="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010100)="00000000080000000000f900b00cb2cc029f49d8b90449a7d5d54d49010000a566", 0x21, 0x4e0}, {&(0x7f0000010400)="0200000003000000040000006a000f000300040000000000000000000f00bc0f", 0x20, 0x800}, {&(0x7f0000011600)="ed41000000080000dff4655fe0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}, {0x0}, {0x0}, {0x0}], 0x0, &(0x7f0000012c00)) [ 380.006894] loop2: detected capacity change from 0 to 33 [ 380.023237] EXT4-fs (loop2): bad geometry: block count 128 exceeds size of device (8 blocks) [ 380.051500] loop1: detected capacity change from 0 to 33 [ 380.074593] EXT4-fs (loop1): bad geometry: block count 128 exceeds size of device (8 blocks) 22:16:12 executing program 0: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x2, &(0x7f0000000000)=[{0x7c}, {0x6, 0x0, 0x0, 0x7fffffff}]}) r0 = openat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x800, 0x10e) r1 = syz_init_net_socket$802154_raw(0x24, 0x3, 0x0) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8916, &(0x7f0000001180)={'bond0\x00', {0x2, 0x0, @local}}) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f0000000080)) r2 = perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = fork() perf_event_open(&(0x7f0000001280)={0x0, 0x80, 0x5, 0x0, 0x1, 0x4, 0x0, 0xe41, 0x84000, 0x8, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x9, 0x0, @perf_config_ext={0x8000, 0x100}, 0x8000, 0xffffffff, 0x2476f094, 0x0, 0x7, 0x8001, 0xffff, 0x0, 0x1, 0x0, 0x10000}, r3, 0xb, 0xffffffffffffffff, 0x2) r4 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x0) r5 = dup2(r4, r4) bind$bt_l2cap(r5, &(0x7f0000000000)={0x1f, 0x0, @fixed={'\xaa\xaa\xaa\xaa\xaa', 0x10}}, 0xe) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r0, 0xc0502100, &(0x7f0000001200)={0x0}) ioctl$SECCOMP_IOCTL_NOTIF_ADDFD(r5, 0x40182103, &(0x7f0000000100)={r6, 0x2, r0, 0x1, 0x80000}) io_uring_register$IORING_REGISTER_PERSONALITY(r2, 0x9, 0x0, 0x0) 22:16:12 executing program 2: getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000040), &(0x7f0000000080)=0xc) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x0, 0x0, 0x0, &(0x7f0000012c00)) 22:16:12 executing program 1: getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000040), &(0x7f0000000080)=0xc) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010100)="00000000080000000000f900b00cb2cc029f49d8b90449a7d5d54d49010000a566", 0x21, 0x4e0}, {&(0x7f0000010400)="0200000003000000040000006a000f000300040000000000000000000f00bc0f", 0x20, 0x800}, {&(0x7f0000011600)="ed41000000080000dff4655fe0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}, {0x0}, {0x0}, {0x0}], 0x0, &(0x7f0000012c00)) [ 380.293186] No source specified [ 380.329480] loop1: detected capacity change from 0 to 33 [ 380.345071] EXT4-fs (loop1): bad geometry: block count 128 exceeds size of device (8 blocks) 22:16:12 executing program 4: openat(0xffffffffffffffff, &(0x7f0000000100)='./file1\x00', 0x20801, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000240)='./file1\x00', 0x587401, 0x167) ioctl$FS_IOC_SETFLAGS(r1, 0x40086602, &(0x7f0000000040)) pwritev(r0, &(0x7f0000000080)=[{&(0x7f0000000140)='\x00', 0x1a}], 0x1, 0x7fffffc, 0x0) r2 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000040)='/sys/kernel/slab', 0x0, 0x0) getdents(r2, &(0x7f0000000080)=""/247, 0xf7) lseek(r2, 0x0, 0x0) getdents64(r2, &(0x7f0000000240)=""/226, 0x20000258) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, 0x0) mount(&(0x7f0000000740)=ANY=[@ANYBLOB="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"], &(0x7f0000000680)='./file1\x00', &(0x7f00000006c0)='hfs\x00', 0x2021080, &(0x7f0000000700)='(-\x00') r3 = perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) umount2(&(0x7f0000000200)='./file1\x00', 0x1) ioctl$SNAPSHOT_GET_IMAGE_SIZE(0xffffffffffffffff, 0x8008330e, &(0x7f0000000400)) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, 0x0) r4 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x0) dup2(r4, r4) fsetxattr$trusted_overlay_redirect(r4, &(0x7f0000000340), &(0x7f0000000380)='.\x00', 0x2, 0x1) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(r3, 0xd000943d, 0x0) 22:16:12 executing program 2: getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000040), &(0x7f0000000080)=0xc) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x0, 0x0, 0x0, &(0x7f0000012c00)) 22:16:12 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010100)="00000000080000000000f900b00cb2cc029f49d8b90449a7d5d54d49010000a566", 0x21, 0x4e0}, {&(0x7f0000010400)="0200000003000000040000006a000f000300040000000000000000000f00bc0f", 0x20, 0x800}, {&(0x7f0000011600)="ed41000000080000dff4655fe0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}, {0x0}, {0x0}, {0x0}], 0x0, &(0x7f0000012c00)) [ 380.501111] loop1: detected capacity change from 0 to 33 22:16:12 executing program 6: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_config_ext={0x4, 0x1}, 0x0, 0x0, 0x3}, 0x0, 0xfffffffffffffffe, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x80000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, 0x0) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(0xffffffffffffffff, 0xc018937c, 0x0) r1 = socket$inet6(0xa, 0x1, 0x0) getsockopt$SO_TIMESTAMPING(r1, 0x1, 0x25, &(0x7f0000000240), 0x0) bind$inet6(r1, &(0x7f00000002c0)={0xa, 0x4e20, 0x0, @empty}, 0x1c) ioctl$sock_inet_SIOCSIFNETMASK(0xffffffffffffffff, 0x891c, 0x0) r2 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000040)) setsockopt$packet_add_memb(r2, 0x107, 0x1, &(0x7f0000000080)={0x0, 0x1, 0x6, @broadcast}, 0x10) setsockopt$packet_add_memb(r2, 0x107, 0x2, &(0x7f00000001c0)={0x0, 0x1, 0x6, @random="767b24f4e073"}, 0x10) fcntl$setstatus(r2, 0x4, 0x0) connect$inet6(r1, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendmmsg(r1, &(0x7f0000004240)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0) recvfrom(r1, &(0x7f0000000140)=""/53, 0x35, 0x2110, &(0x7f0000000340)=@alg={0x26, 'hash\x00', 0x0, 0x0, 'rmd128\x00'}, 0x80) recvfrom(r1, &(0x7f00000003c0)=""/77, 0x6bc2bb1, 0x324, 0x0, 0x37) ioctl$AUTOFS_IOC_SETTIMEOUT(0xffffffffffffffff, 0x80049367, &(0x7f00000000c0)) timer_create(0x0, 0x0, &(0x7f0000000040)) [ 380.514487] EXT4-fs (loop1): bad geometry: block count 128 exceeds size of device (8 blocks) [ 380.529829] No source specified 22:16:12 executing program 2: getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000040), &(0x7f0000000080)=0xc) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x0, 0x0, 0x0, &(0x7f0000012c00)) [ 380.688984] No source specified 22:16:28 executing program 3: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x2, &(0x7f0000000000)=[{0x7c}, {0x6, 0x0, 0x0, 0x7fffffff}]}) r0 = openat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x800, 0x10e) r1 = syz_init_net_socket$802154_raw(0x24, 0x3, 0x0) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8916, &(0x7f0000001180)={'bond0\x00', {0x2, 0x0, @local}}) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f0000000080)) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = fork() perf_event_open(&(0x7f0000001280)={0x0, 0x80, 0x5, 0x0, 0x1, 0x4, 0x0, 0xe41, 0x84000, 0x8, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x9, 0x0, @perf_config_ext={0x8000, 0x100}, 0x8000, 0xffffffff, 0x2476f094, 0x0, 0x7, 0x8001, 0xffff, 0x0, 0x1, 0x0, 0x10000}, r2, 0xb, 0xffffffffffffffff, 0x2) r3 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x0) r4 = dup2(r3, r3) bind$bt_l2cap(r4, &(0x7f0000000000)={0x1f, 0x0, @fixed={'\xaa\xaa\xaa\xaa\xaa', 0x10}}, 0xe) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r0, 0xc0502100, &(0x7f0000001200)) 22:16:28 executing program 6: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x2, &(0x7f0000000000)=[{0x7c}, {0x6, 0x0, 0x0, 0x7fffffff}]}) openat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x800, 0x10e) r0 = syz_init_net_socket$802154_raw(0x24, 0x3, 0x0) ioctl$sock_inet_SIOCSIFADDR(r0, 0x8916, &(0x7f0000001180)={'bond0\x00', {0x2, 0x0, @local}}) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f0000000080)) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = fork() perf_event_open(&(0x7f0000001280)={0x0, 0x80, 0x5, 0x0, 0x1, 0x4, 0x0, 0xe41, 0x84000, 0x8, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x9, 0x0, @perf_config_ext={0x8000, 0x100}, 0x8000, 0xffffffff, 0x2476f094, 0x0, 0x7, 0x8001, 0xffff, 0x0, 0x1, 0x0, 0x10000}, r1, 0xb, 0xffffffffffffffff, 0x2) syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x0) 22:16:28 executing program 5: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x2, &(0x7f0000000000)=[{0x7c}, {0x6, 0x0, 0x0, 0x7fffffff}]}) r0 = openat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x800, 0x10e) r1 = syz_init_net_socket$802154_raw(0x24, 0x3, 0x0) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8916, &(0x7f0000001180)={'bond0\x00', {0x2, 0x0, @local}}) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f0000000080)) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = fork() perf_event_open(&(0x7f0000001280)={0x0, 0x80, 0x5, 0x0, 0x1, 0x4, 0x0, 0xe41, 0x84000, 0x8, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x9, 0x0, @perf_config_ext={0x8000, 0x100}, 0x8000, 0xffffffff, 0x2476f094, 0x0, 0x7, 0x8001, 0xffff, 0x0, 0x1, 0x0, 0x10000}, r2, 0xb, 0xffffffffffffffff, 0x2) r3 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x0) r4 = dup2(r3, r3) bind$bt_l2cap(r4, &(0x7f0000000000)={0x1f, 0x0, @fixed={'\xaa\xaa\xaa\xaa\xaa', 0x10}}, 0xe) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r0, 0xc0502100, &(0x7f0000001200)) 22:16:28 executing program 1: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010100)="00000000080000000000f900b00cb2cc029f49d8b90449a7d5d54d49010000a566", 0x21, 0x4e0}, {&(0x7f0000010400)="0200000003000000040000006a000f000300040000000000000000000f00bc0f", 0x20, 0x800}, {&(0x7f0000011600)="ed41000000080000dff4655fe0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}, {0x0}, {0x0}, {0x0}], 0x0, &(0x7f0000012c00)) 22:16:28 executing program 2: getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000040), &(0x7f0000000080)=0xc) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010100)="00000000080000000000f900b00cb2cc029f49d8b90449a7d5d54d49010000a566", 0x21, 0x4e0}, {&(0x7f0000010400)="0200000003000000040000006a000f000300040000000000000000000f00bc0f", 0x20, 0x800}, {&(0x7f0000011600)="ed41000000080000dff4655fe0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}, {0x0}, {0x0}], 0x0, &(0x7f0000012c00)) 22:16:28 executing program 4: openat(0xffffffffffffffff, &(0x7f0000000100)='./file1\x00', 0x20801, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000240)='./file1\x00', 0x587401, 0x167) ioctl$FS_IOC_SETFLAGS(r1, 0x40086602, &(0x7f0000000040)) pwritev(r0, &(0x7f0000000080)=[{&(0x7f0000000140)='\x00', 0x1a}], 0x1, 0x7fffffc, 0x0) r2 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000040)='/sys/kernel/slab', 0x0, 0x0) getdents(r2, &(0x7f0000000080)=""/247, 0xf7) lseek(r2, 0x0, 0x0) getdents64(r2, &(0x7f0000000240)=""/226, 0x20000258) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, 0x0) mount(&(0x7f0000000740)=ANY=[@ANYBLOB="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"], &(0x7f0000000680)='./file1\x00', &(0x7f00000006c0)='hfs\x00', 0x2021080, &(0x7f0000000700)='(-\x00') perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) umount2(&(0x7f0000000200)='./file1\x00', 0x1) ioctl$SNAPSHOT_GET_IMAGE_SIZE(0xffffffffffffffff, 0x8008330e, &(0x7f0000000400)) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, 0x0) r3 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x0) dup2(r3, r3) fsetxattr$trusted_overlay_redirect(r3, &(0x7f0000000340), &(0x7f0000000380)='.\x00', 0x2, 0x1) 22:16:28 executing program 0: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x2, &(0x7f0000000000)=[{0x7c}, {0x6, 0x0, 0x0, 0x7fffffff}]}) r0 = openat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x800, 0x10e) r1 = syz_init_net_socket$802154_raw(0x24, 0x3, 0x0) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8916, &(0x7f0000001180)={'bond0\x00', {0x2, 0x0, @local}}) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f0000000080)) r2 = perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = fork() perf_event_open(&(0x7f0000001280)={0x0, 0x80, 0x5, 0x0, 0x1, 0x4, 0x0, 0xe41, 0x84000, 0x8, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x9, 0x0, @perf_config_ext={0x8000, 0x100}, 0x8000, 0xffffffff, 0x2476f094, 0x0, 0x7, 0x8001, 0xffff, 0x0, 0x1, 0x0, 0x10000}, r3, 0xb, 0xffffffffffffffff, 0x2) r4 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x0) r5 = dup2(r4, r4) bind$bt_l2cap(r5, &(0x7f0000000000)={0x1f, 0x0, @fixed={'\xaa\xaa\xaa\xaa\xaa', 0x10}}, 0xe) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r0, 0xc0502100, &(0x7f0000001200)={0x0}) ioctl$SECCOMP_IOCTL_NOTIF_ADDFD(r5, 0x40182103, &(0x7f0000000100)={r6, 0x2, r0, 0x1, 0x80000}) io_uring_register$IORING_REGISTER_PERSONALITY(r2, 0x9, 0x0, 0x0) 22:16:28 executing program 7: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x2, &(0x7f0000000000)=[{0x7c}, {0x6, 0x0, 0x0, 0x7fffffff}]}) openat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x800, 0x10e) r0 = syz_init_net_socket$802154_raw(0x24, 0x3, 0x0) ioctl$sock_inet_SIOCSIFADDR(r0, 0x8916, &(0x7f0000001180)={'bond0\x00', {0x2, 0x0, @local}}) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f0000000080)) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = fork() perf_event_open(&(0x7f0000001280)={0x0, 0x80, 0x5, 0x0, 0x1, 0x4, 0x0, 0xe41, 0x84000, 0x8, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x9, 0x0, @perf_config_ext={0x8000, 0x100}, 0x8000, 0xffffffff, 0x2476f094, 0x0, 0x7, 0x8001, 0xffff, 0x0, 0x1, 0x0, 0x10000}, r1, 0xb, 0xffffffffffffffff, 0x2) [ 395.985994] loop1: detected capacity change from 0 to 33 [ 395.988940] loop2: detected capacity change from 0 to 512 22:16:28 executing program 1: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010100)="00000000080000000000f900b00cb2cc029f49d8b90449a7d5d54d49010000a566", 0x21, 0x4e0}, {&(0x7f0000010400)="0200000003000000040000006a000f000300040000000000000000000f00bc0f", 0x20, 0x800}, {&(0x7f0000011600)="ed41000000080000dff4655fe0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}, {0x0}, {0x0}, {0x0}], 0x0, &(0x7f0000012c00)) [ 396.064457] EXT4-fs error (device loop2): ext4_orphan_get:1419: comm syz-executor.2: bad orphan inode 16318464 [ 396.121191] EXT4-fs (loop2): mounted filesystem without journal. Quota mode: none. [ 396.136738] loop1: detected capacity change from 0 to 33 22:16:28 executing program 1: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010100)="00000000080000000000f900b00cb2cc029f49d8b90449a7d5d54d49010000a566", 0x21, 0x4e0}, {&(0x7f0000010400)="0200000003000000040000006a000f000300040000000000000000000f00bc0f", 0x20, 0x800}, {&(0x7f0000011600)="ed41000000080000dff4655fe0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}, {0x0}, {0x0}, {0x0}], 0x0, &(0x7f0000012c00)) [ 396.191032] loop1: detected capacity change from 0 to 33 22:16:28 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', 0x0, 0x0, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010100)="00000000080000000000f900b00cb2cc029f49d8b90449a7d5d54d49010000a566", 0x21, 0x4e0}, {&(0x7f0000010400)="0200000003000000040000006a000f000300040000000000000000000f00bc0f", 0x20, 0x800}, {&(0x7f0000011600)="ed41000000080000dff4655fe0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}, {0x0}, {0x0}, {0x0}], 0x0, &(0x7f0000012c00)) [ 396.280294] loop1: detected capacity change from 0 to 33 22:16:28 executing program 2: getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000040), &(0x7f0000000080)=0xc) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010100)="00000000080000000000f900b00cb2cc029f49d8b90449a7d5d54d49010000a566", 0x21, 0x4e0}, {&(0x7f0000010400)="0200000003000000040000006a000f000300040000000000000000000f00bc0f", 0x20, 0x800}, {&(0x7f0000011600)="ed41000000080000dff4655fe0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}, {0x0}, {0x0}], 0x0, &(0x7f0000012c00)) [ 396.361011] EXT4-fs (loop2): unmounting filesystem. 22:16:28 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', 0x0, 0x0, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010100)="00000000080000000000f900b00cb2cc029f49d8b90449a7d5d54d49010000a566", 0x21, 0x4e0}, {&(0x7f0000010400)="0200000003000000040000006a000f000300040000000000000000000f00bc0f", 0x20, 0x800}, {&(0x7f0000011600)="ed41000000080000dff4655fe0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}, {0x0}, {0x0}, {0x0}], 0x0, &(0x7f0000012c00)) 22:16:28 executing program 4: openat(0xffffffffffffffff, &(0x7f0000000100)='./file1\x00', 0x20801, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000240)='./file1\x00', 0x587401, 0x167) ioctl$FS_IOC_SETFLAGS(r1, 0x40086602, &(0x7f0000000040)) pwritev(r0, &(0x7f0000000080)=[{&(0x7f0000000140)='\x00', 0x1a}], 0x1, 0x7fffffc, 0x0) r2 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000040)='/sys/kernel/slab', 0x0, 0x0) getdents(r2, &(0x7f0000000080)=""/247, 0xf7) lseek(r2, 0x0, 0x0) getdents64(r2, &(0x7f0000000240)=""/226, 0x20000258) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, 0x0) mount(&(0x7f0000000740)=ANY=[@ANYBLOB="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"], &(0x7f0000000680)='./file1\x00', &(0x7f00000006c0)='hfs\x00', 0x2021080, &(0x7f0000000700)='(-\x00') perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) umount2(&(0x7f0000000200)='./file1\x00', 0x1) ioctl$SNAPSHOT_GET_IMAGE_SIZE(0xffffffffffffffff, 0x8008330e, &(0x7f0000000400)) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, 0x0) r3 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x0) dup2(r3, r3) [ 396.478482] loop2: detected capacity change from 0 to 512 [ 396.506560] EXT4-fs error (device loop2): ext4_orphan_get:1419: comm syz-executor.2: bad orphan inode 16318464 [ 396.508162] loop1: detected capacity change from 0 to 33 [ 396.525865] EXT4-fs (loop2): mounted filesystem without journal. Quota mode: none. 22:16:28 executing program 2: getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000040), &(0x7f0000000080)=0xc) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010100)="00000000080000000000f900b00cb2cc029f49d8b90449a7d5d54d49010000a566", 0x21, 0x4e0}, {&(0x7f0000010400)="0200000003000000040000006a000f000300040000000000000000000f00bc0f", 0x20, 0x800}, {&(0x7f0000011600)="ed41000000080000dff4655fe0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}, {0x0}, {0x0}], 0x0, &(0x7f0000012c00)) 22:16:28 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', 0x0, 0x0, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010100)="00000000080000000000f900b00cb2cc029f49d8b90449a7d5d54d49010000a566", 0x21, 0x4e0}, {&(0x7f0000010400)="0200000003000000040000006a000f000300040000000000000000000f00bc0f", 0x20, 0x800}, {&(0x7f0000011600)="ed41000000080000dff4655fe0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}, {0x0}, {0x0}, {0x0}], 0x0, &(0x7f0000012c00)) [ 396.595465] EXT4-fs (loop2): unmounting filesystem. [ 396.683567] loop2: detected capacity change from 0 to 512 22:16:29 executing program 3: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x2, &(0x7f0000000000)=[{0x7c}, {0x6, 0x0, 0x0, 0x7fffffff}]}) openat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x800, 0x10e) r0 = syz_init_net_socket$802154_raw(0x24, 0x3, 0x0) ioctl$sock_inet_SIOCSIFADDR(r0, 0x8916, &(0x7f0000001180)={'bond0\x00', {0x2, 0x0, @local}}) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f0000000080)) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = fork() perf_event_open(&(0x7f0000001280)={0x0, 0x80, 0x5, 0x0, 0x1, 0x4, 0x0, 0xe41, 0x84000, 0x8, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x9, 0x0, @perf_config_ext={0x8000, 0x100}, 0x8000, 0xffffffff, 0x2476f094, 0x0, 0x7, 0x8001, 0xffff, 0x0, 0x1, 0x0, 0x10000}, r1, 0xb, 0xffffffffffffffff, 0x2) r2 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x0) r3 = dup2(r2, r2) bind$bt_l2cap(r3, &(0x7f0000000000)={0x1f, 0x0, @fixed={'\xaa\xaa\xaa\xaa\xaa', 0x10}}, 0xe) [ 396.706363] EXT4-fs error (device loop2): ext4_orphan_get:1419: comm syz-executor.2: bad orphan inode 16318464 [ 396.708533] EXT4-fs (loop2): mounted filesystem without journal. Quota mode: none. [ 396.746932] EXT4-fs (loop2): unmounting filesystem. [ 396.752525] loop1: detected capacity change from 0 to 33 22:16:29 executing program 6: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x2, &(0x7f0000000000)=[{0x7c}, {0x6, 0x0, 0x0, 0x7fffffff}]}) r0 = openat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x800, 0x10e) r1 = syz_init_net_socket$802154_raw(0x24, 0x3, 0x0) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8916, &(0x7f0000001180)={'bond0\x00', {0x2, 0x0, @local}}) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f0000000080)) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = fork() perf_event_open(&(0x7f0000001280)={0x0, 0x80, 0x5, 0x0, 0x1, 0x4, 0x0, 0xe41, 0x84000, 0x8, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x9, 0x0, @perf_config_ext={0x8000, 0x100}, 0x8000, 0xffffffff, 0x2476f094, 0x0, 0x7, 0x8001, 0xffff, 0x0, 0x1, 0x0, 0x10000}, r2, 0xb, 0xffffffffffffffff, 0x2) r3 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x0) r4 = dup2(r3, r3) bind$bt_l2cap(r4, &(0x7f0000000000)={0x1f, 0x0, @fixed={'\xaa\xaa\xaa\xaa\xaa', 0x10}}, 0xe) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r0, 0xc0502100, &(0x7f0000001200)={0x0}) ioctl$SECCOMP_IOCTL_NOTIF_ADDFD(r4, 0x40182103, &(0x7f0000000100)={r5, 0x2, r0, 0x1, 0x80000}) 22:16:43 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000012c00)) [ 411.124611] No source specified 22:16:43 executing program 4: openat(0xffffffffffffffff, &(0x7f0000000100)='./file1\x00', 0x20801, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000240)='./file1\x00', 0x587401, 0x167) ioctl$FS_IOC_SETFLAGS(r1, 0x40086602, &(0x7f0000000040)) pwritev(r0, &(0x7f0000000080)=[{&(0x7f0000000140)='\x00', 0x1a}], 0x1, 0x7fffffc, 0x0) r2 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000040)='/sys/kernel/slab', 0x0, 0x0) getdents(r2, &(0x7f0000000080)=""/247, 0xf7) lseek(r2, 0x0, 0x0) getdents64(r2, &(0x7f0000000240)=""/226, 0x20000258) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, 0x0) mount(&(0x7f0000000740)=ANY=[@ANYBLOB="d6aff907df6dd777ed9d8489ced5f94d2b880aec65a8c7078e974ab5155c89c922675cef313f2de44aae6026c8a3f7e174022fff96734f2b10f8c29a12d96bb909b05d7131d5641e694abc10983a2a94443e027766d623e51ea4f0d4bb8905aa26a756f7dccb95249d8655d44171b1ca83092a4df6438628e47f35e8c4e40eab260ae59de413afcf17bdd970481163ebdb5d4ad41509c4648265ae97a530f0a0352f50518231d37e9c1e0bf5f69b04aa9c7b32883584d83a5fca23b4af4d11e282ddd1e807c60d41d053dca1b6e8220e54e556c15c126dfbe38f5039c715cae0400497f9a741c0ddd2f0e68e29175655141c353c939cb8fa3bf38f9f72da08b0af9ff4145fe28ce5f796a1f2077f7c1cfb2b2630c9e7b0c6060e7682a9f12d4fc98edce5f67929c79650a31527c0e6d2b0d0eeb27c5b846501f9ff89da1525d75b191f6e3c04421db98e7771e26d9afd960183132522c398860a528972a19b1ca035078a09803b90dc8a86e57027eaab46dc3a3a592abd0626da3c2171f392acffa1f8eb0fa129b4481c59a749e6"], &(0x7f0000000680)='./file1\x00', &(0x7f00000006c0)='hfs\x00', 0x2021080, &(0x7f0000000700)='(-\x00') perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) umount2(&(0x7f0000000200)='./file1\x00', 0x1) ioctl$SNAPSHOT_GET_IMAGE_SIZE(0xffffffffffffffff, 0x8008330e, &(0x7f0000000400)) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, 0x0) syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x0) 22:16:43 executing program 3: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x2, &(0x7f0000000000)=[{0x7c}, {0x6, 0x0, 0x0, 0x7fffffff}]}) openat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x800, 0x10e) r0 = syz_init_net_socket$802154_raw(0x24, 0x3, 0x0) ioctl$sock_inet_SIOCSIFADDR(r0, 0x8916, &(0x7f0000001180)={'bond0\x00', {0x2, 0x0, @local}}) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f0000000080)) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = fork() perf_event_open(&(0x7f0000001280)={0x0, 0x80, 0x5, 0x0, 0x1, 0x4, 0x0, 0xe41, 0x84000, 0x8, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x9, 0x0, @perf_config_ext={0x8000, 0x100}, 0x8000, 0xffffffff, 0x2476f094, 0x0, 0x7, 0x8001, 0xffff, 0x0, 0x1, 0x0, 0x10000}, r1, 0xb, 0xffffffffffffffff, 0x2) syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x0) bind$bt_l2cap(0xffffffffffffffff, &(0x7f0000000000)={0x1f, 0x0, @fixed={'\xaa\xaa\xaa\xaa\xaa', 0x10}}, 0xe) 22:16:43 executing program 6: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x2, &(0x7f0000000000)=[{0x7c}, {0x6, 0x0, 0x0, 0x7fffffff}]}) r0 = openat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x800, 0x10e) r1 = syz_init_net_socket$802154_raw(0x24, 0x3, 0x0) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8916, &(0x7f0000001180)={'bond0\x00', {0x2, 0x0, @local}}) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f0000000080)) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = fork() perf_event_open(&(0x7f0000001280)={0x0, 0x80, 0x5, 0x0, 0x1, 0x4, 0x0, 0xe41, 0x84000, 0x8, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x9, 0x0, @perf_config_ext={0x8000, 0x100}, 0x8000, 0xffffffff, 0x2476f094, 0x0, 0x7, 0x8001, 0xffff, 0x0, 0x1, 0x0, 0x10000}, r2, 0xb, 0xffffffffffffffff, 0x2) r3 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x0) r4 = dup2(r3, r3) bind$bt_l2cap(r4, &(0x7f0000000000)={0x1f, 0x0, @fixed={'\xaa\xaa\xaa\xaa\xaa', 0x10}}, 0xe) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r0, 0xc0502100, &(0x7f0000001200)={0x0}) ioctl$SECCOMP_IOCTL_NOTIF_ADDFD(r4, 0x40182103, &(0x7f0000000100)={r5, 0x2, r0, 0x1, 0x80000}) 22:16:43 executing program 2: getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000040), &(0x7f0000000080)=0xc) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010100)="00000000080000000000f900b00cb2cc029f49d8b90449a7d5d54d49010000a566", 0x21, 0x4e0}, {&(0x7f0000010400)="0200000003000000040000006a000f000300040000000000000000000f00bc0f", 0x20, 0x800}, {&(0x7f0000011600)="ed41000000080000dff4655fe0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}, {0x0}, {0x0}], 0x0, &(0x7f0000012c00)) 22:16:43 executing program 7: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x2, &(0x7f0000000000)=[{0x7c}, {0x6, 0x0, 0x0, 0x7fffffff}]}) openat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x800, 0x10e) r0 = syz_init_net_socket$802154_raw(0x24, 0x3, 0x0) ioctl$sock_inet_SIOCSIFADDR(r0, 0x8916, &(0x7f0000001180)={'bond0\x00', {0x2, 0x0, @local}}) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f0000000080)) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fork() 22:16:43 executing program 0: openat(0xffffffffffffffff, &(0x7f0000000100)='./file1\x00', 0x20801, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000240)='./file1\x00', 0x587401, 0x167) ioctl$FS_IOC_SETFLAGS(r1, 0x40086602, &(0x7f0000000040)) pwritev(r0, &(0x7f0000000080)=[{&(0x7f0000000140)='\x00', 0x1a}], 0x1, 0x7fffffc, 0x0) r2 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000040)='/sys/kernel/slab', 0x0, 0x0) getdents(r2, &(0x7f0000000080)=""/247, 0xf7) lseek(r2, 0x0, 0x0) getdents64(r2, &(0x7f0000000240)=""/226, 0x20000258) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, 0x0) mount(&(0x7f0000000740)=ANY=[@ANYBLOB="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"], &(0x7f0000000680)='./file1\x00', &(0x7f00000006c0)='hfs\x00', 0x2021080, &(0x7f0000000700)='(-\x00') perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) umount2(&(0x7f0000000200)='./file1\x00', 0x1) ioctl$SNAPSHOT_GET_IMAGE_SIZE(0xffffffffffffffff, 0x8008330e, &(0x7f0000000400)) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, 0x0) r3 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x0) dup2(r3, r3) fsetxattr$trusted_overlay_redirect(r3, &(0x7f0000000340), &(0x7f0000000380)='.\x00', 0x2, 0x1) 22:16:43 executing program 5: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x2, &(0x7f0000000000)=[{0x7c}, {0x6, 0x0, 0x0, 0x7fffffff}]}) openat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x800, 0x10e) r0 = syz_init_net_socket$802154_raw(0x24, 0x3, 0x0) ioctl$sock_inet_SIOCSIFADDR(r0, 0x8916, &(0x7f0000001180)={'bond0\x00', {0x2, 0x0, @local}}) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f0000000080)) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = fork() perf_event_open(&(0x7f0000001280)={0x0, 0x80, 0x5, 0x0, 0x1, 0x4, 0x0, 0xe41, 0x84000, 0x8, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x9, 0x0, @perf_config_ext={0x8000, 0x100}, 0x8000, 0xffffffff, 0x2476f094, 0x0, 0x7, 0x8001, 0xffff, 0x0, 0x1, 0x0, 0x10000}, r1, 0xb, 0xffffffffffffffff, 0x2) r2 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x0) r3 = dup2(r2, r2) bind$bt_l2cap(r3, &(0x7f0000000000)={0x1f, 0x0, @fixed={'\xaa\xaa\xaa\xaa\xaa', 0x10}}, 0xe) 22:16:43 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000012c00)) [ 411.203149] loop2: detected capacity change from 0 to 512 [ 411.225195] No source specified [ 411.278919] EXT4-fs error (device loop2): ext4_orphan_get:1419: comm syz-executor.2: bad orphan inode 16318464 22:16:43 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000012c00)) [ 411.316257] EXT4-fs (loop2): mounted filesystem without journal. Quota mode: none. [ 411.372608] No source specified 22:16:43 executing program 4: openat(0xffffffffffffffff, &(0x7f0000000100)='./file1\x00', 0x20801, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000240)='./file1\x00', 0x587401, 0x167) ioctl$FS_IOC_SETFLAGS(r1, 0x40086602, &(0x7f0000000040)) pwritev(r0, &(0x7f0000000080)=[{&(0x7f0000000140)='\x00', 0x1a}], 0x1, 0x7fffffc, 0x0) r2 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000040)='/sys/kernel/slab', 0x0, 0x0) getdents(r2, &(0x7f0000000080)=""/247, 0xf7) lseek(r2, 0x0, 0x0) getdents64(r2, &(0x7f0000000240)=""/226, 0x20000258) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, 0x0) mount(&(0x7f0000000740)=ANY=[@ANYBLOB="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"], &(0x7f0000000680)='./file1\x00', &(0x7f00000006c0)='hfs\x00', 0x2021080, &(0x7f0000000700)='(-\x00') perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) umount2(&(0x7f0000000200)='./file1\x00', 0x1) ioctl$SNAPSHOT_GET_IMAGE_SIZE(0xffffffffffffffff, 0x8008330e, &(0x7f0000000400)) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, 0x0) 22:16:43 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010100)="00000000080000000000f900b00cb2cc029f49d8b90449a7d5d54d49010000a566", 0x21, 0x4e0}, {&(0x7f0000010400)="0200000003000000040000006a000f000300040000000000000000000f00bc0f", 0x20, 0x800}, {&(0x7f0000011600)="ed41000000080000dff4655fe0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}, {0x0}, {0x0}], 0x0, &(0x7f0000012c00)) 22:16:43 executing program 0: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x2, &(0x7f0000000000)=[{0x7c}, {0x6, 0x0, 0x0, 0x7fffffff}]}) openat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x800, 0x10e) r0 = syz_init_net_socket$802154_raw(0x24, 0x3, 0x0) ioctl$sock_inet_SIOCSIFADDR(r0, 0x8916, &(0x7f0000001180)={'bond0\x00', {0x2, 0x0, @local}}) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f0000000080)) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = fork() perf_event_open(&(0x7f0000001280)={0x0, 0x80, 0x5, 0x0, 0x1, 0x4, 0x0, 0xe41, 0x84000, 0x8, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x9, 0x0, @perf_config_ext={0x8000, 0x100}, 0x8000, 0xffffffff, 0x2476f094, 0x0, 0x7, 0x8001, 0xffff, 0x0, 0x1, 0x0, 0x10000}, r1, 0xb, 0xffffffffffffffff, 0x2) r2 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x0) r3 = dup2(r2, r2) bind$bt_l2cap(r3, &(0x7f0000000000)={0x1f, 0x0, @fixed={'\xaa\xaa\xaa\xaa\xaa', 0x10}}, 0xe) 22:16:43 executing program 2: getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000040), &(0x7f0000000080)=0xc) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010100)="00000000080000000000f900b00cb2cc029f49d8b90449a7d5d54d49010000a566", 0x21, 0x4e0}, {&(0x7f0000010400)="0200000003000000040000006a000f000300040000000000000000000f00bc0f", 0x20, 0x800}, {&(0x7f0000011600)="ed41000000080000dff4655fe0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}, {0x0}, {0x0}], 0x0, &(0x7f0000012c00)) [ 411.536016] EXT4-fs (loop2): unmounting filesystem. [ 411.536069] loop1: detected capacity change from 0 to 33 [ 411.561983] EXT4-fs (loop1): bad geometry: block count 128 exceeds size of device (8 blocks) [ 411.710707] loop2: detected capacity change from 0 to 512 [ 411.738441] EXT4-fs error (device loop2): ext4_orphan_get:1419: comm syz-executor.2: bad orphan inode 16318464 [ 411.741464] EXT4-fs (loop2): mounted filesystem without journal. Quota mode: none. [ 411.825855] EXT4-fs (loop2): unmounting filesystem. 22:17:00 executing program 7: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x2, &(0x7f0000000000)=[{0x7c}, {0x6, 0x0, 0x0, 0x7fffffff}]}) openat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x800, 0x10e) r0 = syz_init_net_socket$802154_raw(0x24, 0x3, 0x0) ioctl$sock_inet_SIOCSIFADDR(r0, 0x8916, &(0x7f0000001180)={'bond0\x00', {0x2, 0x0, @local}}) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f0000000080)) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) 22:17:00 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010100)="00000000080000000000f900b00cb2cc029f49d8b90449a7d5d54d49010000a566", 0x21, 0x4e0}, {&(0x7f0000010400)="0200000003000000040000006a000f000300040000000000000000000f00bc0f", 0x20, 0x800}, {&(0x7f0000011600)="ed41000000080000dff4655fe0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}, {0x0}], 0x0, &(0x7f0000012c00)) 22:17:00 executing program 6: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x2, &(0x7f0000000000)=[{0x7c}, {0x6, 0x0, 0x0, 0x7fffffff}]}) openat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x800, 0x10e) r0 = syz_init_net_socket$802154_raw(0x24, 0x3, 0x0) ioctl$sock_inet_SIOCSIFADDR(r0, 0x8916, &(0x7f0000001180)={'bond0\x00', {0x2, 0x0, @local}}) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f0000000080)) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = fork() perf_event_open(&(0x7f0000001280)={0x0, 0x80, 0x5, 0x0, 0x1, 0x4, 0x0, 0xe41, 0x84000, 0x8, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x9, 0x0, @perf_config_ext={0x8000, 0x100}, 0x8000, 0xffffffff, 0x2476f094, 0x0, 0x7, 0x8001, 0xffff, 0x0, 0x1, 0x0, 0x10000}, r1, 0xb, 0xffffffffffffffff, 0x2) r2 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x0) r3 = dup2(r2, r2) bind$bt_l2cap(r3, &(0x7f0000000000)={0x1f, 0x0, @fixed={'\xaa\xaa\xaa\xaa\xaa', 0x10}}, 0xe) 22:17:00 executing program 4: openat(0xffffffffffffffff, &(0x7f0000000100)='./file1\x00', 0x20801, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000240)='./file1\x00', 0x587401, 0x167) ioctl$FS_IOC_SETFLAGS(r1, 0x40086602, &(0x7f0000000040)) pwritev(r0, &(0x7f0000000080)=[{&(0x7f0000000140)='\x00', 0x1a}], 0x1, 0x7fffffc, 0x0) r2 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000040)='/sys/kernel/slab', 0x0, 0x0) getdents(r2, &(0x7f0000000080)=""/247, 0xf7) lseek(r2, 0x0, 0x0) getdents64(r2, &(0x7f0000000240)=""/226, 0x20000258) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, 0x0) mount(&(0x7f0000000740)=ANY=[@ANYBLOB="d6aff907df6dd777ed9d8489ced5f94d2b880aec65a8c7078e974ab5155c89c922675cef313f2de44aae6026c8a3f7e174022fff96734f2b10f8c29a12d96bb909b05d7131d5641e694abc10983a2a94443e027766d623e51ea4f0d4bb8905aa26a756f7dccb95249d8655d44171b1ca83092a4df6438628e47f35e8c4e40eab260ae59de413afcf17bdd970481163ebdb5d4ad41509c4648265ae97a530f0a0352f50518231d37e9c1e0bf5f69b04aa9c7b32883584d83a5fca23b4af4d11e282ddd1e807c60d41d053dca1b6e8220e54e556c15c126dfbe38f5039c715cae0400497f9a741c0ddd2f0e68e29175655141c353c939cb8fa3bf38f9f72da08b0af9ff4145fe28ce5f796a1f2077f7c1cfb2b2630c9e7b0c6060e7682a9f12d4fc98edce5f67929c79650a31527c0e6d2b0d0eeb27c5b846501f9ff89da1525d75b191f6e3c04421db98e7771e26d9afd960183132522c398860a528972a19b1ca035078a09803b90dc8a86e57027eaab46dc3a3a592abd0626da3c2171f392acffa1f8eb0fa129b4481c59a749e6"], &(0x7f0000000680)='./file1\x00', &(0x7f00000006c0)='hfs\x00', 0x2021080, &(0x7f0000000700)='(-\x00') perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) umount2(&(0x7f0000000200)='./file1\x00', 0x1) ioctl$SNAPSHOT_GET_IMAGE_SIZE(0xffffffffffffffff, 0x8008330e, &(0x7f0000000400)) 22:17:00 executing program 5: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x2, &(0x7f0000000000)=[{0x7c}, {0x6, 0x0, 0x0, 0x7fffffff}]}) openat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x800, 0x10e) r0 = syz_init_net_socket$802154_raw(0x24, 0x3, 0x0) ioctl$sock_inet_SIOCSIFADDR(r0, 0x8916, &(0x7f0000001180)={'bond0\x00', {0x2, 0x0, @local}}) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f0000000080)) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = fork() perf_event_open(&(0x7f0000001280)={0x0, 0x80, 0x5, 0x0, 0x1, 0x4, 0x0, 0xe41, 0x84000, 0x8, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x9, 0x0, @perf_config_ext={0x8000, 0x100}, 0x8000, 0xffffffff, 0x2476f094, 0x0, 0x7, 0x8001, 0xffff, 0x0, 0x1, 0x0, 0x10000}, r1, 0xb, 0xffffffffffffffff, 0x2) r2 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x0) dup2(r2, r2) 22:17:00 executing program 2: getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000040), &(0x7f0000000080)=0xc) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010100)="00000000080000000000f900b00cb2cc029f49d8b90449a7d5d54d49010000a566", 0x21, 0x4e0}, {&(0x7f0000010400)="0200000003000000040000006a000f000300040000000000000000000f00bc0f", 0x20, 0x800}, {&(0x7f0000011600)="ed41000000080000dff4655fe0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}, {0x0}, {0x0}], 0x0, &(0x7f0000012c00)) 22:17:00 executing program 3: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x2, &(0x7f0000000000)=[{0x7c}, {0x6, 0x0, 0x0, 0x7fffffff}]}) openat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x800, 0x10e) r0 = syz_init_net_socket$802154_raw(0x24, 0x3, 0x0) ioctl$sock_inet_SIOCSIFADDR(r0, 0x8916, &(0x7f0000001180)={'bond0\x00', {0x2, 0x0, @local}}) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f0000000080)) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = fork() perf_event_open(&(0x7f0000001280)={0x0, 0x80, 0x5, 0x0, 0x1, 0x4, 0x0, 0xe41, 0x84000, 0x8, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x9, 0x0, @perf_config_ext={0x8000, 0x100}, 0x8000, 0xffffffff, 0x2476f094, 0x0, 0x7, 0x8001, 0xffff, 0x0, 0x1, 0x0, 0x10000}, r1, 0xb, 0xffffffffffffffff, 0x2) syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x0) bind$bt_l2cap(0xffffffffffffffff, &(0x7f0000000000)={0x1f, 0x0, @fixed={'\xaa\xaa\xaa\xaa\xaa', 0x10}}, 0xe) 22:17:00 executing program 0: openat(0xffffffffffffffff, &(0x7f0000000100)='./file1\x00', 0x20801, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000240)='./file1\x00', 0x587401, 0x167) ioctl$FS_IOC_SETFLAGS(r1, 0x40086602, &(0x7f0000000040)) pwritev(r0, &(0x7f0000000080)=[{&(0x7f0000000140)='\x00', 0x1a}], 0x1, 0x7fffffc, 0x0) r2 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000040)='/sys/kernel/slab', 0x0, 0x0) getdents(r2, &(0x7f0000000080)=""/247, 0xf7) lseek(r2, 0x0, 0x0) getdents64(r2, &(0x7f0000000240)=""/226, 0x20000258) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, 0x0) mount(&(0x7f0000000740)=ANY=[@ANYBLOB="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"], &(0x7f0000000680)='./file1\x00', &(0x7f00000006c0)='hfs\x00', 0x2021080, &(0x7f0000000700)='(-\x00') r3 = perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) umount2(&(0x7f0000000200)='./file1\x00', 0x1) ioctl$SNAPSHOT_GET_IMAGE_SIZE(0xffffffffffffffff, 0x8008330e, &(0x7f0000000400)) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, 0x0) r4 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x0) dup2(r4, r4) fsetxattr$trusted_overlay_redirect(r4, &(0x7f0000000340), &(0x7f0000000380)='.\x00', 0x2, 0x1) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(r3, 0xd000943d, 0x0) [ 428.609681] loop1: detected capacity change from 0 to 33 [ 428.632405] EXT4-fs (loop1): bad geometry: block count 128 exceeds size of device (8 blocks) [ 428.644911] loop2: detected capacity change from 0 to 512 [ 428.696851] EXT4-fs error (device loop2): ext4_orphan_get:1419: comm syz-executor.2: bad orphan inode 16318464 [ 428.714593] EXT4-fs (loop2): mounted filesystem without journal. Quota mode: none. 22:17:01 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010100)="00000000080000000000f900b00cb2cc029f49d8b90449a7d5d54d49010000a566", 0x21, 0x4e0}, {&(0x7f0000010400)="0200000003000000040000006a000f000300040000000000000000000f00bc0f", 0x20, 0x800}, {&(0x7f0000011600)="ed41000000080000dff4655fe0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000012c00)) 22:17:01 executing program 2: getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000040), &(0x7f0000000080)=0xc) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010100)="00000000080000000000f900b00cb2cc029f49d8b90449a7d5d54d49010000a566", 0x21, 0x4e0}, {&(0x7f0000010400)="0200000003000000040000006a000f000300040000000000000000000f00bc0f", 0x20, 0x800}, {&(0x7f0000011600)="ed41000000080000dff4655fe0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}, {0x0}, {0x0}], 0x0, &(0x7f0000012c00)) [ 428.882278] EXT4-fs (loop2): unmounting filesystem. [ 428.977286] loop1: detected capacity change from 0 to 33 [ 429.003137] EXT4-fs (loop1): bad geometry: block count 128 exceeds size of device (8 blocks) [ 429.050607] loop2: detected capacity change from 0 to 512 22:17:01 executing program 4: openat(0xffffffffffffffff, &(0x7f0000000100)='./file1\x00', 0x20801, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000240)='./file1\x00', 0x587401, 0x167) ioctl$FS_IOC_SETFLAGS(r1, 0x40086602, &(0x7f0000000040)) pwritev(r0, &(0x7f0000000080)=[{&(0x7f0000000140)='\x00', 0x1a}], 0x1, 0x7fffffc, 0x0) r2 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000040)='/sys/kernel/slab', 0x0, 0x0) getdents(r2, &(0x7f0000000080)=""/247, 0xf7) lseek(r2, 0x0, 0x0) getdents64(r2, &(0x7f0000000240)=""/226, 0x20000258) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, 0x0) mount(&(0x7f0000000740)=ANY=[@ANYBLOB="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"], &(0x7f0000000680)='./file1\x00', &(0x7f00000006c0)='hfs\x00', 0x2021080, &(0x7f0000000700)='(-\x00') perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) umount2(&(0x7f0000000200)='./file1\x00', 0x1) 22:17:01 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010100)="00000000080000000000f900b00cb2cc029f49d8b90449a7d5d54d49010000a566", 0x21, 0x4e0}, {&(0x7f0000010400)="0200000003000000040000006a000f000300040000000000000000000f00bc0f", 0x20, 0x800}], 0x0, &(0x7f0000012c00)) [ 429.156214] EXT4-fs error (device loop2): ext4_orphan_get:1419: comm syz-executor.2: bad orphan inode 16318464 [ 429.158074] EXT4-fs (loop2): mounted filesystem without journal. Quota mode: none. [ 429.318408] loop1: detected capacity change from 0 to 8 [ 429.345320] EXT4-fs (loop1): bad geometry: block count 128 exceeds size of device (2 blocks) 22:17:01 executing program 2: getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000040), &(0x7f0000000080)=0xc) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010100)="00000000080000000000f900b00cb2cc029f49d8b90449a7d5d54d49010000a566", 0x21, 0x4e0}, {&(0x7f0000010400)="0200000003000000040000006a000f000300040000000000000000000f00bc0f", 0x20, 0x800}, {&(0x7f0000011600)="ed41000000080000dff4655fe0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}, {0x0}, {0x0}], 0x0, &(0x7f0000012c00)) [ 429.382321] EXT4-fs (loop2): unmounting filesystem. 22:17:01 executing program 7: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x2, &(0x7f0000000000)=[{0x7c}, {0x6, 0x0, 0x0, 0x7fffffff}]}) openat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x800, 0x10e) r0 = syz_init_net_socket$802154_raw(0x24, 0x3, 0x0) ioctl$sock_inet_SIOCSIFADDR(r0, 0x8916, &(0x7f0000001180)={'bond0\x00', {0x2, 0x0, @local}}) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f0000000080)) 22:17:01 executing program 4: openat(0xffffffffffffffff, &(0x7f0000000100)='./file1\x00', 0x20801, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000240)='./file1\x00', 0x587401, 0x167) ioctl$FS_IOC_SETFLAGS(r1, 0x40086602, &(0x7f0000000040)) pwritev(r0, &(0x7f0000000080)=[{&(0x7f0000000140)='\x00', 0x1a}], 0x1, 0x7fffffc, 0x0) r2 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000040)='/sys/kernel/slab', 0x0, 0x0) getdents(r2, &(0x7f0000000080)=""/247, 0xf7) lseek(r2, 0x0, 0x0) getdents64(r2, &(0x7f0000000240)=""/226, 0x20000258) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, 0x0) mount(&(0x7f0000000740)=ANY=[@ANYBLOB="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"], &(0x7f0000000680)='./file1\x00', &(0x7f00000006c0)='hfs\x00', 0x2021080, &(0x7f0000000700)='(-\x00') perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) 22:17:01 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010100)="00000000080000000000f900b00cb2cc029f49d8b90449a7d5d54d49010000a566", 0x21, 0x4e0}], 0x0, &(0x7f0000012c00)) [ 429.528321] loop2: detected capacity change from 0 to 512 [ 429.575168] EXT4-fs error (device loop2): ext4_orphan_get:1419: comm syz-executor.2: bad orphan inode 16318464 [ 429.584158] loop1: detected capacity change from 0 to 4 [ 429.585002] EXT4-fs (loop2): mounted filesystem without journal. Quota mode: none. 22:17:01 executing program 0: getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000040), &(0x7f0000000080)=0xc) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010100)="00000000080000000000f900b00cb2cc029f49d8b90449a7d5d54d49010000a566", 0x21, 0x4e0}, {&(0x7f0000010400)="0200000003000000040000006a000f000300040000000000000000000f00bc0f", 0x20, 0x800}, {&(0x7f0000011600)="ed41000000080000dff4655fe0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}, {0x0}, {0x0}], 0x0, &(0x7f0000012c00)) [ 429.617027] EXT4-fs (loop1): bad geometry: block count 128 exceeds size of device (1 blocks) [ 429.660339] loop0: detected capacity change from 0 to 512 [ 429.685587] EXT4-fs error (device loop0): ext4_orphan_get:1419: comm syz-executor.0: bad orphan inode 16318464 [ 429.687584] EXT4-fs (loop0): mounted filesystem without journal. Quota mode: none. 22:17:02 executing program 2: getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000040), &(0x7f0000000080)=0xc) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010100)="00000000080000000000f900b00cb2cc029f49d8b90449a7d5d54d49010000a566", 0x21, 0x4e0}, {&(0x7f0000010400)="0200000003000000040000006a000f000300040000000000000000000f00bc0f", 0x20, 0x800}, {&(0x7f0000011600)="ed41000000080000dff4655fe0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}, {0x0}, {0x0}], 0x0, &(0x7f0000012c00)) [ 429.730270] EXT4-fs (loop2): unmounting filesystem. [ 429.774559] EXT4-fs (loop0): unmounting filesystem. 22:17:02 executing program 0: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x2, &(0x7f0000000000)=[{0x7c}, {0x6, 0x0, 0x0, 0x7fffffff}]}) openat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x800, 0x10e) r0 = syz_init_net_socket$802154_raw(0x24, 0x3, 0x0) ioctl$sock_inet_SIOCSIFADDR(r0, 0x8916, &(0x7f0000001180)={'bond0\x00', {0x2, 0x0, @local}}) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f0000000080)) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fork() [ 429.880839] loop2: detected capacity change from 0 to 512 [ 429.898554] EXT4-fs error (device loop2): ext4_orphan_get:1419: comm syz-executor.2: bad orphan inode 16318464 [ 429.900348] EXT4-fs (loop2): mounted filesystem without journal. Quota mode: none. [ 429.932262] EXT4-fs (loop2): unmounting filesystem. 22:17:17 executing program 7: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x2, &(0x7f0000000000)=[{0x7c}, {0x6, 0x0, 0x0, 0x7fffffff}]}) openat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x800, 0x10e) r0 = syz_init_net_socket$802154_raw(0x24, 0x3, 0x0) ioctl$sock_inet_SIOCSIFADDR(r0, 0x8916, &(0x7f0000001180)={'bond0\x00', {0x2, 0x0, @local}}) 22:17:17 executing program 3: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x2, &(0x7f0000000000)=[{0x7c}, {0x6, 0x0, 0x0, 0x7fffffff}]}) openat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x800, 0x10e) r0 = syz_init_net_socket$802154_raw(0x24, 0x3, 0x0) ioctl$sock_inet_SIOCSIFADDR(r0, 0x8916, &(0x7f0000001180)={'bond0\x00', {0x2, 0x0, @local}}) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f0000000080)) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = fork() perf_event_open(&(0x7f0000001280)={0x0, 0x80, 0x5, 0x0, 0x1, 0x4, 0x0, 0xe41, 0x84000, 0x8, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x9, 0x0, @perf_config_ext={0x8000, 0x100}, 0x8000, 0xffffffff, 0x2476f094, 0x0, 0x7, 0x8001, 0xffff, 0x0, 0x1, 0x0, 0x10000}, r1, 0xb, 0xffffffffffffffff, 0x2) syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x0) bind$bt_l2cap(0xffffffffffffffff, &(0x7f0000000000)={0x1f, 0x0, @fixed={'\xaa\xaa\xaa\xaa\xaa', 0x10}}, 0xe) 22:17:17 executing program 5: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x2, &(0x7f0000000000)=[{0x7c}, {0x6, 0x0, 0x0, 0x7fffffff}]}) openat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x800, 0x10e) r0 = syz_init_net_socket$802154_raw(0x24, 0x3, 0x0) ioctl$sock_inet_SIOCSIFADDR(r0, 0x8916, &(0x7f0000001180)={'bond0\x00', {0x2, 0x0, @local}}) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f0000000080)) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = fork() perf_event_open(&(0x7f0000001280)={0x0, 0x80, 0x5, 0x0, 0x1, 0x4, 0x0, 0xe41, 0x84000, 0x8, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x9, 0x0, @perf_config_ext={0x8000, 0x100}, 0x8000, 0xffffffff, 0x2476f094, 0x0, 0x7, 0x8001, 0xffff, 0x0, 0x1, 0x0, 0x10000}, r1, 0xb, 0xffffffffffffffff, 0x2) syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x0) 22:17:17 executing program 0: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x2, &(0x7f0000000000)=[{0x7c}, {0x6, 0x0, 0x0, 0x7fffffff}]}) openat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x800, 0x10e) r0 = syz_init_net_socket$802154_raw(0x24, 0x3, 0x0) ioctl$sock_inet_SIOCSIFADDR(r0, 0x8916, &(0x7f0000001180)={'bond0\x00', {0x2, 0x0, @local}}) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f0000000080)) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fork() 22:17:17 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}], 0x0, &(0x7f0000012c00)) 22:17:17 executing program 4: openat(0xffffffffffffffff, &(0x7f0000000100)='./file1\x00', 0x20801, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000240)='./file1\x00', 0x587401, 0x167) ioctl$FS_IOC_SETFLAGS(r1, 0x40086602, &(0x7f0000000040)) pwritev(r0, &(0x7f0000000080)=[{&(0x7f0000000140)='\x00', 0x1a}], 0x1, 0x7fffffc, 0x0) r2 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000040)='/sys/kernel/slab', 0x0, 0x0) getdents(r2, &(0x7f0000000080)=""/247, 0xf7) lseek(r2, 0x0, 0x0) getdents64(r2, &(0x7f0000000240)=""/226, 0x20000258) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, 0x0) mount(&(0x7f0000000740)=ANY=[@ANYBLOB="d6aff907df6dd777ed9d8489ced5f94d2b880aec65a8c7078e974ab5155c89c922675cef313f2de44aae6026c8a3f7e174022fff96734f2b10f8c29a12d96bb909b05d7131d5641e694abc10983a2a94443e027766d623e51ea4f0d4bb8905aa26a756f7dccb95249d8655d44171b1ca83092a4df6438628e47f35e8c4e40eab260ae59de413afcf17bdd970481163ebdb5d4ad41509c4648265ae97a530f0a0352f50518231d37e9c1e0bf5f69b04aa9c7b32883584d83a5fca23b4af4d11e282ddd1e807c60d41d053dca1b6e8220e54e556c15c126dfbe38f5039c715cae0400497f9a741c0ddd2f0e68e29175655141c353c939cb8fa3bf38f9f72da08b0af9ff4145fe28ce5f796a1f2077f7c1cfb2b2630c9e7b0c6060e7682a9f12d4fc98edce5f67929c79650a31527c0e6d2b0d0eeb27c5b846501f9ff89da1525d75b191f6e3c04421db98e7771e26d9afd960183132522c398860a528972a19b1ca035078a09803b90dc8a86e57027eaab46dc3a3a592abd0626da3c2171f392acffa1f8eb0fa129b4481c59a749e6"], &(0x7f0000000680)='./file1\x00', &(0x7f00000006c0)='hfs\x00', 0x2021080, &(0x7f0000000700)='(-\x00') 22:17:17 executing program 2: getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000040), &(0x7f0000000080)=0xc) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010100)="00000000080000000000f900b00cb2cc029f49d8b90449a7d5d54d49010000a566", 0x21, 0x4e0}, {&(0x7f0000010400)="0200000003000000040000006a000f000300040000000000000000000f00bc0f", 0x20, 0x800}, {0x0}, {0x0}, {0x0}], 0x0, &(0x7f0000012c00)) 22:17:17 executing program 6: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x2, &(0x7f0000000000)=[{0x7c}, {0x6, 0x0, 0x0, 0x7fffffff}]}) openat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x800, 0x10e) r0 = syz_init_net_socket$802154_raw(0x24, 0x3, 0x0) ioctl$sock_inet_SIOCSIFADDR(r0, 0x8916, &(0x7f0000001180)={'bond0\x00', {0x2, 0x0, @local}}) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f0000000080)) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = fork() perf_event_open(&(0x7f0000001280)={0x0, 0x80, 0x5, 0x0, 0x1, 0x4, 0x0, 0xe41, 0x84000, 0x8, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x9, 0x0, @perf_config_ext={0x8000, 0x100}, 0x8000, 0xffffffff, 0x2476f094, 0x0, 0x7, 0x8001, 0xffff, 0x0, 0x1, 0x0, 0x10000}, r1, 0xb, 0xffffffffffffffff, 0x2) r2 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x0) r3 = dup2(r2, r2) bind$bt_l2cap(r3, &(0x7f0000000000)={0x1f, 0x0, @fixed={'\xaa\xaa\xaa\xaa\xaa', 0x10}}, 0xe) [ 444.882440] loop1: detected capacity change from 0 to 4 [ 444.913445] EXT4-fs (loop1): bad geometry: block count 128 exceeds size of device (1 blocks) [ 444.941215] loop2: detected capacity change from 0 to 512 [ 444.988781] EXT4-fs error (device loop2): __ext4_fill_super:5244: inode #2: comm syz-executor.2: iget: root inode unallocated [ 445.006860] EXT4-fs (loop2): get root inode failed [ 445.007776] EXT4-fs (loop2): mount failed 22:17:17 executing program 4: openat(0xffffffffffffffff, &(0x7f0000000100)='./file1\x00', 0x20801, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000240)='./file1\x00', 0x587401, 0x167) ioctl$FS_IOC_SETFLAGS(r1, 0x40086602, &(0x7f0000000040)) pwritev(r0, &(0x7f0000000080)=[{&(0x7f0000000140)='\x00', 0x1a}], 0x1, 0x7fffffc, 0x0) r2 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000040)='/sys/kernel/slab', 0x0, 0x0) getdents(r2, &(0x7f0000000080)=""/247, 0xf7) lseek(r2, 0x0, 0x0) getdents64(r2, &(0x7f0000000240)=""/226, 0x20000258) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, 0x0) 22:17:17 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, &(0x7f0000000200), 0x0, &(0x7f0000012c00)) 22:17:17 executing program 2: getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000040), &(0x7f0000000080)=0xc) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010100)="00000000080000000000f900b00cb2cc029f49d8b90449a7d5d54d49010000a566", 0x21, 0x4e0}, {&(0x7f0000010400)="0200000003000000040000006a000f000300040000000000000000000f00bc0f", 0x20, 0x800}, {0x0}, {0x0}, {0x0}], 0x0, &(0x7f0000012c00)) [ 445.249820] EXT4-fs (loop1): VFS: Can't find ext4 filesystem 22:17:17 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, &(0x7f0000000200), 0x0, &(0x7f0000012c00)) 22:17:17 executing program 4: openat(0xffffffffffffffff, &(0x7f0000000100)='./file1\x00', 0x20801, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000240)='./file1\x00', 0x587401, 0x167) ioctl$FS_IOC_SETFLAGS(r1, 0x40086602, &(0x7f0000000040)) pwritev(r0, &(0x7f0000000080)=[{&(0x7f0000000140)='\x00', 0x1a}], 0x1, 0x7fffffc, 0x0) r2 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000040)='/sys/kernel/slab', 0x0, 0x0) getdents(r2, &(0x7f0000000080)=""/247, 0xf7) lseek(r2, 0x0, 0x0) getdents64(r2, &(0x7f0000000240)=""/226, 0x20000258) [ 445.360148] loop2: detected capacity change from 0 to 512 [ 445.385276] EXT4-fs (loop1): VFS: Can't find ext4 filesystem [ 445.388216] EXT4-fs error (device loop2): __ext4_fill_super:5244: inode #2: comm syz-executor.2: iget: root inode unallocated [ 445.389314] EXT4-fs (loop2): get root inode failed [ 445.389902] EXT4-fs (loop2): mount failed 22:17:17 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, &(0x7f0000000200), 0x0, &(0x7f0000012c00)) 22:17:17 executing program 0: getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000040), &(0x7f0000000080)=0xc) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010100)="00000000080000000000f900b00cb2cc029f49d8b90449a7d5d54d49010000a566", 0x21, 0x4e0}, {&(0x7f0000010400)="0200000003000000040000006a000f000300040000000000000000000f00bc0f", 0x20, 0x800}, {0x0}, {0x0}, {0x0}], 0x0, &(0x7f0000012c00)) [ 445.493373] EXT4-fs (loop1): VFS: Can't find ext4 filesystem [ 445.546415] loop0: detected capacity change from 0 to 512 [ 445.575564] EXT4-fs error (device loop0): __ext4_fill_super:5244: inode #2: comm syz-executor.0: iget: root inode unallocated [ 445.576882] EXT4-fs (loop0): get root inode failed [ 445.577230] EXT4-fs (loop0): mount failed 22:17:33 executing program 4: openat(0xffffffffffffffff, &(0x7f0000000100)='./file1\x00', 0x20801, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000240)='./file1\x00', 0x587401, 0x167) ioctl$FS_IOC_SETFLAGS(r1, 0x40086602, &(0x7f0000000040)) pwritev(r0, &(0x7f0000000080)=[{&(0x7f0000000140)='\x00', 0x1a}], 0x1, 0x7fffffc, 0x0) r2 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000040)='/sys/kernel/slab', 0x0, 0x0) getdents(r2, &(0x7f0000000080)=""/247, 0xf7) getdents64(r2, &(0x7f0000000240)=""/226, 0x20000258) 22:17:33 executing program 2: getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000040), &(0x7f0000000080)=0xc) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010100)="00000000080000000000f900b00cb2cc029f49d8b90449a7d5d54d49010000a566", 0x21, 0x4e0}, {&(0x7f0000010400)="0200000003000000040000006a000f000300040000000000000000000f00bc0f", 0x20, 0x800}, {0x0}, {0x0}, {0x0}], 0x0, &(0x7f0000012c00)) 22:17:33 executing program 3: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x2, &(0x7f0000000000)=[{0x7c}, {0x6, 0x0, 0x0, 0x7fffffff}]}) openat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x800, 0x10e) r0 = syz_init_net_socket$802154_raw(0x24, 0x3, 0x0) ioctl$sock_inet_SIOCSIFADDR(r0, 0x8916, &(0x7f0000001180)={'bond0\x00', {0x2, 0x0, @local}}) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f0000000080)) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = fork() perf_event_open(&(0x7f0000001280)={0x0, 0x80, 0x5, 0x0, 0x1, 0x4, 0x0, 0xe41, 0x84000, 0x8, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x9, 0x0, @perf_config_ext={0x8000, 0x100}, 0x8000, 0xffffffff, 0x2476f094, 0x0, 0x7, 0x8001, 0xffff, 0x0, 0x1, 0x0, 0x10000}, r1, 0xb, 0xffffffffffffffff, 0x2) r2 = dup2(0xffffffffffffffff, 0xffffffffffffffff) bind$bt_l2cap(r2, &(0x7f0000000000)={0x1f, 0x0, @fixed={'\xaa\xaa\xaa\xaa\xaa', 0x10}}, 0xe) 22:17:33 executing program 5: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x2, &(0x7f0000000000)=[{0x7c}, {0x6, 0x0, 0x0, 0x7fffffff}]}) openat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x800, 0x10e) r0 = syz_init_net_socket$802154_raw(0x24, 0x3, 0x0) ioctl$sock_inet_SIOCSIFADDR(r0, 0x8916, &(0x7f0000001180)={'bond0\x00', {0x2, 0x0, @local}}) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f0000000080)) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = fork() perf_event_open(&(0x7f0000001280)={0x0, 0x80, 0x5, 0x0, 0x1, 0x4, 0x0, 0xe41, 0x84000, 0x8, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x9, 0x0, @perf_config_ext={0x8000, 0x100}, 0x8000, 0xffffffff, 0x2476f094, 0x0, 0x7, 0x8001, 0xffff, 0x0, 0x1, 0x0, 0x10000}, r1, 0xb, 0xffffffffffffffff, 0x2) 22:17:33 executing program 0: getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000040), &(0x7f0000000080)=0xc) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010100)="00000000080000000000f900b00cb2cc029f49d8b90449a7d5d54d49010000a566", 0x21, 0x4e0}, {&(0x7f0000010400)="0200000003000000040000006a000f000300040000000000000000000f00bc0f", 0x20, 0x800}, {0x0}, {0x0}, {0x0}], 0x0, &(0x7f0000012c00)) 22:17:33 executing program 7: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x2, &(0x7f0000000000)=[{0x7c}, {0x6, 0x0, 0x0, 0x7fffffff}]}) openat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x800, 0x10e) ioctl$sock_inet_SIOCSIFADDR(0xffffffffffffffff, 0x8916, &(0x7f0000001180)={'bond0\x00', {0x2, 0x0, @local}}) 22:17:33 executing program 6: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x2, &(0x7f0000000000)=[{0x7c}, {0x6, 0x0, 0x0, 0x7fffffff}]}) openat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x800, 0x10e) r0 = syz_init_net_socket$802154_raw(0x24, 0x3, 0x0) ioctl$sock_inet_SIOCSIFADDR(r0, 0x8916, &(0x7f0000001180)={'bond0\x00', {0x2, 0x0, @local}}) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f0000000080)) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = fork() perf_event_open(&(0x7f0000001280)={0x0, 0x80, 0x5, 0x0, 0x1, 0x4, 0x0, 0xe41, 0x84000, 0x8, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x9, 0x0, @perf_config_ext={0x8000, 0x100}, 0x8000, 0xffffffff, 0x2476f094, 0x0, 0x7, 0x8001, 0xffff, 0x0, 0x1, 0x0, 0x10000}, r1, 0xb, 0xffffffffffffffff, 0x2) syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x0) bind$bt_l2cap(0xffffffffffffffff, &(0x7f0000000000)={0x1f, 0x0, @fixed={'\xaa\xaa\xaa\xaa\xaa', 0x10}}, 0xe) 22:17:33 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{0x0, 0x0, 0x400}], 0x0, &(0x7f0000012c00)) [ 460.782500] loop2: detected capacity change from 0 to 512 [ 460.800214] loop0: detected capacity change from 0 to 512 [ 460.806340] loop1: detected capacity change from 0 to 4 [ 460.819928] EXT4-fs error (device loop2): __ext4_fill_super:5244: inode #2: comm syz-executor.2: iget: root inode unallocated [ 460.823916] EXT4-fs (loop1): VFS: Can't find ext4 filesystem [ 460.834332] EXT4-fs (loop2): get root inode failed [ 460.835297] EXT4-fs (loop2): mount failed [ 460.860989] EXT4-fs error (device loop0): __ext4_fill_super:5244: inode #2: comm syz-executor.0: iget: root inode unallocated 22:17:33 executing program 7: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x2, &(0x7f0000000000)=[{0x7c}, {0x6, 0x0, 0x0, 0x7fffffff}]}) openat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x800, 0x10e) ioctl$sock_inet_SIOCSIFADDR(0xffffffffffffffff, 0x8916, &(0x7f0000001180)={'bond0\x00', {0x2, 0x0, @local}}) [ 460.884360] EXT4-fs (loop0): get root inode failed [ 460.885196] EXT4-fs (loop0): mount failed 22:17:33 executing program 4: openat(0xffffffffffffffff, &(0x7f0000000100)='./file1\x00', 0x20801, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000240)='./file1\x00', 0x587401, 0x167) ioctl$FS_IOC_SETFLAGS(r1, 0x40086602, &(0x7f0000000040)) pwritev(r0, &(0x7f0000000080)=[{&(0x7f0000000140)='\x00', 0x1a}], 0x1, 0x7fffffc, 0x0) r2 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000040)='/sys/kernel/slab', 0x0, 0x0) getdents(r2, &(0x7f0000000080)=""/247, 0xf7) getdents64(r2, &(0x7f0000000240)=""/226, 0x20000258) 22:17:33 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{0x0, 0x0, 0x400}], 0x0, &(0x7f0000012c00)) 22:17:33 executing program 2: getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000040), &(0x7f0000000080)=0xc) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010100)="00000000080000000000f900b00cb2cc029f49d8b90449a7d5d54d49010000a566", 0x21, 0x4e0}, {&(0x7f0000010400)="0200000003000000040000006a000f000300040000000000000000000f00bc0f", 0x20, 0x800}, {0x0, 0x0, 0x2100}, {0x0}, {0x0}, {0x0}], 0x0, &(0x7f0000012c00)) 22:17:33 executing program 0: getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000040), &(0x7f0000000080)=0xc) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010100)="00000000080000000000f900b00cb2cc029f49d8b90449a7d5d54d49010000a566", 0x21, 0x4e0}, {&(0x7f0000010400)="0200000003000000040000006a000f000300040000000000000000000f00bc0f", 0x20, 0x800}, {0x0}, {0x0}, {0x0}], 0x0, &(0x7f0000012c00)) 22:17:33 executing program 7: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x2, &(0x7f0000000000)=[{0x7c}, {0x6, 0x0, 0x0, 0x7fffffff}]}) openat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x800, 0x10e) ioctl$sock_inet_SIOCSIFADDR(0xffffffffffffffff, 0x8916, &(0x7f0000001180)={'bond0\x00', {0x2, 0x0, @local}}) [ 461.237104] loop2: detected capacity change from 0 to 512 [ 461.246810] loop1: detected capacity change from 0 to 4 [ 461.266616] EXT4-fs (loop1): VFS: Can't find ext4 filesystem [ 461.289738] EXT4-fs error (device loop2): __ext4_fill_super:5244: inode #2: comm syz-executor.2: iget: root inode unallocated [ 461.303132] EXT4-fs (loop2): get root inode failed [ 461.303983] EXT4-fs (loop2): mount failed [ 461.332428] loop0: detected capacity change from 0 to 512 [ 461.382403] EXT4-fs error (device loop0): __ext4_fill_super:5244: inode #2: comm syz-executor.0: iget: root inode unallocated [ 461.385159] EXT4-fs (loop0): get root inode failed [ 461.385891] EXT4-fs (loop0): mount failed 22:17:33 executing program 4: openat(0xffffffffffffffff, &(0x7f0000000100)='./file1\x00', 0x20801, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000240)='./file1\x00', 0x587401, 0x167) ioctl$FS_IOC_SETFLAGS(r1, 0x40086602, &(0x7f0000000040)) pwritev(r0, &(0x7f0000000080)=[{&(0x7f0000000140)='\x00', 0x1a}], 0x1, 0x7fffffc, 0x0) r2 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000040)='/sys/kernel/slab', 0x0, 0x0) getdents(r2, &(0x7f0000000080)=""/247, 0xf7) getdents64(r2, &(0x7f0000000240)=""/226, 0x20000258) 22:17:33 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{0x0, 0x0, 0x400}], 0x0, &(0x7f0000012c00)) [ 461.567399] loop1: detected capacity change from 0 to 4 [ 461.593016] EXT4-fs (loop1): VFS: Can't find ext4 filesystem 22:17:48 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010100)="00000000080000000000f900b00cb2cc029f49d8b90449a7d5d54d49010000a566", 0x21, 0x4e0}, {&(0x7f0000010400)="0200000003000000040000006a000f000300040000000000000000000f00bc0f", 0x20, 0x800}, {0x0}, {0x0}, {0x0}], 0x0, &(0x7f0000012c00)) 22:17:48 executing program 6: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x2, &(0x7f0000000000)=[{0x7c}, {0x6, 0x0, 0x0, 0x7fffffff}]}) openat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x800, 0x10e) r0 = syz_init_net_socket$802154_raw(0x24, 0x3, 0x0) ioctl$sock_inet_SIOCSIFADDR(r0, 0x8916, &(0x7f0000001180)={'bond0\x00', {0x2, 0x0, @local}}) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f0000000080)) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = fork() perf_event_open(&(0x7f0000001280)={0x0, 0x80, 0x5, 0x0, 0x1, 0x4, 0x0, 0xe41, 0x84000, 0x8, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x9, 0x0, @perf_config_ext={0x8000, 0x100}, 0x8000, 0xffffffff, 0x2476f094, 0x0, 0x7, 0x8001, 0xffff, 0x0, 0x1, 0x0, 0x10000}, r1, 0xb, 0xffffffffffffffff, 0x2) syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x0) bind$bt_l2cap(0xffffffffffffffff, &(0x7f0000000000)={0x1f, 0x0, @fixed={'\xaa\xaa\xaa\xaa\xaa', 0x10}}, 0xe) 22:17:48 executing program 3: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x2, &(0x7f0000000000)=[{0x7c}, {0x6, 0x0, 0x0, 0x7fffffff}]}) openat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x800, 0x10e) r0 = syz_init_net_socket$802154_raw(0x24, 0x3, 0x0) ioctl$sock_inet_SIOCSIFADDR(r0, 0x8916, &(0x7f0000001180)={'bond0\x00', {0x2, 0x0, @local}}) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f0000000080)) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = fork() perf_event_open(&(0x7f0000001280)={0x0, 0x80, 0x5, 0x0, 0x1, 0x4, 0x0, 0xe41, 0x84000, 0x8, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x9, 0x0, @perf_config_ext={0x8000, 0x100}, 0x8000, 0xffffffff, 0x2476f094, 0x0, 0x7, 0x8001, 0xffff, 0x0, 0x1, 0x0, 0x10000}, r1, 0xb, 0xffffffffffffffff, 0x2) r2 = dup2(0xffffffffffffffff, 0xffffffffffffffff) bind$bt_l2cap(r2, &(0x7f0000000000)={0x1f, 0x0, @fixed={'\xaa\xaa\xaa\xaa\xaa', 0x10}}, 0xe) 22:17:48 executing program 4: openat(0xffffffffffffffff, &(0x7f0000000100)='./file1\x00', 0x20801, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000240)='./file1\x00', 0x587401, 0x167) ioctl$FS_IOC_SETFLAGS(r1, 0x40086602, &(0x7f0000000040)) pwritev(r0, &(0x7f0000000080)=[{&(0x7f0000000140)='\x00', 0x1a}], 0x1, 0x7fffffc, 0x0) r2 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000040)='/sys/kernel/slab', 0x0, 0x0) lseek(r2, 0x0, 0x0) getdents64(r2, &(0x7f0000000240)=""/226, 0x20000258) 22:17:48 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000), 0x0, 0x400}], 0x0, &(0x7f0000012c00)) 22:17:48 executing program 5: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x2, &(0x7f0000000000)=[{0x7c}, {0x6, 0x0, 0x0, 0x7fffffff}]}) openat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x800, 0x10e) r0 = syz_init_net_socket$802154_raw(0x24, 0x3, 0x0) ioctl$sock_inet_SIOCSIFADDR(r0, 0x8916, &(0x7f0000001180)={'bond0\x00', {0x2, 0x0, @local}}) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f0000000080)) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fork() 22:17:48 executing program 7: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x2, &(0x7f0000000000)=[{0x7c}, {0x6, 0x0, 0x0, 0x7fffffff}]}) r0 = syz_init_net_socket$802154_raw(0x24, 0x3, 0x0) ioctl$sock_inet_SIOCSIFADDR(r0, 0x8916, &(0x7f0000001180)={'bond0\x00', {0x2, 0x0, @local}}) 22:17:48 executing program 2: getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000040), &(0x7f0000000080)=0xc) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010100)="00000000080000000000f900b00cb2cc029f49d8b90449a7d5d54d49010000a566", 0x21, 0x4e0}, {&(0x7f0000010400)="0200000003000000040000006a000f000300040000000000000000000f00bc0f", 0x20, 0x800}, {0x0, 0x0, 0x2100}, {0x0}, {0x0}, {0x0}], 0x0, &(0x7f0000012c00)) [ 476.452012] loop1: detected capacity change from 0 to 4 [ 476.478378] loop2: detected capacity change from 0 to 512 [ 476.480229] EXT4-fs (loop1): VFS: Can't find ext4 filesystem [ 476.493296] loop0: detected capacity change from 0 to 512 [ 476.495897] EXT4-fs error (device loop2): __ext4_fill_super:5244: inode #2: comm syz-executor.2: iget: root inode unallocated [ 476.497246] EXT4-fs (loop2): get root inode failed [ 476.497612] EXT4-fs (loop2): mount failed [ 476.538339] EXT4-fs error (device loop0): __ext4_fill_super:5244: inode #2: comm syz-executor.0: iget: root inode unallocated [ 476.543819] EXT4-fs (loop0): get root inode failed [ 476.544581] EXT4-fs (loop0): mount failed 22:17:48 executing program 4: openat(0xffffffffffffffff, &(0x7f0000000100)='./file1\x00', 0x20801, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000240)='./file1\x00', 0x587401, 0x167) ioctl$FS_IOC_SETFLAGS(r1, 0x40086602, &(0x7f0000000040)) pwritev(r0, &(0x7f0000000080)=[{&(0x7f0000000140)='\x00', 0x1a}], 0x1, 0x7fffffc, 0x0) lseek(0xffffffffffffffff, 0x0, 0x0) getdents64(0xffffffffffffffff, &(0x7f0000000240)=""/226, 0x20000258) 22:17:48 executing program 2: getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000040), &(0x7f0000000080)=0xc) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010100)="00000000080000000000f900b00cb2cc029f49d8b90449a7d5d54d49010000a566", 0x21, 0x4e0}, {&(0x7f0000010400)="0200000003000000040000006a000f000300040000000000000000000f00bc0f", 0x20, 0x800}, {0x0, 0x0, 0x2100}, {0x0}, {0x0}, {0x0}], 0x0, &(0x7f0000012c00)) 22:17:49 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000), 0x0, 0x400}], 0x0, &(0x7f0000012c00)) 22:17:49 executing program 7: r0 = syz_init_net_socket$802154_raw(0x24, 0x3, 0x0) ioctl$sock_inet_SIOCSIFADDR(r0, 0x8916, &(0x7f0000001180)={'bond0\x00', {0x2, 0x0, @local}}) 22:17:49 executing program 0: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x40000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010100)="00000000080000000000f900b00cb2cc029f49d8b90449a7d5d54d49010000a566", 0x21, 0x4e0}, {&(0x7f0000010400)="0200000003000000040000006a000f000300040000000000000000000f00bc0f", 0x20, 0x800}, {0x0}, {0x0}, {0x0}], 0x0, &(0x7f0000012c00)) [ 476.797747] loop1: detected capacity change from 0 to 4 [ 476.820359] loop2: detected capacity change from 0 to 512 [ 476.830243] EXT4-fs (loop1): VFS: Can't find ext4 filesystem [ 476.868442] EXT4-fs error (device loop2): __ext4_fill_super:5244: inode #2: comm syz-executor.2: iget: root inode unallocated [ 476.869124] loop0: detected capacity change from 0 to 512 [ 476.879059] EXT4-fs (loop2): get root inode failed [ 476.879879] EXT4-fs (loop2): mount failed 22:17:49 executing program 4: openat(0xffffffffffffffff, &(0x7f0000000100)='./file1\x00', 0x20801, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000240)='./file1\x00', 0x587401, 0x167) ioctl$FS_IOC_SETFLAGS(r1, 0x40086602, &(0x7f0000000040)) pwritev(r0, &(0x7f0000000080)=[{&(0x7f0000000140)='\x00', 0x1a}], 0x1, 0x7fffffc, 0x0) lseek(0xffffffffffffffff, 0x0, 0x0) getdents64(0xffffffffffffffff, &(0x7f0000000240)=""/226, 0x20000258) 22:17:49 executing program 0: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x40000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010100)="00000000080000000000f900b00cb2cc029f49d8b90449a7d5d54d49010000a566", 0x21, 0x4e0}, {&(0x7f0000010400)="0200000003000000040000006a000f000300040000000000000000000f00bc0f", 0x20, 0x800}, {0x0}, {0x0}, {0x0}], 0x0, &(0x7f0000012c00)) 22:17:49 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000), 0x0, 0x400}], 0x0, &(0x7f0000012c00)) 22:17:49 executing program 2: getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000040), &(0x7f0000000080)=0xc) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010100)="00000000080000000000f900b00cb2cc029f49d8b90449a7d5d54d49010000a566", 0x21, 0x4e0}, {&(0x7f0000010400)="0200000003000000040000006a000f000300040000000000000000000f00bc0f", 0x20, 0x800}, {&(0x7f0000011600), 0x0, 0x2100}, {0x0}, {0x0}, {0x0}], 0x0, &(0x7f0000012c00)) [ 477.081286] loop0: detected capacity change from 0 to 512 [ 477.082984] loop1: detected capacity change from 0 to 4 [ 477.106994] EXT4-fs (loop1): VFS: Can't find ext4 filesystem [ 477.150811] loop2: detected capacity change from 0 to 512 [ 477.174296] EXT4-fs error (device loop2): __ext4_fill_super:5244: inode #2: comm syz-executor.2: iget: root inode unallocated [ 477.181094] EXT4-fs (loop2): get root inode failed [ 477.181961] EXT4-fs (loop2): mount failed 22:18:02 executing program 3: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x2, &(0x7f0000000000)=[{0x7c}, {0x6, 0x0, 0x0, 0x7fffffff}]}) openat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x800, 0x10e) r0 = syz_init_net_socket$802154_raw(0x24, 0x3, 0x0) ioctl$sock_inet_SIOCSIFADDR(r0, 0x8916, &(0x7f0000001180)={'bond0\x00', {0x2, 0x0, @local}}) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f0000000080)) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = fork() perf_event_open(&(0x7f0000001280)={0x0, 0x80, 0x5, 0x0, 0x1, 0x4, 0x0, 0xe41, 0x84000, 0x8, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x9, 0x0, @perf_config_ext={0x8000, 0x100}, 0x8000, 0xffffffff, 0x2476f094, 0x0, 0x7, 0x8001, 0xffff, 0x0, 0x1, 0x0, 0x10000}, r1, 0xb, 0xffffffffffffffff, 0x2) r2 = dup2(0xffffffffffffffff, 0xffffffffffffffff) bind$bt_l2cap(r2, &(0x7f0000000000)={0x1f, 0x0, @fixed={'\xaa\xaa\xaa\xaa\xaa', 0x10}}, 0xe) [ 490.636284] loop2: detected capacity change from 0 to 512 22:18:02 executing program 7: syz_init_net_socket$802154_raw(0x24, 0x3, 0x0) ioctl$sock_inet_SIOCSIFADDR(0xffffffffffffffff, 0x8916, &(0x7f0000001180)={'bond0\x00', {0x2, 0x0, @local}}) 22:18:02 executing program 0: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x40000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010100)="00000000080000000000f900b00cb2cc029f49d8b90449a7d5d54d49010000a566", 0x21, 0x4e0}, {&(0x7f0000010400)="0200000003000000040000006a000f000300040000000000000000000f00bc0f", 0x20, 0x800}, {0x0}, {0x0}, {0x0}], 0x0, &(0x7f0000012c00)) 22:18:02 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0", 0x2d, 0x400}], 0x0, &(0x7f0000012c00)) 22:18:02 executing program 4: openat(0xffffffffffffffff, &(0x7f0000000100)='./file1\x00', 0x20801, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000240)='./file1\x00', 0x587401, 0x167) ioctl$FS_IOC_SETFLAGS(r1, 0x40086602, &(0x7f0000000040)) pwritev(r0, &(0x7f0000000080)=[{&(0x7f0000000140)='\x00', 0x1a}], 0x1, 0x7fffffc, 0x0) lseek(0xffffffffffffffff, 0x0, 0x0) getdents64(0xffffffffffffffff, &(0x7f0000000240)=""/226, 0x20000258) 22:18:02 executing program 2: getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000040), &(0x7f0000000080)=0xc) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010100)="00000000080000000000f900b00cb2cc029f49d8b90449a7d5d54d49010000a566", 0x21, 0x4e0}, {&(0x7f0000010400)="0200000003000000040000006a000f000300040000000000000000000f00bc0f", 0x20, 0x800}, {&(0x7f0000011600), 0x0, 0x2100}, {0x0}, {0x0}, {0x0}], 0x0, &(0x7f0000012c00)) 22:18:02 executing program 5: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x2, &(0x7f0000000000)=[{0x7c}, {0x6, 0x0, 0x0, 0x7fffffff}]}) openat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x800, 0x10e) r0 = syz_init_net_socket$802154_raw(0x24, 0x3, 0x0) ioctl$sock_inet_SIOCSIFADDR(r0, 0x8916, &(0x7f0000001180)={'bond0\x00', {0x2, 0x0, @local}}) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f0000000080)) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) 22:18:02 executing program 6: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x2, &(0x7f0000000000)=[{0x7c}, {0x6, 0x0, 0x0, 0x7fffffff}]}) openat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x800, 0x10e) r0 = syz_init_net_socket$802154_raw(0x24, 0x3, 0x0) ioctl$sock_inet_SIOCSIFADDR(r0, 0x8916, &(0x7f0000001180)={'bond0\x00', {0x2, 0x0, @local}}) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f0000000080)) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fork() [ 490.642612] loop0: detected capacity change from 0 to 512 22:18:03 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', 0x0, 0x40000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010100)="00000000080000000000f900b00cb2cc029f49d8b90449a7d5d54d49010000a566", 0x21, 0x4e0}, {&(0x7f0000010400)="0200000003000000040000006a000f000300040000000000000000000f00bc0f", 0x20, 0x800}, {0x0}, {0x0}, {0x0}], 0x0, &(0x7f0000012c00)) 22:18:03 executing program 4: openat(0xffffffffffffffff, &(0x7f0000000100)='./file1\x00', 0x20801, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000240)='./file1\x00', 0x587401, 0x167) ioctl$FS_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000040)) r1 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000040)='/sys/kernel/slab', 0x0, 0x0) lseek(r1, 0x0, 0x0) getdents64(r1, &(0x7f0000000240)=""/226, 0x20000258) [ 490.695922] loop1: detected capacity change from 0 to 4 [ 490.698560] EXT4-fs error (device loop2): __ext4_fill_super:5244: inode #2: comm syz-executor.2: iget: root inode unallocated [ 490.706184] EXT4-fs (loop2): get root inode failed [ 490.707183] EXT4-fs (loop2): mount failed [ 490.744229] EXT4-fs (loop1): VFS: Can't find ext4 filesystem 22:18:03 executing program 7: syz_init_net_socket$802154_raw(0x24, 0x3, 0x0) ioctl$sock_inet_SIOCSIFADDR(0xffffffffffffffff, 0x8916, &(0x7f0000001180)={'bond0\x00', {0x2, 0x0, @local}}) [ 490.774376] loop0: detected capacity change from 0 to 512 22:18:03 executing program 4: openat(0xffffffffffffffff, &(0x7f0000000100)='./file1\x00', 0x20801, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000240)='./file1\x00', 0x587401, 0x167) r0 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000040)='/sys/kernel/slab', 0x0, 0x0) lseek(r0, 0x0, 0x0) getdents64(r0, &(0x7f0000000240)=""/226, 0x20000258) 22:18:03 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', 0x0, 0x40000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010100)="00000000080000000000f900b00cb2cc029f49d8b90449a7d5d54d49010000a566", 0x21, 0x4e0}, {&(0x7f0000010400)="0200000003000000040000006a000f000300040000000000000000000f00bc0f", 0x20, 0x800}, {0x0}, {0x0}, {0x0}], 0x0, &(0x7f0000012c00)) 22:18:03 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0", 0x2d, 0x400}], 0x0, &(0x7f0000012c00)) 22:18:03 executing program 2: getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000040), &(0x7f0000000080)=0xc) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010100)="00000000080000000000f900b00cb2cc029f49d8b90449a7d5d54d49010000a566", 0x21, 0x4e0}, {&(0x7f0000010400)="0200000003000000040000006a000f000300040000000000000000000f00bc0f", 0x20, 0x800}, {&(0x7f0000011600), 0x0, 0x2100}, {0x0}, {0x0}, {0x0}], 0x0, &(0x7f0000012c00)) [ 490.946076] loop0: detected capacity change from 0 to 512 22:18:03 executing program 4: openat(0xffffffffffffffff, &(0x7f0000000100)='./file1\x00', 0x20801, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) r0 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000040)='/sys/kernel/slab', 0x0, 0x0) lseek(r0, 0x0, 0x0) getdents64(r0, &(0x7f0000000240)=""/226, 0x20000258) [ 490.997720] loop2: detected capacity change from 0 to 512 [ 491.026724] EXT4-fs error (device loop2): __ext4_fill_super:5244: inode #2: comm syz-executor.2: iget: root inode unallocated [ 491.032814] EXT4-fs (loop2): get root inode failed [ 491.033200] EXT4-fs (loop2): mount failed [ 491.071321] loop1: detected capacity change from 0 to 4 [ 491.086961] EXT4-fs (loop1): VFS: Can't find ext4 filesystem 22:18:17 executing program 6: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x2, &(0x7f0000000000)=[{0x7c}, {0x6, 0x0, 0x0, 0x7fffffff}]}) openat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x800, 0x10e) r0 = syz_init_net_socket$802154_raw(0x24, 0x3, 0x0) ioctl$sock_inet_SIOCSIFADDR(r0, 0x8916, &(0x7f0000001180)={'bond0\x00', {0x2, 0x0, @local}}) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f0000000080)) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fork() 22:18:17 executing program 2: getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000040), &(0x7f0000000080)=0xc) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010100)="00000000080000000000f900b00cb2cc029f49d8b90449a7d5d54d49010000a566", 0x21, 0x4e0}, {&(0x7f0000010400)="0200000003000000040000006a000f000300040000000000000000000f00bc0f", 0x20, 0x800}, {&(0x7f0000011600)="ed41000000080000dff4655fe0f465", 0xf, 0x2100}, {0x0}, {0x0}, {0x0}], 0x0, &(0x7f0000012c00)) 22:18:17 executing program 7: syz_init_net_socket$802154_raw(0x24, 0x3, 0x0) ioctl$sock_inet_SIOCSIFADDR(0xffffffffffffffff, 0x8916, &(0x7f0000001180)={'bond0\x00', {0x2, 0x0, @local}}) 22:18:17 executing program 3: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x2, &(0x7f0000000000)=[{0x7c}, {0x6, 0x0, 0x0, 0x7fffffff}]}) openat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x800, 0x10e) r0 = syz_init_net_socket$802154_raw(0x24, 0x3, 0x0) ioctl$sock_inet_SIOCSIFADDR(r0, 0x8916, &(0x7f0000001180)={'bond0\x00', {0x2, 0x0, @local}}) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f0000000080)) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fork() r1 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x0) r2 = dup2(r1, r1) bind$bt_l2cap(r2, &(0x7f0000000000)={0x1f, 0x0, @fixed={'\xaa\xaa\xaa\xaa\xaa', 0x10}}, 0xe) 22:18:17 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', 0x0, 0x40000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010100)="00000000080000000000f900b00cb2cc029f49d8b90449a7d5d54d49010000a566", 0x21, 0x4e0}, {&(0x7f0000010400)="0200000003000000040000006a000f000300040000000000000000000f00bc0f", 0x20, 0x800}, {0x0}, {0x0}, {0x0}], 0x0, &(0x7f0000012c00)) 22:18:17 executing program 5: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x2, &(0x7f0000000000)=[{0x7c}, {0x6, 0x0, 0x0, 0x7fffffff}]}) openat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x800, 0x10e) r0 = syz_init_net_socket$802154_raw(0x24, 0x3, 0x0) ioctl$sock_inet_SIOCSIFADDR(r0, 0x8916, &(0x7f0000001180)={'bond0\x00', {0x2, 0x0, @local}}) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f0000000080)) 22:18:17 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0", 0x2d, 0x400}], 0x0, &(0x7f0000012c00)) 22:18:17 executing program 4: openat(0xffffffffffffffff, &(0x7f0000000100)='./file1\x00', 0x20801, 0x0) r0 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000040)='/sys/kernel/slab', 0x0, 0x0) lseek(r0, 0x0, 0x0) getdents64(r0, &(0x7f0000000240)=""/226, 0x20000258) [ 505.414503] loop2: detected capacity change from 0 to 512 [ 505.417046] loop0: detected capacity change from 0 to 512 [ 505.425834] loop1: detected capacity change from 0 to 4 [ 505.434178] EXT4-fs (loop1): VFS: Can't find ext4 filesystem [ 505.444953] EXT4-fs error (device loop2): __ext4_fill_super:5244: inode #2: comm syz-executor.2: iget: root inode unallocated [ 505.447203] EXT4-fs (loop2): get root inode failed [ 505.447600] EXT4-fs (loop2): mount failed 22:18:17 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010100)="00000000080000000000f900b00cb2cc029f49d8b90449a7d5d54d49010000a566", 0x21, 0x4e0}, {&(0x7f0000010400)="0200000003000000040000006a000f000300040000000000000000000f00bc0f", 0x20, 0x800}, {0x0}, {0x0}, {0x0}], 0x0, &(0x7f0000012c00)) 22:18:17 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f", 0x44, 0x400}], 0x0, &(0x7f0000012c00)) 22:18:17 executing program 2: getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000040), &(0x7f0000000080)=0xc) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010100)="00000000080000000000f900b00cb2cc029f49d8b90449a7d5d54d49010000a566", 0x21, 0x4e0}, {&(0x7f0000010400)="0200000003000000040000006a000f000300040000000000000000000f00bc0f", 0x20, 0x800}, {&(0x7f0000011600)="ed41000000080000dff4655fe0f465", 0xf, 0x2100}, {0x0}, {0x0}, {0x0}], 0x0, &(0x7f0000012c00)) 22:18:17 