000000000000000000000000e8f7d2e8feeb4bf889ba053b02420ff8010040", 0x1f, 0x4e0}], 0x0, &(0x7f0000000140)=ANY=[]) 06:14:33 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="200000060002000019000000900100000f000000000000000100000005000000000004000040000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000001000018000000c28500002b02", 0x66, 0x400}, {&(0x7f0000010100)="000000000000000000000000e8f7d2e8feeb4bf889ba053b02420ff8010040", 0x1f, 0x4e0}], 0x0, &(0x7f0000000140)=ANY=[]) 06:14:33 executing program 1: pipe(&(0x7f0000000340)={0xffffffffffffffff}) pread64(r0, &(0x7f0000000440)=""/95, 0x5f, 0x6) execveat(r0, &(0x7f0000000080)='./file0\x00', &(0x7f00000001c0)=[&(0x7f00000000c0)='\x00', &(0x7f0000000180)='\x00'], &(0x7f0000000400)=[&(0x7f0000000200)='/dev/zero\x00', &(0x7f0000000240)='/dev/zero\x00', &(0x7f0000000300)='/dev/zero\x00'], 0x1000) socket$inet(0x2, 0x1, 0x0) perf_event_open(&(0x7f0000000100)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x22420, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ptrace$setopts(0x4200, 0x0, 0x5, 0x100050) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000004c00)={0xc0002100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) gettid() r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000), 0x380, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000000)='net/udp6\x00') read$hiddev(r2, &(0x7f0000001140)=""/212, 0xd4) fchmodat(r2, &(0x7f00000004c0)='./file0\x00', 0x0) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(0xffffffffffffffff, 0xc018937c, &(0x7f0000000380)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32=r0, @ANYBLOB="00000000000000002e2f66696cee8816"]) ioctl$TIOCSSOFTCAR(r3, 0x541a, &(0x7f00000003c0)=0x6) waitid$P_PIDFD(0x3, r1, &(0x7f0000000500), 0x2, &(0x7f0000000580)) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(r1, 0xc0189372, &(0x7f0000000040)={{0x1, 0x1, 0x18, r2, {0xffff}}, './file0\x00'}) 06:14:33 executing program 4: r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000040), 0xffffffffffffffff) syz_genetlink_get_family_id$ethtool(&(0x7f0000000100), 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_PAUSE_SET(0xffffffffffffffff, &(0x7f0000000440)={0x0, 0x0, 0x0}, 0x0) r2 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000080)='smaps\x00') pread64(r2, &(0x7f00000000c0)=""/98, 0x62, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x7fffffff) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(0xffffffffffffffff, 0xc0189374, &(0x7f0000000240)={{0x1, 0x1, 0x18, r0, {0x8}}, './file0\x00'}) dup3(0xffffffffffffffff, r2, 0x0) r3 = socket$inet_icmp_raw(0x2, 0x3, 0x1) syz_genetlink_get_family_id$ethtool(&(0x7f0000000180), r2) socket$nl_audit(0x10, 0x3, 0x9) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000040)={'wlan1\x00', 0x0}) sendmsg$inet(r3, &(0x7f0000000780)={&(0x7f0000000000)={0x2, 0x0, @local}, 0x10, &(0x7f00000003c0)=[{&(0x7f0000000300)="6fb9", 0xffeb}], 0x1, &(0x7f0000000700)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {r4, @remote, @broadcast}}}], 0x20}, 0x0) r5 = socket$inet_icmp_raw(0x2, 0x3, 0x1) socket$nl_audit(0x10, 0x3, 0x9) sendmsg$inet(r5, &(0x7f0000000780)={&(0x7f0000000000)={0x2, 0x0, @local}, 0x10, &(0x7f00000003c0)=[{&(0x7f0000000300)="6fb9", 0xffeb}], 0x1, &(0x7f0000000700)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @remote, @broadcast}}}], 0x20}, 0x0) sendmsg$ETHTOOL_MSG_LINKINFO_GET(r2, &(0x7f0000000200)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f00000001c0)={&(0x7f0000000340)=ANY=[@ANYBLOB='@\x00\x00\x00', @ANYRES16=r1, @ANYBLOB="000427bd7000ffdbdf25020000002c00018008000100", @ANYRES32=0x0, @ANYBLOB='\b\x00C\x00\x00\x00\x00\x00\b\x00!', @ANYRES32=r4, @ANYBLOB="d5b921cac279671a02c4d90ed2cbc802c00000009852d9e901fb17000000000000", @ANYRES32=0x0, @ANYBLOB], 0x40}, 0x1, 0x0, 0x0, 0x4}, 0xd0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000480), 0x1}, 0x603}, 0x0, 0xffffffefffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000040)=[{&(0x7f0000010000)="601c6d6b646f736689254300080120000400004000f8000020004000030000000000000001", 0x25}, {0x0, 0x0, 0x10000}], 0x0, &(0x7f0000000040)=ANY=[]) 06:14:33 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x100000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="200f00000002000019000000900100000f000000000000000100000005000000000004000040000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000001000018000000c28500002b02", 0x66, 0x400}, {&(0x7f0000010100)="000000000000000000000000e8f7d2e8feeb4bf889ba053b02420ff8010040", 0x1f, 0x4e0}], 0x0, &(0x7f0000000140)=ANY=[]) [ 2388.947537] loop7: detected capacity change from 0 to 2152 06:14:33 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="200000070002000019000000900100000f000000000000000100000005000000000004000040000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000001000018000000c28500002b02", 0x66, 0x400}, {&(0x7f0000010100)="000000000000000000000000e8f7d2e8feeb4bf889ba053b02420ff8010040", 0x1f, 0x4e0}], 0x0, &(0x7f0000000140)=ANY=[]) [ 2388.961919] EXT4-fs (loop6): unsupported descriptor size 0 [ 2388.967855] loop5: detected capacity change from 0 to 2048 [ 2388.974284] EXT4-fs (loop7): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 2388.974978] EXT4-fs (loop7): group descriptors corrupted! [ 2388.993594] EXT4-fs (loop5): inodes count not valid: 3872 vs 32 [ 2389.019044] loop5: detected capacity change from 0 to 2048 [ 2389.025116] loop4: detected capacity change from 0 to 256 [ 2389.041095] EXT4-fs (loop5): inodes count not valid: 3872 vs 32 06:14:33 executing program 7: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x10d10b, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000100000005000000000004000040000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000001000018000000c28500002b02", 0x66, 0x400}, {&(0x7f0000010100)="000000000000000000000000e8f7d2e8feeb4bf889ba053b02420ff8010040", 0x1f, 0x4e0}], 0x0, &(0x7f0000000140)=ANY=[]) [ 2389.072822] FAT-fs (loop4): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) 06:14:33 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="200000080002000019000000900100000f000000000000000100000005000000000004000040000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000001000018000000c28500002b02", 0x66, 0x400}, {&(0x7f0000010100)="000000000000000000000000e8f7d2e8feeb4bf889ba053b02420ff8010040", 0x1f, 0x4e0}], 0x0, &(0x7f0000000140)=ANY=[]) 06:14:33 executing program 6: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x100000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="0a0000000002000019000000900100000f000000000000000100000005000000000004000040000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000001000018000000c28500002b02", 0x66, 0x400}, {&(0x7f0000010100)="000000000000000000000000e8f7d2e8", 0x10, 0x4e0}], 0x0, &(0x7f0000000140)=ANY=[]) [ 2389.127815] loop7: detected capacity change from 0 to 2152 [ 2389.140622] EXT4-fs (loop7): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 2389.141349] EXT4-fs (loop7): group descriptors corrupted! 06:14:33 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x100000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="201000000002000019000000900100000f000000000000000100000005000000000004000040000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000001000018000000c28500002b02", 0x66, 0x400}, {&(0x7f0000010100)="000000000000000000000000e8f7d2e8feeb4bf889ba053b02420ff8010040", 0x1f, 0x4e0}], 0x0, &(0x7f0000000140)=ANY=[]) [ 2389.169586] loop7: detected capacity change from 0 to 2152 [ 2389.186096] EXT4-fs (loop7): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 2389.186846] EXT4-fs (loop7): group descriptors corrupted! 06:14:33 executing program 0: ioctl$AUTOFS_DEV_IOCTL_CLOSEMOUNT(0xffffffffffffffff, 0xc0189375, 0x0) syz_genetlink_get_family_id$ethtool(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_PAUSE_SET(0xffffffffffffffff, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = memfd_create(&(0x7f0000000400)='B\xdb/\x89\x03l\xdeb\xcb\xb54\xed\xbeLY\xb5Z\xe1\x12S\xf5G\xcc\xf3\xe9\x02h\v\xca(\x96\xe1C\xdf\x1c\xea\x85C\xfb\x10\x13\xfa\x03\x16\xcd\x17\xa2\x80\xa1z\xb4r\x95\xc3@\x9d\xa6\xf1\x92#}g\xd3`\xf7\xcez\xcb\xb3\x1a\xbb\xc48e\x8e\xb1&\xd1\x8a\xe6!\x7f\x8d\xea,qx\xa28\xbf\"\xc7e\x06L\xb06\xeb<$\xd7\xba\xe5\x01\x03\x94r\xab\xd4J\x03s\xaf\xf6A\xbfV\xfa\x1ew\x8d\xbf\x99I\x97\xd8\xd2\xe8\x11\xc4\x04\x00\x84\xd5i\xee\xaf\xae[E\x1f\xdd\xd7#rT+\xb621p\xaf[\x99\" 1\xeb\xc7)\xd2\x1dh\xf2\xd5s\xfd?\fa>\x9f;\xe5r\xe5\xbd\xb0|=\x8eZcPY\xf8\xbd\x13\xaa\x8b\xdf\xbc\x93u\xd5\xb0r\xfb\xde\xe7\xd9k\xe2\xc6\x1b\xf2o@&>\xf2M\xe7\x8c\xeb\xee\xf5\x02~\x85\x14\xf3\xc6v\xf15PE\x8c\xca\x16$\xc2\x01#\xb563\rbq\xbf64\xfaW\x17\xdfa\xe6\xca\x86\xd7\xf8\x81X\x9bg4\xc1\xdam\xcf=Rq6\xb0\xd4D=I\x1a\x0e\xd0\xabz\xe2\x19\x0fM\xad\xdco\xa4\xb2\x8c?\xc1\x10\xf273\xd00\xb3_\xe8\x9a*\xfcL\xea;\xc0\x9a\xdbx!N;\xb5x\t\xa4E\xbe\x93r\x04\xf5\xf0\xf5\x7f\x9a)\xf5\x1b\"\xa1\xd8\x06>\xc9\xe2r\xe9\xbb\xfe\xc0\b\x81\x98\x1c\xe2\xe0?\x8f\xa1\xbel\aN\x83@\xb1\x03)4A\x83\xd6\xcf\xf6\xb5\x82\xb7\x9dA\b$\xa2x\x8a@\xfaj~\xef\x93\xb1/L\x01\xe2\xba|\xf0\x01)PP\xcdl\x06\xfc\x15;qZ\xb1u\xc9\xd0\xd16~JEGm\xe4\x1e@\x9dG\xe4@\xdf\xba\'\x8b\x1cD\xc7\xec\xd1@}tR\xd9P\xf4N\xe3\xd8x\xa0\x91\x17\xc2}\x13\b\xca\t(Z\xa3_\xa1\x90\x15T\xa4\xe7%\x98\xa7\xfb\x8bp/eq\x93\xbf\x1f =|\xf3\xb1\xfcR\xd8\nM,\xcb%@\'\x15\x88\xd8\xad\f\x91|\x95\x8fq+\x98\x81W\xba\x9f\xe0elOt\xbd\by\r\x87\x1c\xba\xbd\x8e+S>\xb8\xe29\x91h^x\xfb`\x00\xdd/\xa6\xb1\x16=\xa1bw\xc5I\xb1\x00'/549, 0x2) r2 = socket$nl_generic(0x10, 0x3, 0x10) r3 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000080), 0xffffffffffffffff) r4 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_80211(r4, 0x8933, &(0x7f00000000c0)={'wlan1\x00', 0x0}) sendmsg$NL80211_CMD_SET_NOACK_MAP(r2, &(0x7f0000000600)={0x0, 0x0, &(0x7f00000005c0)={&(0x7f0000000580)={0x1c, r3, 0x501, 0x20, 0x0, {{}, {@val={0x8, 0x3, r5}, @void}}}, 0x1c}}, 0x0) sendmsg$NL80211_CMD_LEAVE_IBSS(r0, &(0x7f0000000100)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000080)={0x20, r3, 0x200, 0x70bd2c, 0x25dfdbff, {{}, {@void, @val={0xc, 0x99, {0x5, 0xf}}}}, ["", "", "", ""]}, 0x20}, 0x1, 0x0, 0x0, 0x4}, 0x4000000) fcntl$addseals(r1, 0x409, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000002780)={0xffffffffffffffff, 0xffffffffffffffff}) getsockopt$sock_buf(r6, 0x1, 0x3b, 0x0, &(0x7f0000000100)) pwrite64(r6, &(0x7f0000000140)="13a92e039870920257bb7d7e611e1696bd0732e7680452eac4b1193938a346d975604d27bd33b6d88c124a9aa12f0a6c19a0901586e1d40fbdf08d87bda4b0774b6fbf2090add0343b50abea11e8625bfa3c154c4e0fc10e1ffea4a41af8bc1970f46c46ec52d6ec53a050b4a33753cb0fc4bfba102116a2b4421c3ad13a1da76f723fc02f684cbd0c8b385d7bf52fa24a21a8d85817a1d2358e019f1da0f9ff4e53f35a29be314e15ae8dfcd47898f00c30422c45d039430c07d9c9", 0xbc, 0x3) [ 2389.206799] loop6: detected capacity change from 0 to 2048 [ 2389.250045] EXT4-fs (loop6): unsupported descriptor size 0 06:14:33 executing program 4: r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000040), 0xffffffffffffffff) syz_genetlink_get_family_id$ethtool(&(0x7f0000000100), 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_PAUSE_SET(0xffffffffffffffff, &(0x7f0000000440)={0x0, 0x0, 0x0}, 0x0) r2 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000080)='smaps\x00') pread64(r2, &(0x7f00000000c0)=""/98, 0x62, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x7fffffff) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(0xffffffffffffffff, 0xc0189374, &(0x7f0000000240)={{0x1, 0x1, 0x18, r0, {0x8}}, './file0\x00'}) dup3(0xffffffffffffffff, r2, 0x0) r3 = socket$inet_icmp_raw(0x2, 0x3, 0x1) syz_genetlink_get_family_id$ethtool(&(0x7f0000000180), r2) socket$nl_audit(0x10, 0x3, 0x9) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000040)={'wlan1\x00', 0x0}) sendmsg$inet(r3, &(0x7f0000000780)={&(0x7f0000000000)={0x2, 0x0, @local}, 0x10, &(0x7f00000003c0)=[{&(0x7f0000000300)="6fb9", 0xffeb}], 0x1, &(0x7f0000000700)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {r4, @remote, @broadcast}}}], 0x20}, 0x0) r5 = socket$inet_icmp_raw(0x2, 0x3, 0x1) socket$nl_audit(0x10, 0x3, 0x9) sendmsg$inet(r5, &(0x7f0000000780)={&(0x7f0000000000)={0x2, 0x0, @local}, 0x10, &(0x7f00000003c0)=[{&(0x7f0000000300)="6fb9", 0xffeb}], 0x1, &(0x7f0000000700)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @remote, @broadcast}}}], 0x20}, 0x0) sendmsg$ETHTOOL_MSG_LINKINFO_GET(r2, &(0x7f0000000200)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f00000001c0)={&(0x7f0000000340)=ANY=[@ANYBLOB='@\x00\x00\x00', @ANYRES16=r1, @ANYBLOB="000427bd7000ffdbdf25020000002c00018008000100", @ANYRES32=0x0, @ANYBLOB='\b\x00C\x00\x00\x00\x00\x00\b\x00!', @ANYRES32=r4, @ANYBLOB="d5b921cac279671a02c4d90ed2cbc802c00000009852d9e901fb17000000000000", @ANYRES32=0x0, @ANYBLOB], 0x40}, 0x1, 0x0, 0x0, 0x4}, 0xd0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000480), 0x1}, 0x603}, 0x0, 0xffffffefffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000040)=[{&(0x7f0000010000)="601c6d6b646f736689254300080120000400004000f8000020004000030000000000000001", 0x25}, {0x0, 0x0, 0x10000}], 0x0, &(0x7f0000000040)=ANY=[]) 06:14:33 executing program 7: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x10f807, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000100000005000000000004000040000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000001000018000000c28500002b02", 0x66, 0x400}, {&(0x7f0000010100)="000000000000000000000000e8f7d2e8feeb4bf889ba053b02420ff8010040", 0x1f, 0x4e0}], 0x0, &(0x7f0000000140)=ANY=[]) [ 2389.279553] loop5: detected capacity change from 0 to 2048 06:14:33 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="200000180002000019000000900100000f000000000000000100000005000000000004000040000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000001000018000000c28500002b02", 0x66, 0x400}, {&(0x7f0000010100)="000000000000000000000000e8f7d2e8feeb4bf889ba053b02420ff8010040", 0x1f, 0x4e0}], 0x0, &(0x7f0000000140)=ANY=[]) 06:14:33 executing program 1: pipe(&(0x7f0000000340)={0xffffffffffffffff}) pread64(r0, &(0x7f0000000440)=""/95, 0x5f, 0x6) execveat(r0, &(0x7f0000000080)='./file0\x00', &(0x7f00000001c0)=[&(0x7f00000000c0)='\x00', &(0x7f0000000180)='\x00'], &(0x7f0000000400)=[&(0x7f0000000200)='/dev/zero\x00', &(0x7f0000000240)='/dev/zero\x00', &(0x7f0000000300)='/dev/zero\x00'], 0x1000) socket$inet(0x2, 0x1, 0x0) perf_event_open(&(0x7f0000000100)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x22420, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ptrace$setopts(0x4200, 0x0, 0x5, 0x100050) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000004c00)={0xc0002100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) gettid() r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000), 0x380, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000000)='net/udp6\x00') read$hiddev(r2, &(0x7f0000001140)=""/212, 0xd4) fchmodat(r2, &(0x7f00000004c0)='./file0\x00', 0x0) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(r1, 0xc018937c, 0x0) ioctl$TIOCSSOFTCAR(0xffffffffffffffff, 0x541a, &(0x7f00000003c0)=0x6) waitid$P_PIDFD(0x3, r1, &(0x7f0000000500), 0x2, &(0x7f0000000580)) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(r1, 0xc0189372, &(0x7f0000000040)={{0x1, 0x1, 0x18, r2, {0xffff}}, './file0\x00'}) [ 2389.323689] EXT4-fs (loop5): inodes count not valid: 4128 vs 32 [ 2389.340624] loop5: detected capacity change from 0 to 2048 [ 2389.344019] loop7: detected capacity change from 0 to 2172 [ 2389.377506] EXT4-fs (loop5): inodes count not valid: 4128 vs 32 [ 2389.390613] EXT4-fs (loop7): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 2389.391879] EXT4-fs (loop7): group descriptors corrupted! [ 2389.436924] loop4: detected capacity change from 0 to 256 [ 2389.456915] FAT-fs (loop4): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) 06:14:49 executing program 6: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x100000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="0a0000000002000019000000900100000f000000000000000100000005000000000004000040000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000001000018000000c28500002b02", 0x66, 0x400}, {&(0x7f0000010100)="000000000000000000000000e8f7d2e8", 0x10, 0x4e0}], 0x0, &(0x7f0000000140)=ANY=[]) [ 2405.645701] loop7: detected capacity change from 0 to 2174 [ 2405.647718] loop4: detected capacity change from 0 to 256 06:14:49 executing program 4: r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000040), 0xffffffffffffffff) syz_genetlink_get_family_id$ethtool(&(0x7f0000000100), 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_PAUSE_SET(0xffffffffffffffff, &(0x7f0000000440)={0x0, 0x0, 0x0}, 0x0) r2 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000080)='smaps\x00') pread64(r2, &(0x7f00000000c0)=""/98, 0x62, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x7fffffff) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(0xffffffffffffffff, 0xc0189374, &(0x7f0000000240)={{0x1, 0x1, 0x18, r0, {0x8}}, './file0\x00'}) dup3(0xffffffffffffffff, r2, 0x0) r3 = socket$inet_icmp_raw(0x2, 0x3, 0x1) syz_genetlink_get_family_id$ethtool(&(0x7f0000000180), r2) socket$nl_audit(0x10, 0x3, 0x9) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000040)={'wlan1\x00', 0x0}) sendmsg$inet(r3, &(0x7f0000000780)={&(0x7f0000000000)={0x2, 0x0, @local}, 0x10, &(0x7f00000003c0)=[{&(0x7f0000000300)="6fb9", 0xffeb}], 0x1, &(0x7f0000000700)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {r4, @remote, @broadcast}}}], 0x20}, 0x0) r5 = socket$inet_icmp_raw(0x2, 0x3, 0x1) socket$nl_audit(0x10, 0x3, 0x9) sendmsg$inet(r5, &(0x7f0000000780)={&(0x7f0000000000)={0x2, 0x0, @local}, 0x10, &(0x7f00000003c0)=[{&(0x7f0000000300)="6fb9", 0xffeb}], 0x1, &(0x7f0000000700)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @remote, @broadcast}}}], 0x20}, 0x0) sendmsg$ETHTOOL_MSG_LINKINFO_GET(r2, &(0x7f0000000200)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f00000001c0)={&(0x7f0000000340)=ANY=[@ANYBLOB='@\x00\x00\x00', @ANYRES16=r1, @ANYBLOB="000427bd7000ffdbdf25020000002c00018008000100", @ANYRES32=0x0, @ANYBLOB='\b\x00C\x00\x00\x00\x00\x00\b\x00!', @ANYRES32=r4, @ANYBLOB="d5b921cac279671a02c4d90ed2cbc802c00000009852d9e901fb17000000000000", @ANYRES32=0x0, @ANYBLOB], 0x40}, 0x1, 0x0, 0x0, 0x4}, 0xd0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000480), 0x1}, 0x603}, 0x0, 0xffffffefffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000040)=[{&(0x7f0000010000)="601c6d6b646f736689254300080120000400004000f8000020004000030000000000000001", 0x25}, {0x0, 0x0, 0x10000}], 0x0, &(0x7f0000000040)=ANY=[]) 06:14:49 executing program 3: r0 = getpid() ioprio_get$pid(0x2, r0) r1 = getpid() ioprio_get$pid(0x2, r1) syz_mount_image$vfat(0x0, &(0x7f0000000040)='./file1\x00', 0x0, 0x0, &(0x7f00000000c0), 0x2002000, &(0x7f0000000400)=ANY=[@ANYRES16, @ANYBLOB="72e1af808ba473e6f37c85b113d8c4d9e1de4ed2968d2e01108c4795a941d14f6927393c8c3c458dd7454900d48719912efc18d580a8f841234284071012d7d5020eb5d56dc1ba5f1048adac4b928bf6cfd663b4cab43637cb979a9199a0246ec02345161783bc79585902603d7062084f05b744e31fcb4c3e81f3becabb7ad1fa5783f5e5e60ae912102fe8df0536bd074c03bd33742f35c5c44b5c3c9d693114367b7d966e"]) chdir(&(0x7f0000000140)='./file0\x00') ptrace$getenv(0x4201, r0, 0xfff, &(0x7f00000000c0)) openat(0xffffffffffffff9c, &(0x7f0000000000)='./file2\x00', 0x40c2, 0x0) r2 = perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x6, 0x0, 0xe}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r4 = fork() perf_event_open(&(0x7f0000000540)={0x4, 0x80, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x2, 0x2820, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, @perf_config_ext={0xdc, 0x40}, 0x40000, 0x3, 0x8, 0x5, 0x6000000000000, 0x4, 0x5, 0x0, 0x3, 0x0, 0x3}, r4, 0x9, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000340)={0x0, 0x80, 0x2, 0x83, 0x1, 0x7, 0x0, 0x1f, 0x9ec17fc7a3e840c7, 0xc, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x9, 0x4, @perf_bp={&(0x7f0000000240), 0x1}, 0x404, 0x7, 0x3, 0x6, 0x800, 0x9, 0x3, 0x0, 0x7ff, 0x0, 0x9}, r4, 0x8, r2, 0x9) fork() setxattr$trusted_overlay_upper(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180), &(0x7f00000001c0)={0x0, 0xfb, 0x7a, 0x0, 0x2, "d54449275cb08faf62df87518e3ce16f", "9a61b461b0c63151b954990036d5e0163ceb48c6a801bb019e9e6fa7196a9372f804b9e9ca3fb3d85d1985d31346bbd5fd02b1c8223bf6388eb75498623e38ff88a99c5ce38698a32306b7d4e4b0fd4b03bfa568df17a42f725c6c33046b38b6e4a713dde1"}, 0x7a, 0x3) socket$nl_audit(0x10, 0x3, 0x9) chroot(&(0x7f0000000080)='./file1\x00') sendmsg$inet(r3, &(0x7f0000000780)={&(0x7f0000000000)={0x2, 0x0, @local}, 0x10, &(0x7f00000003c0)=[{&(0x7f0000000300)="6fb9", 0xffeb}], 0x1, &(0x7f0000000700)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @remote, @broadcast}}}], 0x20}, 0x0) 06:14:49 executing program 1: pipe(&(0x7f0000000340)={0xffffffffffffffff}) pread64(r0, &(0x7f0000000440)=""/95, 0x5f, 0x6) execveat(r0, &(0x7f0000000080)='./file0\x00', &(0x7f00000001c0)=[&(0x7f00000000c0)='\x00', &(0x7f0000000180)='\x00'], &(0x7f0000000400)=[&(0x7f0000000200)='/dev/zero\x00', &(0x7f0000000240)='/dev/zero\x00', &(0x7f0000000300)='/dev/zero\x00'], 0x1000) socket$inet(0x2, 0x1, 0x0) perf_event_open(&(0x7f0000000100)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x22420, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ptrace$setopts(0x4200, 0x0, 0x5, 0x100050) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000004c00)={0xc0002100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) gettid() r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000), 0x380, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000000)='net/udp6\x00') read$hiddev(r2, &(0x7f0000001140)=""/212, 0xd4) fchmodat(r2, &(0x7f00000004c0)='./file0\x00', 0x0) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(r1, 0xc018937c, 0x0) ioctl$TIOCSSOFTCAR(0xffffffffffffffff, 0x541a, &(0x7f00000003c0)=0x6) waitid$P_PIDFD(0x3, r1, &(0x7f0000000500), 0x2, &(0x7f0000000580)) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(r1, 0xc0189372, &(0x7f0000000040)={{0x1, 0x1, 0x18, r2, {0xffff}}, './file0\x00'}) 06:14:49 executing program 7: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x10fc07, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000100000005000000000004000040000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000001000018000000c28500002b02", 0x66, 0x400}, {&(0x7f0000010100)="000000000000000000000000e8f7d2e8feeb4bf889ba053b02420ff8010040", 0x1f, 0x4e0}], 0x0, &(0x7f0000000140)=ANY=[]) 06:14:49 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x100000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="201100000002000019000000900100000f000000000000000100000005000000000004000040000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000001000018000000c28500002b02", 0x66, 0x400}, {&(0x7f0000010100)="000000000000000000000000e8f7d2e8feeb4bf889ba053b02420ff8010040", 0x1f, 0x4e0}], 0x0, &(0x7f0000000140)=ANY=[]) 06:14:49 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="2000001c0002000019000000900100000f000000000000000100000005000000000004000040000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000001000018000000c28500002b02", 0x66, 0x400}, {&(0x7f0000010100)="000000000000000000000000e8f7d2e8feeb4bf889ba053b02420ff8010040", 0x1f, 0x4e0}], 0x0, &(0x7f0000000140)=ANY=[]) 06:14:49 executing program 0: ioctl$AUTOFS_DEV_IOCTL_CLOSEMOUNT(0xffffffffffffffff, 0xc0189375, 0x0) syz_genetlink_get_family_id$ethtool(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_PAUSE_SET(0xffffffffffffffff, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = memfd_create(&(0x7f0000000400)='B\xdb/\x89\x03l\xdeb\xcb\xb54\xed\xbeLY\xb5Z\xe1\x12S\xf5G\xcc\xf3\xe9\x02h\v\xca(\x96\xe1C\xdf\x1c\xea\x85C\xfb\x10\x13\xfa\x03\x16\xcd\x17\xa2\x80\xa1z\xb4r\x95\xc3@\x9d\xa6\xf1\x92#}g\xd3`\xf7\xcez\xcb\xb3\x1a\xbb\xc48e\x8e\xb1&\xd1\x8a\xe6!\x7f\x8d\xea,qx\xa28\xbf\"\xc7e\x06L\xb06\xeb<$\xd7\xba\xe5\x01\x03\x94r\xab\xd4J\x03s\xaf\xf6A\xbfV\xfa\x1ew\x8d\xbf\x99I\x97\xd8\xd2\xe8\x11\xc4\x04\x00\x84\xd5i\xee\xaf\xae[E\x1f\xdd\xd7#rT+\xb621p\xaf[\x99\" 1\xeb\xc7)\xd2\x1dh\xf2\xd5s\xfd?\fa>\x9f;\xe5r\xe5\xbd\xb0|=\x8eZcPY\xf8\xbd\x13\xaa\x8b\xdf\xbc\x93u\xd5\xb0r\xfb\xde\xe7\xd9k\xe2\xc6\x1b\xf2o@&>\xf2M\xe7\x8c\xeb\xee\xf5\x02~\x85\x14\xf3\xc6v\xf15PE\x8c\xca\x16$\xc2\x01#\xb563\rbq\xbf64\xfaW\x17\xdfa\xe6\xca\x86\xd7\xf8\x81X\x9bg4\xc1\xdam\xcf=Rq6\xb0\xd4D=I\x1a\x0e\xd0\xabz\xe2\x19\x0fM\xad\xdco\xa4\xb2\x8c?\xc1\x10\xf273\xd00\xb3_\xe8\x9a*\xfcL\xea;\xc0\x9a\xdbx!N;\xb5x\t\xa4E\xbe\x93r\x04\xf5\xf0\xf5\x7f\x9a)\xf5\x1b\"\xa1\xd8\x06>\xc9\xe2r\xe9\xbb\xfe\xc0\b\x81\x98\x1c\xe2\xe0?\x8f\xa1\xbel\aN\x83@\xb1\x03)4A\x83\xd6\xcf\xf6\xb5\x82\xb7\x9dA\b$\xa2x\x8a@\xfaj~\xef\x93\xb1/L\x01\xe2\xba|\xf0\x01)PP\xcdl\x06\xfc\x15;qZ\xb1u\xc9\xd0\xd16~JEGm\xe4\x1e@\x9dG\xe4@\xdf\xba\'\x8b\x1cD\xc7\xec\xd1@}tR\xd9P\xf4N\xe3\xd8x\xa0\x91\x17\xc2}\x13\b\xca\t(Z\xa3_\xa1\x90\x15T\xa4\xe7%\x98\xa7\xfb\x8bp/eq\x93\xbf\x1f =|\xf3\xb1\xfcR\xd8\nM,\xcb%@\'\x15\x88\xd8\xad\f\x91|\x95\x8fq+\x98\x81W\xba\x9f\xe0elOt\xbd\by\r\x87\x1c\xba\xbd\x8e+S>\xb8\xe29\x91h^x\xfb`\x00\xdd/\xa6\xb1\x16=\xa1bw\xc5I\xb1\x00'/549, 0x2) r2 = socket$nl_generic(0x10, 0x3, 0x10) r3 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000080), 0xffffffffffffffff) r4 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_80211(r4, 0x8933, &(0x7f00000000c0)={'wlan1\x00', 0x0}) sendmsg$NL80211_CMD_SET_NOACK_MAP(r2, &(0x7f0000000600)={0x0, 0x0, &(0x7f00000005c0)={&(0x7f0000000580)={0x1c, r3, 0x501, 0x20, 0x0, {{}, {@val={0x8, 0x3, r5}, @void}}}, 0x1c}}, 0x0) sendmsg$NL80211_CMD_LEAVE_IBSS(r0, &(0x7f0000000100)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000080)={0x20, r3, 0x200, 0x70bd2c, 0x25dfdbff, {{}, {@void, @val={0xc, 0x99, {0x5, 0xf}}}}, ["", "", "", ""]}, 0x20}, 0x1, 0x0, 0x0, 0x4}, 0x4000000) fcntl$addseals(r1, 0x409, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000002780)={0xffffffffffffffff, 0xffffffffffffffff}) getsockopt$sock_buf(r6, 0x1, 0x3b, 0x0, &(0x7f0000000100)) pwrite64(r6, &(0x7f0000000140)="13a92e039870920257bb7d7e611e1696bd0732e7680452eac4b1193938a346d975604d27bd33b6d88c124a9aa12f0a6c19a0901586e1d40fbdf08d87bda4b0774b6fbf2090add0343b50abea11e8625bfa3c154c4e0fc10e1ffea4a41af8bc1970f46c46ec52d6ec53a050b4a33753cb0fc4bfba102116a2b4421c3ad13a1da76f723fc02f684cbd0c8b385d7bf52fa24a21a8d85817a1d2358e019f1da0f9ff4e53f35a29be314e15ae8dfcd47898f00c30422c45d039430c07d9c9", 0xbc, 0x3) [ 2405.652077] EXT4-fs (loop7): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 2405.652828] EXT4-fs (loop7): group descriptors corrupted! [ 2405.656177] FAT-fs (loop4): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) [ 2405.675078] loop6: detected capacity change from 0 to 2048 [ 2405.682647] loop7: detected capacity change from 0 to 2174 [ 2405.691828] EXT4-fs (loop7): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 2405.692519] EXT4-fs (loop7): group descriptors corrupted! [ 2405.712017] EXT4-fs (loop6): unsupported descriptor size 0 06:14:50 executing program 4: r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000040), 0xffffffffffffffff) syz_genetlink_get_family_id$ethtool(&(0x7f0000000100), 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_PAUSE_SET(0xffffffffffffffff, &(0x7f0000000440)={0x0, 0x0, 0x0}, 0x0) r2 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000080)='smaps\x00') pread64(r2, &(0x7f00000000c0)=""/98, 0x62, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x7fffffff) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(0xffffffffffffffff, 0xc0189374, &(0x7f0000000240)={{0x1, 0x1, 0x18, r0, {0x8}}, './file0\x00'}) dup3(0xffffffffffffffff, r2, 0x0) r3 = socket$inet_icmp_raw(0x2, 0x3, 0x1) syz_genetlink_get_family_id$ethtool(&(0x7f0000000180), r2) socket$nl_audit(0x10, 0x3, 0x9) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000040)={'wlan1\x00', 0x0}) sendmsg$inet(r3, &(0x7f0000000780)={&(0x7f0000000000)={0x2, 0x0, @local}, 0x10, &(0x7f00000003c0)=[{&(0x7f0000000300)="6fb9", 0xffeb}], 0x1, &(0x7f0000000700)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {r4, @remote, @broadcast}}}], 0x20}, 0x0) r5 = socket$inet_icmp_raw(0x2, 0x3, 0x1) socket$nl_audit(0x10, 0x3, 0x9) sendmsg$inet(r5, &(0x7f0000000780)={&(0x7f0000000000)={0x2, 0x0, @local}, 0x10, &(0x7f00000003c0)=[{&(0x7f0000000300)="6fb9", 0xffeb}], 0x1, &(0x7f0000000700)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @remote, @broadcast}}}], 0x20}, 0x0) sendmsg$ETHTOOL_MSG_LINKINFO_GET(r2, &(0x7f0000000200)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f00000001c0)={&(0x7f0000000340)=ANY=[@ANYBLOB='@\x00\x00\x00', @ANYRES16=r1, @ANYBLOB="000427bd7000ffdbdf25020000002c00018008000100", @ANYBLOB='\b\x00C\x00\x00\x00\x00\x00\b\x00!\x00', @ANYRES32=r4, @ANYBLOB="d5b921cac279671a02c4d90ed2cbc802c00000009852d9e901fb17000000000000", @ANYRES32=0x0, @ANYBLOB], 0x40}, 0x1, 0x0, 0x0, 0x4}, 0xd0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000480), 0x1}, 0x603}, 0x0, 0xffffffefffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000040)=[{&(0x7f0000010000)="601c6d6b646f736689254300080120000400004000f8000020004000030000000000000001", 0x25}, {0x0, 0x0, 0x10000}], 0x0, &(0x7f0000000040)=ANY=[]) [ 2405.738746] loop5: detected capacity change from 0 to 2048 [ 2405.765098] EXT4-fs (loop5): inodes count not valid: 4384 vs 32 06:14:50 executing program 7: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x10feff, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000100000005000000000004000040000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000001000018000000c28500002b02", 0x66, 0x400}, {&(0x7f0000010100)="000000000000000000000000e8f7d2e8feeb4bf889ba053b02420ff8010040", 0x1f, 0x4e0}], 0x0, &(0x7f0000000140)=ANY=[]) [ 2405.791336] loop5: detected capacity change from 0 to 2048 06:14:50 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x100004, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000100000005000000000004000040000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000001000018000000c28500002b02", 0x66, 0x400}, {&(0x7f0000010100)="000000000000000000000000e8f7d2e8feeb4bf889ba053b02420ff8010040", 0x1f, 0x4e0}], 0x0, &(0x7f0000000140)=ANY=[]) [ 2405.825636] EXT4-fs (loop5): inodes count not valid: 4384 vs 32 [ 2405.834340] loop4: detected capacity change from 0 to 256 [ 2405.857255] loop7: detected capacity change from 0 to 2175 06:14:50 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="200000650002000019000000900100000f000000000000000100000005000000000004000040000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000001000018000000c28500002b02", 0x66, 0x400}, {&(0x7f0000010100)="000000000000000000000000e8f7d2e8feeb4bf889ba053b02420ff8010040", 0x1f, 0x4e0}], 0x0, &(0x7f0000000140)=ANY=[]) 06:14:50 executing program 6: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x100000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="0a0000000002000019000000900100000f000000000000000100000005000000000004000040000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000001000018000000c28500002b02", 0x66, 0x400}, {&(0x7f0000010100)="000000000000000000000000e8f7d2e8", 0x10, 0x4e0}], 0x0, &(0x7f0000000140)=ANY=[]) [ 2405.865898] FAT-fs (loop4): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) [ 2405.909748] loop6: detected capacity change from 0 to 2048 06:14:50 executing program 4: r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000040), 0xffffffffffffffff) syz_genetlink_get_family_id$ethtool(&(0x7f0000000100), 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_PAUSE_SET(0xffffffffffffffff, &(0x7f0000000440)={0x0, 0x0, 0x0}, 0x0) r2 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000080)='smaps\x00') pread64(r2, &(0x7f00000000c0)=""/98, 0x62, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x7fffffff) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(0xffffffffffffffff, 0xc0189374, &(0x7f0000000240)={{0x1, 0x1, 0x18, r0, {0x8}}, './file0\x00'}) dup3(0xffffffffffffffff, r2, 0x0) r3 = socket$inet_icmp_raw(0x2, 0x3, 0x1) syz_genetlink_get_family_id$ethtool(&(0x7f0000000180), r2) socket$nl_audit(0x10, 0x3, 0x9) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000040)={'wlan1\x00', 0x0}) sendmsg$inet(r3, &(0x7f0000000780)={&(0x7f0000000000)={0x2, 0x0, @local}, 0x10, &(0x7f00000003c0)=[{&(0x7f0000000300)="6fb9", 0xffeb}], 0x1, &(0x7f0000000700)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {r4, @remote, @broadcast}}}], 0x20}, 0x0) r5 = socket$inet_icmp_raw(0x2, 0x3, 0x1) socket$nl_audit(0x10, 0x3, 0x9) sendmsg$inet(r5, &(0x7f0000000780)={&(0x7f0000000000)={0x2, 0x0, @local}, 0x10, &(0x7f00000003c0)=[{&(0x7f0000000300)="6fb9", 0xffeb}], 0x1, &(0x7f0000000700)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @remote, @broadcast}}}], 0x20}, 0x0) sendmsg$ETHTOOL_MSG_LINKINFO_GET(r2, &(0x7f0000000200)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f00000001c0)={&(0x7f0000000340)=ANY=[@ANYBLOB='@\x00\x00\x00', @ANYRES16=r1, @ANYBLOB="000427bd7000ffdbdf25020000002c00018008000100", @ANYBLOB='\b\x00C\x00\x00\x00\x00\x00\b\x00!\x00', @ANYRES32=r4, @ANYBLOB="d5b921cac279671a02c4d90ed2cbc802c00000009852d9e901fb17000000000000", @ANYRES32=0x0, @ANYBLOB], 0x40}, 0x1, 0x0, 0x0, 0x4}, 0xd0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000480), 0x1}, 0x603}, 0x0, 0xffffffefffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000040)=[{&(0x7f0000010000)="601c6d6b646f736689254300080120000400004000f8000020004000030000000000000001", 0x25}, {0x0, 0x0, 0x10000}], 0x0, &(0x7f0000000040)=ANY=[]) [ 2405.939862] EXT4-fs (loop6): unsupported descriptor size 0 [ 2405.943185] EXT4-fs (loop7): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 2405.944671] EXT4-fs (loop7): group descriptors corrupted! 06:14:50 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x100000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="202600000002000019000000900100000f000000000000000100000005000000000004000040000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000001000018000000c28500002b02", 0x66, 0x400}, {&(0x7f0000010100)="000000000000000000000000e8f7d2e8feeb4bf889ba053b02420ff8010040", 0x1f, 0x4e0}], 0x0, &(0x7f0000000140)=ANY=[]) [ 2405.993898] loop7: detected capacity change from 0 to 2175 06:14:50 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x106800, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000100000005000000000004000040000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000001000018000000c28500002b02", 0x66, 0x400}, {&(0x7f0000010100)="000000000000000000000000e8f7d2e8feeb4bf889ba053b02420ff8010040", 0x1f, 0x4e0}], 0x0, &(0x7f0000000140)=ANY=[]) [ 2406.021924] EXT4-fs (loop7): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 2406.023480] EXT4-fs (loop7): group descriptors corrupted! 