fffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff0100ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff0000000000000000ddf4655fddf4655fddf4655f00"/2080, 0x820, 0x1000000000c00}, {&(0x7f0000012000)='PMM\x00PMM', 0x7, 0x10000}], 0x0, &(0x7f0000012b00)) 19:27:53 executing program 4: r0 = syz_io_uring_setup(0x2, &(0x7f0000000500), &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000ff6000/0xa000)=nil, &(0x7f0000000080)=0x0, &(0x7f0000000140)=0x0) r3 = io_uring_setup(0x3ddf, &(0x7f0000000680)) syz_io_uring_submit(r1, r2, &(0x7f0000000800)=@IORING_OP_SENDMSG={0x9, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0}, 0x0) r4 = eventfd(0x0) io_uring_register$IORING_REGISTER_EVENTFD(r0, 0x4, &(0x7f0000000000), 0x1) read$eventfd(r4, &(0x7f0000000040), 0x8) r5 = syz_io_uring_setup(0x3702, &(0x7f00000001c0), &(0x7f0000000000/0x3000)=nil, &(0x7f0000ffe000/0x2000)=nil, &(0x7f0000000140), &(0x7f0000000240)) r6 = dup2(r3, r5) r7 = dup2(r0, r6) io_uring_enter(r7, 0x1739, 0x0, 0x0, 0x0, 0x0) [ 1008.441265] EXT4-fs warning (device loop5): read_mmp_block:106: Error -117 while reading MMP block 0 19:27:53 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000500100000f000000000000000000000004000000000002000020000020000000def4655fdef4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000008000000018000000c20500002b0200000000000000000000000000000000000073797a6b616c6c6572000000000000002f746d702f73797a2d696d61676567656e35373134333434333800"/192, 0xc0, 0x400}, {&(0x7f0000010100)="000000000000000000000000e58ca12e13a240e2b1a22f8d07e8e55f010040000c00000000000000ddf4655f00"/64, 0x40, 0x4e0}, {0x0, 0x0, 0x560}, {0x0, 0x0, 0x1000000000c00}, {&(0x7f0000012000)="504d4d00504d4dff", 0x8, 0x10000}], 0x0, &(0x7f0000012b00)) [ 1008.505683] EXT4-fs warning (device loop5): read_mmp_block:106: Error -117 while reading MMP block 0 19:27:53 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000500100000f000000000000000000000004000000000002000020000020000000def4655fdef4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000008000000018000000c20500002b0200000000000000000000000000000000000073797a6b616c6c6572000000000000002f746d702f73797a2d696d61676567656e35373134333434333800"/192, 0xc0, 0x400}, {&(0x7f0000010100)="000000000000000000000000e58ca12e13a240e2b1a22f8d07e8e55f010040000c00000000000000ddf4655f00"/64, 0x40, 0x4e0}, {0x0, 0x0, 0x560}, {0x0, 0x0, 0x1000000000c00}, {&(0x7f0000012000)="504d4d00504d4dff", 0x8, 0x10000}], 0x0, &(0x7f0000012b00)) 19:27:53 executing program 2: r0 = syz_io_uring_setup(0x21, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, &(0x7f00000a0000)=nil, &(0x7f00000b0000)=nil, &(0x7f0000000180)=0x0, &(0x7f0000002a40)=0x0) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_io_uring_submit(r1, r2, &(0x7f0000000300)=@IORING_OP_OPENAT={0x12, 0x0, 0x0, 0xffffffffffffffff, 0x0, &(0x7f0000000100)='./cgroup/cgroup.procs/file0/../file0\x00'}, 0x0) io_uring_enter(r0, 0x76d3, 0x0, 0x0, 0x0, 0x0) r3 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$netlbl_cipso(&(0x7f0000000000), r3) r4 = syz_io_uring_setup(0x2, &(0x7f0000000500), &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000ff6000/0xa000)=nil, &(0x7f0000000080)=0x0, &(0x7f0000000140)=0x0) r7 = io_uring_setup(0x3ddf, &(0x7f0000000680)) syz_io_uring_submit(r5, r6, &(0x7f0000000800)=@IORING_OP_SENDMSG={0x9, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0}, 0x0) r8 = eventfd(0x0) io_uring_register$IORING_REGISTER_EVENTFD(r4, 0x4, &(0x7f0000000000)=r8, 0x1) read$eventfd(r8, &(0x7f0000000040), 0x8) r9 = syz_io_uring_setup(0x3702, &(0x7f00000001c0), &(0x7f0000000000/0x3000)=nil, &(0x7f0000ffe000/0x2000)=nil, &(0x7f0000000140), &(0x7f0000000240)) r10 = dup2(r7, r9) r11 = dup2(r4, r10) io_uring_enter(r11, 0x1739, 0x0, 0x0, 0x0, 0x0) [ 1008.579148] EXT4-fs warning (device loop5): read_mmp_block:106: Error -117 while reading MMP block 0 19:27:54 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000500100000f000000000000000000000004000000000002000020000020000000def4655fdef4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000008000000018000000c20500002b0200000000000000000000000000000000000073797a6b616c6c6572000000000000002f746d702f73797a2d696d61676567656e35373134333434333800"/192, 0xc0, 0x400}, {&(0x7f0000010100)="000000000000000000000000e58ca12e13a240e2b1a22f8d07e8e55f010040000c00000000000000ddf4655f00"/64, 0x40, 0x4e0}, {&(0x7f0000010200), 0x0, 0x560}, {0x0, 0x0, 0x1000000000c00}, {&(0x7f0000012000)="504d4d00504d4dff", 0x8, 0x10000}], 0x0, &(0x7f0000012b00)) [ 1008.625843] EXT4-fs warning (device loop5): read_mmp_block:106: Error -117 while reading MMP block 0 19:27:54 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000500100000f000000000000000000000004000000000002000020000020000000def4655fdef4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000008000000018000000c20500002b0200000000000000000000000000000000000073797a6b616c6c6572000000000000002f746d702f73797a2d696d61676567656e35373134333434333800"/192, 0xc0, 0x400}, {&(0x7f0000010100)="000000000000000000000000e58ca12e13a240e2b1a22f8d07e8e55f010040000c00000000000000ddf4655f00"/64, 0x40, 0x4e0}, {&(0x7f0000010200), 0x0, 0x560}, {0x0, 0x0, 0x1000000000c00}, {&(0x7f0000012000)="504d4d00504d4dff", 0x8, 0x10000}], 0x0, &(0x7f0000012b00)) 19:27:54 executing program 2: r0 = syz_io_uring_setup(0x21, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, &(0x7f00000a0000)=nil, &(0x7f00000b0000)=nil, &(0x7f0000000180)=0x0, &(0x7f0000002a40)=0x0) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_io_uring_submit(r1, r2, &(0x7f0000000300)=@IORING_OP_OPENAT={0x12, 0x0, 0x0, 0xffffffffffffffff, 0x0, &(0x7f0000000100)='./cgroup/cgroup.procs/file0/../file0\x00'}, 0x0) io_uring_enter(r0, 0x76d3, 0x0, 0x0, 0x0, 0x0) r3 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$netlbl_cipso(&(0x7f0000000000), r3) r4 = syz_io_uring_setup(0x2, &(0x7f0000000500), &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000ff6000/0xa000)=nil, &(0x7f0000000080)=0x0, &(0x7f0000000140)=0x0) r7 = io_uring_setup(0x3ddf, &(0x7f0000000680)) syz_io_uring_submit(r5, r6, &(0x7f0000000800)=@IORING_OP_SENDMSG={0x9, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0}, 0x0) r8 = eventfd(0x0) io_uring_register$IORING_REGISTER_EVENTFD(r4, 0x4, &(0x7f0000000000)=r8, 0x1) read$eventfd(r8, &(0x7f0000000040), 0x8) r9 = syz_io_uring_setup(0x3702, &(0x7f00000001c0), &(0x7f0000000000/0x3000)=nil, &(0x7f0000ffe000/0x2000)=nil, &(0x7f0000000140), &(0x7f0000000240)) r10 = dup2(r7, r9) dup2(r4, r10) [ 1008.700973] EXT4-fs warning (device loop5): read_mmp_block:106: Error -117 while reading MMP block 0 [ 1009.235846] EXT4-fs warning (device loop7): ext4_multi_mount_protect:324: MMP startup interrupted, failing mount [ 1009.235846] [ 1009.256679] EXT4-fs warning (device loop6): ext4_multi_mount_protect:324: MMP startup interrupted, failing mount [ 1009.256679] [ 1009.266058] EXT4-fs warning (device loop3): ext4_multi_mount_protect:324: MMP startup interrupted, failing mount [ 1009.266058] 19:28:06 executing program 2: r0 = syz_io_uring_setup(0x21, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, &(0x7f00000a0000)=nil, &(0x7f00000b0000)=nil, &(0x7f0000000180)=0x0, &(0x7f0000002a40)=0x0) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_io_uring_submit(r1, r2, &(0x7f0000000300)=@IORING_OP_OPENAT={0x12, 0x0, 0x0, 0xffffffffffffffff, 0x0, &(0x7f0000000100)='./cgroup/cgroup.procs/file0/../file0\x00'}, 0x0) io_uring_enter(r0, 0x76d3, 0x0, 0x0, 0x0, 0x0) r3 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$netlbl_cipso(&(0x7f0000000000), r3) r4 = syz_io_uring_setup(0x2, &(0x7f0000000500), &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000ff6000/0xa000)=nil, &(0x7f0000000080)=0x0, &(0x7f0000000140)=0x0) r7 = io_uring_setup(0x3ddf, &(0x7f0000000680)) syz_io_uring_submit(r5, r6, &(0x7f0000000800)=@IORING_OP_SENDMSG={0x9, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0}, 0x0) r8 = eventfd(0x0) io_uring_register$IORING_REGISTER_EVENTFD(r4, 0x4, &(0x7f0000000000)=r8, 0x1) read$eventfd(r8, &(0x7f0000000040), 0x8) r9 = syz_io_uring_setup(0x3702, &(0x7f00000001c0), &(0x7f0000000000/0x3000)=nil, &(0x7f0000ffe000/0x2000)=nil, &(0x7f0000000140), &(0x7f0000000240)) r10 = dup2(r7, r9) dup2(r4, r10) 19:28:06 executing program 6: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000500100000f000000000000000000000004000000000002000020000020000000def4655fdef4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000008000000018000000c20500002b0200000000000000000000000000000000000073797a6b616c6c6572000000000000002f746d702f73797a2d696d61676567656e35373134333434333800"/192, 0xc0, 0x400}, {&(0x7f0000010100)="000000000000000000000000e58ca12e13a240e2b1a22f8d07e8e55f010040000c00000000000000ddf4655f00"/64, 0x40, 0x4e0}, {&(0x7f0000010200)="0100000000000500400000000000000000000000000000003400000000000000", 0x20, 0x560}, {&(0x7f0000010300)="03000000040000000500000015000f0003000400"/32, 0x20, 0x800}, {&(0x7f0000010400)="ff070000ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff0100ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff0000000000000000ddf4655fddf4655fddf4655f00"/2080, 0x820, 0x1000000000c00}, {&(0x7f0000012000)='PMM\x00PMM', 0x7, 0x10000}], 0x0, &(0x7f0000012b00)) 19:28:06 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000500100000f000000000000000000000004000000000002000020000020000000def4655fdef4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000008000000018000000c20500002b0200000000000000000000000000000000000073797a6b616c6c6572000000000000002f746d702f73797a2d696d61676567656e35373134333434333800"/192, 0xc0, 0x400}, {&(0x7f0000010100)="000000000000000000000000e58ca12e13a240e2b1a22f8d07e8e55f010040000c00000000000000ddf4655f00"/64, 0x40, 0x4e0}, {&(0x7f0000010200), 0x0, 0x560}, {0x0, 0x0, 0x1000000000c00}, {&(0x7f0000012000)="504d4d00504d4dff", 0x8, 0x10000}], 0x0, &(0x7f0000012b00)) 19:28:06 executing program 4: r0 = syz_io_uring_setup(0x2, &(0x7f0000000500), &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000ff6000/0xa000)=nil, &(0x7f0000000080)=0x0, &(0x7f0000000140)=0x0) r3 = io_uring_setup(0x3ddf, &(0x7f0000000680)) syz_io_uring_submit(r1, r2, &(0x7f0000000800)=@IORING_OP_SENDMSG={0x9, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0}, 0x0) r4 = eventfd(0x0) io_uring_register$IORING_REGISTER_EVENTFD(r0, 0x4, &(0x7f0000000000)=r4, 0x1) read$eventfd(0xffffffffffffffff, &(0x7f0000000040), 0x8) r5 = syz_io_uring_setup(0x3702, &(0x7f00000001c0), &(0x7f0000000000/0x3000)=nil, &(0x7f0000ffe000/0x2000)=nil, &(0x7f0000000140), &(0x7f0000000240)) r6 = dup2(r3, r5) r7 = dup2(r0, r6) io_uring_enter(r7, 0x1739, 0x0, 0x0, 0x0, 0x0) 19:28:06 executing program 0: r0 = syz_io_uring_setup(0x2, &(0x7f0000000500), &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000ff6000/0xa000)=nil, &(0x7f0000000080)=0x0, &(0x7f0000000140)=0x0) r3 = io_uring_setup(0x3ddf, &(0x7f0000000680)) syz_io_uring_submit(r1, r2, &(0x7f0000000800)=@IORING_OP_SENDMSG={0x9, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0}, 0x0) r4 = eventfd(0x0) io_uring_register$IORING_REGISTER_EVENTFD(r0, 0x4, &(0x7f0000000000)=r4, 0x1) read$eventfd(r4, &(0x7f0000000040), 0x8) r5 = syz_io_uring_setup(0x3702, 0x0, &(0x7f0000000000/0x3000)=nil, &(0x7f0000ffe000/0x2000)=nil, &(0x7f0000000140), &(0x7f0000000240)) r6 = dup2(r3, r5) r7 = dup2(r0, r6) io_uring_enter(r7, 0x1739, 0x0, 0x0, 0x0, 0x0) 19:28:06 executing program 1: syz_io_uring_setup(0x21, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, &(0x7f00000a0000)=nil, &(0x7f00000b0000)=nil, &(0x7f0000000180), &(0x7f0000002a40)) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r0 = syz_io_uring_setup(0x2, &(0x7f0000000500), &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000ff6000/0xa000)=nil, &(0x7f0000000080)=0x0, &(0x7f0000000140)=0x0) r3 = io_uring_setup(0x3ddf, &(0x7f0000000680)) syz_io_uring_submit(r1, r2, &(0x7f0000000800)=@IORING_OP_SENDMSG={0x9, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0}, 0x0) r4 = eventfd(0x0) read$eventfd(r4, &(0x7f0000000040), 0x8) r5 = syz_io_uring_setup(0x3702, &(0x7f00000001c0), &(0x7f0000000000/0x3000)=nil, &(0x7f0000ffe000/0x2000)=nil, &(0x7f0000000140), &(0x7f0000000240)) r6 = dup2(r3, r5) r7 = dup2(r0, r6) io_uring_enter(r7, 0x1739, 0x0, 0x0, 0x0, 0x0) 19:28:06 executing program 7: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000500100000f000000000000000000000004000000000002000020000020000000def4655fdef4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000008000000018000000c20500002b0200000000000000000000000000000000000073797a6b616c6c6572000000000000002f746d702f73797a2d696d61676567656e35373134333434333800"/192, 0xc0, 0x400}, {&(0x7f0000010100)="000000000000000000000000e58ca12e13a240e2b1a22f8d07e8e55f010040000c00000000000000ddf4655f00"/64, 0x40, 0x4e0}, {&(0x7f0000010200)="0100000000000500400000000000000000000000000000003400000000000000", 0x20, 0x560}, {&(0x7f0000010300)="03000000040000000500000015000f0003000400"/32, 0x20, 0x800}, {&(0x7f0000010400)="ff070000ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff0100ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff0000000000000000ddf4655fddf4655fddf4655f00"/2080, 0x820, 0x1000000000c00}, {&(0x7f0000012000)='PMM\x00PMM', 0x7, 0x10000}], 0x0, &(0x7f0000012b00)) 19:28:06 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000500100000f000000000000000000000004000000000002000020000020000000def4655fdef4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000008000000018000000c20500002b0200000000000000000000000000000000000073797a6b616c6c6572000000000000002f746d702f73797a2d696d61676567656e35373134333434333800"/192, 0xc0, 0x400}, {&(0x7f0000010100)="000000000000000000000000e58ca12e13a240e2b1a22f8d07e8e55f010040000c00000000000000ddf4655f00"/64, 0x40, 0x4e0}, {&(0x7f0000010200)="0100000000000500400000000000000000000000000000003400000000000000", 0x20, 0x560}, {&(0x7f0000010300)="03000000040000000500000015000f0003000400"/32, 0x20, 0x800}, {&(0x7f0000010400)="ff070000ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff0100ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff0000000000000000ddf4655fddf4655fddf4655f00"/2080, 0x820, 0x1000000000c00}, {&(0x7f0000012000)='PMM\x00PMM', 0x7, 0x10000}], 0x0, &(0x7f0000012b00)) [ 1020.979945] EXT4-fs warning (device loop5): read_mmp_block:106: Error -117 while reading MMP block 0 19:28:06 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000500100000f000000000000000000000004000000000002000020000020000000def4655fdef4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000008000000018000000c20500002b0200000000000000000000000000000000000073797a6b616c6c6572000000000000002f746d702f73797a2d696d61676567656e35373134333434333800"/192, 0xc0, 0x400}, {&(0x7f0000010100)="000000000000000000000000e58ca12e13a240e2b1a22f8d07e8e55f010040000c00000000000000ddf4655f00"/64, 0x40, 0x4e0}, {&(0x7f0000010200)="01000000000005004000000000000000", 0x10, 0x560}, {0x0, 0x0, 0x1000000000c00}, {&(0x7f0000012000)="504d4d00504d4dff", 0x8, 0x10000}], 0x0, &(0x7f0000012b00)) [ 1021.063309] EXT4-fs error (device loop5): ext4_fill_super:4947: inode #2: comm syz-executor.5: iget: root inode unallocated [ 1021.066920] EXT4-fs (loop5): get root inode failed [ 1021.068190] EXT4-fs (loop5): mount failed 19:28:06 executing program 4: r0 = syz_io_uring_setup(0x2, &(0x7f0000000500), &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000ff6000/0xa000)=nil, &(0x7f0000000080)=0x0, &(0x7f0000000140)=0x0) r3 = io_uring_setup(0x3ddf, &(0x7f0000000680)) syz_io_uring_submit(r1, r2, &(0x7f0000000800)=@IORING_OP_SENDMSG={0x9, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0}, 0x0) r4 = eventfd(0x0) io_uring_register$IORING_REGISTER_EVENTFD(r0, 0x4, &(0x7f0000000000)=r4, 0x1) read$eventfd(0xffffffffffffffff, &(0x7f0000000040), 0x8) r5 = syz_io_uring_setup(0x3702, &(0x7f00000001c0), &(0x7f0000000000/0x3000)=nil, &(0x7f0000ffe000/0x2000)=nil, &(0x7f0000000140), &(0x7f0000000240)) r6 = dup2(r3, r5) r7 = dup2(r0, r6) io_uring_enter(r7, 0x1739, 0x0, 0x0, 0x0, 0x0) 19:28:06 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000500100000f000000000000000000000004000000000002000020000020000000def4655fdef4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000008000000018000000c20500002b0200000000000000000000000000000000000073797a6b616c6c6572000000000000002f746d702f73797a2d696d61676567656e35373134333434333800"/192, 0xc0, 0x400}, {&(0x7f0000010100)="000000000000000000000000e58ca12e13a240e2b1a22f8d07e8e55f010040000c00000000000000ddf4655f00"/64, 0x40, 0x4e0}, {&(0x7f0000010200), 0x0, 0x560}, {0x0, 0x0, 0x1000000000c00}, {&(0x7f0000012000)="504d4d00504d4dff", 0x8, 0x10000}], 0x0, &(0x7f0000012b00)) [ 1021.147346] EXT4-fs warning (device loop5): read_mmp_block:106: Error -117 while reading MMP block 0 19:28:06 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000500100000f000000000000000000000004000000000002000020000020000000def4655fdef4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000008000000018000000c20500002b0200000000000000000000000000000000000073797a6b616c6c6572000000000000002f746d702f73797a2d696d61676567656e35373134333434333800"/192, 0xc0, 0x400}, {&(0x7f0000010100)="000000000000000000000000e58ca12e13a240e2b1a22f8d07e8e55f010040000c00000000000000ddf4655f00"/64, 0x40, 0x4e0}, {&(0x7f0000010200), 0x0, 0x560}, {0x0, 0x0, 0x1000000000c00}, {&(0x7f0000012000)="504d4d00504d4dff", 0x8, 0x10000}], 0x0, &(0x7f0000012b00)) 19:28:06 executing program 4: r0 = syz_io_uring_setup(0x2, &(0x7f0000000500), &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000ff6000/0xa000)=nil, &(0x7f0000000080)=0x0, &(0x7f0000000140)=0x0) r3 = io_uring_setup(0x3ddf, &(0x7f0000000680)) syz_io_uring_submit(r1, r2, &(0x7f0000000800)=@IORING_OP_SENDMSG={0x9, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0}, 0x0) r4 = eventfd(0x0) io_uring_register$IORING_REGISTER_EVENTFD(r0, 0x4, &(0x7f0000000000)=r4, 0x1) read$eventfd(0xffffffffffffffff, &(0x7f0000000040), 0x8) r5 = syz_io_uring_setup(0x3702, &(0x7f00000001c0), &(0x7f0000000000/0x3000)=nil, &(0x7f0000ffe000/0x2000)=nil, &(0x7f0000000140), &(0x7f0000000240)) r6 = dup2(r3, r5) r7 = dup2(r0, r6) io_uring_enter(r7, 0x1739, 0x0, 0x0, 0x0, 0x0) [ 1021.249543] EXT4-fs warning (device loop5): read_mmp_block:106: Error -117 while reading MMP block 0 19:28:06 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000500100000f000000000000000000000004000000000002000020000020000000def4655fdef4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000008000000018000000c20500002b0200000000000000000000000000000000000073797a6b616c6c6572000000000000002f746d702f73797a2d696d61676567656e35373134333434333800"/192, 0xc0, 0x400}, {&(0x7f0000010100)="000000000000000000000000e58ca12e13a240e2b1a22f8d07e8e55f010040000c00000000000000ddf4655f00"/64, 0x40, 0x4e0}, {&(0x7f0000010200), 0x0, 0x560}, {0x0, 0x0, 0x1000000000c00}, {&(0x7f0000012000)="504d4d00504d4dff", 0x8, 0x10000}], 0x0, &(0x7f0000012b00)) [ 1021.320536] EXT4-fs warning (device loop5): read_mmp_block:106: Error -117 while reading MMP block 0 19:28:06 executing program 4: r0 = syz_io_uring_setup(0x2, &(0x7f0000000500), &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000ff6000/0xa000)=nil, &(0x7f0000000080)=0x0, &(0x7f0000000140)=0x0) r3 = io_uring_setup(0x3ddf, &(0x7f0000000680)) syz_io_uring_submit(r1, r2, &(0x7f0000000800)=@IORING_OP_SENDMSG={0x9, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0}, 0x0) r4 = eventfd(0x0) io_uring_register$IORING_REGISTER_EVENTFD(r0, 0x4, &(0x7f0000000000)=r4, 0x1) read$eventfd(r4, 0x0, 0x0) r5 = syz_io_uring_setup(0x3702, &(0x7f00000001c0), &(0x7f0000000000/0x3000)=nil, &(0x7f0000ffe000/0x2000)=nil, &(0x7f0000000140), &(0x7f0000000240)) r6 = dup2(r3, r5) r7 = dup2(r0, r6) io_uring_enter(r7, 0x1739, 0x0, 0x0, 0x0, 0x0) 19:28:06 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000500100000f000000000000000000000004000000000002000020000020000000def4655fdef4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000008000000018000000c20500002b0200000000000000000000000000000000000073797a6b616c6c6572000000000000002f746d702f73797a2d696d61676567656e35373134333434333800"/192, 0xc0, 0x400}, {&(0x7f0000010100)="000000000000000000000000e58ca12e13a240e2b1a22f8d07e8e55f010040000c00000000000000ddf4655f00"/64, 0x40, 0x4e0}, {&(0x7f0000010200)="0100000000000500", 0x8, 0x560}, {0x0, 0x0, 0x1000000000c00}, {&(0x7f0000012000)="504d4d00504d4dff", 0x8, 0x10000}], 0x0, &(0x7f0000012b00)) [ 1021.390564] EXT4-fs warning (device loop5): read_mmp_block:106: Error -117 while reading MMP block 0 [ 1021.856910] EXT4-fs warning (device loop3): ext4_multi_mount_protect:324: MMP startup interrupted, failing mount [ 1021.856910] [ 1021.857002] EXT4-fs warning (device loop6): ext4_multi_mount_protect:324: MMP startup interrupted, failing mount [ 1021.857002] [ 1021.875078] EXT4-fs warning (device loop7): ext4_multi_mount_protect:324: MMP startup interrupted, failing mount [ 1021.875078] 19:28:18 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000500100000f000000000000000000000004000000000002000020000020000000def4655fdef4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000008000000018000000c20500002b0200000000000000000000000000000000000073797a6b616c6c6572000000000000002f746d702f73797a2d696d61676567656e35373134333434333800"/192, 0xc0, 0x400}, {&(0x7f0000010100)="000000000000000000000000e58ca12e13a240e2b1a22f8d07e8e55f010040000c00000000000000ddf4655f00"/64, 0x40, 0x4e0}, {&(0x7f0000010200)="0100000000000500400000000000000000000000000000003400000000000000", 0x20, 0x560}, {&(0x7f0000010300)="03000000040000000500000015000f0003000400"/32, 0x20, 0x800}, {&(0x7f0000010400)="ff070000ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff0100ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff0000000000000000ddf4655fddf4655fddf4655f00"/2080, 0x820, 0x1000000000c00}, {&(0x7f0000012000)="504d4d00504d4dff", 0x8}], 0x0, &(0x7f0000012b00)) 19:28:18 executing program 2: r0 = syz_io_uring_setup(0x21, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, &(0x7f00000a0000)=nil, &(0x7f00000b0000)=nil, &(0x7f0000000180)=0x0, &(0x7f0000002a40)=0x0) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_io_uring_submit(r1, r2, &(0x7f0000000300)=@IORING_OP_OPENAT={0x12, 0x0, 0x0, 0xffffffffffffffff, 0x0, &(0x7f0000000100)='./cgroup/cgroup.procs/file0/../file0\x00'}, 0x0) io_uring_enter(r0, 0x76d3, 0x0, 0x0, 0x0, 0x0) r3 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$netlbl_cipso(&(0x7f0000000000), r3) r4 = syz_io_uring_setup(0x2, &(0x7f0000000500), &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000ff6000/0xa000)=nil, &(0x7f0000000080)=0x0, &(0x7f0000000140)=0x0) r7 = io_uring_setup(0x3ddf, &(0x7f0000000680)) syz_io_uring_submit(r5, r6, &(0x7f0000000800)=@IORING_OP_SENDMSG={0x9, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0}, 0x0) r8 = eventfd(0x0) io_uring_register$IORING_REGISTER_EVENTFD(r4, 0x4, &(0x7f0000000000)=r8, 0x1) read$eventfd(r8, &(0x7f0000000040), 0x8) r9 = syz_io_uring_setup(0x3702, &(0x7f00000001c0), &(0x7f0000000000/0x3000)=nil, &(0x7f0000ffe000/0x2000)=nil, &(0x7f0000000140), &(0x7f0000000240)) r10 = dup2(r7, r9) dup2(r4, r10) 19:28:18 executing program 4: r0 = syz_io_uring_setup(0x2, &(0x7f0000000500), &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000ff6000/0xa000)=nil, &(0x7f0000000080)=0x0, &(0x7f0000000140)=0x0) r3 = io_uring_setup(0x3ddf, &(0x7f0000000680)) syz_io_uring_submit(r1, r2, &(0x7f0000000800)=@IORING_OP_SENDMSG={0x9, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0}, 0x0) r4 = eventfd(0x0) io_uring_register$IORING_REGISTER_EVENTFD(r0, 0x4, &(0x7f0000000000)=r4, 0x1) read$eventfd(r4, 0x0, 0x0) r5 = syz_io_uring_setup(0x3702, &(0x7f00000001c0), &(0x7f0000000000/0x3000)=nil, &(0x7f0000ffe000/0x2000)=nil, &(0x7f0000000140), &(0x7f0000000240)) r6 = dup2(r3, r5) r7 = dup2(r0, r6) io_uring_enter(r7, 0x1739, 0x0, 0x0, 0x0, 0x0) 19:28:18 executing program 6: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000500100000f000000000000000000000004000000000002000020000020000000def4655fdef4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000008000000018000000c20500002b0200000000000000000000000000000000000073797a6b616c6c6572000000000000002f746d702f73797a2d696d61676567656e35373134333434333800"/192, 0xc0, 0x400}, {&(0x7f0000010100)="000000000000000000000000e58ca12e13a240e2b1a22f8d07e8e55f010040000c00000000000000ddf4655f00"/64, 0x40, 0x4e0}, {&(0x7f0000010200)="0100000000000500400000000000000000000000000000003400000000000000", 0x20, 0x560}, {&(0x7f0000010300)="03000000040000000500000015000f0003000400"/32, 0x20, 0x800}, {&(0x7f0000010400)="ff070000ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff0100ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff0000000000000000ddf4655fddf4655fddf4655f00"/2080, 0x820, 0x1000000000c00}, {&(0x7f0000012000)="504d4d00504d4dff", 0x8}], 0x0, &(0x7f0000012b00)) 19:28:18 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000500100000f000000000000000000000004000000000002000020000020000000def4655fdef4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000008000000018000000c20500002b0200000000000000000000000000000000000073797a6b616c6c6572000000000000002f746d702f73797a2d696d61676567656e35373134333434333800"/192, 0xc0, 0x400}, {&(0x7f0000010100)="000000000000000000000000e58ca12e13a240e2b1a22f8d07e8e55f010040000c00000000000000ddf4655f00"/64, 0x40, 0x4e0}, {&(0x7f0000010200)="0100000000000500", 0x8, 0x560}, {0x0, 0x0, 0x1000000000c00}, {&(0x7f0000012000)="504d4d00504d4dff", 0x8, 0x10000}], 0x0, &(0x7f0000012b00)) 19:28:18 executing program 1: syz_io_uring_setup(0x21, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, &(0x7f00000a0000)=nil, &(0x7f00000b0000)=nil, &(0x7f0000000180), &(0x7f0000002a40)) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r0 = syz_io_uring_setup(0x2, &(0x7f0000000500), &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000ff6000/0xa000)=nil, &(0x7f0000000080)=0x0, &(0x7f0000000140)=0x0) r3 = io_uring_setup(0x3ddf, &(0x7f0000000680)) syz_io_uring_submit(r1, r2, &(0x7f0000000800)=@IORING_OP_SENDMSG={0x9, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0}, 0x0) io_uring_register$IORING_REGISTER_EVENTFD(r0, 0x4, &(0x7f0000000000), 0x1) read$eventfd(0xffffffffffffffff, &(0x7f0000000040), 0x8) r4 = syz_io_uring_setup(0x3702, &(0x7f00000001c0), &(0x7f0000000000/0x3000)=nil, &(0x7f0000ffe000/0x2000)=nil, &(0x7f0000000140), &(0x7f0000000240)) r5 = dup2(r3, r4) r6 = dup2(r0, r5) io_uring_enter(r6, 0x1739, 0x0, 0x0, 0x0, 0x0) 19:28:18 executing program 7: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000500100000f000000000000000000000004000000000002000020000020000000def4655fdef4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000008000000018000000c20500002b0200000000000000000000000000000000000073797a6b616c6c6572000000000000002f746d702f73797a2d696d61676567656e35373134333434333800"/192, 0xc0, 0x400}, {&(0x7f0000010100)="000000000000000000000000e58ca12e13a240e2b1a22f8d07e8e55f010040000c00000000000000ddf4655f00"/64, 0x40, 0x4e0}, {&(0x7f0000010200)="0100000000000500400000000000000000000000000000003400000000000000", 0x20, 0x560}, {&(0x7f0000010300)="03000000040000000500000015000f0003000400"/32, 0x20, 0x800}, {&(0x7f0000010400)="ff070000ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff0100ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff0000000000000000ddf4655fddf4655fddf4655f00"/2080, 0x820, 0x1000000000c00}, {&(0x7f0000012000)="504d4d00504d4dff", 0x8}], 0x0, &(0x7f0000012b00)) 19:28:18 executing program 0: r0 = syz_io_uring_setup(0x2, &(0x7f0000000500), &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000ff6000/0xa000)=nil, &(0x7f0000000080)=0x0, &(0x7f0000000140)=0x0) r3 = io_uring_setup(0x3ddf, &(0x7f0000000680)) syz_io_uring_submit(r1, r2, &(0x7f0000000800)=@IORING_OP_SENDMSG={0x9, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0}, 0x0) r4 = eventfd(0x0) io_uring_register$IORING_REGISTER_EVENTFD(r0, 0x4, &(0x7f0000000000)=r4, 0x1) read$eventfd(r4, &(0x7f0000000040), 0x8) r5 = syz_io_uring_setup(0x3702, 0x0, &(0x7f0000000000/0x3000)=nil, &(0x7f0000ffe000/0x2000)=nil, &(0x7f0000000140), &(0x7f0000000240)) r6 = dup2(r3, r5) r7 = dup2(r0, r6) io_uring_enter(r7, 0x1739, 0x0, 0x0, 0x0, 0x0) [ 1033.377643] EXT4-fs warning (device loop6): read_mmp_block:106: Error -117 while reading MMP block 64 19:28:18 executing program 6: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000500100000f000000000000000000000004000000000002000020000020000000def4655fdef4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000008000000018000000c20500002b0200000000000000000000000000000000000073797a6b616c6c6572000000000000002f746d702f73797a2d696d61676567656e35373134333434333800"/192, 0xc0, 0x400}, {&(0x7f0000010100)="000000000000000000000000e58ca12e13a240e2b1a22f8d07e8e55f010040000c00000000000000ddf4655f00"/64, 0x40, 0x4e0}, {&(0x7f0000010200)="0100000000000500400000000000000000000000000000003400000000000000", 0x20, 0x560}, {&(0x7f0000010300)="03000000040000000500000015000f0003000400"/32, 0x20, 0x800}, {&(0x7f0000010400)="ff070000ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff0100ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff0000000000000000ddf4655fddf4655fddf4655f00"/2080, 0x820, 0x1000000000c00}, {&(0x7f0000012000)="504d4d00504d4dff", 0x8}], 0x0, &(0x7f0000012b00)) [ 1033.410286] EXT4-fs warning (device loop3): read_mmp_block:106: Error -117 while reading MMP block 64 [ 1033.419787] EXT4-fs warning (device loop5): read_mmp_block:106: Error -117 while reading MMP block 0 [ 1033.426266] EXT4-fs warning (device loop6): read_mmp_block:106: Error -117 while reading MMP block 64 [ 1033.430938] EXT4-fs warning (device loop7): read_mmp_block:106: Error -117 while reading MMP block 64 19:28:18 executing program 6: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000500100000f000000000000000000000004000000000002000020000020000000def4655fdef4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000008000000018000000c20500002b0200000000000000000000000000000000000073797a6b616c6c6572000000000000002f746d702f73797a2d696d61676567656e35373134333434333800"/192, 0xc0, 0x400}, {&(0x7f0000010100)="000000000000000000000000e58ca12e13a240e2b1a22f8d07e8e55f010040000c00000000000000ddf4655f00"/64, 0x40, 0x4e0}, {&(0x7f0000010200)="0100000000000500400000000000000000000000000000003400000000000000", 0x20, 0x560}, {&(0x7f0000010300)="03000000040000000500000015000f0003000400"/32, 0x20, 0x800}, {&(0x7f0000010400)="ff070000ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff0100ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff0000000000000000ddf4655fddf4655fddf4655f00"/2080, 0x820, 0x1000000000c00}, {&(0x7f0000012000)="504d4d00504d4dff", 0x8}], 0x0, &(0x7f0000012b00)) 19:28:18 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000500100000f000000000000000000000004000000000002000020000020000000def4655fdef4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000008000000018000000c20500002b0200000000000000000000000000000000000073797a6b616c6c6572000000000000002f746d702f73797a2d696d61676567656e35373134333434333800"/192, 0xc0, 0x400}, {&(0x7f0000010100)="000000000000000000000000e58ca12e13a240e2b1a22f8d07e8e55f010040000c00000000000000ddf4655f00"/64, 0x40, 0x4e0}, {&(0x7f0000010200)="0100000000000500", 0x8, 0x560}, {0x0, 0x0, 0x1000000000c00}, {&(0x7f0000012000)="504d4d00504d4dff", 0x8, 0x10000}], 0x0, &(0x7f0000012b00)) 19:28:18 executing program 4: r0 = syz_io_uring_setup(0x2, &(0x7f0000000500), &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000ff6000/0xa000)=nil, &(0x7f0000000080)=0x0, &(0x7f0000000140)=0x0) r3 = io_uring_setup(0x3ddf, &(0x7f0000000680)) syz_io_uring_submit(r1, r2, &(0x7f0000000800)=@IORING_OP_SENDMSG={0x9, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0}, 0x0) r4 = eventfd(0x0) io_uring_register$IORING_REGISTER_EVENTFD(r0, 0x4, &(0x7f0000000000)=r4, 0x1) read$eventfd(r4, 0x0, 0x0) r5 = syz_io_uring_setup(0x3702, &(0x7f00000001c0), &(0x7f0000000000/0x3000)=nil, &(0x7f0000ffe000/0x2000)=nil, &(0x7f0000000140), &(0x7f0000000240)) r6 = dup2(r3, r5) r7 = dup2(r0, r6) io_uring_enter(r7, 0x1739, 0x0, 0x0, 0x0, 0x0) 19:28:18 executing program 6: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000500100000f000000000000000000000004000000000002000020000020000000def4655fdef4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000008000000018000000c20500002b0200000000000000000000000000000000000073797a6b616c6c6572000000000000002f746d702f73797a2d696d61676567656e35373134333434333800"/192, 0xc0, 0x400}, {&(0x7f0000010100)="000000000000000000000000e58ca12e13a240e2b1a22f8d07e8e55f010040000c00000000000000ddf4655f00"/64, 0x40, 0x4e0}, {&(0x7f0000010200)="0100000000000500400000000000000000000000000000003400000000000000", 0x20, 0x560}, {&(0x7f0000010300)="03000000040000000500000015000f0003000400"/32, 0x20, 0x800}, {&(0x7f0000012000)="504d4d00504d4dff", 0x8, 0x10000}], 0x0, &(0x7f0000012b00)) 19:28:18 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000500100000f000000000000000000000004000000000002000020000020000000def4655fdef4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000008000000018000000c20500002b0200000000000000000000000000000000000073797a6b616c6c6572000000000000002f746d702f73797a2d696d61676567656e35373134333434333800"/192, 0xc0, 0x400}, {&(0x7f0000010100)="000000000000000000000000e58ca12e13a240e2b1a22f8d07e8e55f010040000c00000000000000ddf4655f00"/64, 0x40, 0x4e0}, {&(0x7f0000010200)="0100000000000500400000000000000000000000000000003400000000000000", 0x20, 0x560}, {&(0x7f0000010300)="03000000040000000500000015000f0003000400"/32, 0x20, 0x800}, {&(0x7f0000010400)="ff070000ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff0100ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff0000000000000000ddf4655fddf4655fddf4655f00"/2080, 0x820, 0x1000000000c00}, {&(0x7f0000012000)="504d4d00504d4dff", 0x8}], 0x0, &(0x7f0000012b00)) [ 1033.512286] EXT4-fs warning (device loop3): read_mmp_block:106: Error -117 while reading MMP block 64 19:28:18 executing program 6: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000500100000f000000000000000000000004000000000002000020000020000000def4655fdef4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000008000000018000000c20500002b0200000000000000000000000000000000000073797a6b616c6c6572000000000000002f746d702f73797a2d696d61676567656e35373134333434333800"/192, 0xc0, 0x400}, {&(0x7f0000010100)="000000000000000000000000e58ca12e13a240e2b1a22f8d07e8e55f010040000c00000000000000ddf4655f00"/64, 0x40, 0x4e0}, {&(0x7f0000010200)="0100000000000500400000000000000000000000000000003400000000000000", 0x20, 0x560}, {&(0x7f0000010300)="03000000040000000500000015000f0003000400"/32, 0x20, 0x800}, {&(0x7f0000012000)="504d4d00504d4dff", 0x8, 0x10000}], 0x0, &(0x7f0000012b00)) 19:28:18 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000500100000f000000000000000000000004000000000002000020000020000000def4655fdef4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000008000000018000000c20500002b0200000000000000000000000000000000000073797a6b616c6c6572000000000000002f746d702f73797a2d696d61676567656e35373134333434333800"/192, 0xc0, 0x400}, {&(0x7f0000010100)="000000000000000000000000e58ca12e13a240e2b1a22f8d07e8e55f010040000c00000000000000ddf4655f00"/64, 0x40, 0x4e0}, {&(0x7f0000010200)="0100000000000500400000000000000000000000000000003400000000000000", 0x20, 0x560}, {&(0x7f0000010300)="03000000040000000500000015000f0003000400"/32, 0x20, 0x800}, {&(0x7f0000010400)="ff070000ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff0100ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff0000000000000000ddf4655fddf4655fddf4655f00"/2080, 0x820, 0x1000000000c00}, {&(0x7f0000012000)="504d4d00504d4dff", 0x8}], 0x0, &(0x7f0000012b00)) 19:28:18 executing program 7: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000500100000f000000000000000000000004000000000002000020000020000000def4655fdef4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000008000000018000000c20500002b0200000000000000000000000000000000000073797a6b616c6c6572000000000000002f746d702f73797a2d696d61676567656e35373134333434333800"/192, 0xc0, 0x400}, {&(0x7f0000010100)="000000000000000000000000e58ca12e13a240e2b1a22f8d07e8e55f010040000c00000000000000ddf4655f00"/64, 0x40, 0x4e0}, {&(0x7f0000010200)="0100000000000500400000000000000000000000000000003400000000000000", 0x20, 0x560}, {&(0x7f0000010300)="03000000040000000500000015000f0003000400"/32, 0x20, 0x800}, {&(0x7f0000010400)="ff070000ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff0100ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff0000000000000000ddf4655fddf4655fddf4655f00"/2080, 0x820, 0x1000000000c00}, {&(0x7f0000012000)="504d4d00504d4dff", 0x8}], 0x0, &(0x7f0000012b00)) [ 1033.574530] EXT4-fs warning (device loop5): read_mmp_block:106: Error -117 while reading MMP block 0 [ 1033.607920] EXT4-fs warning (device loop3): read_mmp_block:106: Error -117 while reading MMP block 64 [ 1033.647718] EXT4-fs (loop6): bad geometry: block count 512 exceeds size of device (128 blocks) [ 1033.653611] EXT4-fs warning (device loop7): read_mmp_block:106: Error -117 while reading MMP block 64 19:28:31 executing program 6: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000500100000f000000000000000000000004000000000002000020000020000000def4655fdef4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000008000000018000000c20500002b0200000000000000000000000000000000000073797a6b616c6c6572000000000000002f746d702f73797a2d696d61676567656e35373134333434333800"/192, 0xc0, 0x400}, {&(0x7f0000010100)="000000000000000000000000e58ca12e13a240e2b1a22f8d07e8e55f010040000c00000000000000ddf4655f00"/64, 0x40, 0x4e0}, {&(0x7f0000010200)="0100000000000500400000000000000000000000000000003400000000000000", 0x20, 0x560}, {&(0x7f0000010300)="03000000040000000500000015000f0003000400"/32, 0x20, 0x800}, {&(0x7f0000012000)="504d4d00504d4dff", 0x8, 0x10000}], 0x0, &(0x7f0000012b00)) 19:28:31 executing program 2: r0 = syz_io_uring_setup(0x21, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, &(0x7f00000a0000)=nil, &(0x7f00000b0000)=nil, &(0x7f0000000180)=0x0, &(0x7f0000002a40)=0x0) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_io_uring_submit(r1, r2, &(0x7f0000000300)=@IORING_OP_OPENAT={0x12, 0x0, 0x0, 0xffffffffffffffff, 0x0, &(0x7f0000000100)='./cgroup/cgroup.procs/file0/../file0\x00'}, 0x0) io_uring_enter(r0, 0x76d3, 0x0, 0x0, 0x0, 0x0) r3 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$netlbl_cipso(&(0x7f0000000000), r3) r4 = syz_io_uring_setup(0x2, &(0x7f0000000500), &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000ff6000/0xa000)=nil, &(0x7f0000000080)=0x0, &(0x7f0000000140)=0x0) r7 = io_uring_setup(0x3ddf, &(0x7f0000000680)) syz_io_uring_submit(r5, r6, &(0x7f0000000800)=@IORING_OP_SENDMSG={0x9, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0}, 0x0) r8 = eventfd(0x0) io_uring_register$IORING_REGISTER_EVENTFD(r4, 0x4, &(0x7f0000000000)=r8, 0x1) read$eventfd(r8, &(0x7f0000000040), 0x8) r9 = syz_io_uring_setup(0x3702, &(0x7f00000001c0), &(0x7f0000000000/0x3000)=nil, &(0x7f0000ffe000/0x2000)=nil, &(0x7f0000000140), &(0x7f0000000240)) dup2(r7, r9) io_uring_enter(0xffffffffffffffff, 0x1739, 0x0, 0x0, 0x0, 0x0) 19:28:31 executing program 1: syz_io_uring_setup(0x21, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, &(0x7f00000a0000)=nil, &(0x7f00000b0000)=nil, &(0x7f0000000180), &(0x7f0000002a40)) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r0 = syz_io_uring_setup(0x2, &(0x7f0000000500), &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000ff6000/0xa000)=nil, &(0x7f0000000080)=0x0, &(0x7f0000000140)=0x0) r3 = io_uring_setup(0x3ddf, &(0x7f0000000680)) syz_io_uring_submit(r1, r2, &(0x7f0000000800)=@IORING_OP_SENDMSG={0x9, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0}, 0x0) io_uring_register$IORING_REGISTER_EVENTFD(r0, 0x4, &(0x7f0000000000), 0x1) read$eventfd(0xffffffffffffffff, &(0x7f0000000040), 0x8) r4 = syz_io_uring_setup(0x3702, &(0x7f00000001c0), &(0x7f0000000000/0x3000)=nil, &(0x7f0000ffe000/0x2000)=nil, &(0x7f0000000140), &(0x7f0000000240)) r5 = dup2(r3, r4) r6 = dup2(r0, r5) io_uring_enter(r6, 0x1739, 0x0, 0x0, 0x0, 0x0) 19:28:31 executing program 0: r0 = syz_io_uring_setup(0x2, &(0x7f0000000500), &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000ff6000/0xa000)=nil, &(0x7f0000000080)=0x0, &(0x7f0000000140)=0x0) r3 = io_uring_setup(0x3ddf, &(0x7f0000000680)) syz_io_uring_submit(r1, r2, &(0x7f0000000800)=@IORING_OP_SENDMSG={0x9, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0}, 0x0) r4 = eventfd(0x0) io_uring_register$IORING_REGISTER_EVENTFD(r0, 0x4, &(0x7f0000000000)=r4, 0x1) read$eventfd(r4, &(0x7f0000000040), 0x8) r5 = syz_io_uring_setup(0x3702, 0x0, &(0x7f0000000000/0x3000)=nil, &(0x7f0000ffe000/0x2000)=nil, &(0x7f0000000140), &(0x7f0000000240)) r6 = dup2(r3, r5) r7 = dup2(r0, r6) io_uring_enter(r7, 0x1739, 0x0, 0x0, 0x0, 0x0) 19:28:31 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000500100000f000000000000000000000004000000000002000020000020000000def4655fdef4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000008000000018000000c20500002b0200000000000000000000000000000000000073797a6b616c6c6572000000000000002f746d702f73797a2d696d61676567656e35373134333434333800"/192, 0xc0, 0x400}, {&(0x7f0000010100)="000000000000000000000000e58ca12e13a240e2b1a22f8d07e8e55f010040000c00000000000000ddf4655f00"/64, 0x40, 0x4e0}, {&(0x7f0000010200)="010000000000050040000000", 0xc, 0x560}, {0x0, 0x0, 0x1000000000c00}, {&(0x7f0000012000)="504d4d00504d4dff", 0x8, 0x10000}], 0x0, &(0x7f0000012b00)) 19:28:31 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000500100000f000000000000000000000004000000000002000020000020000000def4655fdef4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000008000000018000000c20500002b0200000000000000000000000000000000000073797a6b616c6c6572000000000000002f746d702f73797a2d696d61676567656e35373134333434333800"/192, 0xc0, 0x400}, {&(0x7f0000010100)="000000000000000000000000e58ca12e13a240e2b1a22f8d07e8e55f010040000c00000000000000ddf4655f00"/64, 0x40, 0x4e0}, {&(0x7f0000010200)="0100000000000500400000000000000000000000000000003400000000000000", 0x20, 0x560}, {&(0x7f0000010300)="03000000040000000500000015000f0003000400"/32, 0x20, 0x800}, {&(0x7f0000012000)="504d4d00504d4dff", 0x8, 0x10000}], 0x0, &(0x7f0000012b00)) 19:28:31 executing program 7: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000500100000f000000000000000000000004000000000002000020000020000000def4655fdef4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000008000000018000000c20500002b0200000000000000000000000000000000000073797a6b616c6c6572000000000000002f746d702f73797a2d696d61676567656e35373134333434333800"/192, 0xc0, 0x400}, {&(0x7f0000010100)="000000000000000000000000e58ca12e13a240e2b1a22f8d07e8e55f010040000c00000000000000ddf4655f00"/64, 0x40, 0x4e0}, {&(0x7f0000010200)="0100000000000500400000000000000000000000000000003400000000000000", 0x20, 0x560}, {&(0x7f0000010300)="03000000040000000500000015000f0003000400"/32, 0x20, 0x800}, {&(0x7f0000010400)="ff070000ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff0100ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff0000000000000000ddf4655fddf4655fddf4655f00"/2080, 0x820, 0x1000000000c00}, {&(0x7f0000012000)="504d4d00504d4dff", 0x8}], 0x0, &(0x7f0000012b00)) 19:28:31 executing program 4: r0 = syz_io_uring_setup(0x2, &(0x7f0000000500), &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000ff6000/0xa000)=nil, &(0x7f0000000080)=0x0, &(0x7f0000000140)=0x0) r3 = io_uring_setup(0x3ddf, &(0x7f0000000680)) syz_io_uring_submit(r1, r2, &(0x7f0000000800)=@IORING_OP_SENDMSG={0x9, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0}, 0x0) r4 = eventfd(0x0) io_uring_register$IORING_REGISTER_EVENTFD(r0, 0x4, &(0x7f0000000000)=r4, 0x1) read$eventfd(r4, &(0x7f0000000040), 0x8) r5 = syz_io_uring_setup(0x0, &(0x7f00000001c0), &(0x7f0000000000/0x3000)=nil, &(0x7f0000ffe000/0x2000)=nil, &(0x7f0000000140), &(0x7f0000000240)) r6 = dup2(r3, r5) r7 = dup2(r0, r6) io_uring_enter(r7, 0x1739, 0x0, 0x0, 0x0, 0x0) [ 1046.213240] EXT4-fs (loop3): bad geometry: block count 512 exceeds size of device (128 blocks) [ 1046.220594] EXT4-fs warning (device loop7): read_mmp_block:106: Error -117 while reading MMP block 64 [ 1046.246853] EXT4-fs (loop6): bad geometry: block count 512 exceeds size of device (128 blocks) [ 1046.256611] EXT4-fs error (device loop5): ext4_fill_super:4947: inode #2: comm syz-executor.5: iget: root inode unallocated [ 1046.269162] EXT4-fs (loop5): get root inode failed [ 1046.270740] EXT4-fs (loop5): mount failed 19:28:31 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000500100000f000000000000000000000004000000000002000020000020000000def4655fdef4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000008000000018000000c20500002b0200000000000000000000000000000000000073797a6b616c6c6572000000000000002f746d702f73797a2d696d61676567656e35373134333434333800"/192, 0xc0, 0x400}, {&(0x7f0000010100)="000000000000000000000000e58ca12e13a240e2b1a22f8d07e8e55f010040000c00000000000000ddf4655f00"/64, 0x40, 0x4e0}, {&(0x7f0000010200)="0100000000000500400000000000000000000000000000003400000000000000", 0x20, 0x560}, {&(0x7f0000010300)="03000000040000000500000015000f0003000400"/32, 0x20, 0x800}, {&(0x7f0000012000)="504d4d00504d4dff", 0x8, 0x10000}], 0x0, &(0x7f0000012b00)) 19:28:31 executing program 7: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000500100000f000000000000000000000004000000000002000020000020000000def4655fdef4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000008000000018000000c20500002b0200000000000000000000000000000000000073797a6b616c6c6572000000000000002f746d702f73797a2d696d61676567656e35373134333434333800"/192, 0xc0, 0x400}, {&(0x7f0000010100)="000000000000000000000000e58ca12e13a240e2b1a22f8d07e8e55f010040000c00000000000000ddf4655f00"/64, 0x40, 0x4e0}, {&(0x7f0000010200)="0100000000000500400000000000000000000000000000003400000000000000", 0x20, 0x560}, {&(0x7f0000010300)="03000000040000000500000015000f0003000400"/32, 0x20, 0x800}, {&(0x7f0000012000)="504d4d00504d4dff", 0x8, 0x10000}], 0x0, &(0x7f0000012b00)) 19:28:31 executing program 6: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000500100000f000000000000000000000004000000000002000020000020000000def4655fdef4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000008000000018000000c20500002b0200000000000000000000000000000000000073797a6b616c6c6572000000000000002f746d702f73797a2d696d61676567656e35373134333434333800"/192, 0xc0, 0x400}, {&(0x7f0000010100)="000000000000000000000000e58ca12e13a240e2b1a22f8d07e8e55f010040000c00000000000000ddf4655f00"/64, 0x40, 0x4e0}, {&(0x7f0000010200)="0100000000000500400000000000000000000000000000003400000000000000", 0x20, 0x560}, {&(0x7f0000010300)="03000000040000000500000015000f0003000400"/32, 0x20, 0x800}, {0x0, 0x0, 0x1000000000c00}, {&(0x7f0000012000)="504d4d00504d4dff", 0x8, 0x10000}], 0x0, &(0x7f0000012b00)) [ 1046.382140] EXT4-fs (loop7): bad geometry: block count 512 exceeds size of device (128 blocks) 19:28:31 executing program 7: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000500100000f000000000000000000000004000000000002000020000020000000def4655fdef4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000008000000018000000c20500002b0200000000000000000000000000000000000073797a6b616c6c6572000000000000002f746d702f73797a2d696d61676567656e35373134333434333800"/192, 0xc0, 0x400}, {&(0x7f0000010100)="000000000000000000000000e58ca12e13a240e2b1a22f8d07e8e55f010040000c00000000000000ddf4655f00"/64, 0x40, 0x4e0}, {&(0x7f0000010200)="0100000000000500400000000000000000000000000000003400000000000000", 0x20, 0x560}, {&(0x7f0000010300)="03000000040000000500000015000f0003000400"/32, 0x20, 0x800}, {&(0x7f0000012000)="504d4d00504d4dff", 0x8, 0x10000}], 0x0, &(0x7f0000012b00)) 19:28:31 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000500100000f000000000000000000000004000000000002000020000020000000def4655fdef4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000008000000018000000c20500002b0200000000000000000000000000000000000073797a6b616c6c6572000000000000002f746d702f73797a2d696d61676567656e35373134333434333800"/192, 0xc0, 0x400}, {&(0x7f0000010100)="000000000000000000000000e58ca12e13a240e2b1a22f8d07e8e55f010040000c00000000000000ddf4655f00"/64, 0x40, 0x4e0}, {&(0x7f0000010200)="0100000000000500", 0x8, 0x560}, {0x0, 0x0, 0x1000000000c00}, {&(0x7f0000012000)="504d4d00504d4dff", 0x8, 0x10000}], 0x0, &(0x7f0000012b00)) 19:28:31 executing program 1: syz_io_uring_setup(0x21, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, &(0x7f00000a0000)=nil, &(0x7f00000b0000)=nil, &(0x7f0000000180), &(0x7f0000002a40)) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r0 = syz_io_uring_setup(0x2, &(0x7f0000000500), &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000ff6000/0xa000)=nil, &(0x7f0000000080)=0x0, &(0x7f0000000140)=0x0) r3 = io_uring_setup(0x3ddf, &(0x7f0000000680)) syz_io_uring_submit(r1, r2, &(0x7f0000000800)=@IORING_OP_SENDMSG={0x9, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0}, 0x0) io_uring_register$IORING_REGISTER_EVENTFD(r0, 0x4, &(0x7f0000000000), 0x1) read$eventfd(0xffffffffffffffff, &(0x7f0000000040), 0x8) r4 = syz_io_uring_setup(0x3702, &(0x7f00000001c0), &(0x7f0000000000/0x3000)=nil, &(0x7f0000ffe000/0x2000)=nil, &(0x7f0000000140), &(0x7f0000000240)) r5 = dup2(r3, r4) r6 = dup2(r0, r5) io_uring_enter(r6, 0x1739, 0x0, 0x0, 0x0, 0x0) [ 1046.476849] EXT4-fs (loop3): bad geometry: block count 512 exceeds size of device (128 blocks) [ 1046.496210] EXT4-fs (loop7): bad geometry: block count 512 exceeds size of device (128 blocks) [ 1046.533825] EXT4-fs warning (device loop5): read_mmp_block:106: Error -117 while reading MMP block 0 19:28:31 executing program 7: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000500100000f000000000000000000000004000000000002000020000020000000def4655fdef4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000008000000018000000c20500002b0200000000000000000000000000000000000073797a6b616c6c6572000000000000002f746d702f73797a2d696d61676567656e35373134333434333800"/192, 0xc0, 0x400}, {&(0x7f0000010100)="000000000000000000000000e58ca12e13a240e2b1a22f8d07e8e55f010040000c00000000000000ddf4655f00"/64, 0x40, 0x4e0}, {&(0x7f0000010200)="0100000000000500400000000000000000000000000000003400000000000000", 0x20, 0x560}, {&(0x7f0000010300)="03000000040000000500000015000f0003000400"/32, 0x20, 0x800}, {&(0x7f0000012000)="504d4d00504d4dff", 0x8, 0x10000}], 0x0, &(0x7f0000012b00)) [ 1046.549879] EXT4-fs error (device loop6): ext4_fill_super:4947: inode #2: comm syz-executor.6: iget: root inode unallocated [ 1046.552335] EXT4-fs (loop6): get root inode failed [ 1046.553420] EXT4-fs (loop6): mount failed 19:28:31 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000500100000f000000000000000000000004000000000002000020000020000000def4655fdef4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000008000000018000000c20500002b0200000000000000000000000000000000000073797a6b616c6c6572000000000000002f746d702f73797a2d696d61676567656e35373134333434333800"/192, 0xc0, 0x400}, {&(0x7f0000010100)="000000000000000000000000e58ca12e13a240e2b1a22f8d07e8e55f010040000c00000000000000ddf4655f00"/64, 0x40, 0x4e0}, {&(0x7f0000010200)="0100000000000500400000000000000000000000000000003400000000000000", 0x20, 0x560}, {&(0x7f0000010300)="03000000040000000500000015000f0003000400"/32, 0x20, 0x800}, {&(0x7f0000012000)="504d4d00504d4dff", 0x8, 0x10000}], 0x0, &(0x7f0000012b00)) [ 1046.624905] EXT4-fs (loop3): bad geometry: block count 512 exceeds size of device (128 blocks) [ 1046.658826] EXT4-fs (loop7): bad geometry: block count 512 exceeds size of device (128 blocks) 19:28:43 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000500100000f000000000000000000000004000000000002000020000020000000def4655fdef4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000008000000018000000c20500002b0200000000000000000000000000000000000073797a6b616c6c6572000000000000002f746d702f73797a2d696d61676567656e35373134333434333800"/192, 0xc0, 0x400}, {&(0x7f0000010100)="000000000000000000000000e58ca12e13a240e2b1a22f8d07e8e55f010040000c00000000000000ddf4655f00"/64, 0x40, 0x4e0}, {&(0x7f0000010200)="0100000000000500400000000000000000000000000000003400000000000000", 0x20, 0x560}, {&(0x7f0000010300)="03000000040000000500000015000f0003000400"/32, 0x20, 0x800}, {0x0, 0x0, 0x1000000000c00}, {&(0x7f0000012000)="504d4d00504d4dff", 0x8, 0x10000}], 0x0, &(0x7f0000012b00)) 19:28:43 executing program 6: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000500100000f000000000000000000000004000000000002000020000020000000def4655fdef4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000008000000018000000c20500002b0200000000000000000000000000000000000073797a6b616c6c6572000000000000002f746d702f73797a2d696d61676567656e35373134333434333800"/192, 0xc0, 0x400}, {&(0x7f0000010100)="000000000000000000000000e58ca12e13a240e2b1a22f8d07e8e55f010040000c00000000000000ddf4655f00"/64, 0x40, 0x4e0}, {&(0x7f0000010200)="0100000000000500400000000000000000000000000000003400000000000000", 0x20, 0x560}, {&(0x7f0000010300)="03000000040000000500000015000f0003000400"/32, 0x20, 0x800}, {0x0}, {&(0x7f0000012000)="504d4d00504d4dff", 0x8, 0x10000}], 0x0, &(0x7f0000012b00)) 19:28:43 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000500100000f000000000000000000000004000000000002000020000020000000def4655fdef4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000008000000018000000c20500002b0200000000000000000000000000000000000073797a6b616c6c6572000000000000002f746d702f73797a2d696d61676567656e35373134333434333800"/192, 0xc0, 0x400}, {&(0x7f0000010100)="000000000000000000000000e58ca12e13a240e2b1a22f8d07e8e55f010040000c00000000000000ddf4655f00"/64, 0x40, 0x4e0}, {&(0x7f0000010200)="0100000000000500", 0x8, 0x560}, {0x0, 0x0, 0x1000000000c00}, {&(0x7f0000012000)="504d4d00504d4dff", 0x8, 0x10000}], 0x0, &(0x7f0000012b00)) 19:28:43 executing program 1: syz_io_uring_setup(0x21, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, &(0x7f00000a0000)=nil, &(0x7f00000b0000)=nil, &(0x7f0000000180), &(0x7f0000002a40)) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r0 = syz_io_uring_setup(0x2, &(0x7f0000000500), &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000ff6000/0xa000)=nil, &(0x7f0000000080), &(0x7f0000000140)) r1 = io_uring_setup(0x3ddf, &(0x7f0000000680)) r2 = eventfd(0x0) io_uring_register$IORING_REGISTER_EVENTFD(r0, 0x4, &(0x7f0000000000)=r2, 0x1) read$eventfd(r2, &(0x7f0000000040), 0x8) r3 = syz_io_uring_setup(0x3702, &(0x7f00000001c0), &(0x7f0000000000/0x3000)=nil, &(0x7f0000ffe000/0x2000)=nil, &(0x7f0000000140), &(0x7f0000000240)) r4 = dup2(r1, r3) r5 = dup2(r0, r4) io_uring_enter(r5, 0x1739, 0x0, 0x0, 0x0, 0x0) 19:28:43 executing program 4: r0 = syz_io_uring_setup(0x2, &(0x7f0000000500), &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000ff6000/0xa000)=nil, &(0x7f0000000080)=0x0, &(0x7f0000000140)=0x0) r3 = io_uring_setup(0x3ddf, &(0x7f0000000680)) syz_io_uring_submit(r1, r2, &(0x7f0000000800)=@IORING_OP_SENDMSG={0x9, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0}, 0x0) r4 = eventfd(0x0) io_uring_register$IORING_REGISTER_EVENTFD(r0, 0x4, &(0x7f0000000000)=r4, 0x1) read$eventfd(r4, &(0x7f0000000040), 0x8) r5 = syz_io_uring_setup(0x0, &(0x7f00000001c0), &(0x7f0000000000/0x3000)=nil, &(0x7f0000ffe000/0x2000)=nil, &(0x7f0000000140), &(0x7f0000000240)) r6 = dup2(r3, r5) r7 = dup2(r0, r6) io_uring_enter(r7, 0x1739, 0x0, 0x0, 0x0, 0x0) 19:28:43 executing program 0: r0 = syz_io_uring_setup(0x2, &(0x7f0000000500), &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000ff6000/0xa000)=nil, &(0x7f0000000080)=0x0, &(0x7f0000000140)=0x0) r3 = io_uring_setup(0x3ddf, &(0x7f0000000680)) syz_io_uring_submit(r1, r2, &(0x7f0000000800)=@IORING_OP_SENDMSG={0x9, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0}, 0x0) r4 = eventfd(0x0) io_uring_register$IORING_REGISTER_EVENTFD(r0, 0x4, &(0x7f0000000000)=r4, 0x1) read$eventfd(r4, &(0x7f0000000040), 0x8) r5 = syz_io_uring_setup(0x3702, &(0x7f00000001c0), &(0x7f0000000000/0x3000)=nil, &(0x7f0000ffe000/0x2000)=nil, 0x0, &(0x7f0000000240)) r6 = dup2(r3, r5) r7 = dup2(r0, r6) io_uring_enter(r7, 0x1739, 0x0, 0x0, 0x0, 0x0) 19:28:43 executing program 2: r0 = syz_io_uring_setup(0x21, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, &(0x7f00000a0000)=nil, &(0x7f00000b0000)=nil, &(0x7f0000000180)=0x0, &(0x7f0000002a40)=0x0) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_io_uring_submit(r1, r2, &(0x7f0000000300)=@IORING_OP_OPENAT={0x12, 0x0, 0x0, 0xffffffffffffffff, 0x0, &(0x7f0000000100)='./cgroup/cgroup.procs/file0/../file0\x00'}, 0x0) io_uring_enter(r0, 0x76d3, 0x0, 0x0, 0x0, 0x0) r3 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$netlbl_cipso(&(0x7f0000000000), r3) r4 = syz_io_uring_setup(0x2, &(0x7f0000000500), &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000ff6000/0xa000)=nil, &(0x7f0000000080)=0x0, &(0x7f0000000140)=0x0) r7 = io_uring_setup(0x3ddf, &(0x7f0000000680)) syz_io_uring_submit(r5, r6, &(0x7f0000000800)=@IORING_OP_SENDMSG={0x9, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0}, 0x0) r8 = eventfd(0x0) io_uring_register$IORING_REGISTER_EVENTFD(r4, 0x4, &(0x7f0000000000)=r8, 0x1) read$eventfd(r8, &(0x7f0000000040), 0x8) r9 = syz_io_uring_setup(0x3702, &(0x7f00000001c0), &(0x7f0000000000/0x3000)=nil, &(0x7f0000ffe000/0x2000)=nil, &(0x7f0000000140), &(0x7f0000000240)) dup2(r7, r9) io_uring_enter(0xffffffffffffffff, 0x1739, 0x0, 0x0, 0x0, 0x0) 19:28:43 executing program 