executing program 7: r0 = syz_init_net_socket$802154_raw(0x24, 0x3, 0x0) ioctl$sock_inet_SIOCSIFADDR(r0, 0x8916, 0x0) [ 505.568113] loop0: detected capacity change from 0 to 8 [ 505.573820] loop1: detected capacity change from 0 to 4 22:18:17 executing program 4: r0 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000040)='/sys/kernel/slab', 0x0, 0x0) lseek(r0, 0x0, 0x0) getdents64(r0, &(0x7f0000000240)=""/226, 0x20000258) [ 505.597287] EXT4-fs (loop0): bad geometry: block count 128 exceeds size of device (2 blocks) [ 505.599578] EXT4-fs (loop1): bad geometry: block count 128 exceeds size of device (1 blocks) [ 505.600520] loop2: detected capacity change from 0 to 512 [ 505.628366] EXT4-fs error (device loop2): __ext4_fill_super:5244: inode #2: comm syz-executor.2: iget: root inode unallocated [ 505.630343] EXT4-fs (loop2): get root inode failed [ 505.630754] EXT4-fs (loop2): mount failed 22:18:18 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010100)="00000000080000000000f900b00cb2cc029f49d8b90449a7d5d54d49010000a566", 0x21, 0x4e0}, {&(0x7f0000010400)="0200000003000000040000006a000f000300040000000000000000000f00bc0f", 0x20, 0x800}, {0x0}, {0x0}, {0x0}], 0x0, &(0x7f0000012c00)) 22:18:18 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4", 0x2e, 0x400}], 0x0, &(0x7f0000012c00)) [ 505.748506] loop1: detected capacity change from 0 to 4 [ 505.755963] EXT4-fs (loop1): VFS: Can't find ext4 filesystem 22:18:30 executing program 3: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x2, &(0x7f0000000000)=[{0x7c}, {0x6, 0x0, 0x0, 0x7fffffff}]}) openat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x800, 0x10e) r0 = syz_init_net_socket$802154_raw(0x24, 0x3, 0x0) ioctl$sock_inet_SIOCSIFADDR(r0, 0x8916, &(0x7f0000001180)={'bond0\x00', {0x2, 0x0, @local}}) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f0000000080)) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x0) r2 = dup2(r1, r1) bind$bt_l2cap(r2, &(0x7f0000000000)={0x1f, 0x0, @fixed={'\xaa\xaa\xaa\xaa\xaa', 0x10}}, 0xe) 22:18:30 executing program 2: getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000040), &(0x7f0000000080)=0xc) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010100)="00000000080000000000f900b00cb2cc029f49d8b90449a7d5d54d49010000a566", 0x21, 0x4e0}, {&(0x7f0000010400)="0200000003000000040000006a000f000300040000000000000000000f00bc0f", 0x20, 0x800}, {&(0x7f0000011600)="ed41000000080000dff4655fe0f465", 0xf, 0x2100}, {0x0}, {0x0}, {0x0}], 0x0, &(0x7f0000012c00)) 22:18:30 executing program 6: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x2, &(0x7f0000000000)=[{0x7c}, {0x6, 0x0, 0x0, 0x7fffffff}]}) openat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x800, 0x10e) r0 = syz_init_net_socket$802154_raw(0x24, 0x3, 0x0) ioctl$sock_inet_SIOCSIFADDR(r0, 0x8916, &(0x7f0000001180)={'bond0\x00', {0x2, 0x0, @local}}) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f0000000080)) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = fork() perf_event_open(&(0x7f0000001280)={0x0, 0x80, 0x5, 0x0, 0x1, 0x4, 0x0, 0xe41, 0x84000, 0x8, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x9, 0x0, @perf_config_ext={0x8000, 0x100}, 0x8000, 0xffffffff, 0x2476f094, 0x0, 0x7, 0x8001, 0xffff, 0x0, 0x1, 0x0, 0x10000}, r1, 0xb, 0xffffffffffffffff, 0x2) r2 = dup2(0xffffffffffffffff, 0xffffffffffffffff) bind$bt_l2cap(r2, &(0x7f0000000000)={0x1f, 0x0, @fixed={'\xaa\xaa\xaa\xaa\xaa', 0x10}}, 0xe) 22:18:30 executing program 4: r0 = openat$sysfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) lseek(r0, 0x0, 0x0) getdents64(r0, &(0x7f0000000240)=""/226, 0x20000258) 22:18:30 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010100)="00000000080000000000f900b00cb2cc029f49d8b90449a7d5d54d49010000a566", 0x21, 0x4e0}, {&(0x7f0000010400)="0200000003000000040000006a000f000300040000000000000000000f00bc0f", 0x20, 0x800}, {0x0}, {0x0}, {0x0}], 0x0, &(0x7f0000012c00)) 22:18:30 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4", 0x2e, 0x400}], 0x0, &(0x7f0000012c00)) 22:18:30 executing program 7: r0 = syz_init_net_socket$802154_raw(0x24, 0x3, 0x0) ioctl$sock_inet_SIOCSIFADDR(r0, 0x8916, 0x0) 22:18:30 executing program 5: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x2, &(0x7f0000000000)=[{0x7c}, {0x6, 0x0, 0x0, 0x7fffffff}]}) openat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x800, 0x10e) r0 = syz_init_net_socket$802154_raw(0x24, 0x3, 0x0) ioctl$sock_inet_SIOCSIFADDR(r0, 0x8916, &(0x7f0000001180)={'bond0\x00', {0x2, 0x0, @local}}) 22:18:30 executing program 4: r0 = openat$sysfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) lseek(r0, 0x0, 0x0) getdents64(r0, &(0x7f0000000240)=""/226, 0x20000258) [ 518.306291] loop1: detected capacity change from 0 to 4 [ 518.325545] EXT4-fs (loop1): VFS: Can't find ext4 filesystem [ 518.339289] loop2: detected capacity change from 0 to 512 [ 518.342360] loop0: detected capacity change from 0 to 8 [ 518.361733] EXT4-fs (loop0): bad geometry: block count 128 exceeds size of device (2 blocks) [ 518.368003] EXT4-fs error (device loop2): __ext4_fill_super:5244: inode #2: comm syz-executor.2: iget: root inode unallocated [ 518.376459] EXT4-fs (loop2): get root inode failed [ 518.377383] EXT4-fs (loop2): mount failed 22:18:30 executing program 7: r0 = syz_init_net_socket$802154_raw(0x24, 0x3, 0x0) ioctl$sock_inet_SIOCSIFADDR(r0, 0x8916, 0x0) 22:18:30 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4", 0x2e, 0x400}], 0x0, &(0x7f0000012c00)) 22:18:30 executing program 4: r0 = openat$sysfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) lseek(r0, 0x0, 0x0) getdents64(r0, &(0x7f0000000240)=""/226, 0x20000258) [ 518.504341] loop1: detected capacity change from 0 to 4 22:18:30 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x0, 0x0, 0x0, &(0x7f0000012c00)) [ 518.519093] EXT4-fs (loop1): VFS: Can't find ext4 filesystem 22:18:30 executing program 2: getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000040), &(0x7f0000000080)=0xc) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010100)="00000000080000000000f900b00cb2cc029f49d8b90449a7d5d54d49010000a566", 0x21, 0x4e0}, {&(0x7f0000010400)="0200000003000000040000006a000f000300040000000000000000000f00bc0f", 0x20, 0x800}, {&(0x7f0000011600)="ed41000000080000dff4655fe0f4655fe0f4655f0000", 0x16, 0x2100}, {0x0}, {0x0}, {0x0}], 0x0, &(0x7f0000012c00)) 22:18:30 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53", 0x39, 0x400}], 0x0, &(0x7f0000012c00)) [ 518.644905] loop1: detected capacity change from 0 to 4 [ 518.661492] EXT4-fs (loop1): VFS: Can't find ext4 filesystem [ 518.680451] loop2: detected capacity change from 0 to 512 [ 518.687016] No source specified [ 518.725500] EXT4-fs error (device loop2): __ext4_fill_super:5244: inode #2: comm syz-executor.2: iget: root inode unallocated [ 518.727506] EXT4-fs (loop2): get root inode failed [ 518.727908] EXT4-fs (loop2): mount failed 22:18:43 executing program 2: getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000040), &(0x7f0000000080)=0xc) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010100)="00000000080000000000f900b00cb2cc029f49d8b90449a7d5d54d49010000a566", 0x21, 0x4e0}, {&(0x7f0000010400)="0200000003000000040000006a000f000300040000000000000000000f00bc0f", 0x20, 0x800}, {&(0x7f0000011600)="ed41000000080000dff4655fe0f4655fe0f4655f0000", 0x16, 0x2100}, {0x0}, {0x0}, {0x0}], 0x0, &(0x7f0000012c00)) 22:18:43 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53", 0x39, 0x400}], 0x0, &(0x7f0000012c00)) 22:18:43 executing program 4: r0 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000040)='/sys/kernel/slab', 0x0, 0x0) lseek(0xffffffffffffffff, 0x0, 0x0) getdents64(r0, &(0x7f0000000240)=""/226, 0x20000258) 22:18:43 executing program 6: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x2, &(0x7f0000000000)=[{0x7c}, {0x6, 0x0, 0x0, 0x7fffffff}]}) openat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x800, 0x10e) r0 = syz_init_net_socket$802154_raw(0x24, 0x3, 0x0) ioctl$sock_inet_SIOCSIFADDR(r0, 0x8916, &(0x7f0000001180)={'bond0\x00', {0x2, 0x0, @local}}) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f0000000080)) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = fork() perf_event_open(&(0x7f0000001280)={0x0, 0x80, 0x5, 0x0, 0x1, 0x4, 0x0, 0xe41, 0x84000, 0x8, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x9, 0x0, @perf_config_ext={0x8000, 0x100}, 0x8000, 0xffffffff, 0x2476f094, 0x0, 0x7, 0x8001, 0xffff, 0x0, 0x1, 0x0, 0x10000}, r1, 0xb, 0xffffffffffffffff, 0x2) r2 = dup2(0xffffffffffffffff, 0xffffffffffffffff) bind$bt_l2cap(r2, &(0x7f0000000000)={0x1f, 0x0, @fixed={'\xaa\xaa\xaa\xaa\xaa', 0x10}}, 0xe) 22:18:43 executing program 3: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x2, &(0x7f0000000000)=[{0x7c}, {0x6, 0x0, 0x0, 0x7fffffff}]}) openat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x800, 0x10e) r0 = syz_init_net_socket$802154_raw(0x24, 0x3, 0x0) ioctl$sock_inet_SIOCSIFADDR(r0, 0x8916, &(0x7f0000001180)={'bond0\x00', {0x2, 0x0, @local}}) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f0000000080)) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x0) r2 = dup2(r1, r1) bind$bt_l2cap(r2, &(0x7f0000000000)={0x1f, 0x0, @fixed={'\xaa\xaa\xaa\xaa\xaa', 0x10}}, 0xe) 22:18:43 executing program 5: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x2, &(0x7f0000000000)=[{0x7c}, {0x6, 0x0, 0x0, 0x7fffffff}]}) openat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x800, 0x10e) ioctl$sock_inet_SIOCSIFADDR(0xffffffffffffffff, 0x8916, &(0x7f0000001180)={'bond0\x00', {0x2, 0x0, @local}}) 22:18:43 executing program 7: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x2, &(0x7f0000000000)=[{0x7c}, {0x6, 0x0, 0x0, 0x7fffffff}]}) openat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x800, 0x10e) r0 = syz_init_net_socket$802154_raw(0x24, 0x3, 0x0) ioctl$sock_inet_SIOCSIFADDR(r0, 0x8916, &(0x7f0000001180)={'bond0\x00', {0x2, 0x0, @local}}) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f0000000080)) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fork() r1 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x0) r2 = dup2(r1, r1) bind$bt_l2cap(r2, &(0x7f0000000000)={0x1f, 0x0, @fixed={'\xaa\xaa\xaa\xaa\xaa', 0x10}}, 0xe) 22:18:43 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x0, 0x0, 0x0, &(0x7f0000012c00)) [ 530.765783] loop1: detected capacity change from 0 to 4 [ 530.773421] EXT4-fs (loop1): VFS: Can't find ext4 filesystem [ 530.800564] No source specified [ 530.807401] loop2: detected capacity change from 0 to 512 22:18:43 executing program 5: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x2, &(0x7f0000000000)=[{0x7c}, {0x6, 0x0, 0x0, 0x7fffffff}]}) openat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x800, 0x10e) ioctl$sock_inet_SIOCSIFADDR(0xffffffffffffffff, 0x8916, &(0x7f0000001180)={'bond0\x00', {0x2, 0x0, @local}}) [ 530.851990] EXT4-fs error (device loop2): __ext4_fill_super:5244: inode #2: comm syz-executor.2: iget: root inode unallocated [ 530.854896] EXT4-fs (loop2): get root inode failed [ 530.855579] EXT4-fs (loop2): mount failed 22:18:43 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53", 0x39, 0x400}], 0x0, &(0x7f0000012c00)) 22:18:43 executing program 4: openat$sysfs(0xffffffffffffff9c, &(0x7f0000000040)='/sys/kernel/slab', 0x0, 0x0) lseek(0xffffffffffffffff, 0x0, 0x0) getdents64(0xffffffffffffffff, &(0x7f0000000240)=""/226, 0x20000258) 22:18:43 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x0, 0x0, 0x0, &(0x7f0000012c00)) [ 531.007472] loop1: detected capacity change from 0 to 4 22:18:43 executing program 2: getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000040), &(0x7f0000000080)=0xc) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010100)="00000000080000000000f900b00cb2cc029f49d8b90449a7d5d54d49010000a566", 0x21, 0x4e0}, {&(0x7f0000010400)="0200000003000000040000006a000f000300040000000000000000000f00bc0f", 0x20, 0x800}, {&(0x7f0000011600)="ed41000000080000dff4655fe0f4655fe0f4655f0000", 0x16, 0x2100}, {0x0}, {0x0}, {0x0}], 0x0, &(0x7f0000012c00)) [ 531.047701] EXT4-fs (loop1): VFS: Can't find ext4 filesystem [ 531.087935] No source specified [ 531.111724] loop2: detected capacity change from 0 to 512 [ 531.138642] EXT4-fs error (device loop2): __ext4_fill_super:5244: inode #2: comm syz-executor.2: iget: root inode unallocated [ 531.139823] EXT4-fs (loop2): get root inode failed [ 531.140167] EXT4-fs (loop2): mount failed 22:18:43 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010100)="00000000080000000000f900b00cb2cc029f49d8b90449a7d5d54d49010000a566", 0x21, 0x4e0}, {&(0x7f0000010400)="0200000003000000040000006a000f000300040000000000000000000f00bc0f", 0x20, 0x800}, {0x0}, {0x0}], 0x0, &(0x7f0000012c00)) 22:18:43 executing program 5: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x2, &(0x7f0000000000)=[{0x7c}, {0x6, 0x0, 0x0, 0x7fffffff}]}) openat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x800, 0x10e) ioctl$sock_inet_SIOCSIFADDR(0xffffffffffffffff, 0x8916, &(0x7f0000001180)={'bond0\x00', {0x2, 0x0, @local}}) 22:18:43 executing program 4: openat$sysfs(0xffffffffffffff9c, &(0x7f0000000040)='/sys/kernel/slab', 0x0, 0x0) lseek(0xffffffffffffffff, 0x0, 0x0) getdents64(0xffffffffffffffff, &(0x7f0000000240)=""/226, 0x20000258) [ 531.232118] loop0: detected capacity change from 0 to 512 [ 531.245288] EXT4-fs error (device loop0): __ext4_fill_super:5244: inode #2: comm syz-executor.0: iget: root inode unallocated [ 531.246673] EXT4-fs (loop0): get root inode failed [ 531.247022] EXT4-fs (loop0): mount failed 22:18:43 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef0100010000", 0x3f, 0x400}], 0x0, &(0x7f0000012c00)) [ 531.298387] loop1: detected capacity change from 0 to 4 [ 531.328463] EXT4-fs (loop1): bad geometry: block count 128 exceeds size of device (1 blocks) 22:18:56 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010100)="00000000080000000000f900b00cb2cc029f49d8b90449a7d5d54d49010000a566", 0x21, 0x4e0}, {&(0x7f0000010400)="0200000003000000040000006a000f000300040000000000000000000f00bc0f", 0x20, 0x800}, {0x0}], 0x0, &(0x7f0000012c00)) 22:18:56 executing program 6: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x2, &(0x7f0000000000)=[{0x7c}, {0x6, 0x0, 0x0, 0x7fffffff}]}) openat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x800, 0x10e) ioctl$sock_inet_SIOCSIFADDR(0xffffffffffffffff, 0x8916, &(0x7f0000001180)={'bond0\x00', {0x2, 0x0, @local}}) 22:18:56 executing program 2: getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000040), &(0x7f0000000080)=0xc) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010100)="00000000080000000000f900b00cb2cc029f49d8b90449a7d5d54d49010000a566", 0x21, 0x4e0}, {&(0x7f0000010400)="0200000003000000040000006a000f000300040000000000000000000f00bc0f", 0x20, 0x800}, {&(0x7f0000011600)="ed41000000080000dff4655fe0f4655fe0f4655f000000000000", 0x1a, 0x2100}, {0x0}, {0x0}, {0x0}], 0x0, &(0x7f0000012c00)) 22:18:56 executing program 4: openat$sysfs(0xffffffffffffff9c, &(0x7f0000000040)='/sys/kernel/slab', 0x0, 0x0) lseek(0xffffffffffffffff, 0x0, 0x0) getdents64(0xffffffffffffffff, &(0x7f0000000240)=""/226, 0x20000258) 22:18:56 executing program 5: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x2, &(0x7f0000000000)=[{0x7c}, {0x6, 0x0, 0x0, 0x7fffffff}]}) r0 = syz_init_net_socket$802154_raw(0x24, 0x3, 0x0) ioctl$sock_inet_SIOCSIFADDR(r0, 0x8916, &(0x7f0000001180)={'bond0\x00', {0x2, 0x0, @local}}) 22:18:56 executing program 7: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x2, &(0x7f0000000000)=[{0x7c}, {0x6, 0x0, 0x0, 0x7fffffff}]}) openat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x800, 0x10e) r0 = syz_init_net_socket$802154_raw(0x24, 0x3, 0x0) ioctl$sock_inet_SIOCSIFADDR(r0, 0x8916, &(0x7f0000001180)={'bond0\x00', {0x2, 0x0, @local}}) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f0000000080)) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fork() r1 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x0) r2 = dup2(r1, r1) bind$bt_l2cap(r2, &(0x7f0000000000)={0x1f, 0x0, @fixed={'\xaa\xaa\xaa\xaa\xaa', 0x10}}, 0xe) 22:18:56 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000012c00)) 22:18:56 executing program 3: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x2, &(0x7f0000000000)=[{0x7c}, {0x6, 0x0, 0x0, 0x7fffffff}]}) openat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x800, 0x10e) r0 = syz_init_net_socket$802154_raw(0x24, 0x3, 0x0) ioctl$sock_inet_SIOCSIFADDR(r0, 0x8916, &(0x7f0000001180)={'bond0\x00', {0x2, 0x0, @local}}) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f0000000080)) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x0) r2 = dup2(r1, r1) bind$bt_l2cap(r2, &(0x7f0000000000)={0x1f, 0x0, @fixed={'\xaa\xaa\xaa\xaa\xaa', 0x10}}, 0xe) 22:18:56 executing program 4: r0 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000040)='/sys/kernel/slab', 0x0, 0x0) lseek(0xffffffffffffffff, 0x0, 0x0) getdents64(r0, 0x0, 0x0) [ 543.858052] loop0: detected capacity change from 0 to 512 [ 543.877105] loop1: detected capacity change from 0 to 4 [ 543.887492] loop2: detected capacity change from 0 to 512 [ 543.916986] EXT4-fs (loop1): bad geometry: block count 128 exceeds size of device (1 blocks) [ 543.929538] EXT4-fs error (device loop2): __ext4_fill_super:5244: inode #2: comm syz-executor.2: iget: root inode unallocated [ 543.930771] EXT4-fs (loop2): get root inode failed [ 543.931144] EXT4-fs (loop2): mount failed [ 543.936878] EXT4-fs error (device loop0): __ext4_fill_super:5244: inode #2: comm syz-executor.0: iget: root inode unallocated [ 543.940473] EXT4-fs (loop0): get root inode failed [ 543.941394] EXT4-fs (loop0): mount failed 22:18:56 executing program 6: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x2, &(0x7f0000000000)=[{0x7c}, {0x6, 0x0, 0x0, 0x7fffffff}]}) openat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x800, 0x10e) r0 = syz_init_net_socket$802154_raw(0x24, 0x3, 0x0) ioctl$sock_inet_SIOCSIFADDR(r0, 0x8916, &(0x7f0000001180)={'bond0\x00', {0x2, 0x0, @local}}) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f0000000080)) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fork() r1 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x0) r2 = dup2(r1, r1) bind$bt_l2cap(r2, &(0x7f0000000000)={0x1f, 0x0, @fixed={'\xaa\xaa\xaa\xaa\xaa', 0x10}}, 0xe) 22:18:56 executing program 4: r0 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000040)='/sys/kernel/slab', 0x0, 0x0) lseek(0xffffffffffffffff, 0x0, 0x0) getdents64(r0, 0x0, 0x0) 22:18:56 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f01", 0x35, 0x400}], 0x0, &(0x7f0000012c00)) 22:18:56 executing program 2: getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000040), &(0x7f0000000080)=0xc) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010100)="00000000080000000000f900b00cb2cc029f49d8b90449a7d5d54d49010000a566", 0x21, 0x4e0}, {&(0x7f0000010400)="0200000003000000040000006a000f000300040000000000000000000f00bc0f", 0x20, 0x800}, {&(0x7f0000011600)="ed41000000080000dff4655fe0f4655fe0f4655f000000000000", 0x1a, 0x2100}, {0x0}, {0x0}, {0x0}], 0x0, &(0x7f0000012c00)) 22:18:56 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010100)="00000000080000000000f900b00cb2cc029f49d8b90449a7d5d54d49010000a566", 0x21, 0x4e0}, {&(0x7f0000010400)="0200000003000000040000006a000f000300040000000000000000000f00bc0f", 0x20, 0x800}], 0x0, &(0x7f0000012c00)) [ 544.123222] loop2: detected capacity change from 0 to 512 22:18:56 executing program 4: r0 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000040)='/sys/kernel/slab', 0x0, 0x0) lseek(0xffffffffffffffff, 0x0, 0x0) getdents64(r0, 0x0, 0x0) [ 544.142145] loop0: detected capacity change from 0 to 512 [ 544.154376] loop1: detected capacity change from 0 to 4 [ 544.166762] EXT4-fs (loop1): VFS: Can't find ext4 filesystem [ 544.169463] EXT4-fs error (device loop0): __ext4_fill_super:5244: inode #2: comm syz-executor.0: iget: root inode unallocated [ 544.170615] EXT4-fs (loop0): get root inode failed [ 544.171076] EXT4-fs (loop0): mount failed [ 544.196939] EXT4-fs error (device loop2): __ext4_fill_super:5244: inode #2: comm syz-executor.2: iget: root inode unallocated [ 544.213468] EXT4-fs (loop2): get root inode failed [ 544.214412] EXT4-fs (loop2): mount failed 22:18:56 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010100)="00000000080000000000f900b00cb2cc029f49d8b90449a7d5d54d49010000a566", 0x21, 0x4e0}, {&(0x7f0000010400)="0200000003000000040000006a000f000300040000000000000000000f00bc0f", 0x20, 0x800}], 0x0, &(0x7f0000012c00)) [ 544.302002] loop0: detected capacity change from 0 to 512 [ 544.321907] EXT4-fs error (device loop0): __ext4_fill_super:5244: inode #2: comm syz-executor.0: iget: root inode unallocated [ 544.323138] EXT4-fs (loop0): get root inode failed [ 544.323518] EXT4-fs (loop0): mount failed 22:19:11 executing program 7: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x2, &(0x7f0000000000)=[{0x7c}, {0x6, 0x0, 0x0, 0x7fffffff}]}) openat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x800, 0x10e) r0 = syz_init_net_socket$802154_raw(0x24, 0x3, 0x0) ioctl$sock_inet_SIOCSIFADDR(r0, 0x8916, &(0x7f0000001180)={'bond0\x00', {0x2, 0x0, @local}}) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f0000000080)) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fork() r1 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x0) r2 = dup2(r1, r1) bind$bt_l2cap(r2, &(0x7f0000000000)={0x1f, 0x0, @fixed={'\xaa\xaa\xaa\xaa\xaa', 0x10}}, 0xe) 22:19:11 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f01", 0x35, 0x400}], 0x0, &(0x7f0000012c00)) 22:19:11 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010100)="00000000080000000000f900b00cb2cc029f49d8b90449a7d5d54d49010000a566", 0x21, 0x4e0}], 0x0, &(0x7f0000012c00)) 22:19:11 executing program 5: r0 = syz_init_net_socket$802154_raw(0x24, 0x3, 0x0) ioctl$sock_inet_SIOCSIFADDR(r0, 0x8916, &(0x7f0000001180)={'bond0\x00', {0x2, 0x0, @local}}) 22:19:11 executing program 4: getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000040), &(0x7f0000000080)=0xc) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010100)="00000000080000000000f900b00cb2cc029f49d8b90449a7d5d54d49010000a566", 0x21, 0x4e0}, {&(0x7f0000010400)="0200000003000000040000006a000f000300040000000000000000000f00bc0f", 0x20, 0x800}, {&(0x7f0000011600)="ed41000000080000dff4655fe0f4655fe0f4655f000000000000", 0x1a, 0x2100}, {0x0}, {0x0}, {0x0}], 0x0, &(0x7f0000012c00)) 22:19:11 executing program 2: getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000040), &(0x7f0000000080)=0xc) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010100)="00000000080000000000f900b00cb2cc029f49d8b90449a7d5d54d49010000a566", 0x21, 0x4e0}, {&(0x7f0000010400)="0200000003000000040000006a000f000300040000000000000000000f00bc0f", 0x20, 0x800}, {&(0x7f0000011600)="ed41000000080000dff4655fe0f4655fe0f4655f000000000000", 0x1a, 0x2100}, {0x0}, {0x0}, {0x0}], 0x0, &(0x7f0000012c00)) 22:19:11 executing program 3: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x2, &(0x7f0000000000)=[{0x7c}, {0x6, 0x0, 0x0, 0x7fffffff}]}) openat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x800, 0x10e) r0 = syz_init_net_socket$802154_raw(0x24, 0x3, 0x0) ioctl$sock_inet_SIOCSIFADDR(r0, 0x8916, &(0x7f0000001180)={'bond0\x00', {0x2, 0x0, @local}}) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f0000000080)) r1 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x0) r2 = dup2(r1, r1) bind$bt_l2cap(r2, &(0x7f0000000000)={0x1f, 0x0, @fixed={'\xaa\xaa\xaa\xaa\xaa', 0x10}}, 0xe) 22:19:11 executing program 6: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x2, &(0x7f0000000000)=[{0x7c}, {0x6, 0x0, 0x0, 0x7fffffff}]}) openat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x800, 0x10e) r0 = syz_init_net_socket$802154_raw(0x24, 0x3, 0x0) ioctl$sock_inet_SIOCSIFADDR(r0, 0x8916, &(0x7f0000001180)={'bond0\x00', {0x2, 0x0, @local}}) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f0000000080)) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fork() r1 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x0) r2 = dup2(r1, r1) bind$bt_l2cap(r2, &(0x7f0000000000)={0x1f, 0x0, @fixed={'\xaa\xaa\xaa\xaa\xaa', 0x10}}, 0xe) [ 559.571737] loop1: detected capacity change from 0 to 4 [ 559.596334] loop4: detected capacity change from 0 to 512 [ 559.604741] EXT4-fs (loop1): VFS: Can't find ext4 filesystem [ 559.647525] loop0: detected capacity change from 0 to 512 [ 559.660598] loop2: detected capacity change from 0 to 512 [ 559.693027] EXT4-fs error (device loop4): __ext4_fill_super:5244: inode #2: comm syz-executor.4: iget: root inode unallocated [ 559.695192] EXT4-fs (loop0): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 559.696486] EXT4-fs (loop0): group descriptors corrupted! [ 559.712773] EXT4-fs (loop4): get root inode failed [ 559.713578] EXT4-fs (loop4): mount failed [ 559.724981] EXT4-fs error (device loop2): __ext4_fill_super:5244: inode #2: comm syz-executor.2: iget: root inode unallocated [ 559.744559] EXT4-fs (loop2): get root inode failed [ 559.745358] EXT4-fs (loop2): mount failed 22:19:12 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f01", 0x35, 0x400}], 0x0, &(0x7f0000012c00)) 22:19:12 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010100)="00000000080000000000f900b00cb2cc029f49d8b90449a7d5d54d49010000a566", 0x21, 0x4e0}], 0x0, &(0x7f0000012c00)) 22:19:12 executing program 4: getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000040), &(0x7f0000000080)=0xc) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010100)="00000000080000000000f900b00cb2cc029f49d8b90449a7d5d54d49010000a566", 0x21, 0x4e0}, {&(0x7f0000010400)="0200000003000000040000006a000f000300040000000000000000000f00bc0f", 0x20, 0x800}, {&(0x7f0000011600)="ed41000000080000dff4655fe0f4655fe0f4655f000000000000", 0x1a, 0x2100}, {0x0}, {0x0}, {0x0}], 0x0, &(0x7f0000012c00)) 22:19:12 executing program 2: getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000040), &(0x7f0000000080)=0xc) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010100)="00000000080000000000f900b00cb2cc029f49d8b90449a7d5d54d49010000a566", 0x21, 0x4e0}, {&(0x7f0000010400)="0200000003000000040000006a000f000300040000000000000000000f00bc0f", 0x20, 0x800}, {&(0x7f0000011600)="ed41000000080000dff4655fe0f4655fe0f4655f0000000000000400", 0x1c, 0x2100}, {0x0}, {0x0}, {0x0}], 0x0, &(0x7f0000012c00)) 22:19:12 executing program 3: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x2, &(0x7f0000000000)=[{0x7c}, {0x6, 0x0, 0x0, 0x7fffffff}]}) openat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x800, 0x10e) r0 = syz_init_net_socket$802154_raw(0x24, 0x3, 0x0) ioctl$sock_inet_SIOCSIFADDR(r0, 0x8916, &(0x7f0000001180)={'bond0\x00', {0x2, 0x0, @local}}) r1 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x0) r2 = dup2(r1, r1) bind$bt_l2cap(r2, &(0x7f0000000000)={0x1f, 0x0, @fixed={'\xaa\xaa\xaa\xaa\xaa', 0x10}}, 0xe) [ 560.047106] loop1: detected capacity change from 0 to 4 [ 560.072522] EXT4-fs (loop1): VFS: Can't find ext4 filesystem [ 560.108375] loop0: detected capacity change from 0 to 512 [ 560.126051] loop2: detected capacity change from 0 to 512 [ 560.131027] loop4: detected capacity change from 0 to 512 [ 560.135456] EXT4-fs (loop0): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 560.136749] EXT4-fs (loop0): group descriptors corrupted! [ 560.159692] EXT4-fs (loop2): corrupt root inode, run e2fsck [ 560.162857] EXT4-fs (loop2): mount failed [ 560.174095] EXT4-fs error (device loop4): __ext4_fill_super:5244: inode #2: comm syz-executor.4: iget: root inode unallocated [ 560.182248] EXT4-fs (loop4): get root inode failed [ 560.182967] EXT4-fs (loop4): mount failed 22:19:12 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff", 0x38, 0x400}], 0x0, &(0x7f0000012c00)) 22:19:12 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010100)="00000000080000000000f900b00cb2cc029f49d8b90449a7d5d54d49010000a566", 0x21, 0x4e0}], 0x0, &(0x7f0000012c00)) [ 560.340188] loop1: detected capacity change from 0 to 4 [ 560.350313] EXT4-fs (loop1): VFS: Can't find ext4 filesystem [ 560.409562] loop0: detected capacity change from 0 to 512 [ 560.431773] EXT4-fs (loop0): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 560.433008] EXT4-fs (loop0): group descriptors corrupted! 22:19:29 executing program 7: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x2, &(0x7f0000000000)=[{0x7c}, {0x6, 0x0, 0x0, 0x7fffffff}]}) openat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x800, 0x10e) r0 = syz_init_net_socket$802154_raw(0x24, 0x3, 0x0) ioctl$sock_inet_SIOCSIFADDR(r0, 0x8916, &(0x7f0000001180)={'bond0\x00', {0x2, 0x0, @local}}) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f0000000080)) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fork() syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x0) bind$bt_l2cap(0xffffffffffffffff, &(0x7f0000000000)={0x1f, 0x0, @fixed={'\xaa\xaa\xaa\xaa\xaa', 0x10}}, 0xe) 22:19:29 executing program 2: getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000040), &(0x7f0000000080)=0xc) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010100)="00000000080000000000f900b00cb2cc029f49d8b90449a7d5d54d49010000a566", 0x21, 0x4e0}, {&(0x7f0000010400)="0200000003000000040000006a000f000300040000000000000000000f00bc0f", 0x20, 0x800}, {&(0x7f0000011600)="ed41000000080000dff4655fe0f4655fe0f4655f0000000000000400", 0x1c, 0x2100}, {0x0}, {0x0}, {0x0}], 0x0, &(0x7f0000012c00)) 22:19:29 executing program 6: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x2, &(0x7f0000000000)=[{0x7c}, {0x6, 0x0, 0x0, 0x7fffffff}]}) openat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x800, 0x10e) r0 = syz_init_net_socket$802154_raw(0x24, 0x3, 0x0) ioctl$sock_inet_SIOCSIFADDR(r0, 0x8916, &(0x7f0000001180)={'bond0\x00', {0x2, 0x0, @local}}) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f0000000080)) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fork() r1 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x0) r2 = dup2(r1, r1) bind$bt_l2cap(r2, &(0x7f0000000000)={0x1f, 0x0, @fixed={'\xaa\xaa\xaa\xaa\xaa', 0x10}}, 0xe) 22:19:29 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff", 0x38, 0x400}], 0x0, &(0x7f0000012c00)) 22:19:29 executing program 4: getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000040), &(0x7f0000000080)=0xc) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010100)="00000000080000000000f900b00cb2cc029f49d8b90449a7d5d54d49010000a566", 0x21, 0x4e0}, {&(0x7f0000010400)="0200000003000000040000006a000f000300040000000000000000000f00bc0f", 0x20, 0x800}, {&(0x7f0000011600)="ed41000000080000dff4655fe0f4655fe0f4655f000000000000", 0x1a, 0x2100}, {0x0}, {0x0}, {0x0}], 0x0, &(0x7f0000012c00)) 22:19:29 executing program 5: syz_init_net_socket$802154_raw(0x24, 0x3, 0x0) ioctl$sock_inet_SIOCSIFADDR(0xffffffffffffffff, 0x8916, &(0x7f0000001180)={'bond0\x00', {0x2, 0x0, @local}}) 22:19:29 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010100)="00000000080000000000f900b00cb2cc029f49d8b90449a7d5d54d49010000a566", 0x21, 0x4e0}, {0x0, 0x0, 0x800}], 0x0, &(0x7f0000012c00)) 22:19:29 executing program 3: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x2, &(0x7f0000000000)=[{0x7c}, {0x6, 0x0, 0x0, 0x7fffffff}]}) openat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x800, 0x10e) syz_init_net_socket$802154_raw(0x24, 0x3, 0x0) r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x0) r1 = dup2(r0, r0) bind$bt_l2cap(r1, &(0x7f0000000000)={0x1f, 0x0, @fixed={'\xaa\xaa\xaa\xaa\xaa', 0x10}}, 0xe) [ 577.193898] loop1: detected capacity change from 0 to 4 [ 577.199308] EXT4-fs (loop1): VFS: Can't find ext4 filesystem [ 577.215915] loop0: detected capacity change from 0 to 512 [ 577.229920] loop4: detected capacity change from 0 to 512 [ 577.237004] EXT4-fs (loop0): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 577.238476] EXT4-fs (loop0): group descriptors corrupted! [ 577.251826] loop2: detected capacity change from 0 to 512 [ 577.255537] EXT4-fs error (device loop4): __ext4_fill_super:5244: inode #2: comm syz-executor.4: iget: root inode unallocated [ 577.257790] EXT4-fs (loop4): get root inode failed [ 577.258192] EXT4-fs (loop4): mount failed 22:19:29 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff", 0x38, 0x400}], 0x0, &(0x7f0000012c00)) 22:19:29 executing program 5: syz_init_net_socket$802154_raw(0x24, 0x3, 0x0) ioctl$sock_inet_SIOCSIFADDR(0xffffffffffffffff, 0x8916, &(0x7f0000001180)={'bond0\x00', {0x2, 0x0, @local}}) [ 577.331130] EXT4-fs (loop2): corrupt root inode, run e2fsck [ 577.332258] EXT4-fs (loop2): mount failed 22:19:29 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010100)="00000000080000000000f900b00cb2cc029f49d8b90449a7d5d54d49010000a566", 0x21, 0x4e0}, {0x0, 0x0, 0x800}], 0x0, &(0x7f0000012c00)) [ 577.371599] loop1: detected capacity change from 0 to 4 22:19:29 executing program 3: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x2, &(0x7f0000000000)=[{0x7c}, {0x6, 0x0, 0x0, 0x7fffffff}]}) openat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x800, 0x10e) r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x0) r1 = dup2(r0, r0) bind$bt_l2cap(r1, &(0x7f0000000000)={0x1f, 0x0, @fixed={'\xaa\xaa\xaa\xaa\xaa', 0x10}}, 0xe) [ 577.395668] EXT4-fs (loop1): VFS: Can't find ext4 filesystem 22:19:29 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010100)="00000000080000000000f900b00cb2cc029f49d8b90449a7d5d54d49010000a566", 0x21, 0x4e0}, {&(0x7f0000010400)="0200000003000000040000006a000f000300040000000000000000000f00bc0f", 0x20, 0x800}, {&(0x7f0000011600)="ed41000000080000dff4655fe0f4655fe0f4655f000000000000", 0x1a, 0x2100}, {0x0}, {0x0}, {0x0}], 0x0, &(0x7f0000012c00)) [ 577.424763] loop0: detected capacity change from 0 to 512 22:19:29 executing program 5: syz_init_net_socket$802154_raw(0x24, 0x3, 0x0) ioctl$sock_inet_SIOCSIFADDR(0xffffffffffffffff, 0x8916, &(0x7f0000001180)={'bond0\x00', {0x2, 0x0, @local}}) [ 577.457753] EXT4-fs (loop0): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 577.458585] EXT4-fs (loop0): group descriptors corrupted! [ 577.465453] loop4: detected capacity change from 0 to 512 22:19:29 executing program 2: getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000040), &(0x7f0000000080)=0xc) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010100)="00000000080000000000f900b00cb2cc029f49d8b90449a7d5d54d49010000a566", 0x21, 0x4e0}, {&(0x7f0000010400)="0200000003000000040000006a000f000300040000000000000000000f00bc0f", 0x20, 0x800}, {&(0x7f0000011600)="ed41000000080000dff4655fe0f4655fe0f4655f0000000000000400", 0x1c, 0x2100}, {0x0}, {0x0}, {0x0}], 0x0, &(0x7f0000012c00)) 22:19:29 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53", 0x39, 0x400}], 0x0, &(0x7f0000012c00)) [ 577.507415] EXT4-fs error (device loop4): __ext4_fill_super:5244: inode #2: comm syz-executor.4: iget: root inode unallocated [ 577.509528] EXT4-fs (loop4): get root inode failed [ 577.510164] EXT4-fs (loop4): mount failed [ 577.586909] loop2: detected capacity change from 0 to 512 [ 577.660579] EXT4-fs (loop2): corrupt root inode, run e2fsck [ 577.661794] EXT4-fs (loop2): mount failed 22:19:43 executing program 7: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x2, &(0x7f0000000000)=[{0x7c}, {0x6, 0x0, 0x0, 0x7fffffff}]}) openat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x800, 0x10e) r0 = syz_init_net_socket$802154_raw(0x24, 0x3, 0x0) ioctl$sock_inet_SIOCSIFADDR(r0, 0x8916, &(0x7f0000001180)={'bond0\x00', {0x2, 0x0, @local}}) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f0000000080)) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fork() syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x0) bind$bt_l2cap(0xffffffffffffffff, &(0x7f0000000000)={0x1f, 0x0, @fixed={'\xaa\xaa\xaa\xaa\xaa', 0x10}}, 0xe) 22:19:43 executing program 4: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x40000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010100)="00000000080000000000f900b00cb2cc029f49d8b90449a7d5d54d49010000a566", 0x21, 0x4e0}, {&(0x7f0000010400)="0200000003000000040000006a000f000300040000000000000000000f00bc0f", 0x20, 0x800}, {&(0x7f0000011600)="ed41000000080000dff4655fe0f4655fe0f4655f000000000000", 0x1a, 0x2100}, {0x0}, {0x0}, {0x0}], 0x0, &(0x7f0000012c00)) 22:19:43 executing program 6: getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000040), &(0x7f0000000080)=0xc) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010100)="00000000080000000000f900b00cb2cc029f49d8b90449a7d5d54d49010000a566", 0x21, 0x4e0}, {&(0x7f0000010400)="0200000003000000040000006a000f000300040000000000000000000f00bc0f", 0x20, 0x800}, {&(0x7f0000011600)="ed41000000080000dff4655fe0f4655fe0f4655f0000000000000400", 0x1c, 0x2100}, {0x0}, {0x0}, {0x0}], 0x0, &(0x7f0000012c00)) 22:19:43 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010100)="00000000080000000000f900b00cb2cc029f49d8b90449a7d5d54d49010000a566", 0x21, 0x4e0}, {0x0, 0x0, 0x800}], 0x0, &(0x7f0000012c00)) 22:19:43 executing program 3: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x2, &(0x7f0000000000)=[{0x7c}, {0x6, 0x0, 0x0, 0x7fffffff}]}) r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x0) r1 = dup2(r0, r0) bind$bt_l2cap(r1, &(0x7f0000000000)={0x1f, 0x0, @fixed={'\xaa\xaa\xaa\xaa\xaa', 0x10}}, 0xe) 22:19:43 executing program 5: r0 = syz_init_net_socket$802154_raw(0x24, 0x3, 0x0) ioctl$sock_inet_SIOCSIFADDR(r0, 0x8916, 0x0) 22:19:43 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53", 0x39, 0x400}], 0x0, &(0x7f0000012c00)) 22:19:43 executing program 2: getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000040), &(0x7f0000000080)=0xc) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010100)="00000000080000000000f900b00cb2cc029f49d8b90449a7d5d54d49010000a566", 0x21, 0x4e0}, {&(0x7f0000010400)="0200000003000000040000006a000f000300040000000000000000000f00bc0f", 0x20, 0x800}, {&(0x7f0000011600)="ed41000000080000dff4655fe0f4655fe0f4655f000000000000040004", 0x1d}, {0x0}, {0x0}, {0x0}], 0x0, &(0x7f0000012c00)) [ 590.809264] loop4: detected capacity change from 0 to 512 [ 590.817971] loop6: detected capacity change from 0 to 512 [ 590.832137] EXT4-fs (loop6): corrupt root inode, run e2fsck [ 590.832720] EXT4-fs (loop6): mount failed [ 590.848292] loop2: detected capacity change from 0 to 512 [ 590.849871] loop1: detected capacity change from 0 to 4 22:19:43 executing program 3: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x0) r1 = dup2(r0, r0) bind$bt_l2cap(r1, &(0x7f0000000000)={0x1f, 0x0, @fixed={'\xaa\xaa\xaa\xaa\xaa', 0x10}}, 0xe) [ 590.861392] EXT4-fs (loop1): VFS: Can't find ext4 filesystem 22:19:43 executing program 4: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x40000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010100)="00000000080000000000f900b00cb2cc029f49d8b90449a7d5d54d49010000a566", 0x21, 0x4e0}, {&(0x7f0000010400)="0200000003000000040000006a000f000300040000000000000000000f00bc0f", 0x20, 0x800}, {&(0x7f0000011600)="ed41000000080000dff4655fe0f4655fe0f4655f000000000000", 0x1a, 0x2100}, {0x0}, {0x0}, {0x0}], 0x0, &(0x7f0000012c00)) [ 590.866287] loop0: detected capacity change from 0 to 512 [ 590.873821] EXT4-fs error (device loop2): __ext4_fill_super:5244: inode #2: comm syz-executor.2: iget: root inode unallocated [ 590.879266] EXT4-fs (loop2): get root inode failed [ 590.879928] EXT4-fs (loop2): mount failed [ 590.882103] EXT4-fs (loop0): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 590.883406] EXT4-fs (loop0): group descriptors corrupted! 22:19:43 executing program 6: getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000040), &(0x7f0000000080)=0xc) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010100)="00000000080000000000f900b00cb2cc029f49d8b90449a7d5d54d49010000a566", 0x21, 0x4e0}, {&(0x7f0000010400)="0200000003000000040000006a000f000300040000000000000000000f00bc0f", 0x20, 0x800}, {&(0x7f0000011600)="ed41000000080000dff4655fe0f4655fe0f4655f0000000000000400", 0x1c, 0x2100}, {0x0}, {0x0}, {0x0}], 0x0, &(0x7f0000012c00)) [ 590.951859] loop4: detected capacity change from 0 to 512 22:19:43 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53", 0x39, 0x400}], 0x0, &(0x7f0000012c00)) 22:19:43 executing program 2: getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000040), &(0x7f0000000080)=0xc) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010100)="00000000080000000000f900b00cb2cc029f49d8b90449a7d5d54d49010000a566", 0x21, 0x4e0}, {&(0x7f0000010400)="0200000003000000040000006a000f000300040000000000000000000f00bc0f", 0x20, 0x800}, {&(0x7f0000011600)="ed41000000080000dff4655fe0f4655fe0f4655f000000000000040004", 0x1d}, {0x0}, {0x0}, {0x0}], 0x0, &(0x7f0000012c00)) 22:19:43 executing program 5: r0 = syz_init_net_socket$802154_raw(0x24, 0x3, 0x0) ioctl$sock_inet_SIOCSIFADDR(r0, 0x8916, 0x0) 22:19:43 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010100)="00000000080000000000f900b00cb2cc029f49d8b90449a7d5d54d49010000a566", 0x21, 0x4e0}, {&(0x7f0000010400), 0x0, 0x800}], 0x0, &(0x7f0000012c00)) [ 591.010341] loop6: detected capacity change from 0 to 512 22:19:43 executing program 4: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x40000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010100)="00000000080000000000f900b00cb2cc029f49d8b90449a7d5d54d49010000a566", 0x21, 0x4e0}, {&(0x7f0000010400)="0200000003000000040000006a000f000300040000000000000000000f00bc0f", 0x20, 0x800}, {&(0x7f0000011600)="ed41000000080000dff4655fe0f4655fe0f4655f000000000000", 0x1a, 0x2100}, {0x0}, {0x0}, {0x0}], 0x0, &(0x7f0000012c00)) [ 591.041695] EXT4-fs (loop6): corrupt root inode, run e2fsck [ 591.042198] EXT4-fs (loop6): mount failed [ 591.077169] loop1: detected capacity change from 0 to 4 [ 591.087566] loop4: detected capacity change from 0 to 512 [ 591.095100] EXT4-fs (loop1): VFS: Can't find ext4 filesystem [ 591.106792] loop2: detected capacity change from 0 to 512 [ 591.131381] loop0: detected capacity change from 0 to 512 [ 591.135604] EXT4-fs error (device loop2): __ext4_fill_super:5244: inode #2: comm syz-executor.2: iget: root inode unallocated [ 591.139526] EXT4-fs (loop2): get root inode failed [ 591.140615] EXT4-fs (loop2): mount failed [ 591.169785] EXT4-fs (loop0): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 591.171175] EXT4-fs (loop0): group descriptors corrupted! [ 604.449321] loop0: detected capacity change from 0 to 512 [ 604.467385] loop2: detected capacity change from 0 to 512 22:19:56 executing program 3: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x0, 0x0) r1 = dup2(r0, r0) bind$bt_l2cap(r1, &(0x7f0000000000)={0x1f, 0x0, @fixed={'\xaa\xaa\xaa\xaa\xaa', 0x10}}, 0xe) 22:19:56 executing program 7: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x2, &(0x7f0000000000)=[{0x7c}, {0x6, 0x0, 0x0, 0x7fffffff}]}) openat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x800, 0x10e) r0 = syz_init_net_socket$802154_raw(0x24, 0x3, 0x0) ioctl$sock_inet_SIOCSIFADDR(r0, 0x8916, &(0x7f0000001180)={'bond0\x00', {0x2, 0x0, @local}}) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f0000000080)) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fork() syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x0) bind$bt_l2cap(0xffffffffffffffff, &(0x7f0000000000)={0x1f, 0x0, @fixed={'\xaa\xaa\xaa\xaa\xaa', 0x10}}, 0xe) 22:19:56 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010100)="00000000080000000000f900b00cb2cc029f49d8b90449a7d5d54d49010000a566", 0x21, 0x4e0}, {&(0x7f0000010400), 0x0, 0x800}], 0x0, &(0x7f0000012c00)) 22:19:56 executing program 5: r0 = syz_init_net_socket$802154_raw(0x24, 0x3, 0x0) ioctl$sock_inet_SIOCSIFADDR(r0, 0x8916, 0x0) 22:19:56 executing program 6: getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000040), &(0x7f0000000080)=0xc) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010100)="00000000080000000000f900b00cb2cc029f49d8b90449a7d5d54d49010000a566", 0x21, 0x4e0}, {&(0x7f0000010400)="0200000003000000040000006a000f000300040000000000000000000f00bc0f", 0x20, 0x800}, {&(0x7f0000011600)="ed41000000080000dff4655fe0f4655fe0f4655f0000000000000400", 0x1c, 0x2100}, {0x0}, {0x0}, {0x0}], 0x0, &(0x7f0000012c00)) 22:19:56 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', 0x0, 0x40000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010100)="00000000080000000000f900b00cb2cc029f49d8b90449a7d5d54d49010000a566", 0x21, 0x4e0}, {&(0x7f0000010400)="0200000003000000040000006a000f000300040000000000000000000f00bc0f", 0x20, 0x800}, {&(0x7f0000011600)="ed41000000080000dff4655fe0f4655fe0f4655f000000000000", 0x1a, 0x2100}, {0x0}, {0x0}, {0x0}], 0x0, &(0x7f0000012c00)) 22:19:56 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef", 0x3a}], 0x0, &(0x7f0000012c00)) 22:19:56 executing program 2: getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000040), &(0x7f0000000080)=0xc) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010100)="00000000080000000000f900b00cb2cc029f49d8b90449a7d5d54d49010000a566", 0x21, 0x4e0}, {&(0x7f0000010400)="0200000003000000040000006a000f000300040000000000000000000f00bc0f", 0x20, 0x800}, {&(0x7f0000011600)="ed41000000080000dff4655fe0f4655fe0f4655f000000000000040004", 0x1d}, {0x0}, {0x0}, {0x0}], 0x0, &(0x7f0000012c00)) [ 604.471406] EXT4-fs (loop0): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 604.472203] EXT4-fs (loop0): group descriptors corrupted! [ 604.475871] EXT4-fs error (device loop2): __ext4_fill_super:5244: inode #2: comm syz-executor.2: iget: root inode unallocated [ 604.484493] EXT4-fs (loop1): VFS: Can't find ext4 filesystem [ 604.485405] EXT4-fs (loop2): get root inode failed [ 604.486016] EXT4-fs (loop2): mount failed [ 604.519740] loop4: detected capacity change from 0 to 512 22:19:56 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef", 0x3a}], 0x0, &(0x7f0000012c00)) 22:19:56 executing program 2: getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000040), &(0x7f0000000080)=0xc) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010100)="00000000080000000000f900b00cb2cc029f49d8b90449a7d5d54d49010000a566", 0x21, 0x4e0}, {&(0x7f0000011600)="ed41000000080000dff4655fe0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}, {0x0}, {0x0}, {0x0}], 0x0, &(0x7f0000012c00)) [ 604.555994] loop6: detected capacity change from 0 to 512 [ 604.568277] EXT4-fs (loop6): corrupt root inode, run e2fsck [ 604.568824] EXT4-fs (loop6): mount failed 22:19:56 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010100)="00000000080000000000f900b00cb2cc029f49d8b90449a7d5d54d49010000a566", 0x21, 0x4e0}, {&(0x7f0000010400), 0x0, 0x800}], 0x0, &(0x7f0000012c00)) 22:19:56 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef", 0x3a}], 0x0, &(0x7f0000012c00)) 22:19:56 executing program 6: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010100)="00000000080000000000f900b00cb2cc029f49d8b90449a7d5d54d49010000a566", 0x21, 0x4e0}, {&(0x7f0000010400)="0200000003000000040000006a000f000300040000000000000000000f00bc0f", 0x20, 0x800}, {&(0x7f0000011600)="ed41000000080000dff4655fe0f4655fe0f4655f0000000000000400", 0x1c, 0x2100}, {0x0}, {0x0}, {0x0}], 0x0, &(0x7f0000012c00)) [ 604.629861] EXT4-fs (loop1): VFS: Can't find ext4 filesystem 22:19:56 executing program 3: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x0, 0x0) r1 = dup2(r0, r0) bind$bt_l2cap(r1, &(0x7f0000000000)={0x1f, 0x0, @fixed={'\xaa\xaa\xaa\xaa\xaa', 0x10}}, 0xe) [ 604.681728] loop2: detected capacity change from 0 to 512 [ 604.689501] EXT4-fs (loop5): VFS: Can't find ext4 filesystem [ 604.696468] loop6: detected capacity change from 0 to 512 [ 604.706254] EXT4-fs (loop2): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 604.707593] EXT4-fs (loop2): group descriptors corrupted! 22:19:57 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', 0x0, 0x40000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010100)="00000000080000000000f900b00cb2cc029f49d8b90449a7d5d54d49010000a566", 0x21, 0x4e0}, {&(0x7f0000010400)="0200000003000000040000006a000f000300040000000000000000000f00bc0f", 0x20, 0x800}, {&(0x7f0000011600)="ed41000000080000dff4655fe0f4655fe0f4655f000000000000", 0x1a, 0x2100}, {0x0}, {0x0}, {0x0}], 0x0, &(0x7f0000012c00)) [ 604.714133] loop0: detected capacity change from 0 to 512 [ 604.726235] EXT4-fs (loop6): corrupt root inode, run e2fsck [ 604.726718] EXT4-fs (loop6): mount failed [ 604.744098] EXT4-fs (loop0): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 604.744990] EXT4-fs (loop0): group descriptors corrupted! [ 604.776966] loop4: detected capacity change from 0 to 512 22:19:57 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef", 0x3a}], 0x0, &(0x7f0000012c00)) 22:19:57 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef", 0x3a}], 0x0, &(0x7f0000012c00)) [ 604.840342] EXT4-fs (loop1): VFS: Can't find ext4 filesystem [ 604.847283] EXT4-fs (loop5): VFS: Can't find ext4 filesystem 22:20:08 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef", 0x3a}], 0x0, &(0x7f0000012c00)) 22:20:08 executing program 6: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x40000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010100)="00000000080000000000f900b00cb2cc029f49d8b90449a7d5d54d49010000a566", 0x21, 0x4e0}, {&(0x7f0000010400)="0200000003000000040000006a000f000300040000000000000000000f00bc0f", 0x20, 0x800}, {&(0x7f0000011600)="ed41000000080000dff4655fe0f4655fe0f4655f0000000000000400", 0x1c, 0x2100}, {0x0}, {0x0}, {0x0}], 0x0, &(0x7f0000012c00)) 22:20:08 executing program 7: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x2, &(0x7f0000000000)=[{0x7c}, {0x6, 0x0, 0x0, 0x7fffffff}]}) openat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x800, 0x10e) r0 = syz_init_net_socket$802154_raw(0x24, 0x3, 0x0) ioctl$sock_inet_SIOCSIFADDR(r0, 0x8916, &(0x7f0000001180)={'bond0\x00', {0x2, 0x0, @local}}) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f0000000080)) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fork() r1 = dup2(0xffffffffffffffff, 0xffffffffffffffff) bind$bt_l2cap(r1, &(0x7f0000000000)={0x1f, 0x0, @fixed={'\xaa\xaa\xaa\xaa\xaa', 0x10}}, 0xe) 22:20:08 executing program 2: getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000040), &(0x7f0000000080)=0xc) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010100)="00000000080000000000f900b00cb2cc029f49d8b90449a7d5d54d49010000a566", 0x21, 0x4e0}, {&(0x7f0000011600)="ed41000000080000dff4655fe0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}, {0x0}, {0x0}, {0x0}], 0x0, &(0x7f0000012c00)) [ 616.262307] loop4: detected capacity change from 0 to 512 [ 616.265253] loop6: detected capacity change from 0 to 512 22:20:08 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010100)="00000000080000000000f900b00cb2cc029f49d8b90449a7d5d54d49010000a566", 0x21, 0x4e0}, {&(0x7f0000010400)="0200000003000000040000006a000f00", 0x10, 0x800}], 0x0, &(0x7f0000012c00)) 22:20:08 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', 0x0, 0x40000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010100)="00000000080000000000f900b00cb2cc029f49d8b90449a7d5d54d49010000a566", 0x21, 0x4e0}, {&(0x7f0000010400)="0200000003000000040000006a000f000300040000000000000000000f00bc0f", 0x20, 0x800}, {&(0x7f0000011600)="ed41000000080000dff4655fe0f4655fe0f4655f000000000000", 0x1a, 0x2100}, {0x0}, {0x0}, {0x0}], 0x0, &(0x7f0000012c00)) 22:20:08 executing program 3: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x0, 0x0) r1 = dup2(r0, r0) bind$bt_l2cap(r1, &(0x7f0000000000)={0x1f, 0x0, @fixed={'\xaa\xaa\xaa\xaa\xaa', 0x10}}, 0xe) 22:20:08 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef", 0x3a, 0x400}], 0x0, 0x0) [ 616.302375] loop1: detected capacity change from 0 to 4 [ 616.305348] loop2: detected capacity change from 0 to 512 22:20:08 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010100)="00000000080000000000f900b00cb2cc029f49d8b90449a7d5d54d49010000a566", 0x21, 0x4e0}, {&(0x7f0000010400)="0200000003000000040000006a000f000300040000000000000000000f00bc0f", 0x20, 0x800}, {&(0x7f0000011600)="ed41000000080000dff4655fe0f4655fe0f4655f000000000000", 0x1a, 0x2100}, {0x0}, {0x0}, {0x0}], 0x0, &(0x7f0000012c00)) 22:20:08 executing program 6: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x40000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010100)="00000000080000000000f900b00cb2cc029f49d8b90449a7d5d54d49010000a566", 0x21, 0x4e0}, {&(0x7f0000010400)="0200000003000000040000006a000f000300040000000000000000000f00bc0f", 0x20, 0x800}, {&(0x7f0000011600)="ed41000000080000dff4655fe0f4655fe0f4655f0000000000000400", 0x1c, 0x2100}, {0x0}, {0x0}, {0x0}], 0x0, &(0x7f0000012c00)) [ 616.319112] EXT4-fs (loop2): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 616.319824] EXT4-fs (loop2): group descriptors corrupted! [ 616.342966] EXT4-fs (loop5): VFS: Can't find ext4 filesystem [ 616.344765] loop0: detected capacity change from 0 to 512 [ 616.362653] loop4: detected capacity change from 0 to 33 [ 616.364640] loop6: detected capacity change from 0 to 512 [ 616.374286] EXT4-fs (loop4): bad geometry: block count 128 exceeds size of device (8 blocks) [ 616.391998] EXT4-fs error (device loop0): __ext4_fill_super:5244: inode #2: comm syz-executor.0: iget: root inode unallocated [ 616.401976] EXT4-fs (loop0): get root inode failed [ 616.402972] EXT4-fs (loop0): mount failed 22:20:08 executing program 2: getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000040), &(0x7f0000000080)=0xc) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010100)="00000000080000000000f900b00cb2cc029f49d8b90449a7d5d54d49010000a566", 0x21, 0x4e0}, {&(0x7f0000011600)="ed41000000080000dff4655fe0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}, {0x0}, {0x0}, {0x0}], 0x0, &(0x7f0000012c00)) 22:20:08 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef", 0x3a, 0x400}], 0x0, 0x0) 22:20:08 executing program 6: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x40000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010100)="00000000080000000000f900b00cb2cc029f49d8b90449a7d5d54d49010000a566", 0x21, 0x4e0}, {&(0x7f0000010400)="0200000003000000040000006a000f000300040000000000000000000f00bc0f", 0x20, 0x800}, {&(0x7f0000011600)="ed41000000080000dff4655fe0f4655fe0f4655f0000000000000400", 0x1c, 0x2100}, {0x0}, {0x0}, {0x0}], 0x0, &(0x7f0000012c00)) 22:20:08 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010100)="00000000080000000000f900b00cb2cc029f49d8b90449a7d5d54d49010000a566", 0x21, 0x4e0}, {&(0x7f0000010400)="0200000003000000040000006a000f000300040000000000000000000f00bc0f", 0x20, 0x800}, {&(0x7f0000011600)="ed41000000080000dff4655fe0f4655fe0f4655f000000000000", 0x1a, 0x2100}, {0x0}, {0x0}, {0x0}], 0x0, &(0x7f0000012c00)) 22:20:08 executing program 3: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x0) r1 = dup2(0xffffffffffffffff, r0) bind$bt_l2cap(r1, &(0x7f0000000000)={0x1f, 0x0, @fixed={'\xaa\xaa\xaa\xaa\xaa', 0x10}}, 0xe) [ 616.480250] loop1: detected capacity change from 0 to 4 [ 616.493592] loop6: detected capacity change from 0 to 512 [ 616.499230] loop4: detected capacity change from 0 to 33 22:20:08 executing program 5: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef", 0x3a}], 0x0, &(0x7f0000012c00)) [ 616.543705] EXT4-fs (loop4): bad geometry: block count 128 exceeds size of device (8 blocks) [ 616.546285] loop2: detected capacity change from 0 to 512 [ 616.569995] EXT4-fs (loop2): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 616.571400] EXT4-fs (loop2): group descriptors corrupted! 22:20:22 executing program 6: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', 0x0, 0x40000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010100)="00000000080000000000f900b00cb2cc029f49d8b90449a7d5d54d49010000a566", 0x21, 0x4e0}, {&(0x7f0000010400)="0200000003000000040000006a000f000300040000000000000000000f00bc0f", 0x20, 0x800}, {&(0x7f0000011600)="ed41000000080000dff4655fe0f4655fe0f4655f0000000000000400", 0x1c, 0x2100}, {0x0}, {0x0}, {0x0}], 0x0, &(0x7f0000012c00)) 22:20:22 executing program 7: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x2, &(0x7f0000000000)=[{0x7c}, {0x6, 0x0, 0x0, 0x7fffffff}]}) openat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x800, 0x10e) r0 = syz_init_net_socket$802154_raw(0x24, 0x3, 0x0) ioctl$sock_inet_SIOCSIFADDR(r0, 0x8916, &(0x7f0000001180)={'bond0\x00', {0x2, 0x0, @local}}) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f0000000080)) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fork() r1 = dup2(0xffffffffffffffff, 0xffffffffffffffff) bind$bt_l2cap(r1, &(0x7f0000000000)={0x1f, 0x0, @fixed={'\xaa\xaa\xaa\xaa\xaa', 0x10}}, 0xe) 22:20:22 executing program 3: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x0) r1 = dup2(0xffffffffffffffff, r0) bind$bt_l2cap(r1, &(0x7f0000000000)={0x1f, 0x0, @fixed={'\xaa\xaa\xaa\xaa\xaa', 0x10}}, 0xe) 22:20:22 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010100)="00000000080000000000f900b00cb2cc029f49d8b90449a7d5d54d49010000a566", 0x21, 0x4e0}, {&(0x7f0000010400)="0200000003000000040000006a000f000300040000000000000000000f00bc0f", 0x20, 0x800}, {&(0x7f0000011600)="ed41000000080000dff4655fe0f4655fe0f4655f000000000000", 0x1a, 0x2100}, {0x0}, {0x0}, {0x0}], 0x0, &(0x7f0000012c00)) 22:20:22 executing program 5: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef", 0x3a}], 0x0, &(0x7f0000012c00)) 22:20:22 executing program 2: getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000040), &(0x7f0000000080)=0xc) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010100)="00000000080000000000f900b00cb2cc029f49d8b90449a7d5d54d49010000a566", 0x21, 0x4e0}, {0x0, 0x0, 0x800}, {&(0x7f0000011600)="ed41000000080000dff4655fe0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}, {0x0}, {0x0}, {0x0}], 0x0, &(0x7f0000012c00)) 22:20:22 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef", 0x3a, 0x400}], 0x0, 0x0) 22:20:22 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010100)="00000000080000000000f900b00cb2cc029f49d8b90449a7d5d54d49010000a566", 0x21, 0x4e0}, {&(0x7f0000010400), 0x0, 0x800}], 0x0, &(0x7f0000012c00)) [ 629.815219] loop4: detected capacity change from 0 to 33 [ 629.820330] loop2: detected capacity change from 0 to 512 [ 629.832293] EXT4-fs (loop4): bad geometry: block count 128 exceeds size of device (8 blocks) [ 629.837990] loop0: detected capacity change from 0 to 512 [ 629.843864] loop6: detected capacity change from 0 to 512 [ 629.850523] EXT4-fs (loop0): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 629.851098] EXT4-fs (loop2): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 629.851783] EXT4-fs (loop0): group descriptors corrupted! [ 629.852923] EXT4-fs (loop2): group descriptors corrupted! [ 629.865797] loop1: detected capacity change from 0 to 4 22:20:22 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x0, 0x0, 0x0, &(0x7f0000012c00)) 22:20:22 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010100)="00000000080000000000f900b00cb2cc029f49d8b90449a7d5d54d49010000a566", 0x21, 0x4e0}, {&(0x7f0000010400), 0x0, 0x800}], 0x0, &(0x7f0000012c00)) 22:20:22 executing program 3: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x0) r1 = dup2(0xffffffffffffffff, r0) bind$bt_l2cap(r1, &(0x7f0000000000)={0x1f, 0x0, @fixed={'\xaa\xaa\xaa\xaa\xaa', 0x10}}, 0xe) 22:20:22 executing program 5: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef", 0x3a}], 0x0, &(0x7f0000012c00)) [ 630.019019] No source specified [ 630.038326] loop0: detected capacity change from 0 to 512 22:20:22 executing program 6: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', 0x0, 0x40000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010100)="00000000080000000000f900b00cb2cc029f49d8b90449a7d5d54d49010000a566", 0x21, 0x4e0}, {&(0x7f0000010400)="0200000003000000040000006a000f000300040000000000000000000f00bc0f", 0x20, 0x800}, {&(0x7f0000011600)="ed41000000080000dff4655fe0f4655fe0f4655f0000000000000400", 0x1c, 0x2100}, {0x0}, {0x0}, {0x0}], 0x0, &(0x7f0000012c00)) 22:20:22 executing program 2: getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000040), &(0x7f0000000080)=0xc) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010100)="00000000080000000000f900b00cb2cc029f49d8b90449a7d5d54d49010000a566", 0x21, 0x4e0}, {0x0, 0x0, 0x800}, {&(0x7f0000011600)="ed41000000080000dff4655fe0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}, {0x0}, {0x0}, {0x0}], 0x0, &(0x7f0000012c00)) [ 630.067290] EXT4-fs (loop0): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 630.068693] EXT4-fs (loop0): group descriptors corrupted! [ 630.140987] loop6: detected capacity change from 0 to 512 [ 630.148463] loop2: detected capacity change from 0 to 512 22:20:22 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x0, 0x0, 0x0, &(0x7f0000012c00)) [ 630.192929] EXT4-fs (loop2): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 630.194303] EXT4-fs (loop2): group descriptors corrupted! 22:20:22 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010100)="00000000080000000000f900b00cb2cc029f49d8b90449a7d5d54d49010000a566", 0x21, 0x4e0}, {&(0x7f0000010400), 0x0, 0x800}], 0x0, &(0x7f0000012c00)) 22:20:22 executing program 3: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x0) r1 = dup2(r0, 0xffffffffffffffff) bind$bt_l2cap(r1, &(0x7f0000000000)={0x1f, 0x0, @fixed={'\xaa\xaa\xaa\xaa\xaa', 0x10}}, 0xe) [ 630.301549] loop0: detected capacity change from 0 to 512 [ 630.309933] No source specified [ 630.313964] EXT4-fs (loop0): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 630.315448] EXT4-fs (loop0): group descriptors corrupted! [ 646.027786] loop0: detected capacity change from 0 to 512 [ 646.029192] loop6: detected capacity change from 0 to 512 [ 646.033761] EXT4-fs (loop0): ext4_check_descriptors: Inode table for group 0 overlaps superblock [ 646.034457] EXT4-fs (loop0): group descriptors corrupted! 22:20:38 executing program 2: getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000040), &(0x7f0000000080)=0xc) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010100)="00000000080000000000f900b00cb2cc029f49d8b90449a7d5d54d49010000a566", 0x21, 0x4e0}, {0x0, 0x0, 0x800}, {&(0x7f0000011600)="ed41000000080000dff4655fe0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}, {0x0}, {0x0}, {0x0}], 0x0, &(0x7f0000012c00)) 22:20:38 executing program 6: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', 0x0, 0x40000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010100)="00000000080000000000f900b00cb2cc029f49d8b90449a7d5d54d49010000a566", 0x21, 0x4e0}, {&(0x7f0000010400)="0200000003000000040000006a000f000300040000000000000000000f00bc0f", 0x20, 0x800}, {&(0x7f0000011600)="ed41000000080000dff4655fe0f4655fe0f4655f0000000000000400", 0x1c, 0x2100}, {0x0}, {0x0}, {0x0}], 0x0, &(0x7f0000012c00)) 22:20:38 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', 0x0, 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef", 0x3a}], 0x0, &(0x7f0000012c00)) 22:20:38 executing program 7: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x2, &(0x7f0000000000)=[{0x7c}, {0x6, 0x0, 0x0, 0x7fffffff}]}) openat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x800, 0x10e) r0 = syz_init_net_socket$802154_raw(0x24, 0x3, 0x0) ioctl$sock_inet_SIOCSIFADDR(r0, 0x8916, &(0x7f0000001180)={'bond0\x00', {0x2, 0x0, @local}}) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f0000000080)) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fork() r1 = dup2(0xffffffffffffffff, 0xffffffffffffffff) bind$bt_l2cap(r1, &(0x7f0000000000)={0x1f, 0x0, @fixed={'\xaa\xaa\xaa\xaa\xaa', 0x10}}, 0xe) 22:20:38 executing program 1: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x2, &(0x7f0000000000)=[{0x7c}, {0x6, 0x0, 0x0, 0x7fffffff}]}) openat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x800, 0x10e) r0 = syz_init_net_socket$802154_raw(0x24, 0x3, 0x0) ioctl$sock_inet_SIOCSIFADDR(r0, 0x8916, &(0x7f0000001180)={'bond0\x00', {0x2, 0x0, @local}}) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f0000000080)) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fork() r1 = dup2(0xffffffffffffffff, 0xffffffffffffffff) bind$bt_l2cap(r1, &(0x7f0000000000)={0x1f, 0x0, @fixed={'\xaa\xaa\xaa\xaa\xaa', 0x10}}, 0xe) 22:20:38 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x0, 0x0, 0x0, &(0x7f0000012c00)) 22:20:38 executing program 3: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x0) r1 = dup2(r0, 0xffffffffffffffff) bind$bt_l2cap(r1, &(0x7f0000000000)={0x1f, 0x0, @fixed={'\xaa\xaa\xaa\xaa\xaa', 0x10}}, 0xe) 22:20:38 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010100)="00000000080000000000f900b00cb2cc029f49d8b90449a7d5d54d49010000a566", 0x21, 0x4e0}, {&(0x7f0000010400)="0200000003000000", 0x8, 0x800}], 0x0, &(0x7f0000012c00)) 22:20:38 executing program 6: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010100)="00000000080000000000f900b00cb2cc029f49d8b90449a7d5d54d49010000a566", 0x21, 0x4e0}, {&(0x7f0000010400)="0200000003000000040000006a000f000300040000000000000000000f00bc0f", 0x20, 0x800}, {&(0x7f0000011600)="ed41000000080000dff4655fe0f4655fe0f4655f0000000000000400", 0x1c, 0x2100}, {0x0}, {0x0}, {0x0}], 0x0, &(0x7f0000012c00)) [ 646.077270] loop2: detected capacity change from 0 to 512 [ 646.092670] EXT4-fs (loop2): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 646.093351] EXT4-fs (loop2): group descriptors corrupted! 22:20:38 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010100)="00000000080000000000f900b00cb2cc029f49d8b90449a7d5d54d49010000a566", 0x21, 0x4e0}, {&(0x7f0000010400)="0200000003000000", 0x8, 0x800}], 0x0, &(0x7f0000012c00)) [ 646.101504] No source specified [ 646.135200] loop6: detected capacity change from 0 to 33 [ 646.150396] EXT4-fs (loop6): bad geometry: block count 128 exceeds size of device (8 blocks) [ 646.157191] loop0: detected capacity change from 0 to 512 [ 646.176733] EXT4-fs (loop0): ext4_check_descriptors: Inode table for group 0 overlaps superblock [ 646.177410] EXT4-fs (loop0): group descriptors corrupted! 22:20:38 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', 0x0, 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef", 0x3a}], 0x0, &(0x7f0000012c00)) 22:20:38 executing program 2: getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000040), &(0x7f0000000080)=0xc) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010100)="00000000080000000000f900b00cb2cc029f49d8b90449a7d5d54d49010000a566", 0x21, 0x4e0}, {&(0x7f0000010400), 0x0, 0x800}, {&(0x7f0000011600)="ed41000000080000dff4655fe0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}, {0x0}, {0x0}, {0x0}], 0x0, &(0x7f0000012c00)) 22:20:38 executing program 3: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x0) r1 = dup2(r0, 0xffffffffffffffff) bind$bt_l2cap(r1, &(0x7f0000000000)={0x1f, 0x0, @fixed={'\xaa\xaa\xaa\xaa\xaa', 0x10}}, 0xe) 22:20:38 executing program 6: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010100)="00000000080000000000f900b00cb2cc029f49d8b90449a7d5d54d49010000a566", 0x21, 0x4e0}, {&(0x7f0000010400)="0200000003000000040000006a000f000300040000000000000000000f00bc0f", 0x20, 0x800}, {&(0x7f0000011600)="ed41000000080000dff4655fe0f4655fe0f4655f0000000000000400", 0x1c, 0x2100}, {0x0}, {0x0}, {0x0}], 0x0, &(0x7f0000012c00)) 22:20:38 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010100)="00000000080000000000f900b00cb2cc029f49d8b90449a7d5d54d49010000a566", 0x21, 0x4e0}, {&(0x7f0000010400)="0200000003000000040000006a000f000300040000000000000000000f00bc0f", 0x20, 0x800}, {&(0x7f0000011600)="ed41000000080000dff4655fe0f4655fe0f4655f000000000000", 0x1a, 0x2100}, {0x0}, {0x0}], 0x0, &(0x7f0000012c00)) 22:20:38 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010100)="00000000080000000000f900b00cb2cc029f49d8b90449a7d5d54d49010000a566", 0x21, 0x4e0}, {&(0x7f0000010400)="0200000003000000", 0x8, 0x800}], 0x0, &(0x7f0000012c00)) [ 646.335930] loop6: detected capacity change from 0 to 33 [ 646.339746] loop0: detected capacity change from 0 to 512 [ 646.350363] EXT4-fs (loop0): ext4_check_descriptors: Inode table for group 0 overlaps superblock [ 646.351189] EXT4-fs (loop0): group descriptors corrupted! [ 646.365325] loop2: detected capacity change from 0 to 512 [ 646.369079] loop4: detected capacity change from 0 to 512 [ 646.374313] EXT4-fs (loop6): bad geometry: block count 128 exceeds size of device (8 blocks) [ 646.389677] EXT4-fs (loop2): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 646.391154] EXT4-fs (loop2): group descriptors corrupted! [ 646.397089] EXT4-fs error (device loop4): __ext4_fill_super:5244: inode #2: comm syz-executor.4: iget: root inode unallocated [ 646.398295] EXT4-fs (loop4): get root inode failed [ 646.398740] EXT4-fs (loop4): mount failed [ 661.890347] loop0: detected capacity change from 0 to 512 22:20:54 executing program 1: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x2, &(0x7f0000000000)=[{0x7c}, {0x6, 0x0, 0x0, 0x7fffffff}]}) openat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x800, 0x10e) r0 = syz_init_net_socket$802154_raw(0x24, 0x3, 0x0) ioctl$sock_inet_SIOCSIFADDR(r0, 0x8916, &(0x7f0000001180)={'bond0\x00', {0x2, 0x0, @local}}) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f0000000080)) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fork() r1 = dup2(0xffffffffffffffff, 0xffffffffffffffff) bind$bt_l2cap(r1, &(0x7f0000000000)={0x1f, 0x0, @fixed={'\xaa\xaa\xaa\xaa\xaa', 0x10}}, 0xe) 22:20:54 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', 0x0, 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef", 0x3a}], 0x0, &(0x7f0000012c00)) 22:20:54 executing program 7: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x2, &(0x7f0000000000)=[{0x7c}, {0x6, 0x0, 0x0, 0x7fffffff}]}) openat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x800, 0x10e) r0 = syz_init_net_socket$802154_raw(0x24, 0x3, 0x0) ioctl$sock_inet_SIOCSIFADDR(r0, 0x8916, &(0x7f0000001180)={'bond0\x00', {0x2, 0x0, @local}}) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f0000000080)) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x0) r2 = dup2(r1, r1) bind$bt_l2cap(r2, &(0x7f0000000000)={0x1f, 0x0, @fixed={'\xaa\xaa\xaa\xaa\xaa', 0x10}}, 0xe) 22:20:54 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010100)="00000000080000000000f900b00cb2cc029f49d8b90449a7d5d54d49010000a566", 0x21, 0x4e0}, {&(0x7f0000010400)="0200000003000000040000006a000f000300040000000000000000000f00bc0f", 0x20, 0x800}, {&(0x7f0000011600)="ed41000000080000dff4655fe0f4655fe0f4655f000000000000", 0x1a, 0x2100}, {0x0}], 0x0, &(0x7f0000012c00)) 22:20:54 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010100)="00000000080000000000f900b00cb2cc029f49d8b90449a7d5d54d49010000a566", 0x21, 0x4e0}, {&(0x7f0000010400)="020000000300000004000000", 0xc, 0x800}], 0x0, &(0x7f0000012c00)) 22:20:54 executing program 3: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x0) dup2(r0, r0) bind$bt_l2cap(0xffffffffffffffff, &(0x7f0000000000)={0x1f, 0x0, @fixed={'\xaa\xaa\xaa\xaa\xaa', 0x10}}, 0xe) 22:20:54 executing program 6: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010100)="00000000080000000000f900b00cb2cc029f49d8b90449a7d5d54d49010000a566", 0x21, 0x4e0}, {&(0x7f0000010400)="0200000003000000040000006a000f000300040000000000000000000f00bc0f", 0x20, 0x800}, {&(0x7f0000011600)="ed41000000080000dff4655fe0f4655fe0f4655f0000000000000400", 0x1c, 0x2100}, {0x0}, {0x0}, {0x0}], 0x0, &(0x7f0000012c00)) 22:20:54 executing program 2: getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000040), &(0x7f0000000080)=0xc) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010100)="00000000080000000000f900b00cb2cc029f49d8b90449a7d5d54d49010000a566", 0x21, 0x4e0}, {&(0x7f0000010400), 0x0, 0x800}, {&(0x7f0000011600)="ed41000000080000dff4655fe0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}, {0x0}, {0x0}, {0x0}], 0x0, &(0x7f0000012c00)) [ 661.903018] loop6: detected capacity change from 0 to 33 [ 661.906781] EXT4-fs (loop6): bad geometry: block count 128 exceeds size of device (8 blocks) [ 661.908375] loop2: detected capacity change from 0 to 512 [ 661.911480] loop4: detected capacity change from 0 to 512 [ 661.914490] EXT4-fs (loop2): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 661.915210] EXT4-fs (loop2): group descriptors corrupted! [ 661.925871] EXT4-fs error (device loop0): __ext4_fill_super:5244: inode #2: comm syz-executor.0: iget: root inode unallocated [ 661.927125] EXT4-fs (loop0): get root inode failed [ 661.927497] EXT4-fs (loop0): mount failed [ 661.951890] EXT4-fs error (device loop4): __ext4_fill_super:5244: inode #2: comm syz-executor.4: iget: root inode unallocated [ 661.967688] EXT4-fs (loop4): get root inode failed [ 661.968437] EXT4-fs (loop4): mount failed 22:20:54 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010100)="00000000080000000000f900b00cb2cc029f49d8b90449a7d5d54d49010000a566", 0x21, 0x4e0}, {&(0x7f0000010400)="0200000003000000", 0x8, 0x800}], 0x0, &(0x7f0000012c00)) 22:20:54 executing program 3: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x0) dup2(r0, r0) bind$bt_l2cap(0xffffffffffffffff, &(0x7f0000000000)={0x1f, 0x0, @fixed={'\xaa\xaa\xaa\xaa\xaa', 0x10}}, 0xe) 22:20:54 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000012c00)) 22:20:54 executing program 6: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x0, 0x0, 0x0, &(0x7f0000012c00)) 22:20:54 executing program 2: getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000040), &(0x7f0000000080)=0xc) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010100)="00000000080000000000f900b00cb2cc029f49d8b90449a7d5d54d49010000a566", 0x21, 0x4e0}, {&(0x7f0000010400), 0x0, 0x800}, {&(0x7f0000011600)="ed41000000080000dff4655fe0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}, {0x0}, {0x0}, {0x0}], 0x0, &(0x7f0000012c00)) [ 662.082566] loop0: detected capacity change from 0 to 512 [ 662.113081] EXT4-fs (loop0): ext4_check_descriptors: Inode table for group 0 overlaps superblock [ 662.113821] EXT4-fs (loop0): group descriptors corrupted! 22:20:54 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010100)="00000000080000000000f900b00cb2cc029f49d8b90449a7d5d54d49010000a566", 0x21, 0x4e0}, {&(0x7f0000010400)="0200000003000000040000006a000f000300040000000000000000000f00bc0f", 0x20, 0x800}, {&(0x7f0000011600)="ed41000000080000dff4655fe0f4655fe0f4655f000000000000", 0x1a, 0x2100}], 0x0, &(0x7f0000012c00)) [ 662.137985] No source specified 22:20:54 executing program 3: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x0) dup2(r0, r0) bind$bt_l2cap(0xffffffffffffffff, &(0x7f0000000000)={0x1f, 0x0, @fixed={'\xaa\xaa\xaa\xaa\xaa', 0x10}}, 0xe) [ 662.165719] No source specified [ 662.167062] loop4: detected capacity change from 0 to 512 [ 662.181818] loop2: detected capacity change from 0 to 512 22:20:54 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010100)="00000000080000000000f900b00cb2cc029f49d8b90449a7d5d54d49010000a566", 0x21, 0x4e0}, {&(0x7f0000010400)="0200000003000000", 0x8, 0x800}], 0x0, &(0x7f0000012c00)) [ 662.193193] EXT4-fs error (device loop4): __ext4_fill_super:5244: inode #2: comm syz-executor.4: iget: root inode unallocated [ 662.194470] EXT4-fs (loop4): get root inode failed [ 662.194896] EXT4-fs (loop4): mount failed [ 662.200741] EXT4-fs (loop2): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 662.202139] EXT4-fs (loop2): group descriptors corrupted! [ 662.286188] loop0: detected capacity change from 0 to 512 [ 662.338901] EXT4-fs (loop0): ext4_check_descriptors: Inode table for group 0 overlaps superblock [ 662.340152] EXT4-fs (loop0): group descriptors corrupted! 22:21:11 executing program 1: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x2, &(0x7f0000000000)=[{0x7c}, {0x6, 0x0, 0x0, 0x7fffffff}]}) openat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x800, 0x10e) r0 = syz_init_net_socket$802154_raw(0x24, 0x3, 0x0) ioctl$sock_inet_SIOCSIFADDR(r0, 0x8916, &(0x7f0000001180)={'bond0\x00', {0x2, 0x0, @local}}) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f0000000080)) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fork() r1 = dup2(0xffffffffffffffff, 0xffffffffffffffff) bind$bt_l2cap(r1, &(0x7f0000000000)={0x1f, 0x0, @fixed={'\xaa\xaa\xaa\xaa\xaa', 0x10}}, 0xe) 22:21:11 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000012c00)) 22:21:11 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010100)="00000000080000000000f900b00cb2cc029f49d8b90449a7d5d54d49010000a566", 0x21, 0x4e0}, {&(0x7f0000010400)="0200000003000000", 0x8, 0x800}], 0x0, &(0x7f0000012c00)) 22:21:11 executing program 7: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x2, &(0x7f0000000000)=[{0x7c}, {0x6, 0x0, 0x0, 0x7fffffff}]}) openat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x800, 0x10e) r0 = syz_init_net_socket$802154_raw(0x24, 0x3, 0x0) ioctl$sock_inet_SIOCSIFADDR(r0, 0x8916, &(0x7f0000001180)={'bond0\x00', {0x2, 0x0, @local}}) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f0000000080)) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x0) r2 = dup2(r1, r1) bind$bt_l2cap(r2, &(0x7f0000000000)={0x1f, 0x0, @fixed={'\xaa\xaa\xaa\xaa\xaa', 0x10}}, 0xe) 22:21:11 executing program 2: getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000040), &(0x7f0000000080)=0xc) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010100)="00000000080000000000f900b00cb2cc029f49d8b90449a7d5d54d49010000a566", 0x21, 0x4e0}, {&(0x7f0000010400)="0200000003000000040000006a000f00", 0x10, 0x800}, {&(0x7f0000011600)="ed41000000080000dff4655fe0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}, {0x0}, {0x0}, {0x0}], 0x0, &(0x7f0000012c00)) 22:21:11 executing program 6: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x0, 0x0, 0x0, &(0x7f0000012c00)) 22:21:11 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010100)="00000000080000000000f900b00cb2cc029f49d8b90449a7d5d54d49010000a566", 0x21, 0x4e0}, {&(0x7f0000010400)="0200000003000000040000006a000f000300040000000000000000000f00bc0f", 0x20, 0x800}], 0x0, &(0x7f0000012c00)) 22:21:11 executing program 3: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x0) r1 = dup2(r0, r0) bind$bt_l2cap(r1, 0x0, 0x0) [ 679.252774] No source specified [ 679.255674] No source specified [ 679.303920] loop4: detected capacity change from 0 to 512 [ 679.309411] loop0: detected capacity change from 0 to 512 [ 679.318012] loop2: detected capacity change from 0 to 512 22:21:11 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000012c00)) [ 679.324227] EXT4-fs (loop0): ext4_check_descriptors: Inode table for group 0 overlaps superblock [ 679.325889] EXT4-fs (loop0): group descriptors corrupted! [ 679.356706] EXT4-fs error (device loop4): __ext4_fill_super:5244: inode #2: comm syz-executor.4: iget: root inode unallocated [ 679.361553] EXT4-fs (loop4): get root inode failed [ 679.362306] EXT4-fs (loop4): mount failed 22:21:11 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010100)="00000000080000000000f900b00cb2cc029f49d8b90449a7d5d54d49010000a566", 0x21, 0x4e0}, {&(0x7f0000010400)="02000000030000000400", 0xa, 0x800}], 0x0, &(0x7f0000012c00)) [ 679.433914] EXT4-fs error (device loop2): ext4_orphan_get:1419: comm syz-executor.2: bad orphan inode 16318464 [ 679.448055] No source specified 22:21:11 executing program 6: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x0, 0x0, 0x0, &(0x7f0000012c00)) [ 679.462605] EXT4-fs (loop2): mounted filesystem without journal. Quota mode: none. [ 679.521490] No source specified [ 679.522971] loop0: detected capacity change from 0 to 512 22:21:11 executing program 3: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x0) r1 = dup2(r0, r0) bind$bt_l2cap(r1, 0x0, 0x0) [ 679.563354] EXT4-fs error (device loop0): __ext4_fill_super:5244: inode #2: comm syz-executor.0: iget: root inode unallocated [ 679.572284] EXT4-fs (loop0): get root inode failed [ 679.573317] EXT4-fs (loop0): mount failed 22:21:11 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, &(0x7f0000000200), 0x0, &(0x7f0000012c00)) [ 679.665258] EXT4-fs (loop2): unmounting filesystem. [ 679.748302] EXT4-fs (loop5): VFS: Can't find ext4 filesystem 22:21:31 executing program 1: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x2, &(0x7f0000000000)=[{0x7c}, {0x6, 0x0, 0x0, 0x7fffffff}]}) openat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x800, 0x10e) r0 = syz_init_net_socket$802154_raw(0x24, 0x3, 0x0) ioctl$sock_inet_SIOCSIFADDR(r0, 0x8916, &(0x7f0000001180)={'bond0\x00', {0x2, 0x0, @local}}) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f0000000080)) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x0) r2 = dup2(r1, r1) bind$bt_l2cap(r2, &(0x7f0000000000)={0x1f, 0x0, @fixed={'\xaa\xaa\xaa\xaa\xaa', 0x10}}, 0xe) 22:21:31 executing program 6: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010100)="00000000080000000000f900b00cb2cc029f49d8b90449a7d5d54d49010000a566", 0x21, 0x4e0}, {&(0x7f0000010400)="0200000003000000040000006a000f000300040000000000000000000f00bc0f", 0x20, 0x800}, {&(0x7f0000011600)="ed41000000080000dff4655fe0f4655fe0f4655f0000000000000400", 0x1c, 0x2100}, {0x0}, {0x0}], 0x0, &(0x7f0000012c00)) 22:21:31 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010100)="00000000080000000000f900b00cb2cc029f49d8b90449a7d5d54d49010000a566", 0x21, 0x4e0}, {&(0x7f0000010400)="0200000003000000", 0x8, 0x800}], 0x0, &(0x7f0000012c00)) 22:21:31 executing program 7: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x2, &(0x7f0000000000)=[{0x7c}, {0x6, 0x0, 0x0, 0x7fffffff}]}) openat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x800, 0x10e) r0 = syz_init_net_socket$802154_raw(0x24, 0x3, 0x0) ioctl$sock_inet_SIOCSIFADDR(r0, 0x8916, &(0x7f0000001180)={'bond0\x00', {0x2, 0x0, @local}}) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f0000000080)) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x0) r2 = dup2(r1, r1) bind$bt_l2cap(r2, &(0x7f0000000000)={0x1f, 0x0, @fixed={'\xaa\xaa\xaa\xaa\xaa', 0x10}}, 0xe) 22:21:31 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010100)="00000000080000000000f900b00cb2cc029f49d8b90449a7d5d54d49010000a566", 0x21, 0x4e0}], 0x0, &(0x7f0000012c00)) 22:21:31 executing program 2: getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000040), &(0x7f0000000080)=0xc) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010100)="00000000080000000000f900b00cb2cc029f49d8b90449a7d5d54d49010000a566", 0x21, 0x4e0}, {&(0x7f0000010400)="0200000003000000040000006a000f00", 0x10, 0x800}, {&(0x7f0000011600)="ed41000000080000dff4655fe0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}, {0x0}, {0x0}, {0x0}], 0x0, &(0x7f0000012c00)) 22:21:31 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, &(0x7f0000000200), 0x0, 0x0) 22:21:31 executing program 3: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x0) r1 = dup2(r0, r0) bind$bt_l2cap(r1, 0x0, 0x0) [ 699.689366] loop4: detected capacity change from 0 to 512 [ 699.692308] loop0: detected capacity change from 0 to 512 [ 699.695405] loop6: detected capacity change from 0 to 512 [ 699.699986] loop2: detected capacity change from 0 to 512 [ 699.704687] EXT4-fs (loop4): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 699.705577] EXT4-fs (loop4): group descriptors corrupted! [ 699.708004] EXT4-fs (loop0): ext4_check_descriptors: Inode table for group 0 overlaps superblock [ 699.708933] EXT4-fs (loop0): group descriptors corrupted! [ 699.717064] EXT4-fs (loop6): corrupt root inode, run e2fsck [ 699.718256] EXT4-fs (loop6): mount failed [ 699.741612] EXT4-fs error (device loop2): ext4_orphan_get:1419: comm syz-executor.2: bad orphan inode 16318464 [ 699.743612] EXT4-fs (loop2): mounted filesystem without journal. Quota mode: none. 22:21:32 executing program 3: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x0) r1 = dup2(r0, r0) bind$bt_l2cap(r1, &(0x7f0000000000)={0x1f, 0x0, @fixed}, 0xe) 22:21:32 executing program 2: getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000040), &(0x7f0000000080)=0xc) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010100)="00000000080000000000f900b00cb2cc029f49d8b90449a7d5d54d49010000a566", 0x21, 0x4e0}, {&(0x7f0000010400)="0200000003000000040000006a000f00", 0x10, 0x800}, {&(0x7f0000011600)="ed41000000080000dff4655fe0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}, {0x0}, {0x0}, {0x0}], 0x0, &(0x7f0000012c00)) [ 699.807511] EXT4-fs (loop2): unmounting filesystem. 