06:14:50 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="200000660002000019000000900100000f000000000000000100000005000000000004000040000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000001000018000000c28500002b02", 0x66, 0x400}, {&(0x7f0000010100)="000000000000000000000000e8f7d2e8feeb4bf889ba053b02420ff8010040", 0x1f, 0x4e0}], 0x0, &(0x7f0000000140)=ANY=[]) 06:14:50 executing program 6: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x100000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="0a0000000002000019000000900100000f000000000000000100000005000000000004000040000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000001000018000000c28500002b02", 0x66, 0x400}, {&(0x7f0000010100)="000000000000000000000000e8f7d2e8feeb4bf889ba053b", 0x18, 0x4e0}], 0x0, &(0x7f0000000140)=ANY=[]) [ 2406.071197] loop5: detected capacity change from 0 to 2048 [ 2406.092486] EXT4-fs (loop5): inodes count not valid: 9760 vs 32 [ 2406.102322] loop5: detected capacity change from 0 to 2048 [ 2406.124182] EXT4-fs (loop5): inodes count not valid: 9760 vs 32 [ 2406.134864] loop4: detected capacity change from 0 to 256 [ 2406.168666] loop6: detected capacity change from 0 to 2048 [ 2406.173259] FAT-fs (loop4): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) [ 2406.190525] EXT4-fs (loop6): unsupported descriptor size 0 06:15:08 executing program 4: r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000040), 0xffffffffffffffff) syz_genetlink_get_family_id$ethtool(&(0x7f0000000100), 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_PAUSE_SET(0xffffffffffffffff, &(0x7f0000000440)={0x0, 0x0, 0x0}, 0x0) r2 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000080)='smaps\x00') pread64(r2, &(0x7f00000000c0)=""/98, 0x62, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x7fffffff) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(0xffffffffffffffff, 0xc0189374, &(0x7f0000000240)={{0x1, 0x1, 0x18, r0, {0x8}}, './file0\x00'}) dup3(0xffffffffffffffff, r2, 0x0) r3 = socket$inet_icmp_raw(0x2, 0x3, 0x1) syz_genetlink_get_family_id$ethtool(&(0x7f0000000180), r2) socket$nl_audit(0x10, 0x3, 0x9) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000040)={'wlan1\x00', 0x0}) sendmsg$inet(r3, &(0x7f0000000780)={&(0x7f0000000000)={0x2, 0x0, @local}, 0x10, &(0x7f00000003c0)=[{&(0x7f0000000300)="6fb9", 0xffeb}], 0x1, &(0x7f0000000700)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {r4, @remote, @broadcast}}}], 0x20}, 0x0) r5 = socket$inet_icmp_raw(0x2, 0x3, 0x1) socket$nl_audit(0x10, 0x3, 0x9) sendmsg$inet(r5, &(0x7f0000000780)={&(0x7f0000000000)={0x2, 0x0, @local}, 0x10, &(0x7f00000003c0)=[{&(0x7f0000000300)="6fb9", 0xffeb}], 0x1, &(0x7f0000000700)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @remote, @broadcast}}}], 0x20}, 0x0) sendmsg$ETHTOOL_MSG_LINKINFO_GET(r2, &(0x7f0000000200)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f00000001c0)={&(0x7f0000000340)=ANY=[@ANYBLOB='@\x00\x00\x00', @ANYRES16=r1, @ANYBLOB="000427bd7000ffdbdf25020000002c00018008000100", @ANYBLOB='\b\x00C\x00\x00\x00\x00\x00\b\x00!\x00', @ANYRES32=r4, @ANYBLOB="d5b921cac279671a02c4d90ed2cbc802c00000009852d9e901fb17000000000000", @ANYRES32=0x0, @ANYBLOB], 0x40}, 0x1, 0x0, 0x0, 0x4}, 0xd0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000480), 0x1}, 0x603}, 0x0, 0xffffffefffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000040)=[{&(0x7f0000010000)="601c6d6b646f736689254300080120000400004000f8000020004000030000000000000001", 0x25}, {0x0, 0x0, 0x10000}], 0x0, &(0x7f0000000040)=ANY=[]) 06:15:08 executing program 7: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x10ff07, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000100000005000000000004000040000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000001000018000000c28500002b02", 0x66, 0x400}, {&(0x7f0000010100)="000000000000000000000000e8f7d2e8feeb4bf889ba053b02420ff8010040", 0x1f, 0x4e0}], 0x0, &(0x7f0000000140)=ANY=[]) 06:15:08 executing program 1: pipe(&(0x7f0000000340)={0xffffffffffffffff}) pread64(r0, &(0x7f0000000440)=""/95, 0x5f, 0x6) execveat(r0, &(0x7f0000000080)='./file0\x00', &(0x7f00000001c0)=[&(0x7f00000000c0)='\x00', &(0x7f0000000180)='\x00'], &(0x7f0000000400)=[&(0x7f0000000200)='/dev/zero\x00', &(0x7f0000000240)='/dev/zero\x00', &(0x7f0000000300)='/dev/zero\x00'], 0x1000) socket$inet(0x2, 0x1, 0x0) perf_event_open(&(0x7f0000000100)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x22420, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ptrace$setopts(0x4200, 0x0, 0x5, 0x100050) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000004c00)={0xc0002100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) gettid() r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000), 0x380, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000000)='net/udp6\x00') read$hiddev(r2, &(0x7f0000001140)=""/212, 0xd4) fchmodat(r2, &(0x7f00000004c0)='./file0\x00', 0x0) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(r1, 0xc018937c, 0x0) ioctl$TIOCSSOFTCAR(0xffffffffffffffff, 0x541a, &(0x7f00000003c0)=0x6) waitid$P_PIDFD(0x3, r1, &(0x7f0000000500), 0x2, &(0x7f0000000580)) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(r1, 0xc0189372, &(0x7f0000000040)={{0x1, 0x1, 0x18, r2, {0xffff}}, './file0\x00'}) 06:15:08 executing program 0: pipe(&(0x7f0000000340)={0xffffffffffffffff}) pread64(r0, &(0x7f0000000440)=""/95, 0x5f, 0x6) execveat(r0, &(0x7f0000000080)='./file0\x00', &(0x7f00000001c0)=[&(0x7f00000000c0)='\x00', &(0x7f0000000180)='\x00'], &(0x7f0000000400)=[&(0x7f0000000200)='/dev/zero\x00', &(0x7f0000000240)='/dev/zero\x00', &(0x7f0000000300)='/dev/zero\x00'], 0x1000) socket$inet(0x2, 0x1, 0x0) perf_event_open(&(0x7f0000000100)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x22420, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ptrace$setopts(0x4200, 0x0, 0x5, 0x100050) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000004c00)={0xc0002100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) gettid() r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000), 0x380, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000000)='net/udp6\x00') read$hiddev(r2, &(0x7f0000001140)=""/212, 0xd4) fchmodat(r2, &(0x7f00000004c0)='./file0\x00', 0x0) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(r1, 0xc018937c, 0x0) ioctl$TIOCSSOFTCAR(0xffffffffffffffff, 0x541a, &(0x7f00000003c0)=0x6) waitid$P_PIDFD(0x3, r1, &(0x7f0000000500), 0x2, &(0x7f0000000580)) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(r1, 0xc0189372, &(0x7f0000000040)={{0x1, 0x1, 0x18, r2, {0xffff}}, './file0\x00'}) 06:15:08 executing program 6: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x100000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="0a0000000002000019000000900100000f000000000000000100000005000000000004000040000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000001000018000000c28500002b02", 0x66, 0x400}, {&(0x7f0000010100)="000000000000000000000000e8f7d2e8feeb4bf889ba053b", 0x18, 0x4e0}], 0x0, &(0x7f0000000140)=ANY=[]) 06:15:08 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="200000f00002000019000000900100000f000000000000000100000005000000000004000040000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000001000018000000c28500002b02", 0x66, 0x400}, {&(0x7f0000010100)="000000000000000000000000e8f7d2e8feeb4bf889ba053b02420ff8010040", 0x1f, 0x4e0}], 0x0, &(0x7f0000000140)=ANY=[]) 06:15:08 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x100000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="203e00000002000019000000900100000f000000000000000100000005000000000004000040000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000001000018000000c28500002b02", 0x66, 0x400}, {&(0x7f0000010100)="000000000000000000000000e8f7d2e8feeb4bf889ba053b02420ff8010040", 0x1f, 0x4e0}], 0x0, &(0x7f0000000140)=ANY=[]) 06:15:08 executing program 3: r0 = getpid() ioprio_get$pid(0x2, r0) r1 = getpid() ioprio_get$pid(0x2, r1) syz_mount_image$vfat(0x0, &(0x7f0000000040)='./file1\x00', 0x0, 0x0, &(0x7f00000000c0), 0x2002000, &(0x7f0000000400)=ANY=[@ANYRES16, @ANYBLOB="72e1af808ba473e6f37c85b113d8c4d9e1de4ed2968d2e01108c4795a941d14f6927393c8c3c458dd7454900d48719912efc18d580a8f841234284071012d7d5020eb5d56dc1ba5f1048adac4b928bf6cfd663b4cab43637cb979a9199a0246ec02345161783bc79585902603d7062084f05b744e31fcb4c3e81f3becabb7ad1fa5783f5e5e60ae912102fe8df0536bd074c03bd33742f35c5c44b5c3c9d693114367b7d966e"]) chdir(&(0x7f0000000140)='./file0\x00') ptrace$getenv(0x4201, r0, 0xfff, &(0x7f00000000c0)) openat(0xffffffffffffff9c, &(0x7f0000000000)='./file2\x00', 0x40c2, 0x0) r2 = perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x6, 0x0, 0xe}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r4 = fork() perf_event_open(&(0x7f0000000540)={0x4, 0x80, 0xeb, 0x0, 0x20, 0x0, 0x0, 0x0, 0x2820, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, @perf_config_ext={0xdc, 0x40}, 0x40000, 0x3, 0x8, 0x5, 0x6000000000000, 0x4, 0x5, 0x0, 0x3, 0x0, 0x3}, r4, 0x9, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000340)={0x0, 0x80, 0x2, 0x83, 0x1, 0x7, 0x0, 0x1f, 0x9ec17fc7a3e840c7, 0xc, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x9, 0x4, @perf_bp={&(0x7f0000000240), 0x1}, 0x404, 0x7, 0x3, 0x6, 0x800, 0x9, 0x3, 0x0, 0x7ff, 0x0, 0x9}, r4, 0x8, r2, 0x9) fork() setxattr$trusted_overlay_upper(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180), &(0x7f00000001c0)={0x0, 0xfb, 0x7a, 0x0, 0x2, "d54449275cb08faf62df87518e3ce16f", "9a61b461b0c63151b954990036d5e0163ceb48c6a801bb019e9e6fa7196a9372f804b9e9ca3fb3d85d1985d31346bbd5fd02b1c8223bf6388eb75498623e38ff88a99c5ce38698a32306b7d4e4b0fd4b03bfa568df17a42f725c6c33046b38b6e4a713dde1"}, 0x7a, 0x3) socket$nl_audit(0x10, 0x3, 0x9) chroot(&(0x7f0000000080)='./file1\x00') sendmsg$inet(r3, &(0x7f0000000780)={&(0x7f0000000000)={0x2, 0x0, @local}, 0x10, &(0x7f00000003c0)=[{&(0x7f0000000300)="6fb9", 0xffeb}], 0x1, &(0x7f0000000700)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @remote, @broadcast}}}], 0x20}, 0x0) [ 2424.547775] loop6: detected capacity change from 0 to 2048 [ 2424.549150] loop5: detected capacity change from 0 to 2048 [ 2424.570957] EXT4-fs (loop5): inodes count not valid: 15904 vs 32 [ 2424.576502] loop7: detected capacity change from 0 to 2175 [ 2424.584167] EXT4-fs (loop6): unsupported descriptor size 0 [ 2424.595952] loop5: detected capacity change from 0 to 2048 [ 2424.602707] EXT4-fs (loop7): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 2424.604107] EXT4-fs (loop7): group descriptors corrupted! [ 2424.618180] loop4: detected capacity change from 0 to 256 [ 2424.620468] EXT4-fs (loop5): inodes count not valid: 15904 vs 32 [ 2424.630891] loop7: detected capacity change from 0 to 2175 [ 2424.650859] EXT4-fs (loop7): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 2424.652612] EXT4-fs (loop7): group descriptors corrupted! [ 2424.673990] FAT-fs (loop4): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) 06:15:09 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="200000fe0002000019000000900100000f000000000000000100000005000000000004000040000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000001000018000000c28500002b02", 0x66, 0x400}, {&(0x7f0000010100)="000000000000000000000000e8f7d2e8feeb4bf889ba053b02420ff8010040", 0x1f, 0x4e0}], 0x0, &(0x7f0000000140)=ANY=[]) 06:15:09 executing program 6: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x100000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="0a0000000002000019000000900100000f000000000000000100000005000000000004000040000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000001000018000000c28500002b02", 0x66, 0x400}, {&(0x7f0000010100)="000000000000000000000000e8f7d2e8feeb4bf889ba053b", 0x18, 0x4e0}], 0x0, &(0x7f0000000140)=ANY=[]) 06:15:09 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x100000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="204600000002000019000000900100000f000000000000000100000005000000000004000040000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000001000018000000c28500002b02", 0x66, 0x400}, {&(0x7f0000010100)="000000000000000000000000e8f7d2e8feeb4bf889ba053b02420ff8010040", 0x1f, 0x4e0}], 0x0, &(0x7f0000000140)=ANY=[]) 06:15:09 executing program 7: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x10ff0f, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000100000005000000000004000040000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000001000018000000c28500002b02", 0x66, 0x400}, {&(0x7f0000010100)="000000000000000000000000e8f7d2e8feeb4bf889ba053b02420ff8010040", 0x1f, 0x4e0}], 0x0, &(0x7f0000000140)=ANY=[]) [ 2424.865775] loop5: detected capacity change from 0 to 2048 06:15:09 executing program 4: r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000040), 0xffffffffffffffff) syz_genetlink_get_family_id$ethtool(&(0x7f0000000100), 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_PAUSE_SET(0xffffffffffffffff, &(0x7f0000000440)={0x0, 0x0, 0x0}, 0x0) r2 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000080)='smaps\x00') pread64(r2, &(0x7f00000000c0)=""/98, 0x62, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x7fffffff) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(0xffffffffffffffff, 0xc0189374, &(0x7f0000000240)={{0x1, 0x1, 0x18, r0, {0x8}}, './file0\x00'}) dup3(0xffffffffffffffff, r2, 0x0) r3 = socket$inet_icmp_raw(0x2, 0x3, 0x1) syz_genetlink_get_family_id$ethtool(&(0x7f0000000180), r2) socket$nl_audit(0x10, 0x3, 0x9) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000040)={'wlan1\x00', 0x0}) sendmsg$inet(r3, &(0x7f0000000780)={&(0x7f0000000000)={0x2, 0x0, @local}, 0x10, &(0x7f00000003c0)=[{&(0x7f0000000300)="6fb9", 0xffeb}], 0x1, &(0x7f0000000700)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {r4, @remote, @broadcast}}}], 0x20}, 0x0) r5 = socket$inet_icmp_raw(0x2, 0x3, 0x1) socket$nl_audit(0x10, 0x3, 0x9) sendmsg$inet(r5, &(0x7f0000000780)={&(0x7f0000000000)={0x2, 0x0, @local}, 0x10, &(0x7f00000003c0)=[{&(0x7f0000000300)="6fb9", 0xffeb}], 0x1, &(0x7f0000000700)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @remote, @broadcast}}}], 0x20}, 0x0) sendmsg$ETHTOOL_MSG_LINKINFO_GET(r2, &(0x7f0000000200)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f00000001c0)={&(0x7f0000000340)=ANY=[@ANYBLOB='@\x00\x00\x00', @ANYRES16=r1, @ANYRES32=0x0, @ANYBLOB='\b\x00C\x00\x00\x00\x00\x00\b\x00!\x00', @ANYRES32=r4, @ANYBLOB="d5b921cac279671a02c4d90ed2cbc802c00000009852d9e901fb17000000000000", @ANYRES32=0x0, @ANYBLOB], 0x40}, 0x1, 0x0, 0x0, 0x4}, 0xd0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000480), 0x1}, 0x603}, 0x0, 0xffffffefffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000040)=[{&(0x7f0000010000)="601c6d6b646f736689254300080120000400004000f8000020004000030000000000000001", 0x25}, {0x0, 0x0, 0x10000}], 0x0, &(0x7f0000000040)=ANY=[]) [ 2424.900939] EXT4-fs (loop5): inodes count not valid: 17952 vs 32 06:15:09 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000302000019000000900100000f000000000000000100000005000000000004000040000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000001000018000000c28500002b02", 0x66, 0x400}, {&(0x7f0000010100)="000000000000000000000000e8f7d2e8feeb4bf889ba053b02420ff8010040", 0x1f, 0x4e0}], 0x0, &(0x7f0000000140)=ANY=[]) [ 2424.953376] loop6: detected capacity change from 0 to 2048 [ 2424.983247] EXT4-fs (loop6): unsupported descriptor size 0 [ 2425.008747] loop7: detected capacity change from 0 to 2175 [ 2425.011305] loop4: detected capacity change from 0 to 256 06:15:09 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x100000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="204800000002000019000000900100000f000000000000000100000005000000000004000040000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000001000018000000c28500002b02", 0x66, 0x400}, {&(0x7f0000010100)="000000000000000000000000e8f7d2e8feeb4bf889ba053b02420ff8010040", 0x1f, 0x4e0}], 0x0, &(0x7f0000000140)=ANY=[]) [ 2425.041683] FAT-fs (loop4): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) 06:15:09 executing program 1: pipe(&(0x7f0000000340)={0xffffffffffffffff}) pread64(r0, &(0x7f0000000440)=""/95, 0x5f, 0x6) execveat(r0, &(0x7f0000000080)='./file0\x00', &(0x7f00000001c0)=[&(0x7f00000000c0)='\x00', &(0x7f0000000180)='\x00'], &(0x7f0000000400)=[&(0x7f0000000200)='/dev/zero\x00', &(0x7f0000000240)='/dev/zero\x00', &(0x7f0000000300)='/dev/zero\x00'], 0x1000) socket$inet(0x2, 0x1, 0x0) perf_event_open(&(0x7f0000000100)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x22420, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ptrace$setopts(0x4200, 0x0, 0x5, 0x100050) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000004c00)={0xc0002100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) gettid() r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000), 0x380, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000000)='net/udp6\x00') read$hiddev(r2, &(0x7f0000001140)=""/212, 0xd4) fchmodat(r2, &(0x7f00000004c0)='./file0\x00', 0x0) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(r1, 0xc018937c, &(0x7f0000000380)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32=r0]) ioctl$TIOCSSOFTCAR(r3, 0x541a, &(0x7f00000003c0)=0x6) waitid$P_PIDFD(0x3, r1, &(0x7f0000000500), 0x2, &(0x7f0000000580)) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(r1, 0xc0189372, &(0x7f0000000040)={{0x1, 0x1, 0x18, r2, {0xffff}}, './file0\x00'}) [ 2425.048179] EXT4-fs (loop7): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 2425.049448] EXT4-fs (loop7): group descriptors corrupted! [ 2425.083311] loop7: detected capacity change from 0 to 2175 [ 2425.106614] EXT4-fs (loop7): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 2425.108189] EXT4-fs (loop7): group descriptors corrupted! [ 2425.128357] loop5: detected capacity change from 0 to 2048 [ 2425.152550] EXT4-fs (loop5): inodes count not valid: 18464 vs 32 06:15:09 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="200000800402000019000000900100000f000000000000000100000005000000000004000040000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000001000018000000c28500002b02", 0x66, 0x400}, {&(0x7f0000010100)="000000000000000000000000e8f7d2e8feeb4bf889ba053b02420ff8010040", 0x1f, 0x4e0}], 0x0, &(0x7f0000000140)=ANY=[]) [ 2425.177033] loop5: detected capacity change from 0 to 2048 06:15:09 executing program 6: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x100000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="0a0000000002000019000000900100000f000000000000000100000005000000000004000040000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000001000018000000c28500002b02", 0x66, 0x400}, {&(0x7f0000010100)="000000000000000000000000e8f7d2e8feeb4bf889ba053b02420ff8", 0x1c, 0x4e0}], 0x0, &(0x7f0000000140)=ANY=[]) 06:15:09 executing program 4: r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000040), 0xffffffffffffffff) syz_genetlink_get_family_id$ethtool(&(0x7f0000000100), 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_PAUSE_SET(0xffffffffffffffff, &(0x7f0000000440)={0x0, 0x0, 0x0}, 0x0) r2 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000080)='smaps\x00') pread64(r2, &(0x7f00000000c0)=""/98, 0x62, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x7fffffff) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(0xffffffffffffffff, 0xc0189374, &(0x7f0000000240)={{0x1, 0x1, 0x18, r0, {0x8}}, './file0\x00'}) dup3(0xffffffffffffffff, r2, 0x0) r3 = socket$inet_icmp_raw(0x2, 0x3, 0x1) syz_genetlink_get_family_id$ethtool(&(0x7f0000000180), r2) socket$nl_audit(0x10, 0x3, 0x9) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000040)={'wlan1\x00', 0x0}) sendmsg$inet(r3, &(0x7f0000000780)={&(0x7f0000000000)={0x2, 0x0, @local}, 0x10, &(0x7f00000003c0)=[{&(0x7f0000000300)="6fb9", 0xffeb}], 0x1, &(0x7f0000000700)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {r4, @remote, @broadcast}}}], 0x20}, 0x0) r5 = socket$inet_icmp_raw(0x2, 0x3, 0x1) socket$nl_audit(0x10, 0x3, 0x9) sendmsg$inet(r5, &(0x7f0000000780)={&(0x7f0000000000)={0x2, 0x0, @local}, 0x10, &(0x7f00000003c0)=[{&(0x7f0000000300)="6fb9", 0xffeb}], 0x1, &(0x7f0000000700)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @remote, @broadcast}}}], 0x20}, 0x0) sendmsg$ETHTOOL_MSG_LINKINFO_GET(r2, &(0x7f0000000200)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f00000001c0)={&(0x7f0000000340)=ANY=[@ANYBLOB='@\x00\x00\x00', @ANYRES16=r1, @ANYRES32=0x0, @ANYBLOB='\b\x00C\x00\x00\x00\x00\x00\b\x00!\x00', @ANYRES32=r4, @ANYBLOB="d5b921cac279671a02c4d90ed2cbc802c00000009852d9e901fb17000000000000", @ANYRES32=0x0, @ANYBLOB], 0x40}, 0x1, 0x0, 0x0, 0x4}, 0xd0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000480), 0x1}, 0x603}, 0x0, 0xffffffefffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000040)=[{&(0x7f0000010000)="601c6d6b646f736689254300080120000400004000f8000020004000030000000000000001", 0x25}, {0x0, 0x0, 0x10000}], 0x0, &(0x7f0000000040)=ANY=[]) [ 2425.203511] EXT4-fs (loop5): inodes count not valid: 18464 vs 32 [ 2425.318381] loop4: detected capacity change from 0 to 256 06:15:09 executing program 7: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x10fffe, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000100000005000000000004000040000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000001000018000000c28500002b02", 0x66, 0x400}, {&(0x7f0000010100)="000000000000000000000000e8f7d2e8feeb4bf889ba053b02420ff8010040", 0x1f, 0x4e0}], 0x0, &(0x7f0000000140)=ANY=[]) 06:15:09 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x100003, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000100000005000000000004000040000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000001000018000000c28500002b02", 0x66, 0x400}, {&(0x7f0000010100)="000000000000000000000000e8f7d2e8feeb4bf889ba053b02420ff8010040", 0x1f, 0x4e0}], 0x0, &(0x7f0000000140)=ANY=[]) 06:15:09 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x100000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="204c00000002000019000000900100000f000000000000000100000005000000000004000040000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000001000018000000c28500002b02", 0x66, 0x400}, {&(0x7f0000010100)="000000000000000000000000e8f7d2e8feeb4bf889ba053b02420ff8010040", 0x1f, 0x4e0}], 0x0, &(0x7f0000000140)=ANY=[]) [ 2425.320937] loop6: detected capacity change from 0 to 2048 06:15:09 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000502000019000000900100000f000000000000000100000005000000000004000040000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000001000018000000c28500002b02", 0x66, 0x400}, {&(0x7f0000010100)="000000000000000000000000e8f7d2e8feeb4bf889ba053b02420ff8010040", 0x1f, 0x4e0}], 0x0, &(0x7f0000000140)=ANY=[]) [ 2425.349997] EXT4-fs (loop6): unsupported descriptor size 0 [ 2425.357894] FAT-fs (loop4): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) [ 2425.391035] loop5: detected capacity change from 0 to 2048 [ 2425.408671] EXT4-fs (loop5): inodes count not valid: 19488 vs 32 [ 2425.423969] loop5: detected capacity change from 0 to 2048 [ 2425.427337] loop7: detected capacity change from 0 to 2175 [ 2425.443293] EXT4-fs (loop5): inodes count not valid: 19488 vs 32 [ 2425.481776] EXT4-fs (loop7): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 2425.483132] EXT4-fs (loop7): group descriptors corrupted! [ 2425.502261] loop7: detected capacity change from 0 to 2175 [ 2425.524589] EXT4-fs (loop7): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 2425.525863] EXT4-fs (loop7): group descriptors corrupted! 06:15:28 executing program 7: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x900000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000100000005000000000004000040000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000001000018000000c28500002b02", 0x66, 0x400}, {&(0x7f0000010100)="000000000000000000000000e8f7d2e8feeb4bf889ba053b02420ff8010040", 0x1f, 0x4e0}], 0x0, &(0x7f0000000140)=ANY=[]) 06:15:28 executing program 0: r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000040), 0xffffffffffffffff) syz_genetlink_get_family_id$ethtool(&(0x7f0000000100), 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_PAUSE_SET(0xffffffffffffffff, &(0x7f0000000440)={0x0, 0x0, 0x0}, 0x0) r2 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000080)='smaps\x00') pread64(r2, &(0x7f00000000c0)=""/98, 0x62, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x7fffffff) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(0xffffffffffffffff, 0xc0189374, &(0x7f0000000240)={{0x1, 0x1, 0x18, r0, {0x8}}, './file0\x00'}) dup3(0xffffffffffffffff, r2, 0x0) r3 = socket$inet_icmp_raw(0x2, 0x3, 0x1) syz_genetlink_get_family_id$ethtool(&(0x7f0000000180), r2) socket$nl_audit(0x10, 0x3, 0x9) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000040)={'wlan1\x00', 0x0}) sendmsg$inet(r3, &(0x7f0000000780)={&(0x7f0000000000)={0x2, 0x0, @local}, 0x10, &(0x7f00000003c0)=[{&(0x7f0000000300)="6fb9", 0xffeb}], 0x1, &(0x7f0000000700)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {r4, @remote, @broadcast}}}], 0x20}, 0x0) r5 = socket$inet_icmp_raw(0x2, 0x3, 0x1) socket$nl_audit(0x10, 0x3, 0x9) sendmsg$inet(r5, &(0x7f0000000780)={&(0x7f0000000000)={0x2, 0x0, @local}, 0x10, &(0x7f00000003c0)=[{&(0x7f0000000300)="6fb9", 0xffeb}], 0x1, &(0x7f0000000700)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @remote, @broadcast}}}], 0x20}, 0x0) sendmsg$ETHTOOL_MSG_LINKINFO_GET(r2, &(0x7f0000000200)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f00000001c0)={&(0x7f0000000340)=ANY=[@ANYBLOB='@\x00\x00\x00', @ANYRES16=r1, @ANYRES32=0x0, @ANYBLOB='\b\x00C\x00\x00\x00\x00\x00\b\x00!\x00', @ANYRES32=r4, @ANYBLOB="d5b921cac279671a02c4d90ed2cbc802c00000009852d9e901fb17000000000000", @ANYRES32=0x0, @ANYBLOB], 0x40}, 0x1, 0x0, 0x0, 0x4}, 0xd0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000480), 0x1}, 0x603}, 0x0, 0xffffffefffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000040)=[{&(0x7f0000010000)="601c6d6b646f736689254300080120000400004000f8000020004000030000000000000001", 0x25}, {0x0, 0x0, 0x10000}], 0x0, &(0x7f0000000040)=ANY=[]) 06:15:28 executing program 3: r0 = getpid() ioprio_get$pid(0x2, r0) r1 = getpid() ioprio_get$pid(0x2, r1) syz_mount_image$vfat(0x0, &(0x7f0000000040)='./file1\x00', 0x0, 0x0, &(0x7f00000000c0), 0x2002000, &(0x7f0000000400)=ANY=[@ANYRES16, @ANYBLOB="72e1af808ba473e6f37c85b113d8c4d9e1de4ed2968d2e01108c4795a941d14f6927393c8c3c458dd7454900d48719912efc18d580a8f841234284071012d7d5020eb5d56dc1ba5f1048adac4b928bf6cfd663b4cab43637cb979a9199a0246ec02345161783bc79585902603d7062084f05b744e31fcb4c3e81f3becabb7ad1fa5783f5e5e60ae912102fe8df0536bd074c03bd33742f35c5c44b5c3c9d693114367b7d966e"]) chdir(&(0x7f0000000140)='./file0\x00') ptrace$getenv(0x4201, r0, 0xfff, &(0x7f00000000c0)) openat(0xffffffffffffff9c, &(0x7f0000000000)='./file2\x00', 0x40c2, 0x0) r2 = perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x6, 0x0, 0xe}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r4 = fork() perf_event_open(&(0x7f0000000540)={0x4, 0x80, 0xeb, 0x0, 0x20, 0x0, 0x0, 0x0, 0x2820, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, @perf_config_ext={0xdc, 0x40}, 0x40000, 0x3, 0x8, 0x5, 0x6000000000000, 0x4, 0x5, 0x0, 0x3, 0x0, 0x3}, r4, 0x9, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000340)={0x0, 0x80, 0x2, 0x83, 0x1, 0x7, 0x0, 0x1f, 0x9ec17fc7a3e840c7, 0xc, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x9, 0x4, @perf_bp={&(0x7f0000000240), 0x1}, 0x404, 0x7, 0x3, 0x6, 0x800, 0x9, 0x3, 0x0, 0x7ff, 0x0, 0x9}, r4, 0x8, r2, 0x9) fork() setxattr$trusted_overlay_upper(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180), &(0x7f00000001c0)={0x0, 0xfb, 0x7a, 0x0, 0x2, "d54449275cb08faf62df87518e3ce16f", "9a61b461b0c63151b954990036d5e0163ceb48c6a801bb019e9e6fa7196a9372f804b9e9ca3fb3d85d1985d31346bbd5fd02b1c8223bf6388eb75498623e38ff88a99c5ce38698a32306b7d4e4b0fd4b03bfa568df17a42f725c6c33046b38b6e4a713dde1"}, 0x7a, 0x3) socket$nl_audit(0x10, 0x3, 0x9) chroot(&(0x7f0000000080)='./file1\x00') sendmsg$inet(r3, &(0x7f0000000780)={&(0x7f0000000000)={0x2, 0x0, @local}, 0x10, &(0x7f00000003c0)=[{&(0x7f0000000300)="6fb9", 0xffeb}], 0x1, &(0x7f0000000700)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @remote, @broadcast}}}], 0x20}, 0x0) 06:15:28 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000602000019000000900100000f000000000000000100000005000000000004000040000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000001000018000000c28500002b02", 0x66, 0x400}, {&(0x7f0000010100)="000000000000000000000000e8f7d2e8feeb4bf889ba053b02420ff8010040", 0x1f, 0x4e0}], 0x0, &(0x7f0000000140)=ANY=[]) 06:15:28 executing program 1: pipe(&(0x7f0000000340)={0xffffffffffffffff}) pread64(r0, &(0x7f0000000440)=""/95, 0x5f, 0x6) execveat(r0, &(0x7f0000000080)='./file0\x00', &(0x7f00000001c0)=[&(0x7f00000000c0)='\x00', &(0x7f0000000180)='\x00'], &(0x7f0000000400)=[&(0x7f0000000200)='/dev/zero\x00', &(0x7f0000000240)='/dev/zero\x00', &(0x7f0000000300)='/dev/zero\x00'], 0x1000) socket$inet(0x2, 0x1, 0x0) perf_event_open(&(0x7f0000000100)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x22420, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ptrace$setopts(0x4200, 0x0, 0x5, 0x100050) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000004c00)={0xc0002100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) gettid() r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000), 0x380, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000000)='net/udp6\x00') read$hiddev(r2, &(0x7f0000001140)=""/212, 0xd4) fchmodat(r2, &(0x7f00000004c0)='./file0\x00', 0x0) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(r1, 0xc018937c, &(0x7f0000000380)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32=r0]) ioctl$TIOCSSOFTCAR(r3, 0x541a, &(0x7f00000003c0)=0x6) waitid$P_PIDFD(0x3, r1, &(0x7f0000000500), 0x2, &(0x7f0000000580)) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(r1, 0xc0189372, &(0x7f0000000040)={{0x1, 0x1, 0x18, r2, {0xffff}}, './file0\x00'}) 06:15:28 executing program 4: r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000040), 0xffffffffffffffff) syz_genetlink_get_family_id$ethtool(&(0x7f0000000100), 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_PAUSE_SET(0xffffffffffffffff, &(0x7f0000000440)={0x0, 0x0, 0x0}, 0x0) r2 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000080)='smaps\x00') pread64(r2, &(0x7f00000000c0)=""/98, 0x62, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x7fffffff) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(0xffffffffffffffff, 0xc0189374, &(0x7f0000000240)={{0x1, 0x1, 0x18, r0, {0x8}}, './file0\x00'}) dup3(0xffffffffffffffff, r2, 0x0) r3 = socket$inet_icmp_raw(0x2, 0x3, 0x1) syz_genetlink_get_family_id$ethtool(&(0x7f0000000180), r2) socket$nl_audit(0x10, 0x3, 0x9) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000040)={'wlan1\x00', 0x0}) sendmsg$inet(r3, &(0x7f0000000780)={&(0x7f0000000000)={0x2, 0x0, @local}, 0x10, &(0x7f00000003c0)=[{&(0x7f0000000300)="6fb9", 0xffeb}], 0x1, &(0x7f0000000700)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {r4, @remote, @broadcast}}}], 0x20}, 0x0) r5 = socket$inet_icmp_raw(0x2, 0x3, 0x1) socket$nl_audit(0x10, 0x3, 0x9) sendmsg$inet(r5, &(0x7f0000000780)={&(0x7f0000000000)={0x2, 0x0, @local}, 0x10, &(0x7f00000003c0)=[{&(0x7f0000000300)="6fb9", 0xffeb}], 0x1, &(0x7f0000000700)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @remote, @broadcast}}}], 0x20}, 0x0) sendmsg$ETHTOOL_MSG_LINKINFO_GET(r2, &(0x7f0000000200)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f00000001c0)={&(0x7f0000000340)=ANY=[@ANYBLOB='@\x00\x00\x00', @ANYRES16=r1, @ANYRES32=0x0, @ANYBLOB='\b\x00C\x00\x00\x00\x00\x00\b\x00!\x00', @ANYRES32=r4, @ANYBLOB="d5b921cac279671a02c4d90ed2cbc802c00000009852d9e901fb17000000000000", @ANYRES32=0x0, @ANYBLOB], 0x40}, 0x1, 0x0, 0x0, 0x4}, 0xd0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000480), 0x1}, 0x603}, 0x0, 0xffffffefffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000040)=[{&(0x7f0000010000)="601c6d6b646f736689254300080120000400004000f8000020004000030000000000000001", 0x25}, {0x0, 0x0, 0x10000}], 0x0, &(0x7f0000000040)=ANY=[]) 06:15:28 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x100000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="205500000002000019000000900100000f000000000000000100000005000000000004000040000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000001000018000000c28500002b02", 0x66, 0x400}, {&(0x7f0000010100)="000000000000000000000000e8f7d2e8feeb4bf889ba053b02420ff8010040", 0x1f, 0x4e0}], 0x0, &(0x7f0000000140)=ANY=[]) 06:15:28 executing program 6: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x100000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="0a0000000002000019000000900100000f000000000000000100000005000000000004000040000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000001000018000000c28500002b02", 0x66, 0x400}, {&(0x7f0000010100)="000000000000000000000000e8f7d2e8feeb4bf889ba053b02420ff8", 0x1c, 0x4e0}], 0x0, &(0x7f0000000140)=ANY=[]) [ 2443.875124] loop7: detected capacity change from 0 to 18432 [ 2443.893608] EXT4-fs (loop7): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 2443.895317] EXT4-fs (loop7): group descriptors corrupted! [ 2443.922743] loop6: detected capacity change from 0 to 2048 06:15:28 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000702000019000000900100000f000000000000000100000005000000000004000040000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000001000018000000c28500002b02", 0x66, 0x400}, {&(0x7f0000010100)="000000000000000000000000e8f7d2e8feeb4bf889ba053b02420ff8010040", 0x1f, 0x4e0}], 0x0, &(0x7f0000000140)=ANY=[]) [ 2443.928109] loop7: detected capacity change from 0 to 18432 [ 2443.944105] loop5: detected capacity change from 0 to 2048 [ 2443.946833] EXT4-fs (loop7): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 2443.947809] EXT4-fs (loop7): group descriptors corrupted! [ 2443.948687] EXT4-fs (loop6): unsupported descriptor size 0 [ 2443.971512] EXT4-fs (loop5): inodes count not valid: 21792 vs 32 [ 2444.002217] loop5: detected capacity change from 0 to 2048 [ 2444.003355] loop4: detected capacity change from 0 to 256 [ 2444.023791] EXT4-fs (loop5): inodes count not valid: 21792 vs 32 [ 2444.052652] FAT-fs (loop4): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) 06:15:46 executing program 3: r0 = getpid() ioprio_get$pid(0x2, r0) r1 = getpid() ioprio_get$pid(0x2, r1) syz_mount_image$vfat(0x0, &(0x7f0000000040)='./file1\x00', 0x0, 0x0, &(0x7f00000000c0), 0x2002000, &(0x7f0000000400)=ANY=[@ANYRES16, @ANYBLOB="72e1af808ba473e6f37c85b113d8c4d9e1de4ed2968d2e01108c4795a941d14f6927393c8c3c458dd7454900d48719912efc18d580a8f841234284071012d7d5020eb5d56dc1ba5f1048adac4b928bf6cfd663b4cab43637cb979a9199a0246ec02345161783bc79585902603d7062084f05b744e31fcb4c3e81f3becabb7ad1fa5783f5e5e60ae912102fe8df0536bd074c03bd33742f35c5c44b5c3c9d693114367b7d966e"]) chdir(&(0x7f0000000140)='./file0\x00') ptrace$getenv(0x4201, r0, 0xfff, &(0x7f00000000c0)) openat(0xffffffffffffff9c, &(0x7f0000000000)='./file2\x00', 0x40c2, 0x0) r2 = perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x6, 0x0, 0xe}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r4 = fork() perf_event_open(&(0x7f0000000540)={0x4, 0x80, 0xeb, 0x0, 0x20, 0x0, 0x0, 0x0, 0x2820, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, @perf_config_ext={0xdc, 0x40}, 0x40000, 0x3, 0x8, 0x5, 0x6000000000000, 0x4, 0x5, 0x0, 0x3, 0x0, 0x3}, r4, 0x9, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000340)={0x0, 0x80, 0x2, 0x83, 0x1, 0x7, 0x0, 0x1f, 0x9ec17fc7a3e840c7, 0xc, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x9, 0x4, @perf_bp={&(0x7f0000000240), 0x1}, 0x404, 0x7, 0x3, 0x6, 0x800, 0x9, 0x3, 0x0, 0x7ff, 0x0, 0x9}, r4, 0x8, r2, 0x9) fork() setxattr$trusted_overlay_upper(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180), &(0x7f00000001c0)={0x0, 0xfb, 0x7a, 0x0, 0x2, "d54449275cb08faf62df87518e3ce16f", "9a61b461b0c63151b954990036d5e0163ceb48c6a801bb019e9e6fa7196a9372f804b9e9ca3fb3d85d1985d31346bbd5fd02b1c8223bf6388eb75498623e38ff88a99c5ce38698a32306b7d4e4b0fd4b03bfa568df17a42f725c6c33046b38b6e4a713dde1"}, 0x7a, 0x3) socket$nl_audit(0x10, 0x3, 0x9) chroot(&(0x7f0000000080)='./file1\x00') sendmsg$inet(r3, &(0x7f0000000780)={&(0x7f0000000000)={0x2, 0x0, @local}, 0x10, &(0x7f00000003c0)=[{&(0x7f0000000300)="6fb9", 0xffeb}], 0x1, &(0x7f0000000700)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @remote, @broadcast}}}], 0x20}, 0x0) 06:15:46 executing program 4: r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000040), 0xffffffffffffffff) syz_genetlink_get_family_id$ethtool(&(0x7f0000000100), 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_PAUSE_SET(0xffffffffffffffff, &(0x7f0000000440)={0x0, 0x0, 0x0}, 0x0) r2 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000080)='smaps\x00') pread64(r2, &(0x7f00000000c0)=""/98, 0x62, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x7fffffff) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(0xffffffffffffffff, 0xc0189374, &(0x7f0000000240)={{0x1, 0x1, 0x18, r0, {0x8}}, './file0\x00'}) dup3(0xffffffffffffffff, r2, 0x0) r3 = socket$inet_icmp_raw(0x2, 0x3, 0x1) syz_genetlink_get_family_id$ethtool(&(0x7f0000000180), r2) socket$nl_audit(0x10, 0x3, 0x9) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000040)={'wlan1\x00', 0x0}) sendmsg$inet(r3, &(0x7f0000000780)={&(0x7f0000000000)={0x2, 0x0, @local}, 0x10, &(0x7f00000003c0)=[{&(0x7f0000000300)="6fb9", 0xffeb}], 0x1, &(0x7f0000000700)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {r4, @remote, @broadcast}}}], 0x20}, 0x0) r5 = socket$inet_icmp_raw(0x2, 0x3, 0x1) socket$nl_audit(0x10, 0x3, 0x9) sendmsg$inet(r5, &(0x7f0000000780)={&(0x7f0000000000)={0x2, 0x0, @local}, 0x10, &(0x7f00000003c0)=[{&(0x7f0000000300)="6fb9", 0xffeb}], 0x1, &(0x7f0000000700)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @remote, @broadcast}}}], 0x20}, 0x0) sendmsg$ETHTOOL_MSG_LINKINFO_GET(r2, &(0x7f0000000200)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f00000001c0)={&(0x7f0000000340)=ANY=[@ANYBLOB='@\x00\x00\x00', @ANYRES16=r1, @ANYBLOB, @ANYRES32=0x0, @ANYBLOB='\b\x00C\x00\x00\x00\x00\x00\b\x00!