7: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000500100000f000000000000000000000004000000000002000020000020000000def4655fdef4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000008000000018000000c20500002b0200000000000000000000000000000000000073797a6b616c6c6572000000000000002f746d702f73797a2d696d61676567656e35373134333434333800"/192, 0xc0, 0x400}, {&(0x7f0000010100)="000000000000000000000000e58ca12e13a240e2b1a22f8d07e8e55f010040000c00000000000000ddf4655f00"/64, 0x40, 0x4e0}, {&(0x7f0000010200)="0100000000000500400000000000000000000000000000003400000000000000", 0x20, 0x560}, {&(0x7f0000010300)="03000000040000000500000015000f0003000400"/32, 0x20, 0x800}, {0x0, 0x0, 0x1000000000c00}, {&(0x7f0000012000)="504d4d00504d4dff", 0x8, 0x10000}], 0x0, &(0x7f0000012b00)) [ 1058.437503] EXT4-fs (loop6): bad geometry: block count 512 exceeds size of device (128 blocks) [ 1058.437698] EXT4-fs error (device loop7): ext4_fill_super:4947: inode #2: comm syz-executor.7: iget: root inode unallocated [ 1058.444207] EXT4-fs warning (device loop5): read_mmp_block:106: Error -117 while reading MMP block 0 [ 1058.447353] EXT4-fs (loop7): get root inode failed [ 1058.448126] EXT4-fs (loop7): mount failed 19:28:43 executing program 6: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000500100000f000000000000000000000004000000000002000020000020000000def4655fdef4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000008000000018000000c20500002b0200000000000000000000000000000000000073797a6b616c6c6572000000000000002f746d702f73797a2d696d61676567656e35373134333434333800"/192, 0xc0, 0x400}, {&(0x7f0000010100)="000000000000000000000000e58ca12e13a240e2b1a22f8d07e8e55f010040000c00000000000000ddf4655f00"/64, 0x40, 0x4e0}, {&(0x7f0000010200)="0100000000000500400000000000000000000000000000003400000000000000", 0x20, 0x560}, {&(0x7f0000010300)="03000000040000000500000015000f0003000400"/32, 0x20, 0x800}, {0x0}, {&(0x7f0000012000)="504d4d00504d4dff", 0x8, 0x10000}], 0x0, &(0x7f0000012b00)) 19:28:43 executing program 7: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000500100000f000000000000000000000004000000000002000020000020000000def4655fdef4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000008000000018000000c20500002b0200000000000000000000000000000000000073797a6b616c6c6572000000000000002f746d702f73797a2d696d61676567656e35373134333434333800"/192, 0xc0, 0x400}, {&(0x7f0000010100)="000000000000000000000000e58ca12e13a240e2b1a22f8d07e8e55f010040000c00000000000000ddf4655f00"/64, 0x40, 0x4e0}, {&(0x7f0000010200)="0100000000000500400000000000000000000000000000003400000000000000", 0x20, 0x560}, {&(0x7f0000010300)="03000000040000000500000015000f0003000400"/32, 0x20, 0x800}, {0x0}, {&(0x7f0000012000)="504d4d00504d4dff", 0x8, 0x10000}], 0x0, &(0x7f0000012b00)) 19:28:43 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000500100000f000000000000000000000004000000000002000020000020000000def4655fdef4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000008000000018000000c20500002b0200000000000000000000000000000000000073797a6b616c6c6572000000000000002f746d702f73797a2d696d61676567656e35373134333434333800"/192, 0xc0, 0x400}, {&(0x7f0000010100)="000000000000000000000000e58ca12e13a240e2b1a22f8d07e8e55f010040000c00000000000000ddf4655f00"/64, 0x40, 0x4e0}, {&(0x7f0000010200)="0100000000000500", 0x8, 0x560}, {0x0, 0x0, 0x1000000000c00}, {&(0x7f0000012000)="504d4d00504d4dff", 0x8, 0x10000}], 0x0, &(0x7f0000012b00)) [ 1058.517707] EXT4-fs error (device loop3): ext4_fill_super:4947: inode #2: comm syz-executor.3: iget: root inode unallocated [ 1058.521752] EXT4-fs (loop3): get root inode failed [ 1058.522387] EXT4-fs (loop3): mount failed [ 1058.534271] EXT4-fs (loop6): bad geometry: block count 512 exceeds size of device (128 blocks) [ 1058.549825] EXT4-fs warning (device loop5): read_mmp_block:106: Error -117 while reading MMP block 0 19:28:44 executing program 7: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000500100000f000000000000000000000004000000000002000020000020000000def4655fdef4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000008000000018000000c20500002b0200000000000000000000000000000000000073797a6b616c6c6572000000000000002f746d702f73797a2d696d61676567656e35373134333434333800"/192, 0xc0, 0x400}, {&(0x7f0000010100)="000000000000000000000000e58ca12e13a240e2b1a22f8d07e8e55f010040000c00000000000000ddf4655f00"/64, 0x40, 0x4e0}, {&(0x7f0000010200)="0100000000000500400000000000000000000000000000003400000000000000", 0x20, 0x560}, {&(0x7f0000010300)="03000000040000000500000015000f0003000400"/32, 0x20, 0x800}, {0x0}, {&(0x7f0000012000)="504d4d00504d4dff", 0x8, 0x10000}], 0x0, &(0x7f0000012b00)) 19:28:44 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000500100000f000000000000000000000004000000000002000020000020000000def4655fdef4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000008000000018000000c20500002b0200000000000000000000000000000000000073797a6b616c6c6572000000000000002f746d702f73797a2d696d61676567656e35373134333434333800"/192, 0xc0, 0x400}, {&(0x7f0000010100)="000000000000000000000000e58ca12e13a240e2b1a22f8d07e8e55f010040000c00000000000000ddf4655f00"/64, 0x40, 0x4e0}, {&(0x7f0000010200)="0100000000000500400000000000000000000000000000003400000000000000", 0x20, 0x560}, {&(0x7f0000010300)="03000000040000000500000015000f0003000400"/32, 0x20, 0x800}, {0x0}, {&(0x7f0000012000)="504d4d00504d4dff", 0x8, 0x10000}], 0x0, &(0x7f0000012b00)) 19:28:44 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000500100000f000000000000000000000004000000000002000020000020000000def4655fdef4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000008000000018000000c20500002b0200000000000000000000000000000000000073797a6b616c6c6572000000000000002f746d702f73797a2d696d61676567656e35373134333434333800"/192, 0xc0, 0x400}, {&(0x7f0000010100)="000000000000000000000000e58ca12e13a240e2b1a22f8d07e8e55f010040000c00000000000000ddf4655f00"/64, 0x40, 0x4e0}, {&(0x7f0000010200)="01000000000005004000", 0xa, 0x560}, {0x0, 0x0, 0x1000000000c00}, {&(0x7f0000012000)="504d4d00504d4dff", 0x8, 0x10000}], 0x0, &(0x7f0000012b00)) 19:28:44 executing program 6: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000500100000f000000000000000000000004000000000002000020000020000000def4655fdef4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000008000000018000000c20500002b0200000000000000000000000000000000000073797a6b616c6c6572000000000000002f746d702f73797a2d696d61676567656e35373134333434333800"/192, 0xc0, 0x400}, {&(0x7f0000010100)="000000000000000000000000e58ca12e13a240e2b1a22f8d07e8e55f010040000c00000000000000ddf4655f00"/64, 0x40, 0x4e0}, {&(0x7f0000010200)="0100000000000500400000000000000000000000000000003400000000000000", 0x20, 0x560}, {&(0x7f0000010300)="03000000040000000500000015000f0003000400"/32, 0x20, 0x800}, {0x0}, {&(0x7f0000012000)="504d4d00504d4dff", 0x8, 0x10000}], 0x0, &(0x7f0000012b00)) [ 1058.702815] EXT4-fs (loop7): bad geometry: block count 512 exceeds size of device (128 blocks) 19:28:44 executing program 7: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000500100000f000000000000000000000004000000000002000020000020000000def4655fdef4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000008000000018000000c20500002b0200000000000000000000000000000000000073797a6b616c6c6572000000000000002f746d702f73797a2d696d61676567656e35373134333434333800"/192, 0xc0, 0x400}, {&(0x7f0000010100)="000000000000000000000000e58ca12e13a240e2b1a22f8d07e8e55f010040000c00000000000000ddf4655f00"/64, 0x40, 0x4e0}, {&(0x7f0000010200)="0100000000000500400000000000000000000000000000003400000000000000", 0x20, 0x560}, {&(0x7f0000010300)="03000000040000000500000015000f0003000400"/32, 0x20, 0x800}, {0x0}, {&(0x7f0000012000)="504d4d00504d4dff", 0x8, 0x10000}], 0x0, &(0x7f0000012b00)) [ 1058.738998] EXT4-fs (loop3): bad geometry: block count 512 exceeds size of device (128 blocks) [ 1058.752846] EXT4-fs (loop6): bad geometry: block count 512 exceeds size of device (128 blocks) [ 1058.770172] EXT4-fs error (device loop5): ext4_fill_super:4947: inode #2: comm syz-executor.5: iget: root inode unallocated [ 1058.772351] EXT4-fs (loop5): get root inode failed [ 1058.773148] EXT4-fs (loop5): mount failed 19:28:44 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000500100000f000000000000000000000004000000000002000020000020000000def4655fdef4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000008000000018000000c20500002b0200000000000000000000000000000000000073797a6b616c6c6572000000000000002f746d702f73797a2d696d61676567656e35373134333434333800"/192, 0xc0, 0x400}, {&(0x7f0000010100)="000000000000000000000000e58ca12e13a240e2b1a22f8d07e8e55f010040000c00000000000000ddf4655f00"/64, 0x40, 0x4e0}, {&(0x7f0000010200)="0100000000000500400000000000000000000000000000003400000000000000", 0x20, 0x560}, {&(0x7f0000010300)="03000000040000000500000015000f0003000400"/32, 0x20, 0x800}, {0x0}, {&(0x7f0000012000)="504d4d00504d4dff", 0x8, 0x10000}], 0x0, &(0x7f0000012b00)) [ 1058.832080] EXT4-fs (loop7): bad geometry: block count 512 exceeds size of device (128 blocks) [ 1058.870383] EXT4-fs (loop3): bad geometry: block count 512 exceeds size of device (128 blocks) 19:28:56 executing program 1: syz_io_uring_setup(0x21, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, &(0x7f00000a0000)=nil, &(0x7f00000b0000)=nil, &(0x7f0000000180), &(0x7f0000002a40)) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r0 = syz_io_uring_setup(0x2, &(0x7f0000000500), &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000ff6000/0xa000)=nil, &(0x7f0000000080), &(0x7f0000000140)) r1 = io_uring_setup(0x3ddf, &(0x7f0000000680)) r2 = eventfd(0x0) io_uring_register$IORING_REGISTER_EVENTFD(r0, 0x4, &(0x7f0000000000)=r2, 0x1) read$eventfd(r2, &(0x7f0000000040), 0x8) r3 = syz_io_uring_setup(0x3702, &(0x7f00000001c0), &(0x7f0000000000/0x3000)=nil, &(0x7f0000ffe000/0x2000)=nil, &(0x7f0000000140), &(0x7f0000000240)) r4 = dup2(r1, r3) r5 = dup2(r0, r4) io_uring_enter(r5, 0x1739, 0x0, 0x0, 0x0, 0x0) 19:28:56 executing program 0: r0 = syz_io_uring_setup(0x2, &(0x7f0000000500), &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000ff6000/0xa000)=nil, &(0x7f0000000080)=0x0, &(0x7f0000000140)=0x0) r3 = io_uring_setup(0x3ddf, &(0x7f0000000680)) syz_io_uring_submit(r1, r2, &(0x7f0000000800)=@IORING_OP_SENDMSG={0x9, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0}, 0x0) r4 = eventfd(0x0) io_uring_register$IORING_REGISTER_EVENTFD(r0, 0x4, &(0x7f0000000000)=r4, 0x1) read$eventfd(r4, &(0x7f0000000040), 0x8) r5 = syz_io_uring_setup(0x3702, &(0x7f00000001c0), &(0x7f0000000000/0x3000)=nil, &(0x7f0000ffe000/0x2000)=nil, 0x0, &(0x7f0000000240)) r6 = dup2(r3, r5) r7 = dup2(r0, r6) io_uring_enter(r7, 0x1739, 0x0, 0x0, 0x0, 0x0) 19:28:56 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000500100000f000000000000000000000004000000000002000020000020000000def4655fdef4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000008000000018000000c20500002b0200000000000000000000000000000000000073797a6b616c6c6572000000000000002f746d702f73797a2d696d61676567656e35373134333434333800"/192, 0xc0, 0x400}, {&(0x7f0000010100)="000000000000000000000000e58ca12e13a240e2b1a22f8d07e8e55f010040000c00000000000000ddf4655f00"/64, 0x40, 0x4e0}, {&(0x7f0000010200)="0100000000000500", 0x8, 0x560}, {0x0, 0x0, 0x1000000000c00}, {&(0x7f0000012000)="504d4d00504d4dff", 0x8, 0x10000}], 0x0, &(0x7f0000012b00)) 19:28:56 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000500100000f000000000000000000000004000000000002000020000020000000def4655fdef4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000008000000018000000c20500002b0200000000000000000000000000000000000073797a6b616c6c6572000000000000002f746d702f73797a2d696d61676567656e35373134333434333800"/192, 0xc0, 0x400}, {&(0x7f0000010100)="000000000000000000000000e58ca12e13a240e2b1a22f8d07e8e55f010040000c00000000000000ddf4655f00"/64, 0x40, 0x4e0}, {&(0x7f0000010200)="0100000000000500400000000000000000000000000000003400000000000000", 0x20, 0x560}, {&(0x7f0000010300)="03000000040000000500000015000f0003000400"/32, 0x20, 0x800}, {0x0}, {&(0x7f0000012000)="504d4d00504d4dff", 0x8, 0x10000}], 0x0, &(0x7f0000012b00)) 19:28:56 executing program 6: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000500100000f000000000000000000000004000000000002000020000020000000def4655fdef4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000008000000018000000c20500002b0200000000000000000000000000000000000073797a6b616c6c6572000000000000002f746d702f73797a2d696d61676567656e35373134333434333800"/192, 0xc0, 0x400}, {&(0x7f0000010100)="000000000000000000000000e58ca12e13a240e2b1a22f8d07e8e55f010040000c00000000000000ddf4655f00"/64, 0x40, 0x4e0}, {&(0x7f0000010200)="0100000000000500400000000000000000000000000000003400000000000000", 0x20, 0x560}, {0x0, 0x0, 0x1000000000c00}, {&(0x7f0000012000)="504d4d00504d4dff", 0x8, 0x10000}], 0x0, &(0x7f0000012b00)) 19:28:56 executing program 7: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000500100000f000000000000000000000004000000000002000020000020000000def4655fdef4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000008000000018000000c20500002b0200000000000000000000000000000000000073797a6b616c6c6572000000000000002f746d702f73797a2d696d61676567656e35373134333434333800"/192, 0xc0, 0x400}, {&(0x7f0000010100)="000000000000000000000000e58ca12e13a240e2b1a22f8d07e8e55f010040000c00000000000000ddf4655f00"/64, 0x40, 0x4e0}, {&(0x7f0000010200)="0100000000000500400000000000000000000000000000003400000000000000", 0x20, 0x560}, {0x0, 0x0, 0x1000000000c00}, {&(0x7f0000012000)="504d4d00504d4dff", 0x8, 0x10000}], 0x0, &(0x7f0000012b00)) 19:28:56 executing program 4: r0 = syz_io_uring_setup(0x2, &(0x7f0000000500), &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000ff6000/0xa000)=nil, &(0x7f0000000080)=0x0, &(0x7f0000000140)=0x0) r3 = io_uring_setup(0x3ddf, &(0x7f0000000680)) syz_io_uring_submit(r1, r2, &(0x7f0000000800)=@IORING_OP_SENDMSG={0x9, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0}, 0x0) r4 = eventfd(0x0) io_uring_register$IORING_REGISTER_EVENTFD(r0, 0x4, &(0x7f0000000000)=r4, 0x1) read$eventfd(r4, &(0x7f0000000040), 0x8) r5 = syz_io_uring_setup(0x0, &(0x7f00000001c0), &(0x7f0000000000/0x3000)=nil, &(0x7f0000ffe000/0x2000)=nil, &(0x7f0000000140), &(0x7f0000000240)) r6 = dup2(r3, r5) r7 = dup2(r0, r6) io_uring_enter(r7, 0x1739, 0x0, 0x0, 0x0, 0x0) 19:28:56 executing program 2: r0 = syz_io_uring_setup(0x21, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, &(0x7f00000a0000)=nil, &(0x7f00000b0000)=nil, &(0x7f0000000180)=0x0, &(0x7f0000002a40)=0x0) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_io_uring_submit(r1, r2, &(0x7f0000000300)=@IORING_OP_OPENAT={0x12, 0x0, 0x0, 0xffffffffffffffff, 0x0, &(0x7f0000000100)='./cgroup/cgroup.procs/file0/../file0\x00'}, 0x0) io_uring_enter(r0, 0x76d3, 0x0, 0x0, 0x0, 0x0) r3 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$netlbl_cipso(&(0x7f0000000000), r3) r4 = syz_io_uring_setup(0x2, &(0x7f0000000500), &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000ff6000/0xa000)=nil, &(0x7f0000000080)=0x0, &(0x7f0000000140)=0x0) r7 = io_uring_setup(0x3ddf, &(0x7f0000000680)) syz_io_uring_submit(r5, r6, &(0x7f0000000800)=@IORING_OP_SENDMSG={0x9, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0}, 0x0) r8 = eventfd(0x0) io_uring_register$IORING_REGISTER_EVENTFD(r4, 0x4, &(0x7f0000000000)=r8, 0x1) read$eventfd(r8, &(0x7f0000000040), 0x8) r9 = syz_io_uring_setup(0x3702, &(0x7f00000001c0), &(0x7f0000000000/0x3000)=nil, &(0x7f0000ffe000/0x2000)=nil, &(0x7f0000000140), &(0x7f0000000240)) dup2(r7, r9) io_uring_enter(0xffffffffffffffff, 0x1739, 0x0, 0x0, 0x0, 0x0) [ 1071.375985] EXT4-fs (loop3): bad geometry: block count 512 exceeds size of device (128 blocks) [ 1071.409584] EXT4-fs warning (device loop5): read_mmp_block:106: Error -117 while reading MMP block 0 19:28:56 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000500100000f000000000000000000000004000000000002000020000020000000def4655fdef4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000008000000018000000c20500002b0200000000000000000000000000000000000073797a6b616c6c6572000000000000002f746d702f73797a2d696d61676567656e35373134333434333800"/192, 0xc0, 0x400}, {&(0x7f0000010100)="000000000000000000000000e58ca12e13a240e2b1a22f8d07e8e55f010040000c00000000000000ddf4655f00"/64, 0x40, 0x4e0}, {&(0x7f0000010200)="0100000000000500400000000000000000000000000000003400000000000000", 0x20, 0x560}, {0x0, 0x0, 0x1000000000c00}, {&(0x7f0000012000)="504d4d00504d4dff", 0x8, 0x10000}], 0x0, &(0x7f0000012b00)) [ 1071.428362] EXT4-fs error (device loop6): ext4_fill_super:4947: inode #2: comm syz-executor.6: iget: root inode unallocated [ 1071.435458] EXT4-fs (loop6): get root inode failed [ 1071.436298] EXT4-fs (loop6): mount failed [ 1071.438320] EXT4-fs error (device loop7): ext4_fill_super:4947: inode #2: comm syz-executor.7: iget: root inode unallocated [ 1071.440467] EXT4-fs (loop7): get root inode failed [ 1071.441441] EXT4-fs (loop7): mount failed 19:28:56 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000500100000f000000000000000000000004000000000002000020000020000000def4655fdef4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000008000000018000000c20500002b0200000000000000000000000000000000000073797a6b616c6c6572000000000000002f746d702f73797a2d696d61676567656e35373134333434333800"/192, 0xc0, 0x400}, {&(0x7f0000010100)="000000000000000000000000e58ca12e13a240e2b1a22f8d07e8e55f010040000c00000000000000ddf4655f00"/64, 0x40, 0x4e0}, {&(0x7f0000010200)="0100000000000500", 0x8, 0x560}, {0x0, 0x0, 0x1000000000c00}, {&(0x7f0000012000)="504d4d00504d4dff", 0x8, 0x10000}], 0x0, &(0x7f0000012b00)) 19:28:56 executing program 7: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000500100000f000000000000000000000004000000000002000020000020000000def4655fdef4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000008000000018000000c20500002b0200000000000000000000000000000000000073797a6b616c6c6572000000000000002f746d702f73797a2d696d61676567656e35373134333434333800"/192, 0xc0, 0x400}, {&(0x7f0000010100)="000000000000000000000000e58ca12e13a240e2b1a22f8d07e8e55f010040000c00000000000000ddf4655f00"/64, 0x40, 0x4e0}, {&(0x7f0000010200)="0100000000000500400000000000000000000000000000003400000000000000", 0x20, 0x560}, {0x0}, {&(0x7f0000012000)="504d4d00504d4dff", 0x8, 0x10000}], 0x0, &(0x7f0000012b00)) [ 1071.502189] EXT4-fs error (device loop3): ext4_fill_super:4947: inode #2: comm syz-executor.3: iget: root inode unallocated 19:28:56 executing program 6: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000500100000f000000000000000000000004000000000002000020000020000000def4655fdef4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000008000000018000000c20500002b0200000000000000000000000000000000000073797a6b616c6c6572000000000000002f746d702f73797a2d696d61676567656e35373134333434333800"/192, 0xc0, 0x400}, {&(0x7f0000010100)="000000000000000000000000e58ca12e13a240e2b1a22f8d07e8e55f010040000c00000000000000ddf4655f00"/64, 0x40, 0x4e0}, {&(0x7f0000010200)="0100000000000500400000000000000000000000000000003400000000000000", 0x20, 0x560}, {0x0}, {&(0x7f0000012000)="504d4d00504d4dff", 0x8, 0x10000}], 0x0, &(0x7f0000012b00)) [ 1071.520825] EXT4-fs (loop3): get root inode failed [ 1071.521622] EXT4-fs (loop3): mount failed [ 1071.543964] EXT4-fs warning (device loop5): read_mmp_block:106: Error -117 while reading MMP block 0 19:28:56 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000500100000f000000000000000000000004000000000002000020000020000000def4655fdef4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000008000000018000000c20500002b0200000000000000000000000000000000000073797a6b616c6c6572000000000000002f746d702f73797a2d696d61676567656e35373134333434333800"/192, 0xc0, 0x400}, {&(0x7f0000010100)="000000000000000000000000e58ca12e13a240e2b1a22f8d07e8e55f010040000c00000000000000ddf4655f00"/64, 0x40, 0x4e0}, {&(0x7f0000010200)="0100000000000500400000000000000000000000000000003400000000000000", 0x20, 0x560}, {0x0}, {&(0x7f0000012000)="504d4d00504d4dff", 0x8, 0x10000}], 0x0, &(0x7f0000012b00)) [ 1071.563509] EXT4-fs (loop7): bad geometry: block count 512 exceeds size of device (128 blocks) 19:28:56 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000500100000f000000000000000000000004000000000002000020000020000000def4655fdef4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000008000000018000000c20500002b0200000000000000000000000000000000000073797a6b616c6c6572000000000000002f746d702f73797a2d696d61676567656e35373134333434333800"/192, 0xc0, 0x400}, {&(0x7f0000010100)="000000000000000000000000e58ca12e13a240e2b1a22f8d07e8e55f010040000c00000000000000ddf4655f00"/64, 0x40, 0x4e0}, {&(0x7f0000010200)="0100000000000500", 0x8, 0x560}, {0x0, 0x0, 0x1000000000c00}, {&(0x7f0000012000)="504d4d00504d4dff", 0x8, 0x10000}], 0x0, &(0x7f0000012b00)) [ 1071.605980] EXT4-fs (loop6): bad geometry: block count 512 exceeds size of device (128 blocks) 19:28:57 executing program 7: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000500100000f000000000000000000000004000000000002000020000020000000def4655fdef4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000008000000018000000c20500002b0200000000000000000000000000000000000073797a6b616c6c6572000000000000002f746d702f73797a2d696d61676567656e35373134333434333800"/192, 0xc0, 0x400}, {&(0x7f0000010100)="000000000000000000000000e58ca12e13a240e2b1a22f8d07e8e55f010040000c00000000000000ddf4655f00"/64, 0x40, 0x4e0}, {&(0x7f0000010200)="0100000000000500400000000000000000000000000000003400000000000000", 0x20, 0x560}, {0x0}, {&(0x7f0000012000)="504d4d00504d4dff", 0x8, 0x10000}], 0x0, &(0x7f0000012b00)) 19:28:57 executing program 6: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000500100000f000000000000000000000004000000000002000020000020000000def4655fdef4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000008000000018000000c20500002b0200000000000000000000000000000000000073797a6b616c6c6572000000000000002f746d702f73797a2d696d61676567656e35373134333434333800"/192, 0xc0, 0x400}, {&(0x7f0000010100)="000000000000000000000000e58ca12e13a240e2b1a22f8d07e8e55f010040000c00000000000000ddf4655f00"/64, 0x40, 0x4e0}, {&(0x7f0000010200)="0100000000000500400000000000000000000000000000003400000000000000", 0x20, 0x560}, {0x0}, {&(0x7f0000012000)="504d4d00504d4dff", 0x8, 0x10000}], 0x0, &(0x7f0000012b00)) [ 1071.659442] EXT4-fs (loop6): bad geometry: block count 512 exceeds size of device (128 blocks) [ 1071.665407] EXT4-fs (loop3): bad geometry: block count 512 exceeds size of device (128 blocks) [ 1071.716155] EXT4-fs warning (device loop5): read_mmp_block:106: Error -117 while reading MMP block 0 [ 1071.716275] EXT4-fs (loop7): bad geometry: block count 512 exceeds size of device (128 blocks) 19:29:09 executing program 0: r0 = syz_io_uring_setup(0x2, &(0x7f0000000500), &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000ff6000/0xa000)=nil, &(0x7f0000000080)=0x0, &(0x7f0000000140)=0x0) r3 = io_uring_setup(0x3ddf, &(0x7f0000000680)) syz_io_uring_submit(r1, r2, &(0x7f0000000800)=@IORING_OP_SENDMSG={0x9, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0}, 0x0) r4 = eventfd(0x0) io_uring_register$IORING_REGISTER_EVENTFD(r0, 0x4, &(0x7f0000000000)=r4, 0x1) read$eventfd(r4, &(0x7f0000000040), 0x8) r5 = syz_io_uring_setup(0x3702, &(0x7f00000001c0), &(0x7f0000000000/0x3000)=nil, &(0x7f0000ffe000/0x2000)=nil, 0x0, &(0x7f0000000240)) r6 = dup2(r3, r5) r7 = dup2(r0, r6) io_uring_enter(r7, 0x1739, 0x0, 0x0, 0x0, 0x0) 19:29:09 executing program 4: r0 = syz_io_uring_setup(0x2, &(0x7f0000000500), &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000ff6000/0xa000)=nil, &(0x7f0000000080)=0x0, &(0x7f0000000140)=0x0) r3 = io_uring_setup(0x3ddf, &(0x7f0000000680)) syz_io_uring_submit(r1, r2, &(0x7f0000000800)=@IORING_OP_SENDMSG={0x9, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0}, 0x0) r4 = eventfd(0x0) io_uring_register$IORING_REGISTER_EVENTFD(r0, 0x4, &(0x7f0000000000)=r4, 0x1) read$eventfd(r4, &(0x7f0000000040), 0x8) r5 = syz_io_uring_setup(0x3702, 0x0, &(0x7f0000000000/0x3000)=nil, &(0x7f0000ffe000/0x2000)=nil, &(0x7f0000000140), &(0x7f0000000240)) r6 = dup2(r3, r5) r7 = dup2(r0, r6) io_uring_enter(r7, 0x1739, 0x0, 0x0, 0x0, 0x0) 19:29:09 executing program 6: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000500100000f000000000000000000000004000000000002000020000020000000def4655fdef4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000008000000018000000c20500002b0200000000000000000000000000000000000073797a6b616c6c6572000000000000002f746d702f73797a2d696d61676567656e35373134333434333800"/192, 0xc0, 0x400}, {&(0x7f0000010100)="000000000000000000000000e58ca12e13a240e2b1a22f8d07e8e55f010040000c00000000000000ddf4655f00"/64, 0x40, 0x4e0}, {&(0x7f0000010200)="0100000000000500400000000000000000000000000000003400000000000000", 0x20, 0x560}, {0x0}, {&(0x7f0000012000)="504d4d00504d4dff", 0x8, 0x10000}], 0x0, &(0x7f0000012b00)) 19:29:09 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000500100000f000000000000000000000004000000000002000020000020000000def4655fdef4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000008000000018000000c20500002b0200000000000000000000000000000000000073797a6b616c6c6572000000000000002f746d702f73797a2d696d61676567656e35373134333434333800"/192, 0xc0, 0x400}, {&(0x7f0000010100)="000000000000000000000000e58ca12e13a240e2b1a22f8d07e8e55f010040000c00000000000000ddf4655f00"/64, 0x40, 0x4e0}, {&(0x7f0000010200)="0100000000000500400000000000000000000000000000003400000000000000", 0x20, 0x560}, {0x0}, {&(0x7f0000012000)="504d4d00504d4dff", 0x8, 0x10000}], 0x0, &(0x7f0000012b00)) 19:29:09 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000500100000f000000000000000000000004000000000002000020000020000000def4655fdef4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000008000000018000000c20500002b0200000000000000000000000000000000000073797a6b616c6c6572000000000000002f746d702f73797a2d696d61676567656e35373134333434333800"/192, 0xc0, 0x400}, {&(0x7f0000010100)="000000000000000000000000e58ca12e13a240e2b1a22f8d07e8e55f010040000c00000000000000ddf4655f00"/64, 0x40, 0x4e0}, {&(0x7f0000010200)="010000000000050040", 0x9, 0x560}, {0x0, 0x0, 0x1000000000c00}, {&(0x7f0000012000)="504d4d00504d4dff", 0x8, 0x10000}], 0x0, &(0x7f0000012b00)) 19:29:09 executing program 7: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000500100000f000000000000000000000004000000000002000020000020000000def4655fdef4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000008000000018000000c20500002b0200000000000000000000000000000000000073797a6b616c6c6572000000000000002f746d702f73797a2d696d61676567656e35373134333434333800"/192, 0xc0, 0x400}, {&(0x7f0000010100)="000000000000000000000000e58ca12e13a240e2b1a22f8d07e8e55f010040000c00000000000000ddf4655f00"/64, 0x40, 0x4e0}, {&(0x7f0000010200)="0100000000000500400000000000000000000000000000003400000000000000", 0x20, 0x560}, {0x0}, {&(0x7f0000012000)="504d4d00504d4dff", 0x8, 0x10000}], 0x0, &(0x7f0000012b00)) 19:29:09 executing program 1: syz_io_uring_setup(0x21, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, &(0x7f00000a0000)=nil, &(0x7f00000b0000)=nil, &(0x7f0000000180), &(0x7f0000002a40)) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r0 = syz_io_uring_setup(0x2, &(0x7f0000000500), &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000ff6000/0xa000)=nil, &(0x7f0000000080), &(0x7f0000000140)) r1 = io_uring_setup(0x3ddf, &(0x7f0000000680)) r2 = eventfd(0x0) io_uring_register$IORING_REGISTER_EVENTFD(r0, 0x4, &(0x7f0000000000)=r2, 0x1) read$eventfd(r2, &(0x7f0000000040), 0x8) r3 = syz_io_uring_setup(0x3702, &(0x7f00000001c0), &(0x7f0000000000/0x3000)=nil, &(0x7f0000ffe000/0x2000)=nil, &(0x7f0000000140), &(0x7f0000000240)) r4 = dup2(r1, r3) r5 = dup2(r0, r4) io_uring_enter(r5, 0x1739, 0x0, 0x0, 0x0, 0x0) 19:29:09 executing program 2: r0 = syz_io_uring_setup(0x21, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, &(0x7f00000a0000)=nil, &(0x7f00000b0000)=nil, &(0x7f0000000180)=0x0, &(0x7f0000002a40)=0x0) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_io_uring_submit(r1, r2, &(0x7f0000000300)=@IORING_OP_OPENAT={0x12, 0x0, 0x0, 0xffffffffffffffff, 0x0, &(0x7f0000000100)='./cgroup/cgroup.procs/file0/../file0\x00'}, 0x0) io_uring_enter(r0, 0x76d3, 0x0, 0x0, 0x0, 0x0) r3 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$netlbl_cipso(&(0x7f0000000000), r3) r4 = syz_io_uring_setup(0x2, &(0x7f0000000500), &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000ff6000/0xa000)=nil, &(0x7f0000000080)=0x0, &(0x7f0000000140)=0x0) io_uring_setup(0x3ddf, &(0x7f0000000680)) syz_io_uring_submit(r5, r6, &(0x7f0000000800)=@IORING_OP_SENDMSG={0x9, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0}, 0x0) r7 = eventfd(0x0) io_uring_register$IORING_REGISTER_EVENTFD(r4, 0x4, &(0x7f0000000000)=r7, 0x1) read$eventfd(r7, &(0x7f0000000040), 0x8) syz_io_uring_setup(0x3702, &(0x7f00000001c0), &(0x7f0000000000/0x3000)=nil, &(0x7f0000ffe000/0x2000)=nil, &(0x7f0000000140), &(0x7f0000000240)) r8 = dup2(r4, 0xffffffffffffffff) io_uring_enter(r8, 0x1739, 0x0, 0x0, 0x0, 0x0) [ 1083.866598] EXT4-fs (loop7): bad geometry: block count 512 exceeds size of device (128 blocks) [ 1083.874157] EXT4-fs (loop3): bad geometry: block count 512 exceeds size of device (128 blocks) [ 1083.887610] EXT4-fs (loop6): bad geometry: block count 512 exceeds size of device (128 blocks) [ 1083.891665] EXT4-fs error (device loop5): ext4_fill_super:4947: inode #2: comm syz-executor.5: iget: root inode unallocated [ 1083.895851] EXT4-fs (loop5): get root inode failed [ 1083.896436] EXT4-fs (loop5): mount failed 19:29:09 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000500100000f000000000000000000000004000000000002000020000020000000def4655fdef4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000008000000018000000c20500002b0200000000000000000000000000000000000073797a6b616c6c6572000000000000002f746d702f73797a2d696d61676567656e35373134333434333800"/192, 0xc0, 0x400}, {&(0x7f0000010100)="000000000000000000000000e58ca12e13a240e2b1a22f8d07e8e55f010040000c00000000000000ddf4655f00"/64, 0x40, 0x4e0}, {&(0x7f0000010200)="0100000000000500400000000000000000000000000000003400000000000000", 0x20, 0x560}, {0x0}, {&(0x7f0000012000)="504d4d00504d4dff", 0x8, 0x10000}], 0x0, &(0x7f0000012b00)) 19:29:09 executing program 7: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000500100000f000000000000000000000004000000000002000020000020000000def4655fdef4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000008000000018000000c20500002b0200000000000000000000000000000000000073797a6b616c6c6572000000000000002f746d702f73797a2d696d61676567656e35373134333434333800"/192, 0xc0, 0x400}, {&(0x7f0000010100)="000000000000000000000000e58ca12e13a240e2b1a22f8d07e8e55f010040000c00000000000000ddf4655f00"/64, 0x40, 0x4e0}, {0x0, 0x0, 0x1000000000c00}, {&(0x7f0000012000)="504d4d00504d4dff", 0x8, 0x10000}], 0x0, &(0x7f0000012b00)) [ 1083.943905] EXT4-fs (loop3): bad geometry: block count 512 exceeds size of device (128 blocks) 19:29:09 executing program 6: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000500100000f000000000000000000000004000000000002000020000020000000def4655fdef4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000008000000018000000c20500002b0200000000000000000000000000000000000073797a6b616c6c6572000000000000002f746d702f73797a2d696d61676567656e35373134333434333800"/192, 0xc0, 0x400}, {&(0x7f0000010100)="000000000000000000000000e58ca12e13a240e2b1a22f8d07e8e55f010040000c00000000000000ddf4655f00"/64, 0x40, 0x4e0}, {0x0, 0x0, 0x1000000000c00}, {&(0x7f0000012000)="504d4d00504d4dff", 0x8, 0x10000}], 0x0, &(0x7f0000012b00)) 19:29:09 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000500100000f000000000000000000000004000000000002000020000020000000def4655fdef4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000008000000018000000c20500002b0200000000000000000000000000000000000073797a6b616c6c6572000000000000002f746d702f73797a2d696d61676567656e35373134333434333800"/192, 0xc0, 0x400}, {&(0x7f0000010100)="000000000000000000000000e58ca12e13a240e2b1a22f8d07e8e55f010040000c00000000000000ddf4655f00"/64, 0x40, 0x4e0}, {0x0, 0x0, 0x1000000000c00}, {&(0x7f0000012000)="504d4d00504d4dff", 0x8, 0x10000}], 0x0, &(0x7f0000012b00)) [ 1083.991578] EXT4-fs warning (device loop7): read_mmp_block:106: Error -117 while reading MMP block 0 [ 1084.008694] EXT4-fs warning (device loop3): read_mmp_block:106: Error -117 while reading MMP block 0 19:29:09 executing program 7: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000500100000f000000000000000000000004000000000002000020000020000000def4655fdef4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000008000000018000000c20500002b0200000000000000000000000000000000000073797a6b616c6c6572000000000000002f746d702f73797a2d696d61676567656e35373134333434333800"/192, 0xc0, 0x400}, {&(0x7f0000010100)="000000000000000000000000e58ca12e13a240e2b1a22f8d07e8e55f010040000c00000000000000ddf4655f00"/64, 0x40, 0x4e0}, {0x0, 0x0, 0x1000000000c00}, {&(0x7f0000012000)="504d4d00504d4dff", 0x8, 0x10000}], 0x0, &(0x7f0000012b00)) [ 1084.025522] EXT4-fs warning (device loop6): read_mmp_block:106: Error -117 while reading MMP block 0 19:29:09 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000500100000f000000000000000000000004000000000002000020000020000000def4655fdef4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000008000000018000000c20500002b0200000000000000000000000000000000000073797a6b616c6c6572000000000000002f746d702f73797a2d696d61676567656e35373134333434333800"/192, 0xc0, 0x400}, {&(0x7f0000010100)="000000000000000000000000e58ca12e13a240e2b1a22f8d07e8e55f010040000c00000000000000ddf4655f00"/64, 0x40, 0x4e0}, {0x0, 0x0, 0x1000000000c00}, {&(0x7f0000012000)="504d4d00504d4dff", 0x8, 0x10000}], 0x0, &(0x7f0000012b00)) 19:29:09 executing program 6: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000500100000f000000000000000000000004000000000002000020000020000000def4655fdef4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000008000000018000000c20500002b0200000000000000000000000000000000000073797a6b616c6c6572000000000000002f746d702f73797a2d696d61676567656e35373134333434333800"/192, 0xc0, 0x400}, {&(0x7f0000010100)="000000000000000000000000e58ca12e13a240e2b1a22f8d07e8e55f010040000c00000000000000ddf4655f00"/64, 0x40, 0x4e0}, {0x0, 0x0, 0x1000000000c00}, {&(0x7f0000012000)="504d4d00504d4dff", 0x8, 0x10000}], 0x0, &(0x7f0000012b00)) [ 1084.071038] EXT4-fs warning (device loop7): read_mmp_block:106: Error -117 while reading MMP block 0 [ 1084.081060] EXT4-fs warning (device loop3): read_mmp_block:106: Error -117 while reading MMP block 0 [ 1084.113164] EXT4-fs warning (device loop6): read_mmp_block:106: Error -117 while reading MMP block 0 19:29:26 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000500100000f000000000000000000000004000000000002000020000020000000def4655fdef4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000008000000018000000c20500002b0200000000000000000000000000000000000073797a6b616c6c6572000000000000002f746d702f73797a2d696d61676567656e35373134333434333800"/192, 0xc0, 0x400}, {&(0x7f0000010100)="000000000000000000000000e58ca12e13a240e2b1a22f8d07e8e55f010040000c00000000000000ddf4655f00"/64, 0x40, 0x4e0}, {&(0x7f0000010200)="010000000000050040", 0x9, 0x560}, {0x0, 0x0, 0x1000000000c00}, {&(0x7f0000012000)="504d4d00504d4dff", 0x8, 0x10000}], 0x0, &(0x7f0000012b00)) 19:29:26 executing program 7: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000500100000f000000000000000000000004000000000002000020000020000000def4655fdef4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000008000000018000000c20500002b0200000000000000000000000000000000000073797a6b616c6c6572000000000000002f746d702f73797a2d696d61676567656e35373134333434333800"/192, 0xc0, 0x400}, {&(0x7f0000010100)="000000000000000000000000e58ca12e13a240e2b1a22f8d07e8e55f010040000c00000000000000ddf4655f00"/64, 0x40, 0x4e0}, {0x0, 0x0, 0x1000000000c00}, {&(0x7f0000012000)="504d4d00504d4dff", 0x8, 0x10000}], 0x0, &(0x7f0000012b00)) 19:29:26 executing program 2: r0 = syz_io_uring_setup(0x21, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, &(0x7f00000a0000)=nil, &(0x7f00000b0000)=nil, &(0x7f0000000180)=0x0, &(0x7f0000002a40)=0x0) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_io_uring_submit(r1, r2, &(0x7f0000000300)=@IORING_OP_OPENAT={0x12, 0x0, 0x0, 0xffffffffffffffff, 0x0, &(0x7f0000000100)='./cgroup/cgroup.procs/file0/../file0\x00'}, 0x0) io_uring_enter(r0, 0x76d3, 0x0, 0x0, 0x0, 0x0) r3 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$netlbl_cipso(&(0x7f0000000000), r3) r4 = syz_io_uring_setup(0x2, &(0x7f0000000500), &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000ff6000/0xa000)=nil, &(0x7f0000000080)=0x0, &(0x7f0000000140)=0x0) io_uring_setup(0x3ddf, &(0x7f0000000680)) syz_io_uring_submit(r5, r6, &(0x7f0000000800)=@IORING_OP_SENDMSG={0x9, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0}, 0x0) r7 = eventfd(0x0) io_uring_register$IORING_REGISTER_EVENTFD(r4, 0x4, &(0x7f0000000000)=r7, 0x1) read$eventfd(r7, &(0x7f0000000040), 0x8) syz_io_uring_setup(0x3702, &(0x7f00000001c0), &(0x7f0000000000/0x3000)=nil, &(0x7f0000ffe000/0x2000)=nil, &(0x7f0000000140), &(0x7f0000000240)) r8 = dup2(r4, 0xffffffffffffffff) io_uring_enter(r8, 0x1739, 0x0, 0x0, 0x0, 0x0) 19:29:26 executing program 0: r0 = syz_io_uring_setup(0x2, &(0x7f0000000500), &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000ff6000/0xa000)=nil, &(0x7f0000000080)=0x0, &(0x7f0000000140)=0x0) r3 = io_uring_setup(0x3ddf, &(0x7f0000000680)) syz_io_uring_submit(r1, r2, &(0x7f0000000800)=@IORING_OP_SENDMSG={0x9, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0}, 0x0) r4 = eventfd(0x0) io_uring_register$IORING_REGISTER_EVENTFD(r0, 0x4, &(0x7f0000000000)=r4, 0x1) read$eventfd(r4, &(0x7f0000000040), 0x8) r5 = syz_io_uring_setup(0x3702, &(0x7f00000001c0), &(0x7f0000000000/0x3000)=nil, &(0x7f0000ffe000/0x2000)=nil, &(0x7f0000000140), 0x0) r6 = dup2(r3, r5) r7 = dup2(r0, r6) io_uring_enter(r7, 0x1739, 0x0, 0x0, 0x0, 0x0) 19:29:26 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000500100000f000000000000000000000004000000000002000020000020000000def4655fdef4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000008000000018000000c20500002b0200000000000000000000000000000000000073797a6b616c6c6572000000000000002f746d702f73797a2d696d61676567656e35373134333434333800"/192, 0xc0, 0x400}, {&(0x7f0000010100)="000000000000000000000000e58ca12e13a240e2b1a22f8d07e8e55f010040000c00000000000000ddf4655f00"/64, 0x40, 0x4e0}, {0x0, 0x0, 0x1000000000c00}, {&(0x7f0000012000)="504d4d00504d4dff", 0x8, 0x10000}], 0x0, &(0x7f0000012b00)) 19:29:26 executing program 6: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000500100000f000000000000000000000004000000000002000020000020000000def4655fdef4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000008000000018000000c20500002b0200000000000000000000000000000000000073797a6b616c6c6572000000000000002f746d702f73797a2d696d61676567656e35373134333434333800"/192, 0xc0, 0x400}, {&(0x7f0000010100)="000000000000000000000000e58ca12e13a240e2b1a22f8d07e8e55f010040000c00000000000000ddf4655f00"/64, 0x40, 0x4e0}, {0x0, 0x0, 0x1000000000c00}, {&(0x7f0000012000)="504d4d00504d4dff", 0x8, 0x10000}], 0x0, &(0x7f0000012b00)) 19:29:26 executing program 4: r0 = syz_io_uring_setup(0x2, &(0x7f0000000500), &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000ff6000/0xa000)=nil, &(0x7f0000000080)=0x0, &(0x7f0000000140)=0x0) r3 = io_uring_setup(0x3ddf, &(0x7f0000000680)) syz_io_uring_submit(r1, r2, &(0x7f0000000800)=@IORING_OP_SENDMSG={0x9, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0}, 0x0) r4 = eventfd(0x0) io_uring_register$IORING_REGISTER_EVENTFD(r0, 0x4, &(0x7f0000000000)=r4, 0x1) read$eventfd(r4, &(0x7f0000000040), 0x8) r5 = syz_io_uring_setup(0x3702, 0x0, &(0x7f0000000000/0x3000)=nil, &(0x7f0000ffe000/0x2000)=nil, &(0x7f0000000140), &(0x7f0000000240)) r6 = dup2(r3, r5) r7 = dup2(r0, r6) io_uring_enter(r7, 0x1739, 0x0, 0x0, 0x0, 0x0) 19:29:26 executing program 1: syz_io_uring_setup(0x21, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, &(0x7f00000a0000)=nil, &(0x7f00000b0000)=nil, &(0x7f0000000180), &(0x7f0000002a40)) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r0 = syz_io_uring_setup(0x2, &(0x7f0000000500), &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000ff6000/0xa000)=nil, &(0x7f0000000080)=0x0, &(0x7f0000000140)=0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000800)=@IORING_OP_SENDMSG={0x9, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0}, 0x0) r3 = eventfd(0x0) io_uring_register$IORING_REGISTER_EVENTFD(r0, 0x4, &(0x7f0000000000)=r3, 0x1) read$eventfd(r3, &(0x7f0000000040), 0x8) r4 = syz_io_uring_setup(0x3702, &(0x7f00000001c0), &(0x7f0000000000/0x3000)=nil, &(0x7f0000ffe000/0x2000)=nil, &(0x7f0000000140), &(0x7f0000000240)) r5 = dup2(0xffffffffffffffff, r4) r6 = dup2(r0, r5) io_uring_enter(r6, 0x1739, 0x0, 0x0, 0x0, 0x0) [ 1101.493391] EXT4-fs warning (device loop3): read_mmp_block:106: Error -117 while reading MMP block 0 [ 1101.496557] EXT4-fs warning (device loop6): read_mmp_block:106: Error -117 while reading MMP block 0 [ 1101.502296] EXT4-fs warning (device loop7): read_mmp_block:106: Error -117 while reading MMP block 0 [ 1101.504433] EXT4-fs error (device loop5): ext4_fill_super:4947: inode #2: comm syz-executor.5: iget: root inode unallocated [ 1101.505343] EXT4-fs (loop5): get root inode failed [ 1101.507815] EXT4-fs (loop5): mount failed 19:29:26 executing program 6: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000500100000f000000000000000000000004000000000002000020000020000000def4655fdef4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000008000000018000000c20500002b0200000000000000000000000000000000000073797a6b616c6c6572000000000000002f746d702f73797a2d696d61676567656e35373134333434333800"/192, 0xc0, 0x400}, {&(0x7f0000010100)="000000000000000000000000e58ca12e13a240e2b1a22f8d07e8e55f010040000c00000000000000ddf4655f00"/64, 0x40, 0x4e0}, {0x0, 0x0, 0x560}, {0x0, 0x0, 0x1000000000c00}, {&(0x7f0000012000)="504d4d00504d4dff", 0x8, 0x10000}], 0x0, &(0x7f0000012b00)) 19:29:26 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000500100000f000000000000000000000004000000000002000020000020000000def4655fdef4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000008000000018000000c20500002b0200000000000000000000000000000000000073797a6b616c6c6572000000000000002f746d702f73797a2d696d61676567656e35373134333434333800"/192, 0xc0, 0x400}, {&(0x7f0000010100)="000000000000000000000000e58ca12e13a240e2b1a22f8d07e8e55f010040000c00000000000000ddf4655f00"/64, 0x40, 0x4e0}, {0x0, 0x0, 0x560}, {0x0, 0x0, 0x1000000000c00}, {&(0x7f0000012000)="504d4d00504d4dff", 0x8, 0x10000}], 0x0, &(0x7f0000012b00)) 19:29:27 executing program 7: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000500100000f000000000000000000000004000000000002000020000020000000def4655fdef4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000008000000018000000c20500002b0200000000000000000000000000000000000073797a6b616c6c6572000000000000002f746d702f73797a2d696d61676567656e35373134333434333800"/192, 0xc0, 0x400}, {&(0x7f0000010100)="000000000000000000000000e58ca12e13a240e2b1a22f8d07e8e55f010040000c00000000000000ddf4655f00"/64, 0x40, 0x4e0}, {0x0, 0x0, 0x560}, {0x0, 0x0, 0x1000000000c00}, {&(0x7f0000012000)="504d4d00504d4dff", 0x8, 0x10000}], 0x0, &(0x7f0000012b00)) 19:29:27 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000500100000f000000000000000000000004000000000002000020000020000000def4655fdef4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000008000000018000000c20500002b0200000000000000000000000000000000000073797a6b616c6c6572000000000000002f746d702f73797a2d696d61676567656e35373134333434333800"/192, 0xc0, 0x400}, {&(0x7f0000010100)="000000000000000000000000e58ca12e13a240e2b1a22f8d07e8e55f010040000c00000000000000ddf4655f00"/64, 0x40, 0x4e0}, {&(0x7f0000010200)="0100000000000500", 0x8, 0x560}, {0x0, 0x0, 0x1000000000c00}, {&(0x7f0000012000)="504d4d00504d4dff", 0x8, 0x10000}], 0x0, &(0x7f0000012b00)) [ 1101.638365] EXT4-fs warning (device loop3): read_mmp_block:106: Error -117 while reading MMP block 0 [ 1101.645203] EXT4-fs warning (device loop6): read_mmp_block:106: Error -117 while reading MMP block 0 19:29:27 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000500100000f000000000000000000000004000000000002000020000020000000def4655fdef4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000008000000018000000c20500002b0200000000000000000000000000000000000073797a6b616c6c6572000000000000002f746d702f73797a2d696d61676567656e35373134333434333800"/192, 0xc0, 0x400}, {&(0x7f0000010100)="000000000000000000000000e58ca12e13a240e2b1a22f8d07e8e55f010040000c00000000000000ddf4655f00"/64, 0x40, 0x4e0}, {0x0, 0x0, 0x560}, {0x0, 0x0, 0x1000000000c00}, {&(0x7f0000012000)="504d4d00504d4dff", 0x8, 0x10000}], 0x0, &(0x7f0000012b00)) [ 1101.688174] EXT4-fs warning (device loop5): read_mmp_block:106: Error -117 while reading MMP block 0 [ 1101.693361] EXT4-fs warning (device loop7): read_mmp_block:106: Error -117 while reading MMP block 0 19:29:27 executing program 6: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000500100000f000000000000000000000004000000000002000020000020000000def4655fdef4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000008000000018000000c20500002b0200000000000000000000000000000000000073797a6b616c6c6572000000000000002f746d702f73797a2d696d61676567656e35373134333434333800"/192, 0xc0, 0x400}, {&(0x7f0000010100)="000000000000000000000000e58ca12e13a240e2b1a22f8d07e8e55f010040000c00000000000000ddf4655f00"/64, 0x40, 0x4e0}, {0x0, 0x0, 0x560}, {0x0, 0x0, 0x1000000000c00}, {&(0x7f0000012000)="504d4d00504d4dff", 0x8, 0x10000}], 0x0, &(0x7f0000012b00)) [ 1101.729531] EXT4-fs warning (device loop3): read_mmp_block:106: Error -117 while reading MMP block 0 19:29:27 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000500100000f000000000000000000000004000000000002000020000020000000def4655fdef4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000008000000018000000c20500002b0200000000000000000000000000000000000073797a6b616c6c6572000000000000002f746d702f73797a2d696d61676567656e35373134333434333800"/192, 0xc0, 0x400}, {&(0x7f0000010100)="000000000000000000000000e58ca12e13a240e2b1a22f8d07e8e55f010040000c00000000000000ddf4655f00"/64, 0x40, 0x4e0}, {&(0x7f0000010200)="0100000000000500", 0x8, 0x560}, {0x0, 0x0, 0x1000000000c00}, {&(0x7f0000012000)="504d4d00504d4dff", 0x8, 0x10000}], 0x0, &(0x7f0000012b00)) 19:29:27 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000500100000f000000000000000000000004000000000002000020000020000000def4655fdef4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000008000000018000000c20500002b0200000000000000000000000000000000000073797a6b616c6c6572000000000000002f746d702f73797a2d696d61676567656e35373134333434333800"/192, 0xc0, 0x400}, {&(0x7f0000010100)="000000000000000000000000e58ca12e13a240e2b1a22f8d07e8e55f010040000c00000000000000ddf4655f00"/64, 0x40, 0x4e0}, {0x0, 0x0, 0x560}, {0x0, 0x0, 0x1000000000c00}, {&(0x7f0000012000)="504d4d00504d4dff", 0x8, 0x10000}], 0x0, &(0x7f0000012b00)) 19:29:27 executing program 7: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000500100000f000000000000000000000004000000000002000020000020000000def4655fdef4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000008000000018000000c20500002b0200000000000000000000000000000000000073797a6b616c6c6572000000000000002f746d702f73797a2d696d61676567656e35373134333434333800"/192, 0xc0, 0x400}, {&(0x7f0000010100)="000000000000000000000000e58ca12e13a240e2b1a22f8d07e8e55f010040000c00000000000000ddf4655f00"/64, 0x40, 0x4e0}, {0x0, 0x0, 0x560}, {0x0, 0x0, 0x1000000000c00}, {&(0x7f0000012000)="504d4d00504d4dff", 0x8, 0x10000}], 0x0, &(0x7f0000012b00)) [ 1101.776658] EXT4-fs warning (device loop6): read_mmp_block:106: Error -117 while reading MMP block 0 [ 1101.832962] EXT4-fs warning (device loop5): read_mmp_block:106: Error -117 while reading MMP block 0 [ 1101.840702] EXT4-fs warning (device loop3): read_mmp_block:106: Error -117 while reading MMP block 0 [ 1101.843319] EXT4-fs warning (device loop7): read_mmp_block:106: Error -117 while reading MMP block 0 19:29:38 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000500100000f000000000000000000000004000000000002000020000020000000def4655fdef4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000008000000018000000c20500002b0200000000000000000000000000000000000073797a6b616c6c6572000000000000002f746d702f73797a2d696d61676567656e35373134333434333800"/192, 0xc0, 0x400}, {&(0x7f0000010100)="000000000000000000000000e58ca12e13a240e2b1a22f8d07e8e55f010040000c00000000000000ddf4655f00"/64, 0x40, 0x4e0}, {&(0x7f0000010200)="0100000000000500", 0x8, 0x560}, {0x0, 0x0, 0x1000000000c00}, {&(0x7f0000012000)="504d4d00504d4dff", 0x8, 0x10000}], 0x0, &(0x7f0000012b00)) 19:29:38 executing program 1: syz_io_uring_setup(0x21, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, &(0x7f00000a0000)=nil, &(0x7f00000b0000)=nil, &(0x7f0000000180), &(0x7f0000002a40)) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r0 = syz_io_uring_setup(0x2, &(0x7f0000000500), &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000ff6000/0xa000)=nil, &(0x7f0000000080)=0x0, &(0x7f0000000140)=0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000800)=@IORING_OP_SENDMSG={0x9, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0}, 0x0) r3 = eventfd(0x0) io_uring_register$IORING_REGISTER_EVENTFD(r0, 0x4, &(0x7f0000000000)=r3, 0x1) read$eventfd(r3, &(0x7f0000000040), 0x8) r4 = syz_io_uring_setup(0x3702, &(0x7f00000001c0), &(0x7f0000000000/0x3000)=nil, &(0x7f0000ffe000/0x2000)=nil, &(0x7f0000000140), &(0x7f0000000240)) r5 = dup2(0xffffffffffffffff, r4) r6 = dup2(r0, r5) io_uring_enter(r6, 0x1739, 0x0, 0x0, 0x0, 0x0) 19:29:38 executing program 0: r0 = syz_io_uring_setup(0x2, &(0x7f0000000500), &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000ff6000/0xa000)=nil, &(0x7f0000000080)=0x0, &(0x7f0000000140)=0x0) r3 = io_uring_setup(0x3ddf, &(0x7f0000000680)) syz_io_uring_submit(r1, r2, &(0x7f0000000800)=@IORING_OP_SENDMSG={0x9, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0}, 0x0) r4 = eventfd(0x0) io_uring_register$IORING_REGISTER_EVENTFD(r0, 0x4, &(0x7f0000000000)=r4, 0x1) read$eventfd(r4, &(0x7f0000000040), 0x8) r5 = syz_io_uring_setup(0x3702, &(0x7f00000001c0), &(0x7f0000000000/0x3000)=nil, &(0x7f0000ffe000/0x2000)=nil, &(0x7f0000000140), 0x0) r6 = dup2(r3, r5) r7 = dup2(r0, r6) io_uring_enter(r7, 0x1739, 0x0, 0x0, 0x0, 0x0) 19:29:38 executing program 6: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000500100000f000000000000000000000004000000000002000020000020000000def4655fdef4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000008000000018000000c20500002b0200000000000000000000000000000000000073797a6b616c6c6572000000000000002f746d702f73797a2d696d61676567656e35373134333434333800"/192, 0xc0, 0x400}, {&(0x7f0000010100)="000000000000000000000000e58ca12e13a240e2b1a22f8d07e8e55f010040000c00000000000000ddf4655f00"/64, 0x40, 0x4e0}, {0x0, 0x0, 0x560}, {0x0, 0x0, 0x1000000000c00}, {&(0x7f0000012000)="504d4d00504d4dff", 0x8, 0x10000}], 0x0, &(0x7f0000012b00)) 19:29:38 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000500100000f000000000000000000000004000000000002000020000020000000def4655fdef4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000008000000018000000c20500002b0200000000000000000000000000000000000073797a6b616c6c6572000000000000002f746d702f73797a2d696d61676567656e35373134333434333800"/192, 0xc0, 0x400}, {&(0x7f0000010100)="000000000000000000000000e58ca12e13a240e2b1a22f8d07e8e55f010040000c00000000000000ddf4655f00"/64, 0x40, 0x4e0}, {&(0x7f0000010200), 0x0, 0x560}, {0x0, 0x0, 0x1000000000c00}, {&(0x7f0000012000)="504d4d00504d4dff", 0x8, 0x10000}], 0x0, &(0x7f0000012b00)) 19:29:38 executing program 2: r0 = syz_io_uring_setup(0x21, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, &(0x7f00000a0000)=nil, &(0x7f00000b0000)=nil, &(0x7f0000000180)=0x0, &(0x7f0000002a40)=0x0) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_io_uring_submit(r1, r2, &(0x7f0000000300)=@IORING_OP_OPENAT={0x12, 0x0, 0x0, 0xffffffffffffffff, 0x0, &(0x7f0000000100)='./cgroup/cgroup.procs/file0/../file0\x00'}, 0x0) io_uring_enter(r0, 0x76d3, 0x0, 0x0, 0x0, 0x0) r3 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$netlbl_cipso(&(0x7f0000000000), r3) r4 = syz_io_uring_setup(0x2, &(0x7f0000000500), &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000ff6000/0xa000)=nil, &(0x7f0000000080)=0x0, &(0x7f0000000140)=0x0) io_uring_setup(0x3ddf, &(0x7f0000000680)) syz_io_uring_submit(r5, r6, &(0x7f0000000800)=@IORING_OP_SENDMSG={0x9, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0}, 0x0) r7 = eventfd(0x0) io_uring_register$IORING_REGISTER_EVENTFD(r4, 0x4, &(0x7f0000000000)=r7, 0x1) read$eventfd(r7, &(0x7f0000000040), 0x8) syz_io_uring_setup(0x3702, &(0x7f00000001c0), &(0x7f0000000000/0x3000)=nil, &(0x7f0000ffe000/0x2000)=nil, &(0x7f0000000140), &(0x7f0000000240)) r8 = dup2(r4, 0xffffffffffffffff) io_uring_enter(r8, 0x1739, 0x0, 0x0, 0x0, 0x0) 19:29:38 executing program 4: r0 = syz_io_uring_setup(0x2, &(0x7f0000000500), &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000ff6000/0xa000)=nil, &(0x7f0000000080)=0x0, &(0x7f0000000140)=0x0) r3 = io_uring_setup(0x3ddf, &(0x7f0000000680)) syz_io_uring_submit(r1, r2, &(0x7f0000000800)=@IORING_OP_SENDMSG={0x9, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0}, 0x0) r4 = eventfd(0x0) io_uring_register$IORING_REGISTER_EVENTFD(r0, 0x4, &(0x7f0000000000)=r4, 0x1) read$eventfd(r4, &(0x7f0000000040), 0x8) r5 = syz_io_uring_setup(0x3702, 0x0, &(0x7f0000000000/0x3000)=nil, &(0x7f0000ffe000/0x2000)=nil, &(0x7f0000000140), &(0x7f0000000240)) r6 = dup2(r3, r5) r7 = dup2(r0, r6) io_uring_enter(r7, 0x1739, 0x0, 0x0, 0x0, 0x0) 19:29:38 executing program 7: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000500100000f000000000000000000000004000000000002000020000020000000def4655fdef4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000008000000018000000c20500002b0200000000000000000000000000000000000073797a6b616c6c6572000000000000002f746d702f73797a2d696d61676567656e35373134333434333800"/192, 0xc0, 0x400}, {&(0x7f0000010100)="000000000000000000000000e58ca12e13a240e2b1a22f8d07e8e55f010040000c00000000000000ddf4655f00"/64, 0x40, 0x4e0}, {0x0, 0x0, 0x560}, {0x0, 0x0, 0x1000000000c00}, {&(0x7f0000012000)="504d4d00504d4dff", 0x8, 0x10000}], 0x0, &(0x7f0000012b00)) [ 1113.104140] EXT4-fs warning (device loop6): read_mmp_block:106: Error -117 while reading MMP block 0 [ 1113.128107] EXT4-fs warning (device loop3): read_mmp_block:106: Error -117 while reading MMP block 0 [ 1113.132456] EXT4-fs warning (device loop5): read_mmp_block:106: Error -117 while reading MMP block 0 [ 1113.136473] EXT4-fs warning (device loop7): read_mmp_block:106: Error -117 while reading MMP block 0 19:29:38 executing program 6: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000500100000f000000000000000000000004000000000002000020000020000000def4655fdef4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000008000000018000000c20500002b0200000000000000000000000000000000000073797a6b616c6c6572000000000000002f746d702f73797a2d696d61676567656e35373134333434333800"/192, 0xc0, 0x400}, {&(0x7f0000010100)="000000000000000000000000e58ca12e13a240e2b1a22f8d07e8e55f010040000c00000000000000ddf4655f00"/64, 0x40, 0x4e0}, {&(0x7f0000010200), 0x0, 0x560}, {0x0, 0x0, 0x1000000000c00}, {&(0x7f0000012000)="504d4d00504d4dff", 0x8, 0x10000}], 0x0, &(0x7f0000012b00)) 19:29:38 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000500100000f000000000000000000000004000000000002000020000020000000def4655fdef4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000008000000018000000c20500002b0200000000000000000000000000000000000073797a6b616c6c6572000000000000002f746d702f73797a2d696d61676567656e35373134333434333800"/192, 0xc0, 0x400}, {&(0x7f0000010100)="000000000000000000000000e58ca12e13a240e2b1a22f8d07e8e55f010040000c00000000000000ddf4655f00"/64, 0x40, 0x4e0}, {&(0x7f0000010200), 0x0, 0x560}, {0x0, 0x0, 0x1000000000c00}, {&(0x7f0000012000)="504d4d00504d4dff", 0x8, 0x10000}], 0x0, &(0x7f0000012b00)) 19:29:38 executing program 7: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000500100000f000000000000000000000004000000000002000020000020000000def4655fdef4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000008000000018000000c20500002b0200000000000000000000000000000000000073797a6b616c6c6572000000000000002f746d702f73797a2d696d61676567656e35373134333434333800"/192, 0xc0, 0x400}, {&(0x7f0000010100)="000000000000000000000000e58ca12e13a240e2b1a22f8d07e8e55f010040000c00000000000000ddf4655f00"/64, 0x40, 0x4e0}, {&(0x7f0000010200), 0x0, 0x560}, {0x0, 0x0, 0x1000000000c00}, {&(0x7f0000012000)="504d4d00504d4dff", 0x8, 0x10000}], 0x0, &(0x7f0000012b00)) 19:29:38 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000500100000f000000000000000000000004000000000002000020000020000000def4655fdef4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000008000000018000000c20500002b0200000000000000000000000000000000000073797a6b616c6c6572000000000000002f746d702f73797a2d696d61676567656e35373134333434333800"/192, 0xc0, 0x400}, {&(0x7f0000010100)="000000000000000000000000e58ca12e13a240e2b1a22f8d07e8e55f010040000c00000000000000ddf4655f00"/64, 0x40, 0x4e0}, {&(0x7f0000010200)="010000000000050040", 0x9}, {0x0, 0x0, 0x1000000000c00}, {&(0x7f0000012000)="504d4d00504d4dff", 0x8, 0x10000}], 0x0, &(0x7f0000012b00)) [ 1113.221125] EXT4-fs warning (device loop3): read_mmp_block:106: Error -117 while reading MMP block 0 [ 1113.253652] EXT4-fs warning (device loop6): read_mmp_block:106: Error -117 while reading MMP block 0 [ 1113.274965] EXT4-fs