22:21:32 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, &(0x7f0000000200), 0x0, 0x0) 22:21:32 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010100)="00000000080000000000f900b00cb2cc029f49d8b90449a7d5d54d49010000a566", 0x21, 0x4e0}, {&(0x7f0000010400)="0200000003000000", 0x8, 0x800}], 0x0, &(0x7f0000012c00)) 22:21:32 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010100)="00000000080000000000f900b00cb2cc029f49d8b90449a7d5d54d49010000a566", 0x21, 0x4e0}], 0x0, &(0x7f0000012c00)) 22:21:32 executing program 6: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010100)="00000000080000000000f900b00cb2cc029f49d8b90449a7d5d54d49010000a566", 0x21, 0x4e0}, {&(0x7f0000010400)="0200000003000000040000006a000f000300040000000000000000000f00bc0f", 0x20, 0x800}, {&(0x7f0000011600)="ed41000000080000dff4655fe0f4655fe0f4655f0000000000000400", 0x1c, 0x2100}, {0x0}, {0x0}], 0x0, &(0x7f0000012c00)) 22:21:32 executing program 3: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x0) r1 = dup2(r0, r0) bind$bt_l2cap(r1, &(0x7f0000000000)={0x1f, 0x0, @fixed}, 0xe) [ 699.936242] loop2: detected capacity change from 0 to 512 [ 699.961764] loop4: detected capacity change from 0 to 512 [ 699.965591] loop0: detected capacity change from 0 to 512 [ 699.975057] EXT4-fs (loop4): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 699.975987] EXT4-fs (loop4): group descriptors corrupted! [ 699.978151] loop6: detected capacity change from 0 to 512 [ 699.981039] EXT4-fs (loop0): ext4_check_descriptors: Inode table for group 0 overlaps superblock [ 699.981956] EXT4-fs (loop0): group descriptors corrupted! [ 700.020352] EXT4-fs (loop6): corrupt root inode, run e2fsck [ 700.021022] EXT4-fs (loop6): mount failed [ 700.024184] EXT4-fs error (device loop2): ext4_orphan_get:1419: comm syz-executor.2: bad orphan inode 16318464 [ 700.058473] EXT4-fs (loop2): mounted filesystem without journal. Quota mode: none. 22:21:32 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010100)="00000000080000000000f900b00cb2cc029f49d8b90449a7d5d54d49010000a566", 0x21, 0x4e0}, {&(0x7f0000010400)="0200000003000000", 0x8, 0x800}], 0x0, &(0x7f0000012c00)) [ 700.215119] EXT4-fs (loop2): unmounting filesystem. [ 700.247414] loop0: detected capacity change from 0 to 512 [ 700.255109] EXT4-fs (loop0): ext4_check_descriptors: Inode table for group 0 overlaps superblock [ 700.256134] EXT4-fs (loop0): group descriptors corrupted! 22:21:47 executing program 2: getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000040), &(0x7f0000000080)=0xc) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010100)="00000000080000000000f900b00cb2cc029f49d8b90449a7d5d54d49010000a566", 0x21, 0x4e0}, {&(0x7f0000010400)="0200000003000000040000006a000f000300040000000000", 0x18, 0x800}, {&(0x7f0000011600)="ed41000000080000dff4655fe0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}, {0x0}, {0x0}, {0x0}], 0x0, &(0x7f0000012c00)) 22:21:47 executing program 6: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010100)="00000000080000000000f900b00cb2cc029f49d8b90449a7d5d54d49010000a566", 0x21, 0x4e0}, {&(0x7f0000010400)="0200000003000000040000006a000f000300040000000000000000000f00bc0f", 0x20, 0x800}, {&(0x7f0000011600)="ed41000000080000dff4655fe0f4655fe0f4655f0000000000000400", 0x1c, 0x2100}, {0x0}], 0x0, &(0x7f0000012c00)) [ 714.977441] loop1: detected capacity change from 0 to 512 22:21:47 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010100)="00000000080000000000f900b00cb2cc029f49d8b90449a7d5d54d49010000a566", 0x21, 0x4e0}], 0x0, &(0x7f0000012c00)) 22:21:47 executing program 3: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x0) r1 = dup2(r0, r0) bind$bt_l2cap(r1, &(0x7f0000000000)={0x1f, 0x0, @fixed}, 0xe) 22:21:47 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, &(0x7f0000000200), 0x0, 0x0) 22:21:47 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010100)="00000000080000000000f900b00cb2cc029f49d8b90449a7d5d54d49010000a566", 0x21, 0x4e0}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}], 0x0, &(0x7f0000012c00)) 22:21:47 executing program 1: getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000040), &(0x7f0000000080)=0xc) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010100)="00000000080000000000f900b00cb2cc029f49d8b90449a7d5d54d49010000a566", 0x21, 0x4e0}, {&(0x7f0000010400)="0200000003000000040000006a000f00", 0x10, 0x800}, {&(0x7f0000011600)="ed41000000080000dff4655fe0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}, {0x0}, {0x0}, {0x0}], 0x0, &(0x7f0000012c00)) 22:21:47 executing program 7: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x2, &(0x7f0000000000)=[{0x7c}, {0x6, 0x0, 0x0, 0x7fffffff}]}) openat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x800, 0x10e) r0 = syz_init_net_socket$802154_raw(0x24, 0x3, 0x0) ioctl$sock_inet_SIOCSIFADDR(r0, 0x8916, &(0x7f0000001180)={'bond0\x00', {0x2, 0x0, @local}}) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f0000000080)) fork() r1 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x0) r2 = dup2(r1, r1) bind$bt_l2cap(r2, &(0x7f0000000000)={0x1f, 0x0, @fixed={'\xaa\xaa\xaa\xaa\xaa', 0x10}}, 0xe) [ 714.980823] loop2: detected capacity change from 0 to 512 [ 715.000800] loop4: detected capacity change from 0 to 512 [ 715.001829] EXT4-fs error (device loop1): ext4_orphan_get:1419: comm syz-executor.1: bad orphan inode 16318464 [ 715.002988] EXT4-fs (loop1): mounted filesystem without journal. Quota mode: none. [ 715.007811] EXT4-fs error (device loop2): ext4_orphan_get:1419: comm syz-executor.2: bad orphan inode 16318464 [ 715.008935] EXT4-fs (loop2): mounted filesystem without journal. Quota mode: none. [ 715.020113] loop6: detected capacity change from 0 to 512 [ 715.021139] loop0: detected capacity change from 0 to 512 [ 715.022975] EXT4-fs (loop4): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 715.024416] EXT4-fs (loop4): group descriptors corrupted! [ 715.048297] EXT4-fs (loop6): corrupt root inode, run e2fsck [ 715.048799] EXT4-fs (loop6): mount failed [ 715.049289] EXT4-fs error (device loop0): __ext4_fill_super:5244: inode #2: comm syz-executor.0: iget: root inode unallocated [ 715.054301] EXT4-fs (loop0): get root inode failed [ 715.054724] EXT4-fs (loop0): mount failed [ 715.084943] EXT4-fs (loop2): unmounting filesystem. 22:21:47 executing program 2: getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000040), &(0x7f0000000080)=0xc) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010100)="00000000080000000000f900b00cb2cc029f49d8b90449a7d5d54d49010000a566", 0x21, 0x4e0}, {&(0x7f0000010400)="0200000003000000040000006a000f000300040000000000", 0x18, 0x800}, {&(0x7f0000011600)="ed41000000080000dff4655fe0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}, {0x0}, {0x0}, {0x0}], 0x0, &(0x7f0000012c00)) [ 715.101202] EXT4-fs (loop1): unmounting filesystem. 22:21:47 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010100)="00000000080000000000f900b00cb2cc029f49d8b90449a7d5d54d49010000a566", 0x21, 0x4e0}, {&(0x7f0000010400)="0200000003000000040000006a000f000300040000000000000000000f00bc0f", 0x20, 0x800}, {&(0x7f0000011600)="ed41000000080000dff4655fe0f4655fe0f4655f0000000000000400", 0x1c, 0x2100}, {0x0}, {0x0}], 0x0, &(0x7f0000012c00)) 22:21:47 executing program 6: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010100)="00000000080000000000f900b00cb2cc029f49d8b90449a7d5d54d49010000a566", 0x21, 0x4e0}, {&(0x7f0000010400)="0200000003000000040000006a000f000300040000000000000000000f00bc0f", 0x20, 0x800}, {&(0x7f0000011600)="ed41000000080000dff4655fe0f4655fe0f4655f0000000000000400", 0x1c, 0x2100}], 0x0, &(0x7f0000012c00)) [ 715.172788] loop2: detected capacity change from 0 to 512 [ 715.176293] loop1: detected capacity change from 0 to 512 [ 715.183964] EXT4-fs (loop1): corrupt root inode, run e2fsck [ 715.184653] EXT4-fs (loop1): mount failed [ 715.190927] EXT4-fs error (device loop2): ext4_orphan_get:1419: comm syz-executor.2: bad orphan inode 16318464 [ 715.192517] EXT4-fs (loop2): mounted filesystem without journal. Quota mode: none. 22:21:47 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010100)="00000000080000000000f900b00cb2cc029f49d8b90449a7d5d54d49010000a566", 0x21, 0x4e0}, {&(0x7f0000010400)="0200000003000000", 0x8, 0x800}], 0x0, &(0x7f0000012c00)) [ 715.208485] loop6: detected capacity change from 0 to 512 22:21:47 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010100)="00000000080000000000f900b00cb2cc029f49d8b90449a7d5d54d49010000a566", 0x21, 0x4e0}, {0x0, 0x0, 0x800}], 0x0, &(0x7f0000012c00)) [ 715.218638] loop0: detected capacity change from 0 to 512 [ 715.226871] loop4: detected capacity change from 0 to 512 [ 715.229376] EXT4-fs (loop4): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 715.230308] EXT4-fs (loop4): group descriptors corrupted! [ 715.239529] EXT4-fs (loop0): ext4_check_descriptors: Inode table for group 0 overlaps superblock [ 715.240460] EXT4-fs (loop0): group descriptors corrupted! [ 715.252147] EXT4-fs (loop6): corrupt root inode, run e2fsck [ 715.253111] EXT4-fs (loop6): mount failed [ 715.287827] EXT4-fs (loop2): unmounting filesystem. 22:21:47 executing program 2: getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000040), &(0x7f0000000080)=0xc) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010100)="00000000080000000000f900b00cb2cc029f49d8b90449a7d5d54d49010000a566", 0x21, 0x4e0}, {&(0x7f0000010400)="0200000003000000040000006a000f000300040000000000", 0x18, 0x800}, {&(0x7f0000011600)="ed41000000080000dff4655fe0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}, {0x0}, {0x0}, {0x0}], 0x0, &(0x7f0000012c00)) 22:21:47 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010100)="00000000080000000000f900b00cb2cc029f49d8b90449a7d5d54d49010000a566", 0x21, 0x4e0}, {&(0x7f0000010400)="0200000003000000040000006a000f000300040000000000000000000f00bc0f", 0x20, 0x800}, {&(0x7f0000011600)="ed41000000080000dff4655fe0f4655fe0f4655f0000000000000400", 0x1c, 0x2100}, {0x0}, {0x0}], 0x0, &(0x7f0000012c00)) 22:21:47 executing program 6: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010100)="00000000080000000000f900b00cb2cc029f49d8b90449a7d5d54d49010000a566", 0x21, 0x4e0}, {&(0x7f0000010400)="0200000003000000040000006a000f000300040000000000000000000f00bc0f", 0x20, 0x800}], 0x0, &(0x7f0000012c00)) 22:21:47 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010100)="00000000080000000000f900b00cb2cc029f49d8b90449a7d5d54d49010000a566", 0x21, 0x4e0}, {0x0, 0x0, 0x800}], 0x0, &(0x7f0000012c00)) [ 715.372502] loop6: detected capacity change from 0 to 512 22:21:47 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010100)="00000000080000000000f900b00cb2cc029f49d8b90449a7d5d54d49010000a566", 0x21, 0x4e0}, {&(0x7f0000010400)="0200000003000000", 0x8, 0x800}], 0x0, &(0x7f0000012c00)) [ 715.393311] loop1: detected capacity change from 0 to 512 [ 715.406146] EXT4-fs error (device loop6): __ext4_fill_super:5244: inode #2: comm syz-executor.6: iget: root inode unallocated [ 715.408411] EXT4-fs (loop6): get root inode failed [ 715.409228] EXT4-fs (loop6): mount failed [ 715.410166] EXT4-fs (loop1): corrupt root inode, run e2fsck [ 715.410888] EXT4-fs (loop1): mount failed [ 715.411532] loop2: detected capacity change from 0 to 512 [ 715.433755] loop4: detected capacity change from 0 to 512 22:21:47 executing program 7: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x2, &(0x7f0000000000)=[{0x7c}, {0x6, 0x0, 0x0, 0x7fffffff}]}) openat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x800, 0x10e) r0 = syz_init_net_socket$802154_raw(0x24, 0x3, 0x0) ioctl$sock_inet_SIOCSIFADDR(r0, 0x8916, &(0x7f0000001180)={'bond0\x00', {0x2, 0x0, @local}}) fork() r1 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x0) r2 = dup2(r1, r1) bind$bt_l2cap(r2, &(0x7f0000000000)={0x1f, 0x0, @fixed={'\xaa\xaa\xaa\xaa\xaa', 0x10}}, 0xe) [ 715.451872] EXT4-fs error (device loop2): ext4_orphan_get:1419: comm syz-executor.2: bad orphan inode 16318464 [ 715.454053] EXT4-fs (loop4): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 715.454963] EXT4-fs (loop4): group descriptors corrupted! 22:21:47 executing program 6: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010100)="00000000080000000000f900b00cb2cc029f49d8b90449a7d5d54d49010000a566", 0x21, 0x4e0}, {&(0x7f0000010400)="0200000003000000040000006a000f000300040000000000000000000f00bc0f", 0x20, 0x800}], 0x0, &(0x7f0000012c00)) [ 715.471812] EXT4-fs (loop2): mounted filesystem without journal. Quota mode: none. [ 715.473030] loop0: detected capacity change from 0 to 512 [ 715.489156] EXT4-fs (loop0): ext4_check_descriptors: Inode table for group 0 overlaps superblock [ 715.489967] EXT4-fs (loop0): group descriptors corrupted! 22:21:47 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010100)="00000000080000000000f900b00cb2cc029f49d8b90449a7d5d54d49010000a566", 0x21, 0x4e0}, {&(0x7f0000010400)="02000000030000000400", 0xa, 0x800}], 0x0, &(0x7f0000012c00)) [ 715.507382] loop6: detected capacity change from 0 to 512 [ 715.517505] loop5: detected capacity change from 0 to 512 22:21:47 executing program 3: getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000040), &(0x7f0000000080)=0xc) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010100)="00000000080000000000f900b00cb2cc029f49d8b90449a7d5d54d49010000a566", 0x21, 0x4e0}, {&(0x7f0000010400)="0200000003000000040000006a000f00", 0x10, 0x800}, {&(0x7f0000011600)="ed41000000080000dff4655fe0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}, {0x0}, {0x0}, {0x0}], 0x0, &(0x7f0000012c00)) 22:21:47 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010100)="00000000080000000000f900b00cb2cc029f49d8b90449a7d5d54d49010000a566", 0x21, 0x4e0}, {0x0, 0x0, 0x800}], 0x0, &(0x7f0000012c00)) [ 715.554072] EXT4-fs error (device loop6): __ext4_fill_super:5244: inode #2: comm syz-executor.6: iget: root inode unallocated 22:21:47 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010100)="00000000080000000000f900b00cb2cc029f49d8b90449a7d5d54d49010000a566", 0x21, 0x4e0}, {&(0x7f0000010400)="0200000003000000040000006a000f000300040000000000000000000f00bc0f", 0x20, 0x800}, {&(0x7f0000011600)="ed41000000080000dff4655fe0f4655fe0f4655f0000000000000400", 0x1c, 0x2100}, {0x0}, {0x0}], 0x0, &(0x7f0000012c00)) [ 715.556184] EXT4-fs (loop6): get root inode failed [ 715.556578] EXT4-fs (loop6): mount failed [ 715.567779] loop3: detected capacity change from 0 to 512 [ 715.569504] EXT4-fs error (device loop5): __ext4_fill_super:5244: inode #2: comm syz-executor.5: iget: root inode unallocated [ 715.571962] EXT4-fs (loop5): get root inode failed [ 715.572344] EXT4-fs (loop5): mount failed [ 715.583006] EXT4-fs (loop2): unmounting filesystem. [ 715.601915] loop1: detected capacity change from 0 to 512 [ 715.616280] EXT4-fs error (device loop3): ext4_orphan_get:1419: comm syz-executor.3: bad orphan inode 16318464 [ 715.620370] EXT4-fs (loop3): mounted filesystem without journal. Quota mode: none. [ 715.626217] loop4: detected capacity change from 0 to 512 [ 715.639642] EXT4-fs (loop1): corrupt root inode, run e2fsck [ 715.640155] EXT4-fs (loop1): mount failed [ 715.652453] EXT4-fs (loop4): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 715.654208] EXT4-fs (loop4): group descriptors corrupted! [ 715.792590] EXT4-fs (loop3): unmounting filesystem. 22:22:01 executing program 6: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010100)="00000000080000000000f900b00cb2cc029f49d8b90449a7d5d54d49010000a566", 0x21, 0x4e0}, {&(0x7f0000010400)="0200000003000000040000006a000f000300040000000000000000000f00bc0f", 0x20, 0x800}], 0x0, &(0x7f0000012c00)) 22:22:01 executing program 2: getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000040), &(0x7f0000000080)=0xc) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010100)="00000000080000000000f900b00cb2cc029f49d8b90449a7d5d54d49010000a566", 0x21, 0x4e0}, {&(0x7f0000010400)="0200000003000000040000006a000f00030004000000000000000000", 0x1c, 0x800}, {&(0x7f0000011600)="ed41000000080000dff4655fe0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}, {0x0}, {0x0}, {0x0}], 0x0, &(0x7f0000012c00)) 22:22:01 executing program 7: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x2, &(0x7f0000000000)=[{0x7c}, {0x6, 0x0, 0x0, 0x7fffffff}]}) openat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x800, 0x10e) syz_init_net_socket$802154_raw(0x24, 0x3, 0x0) fork() r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x0) r1 = dup2(r0, r0) bind$bt_l2cap(r1, &(0x7f0000000000)={0x1f, 0x0, @fixed={'\xaa\xaa\xaa\xaa\xaa', 0x10}}, 0xe) [ 729.208238] loop5: detected capacity change from 0 to 512 [ 729.210829] loop6: detected capacity change from 0 to 512 [ 729.218927] loop2: detected capacity change from 0 to 512 22:22:01 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010100)="00000000080000000000f900b00cb2cc029f49d8b90449a7d5d54d49010000a566", 0x21, 0x4e0}, {&(0x7f0000010400), 0x0, 0x800}], 0x0, &(0x7f0000012c00)) 22:22:01 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010100)="00000000080000000000f900b00cb2cc029f49d8b90449a7d5d54d49010000a566", 0x21, 0x4e0}, {&(0x7f0000010400)="02000000030000000400", 0xa, 0x800}], 0x0, &(0x7f0000012c00)) 22:22:01 executing program 3: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x2, &(0x7f0000000000)=[{0x7c}, {0x6, 0x0, 0x0, 0x7fffffff}]}) openat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x800, 0x10e) r0 = syz_init_net_socket$802154_raw(0x24, 0x3, 0x0) ioctl$sock_inet_SIOCSIFADDR(r0, 0x8916, &(0x7f0000001180)={'bond0\x00', {0x2, 0x0, @local}}) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f0000000080)) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x0) r2 = dup2(r1, r1) bind$bt_l2cap(r2, &(0x7f0000000000)={0x1f, 0x0, @fixed={'\xaa\xaa\xaa\xaa\xaa', 0x10}}, 0xe) 22:22:01 executing program 1: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x40000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010100)="00000000080000000000f900b00cb2cc029f49d8b90449a7d5d54d49010000a566", 0x21, 0x4e0}, {&(0x7f0000010400)="0200000003000000040000006a000f000300040000000000000000000f00bc0f", 0x20, 0x800}, {&(0x7f0000011600)="ed41000000080000dff4655fe0f4655fe0f4655f0000000000000400", 0x1c, 0x2100}, {0x0}, {0x0}], 0x0, &(0x7f0000012c00)) 22:22:01 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010100)="00000000080000000000f900b00cb2cc029f49d8b90449a7d5d54d49010000a566", 0x21, 0x4e0}, {&(0x7f0000010400)="0200000003000000", 0x8, 0x800}], 0x0, &(0x7f0000012c00)) [ 729.229111] EXT4-fs error (device loop5): __ext4_fill_super:5244: inode #2: comm syz-executor.5: iget: root inode unallocated [ 729.231057] EXT4-fs (loop5): get root inode failed [ 729.231431] EXT4-fs (loop5): mount failed [ 729.238520] EXT4-fs error (device loop6): __ext4_fill_super:5244: inode #2: comm syz-executor.6: iget: root inode unallocated [ 729.240530] EXT4-fs (loop6): get root inode failed [ 729.241030] EXT4-fs (loop6): mount failed [ 729.247251] EXT4-fs error (device loop2): ext4_orphan_get:1419: comm syz-executor.2: bad orphan inode 16318464 [ 729.253673] EXT4-fs (loop2): mounted filesystem without journal. Quota mode: none. [ 729.287314] loop4: detected capacity change from 0 to 512 [ 729.292833] loop0: detected capacity change from 0 to 512 22:22:01 executing program 6: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010100)="00000000080000000000f900b00cb2cc029f49d8b90449a7d5d54d49010000a566", 0x21, 0x4e0}, {&(0x7f0000010400)="0200000003000000040000006a000f000300040000000000000000000f00bc0f", 0x20, 0x800}, {0x0, 0x0, 0x2100}], 0x0, &(0x7f0000012c00)) [ 729.301445] loop1: detected capacity change from 0 to 512 [ 729.305640] EXT4-fs (loop4): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 729.306296] EXT4-fs (loop4): group descriptors corrupted! [ 729.307576] EXT4-fs (loop2): unmounting filesystem. 22:22:01 executing program 2: getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000040), &(0x7f0000000080)=0xc) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010100)="00000000080000000000f900b00cb2cc029f49d8b90449a7d5d54d49010000a566", 0x21, 0x4e0}, {&(0x7f0000010400)="0200000003000000040000006a000f00030004000000000000000000", 0x1c, 0x800}, {&(0x7f0000011600)="ed41000000080000dff4655fe0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}, {0x0}, {0x0}, {0x0}], 0x0, &(0x7f0000012c00)) [ 729.320744] EXT4-fs (loop0): ext4_check_descriptors: Inode table for group 0 overlaps superblock [ 729.321368] EXT4-fs (loop0): group descriptors corrupted! 22:22:01 executing program 1: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x40000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010100)="00000000080000000000f900b00cb2cc029f49d8b90449a7d5d54d49010000a566", 0x21, 0x4e0}, {&(0x7f0000010400)="0200000003000000040000006a000f000300040000000000000000000f00bc0f", 0x20, 0x800}, {&(0x7f0000011600)="ed41000000080000dff4655fe0f4655fe0f4655f0000000000000400", 0x1c, 0x2100}, {0x0}, {0x0}], 0x0, &(0x7f0000012c00)) 22:22:01 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010100)="00000000080000000000f900b00cb2cc029f49d8b90449a7d5d54d49010000a566", 0x21, 0x4e0}, {&(0x7f0000010400)="02000000030000000400", 0xa, 0x800}], 0x0, &(0x7f0000012c00)) [ 729.380725] loop6: detected capacity change from 0 to 512 22:22:01 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010100)="00000000080000000000f900b00cb2cc029f49d8b90449a7d5d54d49010000a566", 0x21, 0x4e0}, {&(0x7f0000010400), 0x0, 0x800}], 0x0, &(0x7f0000012c00)) 22:22:01 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010100)="00000000080000000000f900b00cb2cc029f49d8b90449a7d5d54d49010000a566", 0x21, 0x4e0}, {&(0x7f0000010400)="020000000300000004", 0x9}], 0x0, &(0x7f0000012c00)) [ 729.409423] EXT4-fs error (device loop6): __ext4_fill_super:5244: inode #2: comm syz-executor.6: iget: root inode unallocated [ 729.410708] EXT4-fs (loop6): get root inode failed [ 729.411074] EXT4-fs (loop6): mount failed [ 729.426570] loop2: detected capacity change from 0 to 512 [ 729.427596] loop5: detected capacity change from 0 to 512 [ 729.434342] loop1: detected capacity change from 0 to 512 [ 729.457800] EXT4-fs error (device loop5): __ext4_fill_super:5244: inode #2: comm syz-executor.5: iget: root inode unallocated [ 729.460471] EXT4-fs (loop5): get root inode failed [ 729.461304] EXT4-fs (loop5): mount failed [ 729.480432] EXT4-fs error (device loop2): ext4_orphan_get:1419: comm syz-executor.2: bad orphan inode 16318464 22:22:01 executing program 7: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x2, &(0x7f0000000000)=[{0x7c}, {0x6, 0x0, 0x0, 0x7fffffff}]}) openat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x800, 0x10e) fork() r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x0) r1 = dup2(r0, r0) bind$bt_l2cap(r1, &(0x7f0000000000)={0x1f, 0x0, @fixed={'\xaa\xaa\xaa\xaa\xaa', 0x10}}, 0xe) [ 729.502744] EXT4-fs (loop2): mounted filesystem without journal. Quota mode: none. [ 729.545484] loop0: detected capacity change from 0 to 512 22:22:01 executing program 6: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010100)="00000000080000000000f900b00cb2cc029f49d8b90449a7d5d54d49010000a566", 0x21, 0x4e0}, {&(0x7f0000010400)="0200000003000000040000006a000f000300040000000000000000000f00bc0f", 0x20, 0x800}, {0x0, 0x0, 0x2100}], 0x0, &(0x7f0000012c00)) [ 729.573503] loop4: detected capacity change from 0 to 512 22:22:01 executing program 1: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x40000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010100)="00000000080000000000f900b00cb2cc029f49d8b90449a7d5d54d49010000a566", 0x21, 0x4e0}, {&(0x7f0000010400)="0200000003000000040000006a000f000300040000000000000000000f00bc0f", 0x20, 0x800}, {&(0x7f0000011600)="ed41000000080000dff4655fe0f4655fe0f4655f0000000000000400", 0x1c, 0x2100}, {0x0}, {0x0}], 0x0, &(0x7f0000012c00)) [ 729.611906] EXT4-fs (loop0): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 729.613264] EXT4-fs (loop0): group descriptors corrupted! [ 729.631787] EXT4-fs (loop4): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 729.633212] EXT4-fs (loop4): group descriptors corrupted! [ 729.708503] EXT4-fs (loop2): unmounting filesystem. [ 729.717994] loop6: detected capacity change from 0 to 512 22:22:02 executing program 5: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010100)="00000000080000000000f900b00cb2cc029f49d8b90449a7d5d54d49010000a566", 0x21, 0x4e0}, {&(0x7f0000010400)="02000000030000000400", 0xa, 0x800}], 0x0, &(0x7f0000012c00)) 22:22:02 executing program 2: getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000040), &(0x7f0000000080)=0xc) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010100)="00000000080000000000f900b00cb2cc029f49d8b90449a7d5d54d49010000a566", 0x21, 0x4e0}, {&(0x7f0000010400)="0200000003000000040000006a000f00030004000000000000000000", 0x1c, 0x800}, {&(0x7f0000011600)="ed41000000080000dff4655fe0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}, {0x0}, {0x0}, {0x0}], 0x0, &(0x7f0000012c00)) [ 729.747612] EXT4-fs error (device loop6): __ext4_fill_super:5244: inode #2: comm syz-executor.6: iget: root inode unallocated [ 729.761537] EXT4-fs (loop6): get root inode failed [ 729.762358] EXT4-fs (loop6): mount failed 22:22:02 executing program 7: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x2, &(0x7f0000000000)=[{0x7c}, {0x6, 0x0, 0x0, 0x7fffffff}]}) fork() r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x0) r1 = dup2(r0, r0) bind$bt_l2cap(r1, &(0x7f0000000000)={0x1f, 0x0, @fixed={'\xaa\xaa\xaa\xaa\xaa', 0x10}}, 0xe) 22:22:02 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010100)="00000000080000000000f900b00cb2cc029f49d8b90449a7d5d54d49010000a566", 0x21, 0x4e0}, {&(0x7f0000010400), 0x0, 0x800}], 0x0, &(0x7f0000012c00)) [ 729.793357] loop1: detected capacity change from 0 to 512 [ 729.840546] loop5: detected capacity change from 0 to 512 [ 729.860189] loop2: detected capacity change from 0 to 512 [ 729.880997] loop4: detected capacity change from 0 to 512 [ 729.891894] EXT4-fs error (device loop2): ext4_orphan_get:1419: comm syz-executor.2: bad orphan inode 16318464 [ 729.900252] EXT4-fs (loop2): mounted filesystem without journal. Quota mode: none. [ 729.902343] EXT4-fs (loop4): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 729.903691] EXT4-fs (loop4): group descriptors corrupted! [ 730.019585] EXT4-fs (loop2): unmounting filesystem. 22:22:16 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010100)="00000000080000000000f900b00cb2cc029f49d8b90449a7d5d54d49010000a566", 0x21, 0x4e0}, {&(0x7f0000010400)="020000000300000004", 0x9}], 0x0, &(0x7f0000012c00)) 22:22:16 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', 0x0, 0x40000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010100)="00000000080000000000f900b00cb2cc029f49d8b90449a7d5d54d49010000a566", 0x21, 0x4e0}, {&(0x7f0000010400)="0200000003000000040000006a000f000300040000000000000000000f00bc0f", 0x20, 0x800}, {&(0x7f0000011600)="ed41000000080000dff4655fe0f4655fe0f4655f0000000000000400", 0x1c, 0x2100}, {0x0}, {0x0}], 0x0, &(0x7f0000012c00)) 22:22:16 executing program 6: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010100)="00000000080000000000f900b00cb2cc029f49d8b90449a7d5d54d49010000a566", 0x21, 0x4e0}, {&(0x7f0000010400)="0200000003000000040000006a000f000300040000000000000000000f00bc0f", 0x20, 0x800}, {0x0, 0x0, 0x2100}], 0x0, &(0x7f0000012c00)) 22:22:16 executing program 5: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010100)="00000000080000000000f900b00cb2cc029f49d8b90449a7d5d54d49010000a566", 0x21, 0x4e0}, {&(0x7f0000010400)="02000000030000000400", 0xa, 0x800}], 0x0, &(0x7f0000012c00)) 22:22:16 executing program 3: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x2, &(0x7f0000000000)=[{0x7c}, {0x6, 0x0, 0x0, 0x7fffffff}]}) openat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x800, 0x10e) r0 = syz_init_net_socket$802154_raw(0x24, 0x3, 0x0) ioctl$sock_inet_SIOCSIFADDR(r0, 0x8916, &(0x7f0000001180)={'bond0\x00', {0x2, 0x0, @local}}) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f0000000080)) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x0) r2 = dup2(r1, r1) bind$bt_l2cap(r2, &(0x7f0000000000)={0x1f, 0x0, @fixed={'\xaa\xaa\xaa\xaa\xaa', 0x10}}, 0xe) [ 743.723700] loop0: detected capacity change from 0 to 512 22:22:16 executing program 7: fork() r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x0) r1 = dup2(r0, r0) bind$bt_l2cap(r1, &(0x7f0000000000)={0x1f, 0x0, @fixed={'\xaa\xaa\xaa\xaa\xaa', 0x10}}, 0xe) 22:22:16 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010100)="00000000080000000000f900b00cb2cc029f49d8b90449a7d5d54d49010000a566", 0x21, 0x4e0}, {&(0x7f0000010400)="0200000003000000040000006a000f00", 0x10, 0x800}], 0x0, &(0x7f0000012c00)) 22:22:16 executing program 2: getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000040), &(0x7f0000000080)=0xc) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010100)="00000000080000000000f900b00cb2cc029f49d8b90449a7d5d54d49010000a566", 0x21, 0x4e0}, {&(0x7f0000010400)="0200000003000000040000006a000f000300040000000000000000000f00", 0x1e, 0x800}, {&(0x7f0000011600)="ed41000000080000dff4655fe0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}, {0x0}, {0x0}, {0x0}], 0x0, &(0x7f0000012c00)) [ 743.747538] loop4: detected capacity change from 0 to 512 [ 743.753088] loop5: detected capacity change from 0 to 512 [ 743.761452] loop6: detected capacity change from 0 to 512 [ 743.763181] EXT4-fs (loop0): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 743.764531] EXT4-fs (loop0): group descriptors corrupted! [ 743.766289] loop1: detected capacity change from 0 to 512 [ 743.779711] EXT4-fs error (device loop4): __ext4_fill_super:5244: inode #2: comm syz-executor.4: iget: root inode unallocated [ 743.782094] EXT4-fs (loop4): get root inode failed [ 743.782892] EXT4-fs (loop4): mount failed [ 743.788569] loop2: detected capacity change from 0 to 512 22:22:16 executing program 7: fork() r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x0, 0x0) r1 = dup2(r0, r0) bind$bt_l2cap(r1, &(0x7f0000000000)={0x1f, 0x0, @fixed={'\xaa\xaa\xaa\xaa\xaa', 0x10}}, 0xe) [ 743.798785] EXT4-fs error (device loop6): __ext4_fill_super:5244: inode #2: comm syz-executor.6: iget: root inode unallocated [ 743.803083] EXT4-fs (loop6): get root inode failed [ 743.803516] EXT4-fs (loop6): mount failed 22:22:16 executing program 6: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010100)="00000000080000000000f900b00cb2cc029f49d8b90449a7d5d54d49010000a566", 0x21, 0x4e0}, {&(0x7f0000010400)="0200000003000000040000006a000f000300040000000000000000000f00bc0f", 0x20, 0x800}, {&(0x7f0000011600), 0x0, 0x2100}], 0x0, &(0x7f0000012c00)) [ 743.861503] loop6: detected capacity change from 0 to 512 [ 743.913871] EXT4-fs error (device loop2): ext4_orphan_get:1419: comm syz-executor.2: bad orphan inode 16318464 22:22:16 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', 0x0, 0x40000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010100)="00000000080000000000f900b00cb2cc029f49d8b90449a7d5d54d49010000a566", 0x21, 0x4e0}, {&(0x7f0000010400)="0200000003000000040000006a000f000300040000000000000000000f00bc0f", 0x20, 0x800}, {&(0x7f0000011600)="ed41000000080000dff4655fe0f4655fe0f4655f0000000000000400", 0x1c, 0x2100}, {0x0}, {0x0}], 0x0, &(0x7f0000012c00)) [ 743.928196] EXT4-fs (loop2): mounted filesystem without journal. Quota mode: none. [ 743.930955] loop1: detected capacity change from 0 to 512 [ 743.946605] EXT4-fs error (device loop6): __ext4_fill_super:5244: inode #2: comm syz-executor.6: iget: root inode unallocated [ 743.952730] EXT4-fs (loop6): get root inode failed [ 743.953418] EXT4-fs (loop6): mount failed 22:22:16 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', 0x0, 0x40000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010100)="00000000080000000000f900b00cb2cc029f49d8b90449a7d5d54d49010000a566", 0x21, 0x4e0}, {&(0x7f0000010400)="0200000003000000040000006a000f000300040000000000000000000f00bc0f", 0x20, 0x800}, {&(0x7f0000011600)="ed41000000080000dff4655fe0f4655fe0f4655f0000000000000400", 0x1c, 0x2100}, {0x0}, {0x0}], 0x0, &(0x7f0000012c00)) 22:22:16 executing program 5: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010100)="00000000080000000000f900b00cb2cc029f49d8b90449a7d5d54d49010000a566", 0x21, 0x4e0}, {&(0x7f0000010400)="02000000030000000400", 0xa, 0x800}], 0x0, &(0x7f0000012c00)) [ 744.005134] loop1: detected capacity change from 0 to 512 [ 744.052688] loop5: detected capacity change from 0 to 512 [ 744.086691] EXT4-fs (loop2): unmounting filesystem. 22:22:29 executing program 3: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x2, &(0x7f0000000000)=[{0x7c}, {0x6, 0x0, 0x0, 0x7fffffff}]}) openat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x800, 0x10e) r0 = syz_init_net_socket$802154_raw(0x24, 0x3, 0x0) ioctl$sock_inet_SIOCSIFADDR(r0, 0x8916, &(0x7f0000001180)={'bond0\x00', {0x2, 0x0, @local}}) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f0000000080)) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x0) r2 = dup2(r1, r1) bind$bt_l2cap(r2, &(0x7f0000000000)={0x1f, 0x0, @fixed={'\xaa\xaa\xaa\xaa\xaa', 0x10}}, 0xe) 22:22:29 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', 0x0, 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010100)="00000000080000000000f900b00cb2cc029f49d8b90449a7d5d54d49010000a566", 0x21, 0x4e0}, {&(0x7f0000010400)="02000000030000000400", 0xa, 0x800}], 0x0, &(0x7f0000012c00)) 22:22:29 executing program 7: fork() r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x0, 0x0) r1 = dup2(r0, r0) bind$bt_l2cap(r1, &(0x7f0000000000)={0x1f, 0x0, @fixed={'\xaa\xaa\xaa\xaa\xaa', 0x10}}, 0xe) 22:22:29 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010100)="00000000080000000000f900b00cb2cc029f49d8b90449a7d5d54d49010000a566", 0x21, 0x4e0}, {&(0x7f0000010400), 0x0, 0x800}], 0x0, &(0x7f0000012c00)) 22:22:29 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010100)="00000000080000000000f900b00cb2cc029f49d8b90449a7d5d54d49010000a566", 0x21, 0x4e0}, {&(0x7f0000010400)="020000000300000004", 0x9}], 0x0, &(0x7f0000012c00)) 22:22:29 executing program 6: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010100)="00000000080000000000f900b00cb2cc029f49d8b90449a7d5d54d49010000a566", 0x21, 0x4e0}, {&(0x7f0000010400)="0200000003000000040000006a000f000300040000000000000000000f00bc0f", 0x20, 0x800}, {&(0x7f0000011600), 0x0, 0x2100}], 0x0, &(0x7f0000012c00)) 22:22:29 executing program 2: getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000040), &(0x7f0000000080)=0xc) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010100)="00000000080000000000f900b00cb2cc029f49d8b90449a7d5d54d49010000a566", 0x21, 0x4e0}, {&(0x7f0000010400)="0200000003000000040000006a000f000300040000000000000000000f00", 0x1e, 0x800}, {&(0x7f0000011600)="ed41000000080000dff4655fe0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}, {0x0}, {0x0}, {0x0}], 0x0, &(0x7f0000012c00)) 22:22:29 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010100)="00000000080000000000f900b00cb2cc029f49d8b90449a7d5d54d49010000a566", 0x21, 0x4e0}, {&(0x7f0000010400)="0200000003000000040000006a000f000300040000000000000000000f00bc0f", 0x20, 0x800}, {&(0x7f0000011600)="ed41000000080000dff4655fe0f4655fe0f4655f0000000000000400", 0x1c, 0x2100}, {0x0}, {0x0}], 0x0, &(0x7f0000012c00)) [ 756.804240] loop1: detected capacity change from 0 to 33 [ 756.807231] EXT4-fs (loop1): bad geometry: block count 128 exceeds size of device (8 blocks) [ 756.813281] loop4: detected capacity change from 0 to 512 [ 756.817349] EXT4-fs (loop4): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 756.818366] EXT4-fs (loop4): group descriptors corrupted! [ 756.821323] loop6: detected capacity change from 0 to 512 [ 756.856013] loop5: detected capacity change from 0 to 512 [ 756.864824] loop0: detected capacity change from 0 to 512 [ 756.867387] EXT4-fs (loop0): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 756.868154] EXT4-fs (loop0): group descriptors corrupted! [ 756.874654] EXT4-fs error (device loop6): __ext4_fill_super:5244: inode #2: comm syz-executor.6: iget: root inode unallocated [ 756.893803] EXT4-fs (loop6): get root inode failed [ 756.894574] EXT4-fs (loop6): mount failed [ 756.908142] loop2: detected capacity change from 0 to 512 [ 756.957045] EXT4-fs error (device loop2): ext4_orphan_get:1419: comm syz-executor.2: bad orphan inode 16318464 [ 756.958136] EXT4-fs (loop2): mounted filesystem without journal. Quota mode: none. [ 756.987248] EXT4-fs (loop2): unmounting filesystem. 22:22:41 executing program 3: getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000040), &(0x7f0000000080)=0xc) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010100)="00000000080000000000f900b00cb2cc029f49d8b90449a7d5d54d49010000a566", 0x21, 0x4e0}, {&(0x7f0000010400)="0200000003000000040000006a000f000300040000000000000000000f00", 0x1e, 0x800}, {&(0x7f0000011600)="ed41000000080000dff4655fe0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}, {0x0}, {0x0}, {0x0}], 0x0, &(0x7f0000012c00)) 22:22:41 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010100)="00000000080000000000f900b00cb2cc029f49d8b90449a7d5d54d49010000a566", 0x21, 0x4e0}, {&(0x7f0000010400), 0x0, 0x800}], 0x0, &(0x7f0000012c00)) [ 769.013785] loop3: detected capacity change from 0 to 512 22:22:41 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', 0x0, 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010100)="00000000080000000000f900b00cb2cc029f49d8b90449a7d5d54d49010000a566", 0x21, 0x4e0}, {&(0x7f0000010400)="02000000030000000400", 0xa, 0x800}], 0x0, &(0x7f0000012c00)) 22:22:41 executing program 2: getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000040), &(0x7f0000000080)=0xc) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010100)="00000000080000000000f900b00cb2cc029f49d8b90449a7d5d54d49010000a566", 0x21, 0x4e0}, {&(0x7f0000010400)="0200000003000000040000006a000f000300040000000000000000000f00", 0x1e, 0x800}, {&(0x7f0000011600)="ed41000000080000dff4655fe0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}, {0x0}, {0x0}, {0x0}], 0x0, &(0x7f0000012c00)) [ 769.036013] loop2: detected capacity change from 0 to 512 [ 769.036055] loop1: detected capacity change from 0 to 33 22:22:41 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010100)="00000000080000000000f900b00cb2cc029f49d8b90449a7d5d54d49010000a566", 0x21, 0x4e0}, {&(0x7f0000010400)="0200000003000000040000006a000f000300040000000000000000000f00bc0f", 0x20, 0x800}, {&(0x7f0000011600)="ed41000000080000dff4655fe0f4655fe0f4655f0000000000000400", 0x1c, 0x2100}, {0x0}, {0x0}], 0x0, &(0x7f0000012c00)) 22:22:41 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}], 0x0, &(0x7f0000012c00)) 22:22:41 executing program 7: fork() r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x0, 0x0) r1 = dup2(r0, r0) bind$bt_l2cap(r1, &(0x7f0000000000)={0x1f, 0x0, @fixed={'\xaa\xaa\xaa\xaa\xaa', 0x10}}, 0xe) 22:22:41 executing program 6: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010100)="00000000080000000000f900b00cb2cc029f49d8b90449a7d5d54d49010000a566", 0x21, 0x4e0}, {&(0x7f0000010400)="0200000003000000040000006a000f000300040000000000000000000f00bc0f", 0x20, 0x800}, {&(0x7f0000011600), 0x0, 0x2100}], 0x0, &(0x7f0000012c00)) [ 769.041800] loop6: detected capacity change from 0 to 512 [ 769.057784] loop5: detected capacity change from 0 to 512 [ 769.059330] EXT4-fs (loop1): bad geometry: block count 128 exceeds size of device (8 blocks) [ 769.060540] EXT4-fs error (device loop3): ext4_orphan_get:1419: comm syz-executor.3: bad orphan inode 16318464 [ 769.064454] loop4: detected capacity change from 0 to 512 [ 769.068364] EXT4-fs error (device loop2): ext4_orphan_get:1419: comm syz-executor.2: bad orphan inode 16318464 [ 769.069415] EXT4-fs (loop3): mounted filesystem without journal. Quota mode: none. [ 769.071773] loop0: detected capacity change from 0 to 512 [ 769.074305] EXT4-fs (loop4): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 769.075087] EXT4-fs (loop4): group descriptors corrupted! [ 769.078145] EXT4-fs (loop2): mounted filesystem without journal. Quota mode: none. [ 769.099504] EXT4-fs error (device loop6): __ext4_fill_super:5244: inode #2: comm syz-executor.6: iget: root inode unallocated [ 769.104164] EXT4-fs (loop6): get root inode failed [ 769.104968] EXT4-fs (loop6): mount failed [ 769.105973] EXT4-fs error (device loop0): __ext4_fill_super:5244: inode #2: comm syz-executor.0: iget: root inode unallocated [ 769.107103] EXT4-fs (loop0): get root inode failed [ 769.107505] EXT4-fs (loop0): mount failed 22:22:41 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010100)="00000000080000000000f900b00cb2cc029f49d8b90449a7d5d54d49010000a566", 0x21, 0x4e0}, {&(0x7f0000010400)="0200000003000000040000006a000f000300040000000000000000000f00bc0f", 0x20, 0x800}, {&(0x7f0000011600)="ed41000000080000dff4655fe0f4655fe0f4655f0000000000000400", 0x1c, 0x2100}, {0x0}, {0x0}], 0x0, &(0x7f0000012c00)) 22:22:41 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010100)="00000000080000000000f900b00cb2cc029f49d8b90449a7d5d54d49010000a566", 0x21, 0x4e0}, {&(0x7f0000010400), 0x0, 0x800}], 0x0, &(0x7f0000012c00)) 22:22:41 executing program 6: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010100)="00000000080000000000f900b00cb2cc029f49d8b90449a7d5d54d49010000a566", 0x21, 0x4e0}, {&(0x7f0000010400)="0200000003000000040000006a000f000300040000000000000000000f00bc0f", 0x20, 0x800}, {&(0x7f0000011600)="ed41000000080000dff4655fe0f4", 0xe, 0x2100}], 0x0, &(0x7f0000012c00)) 22:22:41 executing program 2: getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000040), &(0x7f0000000080)=0xc) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010100)="00000000080000000000f900b00cb2cc029f49d8b90449a7d5d54d49010000a566", 0x21, 0x4e0}, {&(0x7f0000010400)="0200000003000000040000006a000f000300040000000000000000000f00bc", 0x1f, 0x800}, {&(0x7f0000011600)="ed41000000080000dff4655fe0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}, {0x0}, {0x0}, {0x0}], 0x0, &(0x7f0000012c00)) 22:22:41 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', 0x0, 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010100)="00000000080000000000f900b00cb2cc029f49d8b90449a7d5d54d49010000a566", 0x21, 0x4e0}, {&(0x7f0000010400)="02000000030000000400", 0xa, 0x800}], 0x0, &(0x7f0000012c00)) 22:22:41 executing program 7: fork() r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x0) r1 = dup2(0xffffffffffffffff, r0) bind$bt_l2cap(r1, &(0x7f0000000000)={0x1f, 0x0, @fixed={'\xaa\xaa\xaa\xaa\xaa', 0x10}}, 0xe) [ 769.203954] EXT4-fs (loop2): unmounting filesystem. [ 769.209737] EXT4-fs (loop3): unmounting filesystem. [ 769.224272] loop1: detected capacity change from 0 to 33 22:22:41 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0x800}], 0x0, &(0x7f0000012c00)) [ 769.232950] loop6: detected capacity change from 0 to 512 22:22:41 executing program 3: getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000040), &(0x7f0000000080)=0xc) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010100)="00000000080000000000f900b00cb2cc029f49d8b90449a7d5d54d49010000a566", 0x21, 0x4e0}, {&(0x7f0000010400)="0200000003000000040000006a000f00030004000000000000000000", 0x1c, 0x800}, {&(0x7f0000011600)="ed41000000080000dff4655fe0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}, {0x0}, {0x0}, {0x0}], 0x0, &(0x7f0000012c00)) [ 769.247942] EXT4-fs (loop1): bad geometry: block count 128 exceeds size of device (8 blocks) [ 769.255968] loop5: detected capacity change from 0 to 512 [ 769.269226] EXT4-fs error (device loop6): __ext4_fill_super:5244: inode #2: comm syz-executor.6: iget: root inode unallocated [ 769.273641] EXT4-fs (loop6): get root inode failed [ 769.274013] EXT4-fs (loop6): mount failed [ 769.280880] loop4: detected capacity change from 0 to 512 [ 769.302446] loop0: detected capacity change from 0 to 512 [ 769.306808] EXT4-fs (loop4): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 769.308162] EXT4-fs (loop4): group descriptors corrupted! [ 769.311692] EXT4-fs (loop0): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 769.312376] EXT4-fs (loop0): group descriptors corrupted! 22:22:41 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010100)="00000000080000000000f900b00cb2cc029f49d8b90449a7d5d54d49010000a566", 0x21, 0x4e0}, {&(0x7f0000010400)="02000000030000000400", 0xa, 0x800}], 0x0, &(0x7f0000012c00)) [ 769.335492] loop3: detected capacity change from 0 to 512 [ 769.338515] loop2: detected capacity change from 0 to 512 22:22:41 executing program 6: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010100)="00000000080000000000f900b00cb2cc029f49d8b90449a7d5d54d49010000a566", 0x21, 0x4e0}, {&(0x7f0000010400)="0200000003000000040000006a000f000300040000000000000000000f00bc0f", 0x20, 0x800}, {&(0x7f0000011600)="ed41000000080000dff4655fe0f4", 0xe, 0x2100}], 0x0, &(0x7f0000012c00)) 22:22:41 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x0, 0x0, 0x0, &(0x7f0000012c00)) [ 769.365870] EXT4-fs error (device loop3): ext4_orphan_get:1419: comm syz-executor.3: bad orphan inode 16318464 [ 769.370729] EXT4-fs (loop3): mounted filesystem without journal. Quota mode: none. [ 769.378066] EXT4-fs error (device loop2): ext4_orphan_get:1419: comm syz-executor.2: bad orphan inode 16318464 [ 769.386709] EXT4-fs (loop2): mounted filesystem without journal. Quota mode: none. [ 769.404520] loop5: detected capacity change from 0 to 8 [ 769.409257] EXT4-fs (loop5): bad geometry: block count 128 exceeds size of device (2 blocks) [ 769.422232] EXT4-fs (loop3): unmounting filesystem. [ 769.426126] loop6: detected capacity change from 0 to 512 22:22:41 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0x800}], 0x0, &(0x7f0000012c00)) 22:22:41 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010100)="00000000080000000000f900b00cb2cc029f49d8b90449a7d5d54d49010000a566", 0x21, 0x4e0}, {&(0x7f0000010400)="0200000003000000", 0x8, 0x800}], 0x0, &(0x7f0000012c00)) [ 769.435386] No source specified 22:22:41 executing program 7: fork() r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x0) r1 = dup2(0xffffffffffffffff, r0) bind$bt_l2cap(r1, &(0x7f0000000000)={0x1f, 0x0, @fixed={'\xaa\xaa\xaa\xaa\xaa', 0x10}}, 0xe) [ 769.456191] EXT4-fs error (device loop6): __ext4_fill_super:5244: inode #2: comm syz-executor.6: iget: root inode unallocated [ 769.457349] EXT4-fs (loop6): get root inode failed [ 769.457926] EXT4-fs (loop6): mount failed 22:22:41 executing program 3: getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000040), &(0x7f0000000080)=0xc) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010100)="00000000080000000000f900b00cb2cc029f49d8b90449a7d5d54d49010000a566", 0x21, 0x4e0}, {&(0x7f0000010400)="0200000003000000040000006a000f00030004000000000000000000", 0x1c, 0x800}, {&(0x7f0000011600)="ed41000000080000dff4655fe0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}, {0x0}, {0x0}, {0x0}], 0x0, &(0x7f0000012c00)) [ 769.490780] loop4: detected capacity change from 0 to 512 [ 769.498239] loop0: detected capacity change from 0 to 512 [ 769.499788] EXT4-fs (loop2): unmounting filesystem. [ 769.505669] loop3: detected capacity change from 0 to 512 [ 769.508752] EXT4-fs (loop0): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 769.509359] EXT4-fs (loop0): group descriptors corrupted! [ 769.530369] EXT4-fs (loop4): ext4_check_descriptors: Inode table for group 0 overlaps superblock [ 769.531633] EXT4-fs (loop4): group descriptors corrupted! [ 769.534085] EXT4-fs error (device loop3): ext4_orphan_get:1419: comm syz-executor.3: bad orphan inode 16318464 [ 769.535185] EXT4-fs (loop3): mounted filesystem without journal. Quota mode: none. [ 769.569867] cgroup: fork rejected by pids controller in /syz7 [ 769.645435] EXT4-fs (loop3): unmounting filesystem. 22:22:55 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x0, 0x0, 0x0, &(0x7f0000012c00)) [ 783.448139] loop6: detected capacity change from 0 to 512 22:22:55 executing program 2: getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000040), &(0x7f0000000080)=0xc) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010100)="00000000080000000000f900b00cb2cc029f49d8b90449a7d5d54d49010000a566", 0x21, 0x4e0}, {&(0x7f0000010400)="0200000003000000040000006a000f000300040000000000000000000f00bc", 0x1f, 0x800}, {&(0x7f0000011600)="ed41000000080000dff4655fe0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}, {0x0}, {0x0}, {0x0}], 0x0, &(0x7f0000012c00)) 22:22:55 executing program 7: fork() r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x0) r1 = dup2(0xffffffffffffffff, r0) bind$bt_l2cap(r1, &(0x7f0000000000)={0x1f, 0x0, @fixed={'\xaa\xaa\xaa\xaa\xaa', 0x10}}, 0xe) 22:22:55 executing program 3: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x2, &(0x7f0000000000)=[{0x7c}, {0x6, 0x0, 0x0, 0x7fffffff}]}) openat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x800, 0x10e) syz_init_net_socket$802154_raw(0x24, 0x3, 0x0) fork() r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x0) r1 = dup2(r0, r0) bind$bt_l2cap(r1, &(0x7f0000000000)={0x1f, 0x0, @fixed={'\xaa\xaa\xaa\xaa\xaa', 0x10}}, 0xe) 22:22:55 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010100)="00000000080000000000f900b00cb2cc029f49d8b90449a7d5d54d49010000a566", 0x21, 0x4e0}, {&(0x7f0000010400)="02000000030000000400", 0xa, 0x800}], 0x0, &(0x7f0000012c00)) 22:22:55 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0x800}], 0x0, &(0x7f0000012c00)) 22:22:55 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010100)="00000000080000000000f900b00cb2cc029f49d8b90449a7d5d54d49010000a566", 0x21, 0x4e0}, {&(0x7f0000010400)="0200000003000000", 0x8, 0x800}], 0x0, &(0x7f0000012c00)) 22:22:55 executing program 6: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010100)="00000000080000000000f900b00cb2cc029f49d8b90449a7d5d54d49010000a566", 0x21, 0x4e0}, {&(0x7f0000010400)="0200000003000000040000006a000f000300040000000000000000000f00bc0f", 0x20, 0x800}, {&(0x7f0000011600)="ed41000000080000dff4655fe0f4", 0xe, 0x2100}], 0x0, &(0x7f0000012c00)) [ 783.453472] No source specified [ 783.460918] EXT4-fs error (device loop6): __ext4_fill_super:5244: inode #2: comm syz-executor.6: iget: root inode unallocated [ 783.462078] EXT4-fs (loop6): get root inode failed [ 783.462460] EXT4-fs (loop6): mount failed [ 783.466011] loop0: detected capacity change from 0 to 512 [ 783.468555] loop5: detected capacity change from 0 to 8 [ 783.486450] EXT4-fs (loop0): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 783.487153] EXT4-fs (loop0): group descriptors corrupted! 22:22:55 executing program 6: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010100)="00000000080000000000f900b00cb2cc029f49d8b90449a7d5d54d49010000a566", 0x21, 0x4e0}, {&(0x7f0000010400)="0200000003000000040000006a000f000300040000000000000000000f00bc0f", 0x20, 0x800}, {&(0x7f0000011600)="ed41000000080000dff4655fe0f4655fe0f4655f00", 0x15, 0x2100}], 0x0, &(0x7f0000012c00)) [ 783.500694] EXT4-fs (loop5): bad geometry: block count 128 exceeds size of device (2 blocks) 22:22:55 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010400), 0x0, 0x800}], 0x0, &(0x7f0000012c00)) [ 783.517102] loop6: detected capacity change from 0 to 512 [ 783.532589] loop0: detected capacity change from 0 to 512 22:22:55 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x0, 0x0, 0x0, &(0x7f0000012c00)) [ 783.545218] loop2: detected capacity change from 0 to 512 [ 783.551162] loop4: detected capacity change from 0 to 512 [ 783.552769] EXT4-fs (loop0): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 783.554188] EXT4-fs (loop0): group descriptors corrupted! [ 783.570838] No source specified [ 783.572108] EXT4-fs error (device loop6): __ext4_fill_super:5244: inode #2: comm syz-executor.6: iget: root inode unallocated [ 783.581721] EXT4-fs (loop6): get root inode failed [ 783.582144] EXT4-fs (loop6): mount failed [ 783.588540] EXT4-fs error (device loop2): ext4_orphan_get:1419: comm syz-executor.2: bad orphan inode 16318464 [ 783.593921] EXT4-fs (loop4): ext4_check_descriptors: Inode table for group 0 overlaps superblock [ 783.594663] EXT4-fs (loop4): group descriptors corrupted! [ 783.598766] EXT4-fs (loop2): mounted filesystem without journal. Quota mode: none. 22:22:56 executing program 6: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010100)="00000000080000000000f900b00cb2cc029f49d8b90449a7d5d54d49010000a566", 0x21, 0x4e0}, {&(0x7f0000010400)="0200000003000000040000006a000f000300040000000000000000000f00bc0f", 0x20, 0x800}, {&(0x7f0000011600)="ed41000000080000dff4655fe0f4655fe0f4655f00", 0x15, 0x2100}], 0x0, &(0x7f0000012c00)) 22:22:56 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010100)="00000000080000000000f900b00cb2cc029f49d8b90449a7d5d54d49010000a566", 0x21, 0x4e0}, {&(0x7f0000010400)="0200000003000000040000006a000f000300040000000000000000000f00bc0f", 0x20, 0x800}, {&(0x7f0000011600)="ed41000000080000dff4655fe0f4655fe0f4655f0000000000000400", 0x1c, 0x2100}, {0x0}], 0x0, &(0x7f0000012c00)) [ 783.758251] EXT4-fs (loop2): unmounting filesystem. [ 783.781966] loop1: detected capacity change from 0 to 512 [ 783.791172] loop6: detected capacity change from 0 to 512 [ 783.806883] EXT4-fs (loop1): corrupt root inode, run e2fsck [ 783.808369] EXT4-fs (loop1): mount failed [ 783.813818] EXT4-fs error (device loop6): __ext4_fill_super:5244: inode #2: comm syz-executor.6: iget: root inode unallocated [ 783.816746] EXT4-fs (loop6): get root inode failed [ 783.817446] EXT4-fs (loop6): mount failed 22:23:12 executing program 2: getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000040), &(0x7f0000000080)=0xc) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010100)="00000000080000000000f900b00cb2cc029f49d8b90449a7d5d54d49010000a566", 0x21, 0x4e0}, {&(0x7f0000010400)="0200000003000000040000006a000f000300040000000000000000000f00bc", 0x1f, 0x800}, {&(0x7f0000011600)="ed41000000080000dff4655fe0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}, {0x0}, {0x0}, {0x0}], 0x0, &(0x7f0000012c00)) 22:23:12 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010100)="00000000080000000000f900b00cb2cc029f49d8b90449a7d5d54d49010000a566", 0x21, 0x4e0}, {&(0x7f0000010400)="0200000003000000040000006a000f000300040000000000000000000f00bc0f", 0x20, 0x800}, {&(0x7f0000011600)="ed41000000080000dff4655fe0f4655fe0f4655f0000000000000400", 0x1c, 0x2100}], 0x0, &(0x7f0000012c00)) 22:23:12 executing program 6: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010100)="00000000080000000000f900b00cb2cc029f49d8b90449a7d5d54d49010000a566", 0x21, 0x4e0}, {&(0x7f0000010400)="0200000003000000040000006a000f000300040000000000000000000f00bc0f", 0x20, 0x800}, {&(0x7f0000011600)="ed41000000080000dff4655fe0f4655fe0f4655f00", 0x15, 0x2100}], 0x0, &(0x7f0000012c00)) 22:23:12 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010100)="00000000080000000000f900b00cb2cc029f49d8b90449a7d5d54d49010000a566", 0x21, 0x4e0}, {&(0x7f0000010400)="0200000003000000", 0x8, 0x800}], 0x0, &(0x7f0000012c00)) 22:23:12 executing program 3: getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000040), &(0x7f0000000080)=0xc) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010100)="00000000080000000000f900b00cb2cc029f49d8b90449a7d5d54d49010000a566", 0x21, 0x4e0}, {&(0x7f0000010400)="0200000003000000040000006a000f00030004000000000000000000", 0x1c, 0x800}, {&(0x7f0000011600)="ed41000000080000dff4655fe0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}, {0x0}, {0x0}, {0x0}], 0x0, &(0x7f0000012c00)) 22:23:12 executing program 7: fork() r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x0) r1 = dup2(r0, 0xffffffffffffffff) bind$bt_l2cap(r1, &(0x7f0000000000)={0x1f, 0x0, @fixed={'\xaa\xaa\xaa\xaa\xaa', 0x10}}, 0xe) [ 799.893326] loop1: detected capacity change from 0 to 512 22:23:12 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010100)="00000000080000000000f900b00cb2cc029f49d8b90449a7d5d54d49010000a566", 0x21, 0x4e0}, {&(0x7f0000010400)="02000000030000000400", 0xa, 0x800}], 0x0, &(0x7f0000012c00)) 22:23:12 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010400), 0x0, 0x800}], 0x0, &(0x7f0000012c00)) [ 799.908586] loop0: detected capacity change from 0 to 512 [ 799.925008] EXT4-fs (loop0): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 799.925898] EXT4-fs (loop0): group descriptors corrupted! [ 799.934345] EXT4-fs (loop1): corrupt root inode, run e2fsck [ 799.934860] EXT4-fs (loop1): mount failed [ 799.951705] loop4: detected capacity change from 0 to 512 [ 799.954107] loop3: detected capacity change from 0 to 512 [ 799.967245] loop2: detected capacity change from 0 to 512 [ 799.969798] EXT4-fs (loop4): ext4_check_descriptors: Inode table for group 0 overlaps superblock [ 799.970514] EXT4-fs (loop4): group descriptors corrupted! 22:23:12 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010100)="00000000080000000000f900b00cb2cc029f49d8b90449a7d5d54d49010000a566", 0x21, 0x4e0}, {&(0x7f0000010400)="0200000003000000040000006a000f000300040000000000000000000f00bc0f", 0x20, 0x800}], 0x0, &(0x7f0000012c00)) [ 799.986722] loop5: detected capacity change from 0 to 8 [ 799.994122] loop6: detected capacity change from 0 to 512 [ 800.007805] EXT4-fs (loop5): bad geometry: block count 128 exceeds size of device (2 blocks) [ 800.015234] EXT4-fs error (device loop6): __ext4_fill_super:5244: inode #2: comm syz-executor.6: iget: root inode unallocated [ 800.017415] EXT4-fs (loop6): get root inode failed [ 800.017916] EXT4-fs (loop6): mount failed [ 800.039813] EXT4-fs error (device loop3): ext4_orphan_get:1419: comm syz-executor.3: bad orphan inode 16318464 [ 800.041991] EXT4-fs (loop3): mounted filesystem without journal. Quota mode: none. [ 800.043418] EXT4-fs error (device loop2): ext4_orphan_get:1419: comm syz-executor.2: bad orphan inode 16318464 [ 800.048046] EXT4-fs (loop2): mounted filesystem without journal. Quota mode: none. [ 800.090896] loop1: detected capacity change from 0 to 512 [ 800.115816] EXT4-fs (loop2): unmounting filesystem. [ 800.128802] EXT4-fs error (device loop1): __ext4_fill_super:5244: inode #2: comm syz-executor.1: iget: root inode unallocated [ 800.136188] EXT4-fs (loop1): get root inode failed [ 800.136266] EXT4-fs (loop3): unmounting filesystem. [ 800.136968] EXT4-fs (loop1): mount failed 22:23:28 executing program 7: fork() r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x0) r1 = dup2(r0, 0xffffffffffffffff) bind$bt_l2cap(r1, &(0x7f0000000000)={0x1f, 0x0, @fixed={'\xaa\xaa\xaa\xaa\xaa', 0x10}}, 0xe) 22:23:28 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010100)="00000000080000000000f900b00cb2cc029f49d8b90449a7d5d54d49010000a566", 0x21, 0x4e0}, {&(0x7f0000010400)="0200000003000000040000006a000f000300040000000000000000000f00bc0f", 0x20, 0x800}], 0x0, &(0x7f0000012c00)) 22:23:28 executing program 6: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010100)="00000000080000000000f900b00cb2cc029f49d8b90449a7d5d54d49010000a566", 0x21, 0x4e0}, {&(0x7f0000010400)="0200000003000000040000006a000f000300040000000000000000000f00bc0f", 0x20, 0x800}, {&(0x7f0000011600)="ed41000000080000dff4655fe0f4655fe0f4655f0000000000", 0x19, 0x2100}], 0x0, &(0x7f0000012c00)) 22:23:28 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010100)="00000000080000000000f900b00cb2cc029f49d8b90449a7d5d54d49010000a566", 0x21, 0x4e0}, {&(0x7f0000010400)="020000000300000004000000", 0xc, 0x800}], 0x0, &(0x7f0000012c00)) 22:23:28 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x0, 0x0, 0x0, &(0x7f0000012c00)) 22:23:28 executing program 2: getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000040), &(0x7f0000000080)=0xc) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010100)="00000000080000000000f900b00cb2cc029f49d8b90449a7d5d54d49010000a566", 0x21, 0x4e0}, {&(0x7f0000010400)="0200000003000000040000006a000f000300040000000000000000000f00bc0f", 0x20}, {&(0x7f0000011600)="ed41000000080000dff4655fe0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}, {0x0}, {0x0}, {0x0}], 0x0, &(0x7f0000012c00)) 22:23:28 executing program 3: getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000040), &(0x7f0000000080)=0xc) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010100)="00000000080000000000f900b00cb2cc029f49d8b90449a7d5d54d49010000a566", 0x21, 0x4e0}, {&(0x7f0000010400)="0200000003000000040000006a000f000300040000000000000000000f00bc", 0x1f, 0x800}, {&(0x7f0000011600)="ed41000000080000dff4655fe0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}, {0x0}, {0x0}, {0x0}], 0x0, &(0x7f0000012c00)) 22:23:28 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010400), 0x0, 0x800}], 0x0, &(0x7f0000012c00)) [ 816.104496] loop2: detected capacity change from 0 to 512 [ 816.106302] loop4: detected capacity change from 0 to 512 [ 816.109735] loop3: detected capacity change from 0 to 512 [ 816.120827] loop6: detected capacity change from 0 to 512 [ 816.125327] loop1: detected capacity change from 0 to 512 [ 816.125826] EXT4-fs (loop2): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 816.127331] EXT4-fs (loop2): group descriptors corrupted! [ 816.127468] No source specified [ 816.132792] EXT4-fs error (device loop4): __ext4_fill_super:5244: inode #2: comm syz-executor.4: iget: root inode unallocated [ 816.136205] EXT4-fs (loop4): get root inode failed [ 816.137176] EXT4-fs (loop4): mount failed [ 816.140819] loop0: detected capacity change from 0 to 512 [ 816.153911] EXT4-fs error (device loop3): ext4_orphan_get:1419: comm syz-executor.3: bad orphan inode 16318464 [ 816.158399] EXT4-fs (loop3): mounted filesystem without journal. Quota mode: none. [ 816.168567] EXT4-fs (loop0): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 816.169890] EXT4-fs (loop0): group descriptors corrupted! [ 816.179086] EXT4-fs error (device loop6): __ext4_fill_super:5244: inode #2: comm syz-executor.6: iget: root inode unallocated [ 816.180921] EXT4-fs error (device loop1): __ext4_fill_super:5244: inode #2: comm syz-executor.1: iget: root inode unallocated [ 816.182971] EXT4-fs (loop6): get root inode failed [ 816.183702] EXT4-fs (loop6): mount failed [ 816.184450] EXT4-fs (loop1): get root inode failed [ 816.185214] EXT4-fs (loop1): mount failed 22:23:28 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x0, 0x0, 0x0, &(0x7f0000012c00)) 22:23:28 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010100)="00000000080000000000f900b00cb2cc029f49d8b90449a7d5d54d49010000a566", 0x21, 0x4e0}, {&(0x7f0000010400)="0200000003000000040000006a000f000300040000000000000000000f00bc0f", 0x20, 0x800}], 0x0, &(0x7f0000012c00)) 22:23:28 executing program 6: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010100)="00000000080000000000f900b00cb2cc029f49d8b90449a7d5d54d49010000a566", 0x21, 0x4e0}, {&(0x7f0000010400)="0200000003000000040000006a000f000300040000000000000000000f00bc0f", 0x20, 0x800}, {&(0x7f0000011600)="ed41000000080000dff4655fe0f4655fe0f4655f0000000000", 0x19, 0x2100}], 0x0, &(0x7f0000012c00)) 22:23:28 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010100)="00000000080000000000f900b00cb2cc029f49d8b90449a7d5d54d49010000a566", 0x21, 0x4e0}, {&(0x7f0000010400)="0200000003000000", 0x8, 0x800}], 0x0, &(0x7f0000012c00)) 22:23:28 executing program 2: getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000040), &(0x7f0000000080)=0xc) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010100)="00000000080000000000f900b00cb2cc029f49d8b90449a7d5d54d49010000a566", 0x21, 0x4e0}, {&(0x7f0000010400)="0200000003000000040000006a000f000300040000000000000000000f00bc0f", 0x20}, {&(0x7f0000011600)="ed41000000080000dff4655fe0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}, {0x0}, {0x0}, {0x0}], 0x0, &(0x7f0000012c00)) [ 816.361332] EXT4-fs (loop3): unmounting filesystem. [ 816.370418] loop6: detected capacity change from 0 to 512 [ 816.379280] loop1: detected capacity change from 0 to 512 [ 816.390989] loop2: detected capacity change from 0 to 512 22:23:28 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010400)="0200000003", 0x5, 0x800}], 0x0, &(0x7f0000012c00)) [ 816.407245] EXT4-fs (loop2): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 816.408431] EXT4-fs (loop2): group descriptors corrupted! [ 816.412719] EXT4-fs error (device loop6): __ext4_fill_super:5244: inode #2: comm syz-executor.6: iget: root inode unallocated [ 816.415677] EXT4-fs (loop6): get root inode failed [ 816.416319] EXT4-fs (loop6): mount failed [ 816.417253] EXT4-fs error (device loop1): __ext4_fill_super:5244: inode #2: comm syz-executor.1: iget: root inode unallocated [ 816.421883] No source specified [ 816.423251] EXT4-fs (loop1): get root inode failed [ 816.423972] EXT4-fs (loop1): mount failed 22:23:28 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010100)="00000000080000000000f900b00cb2cc029f49d8b90449a7d5d54d49010000a566", 0x21, 0x4e0}, {&(0x7f0000010400)="0200000003000000040000006a000f000300040000000000000000000f00bc0f", 0x20, 0x800}, {&(0x7f0000011600)="ed41000000080000dff4655fe0f4655fe0f4655f00", 0x15, 0x2100}], 0x0, &(0x7f0000012c00)) [ 816.485780] loop0: detected capacity change from 0 to 512 22:23:28 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010100)="00000000080000000000f900b00cb2cc029f49d8b90449a7d5d54d49010000a566", 0x21, 0x4e0}, {&(0x7f0000010400)="0200000003000000040000006a000f000300040000000000000000000f00bc0f", 0x20, 0x800}, {0x0, 0x0, 0x2100}], 0x0, &(0x7f0000012c00)) [ 816.497605] loop4: detected capacity change from 0 to 512 22:23:28 executing program 7: fork() r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x0) r1 = dup2(r0, 0xffffffffffffffff) bind$bt_l2cap(r1, &(0x7f0000000000)={0x1f, 0x0, @fixed={'\xaa\xaa\xaa\xaa\xaa', 0x10}}, 0xe) [ 816.516166] EXT4-fs (loop0): ext4_check_descriptors: Inode table for group 0 overlaps superblock [ 816.517945] EXT4-fs (loop0): group descriptors corrupted! [ 816.519155] EXT4-fs (loop4): ext4_check_descriptors: Inode table for group 0 overlaps superblock [ 816.520842] EXT4-fs (loop4): group descriptors corrupted! [ 816.527972] loop3: detected capacity change from 0 to 512 [ 816.570794] EXT4-fs error (device loop3): __ext4_fill_super:5244: inode #2: comm syz-executor.3: iget: root inode unallocated 22:23:28 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x0, 0x0, 0x0, &(0x7f0000012c00)) [ 816.579870] loop1: detected capacity change from 0 to 512 22:23:28 executing program 2: getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000040), &(0x7f0000000080)=0xc) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010100)="00000000080000000000f900b00cb2cc029f49d8b90449a7d5d54d49010000a566", 0x21, 0x4e0}, {&(0x7f0000010400)="0200000003000000040000006a000f000300040000000000000000000f00bc0f", 0x20}, {&(0x7f0000011600)="ed41000000080000dff4655fe0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}, {0x0}, {0x0}, {0x0}], 0x0, &(0x7f0000012c00)) [ 816.586010] EXT4-fs (loop3): get root inode failed [ 816.586730] EXT4-fs (loop3): mount failed 22:23:28 executing program 6: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010100)="00000000080000000000f900b00cb2cc029f49d8b90449a7d5d54d49010000a566", 0x21, 0x4e0}, {&(0x7f0000010400)="0200000003000000040000006a000f000300040000000000000000000f00bc0f", 0x20, 0x800}, {&(0x7f0000011600)="ed41000000080000dff4655fe0f4655fe0f4655f0000000000", 0x19, 0x2100}], 0x0, &(0x7f0000012c00)) [ 816.633719] EXT4-fs error (device loop1): __ext4_fill_super:5244: inode #2: comm syz-executor.1: iget: root inode unallocated [ 816.635760] EXT4-fs (loop1): get root inode failed [ 816.636442] EXT4-fs (loop1): mount failed 22:23:29 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010400)="0200000003", 0x5, 0x800}], 0x0, &(0x7f0000012c00)) [ 816.713344] No source specified [ 816.721766] loop6: detected capacity change from 0 to 512 [ 816.728910] loop2: detected capacity change from 0 to 512 [ 816.746236] EXT4-fs (loop2): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 816.747480] EXT4-fs (loop2): group descriptors corrupted! [ 816.749551] EXT4-fs error (device loop6): __ext4_fill_super:5244: inode #2: comm syz-executor.6: iget: root inode unallocated [ 816.754153] EXT4-fs (loop6): get root inode failed [ 816.754867] EXT4-fs (loop6): mount failed [ 816.780878] loop0: detected capacity change from 0 to 512 [ 816.797913] EXT4-fs (loop0): ext4_check_descriptors: Inode table for group 0 overlaps superblock [ 816.799223] EXT4-fs (loop0): group descriptors corrupted! 22:23:42 executing program 7: fork() r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x0) dup2(r0, r0) bind$bt_l2cap(0xffffffffffffffff, &(0x7f0000000000)={0x1f, 0x0, @fixed={'\xaa\xaa\xaa\xaa\xaa', 0x10}}, 0xe) 22:23:42 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010100)="00000000080000000000f900b00cb2cc029f49d8b90449a7d5d54d49010000a566", 0x21, 0x4e0}, {&(0x7f0000010400)="0200000003000000040000006a000f000300040000000000000000000f00bc0f", 0x20, 0x800}, {&(0x7f0000011600)="ed41000000080000dff4655fe0f4655fe0f4655f00", 0x15, 0x2100}], 0x0, &(0x7f0000012c00)) 22:23:42 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010400)="0200000003", 0x5, 0x800}], 0x0, &(0x7f0000012c00)) 22:23:42 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010100)="00000000080000000000f900b00cb2cc029f49d8b90449a7d5d54d49010000a566", 0x21, 0x4e0}], 0x0, &(0x7f0000012c00)) [ 829.816046] loop0: detected capacity change from 0 to 512 [ 829.834656] loop3: detected capacity change from 0 to 512 [ 829.837579] EXT4-fs (loop0): ext4_check_descriptors: Inode table for group 0 overlaps superblock [ 829.838291] EXT4-fs (loop0): group descriptors corrupted! 22:23:42 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010100)="00000000080000000000f900b00cb2cc029f49d8b90449a7d5d54d49010000a566", 0x21, 0x4e0}, {&(0x7f0000010400)="0200000003000000", 0x8, 0x800}], 0x0, &(0x7f0000012c00)) 22:23:42 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010100)="00000000080000000000f900b00cb2cc029f49d8b90449a7d5d54d49010000a566", 0x21, 0x4e0}, {&(0x7f0000010400)="0200000003000000040000006a000f000300040000000000000000000f00bc0f", 0x20, 0x800}, {0x0, 0x0, 0x2100}], 0x0, &(0x7f0000012c00)) 22:23:42 executing program 2: getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000040), &(0x7f0000000080)=0xc) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010400)="0200000003000000040000006a000f000300040000000000000000000f00bc0f", 0x20, 0x800}, {&(0x7f0000011600)="ed41000000080000dff4655fe0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}, {0x0}, {0x0}, {0x0}], 0x0, &(0x7f0000012c00)) 22:23:42 executing program 6: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010100)="00000000080000000000f900b00cb2cc029f49d8b90449a7d5d54d49010000a566", 0x21, 0x4e0}, {&(0x7f0000010400)="0200000003000000040000006a000f000300040000000000000000000f00bc0f", 0x20, 0x800}, {&(0x7f0000011600)="ed41000000080000dff4655fe0f4655fe0f4655f00000000000004", 0x1b, 0x2100}], 0x0, &(0x7f0000012c00)) [ 829.848890] loop6: detected capacity change from 0 to 512 [ 829.852948] loop2: detected capacity change from 0 to 512 [ 829.855606] loop5: detected capacity change from 0 to 512 [ 829.866950] EXT4-fs (loop5): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 829.867662] EXT4-fs (loop5): group descriptors corrupted! [ 829.869730] EXT4-fs (loop6): corrupt root inode, run e2fsck [ 829.870190] EXT4-fs (loop6): mount failed [ 829.878032] loop4: detected capacity change from 0 to 512 [ 829.878480] EXT4-fs error (device loop3): __ext4_fill_super:5244: inode #2: comm syz-executor.3: iget: root inode unallocated [ 829.883593] loop1: detected capacity change from 0 to 512 [ 829.886123] EXT4-fs (loop3): get root inode failed [ 829.886946] EXT4-fs (loop3): mount failed [ 829.897565] EXT4-fs (loop4): ext4_check_descriptors: Inode table for group 0 overlaps superblock [ 829.898386] EXT4-fs (loop4): group descriptors corrupted! [ 829.905280] EXT4-fs (loop2): mounted filesystem without journal. Quota mode: none. [ 829.925307] EXT4-fs error (device loop1): __ext4_fill_super:5244: inode #2: comm syz-executor.1: iget: root inode unallocated 22:23:42 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010400)="02000000030000", 0x7, 0x800}], 0x0, &(0x7f0000012c00)) [ 829.939723] EXT4-fs (loop1): get root inode failed [ 829.940108] EXT4-fs (loop1): mount failed 22:23:42 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010100)="00000000080000000000f900b00cb2cc029f49d8b90449a7d5d54d49010000a566", 0x21, 0x4e0}, {&(0x7f0000010400)="0200000003000000040000006a000f000300040000000000000000000f00bc0f", 0x20, 0x800}, {&(0x7f0000011600)="ed41000000080000dff4655fe0f4655fe0f4655f00", 0x15, 0x2100}], 0x0, &(0x7f0000012c00)) [ 829.971435] EXT4-fs (loop2): unmounting filesystem. 22:23:42 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010100)="00000000080000000000f900b00cb2cc029f49d8b90449a7d5d54d49010000a566", 0x21, 0x4e0}], 0x0, &(0x7f0000012c00)) 22:23:42 executing program 6: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010100)="00000000080000000000f900b00cb2cc029f49d8b90449a7d5d54d49010000a566", 0x21, 0x4e0}, {&(0x7f0000010400)="0200000003000000040000006a000f000300040000000000000000000f00bc0f", 0x20, 0x800}, {&(0x7f0000011600)="ed41000000080000dff4655fe0f4655fe0f4655f000000000000", 0x1a, 0x2100}], 0x0, &(0x7f0000012c00)) 22:23:42 executing program 2: getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000040), &(0x7f0000000080)=0xc) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010400)="0200000003000000040000006a000f000300040000000000000000000f00bc0f", 0x20, 0x800}, {&(0x7f0000011600)="ed41000000080000dff4655fe0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}, {0x0}, {0x0}, {0x0}], 0x0, &(0x7f0000012c00)) [ 830.036147] loop2: detected capacity change from 0 to 512 22:23:42 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010100)="00000000080000000000f900b00cb2cc029f49d8b90449a7d5d54d49010000a566", 0x21, 0x4e0}, {&(0x7f0000010400)="0200000003000000", 0x8, 0x800}], 0x0, &(0x7f0000012c00)) [ 830.041892] loop6: detected capacity change from 0 to 512 22:23:42 executing program 7: fork() r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x0) dup2(r0, r0) bind$bt_l2cap(0xffffffffffffffff, &(0x7f0000000000)={0x1f, 0x0, @fixed={'\xaa\xaa\xaa\xaa\xaa', 0x10}}, 0xe) [ 830.053248] EXT4-fs (loop2): mounted filesystem without journal. Quota mode: none. [ 830.054417] EXT4-fs error (device loop6): __ext4_fill_super:5244: inode #2: comm syz-executor.6: iget: root inode unallocated [ 830.056376] EXT4-fs (loop6): get root inode failed [ 830.056809] EXT4-fs (loop6): mount failed 22:23:42 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010100)="00000000080000000000f900b00cb2cc029f49d8b90449a7d5d54d49010000a566", 0x21, 0x4e0}, {&(0x7f0000010400)="0200000003000000040000006a000f000300040000000000000000000f00bc0f", 0x20, 0x800}, {0x0, 0x0, 0x2100}], 0x0, &(0x7f0000012c00)) [ 830.075253] loop0: detected capacity change from 0 to 512 [ 830.093484] EXT4-fs (loop2): unmounting filesystem. [ 830.106740] loop3: detected capacity change from 0 to 512 22:23:42 executing program 2: getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000040), &(0x7f0000000080)=0xc) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010400)="0200000003000000040000006a000f000300040000000000000000000f00bc0f", 0x20, 0x800}, {&(0x7f0000011600)="ed41000000080000dff4655fe0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}, {0x0}, {0x0}, {0x0}], 0x0, &(0x7f0000012c00)) [ 830.118743] EXT4-fs (loop0): ext4_check_descriptors: Inode table for group 0 overlaps superblock [ 830.120215] EXT4-fs (loop0): group descriptors corrupted! [ 830.123499] loop5: detected capacity change from 0 to 512 [ 830.130215] EXT4-fs error (device loop3): __ext4_fill_super:5244: inode #2: comm syz-executor.3: iget: root inode unallocated [ 830.131561] EXT4-fs (loop3): get root inode failed [ 830.131974] EXT4-fs (loop3): mount failed [ 830.136393] loop1: detected capacity change from 0 to 512 22:23:42 executing program 6: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010100)="00000000080000000000f900b00cb2cc029f49d8b90449a7d5d54d49010000a566", 0x21, 0x4e0}, {&(0x7f0000010400)="0200000003000000040000006a000f000300040000000000000000000f00bc0f", 0x20, 0x800}, {&(0x7f0000011600)="ed41000000080000dff4655fe0f4655fe0f4655f000000000000", 0x1a, 0x2100}], 0x0, &(0x7f0000012c00)) [ 830.150803] EXT4-fs (loop5): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 830.152256] EXT4-fs (loop5): group descriptors corrupted! [ 830.152595] EXT4-fs error (device loop1): __ext4_fill_super:5244: inode #2: comm syz-executor.1: iget: root inode unallocated [ 830.154189] EXT4-fs (loop1): get root inode failed [ 830.154567] EXT4-fs (loop1): mount failed [ 830.169883] loop4: detected capacity change from 0 to 512 [ 830.178537] loop6: detected capacity change from 0 to 512 [ 830.205512] EXT4-fs (loop4): ext4_check_descriptors: Inode table for group 0 overlaps superblock [ 830.207027] EXT4-fs (loop4): group descriptors corrupted! 22:23:42 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010100)="00000000080000000000f900b00cb2cc029f49d8b90449a7d5d54d49010000a566", 0x21, 0x4e0}, {&(0x7f0000010400)="0200000003000000040000006a000f000300040000000000000000000f00bc0f", 0x20, 0x800}, {&(0x7f0000011600), 0x0, 0x2100}], 0x0, &(0x7f0000012c00)) [ 830.238882] EXT4-fs error (device loop6): __ext4_fill_super:5244: inode #2: comm syz-executor.6: iget: root inode unallocated [ 830.253565] loop2: detected capacity change from 0 to 512 [ 830.263420] EXT4-fs (loop6): get root inode failed [ 830.263842] EXT4-fs (loop6): mount failed [ 830.268977] loop1: detected capacity change from 0 to 512 [ 830.293603] EXT4-fs error (device loop1): __ext4_fill_super:5244: inode #2: comm syz-executor.1: iget: root inode unallocated [ 830.294811] EXT4-fs (loop1): get root inode failed [ 830.295209] EXT4-fs (loop1): mount failed [ 830.298780] EXT4-fs (loop2): mounted filesystem without journal. Quota mode: none. [ 830.360863] EXT4-fs (loop2): unmounting filesystem. 22:23:58 executing program 7: fork() r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x0) dup2(r0, r0) bind$bt_l2cap(0xffffffffffffffff, &(0x7f0000000000)={0x1f, 0x0, @fixed={'\xaa\xaa\xaa\xaa\xaa', 0x10}}, 0xe) 22:23:58 executing program 3: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010100)="00000000080000000000f900b00cb2cc029f49d8b90449a7d5d54d49010000a566", 0x21, 0x4e0}, {&(0x7f0000010400)="0200000003000000040000006a000f000300040000000000000000000f00bc0f", 0x20, 0x800}, {&(0x7f0000011600)="ed41000000080000dff4655fe0f4655fe0f4655f00", 0x15, 0x2100}], 0x0, &(0x7f0000012c00)) [ 846.114360] loop0: detected capacity change from 0 to 512 [ 846.122534] loop2: detected capacity change from 0 to 512 [ 846.124280] loop1: detected capacity change from 0 to 512 [ 846.124783] loop3: detected capacity change from 0 to 512 22:23:58 executing program 2: getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000040), &(0x7f0000000080)=0xc) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0x4e0}, {&(0x7f0000010400)="0200000003000000040000006a000f000300040000000000000000000f00bc0f", 0x20, 0x800}, {&(0x7f0000011600)="ed41000000080000dff4655fe0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}, {0x0}, {0x0}, {0x0}], 0x0, &(0x7f0000012c00)) 22:23:58 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010100)="00000000080000000000f900b00cb2cc029f49d8b90449a7d5d54d49010000a566", 0x21, 0x4e0}, {&(0x7f0000010400)="02000000030000000400", 0xa, 0x800}], 0x0, &(0x7f0000012c00)) 22:23:58 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010100)="00000000080000000000f900b00cb2cc029f49d8b90449a7d5d54d49010000a566", 0x21, 0x4e0}], 0x0, &(0x7f0000012c00)) 22:23:58 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010400)="02000000030000", 0x7, 0x800}], 0x0, &(0x7f0000012c00)) 22:23:58 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010100)="00000000080000000000f900b00cb2cc029f49d8b90449a7d5d54d49010000a566", 0x21, 0x4e0}, {&(0x7f0000010400)="0200000003000000040000006a000f000300040000000000000000000f00bc0f", 0x20, 0x800}, {&(0x7f0000011600), 0x0, 0x2100}], 0x0, &(0x7f0000012c00)) 22:23:58 executing program 6: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010100)="00000000080000000000f900b00cb2cc029f49d8b90449a7d5d54d49010000a566", 0x21, 0x4e0}, {&(0x7f0000010400)="0200000003000000040000006a000f000300040000000000000000000f00bc0f", 0x20, 0x800}, {&(0x7f0000011600)="ed41000000080000dff4655fe0f4655fe0f4655f000000000000", 0x1a, 0x2100}], 0x0, &(0x7f0000012c00)) [ 846.140998] loop6: detected capacity change from 0 to 512 [ 846.144184] EXT4-fs (loop0): ext4_check_descriptors: Inode table for group 0 overlaps superblock [ 846.144881] EXT4-fs (loop0): group descriptors corrupted! [ 846.148538] loop4: detected capacity change from 0 to 512 [ 846.163584] EXT4-fs error (device loop4): __ext4_fill_super:5244: inode #2: comm syz-executor.4: iget: root inode unallocated [ 846.163871] EXT4-fs error (device loop1): __ext4_fill_super:5244: inode #2: comm syz-executor.1: iget: root inode unallocated [ 846.166869] EXT4-fs (loop4): get root inode failed [ 846.167236] EXT4-fs (loop4): mount failed [ 846.171405] EXT4-fs error (device loop6): __ext4_fill_super:5244: inode #2: comm syz-executor.6: iget: root inode unallocated [ 846.172967] loop5: detected capacity change from 0 to 512 [ 846.174431] EXT4-fs (loop1): get root inode failed [ 846.175212] EXT4-fs (loop1): mount failed [ 846.176012] EXT4-fs (loop6): get root inode failed [ 846.176389] EXT4-fs (loop6): mount failed [ 846.184403] EXT4-fs (loop5): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 846.185851] EXT4-fs (loop5): group descriptors corrupted! [ 846.195777] EXT4-fs (loop2): mounted filesystem without journal. Quota mode: none. 22:23:58 executing program 3: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010100)="00000000080000000000f900b00cb2cc029f49d8b90449a7d5d54d49010000a566", 0x21, 0x4e0}, {&(0x7f0000010400)="0200000003000000040000006a000f000300040000000000000000000f00bc0f", 0x20, 0x800}, {&(0x7f0000011600)="ed41000000080000dff4655fe0f4655fe0f4655f00", 0x15, 0x2100}], 0x0, &(0x7f0000012c00)) 22:23:58 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010400)="02000000030000", 0x7, 0x800}], 0x0, &(0x7f0000012c00)) [ 846.286643] loop3: detected capacity change from 0 to 512 [ 846.293480] EXT4-fs (loop2): unmounting filesystem. [ 846.296142] loop0: detected capacity change from 0 to 512 [ 846.310156] EXT4-fs (loop0): ext4_check_descriptors: Inode table for group 0 overlaps superblock [ 846.310839] EXT4-fs (loop0): group descriptors corrupted! 22:24:12 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010100)="00000000080000000000f900b00cb2cc029f49d8b90449a7d5d54d49010000a566", 0x21, 0x4e0}, {0x0, 0x0, 0x800}], 0x0, &(0x7f0000012c00)) 22:24:12 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010100)="00000000080000000000f900b00cb2cc029f49d8b90449a7d5d54d49010000a566", 0x21, 0x4e0}, {&(0x7f0000010400)="0200000003000000040000006a000f000300040000000000000000000f00bc0f", 0x20, 0x800}, {&(0x7f0000011600), 0x0, 0x2100}], 0x0, &(0x7f0000012c00)) 22:24:12 executing program 7: fork() r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x0) r1 = dup2(r0, r0) bind$bt_l2cap(r1, 0x0, 0x0) [ 860.495170] loop1: detected capacity change from 0 to 512 22:24:12 executing program 3: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010100)="00000000080000000000f900b00cb2cc029f49d8b90449a7d5d54d49010000a566", 0x21, 0x4e0}, {&(0x7f0000010400)="0200000003000000040000006a000f000300040000000000000000000f00bc0f", 0x20, 0x800}, {&(0x7f0000011600)="ed41000000080000dff4655fe0f4655fe0f4655f00", 0x15, 0x2100}], 0x0, &(0x7f0000012c00)) [ 860.505337] loop3: detected capacity change from 0 to 512 22:24:12 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010100)="00000000080000000000f900b00cb2cc029f49d8b90449a7d5d54d49010000a566", 0x21, 0x4e0}, {&(0x7f0000010400)="0200000003000000", 0x8, 0x800}], 0x0, &(0x7f0000012c00)) 22:24:12 executing program 2: getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000040), &(0x7f0000000080)=0xc) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0x4e0}, {&(0x7f0000010400)="0200000003000000040000006a000f000300040000000000000000000f00bc0f", 0x20, 0x800}, {&(0x7f0000011600)="ed41000000080000dff4655fe0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}, {0x0}, {0x0}, {0x0}], 0x0, &(0x7f0000012c00)) 22:24:12 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010400)="0200000003000000", 0x8, 0x800}], 0x0, &(0x7f0000012c00)) [ 860.517550] loop2: detected capacity change from 0 to 512 [ 860.517678] loop6: detected capacity change from 0 to 512 22:24:12 executing program 6: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010100)="00000000080000000000f900b00cb2cc029f49d8b90449a7d5d54d49010000a566", 0x21, 0x4e0}, {&(0x7f0000010400)="0200000003000000040000006a000f000300040000000000000000000f00bc0f", 0x20, 0x800}, {&(0x7f0000011600)="ed41000000080000dff4655fe0f4655fe0f4655f00000000000004", 0x1b}], 0x0, &(0x7f0000012c00)) [ 860.523795] EXT4-fs error (device loop1): __ext4_fill_super:5244: inode #2: comm syz-executor.1: iget: root inode unallocated [ 860.524973] EXT4-fs (loop1): get root inode failed [ 860.525381] EXT4-fs (loop1): mount failed [ 860.553716] EXT4-fs (loop2): mounted filesystem without journal. Quota mode: none. [ 860.563372] EXT4-fs error (device loop6): __ext4_fill_super:5244: inode #2: comm syz-executor.6: iget: root inode unallocated [ 860.566681] loop4: detected capacity change from 0 to 512 [ 860.569067] EXT4-fs (loop6): get root inode failed [ 860.570017] EXT4-fs (loop6): mount failed 22:24:12 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010100)="00000000080000000000f900b00cb2cc029f49d8b90449a7d5d54d49010000a566", 0x21, 0x4e0}, {&(0x7f0000010400)="0200000003000000040000006a000f000300040000000000000000000f00bc0f", 0x20, 0x800}, {&(0x7f0000011600)="ed41000000080000dff4655fe0f4", 0xe, 0x2100}], 0x0, &(0x7f0000012c00)) [ 860.580668] EXT4-fs (loop2): unmounting filesystem. 