\x00', @ANYRES32=r4, @ANYBLOB="d5b921cac279671a02c4d90ed2cbc802c00000009852d9e901fb17000000000000", @ANYRES32=0x0, @ANYBLOB], 0x40}, 0x1, 0x0, 0x0, 0x4}, 0xd0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000480), 0x1}, 0x603}, 0x0, 0xffffffefffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000040)=[{&(0x7f0000010000)="601c6d6b646f736689254300080120000400004000f8000020004000030000000000000001", 0x25}, {0x0, 0x0, 0x10000}], 0x0, &(0x7f0000000040)=ANY=[]) 06:15:46 executing program 7: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x1000000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000100000005000000000004000040000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000001000018000000c28500002b02", 0x66, 0x400}, {&(0x7f0000010100)="000000000000000000000000e8f7d2e8feeb4bf889ba053b02420ff8010040", 0x1f, 0x4e0}], 0x0, &(0x7f0000000140)=ANY=[]) 06:15:46 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x100000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="206000000002000019000000900100000f000000000000000100000005000000000004000040000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000001000018000000c28500002b02", 0x66, 0x400}, {&(0x7f0000010100)="000000000000000000000000e8f7d2e8feeb4bf889ba053b02420ff8010040", 0x1f, 0x4e0}], 0x0, &(0x7f0000000140)=ANY=[]) 06:15:46 executing program 6: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x100000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="0a0000000002000019000000900100000f000000000000000100000005000000000004000040000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000001000018000000c28500002b02", 0x66, 0x400}, {&(0x7f0000010100)="000000000000000000000000e8f7d2e8feeb4bf889ba053b02420ff8", 0x1c, 0x4e0}], 0x0, &(0x7f0000000140)=ANY=[]) 06:15:46 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="200000c00902000019000000900100000f000000000000000100000005000000000004000040000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000001000018000000c28500002b02", 0x66, 0x400}, {&(0x7f0000010100)="000000000000000000000000e8f7d2e8feeb4bf889ba053b02420ff8010040", 0x1f, 0x4e0}], 0x0, &(0x7f0000000140)=ANY=[]) 06:15:46 executing program 1: pipe(&(0x7f0000000340)={0xffffffffffffffff}) pread64(r0, &(0x7f0000000440)=""/95, 0x5f, 0x6) execveat(r0, &(0x7f0000000080)='./file0\x00', &(0x7f00000001c0)=[&(0x7f00000000c0)='\x00', &(0x7f0000000180)='\x00'], &(0x7f0000000400)=[&(0x7f0000000200)='/dev/zero\x00', &(0x7f0000000240)='/dev/zero\x00', &(0x7f0000000300)='/dev/zero\x00'], 0x1000) socket$inet(0x2, 0x1, 0x0) perf_event_open(&(0x7f0000000100)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x22420, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ptrace$setopts(0x4200, 0x0, 0x5, 0x100050) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000004c00)={0xc0002100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) gettid() r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000), 0x380, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000000)='net/udp6\x00') read$hiddev(r2, &(0x7f0000001140)=""/212, 0xd4) fchmodat(r2, &(0x7f00000004c0)='./file0\x00', 0x0) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(r1, 0xc018937c, &(0x7f0000000380)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32=r0]) ioctl$TIOCSSOFTCAR(r3, 0x541a, &(0x7f00000003c0)=0x6) waitid$P_PIDFD(0x3, r1, &(0x7f0000000500), 0x2, &(0x7f0000000580)) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(r1, 0xc0189372, &(0x7f0000000040)={{0x1, 0x1, 0x18, r2, {0xffff}}, './file0\x00'}) 06:15:46 executing program 0: ioctl$AUTOFS_DEV_IOCTL_CLOSEMOUNT(0xffffffffffffffff, 0xc0189375, 0x0) r0 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_PAUSE_SET(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$inet(0xffffffffffffffff, &(0x7f0000000780)={&(0x7f0000000000)={0x2, 0x0, @local}, 0x10, &(0x7f00000003c0)=[{&(0x7f0000000300)="6fb9", 0xffeb}], 0x1, &(0x7f0000000700)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @remote, @broadcast}}}], 0x20}, 0x0) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = socket$nl_audit(0x10, 0x3, 0x9) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000040)={'wlan1\x00', 0x0}) sendmsg$inet(r1, &(0x7f0000000780)={&(0x7f0000000000)={0x2, 0x0, @local}, 0x10, &(0x7f00000003c0)=[{&(0x7f0000000300)="6fb9", 0xffeb}], 0x1, &(0x7f0000000700)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {r3, @remote, @broadcast}}}], 0x20}, 0x0) sendmsg$ETHTOOL_MSG_PAUSE_SET(0xffffffffffffffff, &(0x7f0000001700)={&(0x7f0000000380)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f00000003c0)={&(0x7f0000001640)={0x98, r0, 0x0, 0x70bd2d, 0x25dfdbfc, {}, [@ETHTOOL_A_PAUSE_RX={0x5, 0x3, 0x1}, @ETHTOOL_A_PAUSE_RX={0x5}, @ETHTOOL_A_PAUSE_TX={0x5}, @ETHTOOL_A_PAUSE_RX={0x5}, @ETHTOOL_A_PAUSE_HEADER={0x5c, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'wlan0\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r3}, @ETHTOOL_A_HEADER_FLAGS={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'geneve0\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}]}, @ETHTOOL_A_PAUSE_RX={0x5, 0x3, 0x1}]}, 0x98}, 0x1, 0x0, 0x0, 0x4008040}, 0x40) r4 = memfd_create(&(0x7f0000000400)='B\xdb/\x89\x03l\xdeb\xcb\xb54\xed\xbeLY\xb5Z\xe1\x12S\xf5G\xcc\xf3\xe9\x02h\v\xca(\x96\xe1C\xdf\x1c\xea\x85C\xfb\x10\x13\xfa\x03\x16\xcd\x17\xa2\x80\xa1z\xb4r\x95\xc3@\x9d\xa6\xf1\x92#}g\xd3`\xf7\xcez\xcb\xb3\x1a\xbb\xc48e\x8e\xb1&\xd1\x8a\xe6!\x7f\x8d\xea,qx\xa28\xbf\"\xc7e\x06L\xb06\xeb<$\xd7\xba\xe5\x01\x03\x94r\xab\xd4J\x03s\xaf\xf6A\xbfV\xfa\x1ew\x8d\xbf\x99I\x97\xd8\xd2\xe8\x11\xc4\x04\x00\x84\xd5i\xee\xaf\xae[E\x1f\xdd\xd7#rT+\xb621p\xaf[\x99\" 1\xeb\xc7)\xd2\x1dh\xf2\xd5s\xfd?\fa>\x9f;\xe5r\xe5\xbd\xb0|=\x8eZcPY\xf8\xbd\x13\xaa\x8b\xdf\xbc\x93u\xd5\xb0r\xfb\xde\xe7\xd9k\xe2\xc6\x1b\xf2o@&>\xf2M\xe7\x8c\xeb\xee\xf5\x02~\x85\x14\xf3\xc6v\xf15PE\x8c\xca\x16$\xc2\x01#\xb563\rbq\xbf64\xfaW\x17\xdfa\xe6\xca\x86\xd7\xf8\x81X\x9bg4\xc1\xdam\xcf=Rq6\xb0\xd4D=I\x1a\x0e\xd0\xabz\xe2\x19\x0fM\xad\xdco\xa4\xb2\x8c?\xc1\x10\xf273\xd00\xb3_\xe8\x9a*\xfcL\xea;\xc0\x9a\xdbx!N;\xb5x\t\xa4E\xbe\x93r\x04\xf5\xf0\xf5\x7f\x9a)\xf5\x1b\"\xa1\xd8\x06>\xc9\xe2r\xe9\xbb\xfe\xc0\b\x81\x98\x1c\xe2\xe0?\x8f\xa1\xbel\aN\x83@\xb1\x03)4A\x83\xd6\xcf\xf6\xb5\x82\xb7\x9dA\b$\xa2x\x8a@\xfaj~\xef\x93\xb1/L\x01\xe2\xba|\xf0\x01)PP\xcdl\x06\xfc\x15;qZ\xb1u\xc9\xd0\xd16~JEGm\xe4\x1e@\x9dG\xe4@\xdf\xba\'\x8b\x1cD\xc7\xec\xd1@}tR\xd9P\xf4N\xe3\xd8x\xa0\x91\x17\xc2}\x13\b\xca\t(Z\xa3_\xa1\x90\x15T\xa4\xe7%\x98\xa7\xfb\x8bp/eq\x93\xbf\x1f =|\xf3\xb1\xfcR\xd8\nM,\xcb%@\'\x15\x88\xd8\xad\f\x91|\x95\x8fq+\x98\x81W\xba\x9f\xe0elOt\xbd\by\r\x87\x1c\xba\xbd\x8e+S>\xb8\xe29\x91h^x\xfb`\x00\xdd/\xa6\xb1\x16=\xa1bw\xc5I\xb1\x00'/549, 0x2) fcntl$addseals(r4, 0x409, 0x0) r5 = openat$vcsu(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r6 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x101342, 0x0) write$binfmt_aout(r6, &(0x7f0000000c40)=ANY=[], 0x820) r7 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x0, 0x0) sendfile(r6, r7, 0x0, 0x7fffffff) signalfd(r6, &(0x7f0000000300)={[0x3073871e]}, 0x8) clone3(&(0x7f0000000200)={0x40800400, &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000140), {0x2a}, &(0x7f0000000640)=""/4096, 0x1000, &(0x7f0000000180)=""/64, &(0x7f00000001c0)=[0xffffffffffffffff], 0x1, {r7}}, 0x58) ioctl$sock_inet_SIOCSIFDSTADDR(r5, 0x8918, &(0x7f0000000080)={'batadv_slave_0\x00', {0x2, 0x0, @initdev}}) [ 2461.982569] loop5: detected capacity change from 0 to 2048 [ 2461.987793] loop6: detected capacity change from 0 to 2048 [ 2461.998954] EXT4-fs (loop5): inodes count not valid: 24608 vs 32 [ 2462.017160] EXT4-fs (loop6): unsupported descriptor size 0 [ 2462.018304] loop7: detected capacity change from 0 to 32768 [ 2462.025291] loop5: detected capacity change from 0 to 2048 [ 2462.032743] loop4: detected capacity change from 0 to 256 [ 2462.036564] EXT4-fs (loop5): inodes count not valid: 24608 vs 32 [ 2462.052344] FAT-fs (loop4): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) [ 2462.092451] EXT4-fs (loop7): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 2462.093758] EXT4-fs (loop7): group descriptors corrupted! 06:15:46 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x100000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="206800000002000019000000900100000f000000000000000100000005000000000004000040000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000001000018000000c28500002b02", 0x66, 0x400}, {&(0x7f0000010100)="000000000000000000000000e8f7d2e8feeb4bf889ba053b02420ff8010040", 0x1f, 0x4e0}], 0x0, &(0x7f0000000140)=ANY=[]) [ 2462.119878] loop7: detected capacity change from 0 to 32768 06:15:46 executing program 4: r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000040), 0xffffffffffffffff) syz_genetlink_get_family_id$ethtool(&(0x7f0000000100), 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_PAUSE_SET(0xffffffffffffffff, &(0x7f0000000440)={0x0, 0x0, 0x0}, 0x0) r2 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000080)='smaps\x00') pread64(r2, &(0x7f00000000c0)=""/98, 0x62, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x7fffffff) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(0xffffffffffffffff, 0xc0189374, &(0x7f0000000240)={{0x1, 0x1, 0x18, r0, {0x8}}, './file0\x00'}) dup3(0xffffffffffffffff, r2, 0x0) r3 = socket$inet_icmp_raw(0x2, 0x3, 0x1) syz_genetlink_get_family_id$ethtool(&(0x7f0000000180), r2) socket$nl_audit(0x10, 0x3, 0x9) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000040)={'wlan1\x00', 0x0}) sendmsg$inet(r3, &(0x7f0000000780)={&(0x7f0000000000)={0x2, 0x0, @local}, 0x10, &(0x7f00000003c0)=[{&(0x7f0000000300)="6fb9", 0xffeb}], 0x1, &(0x7f0000000700)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {r4, @remote, @broadcast}}}], 0x20}, 0x0) r5 = socket$inet_icmp_raw(0x2, 0x3, 0x1) socket$nl_audit(0x10, 0x3, 0x9) sendmsg$inet(r5, &(0x7f0000000780)={&(0x7f0000000000)={0x2, 0x0, @local}, 0x10, &(0x7f00000003c0)=[{&(0x7f0000000300)="6fb9", 0xffeb}], 0x1, &(0x7f0000000700)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @remote, @broadcast}}}], 0x20}, 0x0) sendmsg$ETHTOOL_MSG_LINKINFO_GET(r2, &(0x7f0000000200)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f00000001c0)={&(0x7f0000000340)=ANY=[@ANYBLOB='@\x00\x00\x00', @ANYRES16=r1, @ANYBLOB, @ANYRES32=0x0, @ANYBLOB='\b\x00C\x00\x00\x00\x00\x00\b\x00!\x00', @ANYRES32=r4, @ANYBLOB="d5b921cac279671a02c4d90ed2cbc802c00000009852d9e901fb17000000000000", @ANYRES32=0x0, @ANYBLOB], 0x40}, 0x1, 0x0, 0x0, 0x4}, 0xd0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000480), 0x1}, 0x603}, 0x0, 0xffffffefffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000040)=[{&(0x7f0000010000)="601c6d6b646f736689254300080120000400004000f8000020004000030000000000000001", 0x25}, {0x0, 0x0, 0x10000}], 0x0, &(0x7f0000000040)=ANY=[]) [ 2462.142869] EXT4-fs (loop7): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 2462.143845] EXT4-fs (loop7): group descriptors corrupted! 06:15:46 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="200000001802000019000000900100000f000000000000000100000005000000000004000040000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000001000018000000c28500002b02", 0x66, 0x400}, {&(0x7f0000010100)="000000000000000000000000e8f7d2e8feeb4bf889ba053b02420ff8010040", 0x1f, 0x4e0}], 0x0, &(0x7f0000000140)=ANY=[]) 06:15:46 executing program 6: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x100000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="0a0000000002000019000000900100000f000000000000000100000005000000000004000040000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000001000018000000c28500002b02", 0x66, 0x400}, {&(0x7f0000010100)="000000000000000000000000e8f7d2e8feeb4bf889ba053b02420ff80100", 0x1e, 0x4e0}], 0x0, &(0x7f0000000140)=ANY=[]) [ 2462.218279] loop5: detected capacity change from 0 to 2048 [ 2462.247000] EXT4-fs (loop5): inodes count not valid: 26656 vs 32 06:15:46 executing program 7: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x5000000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000100000005000000000004000040000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000001000018000000c28500002b02", 0x66, 0x400}, {&(0x7f0000010100)="000000000000000000000000e8f7d2e8feeb4bf889ba053b02420ff8010040", 0x1f, 0x4e0}], 0x0, &(0x7f0000000140)=ANY=[]) [ 2462.341105] loop6: detected capacity change from 0 to 2048 [ 2462.350805] loop4: detected capacity change from 0 to 256 06:15:46 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x100000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="206c00000002000019000000900100000f000000000000000100000005000000000004000040000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000001000018000000c28500002b02", 0x66, 0x400}, {&(0x7f0000010100)="000000000000000000000000e8f7d2e8feeb4bf889ba053b02420ff8010040", 0x1f, 0x4e0}], 0x0, &(0x7f0000000140)=ANY=[]) [ 2462.397292] FAT-fs (loop4): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) [ 2462.398679] EXT4-fs (loop6): unsupported descriptor size 0 06:15:46 executing program 1: pipe(&(0x7f0000000340)={0xffffffffffffffff}) pread64(r0, &(0x7f0000000440)=""/95, 0x5f, 0x6) execveat(r0, &(0x7f0000000080)='./file0\x00', &(0x7f00000001c0)=[&(0x7f00000000c0)='\x00', &(0x7f0000000180)='\x00'], &(0x7f0000000400)=[&(0x7f0000000200)='/dev/zero\x00', &(0x7f0000000240)='/dev/zero\x00', &(0x7f0000000300)='/dev/zero\x00'], 0x1000) socket$inet(0x2, 0x1, 0x0) perf_event_open(&(0x7f0000000100)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x22420, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ptrace$setopts(0x4200, 0x0, 0x5, 0x100050) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000004c00)={0xc0002100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) gettid() r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000), 0x380, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000000)='net/udp6\x00') read$hiddev(r2, &(0x7f0000001140)=""/212, 0xd4) fchmodat(r2, &(0x7f00000004c0)='./file0\x00', 0x0) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(r1, 0xc018937c, &(0x7f0000000380)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32=r0, @ANYBLOB]) ioctl$TIOCSSOFTCAR(r3, 0x541a, &(0x7f00000003c0)=0x6) waitid$P_PIDFD(0x3, r1, &(0x7f0000000500), 0x2, &(0x7f0000000580)) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(r1, 0xc0189372, &(0x7f0000000040)={{0x1, 0x1, 0x18, r2, {0xffff}}, './file0\x00'}) [ 2462.455761] loop7: detected capacity change from 0 to 163840 06:15:46 executing program 4: r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000040), 0xffffffffffffffff) syz_genetlink_get_family_id$ethtool(&(0x7f0000000100), 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_PAUSE_SET(0xffffffffffffffff, &(0x7f0000000440)={0x0, 0x0, 0x0}, 0x0) r2 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000080)='smaps\x00') pread64(r2, &(0x7f00000000c0)=""/98, 0x62, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x7fffffff) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(0xffffffffffffffff, 0xc0189374, &(0x7f0000000240)={{0x1, 0x1, 0x18, r0, {0x8}}, './file0\x00'}) dup3(0xffffffffffffffff, r2, 0x0) r3 = socket$inet_icmp_raw(0x2, 0x3, 0x1) syz_genetlink_get_family_id$ethtool(&(0x7f0000000180), r2) socket$nl_audit(0x10, 0x3, 0x9) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000040)={'wlan1\x00', 0x0}) sendmsg$inet(r3, &(0x7f0000000780)={&(0x7f0000000000)={0x2, 0x0, @local}, 0x10, &(0x7f00000003c0)=[{&(0x7f0000000300)="6fb9", 0xffeb}], 0x1, &(0x7f0000000700)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {r4, @remote, @broadcast}}}], 0x20}, 0x0) r5 = socket$inet_icmp_raw(0x2, 0x3, 0x1) socket$nl_audit(0x10, 0x3, 0x9) sendmsg$inet(r5, &(0x7f0000000780)={&(0x7f0000000000)={0x2, 0x0, @local}, 0x10, &(0x7f00000003c0)=[{&(0x7f0000000300)="6fb9", 0xffeb}], 0x1, &(0x7f0000000700)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @remote, @broadcast}}}], 0x20}, 0x0) sendmsg$ETHTOOL_MSG_LINKINFO_GET(r2, &(0x7f0000000200)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f00000001c0)={&(0x7f0000000340)=ANY=[@ANYBLOB='@\x00\x00\x00', @ANYRES16=r1, @ANYBLOB, @ANYRES32=0x0, @ANYBLOB='\b\x00C\x00\x00\x00\x00\x00\b\x00!\x00', @ANYRES32=r4, @ANYBLOB="d5b921cac279671a02c4d90ed2cbc802c00000009852d9e901fb17000000000000", @ANYRES32=0x0, @ANYBLOB], 0x40}, 0x1, 0x0, 0x0, 0x4}, 0xd0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000480), 0x1}, 0x603}, 0x0, 0xffffffefffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000040)=[{&(0x7f0000010000)="601c6d6b646f736689254300080120000400004000f8000020004000030000000000000001", 0x25}, {0x0, 0x0, 0x10000}], 0x0, &(0x7f0000000040)=ANY=[]) [ 2462.489142] EXT4-fs (loop7): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 2462.489958] EXT4-fs (loop7): group descriptors corrupted! [ 2462.507938] loop5: detected capacity change from 0 to 2048 [ 2462.554639] loop7: detected capacity change from 0 to 163840 [ 2462.561196] EXT4-fs (loop5): inodes count not valid: 27680 vs 32 [ 2462.577729] EXT4-fs (loop7): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 2462.579090] EXT4-fs (loop7): group descriptors corrupted! [ 2462.602615] loop5: detected capacity change from 0 to 2048 [ 2462.628105] EXT4-fs (loop5): inodes count not valid: 27680 vs 32 06:15:47 executing program 3: r0 = getpid() ioprio_get$pid(0x2, r0) r1 = getpid() ioprio_get$pid(0x2, r1) syz_mount_image$vfat(0x0, &(0x7f0000000040)='./file1\x00', 0x0, 0x0, &(0x7f00000000c0), 0x2002000, &(0x7f0000000400)=ANY=[@ANYRES16, @ANYBLOB="72e1af808ba473e6f37c85b113d8c4d9e1de4ed2968d2e01108c4795a941d14f6927393c8c3c458dd7454900d48719912efc18d580a8f841234284071012d7d5020eb5d56dc1ba5f1048adac4b928bf6cfd663b4cab43637cb979a9199a0246ec02345161783bc79585902603d7062084f05b744e31fcb4c3e81f3becabb7ad1fa5783f5e5e60ae912102fe8df0536bd074c03bd33742f35c5c44b5c3c9d693114367b7d966e"]) chdir(&(0x7f0000000140)='./file0\x00') ptrace$getenv(0x4201, r0, 0xfff, &(0x7f00000000c0)) openat(0xffffffffffffff9c, &(0x7f0000000000)='./file2\x00', 0x40c2, 0x0) r2 = perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x6, 0x0, 0xe}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r4 = fork() perf_event_open(&(0x7f0000000540)={0x4, 0x80, 0xeb, 0x0, 0x20, 0x0, 0x0, 0x2, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, @perf_config_ext={0xdc, 0x40}, 0x40000, 0x3, 0x8, 0x5, 0x6000000000000, 0x4, 0x5, 0x0, 0x3, 0x0, 0x3}, r4, 0x9, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000340)={0x0, 0x80, 0x2, 0x83, 0x1, 0x7, 0x0, 0x1f, 0x9ec17fc7a3e840c7, 0xc, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x9, 0x4, @perf_bp={&(0x7f0000000240), 0x1}, 0x404, 0x7, 0x3, 0x6, 0x800, 0x9, 0x3, 0x0, 0x7ff, 0x0, 0x9}, r4, 0x8, r2, 0x9) fork() setxattr$trusted_overlay_upper(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180), &(0x7f00000001c0)={0x0, 0xfb, 0x7a, 0x0, 0x2, "d54449275cb08faf62df87518e3ce16f", "9a61b461b0c63151b954990036d5e0163ceb48c6a801bb019e9e6fa7196a9372f804b9e9ca3fb3d85d1985d31346bbd5fd02b1c8223bf6388eb75498623e38ff88a99c5ce38698a32306b7d4e4b0fd4b03bfa568df17a42f725c6c33046b38b6e4a713dde1"}, 0x7a, 0x3) socket$nl_audit(0x10, 0x3, 0x9) chroot(&(0x7f0000000080)='./file1\x00') sendmsg$inet(r3, &(0x7f0000000780)={&(0x7f0000000000)={0x2, 0x0, @local}, 0x10, &(0x7f00000003c0)=[{&(0x7f0000000300)="6fb9", 0xffeb}], 0x1, &(0x7f0000000700)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @remote, @broadcast}}}], 0x20}, 0x0) 06:15:47 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="200000001c02000019000000900100000f000000000000000100000005000000000004000040000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000001000018000000c28500002b02", 0x66, 0x400}, {&(0x7f0000010100)="000000000000000000000000e8f7d2e8feeb4bf889ba053b02420ff8010040", 0x1f, 0x4e0}], 0x0, &(0x7f0000000140)=ANY=[]) 06:15:47 executing program 6: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x100000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="0a0000000002000019000000900100000f000000000000000100000005000000000004000040000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000001000018000000c28500002b02", 0x66, 0x400}, {&(0x7f0000010100)="000000000000000000000000e8f7d2e8feeb4bf889ba053b02420ff80100", 0x1e, 0x4e0}], 0x0, &(0x7f0000000140)=ANY=[]) [ 2462.771010] loop4: detected capacity change from 0 to 256 06:15:47 executing program 7: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8000000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000100000005000000000004000040000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000001000018000000c28500002b02", 0x66, 0x400}, {&(0x7f0000010100)="000000000000000000000000e8f7d2e8feeb4bf889ba053b02420ff8010040", 0x1f, 0x4e0}], 0x0, &(0x7f0000000140)=ANY=[]) [ 2462.860816] loop6: detected capacity change from 0 to 2048 06:15:47 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x100000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="207400000002000019000000900100000f000000000000000100000005000000000004000040000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000001000018000000c28500002b02", 0x66, 0x400}, {&(0x7f0000010100)="000000000000000000000000e8f7d2e8feeb4bf889ba053b02420ff8010040", 0x1f, 0x4e0}], 0x0, &(0x7f0000000140)=ANY=[]) [ 2462.917699] FAT-fs (loop4): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) [ 2462.922612] EXT4-fs (loop6): unsupported descriptor size 0 [ 2463.022997] loop7: detected capacity change from 0 to 262144 06:15:47 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="200000001f02000019000000900100000f000000000000000100000005000000000004000040000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000001000018000000c28500002b02", 0x66, 0x400}, {&(0x7f0000010100)="000000000000000000000000e8f7d2e8feeb4bf889ba053b02420ff8010040", 0x1f, 0x4e0}], 0x0, &(0x7f0000000140)=ANY=[]) [ 2463.040940] EXT4-fs (loop7): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 2463.042368] EXT4-fs (loop7): group descriptors corrupted! [ 2463.061638] loop7: detected capacity change from 0 to 262144 [ 2463.083073] EXT4-fs (loop7): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 2463.084339] EXT4-fs (loop7): group descriptors corrupted! 06:15:47 executing program 1: pipe(&(0x7f0000000340)={0xffffffffffffffff}) pread64(r0, &(0x7f0000000440)=""/95, 0x5f, 0x6) execveat(r0, &(0x7f0000000080)='./file0\x00', &(0x7f00000001c0)=[&(0x7f00000000c0)='\x00', &(0x7f0000000180)='\x00'], &(0x7f0000000400)=[&(0x7f0000000200)='/dev/zero\x00', &(0x7f0000000240)='/dev/zero\x00', &(0x7f0000000300)='/dev/zero\x00'], 0x1000) socket$inet(0x2, 0x1, 0x0) perf_event_open(&(0x7f0000000100)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x22420, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ptrace$setopts(0x4200, 0x0, 0x5, 0x100050) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000004c00)={0xc0002100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) gettid() r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000), 0x380, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000000)='net/udp6\x00') read$hiddev(r2, &(0x7f0000001140)=""/212, 0xd4) fchmodat(r2, &(0x7f00000004c0)='./file0\x00', 0x0) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(r1, 0xc018937c, &(0x7f0000000380)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32=r0, @ANYBLOB]) ioctl$TIOCSSOFTCAR(r3, 0x541a, &(0x7f00000003c0)=0x6) waitid$P_PIDFD(0x3, r1, &(0x7f0000000500), 0x2, &(0x7f0000000580)) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(r1, 0xc0189372, &(0x7f0000000040)={{0x1, 0x1, 0x18, r2, {0xffff}}, './file0\x00'}) [ 2463.151477] loop5: detected capacity change from 0 to 2048 [ 2463.198525] EXT4-fs (loop5): inodes count not valid: 29728 vs 32 [ 2463.232860] loop5: detected capacity change from 0 to 2048 [ 2463.269779] EXT4-fs (loop5): inodes count not valid: 29728 vs 32 06:16:05 executing program 7: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xb000000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000100000005000000000004000040000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000001000018000000c28500002b02", 0x66, 0x400}, {&(0x7f0000010100)="000000000000000000000000e8f7d2e8feeb4bf889ba053b02420ff8010040", 0x1f, 0x4e0}], 0x0, &(0x7f0000000140)=ANY=[]) 06:16:05 executing program 3: r0 = getpid() ioprio_get$pid(0x2, r0) r1 = getpid() ioprio_get$pid(0x2, r1) syz_mount_image$vfat(0x0, &(0x7f0000000040)='./file1\x00', 0x0, 0x0, &(0x7f00000000c0), 0x2002000, &(0x7f0000000400)=ANY=[@ANYRES16, @ANYBLOB="72e1af808ba473e6f37c85b113d8c4d9e1de4ed2968d2e01108c4795a941d14f6927393c8c3c458dd7454900d48719912efc18d580a8f841234284071012d7d5020eb5d56dc1ba5f1048adac4b928bf6cfd663b4cab43637cb979a9199a0246ec02345161783bc79585902603d7062084f05b744e31fcb4c3e81f3becabb7ad1fa5783f5e5e60ae912102fe8df0536bd074c03bd33742f35c5c44b5c3c9d693114367b7d966e"]) chdir(&(0x7f0000000140)='./file0\x00') ptrace$getenv(0x4201, r0, 0xfff, &(0x7f00000000c0)) openat(0xffffffffffffff9c, &(0x7f0000000000)='./file2\x00', 0x40c2, 0x0) r2 = perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x6, 0x0, 0xe}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r4 = fork() perf_event_open(&(0x7f0000000540)={0x4, 0x80, 0xeb, 0x0, 0x20, 0x0, 0x0, 0x2, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, @perf_config_ext={0xdc, 0x40}, 0x40000, 0x3, 0x8, 0x5, 0x6000000000000, 0x4, 0x5, 0x0, 0x3, 0x0, 0x3}, r4, 0x9, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000340)={0x0, 0x80, 0x2, 0x83, 0x1, 0x7, 0x0, 0x1f, 0x9ec17fc7a3e840c7, 0xc, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x9, 0x4, @perf_bp={&(0x7f0000000240), 0x1}, 0x404, 0x7, 0x3, 0x6, 0x800, 0x9, 0x3, 0x0, 0x7ff, 0x0, 0x9}, r4, 0x8, r2, 0x9) fork() setxattr$trusted_overlay_upper(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180), &(0x7f00000001c0)={0x0, 0xfb, 0x7a, 0x0, 0x2, "d54449275cb08faf62df87518e3ce16f", "9a61b461b0c63151b954990036d5e0163ceb48c6a801bb019e9e6fa7196a9372f804b9e9ca3fb3d85d1985d31346bbd5fd02b1c8223bf6388eb75498623e38ff88a99c5ce38698a32306b7d4e4b0fd4b03bfa568df17a42f725c6c33046b38b6e4a713dde1"}, 0x7a, 0x3) socket$nl_audit(0x10, 0x3, 0x9) chroot(&(0x7f0000000080)='./file1\x00') sendmsg$inet(r3, &(0x7f0000000780)={&(0x7f0000000000)={0x2, 0x0, @local}, 0x10, &(0x7f00000003c0)=[{&(0x7f0000000300)="6fb9", 0xffeb}], 0x1, &(0x7f0000000700)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @remote, @broadcast}}}], 0x20}, 0x0) [ 2480.821902] loop6: detected capacity change from 0 to 2048 06:16:05 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8000000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000100000005000000000004000040000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000001000018000000c28500002b02", 0x66, 0x400}, {&(0x7f0000010100)="000000000000000000000000e8f7d2e8feeb4bf889ba053b02420ff8010040", 0x1f, 0x4e0}], 0x0, &(0x7f0000000140)=ANY=[]) 06:16:05 executing program 6: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x100000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="0a0000000002000019000000900100000f000000000000000100000005000000000004000040000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000001000018000000c28500002b02", 0x66, 0x400}, {&(0x7f0000010100)="000000000000000000000000e8f7d2e8feeb4bf889ba053b02420ff80100", 0x1e, 0x4e0}], 0x0, &(0x7f0000000140)=ANY=[]) 06:16:05 executing program 1: pipe(&(0x7f0000000340)={0xffffffffffffffff}) pread64(r0, &(0x7f0000000440)=""/95, 0x5f, 0x6) execveat(r0, &(0x7f0000000080)='./file0\x00', &(0x7f00000001c0)=[&(0x7f00000000c0)='\x00', &(0x7f0000000180)='\x00'], &(0x7f0000000400)=[&(0x7f0000000200)='/dev/zero\x00', &(0x7f0000000240)='/dev/zero\x00', &(0x7f0000000300)='/dev/zero\x00'], 0x1000) socket$inet(0x2, 0x1, 0x0) perf_event_open(&(0x7f0000000100)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x22420, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ptrace$setopts(0x4200, 0x0, 0x5, 0x100050) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000004c00)={0xc0002100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) gettid() r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000), 0x380, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000000)='net/udp6\x00') read$hiddev(r2, &(0x7f0000001140)=""/212, 0xd4) fchmodat(r2, &(0x7f00000004c0)='./file0\x00', 0x0) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(r1, 0xc018937c, &(0x7f0000000380)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32=r0, @ANYBLOB]) ioctl$TIOCSSOFTCAR(r3, 0x541a, &(0x7f00000003c0)=0x6) waitid$P_PIDFD(0x3, r1, &(0x7f0000000500), 0x2, &(0x7f0000000580)) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(r1, 0xc0189372, &(0x7f0000000040)={{0x1, 0x1, 0x18, r2, {0xffff}}, './file0\x00'}) 06:16:05 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x100000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="207a00000002000019000000900100000f000000000000000100000005000000000004000040000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000001000018000000c28500002b02", 0x66, 0x400}, {&(0x7f0000010100)="000000000000000000000000e8f7d2e8feeb4bf889ba053b02420ff8010040", 0x1f, 0x4e0}], 0x0, &(0x7f0000000140)=ANY=[]) 06:16:05 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="200000002002000019000000900100000f000000000000000100000005000000000004000040000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000001000018000000c28500002b02", 0x66, 0x400}, {&(0x7f0000010100)="000000000000000000000000e8f7d2e8feeb4bf889ba053b02420ff8010040", 0x1f, 0x4e0}], 0x0, &(0x7f0000000140)=ANY=[]) 06:16:05 executing program 4: r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000040), 0xffffffffffffffff) syz_genetlink_get_family_id$ethtool(&(0x7f0000000100), 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_PAUSE_SET(0xffffffffffffffff, &(0x7f0000000440)={0x0, 0x0, 0x0}, 0x0) r2 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000080)='smaps\x00') pread64(r2, &(0x7f00000000c0)=""/98, 0x62, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x7fffffff) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(0xffffffffffffffff, 0xc0189374, &(0x7f0000000240)={{0x1, 0x1, 0x18, r0, {0x8}}, './file0\x00'}) dup3(0xffffffffffffffff, r2, 0x0) r3 = socket$inet_icmp_raw(0x2, 0x3, 0x1) syz_genetlink_get_family_id$ethtool(&(0x7f0000000180), r2) socket$nl_audit(0x10, 0x3, 0x9) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000040)={'wlan1\x00', 0x0}) sendmsg$inet(r3, &(0x7f0000000780)={&(0x7f0000000000)={0x2, 0x0, @local}, 0x10, &(0x7f00000003c0)=[{&(0x7f0000000300)="6fb9", 0xffeb}], 0x1, &(0x7f0000000700)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {r4, @remote, @broadcast}}}], 0x20}, 0x0) r5 = socket$inet_icmp_raw(0x2, 0x3, 0x1) socket$nl_audit(0x10, 0x3, 0x9) sendmsg$inet(r5, &(0x7f0000000780)={&(0x7f0000000000)={0x2, 0x0, @local}, 0x10, &(0x7f00000003c0)=[{&(0x7f0000000300)="6fb9", 0xffeb}], 0x1, &(0x7f0000000700)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @remote, @broadcast}}}], 0x20}, 0x0) sendmsg$ETHTOOL_MSG_LINKINFO_GET(r2, &(0x7f0000000200)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f00000001c0)={&(0x7f0000000340)=ANY=[@ANYBLOB='@\x00\x00\x00', @ANYRES16=r1, @ANYBLOB="000427bd7000ffdbdf2502", @ANYRES32=0x0, @ANYBLOB='\b\x00C\x00\x00\x00\x00\x00\b\x00!\x00', @ANYRES32=r4, @ANYBLOB="d5b921cac279671a02c4d90ed2cbc802c00000009852d9e901fb17000000000000", @ANYRES32=0x0, @ANYBLOB], 0x40}, 0x1, 0x0, 0x0, 0x4}, 0xd0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000480), 0x1}, 0x603}, 0x0, 0xffffffefffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000040)=[{&(0x7f0000010000)="601c6d6b646f736689254300080120000400004000f8000020004000030000000000000001", 0x25}, {0x0, 0x0, 0x10000}], 0x0, &(0x7f0000000040)=ANY=[]) [ 2480.830048] loop7: detected capacity change from 0 to 264192 [ 2480.852739] loop4: detected capacity change from 0 to 256 [ 2480.858225] loop5: detected capacity change from 0 to 2048 [ 2480.863993] EXT4-fs (loop6): unsupported descriptor size 0 [ 2480.877786] FAT-fs (loop4): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) [ 2480.878856] EXT4-fs (loop7): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 2480.880240] EXT4-fs (loop7): group descriptors corrupted! [ 2480.895263] EXT4-fs (loop5): inodes count not valid: 31264 vs 32 [ 2480.914995] loop7: detected capacity change from 0 to 264192 [ 2480.921207] loop5: detected capacity change from 0 to 2048 [ 2480.940548] EXT4-fs (loop7): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 2480.941852] EXT4-fs (loop7): group descriptors corrupted! [ 2480.948120] EXT4-fs (loop5): inodes count not valid: 31264 vs 32 06:16:05 executing program 4: r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000040), 0xffffffffffffffff) syz_genetlink_get_family_id$ethtool(&(0x7f0000000100), 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_PAUSE_SET(0xffffffffffffffff, &(0x7f0000000440)={0x0, 0x0, 0x0}, 0x0) r2 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000080)='smaps\x00') pread64(r2, &(0x7f00000000c0)=""/98, 0x62, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x7fffffff) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(0xffffffffffffffff, 0xc0189374, &(0x7f0000000240)={{0x1, 0x1, 0x18, r0, {0x8}}, './file0\x00'}) dup3(0xffffffffffffffff, r2, 0x0) r3 = socket$inet_icmp_raw(0x2, 0x3, 0x1) syz_genetlink_get_family_id$ethtool(&(0x7f0000000180), r2) socket$nl_audit(0x10, 0x3, 0x9) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000040)={'wlan1\x00', 0x0}) sendmsg$inet(r3, &(0x7f0000000780)={&(0x7f0000000000)={0x2, 0x0, @local}, 0x10, &(0x7f00000003c0)=[{&(0x7f0000000300)="6fb9", 0xffeb}], 0x1, &(0x7f0000000700)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {r4, @remote, @broadcast}}}], 0x20}, 0x0) r5 = socket$inet_icmp_raw(0x2, 0x3, 0x1) socket$nl_audit(0x10, 0x3, 0x9) sendmsg$inet(r5, &(0x7f0000000780)={&(0x7f0000000000)={0x2, 0x0, @local}, 0x10, &(0x7f00000003c0)=[{&(0x7f0000000300)="6fb9", 0xffeb}], 0x1, &(0x7f0000000700)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @remote, @broadcast}}}], 0x20}, 0x0) sendmsg$ETHTOOL_MSG_LINKINFO_GET(r2, &(0x7f0000000200)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f00000001c0)={&(0x7f0000000340)=ANY=[@ANYBLOB='@\x00\x00\x00', @ANYRES16=r1, @ANYBLOB="000427bd7000ffdbdf2502", @ANYRES32=0x0, @ANYBLOB='\b\x00C\x00\x00\x00\x00\x00\b\x00!