warning (device loop7): read_mmp_block:106: Error -117 while reading MMP block 0 [ 1113.279126] EXT4-fs warning (device loop5): read_mmp_block:106: Error -117 while reading MMP block 0 19:29:38 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000500100000f000000000000000000000004000000000002000020000020000000def4655fdef4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000008000000018000000c20500002b0200000000000000000000000000000000000073797a6b616c6c6572000000000000002f746d702f73797a2d696d61676567656e35373134333434333800"/192, 0xc0, 0x400}, {&(0x7f0000010100)="000000000000000000000000e58ca12e13a240e2b1a22f8d07e8e55f010040000c00000000000000ddf4655f00"/64, 0x40, 0x4e0}, {&(0x7f0000010200), 0x0, 0x560}, {0x0, 0x0, 0x1000000000c00}, {&(0x7f0000012000)="504d4d00504d4dff", 0x8, 0x10000}], 0x0, &(0x7f0000012b00)) 19:29:38 executing program 6: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000500100000f000000000000000000000004000000000002000020000020000000def4655fdef4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000008000000018000000c20500002b0200000000000000000000000000000000000073797a6b616c6c6572000000000000002f746d702f73797a2d696d61676567656e35373134333434333800"/192, 0xc0, 0x400}, {&(0x7f0000010100)="000000000000000000000000e58ca12e13a240e2b1a22f8d07e8e55f010040000c00000000000000ddf4655f00"/64, 0x40, 0x4e0}, {&(0x7f0000010200), 0x0, 0x560}, {0x0, 0x0, 0x1000000000c00}, {&(0x7f0000012000)="504d4d00504d4dff", 0x8, 0x10000}], 0x0, &(0x7f0000012b00)) 19:29:38 executing program 7: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000500100000f000000000000000000000004000000000002000020000020000000def4655fdef4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000008000000018000000c20500002b0200000000000000000000000000000000000073797a6b616c6c6572000000000000002f746d702f73797a2d696d61676567656e35373134333434333800"/192, 0xc0, 0x400}, {&(0x7f0000010100)="000000000000000000000000e58ca12e13a240e2b1a22f8d07e8e55f010040000c00000000000000ddf4655f00"/64, 0x40, 0x4e0}, {&(0x7f0000010200), 0x0, 0x560}, {0x0, 0x0, 0x1000000000c00}, {&(0x7f0000012000)="504d4d00504d4dff", 0x8, 0x10000}], 0x0, &(0x7f0000012b00)) 19:29:38 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000500100000f000000000000000000000004000000000002000020000020000000def4655fdef4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000008000000018000000c20500002b0200000000000000000000000000000000000073797a6b616c6c6572000000000000002f746d702f73797a2d696d61676567656e35373134333434333800"/192, 0xc0, 0x400}, {&(0x7f0000010100)="000000000000000000000000e58ca12e13a240e2b1a22f8d07e8e55f010040000c00000000000000ddf4655f00"/64, 0x40, 0x4e0}, {&(0x7f0000010200)="010000000000050040", 0x9}, {0x0, 0x0, 0x1000000000c00}, {&(0x7f0000012000)="504d4d00504d4dff", 0x8, 0x10000}], 0x0, &(0x7f0000012b00)) [ 1113.338945] EXT4-fs warning (device loop3): read_mmp_block:106: Error -117 while reading MMP block 0 [ 1113.367320] EXT4-fs warning (device loop6): read_mmp_block:106: Error -117 while reading MMP block 0 [ 1113.376157] EXT4-fs warning (device loop7): read_mmp_block:106: Error -117 while reading MMP block 0 [ 1113.409502] EXT4-fs warning (device loop5): read_mmp_block:106: Error -117 while reading MMP block 0 19:29:52 executing program 0: r0 = syz_io_uring_setup(0x2, &(0x7f0000000500), &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000ff6000/0xa000)=nil, &(0x7f0000000080)=0x0, &(0x7f0000000140)=0x0) r3 = io_uring_setup(0x3ddf, &(0x7f0000000680)) syz_io_uring_submit(r1, r2, &(0x7f0000000800)=@IORING_OP_SENDMSG={0x9, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0}, 0x0) r4 = eventfd(0x0) io_uring_register$IORING_REGISTER_EVENTFD(r0, 0x4, &(0x7f0000000000)=r4, 0x1) read$eventfd(r4, &(0x7f0000000040), 0x8) r5 = syz_io_uring_setup(0x3702, &(0x7f00000001c0), &(0x7f0000000000/0x3000)=nil, &(0x7f0000ffe000/0x2000)=nil, &(0x7f0000000140), 0x0) r6 = dup2(r3, r5) r7 = dup2(r0, r6) io_uring_enter(r7, 0x1739, 0x0, 0x0, 0x0, 0x0) 19:29:52 executing program 4: r0 = syz_io_uring_setup(0x2, &(0x7f0000000500), &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000ff6000/0xa000)=nil, &(0x7f0000000080)=0x0, &(0x7f0000000140)=0x0) r3 = io_uring_setup(0x3ddf, &(0x7f0000000680)) syz_io_uring_submit(r1, r2, &(0x7f0000000800)=@IORING_OP_SENDMSG={0x9, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0}, 0x0) r4 = eventfd(0x0) io_uring_register$IORING_REGISTER_EVENTFD(r0, 0x4, &(0x7f0000000000)=r4, 0x1) read$eventfd(r4, &(0x7f0000000040), 0x8) r5 = syz_io_uring_setup(0x3702, &(0x7f00000001c0), &(0x7f0000000000/0x3000)=nil, &(0x7f0000ffe000/0x2000)=nil, 0x0, &(0x7f0000000240)) r6 = dup2(r3, r5) r7 = dup2(r0, r6) io_uring_enter(r7, 0x1739, 0x0, 0x0, 0x0, 0x0) 19:29:52 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000500100000f000000000000000000000004000000000002000020000020000000def4655fdef4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000008000000018000000c20500002b0200000000000000000000000000000000000073797a6b616c6c6572000000000000002f746d702f73797a2d696d61676567656e35373134333434333800"/192, 0xc0, 0x400}, {&(0x7f0000010100)="000000000000000000000000e58ca12e13a240e2b1a22f8d07e8e55f010040000c00000000000000ddf4655f00"/64, 0x40, 0x4e0}, {&(0x7f0000010200)="01000000000005004000000000000000", 0x10, 0x560}, {0x0, 0x0, 0x1000000000c00}, {&(0x7f0000012000)="504d4d00504d4dff", 0x8, 0x10000}], 0x0, &(0x7f0000012b00)) 19:29:52 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000500100000f000000000000000000000004000000000002000020000020000000def4655fdef4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000008000000018000000c20500002b0200000000000000000000000000000000000073797a6b616c6c6572000000000000002f746d702f73797a2d696d61676567656e35373134333434333800"/192, 0xc0, 0x400}, {&(0x7f0000010100)="000000000000000000000000e58ca12e13a240e2b1a22f8d07e8e55f010040000c00000000000000ddf4655f00"/64, 0x40, 0x4e0}, {&(0x7f0000010200)="010000000000050040", 0x9}, {0x0, 0x0, 0x1000000000c00}, {&(0x7f0000012000)="504d4d00504d4dff", 0x8, 0x10000}], 0x0, &(0x7f0000012b00)) 19:29:52 executing program 6: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000500100000f000000000000000000000004000000000002000020000020000000def4655fdef4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000008000000018000000c20500002b0200000000000000000000000000000000000073797a6b616c6c6572000000000000002f746d702f73797a2d696d61676567656e35373134333434333800"/192, 0xc0, 0x400}, {&(0x7f0000010100)="000000000000000000000000e58ca12e13a240e2b1a22f8d07e8e55f010040000c00000000000000ddf4655f00"/64, 0x40, 0x4e0}, {&(0x7f0000010200), 0x0, 0x560}, {0x0, 0x0, 0x1000000000c00}, {&(0x7f0000012000)="504d4d00504d4dff", 0x8, 0x10000}], 0x0, &(0x7f0000012b00)) 19:29:52 executing program 7: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000500100000f000000000000000000000004000000000002000020000020000000def4655fdef4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000008000000018000000c20500002b0200000000000000000000000000000000000073797a6b616c6c6572000000000000002f746d702f73797a2d696d61676567656e35373134333434333800"/192, 0xc0, 0x400}, {&(0x7f0000010100)="000000000000000000000000e58ca12e13a240e2b1a22f8d07e8e55f010040000c00000000000000ddf4655f00"/64, 0x40, 0x4e0}, {&(0x7f0000010200), 0x0, 0x560}, {0x0, 0x0, 0x1000000000c00}, {&(0x7f0000012000)="504d4d00504d4dff", 0x8, 0x10000}], 0x0, &(0x7f0000012b00)) 19:29:52 executing program 1: syz_io_uring_setup(0x21, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, &(0x7f00000a0000)=nil, &(0x7f00000b0000)=nil, &(0x7f0000000180), &(0x7f0000002a40)) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r0 = syz_io_uring_setup(0x2, &(0x7f0000000500), &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000ff6000/0xa000)=nil, &(0x7f0000000080)=0x0, &(0x7f0000000140)=0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000800)=@IORING_OP_SENDMSG={0x9, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0}, 0x0) r3 = eventfd(0x0) io_uring_register$IORING_REGISTER_EVENTFD(r0, 0x4, &(0x7f0000000000)=r3, 0x1) read$eventfd(r3, &(0x7f0000000040), 0x8) r4 = syz_io_uring_setup(0x3702, &(0x7f00000001c0), &(0x7f0000000000/0x3000)=nil, &(0x7f0000ffe000/0x2000)=nil, &(0x7f0000000140), &(0x7f0000000240)) r5 = dup2(0xffffffffffffffff, r4) r6 = dup2(r0, r5) io_uring_enter(r6, 0x1739, 0x0, 0x0, 0x0, 0x0) 19:29:52 executing program 2: r0 = syz_io_uring_setup(0x21, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, &(0x7f00000a0000)=nil, &(0x7f00000b0000)=nil, &(0x7f0000000180)=0x0, &(0x7f0000002a40)=0x0) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_io_uring_submit(r1, r2, &(0x7f0000000300)=@IORING_OP_OPENAT={0x12, 0x0, 0x0, 0xffffffffffffffff, 0x0, &(0x7f0000000100)='./cgroup/cgroup.procs/file0/../file0\x00'}, 0x0) io_uring_enter(r0, 0x76d3, 0x0, 0x0, 0x0, 0x0) r3 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$netlbl_cipso(&(0x7f0000000000), r3) r4 = syz_io_uring_setup(0x2, &(0x7f0000000500), &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000ff6000/0xa000)=nil, &(0x7f0000000080)=0x0, &(0x7f0000000140)=0x0) r7 = io_uring_setup(0x3ddf, &(0x7f0000000680)) syz_io_uring_submit(r5, r6, &(0x7f0000000800)=@IORING_OP_SENDMSG={0x9, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0}, 0x0) r8 = eventfd(0x0) io_uring_register$IORING_REGISTER_EVENTFD(r4, 0x4, &(0x7f0000000000)=r8, 0x1) read$eventfd(r8, &(0x7f0000000040), 0x8) r9 = dup2(r7, 0xffffffffffffffff) r10 = dup2(r4, r9) io_uring_enter(r10, 0x1739, 0x0, 0x0, 0x0, 0x0) [ 1127.380224] EXT4-fs warning (device loop5): read_mmp_block:106: Error -117 while reading MMP block 0 [ 1127.408548] EXT4-fs warning (device loop7): read_mmp_block:106: Error -117 while reading MMP block 0 [ 1127.422781] EXT4-fs warning (device loop6): read_mmp_block:106: Error -117 while reading MMP block 0 [ 1127.436235] EXT4-fs error (device loop3): ext4_fill_super:4947: inode #2: comm syz-executor.3: iget: root inode unallocated [ 1127.440309] EXT4-fs (loop3): get root inode failed [ 1127.441633] EXT4-fs (loop3): mount failed 19:29:52 executing program 7: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000500100000f000000000000000000000004000000000002000020000020000000def4655fdef4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000008000000018000000c20500002b0200000000000000000000000000000000000073797a6b616c6c6572000000000000002f746d702f73797a2d696d61676567656e35373134333434333800"/192, 0xc0, 0x400}, {&(0x7f0000010100)="000000000000000000000000e58ca12e13a240e2b1a22f8d07e8e55f010040000c00000000000000ddf4655f00"/64, 0x40, 0x4e0}, {&(0x7f0000010200)="01000000000005004000000000000000", 0x10, 0x560}, {0x0, 0x0, 0x1000000000c00}, {&(0x7f0000012000)="504d4d00504d4dff", 0x8, 0x10000}], 0x0, &(0x7f0000012b00)) 19:29:52 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000500100000f000000000000000000000004000000000002000020000020000000def4655fdef4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000008000000018000000c20500002b0200000000000000000000000000000000000073797a6b616c6c6572000000000000002f746d702f73797a2d696d61676567656e35373134333434333800"/192, 0xc0, 0x400}, {&(0x7f0000010200)="010000000000050040", 0x9, 0x560}, {0x0, 0x0, 0x1000000000c00}, {&(0x7f0000012000)="504d4d00504d4dff", 0x8, 0x10000}], 0x0, &(0x7f0000012b00)) 19:29:52 executing program 6: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000500100000f000000000000000000000004000000000002000020000020000000def4655fdef4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000008000000018000000c20500002b0200000000000000000000000000000000000073797a6b616c6c6572000000000000002f746d702f73797a2d696d61676567656e35373134333434333800"/192, 0xc0, 0x400}, {&(0x7f0000010100)="000000000000000000000000e58ca12e13a240e2b1a22f8d07e8e55f010040000c00000000000000ddf4655f00"/64, 0x40, 0x4e0}, {&(0x7f0000010200)="01000000000005004000000000000000", 0x10, 0x560}, {0x0, 0x0, 0x1000000000c00}, {&(0x7f0000012000)="504d4d00504d4dff", 0x8, 0x10000}], 0x0, &(0x7f0000012b00)) 19:29:52 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000500100000f000000000000000000000004000000000002000020000020000000def4655fdef4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000008000000018000000c20500002b0200000000000000000000000000000000000073797a6b616c6c6572000000000000002f746d702f73797a2d696d61676567656e35373134333434333800"/192, 0xc0, 0x400}, {&(0x7f0000010100)="000000000000000000000000e58ca12e13a240e2b1a22f8d07e8e55f010040000c00000000000000ddf4655f00"/64, 0x40, 0x4e0}, {&(0x7f0000010200), 0x0, 0x560}, {0x0, 0x0, 0x1000000000c00}, {&(0x7f0000012000)="504d4d00504d4dff", 0x8, 0x10000}], 0x0, &(0x7f0000012b00)) [ 1127.570580] EXT4-fs (loop5): unsupported descriptor size 0 [ 1127.600444] EXT4-fs error (device loop6): ext4_fill_super:4947: inode #2: comm syz-executor.6: iget: root inode unallocated [ 1127.602224] EXT4-fs error (device loop7): ext4_fill_super:4947: inode #2: comm syz-executor.7: iget: root inode unallocated [ 1127.606027] EXT4-fs (loop7): get root inode failed [ 1127.606756] EXT4-fs (loop7): mount failed [ 1127.607391] EXT4-fs (loop6): get root inode failed [ 1127.608167] EXT4-fs (loop6): mount failed 19:29:53 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000500100000f000000000000000000000004000000000002000020000020000000def4655fdef4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000008000000018000000c20500002b0200000000000000000000000000000000000073797a6b616c6c6572000000000000002f746d702f73797a2d696d61676567656e35373134333434333800"/192, 0xc0, 0x400}, {&(0x7f0000010200)="010000000000050040", 0x9, 0x560}, {0x0, 0x0, 0x1000000000c00}, {&(0x7f0000012000)="504d4d00504d4dff", 0x8, 0x10000}], 0x0, &(0x7f0000012b00)) 19:29:53 executing program 7: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000500100000f000000000000000000000004000000000002000020000020000000def4655fdef4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000008000000018000000c20500002b0200000000000000000000000000000000000073797a6b616c6c6572000000000000002f746d702f73797a2d696d61676567656e35373134333434333800"/192, 0xc0, 0x400}, {&(0x7f0000010100)="000000000000000000000000e58ca12e13a240e2b1a22f8d07e8e55f010040000c00000000000000ddf4655f00"/64, 0x40, 0x4e0}, {&(0x7f0000010200), 0x0, 0x560}, {0x0, 0x0, 0x1000000000c00}, {&(0x7f0000012000)="504d4d00504d4dff", 0x8, 0x10000}], 0x0, &(0x7f0000012b00)) [ 1127.658153] EXT4-fs warning (device loop3): read_mmp_block:106: Error -117 while reading MMP block 0 [ 1127.681607] EXT4-fs warning (device loop7): read_mmp_block:106: Error -117 while reading MMP block 0 [ 1127.685882] EXT4-fs (loop5): unsupported descriptor size 0 19:29:53 executing program 6: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000500100000f000000000000000000000004000000000002000020000020000000def4655fdef4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000008000000018000000c20500002b0200000000000000000000000000000000000073797a6b616c6c6572000000000000002f746d702f73797a2d696d61676567656e35373134333434333800"/192, 0xc0, 0x400}, {&(0x7f0000010100)="000000000000000000000000e58ca12e13a240e2b1a22f8d07e8e55f010040000c00000000000000ddf4655f00"/64, 0x40, 0x4e0}, {&(0x7f0000010200), 0x0, 0x560}, {0x0, 0x0, 0x1000000000c00}, {&(0x7f0000012000)="504d4d00504d4dff", 0x8, 0x10000}], 0x0, &(0x7f0000012b00)) 19:29:53 executing program 7: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000500100000f000000000000000000000004000000000002000020000020000000def4655fdef4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000008000000018000000c20500002b0200000000000000000000000000000000000073797a6b616c6c6572000000000000002f746d702f73797a2d696d61676567656e35373134333434333800"/192, 0xc0, 0x400}, {&(0x7f0000010100)="000000000000000000000000e58ca12e13a240e2b1a22f8d07e8e55f010040000c00000000000000ddf4655f00"/64, 0x40, 0x4e0}, {&(0x7f0000010200), 0x0, 0x560}, {0x0, 0x0, 0x1000000000c00}, {&(0x7f0000012000)="504d4d00504d4dff", 0x8, 0x10000}], 0x0, &(0x7f0000012b00)) [ 1127.750091] EXT4-fs warning (device loop6): read_mmp_block:106: Error -117 while reading MMP block 0 [ 1127.789193] EXT4-fs warning (device loop7): read_mmp_block:106: Error -117 while reading MMP block 0 19:30:06 executing program 2: r0 = syz_io_uring_setup(0x21, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, &(0x7f00000a0000)=nil, &(0x7f00000b0000)=nil, &(0x7f0000000180)=0x0, &(0x7f0000002a40)=0x0) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_io_uring_submit(r1, r2, &(0x7f0000000300)=@IORING_OP_OPENAT={0x12, 0x0, 0x0, 0xffffffffffffffff, 0x0, &(0x7f0000000100)='./cgroup/cgroup.procs/file0/../file0\x00'}, 0x0) io_uring_enter(r0, 0x76d3, 0x0, 0x0, 0x0, 0x0) r3 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$netlbl_cipso(&(0x7f0000000000), r3) r4 = syz_io_uring_setup(0x2, &(0x7f0000000500), &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000ff6000/0xa000)=nil, &(0x7f0000000080)=0x0, &(0x7f0000000140)=0x0) r7 = io_uring_setup(0x3ddf, &(0x7f0000000680)) syz_io_uring_submit(r5, r6, &(0x7f0000000800)=@IORING_OP_SENDMSG={0x9, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0}, 0x0) r8 = eventfd(0x0) io_uring_register$IORING_REGISTER_EVENTFD(r4, 0x4, &(0x7f0000000000)=r8, 0x1) read$eventfd(r8, &(0x7f0000000040), 0x8) r9 = dup2(r7, 0xffffffffffffffff) r10 = dup2(r4, r9) io_uring_enter(r10, 0x1739, 0x0, 0x0, 0x0, 0x0) 19:30:06 executing program 6: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000500100000f000000000000000000000004000000000002000020000020000000def4655fdef4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000008000000018000000c20500002b0200000000000000000000000000000000000073797a6b616c6c6572000000000000002f746d702f73797a2d696d61676567656e35373134333434333800"/192, 0xc0, 0x400}, {&(0x7f0000010100)="000000000000000000000000e58ca12e13a240e2b1a22f8d07e8e55f010040000c00000000000000ddf4655f00"/64, 0x40, 0x4e0}, {&(0x7f0000010200), 0x0, 0x560}, {0x0, 0x0, 0x1000000000c00}, {&(0x7f0000012000)="504d4d00504d4dff", 0x8, 0x10000}], 0x0, &(0x7f0000012b00)) 19:30:06 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000500100000f000000000000000000000004000000000002000020000020000000def4655fdef4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000008000000018000000c20500002b0200000000000000000000000000000000000073797a6b616c6c6572000000000000002f746d702f73797a2d696d61676567656e35373134333434333800"/192, 0xc0, 0x400}, {&(0x7f0000010100)="000000000000000000000000e58ca12e13a240e2b1a22f8d07e8e55f010040000c00000000000000ddf4655f00"/64, 0x40, 0x4e0}, {&(0x7f0000010200), 0x0, 0x560}, {0x0, 0x0, 0x1000000000c00}, {&(0x7f0000012000)="504d4d00504d4dff", 0x8, 0x10000}], 0x0, &(0x7f0000012b00)) 19:30:06 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000500100000f000000000000000000000004000000000002000020000020000000def4655fdef4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000008000000018000000c20500002b0200000000000000000000000000000000000073797a6b616c6c6572000000000000002f746d702f73797a2d696d61676567656e35373134333434333800"/192, 0xc0, 0x400}, {&(0x7f0000010200)="010000000000050040", 0x9, 0x560}, {0x0, 0x0, 0x1000000000c00}, {&(0x7f0000012000)="504d4d00504d4dff", 0x8, 0x10000}], 0x0, &(0x7f0000012b00)) 19:30:06 executing program 1: syz_io_uring_setup(0x21, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, &(0x7f00000a0000)=nil, &(0x7f00000b0000)=nil, &(0x7f0000000180), &(0x7f0000002a40)) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r0 = io_uring_setup(0x3ddf, &(0x7f0000000680)) syz_io_uring_submit(0x0, 0x0, &(0x7f0000000800)=@IORING_OP_SENDMSG={0x9, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0}, 0x0) r1 = eventfd(0x0) io_uring_register$IORING_REGISTER_EVENTFD(0xffffffffffffffff, 0x4, &(0x7f0000000000)=r1, 0x1) read$eventfd(r1, &(0x7f0000000040), 0x8) r2 = syz_io_uring_setup(0x3702, &(0x7f00000001c0), &(0x7f0000000000/0x3000)=nil, &(0x7f0000ffe000/0x2000)=nil, &(0x7f0000000140), &(0x7f0000000240)) r3 = dup2(r0, r2) r4 = dup2(0xffffffffffffffff, r3) io_uring_enter(r4, 0x1739, 0x0, 0x0, 0x0, 0x0) 19:30:06 executing program 4: r0 = syz_io_uring_setup(0x2, &(0x7f0000000500), &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000ff6000/0xa000)=nil, &(0x7f0000000080)=0x0, &(0x7f0000000140)=0x0) r3 = io_uring_setup(0x3ddf, &(0x7f0000000680)) syz_io_uring_submit(r1, r2, &(0x7f0000000800)=@IORING_OP_SENDMSG={0x9, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0}, 0x0) r4 = eventfd(0x0) io_uring_register$IORING_REGISTER_EVENTFD(r0, 0x4, &(0x7f0000000000)=r4, 0x1) read$eventfd(r4, &(0x7f0000000040), 0x8) r5 = syz_io_uring_setup(0x3702, &(0x7f00000001c0), &(0x7f0000000000/0x3000)=nil, &(0x7f0000ffe000/0x2000)=nil, 0x0, &(0x7f0000000240)) r6 = dup2(r3, r5) r7 = dup2(r0, r6) io_uring_enter(r7, 0x1739, 0x0, 0x0, 0x0, 0x0) 19:30:06 executing program 7: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000500100000f000000000000000000000004000000000002000020000020000000def4655fdef4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000008000000018000000c20500002b0200000000000000000000000000000000000073797a6b616c6c6572000000000000002f746d702f73797a2d696d61676567656e35373134333434333800"/192, 0xc0, 0x400}, {&(0x7f0000010100)="000000000000000000000000e58ca12e13a240e2b1a22f8d07e8e55f010040000c00000000000000ddf4655f00"/64, 0x40, 0x4e0}, {&(0x7f0000010200), 0x0, 0x560}, {0x0, 0x0, 0x1000000000c00}, {&(0x7f0000012000)="504d4d00504d4dff", 0x8, 0x10000}], 0x0, &(0x7f0000012b00)) 19:30:06 executing program 0: r0 = syz_io_uring_setup(0x2, &(0x7f0000000500), &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000ff6000/0xa000)=nil, &(0x7f0000000080)=0x0, &(0x7f0000000140)=0x0) io_uring_setup(0x3ddf, &(0x7f0000000680)) syz_io_uring_submit(r1, r2, &(0x7f0000000800)=@IORING_OP_SENDMSG={0x9, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0}, 0x0) r3 = eventfd(0x0) io_uring_register$IORING_REGISTER_EVENTFD(r0, 0x4, &(0x7f0000000000)=r3, 0x1) read$eventfd(r3, &(0x7f0000000040), 0x8) r4 = syz_io_uring_setup(0x3702, &(0x7f00000001c0), &(0x7f0000000000/0x3000)=nil, &(0x7f0000ffe000/0x2000)=nil, &(0x7f0000000140), &(0x7f0000000240)) r5 = dup2(0xffffffffffffffff, r4) r6 = dup2(r0, r5) io_uring_enter(r6, 0x1739, 0x0, 0x0, 0x0, 0x0) [ 1140.762116] EXT4-fs warning (device loop6): read_mmp_block:106: Error -117 while reading MMP block 0 19:30:06 executing program 6: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000500100000f000000000000000000000004000000000002000020000020000000def4655fdef4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000008000000018000000c20500002b0200000000000000000000000000000000000073797a6b616c6c6572000000000000002f746d702f73797a2d696d61676567656e35373134333434333800"/192, 0xc0, 0x400}, {&(0x7f0000010100)="000000000000000000000000e58ca12e13a240e2b1a22f8d07e8e55f010040000c00000000000000ddf4655f00"/64, 0x40, 0x4e0}, {&(0x7f0000010200), 0x0, 0x560}, {0x0, 0x0, 0x1000000000c00}, {&(0x7f0000012000)="504d4d00504d4dff", 0x8, 0x10000}], 0x0, &(0x7f0000012b00)) [ 1140.782901] EXT4-fs warning (device loop7): read_mmp_block:106: Error -117 while reading MMP block 0 [ 1140.785997] EXT4-fs warning (device loop3): read_mmp_block:106: Error -117 while reading MMP block 0 [ 1140.805077] EXT4-fs (loop5): unsupported descriptor size 0 [ 1140.809700] EXT4-fs warning (device loop6): read_mmp_block:106: Error -117 while reading MMP block 0 19:30:06 executing program 6: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000500100000f000000000000000000000004000000000002000020000020000000def4655fdef4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000008000000018000000c20500002b0200000000000000000000000000000000000073797a6b616c6c6572000000000000002f746d702f73797a2d696d61676567656e35373134333434333800"/192, 0xc0, 0x400}, {&(0x7f0000010100)="000000000000000000000000e58ca12e13a240e2b1a22f8d07e8e55f010040000c00000000000000ddf4655f00"/64, 0x40, 0x4e0}, {&(0x7f0000010200)="0100000000000500", 0x8, 0x560}, {0x0, 0x0, 0x1000000000c00}, {&(0x7f0000012000)="504d4d00504d4dff", 0x8, 0x10000}], 0x0, &(0x7f0000012b00)) 19:30:06 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000500100000f000000000000000000000004000000000002000020000020000000def4655fdef4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000008000000018000000c20500002b0200000000000000000000000000000000000073797a6b616c6c6572000000000000002f746d702f73797a2d696d61676567656e35373134333434333800"/192, 0xc0, 0x400}, {&(0x7f0000010100)="000000000000000000000000e58ca12e13a240e2b1a22f8d07e8e55f010040000c00000000000000ddf4655f00"/64, 0x40, 0x4e0}, {&(0x7f0000010200), 0x0, 0x560}, {0x0, 0x0, 0x1000000000c00}, {&(0x7f0000012000)="504d4d00504d4dff", 0x8, 0x10000}], 0x0, &(0x7f0000012b00)) [ 1140.852603] EXT4-fs warning (device loop6): read_mmp_block:106: Error -117 while reading MMP block 0 19:30:06 executing program 7: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000500100000f000000000000000000000004000000000002000020000020000000def4655fdef4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000008000000018000000c20500002b0200000000000000000000000000000000000073797a6b616c6c6572000000000000002f746d702f73797a2d696d61676567656e35373134333434333800"/192, 0xc0, 0x400}, {&(0x7f0000010100)="000000000000000000000000e58ca12e13a240e2b1a22f8d07e8e55f010040000c00000000000000ddf4655f00"/64, 0x40, 0x4e0}, {&(0x7f0000010200)="0100000000000500", 0x8, 0x560}, {0x0, 0x0, 0x1000000000c00}, {&(0x7f0000012000)="504d4d00504d4dff", 0x8, 0x10000}], 0x0, &(0x7f0000012b00)) 19:30:06 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000500100000f000000000000000000000004000000000002000020000020000000def4655fdef4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000008000000018000000c20500002b0200000000000000000000000000000000000073797a6b616c6c6572000000000000002f746d702f73797a2d696d61676567656e35373134333434333800"/192, 0xc0, 0x400}, {0x0, 0x0, 0x4e0}, {&(0x7f0000010200)="010000000000050040", 0x9, 0x560}, {0x0, 0x0, 0x1000000000c00}, {&(0x7f0000012000)="504d4d00504d4dff", 0x8, 0x10000}], 0x0, &(0x7f0000012b00)) [ 1140.890347] EXT4-fs warning (device loop7): read_mmp_block:106: Error -117 while reading MMP block 0 19:30:06 executing program 6: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000500100000f000000000000000000000004000000000002000020000020000000def4655fdef4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000008000000018000000c20500002b0200000000000000000000000000000000000073797a6b616c6c6572000000000000002f746d702f73797a2d696d61676567656e35373134333434333800"/192, 0xc0, 0x400}, {&(0x7f0000010100)="000000000000000000000000e58ca12e13a240e2b1a22f8d07e8e55f010040000c00000000000000ddf4655f00"/64, 0x40, 0x4e0}, {&(0x7f0000010200)="0100000000000500", 0x8, 0x560}, {0x0, 0x0, 0x1000000000c00}, {&(0x7f0000012000)="504d4d00504d4dff", 0x8, 0x10000}], 0x0, &(0x7f0000012b00)) 19:30:06 executing program 7: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000500100000f000000000000000000000004000000000002000020000020000000def4655fdef4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000008000000018000000c20500002b0200000000000000000000000000000000000073797a6b616c6c6572000000000000002f746d702f73797a2d696d61676567656e35373134333434333800"/192, 0xc0, 0x400}, {&(0x7f0000010100)="000000000000000000000000e58ca12e13a240e2b1a22f8d07e8e55f010040000c00000000000000ddf4655f00"/64, 0x40, 0x4e0}, {&(0x7f0000010200)="0100000000000500", 0x8, 0x560}, {0x0, 0x0, 0x1000000000c00}, {&(0x7f0000012000)="504d4d00504d4dff", 0x8, 0x10000}], 0x0, &(0x7f0000012b00)) [ 1140.959589] EXT4-fs warning (device loop3): read_mmp_block:106: Error -117 while reading MMP block 0 [ 1140.973889] EXT4-fs (loop5): unsupported descriptor size 0 [ 1141.010461] EXT4-fs warning (device loop6): read_mmp_block:106: Error -117 while reading MMP block 0 [ 1141.027887] EXT4-fs warning (device loop7): read_mmp_block:106: Error -117 while reading MMP block 0 19:30:06 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000500100000f000000000000000000000004000000000002000020000020000000def4655fdef4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000008000000018000000c20500002b0200000000000000000000000000000000000073797a6b616c6c6572000000000000002f746d702f73797a2d696d61676567656e35373134333434333800"/192, 0xc0, 0x400}, {&(0x7f0000010100)="000000000000000000000000e58ca12e13a240e2b1a22f8d07e8e55f010040000c00000000000000ddf4655f00"/64, 0x40, 0x4e0}, {&(0x7f0000010200)="0100000000000500", 0x8, 0x560}, {0x0, 0x0, 0x1000000000c00}, {&(0x7f0000012000)="504d4d00504d4dff", 0x8, 0x10000}], 0x0, &(0x7f0000012b00)) [ 1141.123632] EXT4-fs warning (device loop3): read_mmp_block:106: Error -117 while reading MMP block 0 19:30:18 executing program 4: r0 = syz_io_uring_setup(0x2, &(0x7f0000000500), &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000ff6000/0xa000)=nil, &(0x7f0000000080)=0x0, &(0x7f0000000140)=0x0) r3 = io_uring_setup(0x3ddf, &(0x7f0000000680)) syz_io_uring_submit(r1, r2, &(0x7f0000000800)=@IORING_OP_SENDMSG={0x9, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0}, 0x0) r4 = eventfd(0x0) io_uring_register$IORING_REGISTER_EVENTFD(r0, 0x4, &(0x7f0000000000)=r4, 0x1) read$eventfd(r4, &(0x7f0000000040), 0x8) r5 = syz_io_uring_setup(0x3702, &(0x7f00000001c0), &(0x7f0000000000/0x3000)=nil, &(0x7f0000ffe000/0x2000)=nil, 0x0, &(0x7f0000000240)) r6 = dup2(r3, r5) r7 = dup2(r0, r6) io_uring_enter(r7, 0x1739, 0x0, 0x0, 0x0, 0x0) 19:30:18 executing program 0: r0 = syz_io_uring_setup(0x2, &(0x7f0000000500), &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000ff6000/0xa000)=nil, &(0x7f0000000080)=0x0, &(0x7f0000000140)=0x0) io_uring_setup(0x3ddf, &(0x7f0000000680)) syz_io_uring_submit(r1, r2, &(0x7f0000000800)=@IORING_OP_SENDMSG={0x9, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0}, 0x0) r3 = eventfd(0x0) io_uring_register$IORING_REGISTER_EVENTFD(r0, 0x4, &(0x7f0000000000)=r3, 0x1) read$eventfd(r3, &(0x7f0000000040), 0x8) r4 = syz_io_uring_setup(0x3702, &(0x7f00000001c0), &(0x7f0000000000/0x3000)=nil, &(0x7f0000ffe000/0x2000)=nil, &(0x7f0000000140), &(0x7f0000000240)) r5 = dup2(0xffffffffffffffff, r4) r6 = dup2(r0, r5) io_uring_enter(r6, 0x1739, 0x0, 0x0, 0x0, 0x0) 19:30:18 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000500100000f000000000000000000000004000000000002000020000020000000def4655fdef4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000008000000018000000c20500002b0200000000000000000000000000000000000073797a6b616c6c6572000000000000002f746d702f73797a2d696d61676567656e35373134333434333800"/192, 0xc0, 0x400}, {0x0, 0x0, 0x4e0}, {&(0x7f0000010200)="010000000000050040", 0x9, 0x560}, {0x0, 0x0, 0x1000000000c00}, {&(0x7f0000012000)="504d4d00504d4dff", 0x8, 0x10000}], 0x0, &(0x7f0000012b00)) 19:30:18 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000500100000f000000000000000000000004000000000002000020000020000000def4655fdef4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000008000000018000000c20500002b0200000000000000000000000000000000000073797a6b616c6c6572000000000000002f746d702f73797a2d696d61676567656e35373134333434333800"/192, 0xc0, 0x400}, {&(0x7f0000010100)="000000000000000000000000e58ca12e13a240e2b1a22f8d07e8e55f010040000c00000000000000ddf4655f00"/64, 0x40, 0x4e0}, {&(0x7f0000010200)="0100000000000500", 0x8, 0x560}, {0x0, 0x0, 0x1000000000c00}, {&(0x7f0000012000)="504d4d00504d4dff", 0x8, 0x10000}], 0x0, &(0x7f0000012b00)) 19:30:18 executing program 6: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000500100000f000000000000000000000004000000000002000020000020000000def4655fdef4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000008000000018000000c20500002b0200000000000000000000000000000000000073797a6b616c6c6572000000000000002f746d702f73797a2d696d61676567656e35373134333434333800"/192, 0xc0, 0x400}, {&(0x7f0000010100)="000000000000000000000000e58ca12e13a240e2b1a22f8d07e8e55f010040000c00000000000000ddf4655f00"/64, 0x40, 0x4e0}, {&(0x7f0000010200)="0100000000000500", 0x8, 0x560}, {0x0, 0x0, 0x1000000000c00}, {&(0x7f0000012000)="504d4d00504d4dff", 0x8, 0x10000}], 0x0, &(0x7f0000012b00)) 19:30:18 executing program 7: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000500100000f000000000000000000000004000000000002000020000020000000def4655fdef4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000008000000018000000c20500002b0200000000000000000000000000000000000073797a6b616c6c6572000000000000002f746d702f73797a2d696d61676567656e35373134333434333800"/192, 0xc0, 0x400}, {&(0x7f0000010100)="000000000000000000000000e58ca12e13a240e2b1a22f8d07e8e55f010040000c00000000000000ddf4655f00"/64, 0x40, 0x4e0}, {&(0x7f0000010200)="0100000000000500", 0x8, 0x560}, {0x0, 0x0, 0x1000000000c00}, {&(0x7f0000012000)="504d4d00504d4dff", 0x8, 0x10000}], 0x0, &(0x7f0000012b00)) 19:30:18 executing program 1: syz_io_uring_setup(0x21, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, &(0x7f00000a0000)=nil, &(0x7f00000b0000)=nil, &(0x7f0000000180), &(0x7f0000002a40)) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r0 = io_uring_setup(0x3ddf, &(0x7f0000000680)) syz_io_uring_submit(0x0, 0x0, &(0x7f0000000800)=@IORING_OP_SENDMSG={0x9, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0}, 0x0) r1 = eventfd(0x0) io_uring_register$IORING_REGISTER_EVENTFD(0xffffffffffffffff, 0x4, &(0x7f0000000000)=r1, 0x1) read$eventfd(r1, &(0x7f0000000040), 0x8) r2 = syz_io_uring_setup(0x3702, &(0x7f00000001c0), &(0x7f0000000000/0x3000)=nil, &(0x7f0000ffe000/0x2000)=nil, &(0x7f0000000140), &(0x7f0000000240)) r3 = dup2(r0, r2) r4 = dup2(0xffffffffffffffff, r3) io_uring_enter(r4, 0x1739, 0x0, 0x0, 0x0, 0x0) 19:30:18 executing program 2: r0 = syz_io_uring_setup(0x21, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, &(0x7f00000a0000)=nil, &(0x7f00000b0000)=nil, &(0x7f0000000180)=0x0, &(0x7f0000002a40)=0x0) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_io_uring_submit(r1, r2, &(0x7f0000000300)=@IORING_OP_OPENAT={0x12, 0x0, 0x0, 0xffffffffffffffff, 0x0, &(0x7f0000000100)='./cgroup/cgroup.procs/file0/../file0\x00'}, 0x0) io_uring_enter(r0, 0x76d3, 0x0, 0x0, 0x0, 0x0) r3 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$netlbl_cipso(&(0x7f0000000000), r3) r4 = syz_io_uring_setup(0x2, &(0x7f0000000500), &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000ff6000/0xa000)=nil, &(0x7f0000000080)=0x0, &(0x7f0000000140)=0x0) r7 = io_uring_setup(0x3ddf, &(0x7f0000000680)) syz_io_uring_submit(r5, r6, &(0x7f0000000800)=@IORING_OP_SENDMSG={0x9, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0}, 0x0) r8 = eventfd(0x0) io_uring_register$IORING_REGISTER_EVENTFD(r4, 0x4, &(0x7f0000000000)=r8, 0x1) read$eventfd(r8, &(0x7f0000000040), 0x8) r9 = dup2(r7, 0xffffffffffffffff) r10 = dup2(r4, r9) io_uring_enter(r10, 0x1739, 0x0, 0x0, 0x0, 0x0) [ 1153.037795] EXT4-fs warning (device loop7): read_mmp_block:106: Error -117 while reading MMP block 0 [ 1153.044873] EXT4-fs warning (device loop3): read_mmp_block:106: Error -117 while reading MMP block 0 [ 1153.048407] EXT4-fs warning (device loop6): read_mmp_block:106: Error -117 while reading MMP block 0 [ 1153.050668] EXT4-fs (loop5): unsupported descriptor size 0 19:30:18 executing program 7: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000500100000f000000000000000000000004000000000002000020000020000000def4655fdef4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000008000000018000000c20500002b0200000000000000000000000000000000000073797a6b616c6c6572000000000000002f746d702f73797a2d696d61676567656e35373134333434333800"/192, 0xc0, 0x400}, {&(0x7f0000010100)="000000000000000000000000e58ca12e13a240e2b1a22f8d07e8e55f010040000c00000000000000ddf4655f00"/64, 0x40, 0x4e0}, {&(0x7f0000010200)="010000000000050040000000", 0xc, 0x560}, {0x0, 0x0, 0x1000000000c00}, {&(0x7f0000012000)="504d4d00504d4dff", 0x8, 0x10000}], 0x0, &(0x7f0000012b00)) 19:30:18 executing program 6: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000500100000f000000000000000000000004000000000002000020000020000000def4655fdef4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000008000000018000000c20500002b0200000000000000000000000000000000000073797a6b616c6c6572000000000000002f746d702f73797a2d696d61676567656e35373134333434333800"/192, 0xc0, 0x400}, {&(0x7f0000010100)="000000000000000000000000e58ca12e13a240e2b1a22f8d07e8e55f010040000c00000000000000ddf4655f00"/64, 0x40, 0x4e0}, {&(0x7f0000010200)="010000000000050040000000", 0xc, 0x560}, {0x0, 0x0, 0x1000000000c00}, {&(0x7f0000012000)="504d4d00504d4dff", 0x8, 0x10000}], 0x0, &(0x7f0000012b00)) 19:30:18 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000500100000f000000000000000000000004000000000002000020000020000000def4655fdef4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000008000000018000000c20500002b0200000000000000000000000000000000000073797a6b616c6c6572000000000000002f746d702f73797a2d696d61676567656e35373134333434333800"/192, 0xc0, 0x400}, {&(0x7f0000010100)="000000000000000000000000e58ca12e13a240e2b1a22f8d07e8e55f010040000c00000000000000ddf4655f00"/64, 0x40, 0x4e0}, {&(0x7f0000010200)="0100000000000500", 0x8, 0x560}, {0x0, 0x0, 0x1000000000c00}, {&(0x7f0000012000)="504d4d00504d4dff", 0x8, 0x10000}], 0x0, &(0x7f0000012b00)) 19:30:18 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000500100000f000000000000000000000004000000000002000020000020000000def4655fdef4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000008000000018000000c20500002b0200000000000000000000000000000000000073797a6b616c6c6572000000000000002f746d702f73797a2d696d61676567656e35373134333434333800"/192, 0xc0, 0x400}, {0x0, 0x0, 0x4e0}, {&(0x7f0000010200)="010000000000050040", 0x9, 0x560}, {0x0, 0x0, 0x1000000000c00}, {&(0x7f0000012000)="504d4d00504d4dff", 0x8, 0x10000}], 0x0, &(0x7f0000012b00)) [ 1153.198649] EXT4-fs error (device loop7): ext4_fill_super:4947: inode #2: comm syz-executor.7: iget: root inode unallocated [ 1153.201556] EXT4-fs (loop7): get root inode failed [ 1153.202667] EXT4-fs (loop7): mount failed [ 1153.249184] EXT4-fs (loop5): unsupported descriptor size 0 19:30:18 executing program 7: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000500100000f000000000000000000000004000000000002000020000020000000def4655fdef4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000008000000018000000c20500002b0200000000000000000000000000000000000073797a6b616c6c6572000000000000002f746d702f73797a2d696d61676567656e35373134333434333800"/192, 0xc0, 0x400}, {&(0x7f0000010100)="000000000000000000000000e58ca12e13a240e2b1a22f8d07e8e55f010040000c00000000000000ddf4655f00"/64, 0x40, 0x4e0}, {&(0x7f0000010200)="0100000000000500", 0x8, 0x560}, {0x0, 0x0, 0x1000000000c00}, {&(0x7f0000012000)="504d4d00504d4dff", 0x8, 0x10000}], 0x0, &(0x7f0000012b00)) 19:30:18 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000500100000f000000000000000000000004000000000002000020000020000000def4655fdef4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000008000000018000000c20500002b0200000000000000000000000000000000000073797a6b616c6c6572000000000000002f746d702f73797a2d696d61676567656e35373134333434333800"/192, 0xc0, 0x400}, {&(0x7f0000010100), 0x0, 0x4e0}, {&(0x7f0000010200)="010000000000050040", 0x9, 0x560}, {0x0, 0x0, 0x1000000000c00}, {&(0x7f0000012000)="504d4d00504d4dff", 0x8, 0x10000}], 0x0, &(0x7f0000012b00)) [ 1153.282280] EXT4-fs warning (device loop3): read_mmp_block:106: Error -117 while reading MMP block 0 [ 1153.295964] EXT4-fs error (device loop6): ext4_fill_super:4947: inode #2: comm syz-executor.6: iget: root inode unallocated [ 1153.299921] EXT4-fs (loop6): get root inode failed [ 1153.301066] EXT4-fs (loop6): mount failed [ 1153.333841] EXT4-fs warning (device loop7): read_mmp_block:106: Error -117 while reading MMP block 0 19:30:18 executing program 6: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000500100000f000000000000000000000004000000000002000020000020000000def4655fdef4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000008000000018000000c20500002b0200000000000000000000000000000000000073797a6b616c6c6572000000000000002f746d702f73797a2d696d61676567656e35373134333434333800"/192, 0xc0, 0x400}, {&(0x7f0000010100)="000000000000000000000000e58ca12e13a240e2b1a22f8d07e8e55f010040000c00000000000000ddf4655f00"/64, 0x40, 0x4e0}, {&(0x7f0000010200)="0100000000000500", 0x8, 0x560}, {0x0, 0x0, 0x1000000000c00}, {&(0x7f0000012000)="504d4d00504d4dff", 0x8, 0x10000}], 0x0, &(0x7f0000012b00)) [ 1153.391254] EXT4-fs (loop5): unsupported descriptor size 0 [ 1153.400762] EXT4-fs warning (device loop6): read_mmp_block:106: Error -117 while reading MMP block 0 19:30:30 executing program 0: r0 = syz_io_uring_setup(0x2, &(0x7f0000000500), &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000ff6000/0xa000)=nil, &(0x7f0000000080)=0x0, &(0x7f0000000140)=0x0) io_uring_setup(0x3ddf, &(0x7f0000000680)) syz_io_uring_submit(r1, r2, &(0x7f0000000800)=@IORING_OP_SENDMSG={0x9, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0}, 0x0) r3 = eventfd(0x0) io_uring_register$IORING_REGISTER_EVENTFD(r0, 0x4, &(0x7f0000000000)=r3, 0x1) read$eventfd(r3, &(0x7f0000000040), 0x8) r4 = syz_io_uring_setup(0x3702, &(0x7f00000001c0), &(0x7f0000000000/0x3000)=nil, &(0x7f0000ffe000/0x2000)=nil, &(0x7f0000000140), &(0x7f0000000240)) r5 = dup2(0xffffffffffffffff, r4) r6 = dup2(r0, r5) io_uring_enter(r6, 0x1739, 0x0, 0x0, 0x0, 0x0) 19:30:30 executing program 1: syz_io_uring_setup(0x21, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, &(0x7f00000a0000)=nil, &(0x7f00000b0000)=nil, &(0x7f0000000180), &(0x7f0000002a40)) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r0 = io_uring_setup(0x3ddf, &(0x7f0000000680)) syz_io_uring_submit(0x0, 0x0, &(0x7f0000000800)=@IORING_OP_SENDMSG={0x9, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0}, 0x0) r1 = eventfd(0x0) io_uring_register$IORING_REGISTER_EVENTFD(0xffffffffffffffff, 0x4, &(0x7f0000000000)=r1, 0x1) read$eventfd(r1, &(0x7f0000000040), 0x8) r2 = syz_io_uring_setup(0x3702, &(0x7f00000001c0), &(0x7f0000000000/0x3000)=nil, &(0x7f0000ffe000/0x2000)=nil, &(0x7f0000000140), &(0x7f0000000240)) r3 = dup2(r0, r2) r4 = dup2(0xffffffffffffffff, r3) io_uring_enter(r4, 0x1739, 0x0, 0x0, 0x0, 0x0) 19:30:30 executing program 7: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000500100000f000000000000000000000004000000000002000020000020000000def4655fdef4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000008000000018000000c20500002b0200000000000000000000000000000000000073797a6b616c6c6572000000000000002f746d702f73797a2d696d61676567656e35373134333434333800"/192, 0xc0, 0x400}, {&(0x7f0000010100)="000000000000000000000000e58ca12e13a240e2b1a22f8d07e8e55f010040000c00000000000000ddf4655f00"/64, 0x40, 0x4e0}, {&(0x7f0000010200)="0100000000000500", 0x8, 0x560}, {0x0, 0x0, 0x1000000000c00}, {&(0x7f0000012000)="504d4d00504d4dff", 0x8, 0x10000}], 0x0, &(0x7f0000012b00)) 19:30:30 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000500100000f000000000000000000000004000000000002000020000020000000def4655fdef4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000008000000018000000c20500002b0200000000000000000000000000000000000073797a6b616c6c6572000000000000002f746d702f73797a2d696d61676567656e35373134333434333800"/192, 0xc0, 0x400}, {&(0x7f0000010100), 0x0, 0x4e0}, {&(0x7f0000010200)="010000000000050040", 0x9, 0x560}, {0x0, 0x0, 0x1000000000c00}, {&(0x7f0000012000)="504d4d00504d4dff", 0x8, 0x10000}], 0x0, &(0x7f0000012b00)) 19:30:30 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000500100000f000000000000000000000004000000000002000020000020000000def4655fdef4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000008000000018000000c20500002b0200000000000000000000000000000000000073797a6b616c6c6572000000000000002f746d702f73797a2d696d61676567656e35373134333434333800"/192, 0xc0, 0x400}, {&(0x7f0000010100)="000000000000000000000000e58ca12e13a240e2b1a22f8d07e8e55f010040000c00000000000000ddf4655f00"/64, 0x40, 0x4e0}, {&(0x7f0000010200)="010000000000050040000000", 0xc, 0x560}, {0x0, 0x0, 0x1000000000c00}, {&(0x7f0000012000)="504d4d00504d4dff", 0x8, 0x10000}], 0x0, &(0x7f0000012b00)) 19:30:30 executing program 6: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000500100000f000000000000000000000004000000000002000020000020000000def4655fdef4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000008000000018000000c20500002b0200000000000000000000000000000000000073797a6b616c6c6572000000000000002f746d702f73797a2d696d61676567656e35373134333434333800"/192, 0xc0, 0x400}, {&(0x7f0000010100)="000000000000000000000000e58ca12e13a240e2b1a22f8d07e8e55f010040000c00000000000000ddf4655f00"/64, 0x40, 0x4e0}, {&(0x7f0000010200)="0100000000000500", 0x8, 0x560}, {0x0, 0x0, 0x1000000000c00}, {&(0x7f0000012000)="504d4d00504d4dff", 0x8, 0x10000}], 0x0, &(0x7f0000012b00)) 19:30:30 executing program 4: r0 = syz_io_uring_setup(0x2, &(0x7f0000000500), &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000ff6000/0xa000)=nil, &(0x7f0000000080)=0x0, &(0x7f0000000140)=0x0) r3 = io_uring_setup(0x3ddf, &(0x7f0000000680)) syz_io_uring_submit(r1, r2, &(0x7f0000000800)=@IORING_OP_SENDMSG={0x9, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0}, 0x0) r4 = eventfd(0x0) io_uring_register$IORING_REGISTER_EVENTFD(r0, 0x4, &(0x7f0000000000)=r4, 0x1) read$eventfd(r4, &(0x7f0000000040), 0x8) r5 = syz_io_uring_setup(0x3702, &(0x7f00000001c0), &(0x7f0000000000/0x3000)=nil, &(0x7f0000ffe000/0x2000)=nil, &(0x7f0000000140), 0x0) r6 = dup2(r3, r5) r7 = dup2(r0, r6) io_uring_enter(r7, 0x1739, 0x0, 0x0, 0x0, 0x0) 19:30:30 executing program 2: r0 = syz_io_uring_setup(0x21, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, &(0x7f00000a0000)=nil, &(0x7f00000b0000)=nil, &(0x7f0000000180)=0x0, &(0x7f0000002a40)=0x0) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_io_uring_submit(r1, r2, &(0x7f0000000300)=@IORING_OP_OPENAT={0x12, 0x0, 0x0, 0xffffffffffffffff, 0x0, &(0x7f0000000100)='./cgroup/cgroup.procs/file0/../file0\x00'}, 0x0) io_uring_enter(r0, 0x76d3, 0x0, 0x0, 0x0, 0x0) r3 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$netlbl_cipso(&(0x7f0000000000), r3) r4 = syz_io_uring_setup(0x2, &(0x7f0000000500), &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000ff6000/0xa000)=nil, &(0x7f0000000080)=0x0, &(0x7f0000000140)=0x0) r7 = io_uring_setup(0x3ddf, &(0x7f0000000680)) syz_io_uring_submit(r5, r6, &(0x7f0000000800)=@IORING_OP_SENDMSG={0x9, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0}, 0x0) r8 = eventfd(0x0) read$eventfd(r8, &(0x7f0000000040), 0x8) r9 = syz_io_uring_setup(0x3702, &(0x7f00000001c0), &(0x7f0000000000/0x3000)=nil, &(0x7f0000ffe000/0x2000)=nil, &(0x7f0000000140), &(0x7f0000000240)) r10 = dup2(r7, r9) r11 = dup2(r4, r10) io_uring_enter(r11, 0x1739, 0x0, 0x0, 0x0, 0x0) [ 1164.930543] EXT4-fs (loop5): unsupported descriptor size 0 [ 1164.956232] EXT4-fs warning (device loop6): read_mmp_block:106: Error -117 while reading MMP block 0 [ 1164.967497] EXT4-fs warning (device loop7): read_mmp_block:106: Error -117 while reading MMP block 0 19:30:30 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000500100000f000000000000000000000004000000000002000020000020000000def4655fdef4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000008000000018000000c20500002b0200000000000000000000000000000000000073797a6b616c6c6572000000000000002f746d702f73797a2d696d61676567656e35373134333434333800"/192, 0xc0, 0x400}, {&(0x7f0000010100), 0x0, 0x4e0}, {&(0x7f0000010200)="010000000000050040", 0x9, 0x560}, {0x0, 0x0, 0x1000000000c00}, {&(0x7f0000012000)="504d4d00504d4dff", 0x8, 0x10000}], 0x0, &(0x7f0000012b00)) 19:30:30 executing program 6: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000500100000f000000000000000000000004000000000002000020000020000000def4655fdef4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000008000000018000000c20500002b0200000000000000000000000000000000000073797a6b616c6c6572000000000000002f746d702f73797a2d696d61676567656e35373134333434333800"/192, 0xc0, 0x400}, {&(0x7f0000010100)="000000000000000000000000e58ca12e13a240e2b1a22f8d07e8e55f010040000c00000000000000ddf4655f00"/64, 0x40, 0x4e0}, {&(0x7f0000010200)="0100000000000500", 0x8, 0x560}, {0x0, 0x0, 0x1000000000c00}, {&(0x7f0000012000)="504d4d00504d4dff", 0x8, 0x10000}], 0x0, &(0x7f0000012b00)) [ 1164.998185] EXT4-fs error (device loop3): ext4_fill_super:4947: inode #2: comm syz-executor.3: iget: root inode unallocated [ 1165.001671] EXT4-fs (loop3): get root inode failed [ 1165.002792] EXT4-fs (loop3): mount failed 19:30:30 executing program 7: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000500100000f000000000000000000000004000000000002000020000020000000def4655fdef4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000008000000018000000c20500002b0200000000000000000000000000000000000073797a6b616c6c6572000000000000002f746d702f73797a2d696d61676567656e35373134333434333800"/192, 0xc0, 0x400}, {&(0x7f0000010100)="000000000000000000000000e58ca12e13a240e2b1a22f8d07e8e55f010040000c00000000000000ddf4655f00"/64, 0x40, 0x4e0}, {&(0x7f0000010200)="0100000000000500", 0x8, 0x560}, {0x0, 0x0, 0x1000000000c00}, {&(0x7f0000012000)="504d4d00504d4dff", 0x8, 0x10000}], 0x0, &(0x7f0000012b00)) [ 1165.051194] EXT4-fs (loop5): unsupported descriptor size 0 19:30:30 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000500100000f000000000000000000000004000000000002000020000020000000def4655fdef4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000008000000018000000c20500002b0200000000000000000000000000000000000073797a6b616c6c6572000000000000002f746d702f73797a2d696d61676567656e35373134333434333800"/192, 0xc0, 0x400}, {&(0x7f0000010100)="000000000000000000000000e58ca12e13a240e2b1a22f8d07e8e55f010040000c00000000000000ddf4655f00"/64, 0x40, 0x4e0}, {&(0x7f0000010200)="0100000000000500", 0x8, 0x560}, {0x0, 0x0, 0x1000000000c00}, {&(0x7f0000012000)="504d4d00504d4dff", 0x8, 0x10000}], 0x0, &(0x7f0000012b00)) 19:30:30 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000500100000f000000000000000000000004000000000002000020000020000000def4655fdef4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000008000000018000000c20500002b0200000000000000000000000000000000000073797a6b616c6c6572000000000000002f746d702f73797a2d696d61676567656e35373134333434333800"/192, 0xc0, 0x400}, {&(0x7f0000010100)="000000000000000000000000e58ca12e13a240e2b1a22f8d07e8e55f01004000", 0x20, 0x4e0}, {&(0x7f0000010200)="010000000000050040", 0x9, 0x560}, {0x0, 0x0, 0x1000000000c00}, {&(0x7f0000012000)="504d4d00504d4dff", 0x8, 0x10000}], 0x0, &(0x7f0000012b00)) [ 1165.095653] EXT4-fs warning (device loop7): read_mmp_block:106: Error -117 while reading MMP block 0 19:30:30 executing program 7: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000500100000f000000000000000000000004000000000002000020000020000000def4655fdef4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000008000000018000000c20500002b0200000000000000000000000000000000000073797a6b616c6c6572000000000000002f746d702f73797a2d696d61676567656e35373134333434333800"/192, 0xc0, 0x400}, {&(0x7f0000010100)="000000000000000000000000e58ca12e13a240e2b1a22f8d07e8e55f010040000c00000000000000ddf4655f00"/64, 0x40, 0x4e0}, {&(0x7f0000010200)="01000000000005004000", 0xa, 0x560}, {0x0, 0x0, 0x1000000000c00}, {&(0x7f0000012000)="504d4d00504d4dff", 0x8, 0x10000}], 0x0, &(0x7f0000012b00)) [ 1165.124856] EXT4-fs warning (device loop6): read_mmp_block:106: Error -117 while reading MMP block 0 [ 1165.157129] EXT4-fs error (device loop5): ext4_fill_super:4947: inode #2: comm syz-executor.5: iget: root inode unallocated 19:30:30 executing program 6: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000500100000f000000000000000000000004000000000002000020000020000000def4655fdef4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000008000000018000000c20500002b0200000000000000000000000000000000000073797a6b616c6c6572000000000000002f746d702f73797a2d696d61676567656e35373134333434333800"/192, 0xc0, 0x400}, {&(0x7f0000010100)="000000000000000000000000e58ca12e13a240e2b1a22f8d07e8e55f010040000c00000000000000ddf4655f00"/64, 0x40, 0x4e0}, {&(0x7f0000010200)="01000000000005004000", 0xa, 0x560}, {0x0, 0x0, 0x1000000000c00}, {&(0x7f0000012000)="504d4d00504d4dff", 0x8, 0x10000}], 0x0, &(0x7f0000012b00)) [ 1165.168191] EXT4-fs (loop5): get root inode failed [ 1165.169311] EXT4-fs (loop5): mount failed [ 1165.175500] EXT4-fs warning (device loop3): read_mmp_block:106: Error -117 while reading MMP block 0 [ 1165.181234] EXT4-fs error (device loop7): ext4_fill_super:4947: inode #2: comm syz-executor.7: iget: root inode unallocated [ 1165.187215] EXT4-fs (loop7): get root inode failed [ 1165.188352] EXT4-fs (loop7): mount failed [ 1165.273054] EXT4-fs error (device loop6): ext4_fill_super:4947: inode #2: comm syz-executor.6: iget: root inode unallocated [ 1165.276280] EXT4-fs (loop6): get root inode failed [ 1165.277433] EXT4-fs (loop6): mount failed 19:30:43 executing program 1: syz_io_uring_setup(0x21, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, &(0x7f00000a0000)=nil, &(0x7f00000b0000)=nil, &(0x7f0000000180), &(0x7f0000002a40)) r0 = syz_io_uring_setup(0x2, &(0x7f0000000500), &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000ff6000/0xa000)=nil, &(0x7f0000000080)=0x0, &(0x7f0000000140)=0x0) r3 = io_uring_setup(0x3ddf, &(0x7f0000000680)) syz_io_uring_submit(r1, r2, &(0x7f0000000800)=@IORING_OP_SENDMSG={0x9, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0}, 0x0) r4 = eventfd(0x0) io_uring_register$IORING_REGISTER_EVENTFD(r0, 0x4, &(0x7f0000000000)=r4, 0x1) read$eventfd(r4, &(0x7f0000000040), 0x8) r5 = syz_io_uring_setup(0x3702, &(0x7f00000001c0), &(0x7f0000000000/0x3000)=nil, &(0x7f0000ffe000/0x2000)=nil, &(0x7f0000000140), &(0x7f0000000240)) r6 = dup2(r3, r5) r7 = dup2(r0, r6) io_uring_enter(r7, 0x1739, 0x0, 0x0, 0x0, 0x0) 19:30:43 executing program 0: r0 = syz_io_uring_setup(0x2, &(0x7f0000000500), &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000ff6000/0xa000)=nil, &(0x7f0000000080)=0x0, &(0x7f0000000140)=0x0) r3 = io_uring_setup(0x3ddf, &(0x7f0000000680)) syz_io_uring_submit(r1, r2, &(0x7f0000000800)=@IORING_OP_SENDMSG={0x9, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0}, 0x0) r4 = eventfd(0x0) io_uring_register$IORING_REGISTER_EVENTFD(r0, 0x4, &(0x7f0000000000)=r4, 0x1) read$eventfd(r4, &(0x7f0000000040), 0x8) syz_io_uring_setup(0x3702, &(0x7f00000001c0), &(0x7f0000000000/0x3000)=nil, &(0x7f0000ffe000/0x2000)=nil, &(0x7f0000000140), &(0x7f0000000240)) r5 = dup2(r3, 0xffffffffffffffff) r6 = dup2(r0, r5) io_uring_enter(r6, 0x1739, 0x0, 0x0, 0x0, 0x0) 19:30:43 executing program 7: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000500100000f000000000000000000000004000000000002000020000020000000def4655fdef4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000008000000018000000c20500002b0200000000000000000000000000000000000073797a6b616c6c6572000000000000002f746d702f73797a2d696d61676567656e35373134333434333800"/192, 0xc0, 0x400}, {&(0x7f0000010100)="000000000000000000000000e58ca12e13a240e2b1a22f8d07e8e55f010040000c00000000000000ddf4655f00"/64, 0x40, 0x4e0}, {&(0x7f0000010200)="0100000000000500", 0x8, 0x560}, {0x0, 0x0, 0x1000000000c00}, {&(0x7f0000012000)="504d4d00504d4dff", 0x8, 0x10000}], 0x0, &(0x7f0000012b00)) 19:30:43 executing program 6: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000500100000f000000000000000000000004000000000002000020000020000000def4655fdef4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000008000000018000000c20500002b0200000000000000000000000000000000000073797a6b616c6c6572000000000000002f746d702f73797a2d696d61676567656e35373134333434333800"/192, 0xc0, 0x400}, {&(0x7f0000010100)="000000000000000000000000e58ca12e13a240e2b1a22f8d07e8e55f010040000c00000000000000ddf4655f00"/64, 0x40, 0x4e0}, {&(0x7f0000010200)="0100000000000500", 0x8, 0x560}, {0x0, 0x0, 0x1000000000c00}, {&(0x7f0000012000)="504d4d00504d4dff", 0x8, 0x10000}], 0x0, &(0x7f0000012b00)) 19:30:43 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000500100000f000000000000000000000004000000000002000020000020000000def4655fdef4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000008000000018000000c20500002b0200000000000000000000000000000000000073797a6b616c6c6572000000000000002f746d702f73797a2d696d61676567656e35373134333434333800"/192, 0xc0, 0x400}, {&(0x7f0000010100)="000000000000000000000000e58ca12e13a240e2b1a22f8d07e8e55f010040000c00000000000000ddf4655f00"/64, 0x40, 0x4e0}, {&(0x7f0000010200)="0100000000000500", 0x8, 0x560}, {0x0, 0x0, 0x1000000000c00}, {&(0x7f0000012000)="504d4d00504d4dff", 0x8, 0x10000}], 0x0, &(0x7f0000012b00)) 19:30:43 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000500100000f000000000000000000000004000000000002000020000020000000def4655fdef4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000008000000018000000c20500002b0200000000000000000000000000000000000073797a6b616c6c6572000000000000002f746d702f73797a2d696d61676567656e35373134333434333800"/192, 0xc0, 0x400}, {&(0x7f0000010100), 0x0, 0x4e0}, {&(0x7f0000010200)="010000000000050040", 0x9, 0x560}, {0x0, 0x0, 0x1000000000c00}, {&(0x7f0000012000)="504d4d00504d4dff", 0x8, 0x10000}], 0x0, &(0x7f0000012b00)) 19:30:43 executing program 4: r0 = syz_io_uring_setup(0x2, &(0x7f0000000500), &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000ff6000/0xa000)=nil, &(0x7f0000000080)=0x0, &(0x7f0000000140)=0x0) r3 = io_uring_setup(0x3ddf, &(0x7f0000000680)) syz_io_uring_submit(r1, r2, &(0x7f0000000800)=@IORING_OP_SENDMSG={0x9, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0}, 0x0) r4 = eventfd(0x0) io_uring_register$IORING_REGISTER_EVENTFD(r0, 0x4, &(0x7f0000000000)=r4, 0x1) read$eventfd(r4, &(0x7f0000000040), 0x8) r5 = syz_io_uring_setup(0x3702, &(0x7f00000001c0), &(0x7f0000000000/0x3000)=nil, &(0x7f0000ffe000/0x2000)=nil, &(0x7f0000000140), 0x0) r6 = dup2(r3, r5) r7 = dup2(r0, r6) io_uring_enter(r7, 0x1739, 0x0, 0x0, 0x0, 0x0) 19:30:43 executing program 2: r0 = syz_io_uring_setup(0x21, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, &(0x7f00000a0000)=nil, &(0x7f00000b0000)=nil, &(0x7f0000000180)=0x0, &(0x7f0000002a40)=0x0) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_io_uring_submit(r1, r2, &(0x7f0000000300)=@IORING_OP_OPENAT={0x12, 0x0, 0x0, 0xffffffffffffffff, 0x0, &(0x7f0000000100)='./cgroup/cgroup.procs/file0/../file0\x00'}, 0x0) io_uring_enter(r0, 0x76d3, 0x0, 0x0, 0x0, 0x0) r3 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$netlbl_cipso(&(0x7f0000000000), r3) r4 = syz_io_uring_setup(0x2, &(0x7f0000000500), &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000ff6000/0xa000)=nil, &(0x7f0000000080)=0x0, &(0x7f0000000140)=0x0) r7 = io_uring_setup(0x3ddf, &(0x7f0000000680)) syz_io_uring_submit(r5, r6, &(0x7f0000000800)=@IORING_OP_SENDMSG={0x9, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0}, 0x0) r8 = eventfd(0x0) read$eventfd(r8, &(0x7f0000000040), 0x8) r9 = syz_io_uring_setup(0x3702, &(0x7f00000001c0), &(0x7f0000000000/0x3000)=nil, &(0x7f0000ffe000/0x2000)=nil, &(0x7f0000000140), &(0x7f0000000240)) r10 = dup2(r7, r9) r11 = dup2(r4, r10) io_uring_enter(r11, 0x1739, 0x0, 0x0, 0x0, 0x0) [ 1178.125506] EXT4-fs (loop5): unsupported descriptor size 0 [ 1178.133069] EXT4-fs warning (device loop6): read_mmp_block:106: Error -117 while reading MMP block 0 [ 1178.144542] EXT4-fs warning (device loop3): read_mmp_block:106: Error -117 while reading MMP block 0 [ 1178.154558] EXT4-fs warning (device loop7): read_mmp_block:106: Error -117 while reading MMP block 0 19:30:43 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000500100000f000000000000000000000004000000000002000020000020000000def4655fdef4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000008000000018000000c20500002b0200000000000000000000000000000000000073797a6b616c6c6572000000000000002f746d702f73797a2d696d61676567656e35373134333434333800"/192, 0xc0, 0x400}, {&(0x7f0000010100), 0x0, 0x4e0}, {&(0x7f0000010200)="010000000000050040", 0x9, 0x560}, {0x0, 0x0, 0x1000000000c00}, {&(0x7f0000012000)="504d4d00504d4dff", 0x8, 0x10000}], 0x0, &(0x7f0000012b00)) 19:30:43 executing program 7: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000500100000f000000000000000000000004000000000002000020000020000000def4655fdef4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000008000000018000000c20500002b0200000000000000000000000000000000000073797a6b616c6c6572000000000000002f746d702f73797a2d696d61676567656e35373134333434333800"/192, 0xc0, 0x400}, {&(0x7f0000010100)="000000000000000000000000e58ca12e13a240e2b1a22f8d07e8e55f010040000c00000000000000ddf4655f00"/64, 0x40, 0x4e0}, {&(0x7f0000010200)="0100000000000500", 0x8, 0x560}, {0x0, 0x0, 0x1000000000c00}, {&(0x7f0000012000)="504d4d00504d4dff", 0x8, 0x10000}], 0x0, &(0x7f0000012b00)) 19:30:43 executing program 6: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000500100000f000000000000000000000004000000000002000020000020000000def4655fdef4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000008000000018000000c20500002b0200000000000000000000000000000000000073797a6b616c6c6572000000000000002f746d702f73797a2d696d61676567656e35373134333434333800"/192, 0xc0, 0x400}, {&(0x7f0000010100)="000000000000000000000000e58ca12e13a240e2b1a22f8d07e8e55f010040000c00000000000000ddf4655f00"/64, 0x40, 0x4e0}, {&(0x7f0000010200)="0100000000000500", 0x8, 0x560}, {0x0, 0x0, 0x1000000000c00}, {&(0x7f0000012000)="504d4d00504d4dff", 0x8, 0x10000}], 0x0, &(0x7f0000012b00)) 19:30:43 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000500100000f000000000000000000000004000000000002000020000020000000def4655fdef4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000008000000018000000c20500002b0200000000000000000000000000000000000073797a6b616c6c6572000000000000002f746d702f73797a2d696d61676567656e35373134333434333800"/192, 0xc0, 0x400}, {&(0x7f0000010100)="000000000000000000000000e58ca12e13a240e2b1a22f8d07e8e55f010040000c00000000000000ddf4655f00"/64, 0x40, 0x4e0}, {&(0x7f0000010200)="0100000000000500", 0x8, 0x560}, {0x0, 0x0, 0x1000000000c00}, {&(0x7f0000012000)="504d4d00504d4dff", 0x8, 0x10000}], 0x0, &(0x7f0000012b00)) 19:30:43 executing program 1: r0 = syz_io_uring_setup(0x2, &(0x7f0000000500), &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000ff6000/0xa000)=nil, &(0x7f0000000080)=0x0, &(0x7f0000000140)=0x0) r3 = io_uring_setup(0x3ddf, &(0x7f0000000680)) syz_io_uring_submit(r1, r2, &(0x7f0000000800)=@IORING_OP_SENDMSG={0x9, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0}, 0x0) r4 = eventfd(0x0) io_uring_register$IORING_REGISTER_EVENTFD(r0, 0x4, &(0x7f0000000000)=r4, 0x1) read$eventfd(r4, &(0x7f0000000040), 0x8) r5 = syz_io_uring_setup(0x3702, &(0x7f00000001c0), &(0x7f0000000000/0x3000)=nil, &(0x7f0000ffe000/0x2000)=nil, &(0x7f0000000140), &(0x7f0000000240)) r6 = dup2(r3, r5) r7 = dup2(r0, r6) io_uring_enter(r7, 0x1739, 0x0, 0x0, 0x0, 0x0) [ 1178.254286] EXT4-fs (loop5): unsupported descriptor size 0 19:30:43 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000500100000f000000000000000000000004000000000002000020000020000000def4655fdef4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000008000000018000000c20500002b0200000000000000000000000000000000000073797a6b616c6c6572000000000000002f746d702f73797a2d696d61676567656e35373134333434333800"/192, 0xc0, 0x400}, {&(0x7f0000010100), 0x0, 0x4e0}, {&(0x7f0000010200)="010000000000050040", 0x9, 0x560}, {0x0, 0x0, 0x1000000000c00}, {&(0x7f0000012000)="504d4d00504d4dff", 0x8, 0x10000}], 0x0, &(0x7f0000012b00)) [ 1178.279035] EXT4-fs warning (device loop6): read_mmp_block:106: Error -117 while reading MMP block 0 [ 1178.304818] EXT4-fs warning (device loop3): read_mmp_block:106: Error -117 while reading MMP block 0 [ 1178.311640] EXT4-fs warning (device loop7): read_mmp_block:106: Error -117 while reading MMP block 0 19:30:43 executing program 6: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000500100000f000000000000000000000004000000000002000020000020000000def4655fdef4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000008000000018000000c20500002b0200000000000000000000000000000000000073797a6b616c6c6572000000000000002f746d702f73797a2d696d61676567656e35373134333434333800"/192, 0xc0, 0x400}, {&(0x7f0000010100)="000000000000000000000000e58ca12e13a240e2b1a22f8d07e8e55f010040000c00000000000000ddf4655f00"/64, 0x40, 0x4e0}, {&(0x7f0000010200)="0100000000000500", 0x8, 0x560}, {0x0, 0x0, 0x1000000000c00}, {&(0x7f0000012000)="504d4d00504d4dff", 0x8, 0x10000}], 0x0, &(0x7f0000012b00)) 19:30:43 executing program 7: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000500100000f000000000000000000000004000000000002000020000020000000def4655fdef4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000008000000018000000c20500002b0200000000000000000000000000000000000073797a6b616c6c6572000000000000002f746d702f73797a2d696d61676567656e35373134333434333800"/192, 0xc0, 0x400}, {&(0x7f0000010100)="000000000000000000000000e58ca12e13a240e2b1a22f8d07e8e55f010040000c00000000000000ddf4655f00"/64, 0x40, 0x4e0}, {&(0x7f0000010200)="0100000000000500", 0x8, 0x560}, {0x0, 0x0, 0x1000000000c00}, {&(0x7f0000012000)="504d4d00504d4dff", 0x8, 0x10000}], 0x0, &(0x7f0000012b00)) [ 1178.342995] EXT4-fs (loop5): unsupported descriptor size 0 19:30:43 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000500100000f000000000000000000000004000000000002000020000020000000def4655fdef4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000008000000018000000c20500002b0200000000000000000000000000000000000073797a6b616c6c6572000000000000002f746d702f73797a2d696d61676567656e35373134333434333800"/192, 0xc0, 0x400}, {&(0x7f0000010100)="000000000000000000000000e58ca12e", 0x10, 0x4e0}, {&(0x7f0000010200)="010000000000050040", 0x9, 0x560}, {0x0, 0x0, 0x1000000000c00}, {&(0x7f0000012000)="504d4d00504d4dff", 0x8, 0x10000}], 0x0, &(0x7f0000012b00)) [ 1178.378483] EXT4-fs warning (device loop7): read_mmp_block:106: Error -117 while reading MMP block 0 [ 1178.386648] EXT4-fs (loop5): unsupported descriptor size 0 [ 1178.435858] EXT4-fs warning (device loop6): read_mmp_block:106: Error -117 while reading MMP block 0 19:30:56 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000500100000f000000000000000000000004000000000002000020000020000000def4655fdef4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000008000000018000000c20500002b0200000000000000000000000000000000000073797a6b616c6c6572000000000000002f746d702f73797a2d696d61676567656e35373134333434333800"/192, 0xc0, 0x400}, {&(0x7f0000010100)="000000000000000000000000e58ca12e13a240e2b1a22f8d07e8e55f010040000c00000000000000ddf4655f00"/64, 0x40, 0x4e0}, {&(0x7f0000010200)="01000000000005004000", 0xa, 0x560}, {0x0, 0x0, 0x1000000000c00}, {&(0x7f0000012000)="504d4d00504d4dff", 0x8, 0x10000}], 0x0, &(0x7f0000012b00)) 19:30:56 executing program 0: r0 = syz_io_uring_setup(0x2, &(0x7f0000000500), &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000ff6000/0xa000)=nil, &(0x7f0000000080)=0x0, &(0x7f0000000140)=0x0) r3 = io_uring_setup(0x3ddf, &(0x7f0000000680)) syz_io_uring_submit(r1, r2, &(0x7f0000000800)=@IORING_OP_SENDMSG={0x9, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0}, 0x0) r4 = eventfd(0x0) io_uring_register$IORING_REGISTER_EVENTFD(r0, 0x4, &(0x7f0000000000)=r4, 0x1) read$eventfd(r4, &(0x7f0000000040), 0x8) syz_io_uring_setup(0x3702, &(0x7f00000001c0), &(0x7f0000000000/0x3000)=nil, &(0x7f0000ffe000/0x2000)=nil, &(0x7f0000000140), &(0x7f0000000240)) r5 = dup2(r3, 0xffffffffffffffff) r6 = dup2(r0, r5) io_uring_enter(r6, 0x1739, 0x0, 0x0, 0x0, 0x0) 19:30:56 executing program 4: r0 = syz_io_uring_setup(0x2, &(0x7f0000000500), &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000ff6000/0xa000)=nil, &(0x7f0000000080)=0x0, &(0x7f0000000140)=0x0) r3 = io_uring_setup(0x3ddf, &(0x7f0000000680)) syz_io_uring_submit(r1, r2, &(0x7f0000000800)=@IORING_OP_SENDMSG={0x9, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0}, 0x0) r4 = eventfd(0x0) io_uring_register$IORING_REGISTER_EVENTFD(r0, 0x4, &(0x7f0000000000)=r4, 0x1) read$eventfd(r4, &(0x7f0000000040), 0x8) r5 = syz_io_uring_setup(0x3702, &(0x7f00000001c0), &(0x7f0000000000/0x3000)=nil, &(0x7f0000ffe000/0x2000)=nil, &(0x7f0000000140), 0x0) r6 = dup2(r3, r5) r7 = dup2(r0, r6) io_uring_enter(r7, 0x1739, 0x0, 0x0, 0x0, 0x0) 19:30:56 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000500100000f000000000000000000000004000000000002000020000020000000def4655fdef4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000008000000018000000c20500002b0200000000000000000000000000000000000073797a6b616c6c6572000000000000002f746d702f73797a2d696d61676567656e35373134333434333800"/192, 0xc0, 0x400}, {&(0x7f0000010100)="000000000000000000000000e58ca12e", 0x10, 0x4e0}, {&(0x7f0000010200)="010000000000050040", 0x9, 0x560}, {0x0, 0x0, 0x1000000000c00}, {&(0x7f0000012000)="504d4d00504d4dff", 0x8, 0x10000}], 0x0, &(0x7f0000012b00)) 19:30:56 executing program 1: r0 = syz_io_uring_setup(0x0, &(0x7f0000000500), &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000ff6000/0xa000)=nil, &(0x7f0000000080)=0x0, &(0x7f0000000140)=0x0) r3 = io_uring_setup(0x3ddf, &(0x7f0000000680)) syz_io_uring_submit(r1, r2, &(0x7f0000000800)=@IORING_OP_SENDMSG={0x9, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0}, 0x0) r4 = eventfd(0x0) io_uring_register$IORING_REGISTER_EVENTFD(r0, 0x4, &(0x7f0000000000)=r4, 0x1) read$eventfd(r4, &(0x7f0000000040), 0x8) r5 = syz_io_uring_setup(0x3702, &(0x7f00000001c0), &(0x7f0000000000/0x3000)=nil, &(0x7f0000ffe000/0x2000)=nil, &(0x7f0000000140), &(0x7f0000000240)) r6 = dup2(r3, r5) r7 = dup2(r0, r6) io_uring_enter(r7, 0x1739, 0x0, 0x0, 0x0, 0x0) 19:30:56 executing program 7: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000500100000f000000000000000000000004000000000002000020000020000000def4655fdef4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000008000000018000000c20500002b0200000000000000000000000000000000000073797a6b616c6c6572000000000000002f746d702f73797a2d696d61676567656e35373134333434333800"/192, 0xc0, 0x400}, {&(0x7f0000010100)="000000000000000000000000e58ca12e13a240e2b1a22f8d07e8e55f010040000c00000000000000ddf4655f00"/64, 0x40, 0x4e0}, {&(0x7f0000010200)="010000000000050040", 0x9, 0x560}, {0x0, 0x0, 0x1000000000c00}, {&(0x7f0000012000)="504d4d00504d4dff", 0x8, 0x10000}], 0x0, &(0x7f0000012b00)) 19:30:56 executing program 6: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000500100000f000000000000000000000004000000000002000020000020000000def4655fdef4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000008000000018000000c20500002b0200000000000000000000000000000000000073797a6b616c6c6572000000000000002f746d702f73797a2d696d61676567656e35373134333434333800"/192, 0xc0, 0x400}, {&(0x7f0000010100)="000000000000000000000000e58ca12e13a240e2b1a22f8d07e8e55f010040000c00000000000000ddf4655f00"/64, 0x40, 0x4e0}, {&(0x7f0000010200)="010000000000050040", 0x9, 0x560}, {0x0, 0x0, 0x1000000000c00}, {&(0x7f0000012000)="504d4d00504d4dff", 0x8, 0x10000}], 0x0, &(0x7f0000012b00)) 19:30:56 executing program 2: r0 = syz_io_uring_setup(0x21, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, &(0x7f00000a0000)=nil, &(0x7f00000b0000)=nil, &(0x7f0000000180)=0x0, &(0x7f0000002a40)=0x0) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_io_uring_submit(r1, r2, &(0x7f0000000300)=@IORING_OP_OPENAT={0x12, 0x0, 0x0, 0xffffffffffffffff, 0x0, &(0x7f0000000100)='./cgroup/cgroup.procs/file0/../file0\x00'}, 0x0) io_uring_enter(r0, 0x76d3, 0x0, 0x0, 0x0, 0x0) r3 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$netlbl_cipso(&(0x7f0000000000), r3) r4 = syz_io_uring_setup(0x2, &(0x7f0000000500), &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000ff6000/0xa000)=nil, &(0x7f0000000080)=0x0, &(0x7f0000000140)=0x0) r7 = io_uring_setup(0x3ddf, &(0x7f0000000680)) syz_io_uring_submit(r5, r6, &(0x7f0000000800)=@IORING_OP_SENDMSG={0x9, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0}, 0x0) r8 = eventfd(0x0) read$eventfd(r8, &(0x7f0000000040), 0x8) r9 = syz_io_uring_setup(0x3702, &(0x7f00000001c0), &(0x7f0000000000/0x3000)=nil, &(0x7f0000ffe000/0x2000)=nil, &(0x7f0000000140), &(0x7f0000000240)) r10 = dup2(r7, r9) r11 = dup2(r4, r10) io_uring_enter(r11, 0x1739, 0x0, 0x0, 0x0, 0x0) [ 1190.824266] EXT4-fs (loop5): unsupported descriptor size 0 [ 1190.831560] EXT4-fs error (device loop7): ext4_fill_super:4947: inode #2: comm syz-executor.7: iget: root inode unallocated [ 1190.833023] EXT4-fs (loop7): get root inode failed [ 1190.833542] EXT4-fs (loop7): mount failed 19:30:56 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000500100000f000000000000000000000004000000000002000020000020000000def4655fdef4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000008000000018000000c20500002b0200000000000000000000000000000000000073797a6b616c6c6572000000000000002f746d702f73797a2d696d61676567656e35373134333434333800"/192, 0xc0, 0x400}, {&(0x7f0000010100)="000000000000000000000000e58ca12e", 0x10, 0x4e0}, {&(0x7f0000010200)="010000000000050040", 0x9, 0x560}, {0x0, 0x0, 0x1000000000c00}, {&(0x7f0000012000)="504d4d00504d4dff", 0x8, 0x10000}], 0x0, &(0x7f0000012b00)) [ 1190.877275] EXT4-fs error (device loop3): ext4_fill_super:4947: inode #2: comm syz-executor.3: iget: root inode unallocated 19:30:56 executing program 7: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000500100000f000000000000000000000004000000000002000020000020000000def4655fdef4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000008000000018000000c20500002b0200000000000000000000000000000000000073797a6b616c6c6572000000000000002f746d702f73797a2d696d61676567656e35373134333434333800"/192, 0xc0, 0x400}, {&(0x7f0000010100)="000000000000000000000000e58ca12e13a240e2b1a22f8d07e8e55f010040000c00000000000000ddf4655f00"/64, 0x40, 0x4e0}, {&(0x7f0000010200)="0100000000000500", 0x8, 0x560}, {0x0, 0x0, 0x1000000000c00}, {&(0x7f0000012000)="504d4d00504d4dff", 0x8, 0x10000}], 0x0, &(0x7f0000012b00)) [ 1190.880661] EXT4-fs (loop3): get root inode failed [ 1190.882012] EXT4-fs (loop3): mount failed [ 1190.898007] EXT4-fs error (device loop6): ext4_fill_super:4947: inode #2: comm syz-executor.6: iget: root inode unallocated [ 1190.901813] EXT4-fs (loop6): get root inode failed [ 1190.902975] EXT4-fs (loop6): mount failed [ 1190.923935] EXT4-fs (loop5): unsupported descriptor size 0 19:30:56 executing program 7: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000500100000f000000000000000000000004000000000002000020000020000000def4655fdef4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000008000000018000000c20500002b0200000000000000000000000000000000000073797a6b616c6c6572000000000000002f746d702f73797a2d696d61676567656e35373134333434333800"/192, 0xc0, 0x400}, {&(0x7f0000010100)="000000000000000000000000e58ca12e13a240e2b1a22f8d07e8e55f010040000c00000000000000ddf4655f00"/64, 0x40, 0x4e0}, {&(0x7f0000010200)="0100000000000500", 0x8, 0x560}, {0x0, 0x0, 0x1000000000c00}, {&(0x7f0000012000)="504d4d00504d4dff", 0x8, 0x10000}], 0x0, &(0x7f0000012b00)) 19:30:56 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000500100000f000000000000000000000004000000000002000020000020000000def4655fdef4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000008000000018000000c20500002b0200000000000000000000000000000000000073797a6b616c6c6572000000000000002f746d702f73797a2d696d61676567656e35373134333434333800"/192, 0xc0, 0x400}, {&(0x7f0000010100)="000000000000000000000000e58ca12e13a240e2b1a22f8d07e8e55f010040000c00000000000000ddf4655f00"/64, 0x40, 0x4e0}, {&(0x7f0000010200)="0100000000000500", 0x8, 0x560}, {0x0, 0x0, 0x1000000000c00}, {&(0x7f0000012000)="504d4d00504d4dff", 0x8, 0x10000}], 0x0, &(0x7f0000012b00)) 19:30:56 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000500100000f000000000000000000000004000000000002000020000020000000def4655fdef4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000008000000018000000c20500002b0200000000000000000000000000000000000073797a6b616c6c6572000000000000002f746d702f73797a2d696d61676567656e35373134333434333800"/192, 0xc0, 0x400}, {&(0x7f0000010100)="000000000000000000000000e58ca12e13a240e2b1a22f8d", 0x18, 0x4e0}, {&(0x7f0000010200)="010000000000050040", 0x9, 0x560}, {0x0, 0x0, 0x1000000000c00}, {&(0x7f0000012000)="504d4d00504d4dff", 0x8, 0x10000}], 0x0, &(0x7f0000012b00)) 19:30:56 executing program 6: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000500100000f000000000000000000000004000000000002000020000020000000def4655fdef4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000008000000018000000c20500002b0200000000000000000000000000000000000073797a6b616c6c6572000000000000002f746d702f73797a2d696d61676567656e35373134333434333800"/192, 0xc0, 0x400}, {&(0x7f0000010100)="000000000000000000000000e58ca12e13a240e2b1a22f8d07e8e55f010040000c00000000000000ddf4655f00"/64, 0x40, 0x4e0}, {&(0x7f0000010200)="0100000000000500", 0x8, 0x560}, {0x0, 0x0, 0x1000000000c00}, {&(0x7f0000012000)="504d4d00504d4dff", 0x8, 0x10000}], 0x0, &(0x7f0000012b00)) [ 1191.022075] EXT4-fs warning (device loop7): read_mmp_block:106: Error -117 while reading MMP block 0 [ 1191.032314] EXT4-fs (loop5): unsupported descriptor size 0 [ 1191.038995] EXT4-fs warning (device loop6): read_mmp_block:106: Error -117 while reading MMP block 0 [ 1191.039797] EXT4-fs warning (device loop3): read_mmp_block:106: Error -117 while reading MMP block 0 19:30:56 executing program 7: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000500100000f000000000000000000000004000000000002000020000020000000def4655fdef4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000008000000018000000c20500002b0200000000000000000000000000000000000073797a6b616c6c6572000000000000002f746d702f73797a2d696d61676567656e35373134333434333800"/192, 0xc0, 0x400}, {&(0x7f0000010100)="000000000000000000000000e58ca12e13a240e2b1a22f8d07e8e55f010040000c00000000000000ddf4655f00"/64, 0x40, 0x4e0}, {&(0x7f0000010200)="0100000000000500", 0x8, 0x560}, {0x0, 0x0, 0x1000000000c00}, {&(0x7f0000012000)="504d4d00504d4dff", 0x8, 0x10000}], 0x0, &(0x7f0000012b00)) [ 1191.136584] EXT4-fs warning (device loop7): read_mmp_block:106: Error -117 while reading MMP block 0 19:31:08 executing program 0: r0 = syz_io_uring_setup(0x2, &(0x7f0000000500), &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000ff6000/0xa000)=nil, &(0x7f0000000080)=0x0, &(0x7f0000000140)=0x0) r3 = io_uring_setup(0x3ddf, &(0x7f0000000680)) syz_io_uring_submit(r1, r2, &(0x7f0000000800)=@IORING_OP_SENDMSG={0x9, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0}, 0x0) r4 = eventfd(0x0) io_uring_register$IORING_REGISTER_EVENTFD(r0, 0x4, &(0x7f0000000000)=r4, 0x1) read$eventfd(r4, &(0x7f0000000040), 0x8) syz_io_uring_setup(0x3702, &(0x7f00000001c0), &(0x7f0000000000/0x3000)=nil, &(0x7f0000ffe000/0x2000)=nil, &(0x7f0000000140), &(0x7f0000000240)) r5 = dup2(r3, 0xffffffffffffffff) r6 = dup2(r0, r5) io_uring_enter(r6, 0x1739, 0x0, 0x0, 0x0, 0x0) 19:31:08 executing program 6: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000500100000f000000000000000000000004000000000002000020000020000000def4655fdef4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000008000000018000000c20500002b0200000000000000000000000000000000000073797a6b616c6c6572000000000000002f746d702f73797a2d696d61676567656e35373134333434333800"/192, 0xc0, 0x400}, {&(0x7f0000010100)="000000000000000000000000e58ca12e13a240e2b1a22f8d07e8e55f010040000c00000000000000ddf4655f00"/64, 0x40, 0x4e0}, {&(0x7f0000010200)="0100000000000500", 0x8, 0x560}, {0x0, 0x0, 0x1000000000c00}, {&(0x7f0000012000)="504d4d00504d4dff", 0x8, 0x10000}], 0x0, &(0x7f0000012b00)) 19:31:08 executing program 2: r0 = syz_io_uring_setup(0x21, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, &(0x7f00000a0000)=nil, &(0x7f00000b0000)=nil, &(0x7f0000000180)=0x0, &(0x7f0000002a40)=0x0) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_io_uring_submit(r1, r2, &(0x7f0000000300)=@IORING_OP_OPENAT={0x12, 0x0, 0x0, 0xffffffffffffffff, 0x0, &(0x7f0000000100)='./cgroup/cgroup.procs/file0/../file0\x00'}, 0x0) io_uring_enter(r0, 0x76d3, 0x0, 0x0, 0x0, 0x0) r3 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$netlbl_cipso(&(0x7f0000000000), r3) r4 = syz_io_uring_setup(0x2, &(0x7f0000000500), &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000ff6000/0xa000)=nil, &(0x7f0000000080)=0x0, &(0x7f0000000140)=0x0) r7 = io_uring_setup(0x3ddf, &(0x7f0000000680)) syz_io_uring_submit(r5, r6, &(0x7f0000000800)=@IORING_OP_SENDMSG={0x9, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0}, 0x0) io_uring_register$IORING_REGISTER_EVENTFD(r4, 0x4, &(0x7f0000000000), 0x1) read$eventfd(0xffffffffffffffff, &(0x7f0000000040), 0x8) r8 = syz_io_uring_setup(0x3702, &(0x7f00000001c0), &(0x7f0000000000/0x3000)=nil, &(0x7f0000ffe000/0x2000)=nil, &(0x7f0000000140), &(0x7f0000000240)) r9 = dup2(r7, r8) r10 = dup2(r4, r9) io_uring_enter(r10, 0x1739, 0x0, 0x0, 0x0, 0x0) 19:31:08 executing program 4: r0 = syz_io_uring_setup(0x2, &(0x7f0000000500), &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000ff6000/0xa000)=nil, &(0x7f0000000080)=0x0, &(0x7f0000000140)=0x0) io_uring_setup(0x3ddf, &(0x7f0000000680)) syz_io_uring_submit(r1, r2, &(0x7f0000000800)=@IORING_OP_SENDMSG={0x9, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0}, 0x0) r3 = eventfd(0x0) io_uring_register$IORING_REGISTER_EVENTFD(r0, 0x4, &(0x7f0000000000)=r3, 0x1) read$eventfd(r3, &(0x7f0000000040), 0x8) r4 = syz_io_uring_setup(0x3702, &(0x7f00000001c0), &(0x7f0000000000/0x3000)=nil, &(0x7f0000ffe000/0x2000)=nil, &(0x7f0000000140), &(0x7f0000000240)) r5 = dup2(0xffffffffffffffff, r4) r6 = dup2(r0, r5) io_uring_enter(r6, 0x1739, 0x0, 0x0, 0x0, 0x0) 19:31:08 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000500100000f000000000000000000000004000000000002000020000020000000def4655fdef4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000008000000018000000c20500002b0200000000000000000000000000000000000073797a6b616c6c6572000000000000002f746d702f73797a2d696d61676567656e35373134333434333800"/192, 0xc0, 0x400}, {&(0x7f0000010100)="000000000000000000000000e58ca12e13a240e2b1a22f8d", 0x18, 0x4e0}, {&(0x7f0000010200)="010000000000050040", 0x9, 0x560}, {0x0, 0x0, 0x1000000000c00}, {&(0x7f0000012000)="504d4d00504d4dff", 0x8, 0x10000}], 0x0, &(0x7f0000012b00)) 19:31:08 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000500100000f000000000000000000000004000000000002000020000020000000def4655fdef4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000008000000018000000c20500002b0200000000000000000000000000000000000073797a6b616c6c6572000000000000002f746d702f73797a2d696d61676567656e35373134333434333800"/192, 0xc0, 0x400}, {&(0x7f0000010100)="000000000000000000000000e58ca12e13a240e2b1a22f8d07e8e55f010040000c00000000000000ddf4655f00"/64, 0x40, 0x4e0}, {&(0x7f0000010200)="0100000000000500", 0x8, 0x560}, {0x0, 0x0, 0x1000000000c00}, {&(0x7f0000012000)="504d4d00504d4dff", 0x8, 0x10000}], 0x0, &(0x7f0000012b00)) 19:31:08 executing program 7: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000500100000f000000000000000000000004000000000002000020000020000000def4655fdef4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000008000000018000000c20500002b0200000000000000000000000000000000000073797a6b616c6c6572000000000000002f746d702f73797a2d696d61676567656e35373134333434333800"/192, 0xc0, 0x400}, {&(0x7f0000010100)="000000000000000000000000e58ca12e13a240e2b1a22f8d07e8e55f010040000c00000000000000ddf4655f00"/64, 0x40, 0x4e0}, {&(0x7f0000010200)="010000000000050040", 0x9}, {0x0, 0x0, 0x1000000000c00}, {&(0x7f0000012000)="504d4d00504d4dff", 0x8, 0x10000}], 0x0, &(0x7f0000012b00)) 19:31:08 executing program 1: r0 = syz_io_uring_setup(0x0, &(0x7f0000000500), &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000ff6000/0xa000)=nil, &(0x7f0000000080)=0x0, &(0x7f0000000140)=0x0) r3 = io_uring_setup(0x3ddf, &(0x7f0000000680)) syz_io_uring_submit(r1, r2, &(0x7f0000000800)=@IORING_OP_SENDMSG={0x9, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0}, 0x0) r4 = eventfd(0x0) io_uring_register$IORING_REGISTER_EVENTFD(r0, 0x4, &(0x7f0000000000)=r4, 0x1) read$eventfd(r4, &(0x7f0000000040), 0x8) r5 = syz_io_uring_setup(0x3702, &(0x7f00000001c0), &(0x7f0000000000/0x3000)=nil, &(0x7f0000ffe000/0x2000)=nil, &(0x7f0000000140), &(0x7f0000000240)) r6 = dup2(r3, r5) r7 = dup2(r0, r6) io_uring_enter(r7, 0x1739, 0x0, 0x0, 0x0, 0x0) [ 1203.311517] EXT4-fs (loop5): unsupported descriptor size 0 [ 1203.320323] EXT4-fs warning (device loop6): read_mmp_block:106: Error -117 while reading MMP block 0 [ 1203.327758] EXT4-fs warning (device loop3): read_mmp_block:106: Error -117 while reading MMP block 0 [ 1203.342361] EXT4-fs warning (device loop7): read_mmp_block:106: Error -117 while reading MMP block 0 19:31:08 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000500100000f000000000000000000000004000000000002000020000020000000def4655fdef4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000008000000018000000c20500002b0200000000000000000000000000000000000073797a6b616c6c6572000000000000002f746d702f73797a2d696d61676567656e35373134333434333800"/192, 0xc0, 0x400}, {&(0x7f0000010100)="000000000000000000000000e58ca12e13a240e2b1a22f8d", 0x18, 0x4e0}, {&(0x7f0000010200)="010000000000050040", 0x9, 0x560}, {0x0, 0x0, 0x1000000000c00}, {&(0x7f0000012000)="504d4d00504d4dff", 0x8, 0x10000}], 0x0, &(0x7f0000012b00)) 19:31:08 executing program 7: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000500100000f000000000000000000000004000000000002000020000020000000def4655fdef4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000008000000018000000c20500002b0200000000000000000000000000000000000073797a6b616c6c6572000000000000002f746d702f73797a2d696d61676567656e35373134333434333800"/192, 0xc0, 0x400}, {&(0x7f0000010100)="000000000000000000000000e58ca12e13a240e2b1a22f8d07e8e55f010040000c00000000000000ddf4655f00"/64, 0x40, 0x4e0}, {&(0x7f0000010200)="010000000000050040", 0x9}, {0x0, 0x0, 0x1000000000c00}, {&(0x7f0000012000)="504d4d00504d4dff", 0x8, 0x10000}], 0x0, &(0x7f0000012b00)) 19:31:08 executing program 6: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000500100000f000000000000000000000004000000000002000020000020000000def4655fdef4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000008000000018000000c20500002b0200000000000000000000000000000000000073797a6b616c6c6572000000000000002f746d702f73797a2d696d61676567656e35373134333434333800"/192, 0xc0, 0x400}, {&(0x7f0000010100)="000000000000000000000000e58ca12e13a240e2b1a22f8d07e8e55f010040000c00000000000000ddf4655f00"/64, 0x40, 0x4e0}, {&(0x7f0000010200)="0100000000000500", 0x8, 0x560}, {0x0, 0x0, 0x1000000000c00}, {&(0x7f0000012000)="504d4d00504d4dff", 0x8, 0x10000}], 0x0, &(0x7f0000012b00)) [ 1203.412877] EXT4-fs (loop5): unsupported descriptor size 0 19:31:08 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000500100000f000000000000000000000004000000000002000020000020000000def4655fdef4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000008000000018000000c20500002b0200000000000000000000000000000000000073797a6b616c6c6572000000000000002f746d702f73797a2d696d61676567656e35373134333434333800"/192, 0xc0, 0x400}, {&(0x7f0000010100)="000000000000000000000000e58ca12e13a240e2b1a22f8d07e8e55f010040000c00000000000000ddf4655f00"/64, 0x40, 0x4e0}, {&(0x7f0000010200)="0100000000000500", 0x8, 0x560}, {0x0, 0x0, 0x1000000000c00}, {&(0x7f0000012000)="504d4d00504d4dff", 0x8, 0x10000}], 0x0, &(0x7f0000012b00)) 19:31:08 executing program 2: r0 = syz_io_uring_setup(0x21, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, &(0x7f00000a0000)=nil, &(0x7f00000b0000)=nil, &(0x7f0000000180)=0x0, &(0x7f0000002a40)=0x0) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_io_uring_submit(r1, r2, &(0x7f0000000300)=@IORING_OP_OPENAT={0x12, 0x0, 0x0, 0xffffffffffffffff, 0x0, &(0x7f0000000100)='./cgroup/cgroup.procs/file0/../file0\x00'}, 0x0) io_uring_enter(r0, 0x76d3, 0x0, 0x0, 0x0, 0x0) r3 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$netlbl_cipso(&(0x7f0000000000), r3) r4 = syz_io_uring_setup(0x2, &(0x7f0000000500), &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000ff6000/0xa000)=nil, &(0x7f0000000080)=0x0, &(0x7f0000000140)=0x0) r7 = io_uring_setup(0x3ddf, &(0x7f0000000680)) syz_io_uring_submit(r5, r6, &(0x7f0000000800)=@IORING_OP_SENDMSG={0x9, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0}, 0x0) io_uring_register$IORING_REGISTER_EVENTFD(r4, 0x4, &(0x7f0000000000), 0x1) read$eventfd(0xffffffffffffffff, &(0x7f0000000040), 0x8) r8 = syz_io_uring_setup(0x3702, &(0x7f00000001c0), &(0x7f0000000000/0x3000)=nil, &(0x7f0000ffe000/0x2000)=nil, &(0x7f0000000140), &(0x7f0000000240)) r9 = dup2(r7, r8) r10 = dup2(r4, r9) io_uring_enter(r10, 0x1739, 0x0, 0x0, 0x0, 0x0) [ 1203.473387] EXT4-fs warning (device loop7): read_mmp_block:106: Error -117 while reading MMP block 0 [ 1203.494204] EXT4-fs warning (device loop6): read_mmp_block:106: Error -117 while reading MMP block 0 19:31:08 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000500100000f000000000000000000000004000000000002000020000020000000def4655fdef4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000008000000018000000c20500002b0200000000000000000000000000000000000073797a6b616c6c6572000000000000002f746d702f73797a2d696d61676567656e35373134333434333800"/192, 0xc0, 0x400}, {&(0x7f0000010100)="000000000000000000000000e58ca12e13a240e2b1a22f8d07e8e55f", 0x1c, 0x4e0}, {&(0x7f0000010200)="010000000000050040", 0x9, 0x560}, {0x0, 0x0, 0x1000000000c00}, {&(0x7f0000012000)="504d4d00504d4dff", 0x8, 0x10000}], 0x0, &(0x7f0000012b00)) [ 1203.532924] EXT4-fs warning (device loop3): read_mmp_block:106: Error -117 while reading MMP block 0 19:31:08 executing program 2: r0 = syz_io_uring_setup(0x21, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, &(0x7f00000a0000)=nil, &(0x7f00000b0000)=nil, &(0x7f0000000180)=0x0, &(0x7f0000002a40)=0x0) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_io_uring_submit(r1, r2, &(0x7f0000000300)=@IORING_OP_OPENAT={0x12, 0x0, 0x0, 0xffffffffffffffff, 0x0, &(0x7f0000000100)='./cgroup/cgroup.procs/file0/../file0\x00'}, 0x0) io_uring_enter(r0, 0x76d3, 0x0, 0x0, 0x0, 0x0) r3 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$netlbl_cipso(&(0x7f0000000000), r3) r4 = syz_io_uring_setup(0x2, &(0x7f0000000500), &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000ff6000/0xa000)=nil, &(0x7f0000000080)=0x0, &(0x7f0000000140)=0x0) r7 = io_uring_setup(0x3ddf, &(0x7f0000000680)) syz_io_uring_submit(r5, r6, &(0x7f0000000800)=@IORING_OP_SENDMSG={0x9, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0}, 0x0) io_uring_register$IORING_REGISTER_EVENTFD(r4, 0x4, &(0x7f0000000000), 0x1) read$eventfd(0xffffffffffffffff, &(0x7f0000000040), 0x8) r8 = syz_io_uring_setup(0x3702, &(0x7f00000001c0), &(0x7f0000000000/0x3000)=nil, &(0x7f0000ffe000/0x2000)=nil, &(0x7f0000000140), &(0x7f0000000240)) r9 = dup2(r7, r8) r10 = dup2(r4, r9) io_uring_enter(r10, 0x1739, 0x0, 0x0, 0x0, 0x0) 19:31:08 executing program 7: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000500100000f000000000000000000000004000000000002000020000020000000def4655fdef4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000008000000018000000c20500002b0200000000000000000000000000000000000073797a6b616c6c6572000000000000002f746d702f73797a2d696d61676567656e35373134333434333800"/192, 0xc0, 0x400}, {&(0x7f0000010100)="000000000000000000000000e58ca12e13a240e2b1a22f8d07e8e55f010040000c00000000000000ddf4655f00"/64, 0x40, 0x4e0}, {&(0x7f0000010200)="010000000000050040", 0x9}, {0x0, 0x0, 0x1000000000c00}, {&(0x7f0000012000)="504d4d00504d4dff", 0x8, 0x10000}], 0x0, &(0x7f0000012b00)) [ 1203.600662] EXT4-fs (loop5): unsupported descriptor size 0 [ 1203.628396] EXT4-fs warning (device loop7): read_mmp_block:106: Error -117 while reading MMP block 0 19:31:21 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000500100000f000000000000000000000004000000000002000020000020000000def4655fdef4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000008000000018000000c20500002b0200000000000000000000000000000000000073797a6b616c6c6572000000000000002f746d702f73797a2d696d61676567656e35373134333434333800"/192, 0xc0, 0x400}, {&(0x7f0000010100)="000000000000000000000000e58ca12e13a240e2b1a22f8d07e8e55f010040000c00000000000000ddf4655f00"/64, 0x40, 0x4e0}, {&(0x7f0000010200)="010000000000050040", 0x9, 0x560}, {0x0, 0x0, 0x1000000000c00}, {&(0x7f0000012000)="504d4d00504d4dff", 0x8, 0x10000}], 0x0, &(0x7f0000012b00)) 19:31:21 executing program 4: r0 = syz_io_uring_setup(0x2, &(0x7f0000000500), &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000ff6000/0xa000)=nil, &(0x7f0000000080)=0x0, &(0x7f0000000140)=0x0) io_uring_setup(0x3ddf, &(0x7f0000000680)) syz_io_uring_submit(r1, r2, &(0x7f0000000800)=@IORING_OP_SENDMSG={0x9, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0}, 0x0) r3 = eventfd(0x0) io_uring_register$IORING_REGISTER_EVENTFD(r0, 0x4, &(0x7f0000000000)=r3, 0x1) read$eventfd(r3, &(0x7f0000000040), 0x8) r4 = syz_io_uring_setup(0x3702, &(0x7f00000001c0), &(0x7f0000000000/0x3000)=nil, &(0x7f0000ffe000/0x2000)=nil, &(0x7f0000000140), &(0x7f0000000240)) r5 = dup2(0xffffffffffffffff, r4) r6 = dup2(r0, r5) io_uring_enter(r6, 0x1739, 0x0, 0x0, 0x0, 0x0) 19:31:21 executing program 1: r0 = syz_io_uring_setup(0x0, &(0x7f0000000500), &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000ff6000/0xa000)=nil, &(0x7f0000000080)=0x0, &(0x7f0000000140)=0x0) r3 = io_uring_setup(0x3ddf, &(0x7f0000000680)) syz_io_uring_submit(r1, r2, &(0x7f0000000800)=@IORING_OP_SENDMSG={0x9, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0}, 0x0) r4 = eventfd(0x0) io_uring_register$IORING_REGISTER_EVENTFD(r0, 0x4, &(0x7f0000000000)=r4, 0x1) read$eventfd(r4, &(0x7f0000000040), 0x8) r5 = syz_io_uring_setup(0x3702, &(0x7f00000001c0), &(0x7f0000000000/0x3000)=nil, &(0x7f0000ffe000/0x2000)=nil, &(0x7f0000000140), &(0x7f0000000240)) r6 = dup2(r3, r5) r7 = dup2(r0, r6) io_uring_enter(r7, 0x1739, 0x0, 0x0, 0x0, 0x0) 19:31:21 executing program 6: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000500100000f000000000000000000000004000000000002000020000020000000def4655fdef4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000008000000018000000c20500002b0200000000000000000000000000000000000073797a6b616c6c6572000000000000002f746d702f73797a2d696d61676567656e35373134333434333800"/192, 0xc0, 0x400}, {&(0x7f0000010100)="000000000000000000000000e58ca12e13a240e2b1a22f8d07e8e55f010040000c00000000000000ddf4655f00"/64, 0x40, 0x4e0}, {&(0x7f0000010200)="010000000000050040", 0x9}, {0x0, 0x0, 0x1000000000c00}, {&(0x7f0000012000)="504d4d00504d4dff", 0x8, 0x10000}], 0x0, &(0x7f0000012b00)) 19:31:21 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000500100000f000000000000000000000004000000000002000020000020000000def4655fdef4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000008000000018000000c20500002b0200000000000000000000000000000000000073797a6b616c6c6572000000000000002f746d702f73797a2d696d61676567656e35373134333434333800"/192, 0xc0, 0x400}, {&(0x7f0000010100)="000000000000000000000000e58ca12e13a240e2b1a22f8d07e8e55f", 0x1c, 0x4e0}, {&(0x7f0000010200)="010000000000050040", 0x9, 0x560}, {0x0, 0x0, 0x1000000000c00}, {&(0x7f0000012000)="504d4d00504d4dff", 0x8, 0x10000}], 0x0, &(0x7f0000012b00)) 19:31:21 executing program 0: r0 = syz_io_uring_setup(0x2, &(0x7f0000000500), &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000ff6000/0xa000)=nil, &(0x7f0000000080)=0x0, &(0x7f0000000140)=0x0) r3 = io_uring_setup(0x3ddf, &(0x7f0000000680)) syz_io_uring_submit(r1, r2, &(0x7f0000000800)=@IORING_OP_SENDMSG={0x9, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0}, 0x0) r4 = eventfd(0x0) io_uring_register$IORING_REGISTER_EVENTFD(r0, 0x4, &(0x7f0000000000)=r4, 0x1) read$eventfd(r4, &(0x7f0000000040), 0x8) r5 = syz_io_uring_setup(0x3702, &(0x7f00000001c0), &(0x7f0000000000/0x3000)=nil, &(0x7f0000ffe000/0x2000)=nil, &(0x7f0000000140), &(0x7f0000000240)) r6 = dup2(r3, r5) r7 = dup2(0xffffffffffffffff, r6) io_uring_enter(r7, 0x1739, 0x0, 0x0, 0x0, 0x0) 19:31:21 executing program 7: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000500100000f000000000000000000000004000000000002000020000020000000def4655fdef4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000008000000018000000c20500002b0200000000000000000000000000000000000073797a6b616c6c6572000000000000002f746d702f73797a2d696d61676567656e35373134333434333800"/192, 0xc0, 0x400}, {&(0x7f0000010200)="010000000000050040", 0x9, 0x560}, {0x0, 0x0, 0x1000000000c00}, {&(0x7f0000012000)="504d4d00504d4dff", 0x8, 0x10000}], 0x0, &(0x7f0000012b00)) 19:31:21 executing program 2: r0 = syz_io_uring_setup(0x21, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, &(0x7f00000a0000)=nil, &(0x7f00000b0000)=nil, &(0x7f0000000180)=0x0, &(0x7f0000002a40)=0x0) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_io_uring_submit(r1, r2, &(0x7f0000000300)=@IORING_OP_OPENAT={0x12, 0x0, 0x0, 0xffffffffffffffff, 0x0, &(0x7f0000000100)='./cgroup/cgroup.procs/file0/../file0\x00'}, 0x0) io_uring_enter(r0, 0x76d3, 0x0, 0x0, 0x0, 0x0) r3 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$netlbl_cipso(&(0x7f0000000000), r3) r4 = syz_io_uring_setup(0x2, &(0x7f0000000500), &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000ff6000/0xa000)=nil, &(0x7f0000000080), &(0x7f0000000140)) r5 = io_uring_setup(0x3ddf, &(0x7f0000000680)) r6 = eventfd(0x0) io_uring_register$IORING_REGISTER_EVENTFD(r4, 0x4, &(0x7f0000000000)=r6, 0x1) read$eventfd(r6, &(0x7f0000000040), 0x8) r7 = syz_io_uring_setup(0x3702, &(0x7f00000001c0), &(0x7f0000000000/0x3000)=nil, &(0x7f0000ffe000/0x2000)=nil, &(0x7f0000000140), &(0x7f0000000240)) r8 = dup2(r5, r7) r9 = dup2(r4, r8) io_uring_enter(r9, 0x1739, 0x0, 0x0, 0x0, 0x0) [ 1215.874925] EXT4-fs error (device loop3): ext4_fill_super:4947: inode #2: comm syz-executor.3: iget: root inode unallocated [ 1215.877221] EXT4-fs (loop3): get root inode failed [ 1215.878006] EXT4-fs (loop3): mount failed 19:31:21 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000500100000f000000000000000000000004000000000002000020000020000000def4655fdef4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000008000000018000000c20500002b0200000000000000000000000000000000000073797a6b616c6c6572000000000000002f746d702f73797a2d696d61676567656e35373134333434333800"/192, 0xc0, 0x400}, {&(0x7f0000010100)="000000000000000000000000e58ca12e13a240e2b1a22f8d07e8e55f010040000c00000000000000ddf4655f00"/64, 0x40, 0x4e0}, {&(0x7f0000010200)="0100000000000500", 0x8, 0x560}, {0x0, 0x0, 0x1000000000c00}, {&(0x7f0000012000)="504d4d00504d4dff", 0x8, 0x10000}], 0x0, &(0x7f0000012b00)) [ 1215.907080] EXT4-fs (loop5): unsupported descriptor size 0 [ 1215.917141] EXT4-fs warning (device loop6): read_mmp_block:106: Error -117 while reading MMP block 0 [ 1215.921805] EXT4-fs (loop7): unsupported descriptor size 0 19:31:21 executing program 7: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000500100000f000000000000000000000004000000000002000020000020000000def4655fdef4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000008000000018000000c20500002b0200000000000000000000000000000000000073797a6b616c6c6572000000000000002f746d702f73797a2d696d61676567656e35373134333434333800"/192, 0xc0, 0x400}, {&(0x7f0000010200)="010000000000050040", 0x9, 0x560}, {0x0, 0x0, 0x1000000000c00}, {&(0x7f0000012000)="504d4d00504d4dff", 0x8, 0x10000}], 0x0, &(0x7f0000012b00)) [ 1215.984304] EXT4-fs warning (device loop3): read_mmp_block:106: Error -117 while reading MMP block 0 19:31:21 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000500100000f000000000000000000000004000000000002000020000020000000def4655fdef4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000008000000018000000c20500002b0200000000000000000000000000000000000073797a6b616c6c6572000000000000002f746d702f73797a2d696d61676567656e35373134333434333800"/192, 0xc0, 0x400}, {&(0x7f0000010100)="000000000000000000000000e58ca12e13a240e2b1a22f8d07e8e55f", 0x1c, 0x4e0}, {&(0x7f0000010200)="010000000000050040", 0x9, 0x560}, {0x0, 0x0, 0x1000000000c00}, {&(0x7f0000012000)="504d4d00504d4dff", 0x8, 0x10000}], 0x0, &(0x7f0000012b00)) 19:31:21 executing program 6: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000500100000f000000000000000000000004000000000002000020000020000000def4655fdef4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000008000000018000000c20500002b0200000000000000000000000000000000000073797a6b616c6c6572000000000000002f746d702f73797a2d696d61676567656e35373134333434333800"/192, 0xc0, 0x400}, {&(0x7f0000010100)="000000000000000000000000e58ca12e13a240e2b1a22f8d07e8e55f010040000c00000000000000ddf4655f00"/64, 0x40, 0x4e0}, {&(0x7f0000010200)="010000000000050040", 0x9}, {0x0, 0x0, 0x1000000000c00}, {&(0x7f0000012000)="504d4d00504d4dff", 0x8, 0x10000}], 0x0, &(0x7f0000012b00)) [ 1216.022443] EXT4-fs warning (device loop6): read_mmp_block:106: Error -117 while reading MMP block 0 [ 1216.034906] EXT4-fs (loop7): unsupported descriptor size 0 19:31:21 executing program 6: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000500100000f000000000000000000000004000000000002000020000020000000def4655fdef4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000008000000018000000c20500002b0200000000000000000000000000000000000073797a6b616c6c6572000000000000002f746d702f73797a2d696d61676567656e35373134333434333800"/192, 0xc0, 0x400}, {&(0x7f0000010100)="000000000000000000000000e58ca12e13a240e2b1a22f8d07e8e55f010040000c00000000000000ddf4655f00"/64, 0x40, 0x4e0}, {&(0x7f0000010200)="010000000000050040", 0x9}, {0x0, 0x0, 0x1000000000c00}, {&(0x7f0000012000)="504d4d00504d4dff", 0x8, 0x10000}], 0x0, &(0x7f0000012b00)) 19:31:21 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000500100000f000000000000000000000004000000000002000020000020000000def4655fdef4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000008000000018000000c20500002b0200000000000000000000000000000000000073797a6b616c6c6572000000000000002f746d702f73797a2d696d61676567656e35373134333434333800"/192, 0xc0, 0x400}, {&(0x7f0000010100)="000000000000000000000000e58ca12e13a240e2b1a22f8d07e8e55f010040000c00000000000000ddf4655f00"/64, 0x40, 0x4e0}, {&(0x7f0000010200)="0100000000000500", 0x8, 0x560}, {0x0, 0x0, 0x1000000000c00}, {&(0x7f0000012000)="504d4d00504d4dff", 0x8, 0x10000}], 0x0, &(0x7f0000012b00)) [ 1216.091598] EXT4-fs (loop5): unsupported descriptor size 0 19:31:21 executing program 7: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000500100000f000000000000000000000004000000000002000020000020000000def4655fdef4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000008000000018000000c20500002b0200000000000000000000000000000000000073797a6b616c6c6572000000000000002f746d702f73797a2d696d61676567656e35373134333434333800"/192, 0xc0, 0x400}, {&(0x7f0000010200)="010000000000050040", 0x9, 0x560}, {0x0, 0x0, 0x1000000000c00}, {&(0x7f0000012000)="504d4d00504d4dff", 0x8, 0x10000}], 0x0, &(0x7f0000012b00)) 19:31:21 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000500100000f000000000000000000000004000000000002000020000020000000def4655fdef4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000008000000018000000c20500002b0200000000000000000000000000000000000073797a6b616c6c6572000000000000002f746d702f73797a2d696d61676567656e35373134333434333800"/192, 0xc0, 0x400}, {&(0x7f0000010100)="000000000000000000000000e58ca12e13a240e2b1a22f8d07e8e55f0100", 0x1e, 0x4e0}, {&(0x7f0000010200)="010000000000050040", 0x9, 0x560}, {0x0, 0x0, 0x1000000000c00}, {&(0x7f0000012000)="504d4d00504d4dff", 0x8, 0x10000}], 0x0, &(0x7f0000012b00)) [ 1216.131075] EXT4-fs warning (device loop6): read_mmp_block:106: Error -117 while reading MMP block 0 19:31:21 executing program 6: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000500100000f000000000000000000000004000000000002000020000020000000def4655fdef4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000008000000018000000c20500002b0200000000000000000000000000000000000073797a6b616c6c6572000000000000002f746d702f73797a2d696d61676567656e35373134333434333800"/192, 0xc0, 0x400}, {&(0x7f0000010200)="010000000000050040", 0x9, 0x560}, {0x0, 0x0, 0x1000000000c00}, {&(0x7f0000012000)="504d4d00504d4dff", 0x8, 0x10000}], 0x0, &(0x7f0000012b00)) [ 1216.160136] EXT4-fs (loop7): unsupported descriptor size 0 [ 1216.170586] EXT4-fs warning (device loop3): read_mmp_block:106: Error -117 while reading MMP block 0 [ 1216.187000] EXT4-fs (loop5): unsupported descriptor size 0 [ 1216.209852] EXT4-fs (loop6): unsupported descriptor size 0 19:31:34 executing program 7: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000500100000f000000000000000000000004000000000002000020000020000000def4655fdef4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000008000000018000000c20500002b0200000000000000000000000000000000000073797a6b616c6c6572000000000000002f746d702f73797a2d696d61676567656e35373134333434333800"/192, 0xc0, 0x400}, {0x0, 0x0, 0x4e0}, {&(0x7f0000010200)="010000000000050040", 0x9, 0x560}, {0x0, 0x0, 0x1000000000c00}, {&(0x7f0000012000)="504d4d00504d4dff", 0x8, 0x10000}], 0x0, &(0x7f0000012b00)) 19:31:34 executing program 0: r0 = syz_io_uring_setup(0x2, &(0x7f0000000500), &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000ff6000/0xa000)=nil, &(0x7f0000000080)=0x0, &(0x7f0000000140)=0x0) r3 = io_uring_setup(0x3ddf, &(0x7f0000000680)) syz_io_uring_submit(r1, r2, &(0x7f0000000800)=@IORING_OP_SENDMSG={0x9, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0}, 0x0) r4 = eventfd(0x0) io_uring_register$IORING_REGISTER_EVENTFD(r0, 0x4, &(0x7f0000000000)=r4, 0x1) read$eventfd(r4, &(0x7f0000000040), 0x8) r5 = syz_io_uring_setup(0x3702, &(0x7f00000001c0), &(0x7f0000000000/0x3000)=nil, &(0x7f0000ffe000/0x2000)=nil, &(0x7f0000000140), &(0x7f0000000240)) r6 = dup2(r3, r5) r7 = dup2(0xffffffffffffffff, r6) io_uring_enter(r7, 0x1739, 0x0, 0x0, 0x0, 0x0) 19:31:34 executing program 1: r0 = syz_io_uring_setup(0x2, 0x0, &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000ff6000/0xa000)=nil, &(0x7f0000000080)=0x0, &(0x7f0000000140)=0x0) r3 = io_uring_setup(0x3ddf, &(0x7f0000000680)) syz_io_uring_submit(r1, r2, &(0x7f0000000800)=@IORING_OP_SENDMSG={0x9, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0}, 0x0) r4 = eventfd(0x0) io_uring_register$IORING_REGISTER_EVENTFD(r0, 0x4, &(0x7f0000000000)=r4, 0x1) read$eventfd(r4, &(0x7f0000000040), 0x8) r5 = syz_io_uring_setup(0x3702, &(0x7f00000001c0), &(0x7f0000000000/0x3000)=nil, &(0x7f0000ffe000/0x2000)=nil, &(0x7f0000000140), &(0x7f0000000240)) r6 = dup2(r3, r5) r7 = dup2(r0, r6) io_uring_enter(r7, 0x1739, 0x0, 0x0, 0x0, 0x0) 19:31:34 executing program 6: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000500100000f000000000000000000000004000000000002000020000020000000def4655fdef4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000008000000018000000c20500002b0200000000000000000000000000000000000073797a6b616c6c6572000000000000002f746d702f73797a2d696d61676567656e35373134333434333800"/192, 0xc0, 0x400}, {&(0x7f0000010200)="010000000000050040", 0x9, 0x560}, {0x0, 0x0, 0x1000000000c00}, {&(0x7f0000012000)="504d4d00504d4dff", 0x8, 0x10000}], 0x0, &(0x7f0000012b00)) 19:31:34 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000500100000f000000000000000000000004000000000002000020000020000000def4655fdef4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000008000000018000000c20500002b0200000000000000000000000000000000000073797a6b616c6c6572000000000000002f746d702f73797a2d696d61676567656e35373134333434333800"/192, 0xc0, 0x400}, {&(0x7f0000010100)="000000000000000000000000e58ca12e13a240e2b1a22f8d07e8e55f010040000c00000000000000ddf4655f00"/64, 0x40, 0x4e0}, {&(0x7f0000010200)="0100000000000500", 0x8, 0x560}, {0x0, 0x0, 0x1000000000c00}, {&(0x7f0000012000)="504d4d00504d4dff", 0x8, 0x10000}], 0x0, &(0x7f0000012b00)) 19:31:34 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000500100000f000000000000000000000004000000000002000020000020000000def4655fdef4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000008000000018000000c20500002b0200000000000000000000000000000000000073797a6b616c6c6572000000000000002f746d702f73797a2d696d61676567656e35373134333434333800"/192, 0xc0, 0x400}, {&(0x7f0000010100)="000000000000000000000000e58ca12e13a240e2b1a22f8d07e8e55f0100", 0x1e, 0x4e0}, {&(0x7f0000010200)="010000000000050040", 0x9, 0x560}, {0x0, 0x0, 0x1000000000c00}, {&(0x7f0000012000)="504d4d00504d4dff", 0x8, 0x10000}], 0x0, &(0x7f0000012b00)) 19:31:34 executing program 2: r0 = syz_io_uring_setup(0x21, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, &(0x7f00000a0000)=nil, &(0x7f00000b0000)=nil, &(0x7f0000000180)=0x0, &(0x7f0000002a40)=0x0) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_io_uring_submit(r1, r2, &(0x7f0000000300)=@IORING_OP_OPENAT={0x12, 0x0, 0x0, 0xffffffffffffffff, 0x0, &(0x7f0000000100)='./cgroup/cgroup.procs/file0/../file0\x00'}, 0x0) io_uring_enter(r0, 0x76d3, 0x0, 0x0, 0x0, 0x0) r3 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$netlbl_cipso(&(0x7f0000000000), r3) r4 = syz_io_uring_setup(0x2, &(0x7f0000000500), &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000ff6000/0xa000)=nil, &(0x7f0000000080), &(0x7f0000000140)) r5 = io_uring_setup(0x3ddf, &(0x7f0000000680)) r6 = eventfd(0x0) io_uring_register$IORING_REGISTER_EVENTFD(r4, 0x4, &(0x7f0000000000)=r6, 0x1) read$eventfd(r6, &(0x7f0000000040), 0x8) r7 = syz_io_uring_setup(0x3702, &(0x7f00000001c0), &(0x7f0000000000/0x3000)=nil, &(0x7f0000ffe000/0x2000)=nil, &(0x7f0000000140), &(0x7f0000000240)) r8 = dup2(r5, r7) r9 = dup2(r4, r8) io_uring_enter(r9, 0x1739, 0x0, 0x0, 0x0, 0x0) 19:31:34 executing program 4: r0 = syz_io_uring_setup(0x2, &(0x7f0000000500), &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000ff6000/0xa000)=nil, &(0x7f0000000080)=0x0, &(0x7f0000000140)=0x0) io_uring_setup(0x3ddf, &(0x7f0000000680)) syz_io_uring_submit(r1, r2, &(0x7f0000000800)=@IORING_OP_SENDMSG={0x9, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0}, 0x0) r3 = eventfd(0x0) io_uring_register$IORING_REGISTER_EVENTFD(r0, 0x4, &(0x7f0000000000)=r3, 0x1) read$eventfd(r3, &(0x7f0000000040), 0x8) r4 = syz_io_uring_setup(0x3702, &(0x7f00000001c0), &(0x7f0000000000/0x3000)=nil, &(0x7f0000ffe000/0x2000)=nil, &(0x7f0000000140), &(0x7f0000000240)) r5 = dup2(0xffffffffffffffff, r4) r6 = dup2(r0, r5) io_uring_enter(r6, 0x1739, 0x0, 0x0, 0x0, 0x0) [ 1228.926970] EXT4-fs (loop5): unsupported descriptor size 0 [ 1228.934943] EXT4-fs (loop6): unsupported descriptor size 0 [ 1228.936017] EXT4-fs (loop7): unsupported descriptor size 0 19:31:34 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000500100000f000000000000000000000004000000000002000020000020000000def4655fdef4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000008000000018000000c20500002b0200000000000000000000000000000000000073797a6b616c6c6572000000000000002f746d702f73797a2d696d61676567656e35373134333434333800"/192, 0xc0, 0x400}, {&(0x7f0000010100)="000000000000000000000000e58ca12e13a240e2b1a22f8d07e8e55f0100", 0x1e, 0x4e0}, {&(0x7f0000010200)="010000000000050040", 0x9, 0x560}, {0x0, 0x0, 0x1000000000c00}, {&(0x7f0000012000)="504d4d00504d4dff", 0x8, 0x10000}], 0x0, &(0x7f0000012b00)) [ 1228.988394] EXT4-fs warning (device loop3): read_mmp_block:106: Error -117 while reading MMP block 0 19:31:34 executing program 6: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000500100000f000000000000000000000004000000000002000020000020000000def4655fdef4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000008000000018000000c20500002b0200000000000000000000000000000000000073797a6b616c6c6572000000000000002f746d702f73797a2d696d61676567656e35373134333434333800"/192, 0xc0, 0x400}, {&(0x7f0000010200)="010000000000050040", 0x9, 0x560}, {0x0, 0x0, 0x1000000000c00}, {&(0x7f0000012000)="504d4d00504d4dff", 0x8, 0x10000}], 0x0, &(0x7f0000012b00)) 19:31:34 executing program 7: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000500100000f000000000000000000000004000000000002000020000020000000def4655fdef4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000008000000018000000c20500002b0200000000000000000000000000000000000073797a6b616c6c6572000000000000002f746d702f73797a2d696d61676567656e35373134333434333800"/192, 0xc0, 0x400}, {0x0, 0x0, 0x4e0}, {&(0x7f0000010200)="010000000000050040", 0x9, 0x560}, {0x0, 0x0, 0x1000000000c00}, {&(0x7f0000012000)="504d4d00504d4dff", 0x8, 0x10000}], 0x0, &(0x7f0000012b00)) 19:31:34 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000500100000f000000000000000000000004000000000002000020000020000000def4655fdef4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000008000000018000000c20500002b0200000000000000000000000000000000000073797a6b616c6c6572000000000000002f746d702f73797a2d696d61676567656e35373134333434333800"/192, 0xc0, 0x400}, {&(0x7f0000010100)="000000000000000000000000e58ca12e13a240e2b1a22f8d07e8e55f010040000c00000000000000ddf4655f00"/64, 0x40, 0x4e0}, {&(0x7f0000010200)="010000000000050040", 0x9}, {0x0, 0x0, 0x1000000000c00}, {&(0x7f0000012000)="504d4d00504d4dff", 0x8, 0x10000}], 0x0, &(0x7f0000012b00)) [ 1229.077039] EXT4-fs (loop6): unsupported descriptor size 0 [ 1229.081757] EXT4-fs (loop5): unsupported descriptor size 0 [ 1229.097500] EXT4-fs warning (device loop3): read_mmp_block:106: Error -117 while reading MMP block 0 19:31:34 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000500100000f000000000000000000000004000000000002000020000020000000def4655fdef4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000008000000018000000c20500002b0200000000000000000000000000000000000073797a6b616c6c6572000000000000002f746d702f73797a2d696d61676567656e35373134333434333800"/192, 0xc0, 0x400}, {&(0x7f0000010100)="000000000000000000000000e58ca12e13a240e2b1a22f8d07e8e55f010040000c00000000000000ddf4655f00"/64, 0x40, 0x4e0}, {&(0x7f0000010200)="010000000000050040", 0x9}, {0x0, 0x0, 0x1000000000c00}, {&(0x7f0000012000)="504d4d00504d4dff", 0x8, 0x10000}], 0x0, &(0x7f0000012b00)) [ 1229.126489] EXT4-fs (loop7): unsupported descriptor size 0 19:31:34 executing program 6: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000500100000f000000000000000000000004000000000002000020000020000000def4655fdef4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000008000000018000000c20500002b0200000000000000000000000000000000000073797a6b616c6c6572000000000000002f746d702f73797a2d696d61676567656e35373134333434333800"/192, 0xc0, 0x400}, {0x0, 0x0, 0x4e0}, {&(0x7f0000010200)="010000000000050040", 0x9, 0x560}, {0x0, 0x0, 0x1000000000c00}, {&(0x7f0000012000)="504d4d00504d4dff", 0x8, 0x10000}], 0x0, &(0x7f0000012b00)) 19:31:34 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000500100000f000000000000000000000004000000000002000020000020000000def4655fdef4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000008000000018000000c20500002b0200000000000000000000000000000000000073797a6b616c6c6572000000000000002f746d702f73797a2d696d61676567656e35373134333434333800"/192, 0xc0, 0x400}, {&(0x7f0000010100)="000000000000000000000000e58ca12e13a240e2b1a22f8d07e8e55f010040", 0x1f, 0x4e0}, {&(0x7f0000010200)="010000000000050040", 0x9, 0x560}, {0x0, 0x0, 0x1000000000c00}, {&(0x7f0000012000)="504d4d00504d4dff", 0x8, 0x10000}], 0x0, &(0x7f0000012b00)) 19:31:34 executing program 7: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000500100000f000000000000000000000004000000000002000020000020000000def4655fdef4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000008000000018000000c20500002b0200000000000000000000000000000000000073797a6b616c6c6572000000000000002f746d702f73797a2d696d61676567656e35373134333434333800"/192, 0xc0, 0x400}, {0x0, 0x0, 0x4e0}, {&(0x7f0000010200)="010000000000050040", 0x9, 0x560}, {0x0, 0x0, 0x1000000000c00}, {&(0x7f0000012000)="504d4d00504d4dff", 0x8, 0x10000}], 0x0, &(0x7f0000012b00)) [ 1229.161359] EXT4-fs warning (device loop3): read_mmp_block:106: Error -117 while reading MMP block 0 [ 1229.207482] EXT4-fs error (device loop5): ext4_fill_super:4947: inode #2: comm syz-executor.5: iget: root inode unallocated [ 1229.210453] EXT4-fs (loop6): unsupported descriptor size 0 [ 1229.212802] EXT4-fs (loop5): get root inode failed [ 1229.213492] EXT4-fs (loop5): mount failed 19:31:34 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000500100000f000000000000000000000004000000000002000020000020000000def4655fdef4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000008000000018000000c20500002b0200000000000000000000000000000000000073797a6b616c6c6572000000000000002f746d702f73797a2d696d61676567656e35373134333434333800"/192, 0xc0, 0x400}, {&(0x7f0000010100)="000000000000000000000000e58ca12e13a240e2b1a22f8d07e8e55f010040000c00000000000000ddf4655f00"/64, 0x40, 0x4e0}, {&(0x7f0000010200)="010000000000050040", 0x9}, {0x0, 0x0, 0x1000000000c00}, {&(0x7f0000012000)="504d4d00504d4dff", 0x8, 0x10000}], 0x0, &(0x7f0000012b00)) [ 1229.233834] EXT4-fs (loop7): unsupported descriptor size 0 [ 1229.264018] EXT4-fs warning (device loop3): read_mmp_block:106: Error -117 while reading MMP block 0 19:31:45 executing program 1: r0 = syz_io_uring_setup(0x2, 0x0, &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000ff6000/0xa000)=nil, &(0x7f0000000080)=0x0, &(0x7f0000000140)=0x0) r3 = io_uring_setup(0x3ddf, &(0x7f0000000680)) syz_io_uring_submit(r1, r2, &(0x7f0000000800)=@IORING_OP_SENDMSG={0x9, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0}, 0x0) r4 = eventfd(0x0) io_uring_register$IORING_REGISTER_EVENTFD(r0, 0x4, &(0x7f0000000000)=r4, 0x1) read$eventfd(r4, &(0x7f0000000040), 0x8) r5 = syz_io_uring_setup(0x3702, &(0x7f00000001c0), &(0x7f0000000000/0x3000)=nil, &(0x7f0000ffe000/0x2000)=nil, &(0x7f0000000140), &(0x7f0000000240)) r6 = dup2(r3, r5) r7 = dup2(r0, r6) io_uring_enter(r7, 0x1739, 0x0, 0x0, 0x0, 0x0) 19:31:45 executing program 0: r0 = syz_io_uring_setup(0x2, &(0x7f0000000500), &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000ff6000/0xa000)=nil, &(0x7f0000000080)=0x0, &(0x7f0000000140)=0x0) r3 = io_uring_setup(0x3ddf, &(0x7f0000000680)) syz_io_uring_submit(r1, r2, &(0x7f0000000800)=@IORING_OP_SENDMSG={0x9, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0}, 0x0) r4 = eventfd(0x0) io_uring_register$IORING_REGISTER_EVENTFD(r0, 0x4, &(0x7f0000000000)=r4, 0x1) read$eventfd(r4, &(0x7f0000000040), 0x8) r5 = syz_io_uring_setup(0x3702, &(0x7f00000001c0), &(0x7f0000000000/0x3000)=nil, &(0x7f0000ffe000/0x2000)=nil, &(0x7f0000000140), &(0x7f0000000240)) r6 = dup2(r3, r5) r7 = dup2(0xffffffffffffffff, r6) io_uring_enter(r7, 0x1739, 0x0, 0x0, 0x0, 0x0) 19:31:45 executing program 6: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000500100000f000000000000000000000004000000000002000020000020000000def4655fdef4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000008000000018000000c20500002b0200000000000000000000000000000000000073797a6b616c6c6572000000000000002f746d702f73797a2d696d61676567656e35373134333434333800"/192, 0xc0, 0x400}, {0x0, 0x0, 0x4e0}, {&(0x7f0000010200)="010000000000050040", 0x9, 0x560}, {0x0, 0x0, 0x1000000000c00}, {&(0x7f0000012000)="504d4d00504d4dff", 0x8, 0x10000}], 0x0, &(0x7f0000012b00)) 19:31:45 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000500100000f000000000000000000000004000000000002000020000020000000def4655fdef4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000008000000018000000c20500002b0200000000000000000000000000000000000073797a6b616c6c6572000000000000002f746d702f73797a2d696d61676567656e35373134333434333800"/192, 0xc0, 0x400}, {&(0x7f0000010200)="010000000000050040", 0x9, 0x560}, {0x0, 0x0, 0x1000000000c00}, {&(0x7f0000012000)="504d4d00504d4dff", 0x8, 0x10000}], 0x0, &(0x7f0000012b00)) 19:31:45 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000500100000f000000000000000000000004000000000002000020000020000000def4655fdef4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000008000000018000000c20500002b0200000000000000000000000000000000000073797a6b616c6c6572000000000000002f746d702f73797a2d696d61676567656e35373134333434333800"/192, 0xc0, 0x400}, {&(0x7f0000010100)="000000000000000000000000e58ca12e13a240e2b1a22f8d07e8e55f0100", 0x1e, 0x4e0}, {&(0x7f0000010200)="010000000000050040", 0x9, 0x560}, {0x0, 0x0, 0x1000000000c00}, {&(0x7f0000012000)="504d4d00504d4dff", 0x8, 0x10000}], 0x0, &(0x7f0000012b00)) 19:31:45 executing program 7: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000500100000f000000000000000000000004000000000002000020000020000000def4655fdef4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000008000000018000000c20500002b0200000000000000000000000000000000000073797a6b616c6c6572000000000000002f746d702f73797a2d696d61676567656e35373134333434333800"/192, 0xc0, 0x400}, {&(0x7f0000010100), 0x0, 0x4e0}, {&(0x7f0000010200)="010000000000050040", 0x9, 0x560}, {0x0, 0x0, 0x1000000000c00}, {&(0x7f0000012000)="504d4d00504d4dff", 0x8, 0x10000}], 0x0, &(0x7f0000012b00)) 19:31:45 executing program 2: r0 = syz_io_uring_setup(0x21, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, &(0x7f00000a0000)=nil, &(0x7f00000b0000)=nil, &(0x7f0000000180)=0x0, &(0x7f0000002a40)=0x0) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_io_uring_submit(r1, r2, &(0x7f0000000300)=@IORING_OP_OPENAT={0x12, 0x0, 0x0, 0xffffffffffffffff, 0x0, &(0x7f0000000100)='./cgroup/cgroup.procs/file0/../file0\x00'}, 0x0) io_uring_enter(r0, 0x76d3, 0x0, 0x0, 0x0, 0x0) r3 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$netlbl_cipso(&(0x7f0000000000), r3) r4 = syz_io_uring_setup(0x2, &(0x7f0000000500), &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000ff6000/0xa000)=nil, &(0x7f0000000080), &(0x7f0000000140)) r5 = io_uring_setup(0x3ddf, &(0x7f0000000680)) r6 = eventfd(0x0) io_uring_register$IORING_REGISTER_EVENTFD(r4, 0x4, &(0x7f0000000000)=r6, 0x1) read$eventfd(r6, &(0x7f0000000040), 0x8) r7 = syz_io_uring_setup(0x3702, &(0x7f00000001c0), &(0x7f0000000000/0x3000)=nil, &(0x7f0000ffe000/0x2000)=nil, &(0x7f0000000140), &(0x7f0000000240)) r8 = dup2(r5, r7) r9 = dup2(r4, r8) io_uring_enter(r9, 0x1739, 0x0, 0x0, 0x0, 0x0) 19:31:45 executing program 4: r0 = syz_io_uring_setup(0x2, &(0x7f0000000500), &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000ff6000/0xa000)=nil, &(0x7f0000000080)=0x0, &(0x7f0000000140)=0x0) r3 = io_uring_setup(0x3ddf, &(0x7f0000000680)) syz_io_uring_submit(r1, r2, &(0x7f0000000800)=@IORING_OP_SENDMSG={0x9, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0}, 0x0) r4 = eventfd(0x0) io_uring_register$IORING_REGISTER_EVENTFD(r0, 0x4, &(0x7f0000000000)=r4, 0x1) read$eventfd(r4, &(0x7f0000000040), 0x8) syz_io_uring_setup(0x3702, &(0x7f00000001c0), &(0x7f0000000000/0x3000)=nil, &(0x7f0000ffe000/0x2000)=nil, &(0x7f0000000140), &(0x7f0000000240)) r5 = dup2(r3, 0xffffffffffffffff) r6 = dup2(r0, r5) io_uring_enter(r6, 0x1739, 0x0, 0x0, 0x0, 0x0) [ 1240.375314] EXT4-fs (loop3): unsupported descriptor size 0 [ 1240.405849] EXT4-fs (loop6): unsupported descriptor size 0 [ 1240.407287] EXT4-fs (loop5): unsupported descriptor size 0 19:31:45 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000500100000f000000000000000000000004000000000002000020000020000000def4655fdef4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000008000000018000000c20500002b0200000000000000000000000000000000000073797a6b616c6c6572000000000000002f746d702f73797a2d696d61676567656e35373134333434333800"/192, 0xc0, 0x400}, {&(0x7f0000010200)="010000000000050040", 0x9, 0x560}, {0x0, 0x0, 0x1000000000c00}, {&(0x7f0000012000)="504d4d00504d4dff", 0x8, 0x10000}], 0x0, &(0x7f0000012b00)) [ 1240.422862] EXT4-fs (loop7): unsupported descriptor size 0 19:31:45 executing program 6: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000500100000f000000000000000000000004000000000002000020000020000000def4655fdef4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000008000000018000000c20500002b0200000000000000000000000000000000000073797a6b616c6c6572000000000000002f746d702f73797a2d696d61676567656e35373134333434333800"/192, 0xc0, 0x400}, {0x0, 0x0, 0x4e0}, {&(0x7f0000010200)="010000000000050040", 0x9, 0x560}, {0x0, 0x0, 0x1000000000c00}, {&(0x7f0000012000)="504d4d00504d4dff", 0x8, 0x10000}], 0x0, &(0x7f0000012b00)) 19:31:45 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000500100000f000000000000000000000004000000000002000020000020000000def4655fdef4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000008000000018000000c20500002b0200000000000000000000000000000000000073797a6b616c6c6572000000000000002f746d702f73797a2d696d61676567656e35373134333434333800"/192, 0xc0, 0x400}, {&(0x7f0000010100)="000000000000000000000000e58ca12e13a240e2b1a22f8d07e8e55f0100", 0x1e, 0x4e0}, {&(0x7f0000010200)="010000000000050040", 0x9, 0x560}, {0x0, 0x0, 0x1000000000c00}, {&(0x7f0000012000)="504d4d00504d4dff", 0x8, 0x10000}], 0x0, &(0x7f0000012b00)) 19:31:45 executing program 7: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000500100000f000000000000000000000004000000000002000020000020000000def4655fdef4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000008000000018000000c20500002b0200000000000000000000000000000000000073797a6b616c6c6572000000000000002f746d702f73797a2d696d61676567656e35373134333434333800"/192, 0xc0, 0x400}, {&(0x7f0000010100), 0x0, 0x4e0}, {&(0x7f0000010200)="010000000000050040", 0x9, 0x560}, {0x0, 0x0, 0x1000000000c00}, {&(0x7f0000012000)="504d4d00504d4dff", 0x8, 0x10000}], 0x0, &(0x7f0000012b00)) [ 1240.501593] EXT4-fs (loop5): unsupported descriptor size 0 [ 1240.502502] EXT4-fs (loop6): unsupported descriptor size 0 19:31:45 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000500100000f000000000000000000000004000000000002000020000020000000def4655fdef4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000008000000018000000c20500002b0200000000000000000000000000000000000073797a6b616c6c6572000000000000002f746d702f73797a2d696d61676567656e35373134333434333800"/192, 0xc0, 0x400}, {&(0x7f0000010100)="000000000000000000000000e58ca12e13a240e2b1a22f8d07e8e55f0100", 0x1e, 0x4e0}, {&(0x7f0000010200)="010000000000050040", 0x9, 0x560}, {0x0, 0x0, 0x1000000000c00}, {&(0x7f0000012000)="504d4d00504d4dff", 0x8, 0x10000}], 0x0, &(0x7f0000012b00)) [ 1240.522529] EXT4-fs (loop3): unsupported descriptor size 0 19:31:45 executing program 6: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000500100000f000000000000000000000004000000000002000020000020000000def4655fdef4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000008000000018000000c20500002b0200000000000000000000000000000000000073797a6b616c6c6572000000000000002f746d702f73797a2d696d61676567656e35373134333434333800"/192, 0xc0, 0x400}, {&(0x7f0000010100), 0x0, 0x4e0}, {&(0x7f0000010200)="010000000000050040", 0x9, 0x560}, {0x0, 0x0, 0x1000000000c00}, {&(0x7f0000012000)="504d4d00504d4dff", 0x8, 0x10000}], 0x0, &(0x7f0000012b00)) 19:31:45 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000500100000f000000000000000000000004000000000002000020000020000000def4655fdef4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000008000000018000000c20500002b0200000000000000000000000000000000000073797a6b616c6c6572000000000000002f746d702f73797a2d696d61676567656e35373134333434333800"/192, 0xc0, 0x400}, {&(0x7f0000010200)="010000000000050040", 0x9, 0x560}, {0x0, 0x0, 0x1000000000c00}, {&(0x7f0000012000)="504d4d00504d4dff", 0x8, 0x10000}], 0x0, &(0x7f0000012b00)) [ 1240.580238] EXT4-fs (loop5): unsupported descriptor size 0 [ 1240.587717] EXT4-fs (loop7): unsupported descriptor size 0 [ 1240.605304] EXT4-fs (loop6): unsupported descriptor size 0 [ 1240.632653] EXT4-fs (loop3): unsupported descriptor size 0 19:31:57 executing program 2: r0 = syz_io_uring_setup(0x21, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, &(0x7f00000a0000)=nil, &(0x7f00000b0000)=nil, &(0x7f0000000180)=0x0, &(0x7f0000002a40)=0x0) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_io_uring_submit(r1, r2, &(0x7f0000000300)=@IORING_OP_OPENAT={0x12, 0x0, 0x0, 0xffffffffffffffff, 0x0, &(0x7f0000000100)='./cgroup/cgroup.procs/file0/../file0\x00'}, 0x0) io_uring_enter(r0, 0x76d3, 0x0, 0x0, 0x0, 0x0) r3 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$netlbl_cipso(&(0x7f0000000000), r3) r4 = syz_io_uring_setup(0x2, &(0x7f0000000500), &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000ff6000/0xa000)=nil, &(0x7f0000000080)=0x0, &(0x7f0000000140)=0x0) syz_io_uring_submit(r5, r6, &(0x7f0000000800)=@IORING_OP_SENDMSG={0x9, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0}, 0x0) r7 = eventfd(0x0) io_uring_register$IORING_REGISTER_EVENTFD(r4, 0x4, &(0x7f0000000000)=r7, 0x1) read$eventfd(r7, &(0x7f0000000040), 0x8) r8 = syz_io_uring_setup(0x3702, &(0x7f00000001c0), &(0x7f0000000000/0x3000)=nil, &(0x7f0000ffe000/0x2000)=nil, &(0x7f0000000140), &(0x7f0000000240)) r9 = dup2(0xffffffffffffffff, r8) r10 = dup2(r4, r9) io_uring_enter(r10, 0x1739, 0x0, 0x0, 0x0, 0x0) 19:31:57 executing program 0: r0 = syz_io_uring_setup(0x2, &(0x7f0000000500), &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000ff6000/0xa000)=nil, &(0x7f0000000080)=0x0, &(0x7f0000000140)=0x0) r3 = io_uring_setup(0x3ddf, &(0x7f0000000680)) syz_io_uring_submit(r1, r2, &(0x7f0000000800)=@IORING_OP_SENDMSG={0x9, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0}, 0x0) r4 = eventfd(0x0) io_uring_register$IORING_REGISTER_EVENTFD(r0, 0x4, &(0x7f0000000000)=r4, 0x1) read$eventfd(r4, &(0x7f0000000040), 0x8) r5 = syz_io_uring_setup(0x3702, &(0x7f00000001c0), &(0x7f0000000000/0x3000)=nil, &(0x7f0000ffe000/0x2000)=nil, &(0x7f0000000140), &(0x7f0000000240)) dup2(r3, r5) r6 = dup2(r0, 0xffffffffffffffff) io_uring_enter(r6, 0x1739, 0x0, 0x0, 0x0, 0x0) 19:31:57 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000500100000f000000000000000000000004000000000002000020000020000000def4655fdef4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000008000000018000000c20500002b0200000000000000000000000000000000000073797a6b616c6c6572000000000000002f746d702f73797a2d696d61676567656e35373134333434333800"/192, 0xc0, 0x400}, {&(0x7f0000010100)="000000000000000000000000e58ca12e13a240e2b1a22f8d07e8e55f010040", 0x1f}, {&(0x7f0000010200)="010000000000050040", 0x9, 0x560}, {0x0, 0x0, 0x1000000000c00}, {&(0x7f0000012000)="504d4d00504d4dff", 0x8, 0x10000}], 0x0, &(0x7f0000012b00)) 19:31:57 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000500100000f000000000000000000000004000000000002000020000020000000def4655fdef4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000008000000018000000c20500002b0200000000000000000000000000000000000073797a6b616c6c6572000000000000002f746d702f73797a2d696d61676567656e35373134333434333800"/192, 0xc0, 0x400}, {0x0, 0x0, 0x4e0}, {&(0x7f0000010200)="010000000000050040", 0x9, 0x560}, {0x0, 0x0, 0x1000000000c00}, {&(0x7f0000012000)="504d4d00504d4dff", 0x8, 0x10000}], 0x0, &(0x7f0000012b00)) 19:31:57 executing program 7: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000500100000f000000000000000000000004000000000002000020000020000000def4655fdef4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000008000000018000000c20500002b0200000000000000000000000000000000000073797a6b616c6c6572000000000000002f746d702f73797a2d696d61676567656e35373134333434333800"/192, 0xc0, 0x400}, {&(0x7f0000010100), 0x0, 0x4e0}, {&(0x7f0000010200)="010000000000050040", 0x9, 0x560}, {0x0, 0x0, 0x1000000000c00}, {&(0x7f0000012000)="504d4d00504d4dff", 0x8, 0x10000}], 0x0, &(0x7f0000012b00)) 19:31:57 executing program 6: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000500100000f000000000000000000000004000000000002000020000020000000def4655fdef4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000008000000018000000c20500002b0200000000000000000000000000000000000073797a6b616c6c6572000000000000002f746d702f73797a2d696d61676567656e35373134333434333800"/192, 0xc0, 0x400}, {&(0x7f0000010100), 0x0, 0x4e0}, {&(0x7f0000010200)="010000000000050040", 0x9, 0x560}, {0x0, 0x0, 0x1000000000c00}, {&(0x7f0000012000)="504d4d00504d4dff", 0x8, 0x10000}], 0x0, &(0x7f0000012b00)) 19:31:57 executing program 4: r0 = syz_io_uring_setup(0x2, &(0x7f0000000500), &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000ff6000/0xa000)=nil, &(0x7f0000000080)=0x0, &(0x7f0000000140)=0x0) r3 = io_uring_setup(0x3ddf, &(0x7f0000000680)) syz_io_uring_submit(r1, r2, &(0x7f0000000800)=@IORING_OP_SENDMSG={0x9, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0}, 0x0) r4 = eventfd(0x0) io_uring_register$IORING_REGISTER_EVENTFD(r0, 0x4, &(0x7f0000000000)=r4, 0x1) read$eventfd(r4, &(0x7f0000000040), 0x8) syz_io_uring_setup(0x3702, &(0x7f00000001c0), &(0x7f0000000000/0x3000)=nil, &(0x7f0000ffe000/0x2000)=nil, &(0x7f0000000140), &(0x7f0000000240)) r5 = dup2(r3, 0xffffffffffffffff) r6 = dup2(r0, r5) io_uring_enter(r6, 0x1739, 0x0, 0x0, 0x0, 0x0) 19:31:57 executing program 1: r0 = syz_io_uring_setup(0x2, 0x0, &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000ff6000/0xa000)=nil, &(0x7f0000000080)=0x0, &(0x7f0000000140)=0x0) r3 = io_uring_setup(0x3ddf, &(0x7f0000000680)) syz_io_uring_submit(r1, r2, &(0x7f0000000800)=@IORING_OP_SENDMSG={0x9, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0}, 0x0) r4 = eventfd(0x0) io_uring_register$IORING_REGISTER_EVENTFD(r0, 0x4, &(0x7f0000000000)=r4, 0x1) read$eventfd(r4, &(0x7f0000000040), 0x8) r5 = syz_io_uring_setup(0x3702, &(0x7f00000001c0), &(0x7f0000000000/0x3000)=nil, &(0x7f0000ffe000/0x2000)=nil, &(0x7f0000000140), &(0x7f0000000240)) r6 = dup2(r3, r5) r7 = dup2(r0, r6) io_uring_enter(r7, 0x1739, 0x0, 0x0, 0x0, 0x0) [ 1251.862617] EXT4-fs (loop6): unsupported descriptor size 0 19:31:57 executing program 6: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000500100000f000000000000000000000004000000000002000020000020000000def4655fdef4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000008000000018000000c20500002b0200000000000000000000000000000000000073797a6b616c6c6572000000000000002f746d702f73797a2d696d61676567656e35373134333434333800"/192, 0xc0, 0x400}, {&(0x7f0000010100), 0x0, 0x4e0}, {&(0x7f0000010200)="010000000000050040", 0x9, 0x560}, {0x0, 0x0, 0x1000000000c00}, {&(0x7f0000012000)="504d4d00504d4dff", 0x8, 0x10000}], 0x0, &(0x7f0000012b00)) [ 1251.901024] EXT4-fs (loop3): unsupported descriptor size 0 [ 1251.902483] EXT4-fs (loop7): unsupported descriptor size 0 [ 1251.915191] EXT4-fs (loop5): unsupported descriptor size 0 [ 1251.946824] EXT4-fs (loop6): unsupported descriptor size 0 19:31:57 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000500100000f000000000000000000000004000000000002000020000020000000def4655fdef4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000008000000018000000c20500002b0200000000000000000000000000000000000073797a6b616c6c6572000000000000002f746d702f73797a2d696d61676567656e35373134333434333800"/192, 0xc0, 0x400}, {0x0, 0x0, 0x4e0}, {&(0x7f0000010200)="010000000000050040", 0x9, 0x560}, {0x0, 0x0, 0x1000000000c00}, {&(0x7f0000012000)="504d4d00504d4dff", 0x8, 0x10000}], 0x0, &(0x7f0000012b00)) 19:31:57 executing program 7: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000500100000f000000000000000000000004000000000002000020000020000000def4655fdef4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000008000000018000000c20500002b0200000000000000000000000000000000000073797a6b616c6c6572000000000000002f746d702f73797a2d696d61676567656e35373134333434333800"/192, 0xc0, 0x400}, {&(0x7f0000010100)="000000000000000000000000e58ca12e13a240e2b1a22f8d07e8e55f01004000", 0x20, 0x4e0}, {&(0x7f0000010200)="010000000000050040", 0x9, 0x560}, {0x0, 0x0, 0x1000000000c00}, {&(0x7f0000012000)="504d4d00504d4dff", 0x8, 0x10000}], 0x0, &(0x7f0000012b00)) 19:31:57 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000500100000f000000000000000000000004000000000002000020000020000000def4655fdef4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000008000000018000000c20500002b0200000000000000000000000000000000000073797a6b616c6c6572000000000000002f746d702f73797a2d696d61676567656e35373134333434333800"/192, 0xc0, 0x400}, {&(0x7f0000010100)="000000000000000000000000e58ca12e13a240e2b1a22f8d07e8e55f010040", 0x1f}, {&(0x7f0000010200)="010000000000050040", 0x9, 0x560}, {0x0, 0x0, 0x1000000000c00}, {&(0x7f0000012000)="504d4d00504d4dff", 0x8, 0x10000}], 0x0, &(0x7f0000012b00)) 19:31:57 executing program 6: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000500100000f000000000000000000000004000000000002000020000020000000def4655fdef4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000008000000018000000c20500002b0200000000000000000000000000000000000073797a6b616c6c6572000000000000002f746d702f73797a2d696d61676567656e35373134333434333800"/192, 0xc0, 0x400}, {&(0x7f0000010100)="000000000000000000000000e58ca12e13a240e2b1a22f8d07e8e55f01004000", 0x20, 0x4e0}, {&(0x7f0000010200)="010000000000050040", 0x9, 0x560}, {0x0, 0x0, 0x1000000000c00}, {&(0x7f0000012000)="504d4d00504d4dff", 0x8, 0x10000}], 0x0, &(0x7f0000012b00)) [ 1251.997538] EXT4-fs (loop3): unsupported descriptor size 0 [ 1252.001220] EXT4-fs error (device loop7): ext4_fill_super:4947: inode #2: comm syz-executor.7: iget: root inode unallocated [ 1252.004854] EXT4-fs (loop7): get root inode failed [ 1252.005394] EXT4-fs (loop7): mount failed [ 1252.007439] EXT4-fs (loop5): unsupported descriptor size 0 [ 1252.043272] EXT4-fs error (device loop6): ext4_fill_super:4947: inode #2: comm syz-executor.6: iget: root inode unallocated 19:31:57 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000500100000f000000000000000000000004000000000002000020000020000000def4655fdef4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000008000000018000000c20500002b0200000000000000000000000000000000000073797a6b616c6c6572000000000000002f746d702f73797a2d696d61676567656e35373134333434333800"/192, 0xc0, 0x400}, {0x0, 0x0, 0x4e0}, {&(0x7f0000010200)="010000000000050040", 0x9, 0x560}, {0x0, 0x0, 0x1000000000c00}, {&(0x7f0000012000)="504d4d00504d4dff", 0x8, 0x10000}], 0x0, &(0x7f0000012b00)) [ 1252.047037] EXT4-fs (loop6): get root inode failed [ 1252.047575] EXT4-fs (loop6): mount failed 19:31:57 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000500100000f000000000000000000000004000000000002000020000020000000def4655fdef4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000008000000018000000c20500002b0200000000000000000000000000000000000073797a6b616c6c6572000000000000002f746d702f73797a2d696d61676567656e35373134333434333800"/192, 0xc0, 0x400}, {&(0x7f0000010100)="000000000000000000000000e58ca12e13a240e2b1a22f8d07e8e55f010040", 0x1f}, {&(0x7f0000010200)="010000000000050040", 0x9, 0x560}, {0x0, 0x0, 0x1000000000c00}, {&(0x7f0000012000)="504d4d00504d4dff", 0x8, 0x10000}], 0x0, &(0x7f0000012b00)) 19:31:57 executing program 6: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000500100000f000000000000000000000004000000000002000020000020000000def4655fdef4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000008000000018000000c20500002b0200000000000000000000000000000000000073797a6b616c6c6572000000000000002f746d702f73797a2d696d61676567656e35373134333434333800"/192, 0xc0, 0x400}, {&(0x7f0000010100), 0x0, 0x4e0}, {&(0x7f0000010200)="010000000000050040", 0x9, 0x560}, {0x0, 0x0, 0x1000000000c00}, {&(0x7f0000012000)="504d4d00504d4dff", 0x8, 0x10000}], 0x0, &(0x7f0000012b00)) [ 1252.168573] EXT4-fs (loop6): unsupported descriptor size 0 [ 1252.178636] EXT4-fs (loop3): unsupported descriptor size 0 [ 1252.207489] EXT4-fs (loop5): unsupported descriptor size 0 19:32:11 executing program 2: r0 = syz_io_uring_setup(0x21, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, &(0x7f00000a0000)=nil, &(0x7f00000b0000)=nil, &(0x7f0000000180)=0x0, &(0x7f0000002a40)=0x0) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_io_uring_submit(r1, r2, &(0x7f0000000300)=@IORING_OP_OPENAT={0x12, 0x0, 0x0, 0xffffffffffffffff, 0x0, &(0x7f0000000100)='./cgroup/cgroup.procs/file0/../file0\x00'}, 0x0) io_uring_enter(r0, 0x76d3, 0x0, 0x0, 0x0, 0x0) r3 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$netlbl_cipso(&(0x7f0000000000), r3) r4 = syz_io_uring_setup(0x2, &(0x7f0000000500), &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000ff6000/0xa000)=nil, &(0x7f0000000080)=0x0, &(0x7f0000000140)=0x0) syz_io_uring_submit(r5, r6, &(0x7f0000000800)=@IORING_OP_SENDMSG={0x9, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0}, 0x0) r7 = eventfd(0x0) io_uring_register$IORING_REGISTER_EVENTFD(r4, 0x4, &(0x7f0000000000)=r7, 0x1) read$eventfd(r7, &(0x7f0000000040), 0x8) r8 = syz_io_uring_setup(0x3702, &(0x7f00000001c0), &(0x7f0000000000/0x3000)=nil, &(0x7f0000ffe000/0x2000)=nil, &(0x7f0000000140), &(0x7f0000000240)) r9 = dup2(0xffffffffffffffff, r8) r10 = dup2(r4, r9) io_uring_enter(r10, 0x1739, 0x0, 0x0, 0x0, 0x0) 19:32:11 executing program 1: r0 = syz_io_uring_setup(0x2, &(0x7f0000000500), &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000ff6000/0xa000)=nil, 0x0, &(0x7f0000000140)=0x0) r2 = io_uring_setup(0x3ddf, &(0x7f0000000680)) syz_io_uring_submit(0x0, r1, &(0x7f0000000800)=@IORING_OP_SENDMSG={0x9, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0}, 0x0) r3 = eventfd(0x0) io_uring_register$IORING_REGISTER_EVENTFD(r0, 0x4, &(0x7f0000000000)=r3, 0x1) read$eventfd(r3, &(0x7f0000000040), 0x8) r4 = syz_io_uring_setup(0x3702, &(0x7f00000001c0), &(0x7f0000000000/0x3000)=nil, &(0x7f0000ffe000/0x2000)=nil, &(0x7f0000000140), &(0x7f0000000240)) r5 = dup2(r2, r4) r6 = dup2(r0, r5) io_uring_enter(r6, 0x1739, 0x0, 0x0, 0x0, 0x0) 19:32:11 executing program 7: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000500100000f000000000000000000000004000000000002000020000020000000def4655fdef4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000008000000018000000c20500002b0200000000000000000000000000000000000073797a6b616c6c6572000000000000002f746d702f73797a2d696d61676567656e35373134333434333800"/192, 0xc0, 0x400}, {&(0x7f0000010100), 0x0, 0x4e0}, {&(0x7f0000010200)="010000000000050040", 0x9, 0x560}, {0x0, 0x0, 0x1000000000c00}, {&(0x7f0000012000)="504d4d00504d4dff", 0x8, 0x10000}], 0x0, &(0x7f0000012b00)) 19:32:11 executing program 6: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000500100000f000000000000000000000004000000000002000020000020000000def4655fdef4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000008000000018000000c20500002b0200000000000000000000000000000000000073797a6b616c6c6572000000000000002f746d702f73797a2d696d61676567656e35373134333434333800"/192, 0xc0, 0x400}, {&(0x7f0000010100), 0x0, 0x4e0}, {&(0x7f0000010200)="010000000000050040", 0x9, 0x560}, {0x0, 0x0, 0x1000000000c00}, {&(0x7f0000012000)="504d4d00504d4dff", 0x8, 0x10000}], 0x0, &(0x7f0000012b00)) 19:32:11 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000500100000f000000000000000000000004000000000002000020000020000000def4655fdef4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000008000000018000000c20500002b0200000000000000000000000000000000000073797a6b616c6c6572000000000000002f746d702f73797a2d696d61676567656e35373134333434333800"/192, 0xc0, 0x400}, {&(0x7f0000010100), 0x0, 0x4e0}, {&(0x7f0000010200)="010000000000050040", 0x9, 0x560}, {0x0, 0x0, 0x1000000000c00}, {&(0x7f0000012000)="504d4d00504d4dff", 0x8, 0x10000}], 0x0, &(0x7f0000012b00)) 19:32:11 executing program 4: r0 = syz_io_uring_setup(0x2, &(0x7f0000000500), &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000ff6000/0xa000)=nil, &(0x7f0000000080)=0x0, &(0x7f0000000140)=0x0) r3 = io_uring_setup(0x3ddf, &(0x7f0000000680)) syz_io_uring_submit(r1, r2, &(0x7f0000000800)=@IORING_OP_SENDMSG={0x9, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0}, 0x0) r4 = eventfd(0x0) io_uring_register$IORING_REGISTER_EVENTFD(r0, 0x4, &(0x7f0000000000)=r4, 0x1) read$eventfd(r4, &(0x7f0000000040), 0x8) syz_io_uring_setup(0x3702, &(0x7f00000001c0), &(0x7f0000000000/0x3000)=nil, &(0x7f0000ffe000/0x2000)=nil, &(0x7f0000000140), &(0x7f0000000240)) r5 = dup2(r3, 0xffffffffffffffff) r6 = dup2(r0, r5) io_uring_enter(r6, 0x1739, 0x0, 0x0, 0x0, 0x0) 19:32:11 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010100)="000000000000000000000000e58ca12e13a240e2b1a22f8d07e8e55f010040", 0x1f, 0x4e0}, {&(0x7f0000010200)="010000000000050040", 0x9, 0x560}, {0x0, 0x0, 0x1000000000c00}, {&(0x7f0000012000)="504d4d00504d4dff", 0x8, 0x10000}], 0x0, &(0x7f0000012b00)) 19:32:11 executing program 0: r0 = syz_io_uring_setup(0x2, &(0x7f0000000500), &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000ff6000/0xa000)=nil, &(0x7f0000000080)=0x0, &(0x7f0000000140)=0x0) r3 = io_uring_setup(0x3ddf, &(0x7f0000000680)) syz_io_uring_submit(r1, r2, &(0x7f0000000800)=@IORING_OP_SENDMSG={0x9, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0}, 0x0) r4 = eventfd(0x0) io_uring_register$IORING_REGISTER_EVENTFD(r0, 0x4, &(0x7f0000000000)=r4, 0x1) read$eventfd(r4, &(0x7f0000000040), 0x8) r5 = syz_io_uring_setup(0x3702, &(0x7f00000001c0), &(0x7f0000000000/0x3000)=nil, &(0x7f0000ffe000/0x2000)=nil, &(0x7f0000000140), &(0x7f0000000240)) dup2(r3, r5) r6 = dup2(r0, 0xffffffffffffffff) io_uring_enter(r6, 0x1739, 0x0, 0x0, 0x0, 0x0) [ 1265.808598] EXT4-fs (loop6): unsupported descriptor size 0 [ 1265.816973] EXT4-fs (loop5): VFS: Can't find ext4 filesystem [ 1265.824268] EXT4-fs (loop3): unsupported descriptor size 0 [ 1265.825459] EXT4-fs (loop7): unsupported descriptor size 0 19:32:11 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010100)="000000000000000000000000e58ca12e13a240e2b1a22f8d07e8e55f010040", 0x1f, 0x4e0}, {&(0x7f0000010200)="010000000000050040", 0x9, 0x560}, {0x0, 0x0, 0x1000000000c00}, {&(0x7f0000012000)="504d4d00504d4dff", 0x8, 0x10000}], 0x0, &(0x7f0000012b00)) 19:32:11 executing program 7: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000500100000f000000000000000000000004000000000002000020000020000000def4655fdef4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000008000000018000000c20500002b0200000000000000000000000000000000000073797a6b616c6c6572000000000000002f746d702f73797a2d696d61676567656e35373134333434333800"/192, 0xc0, 0x400}, {&(0x7f0000010100), 0x0, 0x4e0}, {&(0x7f0000010200)="010000000000050040", 0x9, 0x560}, {0x0, 0x0, 0x1000000000c00}, {&(0x7f0000012000)="504d4d00504d4dff", 0x8, 0x10000}], 0x0, &(0x7f0000012b00)) 19:32:11 executing program 6: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000500100000f000000000000000000000004000000000002000020000020000000def4655fdef4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000008000000018000000c20500002b0200000000000000000000000000000000000073797a6b616c6c6572000000000000002f746d702f73797a2d696d61676567656e35373134333434333800"/192, 0xc0, 0x400}, {&(0x7f0000010100), 0x0, 0x4e0}, {&(0x7f0000010200)="010000000000050040", 0x9, 0x560}, {0x0, 0x0, 0x1000000000c00}, {&(0x7f0000012000)="504d4d00504d4dff", 0x8, 0x10000}], 0x0, &(0x7f0000012b00)) 19:32:11 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000500100000f000000000000000000000004000000000002000020000020000000def4655fdef4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000008000000018000000c20500002b0200000000000000000000000000000000000073797a6b616c6c6572000000000000002f746d702f73797a2d696d61676567656e35373134333434333800"/192, 0xc0, 0x400}, {&(0x7f0000010100), 0x0, 0x4e0}, {&(0x7f0000010200)="010000000000050040", 0x9, 0x560}, {0x0, 0x0, 0x1000000000c00}, {&(0x7f0000012000)="504d4d00504d4dff", 0x8, 0x10000}], 0x0, &(0x7f0000012b00)) [ 1265.932153] EXT4-fs (loop5): VFS: Can't find ext4 filesystem [ 1265.949436] EXT4-fs (loop7): unsupported descriptor size 0 [ 1265.951404] EXT4-fs (loop3): unsupported descriptor size 0 [ 1265.954898] EXT4-fs (loop6): unsupported descriptor size 0 19:32:11 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010100)="000000000000000000000000e58ca12e13a240e2b1a22f8d07e8e55f010040", 0x1f, 0x4e0}, {&(0x7f0000010200)="010000000000050040", 0x9, 0x560}, {0x0, 0x0, 0x1000000000c00}, {&(0x7f0000012000)="504d4d00504d4dff", 0x8, 0x10000}], 0x0, &(0x7f0000012b00)) 19:32:11 executing program 6: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000500100000f000000000000000000000004000000000002000020000020000000def4655fdef4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000008000000018000000c20500002b0200000000000000000000000000000000000073797a6b616c6c6572000000000000002f746d702f73797a2d696d61676567656e35373134333434333800"/192, 0xc0, 0x400}, {&(0x7f0000010100)="000000000000000000000000e58ca12e", 0x10, 0x4e0}, {&(0x7f0000010200)="010000000000050040", 0x9, 0x560}, {0x0, 0x0, 0x1000000000c00}, {&(0x7f0000012000)="504d4d00504d4dff", 0x8, 0x10000}], 0x0, &(0x7f0000012b00)) 19:32:11 executing program 7: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000500100000f000000000000000000000004000000000002000020000020000000def4655fdef4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000008000000018000000c20500002b0200000000000000000000000000000000000073797a6b616c6c6572000000000000002f746d702f73797a2d696d61676567656e35373134333434333800"/192, 0xc0, 0x400}, {&(0x7f0000010100), 0x0, 0x4e0}, {&(0x7f0000010200)="010000000000050040", 0x9, 0x560}, {0x0, 0x0, 0x1000000000c00}, {&(0x7f0000012000)="504d4d00504d4dff", 0x8, 0x10000}], 0x0, &(0x7f0000012b00)) 19:32:11 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000500100000f000000000000000000000004000000000002000020000020000000def4655fdef4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000008000000018000000c20500002b0200000000000000000000000000000000000073797a6b616c6c6572000000000000002f746d702f73797a2d696d61676567656e35373134333434333800"/192, 0xc0, 0x400}, {&(0x7f0000010100), 0x0, 0x4e0}, {&(0x7f0000010200)="010000000000050040", 0x9, 0x560}, {0x0, 0x0, 0x1000000000c00}, {&(0x7f0000012000)="504d4d00504d4dff", 0x8, 0x10000}], 0x0, &(0x7f0000012b00)) [ 1266.063633] EXT4-fs (loop7): unsupported descriptor size 0 [ 1266.093158] EXT4-fs (loop5): VFS: Can't find ext4 filesystem [ 1266.122508] EXT4-fs (loop6): unsupported descriptor size 0 [ 1266.136242] EXT4-fs (loop3): unsupported descriptor size 0 19:32:23 executing program 2: r0 = syz_io_uring_setup(0x21, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, &(0x7f00000a0000)=nil, &(0x7f00000b0000)=nil, &(0x7f0000000180)=0x0, &(0x7f0000002a40)=0x0) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_io_uring_submit(r1, r2, &(0x7f0000000300)=@IORING_OP_OPENAT={0x12, 0x0, 0x0, 0xffffffffffffffff, 0x0, &(0x7f0000000100)='./cgroup/cgroup.procs/file0/../file0\x00'}, 0x0) io_uring_enter(r0, 0x76d3, 0x0, 0x0, 0x0, 0x0) r3 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$netlbl_cipso(&(0x7f0000000000), r3) r4 = syz_io_uring_setup(0x2, &(0x7f0000000500), &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000ff6000/0xa000)=nil, &(0x7f0000000080)=0x0, &(0x7f0000000140)=0x0) syz_io_uring_submit(r5, r6, &(0x7f0000000800)=@IORING_OP_SENDMSG={0x9, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0}, 0x0) r7 = eventfd(0x0) io_uring_register$IORING_REGISTER_EVENTFD(r4, 0x4, &(0x7f0000000000)=r7, 0x1) read$eventfd(r7, &(0x7f0000000040), 0x8) r8 = syz_io_uring_setup(0x3702, &(0x7f00000001c0), &(0x7f0000000000/0x3000)=nil, &(0x7f0000ffe000/0x2000)=nil, &(0x7f0000000140), &(0x7f0000000240)) r9 = dup2(0xffffffffffffffff, r8) r10 = dup2(r4, r9) io_uring_enter(r10, 0x1739, 0x0, 0x0, 0x0, 0x0) 19:32:23 executing program 6: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000500100000f000000000000000000000004000000000002000020000020000000def4655fdef4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000008000000018000000c20500002b0200000000000000000000000000000000000073797a6b616c6c6572000000000000002f746d702f73797a2d696d61676567656e35373134333434333800"/192, 0xc0, 0x400}, {&(0x7f0000010100)="000000000000000000000000e58ca12e", 0x10, 0x4e0}, {&(0x7f0000010200)="010000000000050040", 0x9, 0x560}, {0x0, 0x0, 0x1000000000c00}, {&(0x7f0000012000)="504d4d00504d4dff", 0x8, 0x10000}], 0x0, &(0x7f0000012b00)) 19:32:23 executing program 0: r0 = syz_io_uring_setup(0x2, &(0x7f0000000500), &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000ff6000/0xa000)=nil, &(0x7f0000000080)=0x0, &(0x7f0000000140)=0x0) r3 = io_uring_setup(0x3ddf, &(0x7f0000000680)) syz_io_uring_submit(r1, r2, &(0x7f0000000800)=@IORING_OP_SENDMSG={0x9, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0}, 0x0) r4 = eventfd(0x0) io_uring_register$IORING_REGISTER_EVENTFD(r0, 0x4, &(0x7f0000000000)=r4, 0x1) read$eventfd(r4, &(0x7f0000000040), 0x8) r5 = syz_io_uring_setup(0x3702, &(0x7f00000001c0), &(0x7f0000000000/0x3000)=nil, &(0x7f0000ffe000/0x2000)=nil, &(0x7f0000000140), &(0x7f0000000240)) dup2(r3, r5) r6 = dup2(r0, 0xffffffffffffffff) io_uring_enter(r6, 0x1739, 0x0, 0x0, 0x0, 0x0) 19:32:23 executing program 7: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000500100000f000000000000000000000004000000000002000020000020000000def4655fdef4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000008000000018000000c20500002b0200000000000000000000000000000000000073797a6b616c6c6572000000000000002f746d702f73797a2d696d61676567656e35373134333434333800"/192, 0xc0, 0x400}, {&(0x7f0000010100)="000000000000000000000000e58ca12e", 0x10, 0x4e0}, {&(0x7f0000010200)="010000000000050040", 0x9, 0x560}, {0x0, 0x0, 0x1000000000c00}, {&(0x7f0000012000)="504d4d00504d4dff", 0x8, 0x10000}], 0x0, &(0x7f0000012b00)) 19:32:23 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x5, &(0x7f0000000200)=[{0x0, 0x0, 0x400}, {&(0x7f0000010100)="000000000000000000000000e58ca12e13a240e2b1a22f8d07e8e55f010040", 0x1f, 0x4e0}, {&(0x7f0000010200)="010000000000050040", 0x9, 0x560}, {0x0, 0x0, 0x1000000000c00}, {&(0x7f0000012000)="504d4d00504d4dff", 0x8, 0x10000}], 0x0, &(0x7f0000012b00)) 19:32:23 executing program 1: r0 = syz_io_uring_setup(0x2, &(0x7f0000000500), &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000ff6000/0xa000)=nil, 0x0, &(0x7f0000000140)=0x0) r2 = io_uring_setup(0x3ddf, &(0x7f0000000680)) syz_io_uring_submit(0x0, r1, &(0x7f0000000800)=@IORING_OP_SENDMSG={0x9, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0}, 0x0) r3 = eventfd(0x0) io_uring_register$IORING_REGISTER_EVENTFD(r0, 0x4, &(0x7f0000000000)=r3, 0x1) read$eventfd(r3, &(0x7f0000000040), 0x8) r4 = syz_io_uring_setup(0x3702, &(0x7f00000001c0), &(0x7f0000000000/0x3000)=nil, &(0x7f0000ffe000/0x2000)=nil, &(0x7f0000000140), &(0x7f0000000240)) r5 = dup2(r2, r4) r6 = dup2(r0, r5) io_uring_enter(r6, 0x1739, 0x0, 0x0, 0x0, 0x0) 19:32:23 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000500100000f000000000000000000000004000000000002000020000020000000def4655fdef4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000008000000018000000c20500002b0200000000000000000000000000000000000073797a6b616c6c6572000000000000002f746d702f73797a2d696d61676567656e35373134333434333800"/192, 0xc0, 0x400}, {&(0x7f0000010100)="000000000000000000000000e58ca12e13a240e2b1a22f8d07e8e55f01004000", 0x20, 0x4e0}, {&(0x7f0000010200)="010000000000050040", 0x9, 0x560}, {0x0, 0x0, 0x1000000000c00}, {&(0x7f0000012000)="504d4d00504d4dff", 0x8, 0x10000}], 0x0, &(0x7f0000012b00)) 19:32:23 executing program 4: r0 = syz_io_uring_setup(0x2, &(0x7f0000000500), &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000ff6000/0xa000)=nil, &(0x7f0000000080)=0x0, &(0x7f0000000140)=0x0) r3 = io_uring_setup(0x3ddf, &(0x7f0000000680)) syz_io_uring_submit(r1, r2, &(0x7f0000000800)=@IORING_OP_SENDMSG={0x9, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0}, 0x0) r4 = eventfd(0x0) io_uring_register$IORING_REGISTER_EVENTFD(r0, 0x4, &(0x7f0000000000)=r4, 0x1) read$eventfd(r4, &(0x7f0000000040), 0x8) r5 = syz_io_uring_setup(0x3702, &(0x7f00000001c0), &(0x7f0000000000/0x3000)=nil, &(0x7f0000ffe000/0x2000)=nil, &(0x7f0000000140), &(0x7f0000000240)) r6 = dup2(r3, r5) r7 = dup2(0xffffffffffffffff, r6) io_uring_enter(r7, 0x1739, 0x0, 0x0, 0x0, 0x0) [ 1278.230773] EXT4-fs (loop5): VFS: Can't find ext4 filesystem [ 1278.264149] EXT4-fs error (device loop3): ext4_fill_super:4947: inode #2: comm syz-executor.3: iget: root inode unallocated [ 1278.267457] EXT4-fs (loop7): unsupported descriptor size 0 [ 1278.272053] EXT4-fs (loop3): get root inode failed [ 1278.273135] EXT4-fs (loop3): mount failed 19:32:23 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x5, &(0x7f0000000200)=[{0x0, 0x0, 0x400}, {&(0x7f0000010100)="000000000000000000000000e58ca12e13a240e2b1a22f8d07e8e55f010040", 0x1f, 0x4e0}, {&(0x7f0000010200)="010000000000050040", 0x9, 0x560}, {0x0, 0x0, 0x1000000000c00}, {&(0x7f0000012000)="504d4d00504d4dff", 0x8, 0x10000}], 0x0, &(0x7f0000012b00)) [ 1278.275474] EXT4-fs (loop6): unsupported descriptor size 0 [ 1278.326012] EXT4-fs (loop5): VFS: Can't find ext4 filesystem 19:32:23 executing program 7: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000500100000f000000000000000000000004000000000002000020000020000000def4655fdef4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000008000000018000000c20500002b0200000000000000000000000000000000000073797a6b616c6c6572000000000000002f746d702f73797a2d696d61676567656e35373134333434333800"/192, 0xc0, 0x400}, {&(0x7f0000010100)="000000000000000000000000e58ca12e", 0x10, 0x4e0}, {&(0x7f0000010200)="010000000000050040", 0x9, 0x560}, {0x0, 0x0, 0x1000000000c00}, {&(0x7f0000012000)="504d4d00504d4dff", 0x8, 0x10000}], 0x0, &(0x7f0000012b00)) 19:32:23 executing program 6: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000500100000f000000000000000000000004000000000002000020000020000000def4655fdef4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000008000000018000000c20500002b0200000000000000000000000000000000000073797a6b616c6c6572000000000000002f746d702f73797a2d696d61676567656e35373134333434333800"/192, 0xc0, 0x400}, {&(0x7f0000010100)="000000000000000000000000e58ca12e", 0x10, 0x4e0}, {&(0x7f0000010200)="010000000000050040", 0x9, 0x560}, {0x0, 0x0, 0x1000000000c00}, {&(0x7f0000012000)="504d4d00504d4dff", 0x8, 0x10000}], 0x0, &(0x7f0000012b00)) 19:32:23 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x5, &(0x7f0000000200)=[{0x0, 0x0, 0x400}, {&(0x7f0000010100)="000000000000000000000000e58ca12e13a240e2b1a22f8d07e8e55f010040", 0x1f, 0x4e0}, {&(0x7f0000010200)="010000000000050040", 0x9, 0x560}, {0x0, 0x0, 0x1000000000c00}, {&(0x7f0000012000)="504d4d00504d4dff", 0x8, 0x10000}], 0x0, &(0x7f0000012b00)) 19:32:23 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000500100000f000000000000000000000004000000000002000020000020000000def4655fdef4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000008000000018000000c20500002b0200000000000000000000000000000000000073797a6b616c6c6572000000000000002f746d702f73797a2d696d61676567656e35373134333434333800"/192, 0xc0, 0x400}, {&(0x7f0000010100), 0x0, 0x4e0}, {&(0x7f0000010200)="010000000000050040", 0x9, 0x560}, {0x0, 0x0, 0x1000000000c00}, {&(0x7f0000012000)="504d4d00504d4dff", 0x8, 0x10000}], 0x0, &(0x7f0000012b00)) [ 1278.391846] EXT4-fs (loop6): unsupported descriptor size 0 [ 1278.406776] EXT4-fs (loop5): VFS: Can't find ext4 filesystem 19:32:23 executing program 6: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000500100000f000000000000000000000004000000000002000020000020000000def4655fdef4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000008000000018000000c20500002b0200000000000000000000000000000000000073797a6b616c6c6572000000000000002f746d702f73797a2d696d61676567656e35373134333434333800"/192, 0xc0, 0x400}, {&(0x7f0000010100)="000000000000000000000000e58ca12e13a240e2b1a22f8d", 0x18, 0x4e0}, {&(0x7f0000010200)="010000000000050040", 0x9, 0x560}, {0x0, 0x0, 0x1000000000c00}, {&(0x7f0000012000)="504d4d00504d4dff", 0x8, 0x10000}], 0x0, &(0x7f0000012b00)) [ 1278.437050] EXT4-fs (loop7): unsupported descriptor size 0 [ 1278.442112] EXT4-fs (loop3): unsupported descriptor size 0 19:32:23 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000), 0x0, 0x400}, {&(0x7f0000010100)="000000000000000000000000e58ca12e13a240e2b1a22f8d07e8e55f010040", 0x1f, 0x4e0}, {&(0x7f0000010200)="010000000000050040", 0x9, 0x560}, {0x0, 0x0, 0x1000000000c00}, {&(0x7f0000012000)="504d4d00504d4dff", 0x8, 0x10000}], 0x0, &(0x7f0000012b00)) 19:32:23 executing program 7: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000500100000f000000000000000000000004000000000002000020000020000000def4655fdef4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000008000000018000000c20500002b0200000000000000000000000000000000000073797a6b616c6c6572000000000000002f746d702f73797a2d696d61676567656e35373134333434333800"/192, 0xc0, 0x400}, {&(0x7f0000010100)="000000000000000000000000e58ca12e", 0x10, 0x4e0}, {&(0x7f0000010200)="010000000000050040", 0x9, 0x560}, {0x0, 0x0, 0x1000000000c00}, {&(0x7f0000012000)="504d4d00504d4dff", 0x8, 0x10000}], 0x0, &(0x7f0000012b00)) [ 1278.525642] EXT4-fs (loop5): VFS: Can't find ext4 filesystem [ 1278.542582] EXT4-fs (loop6): unsupported descriptor size 0 [ 1278.564576] EXT4-fs (loop7): unsupported descriptor size 0 19:32:35 executing program 2: r0 = syz_io_uring_setup(0x21, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, &(0x7f00000a0000)=nil, &(0x7f00000b0000)=nil, &(0x7f0000000180)=0x0, &(0x7f0000002a40)=0x0) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_io_uring_submit(r1, r2, &(0x7f0000000300)=@IORING_OP_OPENAT={0x12, 0x0, 0x0, 0xffffffffffffffff, 0x0, &(0x7f0000000100)='./cgroup/cgroup.procs/file0/../file0\x00'}, 0x0) io_uring_enter(r0, 0x76d3, 0x0, 0x0, 0x0, 0x0) r3 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$netlbl_cipso(&(0x7f0000000000), r3) r4 = io_uring_setup(0x3ddf, &(0x7f0000000680)) syz_io_uring_submit(0x0, 0x0, &(0x7f0000000800)=@IORING_OP_SENDMSG={0x9, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0}, 0x0) r5 = eventfd(0x0) io_uring_register$IORING_REGISTER_EVENTFD(0xffffffffffffffff, 0x4, &(0x7f0000000000)=r5, 0x1) read$eventfd(r5, &(0x7f0000000040), 0x8) r6 = syz_io_uring_setup(0x3702, &(0x7f00000001c0), &(0x7f0000000000/0x3000)=nil, &(0x7f0000ffe000/0x2000)=nil, &(0x7f0000000140), &(0x7f0000000240)) r7 = dup2(r4, r6) r8 = dup2(0xffffffffffffffff, r7) io_uring_enter(r8, 0x1739, 0x0, 0x0, 0x0, 0x0) 19:32:35 executing program 6: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000500100000f000000000000000000000004000000000002000020000020000000def4655fdef4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000008000000018000000c20500002b0200000000000000000000000000000000000073797a6b616c6c6572000000000000002f746d702f73797a2d696d61676567656e35373134333434333800"/192, 0xc0, 0x400}, {&(0x7f0000010100)="000000000000000000000000e58ca12e13a240e2b1a22f8d", 0x18, 0x4e0}, {&(0x7f0000010200)="010000000000050040", 0x9, 0x560}, {0x0, 0x0, 0x1000000000c00}, {&(0x7f0000012000)="504d4d00504d4dff", 0x8, 0x10000}], 0x0, &(0x7f0000012b00)) 19:32:35 executing program 0: r0 = syz_io_uring_setup(0x2, &(0x7f0000000500), &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000ff6000/0xa000)=nil, &(0x7f0000000080)=0x0, &(0x7f0000000140)=0x0) r3 = io_uring_setup(0x3ddf, &(0x7f0000000680)) syz_io_uring_submit(r1, r2, &(0x7f0000000800)=@IORING_OP_SENDMSG={0x9, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0}, 0x0) r4 = eventfd(0x0) io_uring_register$IORING_REGISTER_EVENTFD(r0, 0x4, &(0x7f0000000000)=r4, 0x1) read$eventfd(r4, &(0x7f0000000040), 0x8) r5 = syz_io_uring_setup(0x3702, &(0x7f00000001c0), &(0x7f0000000000/0x3000)=nil, &(0x7f0000ffe000/0x2000)=nil, &(0x7f0000000140), &(0x7f0000000240)) r6 = dup2(r3, r5) dup2(r0, r6) io_uring_enter(0xffffffffffffffff, 0x1739, 0x0, 0x0, 0x0, 0x0) 19:32:35 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000500100000f000000000000000000000004000000000002000020000020000000def4655fdef4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000008000000018000000c20500002b0200000000000000000000000000000000000073797a6b616c6c6572000000000000002f746d702f73797a2d696d61676567656e35373134333434333800"/192, 0xc0, 0x400}, {&(0x7f0000010100), 0x0, 0x4e0}, {&(0x7f0000010200)="010000000000050040", 0x9, 0x560}, {0x0, 0x0, 0x1000000000c00}, {&(0x7f0000012000)="504d4d00504d4dff", 0x8, 0x10000}], 0x0, &(0x7f0000012b00)) 19:32:35 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000), 0x0, 0x400}, {&(0x7f0000010100)="000000000000000000000000e58ca12e13a240e2b1a22f8d07e8e55f010040", 0x1f, 0x4e0}, {&(0x7f0000010200)="010000000000050040", 0x9, 0x560}, {0x0, 0x0, 0x1000000000c00}, {&(0x7f0000012000)="504d4d00504d4dff", 0x8, 0x10000}], 0x0, &(0x7f0000012b00)) 19:32:35 executing program 1: r0 = syz_io_uring_setup(0x2, &(0x7f0000000500), &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000ff6000/0xa000)=nil, 0x0, &(0x7f0000000140)=0x0) r2 = io_uring_setup(0x3ddf, &(0x7f0000000680)) syz_io_uring_submit(0x0, r1, &(0x7f0000000800)=@IORING_OP_SENDMSG={0x9, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0}, 0x0) r3 = eventfd(0x0) io_uring_register$IORING_REGISTER_EVENTFD(r0, 0x4, &(0x7f0000000000)=r3, 0x1) read$eventfd(r3, &(0x7f0000000040), 0x8) r4 = syz_io_uring_setup(0x3702, &(0x7f00000001c0), &(0x7f0000000000/0x3000)=nil, &(0x7f0000ffe000/0x2000)=nil, &(0x7f0000000140), &(0x7f0000000240)) r5 = dup2(r2, r4) r6 = dup2(r0, r5) io_uring_enter(r6, 0x1739, 0x0, 0x0, 0x0, 0x0) 19:32:35 executing program 7: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000500100000f000000000000000000000004000000000002000020000020000000def4655fdef4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000008000000018000000c20500002b0200000000000000000000000000000000000073797a6b616c6c6572000000000000002f746d702f73797a2d696d61676567656e35373134333434333800"/192, 0xc0, 0x400}, {&(0x7f0000010100)="000000000000000000000000e58ca12e13a240e2b1a22f8d", 0x18, 0x4e0}, {&(0x7f0000010200)="010000000000050040", 0x9, 0x560}, {0x0, 0x0, 0x1000000000c00}, {&(0x7f0000012000)="504d4d00504d4dff", 0x8, 0x10000}], 0x0, &(0x7f0000012b00)) 19:32:35 executing program 4: r0 = syz_io_uring_setup(0x2, &(0x7f0000000500), &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000ff6000/0xa000)=nil, &(0x7f0000000080)=0x0, &(0x7f0000000140)=0x0) r3 = io_uring_setup(0x3ddf, &(0x7f0000000680)) syz_io_uring_submit(r1, r2, &(0x7f0000000800)=@IORING_OP_SENDMSG={0x9, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0}, 0x0) r4 = eventfd(0x0) io_uring_register$IORING_REGISTER_EVENTFD(r0, 0x4, &(0x7f0000000000)=r4, 0x1) read$eventfd(r4, &(0x7f0000000040), 0x8) r5 = syz_io_uring_setup(0x3702, &(0x7f00000001c0), &(0x7f0000000000/0x3000)=nil, &(0x7f0000ffe000/0x2000)=nil, &(0x7f0000000140), &(0x7f0000000240)) r6 = dup2(r3, r5) r7 = dup2(0xffffffffffffffff, r6) io_uring_enter(r7, 0x1739, 0x0, 0x0, 0x0, 0x0) [ 1290.195990] EXT4-fs (loop6): unsupported descriptor size 0 [ 1290.209748] EXT4-fs (loop7): unsupported descriptor size 0 [ 1290.211602] EXT4-fs (loop3): unsupported descriptor size 0 [ 1290.234184] EXT4-fs (loop5): VFS: Can't find ext4 filesystem 19:32:35 executing program 7: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000500100000f000000000000000000000004000000000002000020000020000000def4655fdef4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000008000000018000000c20500002b0200000000000000000000000000000000000073797a6b616c6c6572000000000000002f746d702f73797a2d696d61676567656e35373134333434333800"/192, 0xc0, 0x400}, {&(0x7f0000010100)="000000000000000000000000e58ca12e13a240e2b1a22f8d", 0x18, 0x4e0}, {&(0x7f0000010200)="010000000000050040", 0x9, 0x560}, {0x0, 0x0, 0x1000000000c00}, {&(0x7f0000012000)="504d4d00504d4dff", 0x8, 0x10000}], 0x0, &(0x7f0000012b00)) 19:32:35 executing program 6: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000500100000f000000000000000000000004000000000002000020000020000000def4655fdef4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000008000000018000000c20500002b0200000000000000000000000000000000000073797a6b616c6c6572000000000000002f746d702f73797a2d696d61676567656e35373134333434333800"/192, 0xc0, 0x400}, {&(0x7f0000010100)="000000000000000000000000e58ca12e13a240e2b1a22f8d", 0x18, 0x4e0}, {&(0x7f0000010200)="010000000000050040", 0x9, 0x560}, {0x0, 0x0, 0x1000000000c00}, {&(0x7f0000012000)="504d4d00504d4dff", 0x8, 0x10000}], 0x0, &(0x7f0000012b00)) 19:32:35 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000500100000f000000000000000000000004000000000002000020000020000000def4655fdef4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000008000000018000000c20500002b0200000000000000000000000000000000000073797a6b616c6c6572000000000000002f746d702f73797a2d696d61676567656e35373134333434333800"/192, 0xc0, 0x400}, {&(0x7f0000010100), 0x0, 0x4e0}, {&(0x7f0000010200)="010000000000050040", 0x9, 0x560}, {0x0, 0x0, 0x1000000000c00}, {&(0x7f0000012000)="504d4d00504d4dff", 0x8, 0x10000}], 0x0, &(0x7f0000012b00)) 19:32:35 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000), 0x0, 0x400}, {&(0x7f0000010100)="000000000000000000000000e58ca12e13a240e2b1a22f8d07e8e55f010040", 0x1f, 0x4e0}, {&(0x7f0000010200)="010000000000050040", 0x9, 0x560}, {0x0, 0x0, 0x1000000000c00}, {&(0x7f0000012000)="504d4d00504d4dff", 0x8, 0x10000}], 0x0, &(0x7f0000012b00)) [ 1290.313342] EXT4-fs (loop7): unsupported descriptor size 0 19:32:35 executing program 7: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000500100000f000000000000000000000004000000000002000020000020000000def4655fdef4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000008000000018000000c20500002b0200000000000000000000000000000000000073797a6b616c6c6572000000000000002f746d702f73797a2d696d61676567656e35373134333434333800"/192, 0xc0, 0x400}, {&(0x7f0000010100)="000000000000000000000000e58ca12e13a240e2b1a22f8d", 0x18, 0x4e0}, {&(0x7f0000010200)="010000000000050040", 0x9, 0x560}, {0x0, 0x0, 0x1000000000c00}, {&(0x7f0000012000)="504d4d00504d4dff", 0x8, 0x10000}], 0x0, &(0x7f0000012b00)) [ 1290.336266] EXT4-fs (loop6): unsupported descriptor size 0 [ 1290.338946] EXT4-fs (loop3): unsupported descriptor size 0 [ 1290.342128] EXT4-fs (loop5): VFS: Can't find ext4 filesystem 19:32:35 executing program 6: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000500100000f000000000000000000000004000000000002000020000020000000def4655fdef4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000008000000018000000c20500002b0200000000000000000000000000000000000073797a6b616c6c6572000000000000002f746d702f73797a2d696d61676567656e35373134333434333800"/192, 0xc0, 0x400}, {&(0x7f0000010100)="000000000000000000000000e58ca12e13a240e2b1a22f8d07e8e55f", 0x1c, 0x4e0}, {&(0x7f0000010200)="010000000000050040", 0x9, 0x560}, {0x0, 0x0, 0x1000000000c00}, {&(0x7f0000012000)="504d4d00504d4dff", 0x8, 0x10000}], 0x0, &(0x7f0000012b00)) [ 1290.372924] EXT4-fs (loop6): unsupported descriptor size 0 [ 1290.391775] EXT4-fs (loop7): unsupported descriptor size 0 19:32:48 executing program 6: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000500100000f000000000000000000000004000000000002000020000020000000def4655fdef4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000008000000018000000c20500002b0200000000000000000000000000000000000073797a6b616c6c6572000000000000002f746d702f73797a2d696d61676567656e35373134333434333800"/192, 0xc0, 0x400}, {&(0x7f0000010100)="000000000000000000000000e58ca12e13a240e2b1a22f8d07e8e55f", 0x1c, 0x4e0}, {&(0x7f0000010200)="010000000000050040", 0x9, 0x560}, {0x0, 0x0, 0x1000000000c00}, {&(0x7f0000012000)="504d4d00504d4dff", 0x8, 0x10000}], 0x0, &(0x7f0000012b00)) 19:32:48 executing program 4: r0 = syz_io_uring_setup(0x2, &(0x7f0000000500), &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000ff6000/0xa000)=nil, &(0x7f0000000080)=0x0, &(0x7f0000000140)=0x0) r3 = io_uring_setup(0x3ddf, &(0x7f0000000680)) syz_io_uring_submit(r1, r2, &(0x7f0000000800)=@IORING_OP_SENDMSG={0x9, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0}, 0x0) r4 = eventfd(0x0) io_uring_register$IORING_REGISTER_EVENTFD(r0, 0x4, &(0x7f0000000000)=r4, 0x1) read$eventfd(r4, &(0x7f0000000040), 0x8) r5 = syz_io_uring_setup(0x3702, &(0x7f00000001c0), &(0x7f0000000000/0x3000)=nil, &(0x7f0000ffe000/0x2000)=nil, &(0x7f0000000140), &(0x7f0000000240)) r6 = dup2(r3, r5) r7 = dup2(0xffffffffffffffff, r6) io_uring_enter(r7, 0x1739, 0x0, 0x0, 0x0, 0x0) 19:32:48 executing program 0: r0 = syz_io_uring_setup(0x2, &(0x7f0000000500), &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000ff6000/0xa000)=nil, &(0x7f0000000080)=0x0, &(0x7f0000000140)=0x0) r3 = io_uring_setup(0x3ddf, &(0x7f0000000680)) syz_io_uring_submit(r1, r2, &(0x7f0000000800)=@IORING_OP_SENDMSG={0x9, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0}, 0x0) r4 = eventfd(0x0) io_uring_register$IORING_REGISTER_EVENTFD(r0, 0x4, &(0x7f0000000000)=r4, 0x1) read$eventfd(r4, &(0x7f0000000040), 0x8) r5 = syz_io_uring_setup(0x3702, &(0x7f00000001c0), &(0x7f0000000000/0x3000)=nil, &(0x7f0000ffe000/0x2000)=nil, &(0x7f0000000140), &(0x7f0000000240)) r6 = dup2(r3, r5) dup2(r0, r6) io_uring_enter(0xffffffffffffffff, 0x1739, 0x0, 0x0, 0x0, 0x0) 19:32:48 executing program 7: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000500100000f000000000000000000000004000000000002000020000020000000def4655fdef4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000008000000018000000c20500002b0200000000000000000000000000000000000073797a6b616c6c6572000000000000002f746d702f73797a2d696d61676567656e35373134333434333800"/192, 0xc0, 0x400}, {&(0x7f0000010100)="000000000000000000000000e58ca12e13a240e2b1a22f8d07e8e55f", 0x1c, 0x4e0}, {&(0x7f0000010200)="010000000000050040", 0x9, 0x560}, {0x0, 0x0, 0x1000000000c00}, {&(0x7f0000012000)="504d4d00504d4dff", 0x8, 0x10000}], 0x0, &(0x7f0000012b00)) 19:32:48 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000500100000f000000000000000000000004000000000002000020000020000000def4655fdef4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000008000000018000000c20500002b0200000000000000000000000000000000000073797a6b616c6c6572000000000000002f746d702f73797a2d696d61676567656e35373134333434333800"/192, 0xc0, 0x400}, {&(0x7f0000010100)="000000000000000000000000e58ca12e", 0x10, 