22:24:12 executing program 2: getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000040), &(0x7f0000000080)=0xc) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0x4e0}, {&(0x7f0000010400)="0200000003000000040000006a000f000300040000000000000000000f00bc0f", 0x20, 0x800}, {&(0x7f0000011600)="ed41000000080000dff4655fe0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}, {0x0}, {0x0}, {0x0}], 0x0, &(0x7f0000012c00)) [ 860.584651] EXT4-fs (loop4): ext4_check_descriptors: Inode table for group 0 overlaps superblock [ 860.586033] EXT4-fs (loop4): group descriptors corrupted! [ 860.591091] loop5: detected capacity change from 0 to 512 [ 860.591439] loop0: detected capacity change from 0 to 512 [ 860.607159] EXT4-fs (loop5): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 860.607905] EXT4-fs (loop5): group descriptors corrupted! [ 860.627995] EXT4-fs (loop0): ext4_check_descriptors: Inode table for group 0 overlaps superblock [ 860.629465] EXT4-fs (loop0): group descriptors corrupted! 22:24:12 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', 0x0, 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010100)="00000000080000000000f900b00cb2cc029f49d8b90449a7d5d54d49010000a566", 0x21, 0x4e0}, {&(0x7f0000010400)="0200000003000000040000006a000f000300040000000000000000000f00bc0f", 0x20, 0x800}, {&(0x7f0000011600)="ed41000000080000dff4655fe0f4655fe0f4655f00", 0x15, 0x2100}], 0x0, &(0x7f0000012c00)) [ 860.649880] loop3: detected capacity change from 0 to 512 22:24:13 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010100)="00000000080000000000f900b00cb2cc029f49d8b90449a7d5d54d49010000a566", 0x21, 0x4e0}, {0x0, 0x0, 0x800}], 0x0, &(0x7f0000012c00)) [ 860.662391] loop1: detected capacity change from 0 to 512 [ 860.689269] EXT4-fs error (device loop1): __ext4_fill_super:5244: inode #2: comm syz-executor.1: iget: root inode unallocated [ 860.690168] loop2: detected capacity change from 0 to 512 [ 860.695225] EXT4-fs (loop1): get root inode failed [ 860.695794] EXT4-fs (loop1): mount failed [ 860.700973] loop5: detected capacity change from 0 to 512 22:24:13 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', 0x0, 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010100)="00000000080000000000f900b00cb2cc029f49d8b90449a7d5d54d49010000a566", 0x21, 0x4e0}, {&(0x7f0000010400)="0200000003000000040000006a000f000300040000000000000000000f00bc0f", 0x20, 0x800}, {&(0x7f0000011600)="ed41000000080000dff4655fe0f4655fe0f4655f00", 0x15, 0x2100}], 0x0, &(0x7f0000012c00)) 22:24:13 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010100)="00000000080000000000f900b00cb2cc029f49d8b90449a7d5d54d49010000a566", 0x21, 0x4e0}, {&(0x7f0000010400)="0200000003000000", 0x8, 0x800}], 0x0, &(0x7f0000012c00)) 22:24:13 executing program 6: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010100)="00000000080000000000f900b00cb2cc029f49d8b90449a7d5d54d49010000a566", 0x21, 0x4e0}, {&(0x7f0000010400)="0200000003000000040000006a000f000300040000000000000000000f00bc0f", 0x20, 0x800}, {&(0x7f0000011600)="ed41000000080000dff4655fe0f4655fe0f4655f00000000000004", 0x1b}], 0x0, &(0x7f0000012c00)) [ 860.741883] EXT4-fs (loop5): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 860.742729] EXT4-fs (loop5): group descriptors corrupted! 22:24:13 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010400)="0200000003000000", 0x8, 0x800}], 0x0, &(0x7f0000012c00)) [ 860.755886] EXT4-fs (loop2): mounted filesystem without journal. Quota mode: none. [ 860.785156] loop3: detected capacity change from 0 to 512 22:24:13 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010100)="00000000080000000000f900b00cb2cc029f49d8b90449a7d5d54d49010000a566", 0x21, 0x4e0}, {&(0x7f0000010400)="0200000003000000040000006a000f000300040000000000000000000f00bc0f", 0x20, 0x800}, {&(0x7f0000011600)="ed41000000080000dff4655fe0f4", 0xe, 0x2100}], 0x0, &(0x7f0000012c00)) [ 860.823206] loop4: detected capacity change from 0 to 512 [ 860.837575] loop0: detected capacity change from 0 to 512 [ 860.840767] EXT4-fs (loop4): ext4_check_descriptors: Inode table for group 0 overlaps superblock [ 860.841496] EXT4-fs (loop4): group descriptors corrupted! [ 860.845192] loop6: detected capacity change from 0 to 512 [ 860.851923] EXT4-fs (loop0): ext4_check_descriptors: Inode table for group 0 overlaps superblock [ 860.853130] EXT4-fs (loop2): unmounting filesystem. [ 860.853138] EXT4-fs (loop0): group descriptors corrupted! 22:24:13 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010100)="00000000080000000000f900b00cb2cc029f49d8b90449a7d5d54d49010000a566", 0x21, 0x4e0}, {0x0, 0x0, 0x800}], 0x0, &(0x7f0000012c00)) [ 860.865061] loop1: detected capacity change from 0 to 512 [ 860.889148] EXT4-fs error (device loop6): __ext4_fill_super:5244: inode #2: comm syz-executor.6: iget: root inode unallocated [ 860.891354] EXT4-fs (loop6): get root inode failed [ 860.891779] EXT4-fs (loop6): mount failed [ 860.899451] EXT4-fs error (device loop1): __ext4_fill_super:5244: inode #2: comm syz-executor.1: iget: root inode unallocated [ 860.901364] EXT4-fs (loop1): get root inode failed [ 860.902155] EXT4-fs (loop1): mount failed [ 860.945457] loop5: detected capacity change from 0 to 512 [ 860.962500] EXT4-fs (loop5): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 860.963751] EXT4-fs (loop5): group descriptors corrupted! 22:24:26 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010100)="00000000080000000000f900b00cb2cc029f49d8b90449a7d5d54d49010000a566", 0x21, 0x4e0}, {&(0x7f0000010400), 0x0, 0x800}], 0x0, &(0x7f0000012c00)) 22:24:26 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010100)="00000000080000000000f900b00cb2cc029f49d8b90449a7d5d54d49010000a566", 0x21, 0x4e0}, {&(0x7f0000010400)="0200000003000000040000006a000f000300040000000000000000000f00bc0f", 0x20, 0x800}, {&(0x7f0000011600)="ed41000000080000dff4655fe0f4", 0xe, 0x2100}], 0x0, &(0x7f0000012c00)) 22:24:26 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', 0x0, 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010100)="00000000080000000000f900b00cb2cc029f49d8b90449a7d5d54d49010000a566", 0x21, 0x4e0}, {&(0x7f0000010400)="0200000003000000040000006a000f000300040000000000000000000f00bc0f", 0x20, 0x800}, {&(0x7f0000011600)="ed41000000080000dff4655fe0f4655fe0f4655f00", 0x15, 0x2100}], 0x0, &(0x7f0000012c00)) [ 874.233630] loop0: detected capacity change from 0 to 512 22:24:26 executing program 2: getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000040), &(0x7f0000000080)=0xc) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010100), 0x0, 0x4e0}, {&(0x7f0000010400)="0200000003000000040000006a000f000300040000000000000000000f00bc0f", 0x20, 0x800}, {&(0x7f0000011600)="ed41000000080000dff4655fe0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}, {0x0}, {0x0}, {0x0}], 0x0, &(0x7f0000012c00)) 22:24:26 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010100)="00000000080000000000f900b00cb2cc029f49d8b90449a7d5d54d49010000a566", 0x21, 0x4e0}, {&(0x7f0000010400)="0200000003000000", 0x8, 0x800}], 0x0, &(0x7f0000012c00)) 22:24:26 executing program 7: fork() r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x0) r1 = dup2(r0, r0) bind$bt_l2cap(r1, 0x0, 0x0) 22:24:26 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010400)="0200000003000000", 0x8, 0x800}], 0x0, &(0x7f0000012c00)) 22:24:26 executing program 6: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010100)="00000000080000000000f900b00cb2cc029f49d8b90449a7d5d54d49010000a566", 0x21, 0x4e0}, {&(0x7f0000010400)="0200000003000000040000006a000f000300040000000000000000000f00bc0f", 0x20, 0x800}, {&(0x7f0000011600)="ed41000000080000dff4655fe0f4655fe0f4655f00000000000004", 0x1b}], 0x0, &(0x7f0000012c00)) [ 874.233707] loop1: detected capacity change from 0 to 512 [ 874.246330] loop3: detected capacity change from 0 to 512 [ 874.250466] EXT4-fs (loop0): ext4_check_descriptors: Inode table for group 0 overlaps superblock [ 874.251216] EXT4-fs (loop0): group descriptors corrupted! [ 874.273209] EXT4-fs error (device loop1): __ext4_fill_super:5244: inode #2: comm syz-executor.1: iget: root inode unallocated [ 874.274458] EXT4-fs (loop1): get root inode failed [ 874.274892] EXT4-fs (loop1): mount failed [ 874.277105] loop5: detected capacity change from 0 to 512 [ 874.284725] loop4: detected capacity change from 0 to 512 [ 874.286994] EXT4-fs (loop5): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 874.287719] EXT4-fs (loop5): group descriptors corrupted! [ 874.293424] loop2: detected capacity change from 0 to 512 [ 874.299403] loop6: detected capacity change from 0 to 512 [ 874.305600] EXT4-fs (loop4): ext4_check_descriptors: Inode table for group 0 overlaps superblock [ 874.306285] EXT4-fs (loop4): group descriptors corrupted! [ 874.322958] EXT4-fs error (device loop6): __ext4_fill_super:5244: inode #2: comm syz-executor.6: iget: root inode unallocated 22:24:26 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010100)="00000000080000000000f900b00cb2cc029f49d8b90449a7d5d54d49010000a566", 0x21, 0x4e0}, {&(0x7f0000010400)="0200000003000000040000006a000f000300040000000000000000000f00bc0f", 0x20, 0x800}, {&(0x7f0000011600)="ed41000000080000dff4655fe0f4655fe0f4655f00", 0x15, 0x2100}], 0x0, &(0x7f0000012c00)) [ 874.327086] EXT4-fs (loop6): get root inode failed [ 874.328049] EXT4-fs (loop6): mount failed 22:24:26 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9}], 0x0, &(0x7f0000012c00)) [ 874.353648] EXT4-fs (loop2): mounted filesystem without journal. Quota mode: none. 22:24:26 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010100)="00000000080000000000f900b00cb2cc029f49d8b90449a7d5d54d49010000a566", 0x21, 0x4e0}, {&(0x7f0000010400)="0200000003000000040000006a000f000300040000000000000000000f00bc0f", 0x20, 0x800}, {&(0x7f0000011600)="ed41000000080000dff4655fe0f4655fe0f4655f00", 0x15, 0x2100}], 0x0, &(0x7f0000012c00)) [ 874.399437] loop0: detected capacity change from 0 to 512 [ 874.408287] EXT4-fs (loop0): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 874.409896] EXT4-fs (loop0): group descriptors corrupted! 22:24:26 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010100)="00000000080000000000f900b00cb2cc029f49d8b90449a7d5d54d49010000a566", 0x21, 0x4e0}, {&(0x7f0000010400), 0x0, 0x800}], 0x0, &(0x7f0000012c00)) [ 874.426067] loop3: detected capacity change from 0 to 33 [ 874.434430] EXT4-fs (loop3): bad geometry: block count 128 exceeds size of device (8 blocks) 22:24:26 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010100)="00000000080000000000f900b00cb2cc029f49d8b90449a7d5d54d49010000a566", 0x21, 0x4e0}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}], 0x0, &(0x7f0000012c00)) 22:24:26 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9}], 0x0, &(0x7f0000012c00)) [ 874.509520] loop1: detected capacity change from 0 to 512 22:24:26 executing program 6: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010100)="00000000080000000000f900b00cb2cc029f49d8b90449a7d5d54d49010000a566", 0x21, 0x4e0}, {&(0x7f0000011600)="ed41000000080000dff4655fe0f4655fe0f4655f00000000000004", 0x1b, 0x2100}], 0x0, &(0x7f0000012c00)) [ 874.528741] EXT4-fs (loop2): unmounting filesystem. 22:24:26 executing program 2: getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000040), &(0x7f0000000080)=0xc) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010100), 0x0, 0x4e0}, {&(0x7f0000010400)="0200000003000000040000006a000f000300040000000000000000000f00bc0f", 0x20, 0x800}, {&(0x7f0000011600)="ed41000000080000dff4655fe0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}, {0x0}, {0x0}, {0x0}], 0x0, &(0x7f0000012c00)) [ 874.551519] loop5: detected capacity change from 0 to 512 [ 874.581496] EXT4-fs error (device loop1): __ext4_fill_super:5244: inode #2: comm syz-executor.1: iget: root inode unallocated 22:24:26 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010100)="00000000080000000000f900b00cb2cc029f49d8b90449a7d5d54d49010000a566", 0x21, 0x4e0}, {&(0x7f0000010400)="0200000003000000040000006a000f000300040000000000000000000f00bc0f", 0x20, 0x800}, {&(0x7f0000011600)="ed41000000080000dff4655fe0f4655fe0f4655f00", 0x15, 0x2100}], 0x0, &(0x7f0000012c00)) [ 874.584917] EXT4-fs (loop1): get root inode failed [ 874.585602] EXT4-fs (loop1): mount failed [ 874.591358] loop0: detected capacity change from 0 to 512 [ 874.600729] EXT4-fs (loop5): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 874.602114] EXT4-fs (loop5): group descriptors corrupted! [ 874.604730] EXT4-fs (loop0): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 874.606059] EXT4-fs (loop0): group descriptors corrupted! [ 874.612830] loop4: detected capacity change from 0 to 512 [ 874.651667] EXT4-fs error (device loop4): __ext4_fill_super:5244: inode #2: comm syz-executor.4: iget: root inode unallocated [ 874.656725] EXT4-fs (loop4): get root inode failed [ 874.657426] EXT4-fs (loop4): mount failed [ 874.666107] loop2: detected capacity change from 0 to 512 [ 874.669955] loop6: detected capacity change from 0 to 512 [ 874.691871] EXT4-fs (loop6): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 874.693133] EXT4-fs (loop6): group descriptors corrupted! [ 874.697420] loop3: detected capacity change from 0 to 33 [ 874.717783] EXT4-fs (loop3): bad geometry: block count 128 exceeds size of device (8 blocks) [ 874.741202] EXT4-fs (loop2): mounted filesystem without journal. Quota mode: none. [ 874.851804] EXT4-fs (loop2): unmounting filesystem. 22:24:40 executing program 2: getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000040), &(0x7f0000000080)=0xc) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010100), 0x0, 0x4e0}, {&(0x7f0000010400)="0200000003000000040000006a000f000300040000000000000000000f00bc0f", 0x20, 0x800}, {&(0x7f0000011600)="ed41000000080000dff4655fe0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}, {0x0}, {0x0}, {0x0}], 0x0, &(0x7f0000012c00)) 22:24:40 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010100)="00000000080000000000f900b00cb2cc029f49d8b90449a7d5d54d49010000a566", 0x21, 0x4e0}, {&(0x7f0000010400)="0200000003000000040000006a000f000300040000000000000000000f00bc0f", 0x20, 0x800}, {&(0x7f0000011600)="ed41000000080000dff4655fe0f4655fe0f4655f00", 0x15, 0x2100}], 0x0, &(0x7f0000012c00)) 22:24:40 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010100)="00000000080000000000f900b00cb2cc029f49d8b90449a7d5d54d49010000a566", 0x21, 0x4e0}, {&(0x7f0000010400), 0x0, 0x800}], 0x0, &(0x7f0000012c00)) 22:24:40 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010100)="00000000080000000000f900b00cb2cc029f49d8b90449a7d5d54d49010000a566", 0x21, 0x4e0}, {&(0x7f0000010400)="0200000003000000040000006a000f000300040000000000000000000f00bc0f", 0x20, 0x800}, {&(0x7f0000011600)="ed41000000080000dff4655fe0f4655fe0f4655f00", 0x15, 0x2100}], 0x0, &(0x7f0000012c00)) 22:24:40 executing program 7: fork() r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x0) r1 = dup2(r0, r0) bind$bt_l2cap(r1, 0x0, 0x0) 22:24:40 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010100)="00000000080000000000f900b00cb2cc029f49d8b90449a7d5d54d49010000a566", 0x21, 0x4e0}, {&(0x7f0000010400)="0200000003000000", 0x8, 0x800}], 0x0, &(0x7f0000012c00)) 22:24:40 executing program 6: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010100)="00000000080000000000f900b00cb2cc029f49d8b90449a7d5d54d49010000a566", 0x21, 0x4e0}, {&(0x7f0000011600)="ed41000000080000dff4655fe0f4655fe0f4655f00000000000004", 0x1b, 0x2100}], 0x0, &(0x7f0000012c00)) 22:24:40 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9}], 0x0, &(0x7f0000012c00)) [ 888.179878] loop4: detected capacity change from 0 to 512 [ 888.185147] loop3: detected capacity change from 0 to 33 [ 888.187447] loop2: detected capacity change from 0 to 512 [ 888.198112] loop1: detected capacity change from 0 to 512 [ 888.203403] EXT4-fs (loop3): bad geometry: block count 128 exceeds size of device (8 blocks) [ 888.215098] EXT4-fs error (device loop1): __ext4_fill_super:5244: inode #2: comm syz-executor.1: iget: root inode unallocated [ 888.215300] EXT4-fs (loop4): ext4_check_descriptors: Inode table for group 0 overlaps superblock [ 888.217290] EXT4-fs (loop4): group descriptors corrupted! [ 888.218742] EXT4-fs (loop1): get root inode failed [ 888.219144] EXT4-fs (loop1): mount failed [ 888.235195] loop0: detected capacity change from 0 to 512 [ 888.236641] EXT4-fs (loop2): mounted filesystem without journal. Quota mode: none. [ 888.243184] loop5: detected capacity change from 0 to 512 [ 888.256540] loop6: detected capacity change from 0 to 512 [ 888.268541] EXT4-fs (loop5): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 888.270036] EXT4-fs (loop5): group descriptors corrupted! [ 888.272677] EXT4-fs (loop0): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 888.274091] EXT4-fs (loop0): group descriptors corrupted! [ 888.282065] EXT4-fs (loop6): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 888.283436] EXT4-fs (loop6): group descriptors corrupted! [ 888.284090] EXT4-fs (loop2): unmounting filesystem. 22:24:40 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010100)="00000000080000000000f900b00cb2cc029f49d8b90449a7d5d54d49010000a566", 0x21, 0x4e0}, {&(0x7f0000010400)="0200000003000000040000006a000f000300040000000000000000000f00bc0f", 0x20, 0x800}, {&(0x7f0000011600)="ed41000000080000dff4655fe0f4655fe0f4655f00", 0x15, 0x2100}], 0x0, &(0x7f0000012c00)) 22:24:40 executing program 2: getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000040), &(0x7f0000000080)=0xc) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010100)="00000000080000000000f900b00cb2cc02", 0x11, 0x4e0}, {&(0x7f0000010400)="0200000003000000040000006a000f000300040000000000000000000f00bc0f", 0x20, 0x800}, {&(0x7f0000011600)="ed41000000080000dff4655fe0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}, {0x0}, {0x0}, {0x0}], 0x0, &(0x7f0000012c00)) 22:24:40 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x0, 0x0, 0x0, &(0x7f0000012c00)) 22:24:40 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010100)="00000000080000000000f900b00cb2cc029f49d8b90449a7d5d54d49010000a566", 0x21, 0x4e0}, {&(0x7f0000010400)="0200000003000000", 0x8, 0x800}], 0x0, &(0x7f0000012c00)) [ 888.354859] loop1: detected capacity change from 0 to 512 [ 888.374384] loop2: detected capacity change from 0 to 512 [ 888.380318] EXT4-fs error (device loop1): __ext4_fill_super:5244: inode #2: comm syz-executor.1: iget: root inode unallocated [ 888.382079] EXT4-fs (loop1): get root inode failed [ 888.382519] EXT4-fs (loop1): mount failed [ 888.394421] loop4: detected capacity change from 0 to 512 22:24:40 executing program 7: fork() r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x0) r1 = dup2(r0, r0) bind$bt_l2cap(r1, &(0x7f0000000000)={0x1f, 0x0, @fixed}, 0xe) [ 888.416715] EXT4-fs error (device loop2): ext4_orphan_get:1419: comm syz-executor.2: bad orphan inode 16318464 [ 888.418871] EXT4-fs (loop2): mounted filesystem without journal. Quota mode: none. [ 888.423533] No source specified [ 888.429059] EXT4-fs (loop4): ext4_check_descriptors: Inode table for group 0 overlaps superblock [ 888.430329] EXT4-fs (loop4): group descriptors corrupted! 22:24:40 executing program 6: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010100)="00000000080000000000f900b00cb2cc029f49d8b90449a7d5d54d49010000a566", 0x21, 0x4e0}, {&(0x7f0000011600)="ed41000000080000dff4655fe0f4655fe0f4655f00000000000004", 0x1b, 0x2100}], 0x0, &(0x7f0000012c00)) 22:24:40 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010400)="020000000300000004", 0x9, 0x800}], 0x0, &(0x7f0000012c00)) 22:24:40 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010100)="00000000080000000000f900b00cb2cc029f49d8b90449a7d5d54d49010000a566", 0x21, 0x4e0}, {&(0x7f0000010400)="0200000003", 0x5, 0x800}], 0x0, &(0x7f0000012c00)) [ 888.458535] loop6: detected capacity change from 0 to 512 [ 888.485973] EXT4-fs (loop6): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 888.487052] EXT4-fs (loop6): group descriptors corrupted! [ 888.492497] loop0: detected capacity change from 0 to 512 22:24:40 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010100)="00000000080000000000f900b00cb2cc029f49d8b90449a7d5d54d49010000a566", 0x21, 0x4e0}, {&(0x7f0000010400)="0200000003000000040000006a000f000300040000000000000000000f00bc0f", 0x20, 0x800}, {&(0x7f0000011600)="ed41000000080000dff4655fe0f4655fe0f4655f0000000000", 0x19, 0x2100}], 0x0, &(0x7f0000012c00)) [ 888.515192] EXT4-fs (loop2): unmounting filesystem. [ 888.520863] EXT4-fs (loop0): VFS: Can't find ext4 filesystem [ 888.523852] loop5: detected capacity change from 0 to 512 [ 888.544658] EXT4-fs (loop5): ext4_check_descriptors: Inode table for group 0 overlaps superblock [ 888.545332] EXT4-fs (loop5): group descriptors corrupted! [ 888.583366] loop1: detected capacity change from 0 to 512 [ 888.608499] EXT4-fs error (device loop1): __ext4_fill_super:5244: inode #2: comm syz-executor.1: iget: root inode unallocated [ 888.610482] EXT4-fs (loop1): get root inode failed [ 888.611231] EXT4-fs (loop1): mount failed [ 900.858288] loop1: detected capacity change from 0 to 512 22:24:53 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010100)="00000000080000000000f900b00cb2cc029f49d8b90449a7d5d54d49010000a566", 0x21, 0x4e0}, {&(0x7f0000010400)="0200000003000000040000006a000f000300040000000000000000000f00bc0f", 0x20, 0x800}, {&(0x7f0000011600)="ed41000000080000dff4655fe0f4655fe0f4655f0000000000", 0x19, 0x2100}], 0x0, &(0x7f0000012c00)) 22:24:53 executing program 2: getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000040), &(0x7f0000000080)=0xc) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010100)="00000000080000000000f900b00cb2cc02", 0x11, 0x4e0}, {&(0x7f0000010400)="0200000003000000040000006a000f000300040000000000000000000f00bc0f", 0x20, 0x800}, {&(0x7f0000011600)="ed41000000080000dff4655fe0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}, {0x0}, {0x0}, {0x0}], 0x0, &(0x7f0000012c00)) 22:24:53 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010100)="00000000080000000000f900b00cb2cc029f49d8b90449a7d5d54d49010000a566", 0x21, 0x4e0}, {&(0x7f0000010400)="0200000003", 0x5, 0x800}], 0x0, &(0x7f0000012c00)) 22:24:53 executing program 7: fork() r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x0) r1 = dup2(r0, r0) bind$bt_l2cap(r1, &(0x7f0000000000)={0x1f, 0x0, @fixed}, 0xe) [ 900.862666] loop5: detected capacity change from 0 to 512 [ 900.870700] loop2: detected capacity change from 0 to 512 [ 900.871093] loop4: detected capacity change from 0 to 512 [ 900.898678] loop0: detected capacity change from 0 to 512 [ 900.901268] EXT4-fs (loop5): ext4_check_descriptors: Inode table for group 0 overlaps superblock [ 900.902847] EXT4-fs (loop5): group descriptors corrupted! [ 900.902876] EXT4-fs (loop0): VFS: Can't find ext4 filesystem [ 900.905379] EXT4-fs (loop4): ext4_check_descriptors: Inode table for group 0 overlaps superblock [ 900.906174] EXT4-fs (loop4): group descriptors corrupted! [ 900.909126] EXT4-fs error (device loop1): __ext4_fill_super:5244: inode #2: comm syz-executor.1: iget: root inode unallocated [ 900.911578] EXT4-fs (loop1): get root inode failed [ 900.912440] EXT4-fs (loop1): mount failed [ 900.914070] EXT4-fs error (device loop2): ext4_orphan_get:1419: comm syz-executor.2: bad orphan inode 16318464 [ 900.922172] EXT4-fs (loop2): mounted filesystem without journal. Quota mode: none. [ 900.924562] No source specified [ 900.926280] loop6: detected capacity change from 0 to 512 22:24:53 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010100)="00000000080000000000f900b00cb2cc029f49d8b90449a7d5d54d49010000a566", 0x21, 0x4e0}, {&(0x7f0000010400)="0200000003000000", 0x8, 0x800}], 0x0, &(0x7f0000012c00)) 22:24:53 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x0, 0x0, 0x0, &(0x7f0000012c00)) 22:24:53 executing program 6: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010100)="00000000080000000000f900b00cb2cc029f49d8b90449a7d5d54d49010000a566", 0x21, 0x4e0}, {0x0, 0x0, 0x800}, {&(0x7f0000011600)="ed41000000080000dff4655fe0f4655fe0f4655f00000000000004", 0x1b, 0x2100}], 0x0, &(0x7f0000012c00)) 22:24:53 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010400)="020000000300000004", 0x9, 0x800}], 0x0, &(0x7f0000012c00)) [ 900.947125] EXT4-fs (loop6): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 900.947860] EXT4-fs (loop6): group descriptors corrupted! [ 900.974784] EXT4-fs (loop2): unmounting filesystem. 22:24:53 executing program 2: getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000040), &(0x7f0000000080)=0xc) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010100)="00000000080000000000f900b00cb2cc02", 0x11, 0x4e0}, {&(0x7f0000010400)="0200000003000000040000006a000f000300040000000000000000000f00bc0f", 0x20, 0x800}, {&(0x7f0000011600)="ed41000000080000dff4655fe0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}, {0x0}, {0x0}, {0x0}], 0x0, &(0x7f0000012c00)) 22:24:53 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010100)="00000000080000000000f900b00cb2cc029f49d8b90449a7d5d54d49010000a566", 0x21, 0x4e0}, {&(0x7f0000010400)="0200000003000000040000006a000f000300040000000000000000000f00bc0f", 0x20, 0x800}, {&(0x7f0000011600)="ed41000000080000dff4655fe0f4655fe0f4655f0000000000", 0x19, 0x2100}], 0x0, &(0x7f0000012c00)) 22:24:53 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010100)="00000000080000000000f900b00cb2cc029f49d8b90449a7d5d54d49010000a566", 0x21, 0x4e0}, {&(0x7f0000010400)="0200000003", 0x5, 0x800}], 0x0, &(0x7f0000012c00)) [ 901.068115] loop2: detected capacity change from 0 to 512 [ 901.077151] loop5: detected capacity change from 0 to 512 22:24:53 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010400)="020000000300000004", 0x9, 0x800}], 0x0, &(0x7f0000012c00)) 22:24:53 executing program 6: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010100)="00000000080000000000f900b00cb2cc029f49d8b90449a7d5d54d49010000a566", 0x21, 0x4e0}, {0x0, 0x0, 0x800}, {&(0x7f0000011600)="ed41000000080000dff4655fe0f4655fe0f4655f00000000000004", 0x1b, 0x2100}], 0x0, &(0x7f0000012c00)) 22:24:53 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010100)="00000000080000000000f900b00cb2cc029f49d8b90449a7d5d54d49010000a566", 0x21, 0x4e0}, {&(0x7f0000010400)="020000000300000004", 0x9}], 0x0, &(0x7f0000012c00)) 22:24:53 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x0, 0x0, 0x0, &(0x7f0000012c00)) [ 901.089703] loop1: detected capacity change from 0 to 512 [ 901.097048] EXT4-fs (loop5): ext4_check_descriptors: Inode table for group 0 overlaps superblock [ 901.097769] EXT4-fs (loop5): group descriptors corrupted! [ 901.103439] EXT4-fs error (device loop1): __ext4_fill_super:5244: inode #2: comm syz-executor.1: iget: root inode unallocated [ 901.105142] EXT4-fs (loop1): get root inode failed [ 901.105568] EXT4-fs (loop1): mount failed [ 901.108499] No source specified [ 901.133555] loop6: detected capacity change from 0 to 512 [ 901.137249] EXT4-fs error (device loop2): ext4_orphan_get:1419: comm syz-executor.2: bad orphan inode 16318464 [ 901.140192] loop0: detected capacity change from 0 to 512 [ 901.143702] EXT4-fs (loop0): VFS: Can't find ext4 filesystem 22:24:53 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010100)="00000000080000000000f900b00cb2cc029f49d8b90449a7d5d54d49010000a566", 0x21, 0x4e0}, {&(0x7f0000010400)="0200000003000000", 0x8, 0x800}], 0x0, &(0x7f0000012c00)) [ 901.157343] EXT4-fs (loop2): mounted filesystem without journal. Quota mode: none. 22:24:53 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x2, &(0x7f0000000200)=[{0x0, 0x0, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}], 0x0, &(0x7f0000012c00)) [ 901.175383] loop5: detected capacity change from 0 to 512 [ 901.179965] EXT4-fs (loop5): ext4_check_descriptors: Inode table for group 0 overlaps superblock [ 901.180688] EXT4-fs (loop5): group descriptors corrupted! [ 901.185805] loop4: detected capacity change from 0 to 512 [ 901.194903] EXT4-fs (loop6): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 901.196137] EXT4-fs (loop6): group descriptors corrupted! [ 901.227208] EXT4-fs (loop4): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 901.228456] EXT4-fs (loop4): group descriptors corrupted! 22:24:53 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010100)="00000000080000000000f900b00cb2cc029f49d8b90449a7d5d54d49010000a566", 0x21, 0x4e0}, {&(0x7f0000010400)="0200000003000000", 0x8, 0x800}], 0x0, &(0x7f0000012c00)) 22:24:53 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010100)="00000000080000000000f900b00cb2cc029f49d8b90449a7d5d54d49010000a566", 0x21, 0x4e0}, {&(0x7f0000010400)="0200000003000000040000006a000f000300040000000000000000000f00bc0f", 0x20, 0x800}, {&(0x7f0000011600)="ed41000000080000dff4655fe0f4655fe0f4655f00000000000004", 0x1b, 0x2100}], 0x0, &(0x7f0000012c00)) [ 901.278943] loop5: detected capacity change from 0 to 512 [ 901.312034] EXT4-fs (loop5): ext4_check_descriptors: Inode table for group 0 overlaps superblock [ 901.313478] EXT4-fs (loop5): group descriptors corrupted! [ 901.354082] EXT4-fs (loop2): unmounting filesystem. [ 901.366406] loop0: detected capacity change from 0 to 512 [ 901.407739] EXT4-fs (loop0): VFS: Can't find ext4 filesystem [ 901.436722] loop1: detected capacity change from 0 to 512 [ 901.458840] EXT4-fs (loop1): corrupt root inode, run e2fsck [ 901.465754] EXT4-fs (loop1): mount failed 22:25:06 executing program 6: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010100)="00000000080000000000f900b00cb2cc029f49d8b90449a7d5d54d49010000a566", 0x21, 0x4e0}, {0x0, 0x0, 0x800}, {&(0x7f0000011600)="ed41000000080000dff4655fe0f4655fe0f4655f00000000000004", 0x1b, 0x2100}], 0x0, &(0x7f0000012c00)) 22:25:06 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010100)="00000000080000000000f900b00cb2cc029f49d8b90449a7d5d54d49010000a566", 0x21, 0x4e0}, {&(0x7f0000010400)="0200000003000000040000006a000f000300040000000000000000000f00bc0f", 0x20, 0x800}, {&(0x7f0000011600)="ed41000000080000dff4655fe0f4655fe0f4655f000000000000", 0x1a, 0x2100}], 0x0, &(0x7f0000012c00)) 22:25:06 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x2, &(0x7f0000000200)=[{0x0, 0x0, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}], 0x0, &(0x7f0000012c00)) 22:25:06 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010100)="00000000080000000000f900b00cb2cc029f49d8b90449a7d5d54d49010000a566", 0x21, 0x4e0}, {&(0x7f0000010400)="020000000300000004", 0x9}], 0x0, &(0x7f0000012c00)) 22:25:06 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010100)="00000000080000000000f900b00cb2cc029f49d8b90449a7d5d54d49010000a566", 0x21, 0x4e0}, {&(0x7f0000010400)="0200000003000000", 0x8, 0x800}], 0x0, &(0x7f0000012c00)) 22:25:06 executing program 7: fork() r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x0) r1 = dup2(r0, r0) bind$bt_l2cap(r1, &(0x7f0000000000)={0x1f, 0x0, @fixed}, 0xe) 22:25:06 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010100)="00000000080000000000f900b00cb2cc029f49d8b90449a7d5d54d49010000a566", 0x21, 0x4e0}, {&(0x7f0000010400)="0200000003000000040000006a000f000300040000000000000000000f00bc0f", 0x20, 0x800}], 0x0, &(0x7f0000012c00)) [ 914.128867] loop0: detected capacity change from 0 to 512 22:25:06 executing program 2: getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000040), &(0x7f0000000080)=0xc) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010100)="00000000080000000000f900b00cb2cc029f49d8b90449a7d5", 0x19, 0x4e0}, {&(0x7f0000010400)="0200000003000000040000006a000f000300040000000000000000000f00bc0f", 0x20, 0x800}, {&(0x7f0000011600)="ed41000000080000dff4655fe0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}, {0x0}, {0x0}, {0x0}], 0x0, &(0x7f0000012c00)) [ 914.140529] loop1: detected capacity change from 0 to 512 [ 914.146540] EXT4-fs (loop0): VFS: Can't find ext4 filesystem [ 914.150222] loop6: detected capacity change from 0 to 512 [ 914.154121] loop4: detected capacity change from 0 to 512 [ 914.156152] EXT4-fs error (device loop1): __ext4_fill_super:5244: inode #2: comm syz-executor.1: iget: root inode unallocated [ 914.158925] EXT4-fs (loop1): get root inode failed [ 914.159315] EXT4-fs (loop1): mount failed [ 914.159902] EXT4-fs (loop6): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 914.160586] EXT4-fs (loop6): group descriptors corrupted! [ 914.202406] EXT4-fs (loop4): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 914.203956] EXT4-fs (loop4): group descriptors corrupted! [ 914.229118] loop5: detected capacity change from 0 to 512 [ 914.233825] loop3: detected capacity change from 0 to 512 [ 914.240588] loop2: detected capacity change from 0 to 512 22:25:06 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x2, &(0x7f0000000200)=[{0x0, 0x0, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}], 0x0, &(0x7f0000012c00)) [ 914.260187] EXT4-fs (loop5): ext4_check_descriptors: Inode table for group 0 overlaps superblock [ 914.261627] EXT4-fs (loop5): group descriptors corrupted! 22:25:06 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010100)="00000000080000000000f900b00cb2cc029f49d8b90449a7d5d54d49010000a566", 0x21, 0x4e0}, {&(0x7f0000010400)="0200000003000000040000006a000f000300040000000000000000000f00bc0f", 0x20, 0x800}, {&(0x7f0000011600)="ed41000000080000dff4655fe0f4655fe0f4655f000000000000", 0x1a, 0x2100}], 0x0, &(0x7f0000012c00)) 22:25:06 executing program 6: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010100)="00000000080000000000f900b00cb2cc029f49d8b90449a7d5d54d49010000a566", 0x21, 0x4e0}, {&(0x7f0000010400), 0x0, 0x800}, {&(0x7f0000011600)="ed41000000080000dff4655fe0f4655fe0f4655f00000000000004", 0x1b, 0x2100}], 0x0, &(0x7f0000012c00)) [ 914.281847] EXT4-fs error (device loop3): __ext4_fill_super:5244: inode #2: comm syz-executor.3: iget: root inode unallocated [ 914.293076] EXT4-fs (loop3): get root inode failed [ 914.293916] EXT4-fs (loop3): mount failed [ 914.307704] loop0: detected capacity change from 0 to 512 [ 914.312086] EXT4-fs (loop0): VFS: Can't find ext4 filesystem [ 914.315783] EXT4-fs error (device loop2): ext4_orphan_get:1419: comm syz-executor.2: bad orphan inode 16318464 [ 914.330274] EXT4-fs (loop2): mounted filesystem without journal. Quota mode: none. [ 914.353856] loop1: detected capacity change from 0 to 512 [ 914.359283] loop6: detected capacity change from 0 to 512 [ 914.372783] EXT4-fs (loop6): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 914.373446] EXT4-fs (loop6): group descriptors corrupted! [ 914.377467] EXT4-fs error (device loop2): ext4_validate_block_bitmap:398: comm ext4lazyinit: bg 0: block 2: invalid block bitmap [ 914.386497] EXT4-fs error (device loop1): __ext4_fill_super:5244: inode #2: comm syz-executor.1: iget: root inode unallocated [ 914.388434] EXT4-fs (loop1): get root inode failed [ 914.388872] EXT4-fs (loop1): mount failed 22:25:06 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010100)="00000000080000000000f900b00cb2cc029f49d8b90449a7d5d54d49010000a566", 0x21, 0x4e0}, {&(0x7f0000010400)="020000000300000004", 0x9}], 0x0, &(0x7f0000012c00)) 22:25:06 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000), 0x0, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}], 0x0, &(0x7f0000012c00)) [ 914.435495] EXT4-fs (loop2): unmounting filesystem. 22:25:06 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010100)="00000000080000000000f900b00cb2cc029f49d8b90449a7d5d54d49010000a566", 0x21, 0x4e0}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}], 0x0, &(0x7f0000012c00)) 22:25:06 executing program 2: getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000040), &(0x7f0000000080)=0xc) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010100)="00000000080000000000f900b00cb2cc029f49d8b90449a7d5", 0x19, 0x4e0}, {&(0x7f0000010400)="0200000003000000040000006a000f000300040000000000000000000f00bc0f", 0x20, 0x800}, {&(0x7f0000011600)="ed41000000080000dff4655fe0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}, {0x0}, {0x0}, {0x0}], 0x0, &(0x7f0000012c00)) 22:25:06 executing program 6: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010100)="00000000080000000000f900b00cb2cc029f49d8b90449a7d5d54d49010000a566", 0x21, 0x4e0}, {&(0x7f0000010400), 0x0, 0x800}, {&(0x7f0000011600)="ed41000000080000dff4655fe0f4655fe0f4655f00000000000004", 0x1b, 0x2100}], 0x0, &(0x7f0000012c00)) [ 914.483436] loop4: detected capacity change from 0 to 512 [ 914.488362] EXT4-fs (loop4): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 914.489331] EXT4-fs (loop4): group descriptors corrupted! [ 914.491191] loop2: detected capacity change from 0 to 512 [ 914.506886] loop0: detected capacity change from 0 to 512 [ 914.510746] EXT4-fs (loop0): VFS: Can't find ext4 filesystem [ 914.526299] loop5: detected capacity change from 0 to 512 [ 914.556883] loop6: detected capacity change from 0 to 512 [ 914.560706] EXT4-fs error (device loop2): ext4_orphan_get:1419: comm syz-executor.2: bad orphan inode 16318464 [ 914.565994] EXT4-fs error (device loop5): __ext4_fill_super:5244: inode #2: comm syz-executor.5: iget: root inode unallocated [ 914.567526] EXT4-fs (loop5): get root inode failed [ 914.567983] EXT4-fs (loop5): mount failed [ 914.570220] EXT4-fs (loop2): mounted filesystem without journal. Quota mode: none. [ 914.584307] EXT4-fs (loop6): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 914.585685] EXT4-fs (loop6): group descriptors corrupted! [ 914.662127] EXT4-fs (loop2): unmounting filesystem. 22:25:19 executing program 6: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010100)="00000000080000000000f900b00cb2cc029f49d8b90449a7d5d54d49010000a566", 0x21, 0x4e0}, {&(0x7f0000010400), 0x0, 0x800}, {&(0x7f0000011600)="ed41000000080000dff4655fe0f4655fe0f4655f00000000000004", 0x1b, 0x2100}], 0x0, &(0x7f0000012c00)) 22:25:19 executing program 2: getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000040), &(0x7f0000000080)=0xc) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010100)="00000000080000000000f900b00cb2cc029f49d8b90449a7d5", 0x19, 0x4e0}, {&(0x7f0000010400)="0200000003000000040000006a000f000300040000000000000000000f00bc0f", 0x20, 0x800}, {&(0x7f0000011600)="ed41000000080000dff4655fe0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}, {0x0}, {0x0}, {0x0}], 0x0, &(0x7f0000012c00)) 22:25:19 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010100)="00000000080000000000f900b00cb2cc029f49d8b90449a7d5d54d49010000a566", 0x21, 0x4e0}, {&(0x7f0000010400)="0200000003000000", 0x8, 0x800}], 0x0, &(0x7f0000012c00)) 22:25:19 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010100)="00000000080000000000f900b00cb2cc029f49d8b90449a7d5d54d49010000a566", 0x21, 0x4e0}, {&(0x7f0000010400)="0200000003000000040000006a000f000300040000000000000000000f00bc0f", 0x20, 0x800}, {&(0x7f0000011600)="ed41000000080000dff4655fe0f4655fe0f4655f000000000000", 0x1a, 0x2100}], 0x0, &(0x7f0000012c00)) 22:25:19 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010100)="00000000080000000000f900b00cb2cc029f49d8b90449a7d5d54d49010000a566", 0x21, 0x4e0}], 0x0, &(0x7f0000012c00)) 22:25:19 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}], 0x0, &(0x7f0000012c00)) 22:25:19 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000), 0x0, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}], 0x0, &(0x7f0000012c00)) [ 926.777730] loop2: detected capacity change from 0 to 512 22:25:19 executing program 7: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010100)="00000000080000000000f900b00cb2cc029f49d8b90449a7d5d54d49010000a566", 0x21, 0x4e0}, {&(0x7f0000010400)="0200000003000000", 0x8, 0x800}], 0x0, &(0x7f0000012c00)) [ 926.803076] loop5: detected capacity change from 0 to 512 [ 926.808892] loop7: detected capacity change from 0 to 512 [ 926.811403] loop1: detected capacity change from 0 to 512 [ 926.812574] loop4: detected capacity change from 0 to 512 [ 926.815736] EXT4-fs (loop5): ext4_check_descriptors: Inode table for group 0 overlaps superblock [ 926.816430] EXT4-fs (loop5): group descriptors corrupted! [ 926.819496] EXT4-fs (loop7): ext4_check_descriptors: Inode table for group 0 overlaps superblock [ 926.820169] EXT4-fs (loop7): group descriptors corrupted! [ 926.822233] loop0: detected capacity change from 0 to 512 [ 926.828317] EXT4-fs error (device loop1): __ext4_fill_super:5244: inode #2: comm syz-executor.1: iget: root inode unallocated [ 926.830146] loop3: detected capacity change from 0 to 512 [ 926.831747] EXT4-fs (loop0): VFS: Can't find ext4 filesystem [ 926.833304] loop6: detected capacity change from 0 to 512 [ 926.834975] EXT4-fs (loop1): get root inode failed [ 926.835363] EXT4-fs (loop1): mount failed [ 926.836715] EXT4-fs (loop3): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 926.837408] EXT4-fs (loop3): group descriptors corrupted! [ 926.839451] EXT4-fs error (device loop2): ext4_orphan_get:1419: comm syz-executor.2: bad orphan inode 16318464 [ 926.844495] EXT4-fs error (device loop4): __ext4_fill_super:5244: inode #2: comm syz-executor.4: iget: root inode unallocated [ 926.845453] EXT4-fs (loop2): mounted filesystem without journal. Quota mode: none. [ 926.848012] EXT4-fs (loop4): get root inode failed [ 926.848396] EXT4-fs (loop4): mount failed [ 926.852013] EXT4-fs (loop6): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 926.852693] EXT4-fs (loop6): group descriptors corrupted! [ 926.929117] EXT4-fs (loop2): unmounting filesystem. 22:25:31 executing program 7: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010100)="00000000080000000000f900b00cb2cc029f49d8b90449a7d5d54d49010000a566", 0x21, 0x4e0}, {&(0x7f0000010400)="0200000003000000", 0x8, 0x800}], 0x0, &(0x7f0000012c00)) 22:25:31 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000), 0x0, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}], 0x0, &(0x7f0000012c00)) 22:25:31 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010100)="00000000080000000000f900b00cb2cc029f49d8b90449a7d5d54d49010000a566", 0x21, 0x4e0}, {&(0x7f0000010400)="0200000003000000040000006a000f000300040000000000000000000f00bc0f", 0x20, 0x800}, {&(0x7f0000011600)="ed41000000080000dff4655fe0f4655fe0f4655f00000000000004", 0x1b}], 0x0, &(0x7f0000012c00)) 22:25:31 executing program 6: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010100)="00000000080000000000f900b00cb2cc029f49d8b90449a7d5d54d49010000a566", 0x21, 0x4e0}, {&(0x7f0000010400)="0200000003000000040000006a000f00", 0x10, 0x800}, {&(0x7f0000011600)="ed41000000080000dff4655fe0f4655fe0f4655f00000000000004", 0x1b, 0x2100}], 0x0, &(0x7f0000012c00)) 22:25:31 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010100)="00000000080000000000f900b00cb2cc029f49d8b90449a7d5d54d49010000a566", 0x21, 0x4e0}], 0x0, &(0x7f0000012c00)) 22:25:31 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0x800}], 0x0, &(0x7f0000012c00)) 22:25:31 executing program 2: getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000040), &(0x7f0000000080)=0xc) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010100)="00000000080000000000f900b00cb2cc029f49d8b90449a7d5d54d4901", 0x1d, 0x4e0}, {&(0x7f0000010400)="0200000003000000040000006a000f000300040000000000000000000f00bc0f", 0x20, 0x800}, {&(0x7f0000011600)="ed41000000080000dff4655fe0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}, {0x0}, {0x0}, {0x0}], 0x0, &(0x7f0000012c00)) 22:25:31 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010100)="00000000080000000000f900b00cb2cc029f49d8b90449a7d5d54d49010000a566", 0x21, 0x4e0}, {&(0x7f0000010400)="0200000003000000", 0x8, 0x800}], 0x0, &(0x7f0000012c00)) [ 939.247754] loop6: detected capacity change from 0 to 512 [ 939.249658] loop4: detected capacity change from 0 to 512 [ 939.255357] EXT4-fs (loop4): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 939.256162] EXT4-fs (loop4): group descriptors corrupted! [ 939.258484] loop3: detected capacity change from 0 to 512 [ 939.261198] EXT4-fs (loop3): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 939.261900] EXT4-fs (loop3): group descriptors corrupted! [ 939.265525] EXT4-fs (loop6): corrupt root inode, run e2fsck [ 939.266174] EXT4-fs (loop6): mount failed [ 939.284745] loop5: detected capacity change from 0 to 512 [ 939.303016] loop0: detected capacity change from 0 to 512 [ 939.307437] loop7: detected capacity change from 0 to 512 [ 939.308565] loop1: detected capacity change from 0 to 512 [ 939.315466] loop2: detected capacity change from 0 to 512 [ 939.319013] EXT4-fs (loop5): ext4_check_descriptors: Inode table for group 0 overlaps superblock [ 939.320337] EXT4-fs (loop5): group descriptors corrupted! 22:25:31 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0x800}], 0x0, &(0x7f0000012c00)) [ 939.326058] EXT4-fs (loop0): VFS: Can't find ext4 filesystem [ 939.331526] EXT4-fs (loop7): ext4_check_descriptors: Inode table for group 0 overlaps superblock [ 939.332944] EXT4-fs (loop7): group descriptors corrupted! 22:25:31 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010100)="00000000080000000000f900b00cb2cc029f49d8b90449a7d5d54d49010000a566", 0x21, 0x4e0}], 0x0, &(0x7f0000012c00)) 22:25:31 executing program 6: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010100)="00000000080000000000f900b00cb2cc029f49d8b90449a7d5d54d49010000a566", 0x21, 0x4e0}, {&(0x7f0000010400), 0x0, 0x800}, {&(0x7f0000011600)="ed41000000080000dff4655fe0f4655fe0f4655f00000000000004", 0x1b, 0x2100}], 0x0, &(0x7f0000012c00)) [ 939.341001] EXT4-fs error (device loop1): __ext4_fill_super:5244: inode #2: comm syz-executor.1: iget: root inode unallocated [ 939.344686] EXT4-fs (loop1): get root inode failed [ 939.345490] EXT4-fs (loop1): mount failed [ 939.379924] loop3: detected capacity change from 0 to 512 [ 939.389869] loop4: detected capacity change from 0 to 512 [ 939.393106] loop6: detected capacity change from 0 to 512 [ 939.393510] EXT4-fs (loop3): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 939.394829] EXT4-fs (loop3): group descriptors corrupted! [ 939.396792] EXT4-fs error (device loop2): ext4_orphan_get:1419: comm syz-executor.2: bad orphan inode 16318464 [ 939.406328] EXT4-fs (loop2): mounted filesystem without journal. Quota mode: none. 22:25:31 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010100)="00000000080000000000f900b00cb2cc029f49d8b90449a7d5d54d49010000a566", 0x21, 0x4e0}, {&(0x7f0000010400)="0200000003000000", 0x8, 0x800}], 0x0, &(0x7f0000012c00)) [ 939.435084] EXT4-fs (loop6): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 939.436350] EXT4-fs (loop6): group descriptors corrupted! [ 939.439291] loop5: detected capacity change from 0 to 512 22:25:31 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010100)="00000000080000000000f900b00cb2cc029f49d8b90449a7d5d54d49010000a566", 0x21, 0x4e0}, {0x0, 0x0, 0x800}], 0x0, &(0x7f0000012c00)) [ 939.442046] EXT4-fs (loop4): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 939.443538] EXT4-fs (loop4): group descriptors corrupted! [ 939.445539] EXT4-fs (loop5): ext4_check_descriptors: Inode table for group 0 overlaps superblock [ 939.446330] EXT4-fs (loop5): group descriptors corrupted! 22:25:31 executing program 7: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010100)="00000000080000000000f900b00cb2cc029f49d8b90449a7d5d54d49010000a566", 0x21, 0x4e0}, {&(0x7f0000010400)="0200000003000000", 0x8, 0x800}], 0x0, &(0x7f0000012c00)) 22:25:31 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0", 0x2d, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}], 0x0, &(0x7f0000012c00)) 22:25:31 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010100)="00000000080000000000f900b00cb2cc029f49d8b90449a7d5d54d49010000a566", 0x21, 0x4e0}, {&(0x7f0000010400)="0200000003000000040000006a000f000300040000000000000000000f00bc0f", 0x20, 0x800}, {&(0x7f0000011600)="ed41000000080000dff4655fe0f4655fe0f4655f00000000000004", 0x1b}], 0x0, &(0x7f0000012c00)) 22:25:31 executing program 6: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010100)="00000000080000000000f900b00cb2cc029f49d8b90449a7d5d54d49010000a566", 0x21, 0x4e0}, {&(0x7f0000010400), 0x0, 0x800}, {&(0x7f0000011600)="ed41000000080000dff4655fe0f4655fe0f4655f00000000000004", 0x1b, 0x2100}], 0x0, &(0x7f0000012c00)) 22:25:31 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010100)="00000000080000000000f900b00cb2cc029f49d8b90449a7d5d54d49010000a566", 0x21, 0x4e0}, {&(0x7f0000010400)="020000000300000004", 0x9}], 0x0, &(0x7f0000012c00)) [ 939.525599] loop3: detected capacity change from 0 to 512 [ 939.531057] EXT4-fs (loop3): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 939.531767] EXT4-fs (loop3): group descriptors corrupted! [ 939.547408] EXT4-fs (loop2): unmounting filesystem. 22:25:31 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0x800}], 0x0, &(0x7f0000012c00)) 22:25:31 executing program 2: getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000040), &(0x7f0000000080)=0xc) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010100)="00000000080000000000f900b00cb2cc029f49d8b90449a7d5d54d4901", 0x1d, 0x4e0}, {&(0x7f0000010400)="0200000003000000040000006a000f000300040000000000000000000f00bc0f", 0x20, 0x800}, {&(0x7f0000011600)="ed41000000080000dff4655fe0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}, {0x0}, {0x0}, {0x0}], 0x0, &(0x7f0000012c00)) [ 939.573732] loop0: detected capacity change from 0 to 512 [ 939.575379] loop5: detected capacity change from 0 to 512 [ 939.591286] loop6: detected capacity change from 0 to 512 [ 939.597956] EXT4-fs (loop0): VFS: Can't find ext4 filesystem [ 939.599424] EXT4-fs (loop6): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 939.600253] EXT4-fs (loop6): group descriptors corrupted! [ 939.616906] EXT4-fs (loop5): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 939.618204] EXT4-fs (loop5): group descriptors corrupted! [ 939.623362] loop1: detected capacity change from 0 to 512 [ 939.625732] loop7: detected capacity change from 0 to 512 [ 939.629798] loop2: detected capacity change from 0 to 512 22:25:31 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010100)="00000000080000000000f900b00cb2cc029f49d8b90449a7d5d54d49010000a566", 0x21, 0x4e0}, {0x0, 0x0, 0x800}], 0x0, &(0x7f0000012c00)) [ 939.644849] EXT4-fs (loop7): ext4_check_descriptors: Inode table for group 0 overlaps superblock [ 939.646113] EXT4-fs (loop7): group descriptors corrupted! [ 939.649679] EXT4-fs error (device loop1): __ext4_fill_super:5244: inode #2: comm syz-executor.1: iget: root inode unallocated [ 939.657954] EXT4-fs error (device loop2): ext4_orphan_get:1419: comm syz-executor.2: bad orphan inode 16318464 [ 939.659031] EXT4-fs (loop1): get root inode failed [ 939.659796] EXT4-fs (loop1): mount failed [ 939.661207] loop3: detected capacity change from 0 to 512 [ 939.662217] EXT4-fs (loop2): mounted filesystem without journal. Quota mode: none. 22:25:32 executing program 6: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010100)="00000000080000000000f900b00cb2cc029f49d8b90449a7d5d54d49010000a566", 0x21, 0x4e0}, {&(0x7f0000010400), 0x0, 0x800}, {&(0x7f0000011600)="ed41000000080000dff4655fe0f4655fe0f4655f00000000000004", 0x1b, 0x2100}], 0x0, &(0x7f0000012c00)) [ 939.679601] EXT4-fs (loop2): unmounting filesystem. 22:25:32 executing program 2: getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000040), &(0x7f0000000080)=0xc) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010100)="00000000080000000000f900b00cb2cc029f49d8b90449a7d5d54d4901", 0x1d, 0x4e0}, {&(0x7f0000010400)="0200000003000000040000006a000f000300040000000000000000000f00bc0f", 0x20, 0x800}, {&(0x7f0000011600)="ed41000000080000dff4655fe0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}, {0x0}, {0x0}, {0x0}], 0x0, &(0x7f0000012c00)) [ 939.715868] EXT4-fs (loop3): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 939.717143] EXT4-fs (loop3): group descriptors corrupted! [ 939.745974] loop6: detected capacity change from 0 to 512 [ 939.751910] loop2: detected capacity change from 0 to 512 [ 939.763140] EXT4-fs (loop6): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 939.764485] EXT4-fs (loop6): group descriptors corrupted! [ 939.788581] EXT4-fs error (device loop2): ext4_orphan_get:1419: comm syz-executor.2: bad orphan inode 16318464 22:25:32 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010400), 0x0, 0x800}], 0x0, &(0x7f0000012c00)) [ 939.792351] EXT4-fs (loop2): mounted filesystem without journal. Quota mode: none. 22:25:32 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0", 0x2d, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}], 0x0, &(0x7f0000012c00)) 22:25:32 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010100)="00000000080000000000f900b00cb2cc029f49d8b90449a7d5d54d49010000a566", 0x21, 0x4e0}, {&(0x7f0000010400)="020000000300000004", 0x9}], 0x0, &(0x7f0000012c00)) [ 939.858738] loop5: detected capacity change from 0 to 512 [ 939.871843] EXT4-fs (loop5): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 939.873230] EXT4-fs (loop5): group descriptors corrupted! [ 939.905563] loop4: detected capacity change from 0 to 512 [ 939.935426] EXT4-fs (loop4): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 939.936547] loop0: detected capacity change from 0 to 512 [ 939.936812] EXT4-fs (loop4): group descriptors corrupted! [ 939.945827] EXT4-fs (loop0): VFS: Can't find ext4 filesystem [ 939.946029] EXT4-fs (loop2): unmounting filesystem. 22:25:46 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0", 0x2d, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}], 0x0, &(0x7f0000012c00)) 22:25:46 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010400), 0x0, 0x800}], 0x0, &(0x7f0000012c00)) 22:25:46 executing program 7: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010100)="00000000080000000000f900b00cb2cc029f49d8b90449a7d5d54d49010000a566", 0x21, 0x4e0}, {&(0x7f0000010400)="0200000003000000", 0x8, 0x800}], 0x0, &(0x7f0000012c00)) 22:25:46 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010100)="00000000080000000000f900b00cb2cc029f49d8b90449a7d5d54d49010000a566", 0x21, 0x4e0}, {&(0x7f0000010400)="020000000300000004", 0x9}], 0x0, &(0x7f0000012c00)) 22:25:46 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010100)="00000000080000000000f900b00cb2cc029f49d8b90449a7d5d54d49010000a566", 0x21, 0x4e0}, {&(0x7f0000010400)="0200000003000000040000006a000f000300040000000000000000000f00bc0f", 0x20, 0x800}, {&(0x7f0000011600)="ed41000000080000dff4655fe0f4655fe0f4655f00000000000004", 0x1b}], 0x0, &(0x7f0000012c00)) [ 954.200259] loop0: detected capacity change from 0 to 512 [ 954.203106] EXT4-fs (loop0): VFS: Can't find ext4 filesystem 22:25:46 executing program 6: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010100)="00000000080000000000f900b00cb2cc029f49d8b90449a7d5d54d49010000a566", 0x21, 0x4e0}, {&(0x7f0000010400)="0200000003000000", 0x8, 0x800}, {&(0x7f0000011600)="ed41000000080000dff4655fe0f4655fe0f4655f00000000000004", 0x1b, 0x2100}], 0x0, &(0x7f0000012c00)) 22:25:46 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010100)="00000000080000000000f900b00cb2cc029f49d8b90449a7d5d54d49010000a566", 0x21, 0x4e0}, {0x0, 0x0, 0x800}], 0x0, &(0x7f0000012c00)) 22:25:46 executing program 2: getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000040), &(0x7f0000000080)=0xc) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010100)="00000000080000000000f900b00cb2cc029f49d8b90449a7d5d54d49010000", 0x1f, 0x4e0}, {&(0x7f0000010400)="0200000003000000040000006a000f000300040000000000000000000f00bc0f", 0x20, 0x800}, {&(0x7f0000011600)="ed41000000080000dff4655fe0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}, {0x0}, {0x0}, {0x0}], 0x0, &(0x7f0000012c00)) [ 954.215184] loop6: detected capacity change from 0 to 512 [ 954.228534] EXT4-fs (loop6): ext4_check_descriptors: Inode table for group 0 overlaps superblock [ 954.229229] EXT4-fs (loop6): group descriptors corrupted! [ 954.236373] loop7: detected capacity change from 0 to 512 [ 954.246844] loop4: detected capacity change from 0 to 512 [ 954.262163] EXT4-fs (loop4): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 954.263005] EXT4-fs (loop4): group descriptors corrupted! 22:25:46 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f", 0x44, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}], 0x0, &(0x7f0000012c00)) [ 954.280315] loop2: detected capacity change from 0 to 512 [ 954.281598] loop3: detected capacity change from 0 to 512 [ 954.284945] loop1: detected capacity change from 0 to 512 [ 954.286597] loop5: detected capacity change from 0 to 512 22:25:46 executing program 7: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010100)="00000000080000000000f900b00cb2cc029f49d8b90449a7d5d54d49010000a566", 0x21, 0x4e0}, {&(0x7f0000010400)="0200000003000000", 0x8, 0x800}], 0x0, &(0x7f0000012c00)) [ 954.307471] EXT4-fs (loop5): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 954.308957] EXT4-fs (loop5): group descriptors corrupted! [ 954.310032] EXT4-fs (loop3): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 954.311494] EXT4-fs (loop3): group descriptors corrupted! 22:25:46 executing program 6: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010100)="00000000080000000000f900b00cb2cc029f49d8b90449a7d5d54d49010000a566", 0x21, 0x4e0}, {&(0x7f0000010400)="0200000003000000", 0x8, 0x800}, {&(0x7f0000011600)="ed41000000080000dff4655fe0f4655fe0f4655f00000000000004", 0x1b, 0x2100}], 0x0, &(0x7f0000012c00)) [ 954.319457] EXT4-fs error (device loop1): __ext4_fill_super:5244: inode #2: comm syz-executor.1: iget: root inode unallocated [ 954.321940] EXT4-fs (loop1): get root inode failed [ 954.322787] EXT4-fs (loop1): mount failed [ 954.325825] EXT4-fs error (device loop2): ext4_orphan_get:1419: comm syz-executor.2: bad orphan inode 16318464 [ 954.329530] loop0: detected capacity change from 0 to 512 22:25:46 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010400), 0x0, 0x800}], 0x0, &(0x7f0000012c00)) [ 954.360426] EXT4-fs (loop2): mounted filesystem without journal. Quota mode: none. [ 954.381522] loop7: detected capacity change from 0 to 512 [ 954.384360] loop4: detected capacity change from 0 to 512 [ 954.392705] loop6: detected capacity change from 0 to 512 [ 954.393919] EXT4-fs (loop4): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 954.394635] EXT4-fs (loop4): group descriptors corrupted! [ 954.416170] EXT4-fs error (device loop0): __ext4_fill_super:5244: inode #2: comm syz-executor.0: iget: root inode unallocated [ 954.418495] EXT4-fs (loop0): get root inode failed [ 954.418936] EXT4-fs (loop0): mount failed 22:25:46 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010100)="00000000080000000000f900b00cb2cc029f49d8b90449a7d5d54d49010000a566", 0x21, 0x4e0}, {&(0x7f0000011600)="ed41000000080000dff4655fe0f4655fe0f4655f00000000000004", 0x1b, 0x2100}], 0x0, &(0x7f0000012c00)) 22:25:46 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010400)="0200000003", 0x5, 0x800}], 0x0, &(0x7f0000012c00)) [ 954.432993] EXT4-fs (loop6): ext4_check_descriptors: Inode table for group 0 overlaps superblock [ 954.434457] EXT4-fs (loop6): group descriptors corrupted! [ 954.522245] loop4: detected capacity change from 0 to 512 [ 954.527213] EXT4-fs (loop4): ext4_check_descriptors: Inode table for group 0 overlaps superblock [ 954.527849] EXT4-fs (loop4): group descriptors corrupted! [ 954.540198] EXT4-fs (loop2): unmounting filesystem. [ 954.562533] loop1: detected capacity change from 0 to 512 [ 954.572004] EXT4-fs (loop1): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 954.572638] EXT4-fs (loop1): group descriptors corrupted! 22:25:59 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010100)="00000000080000000000f900b00cb2cc029f49d8b90449a7d5d54d49010000a566", 0x21, 0x4e0}, {&(0x7f0000011600)="ed41000000080000dff4655fe0f4655fe0f4655f00000000000004", 0x1b, 0x2100}], 0x0, &(0x7f0000012c00)) 22:25:59 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}], 0x0, &(0x7f0000012c00)) 22:25:59 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010400)="0200000003", 0x5, 0x800}], 0x0, &(0x7f0000012c00)) [ 967.527264] loop1: detected capacity change from 0 to 512 22:25:59 executing program 2: getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000040), &(0x7f0000000080)=0xc) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010100)="00000000080000000000f900b00cb2cc029f49d8b90449a7d5d54d49010000", 0x1f, 0x4e0}, {&(0x7f0000010400)="0200000003000000040000006a000f000300040000000000000000000f00bc0f", 0x20, 0x800}, {&(0x7f0000011600)="ed41000000080000dff4655fe0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}, {0x0}, {0x0}, {0x0}], 0x0, &(0x7f0000012c00)) 22:25:59 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4", 0x2e, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}], 0x0, &(0x7f0000012c00)) 22:25:59 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010100)="00000000080000000000f900b00cb2cc029f49d8b90449a7d5d54d49010000a566", 0x21, 0x4e0}, {&(0x7f0000010400), 0x0, 0x800}], 0x0, &(0x7f0000012c00)) 22:25:59 executing program 7: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010100)="00000000080000000000f900b00cb2cc029f49d8b90449a7d5d54d49010000a566", 0x21, 0x4e0}, {&(0x7f0000010400)="0200000003000000", 0x8, 0x800}], 0x0, &(0x7f0000012c00)) 22:25:59 executing program 6: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010100)="00000000080000000000f900b00cb2cc029f49d8b90449a7d5d54d49010000a566", 0x21, 0x4e0}, {&(0x7f0000010400)="0200000003000000", 0x8, 0x800}, {&(0x7f0000011600)="ed41000000080000dff4655fe0f4655fe0f4655f00000000000004", 0x1b, 0x2100}], 0x0, &(0x7f0000012c00)) [ 967.536414] loop6: detected capacity change from 0 to 512 [ 967.540259] EXT4-fs (loop6): ext4_check_descriptors: Inode table for group 0 overlaps superblock [ 967.540962] EXT4-fs (loop6): group descriptors corrupted! [ 967.550421] EXT4-fs (loop1): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 967.551130] EXT4-fs (loop1): group descriptors corrupted! [ 967.566448] loop5: detected capacity change from 0 to 512 [ 967.584233] loop7: detected capacity change from 0 to 512 [ 967.584834] loop0: detected capacity change from 0 to 512 22:25:59 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010100)="00000000080000000000f900b00cb2cc029f49d8b90449a7d5d54d49010000a566", 0x21, 0x4e0}, {&(0x7f0000011600)="ed41000000080000dff4655fe0f4655fe0f4655f00000000000004", 0x1b, 0x2100}], 0x0, &(0x7f0000012c00)) 22:25:59 executing program 6: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010100)="00000000080000000000f900b00cb2cc029f49d8b90449a7d5d54d49010000a566", 0x21, 0x4e0}, {&(0x7f0000010400)="020000000300000004000000", 0xc, 0x800}, {&(0x7f0000011600)="ed41000000080000dff4655fe0f4655fe0f4655f00000000000004", 0x1b, 0x2100}], 0x0, &(0x7f0000012c00)) [ 967.597224] EXT4-fs (loop0): VFS: Can't find ext4 filesystem [ 967.600157] loop4: detected capacity change from 0 to 512 [ 967.603512] EXT4-fs (loop4): ext4_check_descriptors: Inode table for group 0 overlaps superblock [ 967.604301] EXT4-fs (loop4): group descriptors corrupted! [ 967.606680] loop3: detected capacity change from 0 to 512 [ 967.606768] loop2: detected capacity change from 0 to 512 [ 967.609727] EXT4-fs error (device loop5): __ext4_fill_super:5244: inode #2: comm syz-executor.5: iget: root inode unallocated [ 967.614895] EXT4-fs (loop5): get root inode failed [ 967.615717] EXT4-fs (loop5): mount failed [ 967.619042] EXT4-fs (loop3): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 967.620340] EXT4-fs (loop3): group descriptors corrupted! 22:26:00 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010400)="0200000003", 0x5, 0x800}], 0x0, &(0x7f0000012c00)) [ 967.695904] EXT4-fs error (device loop2): ext4_orphan_get:1419: comm syz-executor.2: bad orphan inode 16318464 22:26:00 executing program 7: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', 0x0, 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010100)="00000000080000000000f900b00cb2cc029f49d8b90449a7d5d54d49010000a566", 0x21, 0x4e0}, {&(0x7f0000010400)="0200000003000000", 0x8, 0x800}], 0x0, &(0x7f0000012c00)) [ 967.704998] EXT4-fs (loop2): mounted filesystem without journal. Quota mode: none. [ 967.712446] loop6: detected capacity change from 0 to 512 22:26:00 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0x800}], 0x0, &(0x7f0000012c00)) 22:26:00 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4", 0x2e, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}], 0x0, &(0x7f0000012c00)) [ 967.767214] loop1: detected capacity change from 0 to 512 [ 967.781571] EXT4-fs (loop6): corrupt root inode, run e2fsck [ 967.796965] EXT4-fs (loop6): mount failed 22:26:00 executing program 2: getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000040), &(0x7f0000000080)=0xc) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010100)="00000000080000000000f900b00cb2cc029f49d8b90449a7d5d54d49010000", 0x1f, 0x4e0}, {&(0x7f0000010400)="0200000003000000040000006a000f000300040000000000000000000f00bc0f", 0x20, 0x800}, {&(0x7f0000011600)="ed41000000080000dff4655fe0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}, {0x0}, {0x0}, {0x0}], 0x0, &(0x7f0000012c00)) [ 967.814428] EXT4-fs (loop1): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 967.815727] EXT4-fs (loop1): group descriptors corrupted! [ 967.824404] EXT4-fs (loop2): unmounting filesystem. [ 967.850411] loop7: detected capacity change from 0 to 512 [ 967.850796] loop5: detected capacity change from 0 to 512 [ 967.862898] EXT4-fs (loop5): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 967.864249] EXT4-fs (loop5): group descriptors corrupted! [ 967.868326] loop4: detected capacity change from 0 to 512 [ 967.886463] loop0: detected capacity change from 0 to 512 [ 967.894098] EXT4-fs (loop4): ext4_check_descriptors: Inode table for group 0 overlaps superblock [ 967.895393] EXT4-fs (loop4): group descriptors corrupted! [ 967.914465] EXT4-fs (loop0): VFS: Can't find ext4 filesystem [ 967.943500] loop2: detected capacity change from 0 to 512 [ 967.992654] EXT4-fs error (device loop2): ext4_orphan_get:1419: comm syz-executor.2: bad orphan inode 16318464 [ 967.994587] EXT4-fs (loop2): mounted filesystem without journal. Quota mode: none. [ 968.049888] EXT4-fs (loop2): unmounting filesystem. [ 981.956167] loop0: detected capacity change from 0 to 512 22:26:14 executing program 2: getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000040), &(0x7f0000000080)=0xc) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010100)="00000000080000000000f900b00cb2cc029f49d8b90449a7d5d54d49010000a5", 0x20, 0x4e0}, {&(0x7f0000010400)="0200000003000000040000006a000f000300040000000000000000000f00bc0f", 0x20, 0x800}, {&(0x7f0000011600)="ed41000000080000dff4655fe0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}, {0x0}, {0x0}, {0x0}], 0x0, &(0x7f0000012c00)) 22:26:14 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4", 0x2e, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}], 0x0, &(0x7f0000012c00)) 22:26:14 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010100)="00000000080000000000f900b00cb2cc029f49d8b90449a7d5d54d49010000a566", 0x21, 0x4e0}, {&(0x7f0000010400), 0x0, 0x800}], 0x0, &(0x7f0000012c00)) 22:26:14 executing program 7: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', 0x0, 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010100)="00000000080000000000f900b00cb2cc029f49d8b90449a7d5d54d49010000a566", 0x21, 0x4e0}, {&(0x7f0000010400)="0200000003000000", 0x8, 0x800}], 0x0, &(0x7f0000012c00)) [ 981.958979] loop2: detected capacity change from 0 to 512 [ 981.966411] loop3: detected capacity change from 0 to 512 22:26:14 executing program 6: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010100)="00000000080000000000f900b00cb2cc029f49d8b90449a7d5d54d49010000a566", 0x21, 0x4e0}, {&(0x7f0000010400)="020000000300000004000000", 0xc, 0x800}, {&(0x7f0000011600)="ed41000000080000dff4655fe0f4655fe0f4655f00000000000004", 0x1b, 0x2100}], 0x0, &(0x7f0000012c00)) 22:26:14 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010100)="00000000080000000000f900b00cb2cc029f49d8b90449a7d5d54d49010000a566", 0x21, 0x4e0}, {0x0, 0x0, 0x800}, {&(0x7f0000011600)="ed41000000080000dff4655fe0f4655fe0f4655f00000000000004", 0x1b, 0x2100}], 0x0, &(0x7f0000012c00)) 22:26:14 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0x800}], 0x0, &(0x7f0000012c00)) 22:26:14 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010400)="02000000030000", 0x7, 0x800}], 0x0, &(0x7f0000012c00)) [ 981.977521] EXT4-fs (loop3): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 981.978226] EXT4-fs (loop3): group descriptors corrupted! [ 981.978281] loop4: detected capacity change from 0 to 512 [ 981.982358] EXT4-fs (loop0): VFS: Can't find ext4 filesystem [ 982.004866] loop7: detected capacity change from 0 to 512 [ 982.013796] EXT4-fs (loop4): ext4_check_descriptors: Inode table for group 0 overlaps superblock [ 982.015179] EXT4-fs (loop4): group descriptors corrupted! [ 982.017515] loop6: detected capacity change from 0 to 512 22:26:14 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53", 0x39, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}], 0x0, &(0x7f0000012c00)) 22:26:14 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010100)="00000000080000000000f900b00cb2cc029f49d8b90449a7d5d54d49010000a566", 0x21, 0x4e0}, {&(0x7f0000010400), 0x0, 0x800}], 0x0, &(0x7f0000012c00)) [ 982.034107] EXT4-fs error (device loop2): ext4_orphan_get:1419: comm syz-executor.2: bad orphan inode 16318464 [ 982.052082] loop3: detected capacity change from 0 to 512 [ 982.054705] EXT4-fs (loop6): corrupt root inode, run e2fsck [ 982.055192] EXT4-fs (loop6): mount failed [ 982.059481] EXT4-fs (loop2): mounted filesystem without journal. Quota mode: none. [ 982.062987] loop5: detected capacity change from 0 to 512 [ 982.065759] EXT4-fs (loop3): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 982.067217] EXT4-fs (loop3): group descriptors corrupted! [ 982.069830] loop1: detected capacity change from 0 to 512 [ 982.073006] EXT4-fs (loop1): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 982.074117] EXT4-fs (loop1): group descriptors corrupted! [ 982.077714] loop0: detected capacity change from 0 to 512 [ 982.081979] EXT4-fs (loop0): VFS: Can't find ext4 filesystem 22:26:14 executing program 2: getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000040), &(0x7f0000000080)=0xc) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010100)="00000000080000000000f900b00cb2cc029f49d8b90449a7d5d54d49010000a5", 0x20, 0x4e0}, {&(0x7f0000010400)="0200000003000000040000006a000f000300040000000000000000000f00bc0f", 0x20, 0x800}, {&(0x7f0000011600)="ed41000000080000dff4655fe0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}, {0x0}, {0x0}, {0x0}], 0x0, &(0x7f0000012c00)) [ 982.105571] EXT4-fs (loop2): unmounting filesystem. [ 982.116233] EXT4-fs (loop5): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 982.117587] EXT4-fs (loop5): group descriptors corrupted! 22:26:14 executing program 6: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010100)="00000000080000000000f900b00cb2cc029f49d8b90449a7d5d54d49010000a566", 0x21, 0x4e0}, {&(0x7f0000010400)="0200000003000000", 0x8, 0x800}, {&(0x7f0000011600)="ed41000000080000dff4655fe0f4655fe0f4655f00000000000004", 0x1b, 0x2100}], 0x0, &(0x7f0000012c00)) [ 982.168515] loop2: detected capacity change from 0 to 512 22:26:14 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010100)="00000000080000000000f900b00cb2cc029f49d8b90449a7d5d54d49010000a566", 0x21, 0x4e0}, {0x0, 0x0, 0x800}, {&(0x7f0000011600)="ed41000000080000dff4655fe0f4655fe0f4655f00000000000004", 0x1b, 0x2100}], 0x0, &(0x7f0000012c00)) [ 982.182142] loop6: detected capacity change from 0 to 512 [ 982.187275] EXT4-fs error (device loop2): ext4_orphan_get:1419: comm syz-executor.2: bad orphan inode 16318464 22:26:14 executing program 7: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', 0x0, 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010100)="00000000080000000000f900b00cb2cc029f49d8b90449a7d5d54d49010000a566", 0x21, 0x4e0}, {&(0x7f0000010400)="0200000003000000", 0x8, 0x800}], 0x0, &(0x7f0000012c00)) [ 982.195798] EXT4-fs (loop2): mounted filesystem without journal. Quota mode: none. [ 982.206013] EXT4-fs (loop6): ext4_check_descriptors: Inode table for group 0 overlaps superblock [ 982.207536] EXT4-fs (loop6): group descriptors corrupted! 22:26:14 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010400)="02000000030000", 0x7, 0x800}], 0x0, &(0x7f0000012c00)) 22:26:14 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010100)="00000000080000000000f900b00cb2cc029f49d8b90449a7d5d54d49010000a566", 0x21, 0x4e0}, {&(0x7f0000010400)="0200000003000000040000006a000f00", 0x10, 0x800}], 0x0, &(0x7f0000012c00)) 22:26:14 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53", 0x39, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}], 0x0, &(0x7f0000012c00)) [ 982.266588] loop7: detected capacity change from 0 to 512 [ 982.275305] loop4: detected capacity change from 0 to 512 [ 982.281318] loop3: detected capacity change from 0 to 512 [ 982.304800] EXT4-fs (loop4): ext4_check_descriptors: Inode table for group 0 overlaps superblock [ 982.305468] EXT4-fs (loop4): group descriptors corrupted! [ 982.317177] loop1: detected capacity change from 0 to 512 [ 982.318230] EXT4-fs error (device loop3): __ext4_fill_super:5244: inode #2: comm syz-executor.3: iget: root inode unallocated [ 982.320012] EXT4-fs (loop3): get root inode failed [ 982.320400] EXT4-fs (loop3): mount failed [ 982.327107] loop0: detected capacity change from 0 to 512 [ 982.348077] EXT4-fs (loop0): VFS: Can't find ext4 filesystem [ 982.350584] EXT4-fs (loop1): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 982.351362] EXT4-fs (loop1): group descriptors corrupted! [ 982.355791] EXT4-fs (loop2): unmounting filesystem. 22:26:28 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010100)="00000000080000000000f900b00cb2cc029f49d8b90449a7d5d54d49010000a566", 0x21, 0x4e0}, {0x0, 0x0, 0x800}, {&(0x7f0000011600)="ed41000000080000dff4655fe0f4655fe0f4655f00000000000004", 0x1b, 0x2100}], 0x0, &(0x7f0000012c00)) 22:26:28 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53", 0x39, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}], 0x0, &(0x7f0000012c00)) 22:26:28 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010400)="02000000030000", 0x7, 0x800}], 0x0, &(0x7f0000012c00)) 22:26:28 executing program 2: getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000040), &(0x7f0000000080)=0xc) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010100)="00000000080000000000f900b00cb2cc029f49d8b90449a7d5d54d49010000a5", 0x20, 0x4e0}, {&(0x7f0000010400)="0200000003000000040000006a000f000300040000000000000000000f00bc0f", 0x20, 0x800}, {&(0x7f0000011600)="ed41000000080000dff4655fe0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}, {0x0}, {0x0}, {0x0}], 0x0, &(0x7f0000012c00)) 22:26:28 executing program 6: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010100)="00000000080000000000f900b00cb2cc029f49d8b90449a7d5d54d49010000a566", 0x21, 0x4e0}, {&(0x7f0000010400)="0200000003000000", 0x8, 0x800}, {&(0x7f0000011600)="ed41000000080000dff4655fe0f4655fe0f4655f00000000000004", 0x1b, 0x2100}], 0x0, &(0x7f0000012c00)) 22:26:28 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010100)="00000000080000000000f900b00cb2cc029f49d8b90449a7d5d54d49010000a566", 0x21, 0x4e0}, {&(0x7f0000010400), 0x0, 0x800}], 0x0, &(0x7f0000012c00)) 22:26:28 executing program 7: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010100)="00000000080000000000f900b00cb2cc029f49d8b90449a7d5d54d49010000a566", 0x21, 0x4e0}, {&(0x7f0000010400)="0200000003000000", 0x8, 0x800}], 0x0, &(0x7f0000012c00)) [ 996.117367] loop7: detected capacity change from 0 to 8 [ 996.118028] loop2: detected capacity change from 0 to 512 [ 996.122927] EXT4-fs (loop7): bad geometry: block count 128 exceeds size of device (2 blocks) [ 996.127246] loop6: detected capacity change from 0 to 512 22:26:28 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0x800}], 0x0, &(0x7f0000012c00)) [ 996.154321] EXT4-fs error (device loop2): ext4_orphan_get:1419: comm syz-executor.2: bad orphan inode 16318464 22:26:28 executing program 7: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010100)="00000000080000000000f900b00cb2cc029f49d8b90449a7d5d54d49010000a566", 0x21, 0x4e0}, {&(0x7f0000010400)="0200000003000000", 0x8, 0x800}], 0x0, &(0x7f0000012c00)) [ 996.158816] EXT4-fs (loop2): mounted filesystem without journal. Quota mode: none. [ 996.164916] EXT4-fs (loop6): ext4_check_descriptors: Inode table for group 0 overlaps superblock [ 996.166760] EXT4-fs (loop6): group descriptors corrupted! 22:26:28 executing program 2: getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000040), &(0x7f0000000080)=0xc) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010100)="00000000080000000000f900b00cb2cc029f49d8b90449a7d5d54d49010000a566", 0x21}, {&(0x7f0000010400)="0200000003000000040000006a000f000300040000000000000000000f00bc0f", 0x20, 0x800}, {&(0x7f0000011600)="ed41000000080000dff4655fe0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}, {0x0}, {0x0}, {0x0}], 0x0, &(0x7f0000012c00)) [ 996.188780] loop7: detected capacity change from 0 to 8 [ 996.192913] EXT4-fs (loop2): unmounting filesystem. [ 996.196267] loop4: detected capacity change from 0 to 512 [ 996.199556] loop0: detected capacity change from 0 to 512 [ 996.200092] loop1: detected capacity change from 0 to 512 [ 996.203492] EXT4-fs (loop0): VFS: Can't find ext4 filesystem [ 996.208652] loop3: detected capacity change from 0 to 512 [ 996.238501] EXT4-fs (loop7): bad geometry: block count 128 exceeds size of device (2 blocks) [ 996.240811] EXT4-fs (loop1): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 996.242185] EXT4-fs (loop1): group descriptors corrupted! [ 996.246350] loop5: detected capacity change from 0 to 512 [ 996.251993] EXT4-fs (loop4): ext4_check_descriptors: Inode table for group 0 overlaps superblock [ 996.253466] EXT4-fs (loop4): group descriptors corrupted! [ 996.256820] EXT4-fs (loop3): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 996.258205] EXT4-fs (loop3): group descriptors corrupted! [ 996.275900] EXT4-fs (loop5): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 996.277160] EXT4-fs (loop5): group descriptors corrupted! 22:26:28 executing program 6: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010100)="00000000080000000000f900b00cb2cc029f49d8b90449a7d5d54d49010000a566", 0x21, 0x4e0}, {&(0x7f0000010400)="0200000003000000", 0x8, 0x800}, {&(0x7f0000011600)="ed41000000080000dff4655fe0f4655fe0f4655f00000000000004", 0x1b, 0x2100}], 0x0, &(0x7f0000012c00)) 22:26:28 executing program 7: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010100)="00000000080000000000f900b00cb2cc029f49d8b90449a7d5d54d49010000a566", 0x21, 0x4e0}, {&(0x7f0000010400)="0200000003000000", 0x8, 0x800}], 0x0, &(0x7f0000012c00)) 22:26:28 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010100)="00000000080000000000f900b00cb2cc029f49d8b90449a7d5d54d49010000a566", 0x21, 0x4e0}, {&(0x7f0000010400), 0x0, 0x800}, {&(0x7f0000011600)="ed41000000080000dff4655fe0f4655fe0f4655f00000000000004", 0x1b, 0x2100}], 0x0, &(0x7f0000012c00)) 22:26:28 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef0100010000", 0x3f, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}], 0x0, &(0x7f0000012c00)) [ 996.381903] loop2: detected capacity change from 0 to 512 22:26:28 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010400), 0x0, 0x800}], 0x0, &(0x7f0000012c00)) 22:26:28 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010400)="0200000003000000", 0x8, 0x800}], 0x0, &(0x7f0000012c00)) [ 996.439676] EXT4-fs (loop2): mounted filesystem without journal. Quota mode: none. [ 996.471066] loop0: detected capacity change from 0 to 512 [ 996.488417] loop4: detected capacity change from 0 to 512 [ 996.491136] loop6: detected capacity change from 0 to 512 [ 996.493457] EXT4-fs (loop2): unmounting filesystem. [ 996.501649] loop1: detected capacity change from 0 to 512 [ 996.506515] EXT4-fs error (device loop0): __ext4_fill_super:5244: inode #2: comm syz-executor.0: iget: root inode unallocated [ 996.509119] EXT4-fs (loop0): get root inode failed [ 996.509866] EXT4-fs (loop0): mount failed [ 996.522220] EXT4-fs (loop6): ext4_check_descriptors: Inode table for group 0 overlaps superblock [ 996.523475] EXT4-fs (loop6): group descriptors corrupted! [ 996.527582] EXT4-fs (loop4): ext4_check_descriptors: Inode table for group 0 overlaps superblock [ 996.528876] EXT4-fs (loop4): group descriptors corrupted! [ 996.541188] EXT4-fs (loop1): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 996.542565] EXT4-fs (loop1): group descriptors corrupted! [ 996.549347] loop5: detected capacity change from 0 to 512 [ 996.573791] EXT4-fs (loop5): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 996.575072] EXT4-fs (loop5): group descriptors corrupted! 22:26:42 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010400), 0x0, 0x800}], 0x0, &(0x7f0000012c00)) 22:26:42 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010100)="00000000080000000000f900b00cb2cc029f49d8b90449a7d5d54d49010000a566", 0x21, 0x4e0}, {&(0x7f0000010400), 0x0, 0x800}], 0x0, &(0x7f0000012c00)) 22:26:42 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}], 0x0, &(0x7f0000012c00)) 22:26:42 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010400)="0200000003000000", 0x8, 0x800}], 0x0, &(0x7f0000012c00)) 22:26:42 executing program 7: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x0, 0x0, 0x0, &(0x7f0000012c00)) 22:26:42 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010100)="00000000080000000000f900b00cb2cc029f49d8b90449a7d5d54d49010000a566", 0x21, 0x4e0}, {&(0x7f0000010400), 0x0, 0x800}, {&(0x7f0000011600)="ed41000000080000dff4655fe0f4655fe0f4655f00000000000004", 0x1b, 0x2100}], 0x0, &(0x7f0000012c00)) 22:26:42 executing program 6: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010100)="00000000080000000000f900b00cb2cc029f49d8b90449a7d5d54d49010000a566", 0x21, 0x4e0}, {&(0x7f0000010400)="02000000030000000400", 0xa, 0x800}, {&(0x7f0000011600)="ed41000000080000dff4655fe0f4655fe0f4655f00000000000004", 0x1b, 0x2100}], 0x0, &(0x7f0000012c00)) 22:26:42 executing program 2: getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000040), &(0x7f0000000080)=0xc) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010100)="00000000080000000000f900b00cb2cc029f49d8b90449a7d5d54d49010000a566", 0x21}, {&(0x7f0000010400)="0200000003000000040000006a000f000300040000000000000000000f00bc0f", 0x20, 0x800}, {&(0x7f0000011600)="ed41000000080000dff4655fe0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}, {0x0}, {0x0}, {0x0}], 0x0, &(0x7f0000012c00)) [ 1010.477340] loop3: detected capacity change from 0 to 512 [ 1010.500910] EXT4-fs (loop3): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 1010.501452] loop1: detected capacity change from 0 to 512 [ 1010.502395] EXT4-fs (loop3): group descriptors corrupted! [ 1010.508578] loop5: detected capacity change from 0 to 512 [ 1010.511349] loop6: detected capacity change from 0 to 512 [ 1010.514415] No source specified [ 1010.518029] loop4: detected capacity change from 0 to 512 [ 1010.521045] loop0: detected capacity change from 0 to 512 [ 1010.523913] EXT4-fs (loop5): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 1010.525041] EXT4-fs (loop5): group descriptors corrupted! [ 1010.526238] loop2: detected capacity change from 0 to 512 [ 1010.527198] EXT4-fs (loop1): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 1010.528316] EXT4-fs (loop1): group descriptors corrupted! [ 1010.540518] EXT4-fs (loop4): ext4_check_descriptors: Inode table for group 0 overlaps superblock [ 1010.541938] EXT4-fs (loop4): group descriptors corrupted! [ 1010.544554] EXT4-fs (loop6): corrupt root inode, run e2fsck [ 1010.545328] EXT4-fs (loop6): mount failed [ 1010.554703] EXT4-fs error (device loop0): __ext4_fill_super:5244: inode #2: comm syz-executor.0: iget: root inode unallocated [ 1010.559011] EXT4-fs (loop0): get root inode failed [ 1010.559858] EXT4-fs (loop0): mount failed [ 1010.591522] EXT4-fs (loop2): mounted filesystem without journal. Quota mode: none. 22:26:42 executing program 7: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x0, 0x0, 0x0, &(0x7f0000012c00)) 22:26:42 executing program 6: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010100)="00000000080000000000f900b00cb2cc029f49d8b90449a7d5d54d49010000a566", 0x21, 0x4e0}, {&(0x7f0000010400)="0200000003000000", 0x8, 0x800}, {&(0x7f0000011600)="ed41000000080000dff4655fe0f4655fe0f4655f00000000000004", 0x1b, 0x2100}], 0x0, &(0x7f0000012c00)) [ 1010.666526] loop6: detected capacity change from 0 to 512 [ 1010.670160] EXT4-fs (loop6): ext4_check_descriptors: Inode table for group 0 overlaps superblock [ 1010.671250] EXT4-fs (loop6): group descriptors corrupted! [ 1010.730986] No source specified [ 1010.750747] EXT4-fs (loop2): unmounting filesystem. 