\x00', @ANYRES32=r4, @ANYBLOB="d5b921cac279671a02c4d90ed2cbc802c00000009852d9e901fb17000000000000", @ANYRES32=0x0, @ANYBLOB], 0x40}, 0x1, 0x0, 0x0, 0x4}, 0xd0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000480), 0x1}, 0x603}, 0x0, 0xffffffefffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000040)=[{&(0x7f0000010000)="601c6d6b646f736689254300080120000400004000f8000020004000030000000000000001", 0x25}, {0x0, 0x0, 0x10000}], 0x0, &(0x7f0000000040)=ANY=[]) 06:16:05 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="200000006502000019000000900100000f000000000000000100000005000000000004000040000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000001000018000000c28500002b02", 0x66, 0x400}, {&(0x7f0000010100)="000000000000000000000000e8f7d2e8feeb4bf889ba053b02420ff8010040", 0x1f, 0x4e0}], 0x0, &(0x7f0000000140)=ANY=[]) 06:16:05 executing program 6: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x100000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="0a0000000002000019000000900100000f000000000000000100000005000000000004000040000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000001000018000000c28500002b02", 0x66, 0x400}, {&(0x7f0000010100)="000000000000000000000000e8f7d2e8feeb4bf889ba053b02420ff8010040", 0x1f}], 0x0, &(0x7f0000000140)=ANY=[]) [ 2481.116097] loop6: detected capacity change from 0 to 2048 [ 2481.124466] EXT4-fs (loop6): unsupported descriptor size 0 [ 2481.132192] loop4: detected capacity change from 0 to 256 [ 2481.163598] FAT-fs (loop4): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) [ 2497.420789] loop5: detected capacity change from 0 to 2048 [ 2497.427838] EXT4-fs (loop5): inodes count not valid: 36896 vs 32 06:16:21 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x100000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="209000000002000019000000900100000f000000000000000100000005000000000004000040000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000001000018000000c28500002b02", 0x66, 0x400}, {&(0x7f0000010100)="000000000000000000000000e8f7d2e8feeb4bf889ba053b02420ff8010040", 0x1f, 0x4e0}], 0x0, &(0x7f0000000140)=ANY=[]) 06:16:21 executing program 7: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xffffff7f, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000100000005000000000004000040000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000001000018000000c28500002b02", 0x66, 0x400}, {&(0x7f0000010100)="000000000000000000000000e8f7d2e8feeb4bf889ba053b02420ff8010040", 0x1f, 0x4e0}], 0x0, &(0x7f0000000140)=ANY=[]) 06:16:21 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="200000006602000019000000900100000f000000000000000100000005000000000004000040000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000001000018000000c28500002b02", 0x66, 0x400}, {&(0x7f0000010100)="000000000000000000000000e8f7d2e8feeb4bf889ba053b02420ff8010040", 0x1f, 0x4e0}], 0x0, &(0x7f0000000140)=ANY=[]) 06:16:21 executing program 1: pipe(&(0x7f0000000340)={0xffffffffffffffff}) pread64(r0, &(0x7f0000000440)=""/95, 0x5f, 0x6) execveat(r0, &(0x7f0000000080)='./file0\x00', &(0x7f00000001c0)=[&(0x7f00000000c0)='\x00', &(0x7f0000000180)='\x00'], &(0x7f0000000400)=[&(0x7f0000000200)='/dev/zero\x00', &(0x7f0000000240)='/dev/zero\x00', &(0x7f0000000300)='/dev/zero\x00'], 0x1000) socket$inet(0x2, 0x1, 0x0) perf_event_open(&(0x7f0000000100)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x22420, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ptrace$setopts(0x4200, 0x0, 0x5, 0x100050) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000004c00)={0xc0002100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) gettid() r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000), 0x380, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000000)='net/udp6\x00') read$hiddev(r2, &(0x7f0000001140)=""/212, 0xd4) fchmodat(r2, &(0x7f00000004c0)='./file0\x00', 0x0) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(r1, 0xc018937c, &(0x7f0000000380)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32=r0, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00']) ioctl$TIOCSSOFTCAR(r3, 0x541a, &(0x7f00000003c0)=0x6) waitid$P_PIDFD(0x3, r1, &(0x7f0000000500), 0x2, &(0x7f0000000580)) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(r1, 0xc0189372, &(0x7f0000000040)={{0x1, 0x1, 0x18, r2, {0xffff}}, './file0\x00'}) 06:16:21 executing program 3: r0 = getpid() ioprio_get$pid(0x2, r0) r1 = getpid() ioprio_get$pid(0x2, r1) syz_mount_image$vfat(0x0, &(0x7f0000000040)='./file1\x00', 0x0, 0x0, &(0x7f00000000c0), 0x2002000, &(0x7f0000000400)=ANY=[@ANYRES16, @ANYBLOB="72e1af808ba473e6f37c85b113d8c4d9e1de4ed2968d2e01108c4795a941d14f6927393c8c3c458dd7454900d48719912efc18d580a8f841234284071012d7d5020eb5d56dc1ba5f1048adac4b928bf6cfd663b4cab43637cb979a9199a0246ec02345161783bc79585902603d7062084f05b744e31fcb4c3e81f3becabb7ad1fa5783f5e5e60ae912102fe8df0536bd074c03bd33742f35c5c44b5c3c9d693114367b7d966e"]) chdir(&(0x7f0000000140)='./file0\x00') ptrace$getenv(0x4201, r0, 0xfff, &(0x7f00000000c0)) openat(0xffffffffffffff9c, &(0x7f0000000000)='./file2\x00', 0x40c2, 0x0) r2 = perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x6, 0x0, 0xe}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r4 = fork() perf_event_open(&(0x7f0000000540)={0x4, 0x80, 0xeb, 0x0, 0x20, 0x0, 0x0, 0x2, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, @perf_config_ext={0xdc, 0x40}, 0x40000, 0x3, 0x8, 0x5, 0x6000000000000, 0x4, 0x5, 0x0, 0x3, 0x0, 0x3}, r4, 0x9, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000340)={0x0, 0x80, 0x2, 0x83, 0x1, 0x7, 0x0, 0x1f, 0x9ec17fc7a3e840c7, 0xc, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x9, 0x4, @perf_bp={&(0x7f0000000240), 0x1}, 0x404, 0x7, 0x3, 0x6, 0x800, 0x9, 0x3, 0x0, 0x7ff, 0x0, 0x9}, r4, 0x8, r2, 0x9) fork() setxattr$trusted_overlay_upper(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180), &(0x7f00000001c0)={0x0, 0xfb, 0x7a, 0x0, 0x2, "d54449275cb08faf62df87518e3ce16f", "9a61b461b0c63151b954990036d5e0163ceb48c6a801bb019e9e6fa7196a9372f804b9e9ca3fb3d85d1985d31346bbd5fd02b1c8223bf6388eb75498623e38ff88a99c5ce38698a32306b7d4e4b0fd4b03bfa568df17a42f725c6c33046b38b6e4a713dde1"}, 0x7a, 0x3) socket$nl_audit(0x10, 0x3, 0x9) chroot(&(0x7f0000000080)='./file1\x00') sendmsg$inet(r3, &(0x7f0000000780)={&(0x7f0000000000)={0x2, 0x0, @local}, 0x10, &(0x7f00000003c0)=[{&(0x7f0000000300)="6fb9", 0xffeb}], 0x1, &(0x7f0000000700)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @remote, @broadcast}}}], 0x20}, 0x0) 06:16:21 executing program 6: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x100000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="0a0000000002000019000000900100000f000000000000000100000005000000000004000040000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000001000018000000c28500002b02", 0x66, 0x400}, {&(0x7f0000010100)="000000000000000000000000e8f7d2e8feeb4bf889ba053b02420ff8010040", 0x1f}], 0x0, &(0x7f0000000140)=ANY=[]) 06:16:21 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x900000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000100000005000000000004000040000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000001000018000000c28500002b02", 0x66, 0x400}, {&(0x7f0000010100)="000000000000000000000000e8f7d2e8feeb4bf889ba053b02420ff8010040", 0x1f, 0x4e0}], 0x0, &(0x7f0000000140)=ANY=[]) 06:16:21 executing program 4: r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000040), 0xffffffffffffffff) syz_genetlink_get_family_id$ethtool(&(0x7f0000000100), 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_PAUSE_SET(0xffffffffffffffff, &(0x7f0000000440)={0x0, 0x0, 0x0}, 0x0) r2 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000080)='smaps\x00') pread64(r2, &(0x7f00000000c0)=""/98, 0x62, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x7fffffff) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(0xffffffffffffffff, 0xc0189374, &(0x7f0000000240)={{0x1, 0x1, 0x18, r0, {0x8}}, './file0\x00'}) dup3(0xffffffffffffffff, r2, 0x0) r3 = socket$inet_icmp_raw(0x2, 0x3, 0x1) syz_genetlink_get_family_id$ethtool(&(0x7f0000000180), r2) socket$nl_audit(0x10, 0x3, 0x9) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000040)={'wlan1\x00', 0x0}) sendmsg$inet(r3, &(0x7f0000000780)={&(0x7f0000000000)={0x2, 0x0, @local}, 0x10, &(0x7f00000003c0)=[{&(0x7f0000000300)="6fb9", 0xffeb}], 0x1, &(0x7f0000000700)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {r4, @remote, @broadcast}}}], 0x20}, 0x0) r5 = socket$inet_icmp_raw(0x2, 0x3, 0x1) socket$nl_audit(0x10, 0x3, 0x9) sendmsg$inet(r5, &(0x7f0000000780)={&(0x7f0000000000)={0x2, 0x0, @local}, 0x10, &(0x7f00000003c0)=[{&(0x7f0000000300)="6fb9", 0xffeb}], 0x1, &(0x7f0000000700)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @remote, @broadcast}}}], 0x20}, 0x0) sendmsg$ETHTOOL_MSG_LINKINFO_GET(r2, &(0x7f0000000200)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f00000001c0)={&(0x7f0000000340)=ANY=[@ANYBLOB='@\x00\x00\x00', @ANYRES16=r1, @ANYBLOB="000427bd7000ffdbdf2502", @ANYRES32=0x0, @ANYBLOB='\b\x00C\x00\x00\x00\x00\x00\b\x00!\x00', @ANYRES32=r4, @ANYBLOB="d5b921cac279671a02c4d90ed2cbc802c00000009852d9e901fb17000000000000", @ANYRES32=0x0, @ANYBLOB], 0x40}, 0x1, 0x0, 0x0, 0x4}, 0xd0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000480), 0x1}, 0x603}, 0x0, 0xffffffefffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000040)=[{&(0x7f0000010000)="601c6d6b646f736689254300080120000400004000f8000020004000030000000000000001", 0x25}, {0x0, 0x0, 0x10000}], 0x0, &(0x7f0000000040)=ANY=[]) [ 2497.454656] loop5: detected capacity change from 0 to 2048 [ 2497.456174] loop7: detected capacity change from 0 to 264192 [ 2497.482060] EXT4-fs (loop5): inodes count not valid: 36896 vs 32 [ 2497.487556] EXT4-fs (loop7): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 2497.488242] EXT4-fs (loop7): group descriptors corrupted! [ 2497.502994] loop6: detected capacity change from 0 to 2048 [ 2497.506099] loop7: detected capacity change from 0 to 264192 [ 2497.520889] EXT4-fs (loop7): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 2497.521591] EXT4-fs (loop7): group descriptors corrupted! [ 2497.530653] EXT4-fs (loop6): unsupported descriptor size 0 [ 2497.545253] loop4: detected capacity change from 0 to 256 06:16:21 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x100000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="20fe00000002000019000000900100000f000000000000000100000005000000000004000040000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000001000018000000c28500002b02", 0x66, 0x400}, {&(0x7f0000010100)="000000000000000000000000e8f7d2e8feeb4bf889ba053b02420ff8010040", 0x1f, 0x4e0}], 0x0, &(0x7f0000000140)=ANY=[]) [ 2497.588850] FAT-fs (loop4): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) 06:16:21 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="200000048002000019000000900100000f000000000000000100000005000000000004000040000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000001000018000000c28500002b02", 0x66, 0x400}, {&(0x7f0000010100)="000000000000000000000000e8f7d2e8feeb4bf889ba053b02420ff8010040", 0x1f, 0x4e0}], 0x0, &(0x7f0000000140)=ANY=[]) 06:16:21 executing program 7: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x100000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000100000005000000000004000040000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000001000018000000c28500002b02", 0x66, 0x400}, {&(0x7f0000010100)="000000000000000000000000e8f7d2e8feeb4bf889ba053b02420ff8010040", 0x1f, 0x4e0}], 0x0, &(0x7f0000000140)=ANY=[]) 06:16:21 executing program 0: pipe(&(0x7f0000000340)={0xffffffffffffffff}) pread64(r0, &(0x7f0000000440)=""/95, 0x5f, 0x6) execveat(r0, &(0x7f0000000080)='./file0\x00', &(0x7f00000001c0)=[&(0x7f00000000c0)='\x00', &(0x7f0000000180)='\x00'], &(0x7f0000000400)=[&(0x7f0000000200)='/dev/zero\x00', &(0x7f0000000240)='/dev/zero\x00', &(0x7f0000000300)='/dev/zero\x00'], 0x1000) socket$inet(0x2, 0x1, 0x0) perf_event_open(&(0x7f0000000100)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x22420, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ptrace$setopts(0x4200, 0x0, 0x5, 0x100050) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000004c00)={0xc0002100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) gettid() r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000), 0x380, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000000)='net/udp6\x00') read$hiddev(r2, &(0x7f0000001140)=""/212, 0xd4) fchmodat(r2, &(0x7f00000004c0)='./file0\x00', 0x0) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(r1, 0xc018937c, &(0x7f0000000380)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32=r0, @ANYBLOB="00000000000000002e2f66696cee8816"]) ioctl$TIOCSSOFTCAR(r3, 0x541a, &(0x7f00000003c0)=0x6) waitid$P_PIDFD(0x3, r1, &(0x7f0000000500), 0x2, &(0x7f0000000580)) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(r1, 0xc0189372, &(0x7f0000000040)={{0x1, 0x1, 0x18, r2, {0xffff}}, './file0\x00'}) [ 2497.653009] loop5: detected capacity change from 0 to 2048 [ 2497.665467] EXT4-fs (loop5): inodes count not valid: 65056 vs 32 [ 2497.689373] loop7: detected capacity change from 0 to 2048 06:16:22 executing program 6: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x100000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="0a0000000002000019000000900100000f000000000000000100000005000000000004000040000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000001000018000000c28500002b02", 0x66, 0x400}, {&(0x7f0000010100)="000000000000000000000000e8f7d2e8feeb4bf889ba053b02420ff8010040", 0x1f}], 0x0, &(0x7f0000000140)=ANY=[]) [ 2497.706055] EXT4-fs (loop7): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 2497.706986] EXT4-fs (loop7): group descriptors corrupted! [ 2497.726065] loop7: detected capacity change from 0 to 2048 [ 2497.748514] EXT4-fs (loop7): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 2497.749214] EXT4-fs (loop7): group descriptors corrupted! 06:16:22 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x100000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="200003000002000019000000900100000f000000000000000100000005000000000004000040000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000001000018000000c28500002b02", 0x66, 0x400}, {&(0x7f0000010100)="000000000000000000000000e8f7d2e8feeb4bf889ba053b02420ff8010040", 0x1f, 0x4e0}], 0x0, &(0x7f0000000140)=ANY=[]) 06:16:22 executing program 1: pipe(&(0x7f0000000340)={0xffffffffffffffff}) pread64(r0, &(0x7f0000000440)=""/95, 0x5f, 0x6) execveat(r0, &(0x7f0000000080)='./file0\x00', &(0x7f00000001c0)=[&(0x7f00000000c0)='\x00', &(0x7f0000000180)='\x00'], &(0x7f0000000400)=[&(0x7f0000000200)='/dev/zero\x00', &(0x7f0000000240)='/dev/zero\x00', &(0x7f0000000300)='/dev/zero\x00'], 0x1000) socket$inet(0x2, 0x1, 0x0) perf_event_open(&(0x7f0000000100)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x22420, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ptrace$setopts(0x4200, 0x0, 0x5, 0x100050) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000004c00)={0xc0002100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) gettid() r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000), 0x380, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000000)='net/udp6\x00') read$hiddev(r2, &(0x7f0000001140)=""/212, 0xd4) fchmodat(r2, &(0x7f00000004c0)='./file0\x00', 0x0) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(r1, 0xc018937c, &(0x7f0000000380)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32=r0, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00']) ioctl$TIOCSSOFTCAR(r3, 0x541a, &(0x7f00000003c0)=0x6) waitid$P_PIDFD(0x3, r1, &(0x7f0000000500), 0x2, &(0x7f0000000580)) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(r1, 0xc0189372, &(0x7f0000000040)={{0x1, 0x1, 0x18, r2, {0xffff}}, './file0\x00'}) [ 2497.819205] loop5: detected capacity change from 0 to 2048 06:16:22 executing program 4: r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000040), 0xffffffffffffffff) syz_genetlink_get_family_id$ethtool(&(0x7f0000000100), 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_PAUSE_SET(0xffffffffffffffff, &(0x7f0000000440)={0x0, 0x0, 0x0}, 0x0) r2 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000080)='smaps\x00') pread64(r2, &(0x7f00000000c0)=""/98, 0x62, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x7fffffff) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(0xffffffffffffffff, 0xc0189374, &(0x7f0000000240)={{0x1, 0x1, 0x18, r0, {0x8}}, './file0\x00'}) dup3(0xffffffffffffffff, r2, 0x0) r3 = socket$inet_icmp_raw(0x2, 0x3, 0x1) syz_genetlink_get_family_id$ethtool(&(0x7f0000000180), r2) socket$nl_audit(0x10, 0x3, 0x9) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000040)={'wlan1\x00', 0x0}) sendmsg$inet(r3, &(0x7f0000000780)={&(0x7f0000000000)={0x2, 0x0, @local}, 0x10, &(0x7f00000003c0)=[{&(0x7f0000000300)="6fb9", 0xffeb}], 0x1, &(0x7f0000000700)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {r4, @remote, @broadcast}}}], 0x20}, 0x0) r5 = socket$inet_icmp_raw(0x2, 0x3, 0x1) socket$nl_audit(0x10, 0x3, 0x9) sendmsg$inet(r5, &(0x7f0000000780)={&(0x7f0000000000)={0x2, 0x0, @local}, 0x10, &(0x7f00000003c0)=[{&(0x7f0000000300)="6fb9", 0xffeb}], 0x1, &(0x7f0000000700)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @remote, @broadcast}}}], 0x20}, 0x0) sendmsg$ETHTOOL_MSG_LINKINFO_GET(r2, &(0x7f0000000200)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f00000001c0)={&(0x7f0000000340)=ANY=[@ANYBLOB='@\x00\x00\x00', @ANYRES16=r1, @ANYBLOB="000427bd7000ffdbdf25020000002c0001", @ANYRES32=0x0, @ANYBLOB='\b\x00C\x00\x00\x00\x00\x00\b\x00!\x00', @ANYRES32=r4, @ANYBLOB="d5b921cac279671a02c4d90ed2cbc802c00000009852d9e901fb17000000000000", @ANYRES32=0x0, @ANYBLOB], 0x40}, 0x1, 0x0, 0x0, 0x4}, 0xd0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000480), 0x1}, 0x603}, 0x0, 0xffffffefffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000040)=[{&(0x7f0000010000)="601c6d6b646f736689254300080120000400004000f8000020004000030000000000000001", 0x25}, {0x0, 0x0, 0x10000}], 0x0, &(0x7f0000000040)=ANY=[]) [ 2497.847492] EXT4-fs (loop5): inodes count not valid: 196640 vs 32 [ 2497.856698] loop5: detected capacity change from 0 to 2048 [ 2497.865067] EXT4-fs (loop5): inodes count not valid: 196640 vs 32 [ 2497.876263] loop6: detected capacity change from 0 to 2048 [ 2497.892023] EXT4-fs (loop6): unsupported descriptor size 0 [ 2497.947235] loop4: detected capacity change from 0 to 256 [ 2497.990021] FAT-fs (loop4): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) 06:16:38 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="20000009c002000019000000900100000f000000000000000100000005000000000004000040000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000001000018000000c28500002b02", 0x66, 0x400}, {&(0x7f0000010100)="000000000000000000000000e8f7d2e8feeb4bf889ba053b02420ff8010040", 0x1f, 0x4e0}], 0x0, &(0x7f0000000140)=ANY=[]) 06:16:38 executing program 3: r0 = getpid() ioprio_get$pid(0x2, r0) r1 = getpid() ioprio_get$pid(0x2, r1) syz_mount_image$vfat(0x0, &(0x7f0000000040)='./file1\x00', 0x0, 0x0, &(0x7f00000000c0), 0x2002000, &(0x7f0000000400)=ANY=[@ANYRES16, @ANYBLOB="72e1af808ba473e6f37c85b113d8c4d9e1de4ed2968d2e01108c4795a941d14f6927393c8c3c458dd7454900d48719912efc18d580a8f841234284071012d7d5020eb5d56dc1ba5f1048adac4b928bf6cfd663b4cab43637cb979a9199a0246ec02345161783bc79585902603d7062084f05b744e31fcb4c3e81f3becabb7ad1fa5783f5e5e60ae912102fe8df0536bd074c03bd33742f35c5c44b5c3c9d693114367b7d966e"]) chdir(&(0x7f0000000140)='./file0\x00') ptrace$getenv(0x4201, r0, 0xfff, &(0x7f00000000c0)) openat(0xffffffffffffff9c, &(0x7f0000000000)='./file2\x00', 0x40c2, 0x0) r2 = perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x6, 0x0, 0xe}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r4 = fork() perf_event_open(&(0x7f0000000540)={0x4, 0x80, 0xeb, 0x0, 0x20, 0x0, 0x0, 0x2, 0x2820, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, @perf_config_ext={0xdc, 0x40}, 0x40000, 0x3, 0x8, 0x5, 0x6000000000000, 0x4, 0x5, 0x0, 0x3, 0x0, 0x3}, r4, 0x9, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000340)={0x0, 0x80, 0x2, 0x83, 0x1, 0x7, 0x0, 0x1f, 0x9ec17fc7a3e840c7, 0xc, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x9, 0x4, @perf_bp={&(0x7f0000000240), 0x1}, 0x404, 0x7, 0x3, 0x6, 0x800, 0x9, 0x3, 0x0, 0x7ff, 0x0, 0x9}, r4, 0x8, r2, 0x9) fork() setxattr$trusted_overlay_upper(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180), &(0x7f00000001c0)={0x0, 0xfb, 0x7a, 0x0, 0x2, "d54449275cb08faf62df87518e3ce16f", "9a61b461b0c63151b954990036d5e0163ceb48c6a801bb019e9e6fa7196a9372f804b9e9ca3fb3d85d1985d31346bbd5fd02b1c8223bf6388eb75498623e38ff88a99c5ce38698a32306b7d4e4b0fd4b03bfa568df17a42f725c6c33046b38b6e4a713dde1"}, 0x7a, 0x3) socket$nl_audit(0x10, 0x3, 0x9) chroot(&(0x7f0000000080)='./file1\x00') sendmsg$inet(r3, &(0x7f0000000780)={&(0x7f0000000000)={0x2, 0x0, @local}, 0x10, &(0x7f00000003c0)=[{&(0x7f0000000300)="6fb9", 0xffeb}], 0x1, &(0x7f0000000700)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @remote, @broadcast}}}], 0x20}, 0x0) 06:16:38 executing program 0: pipe(&(0x7f0000000340)={0xffffffffffffffff}) pread64(r0, &(0x7f0000000440)=""/95, 0x5f, 0x6) execveat(r0, &(0x7f0000000080)='./file0\x00', &(0x7f00000001c0)=[&(0x7f00000000c0)='\x00', &(0x7f0000000180)='\x00'], &(0x7f0000000400)=[&(0x7f0000000200)='/dev/zero\x00', &(0x7f0000000240)='/dev/zero\x00', &(0x7f0000000300)='/dev/zero\x00'], 0x1000) socket$inet(0x2, 0x1, 0x0) perf_event_open(&(0x7f0000000100)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x22420, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ptrace$setopts(0x4200, 0x0, 0x5, 0x100050) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000004c00)={0xc0002100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) gettid() r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000), 0x380, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000000)='net/udp6\x00') read$hiddev(r2, &(0x7f0000001140)=""/212, 0xd4) fchmodat(r2, &(0x7f00000004c0)='./file0\x00', 0x0) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(r1, 0xc018937c, &(0x7f0000000380)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32=r0, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00']) ioctl$TIOCSSOFTCAR(r3, 0x541a, &(0x7f00000003c0)=0x6) waitid$P_PIDFD(0x3, r1, &(0x7f0000000500), 0x2, &(0x7f0000000580)) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(r1, 0xc0189372, &(0x7f0000000040)={{0x1, 0x1, 0x18, r2, {0xffff}}, './file0\x00'}) 06:16:38 executing program 4: r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000040), 0xffffffffffffffff) syz_genetlink_get_family_id$ethtool(&(0x7f0000000100), 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_PAUSE_SET(0xffffffffffffffff, &(0x7f0000000440)={0x0, 0x0, 0x0}, 0x0) r2 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000080)='smaps\x00') pread64(r2, &(0x7f00000000c0)=""/98, 0x62, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x7fffffff) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(0xffffffffffffffff, 0xc0189374, &(0x7f0000000240)={{0x1, 0x1, 0x18, r0, {0x8}}, './file0\x00'}) dup3(0xffffffffffffffff, r2, 0x0) r3 = socket$inet_icmp_raw(0x2, 0x3, 0x1) syz_genetlink_get_family_id$ethtool(&(0x7f0000000180), r2) socket$nl_audit(0x10, 0x3, 0x9) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000040)={'wlan1\x00', 0x0}) sendmsg$inet(r3, &(0x7f0000000780)={&(0x7f0000000000)={0x2, 0x0, @local}, 0x10, &(0x7f00000003c0)=[{&(0x7f0000000300)="6fb9", 0xffeb}], 0x1, &(0x7f0000000700)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {r4, @remote, @broadcast}}}], 0x20}, 0x0) r5 = socket$inet_icmp_raw(0x2, 0x3, 0x1) socket$nl_audit(0x10, 0x3, 0x9) sendmsg$inet(r5, &(0x7f0000000780)={&(0x7f0000000000)={0x2, 0x0, @local}, 0x10, &(0x7f00000003c0)=[{&(0x7f0000000300)="6fb9", 0xffeb}], 0x1, &(0x7f0000000700)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @remote, @broadcast}}}], 0x20}, 0x0) sendmsg$ETHTOOL_MSG_LINKINFO_GET(r2, &(0x7f0000000200)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f00000001c0)={&(0x7f0000000340)=ANY=[@ANYBLOB='@\x00\x00\x00', @ANYRES16=r1, @ANYBLOB="000427bd7000ffdbdf25020000002c0001", @ANYRES32=0x0, @ANYBLOB='\b\x00C\x00\x00\x00\x00\x00\b\x00!\x00', @ANYRES32=r4, @ANYBLOB="d5b921cac279671a02c4d90ed2cbc802c00000009852d9e901fb17000000000000", @ANYRES32=0x0, @ANYBLOB], 0x40}, 0x1, 0x0, 0x0, 0x4}, 0xd0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000480), 0x1}, 0x603}, 0x0, 0xffffffefffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000040)=[{&(0x7f0000010000)="601c6d6b646f736689254300080120000400004000f8000020004000030000000000000001", 0x25}, {0x0, 0x0, 0x10000}], 0x0, &(0x7f0000000040)=ANY=[]) 06:16:38 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x100000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="20c003000002000019000000900100000f000000000000000100000005000000000004000040000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000001000018000000c28500002b02", 0x66, 0x400}, {&(0x7f0000010100)="000000000000000000000000e8f7d2e8feeb4bf889ba053b02420ff8010040", 0x1f, 0x4e0}], 0x0, &(0x7f0000000140)=ANY=[]) 06:16:38 executing program 6: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x100000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010100)="000000000000000000000000e8f7d2e8feeb4bf889ba053b02420ff8010040", 0x1f, 0x4e0}], 0x0, &(0x7f0000000140)=ANY=[]) 06:16:38 executing program 1: pipe(&(0x7f0000000340)={0xffffffffffffffff}) pread64(r0, &(0x7f0000000440)=""/95, 0x5f, 0x6) execveat(r0, &(0x7f0000000080)='./file0\x00', &(0x7f00000001c0)=[&(0x7f00000000c0)='\x00', &(0x7f0000000180)='\x00'], &(0x7f0000000400)=[&(0x7f0000000200)='/dev/zero\x00', &(0x7f0000000240)='/dev/zero\x00', &(0x7f0000000300)='/dev/zero\x00'], 0x1000) socket$inet(0x2, 0x1, 0x0) perf_event_open(&(0x7f0000000100)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x22420, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ptrace$setopts(0x4200, 0x0, 0x5, 0x100050) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000004c00)={0xc0002100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) gettid() r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000), 0x380, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000000)='net/udp6\x00') read$hiddev(r2, &(0x7f0000001140)=""/212, 0xd4) fchmodat(r2, &(0x7f00000004c0)='./file0\x00', 0x0) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(r1, 0xc018937c, &(0x7f0000000380)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32=r0, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00']) ioctl$TIOCSSOFTCAR(r3, 0x541a, &(0x7f00000003c0)=0x6) waitid$P_PIDFD(0x3, r1, &(0x7f0000000500), 0x2, &(0x7f0000000580)) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(r1, 0xc0189372, &(0x7f0000000040)={{0x1, 0x1, 0x18, r2, {0xffff}}, './file0\x00'}) 06:16:38 executing program 7: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x100000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000100000005000000000004000040000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000001000018000000c28500002b02", 0x66, 0x400}, {&(0x7f0000010100)="000000000000000000000000e8f7d2e8feeb4bf889ba053b02420ff8010040", 0x1f, 0x4e0}], 0x0, &(0x7f0000000140)=ANY=[]) 06:16:38 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000f002000019000000900100000f000000000000000100000005000000000004000040000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000001000018000000c28500002b02", 0x66, 0x400}, {&(0x7f0000010100)="000000000000000000000000e8f7d2e8feeb4bf889ba053b02420ff8010040", 0x1f, 0x4e0}], 0x0, &(0x7f0000000140)=ANY=[]) [ 2514.695697] loop7: detected capacity change from 0 to 2048 [ 2514.699741] loop5: detected capacity change from 0 to 2048 [ 2514.706571] loop6: detected capacity change from 0 to 2048 [ 2514.721660] EXT4-fs (loop6): VFS: Can't find ext4 filesystem [ 2514.724758] EXT4-fs (loop7): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 2514.725481] EXT4-fs (loop7): group descriptors corrupted! [ 2514.726198] EXT4-fs (loop5): inodes count not valid: 245792 vs 32 [ 2514.729840] loop4: detected capacity change from 0 to 256 [ 2514.738509] loop5: detected capacity change from 0 to 2048 [ 2514.741632] loop7: detected capacity change from 0 to 2048 [ 2514.754009] EXT4-fs (loop5): inodes count not valid: 245792 vs 32 [ 2514.760739] EXT4-fs (loop7): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 2514.761457] EXT4-fs (loop7): group descriptors corrupted! [ 2514.765009] FAT-fs (loop4): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) 06:17:02 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x100000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="201004000002000019000000900100000f000000000000000100000005000000000004000040000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000001000018000000c28500002b02", 0x66, 0x400}, {&(0x7f0000010100)="000000000000000000000000e8f7d2e8feeb4bf889ba053b02420ff8010040", 0x1f, 0x4e0}], 0x0, &(0x7f0000000140)=ANY=[]) 06:17:02 executing program 3: r0 = getpid() ioprio_get$pid(0x2, r0) r1 = getpid() ioprio_get$pid(0x2, r1) syz_mount_image$vfat(0x0, &(0x7f0000000040)='./file1\x00', 0x0, 0x0, &(0x7f00000000c0), 0x2002000, &(0x7f0000000400)=ANY=[@ANYRES16, @ANYBLOB="72e1af808ba473e6f37c85b113d8c4d9e1de4ed2968d2e01108c4795a941d14f6927393c8c3c458dd7454900d48719912efc18d580a8f841234284071012d7d5020eb5d56dc1ba5f1048adac4b928bf6cfd663b4cab43637cb979a9199a0246ec02345161783bc79585902603d7062084f05b744e31fcb4c3e81f3becabb7ad1fa5783f5e5e60ae912102fe8df0536bd074c03bd33742f35c5c44b5c3c9d693114367b7d966e"]) chdir(&(0x7f0000000140)='./file0\x00') ptrace$getenv(0x4201, r0, 0xfff, &(0x7f00000000c0)) openat(0xffffffffffffff9c, &(0x7f0000000000)='./file2\x00', 0x40c2, 0x0) r2 = perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x6, 0x0, 0xe}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r4 = fork() perf_event_open(&(0x7f0000000540)={0x4, 0x80, 0xeb, 0x0, 0x20, 0x0, 0x0, 0x2, 0x2820, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, @perf_config_ext={0xdc, 0x40}, 0x40000, 0x3, 0x8, 0x5, 0x6000000000000, 0x4, 0x5, 0x0, 0x3, 0x0, 0x3}, r4, 0x9, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000340)={0x0, 0x80, 0x2, 0x83, 0x1, 0x7, 0x0, 0x1f, 0x9ec17fc7a3e840c7, 0xc, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x9, 0x4, @perf_bp={&(0x7f0000000240), 0x1}, 0x404, 0x7, 0x3, 0x6, 0x800, 0x9, 0x3, 0x0, 0x7ff, 0x0, 0x9}, r4, 0x8, r2, 0x9) fork() setxattr$trusted_overlay_upper(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180), &(0x7f00000001c0)={0x0, 0xfb, 0x7a, 0x0, 0x2, "d54449275cb08faf62df87518e3ce16f", "9a61b461b0c63151b954990036d5e0163ceb48c6a801bb019e9e6fa7196a9372f804b9e9ca3fb3d85d1985d31346bbd5fd02b1c8223bf6388eb75498623e38ff88a99c5ce38698a32306b7d4e4b0fd4b03bfa568df17a42f725c6c33046b38b6e4a713dde1"}, 0x7a, 0x3) socket$nl_audit(0x10, 0x3, 0x9) chroot(&(0x7f0000000080)='./file1\x00') sendmsg$inet(r3, &(0x7f0000000780)={&(0x7f0000000000)={0x2, 0x0, @local}, 0x10, &(0x7f00000003c0)=[{&(0x7f0000000300)="6fb9", 0xffeb}], 0x1, &(0x7f0000000700)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @remote, @broadcast}}}], 0x20}, 0x0) 06:17:02 executing program 1: pipe(&(0x7f0000000340)={0xffffffffffffffff}) pread64(r0, &(0x7f0000000440)=""/95, 0x5f, 0x6) execveat(r0, &(0x7f0000000080)='./file0\x00', &(0x7f00000001c0)=[&(0x7f00000000c0)='\x00', &(0x7f0000000180)='\x00'], &(0x7f0000000400)=[&(0x7f0000000200)='/dev/zero\x00', &(0x7f0000000240)='/dev/zero\x00', &(0x7f0000000300)='/dev/zero\x00'], 0x1000) socket$inet(0x2, 0x1, 0x0) perf_event_open(&(0x7f0000000100)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x22420, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ptrace$setopts(0x4200, 0x0, 0x5, 0x100050) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000004c00)={0xc0002100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) gettid() r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000), 0x380, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000000)='net/udp6\x00') read$hiddev(r2, &(0x7f0000001140)=""/212, 0xd4) fchmodat(r2, &(0x7f00000004c0)='./file0\x00', 0x0) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(r1, 0xc018937c, &(0x7f0000000380)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32=r0, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00./fi']) ioctl$TIOCSSOFTCAR(r3, 0x541a, &(0x7f00000003c0)=0x6) waitid$P_PIDFD(0x3, r1, &(0x7f0000000500), 0x2, &(0x7f0000000580)) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(r1, 0xc0189372, &(0x7f0000000040)={{0x1, 0x1, 0x18, r2, {0xffff}}, './file0\x00'}) 06:17:02 executing program 7: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x100000, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000100000005000000000004000040000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000001000018000000c28500002b02", 0x66, 0x400}, {&(0x7f0000010100)="000000000000000000000000e8f7d2e8feeb4bf889ba053b02420ff8010040", 0x1f, 0x4e0}], 0x0, &(0x7f0000000140)=ANY=[]) 06:17:02 executing program 4: r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000040), 0xffffffffffffffff) syz_genetlink_get_family_id$ethtool(&(0x7f0000000100), 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_PAUSE_SET(0xffffffffffffffff, &(0x7f0000000440)={0x0, 0x0, 0x0}, 0x0) r2 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000080)='smaps\x00') pread64(r2, &(0x7f00000000c0)=""/98, 0x62, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x7fffffff) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(0xffffffffffffffff, 0xc0189374, &(0x7f0000000240)={{0x1, 0x1, 0x18, r0, {0x8}}, './file0\x00'}) dup3(0xffffffffffffffff, r2, 0x0) r3 = socket$inet_icmp_raw(0x2, 0x3, 0x1) syz_genetlink_get_family_id$ethtool(&(0x7f0000000180), r2) socket$nl_audit(0x10, 0x3, 0x9) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000040)={'wlan1\x00', 0x0}) sendmsg$inet(r3, &(0x7f0000000780)={&(0x7f0000000000)={0x2, 0x0, @local}, 0x10, &(0x7f00000003c0)=[{&(0x7f0000000300)="6fb9", 0xffeb}], 0x1, &(0x7f0000000700)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {r4, @remote, @broadcast}}}], 0x20}, 0x0) r5 = socket$inet_icmp_raw(0x2, 0x3, 0x1) socket$nl_audit(0x10, 0x3, 0x9) sendmsg$inet(r5, &(0x7f0000000780)={&(0x7f0000000000)={0x2, 0x0, @local}, 0x10, &(0x7f00000003c0)=[{&(0x7f0000000300)="6fb9", 0xffeb}], 0x1, &(0x7f0000000700)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @remote, @broadcast}}}], 0x20}, 0x0) sendmsg$ETHTOOL_MSG_LINKINFO_GET(r2, &(0x7f0000000200)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f00000001c0)={&(0x7f0000000340)=ANY=[@ANYBLOB='@\x00\x00\x00', @ANYRES16=r1, @ANYBLOB="000427bd7000ffdbdf25020000002c0001", @ANYRES32=0x0, @ANYBLOB='\b\x00C\x00\x00\x00\x00\x00\b\x00!