0x4e0}, {&(0x7f0000010200)="010000000000050040", 0x9, 0x560}, {0x0, 0x0, 0x1000000000c00}, {&(0x7f0000012000)="504d4d00504d4dff", 0x8, 0x10000}], 0x0, &(0x7f0000012b00)) 19:32:48 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000500100000f000000000000000000000004000000000002000020000020000000def4655fdef4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000008000000018000000", 0x60, 0x400}, {&(0x7f0000010100)="000000000000000000000000e58ca12e13a240e2b1a22f8d07e8e55f010040", 0x1f, 0x4e0}, {&(0x7f0000010200)="010000000000050040", 0x9, 0x560}, {0x0, 0x0, 0x1000000000c00}, {&(0x7f0000012000)="504d4d00504d4dff", 0x8, 0x10000}], 0x0, &(0x7f0000012b00)) 19:32:48 executing program 2: r0 = syz_io_uring_setup(0x21, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, &(0x7f00000a0000)=nil, &(0x7f00000b0000)=nil, &(0x7f0000000180)=0x0, &(0x7f0000002a40)=0x0) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_io_uring_submit(r1, r2, &(0x7f0000000300)=@IORING_OP_OPENAT={0x12, 0x0, 0x0, 0xffffffffffffffff, 0x0, &(0x7f0000000100)='./cgroup/cgroup.procs/file0/../file0\x00'}, 0x0) io_uring_enter(r0, 0x76d3, 0x0, 0x0, 0x0, 0x0) r3 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$netlbl_cipso(&(0x7f0000000000), r3) r4 = io_uring_setup(0x3ddf, &(0x7f0000000680)) syz_io_uring_submit(0x0, 0x0, &(0x7f0000000800)=@IORING_OP_SENDMSG={0x9, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0}, 0x0) r5 = eventfd(0x0) io_uring_register$IORING_REGISTER_EVENTFD(0xffffffffffffffff, 0x4, &(0x7f0000000000)=r5, 0x1) read$eventfd(r5, &(0x7f0000000040), 0x8) r6 = syz_io_uring_setup(0x3702, &(0x7f00000001c0), &(0x7f0000000000/0x3000)=nil, &(0x7f0000ffe000/0x2000)=nil, &(0x7f0000000140), &(0x7f0000000240)) r7 = dup2(r4, r6) r8 = dup2(0xffffffffffffffff, r7) io_uring_enter(r8, 0x1739, 0x0, 0x0, 0x0, 0x0) 19:32:48 executing program 1: r0 = syz_io_uring_setup(0x2, &(0x7f0000000500), &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000ff6000/0xa000)=nil, &(0x7f0000000080)=0x0, 0x0) r2 = io_uring_setup(0x3ddf, &(0x7f0000000680)) syz_io_uring_submit(r1, 0x0, &(0x7f0000000800)=@IORING_OP_SENDMSG={0x9, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0}, 0x0) r3 = eventfd(0x0) io_uring_register$IORING_REGISTER_EVENTFD(r0, 0x4, &(0x7f0000000000)=r3, 0x1) read$eventfd(r3, &(0x7f0000000040), 0x8) r4 = syz_io_uring_setup(0x3702, &(0x7f00000001c0), &(0x7f0000000000/0x3000)=nil, &(0x7f0000ffe000/0x2000)=nil, &(0x7f0000000140), &(0x7f0000000240)) r5 = dup2(r2, r4) r6 = dup2(r0, r5) io_uring_enter(r6, 0x1739, 0x0, 0x0, 0x0, 0x0) [ 1303.216475] EXT4-fs (loop3): unsupported descriptor size 0 [ 1303.219990] EXT4-fs (loop7): unsupported descriptor size 0 [ 1303.244099] EXT4-fs (loop6): unsupported descriptor size 0 [ 1303.253584] EXT4-fs (loop5): fragment/cluster size (16384) != block size (1024) 19:32:48 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000500100000f000000000000000000000004000000000002000020000020000000def4655fdef4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000008000000018000000c20500002b0200000000000000000000000000000000000073797a6b616c6c6572000000000000002f746d702f73797a2d696d61676567656e35373134333434333800"/192, 0xc0, 0x400}, {&(0x7f0000010100)="000000000000000000000000e58ca12e", 0x10, 0x4e0}, {&(0x7f0000010200)="010000000000050040", 0x9, 0x560}, {0x0, 0x0, 0x1000000000c00}, {&(0x7f0000012000)="504d4d00504d4dff", 0x8, 0x10000}], 0x0, &(0x7f0000012b00)) 19:32:48 executing program 7: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000500100000f000000000000000000000004000000000002000020000020000000def4655fdef4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000008000000018000000c20500002b0200000000000000000000000000000000000073797a6b616c6c6572000000000000002f746d702f73797a2d696d61676567656e35373134333434333800"/192, 0xc0, 0x400}, {&(0x7f0000010100)="000000000000000000000000e58ca12e13a240e2b1a22f8d07e8e55f", 0x1c, 0x4e0}, {&(0x7f0000010200)="010000000000050040", 0x9, 0x560}, {0x0, 0x0, 0x1000000000c00}, {&(0x7f0000012000)="504d4d00504d4dff", 0x8, 0x10000}], 0x0, &(0x7f0000012b00)) 19:32:48 executing program 6: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000500100000f000000000000000000000004000000000002000020000020000000def4655fdef4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000008000000018000000c20500002b0200000000000000000000000000000000000073797a6b616c6c6572000000000000002f746d702f73797a2d696d61676567656e35373134333434333800"/192, 0xc0, 0x400}, {&(0x7f0000010100)="000000000000000000000000e58ca12e13a240e2b1a22f8d07e8e55f", 0x1c, 0x4e0}, {&(0x7f0000010200)="010000000000050040", 0x9, 0x560}, {0x0, 0x0, 0x1000000000c00}, {&(0x7f0000012000)="504d4d00504d4dff", 0x8, 0x10000}], 0x0, &(0x7f0000012b00)) 19:32:48 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000500100000f000000000000000000000004000000000002000020000020000000def4655fdef4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000008000000018000000", 0x60, 0x400}, {&(0x7f0000010100)="000000000000000000000000e58ca12e13a240e2b1a22f8d07e8e55f010040", 0x1f, 0x4e0}, {&(0x7f0000010200)="010000000000050040", 0x9, 0x560}, {0x0, 0x0, 0x1000000000c00}, {&(0x7f0000012000)="504d4d00504d4dff", 0x8, 0x10000}], 0x0, &(0x7f0000012b00)) [ 1303.331550] EXT4-fs (loop3): unsupported descriptor size 0 [ 1303.346797] EXT4-fs (loop7): unsupported descriptor size 0 [ 1303.353838] EXT4-fs (loop6): unsupported descriptor size 0 19:32:48 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000500100000f000000000000000000000004000000000002000020000020000000def4655fdef4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000008000000018000000c20500002b0200000000000000000000000000000000000073797a6b616c6c6572000000000000002f746d702f73797a2d696d61676567656e35373134333434333800"/192, 0xc0, 0x400}, {&(0x7f0000010100)="000000000000000000000000e58ca12e", 0x10, 0x4e0}, {&(0x7f0000010200)="010000000000050040", 0x9, 0x560}, {0x0, 0x0, 0x1000000000c00}, {&(0x7f0000012000)="504d4d00504d4dff", 0x8, 0x10000}], 0x0, &(0x7f0000012b00)) [ 1303.399597] EXT4-fs (loop5): fragment/cluster size (16384) != block size (1024) 19:32:48 executing program 7: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000500100000f000000000000000000000004000000000002000020000020000000def4655fdef4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000008000000018000000c20500002b0200000000000000000000000000000000000073797a6b616c6c6572000000000000002f746d702f73797a2d696d61676567656e35373134333434333800"/192, 0xc0, 0x400}, {&(0x7f0000010100)="000000000000000000000000e58ca12e13a240e2b1a22f8d07e8e55f", 0x1c, 0x4e0}, {&(0x7f0000010200)="010000000000050040", 0x9, 0x560}, {0x0, 0x0, 0x1000000000c00}, {&(0x7f0000012000)="504d4d00504d4dff", 0x8, 0x10000}], 0x0, &(0x7f0000012b00)) 19:32:48 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000500100000f000000000000000000000004000000000002000020000020000000def4655fdef4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000008000000018000000", 0x60, 0x400}, {&(0x7f0000010100)="000000000000000000000000e58ca12e13a240e2b1a22f8d07e8e55f010040", 0x1f, 0x4e0}, {&(0x7f0000010200)="010000000000050040", 0x9, 0x560}, {0x0, 0x0, 0x1000000000c00}, {&(0x7f0000012000)="504d4d00504d4dff", 0x8, 0x10000}], 0x0, &(0x7f0000012b00)) 19:32:48 executing program 6: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000500100000f000000000000000000000004000000000002000020000020000000def4655fdef4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000008000000018000000c20500002b0200000000000000000000000000000000000073797a6b616c6c6572000000000000002f746d702f73797a2d696d61676567656e35373134333434333800"/192, 0xc0, 0x400}, {&(0x7f0000010100)="000000000000000000000000e58ca12e13a240e2b1a22f8d07e8e55f0100", 0x1e, 0x4e0}, {&(0x7f0000010200)="010000000000050040", 0x9, 0x560}, {0x0, 0x0, 0x1000000000c00}, {&(0x7f0000012000)="504d4d00504d4dff", 0x8, 0x10000}], 0x0, &(0x7f0000012b00)) [ 1303.465525] EXT4-fs (loop7): unsupported descriptor size 0 [ 1303.481623] EXT4-fs (loop5): fragment/cluster size (16384) != block size (1024) [ 1303.493064] EXT4-fs (loop3): unsupported descriptor size 0 19:32:48 executing program 7: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000500100000f000000000000000000000004000000000002000020000020000000def4655fdef4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000008000000018000000c20500002b0200000000000000000000000000000000000073797a6b616c6c6572000000000000002f746d702f73797a2d696d61676567656e35373134333434333800"/192, 0xc0, 0x400}, {&(0x7f0000010100)="000000000000000000000000e58ca12e13a240e2b1a22f8d07e8e55f0100", 0x1e, 0x4e0}, {&(0x7f0000010200)="010000000000050040", 0x9, 0x560}, {0x0, 0x0, 0x1000000000c00}, {&(0x7f0000012000)="504d4d00504d4dff", 0x8, 0x10000}], 0x0, &(0x7f0000012b00)) [ 1303.522538] EXT4-fs (loop6): unsupported descriptor size 0 [ 1303.573304] EXT4-fs (loop7): unsupported descriptor size 0 19:33:01 executing program 6: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000500100000f000000000000000000000004000000000002000020000020000000def4655fdef4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000008000000018000000c20500002b0200000000000000000000000000000000000073797a6b616c6c6572000000000000002f746d702f73797a2d696d61676567656e35373134333434333800"/192, 0xc0, 0x400}, {&(0x7f0000010100)="000000000000000000000000e58ca12e13a240e2b1a22f8d07e8e55f0100", 0x1e, 0x4e0}, {&(0x7f0000010200)="010000000000050040", 0x9, 0x560}, {0x0, 0x0, 0x1000000000c00}, {&(0x7f0000012000)="504d4d00504d4dff", 0x8, 0x10000}], 0x0, &(0x7f0000012b00)) 19:33:01 executing program 2: r0 = syz_io_uring_setup(0x21, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, &(0x7f00000a0000)=nil, &(0x7f00000b0000)=nil, &(0x7f0000000180)=0x0, &(0x7f0000002a40)=0x0) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_io_uring_submit(r1, r2, &(0x7f0000000300)=@IORING_OP_OPENAT={0x12, 0x0, 0x0, 0xffffffffffffffff, 0x0, &(0x7f0000000100)='./cgroup/cgroup.procs/file0/../file0\x00'}, 0x0) io_uring_enter(r0, 0x76d3, 0x0, 0x0, 0x0, 0x0) r3 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$netlbl_cipso(&(0x7f0000000000), r3) r4 = io_uring_setup(0x3ddf, &(0x7f0000000680)) syz_io_uring_submit(0x0, 0x0, &(0x7f0000000800)=@IORING_OP_SENDMSG={0x9, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0}, 0x0) r5 = eventfd(0x0) io_uring_register$IORING_REGISTER_EVENTFD(0xffffffffffffffff, 0x4, &(0x7f0000000000)=r5, 0x1) read$eventfd(r5, &(0x7f0000000040), 0x8) r6 = syz_io_uring_setup(0x3702, &(0x7f00000001c0), &(0x7f0000000000/0x3000)=nil, &(0x7f0000ffe000/0x2000)=nil, &(0x7f0000000140), &(0x7f0000000240)) r7 = dup2(r4, r6) r8 = dup2(0xffffffffffffffff, r7) io_uring_enter(r8, 0x1739, 0x0, 0x0, 0x0, 0x0) 19:33:01 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000500100000f000000000000000000000004000000000002000020000020000000def4655fdef4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000008000000018000000c20500002b0200000000000000000000000000000000000073797a6b616c6c6572000000000000002f746d702f73797a", 0x90, 0x400}, {&(0x7f0000010100)="000000000000000000000000e58ca12e13a240e2b1a22f8d07e8e55f010040", 0x1f, 0x4e0}, {&(0x7f0000010200)="010000000000050040", 0x9, 0x560}, {0x0, 0x0, 0x1000000000c00}, {&(0x7f0000012000)="504d4d00504d4dff", 0x8, 0x10000}], 0x0, &(0x7f0000012b00)) 19:33:01 executing program 7: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000500100000f000000000000000000000004000000000002000020000020000000def4655fdef4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000008000000018000000c20500002b0200000000000000000000000000000000000073797a6b616c6c6572000000000000002f746d702f73797a2d696d61676567656e35373134333434333800"/192, 0xc0, 0x400}, {&(0x7f0000010100)="000000000000000000000000e58ca12e13a240e2b1a22f8d07e8e55f0100", 0x1e, 0x4e0}, {&(0x7f0000010200)="010000000000050040", 0x9, 0x560}, {0x0, 0x0, 0x1000000000c00}, {&(0x7f0000012000)="504d4d00504d4dff", 0x8, 0x10000}], 0x0, &(0x7f0000012b00)) 19:33:01 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000500100000f000000000000000000000004000000000002000020000020000000def4655fdef4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000008000000018000000c20500002b0200000000000000000000000000000000000073797a6b616c6c6572000000000000002f746d702f73797a2d696d61676567656e35373134333434333800"/192, 0xc0, 0x400}, {&(0x7f0000010100)="000000000000000000000000e58ca12e13a240e2b1a22f8d", 0x18, 0x4e0}, {&(0x7f0000010200)="010000000000050040", 0x9, 0x560}, {0x0, 0x0, 0x1000000000c00}, {&(0x7f0000012000)="504d4d00504d4dff", 0x8, 0x10000}], 0x0, &(0x7f0000012b00)) 19:33:01 executing program 0: r0 = syz_io_uring_setup(0x2, &(0x7f0000000500), &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000ff6000/0xa000)=nil, &(0x7f0000000080)=0x0, &(0x7f0000000140)=0x0) r3 = io_uring_setup(0x3ddf, &(0x7f0000000680)) syz_io_uring_submit(r1, r2, &(0x7f0000000800)=@IORING_OP_SENDMSG={0x9, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0}, 0x0) r4 = eventfd(0x0) io_uring_register$IORING_REGISTER_EVENTFD(r0, 0x4, &(0x7f0000000000)=r4, 0x1) read$eventfd(r4, &(0x7f0000000040), 0x8) r5 = syz_io_uring_setup(0x3702, &(0x7f00000001c0), &(0x7f0000000000/0x3000)=nil, &(0x7f0000ffe000/0x2000)=nil, &(0x7f0000000140), &(0x7f0000000240)) r6 = dup2(r3, r5) dup2(r0, r6) io_uring_enter(0xffffffffffffffff, 0x1739, 0x0, 0x0, 0x0, 0x0) 19:33:01 executing program 1: r0 = syz_io_uring_setup(0x2, &(0x7f0000000500), &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000ff6000/0xa000)=nil, &(0x7f0000000080)=0x0, 0x0) r2 = io_uring_setup(0x3ddf, &(0x7f0000000680)) syz_io_uring_submit(r1, 0x0, &(0x7f0000000800)=@IORING_OP_SENDMSG={0x9, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0}, 0x0) r3 = eventfd(0x0) io_uring_register$IORING_REGISTER_EVENTFD(r0, 0x4, &(0x7f0000000000)=r3, 0x1) read$eventfd(r3, &(0x7f0000000040), 0x8) r4 = syz_io_uring_setup(0x3702, &(0x7f00000001c0), &(0x7f0000000000/0x3000)=nil, &(0x7f0000ffe000/0x2000)=nil, &(0x7f0000000140), &(0x7f0000000240)) r5 = dup2(r2, r4) r6 = dup2(r0, r5) io_uring_enter(r6, 0x1739, 0x0, 0x0, 0x0, 0x0) 19:33:01 executing program 4: r0 = syz_io_uring_setup(0x2, &(0x7f0000000500), &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000ff6000/0xa000)=nil, &(0x7f0000000080)=0x0, &(0x7f0000000140)=0x0) r3 = io_uring_setup(0x3ddf, &(0x7f0000000680)) syz_io_uring_submit(r1, r2, &(0x7f0000000800)=@IORING_OP_SENDMSG={0x9, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0}, 0x0) r4 = eventfd(0x0) io_uring_register$IORING_REGISTER_EVENTFD(r0, 0x4, &(0x7f0000000000)=r4, 0x1) read$eventfd(r4, &(0x7f0000000040), 0x8) r5 = syz_io_uring_setup(0x3702, &(0x7f00000001c0), &(0x7f0000000000/0x3000)=nil, &(0x7f0000ffe000/0x2000)=nil, &(0x7f0000000140), &(0x7f0000000240)) dup2(r3, r5) r6 = dup2(r0, 0xffffffffffffffff) io_uring_enter(r6, 0x1739, 0x0, 0x0, 0x0, 0x0) [ 1316.040020] EXT4-fs (loop6): unsupported descriptor size 0 [ 1316.042643] EXT4-fs (loop3): unsupported descriptor size 0 [ 1316.056884] EXT4-fs (loop7): unsupported descriptor size 0 [ 1316.086381] EXT4-fs error (device loop5): ext4_fill_super:4947: inode #2: comm syz-executor.5: iget: root inode unallocated [ 1316.088335] EXT4-fs (loop5): get root inode failed [ 1316.089122] EXT4-fs (loop5): mount failed 19:33:01 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000500100000f000000000000000000000004000000000002000020000020000000def4655fdef4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000008000000018000000c20500002b0200000000000000000000000000000000000073797a6b616c6c6572000000000000002f746d702f73797a2d696d61676567656e35373134333434333800"/192, 0xc0, 0x400}, {&(0x7f0000010100)="000000000000000000000000e58ca12e13a240e2b1a22f8d", 0x18, 0x4e0}, {&(0x7f0000010200)="010000000000050040", 0x9, 0x560}, {0x0, 0x0, 0x1000000000c00}, {&(0x7f0000012000)="504d4d00504d4dff", 0x8, 0x10000}], 0x0, &(0x7f0000012b00)) 19:33:01 executing program 7: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000500100000f000000000000000000000004000000000002000020000020000000def4655fdef4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000008000000018000000c20500002b0200000000000000000000000000000000000073797a6b616c6c6572000000000000002f746d702f73797a2d696d61676567656e35373134333434333800"/192, 0xc0, 0x400}, {&(0x7f0000010100)="000000000000000000000000e58ca12e13a240e2b1a22f8d07e8e55f0100", 0x1e, 0x4e0}, {&(0x7f0000010200)="010000000000050040", 0x9, 0x560}, {0x0, 0x0, 0x1000000000c00}, {&(0x7f0000012000)="504d4d00504d4dff", 0x8, 0x10000}], 0x0, &(0x7f0000012b00)) 19:33:01 executing program 6: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000500100000f000000000000000000000004000000000002000020000020000000def4655fdef4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000008000000018000000c20500002b0200000000000000000000000000000000000073797a6b616c6c6572000000000000002f746d702f73797a2d696d61676567656e35373134333434333800"/192, 0xc0, 0x400}, {&(0x7f0000010100)="000000000000000000000000e58ca12e13a240e2b1a22f8d07e8e55f0100", 0x1e, 0x4e0}, {&(0x7f0000010200)="010000000000050040", 0x9, 0x560}, {0x0, 0x0, 0x1000000000c00}, {&(0x7f0000012000)="504d4d00504d4dff", 0x8, 0x10000}], 0x0, &(0x7f0000012b00)) [ 1316.127055] EXT4-fs (loop7): unsupported descriptor size 0 19:33:01 executing program 7: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000500100000f000000000000000000000004000000000002000020000020000000def4655fdef4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000008000000018000000c20500002b0200000000000000000000000000000000000073797a6b616c6c6572000000000000002f746d702f73797a2d696d61676567656e35373134333434333800"/192, 0xc0, 0x400}, {&(0x7f0000010100)="000000000000000000000000e58ca12e13a240e2b1a22f8d07e8e55f010040", 0x1f, 0x4e0}, {&(0x7f0000010200)="010000000000050040", 0x9, 0x560}, {0x0, 0x0, 0x1000000000c00}, {&(0x7f0000012000)="504d4d00504d4dff", 0x8, 0x10000}], 0x0, &(0x7f0000012b00)) 19:33:01 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000500100000f000000000000000000000004000000000002000020000020000000def4655fdef4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000008000000018000000", 0x60, 0x400}, {&(0x7f0000010100)="000000000000000000000000e58ca12e13a240e2b1a22f8d07e8e55f010040", 0x1f, 0x4e0}, {&(0x7f0000010200)="010000000000050040", 0x9, 0x560}, {0x0, 0x0, 0x1000000000c00}, {&(0x7f0000012000)="504d4d00504d4dff", 0x8, 0x10000}], 0x0, &(0x7f0000012b00)) [ 1316.180026] EXT4-fs (loop3): unsupported descriptor size 0 [ 1316.210975] EXT4-fs (loop6): unsupported descriptor size 0 [ 1316.219414] EXT4-fs (loop5): fragment/cluster size (16384) != block size (1024) 19:33:01 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000500100000f000000000000000000000004000000000002000020000020000000def4655fdef4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000008000000018000000c20500002b0200000000000000000000000000000000000073797a6b616c6c6572000000000000002f746d702f73797a2d696d61676567656e35373134333434333800"/192, 0xc0, 0x400}, {&(0x7f0000010100)="000000000000000000000000e58ca12e13a240e2b1a22f8d", 0x18, 0x4e0}, {&(0x7f0000010200)="010000000000050040", 0x9, 0x560}, {0x0, 0x0, 0x1000000000c00}, {&(0x7f0000012000)="504d4d00504d4dff", 0x8, 0x10000}], 0x0, &(0x7f0000012b00)) [ 1316.248425] EXT4-fs error (device loop7): ext4_fill_super:4947: inode #2: comm syz-executor.7: iget: root inode unallocated [ 1316.251427] EXT4-fs (loop7): get root inode failed [ 1316.252216] EXT4-fs (loop7): mount failed 19:33:01 executing program 6: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000500100000f000000000000000000000004000000000002000020000020000000def4655fdef4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000008000000018000000c20500002b0200000000000000000000000000000000000073797a6b616c6c6572000000000000002f746d702f73797a2d696d61676567656e35373134333434333800"/192, 0xc0, 0x400}, {&(0x7f0000010100)="000000000000000000000000e58ca12e13a240e2b1a22f8d07e8e55f010040", 0x1f, 0x4e0}, {&(0x7f0000010200)="010000000000050040", 0x9, 0x560}, {0x0, 0x0, 0x1000000000c00}, {&(0x7f0000012000)="504d4d00504d4dff", 0x8, 0x10000}], 0x0, &(0x7f0000012b00)) 19:33:01 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000500100000f000000000000000000000004000000000002000020000020000000def4655fdef4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000008000000018000000", 0x60, 0x400}, {&(0x7f0000010100)="000000000000000000000000e58ca12e13a240e2b1a22f8d07e8e55f010040", 0x1f, 0x4e0}, {&(0x7f0000010200)="010000000000050040", 0x9, 0x560}, {0x0, 0x0, 0x1000000000c00}, {&(0x7f0000012000)="504d4d00504d4dff", 0x8, 0x10000}], 0x0, &(0x7f0000012b00)) [ 1316.289563] EXT4-fs error (device loop6): ext4_fill_super:4947: inode #2: comm syz-executor.6: iget: root inode unallocated [ 1316.291859] EXT4-fs (loop6): get root inode failed [ 1316.292639] EXT4-fs (loop6): mount failed [ 1316.299024] EXT4-fs (loop3): unsupported descriptor size 0 19:33:01 executing program 7: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000500100000f000000000000000000000004000000000002000020000020000000def4655fdef4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000008000000018000000c20500002b0200000000000000000000000000000000000073797a6b616c6c6572000000000000002f746d702f73797a2d696d61676567656e35373134333434333800"/192, 0xc0, 0x400}, {&(0x7f0000010100)="000000000000000000000000e58ca12e13a240e2b1a22f8d07e8e55f0100", 0x1e, 0x4e0}, {&(0x7f0000010200)="010000000000050040", 0x9, 0x560}, {0x0, 0x0, 0x1000000000c00}, {&(0x7f0000012000)="504d4d00504d4dff", 0x8, 0x10000}], 0x0, &(0x7f0000012b00)) [ 1316.353846] EXT4-fs (loop5): fragment/cluster size (16384) != block size (1024) [ 1316.362358] EXT4-fs (loop7): unsupported descriptor size 0 19:33:12 executing program 0: r0 = syz_io_uring_setup(0x2, &(0x7f0000000500), &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000ff6000/0xa000)=nil, &(0x7f0000000080)=0x0, &(0x7f0000000140)=0x0) r3 = io_uring_setup(0x3ddf, &(0x7f0000000680)) syz_io_uring_submit(r1, r2, &(0x7f0000000800)=@IORING_OP_SENDMSG={0x9, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0}, 0x0) r4 = eventfd(0x0) io_uring_register$IORING_REGISTER_EVENTFD(r0, 0x4, &(0x7f0000000000)=r4, 0x1) read$eventfd(r4, &(0x7f0000000040), 0x8) r5 = syz_io_uring_setup(0x3702, &(0x7f00000001c0), &(0x7f0000000000/0x3000)=nil, &(0x7f0000ffe000/0x2000)=nil, &(0x7f0000000140), &(0x7f0000000240)) r6 = dup2(r3, r5) r7 = dup2(r0, r6) io_uring_enter(r7, 0x0, 0x0, 0x0, 0x0, 0x0) 19:33:12 executing program 4: r0 = syz_io_uring_setup(0x2, &(0x7f0000000500), &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000ff6000/0xa000)=nil, &(0x7f0000000080)=0x0, &(0x7f0000000140)=0x0) r3 = io_uring_setup(0x3ddf, &(0x7f0000000680)) syz_io_uring_submit(r1, r2, &(0x7f0000000800)=@IORING_OP_SENDMSG={0x9, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0}, 0x0) r4 = eventfd(0x0) io_uring_register$IORING_REGISTER_EVENTFD(r0, 0x4, &(0x7f0000000000)=r4, 0x1) read$eventfd(r4, &(0x7f0000000040), 0x8) r5 = syz_io_uring_setup(0x3702, &(0x7f00000001c0), &(0x7f0000000000/0x3000)=nil, &(0x7f0000ffe000/0x2000)=nil, &(0x7f0000000140), &(0x7f0000000240)) dup2(r3, r5) r6 = dup2(r0, 0xffffffffffffffff) io_uring_enter(r6, 0x1739, 0x0, 0x0, 0x0, 0x0) 19:33:12 executing program 6: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000500100000f000000000000000000000004000000000002000020000020000000def4655fdef4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000008000000018000000c20500002b0200000000000000000000000000000000000073797a6b616c6c6572000000000000002f746d702f73797a2d696d61676567656e35373134333434333800"/192, 0xc0, 0x400}, {&(0x7f0000010100)="000000000000000000000000e58ca12e13a240e2b1a22f8d07e8e55f0100", 0x1e, 0x4e0}, {&(0x7f0000010200)="010000000000050040", 0x9, 0x560}, {0x0, 0x0, 0x1000000000c00}, {&(0x7f0000012000)="504d4d00504d4dff", 0x8, 0x10000}], 0x0, &(0x7f0000012b00)) 19:33:12 executing program 7: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000500100000f000000000000000000000004000000000002000020000020000000def4655fdef4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000008000000018000000c20500002b0200000000000000000000000000000000000073797a6b616c6c6572000000000000002f746d702f73797a2d696d61676567656e35373134333434333800"/192, 0xc0, 0x400}, {&(0x7f0000010100)="000000000000000000000000e58ca12e13a240e2b1a22f8d07e8e55f0100", 0x1e, 0x4e0}, {&(0x7f0000010200)="010000000000050040", 0x9, 0x560}, {0x0, 0x0, 0x1000000000c00}, {&(0x7f0000012000)="504d4d00504d4dff", 0x8, 0x10000}], 0x0, &(0x7f0000012b00)) 19:33:12 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000500100000f000000000000000000000004000000000002000020000020000000def4655fdef4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000008000000018000000c20500002b0200000000000000000000000000000000000073797a6b616c6c6572000000000000002f746d702f73797a2d696d61676567656e35373134333434333800"/192, 0xc0, 0x400}, {&(0x7f0000010100)="000000000000000000000000e58ca12e13a240e2b1a22f8d07e8e55f", 0x1c, 0x4e0}, {&(0x7f0000010200)="010000000000050040", 0x9, 0x560}, {0x0, 0x0, 0x1000000000c00}, {&(0x7f0000012000)="504d4d00504d4dff", 0x8, 0x10000}], 0x0, &(0x7f0000012b00)) 19:33:12 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000500100000f000000000000000000000004000000000002000020000020000000def4655fdef4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000008000000018000000", 0x60, 0x400}, {&(0x7f0000010100)="000000000000000000000000e58ca12e13a240e2b1a22f8d07e8e55f010040", 0x1f, 0x4e0}, {&(0x7f0000010200)="010000000000050040", 0x9, 0x560}, {0x0, 0x0, 0x1000000000c00}, {&(0x7f0000012000)="504d4d00504d4dff", 0x8, 0x10000}], 0x0, &(0x7f0000012b00)) 19:33:12 executing program 1: r0 = syz_io_uring_setup(0x2, &(0x7f0000000500), &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000ff6000/0xa000)=nil, &(0x7f0000000080)=0x0, 0x0) r2 = io_uring_setup(0x3ddf, &(0x7f0000000680)) syz_io_uring_submit(r1, 0x0, &(0x7f0000000800)=@IORING_OP_SENDMSG={0x9, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0}, 0x0) r3 = eventfd(0x0) io_uring_register$IORING_REGISTER_EVENTFD(r0, 0x4, &(0x7f0000000000)=r3, 0x1) read$eventfd(r3, &(0x7f0000000040), 0x8) r4 = syz_io_uring_setup(0x3702, &(0x7f00000001c0), &(0x7f0000000000/0x3000)=nil, &(0x7f0000ffe000/0x2000)=nil, &(0x7f0000000140), &(0x7f0000000240)) r5 = dup2(r2, r4) r6 = dup2(r0, r5) io_uring_enter(r6, 0x1739, 0x0, 0x0, 0x0, 0x0) 19:33:12 executing program 2: r0 = syz_io_uring_setup(0x21, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, &(0x7f00000a0000)=nil, &(0x7f00000b0000)=nil, &(0x7f0000000180)=0x0, &(0x7f0000002a40)=0x0) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_io_uring_submit(r1, r2, &(0x7f0000000300)=@IORING_OP_OPENAT={0x12, 0x0, 0x0, 0xffffffffffffffff, 0x0, &(0x7f0000000100)='./cgroup/cgroup.procs/file0/../file0\x00'}, 0x0) io_uring_enter(r0, 0x76d3, 0x0, 0x0, 0x0, 0x0) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r3 = syz_io_uring_setup(0x2, &(0x7f0000000500), &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000ff6000/0xa000)=nil, &(0x7f0000000080)=0x0, &(0x7f0000000140)=0x0) r6 = io_uring_setup(0x3ddf, &(0x7f0000000680)) syz_io_uring_submit(r4, r5, &(0x7f0000000800)=@IORING_OP_SENDMSG={0x9, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0}, 0x0) r7 = eventfd(0x0) io_uring_register$IORING_REGISTER_EVENTFD(r3, 0x4, &(0x7f0000000000)=r7, 0x1) read$eventfd(r7, &(0x7f0000000040), 0x8) r8 = syz_io_uring_setup(0x3702, &(0x7f00000001c0), &(0x7f0000000000/0x3000)=nil, &(0x7f0000ffe000/0x2000)=nil, &(0x7f0000000140), &(0x7f0000000240)) r9 = dup2(r6, r8) r10 = dup2(r3, r9) io_uring_enter(r10, 0x1739, 0x0, 0x0, 0x0, 0x0) [ 1326.827192] EXT4-fs (loop5): fragment/cluster size (16384) != block size (1024) [ 1326.838862] EXT4-fs (loop3): unsupported descriptor size 0 [ 1326.844208] EXT4-fs (loop7): unsupported descriptor size 0 [ 1326.847460] EXT4-fs (loop6): unsupported descriptor size 0 19:33:12 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000500100000f000000000000000000000004000000000002000020000020000000def4655fdef4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000008000000018000000c20500002b0200"/120, 0x78, 0x400}, {&(0x7f0000010100)="000000000000000000000000e58ca12e13a240e2b1a22f8d07e8e55f010040", 0x1f, 0x4e0}, {&(0x7f0000010200)="010000000000050040", 0x9, 0x560}, {0x0, 0x0, 0x1000000000c00}, {&(0x7f0000012000)="504d4d00504d4dff", 0x8, 0x10000}], 0x0, &(0x7f0000012b00)) 19:33:12 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000500100000f000000000000000000000004000000000002000020000020000000def4655fdef4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000008000000018000000c20500002b0200000000000000000000000000000000000073797a6b616c6c6572000000000000002f746d702f73797a2d696d61676567656e35373134333434333800"/192, 0xc0, 0x400}, {&(0x7f0000010100)="000000000000000000000000e58ca12e13a240e2b1a22f8d07e8e55f", 0x1c, 0x4e0}, {&(0x7f0000010200)="010000000000050040", 0x9, 0x560}, {0x0, 0x0, 0x1000000000c00}, {&(0x7f0000012000)="504d4d00504d4dff", 0x8, 0x10000}], 0x0, &(0x7f0000012b00)) 19:33:12 executing program 7: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000500100000f000000000000000000000004000000000002000020000020000000def4655fdef4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000008000000018000000c20500002b0200000000000000000000000000000000000073797a6b616c6c6572000000000000002f746d702f73797a2d696d61676567656e35373134333434333800"/192, 0xc0, 0x400}, {&(0x7f0000010100)="000000000000000000000000e58ca12e13a240e2b1a22f8d07e8e55f0100", 0x1e, 0x4e0}, {&(0x7f0000010200)="010000000000050040", 0x9, 0x560}, {0x0, 0x0, 0x1000000000c00}, {&(0x7f0000012000)="504d4d00504d4dff", 0x8, 0x10000}], 0x0, &(0x7f0000012b00)) [ 1326.933633] EXT4-fs error (device loop5): ext4_fill_super:4947: inode #2: comm syz-executor.5: iget: root inode unallocated 19:33:12 executing program 2: r0 = syz_io_uring_setup(0x21, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, &(0x7f00000a0000)=nil, &(0x7f00000b0000)=nil, &(0x7f0000000180)=0x0, &(0x7f0000002a40)=0x0) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_io_uring_submit(r1, r2, &(0x7f0000000300)=@IORING_OP_OPENAT={0x12, 0x0, 0x0, 0xffffffffffffffff, 0x0, &(0x7f0000000100)='./cgroup/cgroup.procs/file0/../file0\x00'}, 0x0) io_uring_enter(r0, 0x76d3, 0x0, 0x0, 0x0, 0x0) r3 = syz_io_uring_setup(0x2, &(0x7f0000000500), &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000ff6000/0xa000)=nil, &(0x7f0000000080)=0x0, &(0x7f0000000140)=0x0) r6 = io_uring_setup(0x3ddf, &(0x7f0000000680)) syz_io_uring_submit(r4, r5, &(0x7f0000000800)=@IORING_OP_SENDMSG={0x9, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0}, 0x0) r7 = eventfd(0x0) io_uring_register$IORING_REGISTER_EVENTFD(r3, 0x4, &(0x7f0000000000)=r7, 0x1) read$eventfd(r7, &(0x7f0000000040), 0x8) r8 = syz_io_uring_setup(0x3702, &(0x7f00000001c0), &(0x7f0000000000/0x3000)=nil, &(0x7f0000ffe000/0x2000)=nil, &(0x7f0000000140), &(0x7f0000000240)) r9 = dup2(r6, r8) r10 = dup2(r3, r9) io_uring_enter(r10, 0x1739, 0x0, 0x0, 0x0, 0x0) [ 1326.940796] EXT4-fs (loop5): get root inode failed [ 1326.941347] EXT4-fs (loop5): mount failed 19:33:12 executing program 6: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000500100000f000000000000000000000004000000000002000020000020000000def4655fdef4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000008000000018000000c20500002b0200000000000000000000000000000000000073797a6b616c6c6572000000000000002f746d702f73797a2d696d61676567656e35373134333434333800"/192, 0xc0, 0x400}, {&(0x7f0000010100)="000000000000000000000000e58ca12e13a240e2b1a22f8d07e8e55f0100", 0x1e, 0x4e0}, {&(0x7f0000010200)="010000000000050040", 0x9, 0x560}, {0x0, 0x0, 0x1000000000c00}, {&(0x7f0000012000)="504d4d00504d4dff", 0x8, 0x10000}], 0x0, &(0x7f0000012b00)) 19:33:12 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000500100000f000000000000000000000004000000000002000020000020000000def4655fdef4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000008000000018000000", 0x60, 0x400}, {&(0x7f0000010100)="000000000000000000000000e58ca12e13a240e2b1a22f8d07e8e55f010040", 0x1f, 0x4e0}, {&(0x7f0000010200)="010000000000050040", 0x9, 0x560}, {0x0, 0x0, 0x1000000000c00}, {&(0x7f0000012000)="504d4d00504d4dff", 0x8, 0x10000}], 0x0, &(0x7f0000012b00)) [ 1326.996805] EXT4-fs (loop6): unsupported descriptor size 0 [ 1327.012144] EXT4-fs (loop7): unsupported descriptor size 0 19:33:12 executing program 6: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000500100000f000000000000000000000004000000000002000020000020000000def4655fdef4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000008000000018000000c20500002b0200000000000000000000000000000000000073797a6b616c6c6572000000000000002f746d702f73797a2d696d61676567656e35373134333434333800"/192, 0xc0, 0x400}, {&(0x7f0000010100)="000000000000000000000000e58ca12e13a240e2b1a22f8d07e8e55f0100", 0x1e, 0x4e0}, {&(0x7f0000010200)="010000000000050040", 0x9, 0x560}, {0x0, 0x0, 0x1000000000c00}, {&(0x7f0000012000)="504d4d00504d4dff", 0x8, 0x10000}], 0x0, &(0x7f0000012b00)) [ 1327.039009] EXT4-fs (loop5): fragment/cluster size (16384) != block size (1024) [ 1327.040098] EXT4-fs (loop3): unsupported descriptor size 0 [ 1327.057200] EXT4-fs (loop6): unsupported descriptor size 0 19:33:23 executing program 4: r0 = syz_io_uring_setup(0x2, &(0x7f0000000500), &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000ff6000/0xa000)=nil, &(0x7f0000000080)=0x0, &(0x7f0000000140)=0x0) r3 = io_uring_setup(0x3ddf, &(0x7f0000000680)) syz_io_uring_submit(r1, r2, &(0x7f0000000800)=@IORING_OP_SENDMSG={0x9, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0}, 0x0) r4 = eventfd(0x0) io_uring_register$IORING_REGISTER_EVENTFD(r0, 0x4, &(0x7f0000000000)=r4, 0x1) read$eventfd(r4, &(0x7f0000000040), 0x8) r5 = syz_io_uring_setup(0x3702, &(0x7f00000001c0), &(0x7f0000000000/0x3000)=nil, &(0x7f0000ffe000/0x2000)=nil, &(0x7f0000000140), &(0x7f0000000240)) dup2(r3, r5) r6 = dup2(r0, 0xffffffffffffffff) io_uring_enter(r6, 0x1739, 0x0, 0x0, 0x0, 0x0) 19:33:23 executing program 1: r0 = syz_io_uring_setup(0x2, &(0x7f0000000500), &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000ff6000/0xa000)=nil, &(0x7f0000000080)=0x0, &(0x7f0000000140)=0x0) r3 = io_uring_setup(0x0, &(0x7f0000000680)) syz_io_uring_submit(r1, r2, &(0x7f0000000800)=@IORING_OP_SENDMSG={0x9, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0}, 0x0) r4 = eventfd(0x0) io_uring_register$IORING_REGISTER_EVENTFD(r0, 0x4, &(0x7f0000000000)=r4, 0x1) read$eventfd(r4, &(0x7f0000000040), 0x8) r5 = syz_io_uring_setup(0x3702, &(0x7f00000001c0), &(0x7f0000000000/0x3000)=nil, &(0x7f0000ffe000/0x2000)=nil, &(0x7f0000000140), &(0x7f0000000240)) r6 = dup2(r3, r5) r7 = dup2(r0, r6) io_uring_enter(r7, 0x1739, 0x0, 0x0, 0x0, 0x0) 19:33:23 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000500100000f000000000000000000000004000000000002000020000020000000def4655fdef4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000008000000018000000", 0x60, 0x400}, {&(0x7f0000010100)="000000000000000000000000e58ca12e13a240e2b1a22f8d07e8e55f010040", 0x1f, 0x4e0}, {&(0x7f0000010200)="010000000000050040", 0x9, 0x560}, {0x0, 0x0, 0x1000000000c00}, {&(0x7f0000012000)="504d4d00504d4dff", 0x8, 0x10000}], 0x0, &(0x7f0000012b00)) 19:33:23 executing program 6: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000500100000f000000000000000000000004000000000002000020000020000000def4655fdef4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000008000000018000000c20500002b0200000000000000000000000000000000000073797a6b616c6c6572000000000000002f746d702f73797a2d696d61676567656e35373134333434333800"/192, 0xc0, 0x400}, {&(0x7f0000010100)="000000000000000000000000e58ca12e13a240e2b1a22f8d07e8e55f010040", 0x1f}, {&(0x7f0000010200)="010000000000050040", 0x9, 0x560}, {0x0, 0x0, 0x1000000000c00}, {&(0x7f0000012000)="504d4d00504d4dff", 0x8, 0x10000}], 0x0, &(0x7f0000012b00)) 19:33:23 executing program 7: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000500100000f000000000000000000000004000000000002000020000020000000def4655fdef4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000008000000018000000c20500002b0200000000000000000000000000000000000073797a6b616c6c6572000000000000002f746d702f73797a2d696d61676567656e35373134333434333800"/192, 0xc0, 0x400}, {&(0x7f0000010100)="000000000000000000000000e58ca12e13a240e2b1a22f8d07e8e55f010040", 0x1f}, {&(0x7f0000010200)="010000000000050040", 0x9, 0x560}, {0x0, 0x0, 0x1000000000c00}, {&(0x7f0000012000)="504d4d00504d4dff", 0x8, 0x10000}], 0x0, &(0x7f0000012b00)) 19:33:23 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000500100000f000000000000000000000004000000000002000020000020000000def4655fdef4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000008000000018000000c20500002b0200000000000000000000000000000000000073797a6b616c6c6572000000000000002f746d702f73797a2d696d61676567656e35373134333434333800"/192, 0xc0, 0x400}, {&(0x7f0000010100)="000000000000000000000000e58ca12e13a240e2b1a22f8d07e8e55f", 0x1c, 0x4e0}, {&(0x7f0000010200)="010000000000050040", 0x9, 0x560}, {0x0, 0x0, 0x1000000000c00}, {&(0x7f0000012000)="504d4d00504d4dff", 0x8, 0x10000}], 0x0, &(0x7f0000012b00)) 19:33:23 executing program 0: r0 = syz_io_uring_setup(0x2, &(0x7f0000000500), &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000ff6000/0xa000)=nil, &(0x7f0000000080)=0x0, &(0x7f0000000140)=0x0) r3 = io_uring_setup(0x3ddf, &(0x7f0000000680)) syz_io_uring_submit(r1, r2, &(0x7f0000000800)=@IORING_OP_SENDMSG={0x9, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0}, 0x0) r4 = eventfd(0x0) io_uring_register$IORING_REGISTER_EVENTFD(r0, 0x4, &(0x7f0000000000)=r4, 0x1) read$eventfd(r4, &(0x7f0000000040), 0x8) r5 = syz_io_uring_setup(0x3702, &(0x7f00000001c0), &(0x7f0000000000/0x3000)=nil, &(0x7f0000ffe000/0x2000)=nil, &(0x7f0000000140), &(0x7f0000000240)) r6 = dup2(r3, r5) r7 = dup2(r0, r6) io_uring_enter(r7, 0x0, 0x0, 0x0, 0x0, 0x0) 19:33:23 executing program 2: syz_io_uring_setup(0x21, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, &(0x7f00000a0000)=nil, &(0x7f00000b0000)=nil, &(0x7f0000000180)=0x0, &(0x7f0000002a40)=0x0) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_io_uring_submit(r0, r1, &(0x7f0000000300)=@IORING_OP_OPENAT={0x12, 0x0, 0x0, 0xffffffffffffffff, 0x0, &(0x7f0000000100)='./cgroup/cgroup.procs/file0/../file0\x00'}, 0x0) r2 = syz_io_uring_setup(0x2, &(0x7f0000000500), &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000ff6000/0xa000)=nil, &(0x7f0000000080)=0x0, &(0x7f0000000140)=0x0) r5 = io_uring_setup(0x3ddf, &(0x7f0000000680)) syz_io_uring_submit(r3, r4, &(0x7f0000000800)=@IORING_OP_SENDMSG={0x9, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0}, 0x0) r6 = eventfd(0x0) io_uring_register$IORING_REGISTER_EVENTFD(r2, 0x4, &(0x7f0000000000)=r6, 0x1) read$eventfd(r6, &(0x7f0000000040), 0x8) r7 = syz_io_uring_setup(0x3702, &(0x7f00000001c0), &(0x7f0000000000/0x3000)=nil, &(0x7f0000ffe000/0x2000)=nil, &(0x7f0000000140), &(0x7f0000000240)) r8 = dup2(r5, r7) r9 = dup2(r2, r8) io_uring_enter(r9, 0x1739, 0x0, 0x0, 0x0, 0x0) [ 1337.840910] EXT4-fs (loop6): unsupported descriptor size 0 19:33:23 executing program 6: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000500100000f000000000000000000000004000000000002000020000020000000def4655fdef4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000008000000018000000c20500002b0200000000000000000000000000000000000073797a6b616c6c6572000000000000002f746d702f73797a2d696d61676567656e35373134333434333800"/192, 0xc0, 0x400}, {&(0x7f0000010100)="000000000000000000000000e58ca12e13a240e2b1a22f8d07e8e55f010040", 0x1f}, {&(0x7f0000010200)="010000000000050040", 0x9, 0x560}, {0x0, 0x0, 0x1000000000c00}, {&(0x7f0000012000)="504d4d00504d4dff", 0x8, 0x10000}], 0x0, &(0x7f0000012b00)) [ 1337.869788] EXT4-fs (loop7): unsupported descriptor size 0 [ 1337.872624] EXT4-fs (loop3): unsupported descriptor size 0 [ 1337.874160] EXT4-fs (loop5): fragment/cluster size (16384) != block size (1024) 19:33:23 executing program 7: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000500100000f000000000000000000000004000000000002000020000020000000def4655fdef4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000008000000018000000c20500002b0200000000000000000000000000000000000073797a6b616c6c6572000000000000002f746d702f73797a2d696d61676567656e35373134333434333800"/192, 0xc0, 0x400}, {&(0x7f0000010100)="000000000000000000000000e58ca12e13a240e2b1a22f8d07e8e55f010040", 0x1f}, {&(0x7f0000010200)="010000000000050040", 0x9, 0x560}, {0x0, 0x0, 0x1000000000c00}, {&(0x7f0000012000)="504d4d00504d4dff", 0x8, 0x10000}], 0x0, &(0x7f0000012b00)) 19:33:23 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000500100000f000000000000000000000004000000000002000020000020000000def4655fdef4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000008000000018000000", 0x60, 0x400}, {&(0x7f0000010100)="000000000000000000000000e58ca12e13a240e2b1a22f8d07e8e55f010040", 0x1f, 0x4e0}, {&(0x7f0000010200)="010000000000050040", 0x9, 0x560}, {0x0, 0x0, 0x1000000000c00}, {&(0x7f0000012000)="504d4d00504d4dff", 0x8, 0x10000}], 0x0, &(0x7f0000012b00)) 19:33:23 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000500100000f000000000000000000000004000000000002000020000020000000def4655fdef4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000008000000018000000c20500002b0200000000000000000000000000000000000073797a6b616c6c6572000000000000002f746d702f73797a2d696d61676567656e35373134333434333800"/192, 0xc0, 0x400}, {&(0x7f0000010100)="000000000000000000000000e58ca12e13a240e2b1a22f8d07e8e55f0100", 0x1e, 0x4e0}, {&(0x7f0000010200)="010000000000050040", 0x9, 0x560}, {0x0, 0x0, 0x1000000000c00}, {&(0x7f0000012000)="504d4d00504d4dff", 0x8, 0x10000}], 0x0, &(0x7f0000012b00)) [ 1337.991947] EXT4-fs (loop6): unsupported descriptor size 0 [ 1337.994776] EXT4-fs (loop7): unsupported descriptor size 0 [ 1338.018464] EXT4-fs (loop5): fragment/cluster size (16384) != block size (1024) 19:33:23 executing program 6: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000500100000f000000000000000000000004000000000002000020000020000000def4655fdef4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000008000000018000000c20500002b0200000000000000000000000000000000000073797a6b616c6c6572000000000000002f746d702f73797a2d696d61676567656e35373134333434333800"/192, 0xc0, 0x400}, {&(0x7f0000010100)="000000000000000000000000e58ca12e13a240e2b1a22f8d07e8e55f010040", 0x1f}, {&(0x7f0000010200)="010000000000050040", 0x9, 0x560}, {0x0, 0x0, 0x1000000000c00}, {&(0x7f0000012000)="504d4d00504d4dff", 0x8, 0x10000}], 0x0, &(0x7f0000012b00)) [ 1338.058030] EXT4-fs (loop3): unsupported descriptor size 0 19:33:23 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000500100000f000000000000000000000004000000000002000020000020000000def4655fdef4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000008000000018000000c20500002b02000000000000", 0x6c, 0x400}, {&(0x7f0000010100)="000000000000000000000000e58ca12e13a240e2b1a22f8d07e8e55f010040", 0x1f, 0x4e0}, {&(0x7f0000010200)="010000000000050040", 0x9, 0x560}, {0x0, 0x0, 0x1000000000c00}, {&(0x7f0000012000)="504d4d00504d4dff", 0x8, 0x10000}], 0x0, &(0x7f0000012b00)) 19:33:23 executing program 7: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000500100000f000000000000000000000004000000000002000020000020000000def4655fdef4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000008000000018000000c20500002b0200000000000000000000000000000000000073797a6b616c6c6572000000000000002f746d702f73797a2d696d61676567656e35373134333434333800"/192, 0xc0, 0x400}, {&(0x7f0000010100)="000000000000000000000000e58ca12e13a240e2b1a22f8d07e8e55f010040", 0x1f}, {&(0x7f0000010200)="010000000000050040", 0x9, 0x560}, {0x0, 0x0, 0x1000000000c00}, {&(0x7f0000012000)="504d4d00504d4dff", 0x8, 0x10000}], 0x0, &(0x7f0000012b00)) [ 1338.086906] EXT4-fs error (device loop5): ext4_fill_super:4947: inode #2: comm syz-executor.5: iget: root inode unallocated [ 1338.089810] EXT4-fs (loop5): get root inode failed [ 1338.090918] EXT4-fs (loop5): mount failed 19:33:23 executing program 2: syz_io_uring_setup(0x21, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, &(0x7f00000a0000)=nil, &(0x7f00000b0000)=nil, &(0x7f0000000180), &(0x7f0000002a40)) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r0 = syz_io_uring_setup(0x2, &(0x7f0000000500), &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000ff6000/0xa000)=nil, &(0x7f0000000080)=0x0, &(0x7f0000000140)=0x0) r3 = io_uring_setup(0x3ddf, &(0x7f0000000680)) syz_io_uring_submit(r1, r2, &(0x7f0000000800)=@IORING_OP_SENDMSG={0x9, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0}, 0x0) r4 = eventfd(0x0) io_uring_register$IORING_REGISTER_EVENTFD(r0, 0x4, &(0x7f0000000000)=r4, 0x1) read$eventfd(r4, &(0x7f0000000040), 0x8) r5 = syz_io_uring_setup(0x3702, &(0x7f00000001c0), &(0x7f0000000000/0x3000)=nil, &(0x7f0000ffe000/0x2000)=nil, &(0x7f0000000140), &(0x7f0000000240)) r6 = dup2(r3, r5) r7 = dup2(r0, r6) io_uring_enter(r7, 0x1739, 0x0, 0x0, 0x0, 0x0) [ 1338.130066] EXT4-fs (loop6): unsupported descriptor size 0 [ 1338.146805] EXT4-fs (loop7): unsupported descriptor size 0 19:33:43 executing program 7: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010100)="000000000000000000000000e58ca12e13a240e2b1a22f8d07e8e55f010040", 0x1f, 0x4e0}, {&(0x7f0000010200)="010000000000050040", 0x9, 0x560}, {0x0, 0x0, 0x1000000000c00}, {&(0x7f0000012000)="504d4d00504d4dff", 0x8, 0x10000}], 0x0, &(0x7f0000012b00)) 19:33:43 executing program 1: r0 = syz_io_uring_setup(0x2, &(0x7f0000000500), &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000ff6000/0xa000)=nil, &(0x7f0000000080)=0x0, &(0x7f0000000140)=0x0) r3 = io_uring_setup(0x0, &(0x7f0000000680)) syz_io_uring_submit(r1, r2, &(0x7f0000000800)=@IORING_OP_SENDMSG={0x9, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0}, 0x0) r4 = eventfd(0x0) io_uring_register$IORING_REGISTER_EVENTFD(r0, 0x4, &(0x7f0000000000)=r4, 0x1) read$eventfd(r4, &(0x7f0000000040), 0x8) r5 = syz_io_uring_setup(0x3702, &(0x7f00000001c0), &(0x7f0000000000/0x3000)=nil, &(0x7f0000ffe000/0x2000)=nil, &(0x7f0000000140), &(0x7f0000000240)) r6 = dup2(r3, r5) r7 = dup2(r0, r6) io_uring_enter(r7, 0x1739, 0x0, 0x0, 0x0, 0x0) 19:33:43 executing program 0: r0 = syz_io_uring_setup(0x2, &(0x7f0000000500), &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000ff6000/0xa000)=nil, &(0x7f0000000080)=0x0, &(0x7f0000000140)=0x0) r3 = io_uring_setup(0x3ddf, &(0x7f0000000680)) syz_io_uring_submit(r1, r2, &(0x7f0000000800)=@IORING_OP_SENDMSG={0x9, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0}, 0x0) r4 = eventfd(0x0) io_uring_register$IORING_REGISTER_EVENTFD(r0, 0x4, &(0x7f0000000000)=r4, 0x1) read$eventfd(r4, &(0x7f0000000040), 0x8) r5 = syz_io_uring_setup(0x3702, &(0x7f00000001c0), &(0x7f0000000000/0x3000)=nil, &(0x7f0000ffe000/0x2000)=nil, &(0x7f0000000140), &(0x7f0000000240)) r6 = dup2(r3, r5) r7 = dup2(r0, r6) io_uring_enter(r7, 0x0, 0x0, 0x0, 0x0, 0x0) 19:33:43 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000500100000f000000000000000000000004000000000002000020000020000000def4655fdef4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000008000000018000000c20500002b0200000000000000000000000000000000000073797a6b616c6c6572000000000000002f746d702f73797a2d696d61676567656e35373134333434333800"/192, 0xc0, 0x400}, {&(0x7f0000010100)="000000000000000000000000e58ca12e13a240e2b1a22f8d07e8e55f0100", 0x1e, 0x4e0}, {&(0x7f0000010200)="010000000000050040", 0x9, 0x560}, {0x0, 0x0, 0x1000000000c00}, {&(0x7f0000012000)="504d4d00504d4dff", 0x8, 0x10000}], 0x0, &(0x7f0000012b00)) 19:33:43 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000500100000f000000000000000000000004000000000002000020000020000000def4655fdef4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000008000000018000000", 0x60, 0x400}, {&(0x7f0000010100)="000000000000000000000000e58ca12e13a240e2b1a22f8d07e8e55f010040", 0x1f, 0x4e0}, {&(0x7f0000010200)="010000000000050040", 0x9, 0x560}, {0x0, 0x0, 0x1000000000c00}, {&(0x7f0000012000)="504d4d00504d4dff", 0x8, 0x10000}], 0x0, &(0x7f0000012b00)) 19:33:43 executing program 2: syz_io_uring_setup(0x21, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, &(0x7f00000a0000)=nil, &(0x7f00000b0000)=nil, &(0x7f0000000180), &(0x7f0000002a40)) r0 = syz_io_uring_setup(0x2, &(0x7f0000000500), &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000ff6000/0xa000)=nil, &(0x7f0000000080)=0x0, &(0x7f0000000140)=0x0) r3 = io_uring_setup(0x3ddf, &(0x7f0000000680)) syz_io_uring_submit(r1, r2, &(0x7f0000000800)=@IORING_OP_SENDMSG={0x9, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0}, 0x0) r4 = eventfd(0x0) io_uring_register$IORING_REGISTER_EVENTFD(r0, 0x4, &(0x7f0000000000)=r4, 0x1) read$eventfd(r4, &(0x7f0000000040), 0x8) r5 = syz_io_uring_setup(0x3702, &(0x7f00000001c0), &(0x7f0000000000/0x3000)=nil, &(0x7f0000ffe000/0x2000)=nil, &(0x7f0000000140), &(0x7f0000000240)) r6 = dup2(r3, r5) r7 = dup2(r0, r6) io_uring_enter(r7, 0x1739, 0x0, 0x0, 0x0, 0x0) 19:33:43 executing program 6: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010100)="000000000000000000000000e58ca12e13a240e2b1a22f8d07e8e55f010040", 0x1f, 0x4e0}, {&(0x7f0000010200)="010000000000050040", 0x9, 0x560}, {0x0, 0x0, 0x1000000000c00}, {&(0x7f0000012000)="504d4d00504d4dff", 0x8, 0x10000}], 0x0, &(0x7f0000012b00)) 19:33:43 executing program 4: r0 = syz_io_uring_setup(0x2, &(0x7f0000000500), &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000ff6000/0xa000)=nil, &(0x7f0000000080)=0x0, &(0x7f0000000140)=0x0) r3 = io_uring_setup(0x3ddf, &(0x7f0000000680)) syz_io_uring_submit(r1, r2, &(0x7f0000000800)=@IORING_OP_SENDMSG={0x9, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0}, 0x0) r4 = eventfd(0x0) io_uring_register$IORING_REGISTER_EVENTFD(r0, 0x4, &(0x7f0000000000)=r4, 0x1) read$eventfd(r4, &(0x7f0000000040), 0x8) r5 = syz_io_uring_setup(0x3702, &(0x7f00000001c0), &(0x7f0000000000/0x3000)=nil, &(0x7f0000ffe000/0x2000)=nil, &(0x7f0000000140), &(0x7f0000000240)) r6 = dup2(r3, r5) dup2(r0, r6) io_uring_enter(0xffffffffffffffff, 0x1739, 0x0, 0x0, 0x0, 0x0) [ 1358.442862] EXT4-fs (loop6): VFS: Can't find ext4 filesystem [ 1358.459393] EXT4-fs (loop3): unsupported descriptor size 0 19:33:43 executing program 6: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010100)="000000000000000000000000e58ca12e13a240e2b1a22f8d07e8e55f010040", 0x1f, 0x4e0}, {&(0x7f0000010200)="010000000000050040", 0x9, 0x560}, {0x0, 0x0, 0x1000000000c00}, {&(0x7f0000012000)="504d4d00504d4dff", 0x8, 0x10000}], 0x0, &(0x7f0000012b00)) [ 1358.502989] EXT4-fs (loop7): VFS: Can't find ext4 filesystem [ 1358.515915] EXT4-fs (loop5): fragment/cluster size (16384) != block size (1024) 19:33:43 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000500100000f000000000000000000000004000000000002000020000020000000def4655fdef4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000008000000018000000c20500002b0200000000000000000000000000000000000073797a6b616c6c6572000000000000002f746d702f73797a2d696d61676567656e35373134333434333800"/192, 0xc0, 0x400}, {&(0x7f0000010100)="000000000000000000000000e58ca12e13a240e2b1a22f8d07e8e55f0100", 0x1e, 0x4e0}, {&(0x7f0000010200)="010000000000050040", 0x9, 0x560}, {0x0, 0x0, 0x1000000000c00}, {&(0x7f0000012000)="504d4d00504d4dff", 0x8, 0x10000}], 0x0, &(0x7f0000012b00)) 19:33:43 executing program 7: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010100)="000000000000000000000000e58ca12e13a240e2b1a22f8d07e8e55f010040", 0x1f, 0x4e0}, {&(0x7f0000010200)="010000000000050040", 0x9, 0x560}, {0x0, 0x0, 0x1000000000c00}, {&(0x7f0000012000)="504d4d00504d4dff", 0x8, 0x10000}], 0x0, &(0x7f0000012b00)) [ 1358.552115] EXT4-fs (loop6): VFS: Can't find ext4 filesystem 19:33:43 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000500100000f000000000000000000000004000000000002000020000020000000def4655fdef4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000008000000018000000", 0x60, 0x400}, {&(0x7f0000010100)="000000000000000000000000e58ca12e13a240e2b1a22f8d07e8e55f010040", 0x1f, 0x4e0}, {&(0x7f0000010200)="010000000000050040", 0x9, 0x560}, {0x0, 0x0, 0x1000000000c00}, {&(0x7f0000012000)="504d4d00504d4dff", 0x8, 0x10000}], 0x0, &(0x7f0000012b00)) [ 1358.565344] EXT4-fs (loop3): unsupported descriptor size 0 19:33:43 executing program 6: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010100)="000000000000000000000000e58ca12e13a240e2b1a22f8d07e8e55f010040", 0x1f, 0x4e0}, {&(0x7f0000010200)="010000000000050040", 0x9, 0x560}, {0x0, 0x0, 0x1000000000c00}, {&(0x7f0000012000)="504d4d00504d4dff", 0x8, 0x10000}], 0x0, &(0x7f0000012b00)) [ 1358.615915] EXT4-fs (loop5): fragment/cluster size (16384) != block size (1024) [ 1358.620284] EXT4-fs (loop7): VFS: Can't find ext4 filesystem 19:33:44 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000500100000f000000000000000000000004000000000002000020000020000000def4655fdef4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000008000000018000000c20500002b0200000000000000000000000000000000000073797a6b616c6c6572000000000000002f746d702f73797a2d696d61676567656e35373134333434333800"/192, 0xc0, 0x400}, {&(0x7f0000010100)="000000000000000000000000e58ca12e13a240e2b1a22f8d07e8e55f010040", 0x1f, 0x4e0}, {&(0x7f0000010200)="010000000000050040", 0x9, 0x560}, {0x0, 0x0, 0x1000000000c00}, {&(0x7f0000012000)="504d4d00504d4dff", 0x8, 0x10000}], 0x0, &(0x7f0000012b00)) 19:33:44 executing program 2: r0 = syz_io_uring_setup(0x2, &(0x7f0000000500), &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000ff6000/0xa000)=nil, &(0x7f0000000080)=0x0, &(0x7f0000000140)=0x0) r3 = io_uring_setup(0x3ddf, &(0x7f0000000680)) syz_io_uring_submit(r1, r2, &(0x7f0000000800)=@IORING_OP_SENDMSG={0x9, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0}, 0x0) r4 = eventfd(0x0) io_uring_register$IORING_REGISTER_EVENTFD(r0, 0x4, &(0x7f0000000000)=r4, 0x1) read$eventfd(r4, &(0x7f0000000040), 0x8) r5 = syz_io_uring_setup(0x3702, &(0x7f00000001c0), &(0x7f0000000000/0x3000)=nil, &(0x7f0000ffe000/0x2000)=nil, &(0x7f0000000140), &(0x7f0000000240)) r6 = dup2(r3, r5) r7 = dup2(r0, r6) io_uring_enter(r7, 0x1739, 0x0, 0x0, 0x0, 0x0) [ 1358.645415] EXT4-fs (loop6): VFS: Can't find ext4 filesystem 19:33:44 executing program 6: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x5, &(0x7f0000000200)=[{0x0, 0x0, 0x400}, {&(0x7f0000010100)="000000000000000000000000e58ca12e13a240e2b1a22f8d07e8e55f010040", 0x1f, 0x4e0}, {&(0x7f0000010200)="010000000000050040", 0x9, 0x560}, {0x0, 0x0, 0x1000000000c00}, {&(0x7f0000012000)="504d4d00504d4dff", 0x8, 0x10000}], 0x0, &(0x7f0000012b00)) 19:33:44 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000500100000f000000000000000000000004000000000002000020000020000000def4655fdef4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000008000000018000000", 0x60, 0x400}, {&(0x7f0000010100)="000000000000000000000000e58ca12e13a240e2b1a22f8d07e8e55f010040", 0x1f, 0x4e0}, {&(0x7f0000010200)="010000000000050040", 0x9, 0x560}, {0x0, 0x0, 0x1000000000c00}, {&(0x7f0000012000)="504d4d00504d4dff", 0x8, 0x10000}], 0x0, &(0x7f0000012b00)) [ 1358.698211] EXT4-fs (loop6): VFS: Can't find ext4 filesystem [ 1358.705230] EXT4-fs error (device loop3): ext4_fill_super:4947: inode #2: comm syz-executor.3: iget: root inode unallocated [ 1358.709303] EXT4-fs (loop3): get root inode failed [ 1358.710054] EXT4-fs (loop3): mount failed [ 1358.727417] EXT4-fs (loop5): fragment/cluster size (16384) != block size (1024) 19:33:56 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000500100000f000000000000000000000004000000000002000020000020000000def4655fdef4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000008000000018000000c20500002b0200000000000000000000000000000000000073797a6b616c6c6572000000000000002f746d702f73797a2d696d61676567656e35373134333434333800"/192, 0xc0, 0x400}, {&(0x7f0000010100)="000000000000000000000000e58ca12e13a240e2b1a22f8d07e8e55f0100", 0x1e, 0x4e0}, {&(0x7f0000010200)="010000000000050040", 0x9, 0x560}, {0x0, 0x0, 0x1000000000c00}, {&(0x7f0000012000)="504d4d00504d4dff", 0x8, 0x10000}], 0x0, &(0x7f0000012b00)) 19:33:56 executing program 0: r0 = syz_io_uring_setup(0x2, &(0x7f0000000500), &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000ff6000/0xa000)=nil, &(0x7f0000000080)=0x0, &(0x7f0000000140)=0x0) r3 = io_uring_setup(0x3ddf, &(0x7f0000000680)) syz_io_uring_submit(r1, r2, &(0x7f0000000800)=@IORING_OP_SENDMSG={0x9, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0}, 0x0) r4 = eventfd(0x0) io_uring_register$IORING_REGISTER_EVENTFD(r0, 0x4, &(0x7f0000000000)=r4, 0x1) read$eventfd(r4, &(0x7f0000000040), 0x8) r5 = syz_io_uring_setup(0x3702, &(0x7f00000001c0), &(0x7f0000000000/0x3000)=nil, &(0x7f0000ffe000/0x2000)=nil, &(0x7f0000000140), &(0x7f0000000240)) r6 = dup2(r3, r5) dup2(r0, r6) io_uring_enter(0xffffffffffffffff, 0x1739, 0x0, 0x0, 0x0, 0x0) 19:33:56 executing program 2: r0 = syz_io_uring_setup(0x0, &(0x7f0000000500), &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000ff6000/0xa000)=nil, &(0x7f0000000080)=0x0, &(0x7f0000000140)=0x0) r3 = io_uring_setup(0x3ddf, &(0x7f0000000680)) syz_io_uring_submit(r1, r2, &(0x7f0000000800)=@IORING_OP_SENDMSG={0x9, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0}, 0x0) r4 = eventfd(0x0) io_uring_register$IORING_REGISTER_EVENTFD(r0, 0x4, &(0x7f0000000000)=r4, 0x1) read$eventfd(r4, &(0x7f0000000040), 0x8) r5 = syz_io_uring_setup(0x3702, &(0x7f00000001c0), &(0x7f0000000000/0x3000)=nil, &(0x7f0000ffe000/0x2000)=nil, &(0x7f0000000140), &(0x7f0000000240)) r6 = dup2(r3, r5) r7 = dup2(r0, r6) io_uring_enter(r7, 0x1739, 0x0, 0x0, 0x0, 0x0) 19:33:56 executing program 6: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x5, &(0x7f0000000200)=[{0x0, 0x0, 0x400}, {&(0x7f0000010100)="000000000000000000000000e58ca12e13a240e2b1a22f8d07e8e55f010040", 0x1f, 0x4e0}, {&(0x7f0000010200)="010000000000050040", 