22:26:56 executing program 7: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x0, 0x0, 0x0, &(0x7f0000012c00)) [ 1024.654888] loop3: detected capacity change from 0 to 512 [ 1024.658779] loop0: detected capacity change from 0 to 512 22:26:56 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010100)="00000000080000000000f900b00cb2cc029f49d8b90449a7d5d54d49010000a566", 0x21, 0x4e0}, {&(0x7f0000010400), 0x0, 0x800}, {&(0x7f0000011600)="ed41000000080000dff4655fe0f4655fe0f4655f00000000000004", 0x1b, 0x2100}], 0x0, &(0x7f0000012c00)) 22:26:56 executing program 2: getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000040), &(0x7f0000000080)=0xc) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010100)="00000000080000000000f900b00cb2cc029f49d8b90449a7d5d54d49010000a566", 0x21}, {&(0x7f0000010400)="0200000003000000040000006a000f000300040000000000000000000f00bc0f", 0x20, 0x800}, {&(0x7f0000011600)="ed41000000080000dff4655fe0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}, {0x0}, {0x0}, {0x0}], 0x0, &(0x7f0000012c00)) 22:26:56 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010100)="00000000080000000000f900b00cb2cc029f49d8b90449a7d5d54d49010000a566", 0x21, 0x4e0}, {&(0x7f0000010400), 0x0, 0x800}], 0x0, &(0x7f0000012c00)) 22:26:56 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010400), 0x0, 0x800}], 0x0, &(0x7f0000012c00)) 22:26:56 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f01", 0x35, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}], 0x0, &(0x7f0000012c00)) 22:26:56 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010400)="0200000003000000", 0x8, 0x800}], 0x0, &(0x7f0000012c00)) 22:26:57 executing program 6: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010100)="00000000080000000000f900b00cb2cc029f49d8b90449a7d5d54d49010000a566", 0x21, 0x4e0}, {&(0x7f0000010400)="0200000003000000", 0x8, 0x800}, {&(0x7f0000011600)="ed41000000080000dff4655fe0f4655fe0f4655f00000000000004", 0x1b, 0x2100}], 0x0, &(0x7f0000012c00)) [ 1024.667572] EXT4-fs (loop0): VFS: Can't find ext4 filesystem [ 1024.668510] EXT4-fs (loop3): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 1024.669861] EXT4-fs (loop3): group descriptors corrupted! [ 1024.690262] loop6: detected capacity change from 0 to 512 [ 1024.692301] loop5: detected capacity change from 0 to 512 [ 1024.702975] loop4: detected capacity change from 0 to 512 [ 1024.703188] loop1: detected capacity change from 0 to 512 [ 1024.705996] loop2: detected capacity change from 0 to 512 [ 1024.709010] No source specified [ 1024.723018] EXT4-fs (loop6): ext4_check_descriptors: Inode table for group 0 overlaps superblock [ 1024.724341] EXT4-fs (loop6): group descriptors corrupted! [ 1024.725054] EXT4-fs (loop4): ext4_check_descriptors: Inode table for group 0 overlaps superblock [ 1024.725079] EXT4-fs (loop4): group descriptors corrupted! [ 1024.731218] EXT4-fs (loop5): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 1024.732479] EXT4-fs (loop5): group descriptors corrupted! [ 1024.740423] EXT4-fs (loop1): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 1024.741671] EXT4-fs (loop1): group descriptors corrupted! [ 1024.759642] EXT4-fs (loop2): mounted filesystem without journal. Quota mode: none. 22:26:57 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f01", 0x35, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}], 0x0, &(0x7f0000012c00)) 22:26:57 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010100)="00000000080000000000f900b00cb2cc029f49d8b90449a7d5d54d49010000a566", 0x21, 0x4e0}, {&(0x7f0000010400)="0200000003000000", 0x8, 0x800}], 0x0, &(0x7f0000012c00)) 22:26:57 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010400)="0200000003", 0x5, 0x800}], 0x0, &(0x7f0000012c00)) 22:26:57 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010100)="00000000080000000000f900b00cb2cc029f49d8b90449a7d5d54d49010000a566", 0x21, 0x4e0}, {&(0x7f0000010400)="0200000003000000040000006a000f00", 0x10, 0x800}, {&(0x7f0000011600)="ed41000000080000dff4655fe0f4655fe0f4655f00000000000004", 0x1b, 0x2100}], 0x0, &(0x7f0000012c00)) 22:26:57 executing program 6: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010100)="00000000080000000000f900b00cb2cc029f49d8b90449a7d5d54d49010000a566", 0x21, 0x4e0}, {&(0x7f0000010400)="0200000003000000", 0x8, 0x800}, {&(0x7f0000011600)="ed41000000080000dff4655fe0f4655fe0f4655f00000000000004", 0x1b, 0x2100}], 0x0, &(0x7f0000012c00)) 22:26:57 executing program 7: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010100)="00000000080000000000f900b00cb2cc029f49d8b90449a7d5d54d49010000a566", 0x21, 0x4e0}], 0x0, &(0x7f0000012c00)) 22:26:57 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9}], 0x0, &(0x7f0000012c00)) [ 1024.875941] loop0: detected capacity change from 0 to 512 [ 1024.888008] EXT4-fs (loop0): VFS: Can't find ext4 filesystem 22:26:57 executing program 2: getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000040), &(0x7f0000000080)=0xc) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010100)="00000000080000000000f900b00cb2cc029f49d8b90449a7d5d54d49010000a566", 0x21, 0x4e0}, {&(0x7f0000010400)="0200000003000000040000006a000f000300040000000000000000000f00bc0f", 0x20, 0x800}, {&(0x7f0000011600)="ed41000000080000dff4655fe0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}, {0x0}, {0x0}, {0x0}], 0x0, &(0x7f0000012c00)) [ 1024.903551] EXT4-fs (loop2): unmounting filesystem. [ 1024.919305] loop6: detected capacity change from 0 to 512 [ 1024.932549] loop3: detected capacity change from 0 to 512 [ 1024.941560] EXT4-fs (loop6): ext4_check_descriptors: Inode table for group 0 overlaps superblock [ 1024.942386] EXT4-fs (loop6): group descriptors corrupted! [ 1024.946359] loop7: detected capacity change from 0 to 512 [ 1024.947231] loop5: detected capacity change from 0 to 512 [ 1024.947907] EXT4-fs (loop3): ext4_check_descriptors: Inode table for group 0 overlaps superblock [ 1024.948879] EXT4-fs (loop3): group descriptors corrupted! [ 1024.951761] loop1: detected capacity change from 0 to 512 [ 1024.955533] loop4: detected capacity change from 0 to 512 [ 1024.959480] EXT4-fs (loop5): ext4_check_descriptors: Inode table for group 0 overlaps superblock [ 1024.960272] EXT4-fs (loop5): group descriptors corrupted! [ 1024.962419] EXT4-fs (loop7): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 1024.963207] EXT4-fs (loop7): group descriptors corrupted! [ 1024.967818] EXT4-fs (loop4): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 1024.968572] EXT4-fs (loop4): group descriptors corrupted! 22:26:57 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f01", 0x35, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}], 0x0, &(0x7f0000012c00)) [ 1025.005952] EXT4-fs (loop1): corrupt root inode, run e2fsck [ 1025.010497] EXT4-fs (loop1): mount failed [ 1025.014028] loop2: detected capacity change from 0 to 512 [ 1025.022416] EXT4-fs (loop2): VFS: Can't find ext4 filesystem 22:26:57 executing program 6: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010100)="00000000080000000000f900b00cb2cc029f49d8b90449a7d5d54d49010000a566", 0x21, 0x4e0}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff4655fe0f4655fe0f4655f00000000000004", 0x1b, 0x2100}], 0x0, &(0x7f0000012c00)) 22:26:57 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010400)="0200000003", 0x5, 0x800}], 0x0, &(0x7f0000012c00)) 22:26:57 executing program 7: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}], 0x0, &(0x7f0000012c00)) 22:26:57 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9}], 0x0, &(0x7f0000012c00)) 22:26:57 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010100)="00000000080000000000f900b00cb2cc029f49d8b90449a7d5d54d49010000a566", 0x21, 0x4e0}, {&(0x7f0000010400)="0200000003000000", 0x8, 0x800}], 0x0, &(0x7f0000012c00)) 22:26:57 executing program 2: getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000040), &(0x7f0000000080)=0xc) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010100)="00000000080000000000f900b00cb2cc029f49d8b90449a7d5d54d49010000a566", 0x21, 0x4e0}, {&(0x7f0000010400)="0200000003000000040000006a000f000300040000000000000000000f00bc0f", 0x20, 0x800}, {&(0x7f0000011600)="ed41000000080000dff4655fe0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}, {0x0}, {0x0}, {0x0}], 0x0, &(0x7f0000012c00)) [ 1025.111221] loop6: detected capacity change from 0 to 512 [ 1025.113871] loop7: detected capacity change from 0 to 512 [ 1025.114787] loop4: detected capacity change from 0 to 512 [ 1025.117840] loop0: detected capacity change from 0 to 512 [ 1025.121174] EXT4-fs (loop7): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 1025.121933] EXT4-fs (loop7): group descriptors corrupted! [ 1025.123187] EXT4-fs (loop4): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 1025.124008] EXT4-fs (loop4): group descriptors corrupted! [ 1025.125436] EXT4-fs (loop6): corrupt root inode, run e2fsck [ 1025.126165] EXT4-fs (loop6): mount failed [ 1025.144021] EXT4-fs (loop0): VFS: Can't find ext4 filesystem [ 1025.163589] loop5: detected capacity change from 0 to 512 [ 1025.172823] EXT4-fs (loop5): ext4_check_descriptors: Inode table for group 0 overlaps superblock [ 1025.173531] EXT4-fs (loop5): group descriptors corrupted! [ 1025.194734] loop3: detected capacity change from 0 to 512 [ 1025.212402] EXT4-fs (loop3): ext4_check_descriptors: Inode table for group 0 overlaps superblock [ 1025.213661] EXT4-fs (loop3): group descriptors corrupted! [ 1025.220886] loop2: detected capacity change from 0 to 512 [ 1025.224130] EXT4-fs (loop2): VFS: Can't find ext4 filesystem 22:27:11 executing program 6: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010100)="00000000080000000000f900b00cb2cc029f49d8b90449a7d5d54d49010000a566", 0x21, 0x4e0}, {&(0x7f0000010400)="0200000003000000", 0x8, 0x800}, {&(0x7f0000011600)="ed41000000080000dff4655fe0f4655fe0f4655f00000000000004", 0x1b, 0x2100}], 0x0, &(0x7f0000012c00)) 22:27:11 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010100)="00000000080000000000f900b00cb2cc029f49d8b90449a7d5d54d49010000a566", 0x21, 0x4e0}, {&(0x7f0000010400)="0200000003000000", 0x8, 0x800}], 0x0, &(0x7f0000012c00)) [ 1038.782455] loop5: detected capacity change from 0 to 512 [ 1038.782667] loop3: detected capacity change from 0 to 512 22:27:11 executing program 2: getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000040), &(0x7f0000000080)=0xc) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010100)="00000000080000000000f900b00cb2cc029f49d8b90449a7d5d54d49010000a566", 0x21, 0x4e0}, {&(0x7f0000010400)="0200000003000000040000006a000f000300040000000000000000000f00bc0f", 0x20, 0x800}, {&(0x7f0000011600)="ed41000000080000dff4655fe0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}, {0x0}, {0x0}, {0x0}], 0x0, &(0x7f0000012c00)) 22:27:11 executing program 7: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x0, &(0x7f0000000200), 0x0, &(0x7f0000012c00)) 22:27:11 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010100)="00000000080000000000f900b00cb2cc029f49d8b90449a7d5d54d49010000a566", 0x21, 0x4e0}, {&(0x7f0000010400), 0x0, 0x800}, {&(0x7f0000011600)="ed41000000080000dff4655fe0f4655fe0f4655f00000000000004", 0x1b, 0x2100}], 0x0, &(0x7f0000012c00)) 22:27:11 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010400)="0200000003", 0x5, 0x800}], 0x0, &(0x7f0000012c00)) 22:27:11 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff", 0x38, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}], 0x0, &(0x7f0000012c00)) 22:27:11 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9}], 0x0, &(0x7f0000012c00)) [ 1038.797043] loop6: detected capacity change from 0 to 512 [ 1038.800666] EXT4-fs (loop3): ext4_check_descriptors: Inode table for group 0 overlaps superblock [ 1038.801411] EXT4-fs (loop3): group descriptors corrupted! [ 1038.802967] EXT4-fs (loop6): ext4_check_descriptors: Inode table for group 0 overlaps superblock [ 1038.803722] EXT4-fs (loop6): group descriptors corrupted! [ 1038.804705] loop2: detected capacity change from 0 to 512 [ 1038.805528] loop0: detected capacity change from 0 to 512 [ 1038.808042] EXT4-fs (loop2): VFS: Can't find ext4 filesystem [ 1038.825738] EXT4-fs (loop5): ext4_check_descriptors: Inode table for group 0 overlaps superblock [ 1038.827105] EXT4-fs (loop5): group descriptors corrupted! [ 1038.828554] loop7: detected capacity change from 0 to 512 [ 1038.829707] EXT4-fs (loop0): VFS: Can't find ext4 filesystem [ 1038.836927] EXT4-fs (loop7): VFS: Can't find ext4 filesystem [ 1038.846992] loop1: detected capacity change from 0 to 512 [ 1038.854860] loop4: detected capacity change from 0 to 512 22:27:11 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010100)="00000000080000000000f900b00cb2cc029f49d8b90449a7d5d54d49010000a566", 0x21, 0x4e0}, {&(0x7f0000010400)="020000000300000004000000", 0xc, 0x800}], 0x0, &(0x7f0000012c00)) 22:27:11 executing program 2: getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000040), &(0x7f0000000080)=0xc) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x7, &(0x7f0000000200)=[{0x0, 0x0, 0x400}, {&(0x7f0000010100)="00000000080000000000f900b00cb2cc029f49d8b90449a7d5d54d49010000a566", 0x21, 0x4e0}, {&(0x7f0000010400)="0200000003000000040000006a000f000300040000000000000000000f00bc0f", 0x20, 0x800}, {&(0x7f0000011600)="ed41000000080000dff4655fe0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}, {0x0}, {0x0}, {0x0}], 0x0, &(0x7f0000012c00)) 22:27:11 executing program 6: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010100)="00000000080000000000f900b00cb2cc029f49d8b90449a7d5d54d49010000a566", 0x21, 0x4e0}, {&(0x7f0000010400)="0200000003000000", 0x8, 0x800}, {&(0x7f0000011600)="ed41000000080000dff4655fe0f4655fe0f4655f00000000000004", 0x1b, 0x2100}], 0x0, &(0x7f0000012c00)) [ 1038.874011] EXT4-fs (loop4): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 1038.875413] EXT4-fs (loop4): group descriptors corrupted! [ 1038.876397] EXT4-fs (loop1): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 1038.877762] EXT4-fs (loop1): group descriptors corrupted! [ 1038.920236] loop6: detected capacity change from 0 to 512 [ 1038.921075] loop3: detected capacity change from 0 to 512 [ 1038.923883] loop2: detected capacity change from 0 to 512 [ 1038.929001] EXT4-fs (loop6): ext4_check_descriptors: Inode table for group 0 overlaps superblock [ 1038.929737] EXT4-fs (loop6): group descriptors corrupted! [ 1038.931514] EXT4-fs (loop2): VFS: Can't find ext4 filesystem [ 1038.933088] EXT4-fs error (device loop3): __ext4_fill_super:5244: inode #2: comm syz-executor.3: iget: root inode unallocated [ 1038.937063] EXT4-fs (loop3): get root inode failed [ 1038.937477] EXT4-fs (loop3): mount failed [ 1051.720198] loop7: detected capacity change from 0 to 512 [ 1051.735080] loop2: detected capacity change from 0 to 512 22:27:24 executing program 6: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010100)="00000000080000000000f900b00cb2cc029f49d8b90449a7d5d54d49010000a566", 0x21, 0x4e0}, {&(0x7f0000010400)="0200000003000000", 0x8, 0x800}, {&(0x7f0000011600)="ed41000000080000dff4655fe0f4655fe0f4655f00000000000004", 0x1b, 0x2100}], 0x0, &(0x7f0000012c00)) 22:27:24 executing program 7: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x0, &(0x7f0000000200), 0x0, &(0x7f0000012c00)) 22:27:24 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010100)="00000000080000000000f900b00cb2cc029f49d8b90449a7d5d54d49010000a566", 0x21, 0x4e0}, {&(0x7f0000010400)="0200000003000000", 0x8, 0x800}], 0x0, &(0x7f0000012c00)) 22:27:24 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff", 0x38, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}], 0x0, &(0x7f0000012c00)) 22:27:24 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010400)="02000000030000", 0x7, 0x800}], 0x0, &(0x7f0000012c00)) 22:27:24 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010400)="020000000300000004", 0x9, 0x800}], 0x0, &(0x7f0000012c00)) 22:27:24 executing program 2: getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000040), &(0x7f0000000080)=0xc) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x7, &(0x7f0000000200)=[{0x0, 0x0, 0x400}, {&(0x7f0000010100)="00000000080000000000f900b00cb2cc029f49d8b90449a7d5d54d49010000a566", 0x21, 0x4e0}, {&(0x7f0000010400)="0200000003000000040000006a000f000300040000000000000000000f00bc0f", 0x20, 0x800}, {&(0x7f0000011600)="ed41000000080000dff4655fe0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}, {0x0}, {0x0}, {0x0}], 0x0, &(0x7f0000012c00)) [ 1051.739650] EXT4-fs (loop7): VFS: Can't find ext4 filesystem [ 1051.740112] EXT4-fs (loop2): VFS: Can't find ext4 filesystem [ 1051.741925] loop4: detected capacity change from 0 to 512 22:27:24 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010100)="00000000080000000000f900b00cb2cc029f49d8b90449a7d5d54d49010000a566", 0x21, 0x4e0}, {&(0x7f0000010400), 0x0, 0x800}, {&(0x7f0000011600)="ed41000000080000dff4655fe0f4655fe0f4655f00000000000004", 0x1b, 0x2100}], 0x0, &(0x7f0000012c00)) [ 1051.759342] loop1: detected capacity change from 0 to 512 [ 1051.767355] loop0: detected capacity change from 0 to 512 [ 1051.769124] EXT4-fs (loop4): VFS: Can't find ext4 filesystem [ 1051.771158] EXT4-fs (loop1): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 1051.771854] EXT4-fs (loop1): group descriptors corrupted! [ 1051.775513] EXT4-fs (loop0): VFS: Can't find ext4 filesystem [ 1051.786940] loop6: detected capacity change from 0 to 512 [ 1051.789320] EXT4-fs (loop6): ext4_check_descriptors: Inode table for group 0 overlaps superblock [ 1051.789965] EXT4-fs (loop6): group descriptors corrupted! [ 1051.798579] loop5: detected capacity change from 0 to 512 [ 1051.801689] loop3: detected capacity change from 0 to 512 22:27:24 executing program 2: getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000040), &(0x7f0000000080)=0xc) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x7, &(0x7f0000000200)=[{0x0, 0x0, 0x400}, {&(0x7f0000010100)="00000000080000000000f900b00cb2cc029f49d8b90449a7d5d54d49010000a566", 0x21, 0x4e0}, {&(0x7f0000010400)="0200000003000000040000006a000f000300040000000000000000000f00bc0f", 0x20, 0x800}, {&(0x7f0000011600)="ed41000000080000dff4655fe0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}, {0x0}, {0x0}, {0x0}], 0x0, &(0x7f0000012c00)) 22:27:24 executing program 7: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x0, &(0x7f0000000200), 0x0, &(0x7f0000012c00)) [ 1051.825526] EXT4-fs (loop3): ext4_check_descriptors: Inode table for group 0 overlaps superblock [ 1051.826954] EXT4-fs (loop3): group descriptors corrupted! [ 1051.829144] EXT4-fs (loop5): ext4_check_descriptors: Inode table for group 0 overlaps superblock [ 1051.830559] EXT4-fs (loop5): group descriptors corrupted! 22:27:24 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010100)="00000000080000000000f900b00cb2cc029f49d8b90449a7d5d54d49010000a566", 0x21, 0x4e0}, {&(0x7f0000010400), 0x0, 0x800}, {&(0x7f0000011600)="ed41000000080000dff4655fe0f4655fe0f4655f00000000000004", 0x1b, 0x2100}], 0x0, &(0x7f0000012c00)) 22:27:24 executing program 6: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010100)="00000000080000000000f900b00cb2cc029f49d8b90449a7d5d54d49010000a566", 0x21, 0x4e0}, {&(0x7f0000010400)="020000000300000004", 0x9}, {&(0x7f0000011600)="ed41000000080000dff4655fe0f4655fe0f4655f00000000000004", 0x1b, 0x2100}], 0x0, &(0x7f0000012c00)) 22:27:24 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff", 0x38, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}], 0x0, &(0x7f0000012c00)) [ 1051.872875] loop7: detected capacity change from 0 to 512 [ 1051.882079] EXT4-fs (loop7): VFS: Can't find ext4 filesystem [ 1051.887374] loop1: detected capacity change from 0 to 512 [ 1051.897691] EXT4-fs (loop1): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 1051.898316] EXT4-fs (loop1): group descriptors corrupted! [ 1051.900501] loop6: detected capacity change from 0 to 512 [ 1051.907134] loop2: detected capacity change from 0 to 512 22:27:24 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010400)="020000000300000004", 0x9, 0x800}], 0x0, &(0x7f0000012c00)) [ 1051.925542] EXT4-fs (loop6): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 1051.926185] EXT4-fs (loop6): group descriptors corrupted! [ 1051.929941] EXT4-fs (loop2): VFS: Can't find ext4 filesystem 22:27:24 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010100)="00000000080000000000f900b00cb2cc029f49d8b90449a7d5d54d49010000a566", 0x21, 0x4e0}, {&(0x7f0000010400)="0200000003000000", 0x8, 0x800}], 0x0, &(0x7f0000012c00)) [ 1052.003557] loop4: detected capacity change from 0 to 512 [ 1052.006025] EXT4-fs (loop4): VFS: Can't find ext4 filesystem [ 1052.007758] loop0: detected capacity change from 0 to 512 [ 1052.024783] EXT4-fs (loop0): VFS: Can't find ext4 filesystem [ 1052.050411] loop3: detected capacity change from 0 to 512 [ 1052.054448] EXT4-fs (loop3): ext4_check_descriptors: Inode table for group 0 overlaps superblock [ 1052.055063] EXT4-fs (loop3): group descriptors corrupted! 22:27:38 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010100)="00000000080000000000f900b00cb2cc029f49d8b90449a7d5d54d49010000a566", 0x21, 0x4e0}, {&(0x7f0000010400)="0200000003000000", 0x8, 0x800}], 0x0, &(0x7f0000012c00)) 22:27:38 executing program 7: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x1, &(0x7f0000000200)=[{0x0, 0x0, 0x400}], 0x0, &(0x7f0000012c00)) 22:27:38 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53", 0x39, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}], 0x0, &(0x7f0000012c00)) 22:27:38 executing program 6: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010100)="00000000080000000000f900b00cb2cc029f49d8b90449a7d5d54d49010000a566", 0x21, 0x4e0}, {&(0x7f0000010400)="020000000300000004", 0x9}, {&(0x7f0000011600)="ed41000000080000dff4655fe0f4655fe0f4655f00000000000004", 0x1b, 0x2100}], 0x0, &(0x7f0000012c00)) 22:27:38 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010400)="02000000030000", 0x7, 0x800}], 0x0, &(0x7f0000012c00)) 22:27:38 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010100)="00000000080000000000f900b00cb2cc029f49d8b90449a7d5d54d49010000a566", 0x21, 0x4e0}, {&(0x7f0000010400)="0200000003000000", 0x8, 0x800}, {&(0x7f0000011600)="ed41000000080000dff4655fe0f4655fe0f4655f00000000000004", 0x1b, 0x2100}], 0x0, &(0x7f0000012c00)) 22:27:38 executing program 2: getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000040), &(0x7f0000000080)=0xc) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000), 0x0, 0x400}, {&(0x7f0000010100)="00000000080000000000f900b00cb2cc029f49d8b90449a7d5d54d49010000a566", 0x21, 0x4e0}, {&(0x7f0000010400)="0200000003000000040000006a000f000300040000000000000000000f00bc0f", 0x20, 0x800}, {&(0x7f0000011600)="ed41000000080000dff4655fe0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}, {0x0}, {0x0}, {0x0}], 0x0, &(0x7f0000012c00)) 22:27:38 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010400)="020000000300000004", 0x9, 0x800}], 0x0, &(0x7f0000012c00)) [ 1066.317522] loop3: detected capacity change from 0 to 512 [ 1066.323094] loop5: detected capacity change from 0 to 512 [ 1066.325181] loop0: detected capacity change from 0 to 512 [ 1066.331441] loop2: detected capacity change from 0 to 512 [ 1066.333475] EXT4-fs (loop3): ext4_check_descriptors: Inode table for group 0 overlaps superblock [ 1066.334268] EXT4-fs (loop3): group descriptors corrupted! [ 1066.334836] EXT4-fs (loop5): ext4_check_descriptors: Inode table for group 0 overlaps superblock [ 1066.335507] EXT4-fs (loop5): group descriptors corrupted! [ 1066.337264] EXT4-fs (loop2): VFS: Can't find ext4 filesystem [ 1066.345454] loop7: detected capacity change from 0 to 512 [ 1066.346771] loop1: detected capacity change from 0 to 512 [ 1066.347687] EXT4-fs (loop0): VFS: Can't find ext4 filesystem [ 1066.349717] loop6: detected capacity change from 0 to 512 22:27:38 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010400)="02000000030000", 0x7, 0x800}], 0x0, &(0x7f0000012c00)) [ 1066.384459] EXT4-fs (loop1): ext4_check_descriptors: Inode table for group 0 overlaps superblock [ 1066.385773] EXT4-fs (loop1): group descriptors corrupted! 22:27:38 executing program 2: getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000040), &(0x7f0000000080)=0xc) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000), 0x0, 0x400}, {&(0x7f0000010100)="00000000080000000000f900b00cb2cc029f49d8b90449a7d5d54d49010000a566", 0x21, 0x4e0}, {&(0x7f0000010400)="0200000003000000040000006a000f000300040000000000000000000f00bc0f", 0x20, 0x800}, {&(0x7f0000011600)="ed41000000080000dff4655fe0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}, {0x0}, {0x0}, {0x0}], 0x0, &(0x7f0000012c00)) [ 1066.390952] loop4: detected capacity change from 0 to 512 [ 1066.396911] EXT4-fs (loop7): VFS: Can't find ext4 filesystem 22:27:38 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010100)="00000000080000000000f900b00cb2cc029f49d8b90449a7d5d54d49010000a566", 0x21, 0x4e0}, {&(0x7f0000010400)="02000000030000000400", 0xa, 0x800}], 0x0, &(0x7f0000012c00)) [ 1066.409637] loop5: detected capacity change from 0 to 512 [ 1066.413655] EXT4-fs (loop6): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 1066.414872] EXT4-fs (loop6): group descriptors corrupted! [ 1066.417824] EXT4-fs (loop5): ext4_check_descriptors: Inode table for group 0 overlaps superblock [ 1066.418541] EXT4-fs (loop5): group descriptors corrupted! [ 1066.420477] loop2: detected capacity change from 0 to 512 [ 1066.423039] EXT4-fs (loop2): VFS: Can't find ext4 filesystem [ 1066.423669] EXT4-fs (loop4): VFS: Can't find ext4 filesystem 22:27:38 executing program 2: getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000040), &(0x7f0000000080)=0xc) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000), 0x0, 0x400}, {&(0x7f0000010100)="00000000080000000000f900b00cb2cc029f49d8b90449a7d5d54d49010000a566", 0x21, 0x4e0}, {&(0x7f0000010400)="0200000003000000040000006a000f000300040000000000000000000f00bc0f", 0x20, 0x800}, {&(0x7f0000011600)="ed41000000080000dff4655fe0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}, {0x0}, {0x0}, {0x0}], 0x0, &(0x7f0000012c00)) 22:27:38 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010400)="0200000003000000", 0x8, 0x800}], 0x0, &(0x7f0000012c00)) 22:27:38 executing program 7: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x1, &(0x7f0000000200)=[{0x0, 0x0, 0x400}], 0x0, &(0x7f0000012c00)) [ 1066.511418] loop3: detected capacity change from 0 to 512 22:27:38 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53", 0x39, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}], 0x0, &(0x7f0000012c00)) 22:27:38 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x2, &(0x7f0000000200)=[{0x0, 0x0, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}], 0x0, &(0x7f0000012c00)) [ 1066.533436] EXT4-fs error (device loop3): __ext4_fill_super:5244: inode #2: comm syz-executor.3: iget: root inode unallocated [ 1066.534578] EXT4-fs (loop3): get root inode failed [ 1066.535002] EXT4-fs (loop3): mount failed 22:27:38 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010100)="00000000080000000000f900b00cb2cc029f49d8b90449a7d5d54d49010000a566", 0x21, 0x4e0}, {&(0x7f0000010400)="0200000003000000", 0x8, 0x800}, {&(0x7f0000011600)="ed41000000080000dff4655fe0f4655fe0f4655f00000000000004", 0x1b, 0x2100}], 0x0, &(0x7f0000012c00)) 22:27:38 executing program 6: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010100)="00000000080000000000f900b00cb2cc029f49d8b90449a7d5d54d49010000a566", 0x21, 0x4e0}, {&(0x7f0000010400)="020000000300000004", 0x9}, {&(0x7f0000011600)="ed41000000080000dff4655fe0f4655fe0f4655f00000000000004", 0x1b, 0x2100}], 0x0, &(0x7f0000012c00)) [ 1066.562217] loop2: detected capacity change from 0 to 512 [ 1066.564500] loop7: detected capacity change from 0 to 512 [ 1066.571008] EXT4-fs (loop7): VFS: Can't find ext4 filesystem [ 1066.584006] loop0: detected capacity change from 0 to 512 [ 1066.589551] EXT4-fs (loop2): VFS: Can't find ext4 filesystem [ 1066.593251] loop1: detected capacity change from 0 to 512 [ 1066.595194] EXT4-fs (loop0): VFS: Can't find ext4 filesystem [ 1066.605781] EXT4-fs (loop1): ext4_check_descriptors: Inode table for group 0 overlaps superblock [ 1066.606130] loop5: detected capacity change from 0 to 512 [ 1066.606431] EXT4-fs (loop1): group descriptors corrupted! [ 1066.634387] EXT4-fs (loop5): ext4_check_descriptors: Inode table for group 0 overlaps superblock [ 1066.634421] loop4: detected capacity change from 0 to 512 [ 1066.635651] EXT4-fs (loop5): group descriptors corrupted! [ 1066.639028] loop6: detected capacity change from 0 to 512 [ 1066.650584] EXT4-fs (loop4): VFS: Can't find ext4 filesystem [ 1066.658828] EXT4-fs (loop6): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 1066.660180] EXT4-fs (loop6): group descriptors corrupted! 22:27:51 executing program 6: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff4655fe0f4655fe0f4655f00000000000004", 0x1b, 0x2100}], 0x0, &(0x7f0000012c00)) 22:27:51 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010100)="00000000080000000000f900b00cb2cc029f49d8b90449a7d5d54d49010000a566", 0x21, 0x4e0}, {&(0x7f0000010400)="0200000003000000", 0x8, 0x800}], 0x0, &(0x7f0000012c00)) 22:27:51 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010400)="0200000003000000", 0x8, 0x800}], 0x0, &(0x7f0000012c00)) 22:27:51 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010100)="00000000080000000000f900b00cb2cc029f49d8b90449a7d5d54d49010000a566", 0x21, 0x4e0}, {&(0x7f0000010400)="0200000003000000", 0x8, 0x800}, {&(0x7f0000011600)="ed41000000080000dff4655fe0f4655fe0f4655f00000000000004", 0x1b, 0x2100}], 0x0, &(0x7f0000012c00)) [ 1079.054099] loop3: detected capacity change from 0 to 512 22:27:51 executing program 7: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x1, &(0x7f0000000200)=[{0x0, 0x0, 0x400}], 0x0, &(0x7f0000012c00)) [ 1079.057950] loop7: detected capacity change from 0 to 512 [ 1079.071831] loop0: detected capacity change from 0 to 512 [ 1079.074221] loop1: detected capacity change from 0 to 512 22:27:51 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53", 0x39, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}], 0x0, &(0x7f0000012c00)) 22:27:51 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x2, &(0x7f0000000200)=[{0x0, 0x0, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}], 0x0, &(0x7f0000012c00)) 22:27:51 executing program 2: getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000040), &(0x7f0000000080)=0xc) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0", 0x2d, 0x400}, {&(0x7f0000010100)="00000000080000000000f900b00cb2cc029f49d8b90449a7d5d54d49010000a566", 0x21, 0x4e0}, {&(0x7f0000010400)="0200000003000000040000006a000f000300040000000000000000000f00bc0f", 0x20, 0x800}, {&(0x7f0000011600)="ed41000000080000dff4655fe0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}, {0x0}, {0x0}, {0x0}], 0x0, &(0x7f0000012c00)) [ 1079.079562] EXT4-fs (loop0): VFS: Can't find ext4 filesystem [ 1079.081044] EXT4-fs (loop1): ext4_check_descriptors: Inode table for group 0 overlaps superblock [ 1079.081781] EXT4-fs (loop1): group descriptors corrupted! [ 1079.082922] EXT4-fs (loop3): ext4_check_descriptors: Inode table for group 0 overlaps superblock [ 1079.083635] EXT4-fs (loop3): group descriptors corrupted! [ 1079.087562] loop6: detected capacity change from 0 to 512 [ 1079.094266] EXT4-fs (loop7): VFS: Can't find ext4 filesystem [ 1079.104697] loop4: detected capacity change from 0 to 512 [ 1079.117224] EXT4-fs (loop4): VFS: Can't find ext4 filesystem [ 1079.125036] EXT4-fs (loop6): corrupt root inode, run e2fsck [ 1079.125504] EXT4-fs (loop6): mount failed [ 1079.125559] loop5: detected capacity change from 0 to 512 [ 1079.135737] loop2: detected capacity change from 0 to 512 [ 1079.148926] EXT4-fs (loop5): ext4_check_descriptors: Inode table for group 0 overlaps superblock [ 1079.150396] EXT4-fs (loop5): group descriptors corrupted! [ 1079.154714] EXT4-fs (loop2): VFS: Can't find ext4 filesystem 22:27:51 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef", 0x3a}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}], 0x0, &(0x7f0000012c00)) 22:27:51 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010100)="00000000080000000000f900b00cb2cc029f49d8b90449a7d5d54d49010000a566", 0x21, 0x4e0}, {&(0x7f0000010400)="020000000300000004000000", 0xc, 0x800}, {&(0x7f0000011600)="ed41000000080000dff4655fe0f4655fe0f4655f00000000000004", 0x1b, 0x2100}], 0x0, &(0x7f0000012c00)) 22:27:51 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010100)="00000000080000000000f900b00cb2cc029f49d8b90449a7d5d54d49010000a566", 0x21, 0x4e0}, {&(0x7f0000010400)="0200000003000000", 0x8, 0x800}], 0x0, &(0x7f0000012c00)) 22:27:51 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x2, &(0x7f0000000200)=[{0x0, 0x0, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}], 0x0, &(0x7f0000012c00)) 22:27:51 executing program 6: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0x800}, {&(0x7f0000011600)="ed41000000080000dff4655fe0f4655fe0f4655f00000000000004", 0x1b, 0x2100}], 0x0, &(0x7f0000012c00)) [ 1079.207806] loop0: detected capacity change from 0 to 512 [ 1079.209909] loop1: detected capacity change from 0 to 512 [ 1079.216037] EXT4-fs (loop0): VFS: Can't find ext4 filesystem [ 1079.233471] EXT4-fs (loop1): corrupt root inode, run e2fsck [ 1079.234001] EXT4-fs (loop1): mount failed [ 1079.242354] loop6: detected capacity change from 0 to 512 22:27:51 executing program 7: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000), 0x0, 0x400}], 0x0, &(0x7f0000012c00)) [ 1079.261044] EXT4-fs (loop6): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 1079.261748] EXT4-fs (loop6): group descriptors corrupted! [ 1079.276713] loop3: detected capacity change from 0 to 512 [ 1079.282429] EXT4-fs (loop3): ext4_check_descriptors: Inode table for group 0 overlaps superblock [ 1079.283143] EXT4-fs (loop3): group descriptors corrupted! [ 1079.333169] loop4: detected capacity change from 0 to 512 [ 1079.345488] loop7: detected capacity change from 0 to 512 [ 1079.347458] EXT4-fs (loop4): VFS: Can't find ext4 filesystem [ 1079.351578] EXT4-fs (loop7): VFS: Can't find ext4 filesystem 22:28:07 executing program 7: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000), 0x0, 0x400}], 0x0, &(0x7f0000012c00)) 22:28:07 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000), 0x0, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}], 0x0, &(0x7f0000012c00)) 22:28:07 executing program 2: getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000040), &(0x7f0000000080)=0xc) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0", 0x2d, 0x400}, {&(0x7f0000010100)="00000000080000000000f900b00cb2cc029f49d8b90449a7d5d54d49010000a566", 0x21, 0x4e0}, {&(0x7f0000010400)="0200000003000000040000006a000f000300040000000000000000000f00bc0f", 0x20, 0x800}, {&(0x7f0000011600)="ed41000000080000dff4655fe0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}, {0x0}, {0x0}, {0x0}], 0x0, &(0x7f0000012c00)) 22:28:07 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010400)="0200000003000000", 0x8, 0x800}], 0x0, &(0x7f0000012c00)) 22:28:07 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010100)="00000000080000000000f900b00cb2cc029f49d8b90449a7d5d54d49010000a566", 0x21, 0x4e0}, {&(0x7f0000010400)="0200000003000000", 0x8, 0x800}, {&(0x7f0000011600)="ed41000000080000dff4655fe0f4655fe0f4655f00000000000004", 0x1b, 0x2100}], 0x0, &(0x7f0000012c00)) 22:28:07 executing program 6: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0x800}, {&(0x7f0000011600)="ed41000000080000dff4655fe0f4655fe0f4655f00000000000004", 0x1b, 0x2100}], 0x0, &(0x7f0000012c00)) 22:28:07 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010100)="00000000080000000000f900b00cb2cc029f49d8b90449a7d5d54d49010000a566", 0x21, 0x4e0}, {&(0x7f0000010400)="0200000003000000", 0x8, 0x800}], 0x0, &(0x7f0000012c00)) [ 1094.943872] loop1: detected capacity change from 0 to 512 [ 1094.944985] loop3: detected capacity change from 0 to 512 [ 1094.951008] EXT4-fs (loop3): ext4_check_descriptors: Inode table for group 0 overlaps superblock [ 1094.951742] EXT4-fs (loop3): group descriptors corrupted! [ 1094.952330] EXT4-fs (loop1): ext4_check_descriptors: Inode table for group 0 overlaps superblock [ 1094.953060] EXT4-fs (loop1): group descriptors corrupted! [ 1094.955262] loop6: detected capacity change from 0 to 512 22:28:07 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef", 0x3a}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}], 0x0, &(0x7f0000012c00)) [ 1094.966966] EXT4-fs (loop6): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 1094.967648] EXT4-fs (loop6): group descriptors corrupted! [ 1094.969960] loop0: detected capacity change from 0 to 512 [ 1094.987341] loop7: detected capacity change from 0 to 512 [ 1094.989634] EXT4-fs (loop0): VFS: Can't find ext4 filesystem [ 1094.996750] loop5: detected capacity change from 0 to 512 [ 1095.000970] loop4: detected capacity change from 0 to 512 [ 1095.002229] loop2: detected capacity change from 0 to 512 [ 1095.007716] EXT4-fs (loop7): VFS: Can't find ext4 filesystem [ 1095.014199] EXT4-fs (loop2): VFS: Can't find ext4 filesystem [ 1095.015742] EXT4-fs (loop5): ext4_check_descriptors: Inode table for group 0 overlaps superblock [ 1095.017126] EXT4-fs (loop5): group descriptors corrupted! [ 1095.018957] EXT4-fs (loop4): VFS: Can't find ext4 filesystem 22:28:07 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010100)="00000000080000000000f900b00cb2cc029f49d8b90449a7d5d54d49010000a566", 0x21, 0x4e0}, {&(0x7f0000010400)="0200000003000000", 0x8, 0x800}, {&(0x7f0000011600)="ed41000000080000dff4655fe0f4655fe0f4655f00000000000004", 0x1b, 0x2100}], 0x0, &(0x7f0000012c00)) 22:28:07 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010100)="00000000080000000000f900b00cb2cc029f49d8b90449a7d5d54d49010000a566", 0x21, 0x4e0}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}], 0x0, &(0x7f0000012c00)) 22:28:07 executing program 6: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0x800}, {&(0x7f0000011600)="ed41000000080000dff4655fe0f4655fe0f4655f00000000000004", 0x1b, 0x2100}], 0x0, &(0x7f0000012c00)) 22:28:07 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef", 0x3a}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}], 0x0, &(0x7f0000012c00)) [ 1095.091937] loop1: detected capacity change from 0 to 512 [ 1095.095452] loop3: detected capacity change from 0 to 512 22:28:07 executing program 2: getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000040), &(0x7f0000000080)=0xc) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0", 0x2d, 0x400}, {&(0x7f0000010100)="00000000080000000000f900b00cb2cc029f49d8b90449a7d5d54d49010000a566", 0x21, 0x4e0}, {&(0x7f0000010400)="0200000003000000040000006a000f000300040000000000000000000f00bc0f", 0x20, 0x800}, {&(0x7f0000011600)="ed41000000080000dff4655fe0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}, {0x0}, {0x0}, {0x0}], 0x0, &(0x7f0000012c00)) [ 1095.101001] loop6: detected capacity change from 0 to 512 [ 1095.107853] EXT4-fs (loop1): ext4_check_descriptors: Inode table for group 0 overlaps superblock [ 1095.108549] EXT4-fs (loop1): group descriptors corrupted! [ 1095.112188] loop0: detected capacity change from 0 to 512 [ 1095.120715] EXT4-fs (loop6): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 1095.121411] EXT4-fs (loop6): group descriptors corrupted! [ 1095.124285] EXT4-fs error (device loop3): __ext4_fill_super:5244: inode #2: comm syz-executor.3: iget: root inode unallocated [ 1095.125410] EXT4-fs (loop3): get root inode failed [ 1095.125848] EXT4-fs (loop3): mount failed [ 1095.130296] EXT4-fs (loop0): VFS: Can't find ext4 filesystem 22:28:07 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9}], 0x0, &(0x7f0000012c00)) 22:28:07 executing program 7: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000), 0x0, 0x400}], 0x0, &(0x7f0000012c00)) 22:28:07 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000), 0x0, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}], 0x0, &(0x7f0000012c00)) 22:28:07 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010100)="00000000080000000000f900b00cb2cc029f49d8b90449a7d5d54d49010000a566", 0x21, 0x4e0}, {&(0x7f0000010400)="0200000003000000", 0x8, 0x800}, {&(0x7f0000011600)="ed41000000080000dff4655fe0f4655fe0f4655f00000000000004", 0x1b, 0x2100}], 0x0, &(0x7f0000012c00)) [ 1095.251330] loop1: detected capacity change from 0 to 512 [ 1095.254289] loop2: detected capacity change from 0 to 512 [ 1095.257535] loop4: detected capacity change from 0 to 512 [ 1095.258135] loop5: detected capacity change from 0 to 512 [ 1095.265706] EXT4-fs (loop4): VFS: Can't find ext4 filesystem [ 1095.272125] loop7: detected capacity change from 0 to 512 [ 1095.277853] EXT4-fs (loop1): ext4_check_descriptors: Inode table for group 0 overlaps superblock [ 1095.279239] EXT4-fs (loop1): group descriptors corrupted! [ 1095.286453] EXT4-fs (loop2): VFS: Can't find ext4 filesystem [ 1095.292569] EXT4-fs (loop5): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 1095.294262] EXT4-fs (loop5): group descriptors corrupted! [ 1095.298697] EXT4-fs (loop7): VFS: Can't find ext4 filesystem [ 1111.076768] loop1: detected capacity change from 0 to 512 22:28:23 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010100)="00000000080000000000f900b00cb2cc029f49d8b90449a7d5d54d49010000a566", 0x21, 0x4e0}, {&(0x7f0000010400)="02000000030000000400", 0xa, 0x800}, {&(0x7f0000011600)="ed41000000080000dff4655fe0f4655fe0f4655f00000000000004", 0x1b, 0x2100}], 0x0, &(0x7f0000012c00)) 22:28:23 executing program 6: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010400), 0x0, 0x800}, {&(0x7f0000011600)="ed41000000080000dff4655fe0f4655fe0f4655f00000000000004", 0x1b, 0x2100}], 0x0, &(0x7f0000012c00)) 22:28:23 executing program 7: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0", 0x2d, 0x400}], 0x0, &(0x7f0000012c00)) 22:28:23 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000), 0x0, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}], 0x0, &(0x7f0000012c00)) 22:28:23 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010100)="00000000080000000000f900b00cb2cc029f49d8b90449a7d5d54d49010000a566", 0x21, 0x4e0}, {&(0x7f0000010400)="0200000003000000", 0x8, 0x800}], 0x0, &(0x7f0000012c00)) 22:28:23 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}], 0x0, 0x0) 22:28:23 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9}], 0x0, &(0x7f0000012c00)) 22:28:23 executing program 2: getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000040), &(0x7f0000000080)=0xc) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f", 0x44, 0x400}, {&(0x7f0000010100)="00000000080000000000f900b00cb2cc029f49d8b90449a7d5d54d49010000a566", 0x21, 0x4e0}, {&(0x7f0000010400)="0200000003000000040000006a000f000300040000000000000000000f00bc0f", 0x20, 0x800}, {&(0x7f0000011600)="ed41000000080000dff4655fe0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}, {0x0}, {0x0}, {0x0}], 0x0, &(0x7f0000012c00)) [ 1111.081891] EXT4-fs (loop1): corrupt root inode, run e2fsck [ 1111.082348] EXT4-fs (loop1): mount failed [ 1111.100422] loop3: detected capacity change from 0 to 512 [ 1111.104089] loop2: detected capacity change from 0 to 512 [ 1111.110546] EXT4-fs (loop3): ext4_check_descriptors: Inode table for group 0 overlaps superblock [ 1111.111276] EXT4-fs (loop3): group descriptors corrupted! [ 1111.113060] EXT4-fs error (device loop2): __ext4_fill_super:5244: inode #2: comm syz-executor.2: iget: root inode unallocated [ 1111.114156] EXT4-fs (loop2): get root inode failed [ 1111.114525] EXT4-fs (loop2): mount failed [ 1111.132047] loop4: detected capacity change from 0 to 512 [ 1111.134701] loop6: detected capacity change from 0 to 512 [ 1111.141863] loop0: detected capacity change from 0 to 512 [ 1111.142049] EXT4-fs (loop6): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 1111.143377] EXT4-fs (loop6): group descriptors corrupted! [ 1111.145446] loop5: detected capacity change from 0 to 512 [ 1111.147006] loop7: detected capacity change from 0 to 512 [ 1111.148662] EXT4-fs (loop4): VFS: Can't find ext4 filesystem [ 1111.159046] EXT4-fs (loop7): VFS: Can't find ext4 filesystem [ 1111.160199] EXT4-fs (loop5): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 1111.161707] EXT4-fs (loop5): group descriptors corrupted! 22:28:23 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010100)="00000000080000000000f900b00cb2cc029f49d8b90449a7d5d54d49010000a566", 0x21, 0x4e0}, {&(0x7f0000010400)="0200000003000000", 0x8, 0x800}, {&(0x7f0000011600)="ed41000000080000dff4655fe0f4655fe0f4655f00000000000004", 0x1b, 0x2100}], 0x0, &(0x7f0000012c00)) 22:28:23 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010100)="00000000080000000000f900b00cb2cc029f49d8b90449a7d5d54d49010000a566", 0x21, 0x4e0}, {&(0x7f0000010400)="0200000003000000", 0x8, 0x800}], 0x0, &(0x7f0000012c00)) 22:28:23 executing program 2: getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000040), &(0x7f0000000080)=0xc) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f", 0x44, 0x400}, {&(0x7f0000010100)="00000000080000000000f900b00cb2cc029f49d8b90449a7d5d54d49010000a566", 0x21, 0x4e0}, {&(0x7f0000010400)="0200000003000000040000006a000f000300040000000000000000000f00bc0f", 0x20, 0x800}, {&(0x7f0000011600)="ed41000000080000dff4655fe0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}, {0x0}, {0x0}, {0x0}], 0x0, &(0x7f0000012c00)) 22:28:23 executing program 6: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010400), 0x0, 0x800}, {&(0x7f0000011600)="ed41000000080000dff4655fe0f4655fe0f4655f00000000000004", 0x1b, 0x2100}], 0x0, &(0x7f0000012c00)) [ 1111.231555] loop1: detected capacity change from 0 to 512 [ 1111.238356] EXT4-fs (loop1): ext4_check_descriptors: Inode table for group 0 overlaps superblock [ 1111.239068] EXT4-fs (loop1): group descriptors corrupted! 22:28:23 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0", 0x2d, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}], 0x0, &(0x7f0000012c00)) [ 1111.253387] loop3: detected capacity change from 0 to 512 [ 1111.261362] loop6: detected capacity change from 0 to 512 [ 1111.263662] EXT4-fs (loop3): ext4_check_descriptors: Inode table for group 0 overlaps superblock [ 1111.264335] EXT4-fs (loop3): group descriptors corrupted! 22:28:23 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}], 0x0, 0x0) [ 1111.275326] EXT4-fs (loop6): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 1111.276069] EXT4-fs (loop6): group descriptors corrupted! 22:28:23 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010100)="00000000080000000000f900b00cb2cc029f49d8b90449a7d5d54d49010000a566", 0x21, 0x4e0}, {&(0x7f0000010400)="0200000003000000", 0x8, 0x800}, {&(0x7f0000011600)="ed41000000080000dff4655fe0f4655fe0f4655f00000000000004", 0x1b, 0x2100}], 0x0, &(0x7f0000012c00)) [ 1111.301392] loop2: detected capacity change from 0 to 512 22:28:23 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9}], 0x0, &(0x7f0000012c00)) 22:28:23 executing program 7: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0", 0x2d, 0x400}], 0x0, &(0x7f0000012c00)) [ 1111.334341] EXT4-fs error (device loop2): __ext4_fill_super:5244: inode #2: comm syz-executor.2: iget: root inode unallocated [ 1111.335915] EXT4-fs (loop2): get root inode failed [ 1111.336278] EXT4-fs (loop2): mount failed [ 1111.365480] loop1: detected capacity change from 0 to 512 [ 1111.368215] EXT4-fs (loop1): ext4_check_descriptors: Inode table for group 0 overlaps superblock [ 1111.368889] EXT4-fs (loop1): group descriptors corrupted! [ 1111.382349] loop4: detected capacity change from 0 to 512 [ 1111.385211] EXT4-fs (loop4): VFS: Can't find ext4 filesystem [ 1111.390589] loop5: detected capacity change from 0 to 512 [ 1111.397163] EXT4-fs (loop5): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 1111.397855] EXT4-fs (loop5): group descriptors corrupted! [ 1111.399091] loop0: detected capacity change from 0 to 512 [ 1111.417360] loop7: detected capacity change from 0 to 512 [ 1111.419650] EXT4-fs (loop7): VFS: Can't find ext4 filesystem 22:28:38 executing program 2: getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000040), &(0x7f0000000080)=0xc) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f", 0x44, 0x400}, {&(0x7f0000010100)="00000000080000000000f900b00cb2cc029f49d8b90449a7d5d54d49010000a566", 0x21, 0x4e0}, {&(0x7f0000010400)="0200000003000000040000006a000f000300040000000000000000000f00bc0f", 0x20, 0x800}, {&(0x7f0000011600)="ed41000000080000dff4655fe0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}, {0x0}, {0x0}, {0x0}], 0x0, &(0x7f0000012c00)) 22:28:38 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}], 0x0, 0x0) 22:28:38 executing program 7: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0", 0x2d, 0x400}], 0x0, &(0x7f0000012c00)) 22:28:38 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0", 0x2d, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}], 0x0, &(0x7f0000012c00)) 22:28:38 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010400)="020000000300000004", 0x9, 0x800}], 0x0, &(0x7f0000012c00)) 22:28:38 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010100)="00000000080000000000f900b00cb2cc029f49d8b90449a7d5d54d49010000a566", 0x21, 0x4e0}, {&(0x7f0000010400)="0200000003000000", 0x8, 0x800}, {&(0x7f0000011600)="ed41000000080000dff4655fe0f4655fe0f4655f00000000000004", 0x1b, 0x2100}], 0x0, &(0x7f0000012c00)) 22:28:38 executing program 6: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010400), 0x0, 0x800}, {&(0x7f0000011600)="ed41000000080000dff4655fe0f4655fe0f4655f00000000000004", 0x1b, 0x2100}], 0x0, &(0x7f0000012c00)) 22:28:38 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010100)="00000000080000000000f900b00cb2cc029f49d8b90449a7d5d54d49010000a566", 0x21, 0x4e0}, {&(0x7f0000010400)="0200000003000000", 0x8, 0x800}], 0x0, &(0x7f0000012c00)) [ 1126.123252] loop7: detected capacity change from 0 to 512 [ 1126.124330] loop5: detected capacity change from 0 to 512 [ 1126.129778] loop2: detected capacity change from 0 to 512 [ 1126.136567] loop0: detected capacity change from 0 to 512 [ 1126.140745] EXT4-fs (loop7): VFS: Can't find ext4 filesystem [ 1126.141671] EXT4-fs (loop5): VFS: Can't find ext4 filesystem [ 1126.152958] loop1: detected capacity change from 0 to 512 [ 1126.163528] loop4: detected capacity change from 0 to 512 [ 1126.164982] loop6: detected capacity change from 0 to 512 [ 1126.165192] loop3: detected capacity change from 0 to 512 [ 1126.171110] EXT4-fs error (device loop2): __ext4_fill_super:5244: inode #2: comm syz-executor.2: iget: root inode unallocated [ 1126.178257] EXT4-fs (loop2): get root inode failed [ 1126.178996] EXT4-fs (loop2): mount failed [ 1126.180057] EXT4-fs (loop4): VFS: Can't find ext4 filesystem [ 1126.180363] EXT4-fs (loop1): ext4_check_descriptors: Inode table for group 0 overlaps superblock [ 1126.182207] EXT4-fs (loop1): group descriptors corrupted! [ 1126.184033] EXT4-fs (loop6): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 1126.185413] EXT4-fs (loop6): group descriptors corrupted! [ 1126.194806] EXT4-fs (loop3): ext4_check_descriptors: Inode table for group 0 overlaps superblock [ 1126.196084] EXT4-fs (loop3): group descriptors corrupted! 22:28:38 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010400)="020000000300000004", 0x9, 0x800}], 0x0, &(0x7f0000012c00)) 22:28:38 executing program 7: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f", 0x44, 0x400}], 0x0, &(0x7f0000012c00)) 22:28:38 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010100)="00000000080000000000f900b00cb2cc029f49d8b90449a7d5d54d49010000a566", 0x21, 0x4e0}, {&(0x7f0000010400)="020000000300000004", 0x9}], 0x0, &(0x7f0000012c00)) [ 1126.346055] loop7: detected capacity change from 0 to 512 22:28:38 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0", 0x2d, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}], 0x0, &(0x7f0000012c00)) [ 1126.362048] loop5: detected capacity change from 0 to 512 22:28:38 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010100)="00000000080000000000f900b00cb2cc029f49d8b90449a7d5d54d49010000a566", 0x21, 0x4e0}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff4655fe0f4655fe0f4655f00000000000004", 0x1b, 0x2100}], 0x0, &(0x7f0000012c00)) [ 1126.366129] loop3: detected capacity change from 0 to 512 [ 1126.372178] EXT4-fs (loop3): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 1126.373558] EXT4-fs (loop3): group descriptors corrupted! [ 1126.377482] EXT4-fs (loop5): VFS: Can't find ext4 filesystem [ 1126.389770] EXT4-fs (loop7): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 1126.391067] EXT4-fs (loop7): group descriptors corrupted! 22:28:38 executing program 2: getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000040), &(0x7f0000000080)=0xc) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f0000000000000000010000", 0x4f, 0x400}, {&(0x7f0000010100)="00000000080000000000f900b00cb2cc029f49d8b90449a7d5d54d49010000a566", 0x21, 0x4e0}, {&(0x7f0000010400)="0200000003000000040000006a000f000300040000000000000000000f00bc0f", 0x20, 0x800}, {&(0x7f0000011600)="ed41000000080000dff4655fe0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}, {0x0}, {0x0}, {0x0}], 0x0, &(0x7f0000012c00)) 22:28:38 executing program 6: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010400)="0200000003", 0x5, 0x800}, {&(0x7f0000011600)="ed41000000080000dff4655fe0f4655fe0f4655f00000000000004", 0x1b, 0x2100}], 0x0, &(0x7f0000012c00)) [ 1126.471001] loop6: detected capacity change from 0 to 512 [ 1126.484495] loop2: detected capacity change from 0 to 512 [ 1126.493963] EXT4-fs (loop2): invalid first ino: 0 [ 1126.509547] EXT4-fs (loop6): ext4_check_descriptors: Inode table for group 0 overlaps superblock [ 1126.510880] EXT4-fs (loop6): group descriptors corrupted! [ 1126.523306] loop1: detected capacity change from 0 to 512 [ 1126.525127] loop4: detected capacity change from 0 to 512 [ 1126.541690] EXT4-fs (loop4): VFS: Can't find ext4 filesystem [ 1126.546964] EXT4-fs (loop1): corrupt root inode, run e2fsck [ 1126.548152] EXT4-fs (loop1): mount failed 22:28:52 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010100)="00000000080000000000f900b00cb2cc029f49d8b90449a7d5d54d49010000a566", 0x21, 0x4e0}, {&(0x7f0000010400)="0200000003000000", 0x8, 0x800}, {&(0x7f0000011600)="ed41000000080000dff4655fe0f4655fe0f4655f00000000000004", 0x1b, 0x2100}], 0x0, &(0x7f0000012c00)) 22:28:52 executing program 6: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010400)="0200000003", 0x5, 0x800}, {&(0x7f0000011600)="ed41000000080000dff4655fe0f4655fe0f4655f00000000000004", 0x1b, 0x2100}], 0x0, &(0x7f0000012c00)) 22:28:52 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010100)="00000000080000000000f900b00cb2cc029f49d8b90449a7d5d54d49010000a566", 0x21, 0x4e0}, {&(0x7f0000010400)="020000000300000004", 0x9}], 0x0, &(0x7f0000012c00)) [ 1140.158078] loop6: detected capacity change from 0 to 512 22:28:52 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010400)="020000000300000004", 0x9, 0x800}], 0x0, &(0x7f0000012c00)) 22:28:52 executing program 7: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4", 0x2e, 0x400}], 0x0, &(0x7f0000012c00)) 22:28:52 executing program 2: getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000040), &(0x7f0000000080)=0xc) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f0000000000000000010000", 0x4f, 0x400}, {&(0x7f0000010100)="00000000080000000000f900b00cb2cc029f49d8b90449a7d5d54d49010000a566", 0x21, 0x4e0}, {&(0x7f0000010400)="0200000003000000040000006a000f000300040000000000000000000f00bc0f", 0x20, 0x800}, {&(0x7f0000011600)="ed41000000080000dff4655fe0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}, {0x0}, {0x0}, {0x0}], 0x0, &(0x7f0000012c00)) 22:28:52 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f", 0x44, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}], 0x0, &(0x7f0000012c00)) 22:28:52 executing program 0: getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000040), &(0x7f0000000080)=0xc) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x7, &(0x7f0000000200)=[{0x0, 0x0, 0x400}, {&(0x7f0000010100)="00000000080000000000f900b00cb2cc029f49d8b90449a7d5d54d49010000a566", 0x21, 0x4e0}, {&(0x7f0000010400)="0200000003000000040000006a000f000300040000000000000000000f00bc0f", 0x20, 0x800}, {&(0x7f0000011600)="ed41000000080000dff4655fe0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}, {0x0}, {0x0}, {0x0}], 0x0, &(0x7f0000012c00)) [ 1140.184546] EXT4-fs (loop6): ext4_check_descriptors: Inode table for group 0 overlaps superblock [ 1140.185578] EXT4-fs (loop6): group descriptors corrupted! [ 1140.189280] loop3: detected capacity change from 0 to 512 [ 1140.190648] loop2: detected capacity change from 0 to 512 [ 1140.195587] loop0: detected capacity change from 0 to 512 [ 1140.198275] loop7: detected capacity change from 0 to 512 [ 1140.202853] EXT4-fs (loop2): invalid first ino: 0 [ 1140.203982] loop5: detected capacity change from 0 to 512 [ 1140.209565] loop1: detected capacity change from 0 to 512 [ 1140.218202] loop4: detected capacity change from 0 to 512 22:28:52 executing program 6: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010400)="0200000003", 0x5, 0x800}, {&(0x7f0000011600)="ed41000000080000dff4655fe0f4655fe0f4655f00000000000004", 0x1b, 0x2100}], 0x0, &(0x7f0000012c00)) [ 1140.222970] EXT4-fs (loop7): VFS: Can't find ext4 filesystem [ 1140.224677] EXT4-fs (loop0): VFS: Can't find ext4 filesystem [ 1140.227545] EXT4-fs (loop3): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 1140.228766] EXT4-fs (loop3): group descriptors corrupted! [ 1140.236882] EXT4-fs (loop1): ext4_check_descriptors: Inode table for group 0 overlaps superblock [ 1140.237557] EXT4-fs (loop1): group descriptors corrupted! [ 1140.242476] EXT4-fs (loop5): VFS: Can't find ext4 filesystem 22:28:52 executing program 7: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4", 0x2e, 0x400}], 0x0, &(0x7f0000012c00)) 22:28:52 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010100)="00000000080000000000f900b00cb2cc029f49d8b90449a7d5d54d49010000a566", 0x21, 0x4e0}, {&(0x7f0000010400)="020000000300000004", 0x9}], 0x0, &(0x7f0000012c00)) [ 1140.288497] EXT4-fs error (device loop4): __ext4_fill_super:5244: inode #2: comm syz-executor.4: iget: root inode unallocated [ 1140.290325] loop7: detected capacity change from 0 to 512 [ 1140.296924] EXT4-fs (loop4): get root inode failed [ 1140.297899] EXT4-fs (loop4): mount failed [ 1140.298921] EXT4-fs (loop7): VFS: Can't find ext4 filesystem 22:28:52 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x2, &(0x7f0000000200)=[{0x0, 0x0, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}], 0x0, &(0x7f0000012c00)) [ 1140.330108] loop6: detected capacity change from 0 to 512 [ 1140.349511] EXT4-fs (loop6): ext4_check_descriptors: Inode table for group 0 overlaps superblock [ 1140.350757] EXT4-fs (loop6): group descriptors corrupted! [ 1140.382290] loop5: detected capacity change from 0 to 512 [ 1140.383441] loop3: detected capacity change from 0 to 512 [ 1140.387820] EXT4-fs (loop5): VFS: Can't find ext4 filesystem [ 1140.391343] EXT4-fs (loop3): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 1140.392192] EXT4-fs (loop3): group descriptors corrupted! 22:29:06 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}], 0x0, &(0x7f0000012c00)) 22:29:06 executing program 2: getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000040), &(0x7f0000000080)=0xc) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f0000000000000000010000", 0x4f, 0x400}, {&(0x7f0000010100)="00000000080000000000f900b00cb2cc029f49d8b90449a7d5d54d49010000a566", 0x21, 0x4e0}, {&(0x7f0000010400)="0200000003000000040000006a000f000300040000000000000000000f00bc0f", 0x20, 0x800}, {&(0x7f0000011600)="ed41000000080000dff4655fe0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}, {0x0}, {0x0}, {0x0}], 0x0, &(0x7f0000012c00)) 22:29:06 executing program 6: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010400)="02000000030000", 0x7, 0x800}, {&(0x7f0000011600)="ed41000000080000dff4655fe0f4655fe0f4655f00000000000004", 0x1b, 0x2100}], 0x0, &(0x7f0000012c00)) 22:29:06 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010100)="00000000080000000000f900b00cb2cc029f49d8b90449a7d5d54d49010000a566", 0x21, 0x4e0}, {&(0x7f0000010400)="0200000003000000", 0x8, 0x800}, {&(0x7f0000011600)="ed41000000080000dff4655fe0f4655fe0f4655f00000000000004", 0x1b, 0x2100}], 0x0, &(0x7f0000012c00)) [ 1153.855286] loop4: detected capacity change from 0 to 512 [ 1153.856444] loop6: detected capacity change from 0 to 512 [ 1153.866263] EXT4-fs (loop4): VFS: Can't find ext4 filesystem [ 1153.868146] loop3: detected capacity change from 0 to 512 [ 1153.879128] EXT4-fs error (device loop3): __ext4_fill_super:5244: inode #2: comm syz-executor.3: iget: root inode unallocated [ 1153.881465] EXT4-fs (loop3): get root inode failed [ 1153.881984] EXT4-fs (loop3): mount failed [ 1153.898797] EXT4-fs (loop6): ext4_check_descriptors: Inode table for group 0 overlaps superblock [ 1153.900152] EXT4-fs (loop6): group descriptors corrupted! [ 1153.900641] loop0: detected capacity change from 0 to 512 [ 1153.904358] loop2: detected capacity change from 0 to 512 22:29:06 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010100)="00000000080000000000f900b00cb2cc029f49d8b90449a7d5d54d49010000a566", 0x21, 0x4e0}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff4655fe0f4655fe0f4655f00000000000004", 0x1b, 0x2100}], 0x0, &(0x7f0000012c00)) 22:29:06 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4", 0x2e, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}], 0x0, &(0x7f0000012c00)) 22:29:06 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x2, &(0x7f0000000200)=[{0x0, 0x0, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}], 0x0, &(0x7f0000012c00)) 22:29:06 executing program 7: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4", 0x2e, 0x400}], 0x0, &(0x7f0000012c00)) [ 1153.911028] loop7: detected capacity change from 0 to 512 22:29:06 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4", 0x2e, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}], 0x0, &(0x7f0000012c00)) [ 1153.921013] EXT4-fs (loop2): invalid first ino: 0 [ 1153.921993] EXT4-fs (loop7): VFS: Can't find ext4 filesystem [ 1153.927406] loop5: detected capacity change from 0 to 512 [ 1153.930271] loop1: detected capacity change from 0 to 512 [ 1153.937763] EXT4-fs (loop0): corrupt root inode, run e2fsck [ 1153.938913] EXT4-fs (loop0): mount failed [ 1153.940232] EXT4-fs (loop5): VFS: Can't find ext4 filesystem [ 1153.949113] EXT4-fs (loop1): ext4_check_descriptors: Inode table for group 0 overlaps superblock [ 1153.950083] EXT4-fs (loop1): group descriptors corrupted! 22:29:06 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0x800}], 0x0, &(0x7f0000012c00)) [ 1154.011029] loop3: detected capacity change from 0 to 512 22:29:06 executing program 7: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53", 0x39, 0x400}], 0x0, &(0x7f0000012c00)) 22:29:06 executing program 2: getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000040), &(0x7f0000000080)=0xc) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b", 0x55, 0x400}, {&(0x7f0000010100)="00000000080000000000f900b00cb2cc029f49d8b90449a7d5d54d49010000a566", 0x21, 0x4e0}, {&(0x7f0000010400)="0200000003000000040000006a000f000300040000000000000000000f00bc0f", 0x20, 0x800}, {&(0x7f0000011600)="ed41000000080000dff4655fe0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}, {0x0}, {0x0}, {0x0}], 0x0, &(0x7f0000012c00)) [ 1154.020483] EXT4-fs (loop3): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 1154.021139] EXT4-fs (loop3): group descriptors corrupted! [ 1154.030675] loop4: detected capacity change from 0 to 512 22:29:06 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010100)="00000000080000000000f900b00cb2cc029f49d8b90449a7d5d54d49010000a566", 0x21, 0x4e0}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff4655fe0f4655fe0f4655f00000000000004", 0x1b, 0x2100}], 0x0, &(0x7f0000012c00)) 22:29:06 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010100)="00000000080000000000f900b00cb2cc029f49d8b90449a7d5d54d49010000a566", 0x21, 0x4e0}, {&(0x7f0000010400)="0200000003000000", 0x8, 0x800}, {&(0x7f0000011600)="ed41000000080000dff4655fe0f4655fe0f4655f00000000000004", 0x1b, 0x2100}], 0x0, &(0x7f0000012c00)) [ 1154.053272] EXT4-fs (loop4): VFS: Can't find ext4 filesystem 22:29:06 executing program 6: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010400)="02000000030000", 0x7, 0x800}, {&(0x7f0000011600)="ed41000000080000dff4655fe0f4655fe0f4655f00000000000004", 0x1b, 0x2100}], 0x0, &(0x7f0000012c00)) [ 1154.071394] loop7: detected capacity change from 0 to 512 [ 1154.076873] loop1: detected capacity change from 0 to 512 22:29:06 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x2, &(0x7f0000000200)=[{0x0, 0x0, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}], 0x0, &(0x7f0000012c00)) [ 1154.088332] EXT4-fs (loop1): ext4_check_descriptors: Inode table for group 0 overlaps superblock [ 1154.089396] EXT4-fs (loop1): group descriptors corrupted! 22:29:06 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0x800}], 0x0, &(0x7f0000012c00)) [ 1154.110776] EXT4-fs (loop7): VFS: Can't find ext4 filesystem [ 1154.121210] loop6: detected capacity change from 0 to 512 [ 1154.133657] EXT4-fs (loop6): ext4_check_descriptors: Inode table for group 0 overlaps superblock [ 1154.134478] EXT4-fs (loop6): group descriptors corrupted! [ 1154.144303] loop3: detected capacity change from 0 to 512 [ 1154.148421] loop0: detected capacity change from 0 to 512 [ 1154.153358] loop2: detected capacity change from 0 to 512 [ 1154.160301] EXT4-fs (loop3): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 1154.160982] EXT4-fs (loop3): group descriptors corrupted! [ 1154.169465] loop5: detected capacity change from 0 to 512 [ 1154.169987] EXT4-fs (loop2): unsupported inode size: 0 [ 1154.170865] EXT4-fs (loop2): blocksize: 2048 [ 1154.176428] EXT4-fs (loop0): corrupt root inode, run e2fsck [ 1154.177050] EXT4-fs (loop0): mount failed [ 1154.189355] EXT4-fs (loop5): VFS: Can't find ext4 filesystem 22:29:20 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010100)="00000000080000000000f900b00cb2cc029f49d8b90449a7d5d54d49010000a566", 0x21, 0x4e0}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff4655fe0f4655fe0f4655f00000000000004", 0x1b, 0x2100}], 0x0, &(0x7f0000012c00)) 22:29:20 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010100)="00000000080000000000f900b00cb2cc029f49d8b90449a7d5d54d49010000a566", 0x21, 0x4e0}, {&(0x7f0000010400)="020000000300000004", 0x9}, {&(0x7f0000011600)="ed41000000080000dff4655fe0f4655fe0f4655f00000000000004", 0x1b, 0x2100}], 0x0, &(0x7f0000012c00)) 22:29:20 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000), 0x0, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}], 0x0, &(0x7f0000012c00)) 22:29:20 executing program 6: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010400)="02000000030000", 0x7, 0x800}, {&(0x7f0000011600)="ed41000000080000dff4655fe0f4655fe0f4655f00000000000004", 0x1b, 0x2100}], 0x0, &(0x7f0000012c00)) 22:29:20 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4", 0x2e, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}], 0x0, &(0x7f0000012c00)) 22:29:20 executing program 7: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53", 0x39, 0x400}], 0x0, &(0x7f0000012c00)) 22:29:20 executing program 2: getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000040), &(0x7f0000000080)=0xc) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b", 0x55, 0x400}, {&(0x7f0000010100)="00000000080000000000f900b00cb2cc029f49d8b90449a7d5d54d49010000a566", 0x21, 0x4e0}, {&(0x7f0000010400)="0200000003000000040000006a000f000300040000000000000000000f00bc0f", 0x20, 0x800}, {&(0x7f0000011600)="ed41000000080000dff4655fe0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}, {0x0}, {0x0}, {0x0}], 0x0, &(0x7f0000012c00)) 22:29:20 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0x800}], 0x0, &(0x7f0000012c00)) [ 1167.911430] loop4: detected capacity change from 0 to 512 [ 1167.912911] loop3: detected capacity change from 0 to 512 [ 1167.915932] loop1: detected capacity change from 0 to 512 [ 1167.918459] loop6: detected capacity change from 0 to 512 [ 1167.923738] EXT4-fs (loop3): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 1167.924363] EXT4-fs (loop3): group descriptors corrupted! [ 1167.927243] EXT4-fs (loop4): VFS: Can't find ext4 filesystem [ 1167.928026] EXT4-fs (loop6): ext4_check_descriptors: Inode table for group 0 overlaps superblock [ 1167.928670] EXT4-fs (loop6): group descriptors corrupted! [ 1167.930555] EXT4-fs (loop1): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 1167.931245] EXT4-fs (loop1): group descriptors corrupted! [ 1167.931729] loop0: detected capacity change from 0 to 512 [ 1167.938418] loop7: detected capacity change from 0 to 512 [ 1167.940699] loop5: detected capacity change from 0 to 512 [ 1167.949461] loop2: detected capacity change from 0 to 512 [ 1167.957979] EXT4-fs (loop5): VFS: Can't find ext4 filesystem [ 1167.959743] EXT4-fs (loop7): VFS: Can't find ext4 filesystem [ 1167.968987] EXT4-fs (loop2): unsupported inode size: 0 [ 1167.969982] EXT4-fs (loop2): blocksize: 2048 [ 1167.973019] EXT4-fs (loop0): corrupt root inode, run e2fsck [ 1167.974173] EXT4-fs (loop0): mount failed 22:29:20 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53", 0x39, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}], 0x0, &(0x7f0000012c00)) 22:29:20 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010100)="00000000080000000000f900b00cb2cc029f49d8b90449a7d5d54d49010000a566", 0x21, 0x4e0}, {&(0x7f0000010400)="020000000300000004", 0x9}, {&(0x7f0000011600)="ed41000000080000dff4655fe0f4655fe0f4655f00000000000004", 0x1b, 0x2100}], 0x0, &(0x7f0000012c00)) 22:29:20 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010400), 0x0, 0x800}], 0x0, &(0x7f0000012c00)) 22:29:20 executing program 6: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010400)="0200000003000000", 0x8, 0x800}, {&(0x7f0000011600)="ed41000000080000dff4655fe0f4655fe0f4655f00000000000004", 0x1b, 0x2100}], 0x0, &(0x7f0000012c00)) [ 1168.045938] loop4: detected capacity change from 0 to 512 [ 1168.047998] loop6: detected capacity change from 0 to 512 [ 1168.050394] loop1: detected capacity change from 0 to 512 [ 1168.053082] loop3: detected capacity change from 0 to 512 [ 1168.058816] EXT4-fs (loop6): ext4_check_descriptors: Inode table for group 0 overlaps superblock [ 1168.059739] EXT4-fs (loop6): group descriptors corrupted! [ 1168.062188] EXT4-fs (loop4): VFS: Can't find ext4 filesystem [ 1168.063189] EXT4-fs (loop1): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 1168.064133] EXT4-fs (loop1): group descriptors corrupted! [ 1168.070271] EXT4-fs (loop3): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 1168.071327] EXT4-fs (loop3): group descriptors corrupted! 22:29:20 executing program 7: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53", 0x39, 0x400}], 0x0, &(0x7f0000012c00)) 22:29:20 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000), 0x0, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}], 0x0, &(0x7f0000012c00)) 22:29:20 executing program 2: getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000040), &(0x7f0000000080)=0xc) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b", 0x55, 0x400}, {&(0x7f0000010100)="00000000080000000000f900b00cb2cc029f49d8b90449a7d5d54d49010000a566", 0x21, 0x4e0}, {&(0x7f0000010400)="0200000003000000040000006a000f000300040000000000000000000f00bc0f", 0x20, 0x800}, {&(0x7f0000011600)="ed41000000080000dff4655fe0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}, {0x0}, {0x0}, {0x0}], 0x0, &(0x7f0000012c00)) 22:29:20 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010400), 0x0, 0x800}], 0x0, &(0x7f0000012c00)) 22:29:20 executing program 0: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010100)="00000000080000000000f900b00cb2cc029f49d8b90449a7d5d54d49010000a566", 0x21, 0x4e0}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff4655fe0f4655fe0f4655f00000000000004", 0x1b, 0x2100}], 0x0, &(0x7f0000012c00)) 22:29:20 executing program 6: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010400)="0200000003000000", 0x8, 0x800}, {&(0x7f0000011600)="ed41000000080000dff4655fe0f4655fe0f4655f00000000000004", 0x1b, 0x2100}], 0x0, &(0x7f0000012c00)) 22:29:20 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010100)="00000000080000000000f900b00cb2cc029f49d8b90449a7d5d54d49010000a566", 0x21, 0x4e0}, {&(0x7f0000010400)="020000000300000004", 0x9}, {&(0x7f0000011600)="ed41000000080000dff4655fe0f4655fe0f4655f00000000000004", 0x1b, 0x2100}], 0x0, &(0x7f0000012c00)) 22:29:20 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53", 0x39, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}], 0x0, &(0x7f0000012c00)) [ 1168.184454] loop6: detected capacity change from 0 to 512 [ 1168.187910] loop4: detected capacity change from 0 to 512 [ 1168.193060] loop1: detected capacity change from 0 to 512 [ 1168.194235] loop3: detected capacity change from 0 to 512 [ 1168.198412] EXT4-fs (loop6): ext4_check_descriptors: Inode table for group 0 overlaps superblock [ 1168.199097] EXT4-fs (loop6): group descriptors corrupted! [ 1168.199807] EXT4-fs (loop3): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 1168.200414] EXT4-fs (loop3): group descriptors corrupted! [ 1168.203034] EXT4-fs (loop4): VFS: Can't find ext4 filesystem [ 1168.212564] EXT4-fs (loop1): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 1168.213536] EXT4-fs (loop1): group descriptors corrupted! [ 1168.214336] loop7: detected capacity change from 0 to 512 [ 1168.221826] loop5: detected capacity change from 0 to 512 [ 1168.239279] loop2: detected capacity change from 0 to 512 [ 1168.241576] EXT4-fs (loop7): VFS: Can't find ext4 filesystem [ 1168.242814] EXT4-fs (loop5): VFS: Can't find ext4 filesystem [ 1168.253200] loop0: detected capacity change from 0 to 512 [ 1168.255718] EXT4-fs (loop2): unsupported inode size: 0 [ 1168.256501] EXT4-fs (loop2): blocksize: 2048 22:29:20 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010400), 0x0, 0x800}], 0x0, &(0x7f0000012c00)) 22:29:20 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53", 0x39, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}], 0x0, &(0x7f0000012c00)) 22:29:20 executing program 6: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010400)="0200000003000000", 0x8, 0x800}, {&(0x7f0000011600)="ed41000000080000dff4655fe0f4655fe0f4655f00000000000004", 0x1b, 0x2100}], 0x0, &(0x7f0000012c00)) 22:29:20 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff4655fe0f4655fe0f4655f00000000000004", 0x1b, 0x2100}], 0x0, &(0x7f0000012c00)) [ 1168.326439] loop6: detected capacity change from 0 to 512 [ 1168.328507] loop4: detected capacity change from 0 to 512 [ 1168.335989] loop1: detected capacity change from 0 to 512 [ 1168.339724] EXT4-fs (loop4): VFS: Can't find ext4 filesystem [ 1168.344152] EXT4-fs (loop6): ext4_check_descriptors: Inode table for group 0 overlaps superblock [ 1168.345108] EXT4-fs (loop6): group descriptors corrupted! [ 1168.367320] EXT4-fs (loop1): corrupt root inode, run e2fsck [ 1168.368018] EXT4-fs (loop1): mount failed 22:29:36 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0x800}, {&(0x7f0000011600)="ed41000000080000dff4655fe0f4655fe0f4655f00000000000004", 0x1b, 0x2100}], 0x0, &(0x7f0000012c00)) 22:29:36 executing program 7: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef0100010000", 0x3f, 0x400}], 0x0, &(0x7f0000012c00)) 22:29:36 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef0100010000", 0x3f, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}], 0x0, &(0x7f0000012c00)) 22:29:36 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010400)="0200000003", 0x5, 0x800}], 0x0, &(0x7f0000012c00)) 22:29:36 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000), 0x0, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}], 0x0, &(0x7f0000012c00)) [ 1184.600462] loop4: detected capacity change from 0 to 512 22:29:36 executing program 0: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010100)="00000000080000000000f900b00cb2cc029f49d8b90449a7d5d54d49010000a566", 0x21, 0x4e0}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff4655fe0f4655fe0f4655f00000000000004", 0x1b, 0x2100}], 0x0, &(0x7f0000012c00)) 22:29:36 executing program 2: getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000040), &(0x7f0000000080)=0xc) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b000000", 0x58, 0x400}, {&(0x7f0000010100)="00000000080000000000f900b00cb2cc029f49d8b90449a7d5d54d49010000a566", 0x21, 0x4e0}, {&(0x7f0000010400)="0200000003000000040000006a000f000300040000000000000000000f00bc0f", 0x20, 0x800}, {&(0x7f0000011600)="ed41000000080000dff4655fe0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}, {0x0}, {0x0}, {0x0}], 0x0, &(0x7f0000012c00)) 22:29:36 executing program 6: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9}, {&(0x7f0000011600)="ed41000000080000dff4655fe0f4655fe0f4655f00000000000004", 0x1b, 0x2100}], 0x0, &(0x7f0000012c00)) [ 1184.624073] loop6: detected capacity change from 0 to 512 [ 1184.628150] EXT4-fs (loop6): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 1184.629387] EXT4-fs (loop6): group descriptors corrupted! [ 1184.636448] loop3: detected capacity change from 0 to 512 [ 1184.639306] loop5: detected capacity change from 0 to 512 [ 1184.639358] EXT4-fs error (device loop4): __ext4_fill_super:5244: inode #2: comm syz-executor.4: iget: root inode unallocated [ 1184.642133] EXT4-fs (loop4): get root inode failed [ 1184.642670] EXT4-fs (loop4): mount failed [ 1184.648482] loop0: detected capacity change from 0 to 512 [ 1184.657915] EXT4-fs (loop5): VFS: Can't find ext4 filesystem [ 1184.659253] EXT4-fs (loop3): ext4_check_descriptors: Inode table for group 0 overlaps superblock [ 1184.659825] loop7: detected capacity change from 0 to 512 [ 1184.660064] EXT4-fs (loop3): group descriptors corrupted! [ 1184.662755] loop1: detected capacity change from 0 to 512 [ 1184.687865] loop2: detected capacity change from 0 to 512 [ 1184.719321] EXT4-fs (loop7): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 1184.720729] EXT4-fs (loop7): group descriptors corrupted! [ 1184.729710] EXT4-fs (loop2): unsupported inode size: 0 [ 1184.730544] EXT4-fs (loop2): blocksize: 2048 [ 1184.733864] EXT4-fs (loop1): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 1184.735504] EXT4-fs (loop1): group descriptors corrupted! [ 1197.145548] loop0: detected capacity change from 0 to 512 [ 1197.158978] loop4: detected capacity change from 0 to 512 22:29:49 executing program 2: getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000040), &(0x7f0000000080)=0xc) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b000000", 0x58, 0x400}, {&(0x7f0000010100)="00000000080000000000f900b00cb2cc029f49d8b90449a7d5d54d49010000a566", 0x21, 0x4e0}, {&(0x7f0000010400)="0200000003000000040000006a000f000300040000000000000000000f00bc0f", 0x20, 0x800}, {&(0x7f0000011600)="ed41000000080000dff4655fe0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}, {0x0}, {0x0}, {0x0}], 0x0, &(0x7f0000012c00)) 22:29:49 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010400)="0200000003", 0x5, 0x800}], 0x0, &(0x7f0000012c00)) 22:29:49 executing program 7: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000012c00)) 22:29:49 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}], 0x0, &(0x7f0000012c00)) 22:29:49 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0x800}, {&(0x7f0000011600)="ed41000000080000dff4655fe0f4655fe0f4655f00000000000004", 0x1b, 0x2100}], 0x0, &(0x7f0000012c00)) 22:29:49 executing program 6: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9}, {&(0x7f0000011600)="ed41000000080000dff4655fe0f4655fe0f4655f00000000000004", 0x1b, 0x2100}], 0x0, &(0x7f0000012c00)) 22:29:49 executing program 0: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010100)="00000000080000000000f900b00cb2cc029f49d8b90449a7d5d54d49010000a566", 0x21, 0x4e0}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff4655fe0f4655fe0f4655f00000000000004", 0x1b, 0x2100}], 0x0, &(0x7f0000012c00)) 22:29:49 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0", 0x2d, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}], 0x0, &(0x7f0000012c00)) [ 1197.161691] loop5: detected capacity change from 0 to 512 [ 1197.166209] EXT4-fs (loop5): VFS: Can't find ext4 filesystem [ 1197.167302] EXT4-fs error (device loop4): __ext4_fill_super:5244: inode #2: comm syz-executor.4: iget: root inode unallocated [ 1197.170076] EXT4-fs (loop4): get root inode failed [ 1197.170588] EXT4-fs (loop4): mount failed [ 1197.200865] loop2: detected capacity change from 0 to 512 22:29:49 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0", 0x2d, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}], 0x0, &(0x7f0000012c00)) 22:29:49 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f01", 0x35, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}], 0x0, &(0x7f0000012c00)) [ 1197.226253] loop5: detected capacity change from 0 to 512 [ 1197.228965] EXT4-fs (loop5): VFS: Can't find ext4 filesystem [ 1197.231719] loop1: detected capacity change from 0 to 512 [ 1197.239524] EXT4-fs (loop1): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 1197.240361] EXT4-fs (loop1): group descriptors corrupted! [ 1197.243284] EXT4-fs (loop2): unsupported inode size: 0 [ 1197.244136] EXT4-fs (loop2): blocksize: 2048 [ 1197.246365] loop3: detected capacity change from 0 to 512 [ 1197.247720] loop7: detected capacity change from 0 to 512 [ 1197.252000] loop6: detected capacity change from 0 to 512 [ 1197.253278] EXT4-fs (loop3): ext4_check_descriptors: Inode table for group 0 overlaps superblock [ 1197.254264] EXT4-fs (loop3): group descriptors corrupted! [ 1197.271383] loop4: detected capacity change from 0 to 512 [ 1197.277407] EXT4-fs (loop7): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 1197.278855] EXT4-fs (loop7): group descriptors corrupted! [ 1197.280674] EXT4-fs (loop4): VFS: Can't find ext4 filesystem [ 1197.281708] EXT4-fs (loop6): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 1197.283135] EXT4-fs (loop6): group descriptors corrupted! 22:29:49 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0", 0x2d, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}], 0x0, &(0x7f0000012c00)) 22:29:49 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0x800}, {&(0x7f0000011600)="ed41000000080000dff4655fe0f4655fe0f4655f00000000000004", 0x1b, 0x2100}], 0x0, &(0x7f0000012c00)) 22:29:49 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', 0x0, 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010100)="00000000080000000000f900b00cb2cc029f49d8b90449a7d5d54d49010000a566", 0x21, 0x4e0}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff4655fe0f4655fe0f4655f00000000000004", 0x1b, 0x2100}], 0x0, &(0x7f0000012c00)) 22:29:49 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f01", 0x35, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}], 0x0, &(0x7f0000012c00)) 22:29:49 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010400)="0200000003", 0x5, 0x800}], 0x0, &(0x7f0000012c00)) [ 1197.362425] loop1: detected capacity change from 0 to 512 [ 1197.365949] loop5: detected capacity change from 0 to 512 [ 1197.374253] EXT4-fs (loop1): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 1197.375039] EXT4-fs (loop1): group descriptors corrupted! [ 1197.376746] EXT4-fs (loop5): VFS: Can't find ext4 filesystem 22:29:49 executing program 2: getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000040), &(0x7f0000000080)=0xc) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b000000", 0x58, 0x400}, {&(0x7f0000010100)="00000000080000000000f900b00cb2cc029f49d8b90449a7d5d54d49010000a566", 0x21, 0x4e0}, {&(0x7f0000010400)="0200000003000000040000006a000f000300040000000000000000000f00bc0f", 0x20, 0x800}, {&(0x7f0000011600)="ed41000000080000dff4655fe0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}, {0x0}, {0x0}, {0x0}], 0x0, &(0x7f0000012c00)) [ 1197.392104] loop0: detected capacity change from 0 to 512 22:29:49 executing program 6: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9}, {&(0x7f0000011600)="ed41000000080000dff4655fe0f4655fe0f4655f00000000000004", 0x1b, 0x2100}], 0x0, &(0x7f0000012c00)) [ 1197.412900] loop4: detected capacity change from 0 to 512 [ 1197.421029] EXT4-fs (loop4): VFS: Can't find ext4 filesystem 22:29:49 executing program 7: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f01", 0x35, 0x400}], 0x0, &(0x7f0000012c00)) [ 1197.459531] loop2: detected capacity change from 0 to 512 [ 1197.467793] loop3: detected capacity change from 0 to 512 [ 1197.481395] EXT4-fs (loop2): unsupported inode size: 0 [ 1197.482453] EXT4-fs (loop2): blocksize: 2048 [ 1197.484609] loop7: detected capacity change from 0 to 512 [ 1197.489921] EXT4-fs (loop3): ext4_check_descriptors: Inode table for group 0 overlaps superblock [ 1197.491260] EXT4-fs (loop3): group descriptors corrupted! [ 1197.493727] EXT4-fs (loop7): VFS: Can't find ext4 filesystem [ 1197.520032] loop6: detected capacity change from 0 to 512 [ 1197.536119] EXT4-fs (loop6): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 1197.537390] EXT4-fs (loop6): group descriptors corrupted! 