\x00', @ANYRES32=r4, @ANYBLOB="d5b921cac279671a02c4d90ed2cbc802c00000009852d9e901fb17000000000000", @ANYRES32=0x0, @ANYBLOB], 0x40}, 0x1, 0x0, 0x0, 0x4}, 0xd0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000480), 0x1}, 0x603}, 0x0, 0xffffffefffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000040)=[{&(0x7f0000010000)="601c6d6b646f736689254300080120000400004000f8000020004000030000000000000001", 0x25}, {0x0, 0x0, 0x10000}], 0x0, &(0x7f0000000040)=ANY=[]) 06:17:02 executing program 6: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x100000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010100)="000000000000000000000000e8f7d2e8feeb4bf889ba053b02420ff8010040", 0x1f, 0x4e0}], 0x0, &(0x7f0000000140)=ANY=[]) 06:17:02 executing program 0: pipe(&(0x7f0000000340)={0xffffffffffffffff}) pread64(r0, &(0x7f0000000440)=""/95, 0x5f, 0x6) execveat(r0, &(0x7f0000000080)='./file0\x00', &(0x7f00000001c0)=[&(0x7f00000000c0)='\x00', &(0x7f0000000180)='\x00'], &(0x7f0000000400)=[&(0x7f0000000200)='/dev/zero\x00', &(0x7f0000000240)='/dev/zero\x00', &(0x7f0000000300)='/dev/zero\x00'], 0x1000) socket$inet(0x2, 0x1, 0x0) perf_event_open(&(0x7f0000000100)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x22420, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ptrace$setopts(0x4200, 0x0, 0x5, 0x100050) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000004c00)={0xc0002100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) gettid() r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000), 0x380, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000000)='net/udp6\x00') read$hiddev(r2, &(0x7f0000001140)=""/212, 0xd4) fchmodat(r2, &(0x7f00000004c0)='./file0\x00', 0x0) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(r1, 0xc018937c, &(0x7f0000000380)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32=r0, @ANYBLOB="00000000000000002e2f66696cee8816"]) ioctl$TIOCSSOFTCAR(r3, 0x541a, &(0x7f00000003c0)=0x6) waitid$P_PIDFD(0x3, r1, &(0x7f0000000500), 0x2, &(0x7f0000000580)) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(r1, 0xc0189372, &(0x7f0000000040)={{0x1, 0x1, 0x18, r2, {0xffff}}, './file0\x00'}) 06:17:02 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="200000fffe02000019000000900100000f000000000000000100000005000000000004000040000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000001000018000000c28500002b02", 0x66, 0x400}, {&(0x7f0000010100)="000000000000000000000000e8f7d2e8feeb4bf889ba053b02420ff8010040", 0x1f, 0x4e0}], 0x0, &(0x7f0000000140)=ANY=[]) [ 2538.236307] loop7: detected capacity change from 0 to 2048 [ 2538.236617] loop5: detected capacity change from 0 to 2048 [ 2538.264564] loop6: detected capacity change from 0 to 2048 [ 2538.275503] EXT4-fs (loop7): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 2538.276791] EXT4-fs (loop7): group descriptors corrupted! [ 2538.288096] loop4: detected capacity change from 0 to 256 [ 2538.292924] EXT4-fs (loop5): inodes count not valid: 266272 vs 32 [ 2538.302304] loop7: detected capacity change from 0 to 2048 [ 2538.311302] EXT4-fs (loop6): VFS: Can't find ext4 filesystem [ 2538.326555] EXT4-fs (loop7): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 2538.327964] EXT4-fs (loop7): group descriptors corrupted! [ 2538.329195] loop5: detected capacity change from 0 to 2048 [ 2538.331218] FAT-fs (loop4): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) [ 2538.342090] EXT4-fs (loop5): inodes count not valid: 266272 vs 32 06:17:02 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="200000feff02000019000000900100000f000000000000000100000005000000000004000040000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000001000018000000c28500002b02", 0x66, 0x400}, {&(0x7f0000010100)="000000000000000000000000e8f7d2e8feeb4bf889ba053b02420ff8010040", 0x1f, 0x4e0}], 0x0, &(0x7f0000000140)=ANY=[]) 06:17:02 executing program 6: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x100000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010100)="000000000000000000000000e8f7d2e8feeb4bf889ba053b02420ff8010040", 0x1f, 0x4e0}], 0x0, &(0x7f0000000140)=ANY=[]) 06:17:02 executing program 7: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x100000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000100000005000000000004000040000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000001000018000000c28500002b02", 0x66, 0x400}, {&(0x7f0000010100)="000000000000000000000000e8f7d2e8feeb4bf889ba053b02420ff8010040", 0x1f, 0x4e0}], 0x0, &(0x7f0000000140)=ANY=[]) 06:17:02 executing program 4: r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000040), 0xffffffffffffffff) syz_genetlink_get_family_id$ethtool(&(0x7f0000000100), 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_PAUSE_SET(0xffffffffffffffff, &(0x7f0000000440)={0x0, 0x0, 0x0}, 0x0) r2 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000080)='smaps\x00') pread64(r2, &(0x7f00000000c0)=""/98, 0x62, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x7fffffff) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(0xffffffffffffffff, 0xc0189374, &(0x7f0000000240)={{0x1, 0x1, 0x18, r0, {0x8}}, './file0\x00'}) dup3(0xffffffffffffffff, r2, 0x0) r3 = socket$inet_icmp_raw(0x2, 0x3, 0x1) syz_genetlink_get_family_id$ethtool(&(0x7f0000000180), r2) socket$nl_audit(0x10, 0x3, 0x9) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000040)={'wlan1\x00', 0x0}) sendmsg$inet(r3, &(0x7f0000000780)={&(0x7f0000000000)={0x2, 0x0, @local}, 0x10, &(0x7f00000003c0)=[{&(0x7f0000000300)="6fb9", 0xffeb}], 0x1, &(0x7f0000000700)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {r4, @remote, @broadcast}}}], 0x20}, 0x0) r5 = socket$inet_icmp_raw(0x2, 0x3, 0x1) socket$nl_audit(0x10, 0x3, 0x9) sendmsg$inet(r5, &(0x7f0000000780)={&(0x7f0000000000)={0x2, 0x0, @local}, 0x10, &(0x7f00000003c0)=[{&(0x7f0000000300)="6fb9", 0xffeb}], 0x1, &(0x7f0000000700)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @remote, @broadcast}}}], 0x20}, 0x0) sendmsg$ETHTOOL_MSG_LINKINFO_GET(r2, &(0x7f0000000200)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f00000001c0)={&(0x7f0000000340)=ANY=[@ANYBLOB='@\x00\x00\x00', @ANYRES16=r1, @ANYBLOB="000427bd7000ffdbdf25020000002c0001800800", @ANYRES32=0x0, @ANYBLOB='\b\x00C\x00\x00\x00\x00\x00\b\x00!\x00', @ANYRES32=r4, @ANYBLOB="d5b921cac279671a02c4d90ed2cbc802c00000009852d9e901fb17000000000000", @ANYRES32=0x0, @ANYBLOB], 0x40}, 0x1, 0x0, 0x0, 0x4}, 0xd0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000480), 0x1}, 0x603}, 0x0, 0xffffffefffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000040)=[{&(0x7f0000010000)="601c6d6b646f736689254300080120000400004000f8000020004000030000000000000001", 0x25}, {0x0, 0x0, 0x10000}], 0x0, &(0x7f0000000040)=ANY=[]) 06:17:02 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x100000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="200005000002000019000000900100000f000000000000000100000005000000000004000040000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000001000018000000c28500002b02", 0x66, 0x400}, {&(0x7f0000010100)="000000000000000000000000e8f7d2e8feeb4bf889ba053b02420ff8010040", 0x1f, 0x4e0}], 0x0, &(0x7f0000000140)=ANY=[]) [ 2538.596164] loop7: detected capacity change from 0 to 2048 [ 2538.600609] loop6: detected capacity change from 0 to 2048 [ 2538.619954] EXT4-fs (loop6): VFS: Can't find ext4 filesystem [ 2538.623062] EXT4-fs (loop7): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 2538.624265] EXT4-fs (loop7): group descriptors corrupted! [ 2538.650800] loop7: detected capacity change from 0 to 2048 [ 2538.669770] EXT4-fs (loop7): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 2538.670832] EXT4-fs (loop7): group descriptors corrupted! [ 2538.686362] loop4: detected capacity change from 0 to 256 [ 2538.704351] loop5: detected capacity change from 0 to 2048 [ 2538.723972] FAT-fs (loop4): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) 06:17:03 executing program 7: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x100000, 0x8, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000100000005000000000004000040000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000001000018000000c28500002b02", 0x66, 0x400}, {&(0x7f0000010100)="000000000000000000000000e8f7d2e8feeb4bf889ba053b02420ff8010040", 0x1f, 0x4e0}], 0x0, &(0x7f0000000140)=ANY=[]) [ 2538.790503] EXT4-fs (loop5): inodes count not valid: 327712 vs 32 06:17:03 executing program 6: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x100000, 0x2, &(0x7f0000000200)=[{0x0, 0x0, 0x400}, {&(0x7f0000010100)="000000000000000000000000e8f7d2e8feeb4bf889ba053b02420ff8010040", 0x1f, 0x4e0}], 0x0, &(0x7f0000000140)=ANY=[]) 06:17:03 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000202000019000000900100000f000000000000000100000005000000000004000040000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000001000018000000c28500002b02", 0x66, 0x400}, {&(0x7f0000010100)="000000000000000000000000e8f7d2e8feeb4bf889ba053b02420ff8010040", 0x1f, 0x4e0}], 0x0, &(0x7f0000000140)=ANY=[]) [ 2538.813293] loop5: detected capacity change from 0 to 2048 06:17:03 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x100000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="201004000002000019000000900100000f000000000000000100000005000000000004000040000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000001000018000000c28500002b02", 0x66, 0x400}, {&(0x7f0000010100)="000000000000000000000000e8f7d2e8feeb4bf889ba053b02420ff8010040", 0x1f, 0x4e0}], 0x0, &(0x7f0000000140)=ANY=[]) [ 2538.849649] EXT4-fs (loop5): inodes count not valid: 327712 vs 32 [ 2538.861097] loop6: detected capacity change from 0 to 2048 [ 2538.897595] EXT4-fs (loop6): VFS: Can't find ext4 filesystem [ 2538.899457] loop7: detected capacity change from 0 to 2048 [ 2538.927148] EXT4-fs (loop7): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 2538.928070] EXT4-fs (loop7): group descriptors corrupted! 06:17:03 executing program 3: r0 = getpid() ioprio_get$pid(0x2, r0) r1 = getpid() ioprio_get$pid(0x2, r1) syz_mount_image$vfat(0x0, &(0x7f0000000040)='./file1\x00', 0x0, 0x0, &(0x7f00000000c0), 0x2002000, &(0x7f0000000400)=ANY=[@ANYRES16, @ANYBLOB="72e1af808ba473e6f37c85b113d8c4d9e1de4ed2968d2e01108c4795a941d14f6927393c8c3c458dd7454900d48719912efc18d580a8f841234284071012d7d5020eb5d56dc1ba5f1048adac4b928bf6cfd663b4cab43637cb979a9199a0246ec02345161783bc79585902603d7062084f05b744e31fcb4c3e81f3becabb7ad1fa5783f5e5e60ae912102fe8df0536bd074c03bd33742f35c5c44b5c3c9d693114367b7d966e"]) chdir(&(0x7f0000000140)='./file0\x00') ptrace$getenv(0x4201, r0, 0xfff, &(0x7f00000000c0)) openat(0xffffffffffffff9c, &(0x7f0000000000)='./file2\x00', 0x40c2, 0x0) r2 = perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x6, 0x0, 0xe}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r4 = fork() perf_event_open(&(0x7f0000000540)={0x4, 0x80, 0xeb, 0x0, 0x20, 0x0, 0x0, 0x2, 0x2820, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, @perf_config_ext={0xdc, 0x40}, 0x40000, 0x3, 0x8, 0x5, 0x6000000000000, 0x4, 0x5, 0x0, 0x3, 0x0, 0x3}, r4, 0x9, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000340)={0x0, 0x80, 0x2, 0x83, 0x1, 0x7, 0x0, 0x1f, 0x9ec17fc7a3e840c7, 0xc, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x9, 0x4, @perf_bp={&(0x7f0000000240), 0x1}, 0x404, 0x7, 0x3, 0x6, 0x800, 0x9, 0x3, 0x0, 0x7ff, 0x0, 0x9}, r4, 0x8, r2, 0x9) fork() setxattr$trusted_overlay_upper(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180), &(0x7f00000001c0)={0x0, 0xfb, 0x7a, 0x0, 0x2, "d54449275cb08faf62df87518e3ce16f", "9a61b461b0c63151b954990036d5e0163ceb48c6a801bb019e9e6fa7196a9372f804b9e9ca3fb3d85d1985d31346bbd5fd02b1c8223bf6388eb75498623e38ff88a99c5ce38698a32306b7d4e4b0fd4b03bfa568df17a42f725c6c33046b38b6e4a713dde1"}, 0x7a, 0x3) socket$nl_audit(0x10, 0x3, 0x9) chroot(&(0x7f0000000080)='./file1\x00') sendmsg$inet(r3, &(0x7f0000000780)={&(0x7f0000000000)={0x2, 0x0, @local}, 0x10, &(0x7f00000003c0)=[{&(0x7f0000000300)="6fb9", 0xffeb}], 0x1, &(0x7f0000000700)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @remote, @broadcast}}}], 0x20}, 0x0) 06:17:03 executing program 1: pipe(&(0x7f0000000340)={0xffffffffffffffff}) pread64(r0, &(0x7f0000000440)=""/95, 0x5f, 0x6) execveat(r0, &(0x7f0000000080)='./file0\x00', &(0x7f00000001c0)=[&(0x7f00000000c0)='\x00', &(0x7f0000000180)='\x00'], &(0x7f0000000400)=[&(0x7f0000000200)='/dev/zero\x00', &(0x7f0000000240)='/dev/zero\x00', &(0x7f0000000300)='/dev/zero\x00'], 0x1000) socket$inet(0x2, 0x1, 0x0) perf_event_open(&(0x7f0000000100)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x22420, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ptrace$setopts(0x4200, 0x0, 0x5, 0x100050) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000004c00)={0xc0002100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) gettid() r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000), 0x380, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000000)='net/udp6\x00') read$hiddev(r2, &(0x7f0000001140)=""/212, 0xd4) fchmodat(r2, &(0x7f00000004c0)='./file0\x00', 0x0) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(r1, 0xc018937c, &(0x7f0000000380)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32=r0, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00./fi']) ioctl$TIOCSSOFTCAR(r3, 0x541a, &(0x7f00000003c0)=0x6) waitid$P_PIDFD(0x3, r1, &(0x7f0000000500), 0x2, &(0x7f0000000580)) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(r1, 0xc0189372, &(0x7f0000000040)={{0x1, 0x1, 0x18, r2, {0xffff}}, './file0\x00'}) 06:17:03 executing program 4: r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000040), 0xffffffffffffffff) syz_genetlink_get_family_id$ethtool(&(0x7f0000000100), 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_PAUSE_SET(0xffffffffffffffff, &(0x7f0000000440)={0x0, 0x0, 0x0}, 0x0) r2 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000080)='smaps\x00') pread64(r2, &(0x7f00000000c0)=""/98, 0x62, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x7fffffff) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(0xffffffffffffffff, 0xc0189374, &(0x7f0000000240)={{0x1, 0x1, 0x18, r0, {0x8}}, './file0\x00'}) dup3(0xffffffffffffffff, r2, 0x0) r3 = socket$inet_icmp_raw(0x2, 0x3, 0x1) syz_genetlink_get_family_id$ethtool(&(0x7f0000000180), r2) socket$nl_audit(0x10, 0x3, 0x9) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000040)={'wlan1\x00', 0x0}) sendmsg$inet(r3, &(0x7f0000000780)={&(0x7f0000000000)={0x2, 0x0, @local}, 0x10, &(0x7f00000003c0)=[{&(0x7f0000000300)="6fb9", 0xffeb}], 0x1, &(0x7f0000000700)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {r4, @remote, @broadcast}}}], 0x20}, 0x0) r5 = socket$inet_icmp_raw(0x2, 0x3, 0x1) socket$nl_audit(0x10, 0x3, 0x9) sendmsg$inet(r5, &(0x7f0000000780)={&(0x7f0000000000)={0x2, 0x0, @local}, 0x10, &(0x7f00000003c0)=[{&(0x7f0000000300)="6fb9", 0xffeb}], 0x1, &(0x7f0000000700)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @remote, @broadcast}}}], 0x20}, 0x0) sendmsg$ETHTOOL_MSG_LINKINFO_GET(r2, &(0x7f0000000200)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f00000001c0)={&(0x7f0000000340)=ANY=[@ANYBLOB='@\x00\x00\x00', @ANYRES16=r1, @ANYBLOB="000427bd7000ffdbdf25020000002c0001800800", @ANYRES32=0x0, @ANYBLOB='\b\x00C\x00\x00\x00\x00\x00\b\x00!\x00', @ANYRES32=r4, @ANYBLOB="d5b921cac279671a02c4d90ed2cbc802c00000009852d9e901fb17000000000000", @ANYRES32=0x0, @ANYBLOB], 0x40}, 0x1, 0x0, 0x0, 0x4}, 0xd0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000480), 0x1}, 0x603}, 0x0, 0xffffffefffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000040)=[{&(0x7f0000010000)="601c6d6b646f736689254300080120000400004000f8000020004000030000000000000001", 0x25}, {0x0, 0x0, 0x10000}], 0x0, &(0x7f0000000040)=ANY=[]) [ 2539.020314] loop4: detected capacity change from 0 to 256 [ 2539.043086] FAT-fs (loop4): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) 06:17:19 executing program 3: r0 = getpid() ioprio_get$pid(0x2, r0) r1 = getpid() ioprio_get$pid(0x2, r1) syz_mount_image$vfat(0x0, &(0x7f0000000040)='./file1\x00', 0x0, 0x0, &(0x7f00000000c0), 0x2002000, &(0x7f0000000400)=ANY=[@ANYRES16, @ANYBLOB="72e1af808ba473e6f37c85b113d8c4d9e1de4ed2968d2e01108c4795a941d14f6927393c8c3c458dd7454900d48719912efc18d580a8f841234284071012d7d5020eb5d56dc1ba5f1048adac4b928bf6cfd663b4cab43637cb979a9199a0246ec02345161783bc79585902603d7062084f05b744e31fcb4c3e81f3becabb7ad1fa5783f5e5e60ae912102fe8df0536bd074c03bd33742f35c5c44b5c3c9d693114367b7d966e"]) chdir(&(0x7f0000000140)='./file0\x00') ptrace$getenv(0x4201, r0, 0xfff, &(0x7f00000000c0)) openat(0xffffffffffffff9c, &(0x7f0000000000)='./file2\x00', 0x40c2, 0x0) r2 = perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x6, 0x0, 0xe}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r4 = fork() perf_event_open(&(0x7f0000000540)={0x4, 0x80, 0xeb, 0x0, 0x20, 0x0, 0x0, 0x2, 0x2820, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, @perf_config_ext={0xdc, 0x40}, 0x40000, 0x3, 0x8, 0x5, 0x6000000000000, 0x4, 0x5, 0x0, 0x3, 0x0, 0x3}, r4, 0x9, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000340)={0x0, 0x80, 0x2, 0x83, 0x1, 0x7, 0x0, 0x1f, 0x9ec17fc7a3e840c7, 0xc, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x9, 0x4, @perf_bp={&(0x7f0000000240), 0x1}, 0x404, 0x7, 0x3, 0x6, 0x800, 0x9, 0x3, 0x0, 0x7ff, 0x0, 0x9}, r4, 0x8, r2, 0x9) fork() setxattr$trusted_overlay_upper(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180), &(0x7f00000001c0)={0x0, 0xfb, 0x7a, 0x0, 0x2, "d54449275cb08faf62df87518e3ce16f", "9a61b461b0c63151b954990036d5e0163ceb48c6a801bb019e9e6fa7196a9372f804b9e9ca3fb3d85d1985d31346bbd5fd02b1c8223bf6388eb75498623e38ff88a99c5ce38698a32306b7d4e4b0fd4b03bfa568df17a42f725c6c33046b38b6e4a713dde1"}, 0x7a, 0x3) socket$nl_audit(0x10, 0x3, 0x9) chroot(&(0x7f0000000080)='./file1\x00') sendmsg$inet(r3, &(0x7f0000000780)={&(0x7f0000000000)={0x2, 0x0, @local}, 0x10, &(0x7f00000003c0)=[{&(0x7f0000000300)="6fb9", 0xffeb}], 0x1, &(0x7f0000000700)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @remote, @broadcast}}}], 0x20}, 0x0) 06:17:19 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x100000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="200006000002000019000000900100000f000000000000000100000005000000000004000040000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000001000018000000c28500002b02", 0x66, 0x400}, {&(0x7f0000010100)="000000000000000000000000e8f7d2e8feeb4bf889ba053b02420ff8010040", 0x1f, 0x4e0}], 0x0, &(0x7f0000000140)=ANY=[]) 06:17:19 executing program 0: pipe(&(0x7f0000000340)={0xffffffffffffffff}) pread64(r0, &(0x7f0000000440)=""/95, 0x5f, 0x6) execveat(r0, &(0x7f0000000080)='./file0\x00', &(0x7f00000001c0)=[&(0x7f00000000c0)='\x00', &(0x7f0000000180)='\x00'], &(0x7f0000000400)=[&(0x7f0000000200)='/dev/zero\x00', &(0x7f0000000240)='/dev/zero\x00', &(0x7f0000000300)='/dev/zero\x00'], 0x1000) socket$inet(0x2, 0x1, 0x0) perf_event_open(&(0x7f0000000100)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x22420, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ptrace$setopts(0x4200, 0x0, 0x5, 0x100050) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000004c00)={0xc0002100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) gettid() r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000), 0x380, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000000)='net/udp6\x00') read$hiddev(r2, &(0x7f0000001140)=""/212, 0xd4) fchmodat(r2, &(0x7f00000004c0)='./file0\x00', 0x0) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(r1, 0xc018937c, &(0x7f0000000380)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32=r0, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00./fi']) ioctl$TIOCSSOFTCAR(r3, 0x541a, &(0x7f00000003c0)=0x6) waitid$P_PIDFD(0x3, r1, &(0x7f0000000500), 0x2, &(0x7f0000000580)) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(r1, 0xc0189372, &(0x7f0000000040)={{0x1, 0x1, 0x18, r2, {0xffff}}, './file0\x00'}) 06:17:19 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000302000019000000900100000f000000000000000100000005000000000004000040000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000001000018000000c28500002b02", 0x66, 0x400}, {&(0x7f0000010100)="000000000000000000000000e8f7d2e8feeb4bf889ba053b02420ff8010040", 0x1f, 0x4e0}], 0x0, &(0x7f0000000140)=ANY=[]) 06:17:19 executing program 1: pipe(&(0x7f0000000340)={0xffffffffffffffff}) pread64(r0, &(0x7f0000000440)=""/95, 0x5f, 0x6) execveat(r0, &(0x7f0000000080)='./file0\x00', &(0x7f00000001c0)=[&(0x7f00000000c0)='\x00', &(0x7f0000000180)='\x00'], &(0x7f0000000400)=[&(0x7f0000000200)='/dev/zero\x00', &(0x7f0000000240)='/dev/zero\x00', &(0x7f0000000300)='/dev/zero\x00'], 0x1000) socket$inet(0x2, 0x1, 0x0) perf_event_open(&(0x7f0000000100)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x22420, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ptrace$setopts(0x4200, 0x0, 0x5, 0x100050) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000004c00)={0xc0002100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) gettid() r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000), 0x380, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000000)='net/udp6\x00') read$hiddev(r2, &(0x7f0000001140)=""/212, 0xd4) fchmodat(r2, &(0x7f00000004c0)='./file0\x00', 0x0) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(r1, 0xc018937c, &(0x7f0000000380)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32=r0, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00./fi']) ioctl$TIOCSSOFTCAR(r3, 0x541a, &(0x7f00000003c0)=0x6) waitid$P_PIDFD(0x3, r1, &(0x7f0000000500), 0x2, &(0x7f0000000580)) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(r1, 0xc0189372, &(0x7f0000000040)={{0x1, 0x1, 0x18, r2, {0xffff}}, './file0\x00'}) 06:17:19 executing program 7: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x100000, 0xb, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000100000005000000000004000040000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000001000018000000c28500002b02", 0x66, 0x400}, {&(0x7f0000010100)="000000000000000000000000e8f7d2e8feeb4bf889ba053b02420ff8010040", 0x1f, 0x4e0}], 0x0, &(0x7f0000000140)=ANY=[]) 06:17:19 executing program 6: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x100000, 0x2, &(0x7f0000000200)=[{0x0, 0x0, 0x400}, {&(0x7f0000010100)="000000000000000000000000e8f7d2e8feeb4bf889ba053b02420ff8010040", 0x1f, 0x4e0}], 0x0, &(0x7f0000000140)=ANY=[]) 06:17:19 executing program 4: r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000040), 0xffffffffffffffff) syz_genetlink_get_family_id$ethtool(&(0x7f0000000100), 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_PAUSE_SET(0xffffffffffffffff, &(0x7f0000000440)={0x0, 0x0, 0x0}, 0x0) r2 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000080)='smaps\x00') pread64(r2, &(0x7f00000000c0)=""/98, 0x62, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x7fffffff) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(0xffffffffffffffff, 0xc0189374, &(0x7f0000000240)={{0x1, 0x1, 0x18, r0, {0x8}}, './file0\x00'}) dup3(0xffffffffffffffff, r2, 0x0) r3 = socket$inet_icmp_raw(0x2, 0x3, 0x1) syz_genetlink_get_family_id$ethtool(&(0x7f0000000180), r2) socket$nl_audit(0x10, 0x3, 0x9) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000040)={'wlan1\x00', 0x0}) sendmsg$inet(r3, &(0x7f0000000780)={&(0x7f0000000000)={0x2, 0x0, @local}, 0x10, &(0x7f00000003c0)=[{&(0x7f0000000300)="6fb9", 0xffeb}], 0x1, &(0x7f0000000700)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {r4, @remote, @broadcast}}}], 0x20}, 0x0) r5 = socket$inet_icmp_raw(0x2, 0x3, 0x1) socket$nl_audit(0x10, 0x3, 0x9) sendmsg$inet(r5, &(0x7f0000000780)={&(0x7f0000000000)={0x2, 0x0, @local}, 0x10, &(0x7f00000003c0)=[{&(0x7f0000000300)="6fb9", 0xffeb}], 0x1, &(0x7f0000000700)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @remote, @broadcast}}}], 0x20}, 0x0) sendmsg$ETHTOOL_MSG_LINKINFO_GET(r2, &(0x7f0000000200)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f00000001c0)={&(0x7f0000000340)=ANY=[@ANYBLOB='@\x00\x00\x00', @ANYRES16=r1, @ANYBLOB="000427bd7000ffdbdf25020000002c0001800800", @ANYRES32=0x0, @ANYBLOB='\b\x00C\x00\x00\x00\x00\x00\b\x00!\x00', @ANYRES32=r4, @ANYBLOB="d5b921cac279671a02c4d90ed2cbc802c00000009852d9e901fb17000000000000", @ANYRES32=0x0, @ANYBLOB], 0x40}, 0x1, 0x0, 0x0, 0x4}, 0xd0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000480), 0x1}, 0x603}, 0x0, 0xffffffefffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000040)=[{&(0x7f0000010000)="601c6d6b646f736689254300080120000400004000f8000020004000030000000000000001", 0x25}, {0x0, 0x0, 0x10000}], 0x0, &(0x7f0000000040)=ANY=[]) [ 2555.066259] loop5: detected capacity change from 0 to 2048 [ 2555.084875] EXT4-fs (loop5): inodes count not valid: 393248 vs 32 [ 2555.091565] loop4: detected capacity change from 0 to 256 [ 2555.102873] loop5: detected capacity change from 0 to 2048 [ 2555.109500] loop7: detected capacity change from 0 to 2048 [ 2555.116341] loop6: detected capacity change from 0 to 2048 [ 2555.119301] FAT-fs (loop4): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) [ 2555.128557] EXT4-fs (loop5): inodes count not valid: 393248 vs 32 [ 2555.135789] EXT4-fs (loop7): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 2555.136487] EXT4-fs (loop7): group descriptors corrupted! [ 2555.139664] EXT4-fs (loop6): VFS: Can't find ext4 filesystem [ 2555.155866] loop7: detected capacity change from 0 to 2048 [ 2555.188234] EXT4-fs (loop7): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 2555.189037] EXT4-fs (loop7): group descriptors corrupted! 06:17:19 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x100000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="200007000002000019000000900100000f000000000000000100000005000000000004000040000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000001000018000000c28500002b02", 0x66, 0x400}, {&(0x7f0000010100)="000000000000000000000000e8f7d2e8feeb4bf889ba053b02420ff8010040", 0x1f, 0x4e0}], 0x0, &(0x7f0000000140)=ANY=[]) 06:17:19 executing program 4: r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000040), 0xffffffffffffffff) syz_genetlink_get_family_id$ethtool(&(0x7f0000000100), 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_PAUSE_SET(0xffffffffffffffff, &(0x7f0000000440)={0x0, 0x0, 0x0}, 0x0) r2 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000080)='smaps\x00') pread64(r2, &(0x7f00000000c0)=""/98, 0x62, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x7fffffff) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(0xffffffffffffffff, 0xc0189374, &(0x7f0000000240)={{0x1, 0x1, 0x18, r0, {0x8}}, './file0\x00'}) dup3(0xffffffffffffffff, r2, 0x0) r3 = socket$inet_icmp_raw(0x2, 0x3, 0x1) syz_genetlink_get_family_id$ethtool(&(0x7f0000000180), r2) socket$nl_audit(0x10, 0x3, 0x9) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000040)={'wlan1\x00', 0x0}) sendmsg$inet(r3, &(0x7f0000000780)={&(0x7f0000000000)={0x2, 0x0, @local}, 0x10, &(0x7f00000003c0)=[{&(0x7f0000000300)="6fb9", 0xffeb}], 0x1, &(0x7f0000000700)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {r4, @remote, @broadcast}}}], 0x20}, 0x0) r5 = socket$inet_icmp_raw(0x2, 0x3, 0x1) socket$nl_audit(0x10, 0x3, 0x9) sendmsg$inet(r5, &(0x7f0000000780)={&(0x7f0000000000)={0x2, 0x0, @local}, 0x10, &(0x7f00000003c0)=[{&(0x7f0000000300)="6fb9", 0xffeb}], 0x1, &(0x7f0000000700)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @remote, @broadcast}}}], 0x20}, 0x0) sendmsg$ETHTOOL_MSG_LINKINFO_GET(r2, &(0x7f0000000200)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f00000001c0)={&(0x7f0000000340)=ANY=[@ANYBLOB='@\x00\x00\x00', @ANYRES16=r1, @ANYBLOB="000427bd7000ffdbdf25020000002c000180080001", @ANYRES32=0x0, @ANYBLOB='\b\x00C\x00\x00\x00\x00\x00\b\x00!\x00', @ANYRES32=r4, @ANYBLOB="d5b921cac279671a02c4d90ed2cbc802c00000009852d9e901fb17000000000000", @ANYRES32=0x0, @ANYBLOB], 0x40}, 0x1, 0x0, 0x0, 0x4}, 0xd0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000480), 0x1}, 0x603}, 0x0, 0xffffffefffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000040)=[{&(0x7f0000010000)="601c6d6b646f736689254300080120000400004000f8000020004000030000000000000001", 0x25}, {0x0, 0x0, 0x10000}], 0x0, &(0x7f0000000040)=ANY=[]) 06:17:19 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000402000019000000900100000f000000000000000100000005000000000004000040000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000001000018000000c28500002b02", 0x66, 0x400}, {&(0x7f0000010100)="000000000000000000000000e8f7d2e8feeb4bf889ba053b02420ff8010040", 0x1f, 0x4e0}], 0x0, &(0x7f0000000140)=ANY=[]) 06:17:19 executing program 7: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x100000, 0xe, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000100000005000000000004000040000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000001000018000000c28500002b02", 0x66, 0x400}, {&(0x7f0000010100)="000000000000000000000000e8f7d2e8feeb4bf889ba053b02420ff8010040", 0x1f, 0x4e0}], 0x0, &(0x7f0000000140)=ANY=[]) 06:17:19 executing program 6: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x100000, 0x2, &(0x7f0000000200)=[{0x0, 0x0, 0x400}, {&(0x7f0000010100)="000000000000000000000000e8f7d2e8feeb4bf889ba053b02420ff8010040", 0x1f, 0x4e0}], 0x0, &(0x7f0000000140)=ANY=[]) [ 2555.299136] loop4: detected capacity change from 0 to 256 [ 2555.316676] FAT-fs (loop4): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) 06:17:19 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000502000019000000900100000f000000000000000100000005000000000004000040000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000001000018000000c28500002b02", 0x66, 0x400}, {&(0x7f0000010100)="000000000000000000000000e8f7d2e8feeb4bf889ba053b02420ff8010040", 0x1f, 0x4e0}], 0x0, &(0x7f0000000140)=ANY=[]) [ 2555.373107] loop5: detected capacity change from 0 to 2048 [ 2555.427513] EXT4-fs (loop5): inodes count not valid: 458784 vs 32 [ 2555.452150] loop5: detected capacity change from 0 to 2048 [ 2555.464588] loop7: detected capacity change from 0 to 2048 [ 2555.466549] loop6: detected capacity change from 0 to 2048 [ 2555.475023] EXT4-fs (loop5): inodes count not valid: 458784 vs 32 [ 2555.483297] EXT4-fs (loop7): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 2555.484002] EXT4-fs (loop7): group descriptors corrupted! [ 2555.491536] EXT4-fs (loop6): VFS: Can't find ext4 filesystem [ 2555.503006] loop7: detected capacity change from 0 to 2048 [ 2555.516434] EXT4-fs (loop7): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 2555.517131] EXT4-fs (loop7): group descriptors corrupted! 06:17:38 executing program 7: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x100000, 0x10, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000100000005000000000004000040000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000001000018000000c28500002b02", 0x66, 0x400}, {&(0x7f0000010100)="000000000000000000000000e8f7d2e8feeb4bf889ba053b02420ff8010040", 0x1f, 0x4e0}], 0x0, &(0x7f0000000140)=ANY=[]) 06:17:38 executing program 4: r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000040), 0xffffffffffffffff) syz_genetlink_get_family_id$ethtool(&(0x7f0000000100), 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_PAUSE_SET(0xffffffffffffffff, &(0x7f0000000440)={0x0, 0x0, 0x0}, 0x0) r2 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000080)='smaps\x00') pread64(r2, &(0x7f00000000c0)=""/98, 0x62, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x7fffffff) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(0xffffffffffffffff, 0xc0189374, &(0x7f0000000240)={{0x1, 0x1, 0x18, r0, {0x8}}, './file0\x00'}) dup3(0xffffffffffffffff, r2, 0x0) r3 = socket$inet_icmp_raw(0x2, 0x3, 0x1) syz_genetlink_get_family_id$ethtool(&(0x7f0000000180), r2) socket$nl_audit(0x10, 0x3, 0x9) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000040)={'wlan1\x00', 0x0}) sendmsg$inet(r3, &(0x7f0000000780)={&(0x7f0000000000)={0x2, 0x0, @local}, 0x10, &(0x7f00000003c0)=[{&(0x7f0000000300)="6fb9", 0xffeb}], 0x1, &(0x7f0000000700)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {r4, @remote, @broadcast}}}], 0x20}, 0x0) r5 = socket$inet_icmp_raw(0x2, 0x3, 0x1) socket$nl_audit(0x10, 0x3, 0x9) sendmsg$inet(r5, &(0x7f0000000780)={&(0x7f0000000000)={0x2, 0x0, @local}, 0x10, &(0x7f00000003c0)=[{&(0x7f0000000300)="6fb9", 0xffeb}], 0x1, &(0x7f0000000700)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @remote, @broadcast}}}], 0x20}, 0x0) sendmsg$ETHTOOL_MSG_LINKINFO_GET(r2, &(0x7f0000000200)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f00000001c0)={&(0x7f0000000340)=ANY=[@ANYBLOB='@\x00\x00\x00', @ANYRES16=r1, @ANYBLOB="000427bd7000ffdbdf25020000002c000180080001", @ANYRES32=0x0, @ANYBLOB='\b\x00C\x00\x00\x00\x00\x00\b\x00!