22:30:04 executing program 6: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff4655fe0f4655fe0f4655f00000000000004", 0x1b, 0x2100}], 0x0, &(0x7f0000012c00)) 22:30:04 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010400)="02000000030000", 0x7, 0x800}], 0x0, &(0x7f0000012c00)) [ 1212.050201] loop6: detected capacity change from 0 to 512 22:30:04 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', 0x0, 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010100)="00000000080000000000f900b00cb2cc029f49d8b90449a7d5d54d49010000a566", 0x21, 0x4e0}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff4655fe0f4655fe0f4655f00000000000004", 0x1b, 0x2100}], 0x0, &(0x7f0000012c00)) 22:30:04 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f01", 0x35, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}], 0x0, &(0x7f0000012c00)) 22:30:04 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010400), 0x0, 0x800}, {&(0x7f0000011600)="ed41000000080000dff4655fe0f4655fe0f4655f00000000000004", 0x1b, 0x2100}], 0x0, &(0x7f0000012c00)) 22:30:04 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f", 0x44, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}], 0x0, &(0x7f0000012c00)) 22:30:04 executing program 7: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f01", 0x35, 0x400}], 0x0, &(0x7f0000012c00)) 22:30:04 executing program 2: getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000040), &(0x7f0000000080)=0xc) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b00000000", 0x59, 0x400}, {&(0x7f0000010100)="00000000080000000000f900b00cb2cc029f49d8b90449a7d5d54d49010000a566", 0x21, 0x4e0}, {&(0x7f0000010400)="0200000003000000040000006a000f000300040000000000000000000f00bc0f", 0x20, 0x800}, {&(0x7f0000011600)="ed41000000080000dff4655fe0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}, {0x0}, {0x0}, {0x0}], 0x0, &(0x7f0000012c00)) [ 1212.052390] loop3: detected capacity change from 0 to 512 [ 1212.064935] EXT4-fs (loop6): VFS: Can't find ext4 filesystem [ 1212.067411] loop5: detected capacity change from 0 to 512 [ 1212.074896] loop4: detected capacity change from 0 to 512 [ 1212.076272] EXT4-fs (loop3): ext4_check_descriptors: Inode table for group 0 overlaps superblock [ 1212.076992] EXT4-fs (loop3): group descriptors corrupted! [ 1212.086791] loop2: detected capacity change from 0 to 512 [ 1212.090324] loop0: detected capacity change from 0 to 512 [ 1212.101258] loop7: detected capacity change from 0 to 512 [ 1212.108140] EXT4-fs (loop2): unsupported inode size: 0 [ 1212.109043] EXT4-fs (loop2): blocksize: 2048 [ 1212.111326] EXT4-fs (loop4): VFS: Can't find ext4 filesystem [ 1212.112743] EXT4-fs (loop7): VFS: Can't find ext4 filesystem [ 1212.115805] loop1: detected capacity change from 0 to 512 [ 1212.118243] EXT4-fs error (device loop5): __ext4_fill_super:5244: inode #2: comm syz-executor.5: iget: root inode unallocated [ 1212.122307] EXT4-fs (loop1): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 1212.123172] EXT4-fs (loop1): group descriptors corrupted! [ 1212.128732] EXT4-fs (loop5): get root inode failed [ 1212.129111] EXT4-fs (loop5): mount failed 22:30:04 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010400)="02000000030000", 0x7, 0x800}], 0x0, &(0x7f0000012c00)) 22:30:04 executing program 6: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff4655fe0f4655fe0f4655f00000000000004", 0x1b, 0x2100}], 0x0, &(0x7f0000012c00)) 22:30:04 executing program 2: getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000040), &(0x7f0000000080)=0xc) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b00000000", 0x59, 0x400}, {&(0x7f0000010100)="00000000080000000000f900b00cb2cc029f49d8b90449a7d5d54d49010000a566", 0x21, 0x4e0}, {&(0x7f0000010400)="0200000003000000040000006a000f000300040000000000000000000f00bc0f", 0x20, 0x800}, {&(0x7f0000011600)="ed41000000080000dff4655fe0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}, {0x0}, {0x0}, {0x0}], 0x0, &(0x7f0000012c00)) 22:30:04 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', 0x0, 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010100)="00000000080000000000f900b00cb2cc029f49d8b90449a7d5d54d49010000a566", 0x21, 0x4e0}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff4655fe0f4655fe0f4655f00000000000004", 0x1b, 0x2100}], 0x0, &(0x7f0000012c00)) 22:30:04 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4", 0x2e, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}], 0x0, &(0x7f0000012c00)) [ 1212.218257] loop6: detected capacity change from 0 to 512 [ 1212.221153] loop3: detected capacity change from 0 to 512 [ 1212.226028] loop2: detected capacity change from 0 to 512 22:30:04 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff", 0x38, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}], 0x0, &(0x7f0000012c00)) [ 1212.234787] EXT4-fs (loop6): VFS: Can't find ext4 filesystem [ 1212.237792] EXT4-fs (loop3): ext4_check_descriptors: Inode table for group 0 overlaps superblock [ 1212.238411] EXT4-fs (loop3): group descriptors corrupted! 22:30:04 executing program 7: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f01", 0x35, 0x400}], 0x0, &(0x7f0000012c00)) [ 1212.250982] EXT4-fs (loop2): unsupported inode size: 0 [ 1212.251397] EXT4-fs (loop2): blocksize: 2048 [ 1212.252276] loop4: detected capacity change from 0 to 512 [ 1212.264082] EXT4-fs (loop4): VFS: Can't find ext4 filesystem 22:30:04 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010400), 0x0, 0x800}, {&(0x7f0000011600)="ed41000000080000dff4655fe0f4655fe0f4655f00000000000004", 0x1b, 0x2100}], 0x0, &(0x7f0000012c00)) 22:30:04 executing program 6: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff4655fe0f4655fe0f4655f00000000000004", 0x1b, 0x2100}], 0x0, &(0x7f0000012c00)) [ 1212.304434] loop5: detected capacity change from 0 to 512 [ 1212.311117] loop0: detected capacity change from 0 to 512 [ 1212.323616] EXT4-fs (loop5): VFS: Can't find ext4 filesystem [ 1212.362045] loop7: detected capacity change from 0 to 512 [ 1212.364194] loop1: detected capacity change from 0 to 512 [ 1212.371580] EXT4-fs (loop1): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 1212.372328] EXT4-fs (loop1): group descriptors corrupted! [ 1212.375338] EXT4-fs (loop7): VFS: Can't find ext4 filesystem [ 1226.670086] loop2: detected capacity change from 0 to 512 22:30:18 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010100)="00000000080000000000f900b00cb2cc029f49d8b90449a7d5d54d49010000a566", 0x21, 0x4e0}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff4655fe0f4655fe0f4655f00000000000004", 0x1b, 0x2100}], 0x0, &(0x7f0000012c00)) 22:30:18 executing program 2: getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000040), &(0x7f0000000080)=0xc) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b00000000", 0x59, 0x400}, {&(0x7f0000010100)="00000000080000000000f900b00cb2cc029f49d8b90449a7d5d54d49010000a566", 0x21, 0x4e0}, {&(0x7f0000010400)="0200000003000000040000006a000f000300040000000000000000000f00bc0f", 0x20, 0x800}, {&(0x7f0000011600)="ed41000000080000dff4655fe0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}, {0x0}, {0x0}, {0x0}], 0x0, &(0x7f0000012c00)) 22:30:18 executing program 7: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff", 0x38, 0x400}], 0x0, &(0x7f0000012c00)) 22:30:18 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4", 0x2e, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}], 0x0, &(0x7f0000012c00)) 22:30:18 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010400)="02000000030000", 0x7, 0x800}], 0x0, &(0x7f0000012c00)) 22:30:19 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff", 0x38, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}], 0x0, &(0x7f0000012c00)) 22:30:19 executing program 6: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{0x0, 0x0, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff4655fe0f4655fe0f4655f00000000000004", 0x1b, 0x2100}], 0x0, &(0x7f0000012c00)) 22:30:19 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010400), 0x0, 0x800}, {&(0x7f0000011600)="ed41000000080000dff4655fe0f4655fe0f4655f00000000000004", 0x1b, 0x2100}], 0x0, &(0x7f0000012c00)) [ 1226.687868] EXT4-fs (loop2): unsupported inode size: 0 [ 1226.688745] EXT4-fs (loop2): blocksize: 2048 [ 1226.689208] loop6: detected capacity change from 0 to 512 [ 1226.691011] loop3: detected capacity change from 0 to 512 [ 1226.695690] loop4: detected capacity change from 0 to 512 [ 1226.698058] loop1: detected capacity change from 0 to 512 [ 1226.700887] EXT4-fs (loop6): VFS: Can't find ext4 filesystem [ 1226.726693] EXT4-fs (loop4): VFS: Can't find ext4 filesystem [ 1226.730021] loop7: detected capacity change from 0 to 512 [ 1226.734402] EXT4-fs (loop1): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 1226.735972] EXT4-fs (loop1): group descriptors corrupted! [ 1226.736928] EXT4-fs (loop3): ext4_check_descriptors: Inode table for group 0 overlaps superblock [ 1226.738252] EXT4-fs (loop3): group descriptors corrupted! [ 1226.746061] loop5: detected capacity change from 0 to 512 [ 1226.760546] loop0: detected capacity change from 0 to 33 22:30:19 executing program 6: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{0x0, 0x0, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff4655fe0f4655fe0f4655f00000000000004", 0x1b, 0x2100}], 0x0, &(0x7f0000012c00)) [ 1226.780044] EXT4-fs (loop5): VFS: Can't find ext4 filesystem [ 1226.783649] EXT4-fs (loop7): VFS: Can't find ext4 filesystem [ 1226.797814] EXT4-fs (loop0): bad geometry: block count 128 exceeds size of device (8 blocks) [ 1226.867155] loop6: detected capacity change from 0 to 512 22:30:19 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010400)="0200000003000000", 0x8, 0x800}], 0x0, &(0x7f0000012c00)) [ 1226.882267] EXT4-fs (loop6): VFS: Can't find ext4 filesystem 22:30:19 executing program 2: getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000040), &(0x7f0000000080)=0xc) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a}, {&(0x7f0000010100)="00000000080000000000f900b00cb2cc029f49d8b90449a7d5d54d49010000a566", 0x21, 0x4e0}, {&(0x7f0000010400)="0200000003000000040000006a000f000300040000000000000000000f00bc0f", 0x20, 0x800}, {&(0x7f0000011600)="ed41000000080000dff4655fe0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}, {0x0}, {0x0}, {0x0}], 0x0, &(0x7f0000012c00)) 22:30:19 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4", 0x2e, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}], 0x0, &(0x7f0000012c00)) 22:30:19 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010400)="0200000003", 0x5, 0x800}, {&(0x7f0000011600)="ed41000000080000dff4655fe0f4655fe0f4655f00000000000004", 0x1b, 0x2100}], 0x0, &(0x7f0000012c00)) 22:30:19 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff", 0x38, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}], 0x0, &(0x7f0000012c00)) 22:30:19 executing program 7: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff", 0x38, 0x400}], 0x0, &(0x7f0000012c00)) 22:30:19 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010100)="00000000080000000000f900b00cb2cc029f49d8b90449a7d5d54d49010000a566", 0x21, 0x4e0}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff4655fe0f4655fe0f4655f00000000000004", 0x1b, 0x2100}], 0x0, &(0x7f0000012c00)) [ 1226.993282] loop2: detected capacity change from 0 to 512 [ 1227.011213] EXT4-fs (loop2): VFS: Can't find ext4 filesystem [ 1227.013900] loop5: detected capacity change from 0 to 512 [ 1227.018063] loop7: detected capacity change from 0 to 512 [ 1227.027635] loop3: detected capacity change from 0 to 512 [ 1227.040061] EXT4-fs (loop5): VFS: Can't find ext4 filesystem [ 1227.041164] EXT4-fs (loop7): VFS: Can't find ext4 filesystem [ 1227.043338] loop1: detected capacity change from 0 to 512 [ 1227.049391] loop4: detected capacity change from 0 to 512 [ 1227.061564] loop0: detected capacity change from 0 to 33 [ 1227.064394] EXT4-fs (loop3): ext4_check_descriptors: Inode table for group 0 overlaps superblock [ 1227.065643] EXT4-fs (loop3): group descriptors corrupted! [ 1227.067092] EXT4-fs (loop1): ext4_check_descriptors: Inode table for group 0 overlaps superblock [ 1227.068321] EXT4-fs (loop1): group descriptors corrupted! [ 1227.069217] EXT4-fs (loop4): VFS: Can't find ext4 filesystem [ 1227.074182] EXT4-fs (loop0): bad geometry: block count 128 exceeds size of device (8 blocks) 22:30:19 executing program 6: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{0x0, 0x0, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff4655fe0f4655fe0f4655f00000000000004", 0x1b, 0x2100}], 0x0, &(0x7f0000012c00)) 22:30:19 executing program 2: getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000040), &(0x7f0000000080)=0xc) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a}, {&(0x7f0000010100)="00000000080000000000f900b00cb2cc029f49d8b90449a7d5d54d49010000a566", 0x21, 0x4e0}, {&(0x7f0000010400)="0200000003000000040000006a000f000300040000000000000000000f00bc0f", 0x20, 0x800}, {&(0x7f0000011600)="ed41000000080000dff4655fe0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}, {0x0}, {0x0}, {0x0}], 0x0, &(0x7f0000012c00)) 22:30:19 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53", 0x39, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}], 0x0, &(0x7f0000012c00)) 22:30:19 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010400)="0200000003", 0x5, 0x800}, {&(0x7f0000011600)="ed41000000080000dff4655fe0f4655fe0f4655f00000000000004", 0x1b, 0x2100}], 0x0, &(0x7f0000012c00)) 22:30:19 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53", 0x39, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}], 0x0, &(0x7f0000012c00)) 22:30:19 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010100)="00000000080000000000f900b00cb2cc029f49d8b90449a7d5d54d49010000a566", 0x21, 0x4e0}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff4655fe0f4655fe0f4655f00000000000004", 0x1b, 0x2100}], 0x0, &(0x7f0000012c00)) 22:30:19 executing program 7: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff", 0x38, 0x400}], 0x0, &(0x7f0000012c00)) [ 1227.208877] loop6: detected capacity change from 0 to 512 [ 1227.227913] EXT4-fs (loop6): VFS: Can't find ext4 filesystem [ 1227.244134] loop2: detected capacity change from 0 to 512 [ 1227.265200] loop5: detected capacity change from 0 to 512 [ 1227.266120] EXT4-fs (loop2): VFS: Can't find ext4 filesystem [ 1227.280426] loop7: detected capacity change from 0 to 512 [ 1227.291811] EXT4-fs (loop5): VFS: Can't find ext4 filesystem [ 1227.294424] EXT4-fs (loop7): VFS: Can't find ext4 filesystem [ 1227.297247] loop1: detected capacity change from 0 to 512 [ 1227.298472] loop4: detected capacity change from 0 to 512 [ 1227.305538] loop0: detected capacity change from 0 to 33 [ 1227.311725] EXT4-fs (loop4): VFS: Can't find ext4 filesystem [ 1227.314920] EXT4-fs (loop1): ext4_check_descriptors: Inode table for group 0 overlaps superblock [ 1227.316163] EXT4-fs (loop1): group descriptors corrupted! [ 1227.321523] EXT4-fs (loop0): bad geometry: block count 128 exceeds size of device (8 blocks) [ 1230.054177] kworker/dying (47) used greatest stack depth: 23600 bytes left 22:30:32 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010400)="0200000003", 0x5, 0x800}, {&(0x7f0000011600)="ed41000000080000dff4655fe0f4655fe0f4655f00000000000004", 0x1b, 0x2100}], 0x0, &(0x7f0000012c00)) [ 1240.659092] loop1: detected capacity change from 0 to 512 [ 1240.659500] loop4: detected capacity change from 0 to 512 22:30:32 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010400)="0200000003000000", 0x8, 0x800}], 0x0, &(0x7f0000012c00)) 22:30:32 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x0, 0x0, 0x0, &(0x7f0000012c00)) 22:30:32 executing program 7: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53", 0x39, 0x400}], 0x0, &(0x7f0000012c00)) 22:30:32 executing program 6: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000), 0x0, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff4655fe0f4655fe0f4655f00000000000004", 0x1b, 0x2100}], 0x0, &(0x7f0000012c00)) 22:30:32 executing program 2: getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000040), &(0x7f0000000080)=0xc) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a}, {&(0x7f0000010100)="00000000080000000000f900b00cb2cc029f49d8b90449a7d5d54d49010000a566", 0x21, 0x4e0}, {&(0x7f0000010400)="0200000003000000040000006a000f000300040000000000000000000f00bc0f", 0x20, 0x800}, {&(0x7f0000011600)="ed41000000080000dff4655fe0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}, {0x0}, {0x0}, {0x0}], 0x0, &(0x7f0000012c00)) 22:30:32 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53", 0x39, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}], 0x0, &(0x7f0000012c00)) 22:30:33 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53", 0x39, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}], 0x0, &(0x7f0000012c00)) [ 1240.672786] EXT4-fs (loop1): ext4_check_descriptors: Inode table for group 0 overlaps superblock [ 1240.673427] EXT4-fs (loop1): group descriptors corrupted! [ 1240.684044] No source specified [ 1240.687264] loop2: detected capacity change from 0 to 512 [ 1240.689648] loop3: detected capacity change from 0 to 512 [ 1240.692671] EXT4-fs (loop4): VFS: Can't find ext4 filesystem [ 1240.712069] loop7: detected capacity change from 0 to 512 [ 1240.715999] EXT4-fs (loop7): VFS: Can't find ext4 filesystem [ 1240.718832] loop5: detected capacity change from 0 to 512 [ 1240.722551] loop6: detected capacity change from 0 to 512 [ 1240.724828] EXT4-fs (loop6): VFS: Can't find ext4 filesystem [ 1240.726468] EXT4-fs (loop5): VFS: Can't find ext4 filesystem [ 1240.727690] EXT4-fs (loop3): ext4_check_descriptors: Inode table for group 0 overlaps superblock [ 1240.728946] EXT4-fs (loop3): group descriptors corrupted! [ 1240.729864] EXT4-fs (loop2): VFS: Can't find ext4 filesystem 22:30:33 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010400)="02000000030000", 0x7, 0x800}, {&(0x7f0000011600)="ed41000000080000dff4655fe0f4655fe0f4655f00000000000004", 0x1b, 0x2100}], 0x0, &(0x7f0000012c00)) 22:30:33 executing program 7: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53", 0x39, 0x400}], 0x0, &(0x7f0000012c00)) [ 1240.795120] loop1: detected capacity change from 0 to 512 [ 1240.815492] EXT4-fs (loop1): ext4_check_descriptors: Inode table for group 0 overlaps superblock [ 1240.816221] EXT4-fs (loop1): group descriptors corrupted! 22:30:33 executing program 6: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000), 0x0, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff4655fe0f4655fe0f4655f00000000000004", 0x1b, 0x2100}], 0x0, &(0x7f0000012c00)) [ 1240.856909] loop6: detected capacity change from 0 to 512 [ 1240.859718] EXT4-fs (loop6): VFS: Can't find ext4 filesystem [ 1240.865718] loop7: detected capacity change from 0 to 512 [ 1240.867947] EXT4-fs (loop7): VFS: Can't find ext4 filesystem 22:30:46 executing program 7: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53", 0x39, 0x400}], 0x0, &(0x7f0000012c00)) 22:30:46 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010400)="02000000030000", 0x7, 0x800}, {&(0x7f0000011600)="ed41000000080000dff4655fe0f4655fe0f4655f00000000000004", 0x1b, 0x2100}], 0x0, &(0x7f0000012c00)) [ 1254.333970] loop1: detected capacity change from 0 to 512 22:30:46 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010400)="0200000003000000", 0x8, 0x800}], 0x0, &(0x7f0000012c00)) 22:30:46 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53", 0x39, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}], 0x0, &(0x7f0000012c00)) 22:30:46 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53", 0x39, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}], 0x0, &(0x7f0000012c00)) 22:30:46 executing program 2: getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000040), &(0x7f0000000080)=0xc) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010100)="00000000080000000000f900b00cb2cc029f49d8b90449a7d5d54d49010000a566", 0x21, 0x4e0}, {&(0x7f0000010400)="0200000003000000040000006a000f000300040000000000000000000f00bc0f", 0x20, 0x800}, {&(0x7f0000011600)="ed41000000080000dff4655fe0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}, {0x0}, {0x0}, {0x0}], 0x0, 0x0) 22:30:46 executing program 6: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000), 0x0, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff4655fe0f4655fe0f4655f00000000000004", 0x1b, 0x2100}], 0x0, &(0x7f0000012c00)) 22:30:46 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x0, 0x0, 0x0, &(0x7f0000012c00)) [ 1254.337406] loop5: detected capacity change from 0 to 512 [ 1254.352247] EXT4-fs (loop1): ext4_check_descriptors: Inode table for group 0 overlaps superblock [ 1254.352506] loop4: detected capacity change from 0 to 512 [ 1254.352960] EXT4-fs (loop1): group descriptors corrupted! [ 1254.360004] loop3: detected capacity change from 0 to 512 [ 1254.361166] loop7: detected capacity change from 0 to 512 [ 1254.364648] EXT4-fs (loop3): ext4_check_descriptors: Inode table for group 0 overlaps superblock [ 1254.365337] EXT4-fs (loop3): group descriptors corrupted! [ 1254.374475] loop6: detected capacity change from 0 to 512 [ 1254.376580] EXT4-fs (loop5): VFS: Can't find ext4 filesystem [ 1254.385713] EXT4-fs (loop6): VFS: Can't find ext4 filesystem [ 1254.392643] EXT4-fs (loop4): VFS: Can't find ext4 filesystem [ 1254.397036] No source specified [ 1254.404268] EXT4-fs (loop7): VFS: Can't find ext4 filesystem [ 1254.404693] loop2: detected capacity change from 0 to 512 22:30:46 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010400)="02000000030000", 0x7, 0x800}, {&(0x7f0000011600)="ed41000000080000dff4655fe0f4655fe0f4655f00000000000004", 0x1b, 0x2100}], 0x0, &(0x7f0000012c00)) 22:30:46 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9}], 0x0, &(0x7f0000012c00)) [ 1254.477150] loop1: detected capacity change from 0 to 512 [ 1254.478053] loop3: detected capacity change from 0 to 512 [ 1254.483627] EXT4-fs (loop1): ext4_check_descriptors: Inode table for group 0 overlaps superblock [ 1254.484370] EXT4-fs (loop1): group descriptors corrupted! [ 1254.486151] EXT4-fs (loop3): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 1254.486969] EXT4-fs (loop3): group descriptors corrupted! 22:31:00 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010400)="0200000003000000", 0x8, 0x800}, {&(0x7f0000011600)="ed41000000080000dff4655fe0f4655fe0f4655f00000000000004", 0x1b, 0x2100}], 0x0, &(0x7f0000012c00)) 22:31:00 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x0, 0x0, 0x0, &(0x7f0000012c00)) 22:31:00 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9}], 0x0, &(0x7f0000012c00)) 22:31:00 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef0100010000", 0x3f, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}], 0x0, &(0x7f0000012c00)) [ 1267.920639] loop1: detected capacity change from 0 to 512 [ 1267.928129] loop6: detected capacity change from 0 to 512 22:31:00 executing program 6: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0", 0x2d, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff4655fe0f4655fe0f4655f00000000000004", 0x1b, 0x2100}], 0x0, &(0x7f0000012c00)) [ 1267.933144] No source specified 22:31:00 executing program 2: getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000040), &(0x7f0000000080)=0xc) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010100)="00000000080000000000f900b00cb2cc029f49d8b90449a7d5d54d49010000a566", 0x21, 0x4e0}, {&(0x7f0000010400)="0200000003000000040000006a000f000300040000000000000000000f00bc0f", 0x20, 0x800}, {&(0x7f0000011600)="ed41000000080000dff4655fe0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}, {0x0}, {0x0}, {0x0}], 0x0, 0x0) 22:31:00 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef", 0x3a}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}], 0x0, &(0x7f0000012c00)) 22:31:00 executing program 7: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef", 0x3a}], 0x0, &(0x7f0000012c00)) [ 1267.953626] loop2: detected capacity change from 0 to 512 [ 1267.957823] EXT4-fs (loop6): VFS: Can't find ext4 filesystem [ 1267.957935] loop4: detected capacity change from 0 to 512 [ 1267.959123] loop7: detected capacity change from 0 to 512 [ 1267.960783] EXT4-fs (loop1): ext4_check_descriptors: Inode table for group 0 overlaps superblock [ 1267.962005] EXT4-fs (loop1): group descriptors corrupted! [ 1267.965651] EXT4-fs (loop7): VFS: Can't find ext4 filesystem [ 1267.974794] loop5: detected capacity change from 0 to 512 [ 1267.978249] loop3: detected capacity change from 0 to 512 [ 1267.980950] EXT4-fs (loop4): VFS: Can't find ext4 filesystem [ 1267.990045] EXT4-fs error (device loop5): __ext4_fill_super:5244: inode #2: comm syz-executor.5: iget: root inode unallocated [ 1267.995569] EXT4-fs (loop5): get root inode failed [ 1267.995993] EXT4-fs (loop5): mount failed [ 1267.999279] EXT4-fs (loop3): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 1268.000523] EXT4-fs (loop3): group descriptors corrupted! 22:31:00 executing program 6: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0", 0x2d, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff4655fe0f4655fe0f4655f00000000000004", 0x1b, 0x2100}], 0x0, &(0x7f0000012c00)) 22:31:00 executing program 2: getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000040), &(0x7f0000000080)=0xc) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010100)="00000000080000000000f900b00cb2cc029f49d8b90449a7d5d54d49010000a566", 0x21, 0x4e0}, {&(0x7f0000010400)="0200000003000000040000006a000f000300040000000000000000000f00bc0f", 0x20, 0x800}, {&(0x7f0000011600)="ed41000000080000dff4655fe0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}, {0x0}, {0x0}, {0x0}], 0x0, 0x0) 22:31:00 executing program 7: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef", 0x3a}], 0x0, &(0x7f0000012c00)) [ 1268.069986] loop2: detected capacity change from 0 to 512 [ 1268.073508] loop6: detected capacity change from 0 to 512 22:31:00 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010100)="00000000080000000000f900b00cb2cc029f49d8b90449a7d5d54d49010000a566", 0x21, 0x4e0}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}], 0x0, &(0x7f0000012c00)) 22:31:00 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}], 0x0, &(0x7f0000012c00)) [ 1268.088492] loop7: detected capacity change from 0 to 512 [ 1268.091551] EXT4-fs (loop6): VFS: Can't find ext4 filesystem [ 1268.101998] EXT4-fs (loop7): VFS: Can't find ext4 filesystem 22:31:00 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef", 0x3a}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}], 0x0, &(0x7f0000012c00)) 22:31:00 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010400)="0200000003000000", 0x8, 0x800}, {&(0x7f0000011600)="ed41000000080000dff4655fe0f4655fe0f4655f00000000000004", 0x1b, 0x2100}], 0x0, &(0x7f0000012c00)) 22:31:00 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9}], 0x0, &(0x7f0000012c00)) [ 1268.165257] loop0: detected capacity change from 0 to 512 22:31:00 executing program 6: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0", 0x2d, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff4655fe0f4655fe0f4655f00000000000004", 0x1b, 0x2100}], 0x0, &(0x7f0000012c00)) 22:31:00 executing program 7: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef", 0x3a}], 0x0, &(0x7f0000012c00)) [ 1268.181561] loop5: detected capacity change from 0 to 512 [ 1268.192415] loop1: detected capacity change from 0 to 512 [ 1268.193444] loop4: detected capacity change from 0 to 512 [ 1268.202006] EXT4-fs (loop1): ext4_check_descriptors: Inode table for group 0 overlaps superblock [ 1268.202203] EXT4-fs (loop4): VFS: Can't find ext4 filesystem [ 1268.202750] EXT4-fs (loop1): group descriptors corrupted! [ 1268.204709] EXT4-fs error (device loop5): __ext4_fill_super:5244: inode #2: comm syz-executor.5: iget: root inode unallocated [ 1268.205989] EXT4-fs (loop5): get root inode failed [ 1268.206384] EXT4-fs (loop5): mount failed [ 1268.206942] EXT4-fs error (device loop0): __ext4_fill_super:5244: inode #2: comm syz-executor.0: iget: root inode unallocated [ 1268.212154] EXT4-fs (loop0): get root inode failed [ 1268.213178] EXT4-fs (loop0): mount failed [ 1268.220015] loop3: detected capacity change from 0 to 512 [ 1268.224448] loop6: detected capacity change from 0 to 512 [ 1268.230333] EXT4-fs (loop3): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 1268.231048] EXT4-fs (loop3): group descriptors corrupted! [ 1268.237668] loop7: detected capacity change from 0 to 512 [ 1268.239217] EXT4-fs (loop6): VFS: Can't find ext4 filesystem [ 1268.250182] EXT4-fs (loop7): VFS: Can't find ext4 filesystem 22:31:00 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010400)="0200000003000000", 0x8, 0x800}, {&(0x7f0000011600)="ed41000000080000dff4655fe0f4655fe0f4655f00000000000004", 0x1b, 0x2100}], 0x0, &(0x7f0000012c00)) 22:31:00 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f01", 0x35, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}], 0x0, &(0x7f0000012c00)) 22:31:00 executing program 6: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f", 0x44, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff4655fe0f4655fe0f4655f00000000000004", 0x1b, 0x2100}], 0x0, &(0x7f0000012c00)) [ 1268.346216] loop1: detected capacity change from 0 to 512 [ 1268.348256] loop5: detected capacity change from 0 to 512 [ 1268.356993] EXT4-fs (loop5): VFS: Can't find ext4 filesystem [ 1268.359323] loop6: detected capacity change from 0 to 512 [ 1268.366782] EXT4-fs (loop1): ext4_check_descriptors: Inode table for group 0 overlaps superblock [ 1268.368494] EXT4-fs (loop1): group descriptors corrupted! [ 1268.389462] EXT4-fs error (device loop6): __ext4_fill_super:5244: inode #2: comm syz-executor.6: iget: root inode unallocated [ 1268.393152] EXT4-fs (loop6): get root inode failed [ 1268.394034] EXT4-fs (loop6): mount failed [ 1282.498799] loop4: detected capacity change from 0 to 512 [ 1282.507614] EXT4-fs (loop4): VFS: Can't find ext4 filesystem 22:31:14 executing program 6: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f", 0x44, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff4655fe0f4655fe0f4655f00000000000004", 0x1b, 0x2100}], 0x0, &(0x7f0000012c00)) 22:31:14 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef", 0x3a}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}], 0x0, &(0x7f0000012c00)) 22:31:14 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9}, {&(0x7f0000011600)="ed41000000080000dff4655fe0f4655fe0f4655f00000000000004", 0x1b, 0x2100}], 0x0, &(0x7f0000012c00)) 22:31:14 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010400)="020000000300000004", 0x9, 0x800}], 0x0, &(0x7f0000012c00)) 22:31:14 executing program 7: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef", 0x3a, 0x400}], 0x0, 0x0) 22:31:14 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010100)="00000000080000000000f900b00cb2cc029f49d8b90449a7d5d54d49010000a566", 0x21, 0x4e0}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}], 0x0, &(0x7f0000012c00)) 22:31:14 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f01", 0x35, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}], 0x0, &(0x7f0000012c00)) 22:31:14 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0x800}], 0x0, &(0x7f0000012c00)) [ 1282.521434] loop3: detected capacity change from 0 to 512 [ 1282.524018] loop6: detected capacity change from 0 to 512 [ 1282.542410] loop0: detected capacity change from 0 to 512 [ 1282.544466] EXT4-fs error (device loop6): __ext4_fill_super:5244: inode #2: comm syz-executor.6: iget: root inode unallocated [ 1282.553656] EXT4-fs (loop3): VFS: Can't find ext4 filesystem [ 1282.554955] EXT4-fs (loop6): get root inode failed [ 1282.555455] EXT4-fs (loop6): mount failed [ 1282.557251] loop1: detected capacity change from 0 to 512 [ 1282.560719] loop5: detected capacity change from 0 to 512 [ 1282.562924] loop2: detected capacity change from 0 to 512 [ 1282.565105] loop7: detected capacity change from 0 to 512 [ 1282.568104] EXT4-fs (loop1): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 1282.569548] EXT4-fs (loop1): group descriptors corrupted! [ 1282.575151] EXT4-fs error (device loop0): __ext4_fill_super:5244: inode #2: comm syz-executor.0: iget: root inode unallocated [ 1282.578176] EXT4-fs (loop2): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 1282.579153] EXT4-fs (loop2): group descriptors corrupted! [ 1282.586224] EXT4-fs (loop5): VFS: Can't find ext4 filesystem [ 1282.587176] EXT4-fs (loop0): get root inode failed [ 1282.587783] EXT4-fs (loop0): mount failed 22:31:14 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}], 0x0, 0x0) 22:31:14 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9}, {&(0x7f0000011600)="ed41000000080000dff4655fe0f4655fe0f4655f00000000000004", 0x1b, 0x2100}], 0x0, &(0x7f0000012c00)) 22:31:15 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010400)="020000000300000004", 0x9, 0x800}], 0x0, &(0x7f0000012c00)) 22:31:15 executing program 7: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef", 0x3a, 0x400}], 0x0, 0x0) [ 1282.665260] loop1: detected capacity change from 0 to 512 22:31:15 executing program 6: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f", 0x44, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff4655fe0f4655fe0f4655f00000000000004", 0x1b, 0x2100}], 0x0, &(0x7f0000012c00)) [ 1282.693044] loop3: detected capacity change from 0 to 512 22:31:15 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010100)="00000000080000000000f900b00cb2cc029f49d8b90449a7d5d54d49010000a566", 0x21, 0x4e0}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}], 0x0, &(0x7f0000012c00)) [ 1282.696684] EXT4-fs (loop1): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 1282.698677] EXT4-fs (loop1): group descriptors corrupted! [ 1282.699247] EXT4-fs (loop3): VFS: Can't find ext4 filesystem 22:31:15 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f01", 0x35, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}], 0x0, &(0x7f0000012c00)) [ 1282.709375] loop7: detected capacity change from 0 to 512 22:31:15 executing program 2: getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000040), &(0x7f0000000080)=0xc) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010100)="00000000080000000000f900b00cb2cc029f49d8b90449a7d5d54d49010000a566", 0x21}, {&(0x7f0000010400)="0200000003000000040000006a000f000300040000000000000000000f00bc0f", 0x20, 0x800}, {&(0x7f0000011600)="ed41000000080000dff4655fe0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}, {0x0}, {0x0}, {0x0}], 0x0, &(0x7f0000012c00)) [ 1282.721912] loop4: detected capacity change from 0 to 512 [ 1282.727519] loop2: detected capacity change from 0 to 512 [ 1282.755845] EXT4-fs (loop2): mounted filesystem without journal. Quota mode: none. 22:31:15 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010400)="020000000300000004", 0x9, 0x800}], 0x0, &(0x7f0000012c00)) 22:31:15 executing program 7: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef", 0x3a, 0x400}], 0x0, 0x0) [ 1282.807374] loop6: detected capacity change from 0 to 512 [ 1282.807970] loop5: detected capacity change from 0 to 512 [ 1282.811557] loop3: detected capacity change from 0 to 512 [ 1282.818546] EXT4-fs (loop3): VFS: Can't find ext4 filesystem [ 1282.819141] EXT4-fs (loop5): VFS: Can't find ext4 filesystem [ 1282.823083] loop7: detected capacity change from 0 to 512 [ 1282.843491] EXT4-fs error (device loop6): __ext4_fill_super:5244: inode #2: comm syz-executor.6: iget: root inode unallocated [ 1282.846561] loop0: detected capacity change from 0 to 512 [ 1282.847995] EXT4-fs (loop6): get root inode failed [ 1282.848853] EXT4-fs (loop6): mount failed [ 1282.881398] EXT4-fs (loop2): unmounting filesystem. [ 1282.902125] EXT4-fs error (device loop0): __ext4_fill_super:5244: inode #2: comm syz-executor.0: iget: root inode unallocated [ 1282.904165] EXT4-fs (loop0): get root inode failed [ 1282.905498] EXT4-fs (loop0): mount failed 22:31:29 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x2, &(0x7f0000000200)=[{0x0, 0x0, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}], 0x0, &(0x7f0000012c00)) 22:31:29 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010100)="00000000080000000000f900b00cb2cc029f49d8b90449a7d5d54d49010000a566", 0x21, 0x4e0}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {0x0, 0x0, 0x2100}], 0x0, &(0x7f0000012c00)) 22:31:29 executing program 6: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f0000000000000000010000", 0x4f, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff4655fe0f4655fe0f4655f00000000000004", 0x1b, 0x2100}], 0x0, &(0x7f0000012c00)) 22:31:29 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010100)="00000000080000000000f900b00cb2cc029f49d8b90449a7d5d54d49010000a566", 0x21, 0x4e0}, {&(0x7f0000010400)="0200000003000000", 0x8, 0x800}, {&(0x7f0000011600)="ed41000000080000dff4655fe0f4655fe0f4655f00000000000004", 0x1b, 0x2100}], 0x0, &(0x7f0000012c00)) 22:31:29 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff", 0x38, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}], 0x0, &(0x7f0000012c00)) 22:31:29 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9}, {&(0x7f0000011600)="ed41000000080000dff4655fe0f4655fe0f4655f00000000000004", 0x1b, 0x2100}], 0x0, &(0x7f0000012c00)) 22:31:29 executing program 7: getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000040), &(0x7f0000000080)=0xc) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010100)="00000000080000000000f900b00cb2cc029f49d8b90449a7d5d54d4901", 0x1d, 0x4e0}, {&(0x7f0000010400)="0200000003000000040000006a000f000300040000000000000000000f00bc0f", 0x20, 0x800}, {&(0x7f0000011600)="ed41000000080000dff4655fe0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}, {0x0}, {0x0}, {0x0}], 0x0, &(0x7f0000012c00)) [ 1296.907695] loop2: detected capacity change from 0 to 512 22:31:29 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}], 0x0, 0x0) [ 1296.913387] loop3: detected capacity change from 0 to 512 [ 1296.915483] loop1: detected capacity change from 0 to 512 [ 1296.922968] loop0: detected capacity change from 0 to 512 [ 1296.925826] loop7: detected capacity change from 0 to 512 [ 1296.926041] loop4: detected capacity change from 0 to 512 [ 1296.933988] EXT4-fs (loop2): ext4_check_descriptors: Inode table for group 0 overlaps superblock [ 1296.935001] EXT4-fs (loop2): group descriptors corrupted! [ 1296.943297] loop5: detected capacity change from 0 to 512 [ 1296.946255] EXT4-fs error (device loop0): __ext4_fill_super:5244: inode #2: comm syz-executor.0: iget: root inode unallocated [ 1296.946254] EXT4-fs (loop1): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 1296.948824] EXT4-fs (loop1): group descriptors corrupted! [ 1296.949902] EXT4-fs (loop3): VFS: Can't find ext4 filesystem [ 1296.950367] EXT4-fs (loop0): get root inode failed [ 1296.951358] EXT4-fs (loop0): mount failed [ 1296.951685] loop6: detected capacity change from 0 to 512 [ 1296.961693] EXT4-fs (loop5): VFS: Can't find ext4 filesystem [ 1296.963229] EXT4-fs (loop6): invalid first ino: 0 [ 1296.988308] EXT4-fs error (device loop7): ext4_orphan_get:1419: comm syz-executor.7: bad orphan inode 16318464 [ 1296.989712] EXT4-fs (loop7): mounted filesystem without journal. Quota mode: none. 22:31:29 executing program 6: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f0000000000000000010000", 0x4f, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff4655fe0f4655fe0f4655f00000000000004", 0x1b, 0x2100}], 0x0, &(0x7f0000012c00)) [ 1297.028046] loop6: detected capacity change from 0 to 512 [ 1297.032857] EXT4-fs (loop6): invalid first ino: 0 22:31:29 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x2, &(0x7f0000000200)=[{0x0, 0x0, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}], 0x0, &(0x7f0000012c00)) 22:31:29 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff", 0x38, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}], 0x0, &(0x7f0000012c00)) 22:31:29 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}], 0x0, 0x0) 22:31:29 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff4655fe0f4655fe0f4655f00000000000004", 0x1b, 0x2100}], 0x0, &(0x7f0000012c00)) 22:31:29 executing program 2: getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000040), &(0x7f0000000080)=0xc) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010100)="00000000080000000000f900b00cb2cc029f49d8b90449a7d5", 0x19, 0x4e0}, {&(0x7f0000010400)="0200000003000000040000006a000f000300040000000000000000000f00bc0f", 0x20, 0x800}, {&(0x7f0000011600)="ed41000000080000dff4655fe0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}, {0x0}, {0x0}, {0x0}], 0x0, &(0x7f0000012c00)) [ 1297.087058] EXT4-fs (loop7): unmounting filesystem. [ 1297.098977] loop5: detected capacity change from 0 to 512 [ 1297.103862] EXT4-fs (loop5): VFS: Can't find ext4 filesystem [ 1297.120086] loop3: detected capacity change from 0 to 512 [ 1297.123803] loop4: detected capacity change from 0 to 512 [ 1297.130741] EXT4-fs (loop3): VFS: Can't find ext4 filesystem [ 1297.143487] loop1: detected capacity change from 0 to 512 [ 1297.147422] loop2: detected capacity change from 0 to 512 [ 1297.151495] EXT4-fs (loop1): VFS: Can't find ext4 filesystem [ 1297.173393] EXT4-fs error (device loop2): ext4_orphan_get:1419: comm syz-executor.2: bad orphan inode 16318464 [ 1297.181663] EXT4-fs (loop2): mounted filesystem without journal. Quota mode: none. [ 1297.238176] EXT4-fs (loop2): unmounting filesystem. 22:31:43 executing program 2: getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000040), &(0x7f0000000080)=0xc) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010100), 0x0, 0x4e0}, {&(0x7f0000010400)="0200000003000000040000006a000f000300040000000000000000000f00bc0f", 0x20, 0x800}, {&(0x7f0000011600)="ed41000000080000dff4655fe0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}, {0x0}, {0x0}, {0x0}], 0x0, &(0x7f0000012c00)) 22:31:43 executing program 7: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010100)="00000000080000000000f900b00cb2cc029f49d8b90449a7d5d54d49010000a566", 0x21, 0x4e0}, {&(0x7f0000010400)="0200000003000000040000006a000f000300040000000000000000000f00bc0f", 0x20, 0x800}, {&(0x7f0000011600), 0x0, 0x2100}], 0x0, &(0x7f0000012c00)) 22:31:43 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff4655fe0f4655fe0f4655f00000000000004", 0x1b, 0x2100}], 0x0, &(0x7f0000012c00)) 22:31:43 executing program 6: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f0000000000000000010000", 0x4f, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff4655fe0f4655fe0f4655f00000000000004", 0x1b, 0x2100}], 0x0, &(0x7f0000012c00)) 22:31:43 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010100)="00000000080000000000f900b00cb2cc029f49d8b90449a7d5d54d49010000a566", 0x21, 0x4e0}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {0x0, 0x0, 0x2100}], 0x0, &(0x7f0000012c00)) [ 1311.011493] loop1: detected capacity change from 0 to 512 22:31:43 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff", 0x38, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}], 0x0, &(0x7f0000012c00)) [ 1311.024909] loop2: detected capacity change from 0 to 512 [ 1311.032703] loop7: detected capacity change from 0 to 512 22:31:43 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x2, &(0x7f0000000200)=[{0x0, 0x0, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}], 0x0, &(0x7f0000012c00)) 22:31:43 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010100)="00000000080000000000f900b00cb2cc029f49d8b90449a7d5d54d49010000a566", 0x21, 0x4e0}, {&(0x7f0000010400)="0200000003000000040000006a000f000300040000000000000000000f00bc0f", 0x20, 0x800}, {&(0x7f0000011600)="ed41000000080000dff4655fe0f4", 0xe, 0x2100}], 0x0, &(0x7f0000012c00)) [ 1311.037303] loop5: detected capacity change from 0 to 512 [ 1311.040796] loop3: detected capacity change from 0 to 512 [ 1311.044015] EXT4-fs (loop1): VFS: Can't find ext4 filesystem [ 1311.045949] EXT4-fs (loop5): VFS: Can't find ext4 filesystem [ 1311.047875] EXT4-fs (loop3): VFS: Can't find ext4 filesystem [ 1311.048563] loop4: detected capacity change from 0 to 512 [ 1311.058575] loop6: detected capacity change from 0 to 512 [ 1311.066107] EXT4-fs error (device loop7): __ext4_fill_super:5244: inode #2: comm syz-executor.7: iget: root inode unallocated [ 1311.072151] EXT4-fs (loop7): get root inode failed [ 1311.073057] EXT4-fs (loop7): mount failed [ 1311.074144] EXT4-fs (loop6): invalid first ino: 0 [ 1311.074796] EXT4-fs (loop2): mounted filesystem without journal. Quota mode: none. [ 1311.076092] loop0: detected capacity change from 0 to 512 [ 1311.088321] EXT4-fs error (device loop4): __ext4_fill_super:5244: inode #2: comm syz-executor.4: iget: root inode unallocated [ 1311.091028] EXT4-fs (loop4): get root inode failed [ 1311.091863] EXT4-fs (loop4): mount failed [ 1311.104313] EXT4-fs error (device loop0): __ext4_fill_super:5244: inode #2: comm syz-executor.0: iget: root inode unallocated [ 1311.105464] EXT4-fs (loop0): get root inode failed [ 1311.106034] EXT4-fs (loop0): mount failed 22:31:43 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff4655fe0f4655fe0f4655f00000000000004", 0x1b, 0x2100}], 0x0, &(0x7f0000012c00)) 22:31:43 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53", 0x39, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}], 0x0, &(0x7f0000012c00)) 22:31:43 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000), 0x0, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}], 0x0, &(0x7f0000012c00)) 22:31:43 executing program 6: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b", 0x55, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff4655fe0f4655fe0f4655f00000000000004", 0x1b, 0x2100}], 0x0, &(0x7f0000012c00)) [ 1311.191618] loop5: detected capacity change from 0 to 512 22:31:43 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010100)="00000000080000000000f900b00cb2cc029f49d8b90449a7d5d54d49010000a566", 0x21, 0x4e0}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {0x0, 0x0, 0x2100}], 0x0, &(0x7f0000012c00)) [ 1311.198318] EXT4-fs (loop5): VFS: Can't find ext4 filesystem [ 1311.201995] loop1: detected capacity change from 0 to 512 [ 1311.204153] EXT4-fs (loop1): VFS: Can't find ext4 filesystem [ 1311.213507] loop3: detected capacity change from 0 to 512 [ 1311.217021] EXT4-fs (loop2): unmounting filesystem. [ 1311.219081] EXT4-fs (loop3): VFS: Can't find ext4 filesystem 22:31:43 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010100)="00000000080000000000f900b00cb2cc029f49d8b90449a7d5d54d49010000a566", 0x21, 0x4e0}, {&(0x7f0000010400)="0200000003000000040000006a000f000300040000000000000000000f00bc0f", 0x20, 0x800}, {&(0x7f0000011600)="ed41000000080000dff4655fe0f4655fe0f4655f0000000000", 0x19, 0x2100}], 0x0, &(0x7f0000012c00)) 22:31:43 executing program 2: getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000040), &(0x7f0000000080)=0xc) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010100)="00000000080000000000f900b00cb2cc029f49d8b90449a7d5d54d49010000a566", 0x21, 0x4e0}, {&(0x7f0000010400)="0200000003000000040000006a000f000300040000000000", 0x18, 0x800}, {&(0x7f0000011600)="ed41000000080000dff4655fe0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}, {0x0}, {0x0}, {0x0}], 0x0, &(0x7f0000012c00)) 22:31:43 executing program 7: getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000040), &(0x7f0000000080)=0xc) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010400)="0200000003000000040000006a000f000300040000000000000000000f00bc0f", 0x20, 0x800}, {&(0x7f0000011600)="ed41000000080000dff4655fe0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}, {0x0}, {0x0}, {0x0}], 0x0, &(0x7f0000012c00)) [ 1311.270312] loop7: detected capacity change from 0 to 512 22:31:43 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53", 0x39, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}], 0x0, &(0x7f0000012c00)) [ 1311.291441] loop0: detected capacity change from 0 to 512 22:31:43 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000), 0x0, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}], 0x0, &(0x7f0000012c00)) [ 1311.305443] loop2: detected capacity change from 0 to 512 [ 1311.320072] loop6: detected capacity change from 0 to 512 [ 1311.321297] EXT4-fs error (device loop0): __ext4_fill_super:5244: inode #2: comm syz-executor.0: iget: root inode unallocated [ 1311.322506] EXT4-fs (loop0): get root inode failed [ 1311.323039] EXT4-fs (loop0): mount failed [ 1311.323981] loop4: detected capacity change from 0 to 512 [ 1311.331122] EXT4-fs error (device loop2): ext4_orphan_get:1419: comm syz-executor.2: bad orphan inode 16318464 [ 1311.332896] EXT4-fs (loop2): mounted filesystem without journal. Quota mode: none. [ 1311.334357] EXT4-fs (loop7): mounted filesystem without journal. Quota mode: none. [ 1311.335831] EXT4-fs (loop6): unsupported inode size: 0 [ 1311.336262] EXT4-fs (loop6): blocksize: 2048 [ 1311.338964] loop5: detected capacity change from 0 to 512 [ 1311.347805] loop3: detected capacity change from 0 to 512 [ 1311.349331] EXT4-fs error (device loop4): __ext4_fill_super:5244: inode #2: comm syz-executor.4: iget: root inode unallocated [ 1311.354000] EXT4-fs (loop5): VFS: Can't find ext4 filesystem [ 1311.354459] EXT4-fs (loop4): get root inode failed [ 1311.355258] EXT4-fs (loop4): mount failed [ 1311.358154] EXT4-fs (loop3): VFS: Can't find ext4 filesystem [ 1311.405181] EXT4-fs (loop2): unmounting filesystem. [ 1311.489478] EXT4-fs (loop7): unmounting filesystem. 22:32:02 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010100)="00000000080000000000f900b00cb2cc029f49d8b90449a7d5d54d49010000a566", 0x21, 0x4e0}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600), 0x0, 0x2100}], 0x0, &(0x7f0000012c00)) 22:32:02 executing program 4: getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000040), &(0x7f0000000080)=0xc) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010100)="00000000080000000000f900b00cb2cc029f49d8b90449a7d5d54d49010000a566", 0x21, 0x4e0}, {&(0x7f0000010400)="0200000003000000040000006a000f000300040000000000000000000f00bc0f", 0x20, 0x800}, {&(0x7f0000011600)="ed41000000080000dff4655fe0f4655fe0f4655f000000000000040004", 0x1d}, {0x0}, {0x0}, {0x0}], 0x0, &(0x7f0000012c00)) 22:32:02 executing program 7: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x2, &(0x7f0000000000)=[{0x7c}, {0x6, 0x0, 0x0, 0x7fffffff}]}) openat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x800, 0x10e) r0 = syz_init_net_socket$802154_raw(0x24, 0x3, 0x0) ioctl$sock_inet_SIOCSIFADDR(r0, 0x8916, &(0x7f0000001180)={'bond0\x00', {0x2, 0x0, @local}}) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f0000000080)) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fork() r1 = dup2(0xffffffffffffffff, 0xffffffffffffffff) bind$bt_l2cap(r1, &(0x7f0000000000)={0x1f, 0x0, @fixed={'\xaa\xaa\xaa\xaa\xaa', 0x10}}, 0xe) 22:32:02 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53", 0x39, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}], 0x0, &(0x7f0000012c00)) 22:32:02 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000), 0x0, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}], 0x0, &(0x7f0000012c00)) 22:32:02 executing program 6: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b", 0x55, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff4655fe0f4655fe0f4655f00000000000004", 0x1b, 0x2100}], 0x0, &(0x7f0000012c00)) 22:32:02 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010100)="00000000080000000000f900b00cb2cc029f49d8b90449a7d5d54d49010000a566", 0x21, 0x4e0}, {&(0x7f0000010400)="0200000003000000040000006a000f000300040000000000000000000f00bc0f", 0x20, 0x800}, {&(0x7f0000011600)="ed41000000080000dff4655fe0f4655fe0f4655f0000000000000400", 0x1c, 0x2100}, {0x0}, {0x0}, {0x0}], 0x0, &(0x7f0000012c00)) 22:32:02 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{0x0, 0x0, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff4655fe0f4655fe0f4655f00000000000004", 0x1b, 0x2100}], 0x0, &(0x7f0000012c00)) [ 1329.997452] loop2: detected capacity change from 0 to 33 [ 1330.006432] loop5: detected capacity change from 0 to 512 [ 1330.016744] EXT4-fs (loop2): bad geometry: block count 128 exceeds size of device (8 blocks) [ 1330.021331] loop0: detected capacity change from 0 to 512 [ 1330.025194] loop3: detected capacity change from 0 to 512 [ 1330.028696] loop6: detected capacity change from 0 to 512 [ 1330.030105] EXT4-fs (loop5): VFS: Can't find ext4 filesystem [ 1330.034785] loop1: detected capacity change from 0 to 512 [ 1330.044104] loop4: detected capacity change from 0 to 512 [ 1330.047922] EXT4-fs (loop6): unsupported inode size: 0 [ 1330.048726] EXT4-fs (loop6): blocksize: 2048 [ 1330.049886] EXT4-fs (loop3): VFS: Can't find ext4 filesystem [ 1330.054030] EXT4-fs (loop1): VFS: Can't find ext4 filesystem [ 1330.080821] EXT4-fs error (device loop0): __ext4_fill_super:5244: inode #2: comm syz-executor.0: iget: root inode unallocated [ 1330.084784] EXT4-fs (loop0): get root inode failed [ 1330.085497] EXT4-fs (loop0): mount failed [ 1330.091887] EXT4-fs error (device loop4): __ext4_fill_super:5244: inode #2: comm syz-executor.4: iget: root inode unallocated [ 1330.101377] EXT4-fs (loop4): get root inode failed [ 1330.102099] EXT4-fs (loop4): mount failed 22:32:17 executing program 4: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x2, &(0x7f0000000000)=[{0x7c}, {0x6, 0x0, 0x0, 0x7fffffff}]}) openat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x800, 0x10e) r0 = syz_init_net_socket$802154_raw(0x24, 0x3, 0x0) ioctl$sock_inet_SIOCSIFADDR(r0, 0x8916, &(0x7f0000001180)={'bond0\x00', {0x2, 0x0, @local}}) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f0000000080)) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fork() syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x0) bind$bt_l2cap(0xffffffffffffffff, &(0x7f0000000000)={0x1f, 0x0, @fixed={'\xaa\xaa\xaa\xaa\xaa', 0x10}}, 0xe) 22:32:17 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010100)="00000000080000000000f900b00cb2cc029f49d8b90449a7d5d54d49010000a566", 0x21, 0x4e0}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600), 0x0, 0x2100}], 0x0, &(0x7f0000012c00)) 22:32:17 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010100)="00000000080000000000f900b00cb2cc029f49d8b90449a7d5d54d49010000a566", 0x21, 0x4e0}, {&(0x7f0000010400)="0200000003000000040000006a000f000300040000000000000000000f00bc0f", 0x20, 0x800}, {&(0x7f0000011600)="ed41000000080000dff4655fe0f4655fe0f4655f000000000000", 0x1a, 0x2100}, {0x0}, {0x0}, {0x0}], 0x0, &(0x7f0000012c00)) [ 1345.208969] loop0: detected capacity change from 0 to 512 [ 1345.235879] loop1: detected capacity change from 0 to 512 [ 1345.240243] loop6: detected capacity change from 0 to 512 [ 1345.243833] EXT4-fs (loop6): unsupported inode size: 0 22:32:17 executing program 6: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b", 0x55, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff4655fe0f4655fe0f4655f00000000000004", 0x1b, 0x2100}], 0x0, &(0x7f0000012c00)) 22:32:17 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef", 0x3a}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}], 0x0, &(0x7f0000012c00)) 22:32:17 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{0x0, 0x0, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff4655fe0f4655fe0f4655f00000000000004", 0x1b, 0x2100}], 0x0, &(0x7f0000012c00)) 22:32:17 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0", 0x2d, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}], 0x0, &(0x7f0000012c00)) 22:32:17 executing program 7: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x2, &(0x7f0000000000)=[{0x7c}, {0x6, 0x0, 0x0, 0x7fffffff}]}) openat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x800, 0x10e) r0 = syz_init_net_socket$802154_raw(0x24, 0x3, 0x0) ioctl$sock_inet_SIOCSIFADDR(r0, 0x8916, &(0x7f0000001180)={'bond0\x00', {0x2, 0x0, @local}}) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f0000000080)) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fork() r1 = dup2(0xffffffffffffffff, 0xffffffffffffffff) bind$bt_l2cap(r1, &(0x7f0000000000)={0x1f, 0x0, @fixed={'\xaa\xaa\xaa\xaa\xaa', 0x10}}, 0xe) [ 1345.244391] EXT4-fs (loop6): blocksize: 2048 [ 1345.245934] EXT4-fs (loop1): VFS: Can't find ext4 filesystem [ 1345.246968] loop3: detected capacity change from 0 to 512 [ 1345.251882] loop5: detected capacity change from 0 to 512 [ 1345.269640] EXT4-fs error (device loop0): __ext4_fill_super:5244: inode #2: comm syz-executor.0: iget: root inode unallocated [ 1345.270864] EXT4-fs (loop0): get root inode failed [ 1345.271252] EXT4-fs (loop0): mount failed [ 1345.284112] loop2: detected capacity change from 0 to 512 [ 1345.284656] EXT4-fs (loop3): VFS: Can't find ext4 filesystem 22:32:17 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{0x0, 0x0, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff4655fe0f4655fe0f4655f00000000000004", 0x1b, 0x2100}], 0x0, &(0x7f0000012c00)) [ 1345.304681] EXT4-fs (loop5): VFS: Can't find ext4 filesystem [ 1345.315259] EXT4-fs error (device loop2): __ext4_fill_super:5244: inode #2: comm syz-executor.2: iget: root inode unallocated [ 1345.317249] EXT4-fs (loop2): get root inode failed [ 1345.317734] EXT4-fs (loop2): mount failed 22:32:17 executing program 6: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b000000", 0x58, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff4655fe0f4655fe0f4655f00000000000004", 0x1b, 0x2100}], 0x0, &(0x7f0000012c00)) 22:32:17 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010100)="00000000080000000000f900b00cb2cc029f49d8b90449a7d5d54d49010000a566", 0x21, 0x4e0}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600), 0x0, 0x2100}], 0x0, &(0x7f0000012c00)) [ 1345.382528] loop1: detected capacity change from 0 to 512 [ 1345.415337] EXT4-fs (loop1): VFS: Can't find ext4 filesystem 22:32:17 executing program 2: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x2, &(0x7f0000000000)=[{0x7c}, {0x6, 0x0, 0x0, 0x7fffffff}]}) openat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x800, 0x10e) r0 = syz_init_net_socket$802154_raw(0x24, 0x3, 0x0) ioctl$sock_inet_SIOCSIFADDR(r0, 0x8916, &(0x7f0000001180)={'bond0\x00', {0x2, 0x0, @local}}) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f0000000080)) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fork() syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x0) bind$bt_l2cap(0xffffffffffffffff, &(0x7f0000000000)={0x1f, 0x0, @fixed={'\xaa\xaa\xaa\xaa\xaa', 0x10}}, 0xe) 22:32:17 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0", 0x2d, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}], 0x0, &(0x7f0000012c00)) 22:32:17 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef", 0x3a}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}], 0x0, &(0x7f0000012c00)) [ 1345.475831] loop0: detected capacity change from 0 to 512 22:32:17 executing program 7: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x2, &(0x7f0000000000)=[{0x7c}, {0x6, 0x0, 0x0, 0x7fffffff}]}) openat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x800, 0x10e) r0 = syz_init_net_socket$802154_raw(0x24, 0x3, 0x0) ioctl$sock_inet_SIOCSIFADDR(r0, 0x8916, &(0x7f0000001180)={'bond0\x00', {0x2, 0x0, @local}}) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f0000000080)) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fork() r1 = dup2(0xffffffffffffffff, 0xffffffffffffffff) bind$bt_l2cap(r1, &(0x7f0000000000)={0x1f, 0x0, @fixed={'\xaa\xaa\xaa\xaa\xaa', 0x10}}, 0xe) [ 1345.510127] loop6: detected capacity change from 0 to 512 [ 1345.514215] EXT4-fs (loop6): unsupported inode size: 0 [ 1345.514703] EXT4-fs (loop6): blocksize: 2048 [ 1345.519773] loop3: detected capacity change from 0 to 512 [ 1345.520941] loop5: detected capacity change from 0 to 512 [ 1345.529786] EXT4-fs (loop3): VFS: Can't find ext4 filesystem [ 1345.531950] EXT4-fs (loop5): VFS: Can't find ext4 filesystem [ 1345.532054] EXT4-fs error (device loop0): __ext4_fill_super:5244: inode #2: comm syz-executor.0: iget: root inode unallocated [ 1345.552055] EXT4-fs (loop0): get root inode failed [ 1345.552919] EXT4-fs (loop0): mount failed 22:32:17 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000), 0x0, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff4655fe0f4655fe0f4655f00000000000004", 0x1b, 0x2100}], 0x0, &(0x7f0000012c00)) [ 1345.715515] loop1: detected capacity change from 0 to 512 [ 1345.718979] EXT4-fs (loop1): VFS: Can't find ext4 filesystem 22:32:18 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef", 0x3a}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}], 0x0, &(0x7f0000012c00)) [ 1345.817254] loop5: detected capacity change from 0 to 512 22:32:18 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0", 0x2d, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}], 0x0, &(0x7f0000012c00)) 22:32:18 executing program 6: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b000000", 0x58, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff4655fe0f4655fe0f4655f00000000000004", 0x1b, 0x2100}], 0x0, &(0x7f0000012c00)) 22:32:18 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010100)="00000000080000000000f900b00cb2cc029f49d8b90449a7d5d54d49010000a566", 0x21, 0x4e0}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff4655fe0f4", 0xe, 0x2100}], 0x0, &(0x7f0000012c00)) 22:32:18 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000), 0x0, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff4655fe0f4655fe0f4655f00000000000004", 0x1b, 0x2100}], 0x0, &(0x7f0000012c00)) [ 1345.836696] loop3: detected capacity change from 0 to 512 [ 1345.840676] loop0: detected capacity change from 0 to 512 [ 1345.848136] EXT4-fs (loop3): VFS: Can't find ext4 filesystem [ 1345.863476] EXT4-fs (loop5): VFS: Can't find ext4 filesystem [ 1345.863481] EXT4-fs error (device loop0): __ext4_fill_super:5244: inode #2: comm syz-executor.0: iget: root inode unallocated [ 1345.866398] EXT4-fs (loop0): get root inode failed [ 1345.867024] EXT4-fs (loop0): mount failed 22:32:18 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010100)="00000000080000000000f900b00cb2cc029f49d8b90449a7d5d54d49010000a566", 0x21, 0x4e0}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600), 0x0, 0x2100}], 0x0, &(0x7f0000012c00)) [ 1345.903003] loop6: detected capacity change from 0 to 512 [ 1345.911182] loop4: detected capacity change from 0 to 512 [ 1345.919611] EXT4-fs (loop6): unsupported inode size: 0 [ 1345.920455] EXT4-fs (loop6): blocksize: 2048 22:32:18 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f", 0x44, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}], 0x0, &(0x7f0000012c00)) 22:32:18 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}], 0x0, 0x0) [ 1345.944555] EXT4-fs error (device loop4): __ext4_fill_super:5244: inode #2: comm syz-executor.4: iget: root inode unallocated [ 1345.947300] EXT4-fs (loop4): get root inode failed [ 1345.947920] EXT4-fs (loop4): mount failed [ 1345.955852] loop1: detected capacity change from 0 to 512 [ 1345.970215] EXT4-fs (loop1): VFS: Can't find ext4 filesystem [ 1345.999315] loop3: detected capacity change from 0 to 512 [ 1346.010420] EXT4-fs error (device loop3): __ext4_fill_super:5244: inode #2: comm syz-executor.3: iget: root inode unallocated [ 1346.012027] EXT4-fs (loop3): get root inode failed [ 1346.012414] EXT4-fs (loop3): mount failed [ 1346.013794] loop5: detected capacity change from 0 to 512 22:32:31 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}], 0x0, 0x0) 22:32:31 executing program 7: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010100)="00000000080000000000f900b00cb2cc029f49d8b90449a7d5d54d49010000a566", 0x21, 0x4e0}, {&(0x7f0000010400)="0200000003000000040000006a000f000300040000000000000000000f00bc0f", 0x20, 0x800}], 0x0, &(0x7f0000012c00)) [ 1359.129985] loop5: detected capacity change from 0 to 512 22:32:31 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4", 0x2e, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}], 0x0, &(0x7f0000012c00)) 22:32:31 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010100)="00000000080000000000f900b00cb2cc029f49d8b90449a7d5d54d49010000a566", 0x21, 0x4e0}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff4655fe0f4", 0xe, 0x2100}], 0x0, &(0x7f0000012c00)) [ 1359.148857] loop1: detected capacity change from 0 to 512 22:32:31 executing program 4: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x2, &(0x7f0000000000)=[{0x7c}, {0x6, 0x0, 0x0, 0x7fffffff}]}) openat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x800, 0x10e) r0 = syz_init_net_socket$802154_raw(0x24, 0x3, 0x0) ioctl$sock_inet_SIOCSIFADDR(r0, 0x8916, &(0x7f0000001180)={'bond0\x00', {0x2, 0x0, @local}}) r1 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x0) r2 = dup2(r1, r1) bind$bt_l2cap(r2, &(0x7f0000000000)={0x1f, 0x0, @fixed={'\xaa\xaa\xaa\xaa\xaa', 0x10}}, 0xe) 22:32:31 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000), 0x0, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff4655fe0f4655fe0f4655f00000000000004", 0x1b, 0x2100}], 0x0, &(0x7f0000012c00)) 22:32:31 executing program 6: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b000000", 0x58, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff4655fe0f4655fe0f4655f00000000000004", 0x1b, 0x2100}], 0x0, &(0x7f0000012c00)) 22:32:31 executing program 2: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x2, &(0x7f0000000000)=[{0x7c}, {0x6, 0x0, 0x0, 0x7fffffff}]}) openat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x800, 0x10e) r0 = syz_init_net_socket$802154_raw(0x24, 0x3, 0x0) ioctl$sock_inet_SIOCSIFADDR(r0, 0x8916, &(0x7f0000001180)={'bond0\x00', {0x2, 0x0, @local}}) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f0000000080)) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fork() syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x0) bind$bt_l2cap(0xffffffffffffffff, &(0x7f0000000000)={0x1f, 0x0, @fixed={'\xaa\xaa\xaa\xaa\xaa', 0x10}}, 0xe) [ 1359.169542] loop0: detected capacity change from 0 to 512 [ 1359.176673] EXT4-fs (loop1): VFS: Can't find ext4 filesystem [ 1359.204210] loop7: detected capacity change from 0 to 512 [ 1359.215934] loop3: detected capacity change from 0 to 512 [ 1359.223810] EXT4-fs error (device loop0): __ext4_fill_super:5244: inode #2: comm syz-executor.0: iget: root inode unallocated 22:32:31 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}], 0x0, 0x0) [ 1359.229376] EXT4-fs error (device loop7): __ext4_fill_super:5244: inode #2: comm syz-executor.7: iget: root inode unallocated [ 1359.230743] loop6: detected capacity change from 0 to 512 [ 1359.232226] EXT4-fs (loop0): get root inode failed [ 1359.232666] EXT4-fs (loop7): get root inode failed [ 1359.233211] EXT4-fs (loop0): mount failed [ 1359.233395] EXT4-fs (loop7): mount failed [ 1359.252763] EXT4-fs (loop6): unsupported inode size: 0 [ 1359.253717] EXT4-fs (loop6): blocksize: 2048 [ 1359.259924] EXT4-fs (loop3): VFS: Can't find ext4 filesystem [ 1359.289005] loop5: detected capacity change from 0 to 512 22:32:45 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0", 0x2d, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff4655fe0f4655fe0f4655f00000000000004", 0x1b, 0x2100}], 0x0, &(0x7f0000012c00)) 22:32:45 executing program 7: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010100)="00000000080000000000f900b00cb2cc029f49d8b90449a7d5d54d49010000a566", 0x21, 0x4e0}, {&(0x7f0000010400)="0200000003000000040000006a000f000300040000000000000000000f00bc0f", 0x20, 0x800}], 0x0, &(0x7f0000012c00)) 22:32:45 executing program 2: getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000040), &(0x7f0000000080)=0xc) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010100)="00000000080000000000f900b00cb2cc029f49d8b90449a7d5d54d49010000a566", 0x21, 0x4e0}, {&(0x7f0000010400)="0200000003000000040000006a000f000300040000000000000000000f00bc0f", 0x20, 0x800}, {&(0x7f0000011600)="ed41000000080000dff4655fe0f4655fe0f4655f000000000000", 0x1a, 0x2100}, {0x0}, {0x0}, {0x0}], 0x0, &(0x7f0000012c00)) 22:32:45 executing program 4: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x2, &(0x7f0000000000)=[{0x7c}, {0x6, 0x0, 0x0, 0x7fffffff}]}) openat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x800, 0x10e) r0 = syz_init_net_socket$802154_raw(0x24, 0x3, 0x0) ioctl$sock_inet_SIOCSIFADDR(r0, 0x8916, &(0x7f0000001180)={'bond0\x00', {0x2, 0x0, @local}}) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f0000000080)) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x0) r2 = dup2(r1, r1) bind$bt_l2cap(r2, &(0x7f0000000000)={0x1f, 0x0, @fixed={'\xaa\xaa\xaa\xaa\xaa', 0x10}}, 0xe) 22:32:45 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4", 0x2e, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}], 0x0, &(0x7f0000012c00)) 22:32:45 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010100)="00000000080000000000f900b00cb2cc029f49d8b90449a7d5d54d49010000a566", 0x21, 0x4e0}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff4655fe0f4", 0xe, 0x2100}], 0x0, &(0x7f0000012c00)) 22:32:45 executing program 5: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x2, &(0x7f0000000000)=[{0x7c}, {0x6, 0x0, 0x0, 0x7fffffff}]}) openat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x800, 0x10e) r0 = syz_init_net_socket$802154_raw(0x24, 0x3, 0x0) ioctl$sock_inet_SIOCSIFADDR(r0, 0x8916, &(0x7f0000001180)={'bond0\x00', {0x2, 0x0, @local}}) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f0000000080)) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = fork() perf_event_open(&(0x7f0000001280)={0x0, 0x80, 0x5, 0x0, 0x1, 0x4, 0x0, 0xe41, 0x84000, 0x8, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x9, 0x0, @perf_config_ext={0x8000, 0x100}, 0x8000, 0xffffffff, 0x2476f094, 0x0, 0x7, 0x8001, 0xffff, 0x0, 0x1, 0x0, 0x10000}, r1, 0xb, 0xffffffffffffffff, 0x2) r2 = dup2(0xffffffffffffffff, 0xffffffffffffffff) bind$bt_l2cap(r2, &(0x7f0000000000)={0x1f, 0x0, @fixed={'\xaa\xaa\xaa\xaa\xaa', 0x10}}, 0xe) [ 1373.507382] loop7: detected capacity change from 0 to 512 22:32:45 executing program 6: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b00000000", 0x59, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff4655fe0f4655fe0f4655f00000000000004", 0x1b, 0x2100}], 0x0, &(0x7f0000012c00)) [ 1373.546284] loop3: detected capacity change from 0 to 512 [ 1373.548684] EXT4-fs error (device loop7): __ext4_fill_super:5244: inode #2: comm syz-executor.7: iget: root inode unallocated [ 1373.551045] EXT4-fs (loop7): get root inode failed [ 1373.551784] EXT4-fs (loop7): mount failed [ 1373.554405] loop1: detected capacity change from 0 to 512 [ 1373.556913] loop6: detected capacity change from 0 to 512 [ 1373.564240] EXT4-fs (loop3): VFS: Can't find ext4 filesystem [ 1373.571127] EXT4-fs (loop1): VFS: Can't find ext4 filesystem [ 1373.575396] EXT4-fs (loop6): unsupported inode size: 0 [ 1373.576069] EXT4-fs (loop6): blocksize: 2048 [ 1373.576686] loop0: detected capacity change from 0 to 512 [ 1373.581071] loop2: detected capacity change from 0 to 512 [ 1373.608392] EXT4-fs error (device loop2): __ext4_fill_super:5244: inode #2: comm syz-executor.2: iget: root inode unallocated [ 1373.614750] EXT4-fs error (device loop0): __ext4_fill_super:5244: inode #2: comm syz-executor.0: iget: root inode unallocated [ 1373.617919] EXT4-fs (loop2): get root inode failed [ 1373.618678] EXT4-fs (loop2): mount failed [ 1373.619395] EXT4-fs (loop0): get root inode failed [ 1373.620130] EXT4-fs (loop0): mount failed 22:32:45 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4", 0x2e, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}], 0x0, &(0x7f0000012c00)) 22:32:45 executing program 6: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b00000000", 0x59, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff4655fe0f4655fe0f4655f00000000000004", 0x1b, 0x2100}], 0x0, &(0x7f0000012c00)) 22:32:46 executing program 7: getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000040), &(0x7f0000000080)=0xc) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010100)="00000000080000000000f900b00cb2cc029f49d8b90449a7d5d54d49010000a566", 0x21, 0x4e0}, {&(0x7f0000010400)="0200000003000000040000006a000f000300040000000000000000000f00bc0f", 0x20, 0x800}, {0x0, 0x0, 0x2100}, {0x0}, {0x0}, {0x0}], 0x0, &(0x7f0000012c00)) 22:32:46 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0", 0x2d, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff4655fe0f4655fe0f4655f00000000000004", 0x1b, 0x2100}], 0x0, &(0x7f0000012c00)) [ 1373.753913] loop6: detected capacity change from 0 to 512 [ 1373.760353] EXT4-fs (loop6): unsupported inode size: 0 [ 1373.760990] EXT4-fs (loop6): blocksize: 2048 [ 1373.768288] loop3: detected capacity change from 0 to 512 22:32:46 executing program 6: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b00000000", 0x59, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff4655fe0f4655fe0f4655f00000000000004", 0x1b, 0x2100}], 0x0, &(0x7f0000012c00)) [ 1373.810350] loop1: detected capacity change from 0 to 512 [ 1373.816423] EXT4-fs (loop1): VFS: Can't find ext4 filesystem [ 1373.823770] EXT4-fs (loop3): VFS: Can't find ext4 filesystem 22:32:46 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010100)="00000000080000000000f900b00cb2cc029f49d8b90449a7d5d54d49010000a566", 0x21, 0x4e0}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff4655fe0f4655fe0f4655f00", 0x15, 0x2100}], 0x0, &(0x7f0000012c00)) [ 1373.859284] loop6: detected capacity change from 0 to 512 [ 1373.873548] EXT4-fs (loop6): unsupported inode size: 0 [ 1373.874051] EXT4-fs (loop6): blocksize: 2048 [ 1373.876828] loop7: detected capacity change from 0 to 512 [ 1373.901274] EXT4-fs error (device loop7): __ext4_fill_super:5244: inode #2: comm syz-executor.7: iget: root inode unallocated 22:32:46 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0", 0x2d, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff4655fe0f4655fe0f4655f00000000000004", 0x1b, 0x2100}], 0x0, &(0x7f0000012c00)) 22:32:46 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010100)="00000000080000000000f900b00cb2cc029f49d8b90449a7d5d54d49010000a566", 0x21, 0x4e0}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff4655fe0f4", 0xe, 0x2100}], 0x0, &(0x7f0000012c00)) [ 1373.929660] EXT4-fs (loop7): get root inode failed [ 1373.930082] EXT4-fs (loop7): mount failed [ 1373.946444] loop0: detected capacity change from 0 to 512 22:32:46 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53", 0x39, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}], 0x0, &(0x7f0000012c00)) [ 1373.970438] EXT4-fs error (device loop0): __ext4_fill_super:5244: inode #2: comm syz-executor.0: iget: root inode unallocated [ 1373.971698] EXT4-fs (loop0): get root inode failed [ 1373.972111] EXT4-fs (loop0): mount failed [ 1373.978921] loop2: detected capacity change from 0 to 512 22:32:46 executing program 6: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff4655fe0f4655fe0f4655f00000000000004", 0x1b, 0x2100}], 0x0, &(0x7f0000012c00)) [ 1374.016656] EXT4-fs error (device loop2): __ext4_fill_super:5244: inode #2: comm syz-executor.2: iget: root inode unallocated [ 1374.018789] loop1: detected capacity change from 0 to 512 [ 1374.020725] EXT4-fs (loop2): get root inode failed [ 1374.021447] EXT4-fs (loop2): mount failed [ 1374.036563] EXT4-fs (loop1): VFS: Can't find ext4 filesystem [ 1374.043517] loop3: detected capacity change from 0 to 512 22:32:46 executing program 7: getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000040), &(0x7f0000000080)=0xc) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010100)="00000000080000000000f900b00cb2cc029f49d8b90449a7d5d54d49010000a566", 0x21, 0x4e0}, {&(0x7f0000010400)="0200000003000000040000006a000f000300040000000000000000000f00bc0f", 0x20, 0x800}, {0x0, 0x0, 0x2100}, {0x0}, {0x0}, {0x0}], 0x0, &(0x7f0000012c00)) [ 1374.087064] loop6: detected capacity change from 0 to 512 [ 1374.095661] EXT4-fs (loop3): VFS: Can't find ext4 filesystem [ 1374.129723] EXT4-fs (loop6): VFS: Can't find ext4 filesystem [ 1374.182858] loop7: detected capacity change from 0 to 512 [ 1374.197463] EXT4-fs error (device loop7): __ext4_fill_super:5244: inode #2: comm syz-executor.7: iget: root inode unallocated [ 1374.199134] EXT4-fs (loop7): get root inode failed [ 1374.199479] EXT4-fs (loop7): mount failed 22:32:59 executing program 5: openat(0xffffffffffffffff, &(0x7f0000000100)='./file1\x00', 0x20801, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000240)='./file1\x00', 0x587401, 0x167) ioctl$FS_IOC_SETFLAGS(r1, 0x40086602, &(0x7f0000000040)) pwritev(r0, &(0x7f0000000080)=[{&(0x7f0000000140)='\x00', 0x1a}], 0x1, 0x7fffffc, 0x0) r2 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000040)='/sys/kernel/slab', 0x0, 0x0) getdents(r2, &(0x7f0000000080)=""/247, 0xf7) getdents64(r2, &(0x7f0000000240)=""/226, 0x20000258) 22:32:59 executing program 7: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x2, &(0x7f0000000000)=[{0x7c}, {0x6, 0x0, 0x0, 0x7fffffff}]}) openat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x800, 0x10e) r0 = syz_init_net_socket$802154_raw(0x24, 0x3, 0x0) ioctl$sock_inet_SIOCSIFADDR(r0, 0x8916, &(0x7f0000001180)={'bond0\x00', {0x2, 0x0, @local}}) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f0000000080)) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = fork() perf_event_open(&(0x7f0000001280)={0x0, 0x80, 0x5, 0x0, 0x1, 0x4, 0x0, 0xe41, 0x84000, 0x8, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x9, 0x0, @perf_config_ext={0x8000, 0x100}, 0x8000, 0xffffffff, 0x2476f094, 0x0, 0x7, 0x8001, 0xffff, 0x0, 0x1, 0x0, 0x10000}, r1, 0xb, 0xffffffffffffffff, 0x2) 22:32:59 executing program 4: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x2, &(0x7f0000000000)=[{0x7c}, {0x6, 0x0, 0x0, 0x7fffffff}]}) openat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x800, 0x10e) r0 = syz_init_net_socket$802154_raw(0x24, 0x3, 0x0) ioctl$sock_inet_SIOCSIFADDR(r0, 0x8916, &(0x7f0000001180)={'bond0\x00', {0x2, 0x0, @local}}) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f0000000080)) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = fork() perf_event_open(&(0x7f0000001280)={0x0, 0x80, 0x5, 0x0, 0x1, 0x4, 0x0, 0xe41, 0x84000, 0x8, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x9, 0x0, @perf_config_ext={0x8000, 0x100}, 0x8000, 0xffffffff, 0x2476f094, 0x0, 0x7, 0x8001, 0xffff, 0x0, 0x1, 0x0, 0x10000}, r1, 0xb, 0xffffffffffffffff, 0x2) r2 = dup2(0xffffffffffffffff, 0xffffffffffffffff) bind$bt_l2cap(r2, &(0x7f0000000000)={0x1f, 0x0, @fixed={'\xaa\xaa\xaa\xaa\xaa', 0x10}}, 0xe) 22:32:59 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f", 0x44, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff4655fe0f4655fe0f4655f00000000000004", 0x1b, 0x2100}], 0x0, &(0x7f0000012c00)) 22:32:59 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0", 0x2d, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff4655fe0f4655fe0f4655f00000000000004", 0x1b, 0x2100}], 0x0, &(0x7f0000012c00)) [ 1387.627865] loop1: detected capacity change from 0 to 512 [ 1387.635958] loop3: detected capacity change from 0 to 512 22:32:59 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53", 0x39, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}], 0x0, &(0x7f0000012c00)) 22:32:59 executing program 6: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff4655fe0f4655fe0f4655f00000000000004", 0x1b, 0x2100}], 0x0, &(0x7f0000012c00)) 22:32:59 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010100)="00000000080000000000f900b00cb2cc029f49d8b90449a7d5d54d49010000a566", 0x21, 0x4e0}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff4655fe0f4655fe0f4655f00", 0x15, 0x2100}], 0x0, &(0x7f0000012c00)) [ 1387.641061] EXT4-fs (loop3): VFS: Can't find ext4 filesystem [ 1387.648952] EXT4-fs error (device loop1): __ext4_fill_super:5244: inode #2: comm syz-executor.1: iget: root inode unallocated [ 1387.652528] loop2: detected capacity change from 0 to 512 [ 1387.657653] EXT4-fs (loop1): get root inode failed [ 1387.657911] loop6: detected capacity change from 0 to 512 [ 1387.658156] EXT4-fs (loop1): mount failed [ 1387.676861] EXT4-fs (loop6): VFS: Can't find ext4 filesystem [ 1387.676910] loop0: detected capacity change from 0 to 512 [ 1387.683035] EXT4-fs (loop2): VFS: Can't find ext4 filesystem [ 1387.712170] EXT4-fs error (device loop0): __ext4_fill_super:5244: inode #2: comm syz-executor.0: iget: root inode unallocated [ 1387.716909] EXT4-fs (loop0): get root inode failed [ 1387.717396] EXT4-fs (loop0): mount failed 22:33:00 executing program 6: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff4655fe0f4655fe0f4655f00000000000004", 0x1b, 0x2100}], 0x0, &(0x7f0000012c00)) 22:33:00 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f", 0x44, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff4655fe0f4655fe0f4655f00000000000004", 0x1b, 0x2100}], 0x0, &(0x7f0000012c00)) 22:33:00 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53", 0x39, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}], 0x0, &(0x7f0000012c00)) 22:33:00 executing program 2: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x2, &(0x7f0000000000)=[{0x7c}, {0x6, 0x0, 0x0, 0x7fffffff}]}) openat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x800, 0x10e) r0 = syz_init_net_socket$802154_raw(0x24, 0x3, 0x0) ioctl$sock_inet_SIOCSIFADDR(r0, 0x8916, &(0x7f0000001180)={'bond0\x00', {0x2, 0x0, @local}}) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f0000000080)) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = fork() perf_event_open(&(0x7f0000001280)={0x0, 0x80, 0x5, 0x0, 0x1, 0x4, 0x0, 0xe41, 0x84000, 0x8, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x9, 0x0, @perf_config_ext={0x8000, 0x100}, 0x8000, 0xffffffff, 0x2476f094, 0x0, 0x7, 0x8001, 0xffff, 0x0, 0x1, 0x0, 0x10000}, r1, 0xb, 0xffffffffffffffff, 0x2) syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x0) bind$bt_l2cap(0xffffffffffffffff, &(0x7f0000000000)={0x1f, 0x0, @fixed={'\xaa\xaa\xaa\xaa\xaa', 0x10}}, 0xe) 22:33:00 executing program 5: openat(0xffffffffffffffff, &(0x7f0000000100)='./file1\x00', 0x20801, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000240)='./file1\x00', 0x587401, 0x167) ioctl$FS_IOC_SETFLAGS(r1, 0x40086602, &(0x7f0000000040)) pwritev(r0, &(0x7f0000000080)=[{&(0x7f0000000140)='\x00', 0x1a}], 0x1, 0x7fffffc, 0x0) r2 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000040)='/sys/kernel/slab', 0x0, 0x0) getdents(r2, &(0x7f0000000080)=""/247, 0xf7) getdents64(r2, &(0x7f0000000240)=""/226, 0x20000258) 22:33:00 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010100)="00000000080000000000f900b00cb2cc029f49d8b90449a7d5d54d49010000a566", 0x21, 0x4e0}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff4655fe0f4655fe0f4655f00", 0x15, 0x2100}], 0x0, &(0x7f0000012c00)) [ 1387.897882] loop1: detected capacity change from 0 to 512 [ 1387.907004] loop6: detected capacity change from 0 to 512 [ 1387.925564] EXT4-fs error (device loop1): __ext4_fill_super:5244: inode #2: comm syz-executor.1: iget: root inode unallocated [ 1387.927061] EXT4-fs (loop1): get root inode failed [ 1387.927406] EXT4-fs (loop1): mount failed 22:33:00 executing program 7: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x2, &(0x7f0000000000)=[{0x7c}, {0x6, 0x0, 0x0, 0x7fffffff}]}) openat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x800, 0x10e) r0 = syz_init_net_socket$802154_raw(0x24, 0x3, 0x0) ioctl$sock_inet_SIOCSIFADDR(r0, 0x8916, &(0x7f0000001180)={'bond0\x00', {0x2, 0x0, @local}}) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f0000000080)) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = fork() perf_event_open(&(0x7f0000001280)={0x0, 0x80, 0x5, 0x0, 0x1, 0x4, 0x0, 0xe41, 0x84000, 0x8, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x9, 0x0, @perf_config_ext={0x8000, 0x100}, 0x8000, 0xffffffff, 0x2476f094, 0x0, 0x7, 0x8001, 0xffff, 0x0, 0x1, 0x0, 0x10000}, r1, 0xb, 0xffffffffffffffff, 0x2) [ 1387.934187] loop0: detected capacity change from 0 to 512 [ 1387.938918] loop3: detected capacity change from 0 to 512 [ 1387.939425] EXT4-fs (loop6): VFS: Can't find ext4 filesystem [ 1387.954430] EXT4-fs (loop3): VFS: Can't find ext4 filesystem [ 1387.992856] EXT4-fs error (device loop0): __ext4_fill_super:5244: inode #2: comm syz-executor.0: iget: root inode unallocated [ 1387.994021] EXT4-fs (loop0): get root inode failed [ 1387.994362] EXT4-fs (loop0): mount failed 22:33:00 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f", 0x44, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff4655fe0f4655fe0f4655f00000000000004", 0x1b, 0x2100}], 0x0, &(0x7f0000012c00)) 22:33:00 executing program 5: openat(0xffffffffffffffff, &(0x7f0000000100)='./file1\x00', 0x20801, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000240)='./file1\x00', 0x587401, 0x167) ioctl$FS_IOC_SETFLAGS(r1, 0x40086602, &(0x7f0000000040)) pwritev(r0, &(0x7f0000000080)=[{&(0x7f0000000140)='\x00', 0x1a}], 0x1, 0x7fffffc, 0x0) r2 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000040)='/sys/kernel/slab', 0x0, 0x0) getdents(r2, &(0x7f0000000080)=""/247, 0xf7) getdents64(r2, &(0x7f0000000240)=""/226, 0x20000258) 22:33:00 executing program 6: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff4655fe0f4655fe0f4655f00000000000004", 0x1b, 0x2100}], 0x0, 0x0) [ 1388.122971] loop1: detected capacity change from 0 to 512 [ 1388.137721] EXT4-fs error (device loop1): __ext4_fill_super:5244: inode #2: comm syz-executor.1: iget: root inode unallocated [ 1388.138916] EXT4-fs (loop1): get root inode failed [ 1388.139274] EXT4-fs (loop1): mount failed [ 1388.244433] loop6: detected capacity change from 0 to 512 22:33:15 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f0000000000000000010000", 0x4f, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff4655fe0f4655fe0f4655f00000000000004", 0x1b, 0x2100}], 0x0, &(0x7f0000012c00)) 22:33:15 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010100)="00000000080000000000f900b00cb2cc029f49d8b90449a7d5d54d49010000a566", 0x21, 0x4e0}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff4655fe0f4655fe0f4655f00000000", 0x18, 0x2100}], 0x0, &(0x7f0000012c00)) 22:33:15 executing program 2: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x2, &(0x7f0000000000)=[{0x7c}, {0x6, 0x0, 0x0, 0x7fffffff}]}) openat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x800, 0x10e) r0 = syz_init_net_socket$802154_raw(0x24, 0x3, 0x0) ioctl$sock_inet_SIOCSIFADDR(r0, 0x8916, &(0x7f0000001180)={'bond0\x00', {0x2, 0x0, @local}}) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f0000000080)) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = fork() perf_event_open(&(0x7f0000001280)={0x0, 0x80, 0x5, 0x0, 0x1, 0x4, 0x0, 0xe41, 0x84000, 0x8, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x9, 0x0, @perf_config_ext={0x8000, 0x100}, 0x8000, 0xffffffff, 0x2476f094, 0x0, 0x7, 0x8001, 0xffff, 0x0, 0x1, 0x0, 0x10000}, r1, 0xb, 0xffffffffffffffff, 0x2) syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x0) bind$bt_l2cap(0xffffffffffffffff, &(0x7f0000000000)={0x1f, 0x0, @fixed={'\xaa\xaa\xaa\xaa\xaa', 0x10}}, 0xe) 22:33:15 executing program 4: getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000040), &(0x7f0000000080)=0xc) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010100)="00000000080000000000f900b00cb2cc029f49d8b90449a7d5d54d49010000a566", 0x21, 0x4e0}, {&(0x7f0000010400)="0200000003000000040000006a000f000300040000000000000000000f00bc0f", 0x20, 0x800}, {&(0x7f0000011600)="ed41000000080000dff4655fe0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}, {0x0}, {0x0}], 0x0, &(0x7f0000012c00)) 22:33:15 executing program 7: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x2, &(0x7f0000000000)=[{0x7c}, {0x6, 0x0, 0x0, 0x7fffffff}]}) openat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x800, 0x10e) r0 = syz_init_net_socket$802154_raw(0x24, 0x3, 0x0) ioctl$sock_inet_SIOCSIFADDR(r0, 0x8916, &(0x7f0000001180)={'bond0\x00', {0x2, 0x0, @local}}) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f0000000080)) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = fork() perf_event_open(&(0x7f0000001280)={0x0, 0x80, 0x5, 0x0, 0x1, 0x4, 0x0, 0xe41, 0x84000, 0x8, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x9, 0x0, @perf_config_ext={0x8000, 0x100}, 0x8000, 0xffffffff, 0x2476f094, 0x0, 0x7, 0x8001, 0xffff, 0x0, 0x1, 0x0, 0x10000}, r1, 0xb, 0xffffffffffffffff, 0x2) 22:33:15 executing program 5: openat(0xffffffffffffffff, &(0x7f0000000100)='./file1\x00', 0x20801, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000240)='./file1\x00', 0x587401, 0x167) ioctl$FS_IOC_SETFLAGS(r1, 0x40086602, &(0x7f0000000040)) pwritev(r0, &(0x7f0000000080)=[{&(0x7f0000000140)='\x00', 0x1a}], 0x1, 0x7fffffc, 0x0) r2 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000040)='/sys/kernel/slab', 0x0, 0x0) getdents64(r2, &(0x7f0000000240)=""/226, 0x20000258) 22:33:15 executing program 6: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff4655fe0f4655fe0f4655f00000000000004", 0x1b, 0x2100}], 0x0, 0x0) [ 1403.455620] loop4: detected capacity change from 0 to 512 22:33:15 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef0100010000", 0x3f, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}], 0x0, &(0x7f0000012c00)) [ 1403.466983] loop6: detected capacity change from 0 to 512 [ 1403.475627] loop3: detected capacity change from 0 to 512 22:33:15 executing program 6: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff4655fe0f4655fe0f4655f00000000000004", 0x1b, 0x2100}], 0x0, 0x0) [ 1403.502095] EXT4-fs error (device loop3): __ext4_fill_super:5244: inode #2: comm syz-executor.3: iget: root inode unallocated [ 1403.503266] EXT4-fs (loop3): get root inode failed [ 1403.503673] EXT4-fs (loop3): mount failed [ 1403.511798] EXT4-fs error (device loop4): ext4_orphan_get:1419: comm syz-executor.4: bad orphan inode 16318464 [ 1403.514747] EXT4-fs (loop4): mounted filesystem without journal. Quota mode: none. [ 1403.525312] loop1: detected capacity change from 0 to 512 [ 1403.529374] loop0: detected capacity change from 0 to 512 [ 1403.531744] EXT4-fs (loop1): invalid first ino: 0 [ 1403.546280] EXT4-fs error (device loop0): __ext4_fill_super:5244: inode #2: comm syz-executor.0: iget: root inode unallocated [ 1403.550846] EXT4-fs (loop0): get root inode failed [ 1403.551896] EXT4-fs (loop0): mount failed [ 1403.634098] loop6: detected capacity change from 0 to 512 [ 1403.638981] EXT4-fs (loop4): unmounting filesystem. 22:33:15 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}], 0x0, &(0x7f0000012c00)) 22:33:15 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010100)="00000000080000000000f900b00cb2cc029f49d8b90449a7d5d54d49010000a566", 0x21, 0x4e0}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff4655fe0f4655fe0f4655f00000000", 0x18, 0x2100}], 0x0, &(0x7f0000012c00)) 22:33:15 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}], 0x0, &(0x7f0000012c00)) (fail_nth: 1) 22:33:16 executing program 5: openat(0xffffffffffffffff, &(0x7f0000000100)='./file1\x00', 0x20801, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000240)='./file1\x00', 0x587401, 0x167) ioctl$FS_IOC_SETFLAGS(r1, 0x40086602, &(0x7f0000000040)) pwritev(r0, &(0x7f0000000080)=[{&(0x7f0000000140)='\x00', 0x1a}], 0x1, 0x7fffffc, 0x0) r2 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000040)='/sys/kernel/slab', 0x0, 0x0) getdents64(r2, &(0x7f0000000240)=""/226, 0x20000258) 22:33:16 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f0000000000000000010000", 0x4f, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff4655fe0f4655fe0f4655f00000000000004", 0x1b, 0x2100}], 0x0, &(0x7f0000012c00)) [ 1403.725818] loop3: detected capacity change from 0 to 512 [ 1403.738019] loop0: detected capacity change from 0 to 512 [ 1403.753057] EXT4-fs error (device loop3): __ext4_fill_super:5244: inode #2: comm syz-executor.3: iget: root inode unallocated [ 1403.754185] EXT4-fs (loop3): get root inode failed [ 1403.754549] EXT4-fs (loop3): mount failed [ 1403.763292] loop1: detected capacity change from 0 to 512 [ 1403.788061] EXT4-fs (loop1): invalid first ino: 0 [ 1403.796012] EXT4-fs error (device loop0): __ext4_fill_super:5244: inode #2: comm syz-executor.0: iget: root inode unallocated [ 1403.811083] EXT4-fs (loop0): get root inode failed [ 1403.812202] EXT4-fs (loop0): mount failed [ 1419.212313] loop3: detected capacity change from 0 to 512 [ 1419.217768] loop1: detected capacity change from 0 to 512 22:33:31 executing program 2: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x2, &(0x7f0000000000)=[{0x7c}, {0x6, 0x0, 0x0, 0x7fffffff}]}) openat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x800, 0x10e) r0 = syz_init_net_socket$802154_raw(0x24, 0x3, 0x0) ioctl$sock_inet_SIOCSIFADDR(r0, 0x8916, &(0x7f0000001180)={'bond0\x00', {0x2, 0x0, @local}}) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f0000000080)) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = fork() perf_event_open(&(0x7f0000001280)={0x0, 0x80, 0x5, 0x0, 0x1, 0x4, 0x0, 0xe41, 0x84000, 0x8, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x9, 0x0, @perf_config_ext={0x8000, 0x100}, 0x8000, 0xffffffff, 0x2476f094, 0x0, 0x7, 0x8001, 0xffff, 0x0, 0x1, 0x0, 0x10000}, r1, 0xb, 0xffffffffffffffff, 0x2) syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x0) bind$bt_l2cap(0xffffffffffffffff, &(0x7f0000000000)={0x1f, 0x0, @fixed={'\xaa\xaa\xaa\xaa\xaa', 0x10}}, 0xe) 22:33:31 executing program 5: openat(0xffffffffffffffff, &(0x7f0000000100)='./file1\x00', 0x20801, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000240)='./file1\x00', 0x587401, 0x167) ioctl$FS_IOC_SETFLAGS(r1, 0x40086602, &(0x7f0000000040)) pwritev(r0, &(0x7f0000000080)=[{&(0x7f0000000140)='\x00', 0x1a}], 0x1, 0x7fffffc, 0x0) r2 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000040)='/sys/kernel/slab', 0x0, 0x0) getdents64(r2, &(0x7f0000000240)=""/226, 0x20000258) 22:33:31 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}], 0x0, &(0x7f0000012c00)) (fail_nth: 2) 22:33:31 executing program 7: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}], 0x0, &(0x7f0000012c00)) (fail_nth: 1) 22:33:31 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f01", 0x35, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}], 0x0, &(0x7f0000012c00)) 22:33:31 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f0000000000000000010000", 0x4f, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff4655fe0f4655fe0f4655f00000000000004", 0x1b, 0x2100}], 0x0, &(0x7f0000012c00)) 22:33:31 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010100)="00000000080000000000f900b00cb2cc029f49d8b90449a7d5d54d49010000a566", 0x21, 0x4e0}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff4655fe0f4655fe0f4655f00000000", 0x18, 0x2100}], 0x0, &(0x7f0000012c00)) [ 1419.222609] EXT4-fs (loop1): invalid first ino: 0 [ 1419.245883] loop0: detected capacity change from 0 to 512 [ 1419.256731] EXT4-fs (loop3): VFS: Can't find ext4 filesystem 22:33:31 executing program 5: openat(0xffffffffffffffff, &(0x7f0000000100)='./file1\x00', 0x20801, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000240)='./file1\x00', 0x587401, 0x167) ioctl$FS_IOC_SETFLAGS(r1, 0x40086602, &(0x7f0000000040)) pwritev(r0, &(0x7f0000000080)=[{&(0x7f0000000140)='\x00', 0x1a}], 0x1, 0x7fffffc, 0x0) getdents(0xffffffffffffffff, &(0x7f0000000080)=""/247, 0xf7) getdents64(0xffffffffffffffff, &(0x7f0000000240)=""/226, 0x20000258) 22:33:31 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b", 0x55, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff4655fe0f4655fe0f4655f00000000000004", 0x1b, 0x2100}], 0x0, &(0x7f0000012c00)) [ 1419.281300] EXT4-fs error (device loop0): __ext4_fill_super:5244: inode #2: comm syz-executor.0: iget: root inode unallocated [ 1419.287337] EXT4-fs (loop0): get root inode failed [ 1419.287989] EXT4-fs (loop0): mount failed [ 1419.290396] loop4: detected capacity change from 0 to 512 [ 1419.321633] EXT4-fs error (device loop4): __ext4_fill_super:5244: inode #2: comm syz-executor.4: iget: root inode unallocated [ 1419.324980] EXT4-fs (loop4): get root inode failed [ 1419.325880] EXT4-fs (loop4): mount failed [ 1419.359521] loop1: detected capacity change from 0 to 512 22:33:31 executing program 7: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}], 0x0, &(0x7f0000012c00)) (fail_nth: 2) [ 1419.367545] EXT4-fs (loop1): unsupported inode size: 0 [ 1419.367984] EXT4-fs (loop1): blocksize: 2048 22:33:31 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f01", 0x35, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}], 0x0, &(0x7f0000012c00)) 22:33:31 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}], 0x0, &(0x7f0000012c00)) (fail_nth: 3) 22:33:31 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010100)="00000000080000000000f900b00cb2cc029f49d8b90449a7d5d54d49010000a566", 0x21, 0x4e0}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff4655fe0f4655fe0f4655f000000000000", 0x1a, 0x2100}], 0x0, &(0x7f0000012c00)) 22:33:31 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b", 0x55, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff4655fe0f4655fe0f4655f00000000000004", 0x1b, 0x2100}], 0x0, &(0x7f0000012c00)) [ 1419.487716] loop7: detected capacity change from 0 to 512 [ 1419.500509] loop0: detected capacity change from 0 to 512 22:33:31 executing program 5: openat(0xffffffffffffffff, &(0x7f0000000100)='./file1\x00', 0x20801, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000240)='./file1\x00', 0x587401, 0x167) ioctl$FS_IOC_SETFLAGS(r1, 0x40086602, &(0x7f0000000040)) pwritev(r0, &(0x7f0000000080)=[{&(0x7f0000000140)='\x00', 0x1a}], 0x1, 0x7fffffc, 0x0) getdents(0xffffffffffffffff, &(0x7f0000000080)=""/247, 0xf7) getdents64(0xffffffffffffffff, &(0x7f0000000240)=""/226, 0x20000258) [ 1419.510374] loop3: detected capacity change from 0 to 512 [ 1419.513814] FAULT_INJECTION: forcing a failure. [ 1419.513814] name fail_usercopy, interval 1, probability 0, space 0, times 1 [ 1419.514767] CPU: 1 PID: 13000 Comm: syz-executor.4 Not tainted 6.0.0-rc3-next-20220829 #1 [ 1419.515432] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS rel-1.14.0-0-g155821a1990b-prebuilt.qemu.org 04/01/2014 [ 1419.516324] Call Trace: [ 1419.516543] [ 1419.516727] dump_stack_lvl+0x8b/0xb3 [ 1419.517057] should_fail.cold+0x5/0xa [ 1419.517368] _copy_from_user+0x2a/0x170 [ 1419.517697] __do_sys_memfd_create+0x103/0x4e0 [ 1419.518079] do_syscall_64+0x3b/0x90 [ 1419.518389] entry_SYSCALL_64_after_hwframe+0x63/0xcd [ 1419.518874] RIP: 0033:0x7f499dfa0b19 [ 1419.519185] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1419.520595] RSP: 002b:00007f499b515f48 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 1419.521180] RAX: ffffffffffffffda RBX: 0000000020000200 RCX: 00007f499dfa0b19 [ 1419.521731] RDX: 0000000000001000 RSI: 0000000000000000 RDI: 00007f499dffa0fb [ 1419.522278] RBP: 0000000000000002 R08: 0000000000000800 R09: ffffffffffffffff [ 1419.522820] R10: 0000000000000002 R11: 0000000000000246 R12: 0000000008100000 [ 1419.523364] R13: 0000000020000100 R14: 0000000000040000 R15: 0000000020012c00 [ 1419.523914] [ 1419.532796] EXT4-fs (loop3): VFS: Can't find ext4 filesystem [ 1419.545925] loop1: detected capacity change from 0 to 512 [ 1419.547214] EXT4-fs error (device loop0): __ext4_fill_super:5244: inode #2: comm syz-executor.0: iget: root inode unallocated [ 1419.548533] EXT4-fs (loop0): get root inode failed [ 1419.549068] EXT4-fs (loop0): mount failed [ 1419.553967] EXT4-fs error (device loop7): __ext4_fill_super:5244: inode #2: comm syz-executor.7: iget: root inode unallocated [ 1419.555662] EXT4-fs (loop7): get root inode failed [ 1419.556063] EXT4-fs (loop7): mount failed [ 1419.559254] EXT4-fs (loop1): unsupported inode size: 0 [ 1419.559830] EXT4-fs (loop1): blocksize: 2048 22:33:46 executing program 2: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x2, &(0x7f0000000000)=[{0x7c}, {0x6, 0x0, 0x0, 0x7fffffff}]}) openat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x800, 0x10e) r0 = syz_init_net_socket$802154_raw(0x24, 0x3, 0x0) ioctl$sock_inet_SIOCSIFADDR(r0, 0x8916, &(0x7f0000001180)={'bond0\x00', {0x2, 0x0, @local}}) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f0000000080)) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = fork() perf_event_open(&(0x7f0000001280)={0x0, 0x80, 0x5, 0x0, 0x1, 0x4, 0x0, 0xe41, 0x84000, 0x8, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x9, 0x0, @perf_config_ext={0x8000, 0x100}, 0x8000, 0xffffffff, 0x2476f094, 0x0, 0x7, 0x8001, 0xffff, 0x0, 0x1, 0x0, 0x10000}, r1, 0xb, 0xffffffffffffffff, 0x2) syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x0) 22:33:46 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f01", 0x35, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}], 0x0, &(0x7f0000012c00)) 22:33:46 executing program 6: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010100)="00000000080000000000f900b00cb2cc029f49d8b90449a7d5d54d49010000a566", 0x21, 0x4e0}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff4655fe0f4655fe0f4655f00000000", 0x18, 0x2100}], 0x0, &(0x7f0000012c00)) 22:33:46 executing program 7: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}], 0x0, &(0x7f0000012c00)) (fail_nth: 3) 22:33:46 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b", 0x55, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff4655fe0f4655fe0f4655f00000000000004", 0x1b, 0x2100}], 0x0, &(0x7f0000012c00)) 22:33:46 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010100)="00000000080000000000f900b00cb2cc029f49d8b90449a7d5d54d49010000a566", 0x21, 0x4e0}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff4655fe0f4655fe0f4655f000000000000", 0x1a, 0x2100}], 0x0, &(0x7f0000012c00)) 22:33:46 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}], 0x0, &(0x7f0000012c00)) (fail_nth: 4) 22:33:46 executing program 5: openat(0xffffffffffffffff, &(0x7f0000000100)='./file1\x00', 0x20801, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000240)='./file1\x00', 0x587401, 0x167) ioctl$FS_IOC_SETFLAGS(r1, 0x40086602, &(0x7f0000000040)) pwritev(r0, &(0x7f0000000080)=[{&(0x7f0000000140)='\x00', 0x1a}], 0x1, 0x7fffffc, 0x0) getdents(0xffffffffffffffff, &(0x7f0000000080)=""/247, 0xf7) getdents64(0xffffffffffffffff, &(0x7f0000000240)=""/226, 0x20000258) [ 1433.694388] FAULT_INJECTION: forcing a failure. [ 1433.694388] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 1433.696156] CPU: 1 PID: 13022 Comm: syz-executor.7 Not tainted 6.0.0-rc3-next-20220829 #1 [ 1433.697349] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS rel-1.14.0-0-g155821a1990b-prebuilt.qemu.org 04/01/2014 [ 1433.698984] Call Trace: [ 1433.699372] [ 1433.699727] dump_stack_lvl+0x8b/0xb3 [ 1433.700318] should_fail.cold+0x5/0xa [ 1433.700935] _copy_from_user+0x2a/0x170 [ 1433.701548] __do_sys_memfd_create+0x103/0x4e0 [ 1433.702242] do_syscall_64+0x3b/0x90 [ 1433.702816] entry_SYSCALL_64_after_hwframe+0x63/0xcd [ 1433.703599] RIP: 0033:0x7fb036d74b19 [ 1433.704176] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1433.706926] RSP: 002b:00007fb0342e9f48 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 1433.708079] RAX: ffffffffffffffda RBX: 0000000020000200 RCX: 00007fb036d74b19 [ 1433.709172] RDX: 0000000000001000 RSI: 0000000000000000 RDI: 00007fb036dce0fb 22:33:46 executing program 5: openat(0xffffffffffffffff, &(0x7f0000000100)='./file1\x00', 0x20801, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000240)='./file1\x00', 0x587401, 0x167) ioctl$FS_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000040)) r1 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000040)='/sys/kernel/slab', 0x0, 0x0) getdents(r1, &(0x7f0000000080)=""/247, 0xf7) getdents64(r1, &(0x7f0000000240)=""/226, 0x20000258) [ 1433.710341] RBP: 0000000000000002 R08: 0000000000000800 R09: ffffffffffffffff [ 1433.711453] R10: 0000000000000002 R11: 0000000000000246 R12: 0000000008100000 [ 1433.712203] loop6: detected capacity change from 0 to 512 [ 1433.712543] R13: 0000000020000100 R14: 0000000000040000 R15: 0000000020012c00 [ 1433.714081] [ 1433.739969] loop1: detected capacity change from 0 to 512 [ 1433.748668] EXT4-fs error (device loop6): __ext4_fill_super:5244: inode #2: comm syz-executor.6: iget: root inode unallocated [ 1433.753154] loop0: detected capacity change from 0 to 512 [ 1433.756047] loop3: detected capacity change from 0 to 512 [ 1433.761963] EXT4-fs (loop6): get root inode failed [ 1433.762376] EXT4-fs (loop6): mount failed [ 1433.769642] EXT4-fs (loop3): VFS: Can't find ext4 filesystem [ 1433.770237] EXT4-fs (loop1): unsupported inode size: 0 [ 1433.770701] EXT4-fs (loop1): blocksize: 2048 22:33:46 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}], 0x0, &(0x7f0000012c00)) (fail_nth: 5) [ 1433.812888] EXT4-fs error (device loop0): __ext4_fill_super:5244: inode #2: comm syz-executor.0: iget: root inode unallocated [ 1433.820349] EXT4-fs (loop0): get root inode failed [ 1433.821297] EXT4-fs (loop0): mount failed 22:33:46 executing program 6: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff4655fe0f4655fe0f4655f00000000000004", 0x1b, 0x2100}], 0x0, &(0x7f0000012c00)) (fail_nth: 1) 22:33:46 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b000000", 0x58, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff4655fe0f4655fe0f4655f00000000000004", 0x1b, 0x2100}], 0x0, &(0x7f0000012c00)) 22:33:46 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010100)="00000000080000000000f900b00cb2cc029f49d8b90449a7d5d54d49010000a566", 0x21, 0x4e0}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff4655fe0f4655fe0f4655f000000000000", 0x1a, 0x2100}], 0x0, &(0x7f0000012c00)) 22:33:46 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff", 0x38, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}], 0x0, &(0x7f0000012c00)) 22:33:46 executing program 6: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff4655fe0f4655fe0f4655f00000000000004", 0x1b, 0x2100}], 0x0, &(0x7f0000012c00)) (fail_nth: 2) 22:33:46 executing program 7: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}], 0x0, &(0x7f0000012c00)) (fail_nth: 4) [ 1434.011173] loop4: detected capacity change from 0 to 512 [ 1434.033222] loop1: detected capacity change from 0 to 512 [ 1434.053811] EXT4-fs (loop1): unsupported inode size: 0 [ 1434.054568] EXT4-fs (loop1): blocksize: 2048 [ 1434.056856] EXT4-fs error (device loop4): __ext4_fill_super:5244: inode #2: comm syz-executor.4: iget: root inode unallocated [ 1434.063895] EXT4-fs (loop4): get root inode failed [ 1434.064666] EXT4-fs (loop4): mount failed [ 1434.070378] loop0: detected capacity change from 0 to 512 [ 1434.081781] loop6: detected capacity change from 0 to 512 [ 1434.121347] EXT4-fs (loop6): corrupt root inode, run e2fsck [ 1434.122327] EXT4-fs (loop6): mount failed [ 1434.122555] EXT4-fs error (device loop0): __ext4_fill_super:5244: inode #2: comm syz-executor.0: iget: root inode unallocated [ 1434.135576] EXT4-fs (loop0): get root inode failed [ 1434.136712] EXT4-fs (loop0): mount failed [ 1434.147132] loop3: detected capacity change from 0 to 512 [ 1434.171367] EXT4-fs (loop3): VFS: Can't find ext4 filesystem 22:34:00 executing program 2: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x2, &(0x7f0000000000)=[{0x7c}, {0x6, 0x0, 0x0, 0x7fffffff}]}) openat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x800, 0x10e) r0 = syz_init_net_socket$802154_raw(0x24, 0x3, 0x0) ioctl$sock_inet_SIOCSIFADDR(r0, 0x8916, &(0x7f0000001180)={'bond0\x00', {0x2, 0x0, @local}}) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f0000000080)) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = fork() perf_event_open(&(0x7f0000001280)={0x0, 0x80, 0x5, 0x0, 0x1, 0x4, 0x0, 0xe41, 0x84000, 0x8, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x9, 0x0, @perf_config_ext={0x8000, 0x100}, 0x8000, 0xffffffff, 0x2476f094, 0x0, 0x7, 0x8001, 0xffff, 0x0, 0x1, 0x0, 0x10000}, r1, 0xb, 0xffffffffffffffff, 0x2) 22:34:00 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff", 0x38, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}], 0x0, &(0x7f0000012c00)) 22:34:00 executing program 5: openat(0xffffffffffffffff, &(0x7f0000000100)='./file1\x00', 0x20801, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000240)='./file1\x00', 0x587401, 0x167) r0 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000040)='/sys/kernel/slab', 0x0, 0x0) getdents(r0, &(0x7f0000000080)=""/247, 0xf7) getdents64(r0, &(0x7f0000000240)=""/226, 0x20000258) 22:34:00 executing program 6: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff4655fe0f4655fe0f4655f00000000000004", 0x1b, 0x2100}], 0x0, &(0x7f0000012c00)) (fail_nth: 3) 22:34:00 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}], 0x0, &(0x7f0000012c00)) (fail_nth: 6) 22:34:00 executing program 7: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}], 0x0, &(0x7f0000012c00)) (fail_nth: 5) 22:34:00 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010100)="00000000080000000000f900b00cb2cc029f49d8b90449a7d5d54d49010000a566", 0x21, 0x4e0}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff4655fe0f4655fe0f4655f00000000000004", 0x1b}], 0x0, &(0x7f0000012c00)) [ 1447.755305] loop0: detected capacity change from 0 to 512 22:34:00 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b000000", 0x58, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff4655fe0f4655fe0f4655f00000000000004", 0x1b, 0x2100}], 0x0, &(0x7f0000012c00)) [ 1447.772542] loop3: detected capacity change from 0 to 512 [ 1447.773916] FAULT_INJECTION: forcing a failure. [ 1447.773916] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 1447.775672] CPU: 0 PID: 13079 Comm: syz-executor.6 Not tainted 6.0.0-rc3-next-20220829 #1 [ 1447.776851] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS rel-1.14.0-0-g155821a1990b-prebuilt.qemu.org 04/01/2014 [ 1447.778428] Call Trace: [ 1447.778810] [ 1447.779158] dump_stack_lvl+0x8b/0xb3 [ 1447.779749] should_fail.cold+0x5/0xa [ 1447.780302] _copy_from_user+0x2a/0x170 [ 1447.780896] __do_sys_memfd_create+0x103/0x4e0 [ 1447.781564] do_syscall_64+0x3b/0x90 [ 1447.782111] entry_SYSCALL_64_after_hwframe+0x63/0xcd [ 1447.782849] RIP: 0033:0x7f0e406feb19 [ 1447.783382] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1447.785883] RSP: 002b:00007f0e3dc73f48 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 1447.786944] RAX: ffffffffffffffda RBX: 0000000020000200 RCX: 00007f0e406feb19 [ 1447.787974] RDX: 0000000000004200 RSI: 0000000000000000 RDI: 00007f0e407580fb [ 1447.789037] RBP: 0000000000000003 R08: 0000000000002100 R09: ffffffffffffffff [ 1447.790056] R10: 0000000000000003 R11: 0000000000000246 R12: 0000000008100000 [ 1447.791077] R13: 0000000020000100 R14: 0000000000040000 R15: 0000000020012c00 [ 1447.792101] [ 1447.800463] EXT4-fs error (device loop0): __ext4_fill_super:5244: inode #2: comm syz-executor.0: iget: root inode unallocated [ 1447.803095] EXT4-fs (loop0): get root inode failed [ 1447.803630] EXT4-fs (loop0): mount failed [ 1447.815654] EXT4-fs (loop3): VFS: Can't find ext4 filesystem 22:34:00 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}], 0x0, &(0x7f0000012c00)) (fail_nth: 7) [ 1447.871203] loop7: detected capacity change from 0 to 512 [ 1447.874243] loop1: detected capacity change from 0 to 512 22:34:00 executing program 6: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff4655fe0f4655fe0f4655f00000000000004", 0x1b, 0x2100}], 0x0, &(0x7f0000012c00)) (fail_nth: 4) 22:34:00 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010100)="00000000080000000000f900b00cb2cc029f49d8b90449a7d5d54d49010000a566", 0x21, 0x4e0}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff4655fe0f4655fe0f4655f00000000000004", 0x1b}], 0x0, &(0x7f0000012c00)) [ 1447.911408] EXT4-fs (loop1): unsupported inode size: 0 [ 1447.912328] EXT4-fs (loop1): blocksize: 2048 [ 1447.921192] loop4: detected capacity change from 0 to 512 22:34:00 executing program 6: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff4655fe0f4655fe0f4655f00000000000004", 0x1b, 0x2100}], 0x0, &(0x7f0000012c00)) (fail_nth: 5) [ 1447.930201] loop0: detected capacity change from 0 to 512 [ 1447.935229] EXT4-fs error (device loop7): __ext4_fill_super:5244: inode #2: comm syz-executor.7: iget: root inode unallocated [ 1447.937291] EXT4-fs (loop7): get root inode failed [ 1447.938080] EXT4-fs (loop7): mount failed [ 1447.944613] EXT4-fs error (device loop4): __ext4_fill_super:5244: inode #2: comm syz-executor.4: iget: root inode unallocated [ 1447.947908] EXT4-fs (loop4): get root inode failed [ 1447.948294] EXT4-fs (loop4): mount failed [ 1447.959125] loop6: detected capacity change from 0 to 512 [ 1447.971168] EXT4-fs error (device loop0): __ext4_fill_super:5244: inode #2: comm syz-executor.0: iget: root inode unallocated [ 1447.972417] EXT4-fs (loop0): get root inode failed [ 1447.972862] EXT4-fs (loop0): mount failed [ 1447.984018] EXT4-fs (loop6): corrupt root inode, run e2fsck [ 1447.984540] EXT4-fs (loop6): mount failed 22:34:00 executing program 5: openat(0xffffffffffffffff, &(0x7f0000000100)='./file1\x00', 0x20801, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) r0 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000040)='/sys/kernel/slab', 0x0, 0x0) getdents(r0, &(0x7f0000000080)=""/247, 0xf7) getdents64(r0, &(0x7f0000000240)=""/226, 0x20000258) 22:34:00 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff", 0x38, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}], 0x0, &(0x7f0000012c00)) 22:34:00 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b000000", 0x58, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff4655fe0f4655fe0f4655f00000000000004", 0x1b, 0x2100}], 0x0, &(0x7f0000012c00)) 22:34:00 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}], 0x0, &(0x7f0000012c00)) (fail_nth: 8) [ 1448.063365] loop3: detected capacity change from 0 to 512 [ 1448.075209] EXT4-fs (loop3): VFS: Can't find ext4 filesystem [ 1448.138123] loop1: detected capacity change from 0 to 512 [ 1448.149639] EXT4-fs (loop1): unsupported inode size: 0 [ 1448.150048] EXT4-fs (loop1): blocksize: 2048 22:34:13 executing program 6: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff4655fe0f4655fe0f4655f00000000000004", 0x1b, 0x2100}], 0x0, &(0x7f0000012c00)) (fail_nth: 6) 22:34:13 executing program 2: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x2, &(0x7f0000000000)=[{0x7c}, {0x6, 0x0, 0x0, 0x7fffffff}]}) openat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x800, 0x10e) r0 = syz_init_net_socket$802154_raw(0x24, 0x3, 0x0) ioctl$sock_inet_SIOCSIFADDR(r0, 0x8916, &(0x7f0000001180)={'bond0\x00', {0x2, 0x0, @local}}) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f0000000080)) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = fork() perf_event_open(&(0x7f0000001280)={0x0, 0x80, 0x5, 0x0, 0x1, 0x4, 0x0, 0xe41, 0x84000, 0x8, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x9, 0x0, @perf_config_ext={0x8000, 0x100}, 0x8000, 0xffffffff, 0x2476f094, 0x0, 0x7, 0x8001, 0xffff, 0x0, 0x1, 0x0, 0x10000}, r1, 0xb, 0xffffffffffffffff, 0x2) 22:34:13 executing program 5: openat(0xffffffffffffffff, &(0x7f0000000100)='./file1\x00', 0x20801, 0x0) r0 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000040)='/sys/kernel/slab', 0x0, 0x0) getdents(r0, &(0x7f0000000080)=""/247, 0xf7) getdents64(r0, &(0x7f0000000240)=""/226, 0x20000258) 22:34:13 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53", 0x39, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}], 0x0, &(0x7f0000012c00)) 22:34:13 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}], 0x0, &(0x7f0000012c00)) (fail_nth: 9) 22:34:13 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b00000000", 0x59, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff4655fe0f4655fe0f4655f00000000000004", 0x1b, 0x2100}], 0x0, &(0x7f0000012c00)) 22:34:13 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010100)="00000000080000000000f900b00cb2cc029f49d8b90449a7d5d54d49010000a566", 0x21, 0x4e0}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff4655fe0f4655fe0f4655f00000000000004", 0x1b}], 0x0, &(0x7f0000012c00)) 22:34:13 executing program 7: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}], 0x0, &(0x7f0000012c00)) (fail_nth: 6) [ 1461.471334] loop3: detected capacity change from 0 to 512 [ 1461.477652] EXT4-fs (loop3): VFS: Can't find ext4 filesystem [ 1461.486996] loop1: detected capacity change from 0 to 512 [ 1461.492079] loop4: detected capacity change from 0 to 512 [ 1461.506728] EXT4-fs error (device loop4): __ext4_fill_super:5244: inode #2: comm syz-executor.4: iget: root inode unallocated [ 1461.508336] EXT4-fs (loop1): unsupported inode size: 0 [ 1461.509120] EXT4-fs (loop4): get root inode failed [ 1461.509133] EXT4-fs (loop4): mount failed [ 1461.510360] EXT4-fs (loop1): blocksize: 2048 22:34:13 executing program 5: r0 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000040)='/sys/kernel/slab', 0x0, 0x0) getdents(r0, &(0x7f0000000080)=""/247, 0xf7) getdents64(r0, &(0x7f0000000240)=""/226, 0x20000258) [ 1461.517897] loop0: detected capacity change from 0 to 512 22:34:13 executing program 7: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}], 0x0, &(0x7f0000012c00)) (fail_nth: 7) 22:34:13 executing program 6: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff4655fe0f4655fe0f4655f00000000000004", 0x1b, 0x2100}], 0x0, &(0x7f0000012c00)) (fail_nth: 7) [ 1461.562402] EXT4-fs error (device loop0): __ext4_fill_super:5244: inode #2: comm syz-executor.0: iget: root inode unallocated [ 1461.577558] EXT4-fs (loop0): get root inode failed [ 1461.578157] EXT4-fs (loop0): mount failed 22:34:13 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53", 0x39, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}], 0x0, &(0x7f0000012c00)) 22:34:13 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b00000000", 0x59, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff4655fe0f4655fe0f4655f00000000000004", 0x1b, 0x2100}], 0x0, &(0x7f0000012c00)) 22:34:13 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}], 0x0, &(0x7f0000012c00)) (fail_nth: 10) [ 1461.632818] loop3: detected capacity change from 0 to 512 [ 1461.641133] EXT4-fs (loop3): VFS: Can't find ext4 filesystem [ 1461.674985] loop6: detected capacity change from 0 to 512 [ 1461.677960] loop7: detected capacity change from 0 to 512 [ 1461.685872] EXT4-fs (loop6): corrupt root inode, run e2fsck [ 1461.686354] EXT4-fs (loop6): mount failed [ 1461.730058] EXT4-fs error (device loop7): __ext4_fill_super:5244: inode #2: comm syz-executor.7: iget: root inode unallocated [ 1461.734687] EXT4-fs (loop7): get root inode failed [ 1461.735062] EXT4-fs (loop7): mount failed [ 1461.788545] loop1: detected capacity change from 0 to 512 [ 1461.812765] EXT4-fs (loop1): unsupported inode size: 0 [ 1461.813504] EXT4-fs (loop1): blocksize: 2048 22:34:30 executing program 2: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x2, &(0x7f0000000000)=[{0x7c}, {0x6, 0x0, 0x0, 0x7fffffff}]}) openat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x800, 0x10e) r0 = syz_init_net_socket$802154_raw(0x24, 0x3, 0x0) ioctl$sock_inet_SIOCSIFADDR(r0, 0x8916, &(0x7f0000001180)={'bond0\x00', {0x2, 0x0, @local}}) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f0000000080)) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = fork() perf_event_open(&(0x7f0000001280)={0x0, 0x80, 0x5, 0x0, 0x1, 0x4, 0x0, 0xe41, 0x84000, 0x8, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x9, 0x0, @perf_config_ext={0x8000, 0x100}, 0x8000, 0xffffffff, 0x2476f094, 0x0, 0x7, 0x8001, 0xffff, 0x0, 0x1, 0x0, 0x10000}, r1, 0xb, 0xffffffffffffffff, 0x2) 22:34:30 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b00000000", 0x59, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff4655fe0f4655fe0f4655f00000000000004", 0x1b, 0x2100}], 0x0, &(0x7f0000012c00)) [ 1477.759771] loop1: detected capacity change from 0 to 512 [ 1477.774256] EXT4-fs (loop1): unsupported inode size: 0 [ 1477.774709] EXT4-fs (loop1): blocksize: 2048 22:34:30 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}], 0x0, &(0x7f0000012c00)) (fail_nth: 11) 22:34:30 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010100)="00000000080000000000f900b00cb2cc029f49d8b90449a7d5d54d49010000a566", 0x21, 0x4e0}, {&(0x7f0000011600)="ed41000000080000dff4655fe0f4655fe0f4655f00000000000004", 0x1b, 0x2100}], 0x0, &(0x7f0000012c00)) 22:34:30 executing program 5: r0 = openat$sysfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) getdents(r0, &(0x7f0000000080)=""/247, 0xf7) getdents64(r0, &(0x7f0000000240)=""/226, 0x20000258) 22:34:30 executing program 6: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff4655fe0f4655fe0f4655f00000000000004", 0x1b, 0x2100}], 0x0, &(0x7f0000012c00)) (fail_nth: 8) 22:34:30 executing program 7: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}], 0x0, &(0x7f0000012c00)) (fail_nth: 8) 22:34:30 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53", 0x39, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}], 0x0, &(0x7f0000012c00)) [ 1477.821217] loop4: detected capacity change from 0 to 512 [ 1477.830442] loop0: detected capacity change from 0 to 512 [ 1477.839159] loop3: detected capacity change from 0 to 512 22:34:30 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff4655fe0f4655fe0f4655f00000000000004", 0x1b, 0x2100}], 0x0, &(0x7f0000012c00)) [ 1477.845569] EXT4-fs (loop0): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 1477.846239] EXT4-fs (loop0): group descriptors corrupted! [ 1477.852348] EXT4-fs error (device loop4): __ext4_fill_super:5244: inode #2: comm syz-executor.4: iget: root inode unallocated [ 1477.854686] EXT4-fs (loop4): get root inode failed [ 1477.855462] EXT4-fs (loop4): mount failed [ 1477.860946] EXT4-fs (loop3): VFS: Can't find ext4 filesystem [ 1477.891192] loop1: detected capacity change from 0 to 512 [ 1477.900255] EXT4-fs (loop1): VFS: Can't find ext4 filesystem 22:34:30 executing program 5: r0 = openat$sysfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) getdents(r0, &(0x7f0000000080)=""/247, 0xf7) getdents64(r0, &(0x7f0000000240)=""/226, 0x20000258) 22:34:30 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010100)="00000000080000000000f900b00cb2cc029f49d8b90449a7d5d54d49010000a566", 0x21, 0x4e0}, {&(0x7f0000011600)="ed41000000080000dff4655fe0f4655fe0f4655f00000000000004", 0x1b, 0x2100}], 0x0, &(0x7f0000012c00)) 22:34:30 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff4655fe0f4655fe0f4655f00000000000004", 0x1b, 0x2100}], 0x0, &(0x7f0000012c00)) 22:34:30 executing program 7: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}], 0x0, &(0x7f0000012c00)) (fail_nth: 9) 22:34:30 executing program 6: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff4655fe0f4655fe0f4655f00000000000004", 0x1b, 0x2100}], 0x0, &(0x7f0000012c00)) (fail_nth: 9) [ 1478.011270] loop1: detected capacity change from 0 to 512 [ 1478.013019] loop0: detected capacity change from 0 to 512 [ 1478.020759] EXT4-fs (loop1): VFS: Can't find ext4 filesystem [ 1478.022090] EXT4-fs (loop0): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 1478.022744] EXT4-fs (loop0): group descriptors corrupted! 22:34:30 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef", 0x3a}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}], 0x0, &(0x7f0000012c00)) 22:34:30 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}], 0x0, &(0x7f0000012c00)) (fail_nth: 12) [ 1478.081425] loop7: detected capacity change from 0 to 512 [ 1478.118669] EXT4-fs error (device loop7): __ext4_fill_super:5244: inode #2: comm syz-executor.7: iget: root inode unallocated [ 1478.135191] loop6: detected capacity change from 0 to 512 [ 1478.137690] EXT4-fs (loop7): get root inode failed [ 1478.138381] EXT4-fs (loop7): mount failed [ 1478.166568] EXT4-fs (loop6): corrupt root inode, run e2fsck [ 1478.167126] EXT4-fs (loop6): mount failed [ 1478.168028] loop3: detected capacity change from 0 to 512 [ 1478.170079] EXT4-fs (loop3): VFS: Can't find ext4 filesystem 22:34:43 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff4655fe0f4655fe0f4655f00000000000004", 0x1b, 0x2100}], 0x0, &(0x7f0000012c00)) 22:34:43 executing program 2: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x2, &(0x7f0000000000)=[{0x7c}, {0x6, 0x0, 0x0, 0x7fffffff}]}) openat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x800, 0x10e) r0 = syz_init_net_socket$802154_raw(0x24, 0x3, 0x0) ioctl$sock_inet_SIOCSIFADDR(r0, 0x8916, &(0x7f0000001180)={'bond0\x00', {0x2, 0x0, @local}}) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f0000000080)) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fork() syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x0) 22:34:43 executing program 7: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}], 0x0, &(0x7f0000012c00)) (fail_nth: 10) 22:34:43 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}], 0x0, &(0x7f0000012c00)) (fail_nth: 13) 22:34:43 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010100)="00000000080000000000f900b00cb2cc029f49d8b90449a7d5d54d49010000a566", 0x21, 0x4e0}, {&(0x7f0000011600)="ed41000000080000dff4655fe0f4655fe0f4655f00000000000004", 0x1b, 0x2100}], 0x0, &(0x7f0000012c00)) 22:34:43 executing program 5: r0 = openat$sysfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) getdents(r0, &(0x7f0000000080)=""/247, 0xf7) getdents64(r0, &(0x7f0000000240)=""/226, 0x20000258) 22:34:43 executing program 6: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff4655fe0f4655fe0f4655f00000000000004", 0x1b, 0x2100}], 0x0, &(0x7f0000012c00)) (fail_nth: 10) 22:34:43 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef", 0x3a}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}], 0x0, &(0x7f0000012c00)) [ 1491.608134] loop0: detected capacity change from 0 to 512 [ 1491.612152] loop4: detected capacity change from 0 to 512 [ 1491.618717] EXT4-fs (loop0): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 1491.619328] EXT4-fs (loop0): group descriptors corrupted! [ 1491.625941] EXT4-fs error (device loop4): __ext4_fill_super:5244: inode #2: comm syz-executor.4: iget: root inode unallocated [ 1491.627057] EXT4-fs (loop4): get root inode failed [ 1491.627397] EXT4-fs (loop4): mount failed [ 1491.631866] loop1: detected capacity change from 0 to 512 [ 1491.638564] loop3: detected capacity change from 0 to 512 [ 1491.653653] EXT4-fs (loop1): VFS: Can't find ext4 filesystem 22:34:44 executing program 7: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}], 0x0, &(0x7f0000012c00)) (fail_nth: 11) [ 1491.661693] EXT4-fs (loop3): VFS: Can't find ext4 filesystem 22:34:44 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010100)="00000000080000000000f900b00cb2cc029f49d8b90449a7d5d54d49010000a566", 0x21, 0x4e0}, {0x0, 0x0, 0x800}, {&(0x7f0000011600)="ed41000000080000dff4655fe0f4655fe0f4655f00000000000004", 0x1b, 0x2100}], 0x0, &(0x7f0000012c00)) 22:34:44 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}], 0x0, &(0x7f0000012c00)) (fail_nth: 14) [ 1491.739879] loop7: detected capacity change from 0 to 512 22:34:44 executing program 6: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff4655fe0f4655fe0f4655f00000000000004", 0x1b, 0x2100}], 0x0, &(0x7f0000012c00)) (fail_nth: 11) [ 1491.764835] EXT4-fs error (device loop7): __ext4_fill_super:5244: inode #2: comm syz-executor.7: iget: root inode unallocated 22:34:44 executing program 5: r0 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000040)='/sys/kernel/slab', 0x0, 0x0) getdents(0xffffffffffffffff, &(0x7f0000000080)=""/247, 0xf7) getdents64(r0, &(0x7f0000000240)=""/226, 0x20000258) [ 1491.771641] EXT4-fs (loop7): get root inode failed [ 1491.771997] EXT4-fs (loop7): mount failed [ 1491.778074] loop4: detected capacity change from 0 to 512 [ 1491.788876] loop0: detected capacity change from 0 to 512 [ 1491.802806] EXT4-fs (loop4): VFS: Can't find ext4 filesystem 22:34:44 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff4655fe0f4655fe0f4655f00000000000004", 0x1b, 0x2100}], 0x0, 0x0) [ 1491.808016] EXT4-fs (loop0): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 1491.810098] EXT4-fs (loop0): group descriptors corrupted! 22:34:44 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef", 0x3a}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}], 0x0, &(0x7f0000012c00)) [ 1491.873317] loop6: detected capacity change from 0 to 512 [ 1491.912722] loop3: detected capacity change from 0 to 512 [ 1491.913991] loop1: detected capacity change from 0 to 512 [ 1491.922086] EXT4-fs (loop6): corrupt root inode, run e2fsck [ 1491.923277] EXT4-fs (loop6): mount failed 22:34:44 executing program 7: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}], 0x0, &(0x7f0000012c00)) (fail_nth: 12) 22:34:44 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010100)="00000000080000000000f900b00cb2cc029f49d8b90449a7d5d54d49010000a566", 0x21, 0x4e0}, {0x0, 0x0, 0x800}, {&(0x7f0000011600)="ed41000000080000dff4655fe0f4655fe0f4655f00000000000004", 0x1b, 0x2100}], 0x0, &(0x7f0000012c00)) [ 1491.972921] EXT4-fs (loop3): VFS: Can't find ext4 filesystem [ 1506.111069] FAULT_INJECTION: forcing a failure. [ 1506.111069] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 1506.112190] CPU: 1 PID: 13285 Comm: syz-executor.4 Not tainted 6.0.0-rc3-next-20220829 #1 [ 1506.112814] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS rel-1.14.0-0-g155821a1990b-prebuilt.qemu.org 04/01/2014 [ 1506.113663] Call Trace: [ 1506.113867] [ 1506.114045] dump_stack_lvl+0x8b/0xb3 [ 1506.114345] should_fail.cold+0x5/0xa [ 1506.114638] ? lockdep_hardirqs_on+0x79/0x100 [ 1506.114990] copyin+0x19/0x120 [ 1506.115248] copy_page_from_iter_atomic+0x416/0x16b0 [ 1506.115650] ? ktime_get_coarse_real_ts64+0x159/0x190 [ 1506.116056] ? iov_iter_zero+0x15a0/0x15a0 [ 1506.116394] ? fault_in_subpage_writeable+0x20/0x20 [ 1506.116770] ? ktime_get_coarse_real_ts64+0x159/0x190 [ 1506.117166] ? ktime_get_coarse_real_ts64+0xe0/0x190 [ 1506.117576] ? shmem_write_begin+0xfd/0x1e0 [ 1506.117912] ? shmem_write_begin+0x106/0x1e0 [ 1506.118258] generic_perform_write+0x2bf/0x570 [ 1506.118627] ? generic_file_readonly_mmap+0x1b0/0x1b0 [ 1506.119018] ? new_inode+0x1e0/0x1e0 [ 1506.119300] ? generic_write_checks+0x2bc/0x400 [ 1506.119670] __generic_file_write_iter+0x2da/0x480 [ 1506.120044] generic_file_write_iter+0xe3/0x350 [ 1506.120397] vfs_write+0x9c3/0xd90 [ 1506.120679] ? __ia32_sys_pread64+0x220/0x220 [ 1506.121059] __x64_sys_pwrite64+0x1fb/0x260 [ 1506.121409] ? vfs_write+0xd90/0xd90 [ 1506.121706] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1506.122096] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1506.122490] do_syscall_64+0x3b/0x90 [ 1506.122781] entry_SYSCALL_64_after_hwframe+0x63/0xcd [ 1506.123176] RIP: 0033:0x7f499df53ab7 [ 1506.123461] Code: 08 89 3c 24 48 89 4c 24 18 e8 e5 f8 ff ff 4c 8b 54 24 18 48 8b 54 24 10 41 89 c0 48 8b 74 24 08 8b 3c 24 b8 12 00 00 00 0f 05 <48> 3d 00 f0 ff ff 77 31 44 89 c7 48 89 04 24 e8 15 f9 ff ff 48 8b [ 1506.124798] RSP: 002b:00007f499b515f20 EFLAGS: 00000293 ORIG_RAX: 0000000000000012 [ 1506.125372] RAX: ffffffffffffffda RBX: 00007f499dfea970 RCX: 00007f499df53ab7 [ 1506.125909] RDX: 000000000000003a RSI: 0000000020010000 RDI: 0000000000000004 [ 1506.126435] RBP: 0000000000000002 R08: 0000000000000000 R09: ffffffffffffffff [ 1506.126968] R10: 0000000000000400 R11: 0000000000000293 R12: 0000000000000004 [ 1506.127500] R13: 0000000000000004 R14: 0000000020000200 R15: 0000000000000000 [ 1506.128037] 22:34:58 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff4655fe0f4655fe0f4655f00000000000004", 0x1b, 0x2100}], 0x0, 0x0) 22:34:58 executing program 5: r0 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000040)='/sys/kernel/slab', 0x0, 0x0) getdents(0xffffffffffffffff, &(0x7f0000000080)=""/247, 0xf7) getdents64(r0, &(0x7f0000000240)=""/226, 0x20000258) 22:34:58 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}], 0x0, &(0x7f0000012c00)) (fail_nth: 15) 22:34:58 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010100)="00000000080000000000f900b00cb2cc029f49d8b90449a7d5d54d49010000a566", 0x21, 0x4e0}, {0x0, 0x0, 0x800}, {&(0x7f0000011600)="ed41000000080000dff4655fe0f4655fe0f4655f00000000000004", 0x1b, 0x2100}], 0x0, &(0x7f0000012c00)) 22:34:58 executing program 6: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff4655fe0f4655fe0f4655f00000000000004", 0x1b, 0x2100}], 0x0, &(0x7f0000012c00)) (fail_nth: 12) 22:34:58 executing program 2: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x2, &(0x7f0000000000)=[{0x7c}, {0x6, 0x0, 0x0, 0x7fffffff}]}) openat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x800, 0x10e) r0 = syz_init_net_socket$802154_raw(0x24, 0x3, 0x0) ioctl$sock_inet_SIOCSIFADDR(r0, 0x8916, &(0x7f0000001180)={'bond0\x00', {0x2, 0x0, @local}}) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f0000000080)) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fork() syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x0) 22:34:58 executing program 7: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}], 0x0, &(0x7f0000012c00)) (fail_nth: 13) 22:34:58 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}], 0x0, 0x0) [ 1506.133819] loop7: detected capacity change from 0 to 512 [ 1506.142300] loop1: detected capacity change from 0 to 512 [ 1506.143359] loop0: detected capacity change from 0 to 512 [ 1506.149051] loop3: detected capacity change from 0 to 512 [ 1506.153772] EXT4-fs (loop0): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 1506.154456] EXT4-fs (loop0): group descriptors corrupted! [ 1506.159848] EXT4-fs error (device loop7): __ext4_fill_super:5244: inode #2: comm syz-executor.7: iget: root inode unallocated [ 1506.161890] EXT4-fs (loop7): get root inode failed [ 1506.162295] EXT4-fs (loop7): mount failed 22:34:58 executing program 6: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff4655fe0f4655fe0f4655f00000000000004", 0x1b, 0x2100}], 0x0, &(0x7f0000012c00)) (fail_nth: 13) [ 1506.193174] loop4: detected capacity change from 0 to 512 [ 1506.208068] EXT4-fs error (device loop4): __ext4_fill_super:5244: inode #2: comm syz-executor.4: iget: root inode unallocated [ 1506.214948] EXT4-fs (loop4): get root inode failed [ 1506.215769] EXT4-fs (loop4): mount failed 22:34:58 executing program 5: r0 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000040)='/sys/kernel/slab', 0x0, 0x0) getdents(0xffffffffffffffff, &(0x7f0000000080)=""/247, 0xf7) getdents64(r0, &(0x7f0000000240)=""/226, 0x20000258) 22:34:58 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}], 0x0, 0x0) [ 1506.278239] loop6: detected capacity change from 0 to 512 22:34:58 executing program 7: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}], 0x0, &(0x7f0000012c00)) (fail_nth: 14) 22:34:58 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010100)="00000000080000000000f900b00cb2cc029f49d8b90449a7d5d54d49010000a566", 0x21, 0x4e0}, {&(0x7f0000010400), 0x0, 0x800}, {&(0x7f0000011600)="ed41000000080000dff4655fe0f4655fe0f4655f00000000000004", 0x1b, 0x2100}], 0x0, &(0x7f0000012c00)) 22:34:58 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff4655fe0f4655fe0f4655f00000000000004", 0x1b, 0x2100}], 0x0, 0x0) [ 1506.302644] EXT4-fs (loop6): corrupt root inode, run e2fsck [ 1506.303106] EXT4-fs (loop6): mount failed [ 1506.320348] loop7: detected capacity change from 0 to 512 [ 1506.335660] EXT4-fs (loop7): VFS: Can't find ext4 filesystem 22:34:58 executing program 5: r0 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000040)='/sys/kernel/slab', 0x0, 0x0) getdents(r0, 0x0, 0x0) getdents64(r0, &(0x7f0000000240)=""/226, 0x20000258) 22:34:58 executing program 6: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff4655fe0f4655fe0f4655f00000000000004", 0x1b, 0x2100}], 0x0, &(0x7f0000012c00)) (fail_nth: 14) [ 1506.381157] loop3: detected capacity change from 0 to 512 22:34:58 executing program 7: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}], 0x0, &(0x7f0000012c00)) (fail_nth: 15) 22:34:58 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}], 0x0, &(0x7f0000012c00)) (fail_nth: 16) [ 1506.428224] loop6: detected capacity change from 0 to 512 [ 1506.433070] loop1: detected capacity change from 0 to 512 [ 1506.448239] loop0: detected capacity change from 0 to 512 [ 1506.448358] EXT4-fs (loop6): VFS: Can't find ext4 filesystem 22:34:58 executing program 5: r0 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000040)='/sys/kernel/slab', 0x0, 0x0) getdents(r0, 0x0, 0x0) getdents64(r0, &(0x7f0000000240)=""/226, 0x20000258) [ 1506.455137] FAULT_INJECTION: forcing a failure. [ 1506.455137] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 1506.456057] CPU: 1 PID: 13317 Comm: syz-executor.7 Not tainted 6.0.0-rc3-next-20220829 #1 [ 1506.456696] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS rel-1.14.0-0-g155821a1990b-prebuilt.qemu.org 04/01/2014 [ 1506.457563] Call Trace: [ 1506.457761] [ 1506.457941] dump_stack_lvl+0x8b/0xb3 [ 1506.458247] should_fail.cold+0x5/0xa [ 1506.458545] ? lockdep_hardirqs_on+0x79/0x100 [ 1506.458905] copyin+0x19/0x120 [ 1506.459171] copy_page_from_iter_atomic+0x416/0x16b0 [ 1506.459566] ? ktime_get_coarse_real_ts64+0x159/0x190 [ 1506.459969] ? iov_iter_zero+0x15a0/0x15a0 [ 1506.460306] ? fault_in_subpage_writeable+0x20/0x20 [ 1506.460697] ? ktime_get_coarse_real_ts64+0x159/0x190 [ 1506.461087] ? ktime_get_coarse_real_ts64+0xe0/0x190 [ 1506.461499] ? shmem_write_begin+0xfd/0x1e0 [ 1506.461840] ? shmem_write_begin+0x106/0x1e0 [ 1506.462200] generic_perform_write+0x2bf/0x570 [ 1506.462578] ? generic_file_readonly_mmap+0x1b0/0x1b0 [ 1506.462990] ? new_inode+0x1e0/0x1e0 [ 1506.463284] ? generic_write_checks+0x2bc/0x400 [ 1506.463675] __generic_file_write_iter+0x2da/0x480 [ 1506.464065] generic_file_write_iter+0xe3/0x350 [ 1506.464451] vfs_write+0x9c3/0xd90 [ 1506.464737] ? __ia32_sys_pread64+0x220/0x220 [ 1506.465114] __x64_sys_pwrite64+0x1fb/0x260 [ 1506.465472] ? vfs_write+0xd90/0xd90 [ 1506.465767] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1506.466171] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1506.466583] do_syscall_64+0x3b/0x90 [ 1506.466877] entry_SYSCALL_64_after_hwframe+0x63/0xcd [ 1506.467270] RIP: 0033:0x7fb036d27ab7 [ 1506.467558] Code: 08 89 3c 24 48 89 4c 24 18 e8 e5 f8 ff ff 4c 8b 54 24 18 48 8b 54 24 10 41 89 c0 48 8b 74 24 08 8b 3c 24 b8 12 00 00 00 0f 05 <48> 3d 00 f0 ff ff 77 31 44 89 c7 48 89 04 24 e8 15 f9 ff ff 48 8b [ 1506.468901] RSP: 002b:00007fb0342e9f20 EFLAGS: 00000293 ORIG_RAX: 0000000000000012 [ 1506.469501] RAX: ffffffffffffffda RBX: 00007fb036dbe970 RCX: 00007fb036d27ab7 [ 1506.470041] RDX: 000000000000003a RSI: 0000000020010000 RDI: 0000000000000004 [ 1506.470573] RBP: 0000000000000002 R08: 0000000000000000 R09: ffffffffffffffff [ 1506.471118] R10: 0000000000000400 R11: 0000000000000293 R12: 0000000000000004 [ 1506.471654] R13: 0000000000000004 R14: 0000000020000200 R15: 0000000000000000 [ 1506.472213] 22:34:58 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}], 0x0, 0x0) [ 1506.518197] EXT4-fs (loop0): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 1506.519634] EXT4-fs (loop0): group descriptors corrupted! 22:34:58 executing program 6: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff4655fe0f4655fe0f4655f00000000000004", 0x1b, 0x2100}], 0x0, &(0x7f0000012c00)) (fail_nth: 15) [ 1506.544199] loop7: detected capacity change from 0 to 512 [ 1506.551968] FAULT_INJECTION: forcing a failure. [ 1506.551968] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 1506.553783] CPU: 0 PID: 13324 Comm: syz-executor.4 Not tainted 6.0.0-rc3-next-20220829 #1 [ 1506.554976] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS rel-1.14.0-0-g155821a1990b-prebuilt.qemu.org 04/01/2014 [ 1506.556579] Call Trace: [ 1506.556956] [ 1506.557299] dump_stack_lvl+0x8b/0xb3 [ 1506.557895] should_fail.cold+0x5/0xa [ 1506.558466] copyin+0x19/0x120 [ 1506.558964] copy_page_from_iter_atomic+0x416/0x16b0 [ 1506.559735] ? ktime_get_coarse_real_ts64+0x159/0x190 [ 1506.560503] ? iov_iter_zero+0x15a0/0x15a0 [ 1506.561142] ? fault_in_subpage_writeable+0x20/0x20 [ 1506.561901] ? ktime_get_coarse_real_ts64+0x159/0x190 [ 1506.562671] ? ktime_get_coarse_real_ts64+0xc2/0x190 [ 1506.563493] ? shmem_write_begin+0xfd/0x1e0 [ 1506.564212] ? shmem_write_begin+0x106/0x1e0 [ 1506.564958] generic_perform_write+0x2bf/0x570 [ 1506.565741] ? generic_file_readonly_mmap+0x1b0/0x1b0 [ 1506.566578] ? new_inode+0x1e0/0x1e0 [ 1506.567192] ? generic_write_checks+0x2bc/0x400 [ 1506.567967] __generic_file_write_iter+0x2da/0x480 [ 1506.568776] generic_file_write_iter+0xe3/0x350 [ 1506.569561] vfs_write+0x9c3/0xd90 [ 1506.570152] ? __ia32_sys_pread64+0x220/0x220 [ 1506.570920] __x64_sys_pwrite64+0x1fb/0x260 [ 1506.571626] ? vfs_write+0xd90/0xd90 [ 1506.572235] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1506.573077] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1506.573934] do_syscall_64+0x3b/0x90 [ 1506.574531] entry_SYSCALL_64_after_hwframe+0x63/0xcd [ 1506.575366] RIP: 0033:0x7f499df53ab7 [ 1506.575876] FAULT_INJECTION: forcing a failure. [ 1506.575876] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 1506.575961] Code: 08 89 3c 24 48 89 4c 24 18 e8 e5 f8 ff ff 4c 8b 54 24 18 48 8b 54 24 10 41 89 c0 48 8b 74 24 08 8b 3c 24 b8 12 00 00 00 0f 05 <48> 3d 00 f0 ff ff 77 31 44 89 c7 48 89 04 24 e8 15 f9 ff ff 48 8b [ 1506.579598] RSP: 002b:00007f499b515f20 EFLAGS: 00000293 ORIG_RAX: 0000000000000012 [ 1506.580778] RAX: ffffffffffffffda RBX: 00007f499dfea970 RCX: 00007f499df53ab7 [ 1506.581895] RDX: 0000000000000009 RSI: 0000000020010400 RDI: 0000000000000004 [ 1506.582974] RBP: 0000000000000002 R08: 0000000000000000 R09: ffffffffffffffff [ 1506.584065] R10: 0000000000000800 R11: 0000000000000293 R12: 0000000000000004 [ 1506.585162] R13: 0000000000000004 R14: 0000000020000218 R15: 0000000000000001 [ 1506.586288] [ 1506.586671] CPU: 1 PID: 13327 Comm: syz-executor.6 Not tainted 6.0.0-rc3-next-20220829 #1 [ 1506.587311] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS rel-1.14.0-0-g155821a1990b-prebuilt.qemu.org 04/01/2014 [ 1506.588170] Call Trace: [ 1506.588371] [ 1506.588552] dump_stack_lvl+0x8b/0xb3 [ 1506.588860] should_fail.cold+0x5/0xa [ 1506.589155] ? lockdep_hardirqs_on+0x79/0x100 [ 1506.589534] copyin+0x19/0x120 [ 1506.589798] copy_page_from_iter_atomic+0x416/0x16b0 [ 1506.590212] ? ktime_get_coarse_real_ts64+0x159/0x190 [ 1506.590614] ? iov_iter_zero+0x15a0/0x15a0 [ 1506.590946] ? fault_in_subpage_writeable+0x20/0x20 [ 1506.591345] ? ktime_get_coarse_real_ts64+0x159/0x190 [ 1506.591750] ? ktime_get_coarse_real_ts64+0xe0/0x190 [ 1506.592150] ? shmem_write_begin+0xfd/0x1e0 [ 1506.592492] ? shmem_write_begin+0x106/0x1e0 [ 1506.592850] generic_perform_write+0x2bf/0x570 [ 1506.593222] ? generic_file_readonly_mmap+0x1b0/0x1b0 [ 1506.593636] ? new_inode+0x1e0/0x1e0 [ 1506.593929] ? generic_write_checks+0x2bc/0x400 [ 1506.594306] __generic_file_write_iter+0x2da/0x480 [ 1506.594693] generic_file_write_iter+0xe3/0x350 [ 1506.595065] vfs_write+0x9c3/0xd90 [ 1506.595355] ? __ia32_sys_pread64+0x220/0x220 [ 1506.595729] __x64_sys_pwrite64+0x1fb/0x260 [ 1506.596070] ? vfs_write+0xd90/0xd90 [ 1506.596367] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1506.596778] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1506.597191] do_syscall_64+0x3b/0x90 [ 1506.597486] entry_SYSCALL_64_after_hwframe+0x63/0xcd [ 1506.597895] RIP: 0033:0x7f0e406b1ab7 [ 1506.598177] Code: 08 89 3c 24 48 89 4c 24 18 e8 e5 f8 ff ff 4c 8b 54 24 18 48 8b 54 24 10 41 89 c0 48 8b 74 24 08 8b 3c 24 b8 12 00 00 00 0f 05 <48> 3d 00 f0 ff ff 77 31 44 89 c7 48 89 04 24 e8 15 f9 ff ff 48 8b [ 1506.599490] RSP: 002b:00007f0e3dc73f20 EFLAGS: 00000293 ORIG_RAX: 0000000000000012 [ 1506.600061] RAX: ffffffffffffffda RBX: 00007f0e40748970 RCX: 00007f0e406b1ab7 [ 1506.600597] RDX: 000000000000005a RSI: 0000000020010000 RDI: 0000000000000004 [ 1506.601135] RBP: 0000000000000003 R08: 0000000000000000 R09: ffffffffffffffff [ 1506.601689] R10: 0000000000000400 R11: 0000000000000293 R12: 0000000000000004 [ 1506.602235] R13: 0000000000000004 R14: 0000000020000200 R15: 0000000000000000 [ 1506.602786] [ 1506.615171] EXT4-fs error (device loop7): __ext4_fill_super:5244: inode #2: comm syz-executor.7: iget: root inode unallocated [ 1506.616528] EXT4-fs (loop7): get root inode failed [ 1506.617159] EXT4-fs (loop7): mount failed [ 1506.663994] loop6: detected capacity change from 0 to 512 [ 1506.670308] loop3: detected capacity change from 0 to 512 [ 1506.684225] EXT4-fs (loop6): corrupt root inode, run e2fsck [ 1506.684767] EXT4-fs (loop6): mount failed [ 1506.718991] loop4: detected capacity change from 0 to 512 [ 1506.742297] EXT4-fs error (device loop4): __ext4_fill_super:5244: inode #2: comm syz-executor.4: iget: root inode unallocated [ 1506.744461] EXT4-fs (loop4): get root inode failed [ 1506.745371] EXT4-fs (loop4): mount failed 22:35:11 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}], 0x0, 0x0) 22:35:11 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010100)="00000000080000000000f900b00cb2cc029f49d8b90449a7d5d54d49010000a566", 0x21, 0x4e0}, {&(0x7f0000010400), 0x0, 0x800}, {&(0x7f0000011600)="ed41000000080000dff4655fe0f4655fe0f4655f00000000000004", 0x1b, 0x2100}], 0x0, &(0x7f0000012c00)) 22:35:11 executing program 5: r0 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000040)='/sys/kernel/slab', 0x0, 0x0) getdents(r0, 0x0, 0x0) getdents64(r0, &(0x7f0000000240)=""/226, 0x20000258) 22:35:11 executing program 2: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x2, &(0x7f0000000000)=[{0x7c}, {0x6, 0x0, 0x0, 0x7fffffff}]}) openat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x800, 0x10e) r0 = syz_init_net_socket$802154_raw(0x24, 0x3, 0x0) ioctl$sock_inet_SIOCSIFADDR(r0, 0x8916, &(0x7f0000001180)={'bond0\x00', {0x2, 0x0, @local}}) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f0000000080)) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fork() syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x0) 22:35:11 executing program 7: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}], 0x0, &(0x7f0000012c00)) (fail_nth: 16) [ 1519.469850] loop0: detected capacity change from 0 to 512 22:35:11 executing program 6: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff4655fe0f4655fe0f4655f00000000000004", 0x1b, 0x2100}], 0x0, &(0x7f0000012c00)) (fail_nth: 16) 22:35:11 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}], 0x0, &(0x7f0000012c00)) (fail_nth: 17) 22:35:11 executing program 3: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x2, &(0x7f0000000000)=[{0x7c}, {0x6, 0x0, 0x0, 0x7fffffff}]}) openat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x800, 0x10e) r0 = syz_init_net_socket$802154_raw(0x24, 0x3, 0x0) ioctl$sock_inet_SIOCSIFADDR(r0, 0x8916, &(0x7f0000001180)={'bond0\x00', {0x2, 0x0, @local}}) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f0000000080)) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fork() syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x0) [ 1519.489753] FAULT_INJECTION: forcing a failure. [ 1519.489753] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 1519.490663] CPU: 1 PID: 13349 Comm: syz-executor.7 Not tainted 6.0.0-rc3-next-20220829 #1 [ 1519.491206] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS rel-1.14.0-0-g155821a1990b-prebuilt.qemu.org 04/01/2014 [ 1519.491953] Call Trace: [ 1519.492134] [ 1519.492295] dump_stack_lvl+0x8b/0xb3 [ 1519.492568] should_fail.cold+0x5/0xa [ 1519.492836] copyin+0x19/0x120 [ 1519.493074] copy_page_from_iter_atomic+0x416/0x16b0 [ 1519.493434] ? ktime_get_coarse_real_ts64+0x159/0x190 [ 1519.493800] ? iov_iter_zero+0x15a0/0x15a0 [ 1519.494097] ? fault_in_subpage_writeable+0x20/0x20 [ 1519.494442] ? ktime_get_coarse_real_ts64+0x159/0x190 [ 1519.494795] ? ktime_get_coarse_real_ts64+0xc2/0x190 [ 1519.495145] ? shmem_write_begin+0xfd/0x1e0 [ 1519.495444] ? shmem_write_begin+0x106/0x1e0 [ 1519.495755] generic_perform_write+0x2bf/0x570 [ 1519.496135] ? generic_file_readonly_mmap+0x1b0/0x1b0 [ 1519.496499] ? new_inode+0x1e0/0x1e0 [ 1519.496761] ? generic_write_checks+0x2bc/0x400 [ 1519.497097] __generic_file_write_iter+0x2da/0x480 [ 1519.497437] generic_file_write_iter+0xe3/0x350 [ 1519.497776] vfs_write+0x9c3/0xd90 [ 1519.498033] ? __ia32_sys_pread64+0x220/0x220 [ 1519.498369] __x64_sys_pwrite64+0x1fb/0x260 [ 1519.498677] ? vfs_write+0xd90/0xd90 [ 1519.498944] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1519.499354] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1519.499773] do_syscall_64+0x3b/0x90 [ 1519.500039] entry_SYSCALL_64_after_hwframe+0x63/0xcd [ 1519.500395] RIP: 0033:0x7fb036d27ab7 [ 1519.500654] Code: 08 89 3c 24 48 89 4c 24 18 e8 e5 f8 ff ff 4c 8b 54 24 18 48 8b 54 24 10 41 89 c0 48 8b 74 24 08 8b 3c 24 b8 12 00 00 00 0f 05 <48> 3d 00 f0 ff ff 77 31 44 89 c7 48 89 04 24 e8 15 f9 ff ff 48 8b [ 1519.501855] RSP: 002b:00007fb0342e9f20 EFLAGS: 00000293 ORIG_RAX: 0000000000000012 [ 1519.502361] RAX: ffffffffffffffda RBX: 00007fb036dbe970 RCX: 00007fb036d27ab7 [ 1519.502839] RDX: 0000000000000009 RSI: 0000000020010400 RDI: 0000000000000004 [ 1519.503317] RBP: 0000000000000002 R08: 0000000000000000 R09: ffffffffffffffff [ 1519.503792] R10: 0000000000000800 R11: 0000000000000293 R12: 0000000000000004 [ 1519.504268] R13: 0000000000000004 R14: 0000000020000218 R15: 0000000000000001 [ 1519.504769] [ 1519.523234] FAULT_INJECTION: forcing a failure. [ 1519.523234] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 1519.525347] CPU: 0 PID: 13351 Comm: syz-executor.6 Not tainted 6.0.0-rc3-next-20220829 #1 [ 1519.526254] loop7: detected capacity change from 0 to 512 [ 1519.526472] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS rel-1.14.0-0-g155821a1990b-prebuilt.qemu.org 04/01/2014 [ 1519.528288] Call Trace: [ 1519.528641] 22:35:11 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}], 0x0, &(0x7f0000012c00)) (fail_nth: 18) [ 1519.528951] dump_stack_lvl+0x8b/0xb3 [ 1519.529566] should_fail.cold+0x5/0xa [ 1519.530095] copyin+0x19/0x120 [ 1519.530562] copy_page_from_iter_atomic+0x416/0x16b0 [ 1519.531330] ? ktime_get_coarse_real_ts64+0x159/0x190 [ 1519.532087] ? iov_iter_zero+0x15a0/0x15a0 [ 1519.532730] ? fault_in_subpage_writeable+0x20/0x20 [ 1519.533484] ? ktime_get_coarse_real_ts64+0x159/0x190 [ 1519.534264] ? ktime_get_coarse_real_ts64+0xc2/0x190 [ 1519.535014] ? shmem_write_begin+0xfd/0x1e0 [ 1519.535673] ? shmem_write_begin+0x106/0x1e0 [ 1519.536345] generic_perform_write+0x2bf/0x570 [ 1519.537053] ? generic_file_readonly_mmap+0x1b0/0x1b0 [ 1519.537823] ? new_inode+0x1e0/0x1e0 [ 1519.538380] ? generic_write_checks+0x2bc/0x400 [ 1519.539112] __generic_file_write_iter+0x2da/0x480 [ 1519.539819] generic_file_write_iter+0xe3/0x350 [ 1519.540523] vfs_write+0x9c3/0xd90 [ 1519.541085] ? __ia32_sys_pread64+0x220/0x220 [ 1519.541809] __x64_sys_pwrite64+0x1fb/0x260 [ 1519.542442] ? vfs_write+0xd90/0xd90 [ 1519.543016] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1519.543792] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1519.544562] do_syscall_64+0x3b/0x90 [ 1519.545120] entry_SYSCALL_64_after_hwframe+0x63/0xcd [ 1519.545900] RIP: 0033:0x7f0e406b1ab7 [ 1519.546457] Code: 08 89 3c 24 48 89 4c 24 18 e8 e5 f8 ff ff 4c 8b 54 24 18 48 8b 54 24 10 41 89 c0 48 8b 74 24 08 8b 3c 24 b8 12 00 00 00 0f 05 <48> 3d 00 f0 ff ff 77 31 44 89 c7 48 89 04 24 e8 15 f9 ff ff 48 8b [ 1519.549090] RSP: 002b:00007f0e3dc73f20 EFLAGS: 00000293 ORIG_RAX: 0000000000000012 [ 1519.550199] RAX: ffffffffffffffda RBX: 00007f0e40748970 RCX: 00007f0e406b1ab7 [ 1519.551240] RDX: 0000000000000009 RSI: 0000000020010400 RDI: 0000000000000004 [ 1519.552270] RBP: 0000000000000003 R08: 0000000000000000 R09: ffffffffffffffff [ 1519.553309] R10: 0000000000000800 R11: 0000000000000293 R12: 0000000000000004 [ 1519.554333] R13: 0000000000000004 R14: 0000000020000218 R15: 0000000000000001 [ 1519.555394] [ 1519.564652] EXT4-fs (loop0): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 1519.565982] EXT4-fs (loop0): group descriptors corrupted! [ 1519.584297] loop1: detected capacity change from 0 to 512 [ 1519.585188] loop4: detected capacity change from 0 to 512 [ 1519.597843] EXT4-fs error (device loop4): __ext4_fill_super:5244: inode #2: comm syz-executor.4: iget: root inode unallocated [ 1519.600054] EXT4-fs (loop4): get root inode failed [ 1519.600399] EXT4-fs (loop4): mount failed [ 1519.632084] EXT4-fs error (device loop7): __ext4_fill_super:5244: inode #2: comm syz-executor.7: iget: root inode unallocated [ 1519.634068] EXT4-fs (loop7): get root inode failed [ 1519.634413] EXT4-fs (loop7): mount failed [ 1519.636999] loop6: detected capacity change from 0 to 512 [ 1519.652344] EXT4-fs (loop6): corrupt root inode, run e2fsck [ 1519.652793] EXT4-fs (loop6): mount failed 22:35:12 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}], 0x0, &(0x7f0000012c00)) (fail_nth: 19) 22:35:12 executing program 5: r0 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000040)='/sys/kernel/slab', 0x0, 0x0) getdents(r0, &(0x7f0000000080)=""/247, 0xf7) getdents64(0xffffffffffffffff, &(0x7f0000000240)=""/226, 0x20000258) 22:35:12 executing program 6: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff4655fe0f4655fe0f4655f00000000000004", 0x1b, 0x2100}], 0x0, &(0x7f0000012c00)) (fail_nth: 17) [ 1519.763061] FAULT_INJECTION: forcing a failure. [ 1519.763061] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 1519.764062] CPU: 0 PID: 13373 Comm: syz-executor.4 Not tainted 6.0.0-rc3-next-20220829 #1 22:35:12 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010100)="00000000080000000000f900b00cb2cc029f49d8b90449a7d5d54d49010000a566", 0x21, 0x4e0}, {&(0x7f0000010400), 0x0, 0x800}, {&(0x7f0000011600)="ed41000000080000dff4655fe0f4655fe0f4655f00000000000004", 0x1b, 0x2100}], 0x0, &(0x7f0000012c00)) 22:35:12 executing program 7: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}], 0x0, &(0x7f0000012c00)) (fail_nth: 17) [ 1519.764703] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS rel-1.14.0-0-g155821a1990b-prebuilt.qemu.org 04/01/2014 [ 1519.765753] Call Trace: [ 1519.765972] [ 1519.766170] dump_stack_lvl+0x8b/0xb3 [ 1519.766508] should_fail.cold+0x5/0xa [ 1519.766830] strncpy_from_user+0x34/0x3e0 [ 1519.767181] getname_flags.part.0+0x95/0x4f0 [ 1519.767561] ? vfs_write+0x48e/0xd90 [ 1519.767881] getname+0x8e/0xd0 [ 1519.768163] do_sys_openat2+0xf9/0x4c0 [ 1519.768493] ? build_open_flags+0x6f0/0x6f0 [ 1519.768858] __x64_sys_openat+0x13f/0x1f0 [ 1519.769196] ? __ia32_compat_sys_open+0x1c0/0x1c0 [ 1519.769596] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1519.770028] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1519.770460] do_syscall_64+0x3b/0x90 [ 1519.770774] entry_SYSCALL_64_after_hwframe+0x63/0xcd [ 1519.771208] RIP: 0033:0x7f499df53a04 [ 1519.771519] Code: 84 00 00 00 00 00 44 89 54 24 0c e8 96 f9 ff ff 44 8b 54 24 0c 44 89 e2 48 89 ee 41 89 c0 bf 9c ff ff ff b8 01 01 00 00 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 89 44 24 0c e8 c8 f9 ff ff 8b 44 [ 1519.772985] RSP: 002b:00007f499b515ed0 EFLAGS: 00000293 ORIG_RAX: 0000000000000101 [ 1519.773606] RAX: ffffffffffffffda RBX: 00007f499dfea970 RCX: 00007f499df53a04 [ 1519.774161] RDX: 0000000000000002 RSI: 00007f499b516000 RDI: 00000000ffffff9c [ 1519.774729] RBP: 00007f499b516000 R08: 0000000000000000 R09: ffffffffffffffff [ 1519.775293] R10: 0000000000000000 R11: 0000000000000293 R12: 0000000000000002 [ 1519.775844] R13: 0000000000000004 R14: 0000000020000230 R15: 0000000000000002 [ 1519.776414] 22:35:12 executing program 1: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x2, &(0x7f0000000000)=[{0x7c}, {0x6, 0x0, 0x0, 0x7fffffff}]}) openat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x800, 0x10e) r0 = syz_init_net_socket$802154_raw(0x24, 0x3, 0x0) ioctl$sock_inet_SIOCSIFADDR(r0, 0x8916, &(0x7f0000001180)={'bond0\x00', {0x2, 0x0, @local}}) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f0000000080)) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fork() syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x0) [ 1519.807864] loop6: detected capacity change from 0 to 512 [ 1519.832492] loop0: detected capacity change from 0 to 512 [ 1519.838554] EXT4-fs error (device loop6): __ext4_fill_super:5244: inode #2: comm syz-executor.6: iget: root inode unallocated [ 1519.842846] EXT4-fs (loop6): get root inode failed [ 1519.843272] EXT4-fs (loop6): mount failed [ 1519.852852] EXT4-fs (loop0): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 1519.853485] EXT4-fs (loop0): group descriptors corrupted! 22:35:12 executing program 5: r0 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000040)='/sys/kernel/slab', 0x0, 0x0) getdents(r0, &(0x7f0000000080)=""/247, 0xf7) getdents64(0xffffffffffffffff, &(0x7f0000000240)=""/226, 0x20000258) 22:35:12 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010100)="00000000080000000000f900b00cb2cc029f49d8b90449a7d5d54d49010000a566", 0x21, 0x4e0}, {&(0x7f0000010400)="0200000003", 0x5, 0x800}, {&(0x7f0000011600)="ed41000000080000dff4655fe0f4655fe0f4655f00000000000004", 0x1b, 0x2100}], 0x0, &(0x7f0000012c00)) 22:35:12 executing program 7: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}], 0x0, &(0x7f0000012c00)) (fail_nth: 18) 22:35:12 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}], 0x0, &(0x7f0000012c00)) (fail_nth: 20) [ 1519.994066] loop7: detected capacity change from 0 to 512 [ 1520.008810] EXT4-fs error (device loop7): __ext4_fill_super:5244: inode #2: comm syz-executor.7: iget: root inode unallocated [ 1520.010066] EXT4-fs (loop7): get root inode failed [ 1520.010424] EXT4-fs (loop7): mount failed 22:35:25 executing program 6: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff4655fe0f4655fe0f4655f00000000000004", 0x1b, 0x2100}], 0x0, &(0x7f0000012c00)) (fail_nth: 18) 22:35:25 executing program 1: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x2, &(0x7f0000000000)=[{0x7c}, {0x6, 0x0, 0x0, 0x7fffffff}]}) openat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x800, 0x10e) r0 = syz_init_net_socket$802154_raw(0x24, 0x3, 0x0) ioctl$sock_inet_SIOCSIFADDR(r0, 0x8916, &(0x7f0000001180)={'bond0\x00', {0x2, 0x0, @local}}) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f0000000080)) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fork() syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x0) 22:35:25 executing program 2: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x2, &(0x7f0000000000)=[{0x7c}, {0x6, 0x0, 0x0, 0x7fffffff}]}) openat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x800, 0x10e) r0 = syz_init_net_socket$802154_raw(0x24, 0x3, 0x0) ioctl$sock_inet_SIOCSIFADDR(r0, 0x8916, &(0x7f0000001180)={'bond0\x00', {0x2, 0x0, @local}}) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f0000000080)) r1 = fork() perf_event_open(&(0x7f0000001280)={0x0, 0x80, 0x5, 0x0, 0x1, 0x4, 0x0, 0xe41, 0x84000, 0x8, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x9, 0x0, @perf_config_ext={0x8000, 0x100}, 0x8000, 0xffffffff, 0x2476f094, 0x0, 0x7, 0x8001, 0xffff, 0x0, 0x1, 0x0, 0x10000}, r1, 0xb, 0xffffffffffffffff, 0x2) syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x0) 22:35:25 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}], 0x0, &(0x7f0000012c00)) (fail_nth: 21) 22:35:25 executing program 5: r0 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000040)='/sys/kernel/slab', 0x0, 0x0) getdents(r0, &(0x7f0000000080)=""/247, 0xf7) getdents64(0xffffffffffffffff, &(0x7f0000000240)=""/226, 0x20000258) [ 1533.129930] loop4: detected capacity change from 0 to 512 [ 1533.129975] loop6: detected capacity change from 0 to 512 22:35:25 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010100)="00000000080000000000f900b00cb2cc029f49d8b90449a7d5d54d49010000a566", 0x21, 0x4e0}, {&(0x7f0000010400)="0200000003", 0x5, 0x800}, {&(0x7f0000011600)="ed41000000080000dff4655fe0f4655fe0f4655f00000000000004", 0x1b, 0x2100}], 0x0, &(0x7f0000012c00)) 22:35:25 executing program 7: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}], 0x0, &(0x7f0000012c00)) (fail_nth: 19) 22:35:25 executing program 3: r0 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000040)='/sys/kernel/slab', 0x0, 0x0) getdents(r0, &(0x7f0000000080)=""/247, 0xf7) getdents64(0xffffffffffffffff, &(0x7f0000000240)=""/226, 0x20000258) [ 1533.147069] loop0: detected capacity change from 0 to 512 [ 1533.154254] EXT4-fs error (device loop4): __ext4_fill_super:5244: inode #2: comm syz-executor.4: iget: root inode unallocated [ 1533.155546] EXT4-fs (loop4): get root inode failed [ 1533.156065] EXT4-fs (loop4): mount failed [ 1533.160442] FAULT_INJECTION: forcing a failure. [ 1533.160442] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 1533.162130] CPU: 0 PID: 13424 Comm: syz-executor.7 Not tainted 6.0.0-rc3-next-20220829 #1 [ 1533.163312] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS rel-1.14.0-0-g155821a1990b-prebuilt.qemu.org 04/01/2014 [ 1533.164891] Call Trace: [ 1533.165269] [ 1533.165607] dump_stack_lvl+0x8b/0xb3 [ 1533.166187] should_fail.cold+0x5/0xa [ 1533.166752] strncpy_from_user+0x34/0x3e0 [ 1533.167439] getname_flags.part.0+0x95/0x4f0 [ 1533.168334] ? vfs_write+0x48e/0xd90 [ 1533.168655] EXT4-fs (loop0): ext4_check_descriptors: Inode table for group 0 overlaps superblock [ 1533.169088] getname+0x8e/0xd0 [ 1533.169788] EXT4-fs (loop0): group descriptors corrupted! [ 1533.170259] do_sys_openat2+0xf9/0x4c0 [ 1533.171351] ? build_open_flags+0x6f0/0x6f0 [ 1533.172029] __x64_sys_openat+0x13f/0x1f0 [ 1533.172656] ? __ia32_compat_sys_open+0x1c0/0x1c0 [ 1533.173451] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1533.174280] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1533.175038] do_syscall_64+0x3b/0x90 [ 1533.175638] entry_SYSCALL_64_after_hwframe+0x63/0xcd [ 1533.176398] RIP: 0033:0x7fb036d27a04 [ 1533.176928] Code: 84 00 00 00 00 00 44 89 54 24 0c e8 96 f9 ff ff 44 8b 54 24 0c 44 89 e2 48 89 ee 41 89 c0 bf 9c ff ff ff b8 01 01 00 00 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 89 44 24 0c e8 c8 f9 ff ff 8b 44 [ 1533.179532] RSP: 002b:00007fb0342e9ed0 EFLAGS: 00000293 ORIG_RAX: 0000000000000101 [ 1533.180641] RAX: ffffffffffffffda RBX: 00007fb036dbe970 RCX: 00007fb036d27a04 [ 1533.181657] RDX: 0000000000000002 RSI: 00007fb0342ea000 RDI: 00000000ffffff9c [ 1533.182722] RBP: 00007fb0342ea000 R08: 0000000000000000 R09: ffffffffffffffff [ 1533.183766] R10: 0000000000000000 R11: 0000000000000293 R12: 0000000000000002 [ 1533.184807] R13: 0000000000000004 R14: 0000000020000230 R15: 0000000000000002 [ 1533.185871] [ 1533.190007] EXT4-fs (loop6): corrupt root inode, run e2fsck [ 1533.190444] EXT4-fs (loop6): mount failed 22:35:38 executing program 5: r0 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000040)='/sys/kernel/slab', 0x0, 0x0) getdents(r0, &(0x7f0000000080)=""/247, 0xf7) getdents64(r0, 0x0, 0x0) 22:35:38 executing program 1: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x2, &(0x7f0000000000)=[{0x7c}, {0x6, 0x0, 0x0, 0x7fffffff}]}) openat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x800, 0x10e) r0 = syz_init_net_socket$802154_raw(0x24, 0x3, 0x0) ioctl$sock_inet_SIOCSIFADDR(r0, 0x8916, &(0x7f0000001180)={'bond0\x00', {0x2, 0x0, @local}}) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f0000000080)) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = fork() perf_event_open(&(0x7f0000001280)={0x0, 0x80, 0x5, 0x0, 0x1, 0x4, 0x0, 0xe41, 0x84000, 0x8, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x9, 0x0, @perf_config_ext={0x8000, 0x100}, 0x8000, 0xffffffff, 0x2476f094, 0x0, 0x7, 0x8001, 0xffff, 0x0, 0x1, 0x0, 0x10000}, r1, 0xb, 0xffffffffffffffff, 0x2) [ 1546.332378] loop0: detected capacity change from 0 to 512 22:35:38 executing program 2: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x2, &(0x7f0000000000)=[{0x7c}, {0x6, 0x0, 0x0, 0x7fffffff}]}) openat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x800, 0x10e) r0 = syz_init_net_socket$802154_raw(0x24, 0x3, 0x0) ioctl$sock_inet_SIOCSIFADDR(r0, 0x8916, &(0x7f0000001180)={'bond0\x00', {0x2, 0x0, @local}}) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f0000000080)) r1 = fork() perf_event_open(&(0x7f0000001280)={0x0, 0x80, 0x5, 0x0, 0x1, 0x4, 0x0, 0xe41, 0x84000, 0x8, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x9, 0x0, @perf_config_ext={0x8000, 0x100}, 0x8000, 0xffffffff, 0x2476f094, 0x0, 0x7, 0x8001, 0xffff, 0x0, 0x1, 0x0, 0x10000}, r1, 0xb, 0xffffffffffffffff, 0x2) syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x0) 22:35:38 executing program 6: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff4655fe0f4655fe0f4655f00000000000004", 0x1b, 0x2100}], 0x0, &(0x7f0000012c00)) (fail_nth: 19) 22:35:38 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}], 0x0, &(0x7f0000012c00)) (fail_nth: 22) 22:35:38 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010100)="00000000080000000000f900b00cb2cc029f49d8b90449a7d5d54d49010000a566", 0x21, 0x4e0}, {&(0x7f0000010400)="0200000003", 0x5, 0x800}, {&(0x7f0000011600)="ed41000000080000dff4655fe0f4655fe0f4655f00000000000004", 0x1b, 0x2100}], 0x0, &(0x7f0000012c00)) 22:35:38 executing program 3: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x2, &(0x7f0000000000)=[{0x7c}, {0x6, 0x0, 0x0, 0x7fffffff}]}) openat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x800, 0x10e) r0 = syz_init_net_socket$802154_raw(0x24, 0x3, 0x0) ioctl$sock_inet_SIOCSIFADDR(r0, 0x8916, &(0x7f0000001180)={'bond0\x00', {0x2, 0x0, @local}}) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f0000000080)) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = fork() perf_event_open(&(0x7f0000001280)={0x0, 0x80, 0x5, 0x0, 0x1, 0x4, 0x0, 0xe41, 0x84000, 0x8, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x9, 0x0, @perf_config_ext={0x8000, 0x100}, 0x8000, 0xffffffff, 0x2476f094, 0x0, 0x7, 0x8001, 0xffff, 0x0, 0x1, 0x0, 0x10000}, r1, 0xb, 0xffffffffffffffff, 0x2) 22:35:38 executing program 7: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}], 0x0, &(0x7f0000012c00)) (fail_nth: 20) [ 1546.341980] loop6: detected capacity change from 0 to 512 [ 1546.345547] EXT4-fs (loop0): ext4_check_descriptors: Inode table for group 0 overlaps superblock [ 1546.346290] EXT4-fs (loop0): group descriptors corrupted! [ 1546.355663] EXT4-fs (loop6): corrupt root inode, run e2fsck [ 1546.356126] EXT4-fs (loop6): mount failed 22:35:38 executing program 5: r0 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000040)='/sys/kernel/slab', 0x0, 0x0) getdents(r0, &(0x7f0000000080)=""/247, 0xf7) getdents64(r0, 0x0, 0x0) 22:35:38 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010100)="00000000080000000000f900b00cb2cc029f49d8b90449a7d5d54d49010000a566", 0x21, 0x4e0}, {&(0x7f0000010400)="02000000030000", 0x7, 0x800}, {&(0x7f0000011600)="ed41000000080000dff4655fe0f4655fe0f4655f00000000000004", 0x1b, 0x2100}], 0x0, &(0x7f0000012c00)) 22:35:38 executing program 6: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff4655fe0f4655fe0f4655f00000000000004", 0x1b, 0x2100}], 0x0, &(0x7f0000012c00)) (fail_nth: 20) 22:35:38 executing program 7: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}], 0x0, &(0x7f0000012c00)) (fail_nth: 21) [ 1546.500029] loop0: detected capacity change from 0 to 512 [ 1546.512210] loop6: detected capacity change from 0 to 512 [ 1546.517671] EXT4-fs (loop0): ext4_check_descriptors: Inode table for group 0 overlaps superblock [ 1546.518319] EXT4-fs (loop0): group descriptors corrupted! 22:35:38 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}], 0x0, &(0x7f0000012c00)) (fail_nth: 23) 22:35:38 executing program 5: r0 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000040)='/sys/kernel/slab', 0x0, 0x0) getdents(r0, &(0x7f0000000080)=""/247, 0xf7) getdents64(r0, 0x0, 0x0) [ 1546.563807] EXT4-fs (loop6): corrupt root inode, run e2fsck [ 1546.564297] EXT4-fs (loop6): mount failed 22:35:38 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010100)="00000000080000000000f900b00cb2cc029f49d8b90449a7d5d54d49010000a566", 0x21, 0x4e0}, {&(0x7f0000010400)="02000000030000", 0x7, 0x800}, {&(0x7f0000011600)="ed41000000080000dff4655fe0f4655fe0f4655f00000000000004", 0x1b, 0x2100}], 0x0, &(0x7f0000012c00)) 22:35:38 executing program 6: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff4655fe0f4655fe0f4655f00000000000004", 0x1b, 0x2100}], 0x0, &(0x7f0000012c00)) (fail_nth: 21) [ 1546.648429] loop7: detected capacity change from 0 to 512 [ 1546.676639] EXT4-fs error (device loop7): __ext4_fill_super:5244: inode #2: comm syz-executor.7: iget: root inode unallocated [ 1546.686039] EXT4-fs (loop7): get root inode failed [ 1546.686419] EXT4-fs (loop7): mount failed 22:35:39 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010100)="00000000080000000000f900b00cb2cc029f49d8b90449a7d5d54d49010000a566", 0x21, 0x4e0}, {&(0x7f0000010400)="02000000030000", 0x7, 0x800}, {&(0x7f0000011600)="ed41000000080000dff4655fe0f4655fe0f4655f00000000000004", 0x1b, 0x2100}], 0x0, &(0x7f0000012c00)) [ 1546.827362] loop0: detected capacity change from 0 to 512 [ 1546.831688] EXT4-fs (loop0): ext4_check_descriptors: Inode table for group 0 overlaps superblock [ 1546.832365] EXT4-fs (loop0): group descriptors corrupted! 