\x00', @ANYRES32=r4, @ANYBLOB="d5b921cac279671a02c4d90ed2cbc802c00000009852d9e901fb17000000000000", @ANYRES32=0x0, @ANYBLOB], 0x40}, 0x1, 0x0, 0x0, 0x4}, 0xd0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000480), 0x1}, 0x603}, 0x0, 0xffffffefffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000040)=[{&(0x7f0000010000)="601c6d6b646f736689254300080120000400004000f8000020004000030000000000000001", 0x25}, {0x0, 0x0, 0x10000}], 0x0, &(0x7f0000000040)=ANY=[]) 06:17:38 executing program 6: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x100000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000), 0x0, 0x400}, {&(0x7f0000010100)="000000000000000000000000e8f7d2e8feeb4bf889ba053b02420ff8010040", 0x1f, 0x4e0}], 0x0, &(0x7f0000000140)=ANY=[]) 06:17:38 executing program 0: r0 = getpid() ioprio_get$pid(0x2, r0) r1 = getpid() ioprio_get$pid(0x2, r1) syz_mount_image$vfat(0x0, &(0x7f0000000040)='./file1\x00', 0x0, 0x0, &(0x7f00000000c0), 0x2002000, &(0x7f0000000400)=ANY=[@ANYRES16, @ANYBLOB="72e1af808ba473e6f37c85b113d8c4d9e1de4ed2968d2e01108c4795a941d14f6927393c8c3c458dd7454900d48719912efc18d580a8f841234284071012d7d5020eb5d56dc1ba5f1048adac4b928bf6cfd663b4cab43637cb979a9199a0246ec02345161783bc79585902603d7062084f05b744e31fcb4c3e81f3becabb7ad1fa5783f5e5e60ae912102fe8df0536bd074c03bd33742f35c5c44b5c3c9d693114367b7d966e"]) chdir(&(0x7f0000000140)='./file0\x00') ptrace$getenv(0x4201, r0, 0xfff, &(0x7f00000000c0)) openat(0xffffffffffffff9c, &(0x7f0000000000)='./file2\x00', 0x40c2, 0x0) r2 = perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x6, 0x0, 0xe}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r4 = fork() perf_event_open(&(0x7f0000000540)={0x4, 0x80, 0xeb, 0x0, 0x20, 0x0, 0x0, 0x2, 0x2820, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, @perf_config_ext={0xdc, 0x40}, 0x40000, 0x3, 0x8, 0x5, 0x6000000000000, 0x4, 0x5, 0x0, 0x3, 0x0, 0x3}, r4, 0x9, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000340)={0x0, 0x80, 0x2, 0x83, 0x1, 0x7, 0x0, 0x1f, 0x9ec17fc7a3e840c7, 0xc, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x9, 0x4, @perf_bp={&(0x7f0000000240), 0x1}, 0x404, 0x7, 0x3, 0x6, 0x800, 0x9, 0x3, 0x0, 0x7ff, 0x0, 0x9}, r4, 0x8, r2, 0x9) fork() setxattr$trusted_overlay_upper(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180), &(0x7f00000001c0)={0x0, 0xfb, 0x7a, 0x0, 0x2, "d54449275cb08faf62df87518e3ce16f", "9a61b461b0c63151b954990036d5e0163ceb48c6a801bb019e9e6fa7196a9372f804b9e9ca3fb3d85d1985d31346bbd5fd02b1c8223bf6388eb75498623e38ff88a99c5ce38698a32306b7d4e4b0fd4b03bfa568df17a42f725c6c33046b38b6e4a713dde1"}, 0x7a, 0x3) socket$nl_audit(0x10, 0x3, 0x9) chroot(&(0x7f0000000080)='./file1\x00') sendmsg$inet(r3, &(0x7f0000000780)={&(0x7f0000000000)={0x2, 0x0, @local}, 0x10, &(0x7f00000003c0)=[{&(0x7f0000000300)="6fb9", 0xffeb}], 0x1, &(0x7f0000000700)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @remote, @broadcast}}}], 0x20}, 0x0) 06:17:38 executing program 1: pipe(&(0x7f0000000340)={0xffffffffffffffff}) pread64(r0, &(0x7f0000000440)=""/95, 0x5f, 0x6) execveat(r0, &(0x7f0000000080)='./file0\x00', &(0x7f00000001c0)=[&(0x7f00000000c0)='\x00', &(0x7f0000000180)='\x00'], &(0x7f0000000400)=[&(0x7f0000000200)='/dev/zero\x00', &(0x7f0000000240)='/dev/zero\x00', &(0x7f0000000300)='/dev/zero\x00'], 0x1000) socket$inet(0x2, 0x1, 0x0) perf_event_open(&(0x7f0000000100)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x22420, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ptrace$setopts(0x4200, 0x0, 0x5, 0x100050) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000004c00)={0xc0002100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) gettid() r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000), 0x380, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000000)='net/udp6\x00') read$hiddev(r2, &(0x7f0000001140)=""/212, 0xd4) fchmodat(r2, &(0x7f00000004c0)='./file0\x00', 0x0) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(r1, 0xc018937c, &(0x7f0000000380)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32=r0, @ANYBLOB="00000000000000002e2f66696cee"]) ioctl$TIOCSSOFTCAR(r3, 0x541a, &(0x7f00000003c0)=0x6) waitid$P_PIDFD(0x3, r1, &(0x7f0000000500), 0x2, &(0x7f0000000580)) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(r1, 0xc0189372, &(0x7f0000000040)={{0x1, 0x1, 0x18, r2, {0xffff}}, './file0\x00'}) 06:17:38 executing program 3: r0 = getpid() ioprio_get$pid(0x2, r0) r1 = getpid() ioprio_get$pid(0x2, r1) syz_mount_image$vfat(0x0, &(0x7f0000000040)='./file1\x00', 0x0, 0x0, &(0x7f00000000c0), 0x2002000, &(0x7f0000000400)=ANY=[@ANYRES16, @ANYBLOB="72e1af808ba473e6f37c85b113d8c4d9e1de4ed2968d2e01108c4795a941d14f6927393c8c3c458dd7454900d48719912efc18d580a8f841234284071012d7d5020eb5d56dc1ba5f1048adac4b928bf6cfd663b4cab43637cb979a9199a0246ec02345161783bc79585902603d7062084f05b744e31fcb4c3e81f3becabb7ad1fa5783f5e5e60ae912102fe8df0536bd074c03bd33742f35c5c44b5c3c9d693114367b7d966e"]) chdir(&(0x7f0000000140)='./file0\x00') ptrace$getenv(0x4201, r0, 0xfff, &(0x7f00000000c0)) openat(0xffffffffffffff9c, &(0x7f0000000000)='./file2\x00', 0x40c2, 0x0) r2 = perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x6, 0x0, 0xe}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r4 = fork() perf_event_open(&(0x7f0000000540)={0x4, 0x80, 0xeb, 0x0, 0x20, 0x0, 0x0, 0x2, 0x2820, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, @perf_config_ext={0xdc, 0x40}, 0x40000, 0x3, 0x8, 0x5, 0x6000000000000, 0x4, 0x5, 0x0, 0x3, 0x0, 0x3}, r4, 0x9, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000340)={0x0, 0x80, 0x2, 0x83, 0x1, 0x7, 0x0, 0x1f, 0x9ec17fc7a3e840c7, 0xc, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x9, 0x4, @perf_bp={&(0x7f0000000240), 0x1}, 0x404, 0x7, 0x3, 0x6, 0x800, 0x9, 0x3, 0x0, 0x7ff, 0x0, 0x9}, r4, 0x8, r2, 0x9) fork() setxattr$trusted_overlay_upper(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180), &(0x7f00000001c0)={0x0, 0xfb, 0x7a, 0x0, 0x2, "d54449275cb08faf62df87518e3ce16f", "9a61b461b0c63151b954990036d5e0163ceb48c6a801bb019e9e6fa7196a9372f804b9e9ca3fb3d85d1985d31346bbd5fd02b1c8223bf6388eb75498623e38ff88a99c5ce38698a32306b7d4e4b0fd4b03bfa568df17a42f725c6c33046b38b6e4a713dde1"}, 0x7a, 0x3) socket$nl_audit(0x10, 0x3, 0x9) chroot(&(0x7f0000000080)='./file1\x00') sendmsg$inet(r3, &(0x7f0000000780)={&(0x7f0000000000)={0x2, 0x0, @local}, 0x10, &(0x7f00000003c0)=[{&(0x7f0000000300)="6fb9", 0xffeb}], 0x1, &(0x7f0000000700)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @remote, @broadcast}}}], 0x20}, 0x0) 06:17:38 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000602000019000000900100000f000000000000000100000005000000000004000040000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000001000018000000c28500002b02", 0x66, 0x400}, {&(0x7f0000010100)="000000000000000000000000e8f7d2e8feeb4bf889ba053b02420ff8010040", 0x1f, 0x4e0}], 0x0, &(0x7f0000000140)=ANY=[]) 06:17:38 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x100000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="20f807000002000019000000900100000f000000000000000100000005000000000004000040000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000001000018000000c28500002b02", 0x66, 0x400}, {&(0x7f0000010100)="000000000000000000000000e8f7d2e8feeb4bf889ba053b02420ff8010040", 0x1f, 0x4e0}], 0x0, &(0x7f0000000140)=ANY=[]) [ 2574.273657] loop6: detected capacity change from 0 to 2048 [ 2574.283908] loop5: detected capacity change from 0 to 2048 [ 2574.288789] loop7: detected capacity change from 0 to 2048 [ 2574.301658] EXT4-fs (loop6): VFS: Can't find ext4 filesystem [ 2574.317078] EXT4-fs (loop7): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 2574.318012] EXT4-fs (loop7): group descriptors corrupted! [ 2574.323981] EXT4-fs (loop5): inodes count not valid: 522272 vs 32 [ 2574.336875] loop7: detected capacity change from 0 to 2048 [ 2574.348156] loop4: detected capacity change from 0 to 256 [ 2574.350687] loop5: detected capacity change from 0 to 2048 [ 2574.358807] EXT4-fs (loop7): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 2574.359883] EXT4-fs (loop7): group descriptors corrupted! 06:17:38 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000702000019000000900100000f000000000000000100000005000000000004000040000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000001000018000000c28500002b02", 0x66, 0x400}, {&(0x7f0000010100)="000000000000000000000000e8f7d2e8feeb4bf889ba053b02420ff8010040", 0x1f, 0x4e0}], 0x0, &(0x7f0000000140)=ANY=[]) [ 2574.390138] EXT4-fs (loop5): inodes count not valid: 522272 vs 32 [ 2574.398333] FAT-fs (loop4): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) 06:17:38 executing program 6: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x100000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000), 0x0, 0x400}, {&(0x7f0000010100)="000000000000000000000000e8f7d2e8feeb4bf889ba053b02420ff8010040", 0x1f, 0x4e0}], 0x0, &(0x7f0000000140)=ANY=[]) 06:17:38 executing program 7: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x100000, 0x14, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000100000005000000000004000040000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000001000018000000c28500002b02", 0x66, 0x400}, {&(0x7f0000010100)="000000000000000000000000e8f7d2e8feeb4bf889ba053b02420ff8010040", 0x1f, 0x4e0}], 0x0, &(0x7f0000000140)=ANY=[]) 06:17:38 executing program 1: pipe(&(0x7f0000000340)={0xffffffffffffffff}) pread64(r0, &(0x7f0000000440)=""/95, 0x5f, 0x6) execveat(r0, &(0x7f0000000080)='./file0\x00', &(0x7f00000001c0)=[&(0x7f00000000c0)='\x00', &(0x7f0000000180)='\x00'], &(0x7f0000000400)=[&(0x7f0000000200)='/dev/zero\x00', &(0x7f0000000240)='/dev/zero\x00', &(0x7f0000000300)='/dev/zero\x00'], 0x1000) socket$inet(0x2, 0x1, 0x0) perf_event_open(&(0x7f0000000100)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x22420, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ptrace$setopts(0x4200, 0x0, 0x5, 0x100050) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000004c00)={0xc0002100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) gettid() r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000), 0x380, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000000)='net/udp6\x00') read$hiddev(r2, &(0x7f0000001140)=""/212, 0xd4) fchmodat(r2, &(0x7f00000004c0)='./file0\x00', 0x0) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(r1, 0xc018937c, &(0x7f0000000380)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32=r0, @ANYBLOB="00000000000000002e2f66696cee"]) ioctl$TIOCSSOFTCAR(r3, 0x541a, &(0x7f00000003c0)=0x6) waitid$P_PIDFD(0x3, r1, &(0x7f0000000500), 0x2, &(0x7f0000000580)) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(r1, 0xc0189372, &(0x7f0000000040)={{0x1, 0x1, 0x18, r2, {0xffff}}, './file0\x00'}) 06:17:38 executing program 4: r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000040), 0xffffffffffffffff) syz_genetlink_get_family_id$ethtool(&(0x7f0000000100), 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_PAUSE_SET(0xffffffffffffffff, &(0x7f0000000440)={0x0, 0x0, 0x0}, 0x0) r2 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000080)='smaps\x00') pread64(r2, &(0x7f00000000c0)=""/98, 0x62, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x7fffffff) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(0xffffffffffffffff, 0xc0189374, &(0x7f0000000240)={{0x1, 0x1, 0x18, r0, {0x8}}, './file0\x00'}) dup3(0xffffffffffffffff, r2, 0x0) r3 = socket$inet_icmp_raw(0x2, 0x3, 0x1) syz_genetlink_get_family_id$ethtool(&(0x7f0000000180), r2) socket$nl_audit(0x10, 0x3, 0x9) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000040)={'wlan1\x00', 0x0}) sendmsg$inet(r3, &(0x7f0000000780)={&(0x7f0000000000)={0x2, 0x0, @local}, 0x10, &(0x7f00000003c0)=[{&(0x7f0000000300)="6fb9", 0xffeb}], 0x1, &(0x7f0000000700)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {r4, @remote, @broadcast}}}], 0x20}, 0x0) r5 = socket$inet_icmp_raw(0x2, 0x3, 0x1) socket$nl_audit(0x10, 0x3, 0x9) sendmsg$inet(r5, &(0x7f0000000780)={&(0x7f0000000000)={0x2, 0x0, @local}, 0x10, &(0x7f00000003c0)=[{&(0x7f0000000300)="6fb9", 0xffeb}], 0x1, &(0x7f0000000700)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @remote, @broadcast}}}], 0x20}, 0x0) sendmsg$ETHTOOL_MSG_LINKINFO_GET(r2, &(0x7f0000000200)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f00000001c0)={&(0x7f0000000340)=ANY=[@ANYBLOB='@\x00\x00\x00', @ANYRES16=r1, @ANYBLOB="000427bd7000ffdbdf25020000002c000180080001", @ANYRES32=0x0, @ANYBLOB='\b\x00C\x00\x00\x00\x00\x00\b\x00!\x00', @ANYRES32=r4, @ANYBLOB="d5b921cac279671a02c4d90ed2cbc802c00000009852d9e901fb17000000000000", @ANYRES32=0x0, @ANYBLOB], 0x40}, 0x1, 0x0, 0x0, 0x4}, 0xd0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000480), 0x1}, 0x603}, 0x0, 0xffffffefffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000040)=[{&(0x7f0000010000)="601c6d6b646f736689254300080120000400004000f8000020004000030000000000000001", 0x25}, {0x0, 0x0, 0x10000}], 0x0, &(0x7f0000000040)=ANY=[]) 06:17:38 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x100000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="20fc07000002000019000000900100000f000000000000000100000005000000000004000040000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000001000018000000c28500002b02", 0x66, 0x400}, {&(0x7f0000010100)="000000000000000000000000e8f7d2e8feeb4bf889ba053b02420ff8010040", 0x1f, 0x4e0}], 0x0, &(0x7f0000000140)=ANY=[]) [ 2574.610879] loop6: detected capacity change from 0 to 2048 06:17:38 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="200000001802000019000000900100000f000000000000000100000005000000000004000040000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000001000018000000c28500002b02", 0x66, 0x400}, {&(0x7f0000010100)="000000000000000000000000e8f7d2e8feeb4bf889ba053b02420ff8010040", 0x1f, 0x4e0}], 0x0, &(0x7f0000000140)=ANY=[]) [ 2574.628677] loop7: detected capacity change from 0 to 2048 [ 2574.639707] EXT4-fs (loop6): VFS: Can't find ext4 filesystem [ 2574.642367] loop5: detected capacity change from 0 to 2048 06:17:38 executing program 3: r0 = getpid() ioprio_get$pid(0x2, r0) r1 = getpid() ioprio_get$pid(0x2, r1) syz_mount_image$vfat(0x0, &(0x7f0000000040)='./file1\x00', 0x0, 0x0, &(0x7f00000000c0), 0x2002000, &(0x7f0000000400)=ANY=[@ANYRES16, @ANYBLOB="72e1af808ba473e6f37c85b113d8c4d9e1de4ed2968d2e01108c4795a941d14f6927393c8c3c458dd7454900d48719912efc18d580a8f841234284071012d7d5020eb5d56dc1ba5f1048adac4b928bf6cfd663b4cab43637cb979a9199a0246ec02345161783bc79585902603d7062084f05b744e31fcb4c3e81f3becabb7ad1fa5783f5e5e60ae912102fe8df0536bd074c03bd33742f35c5c44b5c3c9d693114367b7d966e"]) chdir(&(0x7f0000000140)='./file0\x00') ptrace$getenv(0x4201, r0, 0xfff, &(0x7f00000000c0)) openat(0xffffffffffffff9c, &(0x7f0000000000)='./file2\x00', 0x40c2, 0x0) r2 = perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x6, 0x0, 0xe}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r4 = fork() perf_event_open(&(0x7f0000000540)={0x4, 0x80, 0xeb, 0x0, 0x20, 0x0, 0x0, 0x2, 0x2820, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, @perf_config_ext={0xdc, 0x40}, 0x40000, 0x3, 0x8, 0x5, 0x6000000000000, 0x4, 0x5, 0x0, 0x3, 0x0, 0x3}, r4, 0x9, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000340)={0x0, 0x80, 0x2, 0x83, 0x1, 0x7, 0x0, 0x1f, 0x9ec17fc7a3e840c7, 0xc, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x9, 0x4, @perf_bp={&(0x7f0000000240), 0x1}, 0x404, 0x7, 0x3, 0x6, 0x800, 0x9, 0x3, 0x0, 0x7ff, 0x0, 0x9}, r4, 0x8, r2, 0x9) fork() setxattr$trusted_overlay_upper(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180), &(0x7f00000001c0)={0x0, 0xfb, 0x7a, 0x0, 0x2, "d54449275cb08faf62df87518e3ce16f", "9a61b461b0c63151b954990036d5e0163ceb48c6a801bb019e9e6fa7196a9372f804b9e9ca3fb3d85d1985d31346bbd5fd02b1c8223bf6388eb75498623e38ff88a99c5ce38698a32306b7d4e4b0fd4b03bfa568df17a42f725c6c33046b38b6e4a713dde1"}, 0x7a, 0x3) socket$nl_audit(0x10, 0x3, 0x9) chroot(&(0x7f0000000080)='./file1\x00') sendmsg$inet(r3, &(0x7f0000000780)={&(0x7f0000000000)={0x2, 0x0, @local}, 0x10, &(0x7f00000003c0)=[{&(0x7f0000000300)="6fb9", 0xffeb}], 0x1, &(0x7f0000000700)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @remote, @broadcast}}}], 0x20}, 0x0) [ 2574.655655] EXT4-fs (loop7): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 2574.657603] EXT4-fs (loop7): group descriptors corrupted! [ 2574.658307] loop4: detected capacity change from 0 to 256 [ 2574.675666] EXT4-fs (loop5): inodes count not valid: 523296 vs 32 [ 2574.687580] loop7: detected capacity change from 0 to 2048 [ 2574.688048] FAT-fs (loop4): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) [ 2574.710818] loop5: detected capacity change from 0 to 2048 [ 2574.718490] EXT4-fs (loop7): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 2574.719907] EXT4-fs (loop7): group descriptors corrupted! [ 2574.744491] EXT4-fs (loop5): inodes count not valid: 523296 vs 32 06:17:39 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="200000001c02000019000000900100000f000000000000000100000005000000000004000040000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000001000018000000c28500002b02", 0x66, 0x400}, {&(0x7f0000010100)="000000000000000000000000e8f7d2e8feeb4bf889ba053b02420ff8010040", 0x1f, 0x4e0}], 0x0, &(0x7f0000000140)=ANY=[]) 06:17:39 executing program 4: r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_genetlink_get_family_id$ethtool(&(0x7f0000000040), 0xffffffffffffffff) syz_genetlink_get_family_id$ethtool(&(0x7f0000000100), 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_PAUSE_SET(0xffffffffffffffff, &(0x7f0000000440)={0x0, 0x0, 0x0}, 0x0) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000080)='smaps\x00') pread64(r1, &(0x7f00000000c0)=""/98, 0x62, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x7fffffff) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(0xffffffffffffffff, 0xc0189374, &(0x7f0000000240)={{0x1, 0x1, 0x18, r0, {0x8}}, './file0\x00'}) dup3(0xffffffffffffffff, r1, 0x0) r2 = socket$inet_icmp_raw(0x2, 0x3, 0x1) syz_genetlink_get_family_id$ethtool(&(0x7f0000000180), r1) socket$nl_audit(0x10, 0x3, 0x9) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000040)={'wlan1\x00', 0x0}) sendmsg$inet(r2, &(0x7f0000000780)={&(0x7f0000000000)={0x2, 0x0, @local}, 0x10, &(0x7f00000003c0)=[{&(0x7f0000000300)="6fb9", 0xffeb}], 0x1, &(0x7f0000000700)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {r3, @remote, @broadcast}}}], 0x20}, 0x0) r4 = socket$inet_icmp_raw(0x2, 0x3, 0x1) socket$nl_audit(0x10, 0x3, 0x9) sendmsg$inet(r4, &(0x7f0000000780)={&(0x7f0000000000)={0x2, 0x0, @local}, 0x10, &(0x7f00000003c0)=[{&(0x7f0000000300)="6fb9", 0xffeb}], 0x1, &(0x7f0000000700)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @remote, @broadcast}}}], 0x20}, 0x0) sendmsg$ETHTOOL_MSG_LINKINFO_GET(r1, &(0x7f0000000200)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f00000001c0)={&(0x7f0000000340)=ANY=[@ANYBLOB='@\x00\x00\x00', @ANYBLOB="000427bd7000ffdbdf25020000002c00018008000100", @ANYRES32=0x0, @ANYBLOB='\b\x00C\x00\x00\x00\x00\x00\b\x00!\x00', @ANYRES32=r3, @ANYBLOB="d5b921cac279671a02c4d90ed2cbc802c00000009852d9e901fb17000000000000", @ANYRES32=0x0, @ANYBLOB], 0x40}, 0x1, 0x0, 0x0, 0x4}, 0xd0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000480), 0x1}, 0x603}, 0x0, 0xffffffefffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000040)=[{&(0x7f0000010000)="601c6d6b646f736689254300080120000400004000f8000020004000030000000000000001", 0x25}, {0x0, 0x0, 0x10000}], 0x0, &(0x7f0000000040)=ANY=[]) 06:17:39 executing program 6: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x100000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000), 0x0, 0x400}, {&(0x7f0000010100)="000000000000000000000000e8f7d2e8feeb4bf889ba053b02420ff8010040", 0x1f, 0x4e0}], 0x0, &(0x7f0000000140)=ANY=[]) [ 2574.869244] loop4: detected capacity change from 0 to 256 06:17:39 executing program 0: pipe(&(0x7f0000000340)={0xffffffffffffffff}) pread64(r0, &(0x7f0000000440)=""/95, 0x5f, 0x6) execveat(r0, &(0x7f0000000080)='./file0\x00', &(0x7f00000001c0)=[&(0x7f00000000c0)='\x00', &(0x7f0000000180)='\x00'], &(0x7f0000000400)=[&(0x7f0000000200)='/dev/zero\x00', &(0x7f0000000240)='/dev/zero\x00', &(0x7f0000000300)='/dev/zero\x00'], 0x1000) socket$inet(0x2, 0x1, 0x0) perf_event_open(&(0x7f0000000100)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x22420, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ptrace$setopts(0x4200, 0x0, 0x5, 0x100050) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000004c00)={0xc0002100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) gettid() r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000), 0x380, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000000)='net/udp6\x00') read$hiddev(r2, &(0x7f0000001140)=""/212, 0xd4) fchmodat(r2, &(0x7f00000004c0)='./file0\x00', 0x0) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(r1, 0xc018937c, &(0x7f0000000380)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32=r0, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00']) ioctl$TIOCSSOFTCAR(r3, 0x541a, &(0x7f00000003c0)=0x6) waitid$P_PIDFD(0x3, r1, &(0x7f0000000500), 0x2, &(0x7f0000000580)) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(r1, 0xc0189372, &(0x7f0000000040)={{0x1, 0x1, 0x18, r2, {0xffff}}, './file0\x00'}) 06:17:39 executing program 1: pipe(&(0x7f0000000340)={0xffffffffffffffff}) pread64(r0, &(0x7f0000000440)=""/95, 0x5f, 0x6) execveat(r0, &(0x7f0000000080)='./file0\x00', &(0x7f00000001c0)=[&(0x7f00000000c0)='\x00', &(0x7f0000000180)='\x00'], &(0x7f0000000400)=[&(0x7f0000000200)='/dev/zero\x00', &(0x7f0000000240)='/dev/zero\x00', &(0x7f0000000300)='/dev/zero\x00'], 0x1000) socket$inet(0x2, 0x1, 0x0) perf_event_open(&(0x7f0000000100)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x22420, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ptrace$setopts(0x4200, 0x0, 0x5, 0x100050) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000004c00)={0xc0002100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) gettid() r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000), 0x380, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000000)='net/udp6\x00') read$hiddev(r2, &(0x7f0000001140)=""/212, 0xd4) fchmodat(r2, &(0x7f00000004c0)='./file0\x00', 0x0) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(r1, 0xc018937c, &(0x7f0000000380)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32=r0, @ANYBLOB="00000000000000002e2f66696cee"]) ioctl$TIOCSSOFTCAR(r3, 0x541a, &(0x7f00000003c0)=0x6) waitid$P_PIDFD(0x3, r1, &(0x7f0000000500), 0x2, &(0x7f0000000580)) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(r1, 0xc0189372, &(0x7f0000000040)={{0x1, 0x1, 0x18, r2, {0xffff}}, './file0\x00'}) 06:17:39 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="200000006502000019000000900100000f000000000000000100000005000000000004000040000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000001000018000000c28500002b02", 0x66, 0x400}, {&(0x7f0000010100)="000000000000000000000000e8f7d2e8feeb4bf889ba053b02420ff8010040", 0x1f, 0x4e0}], 0x0, &(0x7f0000000140)=ANY=[]) [ 2574.919162] FAT-fs (loop4): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) [ 2574.953439] loop6: detected capacity change from 0 to 2048 [ 2574.962090] EXT4-fs (loop6): VFS: Can't find ext4 filesystem 06:17:56 executing program 7: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x100000, 0x26, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000100000005000000000004000040000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000001000018000000c28500002b02", 0x66, 0x400}, {&(0x7f0000010100)="000000000000000000000000e8f7d2e8feeb4bf889ba053b02420ff8010040", 0x1f, 0x4e0}], 0x0, &(0x7f0000000140)=ANY=[]) 06:17:56 executing program 0: r0 = getpid() ioprio_get$pid(0x2, r0) r1 = getpid() ioprio_get$pid(0x2, r1) syz_mount_image$vfat(0x0, &(0x7f0000000040)='./file1\x00', 0x0, 0x0, &(0x7f00000000c0), 0x2002000, &(0x7f0000000400)=ANY=[@ANYBLOB="72e1af808ba473e6f37c85b113d8c4d9e1de4ed2968d2e01108c4795a941d14f6927393c8c3c458dd7454900d48719912efc18d580a8f841234284071012d7d5020eb5d56dc1ba5f1048adac4b928bf6cfd663b4cab43637cb979a9199a0246ec02345161783bc79585902603d7062084f05b744e31fcb4c3e81f3becabb7ad1fa5783f5e5e60ae912102fe8df0536bd074c03bd33742f35c5c44b5c3c9d693114367b7d966e"]) chdir(&(0x7f0000000140)='./file0\x00') ptrace$getenv(0x4201, r0, 0xfff, &(0x7f00000000c0)) openat(0xffffffffffffff9c, &(0x7f0000000000)='./file2\x00', 0x40c2, 0x0) r2 = perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x6, 0x0, 0xe}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r4 = fork() perf_event_open(&(0x7f0000000540)={0x4, 0x80, 0xeb, 0x0, 0x20, 0x0, 0x0, 0x2, 0x2820, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, @perf_config_ext={0xdc, 0x40}, 0x40000, 0x3, 0x8, 0x5, 0x6000000000000, 0x4, 0x5, 0x0, 0x3, 0x0, 0x3}, r4, 0x9, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000340)={0x0, 0x80, 0x2, 0x83, 0x1, 0x7, 0x0, 0x1f, 0x9ec17fc7a3e840c7, 0xc, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x9, 0x4, @perf_bp={&(0x7f0000000240), 0x1}, 0x404, 0x7, 0x3, 0x6, 0x800, 0x9, 0x3, 0x0, 0x7ff, 0x0, 0x9}, r4, 0x8, r2, 0x9) fork() setxattr$trusted_overlay_upper(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180), &(0x7f00000001c0)={0x0, 0xfb, 0x7a, 0x0, 0x2, "d54449275cb08faf62df87518e3ce16f", "9a61b461b0c63151b954990036d5e0163ceb48c6a801bb019e9e6fa7196a9372f804b9e9ca3fb3d85d1985d31346bbd5fd02b1c8223bf6388eb75498623e38ff88a99c5ce38698a32306b7d4e4b0fd4b03bfa568df17a42f725c6c33046b38b6e4a713dde1"}, 0x7a, 0x3) socket$nl_audit(0x10, 0x3, 0x9) chroot(&(0x7f0000000080)='./file1\x00') sendmsg$inet(r3, &(0x7f0000000780)={&(0x7f0000000000)={0x2, 0x0, @local}, 0x10, &(0x7f00000003c0)=[{&(0x7f0000000300)="6fb9", 0xffeb}], 0x1, &(0x7f0000000700)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @remote, @broadcast}}}], 0x20}, 0x0) 06:17:56 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="200000006602000019000000900100000f000000000000000100000005000000000004000040000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000001000018000000c28500002b02", 0x66, 0x400}, {&(0x7f0000010100)="000000000000000000000000e8f7d2e8feeb4bf889ba053b02420ff8010040", 0x1f, 0x4e0}], 0x0, &(0x7f0000000140)=ANY=[]) 06:17:56 executing program 6: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x100000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="0a0000000002000019000000900100000f000000000000000100000005000000000004000040000020000000dbf4655fdbf465", 0x33, 0x400}, {&(0x7f0000010100)="000000000000000000000000e8f7d2e8feeb4bf889ba053b02420ff8010040", 0x1f, 0x4e0}], 0x0, &(0x7f0000000140)=ANY=[]) 06:17:56 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x100000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="209a08000002000019000000900100000f000000000000000100000005000000000004000040000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000001000018000000c28500002b02", 0x66, 0x400}, {&(0x7f0000010100)="000000000000000000000000e8f7d2e8feeb4bf889ba053b02420ff8010040", 0x1f, 0x4e0}], 0x0, &(0x7f0000000140)=ANY=[]) 06:17:56 executing program 4: r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_genetlink_get_family_id$ethtool(&(0x7f0000000040), 0xffffffffffffffff) syz_genetlink_get_family_id$ethtool(&(0x7f0000000100), 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_PAUSE_SET(0xffffffffffffffff, &(0x7f0000000440)={0x0, 0x0, 0x0}, 0x0) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000080)='smaps\x00') pread64(r1, &(0x7f00000000c0)=""/98, 0x62, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x7fffffff) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(0xffffffffffffffff, 0xc0189374, &(0x7f0000000240)={{0x1, 0x1, 0x18, r0, {0x8}}, './file0\x00'}) dup3(0xffffffffffffffff, r1, 0x0) r2 = socket$inet_icmp_raw(0x2, 0x3, 0x1) syz_genetlink_get_family_id$ethtool(&(0x7f0000000180), r1) socket$nl_audit(0x10, 0x3, 0x9) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000040)={'wlan1\x00', 0x0}) sendmsg$inet(r2, &(0x7f0000000780)={&(0x7f0000000000)={0x2, 0x0, @local}, 0x10, &(0x7f00000003c0)=[{&(0x7f0000000300)="6fb9", 0xffeb}], 0x1, &(0x7f0000000700)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {r3, @remote, @broadcast}}}], 0x20}, 0x0) r4 = socket$inet_icmp_raw(0x2, 0x3, 0x1) socket$nl_audit(0x10, 0x3, 0x9) sendmsg$inet(r4, &(0x7f0000000780)={&(0x7f0000000000)={0x2, 0x0, @local}, 0x10, &(0x7f00000003c0)=[{&(0x7f0000000300)="6fb9", 0xffeb}], 0x1, &(0x7f0000000700)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @remote, @broadcast}}}], 0x20}, 0x0) sendmsg$ETHTOOL_MSG_LINKINFO_GET(r1, &(0x7f0000000200)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f00000001c0)={&(0x7f0000000340)=ANY=[@ANYBLOB='@\x00\x00\x00', @ANYBLOB="000427bd7000ffdbdf25020000002c00018008000100", @ANYRES32=0x0, @ANYBLOB='\b\x00C\x00\x00\x00\x00\x00\b\x00!\x00', @ANYRES32=r3, @ANYBLOB="d5b921cac279671a02c4d90ed2cbc802c00000009852d9e901fb17000000000000", @ANYRES32=0x0, @ANYBLOB], 0x40}, 0x1, 0x0, 0x0, 0x4}, 0xd0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000480), 0x1}, 0x603}, 0x0, 0xffffffefffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000040)=[{&(0x7f0000010000)="601c6d6b646f736689254300080120000400004000f8000020004000030000000000000001", 0x25}, {0x0, 0x0, 0x10000}], 0x0, &(0x7f0000000040)=ANY=[]) 06:17:56 executing program 3: r0 = getpid() ioprio_get$pid(0x2, r0) r1 = getpid() ioprio_get$pid(0x2, r1) syz_mount_image$vfat(0x0, &(0x7f0000000040)='./file1\x00', 0x0, 0x0, &(0x7f00000000c0), 0x2002000, &(0x7f0000000400)=ANY=[@ANYRES16, @ANYBLOB="72e1af808ba473e6f37c85b113d8c4d9e1de4ed2968d2e01108c4795a941d14f6927393c8c3c458dd7454900d48719912efc18d580a8f841234284071012d7d5020eb5d56dc1ba5f1048adac4b928bf6cfd663b4cab43637cb979a9199a0246ec02345161783bc79585902603d7062084f05b744e31fcb4c3e81f3becabb7ad1fa5783f5e5e60ae912102fe8df0536bd074c03bd33742f35c5c44b5c3c9d693114367b7d966e"]) chdir(&(0x7f0000000140)='./file0\x00') ptrace$getenv(0x4201, r0, 0xfff, &(0x7f00000000c0)) openat(0xffffffffffffff9c, &(0x7f0000000000)='./file2\x00', 0x40c2, 0x0) r2 = perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x6, 0x0, 0xe}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r4 = fork() perf_event_open(&(0x7f0000000540)={0x4, 0x80, 0xeb, 0x0, 0x20, 0x0, 0x0, 0x2, 0x2820, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, @perf_config_ext={0xdc, 0x40}, 0x40000, 0x3, 0x8, 0x5, 0x6000000000000, 0x4, 0x5, 0x0, 0x3, 0x0, 0x3}, r4, 0x9, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000340)={0x0, 0x80, 0x2, 0x83, 0x1, 0x7, 0x0, 0x1f, 0x9ec17fc7a3e840c7, 0xc, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x9, 0x4, @perf_bp={&(0x7f0000000240), 0x1}, 0x404, 0x7, 0x3, 0x6, 0x800, 0x9, 0x3, 0x0, 0x7ff, 0x0, 0x9}, r4, 0x8, r2, 0x9) fork() setxattr$trusted_overlay_upper(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180), &(0x7f00000001c0)={0x0, 0xfb, 0x7a, 0x0, 0x2, "d54449275cb08faf62df87518e3ce16f", "9a61b461b0c63151b954990036d5e0163ceb48c6a801bb019e9e6fa7196a9372f804b9e9ca3fb3d85d1985d31346bbd5fd02b1c8223bf6388eb75498623e38ff88a99c5ce38698a32306b7d4e4b0fd4b03bfa568df17a42f725c6c33046b38b6e4a713dde1"}, 0x7a, 0x3) socket$nl_audit(0x10, 0x3, 0x9) chroot(&(0x7f0000000080)='./file1\x00') sendmsg$inet(r3, &(0x7f0000000780)={&(0x7f0000000000)={0x2, 0x0, @local}, 0x10, &(0x7f00000003c0)=[{&(0x7f0000000300)="6fb9", 0xffeb}], 0x1, &(0x7f0000000700)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @remote, @broadcast}}}], 0x20}, 0x0) 06:17:56 executing program 1: pipe(&(0x7f0000000340)={0xffffffffffffffff}) pread64(r0, &(0x7f0000000440)=""/95, 0x5f, 0x6) execveat(r0, &(0x7f0000000080)='./file0\x00', &(0x7f00000001c0)=[&(0x7f00000000c0)='\x00', &(0x7f0000000180)='\x00'], &(0x7f0000000400)=[&(0x7f0000000200)='/dev/zero\x00', &(0x7f0000000240)='/dev/zero\x00', &(0x7f0000000300)='/dev/zero\x00'], 0x1000) socket$inet(0x2, 0x1, 0x0) perf_event_open(&(0x7f0000000100)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x22420, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ptrace$setopts(0x4200, 0x0, 0x5, 0x100050) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000004c00)={0xc0002100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) gettid() r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000), 0x380, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000000)='net/udp6\x00') read$hiddev(r2, &(0x7f0000001140)=""/212, 0xd4) fchmodat(r2, &(0x7f00000004c0)='./file0\x00', 0x0) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(r1, 0xc018937c, &(0x7f0000000380)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32=r0, @ANYBLOB="00000000000000002e2f66696cee88"]) ioctl$TIOCSSOFTCAR(r3, 0x541a, &(0x7f00000003c0)=0x6) waitid$P_PIDFD(0x3, r1, &(0x7f0000000500), 0x2, &(0x7f0000000580)) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(r1, 0xc0189372, &(0x7f0000000040)={{0x1, 0x1, 0x18, r2, {0xffff}}, './file0\x00'}) [ 2592.422974] loop5: detected capacity change from 0 to 2048 [ 2592.423930] loop4: detected capacity change from 0 to 256 [ 2592.424589] loop6: detected capacity change from 0 to 2048 [ 2592.425688] loop7: detected capacity change from 0 to 2048 [ 2592.445222] EXT4-fs (loop6): VFS: Can't find ext4 filesystem [ 2592.446689] FAT-fs (loop4): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) [ 2592.447760] EXT4-fs (loop5): inodes count not valid: 563744 vs 32 [ 2592.451776] EXT4-fs (loop7): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 2592.453263] EXT4-fs (loop7): group descriptors corrupted! [ 2592.468889] loop5: detected capacity change from 0 to 2048 06:17:56 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000fe02000019000000900100000f000000000000000100000005000000000004000040000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000001000018000000c28500002b02", 0x66, 0x400}, {&(0x7f0000010100)="000000000000000000000000e8f7d2e8feeb4bf889ba053b02420ff8010040", 0x1f, 0x4e0}], 0x0, &(0x7f0000000140)=ANY=[]) [ 2592.497524] loop7: detected capacity change from 0 to 2048 [ 2592.507077] EXT4-fs (loop5): inodes count not valid: 563744 vs 32 [ 2592.527606] EXT4-fs (loop7): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 2592.529122] EXT4-fs (loop7): group descriptors corrupted! 06:17:56 executing program 4: r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_genetlink_get_family_id$ethtool(&(0x7f0000000040), 0xffffffffffffffff) syz_genetlink_get_family_id$ethtool(&(0x7f0000000100), 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_PAUSE_SET(0xffffffffffffffff, &(0x7f0000000440)={0x0, 0x0, 0x0}, 0x0) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000080)='smaps\x00') pread64(r1, &(0x7f00000000c0)=""/98, 0x62, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x7fffffff) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(0xffffffffffffffff, 0xc0189374, &(0x7f0000000240)={{0x1, 0x1, 0x18, r0, {0x8}}, './file0\x00'}) dup3(0xffffffffffffffff, r1, 0x0) r2 = socket$inet_icmp_raw(0x2, 0x3, 0x1) syz_genetlink_get_family_id$ethtool(&(0x7f0000000180), r1) socket$nl_audit(0x10, 0x3, 0x9) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000040)={'wlan1\x00', 0x0}) sendmsg$inet(r2, &(0x7f0000000780)={&(0x7f0000000000)={0x2, 0x0, @local}, 0x10, &(0x7f00000003c0)=[{&(0x7f0000000300)="6fb9", 0xffeb}], 0x1, &(0x7f0000000700)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {r3, @remote, @broadcast}}}], 0x20}, 0x0) r4 = socket$inet_icmp_raw(0x2, 0x3, 0x1) socket$nl_audit(0x10, 0x3, 0x9) sendmsg$inet(r4, &(0x7f0000000780)={&(0x7f0000000000)={0x2, 0x0, @local}, 0x10, &(0x7f00000003c0)=[{&(0x7f0000000300)="6fb9", 0xffeb}], 0x1, &(0x7f0000000700)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @remote, @broadcast}}}], 0x20}, 0x0) sendmsg$ETHTOOL_MSG_LINKINFO_GET(r1, &(0x7f0000000200)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f00000001c0)={&(0x7f0000000340)=ANY=[@ANYBLOB='@\x00\x00\x00', @ANYBLOB="000427bd7000ffdbdf25020000002c00018008000100", @ANYRES32=0x0, @ANYBLOB='\b\x00C\x00\x00\x00\x00\x00\b\x00!