22:35:52 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}], 0x0, &(0x7f0000012c00)) (fail_nth: 24) 22:35:52 executing program 1: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x2, &(0x7f0000000000)=[{0x7c}, {0x6, 0x0, 0x0, 0x7fffffff}]}) openat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x800, 0x10e) r0 = syz_init_net_socket$802154_raw(0x24, 0x3, 0x0) ioctl$sock_inet_SIOCSIFADDR(r0, 0x8916, &(0x7f0000001180)={'bond0\x00', {0x2, 0x0, @local}}) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f0000000080)) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = fork() perf_event_open(&(0x7f0000001280)={0x0, 0x80, 0x5, 0x0, 0x1, 0x4, 0x0, 0xe41, 0x84000, 0x8, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x9, 0x0, @perf_config_ext={0x8000, 0x100}, 0x8000, 0xffffffff, 0x2476f094, 0x0, 0x7, 0x8001, 0xffff, 0x0, 0x1, 0x0, 0x10000}, r1, 0xb, 0xffffffffffffffff, 0x2) 22:35:52 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b000000", 0x58, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff4655fe0f4655fe0f4655f00000000000004", 0x1b, 0x2100}], 0x0, &(0x7f0000012c00)) 22:35:52 executing program 5: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x2, &(0x7f0000000000)=[{0x7c}, {0x6, 0x0, 0x0, 0x7fffffff}]}) openat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x800, 0x10e) r0 = syz_init_net_socket$802154_raw(0x24, 0x3, 0x0) ioctl$sock_inet_SIOCSIFADDR(r0, 0x8916, &(0x7f0000001180)={'bond0\x00', {0x2, 0x0, @local}}) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f0000000080)) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = fork() perf_event_open(&(0x7f0000001280)={0x0, 0x80, 0x5, 0x0, 0x1, 0x4, 0x0, 0xe41, 0x84000, 0x8, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x9, 0x0, @perf_config_ext={0x8000, 0x100}, 0x8000, 0xffffffff, 0x2476f094, 0x0, 0x7, 0x8001, 0xffff, 0x0, 0x1, 0x0, 0x10000}, r1, 0xb, 0xffffffffffffffff, 0x2) 22:35:52 executing program 7: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}], 0x0, &(0x7f0000012c00)) (fail_nth: 22) 22:35:52 executing program 6: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff4655fe0f4655fe0f4655f00000000000004", 0x1b, 0x2100}], 0x0, &(0x7f0000012c00)) (fail_nth: 22) 22:35:52 executing program 2: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x2, &(0x7f0000000000)=[{0x7c}, {0x6, 0x0, 0x0, 0x7fffffff}]}) openat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x800, 0x10e) r0 = syz_init_net_socket$802154_raw(0x24, 0x3, 0x0) ioctl$sock_inet_SIOCSIFADDR(r0, 0x8916, &(0x7f0000001180)={'bond0\x00', {0x2, 0x0, @local}}) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f0000000080)) r1 = fork() perf_event_open(&(0x7f0000001280)={0x0, 0x80, 0x5, 0x0, 0x1, 0x4, 0x0, 0xe41, 0x84000, 0x8, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x9, 0x0, @perf_config_ext={0x8000, 0x100}, 0x8000, 0xffffffff, 0x2476f094, 0x0, 0x7, 0x8001, 0xffff, 0x0, 0x1, 0x0, 0x10000}, r1, 0xb, 0xffffffffffffffff, 0x2) syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x0) 22:35:52 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010100)="00000000080000000000f900b00cb2cc029f49d8b90449a7d5d54d49010000a566", 0x21, 0x4e0}, {&(0x7f0000010400)="0200000003000000", 0x8, 0x800}, {&(0x7f0000011600)="ed41000000080000dff4655fe0f4655fe0f4655f00000000000004", 0x1b, 0x2100}], 0x0, &(0x7f0000012c00)) [ 1560.516353] loop0: detected capacity change from 0 to 512 [ 1560.524263] loop3: detected capacity change from 0 to 512 [ 1560.536793] loop6: detected capacity change from 0 to 512 [ 1560.540667] EXT4-fs (loop0): ext4_check_descriptors: Inode table for group 0 overlaps superblock [ 1560.541963] EXT4-fs (loop0): group descriptors corrupted! [ 1560.565681] EXT4-fs (loop3): unsupported inode size: 0 [ 1560.566486] EXT4-fs (loop3): blocksize: 2048 [ 1560.571220] loop4: detected capacity change from 0 to 512 [ 1560.606862] EXT4-fs (loop6): corrupt root inode, run e2fsck [ 1560.611676] EXT4-fs (loop6): mount failed [ 1560.614125] EXT4-fs error (device loop4): __ext4_fill_super:5244: inode #2: comm syz-executor.4: iget: root inode unallocated [ 1560.621685] EXT4-fs (loop4): get root inode failed [ 1560.622142] EXT4-fs (loop4): mount failed 22:35:53 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010100)="00000000080000000000f900b00cb2cc029f49d8b90449a7d5d54d49010000a566", 0x21, 0x4e0}, {&(0x7f0000010400)="0200000003000000", 0x8, 0x800}, {&(0x7f0000011600)="ed41000000080000dff4655fe0f4655fe0f4655f00000000000004", 0x1b, 0x2100}], 0x0, &(0x7f0000012c00)) 22:35:53 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}], 0x0, &(0x7f0000012c00)) (fail_nth: 25) 22:35:53 executing program 6: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff4655fe0f4655fe0f4655f00000000000004", 0x1b, 0x2100}], 0x0, &(0x7f0000012c00)) (fail_nth: 23) 22:35:53 executing program 3: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x2, &(0x7f0000000000)=[{0x7c}, {0x6, 0x0, 0x0, 0x7fffffff}]}) openat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x800, 0x10e) r0 = syz_init_net_socket$802154_raw(0x24, 0x3, 0x0) ioctl$sock_inet_SIOCSIFADDR(r0, 0x8916, &(0x7f0000001180)={'bond0\x00', {0x2, 0x0, @local}}) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f0000000080)) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = fork() perf_event_open(&(0x7f0000001280)={0x0, 0x80, 0x5, 0x0, 0x1, 0x4, 0x0, 0xe41, 0x84000, 0x8, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x9, 0x0, @perf_config_ext={0x8000, 0x100}, 0x8000, 0xffffffff, 0x2476f094, 0x0, 0x7, 0x8001, 0xffff, 0x0, 0x1, 0x0, 0x10000}, r1, 0xb, 0xffffffffffffffff, 0x2) syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x0) 22:35:53 executing program 7: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}], 0x0, &(0x7f0000012c00)) (fail_nth: 23) [ 1560.774093] FAULT_INJECTION: forcing a failure. [ 1560.774093] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 1560.775089] CPU: 1 PID: 13540 Comm: syz-executor.6 Not tainted 6.0.0-rc3-next-20220829 #1 [ 1560.775719] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS rel-1.14.0-0-g155821a1990b-prebuilt.qemu.org 04/01/2014 [ 1560.776548] Call Trace: [ 1560.776749] [ 1560.776924] dump_stack_lvl+0x8b/0xb3 [ 1560.777231] should_fail.cold+0x5/0xa [ 1560.777527] strncpy_from_user+0x34/0x3e0 [ 1560.777862] getname_flags.part.0+0x95/0x4f0 [ 1560.778226] ? vfs_write+0x48e/0xd90 [ 1560.778531] getname+0x8e/0xd0 [ 1560.778797] do_sys_openat2+0xf9/0x4c0 [ 1560.779101] ? build_open_flags+0x6f0/0x6f0 [ 1560.779440] __x64_sys_openat+0x13f/0x1f0 [ 1560.779768] ? __ia32_compat_sys_open+0x1c0/0x1c0 [ 1560.780143] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1560.780548] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1560.780954] do_syscall_64+0x3b/0x90 [ 1560.781239] entry_SYSCALL_64_after_hwframe+0x63/0xcd [ 1560.781635] RIP: 0033:0x7f0e406b1a04 [ 1560.781915] Code: 84 00 00 00 00 00 44 89 54 24 0c e8 96 f9 ff ff 44 8b 54 24 0c 44 89 e2 48 89 ee 41 89 c0 bf 9c ff ff ff b8 01 01 00 00 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 89 44 24 0c e8 c8 f9 ff ff 8b 44 [ 1560.783267] RSP: 002b:00007f0e3dc73ed0 EFLAGS: 00000293 ORIG_RAX: 0000000000000101 [ 1560.783836] RAX: ffffffffffffffda RBX: 00007f0e40748970 RCX: 00007f0e406b1a04 [ 1560.784368] RDX: 0000000000000002 RSI: 00007f0e3dc74000 RDI: 00000000ffffff9c [ 1560.784900] RBP: 00007f0e3dc74000 R08: 0000000000000000 R09: ffffffffffffffff [ 1560.785425] R10: 0000000000000000 R11: 0000000000000293 R12: 0000000000000002 [ 1560.785990] R13: 0000000000000004 R14: 0000000020000248 R15: 0000000000000003 [ 1560.786570] [ 1560.789929] loop4: detected capacity change from 0 to 512 [ 1560.793207] loop7: detected capacity change from 0 to 512 [ 1560.815321] EXT4-fs error (device loop7): __ext4_fill_super:5244: inode #2: comm syz-executor.7: iget: root inode unallocated [ 1560.816751] EXT4-fs (loop7): get root inode failed [ 1560.817129] EXT4-fs (loop7): mount failed [ 1560.825118] EXT4-fs error (device loop4): __ext4_fill_super:5244: inode #2: comm syz-executor.4: iget: root inode unallocated [ 1560.826609] EXT4-fs (loop4): get root inode failed [ 1560.826999] EXT4-fs (loop4): mount failed [ 1560.839555] loop0: detected capacity change from 0 to 512 [ 1560.859127] EXT4-fs (loop0): ext4_check_descriptors: Inode table for group 0 overlaps superblock [ 1560.859833] EXT4-fs (loop0): group descriptors corrupted! 22:35:53 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}], 0x0, &(0x7f0000012c00)) (fail_nth: 26) 22:35:53 executing program 7: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}], 0x0, &(0x7f0000012c00)) (fail_nth: 24) 22:35:53 executing program 2: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x2, &(0x7f0000000000)=[{0x7c}, {0x6, 0x0, 0x0, 0x7fffffff}]}) openat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x800, 0x10e) r0 = syz_init_net_socket$802154_raw(0x24, 0x3, 0x0) ioctl$sock_inet_SIOCSIFADDR(r0, 0x8916, &(0x7f0000001180)={'bond0\x00', {0x2, 0x0, @local}}) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = fork() perf_event_open(&(0x7f0000001280)={0x0, 0x80, 0x5, 0x0, 0x1, 0x4, 0x0, 0xe41, 0x84000, 0x8, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x9, 0x0, @perf_config_ext={0x8000, 0x100}, 0x8000, 0xffffffff, 0x2476f094, 0x0, 0x7, 0x8001, 0xffff, 0x0, 0x1, 0x0, 0x10000}, r1, 0xb, 0xffffffffffffffff, 0x2) syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x0) 22:35:53 executing program 6: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff4655fe0f4655fe0f4655f00000000000004", 0x1b, 0x2100}], 0x0, &(0x7f0000012c00)) (fail_nth: 24) [ 1560.992080] loop4: detected capacity change from 0 to 512 [ 1561.023356] loop7: detected capacity change from 0 to 512 [ 1561.047411] EXT4-fs error (device loop7): __ext4_fill_super:5244: inode #2: comm syz-executor.7: iget: root inode unallocated [ 1561.049189] EXT4-fs (loop7): get root inode failed [ 1561.049600] EXT4-fs (loop7): mount failed [ 1561.053908] EXT4-fs error (device loop4): __ext4_fill_super:5244: inode #2: comm syz-executor.4: iget: root inode unallocated [ 1561.055307] EXT4-fs (loop4): get root inode failed [ 1561.055910] EXT4-fs (loop4): mount failed 22:36:05 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010100)="00000000080000000000f900b00cb2cc029f49d8b90449a7d5d54d49010000a566", 0x21, 0x4e0}, {&(0x7f0000010400)="0200000003000000", 0x8, 0x800}, {&(0x7f0000011600)="ed41000000080000dff4655fe0f4655fe0f4655f00000000000004", 0x1b, 0x2100}], 0x0, &(0x7f0000012c00)) 22:36:05 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}], 0x0, &(0x7f0000012c00)) (fail_nth: 27) 22:36:05 executing program 1: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x2, &(0x7f0000000000)=[{0x7c}, {0x6, 0x0, 0x0, 0x7fffffff}]}) openat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x800, 0x10e) r0 = syz_init_net_socket$802154_raw(0x24, 0x3, 0x0) ioctl$sock_inet_SIOCSIFADDR(r0, 0x8916, &(0x7f0000001180)={'bond0\x00', {0x2, 0x0, @local}}) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = fork() perf_event_open(&(0x7f0000001280)={0x0, 0x80, 0x5, 0x0, 0x1, 0x4, 0x0, 0xe41, 0x84000, 0x8, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x9, 0x0, @perf_config_ext={0x8000, 0x100}, 0x8000, 0xffffffff, 0x2476f094, 0x0, 0x7, 0x8001, 0xffff, 0x0, 0x1, 0x0, 0x10000}, r1, 0xb, 0xffffffffffffffff, 0x2) syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x0) 22:36:05 executing program 7: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}], 0x0, &(0x7f0000012c00)) (fail_nth: 25) 22:36:05 executing program 2: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x2, &(0x7f0000000000)=[{0x7c}, {0x6, 0x0, 0x0, 0x7fffffff}]}) openat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x800, 0x10e) r0 = syz_init_net_socket$802154_raw(0x24, 0x3, 0x0) ioctl$sock_inet_SIOCSIFADDR(r0, 0x8916, &(0x7f0000001180)={'bond0\x00', {0x2, 0x0, @local}}) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = fork() perf_event_open(&(0x7f0000001280)={0x0, 0x80, 0x5, 0x0, 0x1, 0x4, 0x0, 0xe41, 0x84000, 0x8, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x9, 0x0, @perf_config_ext={0x8000, 0x100}, 0x8000, 0xffffffff, 0x2476f094, 0x0, 0x7, 0x8001, 0xffff, 0x0, 0x1, 0x0, 0x10000}, r1, 0xb, 0xffffffffffffffff, 0x2) syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x0) 22:36:05 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}], 0x0, &(0x7f0000012c00)) (fail_nth: 1) [ 1573.592531] loop7: detected capacity change from 0 to 512 22:36:05 executing program 5: r0 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000040)='/sys/kernel/slab', 0x0, 0x0) getdents(r0, &(0x7f0000000080)=""/247, 0xf7) getdents64(r0, &(0x7f0000000240)=""/226, 0x20000258) (fail_nth: 1) 22:36:05 executing program 6: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff4655fe0f4655fe0f4655f00000000000004", 0x1b, 0x2100}], 0x0, &(0x7f0000012c00)) (fail_nth: 25) [ 1573.597935] loop4: detected capacity change from 0 to 512 [ 1573.604540] loop6: detected capacity change from 0 to 512 [ 1573.619325] EXT4-fs error (device loop4): __ext4_fill_super:5244: inode #2: comm syz-executor.4: iget: root inode unallocated [ 1573.620859] EXT4-fs (loop4): get root inode failed [ 1573.621252] EXT4-fs (loop4): mount failed [ 1573.642265] loop0: detected capacity change from 0 to 512 [ 1573.643752] EXT4-fs error (device loop7): __ext4_fill_super:5244: inode #2: comm syz-executor.7: iget: root inode unallocated [ 1573.647110] EXT4-fs (loop7): get root inode failed [ 1573.648007] EXT4-fs (loop7): mount failed [ 1573.649480] EXT4-fs (loop0): ext4_check_descriptors: Inode table for group 0 overlaps superblock [ 1573.650300] EXT4-fs (loop0): group descriptors corrupted! [ 1573.653468] EXT4-fs (loop6): corrupt root inode, run e2fsck [ 1573.654715] EXT4-fs (loop6): mount failed 22:36:06 executing program 5: r0 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000040)='/sys/kernel/slab', 0x0, 0x0) getdents(r0, &(0x7f0000000080)=""/247, 0xf7) getdents64(r0, &(0x7f0000000240)=""/226, 0x20000258) (fail_nth: 2) 22:36:06 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}], 0x0, &(0x7f0000012c00)) (fail_nth: 28) 22:36:06 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}], 0x0, &(0x7f0000012c00)) (fail_nth: 2) 22:36:06 executing program 5: r0 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000040)='/sys/kernel/slab', 0x0, 0x0) getdents(r0, &(0x7f0000000080)=""/247, 0xf7) getdents64(r0, &(0x7f0000000240)=""/226, 0x20000258) (fail_nth: 3) [ 1573.750044] loop4: detected capacity change from 0 to 512 22:36:06 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010100)="00000000080000000000f900b00cb2cc029f49d8b90449a7d5d54d49010000a566", 0x21, 0x4e0}, {&(0x7f0000010400)="020000000300000004", 0x9}, {&(0x7f0000011600)="ed41000000080000dff4655fe0f4655fe0f4655f00000000000004", 0x1b, 0x2100}], 0x0, &(0x7f0000012c00)) [ 1573.798929] FAULT_INJECTION: forcing a failure. [ 1573.798929] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 1573.800067] CPU: 1 PID: 13619 Comm: syz-executor.5 Not tainted 6.0.0-rc3-next-20220829 #1 [ 1573.800690] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS rel-1.14.0-0-g155821a1990b-prebuilt.qemu.org 04/01/2014 [ 1573.801523] Call Trace: [ 1573.801735] [ 1573.801912] dump_stack_lvl+0x8b/0xb3 [ 1573.802230] should_fail.cold+0x5/0xa [ 1573.802523] _copy_to_user+0x2a/0x140 [ 1573.802830] simple_read_from_buffer+0xcc/0x160 [ 1573.803196] proc_fail_nth_read+0x198/0x230 [ 1573.803528] ? proc_exe_link+0x1e0/0x1e0 [ 1573.803837] ? security_file_permission+0xb1/0xe0 [ 1573.804217] vfs_read+0x253/0x930 [ 1573.804501] ? proc_exe_link+0x1e0/0x1e0 [ 1573.804816] ? kernel_read+0x1c0/0x1c0 [ 1573.805121] ? __fget_files+0x270/0x450 [ 1573.805440] ksys_read+0x127/0x250 [ 1573.805724] ? __ia32_sys_pwrite64+0x220/0x220 [ 1573.806095] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1573.806515] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1573.806910] do_syscall_64+0x3b/0x90 [ 1573.807203] entry_SYSCALL_64_after_hwframe+0x63/0xcd [ 1573.807599] RIP: 0033:0x7f47462a369c [ 1573.807879] Code: ec 28 48 89 54 24 18 48 89 74 24 10 89 7c 24 08 e8 f9 fc ff ff 48 8b 54 24 18 48 8b 74 24 10 41 89 c0 8b 7c 24 08 31 c0 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 48 89 44 24 08 e8 2f fd ff ff 48 [ 1573.809221] RSP: 002b:00007f4743866170 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 1573.809780] RAX: ffffffffffffffda RBX: 0000000000002248 RCX: 00007f47462a369c [ 1573.810250] EXT4-fs error (device loop4): __ext4_fill_super:5244: inode #2: comm syz-executor.4: iget: root inode unallocated [ 1573.810316] RDX: 000000000000000f RSI: 00007f47438661e0 RDI: 0000000000000004 [ 1573.812476] RBP: 00007f47438661d0 R08: 0000000000000000 R09: 0000000000000000 [ 1573.813011] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1573.813544] R13: 00007ffdb5f5434f R14: 00007f4743866300 R15: 0000000000022000 [ 1573.814102] [ 1573.818446] loop0: detected capacity change from 0 to 512 [ 1573.828501] EXT4-fs (loop4): get root inode failed [ 1573.829394] EXT4-fs (loop4): mount failed [ 1573.888694] EXT4-fs (loop0): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 1573.890282] EXT4-fs (loop0): group descriptors corrupted! [ 1573.904594] loop3: detected capacity change from 0 to 512 22:36:06 executing program 7: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}], 0x0, &(0x7f0000012c00)) (fail_nth: 26) 22:36:06 executing program 6: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff4655fe0f4655fe0f4655f00000000000004", 0x1b, 0x2100}], 0x0, &(0x7f0000012c00)) (fail_nth: 26) 22:36:06 executing program 5: r0 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000040)='/sys/kernel/slab', 0x0, 0x0) getdents(r0, &(0x7f0000000080)=""/247, 0xf7) getdents64(r0, &(0x7f0000000240)=""/226, 0x20000258) [ 1573.955739] EXT4-fs error (device loop3): __ext4_fill_super:5244: inode #2: comm syz-executor.3: iget: root inode unallocated [ 1573.959055] EXT4-fs (loop3): get root inode failed [ 1573.959437] EXT4-fs (loop3): mount failed [ 1573.986266] loop7: detected capacity change from 0 to 512 [ 1574.006394] EXT4-fs error (device loop7): __ext4_fill_super:5244: inode #2: comm syz-executor.7: iget: root inode unallocated [ 1574.008007] EXT4-fs (loop7): get root inode failed [ 1574.008415] EXT4-fs (loop7): mount failed 22:36:06 executing program 6: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff4655fe0f4655fe0f4655f00000000000004", 0x1b, 0x2100}], 0x0, &(0x7f0000012c00)) (fail_nth: 27) 22:36:06 executing program 5: r0 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000040)='/sys/kernel/slab', 0x0, 0x0) getdents(r0, &(0x7f0000000080)=""/247, 0xf7) getdents64(r0, &(0x7f0000000240)=""/226, 0x28) 22:36:06 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}], 0x0, &(0x7f0000012c00)) (fail_nth: 29) 22:36:06 executing program 7: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}], 0x0, &(0x7f0000012c00)) (fail_nth: 27) 22:36:06 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010100)="00000000080000000000f900b00cb2cc029f49d8b90449a7d5d54d49010000a566", 0x21, 0x4e0}, {&(0x7f0000010400)="020000000300000004", 0x9}, {&(0x7f0000011600)="ed41000000080000dff4655fe0f4655fe0f4655f00000000000004", 0x1b, 0x2100}], 0x0, &(0x7f0000012c00)) [ 1574.104937] loop6: detected capacity change from 0 to 512 [ 1574.121456] loop4: detected capacity change from 0 to 512 [ 1574.133716] EXT4-fs (loop6): corrupt root inode, run e2fsck [ 1574.134235] EXT4-fs (loop6): mount failed [ 1574.143457] loop7: detected capacity change from 0 to 512 [ 1574.146415] EXT4-fs error (device loop4): __ext4_fill_super:5244: inode #2: comm syz-executor.4: iget: root inode unallocated [ 1574.148821] EXT4-fs (loop4): get root inode failed [ 1574.149213] EXT4-fs (loop4): mount failed [ 1574.171662] loop0: detected capacity change from 0 to 512 [ 1574.189372] EXT4-fs (loop0): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 1574.190076] EXT4-fs (loop0): group descriptors corrupted! [ 1574.195194] EXT4-fs error (device loop7): __ext4_fill_super:5244: inode #2: comm syz-executor.7: iget: root inode unallocated [ 1574.201992] EXT4-fs (loop7): get root inode failed [ 1574.202824] EXT4-fs (loop7): mount failed 22:36:18 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}], 0x0, &(0x7f0000012c00)) (fail_nth: 3) 22:36:18 executing program 1: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x2, &(0x7f0000000000)=[{0x7c}, {0x6, 0x0, 0x0, 0x7fffffff}]}) openat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x800, 0x10e) r0 = syz_init_net_socket$802154_raw(0x24, 0x3, 0x0) ioctl$sock_inet_SIOCSIFADDR(r0, 0x8916, &(0x7f0000001180)={'bond0\x00', {0x2, 0x0, @local}}) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = fork() perf_event_open(&(0x7f0000001280)={0x0, 0x80, 0x5, 0x0, 0x1, 0x4, 0x0, 0xe41, 0x84000, 0x8, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x9, 0x0, @perf_config_ext={0x8000, 0x100}, 0x8000, 0xffffffff, 0x2476f094, 0x0, 0x7, 0x8001, 0xffff, 0x0, 0x1, 0x0, 0x10000}, r1, 0xb, 0xffffffffffffffff, 0x2) syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x0) 22:36:18 executing program 7: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}], 0x0, &(0x7f0000012c00)) (fail_nth: 28) 22:36:18 executing program 5: r0 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000000)='/sys/kernel/slab', 0x0, 0x0) getdents(r0, &(0x7f0000000080)=""/247, 0xf7) getdents64(r0, &(0x7f0000000340)=""/232, 0xe8) [ 1586.414596] FAULT_INJECTION: forcing a failure. [ 1586.414596] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 1586.415536] CPU: 0 PID: 13665 Comm: syz-executor.3 Not tainted 6.0.0-rc3-next-20220829 #1 [ 1586.416146] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS rel-1.14.0-0-g155821a1990b-prebuilt.qemu.org 04/01/2014 [ 1586.416982] Call Trace: [ 1586.417178] [ 1586.417354] dump_stack_lvl+0x8b/0xb3 [ 1586.417660] should_fail.cold+0x5/0xa [ 1586.417959] _copy_from_user+0x2a/0x170 [ 1586.418272] __do_sys_memfd_create+0x103/0x4e0 [ 1586.418649] do_syscall_64+0x3b/0x90 [ 1586.418948] entry_SYSCALL_64_after_hwframe+0x63/0xcd [ 1586.419361] RIP: 0033:0x7f0314a61b19 [ 1586.419653] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1586.421007] RSP: 002b:00007f0311fd6f48 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 1586.421587] RAX: ffffffffffffffda RBX: 0000000020000200 RCX: 00007f0314a61b19 [ 1586.422122] RDX: 0000000000001000 RSI: 0000000000000000 RDI: 00007f0314abb0fb [ 1586.422672] RBP: 0000000000000002 R08: 0000000000000800 R09: ffffffffffffffff [ 1586.423200] R10: 0000000000000002 R11: 0000000000000246 R12: 0000000008100000 [ 1586.423739] R13: 0000000020000100 R14: 0000000000040000 R15: 0000000020012c00 [ 1586.424276] 22:36:18 executing program 2: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x2, &(0x7f0000000000)=[{0x7c}, {0x6, 0x0, 0x0, 0x7fffffff}]}) openat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x800, 0x10e) r0 = syz_init_net_socket$802154_raw(0x24, 0x3, 0x0) ioctl$sock_inet_SIOCSIFADDR(r0, 0x8916, &(0x7f0000001180)={'bond0\x00', {0x2, 0x0, @local}}) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = fork() perf_event_open(&(0x7f0000001280)={0x0, 0x80, 0x5, 0x0, 0x1, 0x4, 0x0, 0xe41, 0x84000, 0x8, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x9, 0x0, @perf_config_ext={0x8000, 0x100}, 0x8000, 0xffffffff, 0x2476f094, 0x0, 0x7, 0x8001, 0xffff, 0x0, 0x1, 0x0, 0x10000}, r1, 0xb, 0xffffffffffffffff, 0x2) syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x0) 22:36:18 executing program 6: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff4655fe0f4655fe0f4655f00000000000004", 0x1b, 0x2100}], 0x0, &(0x7f0000012c00)) (fail_nth: 28) 22:36:18 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}], 0x0, &(0x7f0000012c00)) (fail_nth: 30) 22:36:18 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010100)="00000000080000000000f900b00cb2cc029f49d8b90449a7d5d54d49010000a566", 0x21, 0x4e0}, {&(0x7f0000010400)="020000000300000004", 0x9}, {&(0x7f0000011600)="ed41000000080000dff4655fe0f4655fe0f4655f00000000000004", 0x1b, 0x2100}], 0x0, &(0x7f0000012c00)) 22:36:18 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}], 0x0, &(0x7f0000012c00)) (fail_nth: 4) [ 1586.460953] loop0: detected capacity change from 0 to 512 [ 1586.462101] loop7: detected capacity change from 0 to 512 [ 1586.472533] EXT4-fs (loop0): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 1586.473418] EXT4-fs (loop0): group descriptors corrupted! [ 1586.485414] loop4: detected capacity change from 0 to 512 [ 1586.495393] loop6: detected capacity change from 0 to 512 [ 1586.499158] EXT4-fs error (device loop7): __ext4_fill_super:5244: inode #2: comm syz-executor.7: iget: root inode unallocated [ 1586.504390] EXT4-fs (loop7): get root inode failed [ 1586.505355] EXT4-fs (loop7): mount failed [ 1586.510048] EXT4-fs error (device loop4): __ext4_fill_super:5244: inode #2: comm syz-executor.4: iget: root inode unallocated [ 1586.538691] EXT4-fs (loop6): corrupt root inode, run e2fsck [ 1586.541726] EXT4-fs (loop6): mount failed [ 1586.543088] EXT4-fs (loop4): get root inode failed [ 1586.543613] EXT4-fs (loop4): mount failed 22:36:18 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff4655fe0f4655fe0f4655f00000000000004", 0x1b, 0x2100}], 0x0, &(0x7f0000012c00)) 22:36:19 executing program 5: r0 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000040)='/sys/kernel/slab', 0x0, 0x0) preadv(r0, &(0x7f0000000000)=[{&(0x7f0000000180)=""/138, 0x8a}, {&(0x7f0000000340)=""/184, 0xb8}, {&(0x7f0000000400)=""/183, 0xb7}], 0x3, 0x8, 0x6) getdents(r0, &(0x7f0000000080)=""/247, 0xf7) getdents64(r0, &(0x7f0000000240)=""/226, 0x20000258) r1 = openat$vcsu(0xffffffffffffff9c, &(0x7f00000004c0), 0x1, 0x0) openat(r1, &(0x7f0000000540)='./file0\x00', 0x40000, 0x0) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY_ALL_USERS(r1, 0xc0406619, &(0x7f0000000500)={@id={0x2, 0x0, @c}}) 22:36:19 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}], 0x0, &(0x7f0000012c00)) (fail_nth: 5) [ 1586.773025] loop3: detected capacity change from 0 to 512 [ 1586.782233] loop0: detected capacity change from 0 to 512 [ 1586.802374] EXT4-fs error (device loop3): __ext4_fill_super:5244: inode #2: comm syz-executor.3: iget: root inode unallocated [ 1586.804144] EXT4-fs (loop0): corrupt root inode, run e2fsck [ 1586.805023] EXT4-fs (loop0): mount failed [ 1586.812951] EXT4-fs (loop3): get root inode failed [ 1586.813759] EXT4-fs (loop3): mount failed [ 1600.749318] loop7: detected capacity change from 0 to 512 22:36:33 executing program 6: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff4655fe0f4655fe0f4655f00000000000004", 0x1b, 0x2100}], 0x0, &(0x7f0000012c00)) (fail_nth: 29) 22:36:33 executing program 1: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x2, &(0x7f0000000000)=[{0x7c}, {0x6, 0x0, 0x0, 0x7fffffff}]}) openat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x800, 0x10e) r0 = syz_init_net_socket$802154_raw(0x24, 0x3, 0x0) ioctl$sock_inet_SIOCSIFADDR(r0, 0x8916, &(0x7f0000001180)={'bond0\x00', {0x2, 0x0, @local}}) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = fork() perf_event_open(&(0x7f0000001280)={0x0, 0x80, 0x5, 0x0, 0x1, 0x4, 0x0, 0xe41, 0x84000, 0x8, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x9, 0x0, @perf_config_ext={0x8000, 0x100}, 0x8000, 0xffffffff, 0x2476f094, 0x0, 0x7, 0x8001, 0xffff, 0x0, 0x1, 0x0, 0x10000}, r1, 0xb, 0xffffffffffffffff, 0x2) syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x0) 22:36:33 executing program 2: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x2, &(0x7f0000000000)=[{0x7c}, {0x6, 0x0, 0x0, 0x7fffffff}]}) openat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x800, 0x10e) syz_init_net_socket$802154_raw(0x24, 0x3, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = fork() perf_event_open(&(0x7f0000001280)={0x0, 0x80, 0x5, 0x0, 0x1, 0x4, 0x0, 0xe41, 0x84000, 0x8, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x9, 0x0, @perf_config_ext={0x8000, 0x100}, 0x8000, 0xffffffff, 0x2476f094, 0x0, 0x7, 0x8001, 0xffff, 0x0, 0x1, 0x0, 0x10000}, r0, 0xb, 0xffffffffffffffff, 0x2) syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x0) 22:36:33 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0x800}, {&(0x7f0000011600)="ed41000000080000dff4655fe0f4655fe0f4655f00000000000004", 0x1b, 0x2100}], 0x0, &(0x7f0000012c00)) 22:36:33 executing program 7: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}], 0x0, &(0x7f0000012c00)) (fail_nth: 29) 22:36:33 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}], 0x0, &(0x7f0000012c00)) (fail_nth: 31) 22:36:33 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}], 0x0, &(0x7f0000012c00)) (fail_nth: 6) 22:36:33 executing program 5: r0 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000180)='/sys/module/hid_ntrig', 0x80000, 0x0) getdents(r0, &(0x7f0000000080)=""/247, 0xf7) getdents64(r0, &(0x7f0000000240)=""/226, 0x20000258) lstat(&(0x7f0000000200)='./file0/file0\x00', &(0x7f0000000640)={0x0, 0x0, 0x0, 0x0, 0x0}) syz_mount_image$nfs(&(0x7f0000000040), &(0x7f00000001c0)='./file0\x00', 0x2, 0x4, &(0x7f00000005c0)=[{&(0x7f0000000340)="28eb542176cf21e11e09e4c9fb1cf337ca93740bc10c73ce905db89e617b7dfd2c3c8bbe66278b37fb26cf7c7e3cfb3baaccee2c372840a39694c136de8dc6a829fdf3efbb1691e1b5056329a01bc83aca21fc645901f129f7ac5f8c23", 0x5d, 0x8}, {&(0x7f00000003c0)="32e46360f69c22abe5dad93ac89ec8893343ee8e3d061e173a284be600e37f4551b31e9f5a6ea615ebf3d5d94962af06a5029445abd88865b05ed3deaffe575d134b2c7193744cd3ea2efd68a9f9cf1de222677c25349c780b85923598943269dbcf0cd3b7de940dbebe2f5431e371e660895d6740cee74bbb797059ea7d5e2c3fd7d0c81427e2a50b394b3a2b11b9fa134fbd4e80f9a65f92f3a80fef8414370624e08080f83ff56b", 0xa9}, {&(0x7f0000000480)="9eda4e10942a46da3ec58f42b1e1256dc589b3154f8801d8d96cfd0275825f5c7ede6b68c918ab7f7da1acbca30c98925bb93d77a8f54c8de7d9f455077d3045f7a4cf0a025a3ec6d93ae700ada25f7bf211f9e7f2078c1a408d32bcbf0df52a2be58ca35bd3308436", 0x69, 0x8}, {&(0x7f0000000500)="63d0e049936054755e5a562a95e66d69880b7323cd0ec22581be2e16da0024ee63e31a5902986813bdd5398d7ea5cf1052438099845e595f4ac24f2187b1a92185a17cbadf1d664eaeae0f4016509de92013219fd62eedf145341578e9afc214b5cb10fb41ef8012af8cf555e2a1633d7884ed637e60faa3f8bfafd47fa54f23c52ab34c0660f9d8454a98685f7b693de60f1463d8d48b1fc9fcb3b0a062a02bb53f06b4a366097e717b5f642d2950a1accb3c08d985c24789e7b71e946d5f57", 0xc0, 0x700000000000000}], 0x3a2840e, &(0x7f0000000780)=ANY=[@ANYBLOB="5e2c2f2924235b2c2c402a3a2c2c2d2c232c5c5e5d282f297d255c2d2c657569643da45439fe7788a5f5", @ANYRESDEC=r1, @ANYBLOB=',smackfstransmute=.,obj_type=,fsmagic=0x0000000000000003,\x00']) openat(r0, &(0x7f0000000000)='./file0\x00', 0x100, 0x21) openat(0xffffffffffffff9c, &(0x7f0000000740)='./file0/file0\x00', 0x1, 0xc0) [ 1600.772042] loop6: detected capacity change from 0 to 512 [ 1600.772129] loop4: detected capacity change from 0 to 512 [ 1600.778826] EXT4-fs error (device loop7): __ext4_fill_super:5244: inode #2: comm syz-executor.7: iget: root inode unallocated [ 1600.787971] EXT4-fs (loop7): get root inode failed [ 1600.788379] EXT4-fs (loop7): mount failed [ 1600.797075] loop5: detected capacity change from 0 to 264192 22:36:33 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}], 0x0, &(0x7f0000012c00)) (fail_nth: 7) [ 1600.800204] EXT4-fs error (device loop4): __ext4_fill_super:5244: inode #2: comm syz-executor.4: iget: root inode unallocated [ 1600.804136] EXT4-fs (loop4): get root inode failed [ 1600.804691] EXT4-fs (loop4): mount failed [ 1600.814407] loop0: detected capacity change from 0 to 512 [ 1600.821976] EXT4-fs (loop6): corrupt root inode, run e2fsck [ 1600.822504] EXT4-fs (loop6): mount failed [ 1600.828644] loop5: detected capacity change from 0 to 264192 [ 1600.859958] EXT4-fs (loop0): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 1600.861318] EXT4-fs (loop0): group descriptors corrupted! [ 1600.867886] loop3: detected capacity change from 0 to 512 22:36:33 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}], 0x0, &(0x7f0000012c00)) (fail_nth: 32) 22:36:33 executing program 6: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff4655fe0f4655fe0f4655f00000000000004", 0x1b, 0x2100}], 0x0, &(0x7f0000012c00)) (fail_nth: 30) [ 1600.895781] EXT4-fs error (device loop3): __ext4_fill_super:5244: inode #2: comm syz-executor.3: iget: root inode unallocated [ 1600.898364] EXT4-fs (loop3): get root inode failed [ 1600.898795] EXT4-fs (loop3): mount failed [ 1600.949993] loop6: detected capacity change from 0 to 512 22:36:33 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}], 0x0, &(0x7f0000012c00)) (fail_nth: 8) 22:36:33 executing program 7: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}], 0x0, &(0x7f0000012c00)) (fail_nth: 30) [ 1600.980246] EXT4-fs (loop6): corrupt root inode, run e2fsck [ 1600.981288] EXT4-fs (loop6): mount failed 22:36:33 executing program 5: r0 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000040)='/sys/kernel/slab', 0x0, 0x0) getdents(r0, &(0x7f0000000080)=""/247, 0xf7) getdents(r0, &(0x7f00000003c0)=""/245, 0xf5) r1 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x0) r2 = dup2(r1, r1) bind$bt_l2cap(r2, &(0x7f0000000000)={0x1f, 0x0, @fixed={'\xaa\xaa\xaa\xaa\xaa', 0x10}}, 0xe) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f0000000180)={'ip6erspan0\x00'}) getdents64(r0, &(0x7f0000000240)=""/226, 0x20000258) r3 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x0) r4 = dup2(r3, r3) bind$bt_l2cap(r4, &(0x7f0000000000)={0x1f, 0x0, @fixed={'\xaa\xaa\xaa\xaa\xaa', 0x10}}, 0xe) ioctl$AUTOFS_DEV_IOCTL_SETPIPEFD(r0, 0xc0189378, &(0x7f00000001c0)={{0x1, 0x1, 0x18, r4, {r2}}, './file0\x00'}) close(r5) r6 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000200)='/sys/kernel/notes', 0x20242, 0x121) perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x6, 0x4, 0x4, 0x54, 0x0, 0x9297113a00000000, 0x2c80, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x1, @perf_bp={&(0x7f00000004c0), 0x2}, 0x8, 0x7ff, 0xfb6e, 0x3, 0x2, 0x1, 0x1, 0x0, 0x200000, 0x0, 0x8}, 0x0, 0x2, r6, 0x9) lseek(r4, 0xffffffffffff0000, 0x0) 22:36:33 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0x800}, {&(0x7f0000011600)="ed41000000080000dff4655fe0f4655fe0f4655f00000000000004", 0x1b, 0x2100}], 0x0, &(0x7f0000012c00)) [ 1601.020829] loop4: detected capacity change from 0 to 512 [ 1601.056427] EXT4-fs error (device loop4): __ext4_fill_super:5244: inode #2: comm syz-executor.4: iget: root inode unallocated 22:36:33 executing program 6: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff4655fe0f4655fe0f4655f00000000000004", 0x1b, 0x2100}], 0x0, &(0x7f0000012c00)) (fail_nth: 31) [ 1601.059631] loop7: detected capacity change from 0 to 512 [ 1601.064413] EXT4-fs (loop4): get root inode failed [ 1601.065206] EXT4-fs (loop4): mount failed [ 1601.123943] loop6: detected capacity change from 0 to 512 22:36:33 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}], 0x0, &(0x7f0000012c00)) (fail_nth: 9) [ 1601.137369] EXT4-fs error (device loop7): __ext4_fill_super:5244: inode #2: comm syz-executor.7: iget: root inode unallocated [ 1601.139483] EXT4-fs (loop7): get root inode failed [ 1601.140334] EXT4-fs (loop7): mount failed [ 1601.154103] loop0: detected capacity change from 0 to 512 [ 1601.163956] loop3: detected capacity change from 0 to 512 [ 1601.171128] EXT4-fs (loop0): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 1601.171966] EXT4-fs (loop0): group descriptors corrupted! [ 1601.178776] EXT4-fs error (device loop3): __ext4_fill_super:5244: inode #2: comm syz-executor.3: iget: root inode unallocated [ 1601.183017] EXT4-fs (loop3): get root inode failed [ 1601.183436] EXT4-fs (loop3): mount failed [ 1601.216946] EXT4-fs (loop6): corrupt root inode, run e2fsck [ 1601.217992] EXT4-fs (loop6): mount failed 22:36:49 executing program 7: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}], 0x0, &(0x7f0000012c00)) (fail_nth: 31) 22:36:49 executing program 2: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x2, &(0x7f0000000000)=[{0x7c}, {0x6, 0x0, 0x0, 0x7fffffff}]}) openat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x800, 0x10e) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = fork() perf_event_open(&(0x7f0000001280)={0x0, 0x80, 0x5, 0x0, 0x1, 0x4, 0x0, 0xe41, 0x84000, 0x8, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x9, 0x0, @perf_config_ext={0x8000, 0x100}, 0x8000, 0xffffffff, 0x2476f094, 0x0, 0x7, 0x8001, 0xffff, 0x0, 0x1, 0x0, 0x10000}, r0, 0xb, 0xffffffffffffffff, 0x2) syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x0) 22:36:49 executing program 5: r0 = syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000080)='./file0\x00', 0x1, 0x4, &(0x7f0000000580)=[{&(0x7f00000000c0)="76103243abb4e1bf115a008388cbe5b7d522ffdbea16443168f3b0563c01dd2a67eb635b536e14a13d03efd3cc8484c17e1500d818", 0x35}, {&(0x7f0000000100)="cd1859ed80702864a96294db884d63ca842715263a2de468a7302203d2f056f9b0903da10e202d4aeb546fb03376a28d6e2fda3d919464fa7e750b41af9511d42835a1057432bcb1b73b2b35b28465d12d997559ab1b8414896f9cc6a99404b9e0687938c48828054da3896ef59d", 0x6e, 0xeb}, {&(0x7f0000000180)="4617d4e29e8316e6f8bb1a5896ebcd6db3827c6dbca3c7d563f61cbd1de3efb7166c6a93e4677a4b04c361489aa171a296af406cefe30435d19bec79857c14d8cbb8d50252dd116eb9d1a87af18d861ad9511b771f78195083d1c7d93f4620e4070b5ebcfdcf469c5e0d31db71ea0bea68243acd4065aca3e3f75e01e2f512a82e04ce2fab9005bfd193", 0x8a, 0x101}, {&(0x7f0000000480)="b064854ffbe90761fe4c7abf2a8dfa87e330d79360c6d64e489f3ea87be462c94fdf8280b6c8d790bf80a54130e0e4f7e8432cbc11329110c7b82231c6ff3f7eec33befdaddaa71cd38d54e633a24b1cad0bc36ba5ba2fc16a0887ae49d5d8ac10a641ef90d697964aee92452d3e875b49342dea3a30391264cfdec352700a51fbe2551d4c3c074e4e67e3ab60d1074fbb6ad76bbcfda9a6cad42c2e6ad2ebce7be5da66e7c5c994db0c1faaae7669d6e8f5d78f2f9c5c461bc314fe2d3651ce4839026dc95abab94a4519a6e6036947", 0xd0, 0x9}], 0x84008b, &(0x7f0000000600)={[{@shortname_mixed}, {@shortname_winnt}, {@utf8no}, {@iocharset={'iocharset', 0x3d, 'cp869'}}, {@nonumtail}], [{@context={'context', 0x3d, 'unconfined_u'}}, {@fowner_eq}, {@fowner_eq}, {@smackfsfloor}, {@func={'func', 0x3d, 'FILE_CHECK'}}, {@fsname={'fsname', 0x3d, '$*:{\xac'}}]}) getdents(r0, &(0x7f0000000340)=""/258, 0xfd4a) getdents64(0xffffffffffffffff, &(0x7f0000000240)=""/226, 0x20000258) r1 = openat(r0, &(0x7f0000000040)='./file0\x00', 0x121000, 0x11) r2 = accept$inet6(r1, &(0x7f00000006c0), &(0x7f0000000700)=0x1c) pwritev(r2, &(0x7f0000000a80)=[{&(0x7f0000000740)="16f006fbb0e29698e94167d438580fbf901992f70c7dabd078a860144ff56442bdd1e51693aa7866f17571a954c399a05c170c33856eee3c3dea961eff76efb142f34288952479de1fc82d42cda09547affb19f245de92372fc4809c362bca9e44450a346dcc4fe8668575", 0x6b}, {&(0x7f00000007c0)="12875a6880d603322fd7310d0ca2308f538ca0612f44b6a2c2947d229a7dbfebd6a47dea3bb04976c15d4d9964a85d0a496f573766c6", 0x36}, {&(0x7f0000000800)="004dd820aae20ed0fbad889016057ee43511328bc997dd9640b40e34feda163b2736251a6d2df129ada6a8a0c8e761637616ce51cb97b0391438a1527da4292b07ed23ba259c0636720e2bafe2edb6ebf64f74ddf24d851328094464e810d0c9b9ee0c782ae5254db04f78ba56da32634c60c0d12654dd99", 0x78}, {&(0x7f0000000880)="107b3b3939bc0209b928cc71272b42fd4fd14951a8254199914437a8a9cc42a833b93e49da93f76dab0126872438871b9f532ed71409b4b65f773060e5c3853757622772c8cd6868d7e56c14ef1d0e4f970616c2e99c256ed4c47933e2725861b83c40da9decd4dab4d7775dbebd5f8c30aa2990", 0x74}, {&(0x7f0000000900)="46b7768ade96851ae6c124a52106f1faaadf7f6b710877a5a905af00c452415b07916bf0fcb4b6ff17cf1e7e084cfb24f745372d6c678b0565e16f46228e9a5f6a4b64d32fd864a8ea0233850fdd61ee44a6df002e3cb8a5fc", 0x59}, {&(0x7f0000000980)="36bd317f1d153a707ed96de6ad11b5add1454bba3fcc7367aa3116fe4b21aadd9ba7e1a280c87f48a763d1174a1fb50dac643a3f2a758c4dc0e736c3ee6da9a08255ca9ab9208b6f9a94310a7585806d45b714a1349a9c983524f4a947882bf0987110bdd8b292a65cf33a298d164f36c56ffe4a1c8b97d0401f75dc182e63e0d2434076c87c26dad057adeef4652bb08e29db119717288812d33e8a65953daa2e17dbd76bf9b34d670e00b1a114c5cfa26e2872868984161f26458134d90602385835b67a4616ab36104dbcb0dd727b4fadb9c7d01ae1a103830e1f7fedd350aedf7d0931", 0xe5}], 0x6, 0x80000000, 0x2) 22:36:49 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}], 0x0, &(0x7f0000012c00)) (fail_nth: 33) 22:36:49 executing program 1: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x2, &(0x7f0000000000)=[{0x7c}, {0x6, 0x0, 0x0, 0x7fffffff}]}) openat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x800, 0x10e) r0 = syz_init_net_socket$802154_raw(0x24, 0x3, 0x0) ioctl$sock_inet_SIOCSIFADDR(r0, 0x8916, &(0x7f0000001180)={'bond0\x00', {0x2, 0x0, @local}}) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = fork() perf_event_open(&(0x7f0000001280)={0x0, 0x80, 0x5, 0x0, 0x1, 0x4, 0x0, 0xe41, 0x84000, 0x8, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x9, 0x0, @perf_config_ext={0x8000, 0x100}, 0x8000, 0xffffffff, 0x2476f094, 0x0, 0x7, 0x8001, 0xffff, 0x0, 0x1, 0x0, 0x10000}, r1, 0xb, 0xffffffffffffffff, 0x2) syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x0) 22:36:49 executing program 6: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff4655fe0f4655fe0f4655f00000000000004", 0x1b, 0x2100}], 0x0, &(0x7f0000012c00)) (fail_nth: 32) 22:36:49 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}], 0x0, &(0x7f0000012c00)) (fail_nth: 10) 22:36:49 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0x800}, {&(0x7f0000011600)="ed41000000080000dff4655fe0f4655fe0f4655f00000000000004", 0x1b, 0x2100}], 0x0, &(0x7f0000012c00)) [ 1617.108355] loop4: detected capacity change from 0 to 512 [ 1617.124761] EXT4-fs error (device loop4): __ext4_fill_super:5244: inode #2: comm syz-executor.4: iget: root inode unallocated [ 1617.129870] EXT4-fs (loop4): get root inode failed [ 1617.131010] EXT4-fs (loop4): mount failed [ 1617.134156] loop7: detected capacity change from 0 to 512 [ 1617.190966] loop5: detected capacity change from 0 to 1 [ 1617.198819] loop0: detected capacity change from 0 to 512 [ 1617.201554] loop6: detected capacity change from 0 to 512 [ 1617.208330] EXT4-fs error (device loop7): __ext4_fill_super:5244: inode #2: comm syz-executor.7: iget: root inode unallocated [ 1617.215475] EXT4-fs (loop0): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 1617.215624] EXT4-fs (loop7): get root inode failed [ 1617.216664] EXT4-fs (loop0): group descriptors corrupted! [ 1617.217344] EXT4-fs (loop7): mount failed [ 1617.219821] loop5: detected capacity change from 0 to 1 [ 1617.273548] EXT4-fs (loop6): corrupt root inode, run e2fsck [ 1617.274471] EXT4-fs (loop6): mount failed 22:36:49 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}], 0x0, &(0x7f0000012c00)) (fail_nth: 11) 22:36:49 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010400), 0x0, 0x800}, {&(0x7f0000011600)="ed41000000080000dff4655fe0f4655fe0f4655f00000000000004", 0x1b, 0x2100}], 0x0, &(0x7f0000012c00)) 22:36:49 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}], 0x0, &(0x7f0000012c00)) (fail_nth: 34) [ 1617.402145] loop3: detected capacity change from 0 to 512 22:36:49 executing program 6: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff4655fe0f4655fe0f4655f00000000000004", 0x1b, 0x2100}], 0x0, &(0x7f0000012c00)) (fail_nth: 33) 22:36:49 executing program 5: r0 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000340)='/sys/module/rfkill', 0x2a4002, 0x94) r1 = syz_open_dev$sg(&(0x7f0000000000), 0x1, 0x224280) r2 = openat$cgroup_devices(r0, &(0x7f0000000180)='devices.deny\x00', 0x2, 0x0) syz_io_uring_submit(0x0, 0x0, &(0x7f00000001c0)=@IORING_OP_SPLICE={0x1e, 0x4, 0x0, @fd=r0, 0x60a2, {0x0, r1}, 0x0, 0x7f96b6ee1792d164, 0x1, {0x0, 0x0, r2}}, 0x8) r3 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x0) r4 = dup2(r3, r3) bind$bt_l2cap(r4, &(0x7f0000000000)={0x1f, 0x0, @fixed={'\xaa\xaa\xaa\xaa\xaa', 0x10}}, 0xe) ioctl$TIOCGPTLCK(r4, 0x80045439, &(0x7f0000000200)) getdents(r0, &(0x7f0000000080)=""/247, 0xf7) getdents64(r0, &(0x7f0000000240)=""/226, 0x20000258) 22:36:49 executing program 7: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}], 0x0, &(0x7f0000012c00)) (fail_nth: 32) [ 1617.455169] loop0: detected capacity change from 0 to 512 [ 1617.459859] EXT4-fs error (device loop3): __ext4_fill_super:5244: inode #2: comm syz-executor.3: iget: root inode unallocated [ 1617.462001] EXT4-fs (loop3): get root inode failed [ 1617.462798] EXT4-fs (loop3): mount failed [ 1617.499634] EXT4-fs (loop0): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 1617.500880] EXT4-fs (loop0): group descriptors corrupted! [ 1617.549984] loop4: detected capacity change from 0 to 512 [ 1617.565208] loop6: detected capacity change from 0 to 512 [ 1617.592661] EXT4-fs error (device loop4): __ext4_fill_super:5244: inode #2: comm syz-executor.4: iget: root inode unallocated [ 1617.600663] EXT4-fs (loop4): get root inode failed [ 1617.601404] EXT4-fs (loop4): mount failed [ 1617.603913] loop7: detected capacity change from 0 to 512 [ 1617.608334] EXT4-fs (loop6): corrupt root inode, run e2fsck [ 1617.609271] EXT4-fs (loop6): mount failed [ 1617.647664] EXT4-fs error (device loop7): __ext4_fill_super:5244: inode #2: comm syz-executor.7: iget: root inode unallocated [ 1617.657160] EXT4-fs (loop7): get root inode failed [ 1617.657913] EXT4-fs (loop7): mount failed 22:37:04 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}], 0x0, &(0x7f0000012c00)) (fail_nth: 12) 22:37:04 executing program 1: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x2, &(0x7f0000000000)=[{0x7c}, {0x6, 0x0, 0x0, 0x7fffffff}]}) openat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x800, 0x10e) r0 = syz_init_net_socket$802154_raw(0x24, 0x3, 0x0) ioctl$sock_inet_SIOCSIFADDR(r0, 0x8916, &(0x7f0000001180)={'bond0\x00', {0x2, 0x0, @local}}) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = fork() perf_event_open(&(0x7f0000001280)={0x0, 0x80, 0x5, 0x0, 0x1, 0x4, 0x0, 0xe41, 0x84000, 0x8, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x9, 0x0, @perf_config_ext={0x8000, 0x100}, 0x8000, 0xffffffff, 0x2476f094, 0x0, 0x7, 0x8001, 0xffff, 0x0, 0x1, 0x0, 0x10000}, r1, 0xb, 0xffffffffffffffff, 0x2) syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x0) 22:37:04 executing program 2: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x2, &(0x7f0000000000)=[{0x7c}, {0x6, 0x0, 0x0, 0x7fffffff}]}) openat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x800, 0x10e) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = fork() perf_event_open(&(0x7f0000001280)={0x0, 0x80, 0x5, 0x0, 0x1, 0x4, 0x0, 0xe41, 0x84000, 0x8, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x9, 0x0, @perf_config_ext={0x8000, 0x100}, 0x8000, 0xffffffff, 0x2476f094, 0x0, 0x7, 0x8001, 0xffff, 0x0, 0x1, 0x0, 0x10000}, r0, 0xb, 0xffffffffffffffff, 0x2) syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x0) 22:37:04 executing program 7: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}], 0x0, &(0x7f0000012c00)) (fail_nth: 33) 22:37:04 executing program 5: r0 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000040)='/sys/kernel/slab', 0x0, 0x0) getdents(r0, &(0x7f0000000080)=""/247, 0xf7) r1 = open$dir(&(0x7f0000000200)='./file0\x00', 0x101040, 0x20) getdents(r1, &(0x7f0000000340)=""/170, 0xaa) getdents64(r0, &(0x7f0000000240)=""/226, 0x20000258) r2 = syz_open_dev$mouse(&(0x7f0000000000), 0x88b, 0x1) getdents(r2, &(0x7f00000001c0)=""/22, 0x16) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(r0, 0xc018937c, &(0x7f0000000180)={{0x1, 0x1, 0x18, r2, {0x4}}, './file0\x00'}) dup(0xffffffffffffffff) 22:37:04 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010400), 0x0, 0x800}, {&(0x7f0000011600)="ed41000000080000dff4655fe0f4655fe0f4655f00000000000004", 0x1b, 0x2100}], 0x0, &(0x7f0000012c00)) 22:37:04 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}], 0x0, &(0x7f0000012c00)) (fail_nth: 35) 22:37:04 executing program 6: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff4655fe0f4655fe0f4655f00000000000004", 0x1b, 0x2100}], 0x0, &(0x7f0000012c00)) (fail_nth: 34) [ 1632.031072] loop0: detected capacity change from 0 to 512 [ 1632.040969] EXT4-fs (loop0): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 1632.042499] EXT4-fs (loop0): group descriptors corrupted! [ 1632.048714] loop7: detected capacity change from 0 to 512 [ 1632.094358] EXT4-fs error (device loop7): __ext4_fill_super:5244: inode #2: comm syz-executor.7: iget: root inode unallocated [ 1632.096391] EXT4-fs (loop7): get root inode failed [ 1632.096919] EXT4-fs (loop7): mount failed 22:37:04 executing program 5: r0 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000040)='/sys/kernel/slab', 0x0, 0x0) getdents(r0, &(0x7f0000000080)=""/247, 0xf7) r1 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x0) r2 = dup2(r1, r1) getsockopt$SO_TIMESTAMPING(r2, 0x1, 0x25, &(0x7f00000001c0), &(0x7f0000000180)=0x4) getdents64(r0, &(0x7f0000000240)=""/226, 0x20000258) [ 1632.130482] loop6: detected capacity change from 0 to 512 [ 1632.140124] loop4: detected capacity change from 0 to 512 22:37:04 executing program 7: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}], 0x0, &(0x7f0000012c00)) (fail_nth: 34) [ 1632.189806] EXT4-fs error (device loop4): __ext4_fill_super:5244: inode #2: comm syz-executor.4: iget: root inode unallocated [ 1632.192034] EXT4-fs (loop6): corrupt root inode, run e2fsck [ 1632.207901] EXT4-fs (loop6): mount failed 22:37:04 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}], 0x0, &(0x7f0000012c00)) (fail_nth: 13) [ 1632.210093] EXT4-fs (loop4): get root inode failed [ 1632.211037] EXT4-fs (loop4): mount failed 22:37:04 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010400), 0x0, 0x800}, {&(0x7f0000011600)="ed41000000080000dff4655fe0f4655fe0f4655f00000000000004", 0x1b, 0x2100}], 0x0, &(0x7f0000012c00)) [ 1632.293121] loop7: detected capacity change from 0 to 512 [ 1632.324080] EXT4-fs error (device loop7): __ext4_fill_super:5244: inode #2: comm syz-executor.7: iget: root inode unallocated [ 1632.325309] EXT4-fs (loop7): get root inode failed [ 1632.325688] EXT4-fs (loop7): mount failed [ 1632.351027] loop3: detected capacity change from 0 to 512 22:37:04 executing program 6: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff4655fe0f4655fe0f4655f00000000000004", 0x1b, 0x2100}], 0x0, &(0x7f0000012c00)) (fail_nth: 35) [ 1632.376229] EXT4-fs error (device loop3): __ext4_fill_super:5244: inode #2: comm syz-executor.3: iget: root inode unallocated [ 1632.379623] EXT4-fs (loop3): get root inode failed [ 1632.380009] EXT4-fs (loop3): mount failed 22:37:04 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}], 0x0, &(0x7f0000012c00)) (fail_nth: 36) 22:37:04 executing program 7: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}], 0x0, &(0x7f0000012c00)) (fail_nth: 35) 22:37:04 executing program 5: r0 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000040)='/sys/kernel/slab', 0x0, 0x0) r1 = syz_init_net_socket$bt_l2cap(0x1f, 0x5, 0x0) r2 = dup2(r1, r1) bind$bt_l2cap(r2, &(0x7f0000000000)={0x1f, 0x0, @fixed={'\xaa\xaa\xaa\xaa\xaa', 0x10}}, 0xe) fallocate(r2, 0x0, 0x7, 0x100000000) getdents(r0, &(0x7f0000000080)=""/247, 0xf7) getdents64(r0, &(0x7f0000000240)=""/226, 0x20000258) [ 1632.418863] loop0: detected capacity change from 0 to 512 [ 1632.439210] EXT4-fs (loop0): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 1632.440637] EXT4-fs (loop0): group descriptors corrupted! [ 1632.516915] loop6: detected capacity change from 0 to 512 [ 1632.518001] loop4: detected capacity change from 0 to 512 [ 1632.536751] loop7: detected capacity change from 0 to 512 [ 1632.539364] EXT4-fs (loop6): corrupt root inode, run e2fsck [ 1632.540452] EXT4-fs (loop6): mount failed [ 1632.553533] EXT4-fs error (device loop4): __ext4_fill_super:5244: inode #2: comm syz-executor.4: iget: root inode unallocated [ 1632.557669] EXT4-fs (loop4): get root inode failed [ 1632.558061] EXT4-fs (loop4): mount failed [ 1632.566551] EXT4-fs error (device loop7): __ext4_fill_super:5244: inode #2: comm syz-executor.7: iget: root inode unallocated [ 1632.569134] EXT4-fs (loop7): get root inode failed [ 1632.570146] EXT4-fs (loop7): mount failed 22:37:18 executing program 2: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x2, &(0x7f0000000000)=[{0x7c}, {0x6, 0x0, 0x0, 0x7fffffff}]}) openat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x800, 0x10e) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = fork() perf_event_open(&(0x7f0000001280)={0x0, 0x80, 0x5, 0x0, 0x1, 0x4, 0x0, 0xe41, 0x84000, 0x8, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x9, 0x0, @perf_config_ext={0x8000, 0x100}, 0x8000, 0xffffffff, 0x2476f094, 0x0, 0x7, 0x8001, 0xffff, 0x0, 0x1, 0x0, 0x10000}, r0, 0xb, 0xffffffffffffffff, 0x2) syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x0) 22:37:18 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}], 0x0, &(0x7f0000012c00)) (fail_nth: 14) 22:37:18 executing program 1: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x2, &(0x7f0000000000)=[{0x7c}, {0x6, 0x0, 0x0, 0x7fffffff}]}) openat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x800, 0x10e) r0 = syz_init_net_socket$802154_raw(0x24, 0x3, 0x0) ioctl$sock_inet_SIOCSIFADDR(r0, 0x8916, &(0x7f0000001180)={'bond0\x00', {0x2, 0x0, @local}}) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = fork() perf_event_open(&(0x7f0000001280)={0x0, 0x80, 0x5, 0x0, 0x1, 0x4, 0x0, 0xe41, 0x84000, 0x8, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x9, 0x0, @perf_config_ext={0x8000, 0x100}, 0x8000, 0xffffffff, 0x2476f094, 0x0, 0x7, 0x8001, 0xffff, 0x0, 0x1, 0x0, 0x10000}, r1, 0xb, 0xffffffffffffffff, 0x2) syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x0) 22:37:18 executing program 5: stat(&(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)) r0 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000040)='/sys/kernel/slab', 0x0, 0x0) getdents(r0, &(0x7f0000000080)=""/247, 0xf7) getdents64(r0, &(0x7f0000000240)=""/226, 0x20000258) r1 = syz_open_dev$vcsu(&(0x7f0000000000), 0x7, 0x131a00) ioctl$BTRFS_IOC_SCRUB(r1, 0xc400941b, &(0x7f0000000340)={0x0, 0x0, 0x4, 0x1}) [ 1645.867031] loop7: detected capacity change from 0 to 512 22:37:18 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010400)="0200000003", 0x5, 0x800}, {&(0x7f0000011600)="ed41000000080000dff4655fe0f4655fe0f4655f00000000000004", 0x1b, 0x2100}], 0x0, &(0x7f0000012c00)) 22:37:18 executing program 6: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff4655fe0f4655fe0f4655f00000000000004", 0x1b, 0x2100}], 0x0, &(0x7f0000012c00)) (fail_nth: 36) 22:37:18 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}], 0x0, &(0x7f0000012c00)) (fail_nth: 37) 22:37:18 executing program 7: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}], 0x0, &(0x7f0000012c00)) (fail_nth: 36) [ 1645.869994] loop6: detected capacity change from 0 to 512 [ 1645.882242] loop0: detected capacity change from 0 to 512 [ 1645.882295] EXT4-fs (loop6): corrupt root inode, run e2fsck [ 1645.883560] EXT4-fs (loop6): mount failed [ 1645.898796] EXT4-fs error (device loop7): __ext4_fill_super:5244: inode #2: comm syz-executor.7: iget: root inode unallocated [ 1645.903752] EXT4-fs (loop7): get root inode failed [ 1645.904278] EXT4-fs (loop7): mount failed [ 1645.905408] EXT4-fs (loop0): ext4_check_descriptors: Inode table for group 0 overlaps superblock [ 1645.907001] EXT4-fs (loop0): group descriptors corrupted! [ 1645.920091] loop4: detected capacity change from 0 to 512 [ 1645.925970] loop3: detected capacity change from 0 to 512 22:37:18 executing program 5: r0 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000040)='/sys/kernel/slab', 0x0, 0x0) fcntl$dupfd(r0, 0x406, r0) getdents(r0, &(0x7f0000000080)=""/247, 0xf7) getdents64(r0, &(0x7f0000000240)=""/226, 0x20000258) r1 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x0) r2 = dup2(r1, r1) openat(r2, &(0x7f0000000180)='./file0\x00', 0x8081, 0x4) bind$bt_l2cap(r2, &(0x7f0000000000)={0x1f, 0x0, @fixed={'\xaa\xaa\xaa\xaa\xaa', 0x10}}, 0xe) openat(r2, &(0x7f0000000000)='./file0\x00', 0x80, 0x10) [ 1645.942723] EXT4-fs (loop3): VFS: Can't find ext4 filesystem [ 1646.009724] EXT4-fs error (device loop4): __ext4_fill_super:5244: inode #2: comm syz-executor.4: iget: root inode unallocated [ 1646.012478] EXT4-fs (loop4): get root inode failed [ 1646.013432] EXT4-fs (loop4): mount failed 22:37:18 executing program 6: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff4655fe0f4655fe0f4655f00000000000004", 0x1b, 0x2100}], 0x0, &(0x7f0000012c00)) (fail_nth: 37) 22:37:18 executing program 7: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}], 0x0, &(0x7f0000012c00)) (fail_nth: 37) 22:37:18 executing program 5: r0 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000040)='/sys/kernel/slab', 0x0, 0x0) getdents(r0, &(0x7f0000000080)=""/247, 0xf7) getdents64(r0, &(0x7f0000000240)=""/226, 0x20000258) r1 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x0) r2 = dup2(r1, r1) bind$bt_l2cap(r2, &(0x7f0000000000)={0x1f, 0x0, @fixed={'\xaa\xaa\xaa\xaa\xaa', 0x10}}, 0xe) openat(r2, &(0x7f0000000000)='./file0\x00', 0x400000, 0x100) 22:37:18 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010400)="0200000003", 0x5, 0x800}, {&(0x7f0000011600)="ed41000000080000dff4655fe0f4655fe0f4655f00000000000004", 0x1b, 0x2100}], 0x0, &(0x7f0000012c00)) 22:37:18 executing program 2: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x2, &(0x7f0000000000)=[{0x7c}, {0x6, 0x0, 0x0, 0x7fffffff}]}) syz_init_net_socket$802154_raw(0x24, 0x3, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = fork() perf_event_open(&(0x7f0000001280)={0x0, 0x80, 0x5, 0x0, 0x1, 0x4, 0x0, 0xe41, 0x84000, 0x8, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x9, 0x0, @perf_config_ext={0x8000, 0x100}, 0x8000, 0xffffffff, 0x2476f094, 0x0, 0x7, 0x8001, 0xffff, 0x0, 0x1, 0x0, 0x10000}, r0, 0xb, 0xffffffffffffffff, 0x2) syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x0) 22:37:18 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}], 0x0, &(0x7f0000012c00)) (fail_nth: 15) [ 1646.175876] loop0: detected capacity change from 0 to 512 22:37:18 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}], 0x0, &(0x7f0000012c00)) (fail_nth: 38) [ 1646.194945] EXT4-fs (loop0): ext4_check_descriptors: Inode table for group 0 overlaps superblock [ 1646.195696] EXT4-fs (loop0): group descriptors corrupted! [ 1646.234716] loop7: detected capacity change from 0 to 512 [ 1646.248367] loop6: detected capacity change from 0 to 512 22:37:18 executing program 5: r0 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000040)='/sys/kernel/slab', 0x0, 0x10) getdents(r0, &(0x7f0000000080)=""/247, 0xf7) getdents64(r0, &(0x7f0000000240)=""/226, 0x20000258) 22:37:18 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010400)="0200000003", 0x5, 0x800}, {&(0x7f0000011600)="ed41000000080000dff4655fe0f4655fe0f4655f00000000000004", 0x1b, 0x2100}], 0x0, &(0x7f0000012c00)) [ 1646.280243] EXT4-fs error (device loop7): __ext4_fill_super:5244: inode #2: comm syz-executor.7: iget: root inode unallocated [ 1646.283039] EXT4-fs (loop7): get root inode failed [ 1646.283778] EXT4-fs (loop7): mount failed [ 1646.285173] EXT4-fs (loop6): corrupt root inode, run e2fsck [ 1646.286117] EXT4-fs (loop6): mount failed [ 1646.297479] FAULT_INJECTION: forcing a failure. [ 1646.297479] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 1646.298407] CPU: 1 PID: 13949 Comm: syz-executor.3 Not tainted 6.0.0-rc3-next-20220829 #1 [ 1646.299042] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS rel-1.14.0-0-g155821a1990b-prebuilt.qemu.org 04/01/2014 [ 1646.299922] Call Trace: [ 1646.300130] [ 1646.300321] dump_stack_lvl+0x8b/0xb3 [ 1646.300639] should_fail.cold+0x5/0xa [ 1646.300948] ? lockdep_hardirqs_on+0x79/0x100 [ 1646.301312] copyin+0x19/0x120 [ 1646.301591] copy_page_from_iter_atomic+0x416/0x16b0 [ 1646.302012] ? ktime_get_coarse_real_ts64+0x159/0x190 [ 1646.302439] ? iov_iter_zero+0x15a0/0x15a0 [ 1646.302786] ? fault_in_subpage_writeable+0x20/0x20 [ 1646.303186] ? ktime_get_coarse_real_ts64+0x159/0x190 [ 1646.303598] ? ktime_get_coarse_real_ts64+0xe0/0x190 [ 1646.304013] ? shmem_write_begin+0xfd/0x1e0 [ 1646.304357] ? shmem_write_begin+0x106/0x1e0 [ 1646.304721] generic_perform_write+0x2bf/0x570 [ 1646.305102] ? generic_file_readonly_mmap+0x1b0/0x1b0 [ 1646.305522] ? new_inode+0x1e0/0x1e0 [ 1646.305824] ? generic_write_checks+0x2bc/0x400 [ 1646.306217] __generic_file_write_iter+0x2da/0x480 [ 1646.306613] generic_file_write_iter+0xe3/0x350 [ 1646.306987] vfs_write+0x9c3/0xd90 [ 1646.307298] ? __ia32_sys_pread64+0x220/0x220 [ 1646.307693] __x64_sys_pwrite64+0x1fb/0x260 [ 1646.308038] ? vfs_write+0xd90/0xd90 [ 1646.308350] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1646.308759] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1646.309186] do_syscall_64+0x3b/0x90 [ 1646.309483] entry_SYSCALL_64_after_hwframe+0x63/0xcd [ 1646.309892] RIP: 0033:0x7f0314a14ab7 [ 1646.310186] Code: 08 89 3c 24 48 89 4c 24 18 e8 e5 f8 ff ff 4c 8b 54 24 18 48 8b 54 24 10 41 89 c0 48 8b 74 24 08 8b 3c 24 b8 12 00 00 00 0f 05 <48> 3d 00 f0 ff ff 77 31 44 89 c7 48 89 04 24 e8 15 f9 ff ff 48 8b [ 1646.311593] RSP: 002b:00007f0311fd6f20 EFLAGS: 00000293 ORIG_RAX: 0000000000000012 [ 1646.312174] RAX: ffffffffffffffda RBX: 00007f0314aab970 RCX: 00007f0314a14ab7 [ 1646.312719] RDX: 000000000000003a RSI: 0000000020010000 RDI: 0000000000000004 [ 1646.313264] RBP: 0000000000000002 R08: 0000000000000000 R09: ffffffffffffffff [ 1646.313807] R10: 0000000000000400 R11: 0000000000000293 R12: 0000000000000004 [ 1646.314344] R13: 0000000000000004 R14: 0000000020000200 R15: 0000000000000000 [ 1646.314905] [ 1646.326342] loop4: detected capacity change from 0 to 512 [ 1646.359463] loop0: detected capacity change from 0 to 512 [ 1646.370409] EXT4-fs error (device loop4): __ext4_fill_super:5244: inode #2: comm syz-executor.4: iget: root inode unallocated [ 1646.382193] EXT4-fs (loop4): get root inode failed [ 1646.382962] EXT4-fs (loop4): mount failed [ 1646.394869] EXT4-fs (loop0): ext4_check_descriptors: Inode table for group 0 overlaps superblock [ 1646.396239] EXT4-fs (loop0): group descriptors corrupted! [ 1646.407020] loop3: detected capacity change from 0 to 512 [ 1646.435930] EXT4-fs error (device loop3): __ext4_fill_super:5244: inode #2: comm syz-executor.3: iget: root inode unallocated [ 1646.442037] EXT4-fs (loop3): get root inode failed [ 1646.442445] EXT4-fs (loop3): mount failed [ 1660.143823] FAULT_INJECTION: forcing a failure. [ 1660.143823] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 1660.144827] CPU: 0 PID: 13972 Comm: syz-executor.3 Not tainted 6.0.0-rc3-next-20220829 #1 [ 1660.145390] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS rel-1.14.0-0-g155821a1990b-prebuilt.qemu.org 04/01/2014 [ 1660.146165] Call Trace: [ 1660.146355] [ 1660.146523] dump_stack_lvl+0x8b/0xb3 [ 1660.146810] should_fail.cold+0x5/0xa [ 1660.147088] copyin+0x19/0x120 [ 1660.147346] copy_page_from_iter_atomic+0x416/0x16b0 [ 1660.147727] ? ktime_get_coarse_real_ts64+0x159/0x190 [ 1660.148094] ? iov_iter_zero+0x15a0/0x15a0 [ 1660.148409] ? fault_in_subpage_writeable+0x20/0x20 [ 1660.148766] ? ktime_get_coarse_real_ts64+0x159/0x190 [ 1660.149131] ? ktime_get_coarse_real_ts64+0xc2/0x190 [ 1660.149494] ? shmem_write_begin+0xfd/0x1e0 [ 1660.149842] ? shmem_write_begin+0x106/0x1e0 [ 1660.150168] generic_perform_write+0x2bf/0x570 [ 1660.150508] ? generic_file_readonly_mmap+0x1b0/0x1b0 [ 1660.150881] ? new_inode+0x1e0/0x1e0 [ 1660.151153] ? generic_write_checks+0x2bc/0x400 [ 1660.151520] __generic_file_write_iter+0x2da/0x480 [ 1660.151872] generic_file_write_iter+0xe3/0x350 [ 1660.152203] vfs_write+0x9c3/0xd90 [ 1660.152470] ? __ia32_sys_pread64+0x220/0x220 [ 1660.152826] __x64_sys_pwrite64+0x1fb/0x260 [ 1660.153175] ? vfs_write+0xd90/0xd90 [ 1660.153482] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1660.153856] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1660.154227] do_syscall_64+0x3b/0x90 [ 1660.154494] entry_SYSCALL_64_after_hwframe+0x63/0xcd [ 1660.154859] RIP: 0033:0x7f0314a14ab7 [ 1660.155155] Code: 08 89 3c 24 48 89 4c 24 18 e8 e5 f8 ff ff 4c 8b 54 24 18 48 8b 54 24 10 41 89 c0 48 8b 74 24 08 8b 3c 24 b8 12 00 00 00 0f 05 <48> 3d 00 f0 ff ff 77 31 44 89 c7 48 89 04 24 e8 15 f9 ff ff 48 8b [ 1660.156392] RSP: 002b:00007f0311fd6f20 EFLAGS: 00000293 ORIG_RAX: 0000000000000012 [ 1660.156928] RAX: ffffffffffffffda RBX: 00007f0314aab970 RCX: 00007f0314a14ab7 [ 1660.157418] RDX: 0000000000000009 RSI: 0000000020010400 RDI: 0000000000000004 [ 1660.157911] RBP: 0000000000000002 R08: 0000000000000000 R09: ffffffffffffffff [ 1660.158398] R10: 0000000000000800 R11: 0000000000000293 R12: 0000000000000004 [ 1660.158887] R13: 0000000000000004 R14: 0000000020000218 R15: 0000000000000001 [ 1660.159407] [ 1660.160465] loop6: detected capacity change from 0 to 512 22:37:32 executing program 7: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}], 0x0, &(0x7f0000012c00)) (fail_nth: 38) 22:37:32 executing program 2: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x2, &(0x7f0000000000)=[{0x7c}, {0x6, 0x0, 0x0, 0x7fffffff}]}) syz_init_net_socket$802154_raw(0x24, 0x3, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = fork() perf_event_open(&(0x7f0000001280)={0x0, 0x80, 0x5, 0x0, 0x1, 0x4, 0x0, 0xe41, 0x84000, 0x8, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x9, 0x0, @perf_config_ext={0x8000, 0x100}, 0x8000, 0xffffffff, 0x2476f094, 0x0, 0x7, 0x8001, 0xffff, 0x0, 0x1, 0x0, 0x10000}, r0, 0xb, 0xffffffffffffffff, 0x2) syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x0) 22:37:32 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}], 0x0, &(0x7f0000012c00)) (fail_nth: 16) 22:37:32 executing program 5: r0 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000040)='/sys/kernel/slab', 0x0, 0x0) getdents(r0, &(0x7f0000000080)=""/236, 0xec) getdents64(r0, &(0x7f0000000240)=""/226, 0x20000258) 22:37:32 executing program 6: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff4655fe0f4655fe0f4655f00000000000004", 0x1b, 0x2100}], 0x0, &(0x7f0000012c00)) (fail_nth: 38) 22:37:32 executing program 1: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x2, &(0x7f0000000000)=[{0x7c}, {0x6, 0x0, 0x0, 0x7fffffff}]}) openat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x800, 0x10e) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = fork() perf_event_open(&(0x7f0000001280)={0x0, 0x80, 0x5, 0x0, 0x1, 0x4, 0x0, 0xe41, 0x84000, 0x8, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x9, 0x0, @perf_config_ext={0x8000, 0x100}, 0x8000, 0xffffffff, 0x2476f094, 0x0, 0x7, 0x8001, 0xffff, 0x0, 0x1, 0x0, 0x10000}, r0, 0xb, 0xffffffffffffffff, 0x2) syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x0) 22:37:32 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}], 0x0, &(0x7f0000012c00)) (fail_nth: 39) 22:37:32 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010400)="02000000030000", 0x7, 0x800}, {&(0x7f0000011600)="ed41000000080000dff4655fe0f4655fe0f4655f00000000000004", 0x1b, 0x2100}], 0x0, &(0x7f0000012c00)) [ 1660.165395] loop3: detected capacity change from 0 to 512 [ 1660.184075] loop7: detected capacity change from 0 to 512 [ 1660.184608] EXT4-fs (loop6): corrupt root inode, run e2fsck [ 1660.185442] EXT4-fs (loop6): mount failed [ 1660.186405] EXT4-fs error (device loop3): __ext4_fill_super:5244: inode #2: comm syz-executor.3: iget: root inode unallocated [ 1660.200911] loop0: detected capacity change from 0 to 512 [ 1660.203157] EXT4-fs (loop3): get root inode failed [ 1660.203510] EXT4-fs (loop3): mount failed [ 1660.206171] loop4: detected capacity change from 0 to 512 [ 1660.218038] EXT4-fs error (device loop7): __ext4_fill_super:5244: inode #2: comm syz-executor.7: iget: root inode unallocated [ 1660.219040] EXT4-fs (loop7): get root inode failed [ 1660.219393] EXT4-fs (loop7): mount failed [ 1660.243317] EXT4-fs (loop0): ext4_check_descriptors: Inode table for group 0 overlaps superblock [ 1660.244819] EXT4-fs (loop0): group descriptors corrupted! 22:37:32 executing program 6: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff4655fe0f4655fe0f4655f00000000000004", 0x1b, 0x2100}], 0x0, &(0x7f0000012c00)) (fail_nth: 39) [ 1660.273235] EXT4-fs error (device loop4): __ext4_fill_super:5244: inode #2: comm syz-executor.4: iget: root inode unallocated [ 1660.274628] EXT4-fs (loop4): get root inode failed [ 1660.275115] EXT4-fs (loop4): mount failed 22:37:32 executing program 5: r0 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000040)='/sys/kernel/slab', 0x0, 0x0) getdents(r0, &(0x7f0000000340)=""/261, 0x105) getdents64(r0, &(0x7f0000000240)=""/226, 0x20000258) [ 1660.312439] loop6: detected capacity change from 0 to 512 22:37:32 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}], 0x0, &(0x7f0000012c00)) (fail_nth: 40) [ 1660.358679] EXT4-fs (loop6): corrupt root inode, run e2fsck [ 1660.360322] loop4: detected capacity change from 0 to 512 [ 1660.364993] FAULT_INJECTION: forcing a failure. [ 1660.364993] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 1660.366175] CPU: 0 PID: 13999 Comm: syz-executor.4 Not tainted 6.0.0-rc3-next-20220829 #1 [ 1660.366992] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS rel-1.14.0-0-g155821a1990b-prebuilt.qemu.org 04/01/2014 [ 1660.368119] Call Trace: [ 1660.368344] [ 1660.368568] dump_stack_lvl+0x8b/0xb3 [ 1660.368641] EXT4-fs (loop6): mount failed [ 1660.368962] should_fail.cold+0x5/0xa [ 1660.370008] strncpy_from_user+0x34/0x3e0 [ 1660.370446] getname_flags.part.0+0x95/0x4f0 [ 1660.370889] __x64_sys_mkdir+0xda/0x140 [ 1660.371299] do_syscall_64+0x3b/0x90 [ 1660.371674] entry_SYSCALL_64_after_hwframe+0x63/0xcd [ 1660.372200] RIP: 0033:0x7f499df9fc27 [ 1660.372577] Code: 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 83 c8 ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 b8 53 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1660.374375] RSP: 002b:00007f499b515fa8 EFLAGS: 00000213 ORIG_RAX: 0000000000000053 [ 1660.375133] RAX: ffffffffffffffda RBX: 0000000020000200 RCX: 00007f499df9fc27 [ 1660.375849] RDX: 0000000000000004 RSI: 00000000000001ff RDI: 0000000020000100 [ 1660.376553] RBP: 00007f499b516040 R08: 0000000000000000 R09: ffffffffffffffff [ 1660.377262] R10: 0000000000000000 R11: 0000000000000213 R12: 0000000020000000 [ 1660.377972] R13: 0000000020000100 R14: 00007f499b516000 R15: 0000000020012c00 [ 1660.378696] 22:37:32 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}], 0x0, &(0x7f0000012c00)) (fail_nth: 17) 22:37:32 executing program 7: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}], 0x0, &(0x7f0000012c00)) (fail_nth: 39) 22:37:32 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010400)="02000000030000", 0x7, 0x800}, {&(0x7f0000011600)="ed41000000080000dff4655fe0f4655fe0f4655f00000000000004", 0x1b, 0x2100}], 0x0, &(0x7f0000012c00)) [ 1660.474151] loop7: detected capacity change from 0 to 512 22:37:32 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}], 0x0, &(0x7f0000012c00)) (fail_nth: 41) [ 1660.500333] EXT4-fs error (device loop7): __ext4_fill_super:5244: inode #2: comm syz-executor.7: iget: root inode unallocated [ 1660.502749] EXT4-fs (loop7): get root inode failed [ 1660.503253] EXT4-fs (loop7): mount failed [ 1660.505885] loop0: detected capacity change from 0 to 512 [ 1660.526347] EXT4-fs (loop0): ext4_check_descriptors: Inode table for group 0 overlaps superblock [ 1660.527829] EXT4-fs (loop0): group descriptors corrupted! [ 1660.581305] loop4: detected capacity change from 0 to 512 [ 1660.617388] EXT4-fs error (device loop4): __ext4_fill_super:5244: inode #2: comm syz-executor.4: iget: root inode unallocated [ 1660.619738] EXT4-fs (loop4): get root inode failed [ 1660.620552] EXT4-fs (loop4): mount failed 22:37:47 executing program 6: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff4655fe0f4655fe0f4655f00000000000004", 0x1b, 0x2100}], 0x0, &(0x7f0000012c00)) (fail_nth: 40) 22:37:47 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}], 0x0, &(0x7f0000012c00)) (fail_nth: 42) 22:37:47 executing program 2: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x2, &(0x7f0000000000)=[{0x7c}, {0x6, 0x0, 0x0, 0x7fffffff}]}) syz_init_net_socket$802154_raw(0x24, 0x3, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = fork() perf_event_open(&(0x7f0000001280)={0x0, 0x80, 0x5, 0x0, 0x1, 0x4, 0x0, 0xe41, 0x84000, 0x8, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x9, 0x0, @perf_config_ext={0x8000, 0x100}, 0x8000, 0xffffffff, 0x2476f094, 0x0, 0x7, 0x8001, 0xffff, 0x0, 0x1, 0x0, 0x10000}, r0, 0xb, 0xffffffffffffffff, 0x2) syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x0) 22:37:47 executing program 7: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}], 0x0, &(0x7f0000012c00)) (fail_nth: 40) 22:37:47 executing program 5: r0 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000040)='/sys/kernel/slab', 0x214000, 0x0) getdents(r0, &(0x7f0000000080)=""/247, 0xf7) getdents64(r0, &(0x7f0000000240)=""/226, 0x20000258) 22:37:48 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}], 0x0, &(0x7f0000012c00)) (fail_nth: 18) 22:37:48 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010400)="02000000030000", 0x7, 0x800}, {&(0x7f0000011600)="ed41000000080000dff4655fe0f4655fe0f4655f00000000000004", 0x1b, 0x2100}], 0x0, &(0x7f0000012c00)) 22:37:48 executing program 1: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x2, &(0x7f0000000000)=[{0x7c}, {0x6, 0x0, 0x0, 0x7fffffff}]}) syz_init_net_socket$802154_raw(0x24, 0x3, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = fork() perf_event_open(&(0x7f0000001280)={0x0, 0x80, 0x5, 0x0, 0x1, 0x4, 0x0, 0xe41, 0x84000, 0x8, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x9, 0x0, @perf_config_ext={0x8000, 0x100}, 0x8000, 0xffffffff, 0x2476f094, 0x0, 0x7, 0x8001, 0xffff, 0x0, 0x1, 0x0, 0x10000}, r0, 0xb, 0xffffffffffffffff, 0x2) syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x0) [ 1675.686334] loop3: detected capacity change from 0 to 512 [ 1675.689989] loop6: detected capacity change from 0 to 512 [ 1675.691961] loop7: detected capacity change from 0 to 512 [ 1675.692538] FAULT_INJECTION: forcing a failure. [ 1675.692538] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 1675.693633] CPU: 0 PID: 14034 Comm: syz-executor.7 Not tainted 6.0.0-rc3-next-20220829 #1 [ 1675.694389] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS rel-1.14.0-0-g155821a1990b-prebuilt.qemu.org 04/01/2014 [ 1675.695422] Call Trace: [ 1675.695668] [ 1675.695880] dump_stack_lvl+0x8b/0xb3 [ 1675.696246] should_fail.cold+0x5/0xa [ 1675.696609] strncpy_from_user+0x34/0x3e0 [ 1675.697009] getname_flags.part.0+0x95/0x4f0 [ 1675.697431] __x64_sys_mkdir+0xda/0x140 [ 1675.697798] do_syscall_64+0x3b/0x90 [ 1675.698153] entry_SYSCALL_64_after_hwframe+0x63/0xcd [ 1675.698630] RIP: 0033:0x7fb036d73c27 [ 1675.698977] Code: 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 83 c8 ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 b8 53 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1675.700600] RSP: 002b:00007fb0342e9fa8 EFLAGS: 00000213 ORIG_RAX: 0000000000000053 [ 1675.701276] RAX: ffffffffffffffda RBX: 0000000020000200 RCX: 00007fb036d73c27 [ 1675.701918] RDX: 0000000000000004 RSI: 00000000000001ff RDI: 0000000020000100 [ 1675.702563] RBP: 00007fb0342ea040 R08: 0000000000000000 R09: ffffffffffffffff [ 1675.703200] R10: 0000000000000000 R11: 0000000000000213 R12: 0000000020000000 [ 1675.703851] R13: 0000000020000100 R14: 00007fb0342ea000 R15: 0000000020012c00 [ 1675.704505] [ 1675.717788] loop4: detected capacity change from 0 to 512 [ 1675.726129] EXT4-fs error (device loop3): __ext4_fill_super:5244: inode #2: comm syz-executor.3: iget: root inode unallocated [ 1675.730046] EXT4-fs (loop6): corrupt root inode, run e2fsck [ 1675.730725] loop0: detected capacity change from 0 to 512 [ 1675.730773] EXT4-fs (loop6): mount failed [ 1675.735802] EXT4-fs (loop3): get root inode failed [ 1675.736266] EXT4-fs (loop3): mount failed [ 1675.752853] EXT4-fs (loop0): ext4_check_descriptors: Inode table for group 0 overlaps superblock [ 1675.752906] EXT4-fs error (device loop4): __ext4_fill_super:5244: inode #2: comm syz-executor.4: iget: root inode unallocated [ 1675.754375] EXT4-fs (loop0): group descriptors corrupted! [ 1675.758506] EXT4-fs (loop4): get root inode failed [ 1675.759287] EXT4-fs (loop4): mount failed 22:37:48 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}], 0x0, &(0x7f0000012c00)) (fail_nth: 19) 22:37:48 executing program 6: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff4655fe0f4655fe0f4655f00000000000004", 0x1b, 0x2100}], 0x0, &(0x7f0000012c00)) (fail_nth: 41) 22:37:48 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010400)="0200000003000000", 0x8, 0x800}, {&(0x7f0000011600)="ed41000000080000dff4655fe0f4655fe0f4655f00000000000004", 0x1b, 0x2100}], 0x0, &(0x7f0000012c00)) [ 1675.884777] loop6: detected capacity change from 0 to 512 22:37:48 executing program 7: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}], 0x0, &(0x7f0000012c00)) (fail_nth: 41) 22:37:48 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}], 0x0, &(0x7f0000012c00)) (fail_nth: 43) [ 1675.913897] EXT4-fs (loop6): corrupt root inode, run e2fsck [ 1675.914906] EXT4-fs (loop6): mount failed [ 1675.954022] FAULT_INJECTION: forcing a failure. [ 1675.954022] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 1675.956204] CPU: 1 PID: 14053 Comm: syz-executor.3 Not tainted 6.0.0-rc3-next-20220829 #1 [ 1675.957708] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS rel-1.14.0-0-g155821a1990b-prebuilt.qemu.org 04/01/2014 [ 1675.959799] Call Trace: [ 1675.960286] [ 1675.960700] dump_stack_lvl+0x8b/0xb3 [ 1675.961437] should_fail.cold+0x5/0xa [ 1675.962166] strncpy_from_user+0x34/0x3e0 [ 1675.962951] getname_flags.part.0+0x95/0x4f0 [ 1675.963814] ? vfs_write+0x48e/0xd90 [ 1675.964532] getname+0x8e/0xd0 [ 1675.965153] do_sys_openat2+0xf9/0x4c0 [ 1675.965901] ? build_open_flags+0x6f0/0x6f0 [ 1675.966734] __x64_sys_openat+0x13f/0x1f0 [ 1675.967507] ? __ia32_compat_sys_open+0x1c0/0x1c0 [ 1675.968193] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1675.969161] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1675.970151] do_syscall_64+0x3b/0x90 [ 1675.970844] entry_SYSCALL_64_after_hwframe+0x63/0xcd [ 1675.971740] RIP: 0033:0x7f0314a14a04 [ 1675.972235] Code: 84 00 00 00 00 00 44 89 54 24 0c e8 96 f9 ff ff 44 8b 54 24 0c 44 89 e2 48 89 ee 41 89 c0 bf 9c ff ff ff b8 01 01 00 00 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 89 44 24 0c e8 c8 f9 ff ff 8b 44 [ 1675.974508] RSP: 002b:00007f0311fd6ed0 EFLAGS: 00000293 ORIG_RAX: 0000000000000101 [ 1675.975506] RAX: ffffffffffffffda RBX: 00007f0314aab970 RCX: 00007f0314a14a04 [ 1675.976418] RDX: 0000000000000002 RSI: 00007f0311fd7000 RDI: 00000000ffffff9c [ 1675.977325] RBP: 00007f0311fd7000 R08: 0000000000000000 R09: ffffffffffffffff [ 1675.978233] R10: 0000000000000000 R11: 0000000000000293 R12: 0000000000000002 [ 1675.979134] R13: 0000000000000004 R14: 0000000020000230 R15: 0000000000000002 [ 1675.980106] [ 1676.039330] loop0: detected capacity change from 0 to 512 [ 1676.041820] loop7: detected capacity change from 0 to 512 [ 1676.049821] loop4: detected capacity change from 0 to 512 [ 1676.053509] EXT4-fs (loop0): ext4_check_descriptors: Inode table for group 0 overlaps superblock [ 1676.054834] EXT4-fs (loop0): group descriptors corrupted! [ 1676.072998] EXT4-fs error (device loop7): __ext4_fill_super:5244: inode #2: comm syz-executor.7: iget: root inode unallocated [ 1676.075933] EXT4-fs (loop7): get root inode failed [ 1676.077036] EXT4-fs (loop7): mount failed [ 1691.945824] kmemleak: 4 new suspected memory leaks (see /sys/kernel/debug/kmemleak) BUG: memory leak unreferenced object 0xffff88801d322000 (size 512): comm "syz-executor.2", pid 14033, jiffies 4296342721 (age 24.698s) hex dump (first 32 bytes): 01 00 00 00 01 00 00 00 00 00 00 00 00 00 00 00 ................ 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ backtrace: [<00000000c3a6069e>] kmalloc_trace+0x22/0x60 [<0000000037a1ccd4>] do_seccomp+0x2f8/0x2860 [<00000000a9ee5f08>] do_syscall_64+0x3b/0x90 [<00000000da59990a>] entry_SYSCALL_64_after_hwframe+0x63/0xcd BUG: memory leak unreferenced object 0xffffc90000701000 (size 4096): comm "syz-executor.2", pid 14033, jiffies 4296342721 (age 24.698s) hex dump (first 32 bytes): 01 00 00 00 00 00 00 00 00 00 00 00 06 00 00 00 ................ 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ backtrace: [<00000000ad9376cd>] __vmalloc_node_range+0x1225/0x1400 [<00000000df249946>] __vmalloc_node+0xa8/0xf0 [<0000000099e5ca3c>] bpf_prog_alloc_no_stats+0x38/0x350 [<00000000dedf3a36>] bpf_prog_alloc+0x28/0x210 [<0000000044fb163a>] bpf_prog_create_from_user+0xad/0x2f0 [<00000000d092feda>] do_seccomp+0x348/0x2860 [<00000000a9ee5f08>] do_syscall_64+0x3b/0x90 [<00000000da59990a>] entry_SYSCALL_64_after_hwframe+0x63/0xcd BUG: memory leak unreferenced object 0xffff8880473f9000 (size 2048): comm "syz-executor.2", pid 14033, jiffies 4296342721 (age 24.698s) hex dump (first 32 bytes): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ backtrace: [<00000000c3a6069e>] kmalloc_trace+0x22/0x60 [<0000000058b8b202>] bpf_prog_alloc_no_stats+0xeb/0x350 [<00000000dedf3a36>] bpf_prog_alloc+0x28/0x210 [<0000000044fb163a>] bpf_prog_create_from_user+0xad/0x2f0 [<00000000d092feda>] do_seccomp+0x348/0x2860 [<00000000a9ee5f08>] do_syscall_64+0x3b/0x90 [<00000000da59990a>] entry_SYSCALL_64_after_hwframe+0x63/0xcd BUG: memory leak unreferenced object 0xffff888044e3bf20 (size 16): comm "syz-executor.2", pid 14033, jiffies 4296342721 (age 24.698s) hex dump (first 16 bytes): 02 00 ae 48 80 88 ff ff 40 b1 e3 44 80 88 ff ff ...H....@..D.... backtrace: [<00000000c3a6069e>] kmalloc_trace+0x22/0x60 [<000000002bdea943>] bpf_prog_store_orig_filter+0x7b/0x1e0 [<000000004b0cb179>] bpf_prog_create_from_user+0x1c6/0x2f0 [<00000000d092feda>] do_seccomp+0x348/0x2860 [<00000000a9ee5f08>] do_syscall_64+0x3b/0x90 [<00000000da59990a>] entry_SYSCALL_64_after_hwframe+0x63/0xcd BUG: leak checking failed VM DIAGNOSIS: 22:38:13 Registers: info registers vcpu 0 RAX=ffffffff8424b850 RBX=ffffffff85232980 RCX=ffffffff8422d6b2 RDX=0000000000000000 RSI=0000000000000001 RDI=0000000000000000 RBP=0000000000000000 RSP=ffffffff85207e18 R8 =0000000000000001 R9 =ffff88806ce33b53 R10=ffffed100d9c676a R11=0000000000000001 R12=fffffbfff0a46530 R13=ffffffff85af5510 R14=0000000000000000 R15=dffffc0000000000 RIP=ffffffff8424b85b RFL=00000206 [-----P-] CPL=0 II=0 A20=1 SMM=0 HLT=1 ES =0000 0000000000000000 00000000 00000000 CS =0010 0000000000000000 ffffffff 00a09b00 DPL=0 CS64 [-RA] SS =0018 0000000000000000 ffffffff 00c09300 DPL=0 DS [-WA] DS =0000 0000000000000000 00000000 00000000 FS =0000 0000000000000000 00000000 00000000 GS =0000 ffff88806ce00000 00000000 00000000 LDT=0000 fffffe0000000000 00000000 00000000 TR =0040 fffffe0000003000 00004087 00008b00 DPL=0 TSS64-busy GDT= fffffe0000001000 0000007f IDT= fffffe0000000000 00000fff CR0=80050033 CR2=00007f8a84666000 CR3=0000000017628000 CR4=00350ef0 DR0=0000000000000000 DR1=0000000000000000 DR2=0000000000000000 DR3=0000000000000000 DR6=00000000ffff0ff0 DR7=0000000000000400 EFER=0000000000000d01 FCW=037f FSW=0000 [ST=0] FTW=00 MXCSR=00001fa0 FPR0=0000000000000000 0000 FPR1=0000000000000000 0000 FPR2=0000000000000000 0000 FPR3=0000000000000000 0000 FPR4=0000000000000000 0000 FPR5=0000000000000000 0000 FPR6=0000000000000000 0000 FPR7=0000000000000000 0000 YMM00=0000000000000000 0000000000000000 0000000000000000 0000000000000000 YMM01=0000000000000000 0000000000000000 0a64656c69616620 676e696b63656863 YMM02=0000000000000000 0000000000000000 31636e75662e6e75 522e6c697475736f YMM03=0000000000000000 0000000000000000 0000000000000000 0000000000000000 YMM04=0000000000000000 0000000000000000 6b61656c2079726f 6d656d203a475542 YMM05=0000000000000000 0000000000000000 3132373234333639 3234207365696666 YMM06=0000000000000000 0000000000000000 200a29733839362e 3432206567612820 YMM07=0000000000000000 0000000000000000 7473726966282070 6d75642078656820 YMM08=0000000000000000 0000000000000000 202020200a3a2973 6574796220323320 YMM09=0000000000000000 0000000000000000 3020303020303020 3030203030203030 YMM10=0000000000000000 0000000000000000 3030203030203030 2030302030302030 YMM11=0000000000000000 0000000000000000 2030302030302030 3020303020303020 YMM12=0000000000000000 0000000000000000 2e2e2e2e2e2e2e2e 2e2e2e2e2e2e2e20 YMM13=0000000000000000 0000000000000000 6508006c61746f74 20636578650a0073 YMM14=0000000000000000 0000000000000000 7566206365786509 006e656720636578 YMM15=0000000000000000 0000000000000000 000073746e696820 636578650a007a7a info registers vcpu 1 RAX=ffffffff8424b850 RBX=ffff88800865d040 RCX=ffffffff8422d6b2 RDX=0000000000000000 RSI=0000000000000001 RDI=0000000000000000 RBP=0000000000000001 RSP=ffff88800868fe58 R8 =0000000000000001 R9 =ffff88806cf33b53 R10=ffffed100d9e676a R11=0000000000000001 R12=ffffed10010cba08 R13=ffffffff85af5510 R14=0000000000000000 R15=dffffc0000000000 RIP=ffffffff8424b85b RFL=00000202 [-------] CPL=0 II=0 A20=1 SMM=0 HLT=1 ES =0000 0000000000000000 00000000 00000000 CS =0010 0000000000000000 ffffffff 00a09b00 DPL=0 CS64 [-RA] SS =0018 0000000000000000 ffffffff 00c09300 DPL=0 DS [-WA] DS =0000 0000000000000000 00000000 00000000 FS =0000 0000000000000000 00000000 00000000 GS =0000 ffff88806cf00000 00000000 00000000 LDT=0000 fffffe0000000000 00000000 00000000 TR =0040 fffffe000004a000 00004087 00008b00 DPL=0 TSS64-busy GDT= fffffe0000048000 0000007f IDT= fffffe0000000000 00000fff CR0=80050033 CR2=00007ffeaa89f700 CR3=0000000017628000 CR4=00350ee0 DR0=0000000000000000 DR1=0000000000000000 DR2=0000000000000000 DR3=0000000000000000 DR6=00000000ffff0ff0 DR7=0000000000000400 EFER=0000000000000d01 FCW=037f FSW=0000 [ST=0] FTW=00 MXCSR=00001fa0 FPR0=0000000000000000 0000 FPR1=0000000000000000 0000 FPR2=0000000000000000 0000 FPR3=0000000000000000 0000 FPR4=0000000000000000 0000 FPR5=0000000000000000 0000 FPR6=0000000000000000 0000 FPR7=0000000000000000 0000 YMM00=0000000000000000 0000000000000000 0000000000000000 0000000000000000 YMM01=0000000000000000 0000000000000000 0000000000000000 0000000000000000 YMM02=0000000000000000 0000000000000000 0000000000000000 41882df300000000 YMM03=0000000000000000 0000000000000000 0000ff0000000000 0000000000000000 YMM04=0000000000000000 0000000000000000 732f6c61636f6c2f 7273752f3d485441 YMM05=0000000000000000 0000000000000000 622f6c61636f6c2f 7273752f3a6e6962 YMM06=0000000000000000 0000000000000000 73752f3a6e696273 2f7273752f3a6e69 YMM07=0000000000000000 0000000000000000 6e69622f3a6e6962 732f3a6e69622f72 YMM08=0000000000000000 0000000000000000 0000000000000000 0000000000000000 YMM09=0000000000000000 0000000000000000 0000000000000000 0000000000000000 YMM10=0000000000000000 0000000000000000 0000000000000000 0000000000000000 YMM11=0000000000000000 0000000000000000 0000000000000000 0000000000000000 YMM12=0000000000000000 0000000000000000 0000000000000000 0000000000000000 YMM13=0000000000000000 0000000000000000 0000000000000000 0000000000000000 YMM14=0000000000000000 0000000000000000 0000000000000000 0000000000000000 YMM15=0000000000000000 0000000000000000 0000000000000000 0000000000000000