\x00', @ANYRES32=r3, @ANYBLOB="d5b921cac279671a02c4d90ed2cbc802c00000009852d9e901fb17000000000000", @ANYRES32=0x0, @ANYBLOB], 0x40}, 0x1, 0x0, 0x0, 0x4}, 0xd0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000480), 0x1}, 0x603}, 0x0, 0xffffffefffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000040)=[{&(0x7f0000010000)="601c6d6b646f736689254300080120000400004000f8000020004000030000000000000001", 0x25}, {0x0, 0x0, 0x10000}], 0x0, &(0x7f0000000040)=ANY=[]) 06:17:56 executing program 1: pipe(&(0x7f0000000340)={0xffffffffffffffff}) pread64(r0, &(0x7f0000000440)=""/95, 0x5f, 0x6) execveat(r0, &(0x7f0000000080)='./file0\x00', &(0x7f00000001c0)=[&(0x7f00000000c0)='\x00', &(0x7f0000000180)='\x00'], &(0x7f0000000400)=[&(0x7f0000000200)='/dev/zero\x00', &(0x7f0000000240)='/dev/zero\x00', &(0x7f0000000300)='/dev/zero\x00'], 0x1000) socket$inet(0x2, 0x1, 0x0) perf_event_open(&(0x7f0000000100)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x22420, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ptrace$setopts(0x4200, 0x0, 0x5, 0x100050) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000004c00)={0xc0002100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) gettid() r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000), 0x380, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000000)='net/udp6\x00') read$hiddev(r2, &(0x7f0000001140)=""/212, 0xd4) fchmodat(r2, &(0x7f00000004c0)='./file0\x00', 0x0) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(r1, 0xc018937c, &(0x7f0000000380)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32=r0, @ANYBLOB="00000000000000002e2f66696cee88"]) ioctl$TIOCSSOFTCAR(r3, 0x541a, &(0x7f00000003c0)=0x6) waitid$P_PIDFD(0x3, r1, &(0x7f0000000500), 0x2, &(0x7f0000000580)) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(r1, 0xc0189372, &(0x7f0000000040)={{0x1, 0x1, 0x18, r2, {0xffff}}, './file0\x00'}) 06:17:56 executing program 6: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x100000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="0a0000000002000019000000900100000f000000000000000100000005000000000004000040000020000000dbf4655fdbf465", 0x33, 0x400}, {&(0x7f0000010100)="000000000000000000000000e8f7d2e8feeb4bf889ba053b02420ff8010040", 0x1f, 0x4e0}], 0x0, &(0x7f0000000140)=ANY=[]) [ 2592.636313] loop4: detected capacity change from 0 to 256 [ 2592.658884] FAT-fs (loop4): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) [ 2592.811212] loop6: detected capacity change from 0 to 2048 [ 2592.820956] EXT4-fs (loop6): VFS: Can't find ext4 filesystem 06:18:15 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x100000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="209b08000002000019000000900100000f000000000000000100000005000000000004000040000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000001000018000000c28500002b02", 0x66, 0x400}, {&(0x7f0000010100)="000000000000000000000000e8f7d2e8feeb4bf889ba053b02420ff8010040", 0x1f, 0x4e0}], 0x0, &(0x7f0000000140)=ANY=[]) [ 2610.756908] loop7: detected capacity change from 0 to 2048 06:18:15 executing program 6: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x100000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="0a0000000002000019000000900100000f000000000000000100000005000000000004000040000020000000dbf4655fdbf465", 0x33, 0x400}, {&(0x7f0000010100)="000000000000000000000000e8f7d2e8feeb4bf889ba053b02420ff8010040", 0x1f, 0x4e0}], 0x0, &(0x7f0000000140)=ANY=[]) 06:18:15 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000003000019000000900100000f000000000000000100000005000000000004000040000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000001000018000000c28500002b02", 0x66, 0x400}, {&(0x7f0000010100)="000000000000000000000000e8f7d2e8feeb4bf889ba053b02420ff8010040", 0x1f, 0x4e0}], 0x0, &(0x7f0000000140)=ANY=[]) 06:18:15 executing program 7: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x100000, 0x46, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000100000005000000000004000040000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000001000018000000c28500002b02", 0x66, 0x400}, {&(0x7f0000010100)="000000000000000000000000e8f7d2e8feeb4bf889ba053b02420ff8010040", 0x1f, 0x4e0}], 0x0, &(0x7f0000000140)=ANY=[]) 06:18:15 executing program 3: r0 = getpid() ioprio_get$pid(0x2, r0) r1 = getpid() ioprio_get$pid(0x2, r1) syz_mount_image$vfat(0x0, &(0x7f0000000040)='./file1\x00', 0x0, 0x0, &(0x7f00000000c0), 0x2002000, &(0x7f0000000400)=ANY=[@ANYRES16, @ANYBLOB="72e1af808ba473e6f37c85b113d8c4d9e1de4ed2968d2e01108c4795a941d14f6927393c8c3c458dd7454900d48719912efc18d580a8f841234284071012d7d5020eb5d56dc1ba5f1048adac4b928bf6cfd663b4cab43637cb979a9199a0246ec02345161783bc79585902603d7062084f05b744e31fcb4c3e81f3becabb7ad1fa5783f5e5e60ae912102fe8df0536bd074c03bd33742f35c5c44b5c3c9d693114367b7d966e"]) chdir(&(0x7f0000000140)='./file0\x00') ptrace$getenv(0x4201, r0, 0xfff, &(0x7f00000000c0)) openat(0xffffffffffffff9c, &(0x7f0000000000)='./file2\x00', 0x40c2, 0x0) r2 = perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x6, 0x0, 0xe}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r4 = fork() perf_event_open(&(0x7f0000000540)={0x4, 0x80, 0xeb, 0x0, 0x20, 0x0, 0x0, 0x2, 0x2820, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, @perf_config_ext={0xdc, 0x40}, 0x40000, 0x3, 0x8, 0x5, 0x6000000000000, 0x4, 0x5, 0x0, 0x3, 0x0, 0x3}, r4, 0x9, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000340)={0x0, 0x80, 0x2, 0x83, 0x1, 0x7, 0x0, 0x1f, 0x9ec17fc7a3e840c7, 0xc, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x9, 0x4, @perf_bp={&(0x7f0000000240), 0x1}, 0x404, 0x7, 0x3, 0x6, 0x800, 0x9, 0x3, 0x0, 0x7ff, 0x0, 0x9}, r4, 0x8, r2, 0x9) fork() setxattr$trusted_overlay_upper(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180), &(0x7f00000001c0)={0x0, 0xfb, 0x7a, 0x0, 0x2, "d54449275cb08faf62df87518e3ce16f", "9a61b461b0c63151b954990036d5e0163ceb48c6a801bb019e9e6fa7196a9372f804b9e9ca3fb3d85d1985d31346bbd5fd02b1c8223bf6388eb75498623e38ff88a99c5ce38698a32306b7d4e4b0fd4b03bfa568df17a42f725c6c33046b38b6e4a713dde1"}, 0x7a, 0x3) socket$nl_audit(0x10, 0x3, 0x9) chroot(&(0x7f0000000080)='./file1\x00') sendmsg$inet(r3, &(0x7f0000000780)={&(0x7f0000000000)={0x2, 0x0, @local}, 0x10, &(0x7f00000003c0)=[{&(0x7f0000000300)="6fb9", 0xffeb}], 0x1, &(0x7f0000000700)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @remote, @broadcast}}}], 0x20}, 0x0) 06:18:15 executing program 0: pipe(&(0x7f0000000340)={0xffffffffffffffff}) pread64(r0, &(0x7f0000000440)=""/95, 0x5f, 0x6) execveat(r0, &(0x7f0000000080)='./file0\x00', &(0x7f00000001c0)=[&(0x7f00000000c0)='\x00', &(0x7f0000000180)='\x00'], &(0x7f0000000400)=[&(0x7f0000000200)='/dev/zero\x00', &(0x7f0000000240)='/dev/zero\x00', &(0x7f0000000300)='/dev/zero\x00'], 0x1000) socket$inet(0x2, 0x1, 0x0) perf_event_open(&(0x7f0000000100)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ptrace$setopts(0x4200, 0x0, 0x5, 0x100050) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000004c00)={0xc0002100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) gettid() r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000), 0x380, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000000)='net/udp6\x00') read$hiddev(r2, &(0x7f0000001140)=""/212, 0xd4) fchmodat(r2, &(0x7f00000004c0)='./file0\x00', 0x0) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(r1, 0xc018937c, &(0x7f0000000380)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32=r0, @ANYBLOB="00000000000000002e2f66696cee8816"]) ioctl$TIOCSSOFTCAR(r3, 0x541a, &(0x7f00000003c0)=0x6) waitid$P_PIDFD(0x3, r1, &(0x7f0000000500), 0x2, &(0x7f0000000580)) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(r1, 0xc0189372, &(0x7f0000000040)={{0x1, 0x1, 0x18, r2, {0xffff}}, './file0\x00'}) 06:18:15 executing program 4: r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_genetlink_get_family_id$ethtool(&(0x7f0000000040), 0xffffffffffffffff) syz_genetlink_get_family_id$ethtool(&(0x7f0000000100), 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_PAUSE_SET(0xffffffffffffffff, &(0x7f0000000440)={0x0, 0x0, 0x0}, 0x0) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000080)='smaps\x00') pread64(r1, &(0x7f00000000c0)=""/98, 0x62, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x7fffffff) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(0xffffffffffffffff, 0xc0189374, &(0x7f0000000240)={{0x1, 0x1, 0x18, r0, {0x8}}, './file0\x00'}) dup3(0xffffffffffffffff, r1, 0x0) r2 = socket$inet_icmp_raw(0x2, 0x3, 0x1) syz_genetlink_get_family_id$ethtool(&(0x7f0000000180), r1) socket$nl_audit(0x10, 0x3, 0x9) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000040)={'wlan1\x00', 0x0}) sendmsg$inet(r2, &(0x7f0000000780)={&(0x7f0000000000)={0x2, 0x0, @local}, 0x10, &(0x7f00000003c0)=[{&(0x7f0000000300)="6fb9", 0xffeb}], 0x1, &(0x7f0000000700)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {r3, @remote, @broadcast}}}], 0x20}, 0x0) r4 = socket$inet_icmp_raw(0x2, 0x3, 0x1) socket$nl_audit(0x10, 0x3, 0x9) sendmsg$inet(r4, &(0x7f0000000780)={&(0x7f0000000000)={0x2, 0x0, @local}, 0x10, &(0x7f00000003c0)=[{&(0x7f0000000300)="6fb9", 0xffeb}], 0x1, &(0x7f0000000700)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @remote, @broadcast}}}], 0x20}, 0x0) sendmsg$ETHTOOL_MSG_LINKINFO_GET(r1, &(0x7f0000000200)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f00000001c0)={&(0x7f0000000340)=ANY=[@ANYBLOB='@\x00\x00\x00', @ANYRES16, @ANYBLOB="000427bd7000ffdbdf25020000002c00018008000100", @ANYRES32=0x0, @ANYBLOB='\b\x00C\x00\x00\x00\x00\x00\b\x00!\x00', @ANYRES32=r3, @ANYBLOB="d5b921cac279671a02c4d90ed2cbc802c00000009852d9e901fb17000000000000", @ANYRES32=0x0, @ANYBLOB], 0x40}, 0x1, 0x0, 0x0, 0x4}, 0xd0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000480), 0x1}, 0x603}, 0x0, 0xffffffefffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000040)=[{&(0x7f0000010000)="601c6d6b646f736689254300080120000400004000f8000020004000030000000000000001", 0x25}, {0x0, 0x0, 0x10000}], 0x0, &(0x7f0000000040)=ANY=[]) 06:18:15 executing program 1: pipe(&(0x7f0000000340)={0xffffffffffffffff}) pread64(r0, &(0x7f0000000440)=""/95, 0x5f, 0x6) execveat(r0, &(0x7f0000000080)='./file0\x00', &(0x7f00000001c0)=[&(0x7f00000000c0)='\x00', &(0x7f0000000180)='\x00'], &(0x7f0000000400)=[&(0x7f0000000200)='/dev/zero\x00', &(0x7f0000000240)='/dev/zero\x00', &(0x7f0000000300)='/dev/zero\x00'], 0x1000) socket$inet(0x2, 0x1, 0x0) perf_event_open(&(0x7f0000000100)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x22420, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ptrace$setopts(0x4200, 0x0, 0x5, 0x100050) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000004c00)={0xc0002100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) gettid() r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000), 0x380, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000000)='net/udp6\x00') read$hiddev(r2, &(0x7f0000001140)=""/212, 0xd4) fchmodat(r2, &(0x7f00000004c0)='./file0\x00', 0x0) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(r1, 0xc018937c, &(0x7f0000000380)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32=r0, @ANYBLOB="00000000000000002e2f66696cee88"]) ioctl$TIOCSSOFTCAR(r3, 0x541a, &(0x7f00000003c0)=0x6) waitid$P_PIDFD(0x3, r1, &(0x7f0000000500), 0x2, &(0x7f0000000580)) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(r1, 0xc0189372, &(0x7f0000000040)={{0x1, 0x1, 0x18, r2, {0xffff}}, './file0\x00'}) [ 2610.796881] EXT4-fs (loop7): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 2610.797899] EXT4-fs (loop7): group descriptors corrupted! [ 2610.800804] loop5: detected capacity change from 0 to 2048 [ 2610.804408] EXT4-fs (loop5): inodes count not valid: 564000 vs 32 [ 2610.818072] loop6: detected capacity change from 0 to 2048 [ 2610.822941] loop7: detected capacity change from 0 to 2048 [ 2610.826125] loop4: detected capacity change from 0 to 256 [ 2610.828199] loop5: detected capacity change from 0 to 2048 [ 2610.839835] EXT4-fs (loop7): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 2610.840616] EXT4-fs (loop7): group descriptors corrupted! [ 2610.841291] EXT4-fs (loop5): inodes count not valid: 564000 vs 32 [ 2610.841894] EXT4-fs (loop6): VFS: Can't find ext4 filesystem [ 2610.870789] FAT-fs (loop4): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) 06:18:15 executing program 7: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x100000, 0x7fe, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000100000005000000000004000040000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000001000018000000c28500002b02", 0x66, 0x400}, {&(0x7f0000010100)="000000000000000000000000e8f7d2e8feeb4bf889ba053b02420ff8010040", 0x1f, 0x4e0}], 0x0, &(0x7f0000000140)=ANY=[]) 06:18:15 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x100000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="200009000002000019000000900100000f000000000000000100000005000000000004000040000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000001000018000000c28500002b02", 0x66, 0x400}, {&(0x7f0000010100)="000000000000000000000000e8f7d2e8feeb4bf889ba053b02420ff8010040", 0x1f, 0x4e0}], 0x0, &(0x7f0000000140)=ANY=[]) 06:18:15 executing program 6: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x100000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="0a0000000002000019000000900100000f000000000000000100000005000000000004000040000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001", 0x4d, 0x400}, {&(0x7f0000010100)="000000000000000000000000e8f7d2e8feeb4bf889ba053b02420ff8010040", 0x1f, 0x4e0}], 0x0, &(0x7f0000000140)=ANY=[]) 06:18:15 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000006000019000000900100000f000000000000000100000005000000000004000040000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000001000018000000c28500002b02", 0x66, 0x400}, {&(0x7f0000010100)="000000000000000000000000e8f7d2e8feeb4bf889ba053b02420ff8010040", 0x1f, 0x4e0}], 0x0, &(0x7f0000000140)=ANY=[]) [ 2610.999786] loop5: detected capacity change from 0 to 2048 [ 2611.004991] loop6: detected capacity change from 0 to 2048 [ 2611.015054] EXT4-fs (loop5): inodes count not valid: 589856 vs 32 [ 2611.022052] EXT4-fs (loop6): invalid first ino: 0 [ 2611.030018] loop5: detected capacity change from 0 to 2048 [ 2611.046091] EXT4-fs (loop5): inodes count not valid: 589856 vs 32 [ 2611.057756] loop7: detected capacity change from 0 to 2048 [ 2611.064685] EXT4-fs (loop7): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 2611.065482] EXT4-fs (loop7): group descriptors corrupted! 06:18:15 executing program 4: r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_genetlink_get_family_id$ethtool(&(0x7f0000000040), 0xffffffffffffffff) syz_genetlink_get_family_id$ethtool(&(0x7f0000000100), 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_PAUSE_SET(0xffffffffffffffff, &(0x7f0000000440)={0x0, 0x0, 0x0}, 0x0) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000080)='smaps\x00') pread64(r1, &(0x7f00000000c0)=""/98, 0x62, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x7fffffff) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(0xffffffffffffffff, 0xc0189374, &(0x7f0000000240)={{0x1, 0x1, 0x18, r0, {0x8}}, './file0\x00'}) dup3(0xffffffffffffffff, r1, 0x0) r2 = socket$inet_icmp_raw(0x2, 0x3, 0x1) syz_genetlink_get_family_id$ethtool(&(0x7f0000000180), r1) socket$nl_audit(0x10, 0x3, 0x9) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000040)={'wlan1\x00', 0x0}) sendmsg$inet(r2, &(0x7f0000000780)={&(0x7f0000000000)={0x2, 0x0, @local}, 0x10, &(0x7f00000003c0)=[{&(0x7f0000000300)="6fb9", 0xffeb}], 0x1, &(0x7f0000000700)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {r3, @remote, @broadcast}}}], 0x20}, 0x0) r4 = socket$inet_icmp_raw(0x2, 0x3, 0x1) socket$nl_audit(0x10, 0x3, 0x9) sendmsg$inet(r4, &(0x7f0000000780)={&(0x7f0000000000)={0x2, 0x0, @local}, 0x10, &(0x7f00000003c0)=[{&(0x7f0000000300)="6fb9", 0xffeb}], 0x1, &(0x7f0000000700)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @remote, @broadcast}}}], 0x20}, 0x0) sendmsg$ETHTOOL_MSG_LINKINFO_GET(r1, &(0x7f0000000200)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f00000001c0)={&(0x7f0000000340)=ANY=[@ANYBLOB='@\x00\x00\x00', @ANYRES16, @ANYBLOB="000427bd7000ffdbdf25020000002c00018008000100", @ANYRES32=0x0, @ANYBLOB='\b\x00C\x00\x00\x00\x00\x00\b\x00!\x00', @ANYRES32=r3, @ANYBLOB="d5b921cac279671a02c4d90ed2cbc802c00000009852d9e901fb17000000000000", @ANYRES32=0x0, @ANYBLOB], 0x40}, 0x1, 0x0, 0x0, 0x4}, 0xd0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000480), 0x1}, 0x603}, 0x0, 0xffffffefffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000040)=[{&(0x7f0000010000)="601c6d6b646f736689254300080120000400004000f8000020004000030000000000000001", 0x25}, {0x0, 0x0, 0x10000}], 0x0, &(0x7f0000000040)=ANY=[]) 06:18:15 executing program 6: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x100000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="0a0000000002000019000000900100000f000000000000000100000005000000000004000040000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001", 0x4d, 0x400}, {&(0x7f0000010100)="000000000000000000000000e8f7d2e8feeb4bf889ba053b02420ff8010040", 0x1f, 0x4e0}], 0x0, &(0x7f0000000140)=ANY=[]) 06:18:15 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x100000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="20000a000002000019000000900100000f000000000000000100000005000000000004000040000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000001000018000000c28500002b02", 0x66, 0x400}, {&(0x7f0000010100)="000000000000000000000000e8f7d2e8feeb4bf889ba053b02420ff8010040", 0x1f, 0x4e0}], 0x0, &(0x7f0000000140)=ANY=[]) [ 2611.156468] loop6: detected capacity change from 0 to 2048 [ 2611.170332] EXT4-fs (loop6): invalid first ino: 0 [ 2611.179155] loop5: detected capacity change from 0 to 2048 [ 2611.204656] loop4: detected capacity change from 0 to 256 [ 2611.210595] EXT4-fs (loop5): inodes count not valid: 655392 vs 32 [ 2611.226704] loop5: detected capacity change from 0 to 2048 [ 2611.256364] FAT-fs (loop4): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) [ 2611.258067] EXT4-fs (loop5): inodes count not valid: 655392 vs 32 06:18:31 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000007000019000000900100000f000000000000000100000005000000000004000040000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000001000018000000c28500002b02", 0x66, 0x400}, {&(0x7f0000010100)="000000000000000000000000e8f7d2e8feeb4bf889ba053b02420ff8010040", 0x1f, 0x4e0}], 0x0, &(0x7f0000000140)=ANY=[]) 06:18:31 executing program 0: pipe(&(0x7f0000000340)={0xffffffffffffffff}) pread64(r0, &(0x7f0000000440)=""/95, 0x5f, 0x6) execveat(r0, &(0x7f0000000080)='./file0\x00', &(0x7f00000001c0)=[&(0x7f00000000c0)='\x00', &(0x7f0000000180)='\x00'], &(0x7f0000000400)=[&(0x7f0000000200)='/dev/zero\x00', &(0x7f0000000240)='/dev/zero\x00', &(0x7f0000000300)='/dev/zero\x00'], 0x1000) socket$inet(0x2, 0x1, 0x0) perf_event_open(&(0x7f0000000100)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x22420, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ptrace$setopts(0x4200, 0x0, 0x5, 0x100050) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000004c00)={0xc0002100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) gettid() r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000), 0x380, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000000)='net/udp6\x00') read$hiddev(r2, &(0x7f0000001140)=""/212, 0xd4) fchmodat(r2, &(0x7f00000004c0)='./file0\x00', 0x0) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(r1, 0xc018937c, &(0x7f0000000380)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32=r0, @ANYBLOB="00000000000000002e2f66696cee88"]) ioctl$TIOCSSOFTCAR(r3, 0x541a, &(0x7f00000003c0)=0x6) waitid$P_PIDFD(0x3, r1, &(0x7f0000000500), 0x2, &(0x7f0000000580)) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(r1, 0xc0189372, &(0x7f0000000040)={{0x1, 0x1, 0x18, r2, {0xffff}}, './file0\x00'}) 06:18:31 executing program 4: r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_genetlink_get_family_id$ethtool(&(0x7f0000000040), 0xffffffffffffffff) syz_genetlink_get_family_id$ethtool(&(0x7f0000000100), 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_PAUSE_SET(0xffffffffffffffff, &(0x7f0000000440)={0x0, 0x0, 0x0}, 0x0) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000080)='smaps\x00') pread64(r1, &(0x7f00000000c0)=""/98, 0x62, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x7fffffff) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(0xffffffffffffffff, 0xc0189374, &(0x7f0000000240)={{0x1, 0x1, 0x18, r0, {0x8}}, './file0\x00'}) dup3(0xffffffffffffffff, r1, 0x0) r2 = socket$inet_icmp_raw(0x2, 0x3, 0x1) syz_genetlink_get_family_id$ethtool(&(0x7f0000000180), r1) socket$nl_audit(0x10, 0x3, 0x9) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000040)={'wlan1\x00', 0x0}) sendmsg$inet(r2, &(0x7f0000000780)={&(0x7f0000000000)={0x2, 0x0, @local}, 0x10, &(0x7f00000003c0)=[{&(0x7f0000000300)="6fb9", 0xffeb}], 0x1, &(0x7f0000000700)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {r3, @remote, @broadcast}}}], 0x20}, 0x0) r4 = socket$inet_icmp_raw(0x2, 0x3, 0x1) socket$nl_audit(0x10, 0x3, 0x9) sendmsg$inet(r4, &(0x7f0000000780)={&(0x7f0000000000)={0x2, 0x0, @local}, 0x10, &(0x7f00000003c0)=[{&(0x7f0000000300)="6fb9", 0xffeb}], 0x1, &(0x7f0000000700)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @remote, @broadcast}}}], 0x20}, 0x0) sendmsg$ETHTOOL_MSG_LINKINFO_GET(r1, &(0x7f0000000200)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f00000001c0)={&(0x7f0000000340)=ANY=[@ANYBLOB='@\x00\x00\x00', @ANYRES16, @ANYBLOB="000427bd7000ffdbdf25020000002c00018008000100", @ANYRES32=0x0, @ANYBLOB='\b\x00C\x00\x00\x00\x00\x00\b\x00!\x00', @ANYRES32=r3, @ANYBLOB="d5b921cac279671a02c4d90ed2cbc802c00000009852d9e901fb17000000000000", @ANYRES32=0x0, @ANYBLOB], 0x40}, 0x1, 0x0, 0x0, 0x4}, 0xd0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000480), 0x1}, 0x603}, 0x0, 0xffffffefffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000040)=[{&(0x7f0000010000)="601c6d6b646f736689254300080120000400004000f8000020004000030000000000000001", 0x25}, {0x0, 0x0, 0x10000}], 0x0, &(0x7f0000000040)=ANY=[]) 06:18:31 executing program 7: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x100000, 0xff01, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000100000005000000000004000040000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000001000018000000c28500002b02", 0x66, 0x400}, {&(0x7f0000010100)="000000000000000000000000e8f7d2e8feeb4bf889ba053b02420ff8010040", 0x1f, 0x4e0}], 0x0, &(0x7f0000000140)=ANY=[]) 06:18:31 executing program 1: pipe(&(0x7f0000000340)={0xffffffffffffffff}) pread64(r0, &(0x7f0000000440)=""/95, 0x5f, 0x6) execveat(r0, &(0x7f0000000080)='./file0\x00', &(0x7f00000001c0)=[&(0x7f00000000c0)='\x00', &(0x7f0000000180)='\x00'], &(0x7f0000000400)=[&(0x7f0000000200)='/dev/zero\x00', &(0x7f0000000240)='/dev/zero\x00', &(0x7f0000000300)='/dev/zero\x00'], 0x1000) socket$inet(0x2, 0x1, 0x0) perf_event_open(&(0x7f0000000100)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x22420, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ptrace$setopts(0x4200, 0x0, 0x5, 0x100050) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000004c00)={0xc0002100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) gettid() r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000), 0x380, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000000)='net/udp6\x00') read$hiddev(r2, &(0x7f0000001140)=""/212, 0xd4) fchmodat(r2, &(0x7f00000004c0)='./file0\x00', 0x0) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(r1, 0xc018937c, &(0x7f0000000380)=ANY=[@ANYBLOB="010000000100000018000000", @ANYBLOB="00000000000000002e2f66696cee8816"]) ioctl$TIOCSSOFTCAR(0xffffffffffffffff, 0x541a, &(0x7f00000003c0)=0x6) waitid$P_PIDFD(0x3, r1, &(0x7f0000000500), 0x2, &(0x7f0000000580)) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(r1, 0xc0189372, &(0x7f0000000040)={{0x1, 0x1, 0x18, r2, {0xffff}}, './file0\x00'}) 06:18:31 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x100000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="20000b000002000019000000900100000f000000000000000100000005000000000004000040000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000001000018000000c28500002b02", 0x66, 0x400}, {&(0x7f0000010100)="000000000000000000000000e8f7d2e8feeb4bf889ba053b02420ff8010040", 0x1f, 0x4e0}], 0x0, &(0x7f0000000140)=ANY=[]) 06:18:31 executing program 6: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x100000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="0a0000000002000019000000900100000f000000000000000100000005000000000004000040000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001", 0x4d, 0x400}, {&(0x7f0000010100)="000000000000000000000000e8f7d2e8feeb4bf889ba053b02420ff8010040", 0x1f, 0x4e0}], 0x0, &(0x7f0000000140)=ANY=[]) 06:18:31 executing program 3: r0 = getpid() ioprio_get$pid(0x2, r0) r1 = getpid() ioprio_get$pid(0x2, r1) syz_mount_image$vfat(0x0, &(0x7f0000000040)='./file1\x00', 0x0, 0x0, &(0x7f00000000c0), 0x2002000, &(0x7f0000000400)=ANY=[@ANYRES16, @ANYBLOB="72e1af808ba473e6f37c85b113d8c4d9e1de4ed2968d2e01108c4795a941d14f6927393c8c3c458dd7454900d48719912efc18d580a8f841234284071012d7d5020eb5d56dc1ba5f1048adac4b928bf6cfd663b4cab43637cb979a9199a0246ec02345161783bc79585902603d7062084f05b744e31fcb4c3e81f3becabb7ad1fa5783f5e5e60ae912102fe8df0536bd074c03bd33742f35c5c44b5c3c9d693114367b7d966e"]) chdir(&(0x7f0000000140)='./file0\x00') ptrace$getenv(0x4201, r0, 0xfff, &(0x7f00000000c0)) openat(0xffffffffffffff9c, &(0x7f0000000000)='./file2\x00', 0x40c2, 0x0) r2 = perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x6, 0x0, 0xe}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r4 = fork() perf_event_open(&(0x7f0000000540)={0x4, 0x80, 0xeb, 0x0, 0x20, 0x0, 0x0, 0x2, 0x2820, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, @perf_config_ext={0xdc, 0x40}, 0x40000, 0x3, 0x8, 0x5, 0x6000000000000, 0x4, 0x5, 0x0, 0x3, 0x0, 0x3}, r4, 0x9, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000340)={0x0, 0x80, 0x2, 0x83, 0x1, 0x7, 0x0, 0x1f, 0x9ec17fc7a3e840c7, 0xc, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x9, 0x4, @perf_bp={&(0x7f0000000240), 0x1}, 0x404, 0x7, 0x3, 0x6, 0x800, 0x9, 0x3, 0x0, 0x7ff, 0x0, 0x9}, r4, 0x8, r2, 0x9) fork() setxattr$trusted_overlay_upper(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180), &(0x7f00000001c0)={0x0, 0xfb, 0x7a, 0x0, 0x2, "d54449275cb08faf62df87518e3ce16f", "9a61b461b0c63151b954990036d5e0163ceb48c6a801bb019e9e6fa7196a9372f804b9e9ca3fb3d85d1985d31346bbd5fd02b1c8223bf6388eb75498623e38ff88a99c5ce38698a32306b7d4e4b0fd4b03bfa568df17a42f725c6c33046b38b6e4a713dde1"}, 0x7a, 0x3) socket$nl_audit(0x10, 0x3, 0x9) chroot(&(0x7f0000000080)='./file1\x00') sendmsg$inet(r3, &(0x7f0000000780)={&(0x7f0000000000)={0x2, 0x0, @local}, 0x10, &(0x7f00000003c0)=[{&(0x7f0000000300)="6fb9", 0xffeb}], 0x1, &(0x7f0000000700)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @remote, @broadcast}}}], 0x20}, 0x0) [ 2627.572597] loop5: detected capacity change from 0 to 2048 [ 2627.602056] loop6: detected capacity change from 0 to 2048 [ 2627.610455] EXT4-fs (loop6): invalid first ino: 0 [ 2627.628193] EXT4-fs (loop5): inodes count not valid: 720928 vs 32 [ 2627.647625] loop5: detected capacity change from 0 to 2048 [ 2627.674481] EXT4-fs (loop5): inodes count not valid: 720928 vs 32 06:18:32 executing program 6: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x100000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="0a0000000002000019000000900100000f000000000000000100000005000000000004000040000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010100)="000000000000000000000000e8f7d2e8feeb4bf889ba053b02420ff8010040", 0x1f, 0x4e0}], 0x0, &(0x7f0000000140)=ANY=[]) [ 2627.731577] loop4: detected capacity change from 0 to 256 [ 2627.768325] loop6: detected capacity change from 0 to 2048 06:18:32 executing program 1: pipe(&(0x7f0000000340)={0xffffffffffffffff}) pread64(r0, &(0x7f0000000440)=""/95, 0x5f, 0x6) execveat(r0, &(0x7f0000000080)='./file0\x00', &(0x7f00000001c0)=[&(0x7f00000000c0)='\x00', &(0x7f0000000180)='\x00'], &(0x7f0000000400)=[&(0x7f0000000200)='/dev/zero\x00', &(0x7f0000000240)='/dev/zero\x00', &(0x7f0000000300)='/dev/zero\x00'], 0x1000) socket$inet(0x2, 0x1, 0x0) perf_event_open(&(0x7f0000000100)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x22420, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ptrace$setopts(0x4200, 0x0, 0x5, 0x100050) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000004c00)={0xc0002100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) gettid() r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000), 0x380, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000000)='net/udp6\x00') read$hiddev(r2, &(0x7f0000001140)=""/212, 0xd4) fchmodat(r2, &(0x7f00000004c0)='./file0\x00', 0x0) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(r1, 0xc018937c, &(0x7f0000000380)=ANY=[@ANYBLOB="010000000100000018000000", @ANYBLOB="00000000000000002e2f66696cee8816"]) ioctl$TIOCSSOFTCAR(0xffffffffffffffff, 0x541a, &(0x7f00000003c0)=0x6) waitid$P_PIDFD(0x3, r1, &(0x7f0000000500), 0x2, &(0x7f0000000580)) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(r1, 0xc0189372, &(0x7f0000000040)={{0x1, 0x1, 0x18, r2, {0xffff}}, './file0\x00'}) [ 2627.791781] EXT4-fs (loop6): fragment/cluster size (32768) != block size (2048) [ 2627.797877] FAT-fs (loop4): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) 06:18:32 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000f000019000000900100000f000000000000000100000005000000000004000040000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000001000018000000c28500002b02", 0x66, 0x400}, {&(0x7f0000010100)="000000000000000000000000e8f7d2e8feeb4bf889ba053b02420ff8010040", 0x1f, 0x4e0}], 0x0, &(0x7f0000000140)=ANY=[]) 06:18:32 executing program 6: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x100000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="0a0000000002000019000000900100000f000000000000000100000005000000000004000040000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010100)="000000000000000000000000e8f7d2e8feeb4bf889ba053b02420ff8010040", 0x1f, 0x4e0}], 0x0, &(0x7f0000000140)=ANY=[]) 06:18:32 executing program 3: r0 = getpid() ioprio_get$pid(0x2, r0) r1 = getpid() ioprio_get$pid(0x2, r1) syz_mount_image$vfat(0x0, &(0x7f0000000040)='./file1\x00', 0x0, 0x0, &(0x7f00000000c0), 0x2002000, &(0x7f0000000400)=ANY=[@ANYRES16, @ANYBLOB="72e1af808ba473e6f37c85b113d8c4d9e1de4ed2968d2e01108c4795a941d14f6927393c8c3c458dd7454900d48719912efc18d580a8f841234284071012d7d5020eb5d56dc1ba5f1048adac4b928bf6cfd663b4cab43637cb979a9199a0246ec02345161783bc79585902603d7062084f05b744e31fcb4c3e81f3becabb7ad1fa5783f5e5e60ae912102fe8df0536bd074c03bd33742f35c5c44b5c3c9d693114367b7d966e"]) chdir(&(0x7f0000000140)='./file0\x00') ptrace$getenv(0x4201, r0, 0xfff, &(0x7f00000000c0)) openat(0xffffffffffffff9c, &(0x7f0000000000)='./file2\x00', 0x40c2, 0x0) r2 = perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x6, 0x0, 0xe}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r4 = fork() perf_event_open(&(0x7f0000000540)={0x4, 0x80, 0xeb, 0x0, 0x20, 0x0, 0x0, 0x2, 0x2820, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, @perf_config_ext={0xdc, 0x40}, 0x40000, 0x3, 0x8, 0x5, 0x6000000000000, 0x4, 0x5, 0x0, 0x3, 0x0, 0x3}, r4, 0x9, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000340)={0x0, 0x80, 0x2, 0x83, 0x1, 0x7, 0x0, 0x1f, 0x9ec17fc7a3e840c7, 0xc, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x9, 0x4, @perf_bp={&(0x7f0000000240), 0x1}, 0x404, 0x7, 0x3, 0x6, 0x800, 0x9, 0x3, 0x0, 0x7ff, 0x0, 0x9}, r4, 0x8, r2, 0x9) fork() setxattr$trusted_overlay_upper(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180), &(0x7f00000001c0)={0x0, 0xfb, 0x7a, 0x0, 0x2, "d54449275cb08faf62df87518e3ce16f", "9a61b461b0c63151b954990036d5e0163ceb48c6a801bb019e9e6fa7196a9372f804b9e9ca3fb3d85d1985d31346bbd5fd02b1c8223bf6388eb75498623e38ff88a99c5ce38698a32306b7d4e4b0fd4b03bfa568df17a42f725c6c33046b38b6e4a713dde1"}, 0x7a, 0x3) socket$nl_audit(0x10, 0x3, 0x9) chroot(&(0x7f0000000080)='./file1\x00') sendmsg$inet(r3, &(0x7f0000000780)={&(0x7f0000000000)={0x2, 0x0, @local}, 0x10, &(0x7f00000003c0)=[{&(0x7f0000000300)="6fb9", 0xffeb}], 0x1, &(0x7f0000000700)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @remote, @broadcast}}}], 0x20}, 0x0) 06:18:32 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x100000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="20000c000002000019000000900100000f000000000000000100000005000000000004000040000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000001000018000000c28500002b02", 0x66, 0x400}, {&(0x7f0000010100)="000000000000000000000000e8f7d2e8feeb4bf889ba053b02420ff8010040", 0x1f, 0x4e0}], 0x0, &(0x7f0000000140)=ANY=[]) [ 2627.954496] loop6: detected capacity change from 0 to 2048 06:18:32 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x100000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="0a0000000002000019000000900100000f000000000000000100000005000000000004000040000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001", 0x4d, 0x400}, {&(0x7f0000010100)="000000000000000000000000e8f7d2e8feeb4bf889ba053b02420ff8010040", 0x1f, 0x4e0}], 0x0, &(0x7f0000000140)=ANY=[]) 06:18:32 executing program 4: r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000040), 0xffffffffffffffff) syz_genetlink_get_family_id$ethtool(&(0x7f0000000100), 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_PAUSE_SET(0xffffffffffffffff, &(0x7f0000000440)={0x0, 0x0, 0x0}, 0x0) r2 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000080)='smaps\x00') pread64(r2, &(0x7f00000000c0)=""/98, 0x62, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x7fffffff) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(0xffffffffffffffff, 0xc0189374, &(0x7f0000000240)={{0x1, 0x1, 0x18, r0, {0x8}}, './file0\x00'}) dup3(0xffffffffffffffff, r2, 0x0) r3 = socket$inet_icmp_raw(0x2, 0x3, 0x1) syz_genetlink_get_family_id$ethtool(&(0x7f0000000180), r2) socket$nl_audit(0x10, 0x3, 0x9) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000040)={'wlan1\x00', 0x0}) sendmsg$inet(r3, &(0x7f0000000780)={&(0x7f0000000000)={0x2, 0x0, @local}, 0x10, &(0x7f00000003c0)=[{&(0x7f0000000300)="6fb9", 0xffeb}], 0x1, &(0x7f0000000700)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {r4, @remote, @broadcast}}}], 0x20}, 0x0) r5 = socket$inet_icmp_raw(0x2, 0x3, 0x1) socket$nl_audit(0x10, 0x3, 0x9) sendmsg$inet(r5, &(0x7f0000000780)={&(0x7f0000000000)={0x2, 0x0, @local}, 0x10, &(0x7f00000003c0)=[{&(0x7f0000000300)="6fb9", 0xffeb}], 0x1, &(0x7f0000000700)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @remote, @broadcast}}}], 0x20}, 0x0) sendmsg$ETHTOOL_MSG_LINKINFO_GET(r2, &(0x7f0000000200)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f00000001c0)={&(0x7f0000000340)=ANY=[@ANYRES16=r1, @ANYBLOB="000427bd7000ffdbdf25020000002c00018008000100", @ANYRES32=0x0, @ANYBLOB='\b\x00C\x00\x00\x00\x00\x00\b\x00!\x00', @ANYRES32=r4, @ANYBLOB="d5b921cac279671a02c4d90ed2cbc802c00000009852d9e901fb17000000000000", @ANYRES32=0x0, @ANYBLOB], 0x40}, 0x1, 0x0, 0x0, 0x4}, 0xd0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000480), 0x1}, 0x603}, 0x0, 0xffffffefffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000040)=[{&(0x7f0000010000)="601c6d6b646f736689254300080120000400004000f8000020004000030000000000000001", 0x25}, {0x0, 0x0, 0x10000}], 0x0, &(0x7f0000000040)=ANY=[]) [ 2627.999048] EXT4-fs (loop6): fragment/cluster size (32768) != block size (2048) [ 2628.019266] loop5: detected capacity change from 0 to 2048 [ 2628.044679] EXT4-fs (loop5): inodes count not valid: 786464 vs 32 [ 2628.055283] loop5: detected capacity change from 0 to 2048 [ 2628.067452] EXT4-fs (loop5): inodes count not valid: 786464 vs 32 [ 2628.170209] loop4: detected capacity change from 0 to 256 [ 2628.187121] FAT-fs (loop4): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) [ 2628.440203] loop7: detected capacity change from 0 to 2048 [ 2628.446762] EXT4-fs (loop7): VFS: Can't find ext4 filesystem 06:18:49 executing program 7: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x100000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="080000000002000019000000900100000f000000000000000100000005000000000004000040000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000001000018000000c28500002b02", 0x66, 0x400}, {&(0x7f0000010100)="000000000000000000000000e8f7d2e8feeb4bf889ba053b02420ff8010040", 0x1f, 0x4e0}], 0x0, &(0x7f0000000140)=ANY=[]) 06:18:49 executing program 1: pipe(&(0x7f0000000340)={0xffffffffffffffff}) pread64(r0, &(0x7f0000000440)=""/95, 0x5f, 0x6) execveat(r0, &(0x7f0000000080)='./file0\x00', &(0x7f00000001c0)=[&(0x7f00000000c0)='\x00', &(0x7f0000000180)='\x00'], &(0x7f0000000400)=[&(0x7f0000000200)='/dev/zero\x00', &(0x7f0000000240)='/dev/zero\x00', &(0x7f0000000300)='/dev/zero\x00'], 0x1000) socket$inet(0x2, 0x1, 0x0) perf_event_open(&(0x7f0000000100)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x22420, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ptrace$setopts(0x4200, 0x0, 0x5, 0x100050) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000004c00)={0xc0002100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) gettid() r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000), 0x380, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000000)='net/udp6\x00') read$hiddev(r2, &(0x7f0000001140)=""/212, 0xd4) fchmodat(r2, &(0x7f00000004c0)='./file0\x00', 0x0) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(r1, 0xc018937c, &(0x7f0000000380)=ANY=[@ANYBLOB="010000000100000018000000", @ANYBLOB="00000000000000002e2f66696cee8816"]) ioctl$TIOCSSOFTCAR(0xffffffffffffffff, 0x541a, &(0x7f00000003c0)=0x6) waitid$P_PIDFD(0x3, r1, &(0x7f0000000500), 0x2, &(0x7f0000000580)) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(r1, 0xc0189372, &(0x7f0000000040)={{0x1, 0x1, 0x18, r2, {0xffff}}, './file0\x00'}) 06:18:49 executing program 3: r0 = getpid() ioprio_get$pid(0x2, r0) r1 = getpid() ioprio_get$pid(0x2, r1) syz_mount_image$vfat(0x0, &(0x7f0000000040)='./file1\x00', 0x0, 0x0, &(0x7f00000000c0), 0x2002000, &(0x7f0000000400)=ANY=[@ANYRES16, @ANYBLOB="72e1af808ba473e6f37c85b113d8c4d9e1de4ed2968d2e01108c4795a941d14f6927393c8c3c458dd7454900d48719912efc18d580a8f841234284071012d7d5020eb5d56dc1ba5f1048adac4b928bf6cfd663b4cab43637cb979a9199a0246ec02345161783bc79585902603d7062084f05b744e31fcb4c3e81f3becabb7ad1fa5783f5e5e60ae912102fe8df0536bd074c03bd33742f35c5c44b5c3c9d693114367b7d966e"]) chdir(&(0x7f0000000140)='./file0\x00') ptrace$getenv(0x4201, r0, 0xfff, &(0x7f00000000c0)) openat(0xffffffffffffff9c, &(0x7f0000000000)='./file2\x00', 0x40c2, 0x0) r2 = perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x6, 0x0, 0xe}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r4 = fork() perf_event_open(&(0x7f0000000540)={0x4, 0x80, 0xeb, 0x0, 0x20, 0x0, 0x0, 0x2, 0x2820, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, @perf_config_ext={0xdc, 0x40}, 0x40000, 0x3, 0x8, 0x5, 0x6000000000000, 0x4, 0x5, 0x0, 0x3, 0x0, 0x3}, r4, 0x9, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000340)={0x0, 0x80, 0x2, 0x83, 0x1, 0x7, 0x0, 0x1f, 0x9ec17fc7a3e840c7, 0xc, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x9, 0x4, @perf_bp={&(0x7f0000000240), 0x1}, 0x404, 0x7, 0x3, 0x6, 0x800, 0x9, 0x3, 0x0, 0x7ff, 0x0, 0x9}, r4, 0x8, r2, 0x9) fork() setxattr$trusted_overlay_upper(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180), &(0x7f00000001c0)={0x0, 0xfb, 0x7a, 0x0, 0x2, "d54449275cb08faf62df87518e3ce16f", "9a61b461b0c63151b954990036d5e0163ceb48c6a801bb019e9e6fa7196a9372f804b9e9ca3fb3d85d1985d31346bbd5fd02b1c8223bf6388eb75498623e38ff88a99c5ce38698a32306b7d4e4b0fd4b03bfa568df17a42f725c6c33046b38b6e4a713dde1"}, 0x7a, 0x3) socket$nl_audit(0x10, 0x3, 0x9) chroot(&(0x7f0000000080)='./file1\x00') sendmsg$inet(r3, &(0x7f0000000780)={&(0x7f0000000000)={0x2, 0x0, @local}, 0x10, &(0x7f00000003c0)=[{&(0x7f0000000300)="6fb9", 0xffeb}], 0x1, &(0x7f0000000700)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @remote, @broadcast}}}], 0x20}, 0x0) 06:18:49 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x100000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="20000d000002000019000000900100000f000000000000000100000005000000000004000040000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000001000018000000c28500002b02", 0x66, 0x400}, {&(0x7f0000010100)="000000000000000000000000e8f7d2e8feeb4bf889ba053b02420ff8010040", 0x1f, 0x4e0}], 0x0, &(0x7f0000000140)=ANY=[]) 06:18:49 executing program 0: ioctl$AUTOFS_DEV_IOCTL_CLOSEMOUNT(0xffffffffffffffff, 0xc0189375, 0x0) syz_genetlink_get_family_id$ethtool(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_PAUSE_SET(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = memfd_create(&(0x7f0000000400)='B\xdb/\x89\x03l\xdeb\xcb\xb54\xed\xbeLY\xb5Z\xe1\x12S\xf5G\xcc\xf3\xe9\x02h\v\xca(\x96\xe1C\xdf\x1c\xea\x85C\xfb\x10\x13\xfa\x03\x16\xcd\x17\xa2\x80\xa1z\xb4r\x95\xc3@\x9d\xa6\xf1\x92#}g\xd3`\xf7\xcez\xcb\xb3\x1a\xbb\xc48e\x8e\xb1&\xd1\x8a\xe6!\x7f\x8d\xea,qx\xa28\xbf\"\xc7e\x06L\xb06\xeb<$\xd7\xba\xe5\x01\x03\x94r\xab\xd4J\x03s\xaf\xf6A\xbfV\xfa\x1ew\x8d\xbf\x99I\x97\xd8\xd2\xe8\x11\xc4\x04\x00\x84\xd5i\xee\xaf\xae[E\x1f\xdd\xd7#rT+\xb621p\xaf[\x99\" 1\xeb\xc7)\xd2\x1dh\xf2\xd5s\xfd?\fa>\x9f;\xe5r\xe5\xbd\xb0|=\x8eZcPY\xf8\xbd\x13\xaa\x8b\xdf\xbc\x93u\xd5\xb0r\xfb\xde\xe7\xd9k\xe2\xc6\x1b\xf2o@&>\xf2M\xe7\x8c\xeb\xee\xf5\x02~\x85\x14\xf3\xc6v\xf15PE\x8c\xca\x16$\xc2\x01#\xb563\rbq\xbf64\xfaW\x17\xdfa\xe6\xca\x86\xd7\xf8\x81X\x9bg4\xc1\xdam\xcf=Rq6\xb0\xd4D=I\x1a\x0e\xd0\xabz\xe2\x19\x0fM\xad\xdco\xa4\xb2\x8c?\xc1\x10\xf273\xd00\xb3_\xe8\x9a*\xfcL\xea;\xc0\x9a\xdbx!N;\xb5x\t\xa4E\xbe\x93r\x04\xf5\xf0\xf5\x7f\x9a)\xf5\x1b\"\xa1\xd8\x06>\xc9\xe2r\xe9\xbb\xfe\xc0\b\x81\x98\x1c\xe2\xe0?\x8f\xa1\xbel\aN\x83@\xb1\x03)4A\x83\xd6\xcf\xf6\xb5\x82\xb7\x9dA\b$\xa2x\x8a@\xfaj~\xef\x93\xb1/L\x01\xe2\xba|\xf0\x01)PP\xcdl\x06\xfc\x15;qZ\xb1u\xc9\xd0\xd16~JEGm\xe4\x1e@\x9dG\xe4@\xdf\xba\'\x8b\x1cD\xc7\xec\xd1@}tR\xd9P\xf4N\xe3\xd8x\xa0\x91\x17\xc2}\x13\b\xca\t(Z\xa3_\xa1\x90\x15T\xa4\xe7%\x98\xa7\xfb\x8bp/eq\x93\xbf\x1f =|\xf3\xb1\xfcR\xd8\nM,\xcb%@\'\x15\x88\xd8\xad\f\x91|\x95\x8fq+\x98\x81W\xba\x9f\xe0elOt\xbd\by\r\x87\x1c\xba\xbd\x8e+S>\xb8\xe29\x91h^x\xfb`\x00\xdd/\xa6\xb1\x16=\xa1bw\xc5I\xb1\x00'/549, 0x2) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000080)={{{@in6=@ipv4={""/10, ""/2, @local}, @in6=@empty, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@initdev}, 0x0, @in=@empty}}, &(0x7f0000000180)=0xe8) r2 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r3 = socket$nl_audit(0x10, 0x3, 0x9) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000000040)={'wlan1\x00', 0x0}) sendmsg$inet(r2, &(0x7f0000000780)={&(0x7f0000000000)={0x2, 0x0, @local}, 0x10, &(0x7f00000003c0)=[{&(0x7f0000000300)="6fb9", 0xffeb}], 0x1, &(0x7f0000000700)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {r4, @remote, @broadcast}}}], 0x20}, 0x0) r5 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r6 = socket$nl_audit(0x10, 0x3, 0x9) ioctl$sock_SIOCGIFINDEX(r6, 0x8933, &(0x7f0000000040)={'wlan1\x00', 0x0}) sendmsg$inet(r5, &(0x7f0000000780)={&(0x7f0000000000)={0x2, 0x0, @local}, 0x10, &(0x7f00000003c0)=[{&(0x7f0000000300)="6fb9", 0xffeb}], 0x1, &(0x7f0000000700)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {r7, @remote, @broadcast}}}], 0x20}, 0x0) r8 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r9 = socket$nl_audit(0x10, 0x3, 0x9) ioctl$sock_SIOCGIFINDEX(r9, 0x8933, &(0x7f0000000040)={'wlan1\x00', 0x0}) sendmsg$inet(r8, &(0x7f0000000780)={&(0x7f0000000000)={0x2, 0x0, @local}, 0x10, &(0x7f00000003c0)=[{&(0x7f0000000300)="6fb9", 0xffeb}], 0x1, &(0x7f0000000700)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {r10, @remote, @broadcast}}}], 0x20}, 0x0) sendmsg$ETHTOOL_MSG_DEBUG_GET(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f0000000000), 0xc, &(0x7f00000001c0)={&(0x7f0000000300)={0xf0, 0x0, 0x10, 0x3, 0x25dfdbfb, {}, [@HEADER={0x3c, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r1}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}]}, @HEADER={0x28, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x3}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'batadv_slave_1\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r4}]}, @HEADER={0xc, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}]}, @HEADER={0x6c, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r7}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth1_to_team\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x4}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'caif0\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r10}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_FLAGS={0x8}]}]}, 0xf0}, 0x1, 0x0, 0x0, 0x8800}, 0x40) fcntl$addseals(r0, 0x409, 0x0) 06:18:49 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000003000019000000900100000f000000000000000100000005000000000004000040000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000001000018000000c28500002b02", 0x66, 0x400}, {&(0x7f0000010100)="000000000000000000000000e8f7d2e8feeb4bf889ba053b02420ff8010040", 0x1f, 0x4e0}], 0x0, &(0x7f0000000140)=ANY=[]) 06:18:49 executing program 6: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x100000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="0a0000000002000019000000900100000f000000000000000100000005000000000004000040000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010100)="000000000000000000000000e8f7d2e8feeb4bf889ba053b02420ff8010040", 0x1f, 0x4e0}], 0x0, &(0x7f0000000140)=ANY=[]) 06:18:49 executing program 4: r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000040), 0xffffffffffffffff) syz_genetlink_get_family_id$ethtool(&(0x7f0000000100), 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_PAUSE_SET(0xffffffffffffffff, &(0x7f0000000440)={0x0, 0x0, 0x0}, 0x0) r2 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000080)='smaps\x00') pread64(r2, &(0x7f00000000c0)=""/98, 0x62, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x7fffffff) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(0xffffffffffffffff, 0xc0189374, &(0x7f0000000240)={{0x1, 0x1, 0x18, r0, {0x8}}, './file0\x00'}) dup3(0xffffffffffffffff, r2, 0x0) r3 = socket$inet_icmp_raw(0x2, 0x3, 0x1) syz_genetlink_get_family_id$ethtool(&(0x7f0000000180), r2) socket$nl_audit(0x10, 0x3, 0x9) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000040)={'wlan1\x00', 0x0}) sendmsg$inet(r3, &(0x7f0000000780)={&(0x7f0000000000)={0x2, 0x0, @local}, 0x10, &(0x7f00000003c0)=[{&(0x7f0000000300)="6fb9", 0xffeb}], 0x1, &(0x7f0000000700)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {r4, @remote, @broadcast}}}], 0x20}, 0x0) r5 = socket$inet_icmp_raw(0x2, 0x3, 0x1) socket$nl_audit(0x10, 0x3, 0x9) sendmsg$inet(r5, &(0x7f0000000780)={&(0x7f0000000000)={0x2, 0x0, @local}, 0x10, &(0x7f00000003c0)=[{&(0x7f0000000300)="6fb9", 0xffeb}], 0x1, &(0x7f0000000700)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @remote, @broadcast}}}], 0x20}, 0x0) sendmsg$ETHTOOL_MSG_LINKINFO_GET(r2, &(0x7f0000000200)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f00000001c0)={&(0x7f0000000340)=ANY=[@ANYRES16=r1, @ANYBLOB="000427bd7000ffdbdf25020000002c00018008000100", @ANYRES32=0x0, @ANYBLOB='\b\x00C\x00\x00\x00\x00\x00\b\x00!\x00', @ANYRES32=r4, @ANYBLOB="d5b921cac279671a02c4d90ed2cbc802c00000009852d9e901fb17000000000000", @ANYRES32=0x0, @ANYBLOB], 0x40}, 0x1, 0x0, 0x0, 0x4}, 0xd0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000480), 0x1}, 0x603}, 0x0, 0xffffffefffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000040)=[{&(0x7f0000010000)="601c6d6b646f736689254300080120000400004000f8000020004000030000000000000001", 0x25}, {0x0, 0x0, 0x10000}], 0x0, &(0x7f0000000040)=ANY=[]) [ 2645.442872] loop7: detected capacity change from 0 to 2048 [ 2645.465180] loop5: detected capacity change from 0 to 2048 [ 2645.477636] EXT4-fs (loop7): inodes count not valid: 8 vs 32 [ 2645.487977] loop6: detected capacity change from 0 to 2048 [ 2645.510175] EXT4-fs (loop5): inodes count not valid: 852000 vs 32 [ 2645.512806] loop7: detected capacity change from 0 to 2048 [ 2645.519199] EXT4-fs (loop6): fragment/cluster size (32768) != block size (2048) [ 2645.536990] EXT4-fs (loop7): inodes count not valid: 8 vs 32 [ 2645.538559] loop5: detected capacity change from 0 to 2048 [ 2645.558285] loop4: detected capacity change from 0 to 256 [ 2645.577482] EXT4-fs (loop5): inodes count not valid: 852000 vs 32 06:18:49 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000006000019000000900100000f000000000000000100000005000000000004000040000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000001000018000000c28500002b02", 0x66, 0x400}, {&(0x7f0000010100)="000000000000000000000000e8f7d2e8feeb4bf889ba053b02420ff8010040", 0x1f, 0x4e0}], 0x0, &(0x7f0000000140)=ANY=[]) [ 2645.609659] FAT-fs (loop4): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) 06:18:49 executing program 6: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x100000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="0a0000000002000019000000900100000f000000000000000100000005000000000004000040000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000001000018000000", 0x60, 0x400}, {&(0x7f0000010100)="000000000000000000000000e8f7d2e8feeb4bf889ba053b02420ff8010040", 0x1f, 0x4e0}], 0x0, &(0x7f0000000140)=ANY=[]) 06:18:49 executing program 3: r0 = getpid() ioprio_get$pid(0x2, r0) r1 = getpid() ioprio_get$pid(0x2, r1) syz_mount_image$vfat(0x0, &(0x7f0000000040)='./file1\x00', 0x0, 0x0, &(0x7f00000000c0), 0x2002000, &(0x7f0000000400)=ANY=[@ANYRES16, @ANYBLOB="72e1af808ba473e6f37c85b113d8c4d9e1de4ed2968d2e01108c4795a941d14f6927393c8c3c458dd7454900d48719912efc18d580a8f841234284071012d7d5020eb5d56dc1ba5f1048adac4b928bf6cfd663b4cab43637cb979a9199a0246ec02345161783bc79585902603d7062084f05b744e31fcb4c3e81f3becabb7ad1fa5783f5e5e60ae912102fe8df0536bd074c03bd33742f35c5c44b5c3c9d693114367b7d966e"]) chdir(&(0x7f0000000140)='./file0\x00') ptrace$getenv(0x4201, r0, 0xfff, &(0x7f00000000c0)) openat(0xffffffffffffff9c, &(0x7f0000000000)='./file2\x00', 0x40c2, 0x0) r2 = perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x6, 0x0, 0xe}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r4 = fork() perf_event_open(&(0x7f0000000540)={0x4, 0x80, 0xeb, 0x0, 0x20, 0x0, 0x0, 0x2, 0x2820, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, @perf_config_ext={0xdc, 0x40}, 0x40000, 0x3, 0x8, 0x5, 0x6000000000000, 0x4, 0x5, 0x0, 0x3, 0x0, 0x3}, r4, 0x9, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000340)={0x0, 0x80, 0x2, 0x83, 0x1, 0x7, 0x0, 0x1f, 0x9ec17fc7a3e840c7, 0xc, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x9, 0x4, @perf_bp={&(0x7f0000000240), 0x1}, 0x404, 0x7, 0x3, 0x6, 0x800, 0x9, 0x3, 0x0, 0x7ff, 0x0, 0x9}, r4, 0x8, r2, 0x9) fork() setxattr$trusted_overlay_upper(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180), &(0x7f00000001c0)={0x0, 0xfb, 0x7a, 0x0, 0x2, "d54449275cb08faf62df87518e3ce16f", "9a61b461b0c63151b954990036d5e0163ceb48c6a801bb019e9e6fa7196a9372f804b9e9ca3fb3d85d1985d31346bbd5fd02b1c8223bf6388eb75498623e38ff88a99c5ce38698a32306b7d4e4b0fd4b03bfa568df17a42f725c6c33046b38b6e4a713dde1"}, 0x7a, 0x3) socket$nl_audit(0x10, 0x3, 0x9) chroot(&(0x7f0000000080)='./file1\x00') sendmsg$inet(r3, &(0x7f0000000780)={&(0x7f0000000000)={0x2, 0x0, @local}, 0x10, &(0x7f00000003c0)=[{&(0x7f0000000300)="6fb9", 0xffeb}], 0x1, &(0x7f0000000700)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @remote, @broadcast}}}], 0x20}, 0x0) 06:18:50 executing program 7: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x100000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="0a0000000002000019000000900100000f000000000000000100000005000000000004000040000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000001000018000000c28500002b02", 0x66, 0x400}, {&(0x7f0000010100)="000000000000000000000000e8f7d2e8feeb4bf889ba053b02420ff8010040", 0x1f, 0x4e0}], 0x0, &(0x7f0000000140)=ANY=[]) 06:18:50 executing program 0: pipe(&(0x7f0000000340)={0xffffffffffffffff}) pread64(r0, &(0x7f0000000440)=""/95, 0x5f, 0x6) execveat(r0, &(0x7f0000000080)='./file0\x00', &(0x7f00000001c0)=[&(0x7f00000000c0)='\x00', &(0x7f0000000180)='\x00'], &(0x7f0000000400)=[&(0x7f0000000200)='/dev/zero\x00', &(0x7f0000000240)='/dev/zero\x00', &(0x7f0000000300)='/dev/zero\x00'], 0x1000) socket$inet(0x2, 0x1, 0x0) perf_event_open(&(0x7f0000000100)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x22420, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ptrace$setopts(0x4200, 0x0, 0x5, 0x100050) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000004c00)={0xc0002100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) gettid() r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000), 0x380, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000000)='net/udp6\x00') read$hiddev(r2, &(0x7f0000001140)=""/212, 0xd4) fchmodat(r2, &(0x7f00000004c0)='./file0\x00', 0x0) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(r1, 0xc018937c, &(0x7f0000000380)=ANY=[@ANYBLOB="010000000100000018000000", @ANYBLOB="00000000000000002e2f66696cee8816"]) ioctl$TIOCSSOFTCAR(0xffffffffffffffff, 0x541a, &(0x7f00000003c0)=0x6) waitid$P_PIDFD(0x3, r1, &(0x7f0000000500), 0x2, &(0x7f0000000580)) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(r1, 0xc0189372, &(0x7f0000000040)={{0x1, 0x1, 0x18, r2, {0xffff}}, './file0\x00'}) 06:18:50 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x100000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="20000f000002000019000000900100000f000000000000000100000005000000000004000040000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000001000018000000c28500002b02", 0x66, 0x400}, {&(0x7f0000010100)="000000000000000000000000e8f7d2e8feeb4bf889ba053b02420ff8010040", 0x1f, 0x4e0}], 0x0, &(0x7f0000000140)=ANY=[]) 06:18:50 executing program 1: pipe(&(0x7f0000000340)={0xffffffffffffffff}) pread64(r0, &(0x7f0000000440)=""/95, 0x5f, 0x6) execveat(r0, &(0x7f0000000080)='./file0\x00', &(0x7f00000001c0)=[&(0x7f00000000c0)='\x00', &(0x7f0000000180)='\x00'], &(0x7f0000000400)=[&(0x7f0000000200)='/dev/zero\x00', &(0x7f0000000240)='/dev/zero\x00', &(0x7f0000000300)='/dev/zero\x00'], 0x1000) socket$inet(0x2, 0x1, 0x0) perf_event_open(&(0x7f0000000100)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x22420, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ptrace$setopts(0x4200, 0x0, 0x5, 0x100050) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000004c00)={0xc0002100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) gettid() r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000), 0x380, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000000)='net/udp6\x00') read$hiddev(r2, &(0x7f0000001140)=""/212, 0xd4) fchmodat(r2, &(0x7f00000004c0)='./file0\x00', 0x0) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(r1, 0xc018937c, &(0x7f0000000380)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32=0xffffffffffffffff, @ANYBLOB="00000000000000002e2f66696cee8816"]) ioctl$TIOCSSOFTCAR(r3, 0x541a, &(0x7f00000003c0)=0x6) waitid$P_PIDFD(0x3, r1, &(0x7f0000000500), 0x2, &(0x7f0000000580)) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(r1, 0xc0189372, &(0x7f0000000040)={{0x1, 0x1, 0x18, r2, {0xffff}}, './file0\x00'}) [ 2645.805237] loop7: detected capacity change from 0 to 2048 06:18:50 executing program 4: r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000040), 0xffffffffffffffff) syz_genetlink_get_family_id$ethtool(&(0x7f0000000100), 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_PAUSE_SET(0xffffffffffffffff, &(0x7f0000000440)={0x0, 0x0, 0x0}, 0x0) r2 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000080)='smaps\x00') pread64(r2, &(0x7f00000000c0)=""/98, 0x62, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x7fffffff) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(0xffffffffffffffff, 0xc0189374, &(0x7f0000000240)={{0x1, 0x1, 0x18, r0, {0x8}}, './file0\x00'}) dup3(0xffffffffffffffff, r2, 0x0) r3 = socket$inet_icmp_raw(0x2, 0x3, 0x1) syz_genetlink_get_family_id$ethtool(&(0x7f0000000180), r2) socket$nl_audit(0x10, 0x3, 0x9) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000040)={'wlan1\x00', 0x0}) sendmsg$inet(r3, &(0x7f0000000780)={&(0x7f0000000000)={0x2, 0x0, @local}, 0x10, &(0x7f00000003c0)=[{&(0x7f0000000300)="6fb9", 0xffeb}], 0x1, &(0x7f0000000700)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {r4, @remote, @broadcast}}}], 0x20}, 0x0) r5 = socket$inet_icmp_raw(0x2, 0x3, 0x1) socket$nl_audit(0x10, 0x3, 0x9) sendmsg$inet(r5, &(0x7f0000000780)={&(0x7f0000000000)={0x2, 0x0, @local}, 0x10, &(0x7f00000003c0)=[{&(0x7f0000000300)="6fb9", 0xffeb}], 0x1, &(0x7f0000000700)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @remote, @broadcast}}}], 0x20}, 0x0) sendmsg$ETHTOOL_MSG_LINKINFO_GET(r2, &(0x7f0000000200)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f00000001c0)={&(0x7f0000000340)=ANY=[@ANYRES16=r1, @ANYBLOB="000427bd7000ffdbdf25020000002c00018008000100", @ANYRES32=0x0, @ANYBLOB='\b\x00C\x00\x00\x00\x00\x00\b\x00!\x00', @ANYRES32=r4, @ANYBLOB="d5b921cac279671a02c4d90ed2cbc802c00000009852d9e901fb17000000000000", @ANYRES32=0x0, @ANYBLOB], 0x40}, 0x1, 0x0, 0x0, 0x4}, 0xd0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000480), 0x1}, 0x603}, 0x0, 0xffffffefffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000040)=[{&(0x7f0000010000)="601c6d6b646f736689254300080120000400004000f8000020004000030000000000000001", 0x25}, {0x0, 0x0, 0x10000}], 0x0, &(0x7f0000000040)=ANY=[]) [ 2645.820071] EXT4-fs (loop7): inodes count not valid: 10 vs 32 06:18:50 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000007000019000000900100000f000000000000000100000005000000000004000040000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000001000018000000c28500002b02", 0x66, 0x400}, {&(0x7f0000010100)="000000000000000000000000e8f7d2e8feeb4bf889ba053b02420ff8010040", 0x1f, 0x4e0}], 0x0, &(0x7f0000000140)=ANY=[]) [ 2645.834573] loop6: detected capacity change from 0 to 2048 [ 2645.835331] loop7: detected capacity change from 0 to 2048 [ 2645.841986] EXT4-fs (loop7): inodes count not valid: 10 vs 32 [ 2645.863039] loop5: detected capacity change from 0 to 2048 [ 2645.866637] EXT4-fs (loop6): fragment/cluster size (32768) != block size (2048) [ 2645.878993] EXT4-fs (loop5): inodes count not valid: 983072 vs 32 [ 2645.900823] loop5: detected capacity change from 0 to 2048 06:18:50 executing program 7: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x100000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="0b0000000002000019000000900100000f000000000000000100000005000000000004000040000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000001000018000000c28500002b02", 0x66, 0x400}, {&(0x7f0000010100)="000000000000000000000000e8f7d2e8feeb4bf889ba053b02420ff8010040", 0x1f, 0x4e0}], 0x0, &(0x7f0000000140)=ANY=[]) [ 2645.921759] EXT4-fs (loop5): inodes count not valid: 983072 vs 32 [ 2645.975053] loop7: detected capacity change from 0 to 2048 [ 2645.994686] EXT4-fs (loop7): inodes count not valid: 11 vs 32 [ 2646.008831] loop7: detected capacity change from 0 to 2048 [ 2646.045008] EXT4-fs (loop7): inodes count not valid: 11 vs 32 [ 2646.080199] loop4: detected capacity change from 0 to 256 [ 2646.125920] FAT-fs (loop4): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) [ 2646.795788] ================================================================== [ 2646.796990] BUG: KASAN: use-after-free in __lock_acquire+0x42c9/0x5e70 [ 2646.798192] Read of size 8 at addr ffff88800dc297b8 by task syz-executor/26782 [ 2646.799188] [ 2646.799415] CPU: 1 PID: 26782 Comm: syz-executor Not tainted 5.19.0-rc7-next-20220722 #1 [ 2646.800424] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS rel-1.14.0-0-g155821a1990b-prebuilt.qemu.org 04/01/2014 [ 2646.801850] Call Trace: [ 2646.802243] [ 2646.802535] dump_stack_lvl+0x8b/0xb3 [ 2646.803028] print_report.cold+0x5e/0x5e5 [ 2646.803557] ? __lock_acquire+0x42c9/0x5e70 [ 2646.804112] kasan_report+0xb1/0x1c0 [ 2646.804595] ? __lock_acquire+0x42c9/0x5e70 [ 2646.805173] __lock_acquire+0x42c9/0x5e70 [ 2646.805711] ? lock_chain_count+0x20/0x20 [ 2646.806245] ? lockdep_hardirqs_on_prepare+0x410/0x410 [ 2646.806924] ? lockdep_hardirqs_on_prepare+0x410/0x410 [ 2646.807624] ? finish_task_switch.isra.0+0x230/0x8a0 [ 2646.808305] lock_acquire+0x1a2/0x530 [ 2646.808829] ? kmemleak_scan+0x21d/0x16f0 [ 2646.809392] ? lock_release+0x750/0x750 [ 2646.809950] ? rcu_read_lock_sched_held+0x3e/0x80 [ 2646.810863] ? trace_rcu_dyntick+0x1a7/0x250 [ 2646.811950] ? ct_nmi_exit+0x119/0x1c0 [ 2646.812840] _raw_spin_lock_irq+0x32/0x50 [ 2646.813409] ? kmemleak_scan+0x21d/0x16f0 [ 2646.813979] kmemleak_scan+0x21d/0x16f0 [ 2646.814558] ? paint_ptr+0xc0/0xc0 [ 2646.815053] ? strncpy_from_user+0x204/0x3e0 [ 2646.815653] kmemleak_write+0x570/0x680 [ 2646.816190] ? kmemleak_scan+0x16f0/0x16f0 [ 2646.816797] ? debugfs_file_get+0x1ce/0x450 [ 2646.817383] ? debugfs_file_put+0xd0/0xd0 [ 2646.817967] full_proxy_write+0x11d/0x190 [ 2646.818605] vfs_write+0x2cb/0xd90 [ 2646.819121] ? full_proxy_poll+0x180/0x180 [ 2646.819692] ? __ia32_sys_pread64+0x220/0x220 [ 2646.820324] ? lock_release+0x3b2/0x750 [ 2646.820890] ? syscall_enter_from_user_mode+0x1d/0x50 [ 2646.821622] ? __fget_light+0x212/0x280 [ 2646.822165] ksys_write+0x127/0x250 [ 2646.822658] ? __ia32_sys_read+0xb0/0xb0 [ 2646.823235] ? syscall_enter_from_user_mode+0x1d/0x50 [ 2646.823921] ? syscall_enter_from_user_mode+0x1d/0x50 [ 2646.824643] do_syscall_64+0x3b/0x90 [ 2646.825168] entry_SYSCALL_64_after_hwframe+0x63/0xcd [ 2646.825851] RIP: 0033:0x7f7bdd9ff5c3 [ 2646.826336] Code: 16 00 00 00 eb ae 90 b8 6e 00 00 00 eb a6 e8 44 ef 04 00 0f 1f 40 00 64 8b 04 25 18 00 00 00 85 c0 75 14 b8 01 00 00 00 0f 05 <48> 3d 00 f0 ff ff 77 55 c3 0f 1f 40 00 48 83 ec 28 48 89 54 24 18 [ 2646.828576] RSP: 002b:00007ffca817d628 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 2646.829530] RAX: ffffffffffffffda RBX: 00007ffca817dc68 RCX: 00007f7bdd9ff5c3 [ 2646.830413] RDX: 0000000000000004 RSI: 00007f7bddab5ed9 RDI: 0000000000000003 [ 2646.831320] RBP: 0000000000000005 R08: 0000000000000a56 R09: 00007ffca81bf080 [ 2646.832248] R10: 00007ffca81bf090 R11: 0000000000000246 R12: 00007f7bdda01b10 [ 2646.833223] R13: 00007ffca817eec7 R14: 0000000000000000 R15: 000000000028603e [ 2646.834154] [ 2646.834471] [ 2646.834698] Allocated by task 26782: [ 2646.835210] kasan_save_stack+0x1e/0x40 [ 2646.835739] __kasan_slab_alloc+0x66/0x80 [ 2646.836301] kmem_cache_alloc+0x1b1/0x4a0 [ 2646.836869] __create_object.isra.0+0x3d/0xc10 [ 2646.837484] kmem_cache_alloc_node+0x259/0x4b0 [ 2646.838084] __alloc_skb+0x210/0x300 [ 2646.838585] skb_copy+0x139/0x3c0 [ 2646.839058] mac80211_hwsim_tx_frame_no_nl.isra.0+0xb6d/0x1440 [ 2646.839834] mac80211_hwsim_tx_frame+0x1ee/0x2a0 [ 2646.840430] mac80211_hwsim_beacon_tx+0x562/0xaa0 [ 2646.841053] __iterate_interfaces+0x2d3/0x560 [ 2646.841631] ieee80211_iterate_active_interfaces_atomic+0x70/0x180 [ 2646.842430] mac80211_hwsim_beacon+0x101/0x200 [ 2646.843008] __hrtimer_run_queues+0x5de/0xbd0 [ 2646.843583] hrtimer_run_softirq+0x172/0x340 [ 2646.844134] __do_softirq+0x1c8/0x8d0 [ 2646.844629] [ 2646.844858] Freed by task 26685: [ 2646.845284] kasan_save_stack+0x1e/0x40 [ 2646.845790] kasan_set_track+0x21/0x30 [ 2646.846286] kasan_set_free_info+0x20/0x40 [ 2646.846819] __kasan_slab_free+0x108/0x190 [ 2646.847349] kmem_cache_free+0xfb/0x610 [ 2646.847848] rcu_core+0x7e2/0x2080 [ 2646.848296] __do_softirq+0x1c8/0x8d0 [ 2646.848804] [ 2646.849027] Last potentially related work creation: [ 2646.849636] kasan_save_stack+0x1e/0x40 [ 2646.850141] __kasan_record_aux_stack+0x97/0xb0 [ 2646.850730] call_rcu+0x6a/0xa30 [ 2646.851160] kmem_cache_free+0xc1/0x610 [ 2646.851653] kfree_skbmem+0xef/0x1b0 [ 2646.852134] kfree_skb_reason+0x85/0x110 [ 2646.852653] ieee80211_iface_work+0x34f/0xc80 [ 2646.853244] process_one_work+0xa0f/0x1690 [ 2646.853776] worker_thread+0x637/0x1260 [ 2646.854280] kthread+0x2ed/0x3a0 [ 2646.854719] ret_from_fork+0x22/0x30 [ 2646.855191] [ 2646.855411] Second to last potentially related work creation: [ 2646.856115] kasan_save_stack+0x1e/0x40 [ 2646.856615] __kasan_record_aux_stack+0x97/0xb0 [ 2646.857211] call_rcu+0x6a/0xa30 [ 2646.857642] kmem_cache_free+0xc1/0x610 [ 2646.858147] kfree_skbmem+0xef/0x1b0 [ 2646.858628] kfree_skb_reason+0x85/0x110 [ 2646.859142] ieee80211_iface_work+0x34f/0xc80 [ 2646.859713] process_one_work+0xa0f/0x1690 [ 2646.860255] worker_thread+0x637/0x1260 [ 2646.860781] kthread+0x2ed/0x3a0 [ 2646.861215] ret_from_fork+0x22/0x30 [ 2646.861688] [ 2646.861913] The buggy address belongs to the object at ffff88800dc297a0 [ 2646.861913] which belongs to the cache kmemleak_object of size 368 [ 2646.863487] The buggy address is located 24 bytes inside of [ 2646.863487] 368-byte region [ffff88800dc297a0, ffff88800dc29910) [ 2646.864940] [ 2646.865168] The buggy address belongs to the physical page: [ 2646.865864] page:000000009a50fbc4 refcount:1 mapcount:0 mapping:0000000000000000 index:0xffff88800dc29cb0 pfn:0xdc28 [ 2646.867174] head:000000009a50fbc4 order:1 compound_mapcount:0 compound_pincount:0 [ 2646.868127] flags: 0x100000000010200(slab|head|node=0|zone=1) [ 2646.868880] raw: 0100000000010200 ffffea0000389f88 ffffea00011f5488 ffff888007c4f780 [ 2646.869818] raw: ffff88800dc29cb0 0000000000120011 00000001ffffffff 0000000000000000 [ 2646.870747] page dumped because: kasan: bad access detected [ 2646.871441] [ 2646.871655] Memory state around the buggy address: [ 2646.872252] ffff88800dc29680: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 2646.873137] ffff88800dc29700: 00 00 00 00 00 00 00 00 00 00 00 00 fc fc fc fc [ 2646.874018] >ffff88800dc29780: fc fc fc fc fa fb fb fb fb fb fb fb fb fb fb fb [ 2646.874898] ^ [ 2646.875529] ffff88800dc29800: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 2646.876417] ffff88800dc29880: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 2646.877305] ================================================================== [ 2646.878178] Disabling lock debugging due to kernel taint VM DIAGNOSIS: 06:18:51 Registers: info registers vcpu 0 RAX=0000000000000000 RBX=ffffea00012c2400 RCX=0000000000000000 RDX=ffff88804966d040 RSI=ffffffff816db780 RDI=0000000000000007 RBP=ffff88800ddd5ea0 RSP=ffff888047befb40 R8 =0000000000000007 R9 =0000000000000000 R10=0000000000000000 R11=0000000000000001 R12=00005617ad786000 R13=0000000000000001 R14=ffff888018a7e400 R15=0000000000000000 RIP=ffffffff8145a227 RFL=00000246 [---Z-P-] CPL=0 II=0 A20=1 SMM=0 HLT=0 ES =0000 0000000000000000 00000000 00000000 CS =0010 0000000000000000 ffffffff 00a09b00 DPL=0 CS64 [-RA] SS =0000 0000000000000000 00000000 00000000 DS =0000 0000000000000000 00000000 00000000 FS =0000 00007f8c946c58c0 00000000 00000000 GS =0000 ffff88806ce00000 00000000 00000000 LDT=0000 fffffe0000000000 00000000 00000000 TR =0040 fffffe0000003000 00004087 00008b00 DPL=0 TSS64-busy GDT= fffffe0000001000 0000007f IDT= fffffe0000000000 00000fff CR0=80050033 CR2=00005617ad786410 CR3=0000000048496000 CR4=00350ef0 DR0=0000000000000000 DR1=0000000000000000 DR2=0000000000000000 DR3=0000000000000000 DR6=00000000ffff4ff0 DR7=0000000000000400 EFER=0000000000000d01 FCW=037f FSW=0000 [ST=0] FTW=00 MXCSR=00001f80 FPR0=0000000000000000 0000 FPR1=0000000000000000 0000 FPR2=0000000000000000 0000 FPR3=0000000000000000 0000 FPR4=0000000000000000 0000 FPR5=0000000000000000 0000 FPR6=0000000000000000 0000 FPR7=0000000000000000 0000 YMM00=0000000000000000 0000000000000000 ffffffffffffffff ffffffffffffffff YMM01=0000000000000000 0000000000000000 00007f8c946e0e90 00007f8c946e0e80 YMM02=0000000000000000 0000000000000000 ffff000000000000 0000000000000000 YMM03=0000000000000000 0000000000000000 0000000000ff0000 000000ff000000ff YMM04=0000000000000000 0000000000000000 2f2f2f2f2f2f2f2f 2f2f2f2f2f2f2f2f YMM05=0000000000000000 0000000000000000 ffffffffffff0000 0000000000000000 YMM06=0000000000000000 0000000000000000 0000000000006561 6124242f6867632f YMM07=0000000000000000 0000000000000000 0000000000000000 0000000000000000 YMM08=0000000000000000 0000000000000000 0000303a372f6b63 6f6c622f7665642f YMM09=0000000000000000 0000000000000000 0000000000000000 0000000000000000 YMM10=0000000000000000 0000000000000000 0000000000002000 0000000000000000 YMM11=0000000000000000 0000000000000000 0000000000000000 0000000000000000 YMM12=0000000000000000 0000000000000000 0000000000000000 0000000000000000 YMM13=0000000000000000 0000000000000000 0000000000000000 0000000000000000 YMM14=0000000000000000 0000000000000000 0000000000000000 0000000000000000 YMM15=0000000000000000 0000000000000000 0000000000000000 0000000000000000 info registers vcpu 1 RAX=0000000000000031 RBX=00000000000003f8 RCX=0000000000000000 RDX=00000000000003f8 RSI=ffffffff82437bb1 RDI=ffffffff876276e0 RBP=ffffffff876276a0 RSP=ffff88804778f268 R8 =0000000000000001 R9 =000000000000000a R10=0000000000000031 R11=0000000000000001 R12=0000000000000031 R13=ffffffff876276a0 R14=0000000000000010 R15=ffffffff82437ba0 RIP=ffffffff82437c09 RFL=00000002 [-------] CPL=0 II=0 A20=1 SMM=0 HLT=0 ES =0000 0000000000000000 00000000 00000000 CS =0010 0000000000000000 ffffffff 00a09b00 DPL=0 CS64 [-RA] SS =0018 0000000000000000 ffffffff 00c09300 DPL=0 DS [-WA] DS =0000 0000000000000000 00000000 00000000 FS =0000 0000555556ac8400 00000000 00000000 GS =0000 ffff88806cf00000 00000000 00000000 LDT=0000 fffffe0000000000 00000000 00000000 TR =0040 fffffe000004a000 00004087 00008b00 DPL=0 TSS64-busy GDT= fffffe0000048000 0000007f IDT= fffffe0000000000 00000fff CR0=80050033 CR2=00005617adea29c8 CR3=00000000474a6000 CR4=00350ee0 DR0=0000000000000000 DR1=0000000000000000 DR2=0000000000000000 DR3=0000000000000000 DR6=00000000ffff4ff0 DR7=0000000000000400 EFER=0000000000000d01 FCW=037f FSW=0000 [ST=0] FTW=00 MXCSR=00001f80 FPR0=0000000000000000 0000 FPR1=0000000000000000 0000 FPR2=0000000000000000 0000 FPR3=0000000000000000 0000 FPR4=0000000000000000 0000 FPR5=0000000000000000 0000 FPR6=0000000000000000 0000 FPR7=0000000000000000 0000 YMM00=0000000000000000 0000000000000000 0000000000000000 0000000000000000 YMM01=0000000000000000 0000000000000000 0000000000000000 00454d414e564544 YMM02=0000000000000000 0000000000000000 ffffff0f0e0d0c0b 0a09080706050403 YMM03=0000000000000000 0000000000000000 696e656420737365 636341002f737973 YMM04=0000000000000000 0000000000000000 000000363d524f4e 494d00373d524f4a YMM05=0000000000000000 0000000000000000 3d5145534b534944 006b7369643d4550 YMM06=0000000000000000 0000000000000000 3d454d414e564544 00303d444955555f YMM07=0000000000000000 0000000000000000 0000000000000000 0000000000000000 YMM08=0000000000000000 0000000000000000 2064616572206f74 2064656c69614600 YMM09=0000000000000000 0000000000000000 0000000000000000 0000000000000000 YMM10=0000000000000000 0000000000000000 0000000000002000 0000000000000000 YMM11=0000000000000000 0000000000000000 0000000000000000 0000000000000000 YMM12=0000000000000000 0000000000000000 0000000000000000 0000000000000000 YMM13=0000000000000000 0000000000000000 0000000000000000 0000000000000000 YMM14=0000000000000000 0000000000000000 0000000000000000 0000000000000000 YMM15=0000000000000000 0000000000000000 0000000000000000 0000000000000000