0x9, 0x560}, {0x0, 0x0, 0x1000000000c00}, {&(0x7f0000012000)="504d4d00504d4dff", 0x8, 0x10000}], 0x0, &(0x7f0000012b00)) 19:33:56 executing program 7: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010100)="000000000000000000000000e58ca12e13a240e2b1a22f8d07e8e55f010040", 0x1f, 0x4e0}, {&(0x7f0000010200)="010000000000050040", 0x9, 0x560}, {0x0, 0x0, 0x1000000000c00}, {&(0x7f0000012000)="504d4d00504d4dff", 0x8, 0x10000}], 0x0, &(0x7f0000012b00)) 19:33:56 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000500100000f000000000000000000000004000000000002000020000020000000def4655fdef4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000008000000018000000c20500002b02", 0x66, 0x400}, {&(0x7f0000010100)="000000000000000000000000e58ca12e13a240e2b1a22f8d07e8e55f010040", 0x1f, 0x4e0}, {&(0x7f0000010200)="010000000000050040", 0x9, 0x560}, {0x0, 0x0, 0x1000000000c00}, {&(0x7f0000012000)="504d4d00504d4dff", 0x8, 0x10000}], 0x0, &(0x7f0000012b00)) 19:33:56 executing program 1: r0 = syz_io_uring_setup(0x2, &(0x7f0000000500), &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000ff6000/0xa000)=nil, &(0x7f0000000080)=0x0, &(0x7f0000000140)=0x0) r3 = io_uring_setup(0x0, &(0x7f0000000680)) syz_io_uring_submit(r1, r2, &(0x7f0000000800)=@IORING_OP_SENDMSG={0x9, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0}, 0x0) r4 = eventfd(0x0) io_uring_register$IORING_REGISTER_EVENTFD(r0, 0x4, &(0x7f0000000000)=r4, 0x1) read$eventfd(r4, &(0x7f0000000040), 0x8) r5 = syz_io_uring_setup(0x3702, &(0x7f00000001c0), &(0x7f0000000000/0x3000)=nil, &(0x7f0000ffe000/0x2000)=nil, &(0x7f0000000140), &(0x7f0000000240)) r6 = dup2(r3, r5) r7 = dup2(r0, r6) io_uring_enter(r7, 0x1739, 0x0, 0x0, 0x0, 0x0) 19:33:56 executing program 4: r0 = syz_io_uring_setup(0x2, &(0x7f0000000500), &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000ff6000/0xa000)=nil, &(0x7f0000000080)=0x0, &(0x7f0000000140)=0x0) r3 = io_uring_setup(0x3ddf, &(0x7f0000000680)) syz_io_uring_submit(r1, r2, &(0x7f0000000800)=@IORING_OP_SENDMSG={0x9, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0}, 0x0) r4 = eventfd(0x0) io_uring_register$IORING_REGISTER_EVENTFD(r0, 0x4, &(0x7f0000000000)=r4, 0x1) read$eventfd(r4, &(0x7f0000000040), 0x8) r5 = syz_io_uring_setup(0x3702, &(0x7f00000001c0), &(0x7f0000000000/0x3000)=nil, &(0x7f0000ffe000/0x2000)=nil, &(0x7f0000000140), &(0x7f0000000240)) r6 = dup2(r3, r5) dup2(r0, r6) io_uring_enter(0xffffffffffffffff, 0x1739, 0x0, 0x0, 0x0, 0x0) [ 1370.880599] EXT4-fs (loop3): unsupported descriptor size 0 [ 1370.906534] EXT4-fs (loop7): VFS: Can't find ext4 filesystem [ 1370.914426] EXT4-fs (loop6): VFS: Can't find ext4 filesystem 19:33:56 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000500100000f000000000000000000000004000000000002000020000020000000def4655fdef4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000008000000018000000c20500002b0200000000000000000000000000000000000073797a6b616c6c6572000000000000002f746d702f73797a2d696d61676567656e35373134333434333800"/192, 0xc0, 0x400}, {&(0x7f0000010100)="000000000000000000000000e58ca12e13a240e2b1a22f8d07e8e55f0100", 0x1e, 0x4e0}, {&(0x7f0000010200)="010000000000050040", 0x9, 0x560}, {0x0, 0x0, 0x1000000000c00}, {&(0x7f0000012000)="504d4d00504d4dff", 0x8, 0x10000}], 0x0, &(0x7f0000012b00)) [ 1370.942127] EXT4-fs error (device loop5): ext4_fill_super:4947: inode #2: comm syz-executor.5: iget: root inode unallocated [ 1370.943618] EXT4-fs (loop5): get root inode failed [ 1370.944293] EXT4-fs (loop5): mount failed 19:33:56 executing program 7: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x5, &(0x7f0000000200)=[{0x0, 0x0, 0x400}, {&(0x7f0000010100)="000000000000000000000000e58ca12e13a240e2b1a22f8d07e8e55f010040", 0x1f, 0x4e0}, {&(0x7f0000010200)="010000000000050040", 0x9, 0x560}, {0x0, 0x0, 0x1000000000c00}, {&(0x7f0000012000)="504d4d00504d4dff", 0x8, 0x10000}], 0x0, &(0x7f0000012b00)) 19:33:56 executing program 6: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x5, &(0x7f0000000200)=[{0x0, 0x0, 0x400}, {&(0x7f0000010100)="000000000000000000000000e58ca12e13a240e2b1a22f8d07e8e55f010040", 0x1f, 0x4e0}, {&(0x7f0000010200)="010000000000050040", 0x9, 0x560}, {0x0, 0x0, 0x1000000000c00}, {&(0x7f0000012000)="504d4d00504d4dff", 0x8, 0x10000}], 0x0, &(0x7f0000012b00)) 19:33:56 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000500100000f000000000000000000000004000000000002000020000020000000def4655fdef4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000008000000018000000", 0x60, 0x400}, {&(0x7f0000010100)="000000000000000000000000e58ca12e13a240e2b1a22f8d07e8e55f010040", 0x1f, 0x4e0}, {&(0x7f0000010200)="010000000000050040", 0x9, 0x560}, {0x0, 0x0, 0x1000000000c00}, {&(0x7f0000012000)="504d4d00504d4dff", 0x8, 0x10000}], 0x0, &(0x7f0000012b00)) [ 1371.046068] EXT4-fs (loop3): unsupported descriptor size 0 [ 1371.063319] EXT4-fs (loop7): VFS: Can't find ext4 filesystem [ 1371.083956] EXT4-fs (loop6): VFS: Can't find ext4 filesystem 19:33:56 executing program 7: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x5, &(0x7f0000000200)=[{0x0, 0x0, 0x400}, {&(0x7f0000010100)="000000000000000000000000e58ca12e13a240e2b1a22f8d07e8e55f010040", 0x1f, 0x4e0}, {&(0x7f0000010200)="010000000000050040", 0x9, 0x560}, {0x0, 0x0, 0x1000000000c00}, {&(0x7f0000012000)="504d4d00504d4dff", 0x8, 0x10000}], 0x0, &(0x7f0000012b00)) 19:33:56 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000500100000f000000000000000000000004000000000002000020000020000000def4655fdef4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000008000000018000000c20500002b0200000000000000000000000000000000000073797a6b616c6c6572000000000000002f746d702f73797a2d696d61676567656e35373134333434333800"/192, 0xc0, 0x400}, {&(0x7f0000010100)="000000000000000000000000e58ca12e13a240e2b1a22f8d07e8e55f0100", 0x1e, 0x4e0}, {&(0x7f0000010200)="010000000000050040", 0x9, 0x560}, {0x0, 0x0, 0x1000000000c00}, {&(0x7f0000012000)="504d4d00504d4dff", 0x8, 0x10000}], 0x0, &(0x7f0000012b00)) [ 1371.135053] EXT4-fs (loop5): fragment/cluster size (16384) != block size (1024) 19:33:56 executing program 6: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000), 0x0, 0x400}, {&(0x7f0000010100)="000000000000000000000000e58ca12e13a240e2b1a22f8d07e8e55f010040", 0x1f, 0x4e0}, {&(0x7f0000010200)="010000000000050040", 0x9, 0x560}, {0x0, 0x0, 0x1000000000c00}, {&(0x7f0000012000)="504d4d00504d4dff", 0x8, 0x10000}], 0x0, &(0x7f0000012b00)) [ 1371.180087] EXT4-fs (loop7): VFS: Can't find ext4 filesystem 19:33:56 executing program 7: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x5, &(0x7f0000000200)=[{0x0, 0x0, 0x400}, {&(0x7f0000010100)="000000000000000000000000e58ca12e13a240e2b1a22f8d07e8e55f010040", 0x1f, 0x4e0}, {&(0x7f0000010200)="010000000000050040", 0x9, 0x560}, {0x0, 0x0, 0x1000000000c00}, {&(0x7f0000012000)="504d4d00504d4dff", 0x8, 0x10000}], 0x0, &(0x7f0000012b00)) 19:33:56 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000500100000f000000000000000000000004000000000002000020000020000000def4655fdef4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000008000000018000000", 0x60, 0x400}, {&(0x7f0000010100)="000000000000000000000000e58ca12e13a240e2b1a22f8d07e8e55f010040", 0x1f, 0x4e0}, {&(0x7f0000010200)="010000000000050040", 0x9, 0x560}, {0x0, 0x0, 0x1000000000c00}, {&(0x7f0000012000)="504d4d00504d4dff", 0x8, 0x10000}], 0x0, &(0x7f0000012b00)) [ 1371.240722] EXT4-fs (loop3): unsupported descriptor size 0 [ 1371.244360] EXT4-fs (loop6): VFS: Can't find ext4 filesystem [ 1371.250082] EXT4-fs (loop7): VFS: Can't find ext4 filesystem [ 1371.273741] EXT4-fs (loop5): fragment/cluster size (16384) != block size (1024) 19:34:08 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000500100000f000000000000000000000004000000000002000020000020000000def4655fdef4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000008000000018000000", 0x60, 0x400}, {&(0x7f0000010100)="000000000000000000000000e58ca12e13a240e2b1a22f8d07e8e55f010040", 0x1f, 0x4e0}, {&(0x7f0000010200)="010000000000050040", 0x9, 0x560}, {0x0, 0x0, 0x1000000000c00}, {&(0x7f0000012000)="504d4d00504d4dff", 0x8, 0x10000}], 0x0, &(0x7f0000012b00)) 19:34:08 executing program 7: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000), 0x0, 0x400}, {&(0x7f0000010100)="000000000000000000000000e58ca12e13a240e2b1a22f8d07e8e55f010040", 0x1f, 0x4e0}, {&(0x7f0000010200)="010000000000050040", 0x9, 0x560}, {0x0, 0x0, 0x1000000000c00}, {&(0x7f0000012000)="504d4d00504d4dff", 0x8, 0x10000}], 0x0, &(0x7f0000012b00)) 19:34:08 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000500100000f000000000000000000000004000000000002000020000020000000def4655fdef4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000008000000018000000c20500002b0200000000000000000000000000000000000073797a6b616c6c6572000000000000002f746d702f73797a2d696d61676567656e35373134333434333800"/192, 0xc0, 0x400}, {&(0x7f0000010100)="000000000000000000000000e58ca12e13a240e2b1a22f8d07e8e55f010040", 0x1f}, {&(0x7f0000010200)="010000000000050040", 0x9, 0x560}, {0x0, 0x0, 0x1000000000c00}, {&(0x7f0000012000)="504d4d00504d4dff", 0x8, 0x10000}], 0x0, &(0x7f0000012b00)) 19:34:08 executing program 2: r0 = syz_io_uring_setup(0x0, &(0x7f0000000500), &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000ff6000/0xa000)=nil, &(0x7f0000000080)=0x0, &(0x7f0000000140)=0x0) r3 = io_uring_setup(0x3ddf, &(0x7f0000000680)) syz_io_uring_submit(r1, r2, &(0x7f0000000800)=@IORING_OP_SENDMSG={0x9, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0}, 0x0) r4 = eventfd(0x0) io_uring_register$IORING_REGISTER_EVENTFD(r0, 0x4, &(0x7f0000000000)=r4, 0x1) read$eventfd(r4, &(0x7f0000000040), 0x8) r5 = syz_io_uring_setup(0x3702, &(0x7f00000001c0), &(0x7f0000000000/0x3000)=nil, &(0x7f0000ffe000/0x2000)=nil, &(0x7f0000000140), &(0x7f0000000240)) r6 = dup2(r3, r5) r7 = dup2(r0, r6) io_uring_enter(r7, 0x1739, 0x0, 0x0, 0x0, 0x0) 19:34:08 executing program 4: r0 = syz_io_uring_setup(0x2, &(0x7f0000000500), &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000ff6000/0xa000)=nil, &(0x7f0000000080)=0x0, &(0x7f0000000140)=0x0) r3 = io_uring_setup(0x3ddf, &(0x7f0000000680)) syz_io_uring_submit(r1, r2, &(0x7f0000000800)=@IORING_OP_SENDMSG={0x9, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0}, 0x0) r4 = eventfd(0x0) io_uring_register$IORING_REGISTER_EVENTFD(r0, 0x4, &(0x7f0000000000)=r4, 0x1) read$eventfd(r4, &(0x7f0000000040), 0x8) r5 = syz_io_uring_setup(0x3702, &(0x7f00000001c0), &(0x7f0000000000/0x3000)=nil, &(0x7f0000ffe000/0x2000)=nil, &(0x7f0000000140), &(0x7f0000000240)) r6 = dup2(r3, r5) dup2(r0, r6) io_uring_enter(0xffffffffffffffff, 0x1739, 0x0, 0x0, 0x0, 0x0) 19:34:08 executing program 6: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000), 0x0, 0x400}, {&(0x7f0000010100)="000000000000000000000000e58ca12e13a240e2b1a22f8d07e8e55f010040", 0x1f, 0x4e0}, {&(0x7f0000010200)="010000000000050040", 0x9, 0x560}, {0x0, 0x0, 0x1000000000c00}, {&(0x7f0000012000)="504d4d00504d4dff", 0x8, 0x10000}], 0x0, &(0x7f0000012b00)) 19:34:08 executing program 1: r0 = syz_io_uring_setup(0x2, &(0x7f0000000500), &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000ff6000/0xa000)=nil, &(0x7f0000000080)=0x0, &(0x7f0000000140)=0x0) r3 = io_uring_setup(0x3ddf, 0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000800)=@IORING_OP_SENDMSG={0x9, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0}, 0x0) r4 = eventfd(0x0) io_uring_register$IORING_REGISTER_EVENTFD(r0, 0x4, &(0x7f0000000000)=r4, 0x1) read$eventfd(r4, &(0x7f0000000040), 0x8) r5 = syz_io_uring_setup(0x3702, &(0x7f00000001c0), &(0x7f0000000000/0x3000)=nil, &(0x7f0000ffe000/0x2000)=nil, &(0x7f0000000140), &(0x7f0000000240)) r6 = dup2(r3, r5) r7 = dup2(r0, r6) io_uring_enter(r7, 0x1739, 0x0, 0x0, 0x0, 0x0) 19:34:08 executing program 0: r0 = syz_io_uring_setup(0x2, &(0x7f0000000500), &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000ff6000/0xa000)=nil, &(0x7f0000000080)=0x0, &(0x7f0000000140)=0x0) r3 = io_uring_setup(0x0, &(0x7f0000000680)) syz_io_uring_submit(r1, r2, &(0x7f0000000800)=@IORING_OP_SENDMSG={0x9, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0}, 0x0) r4 = eventfd(0x0) io_uring_register$IORING_REGISTER_EVENTFD(r0, 0x4, &(0x7f0000000000)=r4, 0x1) read$eventfd(r4, &(0x7f0000000040), 0x8) r5 = syz_io_uring_setup(0x3702, &(0x7f00000001c0), &(0x7f0000000000/0x3000)=nil, &(0x7f0000ffe000/0x2000)=nil, &(0x7f0000000140), &(0x7f0000000240)) r6 = dup2(r3, r5) r7 = dup2(r0, r6) io_uring_enter(r7, 0x1739, 0x0, 0x0, 0x0, 0x0) [ 1383.347102] EXT4-fs (loop5): fragment/cluster size (16384) != block size (1024) [ 1383.359888] EXT4-fs (loop6): VFS: Can't find ext4 filesystem 19:34:08 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000500100000f000000000000000000000004000000000002000020000020000000def4655fdef4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000008000000018000000c20500", 0x63, 0x400}, {&(0x7f0000010100)="000000000000000000000000e58ca12e13a240e2b1a22f8d07e8e55f010040", 0x1f, 0x4e0}, {&(0x7f0000010200)="010000000000050040", 0x9, 0x560}, {0x0, 0x0, 0x1000000000c00}, {&(0x7f0000012000)="504d4d00504d4dff", 0x8, 0x10000}], 0x0, &(0x7f0000012b00)) [ 1383.402279] EXT4-fs (loop7): VFS: Can't find ext4 filesystem [ 1383.417109] EXT4-fs (loop3): unsupported descriptor size 0 19:34:08 executing program 6: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000), 0x0, 0x400}, {&(0x7f0000010100)="000000000000000000000000e58ca12e13a240e2b1a22f8d07e8e55f010040", 0x1f, 0x4e0}, {&(0x7f0000010200)="010000000000050040", 0x9, 0x560}, {0x0, 0x0, 0x1000000000c00}, {&(0x7f0000012000)="504d4d00504d4dff", 0x8, 0x10000}], 0x0, &(0x7f0000012b00)) [ 1383.442075] EXT4-fs (loop5): fragment/cluster size (16384) != block size (1024) 19:34:08 executing program 7: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000), 0x0, 0x400}, {&(0x7f0000010100)="000000000000000000000000e58ca12e13a240e2b1a22f8d07e8e55f010040", 0x1f, 0x4e0}, {&(0x7f0000010200)="010000000000050040", 0x9, 0x560}, {0x0, 0x0, 0x1000000000c00}, {&(0x7f0000012000)="504d4d00504d4dff", 0x8, 0x10000}], 0x0, &(0x7f0000012b00)) 19:34:08 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000500100000f000000000000000000000004000000000002000020000020000000def4655fdef4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000008000000018000000c20500", 0x63, 0x400}, {&(0x7f0000010100)="000000000000000000000000e58ca12e13a240e2b1a22f8d07e8e55f010040", 0x1f, 0x4e0}, {&(0x7f0000010200)="010000000000050040", 0x9, 0x560}, {0x0, 0x0, 0x1000000000c00}, {&(0x7f0000012000)="504d4d00504d4dff", 0x8, 0x10000}], 0x0, &(0x7f0000012b00)) 19:34:08 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000500100000f000000000000000000000004000000000002000020000020000000def4655fdef4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000008000000018000000c20500002b0200000000000000000000000000000000000073797a6b616c6c6572000000000000002f746d702f73797a2d696d61676567656e35373134333434333800"/192, 0xc0, 0x400}, {&(0x7f0000010100)="000000000000000000000000e58ca12e13a240e2b1a22f8d07e8e55f010040", 0x1f}, {&(0x7f0000010200)="010000000000050040", 0x9, 0x560}, {0x0, 0x0, 0x1000000000c00}, {&(0x7f0000012000)="504d4d00504d4dff", 0x8, 0x10000}], 0x0, &(0x7f0000012b00)) [ 1383.526741] EXT4-fs (loop6): VFS: Can't find ext4 filesystem [ 1383.533734] EXT4-fs (loop7): VFS: Can't find ext4 filesystem [ 1383.537565] EXT4-fs (loop5): fragment/cluster size (16384) != block size (1024) [ 1383.546061] EXT4-fs (loop3): unsupported descriptor size 0 19:34:08 executing program 7: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000), 0x0, 0x400}, {&(0x7f0000010100)="000000000000000000000000e58ca12e13a240e2b1a22f8d07e8e55f010040", 0x1f, 0x4e0}, {&(0x7f0000010200)="010000000000050040", 0x9, 0x560}, {0x0, 0x0, 0x1000000000c00}, {&(0x7f0000012000)="504d4d00504d4dff", 0x8, 0x10000}], 0x0, &(0x7f0000012b00)) [ 1383.628598] EXT4-fs (loop7): VFS: Can't find ext4 filesystem 19:34:20 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000500100000f000000000000000000000004000000000002000020000020000000def4655fdef4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000008000000018000000c20500002b0200000000000000000000000000000000000073797a6b616c6c6572000000000000002f746d702f73797a2d696d61676567656e35373134333434333800"/192, 0xc0, 0x400}, {&(0x7f0000010100)="000000000000000000000000e58ca12e13a240e2b1a22f8d07e8e55f010040", 0x1f}, {&(0x7f0000010200)="010000000000050040", 0x9, 0x560}, {0x0, 0x0, 0x1000000000c00}, {&(0x7f0000012000)="504d4d00504d4dff", 0x8, 0x10000}], 0x0, &(0x7f0000012b00)) 19:34:20 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000500100000f000000000000000000000004000000000002000020000020000000def4655fdef4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000008000000018000000c20500002b0200000000000000000000000000000000000073797a6b616c6c6572000000000000002f746d702f73797a2d696d61676567656e35373134333434333800"/192, 0xc0, 0x400}, {&(0x7f0000010100)="000000000000000000000000e58ca12e13a240e2b1a22f8d07e8e55f0100", 0x1e, 0x4e0}, {&(0x7f0000010200)="010000000000050040", 0x9, 0x560}, {0x0, 0x0, 0x1000000000c00}, {&(0x7f0000012000)="504d4d00504d4dff", 0x8, 0x10000}], 0x0, &(0x7f0000012b00)) 19:34:20 executing program 1: r0 = syz_io_uring_setup(0x2, &(0x7f0000000500), &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000ff6000/0xa000)=nil, &(0x7f0000000080)=0x0, &(0x7f0000000140)=0x0) r3 = io_uring_setup(0x3ddf, 0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000800)=@IORING_OP_SENDMSG={0x9, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0}, 0x0) r4 = eventfd(0x0) io_uring_register$IORING_REGISTER_EVENTFD(r0, 0x4, &(0x7f0000000000)=r4, 0x1) read$eventfd(r4, &(0x7f0000000040), 0x8) r5 = syz_io_uring_setup(0x3702, &(0x7f00000001c0), &(0x7f0000000000/0x3000)=nil, &(0x7f0000ffe000/0x2000)=nil, &(0x7f0000000140), &(0x7f0000000240)) r6 = dup2(r3, r5) r7 = dup2(r0, r6) io_uring_enter(r7, 0x1739, 0x0, 0x0, 0x0, 0x0) 19:34:20 executing program 7: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000500100000f000000000000000000000004000000000002000020000020000000def4655fdef4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000008000000018000000", 0x60, 0x400}, {&(0x7f0000010100)="000000000000000000000000e58ca12e13a240e2b1a22f8d07e8e55f010040", 0x1f, 0x4e0}, {&(0x7f0000010200)="010000000000050040", 0x9, 0x560}, {0x0, 0x0, 0x1000000000c00}, {&(0x7f0000012000)="504d4d00504d4dff", 0x8, 0x10000}], 0x0, &(0x7f0000012b00)) 19:34:20 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000500100000f000000000000000000000004000000000002000020000020000000def4655fdef4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000008000000018000000c20500", 0x63, 0x400}, {&(0x7f0000010100)="000000000000000000000000e58ca12e13a240e2b1a22f8d07e8e55f010040", 0x1f, 0x4e0}, {&(0x7f0000010200)="010000000000050040", 0x9, 0x560}, {0x0, 0x0, 0x1000000000c00}, {&(0x7f0000012000)="504d4d00504d4dff", 0x8, 0x10000}], 0x0, &(0x7f0000012b00)) 19:34:20 executing program 6: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000500100000f000000000000000000000004000000000002000020000020000000def4655fdef4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000008000000018000000", 0x60, 0x400}, {&(0x7f0000010100)="000000000000000000000000e58ca12e13a240e2b1a22f8d07e8e55f010040", 0x1f, 0x4e0}, {&(0x7f0000010200)="010000000000050040", 0x9, 0x560}, {0x0, 0x0, 0x1000000000c00}, {&(0x7f0000012000)="504d4d00504d4dff", 0x8, 0x10000}], 0x0, &(0x7f0000012b00)) 19:34:20 executing program 2: r0 = syz_io_uring_setup(0x0, &(0x7f0000000500), &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000ff6000/0xa000)=nil, &(0x7f0000000080)=0x0, &(0x7f0000000140)=0x0) r3 = io_uring_setup(0x3ddf, &(0x7f0000000680)) syz_io_uring_submit(r1, r2, &(0x7f0000000800)=@IORING_OP_SENDMSG={0x9, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0}, 0x0) r4 = eventfd(0x0) io_uring_register$IORING_REGISTER_EVENTFD(r0, 0x4, &(0x7f0000000000)=r4, 0x1) read$eventfd(r4, &(0x7f0000000040), 0x8) r5 = syz_io_uring_setup(0x3702, &(0x7f00000001c0), &(0x7f0000000000/0x3000)=nil, &(0x7f0000ffe000/0x2000)=nil, &(0x7f0000000140), &(0x7f0000000240)) r6 = dup2(r3, r5) r7 = dup2(r0, r6) io_uring_enter(r7, 0x1739, 0x0, 0x0, 0x0, 0x0) 19:34:20 executing program 4: r0 = syz_io_uring_setup(0x2, &(0x7f0000000500), &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000ff6000/0xa000)=nil, &(0x7f0000000080)=0x0, &(0x7f0000000140)=0x0) r3 = io_uring_setup(0x3ddf, &(0x7f0000000680)) syz_io_uring_submit(r1, r2, &(0x7f0000000800)=@IORING_OP_SENDMSG={0x9, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0}, 0x0) r4 = eventfd(0x0) io_uring_register$IORING_REGISTER_EVENTFD(r0, 0x4, &(0x7f0000000000)=r4, 0x1) read$eventfd(r4, &(0x7f0000000040), 0x8) r5 = syz_io_uring_setup(0x3702, &(0x7f00000001c0), &(0x7f0000000000/0x3000)=nil, &(0x7f0000ffe000/0x2000)=nil, &(0x7f0000000140), &(0x7f0000000240)) r6 = dup2(r3, r5) r7 = dup2(r0, r6) io_uring_enter(r7, 0x0, 0x0, 0x0, 0x0, 0x0) [ 1395.200400] EXT4-fs (loop3): unsupported descriptor size 0 [ 1395.202206] EXT4-fs (loop6): fragment/cluster size (16384) != block size (1024) [ 1395.203655] EXT4-fs (loop0): unsupported descriptor size 0 [ 1395.228538] EXT4-fs (loop5): fragment/cluster size (16384) != block size (1024) [ 1395.235573] EXT4-fs (loop7): fragment/cluster size (16384) != block size (1024) 19:34:20 executing program 6: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000500100000f000000000000000000000004000000000002000020000020000000def4655fdef4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000008000000018000000", 0x60, 0x400}, {&(0x7f0000010100)="000000000000000000000000e58ca12e13a240e2b1a22f8d07e8e55f010040", 0x1f, 0x4e0}, {&(0x7f0000010200)="010000000000050040", 0x9, 0x560}, {0x0, 0x0, 0x1000000000c00}, {&(0x7f0000012000)="504d4d00504d4dff", 0x8, 0x10000}], 0x0, &(0x7f0000012b00)) 19:34:20 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000500100000f000000000000000000000004000000000002000020000020000000def4655fdef4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000008000000018000000", 0x60, 0x400}, {&(0x7f0000010100)="000000000000000000000000e58ca12e13a240e2b1a22f8d07e8e55f010040", 0x1f, 0x4e0}, {&(0x7f0000010200)="010000000000050040", 0x9, 0x560}, {0x0, 0x0, 0x1000000000c00}, {&(0x7f0000012000)="504d4d00504d4dff", 0x8, 0x10000}], 0x0, &(0x7f0000012b00)) 19:34:20 executing program 7: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000500100000f000000000000000000000004000000000002000020000020000000def4655fdef4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000008000000018000000", 0x60, 0x400}, {&(0x7f0000010100)="000000000000000000000000e58ca12e13a240e2b1a22f8d07e8e55f010040", 0x1f, 0x4e0}, {&(0x7f0000010200)="010000000000050040", 0x9, 0x560}, {0x0, 0x0, 0x1000000000c00}, {&(0x7f0000012000)="504d4d00504d4dff", 0x8, 0x10000}], 0x0, &(0x7f0000012b00)) 19:34:20 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010100)="000000000000000000000000e58ca12e13a240e2b1a22f8d07e8e55f010040", 0x1f, 0x4e0}, {&(0x7f0000010200)="010000000000050040", 0x9, 0x560}, {0x0, 0x0, 0x1000000000c00}, {&(0x7f0000012000)="504d4d00504d4dff", 0x8, 0x10000}], 0x0, &(0x7f0000012b00)) [ 1395.303006] EXT4-fs (loop0): fragment/cluster size (16384) != block size (1024) 19:34:20 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000500100000f000000000000000000000004000000000002000020000020000000def4655fdef4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000008000000018000000c20500002b", 0x65, 0x400}, {&(0x7f0000010100)="000000000000000000000000e58ca12e13a240e2b1a22f8d07e8e55f010040", 0x1f, 0x4e0}, {&(0x7f0000010200)="010000000000050040", 0x9, 0x560}, {0x0, 0x0, 0x1000000000c00}, {&(0x7f0000012000)="504d4d00504d4dff", 0x8, 0x10000}], 0x0, &(0x7f0000012b00)) [ 1395.324161] EXT4-fs (loop3): VFS: Can't find ext4 filesystem 19:34:20 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000500100000f000000000000000000000004000000000002000020000020000000def4655fdef4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000008000000018000000", 0x60, 0x400}, {&(0x7f0000010100)="000000000000000000000000e58ca12e13a240e2b1a22f8d07e8e55f010040", 0x1f, 0x4e0}, {&(0x7f0000010200)="010000000000050040", 0x9, 0x560}, {0x0, 0x0, 0x1000000000c00}, {&(0x7f0000012000)="504d4d00504d4dff", 0x8, 0x10000}], 0x0, &(0x7f0000012b00)) [ 1395.350058] EXT4-fs (loop6): fragment/cluster size (16384) != block size (1024) [ 1395.362672] EXT4-fs (loop7): fragment/cluster size (16384) != block size (1024) [ 1395.385247] EXT4-fs (loop5): fragment/cluster size (16384) != block size (1024) 19:34:20 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010100)="000000000000000000000000e58ca12e13a240e2b1a22f8d07e8e55f010040", 0x1f, 0x4e0}, {&(0x7f0000010200)="010000000000050040", 0x9, 0x560}, {0x0, 0x0, 0x1000000000c00}, {&(0x7f0000012000)="504d4d00504d4dff", 0x8, 0x10000}], 0x0, &(0x7f0000012b00)) 19:34:20 executing program 6: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000500100000f000000000000000000000004000000000002000020000020000000def4655fdef4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000008000000018000000", 0x60, 0x400}, {&(0x7f0000010100)="000000000000000000000000e58ca12e13a240e2b1a22f8d07e8e55f010040", 0x1f, 0x4e0}, {&(0x7f0000010200)="010000000000050040", 0x9, 0x560}, {0x0, 0x0, 0x1000000000c00}, {&(0x7f0000012000)="504d4d00504d4dff", 0x8, 0x10000}], 0x0, &(0x7f0000012b00)) [ 1395.425207] EXT4-fs (loop0): fragment/cluster size (16384) != block size (1024) [ 1395.430641] EXT4-fs (loop3): VFS: Can't find ext4 filesystem 19:34:20 executing program 7: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000500100000f000000000000000000000004000000000002000020000020000000def4655fdef4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000008000000018000000", 0x60, 0x400}, {&(0x7f0000010100)="000000000000000000000000e58ca12e13a240e2b1a22f8d07e8e55f010040", 0x1f, 0x4e0}, {&(0x7f0000010200)="010000000000050040", 0x9, 0x560}, {0x0, 0x0, 0x1000000000c00}, {&(0x7f0000012000)="504d4d00504d4dff", 0x8, 0x10000}], 0x0, &(0x7f0000012b00)) [ 1395.476309] EXT4-fs (loop6): fragment/cluster size (16384) != block size (1024) [ 1395.505813] EXT4-fs (loop7): fragment/cluster size (16384) != block size (1024) 19:34:34 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010100)="000000000000000000000000e58ca12e13a240e2b1a22f8d07e8e55f010040", 0x1f, 0x4e0}, {&(0x7f0000010200)="010000000000050040", 0x9, 0x560}, {0x0, 0x0, 0x1000000000c00}, {&(0x7f0000012000)="504d4d00504d4dff", 0x8, 0x10000}], 0x0, &(0x7f0000012b00)) 19:34:34 executing program 1: r0 = syz_io_uring_setup(0x2, &(0x7f0000000500), &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000ff6000/0xa000)=nil, &(0x7f0000000080)=0x0, &(0x7f0000000140)=0x0) r3 = io_uring_setup(0x3ddf, 0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000800)=@IORING_OP_SENDMSG={0x9, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0}, 0x0) r4 = eventfd(0x0) io_uring_register$IORING_REGISTER_EVENTFD(r0, 0x4, &(0x7f0000000000)=r4, 0x1) read$eventfd(r4, &(0x7f0000000040), 0x8) r5 = syz_io_uring_setup(0x3702, &(0x7f00000001c0), &(0x7f0000000000/0x3000)=nil, &(0x7f0000ffe000/0x2000)=nil, &(0x7f0000000140), &(0x7f0000000240)) r6 = dup2(r3, r5) r7 = dup2(r0, r6) io_uring_enter(r7, 0x1739, 0x0, 0x0, 0x0, 0x0) 19:34:34 executing program 4: r0 = syz_io_uring_setup(0x2, &(0x7f0000000500), &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000ff6000/0xa000)=nil, &(0x7f0000000080)=0x0, &(0x7f0000000140)=0x0) r3 = io_uring_setup(0x3ddf, &(0x7f0000000680)) syz_io_uring_submit(r1, r2, &(0x7f0000000800)=@IORING_OP_SENDMSG={0x9, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0}, 0x0) r4 = eventfd(0x0) io_uring_register$IORING_REGISTER_EVENTFD(r0, 0x4, &(0x7f0000000000)=r4, 0x1) read$eventfd(r4, &(0x7f0000000040), 0x8) r5 = syz_io_uring_setup(0x3702, &(0x7f00000001c0), &(0x7f0000000000/0x3000)=nil, &(0x7f0000ffe000/0x2000)=nil, &(0x7f0000000140), &(0x7f0000000240)) r6 = dup2(r3, r5) r7 = dup2(r0, r6) io_uring_enter(r7, 0x0, 0x0, 0x0, 0x0, 0x0) 19:34:34 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000500100000f000000000000000000000004000000000002000020000020000000def4655fdef4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000008000000018000000", 0x60, 0x400}, {&(0x7f0000010100)="000000000000000000000000e58ca12e13a240e2b1a22f8d07e8e55f010040", 0x1f, 0x4e0}, {&(0x7f0000010200)="010000000000050040", 0x9, 0x560}, {0x0, 0x0, 0x1000000000c00}, {&(0x7f0000012000)="504d4d00504d4dff", 0x8, 0x10000}], 0x0, &(0x7f0000012b00)) 19:34:34 executing program 6: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000500100000f000000000000000000000004000000000002000020000020000000def4655fdef4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000008000000018000000c20500002b0200000000000000000000000000000000000073797a6b616c6c6572000000000000002f746d702f73797a", 0x90, 0x400}, {&(0x7f0000010100)="000000000000000000000000e58ca12e13a240e2b1a22f8d07e8e55f010040", 0x1f, 0x4e0}, {&(0x7f0000010200)="010000000000050040", 0x9, 0x560}, {0x0, 0x0, 0x1000000000c00}, {&(0x7f0000012000)="504d4d00504d4dff", 0x8, 0x10000}], 0x0, &(0x7f0000012b00)) 19:34:34 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000500100000f000000000000000000000004000000000002000020000020000000def4655fdef4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000008000000018000000c20500002b", 0x65, 0x400}, {&(0x7f0000010100)="000000000000000000000000e58ca12e13a240e2b1a22f8d07e8e55f010040", 0x1f, 0x4e0}, {&(0x7f0000010200)="010000000000050040", 0x9, 0x560}, {0x0, 0x0, 0x1000000000c00}, {&(0x7f0000012000)="504d4d00504d4dff", 0x8, 0x10000}], 0x0, &(0x7f0000012b00)) 19:34:34 executing program 2: r0 = syz_io_uring_setup(0x2, 0x0, &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000ff6000/0xa000)=nil, &(0x7f0000000080)=0x0, &(0x7f0000000140)=0x0) r3 = io_uring_setup(0x3ddf, &(0x7f0000000680)) syz_io_uring_submit(r1, r2, &(0x7f0000000800)=@IORING_OP_SENDMSG={0x9, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0}, 0x0) r4 = eventfd(0x0) io_uring_register$IORING_REGISTER_EVENTFD(r0, 0x4, &(0x7f0000000000)=r4, 0x1) read$eventfd(r4, &(0x7f0000000040), 0x8) r5 = syz_io_uring_setup(0x3702, &(0x7f00000001c0), &(0x7f0000000000/0x3000)=nil, &(0x7f0000ffe000/0x2000)=nil, &(0x7f0000000140), &(0x7f0000000240)) r6 = dup2(r3, r5) r7 = dup2(r0, r6) io_uring_enter(r7, 0x1739, 0x0, 0x0, 0x0, 0x0) 19:34:34 executing program 7: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000500100000f000000000000000000000004000000000002000020000020000000def4655fdef4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000008000000018000000c20500002b0200000000000000000000000000000000000073797a6b616c6c6572000000000000002f746d702f73797a", 0x90, 0x400}, {&(0x7f0000010100)="000000000000000000000000e58ca12e13a240e2b1a22f8d07e8e55f010040", 0x1f, 0x4e0}, {&(0x7f0000010200)="010000000000050040", 0x9, 0x560}, {0x0, 0x0, 0x1000000000c00}, {&(0x7f0000012000)="504d4d00504d4dff", 0x8, 0x10000}], 0x0, &(0x7f0000012b00)) [ 1408.722296] EXT4-fs (loop0): fragment/cluster size (16384) != block size (1024) [ 1408.725459] EXT4-fs (loop3): VFS: Can't find ext4 filesystem [ 1408.730403] EXT4-fs error (device loop7): ext4_fill_super:4947: inode #2: comm syz-executor.7: iget: root inode unallocated [ 1408.730692] EXT4-fs error (device loop6): ext4_fill_super:4947: inode #2: comm syz-executor.6: iget: root inode unallocated [ 1408.732601] EXT4-fs (loop7): get root inode failed [ 1408.734574] EXT4-fs (loop6): get root inode failed [ 1408.734716] EXT4-fs (loop7): mount failed [ 1408.735516] EXT4-fs (loop6): mount failed [ 1408.750718] EXT4-fs (loop5): fragment/cluster size (16384) != block size (1024) 19:34:34 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000500100000f000000000000000000000004000000000002000020000020000000def4655fdef4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000008000000018000000c20500002b", 0x65, 0x400}, {&(0x7f0000010100)="000000000000000000000000e58ca12e13a240e2b1a22f8d07e8e55f010040", 0x1f, 0x4e0}, {&(0x7f0000010200)="010000000000050040", 0x9, 0x560}, {0x0, 0x0, 0x1000000000c00}, {&(0x7f0000012000)="504d4d00504d4dff", 0x8, 0x10000}], 0x0, &(0x7f0000012b00)) 19:34:34 executing program 7: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000500100000f000000000000000000000004000000000002000020000020000000def4655fdef4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000008000000018000000", 0x60, 0x400}, {&(0x7f0000010100)="000000000000000000000000e58ca12e13a240e2b1a22f8d07e8e55f010040", 0x1f, 0x4e0}, {&(0x7f0000010200)="010000000000050040", 0x9, 0x560}, {0x0, 0x0, 0x1000000000c00}, {&(0x7f0000012000)="504d4d00504d4dff", 0x8, 0x10000}], 0x0, &(0x7f0000012b00)) [ 1408.818184] EXT4-fs (loop5): fragment/cluster size (16384) != block size (1024) 19:34:34 executing program 6: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000500100000f000000000000000000000004000000000002000020000020000000def4655fdef4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000008000000018000000", 0x60, 0x400}, {&(0x7f0000010100)="000000000000000000000000e58ca12e13a240e2b1a22f8d07e8e55f010040", 0x1f, 0x4e0}, {&(0x7f0000010200)="010000000000050040", 0x9, 0x560}, {0x0, 0x0, 0x1000000000c00}, {&(0x7f0000012000)="504d4d00504d4dff", 0x8, 0x10000}], 0x0, &(0x7f0000012b00)) 19:34:34 executing program 0: syz_mount_image$ext4(0x0, &(0x7f0000000180)='./file0\x00', 0x0, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000500100000f000000000000000000000004000000000002000020000020000000def4655fdef4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000008000000018000000", 0x60, 0x400}, {&(0x7f0000010100)="000000000000000000000000e58ca12e13a240e2b1a22f8d07e8e55f010040", 0x1f, 0x4e0}, {&(0x7f0000010200)="010000000000050040", 0x9, 0x560}, {0x0, 0x0, 0x1000000000c00}, {&(0x7f0000012000)="504d4d00504d4dff", 0x8, 0x10000}], 0x0, &(0x7f0000012b00)) 19:34:34 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x5, &(0x7f0000000200)=[{0x0, 0x0, 0x400}, {&(0x7f0000010100)="000000000000000000000000e58ca12e13a240e2b1a22f8d07e8e55f010040", 0x1f, 0x4e0}, {&(0x7f0000010200)="010000000000050040", 0x9, 0x560}, {0x0, 0x0, 0x1000000000c00}, {&(0x7f0000012000)="504d4d00504d4dff", 0x8, 0x10000}], 0x0, &(0x7f0000012b00)) [ 1408.898309] EXT4-fs (loop7): fragment/cluster size (16384) != block size (1024) 19:34:34 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000500100000f000000000000000000000004000000000002000020000020000000def4655fdef4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000008000000018000000c20500002b02", 0x66}, {&(0x7f0000010100)="000000000000000000000000e58ca12e13a240e2b1a22f8d07e8e55f010040", 0x1f, 0x4e0}, {&(0x7f0000010200)="010000000000050040", 0x9, 0x560}, {0x0, 0x0, 0x1000000000c00}, {&(0x7f0000012000)="504d4d00504d4dff", 0x8, 0x10000}], 0x0, &(0x7f0000012b00)) [ 1408.907031] EXT4-fs (loop3): VFS: Can't find ext4 filesystem 19:34:34 executing program 7: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000500100000f000000000000000000000004000000000002000020000020000000def4655fdef4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000008000000018000000", 0x60, 0x400}, {&(0x7f0000010100)="000000000000000000000000e58ca12e13a240e2b1a22f8d07e8e55f010040", 0x1f, 0x4e0}, {&(0x7f0000010200)="010000000000050040", 0x9, 0x560}, {0x0, 0x0, 0x1000000000c00}, {&(0x7f0000012000)="504d4d00504d4dff", 0x8, 0x10000}], 0x0, &(0x7f0000012b00)) [ 1408.935663] EXT4-fs (loop6): fragment/cluster size (16384) != block size (1024) [ 1408.967308] EXT4-fs (loop5): VFS: Can't find ext4 filesystem 19:34:34 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x5, &(0x7f0000000200)=[{0x0, 0x0, 0x400}, {&(0x7f0000010100)="000000000000000000000000e58ca12e13a240e2b1a22f8d07e8e55f010040", 0x1f, 0x4e0}, {&(0x7f0000010200)="010000000000050040", 0x9, 0x560}, {0x0, 0x0, 0x1000000000c00}, {&(0x7f0000012000)="504d4d00504d4dff", 0x8, 0x10000}], 0x0, &(0x7f0000012b00)) 19:34:34 executing program 0: syz_mount_image$ext4(0x0, &(0x7f0000000180)='./file0\x00', 0x0, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000500100000f000000000000000000000004000000000002000020000020000000def4655fdef4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000008000000018000000", 0x60, 0x400}, {&(0x7f0000010100)="000000000000000000000000e58ca12e13a240e2b1a22f8d07e8e55f010040", 0x1f, 0x4e0}, {&(0x7f0000010200)="010000000000050040", 0x9, 0x560}, {0x0, 0x0, 0x1000000000c00}, {&(0x7f0000012000)="504d4d00504d4dff", 0x8, 0x10000}], 0x0, &(0x7f0000012b00)) [ 1409.019283] EXT4-fs (loop7): fragment/cluster size (16384) != block size (1024) [ 1409.057070] EXT4-fs (loop3): VFS: Can't find ext4 filesystem 19:34:47 executing program 4: r0 = syz_io_uring_setup(0x2, &(0x7f0000000500), &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000ff6000/0xa000)=nil, &(0x7f0000000080)=0x0, &(0x7f0000000140)=0x0) r3 = io_uring_setup(0x3ddf, &(0x7f0000000680)) syz_io_uring_submit(r1, r2, &(0x7f0000000800)=@IORING_OP_SENDMSG={0x9, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0}, 0x0) r4 = eventfd(0x0) io_uring_register$IORING_REGISTER_EVENTFD(r0, 0x4, &(0x7f0000000000)=r4, 0x1) read$eventfd(r4, &(0x7f0000000040), 0x8) r5 = syz_io_uring_setup(0x3702, &(0x7f00000001c0), &(0x7f0000000000/0x3000)=nil, &(0x7f0000ffe000/0x2000)=nil, &(0x7f0000000140), &(0x7f0000000240)) r6 = dup2(r3, r5) r7 = dup2(r0, r6) io_uring_enter(r7, 0x0, 0x0, 0x0, 0x0, 0x0) 19:34:47 executing program 2: r0 = syz_io_uring_setup(0x2, 0x0, &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000ff6000/0xa000)=nil, &(0x7f0000000080)=0x0, &(0x7f0000000140)=0x0) r3 = io_uring_setup(0x3ddf, &(0x7f0000000680)) syz_io_uring_submit(r1, r2, &(0x7f0000000800)=@IORING_OP_SENDMSG={0x9, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0}, 0x0) r4 = eventfd(0x0) io_uring_register$IORING_REGISTER_EVENTFD(r0, 0x4, &(0x7f0000000000)=r4, 0x1) read$eventfd(r4, &(0x7f0000000040), 0x8) r5 = syz_io_uring_setup(0x3702, &(0x7f00000001c0), &(0x7f0000000000/0x3000)=nil, &(0x7f0000ffe000/0x2000)=nil, &(0x7f0000000140), &(0x7f0000000240)) r6 = dup2(r3, r5) r7 = dup2(r0, r6) io_uring_enter(r7, 0x1739, 0x0, 0x0, 0x0, 0x0) 19:34:47 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000500100000f000000000000000000000004000000000002000020000020000000def4655fdef4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000008000000018000000c20500002b02", 0x66}, {&(0x7f0000010100)="000000000000000000000000e58ca12e13a240e2b1a22f8d07e8e55f010040", 0x1f, 0x4e0}, {&(0x7f0000010200)="010000000000050040", 0x9, 0x560}, {0x0, 0x0, 0x1000000000c00}, {&(0x7f0000012000)="504d4d00504d4dff", 0x8, 0x10000}], 0x0, &(0x7f0000012b00)) 19:34:47 executing program 6: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000500100000f000000000000000000000004000000000002000020000020000000def4655fdef4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000008000000018000000", 0x60, 0x400}, {&(0x7f0000010100)="000000000000000000000000e58ca12e13a240e2b1a22f8d07e8e55f010040", 0x1f, 0x4e0}, {&(0x7f0000010200)="010000000000050040", 0x9, 0x560}, {0x0, 0x0, 0x1000000000c00}, {&(0x7f0000012000)="504d4d00504d4dff", 0x8, 0x10000}], 0x0, &(0x7f0000012b00)) 19:34:47 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x5, &(0x7f0000000200)=[{0x0, 0x0, 0x400}, {&(0x7f0000010100)="000000000000000000000000e58ca12e13a240e2b1a22f8d07e8e55f010040", 0x1f, 0x4e0}, {&(0x7f0000010200)="010000000000050040", 0x9, 0x560}, {0x0, 0x0, 0x1000000000c00}, {&(0x7f0000012000)="504d4d00504d4dff", 0x8, 0x10000}], 0x0, &(0x7f0000012b00)) 19:34:47 executing program 7: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000500100000f000000000000000000000004000000000002000020000020000000def4655fdef4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000008000000018000000", 0x60, 0x400}, {&(0x7f0000010100)="000000000000000000000000e58ca12e13a240e2b1a22f8d07e8e55f010040", 0x1f, 0x4e0}, {&(0x7f0000010200)="010000000000050040", 0x9, 0x560}, {0x0, 0x0, 0x1000000000c00}, {&(0x7f0000012000)="504d4d00504d4dff", 0x8, 0x10000}], 0x0, &(0x7f0000012b00)) 19:34:47 executing program 0: syz_mount_image$ext4(0x0, &(0x7f0000000180)='./file0\x00', 0x0, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000500100000f000000000000000000000004000000000002000020000020000000def4655fdef4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000008000000018000000", 0x60, 0x400}, {&(0x7f0000010100)="000000000000000000000000e58ca12e13a240e2b1a22f8d07e8e55f010040", 0x1f, 0x4e0}, {&(0x7f0000010200)="010000000000050040", 0x9, 0x560}, {0x0, 0x0, 0x1000000000c00}, {&(0x7f0000012000)="504d4d00504d4dff", 0x8, 0x10000}], 0x0, &(0x7f0000012b00)) 19:34:47 executing program 1: r0 = syz_io_uring_setup(0x2, &(0x7f0000000500), &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000ff6000/0xa000)=nil, &(0x7f0000000080), &(0x7f0000000140)=0x0) r2 = io_uring_setup(0x3ddf, &(0x7f0000000680)) syz_io_uring_submit(0x0, r1, &(0x7f0000000800)=@IORING_OP_SENDMSG={0x9, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0}, 0x0) r3 = eventfd(0x0) io_uring_register$IORING_REGISTER_EVENTFD(r0, 0x4, &(0x7f0000000000)=r3, 0x1) read$eventfd(r3, &(0x7f0000000040), 0x8) r4 = syz_io_uring_setup(0x3702, &(0x7f00000001c0), &(0x7f0000000000/0x3000)=nil, &(0x7f0000ffe000/0x2000)=nil, &(0x7f0000000140), &(0x7f0000000240)) r5 = dup2(r2, r4) r6 = dup2(r0, r5) io_uring_enter(r6, 0x1739, 0x0, 0x0, 0x0, 0x0) 19:34:47 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', 0x0, 0x0, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000500100000f000000000000000000000004000000000002000020000020000000def4655fdef4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000008000000018000000", 0x60, 0x400}, {&(0x7f0000010100)="000000000000000000000000e58ca12e13a240e2b1a22f8d07e8e55f010040", 0x1f, 0x4e0}, {&(0x7f0000010200)="010000000000050040", 0x9, 0x560}, {0x0, 0x0, 0x1000000000c00}, {&(0x7f0000012000)="504d4d00504d4dff", 0x8, 0x10000}], 0x0, &(0x7f0000012b00)) [ 1421.691871] EXT4-fs (loop7): fragment/cluster size (16384) != block size (1024) [ 1421.693607] EXT4-fs (loop6): fragment/cluster size (16384) != block size (1024) [ 1421.696261] EXT4-fs (loop5): VFS: Can't find ext4 filesystem [ 1421.703685] EXT4-fs (loop3): VFS: Can't find ext4 filesystem 19:34:47 executing program 7: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000500100000f000000000000000000000004000000000002000020000020000000def4655fdef4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000008000000018000000c20500002b0200"/120, 0x78, 0x400}, {&(0x7f0000010100)="000000000000000000000000e58ca12e13a240e2b1a22f8d07e8e55f010040", 0x1f, 0x4e0}, {&(0x7f0000010200)="010000000000050040", 0x9, 0x560}, {0x0, 0x0, 0x1000000000c00}, {&(0x7f0000012000)="504d4d00504d4dff", 0x8, 0x10000}], 0x0, &(0x7f0000012b00)) 19:34:47 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000500100000f000000000000000000000004000000000002000020000020000000def4655fdef4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000008000000018000000c20500002b02", 0x66}, {&(0x7f0000010100)="000000000000000000000000e58ca12e13a240e2b1a22f8d07e8e55f010040", 0x1f, 0x4e0}, {&(0x7f0000010200)="010000000000050040", 0x9, 0x560}, {0x0, 0x0, 0x1000000000c00}, {&(0x7f0000012000)="504d4d00504d4dff", 0x8, 0x10000}], 0x0, &(0x7f0000012b00)) 19:34:47 executing program 6: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000500100000f000000000000000000000004000000000002000020000020000000def4655fdef4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000008000000018000000", 0x60, 0x400}, {&(0x7f0000010100)="000000000000000000000000e58ca12e13a240e2b1a22f8d07e8e55f010040", 0x1f, 0x4e0}, {&(0x7f0000010200)="010000000000050040", 0x9, 0x560}, {0x0, 0x0, 0x1000000000c00}, {&(0x7f0000012000)="504d4d00504d4dff", 0x8, 0x10000}], 0x0, &(0x7f0000012b00)) 19:34:47 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000), 0x0, 0x400}, {&(0x7f0000010100)="000000000000000000000000e58ca12e13a240e2b1a22f8d07e8e55f010040", 0x1f, 0x4e0}, {&(0x7f0000010200)="010000000000050040", 0x9, 0x560}, {0x0, 0x0, 0x1000000000c00}, {&(0x7f0000012000)="504d4d00504d4dff", 0x8, 0x10000}], 0x0, &(0x7f0000012b00)) 19:34:47 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', 0x0, 0x0, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000500100000f000000000000000000000004000000000002000020000020000000def4655fdef4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000008000000018000000", 0x60, 0x400}, {&(0x7f0000010100)="000000000000000000000000e58ca12e13a240e2b1a22f8d07e8e55f010040", 0x1f, 0x4e0}, {&(0x7f0000010200)="010000000000050040", 0x9, 0x560}, {0x0, 0x0, 0x1000000000c00}, {&(0x7f0000012000)="504d4d00504d4dff", 0x8, 0x10000}], 0x0, &(0x7f0000012b00)) [ 1421.812246] EXT4-fs (loop5): VFS: Can't find ext4 filesystem [ 1421.827962] EXT4-fs error (device loop7): ext4_fill_super:4947: inode #2: comm syz-executor.7: iget: root inode unallocated [ 1421.830212] EXT4-fs (loop7): get root inode failed [ 1421.830999] EXT4-fs (loop7): mount failed 19:34:47 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000500100000f000000000000000000000004000000000002000020000020000000def4655fdef4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000008000000018000000c20500002b02", 0x66, 0x400}, {&(0x7f0000010100)="000000000000000000000000e58ca12e13a240e2b1a22f8d07e8e55f010040", 0x1f, 0x4e0}, {&(0x7f0000010200)="010000000000050040", 0x9, 0x560}, {0x0, 0x0, 0x1000000000c00}, {&(0x7f0000012000)="504d4d00504d4dff", 0x8, 0x10000}], 0x0, 0x0) [ 1421.859958] EXT4-fs (loop6): fragment/cluster size (16384) != block size (1024) [ 1421.861140] EXT4-fs (loop3): VFS: Can't find ext4 filesystem 19:34:47 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', 0x0, 0x0, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000500100000f000000000000000000000004000000000002000020000020000000def4655fdef4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000008000000018000000", 0x60, 0x400}, {&(0x7f0000010100)="000000000000000000000000e58ca12e13a240e2b1a22f8d07e8e55f010040", 0x1f, 0x4e0}, {&(0x7f0000010200)="010000000000050040", 0x9, 0x560}, {0x0, 0x0, 0x1000000000c00}, {&(0x7f0000012000)="504d4d00504d4dff", 0x8, 0x10000}], 0x0, &(0x7f0000012b00)) 19:34:58 executing program 2: r0 = syz_io_uring_setup(0x2, 0x0, &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000ff6000/0xa000)=nil, &(0x7f0000000080)=0x0, &(0x7f0000000140)=0x0) r3 = io_uring_setup(0x3ddf, &(0x7f0000000680)) syz_io_uring_submit(r1, r2, &(0x7f0000000800)=@IORING_OP_SENDMSG={0x9, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0}, 0x0) r4 = eventfd(0x0) io_uring_register$IORING_REGISTER_EVENTFD(r0, 0x4, &(0x7f0000000000)=r4, 0x1) read$eventfd(r4, &(0x7f0000000040), 0x8) r5 = syz_io_uring_setup(0x3702, &(0x7f00000001c0), &(0x7f0000000000/0x3000)=nil, &(0x7f0000ffe000/0x2000)=nil, &(0x7f0000000140), &(0x7f0000000240)) r6 = dup2(r3, r5) r7 = dup2(r0, r6) io_uring_enter(r7, 0x1739, 0x0, 0x0, 0x0, 0x0) 19:34:58 executing program 7: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000500100000f000000000000000000000004000000000002000020000020000000def4655fdef4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000008000000018000000", 0x60, 0x400}, {&(0x7f0000010100)="000000000000000000000000e58ca12e13a240e2b1a22f8d07e8e55f010040", 0x1f, 0x4e0}, {&(0x7f0000010200)="010000000000050040", 0x9, 0x560}, {0x0, 0x0, 0x1000000000c00}, {&(0x7f0000012000)="504d4d00504d4dff", 0x8, 0x10000}], 0x0, &(0x7f0000012b00)) 19:34:58 executing program 6: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000500100000f000000000000000000000004000000000002000020000020000000def4655fdef4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000008000000018000000c20500002b0200"/120, 0x78, 0x400}, {&(0x7f0000010100)="000000000000000000000000e58ca12e13a240e2b1a22f8d07e8e55f010040", 0x1f, 0x4e0}, {&(0x7f0000010200)="010000000000050040", 0x9, 0x560}, {0x0, 0x0, 0x1000000000c00}, {&(0x7f0000012000)="504d4d00504d4dff", 0x8, 0x10000}], 0x0, &(0x7f0000012b00)) 19:34:58 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000), 0x0, 0x400}, {&(0x7f0000010100)="000000000000000000000000e58ca12e13a240e2b1a22f8d07e8e55f010040", 0x1f, 0x4e0}, {&(0x7f0000010200)="010000000000050040", 0x9, 0x560}, {0x0, 0x0, 0x1000000000c00}, {&(0x7f0000012000)="504d4d00504d4dff", 0x8, 0x10000}], 0x0, &(0x7f0000012b00)) 19:34:58 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000012b00)) 19:34:58 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000500100000f000000000000000000000004000000000002000020000020000000def4655fdef4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000008000000018000000c20500002b02", 0x66, 0x400}, {&(0x7f0000010100)="000000000000000000000000e58ca12e13a240e2b1a22f8d07e8e55f010040", 0x1f, 0x4e0}, {&(0x7f0000010200)="010000000000050040", 0x9, 0x560}, {0x0, 0x0, 0x1000000000c00}, {&(0x7f0000012000)="504d4d00504d4dff", 0x8, 0x10000}], 0x0, 0x0) 19:34:58 executing program 1: r0 = syz_io_uring_setup(0x2, &(0x7f0000000500), &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000ff6000/0xa000)=nil, &(0x7f0000000080), &(0x7f0000000140)=0x0) r2 = io_uring_setup(0x3ddf, &(0x7f0000000680)) syz_io_uring_submit(0x0, r1, &(0x7f0000000800)=@IORING_OP_SENDMSG={0x9, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0}, 0x0) r3 = eventfd(0x0) io_uring_register$IORING_REGISTER_EVENTFD(r0, 0x4, &(0x7f0000000000)=r3, 0x1) read$eventfd(r3, &(0x7f0000000040), 0x8) r4 = syz_io_uring_setup(0x3702, &(0x7f00000001c0), &(0x7f0000000000/0x3000)=nil, &(0x7f0000ffe000/0x2000)=nil, &(0x7f0000000140), &(0x7f0000000240)) r5 = dup2(r2, r4) r6 = dup2(r0, r5) io_uring_enter(r6, 0x1739, 0x0, 0x0, 0x0, 0x0) 19:34:58 executing program 4: r0 = syz_io_uring_setup(0x2, &(0x7f0000000500), &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000ff6000/0xa000)=nil, &(0x7f0000000080), &(0x7f0000000140)=0x0) r2 = io_uring_setup(0x3ddf, &(0x7f0000000680)) syz_io_uring_submit(0x0, r1, &(0x7f0000000800)=@IORING_OP_SENDMSG={0x9, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0}, 0x0) r3 = eventfd(0x0) io_uring_register$IORING_REGISTER_EVENTFD(r0, 0x4, &(0x7f0000000000)=r3, 0x1) read$eventfd(r3, &(0x7f0000000040), 0x8) r4 = syz_io_uring_setup(0x3702, &(0x7f00000001c0), &(0x7f0000000000/0x3000)=nil, &(0x7f0000ffe000/0x2000)=nil, &(0x7f0000000140), &(0x7f0000000240)) r5 = dup2(r2, r4) r6 = dup2(r0, r5) io_uring_enter(r6, 0x1739, 0x0, 0x0, 0x0, 0x0) [ 1432.939316] EXT4-fs (loop3): VFS: Can't find ext4 filesystem 19:34:58 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000012b00)) [ 1432.945792] EXT4-fs (loop7): fragment/cluster size (16384) != block size (1024) 19:34:58 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000500100000f000000000000000000000004000000000002000020000020000000def4655fdef4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000008000000018000000c20500002b02", 0x66, 0x400}, {&(0x7f0000010100)="000000000000000000000000e58ca12e13a240e2b1a22f8d07e8e55f010040", 0x1f, 0x4e0}, {&(0x7f0000010200)="010000000000050040", 0x9, 0x560}, {0x0, 0x0, 0x1000000000c00}, {&(0x7f0000012000)="504d4d00504d4dff", 0x8, 0x10000}], 0x0, 0x0) 19:34:58 executing program 7: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000500100000f000000000000000000000004000000000002000020000020000000def4655fdef4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000008000000018000000", 0x60, 0x400}, {&(0x7f0000010100)="000000000000000000000000e58ca12e13a240e2b1a22f8d07e8e55f010040", 0x1f, 0x4e0}, {&(0x7f0000010200)="010000000000050040", 0x9, 0x560}, {0x0, 0x0, 0x1000000000c00}, {&(0x7f0000012000)="504d4d00504d4dff", 0x8, 0x10000}], 0x0, &(0x7f0000012b00)) [ 1432.984589] EXT4-fs error (device loop6): ext4_fill_super:4947: inode #2: comm syz-executor.6: iget: root inode unallocated [ 1432.989160] EXT4-fs (loop6): get root inode failed [ 1432.990368] EXT4-fs (loop6): mount failed [ 1433.031735] EXT4-fs (loop7): fragment/cluster size (16384) != block size (1024) 19:34:58 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000), 0x0, 0x400}, {&(0x7f0000010100)="000000000000000000000000e58ca12e13a240e2b1a22f8d07e8e55f010040", 0x1f, 0x4e0}, {&(0x7f0000010200)="010000000000050040", 0x9, 0x560}, {0x0, 0x0, 0x1000000000c00}, {&(0x7f0000012000)="504d4d00504d4dff", 0x8, 0x10000}], 0x0, &(0x7f0000012b00)) 19:34:58 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000012b00)) 19:34:58 executing program 7: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000500100000f000000000000000000000004000000000002000020000020000000def4655fdef4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000008000000018000000", 0x60, 0x400}, {&(0x7f0000010100)="000000000000000000000000e58ca12e13a240e2b1a22f8d07e8e55f010040", 0x1f, 0x4e0}, {&(0x7f0000010200)="010000000000050040", 0x9, 0x560}, {0x0, 0x0, 0x1000000000c00}, {&(0x7f0000012000)="504d4d00504d4dff", 0x8, 0x10000}], 0x0, &(0x7f0000012b00)) 19:34:58 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000500100000f000000000000000000000004000000000002000020000020000000def4655fdef4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000008000000018000000c20500002b02", 0x66, 0x400}, {&(0x7f0000010100)="000000000000000000000000e58ca12e13a240e2b1a22f8d07e8e55f010040", 0x1f, 0x4e0}, {&(0x7f0000010200)="010000000000050040", 0x9, 0x560}, {0x0, 0x0, 0x1000000000c00}, {&(0x7f0000012000)="504d4d00504d4dff", 0x8, 0x10000}], 0x0, 0x0) 19:34:58 executing program 6: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000500100000f000000000000000000000004000000000002000020000020000000def4655fdef4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000008000000018000000", 0x60, 0x400}, {&(0x7f0000010100)="000000000000000000000000e58ca12e13a240e2b1a22f8d07e8e55f010040", 0x1f, 0x4e0}, {&(0x7f0000010200)="010000000000050040", 0x9, 0x560}, {0x0, 0x0, 0x1000000000c00}, {&(0x7f0000012000)="504d4d00504d4dff", 0x8, 0x10000}], 0x0, &(0x7f0000012b00)) [ 1433.131080] EXT4-fs (loop7): fragment/cluster size (16384) != block size (1024) [ 1433.169114] EXT4-fs (loop6): fragment/cluster size (16384) != block size (1024) [ 1433.174683] EXT4-fs (loop3): VFS: Can't find ext4 filesystem 19:35:10 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x5, &(0x7f0000000200)=[{0x0, 0x0, 0x400}, {&(0x7f0000010100)="000000000000000000000000e58ca12e13a240e2b1a22f8d07e8e55f010040", 0x1f, 0x4e0}, {&(0x7f0000010200)="010000000000050040", 0x9, 0x560}, {0x0, 0x0, 0x1000000000c00}, {&(0x7f0000012000)="504d4d00504d4dff", 0x8, 0x10000}], 0x0, &(0x7f0000012b00)) 19:35:10 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000500100000f000000000000000000000004000000000002000020000020000000def4655fdef4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000008000000018000000", 0x60, 0x400}, {&(0x7f0000010100)="000000000000000000000000e58ca12e13a240e2b1a22f8d07e8e55f010040", 0x1f, 0x4e0}, {&(0x7f0000010200)="010000000000050040", 0x9, 0x560}, {0x0, 0x0, 0x1000000000c00}], 0x0, &(0x7f0000012b00)) 19:35:10 executing program 2: r0 = syz_io_uring_setup(0x2, &(0x7f0000000500), &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000ff6000/0xa000)=nil, 0x0, &(0x7f0000000140)=0x0) r2 = io_uring_setup(0x3ddf, &(0x7f0000000680)) syz_io_uring_submit(0x0, r1, &(0x7f0000000800)=@IORING_OP_SENDMSG={0x9, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0}, 0x0) r3 = eventfd(0x0) io_uring_register$IORING_REGISTER_EVENTFD(r0, 0x4, &(0x7f0000000000)=r3, 0x1) read$eventfd(r3, &(0x7f0000000040), 0x8) r4 = syz_io_uring_setup(0x3702, &(0x7f00000001c0), &(0x7f0000000000/0x3000)=nil, &(0x7f0000ffe000/0x2000)=nil, &(0x7f0000000140), &(0x7f0000000240)) r5 = dup2(r2, r4) r6 = dup2(r0, r5) io_uring_enter(r6, 0x1739, 0x0, 0x0, 0x0, 0x0) 19:35:10 executing program 7: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000500100000f000000000000000000000004000000000002000020000020000000def4655fdef4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000008000000018000000c20500002b02000000000000", 0x6c, 0x400}, {&(0x7f0000010100)="000000000000000000000000e58ca12e13a240e2b1a22f8d07e8e55f010040", 0x1f, 0x4e0}, {&(0x7f0000010200)="010000000000050040", 0x9, 0x560}, {0x0, 0x0, 0x1000000000c00}, {&(0x7f0000012000)="504d4d00504d4dff", 0x8, 0x10000}], 0x0, &(0x7f0000012b00)) 19:35:10 executing program 6: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000500100000f000000000000000000000004000000000002000020000020000000def4655fdef4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000008000000018000000", 0x60, 0x400}, {&(0x7f0000010100)="000000000000000000000000e58ca12e13a240e2b1a22f8d07e8e55f010040", 0x1f, 0x4e0}, {&(0x7f0000010200)="010000000000050040", 0x9, 0x560}, {0x0, 0x0, 0x1000000000c00}, {&(0x7f0000012000)="504d4d00504d4dff", 0x8, 0x10000}], 0x0, &(0x7f0000012b00)) 19:35:10 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000500100000f000000000000000000000004000000000002000020000020000000def4655fdef4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000008000000018000000c20500002b0200000000000000000000000000000000000073797a6b616c6c6572000000000000002f746d702f73797a", 0x90, 0x400}, {&(0x7f0000010100)="000000000000000000000000e58ca12e13a240e2b1a22f8d07e8e55f010040", 0x1f, 0x4e0}, {&(0x7f0000010200)="010000000000050040", 0x9, 0x560}, {0x0, 0x0, 0x1000000000c00}, {&(0x7f0000012000)="504d4d00504d4dff", 0x8, 0x10000}], 0x0, &(0x7f0000012b00)) 19:35:10 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000500100000f000000000000000000000004000000000002000020000020000000def4655fdef4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000008000000018000000", 0x60, 0x400}, {&(0x7f0000010100)="000000000000000000000000e58ca12e13a240e2b1a22f8d07e8e55f010040", 0x1f, 0x4e0}, {&(0x7f0000010200)="010000000000050040", 0x9, 0x560}, {0x0, 0x0, 0x1000000000c00}, {&(0x7f0000012000)="504d4d00504d4dff", 0x8, 0x10000}], 0x0, &(0x7f0000012b00)) 19:35:10 executing program 1: r0 = syz_io_uring_setup(0x2, &(0x7f0000000500), &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000ff6000/0xa000)=nil, &(0x7f0000000080), &(0x7f0000000140)=0x0) r2 = io_uring_setup(0x3ddf, &(0x7f0000000680)) syz_io_uring_submit(0x0, r1, &(0x7f0000000800)=@IORING_OP_SENDMSG={0x9, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0}, 0x0) r3 = eventfd(0x0) io_uring_register$IORING_REGISTER_EVENTFD(r0, 0x4, &(0x7f0000000000)=r3, 0x1) read$eventfd(r3, &(0x7f0000000040), 0x8) r4 = syz_io_uring_setup(0x3702, &(0x7f00000001c0), &(0x7f0000000000/0x3000)=nil, &(0x7f0000ffe000/0x2000)=nil, &(0x7f0000000140), &(0x7f0000000240)) r5 = dup2(r2, r4) r6 = dup2(r0, r5) io_uring_enter(r6, 0x1739, 0x0, 0x0, 0x0, 0x0) [ 1445.402517] EXT4-fs (loop4): VFS: Can't find ext4 filesystem [ 1445.405155] EXT4-fs (loop0): fragment/cluster size (16384) != block size (1024) [ 1445.408988] EXT4-fs (loop3): fragment/cluster size (16384) != block size (1024) [ 1445.412248] EXT4-fs error (device loop7): ext4_fill_super:4947: inode #2: comm syz-executor.7: iget: root inode unallocated [ 1445.416124] EXT4-fs (loop7): get root inode failed [ 1445.416991] EXT4-fs (loop7): mount failed [ 1445.419322] EXT4-fs error (device loop5): ext4_fill_super:4947: inode #2: comm syz-executor.5: iget: root inode unallocated [ 1445.419382] EXT4-fs (loop6): fragment/cluster size (16384) != block size (1024) [ 1445.423511] EXT4-fs (loop5): get root inode failed [ 1445.424310] EXT4-fs (loop5): mount failed 19:35:10 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000500100000f000000000000000000000004000000000002000020000020000000def4655fdef4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000008000000018000000c20500002b0200000000000000000000000000000000000073797a6b616c6c6572000000000000002f746d702f73797a2d696d61676567656e35373134333434333800"/192, 0xc0, 0x400}, {&(0x7f0000010100)="000000000000000000000000e58ca12e13a240e2b1a22f8d07e8e55f0100", 0x1e, 0x4e0}, {&(0x7f0000010200)="010000000000050040", 0x9, 0x560}, {0x0, 0x0, 0x1000000000c00}, {&(0x7f0000012000)="504d4d00504d4dff", 0x8, 0x10000}], 0x0, &(0x7f0000012b00)) 19:35:10 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000500100000f000000000000000000000004000000000002000020000020000000def4655fdef4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000008000000018000000", 0x60, 0x400}, {&(0x7f0000010100)="000000000000000000000000e58ca12e13a240e2b1a22f8d07e8e55f010040", 0x1f, 0x4e0}, {&(0x7f0000010200)="010000000000050040", 0x9, 0x560}, {0x0, 0x0, 0x1000000000c00}, {&(0x7f0000012000)="504d4d00504d4dff", 0x8, 0x10000}], 0x0, &(0x7f0000012b00)) 19:35:10 executing program 7: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000500100000f000000000000000000000004000000000002000020000020000000def4655fdef4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000008000000018000000", 0x60, 0x400}, {&(0x7f0000010100)="000000000000000000000000e58ca12e13a240e2b1a22f8d07e8e55f010040", 0x1f, 0x4e0}, {&(0x7f0000010200)="010000000000050040", 0x9, 0x560}, {0x0, 0x0, 0x1000000000c00}, {&(0x7f0000012000)="504d4d00504d4dff", 0x8, 0x10000}], 0x0, &(0x7f0000012b00)) 19:35:10 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000500100000f000000000000000000000004000000000002000020000020000000def4655fdef4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000008000000018000000", 0x60, 0x400}, {&(0x7f0000010100)="000000000000000000000000e58ca12e13a240e2b1a22f8d07e8e55f010040", 0x1f, 0x4e0}, {&(0x7f0000010200)="010000000000050040", 0x9, 0x560}], 0x0, &(0x7f0000012b00)) [ 1445.511902] EXT4-fs (loop7): fragment/cluster size (16384) != block size (1024) 19:35:10 executing program 6: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000500100000f000000000000000000000004000000000002000020000020000000def4655fdef4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000008000000018000000", 0x60, 0x400}, {&(0x7f0000010100)="000000000000000000000000e58ca12e13a240e2b1a22f8d07e8e55f010040", 0x1f, 0x4e0}, {&(0x7f0000010200)="010000000000050040", 0x9, 0x560}, {0x0, 0x0, 0x1000000000c00}, {&(0x7f0000012000)="504d4d00504d4dff", 0x8, 0x10000}], 0x0, &(0x7f0000012b00)) 19:35:10 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000500100000f000000000000000000000004000000000002000020000020000000def4655fdef4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000008000000018000000c20500002b02000000000000", 0x6c, 0x400}, {&(0x7f0000010100)="000000000000000000000000e58ca12e13a240e2b1a22f8d07e8e55f010040", 0x1f, 0x4e0}, {&(0x7f0000010200)="010000000000050040", 0x9, 0x560}, {0x0, 0x0, 0x1000000000c00}, {&(0x7f0000012000)="504d4d00504d4dff", 0x8, 0x10000}], 0x0, &(0x7f0000012b00)) [ 1445.554003] EXT4-fs (loop6): fragment/cluster size (16384) != block size (1024) 19:35:10 executing program 7: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000500100000f000000000000000000000004000000000002000020000020000000def4655fdef4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000008000000018000000", 0x60, 0x400}, {&(0x7f0000010100)="000000000000000000000000e58ca12e13a240e2b1a22f8d07e8e55f010040", 0x1f, 0x4e0}, {&(0x7f0000010200)="010000000000050040", 0x9, 0x560}, {0x0, 0x0, 0x1000000000c00}, {&(0x7f0000012000)="504d4d00504d4dff", 0x8, 0x10000}], 0x0, &(0x7f0000012b00)) [ 1445.590453] EXT4-fs (loop4): unsupported descriptor size 0 [ 1445.604663] EXT4-fs (loop0): fragment/cluster size (16384) != block size (1024) [ 1445.612842] EXT4-fs (loop3): fragment/cluster size (16384) != block size (1024) [ 1445.642886] EXT4-fs (loop7): fragment/cluster size (16384) != block size (1024) [ 1445.675544] EXT4-fs error (device loop5): ext4_fill_super:4947: inode #2: comm syz-executor.5: iget: root inode unallocated [ 1445.680804] EXT4-fs (loop5): get root inode failed [ 1445.681463] EXT4-fs (loop5): mount failed 19:35:22 executing program 2: r0 = syz_io_uring_setup(0x2, &(0x7f0000000500), &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000ff6000/0xa000)=nil, 0x0, &(0x7f0000000140)=0x0) r2 = io_uring_setup(0x3ddf, &(0x7f0000000680)) syz_io_uring_submit(0x0, r1, &(0x7f0000000800)=@IORING_OP_SENDMSG={0x9, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0}, 0x0) r3 = eventfd(0x0) io_uring_register$IORING_REGISTER_EVENTFD(r0, 0x4, &(0x7f0000000000)=r3, 0x1) read$eventfd(r3, &(0x7f0000000040), 0x8) r4 = syz_io_uring_setup(0x3702, &(0x7f00000001c0), &(0x7f0000000000/0x3000)=nil, &(0x7f0000ffe000/0x2000)=nil, &(0x7f0000000140), &(0x7f0000000240)) r5 = dup2(r2, r4) r6 = dup2(r0, r5) io_uring_enter(r6, 0x1739, 0x0, 0x0, 0x0, 0x0) 19:35:22 executing program 1: r0 = syz_io_uring_setup(0x2, &(0x7f0000000500), &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000ff6000/0xa000)=nil, &(0x7f0000000080)=0x0, &(0x7f0000000140)) r2 = io_uring_setup(0x3ddf, &(0x7f0000000680)) syz_io_uring_submit(r1, 0x0, &(0x7f0000000800)=@IORING_OP_SENDMSG={0x9, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0}, 0x0) r3 = eventfd(0x0) io_uring_register$IORING_REGISTER_EVENTFD(r0, 0x4, &(0x7f0000000000)=r3, 0x1) read$eventfd(r3, &(0x7f0000000040), 0x8) r4 = syz_io_uring_setup(0x3702, &(0x7f00000001c0), &(0x7f0000000000/0x3000)=nil, &(0x7f0000ffe000/0x2000)=nil, &(0x7f0000000140), &(0x7f0000000240)) r5 = dup2(r2, r4) r6 = dup2(r0, r5) io_uring_enter(r6, 0x1739, 0x0, 0x0, 0x0, 0x0) 19:35:22 executing program 6: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000500100000f000000000000000000000004000000000002000020000020000000def4655fdef4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000008000000018000000c20500002b02000000000000", 0x6c, 0x400}, {&(0x7f0000010100)="000000000000000000000000e58ca12e13a240e2b1a22f8d07e8e55f010040", 0x1f, 0x4e0}, {&(0x7f0000010200)="010000000000050040", 0x9, 0x560}, {0x0, 0x0, 0x1000000000c00}, {&(0x7f0000012000)="504d4d00504d4dff", 0x8, 0x10000}], 0x0, &(0x7f0000012b00)) 19:35:22 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000500100000f000000000000000000000004000000000002000020000020000000def4655fdef4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000008000000018000000", 0x60, 0x400}, {&(0x7f0000010100)="000000000000000000000000e58ca12e13a240e2b1a22f8d07e8e55f010040", 0x1f, 0x4e0}, {&(0x7f0000010200)="010000000000050040", 0x9, 0x560}, {0x0, 0x0, 0x1000000000c00}, {&(0x7f0000012000)="504d4d00504d4dff", 0x8, 0x10000}], 0x0, &(0x7f0000012b00)) 19:35:22 executing program 7: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000500100000f000000000000000000000004000000000002000020000020000000def4655fdef4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000008000000018000000", 0x60, 0x400}, {&(0x7f0000010100)="000000000000000000000000e58ca12e13a240e2b1a22f8d07e8e55f010040", 0x1f, 0x4e0}, {&(0x7f0000010200)="010000000000050040", 0x9, 0x560}, {0x0, 0x0, 0x1000000000c00}, {&(0x7f0000012000)="504d4d00504d4dff", 0x8, 0x10000}], 0x0, &(0x7f0000012b00)) 19:35:22 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000500100000f000000000000000000000004000000000002000020000020000000def4655fdef4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000008000000018000000", 0x60, 0x400}, {&(0x7f0000010100)="000000000000000000000000e58ca12e13a240e2b1a22f8d07e8e55f010040", 0x1f, 0x4e0}], 0x0, &(0x7f0000012b00)) 19:35:22 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000500100000f000000000000000000000004000000000002000020000020000000def4655fdef4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000008000000018000000", 0x60, 0x400}, {&(0x7f0000010100)="000000000000000000000000e58ca12e13a240e2b1a22f8d07e8e55f010040", 0x1f, 0x4e0}, {&(0x7f0000010200)="010000000000050040", 0x9, 0x560}, {0x0, 0x0, 0x1000000000c00}, {&(0x7f0000012000)="504d4d00504d4dff", 0x8, 0x10000}], 0x0, &(0x7f0000012b00)) 19:35:22 executing program 5: syz_io_uring_setup(0x21, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, &(0x7f00000a0000)=nil, &(0x7f00000b0000)=nil, &(0x7f0000000180), &(0x7f0000002a40)) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r0 = syz_io_uring_setup(0x2, &(0x7f0000000500), &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000ff6000/0xa000)=nil, &(0x7f0000000080)=0x0, &(0x7f0000000140)=0x0) r3 = io_uring_setup(0x3ddf, &(0x7f0000000680)) syz_io_uring_submit(r1, r2, &(0x7f0000000800)=@IORING_OP_SENDMSG={0x9, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0}, 0x0) r4 = eventfd(0x0) io_uring_register$IORING_REGISTER_EVENTFD(r0, 0x4, &(0x7f0000000000)=r4, 0x1) read$eventfd(r4, &(0x7f0000000040), 0x8) r5 = syz_io_uring_setup(0x3702, &(0x7f00000001c0), &(0x7f0000000000/0x3000)=nil, &(0x7f0000ffe000/0x2000)=nil, &(0x7f0000000140), &(0x7f0000000240)) r6 = dup2(r3, r5) r7 = dup2(r0, r6) io_uring_enter(r7, 0x1739, 0x0, 0x0, 0x0, 0x0) [ 1457.051270] EXT4-fs (loop4): fragment/cluster size (16384) != block size (1024) 19:35:22 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000500100000f000000000000000000000004000000000002000020000020000000def4655fdef4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000008000000018000000", 0x60, 0x400}, {&(0x7f0000010100)="000000000000000000000000e58ca12e13a240e2b1a22f8d07e8e55f010040", 0x1f, 0x4e0}, {&(0x7f0000010200)="010000000000050040", 0x9, 0x560}, {0x0, 0x0, 0x1000000000c00}, {&(0x7f0000012000)="504d4d00504d4dff", 0x8, 0x10000}], 0x0, &(0x7f0000012b00)) [ 1457.076548] EXT4-fs (loop7): fragment/cluster size (16384) != block size (1024) [ 1457.094667] EXT4-fs (loop0): fragment/cluster size (16384) != block size (1024) [ 1457.101397] EXT4-fs (loop3): fragment/cluster size (16384) != block size (1024) [ 1457.104258] EXT4-fs error (device loop6): ext4_fill_super:4947: inode #2: comm syz-executor.6: iget: root inode unallocated [ 1457.107167] EXT4-fs (loop6): get root inode failed [ 1457.108436] EXT4-fs (loop6): mount failed 19:35:22 executing program 7: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000500100000f000000000000000000000004000000000002000020000020000000def4655fdef4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000008000000018000000c20500002b02", 0x66, 0x400}, {&(0x7f0000010100)="000000000000000000000000e58ca12e13a240e2b1a22f8d07e8e55f010040", 0x1f, 0x4e0}, {&(0x7f0000010200)="010000000000050040", 0x9, 0x560}, {0x0, 0x0, 0x1000000000c00}, {&(0x7f0000012000)="504d4d00504d4dff", 0x8, 0x10000}], 0x0, &(0x7f0000012b00)) 19:35:22 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000500100000f000000000000000000000004000000000002000020000020000000def4655fdef4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000008000000018000000c20500002b0200000000000000000000000000000000000073797a6b616c6c6572000000000000002f746d702f73797a", 0x90, 0x400}, {&(0x7f0000010100)="000000000000000000000000e58ca12e13a240e2b1a22f8d07e8e55f010040", 0x1f, 0x4e0}, {&(0x7f0000010200)="010000000000050040", 0x9, 0x560}, {0x0, 0x0, 0x1000000000c00}, {&(0x7f0000012000)="504d4d00504d4dff", 0x8, 0x10000}], 0x0, &(0x7f0000012b00)) 19:35:22 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000500100000f000000000000000000000004000000000002000020000020000000def4655fdef4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000008000000018000000", 0x60, 0x400}], 0x0, &(0x7f0000012b00)) 19:35:22 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000500100000f000000000000000000000004000000000002000020000020000000def4655fdef4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000008000000018000000c20500002b02000000000000", 0x6c, 0x400}, {&(0x7f0000010100)="000000000000000000000000e58ca12e13a240e2b1a22f8d07e8e55f010040", 0x1f, 0x4e0}, {&(0x7f0000010200)="010000000000050040", 0x9, 0x560}, {0x0, 0x0, 0x1000000000c00}, {&(0x7f0000012000)="504d4d00504d4dff", 0x8, 0x10000}], 0x0, &(0x7f0000012b00)) [ 1457.163848] EXT4-fs (loop4): fragment/cluster size (16384) != block size (1024) [ 1457.167903] EXT4-fs (loop0): fragment/cluster size (16384) != block size (1024) [ 1457.178104] EXT4-fs error (device loop3): ext4_fill_super:4947: inode #2: comm syz-executor.3: iget: root inode unallocated [ 1457.179985] EXT4-fs (loop3): get root inode failed [ 1457.180874] EXT4-fs (loop3): mount failed 19:35:22 executing program 6: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000500100000f000000000000000000000004000000000002000020000020000000def4655fdef4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000008000000018000000", 0x60, 0x400}, {&(0x7f0000010100)="000000000000000000000000e58ca12e13a240e2b1a22f8d07e8e55f010040", 0x1f, 0x4e0}, {&(0x7f0000010200)="010000000000050040", 0x9, 0x560}, {0x0, 0x0, 0x1000000000c00}, {&(0x7f0000012000)="504d4d00504d4dff", 0x8, 0x10000}], 0x0, &(0x7f0000012b00)) 19:35:22 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x0, &(0x7f0000000200), 0x0, &(0x7f0000012b00)) 19:35:22 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000500100000f000000000000000000000004000000000002000020000020000000def4655fdef4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000008000000018000000", 0x60, 0x400}, {&(0x7f0000010100)="000000000000000000000000e58ca12e13a240e2b1a22f8d07e8e55f010040", 0x1f, 0x4e0}, {&(0x7f0000010200)="010000000000050040", 0x9, 0x560}, {0x0, 0x0, 0x1000000000c00}, {&(0x7f0000012000)="504d4d00504d4dff", 0x8, 0x10000}], 0x0, &(0x7f0000012b00)) [ 1457.237208] EXT4-fs error (device loop5): ext4_fill_super:4947: inode #2: comm syz-executor.5: iget: root inode unallocated [ 1457.243025] EXT4-fs (loop5): get root inode failed [ 1457.244168] EXT4-fs (loop5): mount failed [ 1457.250804] EXT4-fs (loop3): fragment/cluster size (16384) != block size (1024) [ 1457.269322] EXT4-fs error (device loop7): ext4_fill_super:4947: inode #2: comm syz-executor.7: iget: root inode unallocated [ 1457.277228] EXT4-fs (loop7): get root inode failed [ 1457.278319] EXT4-fs (loop7): mount failed [ 1457.295703] EXT4-fs (loop6): fragment/cluster size (16384) != block size (1024) [ 1457.303980] EXT4-fs (loop0): VFS: Can't find ext4 filesystem 19:35:36 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000500100000f000000000000000000000004000000000002000020000020000000def4655fdef4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000008000000018000000", 0x60, 0x400}, {&(0x7f0000010100)="000000000000000000000000e58ca12e13a240e2b1a22f8d07e8e55f010040", 0x1f, 0x4e0}, {&(0x7f0000010200)="010000000000050040", 0x9, 0x560}, {0x0, 0x0, 0x1000000000c00}, {&(0x7f0000012000)="504d4d00504d4dff", 0x8, 0x10000}], 0x0, &(0x7f0000012b00)) 19:35:36 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000500100000f000000000000000000000004000000000002000020000020000000def4655fdef4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000008000000018000000c20500002b02000000000000", 0x6c, 0x400}, {&(0x7f0000010100)="000000000000000000000000e58ca12e13a240e2b1a22f8d07e8e55f010040", 0x1f, 0x4e0}, {&(0x7f0000010200)="010000000000050040", 0x9, 0x560}, {0x0, 0x0, 0x1000000000c00}, {&(0x7f0000012000)="504d4d00504d4dff", 0x8, 0x10000}], 0x0, &(0x7f0000012b00)) 19:35:36 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x0, &(0x7f0000000200), 0x0, &(0x7f0000012b00)) 19:35:36 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000500100000f000000000000000000000004000000000002000020000020000000def4655fdef4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000008000000018000000", 0x60, 0x400}, {&(0x7f0000010100)="000000000000000000000000e58ca12e13a240e2b1a22f8d07e8e55f010040", 0x1f, 0x4e0}, {&(0x7f0000010200)="010000000000050040", 0x9, 0x560}, {0x0, 0x0, 0x1000000000c00}, {&(0x7f0000012000)="504d4d00504d4dff", 0x8, 0x10000}], 0x0, &(0x7f0000012b00)) 19:35:36 executing program 6: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000500100000f000000000000000000000004000000000002000020000020000000def4655fdef4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000008000000018000000", 0x60, 0x400}, {&(0x7f0000010100)="000000000000000000000000e58ca12e13a240e2b1a22f8d07e8e55f010040", 0x1f, 0x4e0}, {&(0x7f0000010200)="010000000000050040", 0x9, 0x560}, {0x0, 0x0, 0x1000000000c00}, {&(0x7f0000012000)="504d4d00504d4dff", 0x8, 0x10000}], 0x0, &(0x7f0000012b00)) 19:35:36 executing program 7: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000500100000f000000000000000000000004000000000002000020000020000000def4655fdef4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000008000000018000000", 0x60, 0x400}, {&(0x7f0000010100)="000000000000000000000000e58ca12e13a240e2b1a22f8d07e8e55f010040", 0x1f, 0x4e0}, {&(0x7f0000010200)="010000000000050040", 0x9, 0x560}, {0x0, 0x0, 0x1000000000c00}, {&(0x7f0000012000)="504d4d00504d4dff", 0x8, 0x10000}], 0x0, &(0x7f0000012b00)) 19:35:36 executing program 1: r0 = syz_io_uring_setup(0x2, &(0x7f0000000500), &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000ff6000/0xa000)=nil, &(0x7f0000000080)=0x0, &(0x7f0000000140)) r2 = io_uring_setup(0x3ddf, &(0x7f0000000680)) syz_io_uring_submit(r1, 0x0, &(0x7f0000000800)=@IORING_OP_SENDMSG={0x9, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0}, 0x0) r3 = eventfd(0x0) io_uring_register$IORING_REGISTER_EVENTFD(r0, 0x4, &(0x7f0000000000)=r3, 0x1) read$eventfd(r3, &(0x7f0000000040), 0x8) r4 = syz_io_uring_setup(0x3702, &(0x7f00000001c0), &(0x7f0000000000/0x3000)=nil, &(0x7f0000ffe000/0x2000)=nil, &(0x7f0000000140), &(0x7f0000000240)) r5 = dup2(r2, r4) r6 = dup2(r0, r5) io_uring_enter(r6, 0x1739, 0x0, 0x0, 0x0, 0x0) 19:35:36 executing program 2: r0 = syz_io_uring_setup(0x2, &(0x7f0000000500), &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000ff6000/0xa000)=nil, 0x0, &(0x7f0000000140)=0x0) r2 = io_uring_setup(0x3ddf, &(0x7f0000000680)) syz_io_uring_submit(0x0, r1, &(0x7f0000000800)=@IORING_OP_SENDMSG={0x9, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0}, 0x0) r3 = eventfd(0x0) io_uring_register$IORING_REGISTER_EVENTFD(r0, 0x4, &(0x7f0000000000)=r3, 0x1) read$eventfd(r3, &(0x7f0000000040), 0x8) r4 = syz_io_uring_setup(0x3702, &(0x7f00000001c0), &(0x7f0000000000/0x3000)=nil, &(0x7f0000ffe000/0x2000)=nil, &(0x7f0000000140), &(0x7f0000000240)) r5 = dup2(r2, r4) r6 = dup2(r0, r5) io_uring_enter(r6, 0x1739, 0x0, 0x0, 0x0, 0x0) [ 1470.793420] EXT4-fs (loop7): fragment/cluster size (16384) != block size (1024) [ 1470.795389] EXT4-fs (loop6): fragment/cluster size (16384) != block size (1024) [ 1470.828301] EXT4-fs (loop3): fragment/cluster size (16384) != block size (1024) 19:35:36 executing program 6: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000500100000f000000000000000000000004000000000002000020000020000000def4655fdef4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000008000000018000000", 0x60, 0x400}, {&(0x7f0000010100)="000000000000000000000000e58ca12e13a240e2b1a22f8d07e8e55f010040", 0x1f, 0x4e0}, {&(0x7f0000010200)="010000000000050040", 0x9, 0x560}, {0x0, 0x0, 0x1000000000c00}, {&(0x7f0000012000)="504d4d00504d4dff", 0x8, 0x10000}], 0x0, &(0x7f0000012b00)) 19:35:36 executing program 7: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000500100000f000000000000000000000004000000000002000020000020000000def4655fdef4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000008000000018000000", 0x60, 0x400}, {&(0x7f0000010100)="000000000000000000000000e58ca12e13a240e2b1a22f8d07e8e55f010040", 0x1f, 0x4e0}, {&(0x7f0000010200)="010000000000050040", 0x9, 0x560}, {0x0, 0x0, 0x1000000000c00}, {&(0x7f0000012000)="504d4d00504d4dff", 0x8, 0x10000}], 0x0, &(0x7f0000012b00)) [ 1470.865913] EXT4-fs (loop4): fragment/cluster size (16384) != block size (1024) [ 1470.867282] EXT4-fs (loop0): VFS: Can't find ext4 filesystem [ 1470.868794] EXT4-fs error (device loop5): ext4_fill_super:4947: inode #2: comm syz-executor.5: iget: root inode unallocated [ 1470.871153] EXT4-fs (loop5): get root inode failed [ 1470.871975] EXT4-fs (loop5): mount failed 19:35:36 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000500100000f000000000000000000000004000000000002000020000020000000def4655fdef4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000008000000018000000", 0x60, 0x400}, {&(0x7f0000010100)="000000000000000000000000e58ca12e13a240e2b1a22f8d07e8e55f010040", 0x1f, 0x4e0}, {&(0x7f0000010200)="010000000000050040", 0x9, 0x560}, {0x0, 0x0, 0x1000000000c00}, {&(0x7f0000012000)="504d4d00504d4dff", 0x8, 0x10000}], 0x0, &(0x7f0000012b00)) [ 1470.942419] EXT4-fs (loop6): fragment/cluster size (16384) != block size (1024) 19:35:36 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x0, &(0x7f0000000200), 0x0, &(0x7f0000012b00)) 19:35:36 executing program 4: syz_mount_image$ext4(0x0, &(0x7f0000000180)='./file0\x00', 0x0, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000500100000f000000000000000000000004000000000002000020000020000000def4655fdef4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000008000000018000000", 0x60, 0x400}, {&(0x7f0000010100)="000000000000000000000000e58ca12e13a240e2b1a22f8d07e8e55f010040", 0x1f, 0x4e0}, {&(0x7f0000010200)="010000000000050040", 0x9, 0x560}, {0x0, 0x0, 0x1000000000c00}, {&(0x7f0000012000)="504d4d00504d4dff", 0x8, 0x10000}], 0x0, &(0x7f0000012b00)) [ 1470.967223] EXT4-fs (loop3): fragment/cluster size (16384) != block size (1024) [ 1470.967996] EXT4-fs (loop7): fragment/cluster size (16384) != block size (1024) 19:35:36 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000500100000f000000000000000000000004000000000002000020000020000000def4655fdef4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000008000000018000000c20500002b0200000000000000000000000000000000000073797a6b616c6c6572000000000000002f746d702f73797a2d696d61676567656e35373134333434333800"/192, 0xc0, 0x400}, {&(0x7f0000010100)="000000000000000000000000e58ca12e13a240e2b1a22f8d07e8e55f010040", 0x1f}, {&(0x7f0000010200)="010000000000050040", 0x9, 0x560}, {0x0, 0x0, 0x1000000000c00}, {&(0x7f0000012000)="504d4d00504d4dff", 0x8, 0x10000}], 0x0, &(0x7f0000012b00)) 19:35:36 executing program 6: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000500100000f000000000000000000000004000000000002000020000020000000def4655fdef4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000008000000018000000c20500002b02", 0x66, 0x400}, {&(0x7f0000010100)="000000000000000000000000e58ca12e13a240e2b1a22f8d07e8e55f010040", 0x1f, 0x4e0}, {&(0x7f0000010200)="010000000000050040", 0x9, 0x560}, {0x0, 0x0, 0x1000000000c00}, {&(0x7f0000012000)="504d4d00504d4dff", 0x8, 0x10000}], 0x0, &(0x7f0000012b00)) 19:35:36 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000500100000f000000000000000000000004000000000002000020000020000000def4655fdef4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000008000000018000000c20500002b0200"/120, 0x78, 0x400}, {&(0x7f0000010100)="000000000000000000000000e58ca12e13a240e2b1a22f8d07e8e55f010040", 0x1f, 0x4e0}, {&(0x7f0000010200)="010000000000050040", 0x9, 0x560}, {0x0, 0x0, 0x1000000000c00}, {&(0x7f0000012000)="504d4d00504d4dff", 0x8, 0x10000}], 0x0, &(0x7f0000012b00)) 19:35:36 executing program 7: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000500100000f000000000000000000000004000000000002000020000020000000def4655fdef4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000008000000018000000", 0x60, 0x400}, {&(0x7f0000010100)="000000000000000000000000e58ca12e13a240e2b1a22f8d07e8e55f010040", 0x1f, 0x4e0}, {&(0x7f0000010200)="010000000000050040", 0x9, 0x560}, {0x0, 0x0, 0x1000000000c00}, {&(0x7f0000012000)="504d4d00504d4dff", 0x8, 0x10000}], 0x0, &(0x7f0000012b00)) [ 1471.059927] EXT4-fs (loop0): VFS: Can't find ext4 filesystem [ 1471.073326] EXT4-fs (loop5): unsupported descriptor size 0 19:35:36 executing program 4: syz_mount_image$ext4(0x0, &(0x7f0000000180)='./file0\x00', 0x0, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000500100000f000000000000000000000004000000000002000020000020000000def4655fdef4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000008000000018000000", 0x60, 0x400}, {&(0x7f0000010100)="000000000000000000000000e58ca12e13a240e2b1a22f8d07e8e55f010040", 0x1f, 0x4e0}, {&(0x7f0000010200)="010000000000050040", 0x9, 0x560}, {0x0, 0x0, 0x1000000000c00}, {&(0x7f0000012000)="504d4d00504d4dff", 0x8, 0x10000}], 0x0, &(0x7f0000012b00)) 19:35:36 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{0x0, 0x0, 0x400}], 0x0, &(0x7f0000012b00)) [ 1471.153871] EXT4-fs (loop7): fragment/cluster size (16384) != block size (1024) [ 1471.155624] EXT4-fs error (device loop3): ext4_fill_super:4947: inode #2: comm syz-executor.3: iget: root inode unallocated [ 1471.157788] EXT4-fs (loop3): get root inode failed [ 1471.158481] EXT4-fs (loop3): mount failed [ 1471.167055] EXT4-fs error (device loop6): ext4_fill_super:4947: inode #2: comm syz-executor.6: iget: root inode unallocated [ 1471.176798] EXT4-fs (loop6): get root inode failed [ 1471.178614] EXT4-fs (loop6): mount failed [ 1471.267310] EXT4-fs (loop0): VFS: Can't find ext4 filesystem 19:35:49 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000500100000f000000000000000000000004000000000002000020000020000000def4655fdef4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000008000000018000000c20500002b02", 0x66, 0x400}, {&(0x7f0000010100)="000000000000000000000000e58ca12e13a240e2b1a22f8d07e8e55f010040", 0x1f, 0x4e0}, {&(0x7f0000010200)="010000000000050040", 0x9, 0x560}, {0x0, 0x0, 0x1000000000c00}, {&(0x7f0000012000)="504d4d00504d4dff", 0x8, 0x10000}], 0x0, &(0x7f0000012b00)) 19:35:49 executing program 4: syz_mount_image$ext4(0x0, &(0x7f0000000180)='./file0\x00', 0x0, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000500100000f000000000000000000000004000000000002000020000020000000def4655fdef4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000008000000018000000", 0x60, 0x400}, {&(0x7f0000010100)="000000000000000000000000e58ca12e13a240e2b1a22f8d07e8e55f010040", 0x1f, 0x4e0}, {&(0x7f0000010200)="010000000000050040", 0x9, 0x560}, {0x0, 0x0, 0x1000000000c00}, {&(0x7f0000012000)="504d4d00504d4dff", 0x8, 0x10000}], 0x0, &(0x7f0000012b00)) 19:35:49 executing program 2: r0 = syz_io_uring_setup(0x2, &(0x7f0000000500), &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000ff6000/0xa000)=nil, &(0x7f0000000080)=0x0, 0x0) r2 = io_uring_setup(0x3ddf, &(0x7f0000000680)) syz_io_uring_submit(r1, 0x0, &(0x7f0000000800)=@IORING_OP_SENDMSG={0x9, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0}, 0x0) r3 = eventfd(0x0) io_uring_register$IORING_REGISTER_EVENTFD(r0, 0x4, &(0x7f0000000000)=r3, 0x1) read$eventfd(r3, &(0x7f0000000040), 0x8) r4 = syz_io_uring_setup(0x3702, &(0x7f00000001c0), &(0x7f0000000000/0x3000)=nil, &(0x7f0000ffe000/0x2000)=nil, &(0x7f0000000140), &(0x7f0000000240)) r5 = dup2(r2, r4) r6 = dup2(r0, r5) io_uring_enter(r6, 0x1739, 0x0, 0x0, 0x0, 0x0) 19:35:49 executing program 1: r0 = syz_io_uring_setup(0x2, &(0x7f0000000500), &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000ff6000/0xa000)=nil, &(0x7f0000000080)=0x0, &(0x7f0000000140)) r2 = io_uring_setup(0x3ddf, &(0x7f0000000680)) syz_io_uring_submit(r1, 0x0, &(0x7f0000000800)=@IORING_OP_SENDMSG={0x9, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0}, 0x0) r3 = eventfd(0x0) io_uring_register$IORING_REGISTER_EVENTFD(r0, 0x4, &(0x7f0000000000)=r3, 0x1) read$eventfd(r3, &(0x7f0000000040), 0x8) r4 = syz_io_uring_setup(0x3702, &(0x7f00000001c0), &(0x7f0000000000/0x3000)=nil, &(0x7f0000ffe000/0x2000)=nil, &(0x7f0000000140), &(0x7f0000000240)) r5 = dup2(r2, r4) r6 = dup2(r0, r5) io_uring_enter(r6, 0x1739, 0x0, 0x0, 0x0, 0x0) 19:35:49 executing program 7: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000500100000f000000000000000000000004000000000002000020000020000000def4655fdef4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000008000000018000000c20500", 0x63, 0x400}, {&(0x7f0000010100)="000000000000000000000000e58ca12e13a240e2b1a22f8d07e8e55f010040", 0x1f, 0x4e0}, {&(0x7f0000010200)="010000000000050040", 0x9, 0x560}, {0x0, 0x0, 0x1000000000c00}, {&(0x7f0000012000)="504d4d00504d4dff", 0x8, 0x10000}], 0x0, &(0x7f0000012b00)) 19:35:49 executing program 6: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000500100000f000000000000000000000004000000000002000020000020000000def4655fdef4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000008000000018000000", 0x60, 0x400}, {&(0x7f0000010100)="000000000000000000000000e58ca12e13a240e2b1a22f8d07e8e55f010040", 0x1f, 0x4e0}, {&(0x7f0000010200)="010000000000050040", 0x9, 0x560}, {0x0, 0x0, 0x1000000000c00}, {&(0x7f0000012000)="504d4d00504d4dff", 0x8, 0x10000}], 0x0, &(0x7f0000012b00)) 19:35:49 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{0x0, 0x0, 0x400}], 0x0, &(0x7f0000012b00)) 19:35:49 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000500100000f000000000000000000000004000000000002000020000020000000def4655fdef4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000008000000018000000", 0x60, 0x400}, {&(0x7f0000010100)="000000000000000000000000e58ca12e13a240e2b1a22f8d07e8e55f010040", 0x1f, 0x4e0}, {&(0x7f0000010200)="010000000000050040", 0x9, 0x560}, {0x0, 0x0, 0x1000000000c00}, {&(0x7f0000012000)="504d4d00504d4dff", 0x8, 0x10000}], 0x0, &(0x7f0000012b00)) [ 1483.848768] EXT4-fs error (device loop5): ext4_fill_super:4947: inode #2: comm syz-executor.5: iget: root inode unallocated [ 1483.855316] EXT4-fs (loop5): get root inode failed [ 1483.857161] EXT4-fs (loop5): mount failed [ 1483.859117] EXT4-fs (loop0): VFS: Can't find ext4 filesystem [ 1483.871895] EXT4-fs (loop6): fragment/cluster size (16384) != block size (1024) 19:35:49 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000500100000f000000000000000000000004000000000002000020000020000000def4655fdef4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000008000000018000000", 0x60, 0x400}, {&(0x7f0000010100)="000000000000000000000000e58ca12e13a240e2b1a22f8d07e8e55f010040", 0x1f, 0x4e0}, {&(0x7f0000010200)="010000000000050040", 0x9, 0x560}, {0x0, 0x0, 0x1000000000c00}, {&(0x7f0000012000)="504d4d00504d4dff", 0x8, 0x10000}], 0x0, &(0x7f0000012b00)) [ 1483.896354] EXT4-fs (loop3): fragment/cluster size (16384) != block size (1024) [ 1483.933373] EXT4-fs (loop7): fragment/cluster size (16384) != block size (1024) 19:35:49 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', 0x0, 0x0, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000500100000f000000000000000000000004000000000002000020000020000000def4655fdef4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000008000000018000000", 0x60, 0x400}, {&(0x7f0000010100)="000000000000000000000000e58ca12e13a240e2b1a22f8d07e8e55f010040", 0x1f, 0x4e0}, {&(0x7f0000010200)="010000000000050040", 0x9, 0x560}, {0x0, 0x0, 0x1000000000c00}, {&(0x7f0000012000)="504d4d00504d4dff", 0x8, 0x10000}], 0x0, &(0x7f0000012b00)) 19:35:49 executing program 7: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000500100000f000000000000000000000004000000000002000020000020000000def4655fdef4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000008000000018000000c20500", 0x63, 0x400}, {&(0x7f0000010100)="000000000000000000000000e58ca12e13a240e2b1a22f8d07e8e55f010040", 0x1f, 0x4e0}, {&(0x7f0000010200)="010000000000050040", 0x9, 0x560}, {0x0, 0x0, 0x1000000000c00}, {&(0x7f0000012000)="504d4d00504d4dff", 0x8, 0x10000}], 0x0, &(0x7f0000012b00)) 19:35:49 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{0x0, 0x0, 0x400}], 0x0, &(0x7f0000012b00)) 19:35:49 executing program 6: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000500100000f000000000000000000000004000000000002000020000020000000def4655fdef4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000008000000018000000", 0x60, 0x400}, {&(0x7f0000010100)="000000000000000000000000e58ca12e13a240e2b1a22f8d07e8e55f010040", 0x1f, 0x4e0}, {&(0x7f0000010200)="010000000000050040", 0x9, 0x560}, {0x0, 0x0, 0x1000000000c00}, {&(0x7f0000012000)="504d4d00504d4dff", 0x8, 0x10000}], 0x0, &(0x7f0000012b00)) 19:35:49 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000500100000f000000000000000000000004000000000002000020000020000000def4655fdef4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000008000000018000000", 0x60, 0x400}, {&(0x7f0000010100)="000000000000000000000000e58ca12e13a240e2b1a22f8d07e8e55f010040", 0x1f, 0x4e0}, {&(0x7f0000010200)="010000000000050040", 0x9, 0x560}, {0x0, 0x0, 0x1000000000c00}, {&(0x7f0000012000)="504d4d00504d4dff", 0x8, 0x10000}], 0x0, &(0x7f0000012b00)) [ 1484.029624] EXT4-fs (loop5): fragment/cluster size (16384) != block size (1024) [ 1484.048165] EXT4-fs (loop0): VFS: Can't find ext4 filesystem [ 1484.070254] EXT4-fs (loop3): fragment/cluster size (16384) != block size (1024) [ 1484.079255] EXT4-fs (loop7): fragment/cluster size (16384) != block size (1024) [ 1484.106788] EXT4-fs (loop6): fragment/cluster size (16384) != block size (1024) 19:35:49 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000500100000f000000000000000000000004000000000002000020000020000000def4655fdef4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000008000000018000000", 0x60, 0x400}, {&(0x7f0000010100)="000000000000000000000000e58ca12e13a240e2b1a22f8d07e8e55f010040", 0x1f, 0x4e0}, {&(0x7f0000010200)="010000000000050040", 0x9, 0x560}, {0x0, 0x0, 0x1000000000c00}, {&(0x7f0000012000)="504d4d00504d4dff", 0x8, 0x10000}], 0x0, &(0x7f0000012b00)) 19:35:49 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', 0x0, 0x0, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000500100000f000000000000000000000004000000000002000020000020000000def4655fdef4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000008000000018000000", 0x60, 0x400}, {&(0x7f0000010100)="000000000000000000000000e58ca12e13a240e2b1a22f8d07e8e55f010040", 0x1f, 0x4e0}, {&(0x7f0000010200)="010000000000050040", 0x9, 0x560}, {0x0, 0x0, 0x1000000000c00}, {&(0x7f0000012000)="504d4d00504d4dff", 0x8, 0x10000}], 0x0, &(0x7f0000012b00)) 19:35:49 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000500100000f000000000000000000000004000000000002000020000020000000def4655fdef4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000008000000018000000", 0x60, 0x400}, {&(0x7f0000010100)="000000000000000000000000e58ca12e13a240e2b1a22f8d07e8e55f010040", 0x1f, 0x4e0}, {&(0x7f0000010200)="010000000000050040", 0x9, 0x560}, {0x0, 0x0, 0x1000000000c00}, {&(0x7f0000012000)="504d4d00504d4dff", 0x8, 0x10000}], 0x0, &(0x7f0000012b00)) 19:35:49 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000), 0x0, 0x400}], 0x0, &(0x7f0000012b00)) [ 1484.189635] EXT4-fs (loop5): fragment/cluster size (16384) != block size (1024) [ 1484.228960] EXT4-fs (loop0): VFS: Can't find ext4 filesystem [ 1484.243942] EXT4-fs (loop3): fragment/cluster size (16384) != block size (1024) 19:36:01 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', 0x0, 0x0, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000500100000f000000000000000000000004000000000002000020000020000000def4655fdef4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000008000000018000000", 0x60, 0x400}, {&(0x7f0000010100)="000000000000000000000000e58ca12e13a240e2b1a22f8d07e8e55f010040", 0x1f, 0x4e0}, {&(0x7f0000010200)="010000000000050040", 0x9, 0x560}, {0x0, 0x0, 0x1000000000c00}, {&(0x7f0000012000)="504d4d00504d4dff", 0x8, 0x10000}], 0x0, &(0x7f0000012b00)) 19:36:01 executing program 7: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000500100000f000000000000000000000004000000000002000020000020000000def4655fdef4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000008000000018000000c20500", 0x63, 0x400}, {&(0x7f0000010100)="000000000000000000000000e58ca12e13a240e2b1a22f8d07e8e55f010040", 0x1f, 0x4e0}, {&(0x7f0000010200)="010000000000050040", 0x9, 0x560}, {0x0, 0x0, 0x1000000000c00}, {&(0x7f0000012000)="504d4d00504d4dff", 0x8, 0x10000}], 0x0, &(0x7f0000012b00)) 19:36:01 executing program 1: r0 = syz_io_uring_setup(0x2, &(0x7f0000000500), &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000ff6000/0xa000)=nil, &(0x7f0000000080)=0x0, &(0x7f0000000140)=0x0) r3 = io_uring_setup(0x3ddf, &(0x7f0000000680)) syz_io_uring_submit(r1, r2, 0x0, 0x0) r4 = eventfd(0x0) io_uring_register$IORING_REGISTER_EVENTFD(r0, 0x4, &(0x7f0000000000)=r4, 0x1) read$eventfd(r4, &(0x7f0000000040), 0x8) r5 = syz_io_uring_setup(0x3702, &(0x7f00000001c0), &(0x7f0000000000/0x3000)=nil, &(0x7f0000ffe000/0x2000)=nil, &(0x7f0000000140), &(0x7f0000000240)) r6 = dup2(r3, r5) r7 = dup2(r0, r6) io_uring_enter(r7, 0x1739, 0x0, 0x0, 0x0, 0x0) 19:36:01 executing program 2: r0 = syz_io_uring_setup(0x2, &(0x7f0000000500), &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000ff6000/0xa000)=nil, &(0x7f0000000080)=0x0, 0x0) r2 = io_uring_setup(0x3ddf, &(0x7f0000000680)) syz_io_uring_submit(r1, 0x0, &(0x7f0000000800)=@IORING_OP_SENDMSG={0x9, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0}, 0x0) r3 = eventfd(0x0) io_uring_register$IORING_REGISTER_EVENTFD(r0, 0x4, &(0x7f0000000000)=r3, 0x1) read$eventfd(r3, &(0x7f0000000040), 0x8) r4 = syz_io_uring_setup(0x3702, &(0x7f00000001c0), &(0x7f0000000000/0x3000)=nil, &(0x7f0000ffe000/0x2000)=nil, &(0x7f0000000140), &(0x7f0000000240)) r5 = dup2(r2, r4) r6 = dup2(r0, r5) io_uring_enter(r6, 0x1739, 0x0, 0x0, 0x0, 0x0) 19:36:01 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000500100000f000000000000000000000004000000000002000020000020000000def4655fdef4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000008000000018000000", 0x60, 0x400}, {&(0x7f0000010100)="000000000000000000000000e58ca12e13a240e2b1a22f8d07e8e55f010040", 0x1f, 0x4e0}, {&(0x7f0000010200)="010000000000050040", 0x9, 0x560}, {0x0, 0x0, 0x1000000000c00}, {&(0x7f0000012000)="504d4d00504d4dff", 0x8, 0x10000}], 0x0, &(0x7f0000012b00)) 19:36:01 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000), 0x0, 0x400}], 0x0, &(0x7f0000012b00)) 19:36:01 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000500100000f000000000000000000000004000000000002000020000020000000def4655fdef4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000008000000018000000c20500002b02000000000000", 0x6c, 0x400}, {&(0x7f0000010100)="000000000000000000000000e58ca12e13a240e2b1a22f8d07e8e55f010040", 0x1f, 0x4e0}, {&(0x7f0000010200)="010000000000050040", 0x9, 0x560}, {0x0, 0x0, 0x1000000000c00}, {&(0x7f0000012000)="504d4d00504d4dff", 0x8, 0x10000}], 0x0, &(0x7f0000012b00)) 19:36:01 executing program 6: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000500100000f000000000000000000000004000000000002000020000020000000def4655fdef4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000008000000018000000", 0x60, 0x400}, {&(0x7f0000010100)="000000000000000000000000e58ca12e13a240e2b1a22f8d07e8e55f010040", 0x1f, 0x4e0}, {&(0x7f0000010200)="010000000000050040", 0x9, 0x560}, {0x0, 0x0, 0x1000000000c00}, {&(0x7f0000012000)="504d4d00504d4dff", 0x8, 0x10000}], 0x0, &(0x7f0000012b00)) [ 1496.504178] EXT4-fs (loop5): fragment/cluster size (16384) != block size (1024) [ 1496.504513] EXT4-fs (loop0): VFS: Can't find ext4 filesystem [ 1496.525183] EXT4-fs (loop6): fragment/cluster size (16384) != block size (1024) [ 1496.527196] EXT4-fs (loop7): fragment/cluster size (16384) != block size (1024) [ 1496.583050] EXT4-fs error (device loop3): ext4_fill_super:4947: inode #2: comm syz-executor.3: iget: root inode unallocated 19:36:01 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000), 0x0, 0x400}], 0x0, &(0x7f0000012b00)) [ 1496.591345] EXT4-fs (loop3): get root inode failed [ 1496.592437] EXT4-fs (loop3): mount failed 19:36:02 executing program 7: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000500100000f000000000000000000000004000000000002000020000020000000def4655fdef4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000008000000018000000c20500002b", 0x65, 0x400}, {&(0x7f0000010100)="000000000000000000000000e58ca12e13a240e2b1a22f8d07e8e55f010040", 0x1f, 0x4e0}, {&(0x7f0000010200)="010000000000050040", 0x9, 0x560}, {0x0, 0x0, 0x1000000000c00}, {&(0x7f0000012000)="504d4d00504d4dff", 0x8, 0x10000}], 0x0, &(0x7f0000012b00)) 19:36:02 executing program 6: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000500100000f000000000000000000000004000000000002000020000020000000def4655fdef4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000008000000018000000c20500", 0x63, 0x400}, {&(0x7f0000010100)="000000000000000000000000e58ca12e13a240e2b1a22f8d07e8e55f010040", 0x1f, 0x4e0}, {&(0x7f0000010200)="010000000000050040", 0x9, 0x560}, {0x0, 0x0, 0x1000000000c00}, {&(0x7f0000012000)="504d4d00504d4dff", 0x8, 0x10000}], 0x0, &(0x7f0000012b00)) 19:36:02 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000012b00)) 19:36:02 executing program 5: syz_mount_image$ext4(0x0, &(0x7f0000000180)='./file0\x00', 0x0, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000500100000f000000000000000000000004000000000002000020000020000000def4655fdef4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000008000000018000000", 0x60, 0x400}, {&(0x7f0000010100)="000000000000000000000000e58ca12e13a240e2b1a22f8d07e8e55f010040", 0x1f, 0x4e0}, {&(0x7f0000010200)="010000000000050040", 0x9, 0x560}, {0x0, 0x0, 0x1000000000c00}, {&(0x7f0000012000)="504d4d00504d4dff", 0x8, 0x10000}], 0x0, &(0x7f0000012b00)) [ 1496.637401] EXT4-fs (loop6): fragment/cluster size (16384) != block size (1024) 19:36:02 executing program 6: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000500100000f000000000000000000000004000000000002000020000020000000def4655fdef4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000008000000018000000c20500", 0x63, 0x400}, {&(0x7f0000010100)="000000000000000000000000e58ca12e13a240e2b1a22f8d07e8e55f010040", 0x1f, 0x4e0}, {&(0x7f0000010200)="010000000000050040", 0x9, 0x560}, {0x0, 0x0, 0x1000000000c00}, {&(0x7f0000012000)="504d4d00504d4dff", 0x8, 0x10000}], 0x0, &(0x7f0000012b00)) 19:36:02 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000500100000f000000000000000000000004000000000002000020000020000000def4655fdef4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000008000000018000000", 0x60, 0x400}, {&(0x7f0000010100)="000000000000000000000000e58ca12e13a240e2b1a22f8d07e8e55f010040", 0x1f, 0x4e0}, {&(0x7f0000010200)="010000000000050040", 0x9, 0x560}, {0x0, 0x0, 0x1000000000c00}, {&(0x7f0000012000)="504d4d00504d4dff", 0x8, 0x10000}], 0x0, &(0x7f0000012b00)) [ 1496.700033] EXT4-fs (loop0): VFS: Can't find ext4 filesystem 19:36:02 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000012b00)) 19:36:02 executing program 5: syz_mount_image$ext4(0x0, &(0x7f0000000180)='./file0\x00', 0x0, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000500100000f000000000000000000000004000000000002000020000020000000def4655fdef4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000008000000018000000", 0x60, 0x400}, {&(0x7f0000010100)="000000000000000000000000e58ca12e13a240e2b1a22f8d07e8e55f010040", 0x1f, 0x4e0}, {&(0x7f0000010200)="010000000000050040", 0x9, 0x560}, {0x0, 0x0, 0x1000000000c00}, {&(0x7f0000012000)="504d4d00504d4dff", 0x8, 0x10000}], 0x0, &(0x7f0000012b00)) [ 1496.753217] EXT4-fs (loop7): fragment/cluster size (16384) != block size (1024) [ 1496.761449] EXT4-fs (loop3): fragment/cluster size (16384) != block size (1024) [ 1496.774205] EXT4-fs (loop6): fragment/cluster size (16384) != block size (1024) 19:36:14 executing program 1: r0 = syz_io_uring_setup(0x2, &(0x7f0000000500), &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000ff6000/0xa000)=nil, &(0x7f0000000080)=0x0, &(0x7f0000000140)=0x0) r3 = io_uring_setup(0x3ddf, &(0x7f0000000680)) syz_io_uring_submit(r1, r2, 0x0, 0x0) r4 = eventfd(0x0) io_uring_register$IORING_REGISTER_EVENTFD(r0, 0x4, &(0x7f0000000000)=r4, 0x1) read$eventfd(r4, &(0x7f0000000040), 0x8) r5 = syz_io_uring_setup(0x3702, &(0x7f00000001c0), &(0x7f0000000000/0x3000)=nil, &(0x7f0000ffe000/0x2000)=nil, &(0x7f0000000140), &(0x7f0000000240)) r6 = dup2(r3, r5) r7 = dup2(r0, r6) io_uring_enter(r7, 0x1739, 0x0, 0x0, 0x0, 0x0) 19:36:14 executing program 2: r0 = syz_io_uring_setup(0x2, &(0x7f0000000500), &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000ff6000/0xa000)=nil, &(0x7f0000000080)=0x0, 0x0) r2 = io_uring_setup(0x3ddf, &(0x7f0000000680)) syz_io_uring_submit(r1, 0x0, &(0x7f0000000800)=@IORING_OP_SENDMSG={0x9, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0}, 0x0) r3 = eventfd(0x0) io_uring_register$IORING_REGISTER_EVENTFD(r0, 0x4, &(0x7f0000000000)=r3, 0x1) read$eventfd(r3, &(0x7f0000000040), 0x8) r4 = syz_io_uring_setup(0x3702, &(0x7f00000001c0), &(0x7f0000000000/0x3000)=nil, &(0x7f0000ffe000/0x2000)=nil, &(0x7f0000000140), &(0x7f0000000240)) r5 = dup2(r2, r4) r6 = dup2(r0, r5) io_uring_enter(r6, 0x1739, 0x0, 0x0, 0x0, 0x0) 19:36:14 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000500100000f000000000000000000000004000000000002000020000020000000def4655f", 0x30, 0x400}], 0x0, &(0x7f0000012b00)) 19:36:14 executing program 6: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000500100000f000000000000000000000004000000000002000020000020000000def4655fdef4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000008000000018000000c20500", 0x63, 0x400}, {&(0x7f0000010100)="000000000000000000000000e58ca12e13a240e2b1a22f8d07e8e55f010040", 0x1f, 0x4e0}, {&(0x7f0000010200)="010000000000050040", 0x9, 0x560}, {0x0, 0x0, 0x1000000000c00}, {&(0x7f0000012000)="504d4d00504d4dff", 0x8, 0x10000}], 0x0, &(0x7f0000012b00)) 19:36:14 executing program 7: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000500100000f000000000000000000000004000000000002000020000020000000def4655fdef4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000008000000018000000c20500002b", 0x65, 0x400}, {&(0x7f0000010100)="000000000000000000000000e58ca12e13a240e2b1a22f8d07e8e55f010040", 0x1f, 0x4e0}, {&(0x7f0000010200)="010000000000050040", 0x9, 0x560}, {0x0, 0x0, 0x1000000000c00}, {&(0x7f0000012000)="504d4d00504d4dff", 0x8, 0x10000}], 0x0, &(0x7f0000012b00)) 19:36:14 executing program 5: syz_mount_image$ext4(0x0, &(0x7f0000000180)='./file0\x00', 0x0, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000500100000f000000000000000000000004000000000002000020000020000000def4655fdef4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000008000000018000000", 0x60, 0x400}, {&(0x7f0000010100)="000000000000000000000000e58ca12e13a240e2b1a22f8d07e8e55f010040", 0x1f, 0x4e0}, {&(0x7f0000010200)="010000000000050040", 0x9, 0x560}, {0x0, 0x0, 0x1000000000c00}, {&(0x7f0000012000)="504d4d00504d4dff", 0x8, 0x10000}], 0x0, &(0x7f0000012b00)) 19:36:14 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000500100000f000000000000000000000004000000000002000020000020000000def4655fdef4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000008000000018000000", 0x60, 0x400}, {&(0x7f0000010100)="000000000000000000000000e58ca12e13a240e2b1a22f8d07e8e55f010040", 0x1f, 0x4e0}, {&(0x7f0000010200)="010000000000050040", 0x9, 0x560}, {0x0, 0x0, 0x1000000000c00}, {&(0x7f0000012000)="504d4d00504d4dff", 0x8, 0x10000}], 0x0, &(0x7f0000012b00)) 19:36:14 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000012b00)) [ 1509.467891] EXT4-fs (loop3): fragment/cluster size (16384) != block size (1024) 19:36:14 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', 0x0, 0x0, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000500100000f000000000000000000000004000000000002000020000020000000def4655fdef4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000008000000018000000", 0x60, 0x400}, {&(0x7f0000010100)="000000000000000000000000e58ca12e13a240e2b1a22f8d07e8e55f010040", 0x1f, 0x4e0}, {&(0x7f0000010200)="010000000000050040", 0x9, 0x560}, {0x0, 0x0, 0x1000000000c00}, {&(0x7f0000012000)="504d4d00504d4dff", 0x8, 0x10000}], 0x0, &(0x7f0000012b00)) [ 1509.490657] EXT4-fs (loop0): VFS: Can't find ext4 filesystem [ 1509.490688] EXT4-fs (loop7): fragment/cluster size (16384) != block size (1024) [ 1509.492641] EXT4-fs (loop6): fragment/cluster size (16384) != block size (1024) 19:36:14 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000500100000f000000000000000000000004000000000002000020000020000000def4655fdef4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000008000000018000000", 0x60, 0x400}, {&(0x7f0000010100)="000000000000000000000000e58ca12e13a240e2b1a22f8d07e8e55f010040", 0x1f, 0x4e0}, {&(0x7f0000010200)="010000000000050040", 0x9, 0x560}, {0x0, 0x0, 0x1000000000c00}, {&(0x7f0000012000)="504d4d00504d4dff", 0x8, 0x10000}], 0x0, &(0x7f0000012b00)) [ 1509.578103] EXT4-fs (loop3): fragment/cluster size (16384) != block size (1024) 19:36:26 executing program 1: r0 = syz_io_uring_setup(0x2, &(0x7f0000000500), &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000ff6000/0xa000)=nil, &(0x7f0000000080)=0x0, &(0x7f0000000140)=0x0) r3 = io_uring_setup(0x3ddf, &(0x7f0000000680)) syz_io_uring_submit(r1, r2, 0x0, 0x0) r4 = eventfd(0x0) io_uring_register$IORING_REGISTER_EVENTFD(r0, 0x4, &(0x7f0000000000)=r4, 0x1) read$eventfd(r4, &(0x7f0000000040), 0x8) r5 = syz_io_uring_setup(0x3702, &(0x7f00000001c0), &(0x7f0000000000/0x3000)=nil, &(0x7f0000ffe000/0x2000)=nil, &(0x7f0000000140), &(0x7f0000000240)) r6 = dup2(r3, r5) r7 = dup2(r0, r6) io_uring_enter(r7, 0x1739, 0x0, 0x0, 0x0, 0x0) 19:36:26 executing program 7: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000500100000f000000000000000000000004000000000002000020000020000000def4655fdef4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000008000000018000000c20500002b", 0x65, 0x400}, {&(0x7f0000010100)="000000000000000000000000e58ca12e13a240e2b1a22f8d07e8e55f010040", 0x1f, 0x4e0}, {&(0x7f0000010200)="010000000000050040", 0x9, 0x560}, {0x0, 0x0, 0x1000000000c00}, {&(0x7f0000012000)="504d4d00504d4dff", 0x8, 0x10000}], 0x0, &(0x7f0000012b00)) 19:36:26 executing program 2: r0 = syz_io_uring_setup(0x2, &(0x7f0000000500), &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000ff6000/0xa000)=nil, &(0x7f0000000080)=0x0, &(0x7f0000000140)=0x0) r3 = io_uring_setup(0x0, &(0x7f0000000680)) syz_io_uring_submit(r1, r2, &(0x7f0000000800)=@IORING_OP_SENDMSG={0x9, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0}, 0x0) r4 = eventfd(0x0) io_uring_register$IORING_REGISTER_EVENTFD(r0, 0x4, &(0x7f0000000000)=r4, 0x1) read$eventfd(r4, &(0x7f0000000040), 0x8) r5 = syz_io_uring_setup(0x3702, &(0x7f00000001c0), &(0x7f0000000000/0x3000)=nil, &(0x7f0000ffe000/0x2000)=nil, &(0x7f0000000140), &(0x7f0000000240)) r6 = dup2(r3, r5) r7 = dup2(r0, r6) io_uring_enter(r7, 0x1739, 0x0, 0x0, 0x0, 0x0) 19:36:26 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000500100000f000000000000000000000004000000000002000020000020000000def4655fdef4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000008000000018000000", 0x60, 0x400}, {&(0x7f0000010100)="000000000000000000000000e58ca12e13a240e2b1a22f8d07e8e55f010040", 0x1f, 0x4e0}, {&(0x7f0000010200)="010000000000050040", 0x9, 0x560}, {0x0, 0x0, 0x1000000000c00}], 0x0, &(0x7f0000012b00)) 19:36:26 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000500100000f000000000000000000000004000000000002000020000020000000def4655f", 0x30, 0x400}], 0x0, &(0x7f0000012b00)) 19:36:26 executing program 6: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000500100000f000000000000000000000004000000000002000020000020000000def4655fdef4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000008000000018000000c20500002b", 0x65, 0x400}, {&(0x7f0000010100)="000000000000000000000000e58ca12e13a240e2b1a22f8d07e8e55f010040", 0x1f, 0x4e0}, {&(0x7f0000010200)="010000000000050040", 0x9, 0x560}, {0x0, 0x0, 0x1000000000c00}, {&(0x7f0000012000)="504d4d00504d4dff", 0x8, 0x10000}], 0x0, &(0x7f0000012b00)) 19:36:26 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000500100000f000000000000000000000004000000000002000020000020000000def4655fdef4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000008000000018000000c20500002b02", 0x66, 0x400}, {&(0x7f0000010100)="000000000000000000000000e58ca12e13a240e2b1a22f8d07e8e55f010040", 0x1f, 0x4e0}, {&(0x7f0000010200)="010000000000050040", 0x9, 0x560}, {0x0, 0x0, 0x1000000000c00}, {&(0x7f0000012000)="504d4d00504d4dff", 0x8, 0x10000}], 0x0, &(0x7f0000012b00)) 19:36:26 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', 0x0, 0x0, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000500100000f000000000000000000000004000000000002000020000020000000def4655fdef4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000008000000018000000", 0x60, 0x400}, {&(0x7f0000010100)="000000000000000000000000e58ca12e13a240e2b1a22f8d07e8e55f010040", 0x1f, 0x4e0}, {&(0x7f0000010200)="010000000000050040", 0x9, 0x560}, {0x0, 0x0, 0x1000000000c00}, {&(0x7f0000012000)="504d4d00504d4dff", 0x8, 0x10000}], 0x0, &(0x7f0000012b00)) [ 1521.354312] EXT4-fs (loop4): fragment/cluster size (16384) != block size (1024) [ 1521.380000] EXT4-fs (loop7): fragment/cluster size (16384) != block size (1024) [ 1521.383733] EXT4-fs (loop6): fragment/cluster size (16384) != block size (1024) 19:36:26 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000500100000f000000000000000000000004000000000002000020000020000000def4655fdef4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000008000000018000000", 0x60, 0x400}, {&(0x7f0000010100)="000000000000000000000000e58ca12e13a240e2b1a22f8d07e8e55f010040", 0x1f, 0x4e0}, {&(0x7f0000010200)="010000000000050040", 0x9, 0x560}], 0x0, &(0x7f0000012b00)) [ 1521.401790] EXT4-fs error (device loop3): ext4_fill_super:4947: inode #2: comm syz-executor.3: iget: root inode unallocated 19:36:26 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', 0x0, 0x0, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000500100000f000000000000000000000004000000000002000020000020000000def4655fdef4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000008000000018000000", 0x60, 0x400}, {&(0x7f0000010100)="000000000000000000000000e58ca12e13a240e2b1a22f8d07e8e55f010040", 0x1f, 0x4e0}, {&(0x7f0000010200)="010000000000050040", 0x9, 0x560}, {0x0, 0x0, 0x1000000000c00}, {&(0x7f0000012000)="504d4d00504d4dff", 0x8, 0x10000}], 0x0, &(0x7f0000012b00)) [ 1521.407948] EXT4-fs (loop3): get root inode failed [ 1521.408591] EXT4-fs (loop3): mount failed [ 1521.428250] EXT4-fs (loop0): VFS: Can't find ext4 filesystem 19:36:26 executing program 7: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000500100000f000000000000000000000004000000000002000020000020000000def4655fdef4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000008000000018000000c20500002b02", 0x66}, {&(0x7f0000010100)="000000000000000000000000e58ca12e13a240e2b1a22f8d07e8e55f010040", 0x1f, 0x4e0}, {&(0x7f0000010200)="010000000000050040", 0x9, 0x560}, {0x0, 0x0, 0x1000000000c00}, {&(0x7f0000012000)="504d4d00504d4dff", 0x8, 0x10000}], 0x0, &(0x7f0000012b00)) 19:36:26 executing program 6: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000500100000f000000000000000000000004000000000002000020000020000000def4655fdef4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000008000000018000000c20500002b", 0x65, 0x400}, {&(0x7f0000010100)="000000000000000000000000e58ca12e13a240e2b1a22f8d07e8e55f010040", 0x1f, 0x4e0}, {&(0x7f0000010200)="010000000000050040", 0x9, 0x560}, {0x0, 0x0, 0x1000000000c00}, {&(0x7f0000012000)="504d4d00504d4dff", 0x8, 0x10000}], 0x0, &(0x7f0000012b00)) 19:36:26 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000500100000f000000000000000000000004000000000002000020000020000000def4655f", 0x30, 0x400}], 0x0, &(0x7f0000012b00)) 19:36:26 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000500100000f000000000000000000000004000000000002000020000020000000def4655fdef4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000008000000018000000", 0x60, 0x400}, {&(0x7f0000010100)="000000000000000000000000e58ca12e13a240e2b1a22f8d07e8e55f010040", 0x1f, 0x4e0}, {&(0x7f0000010200)="010000000000050040", 0x9, 0x560}, {0x0, 0x0, 0x1000000000c00}, {&(0x7f0000012000)="504d4d00504d4dff", 0x8, 0x10000}], 0x0, &(0x7f0000012b00)) [ 1521.523100] EXT4-fs (loop4): fragment/cluster size (16384) != block size (1024) 19:36:26 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000012b00)) [ 1521.558146] EXT4-fs (loop0): VFS: Can't find ext4 filesystem [ 1521.560582] EXT4-fs (loop7): VFS: Can't find ext4 filesystem [ 1521.573306] EXT4-fs (loop3): fragment/cluster size (16384) != block size (1024) [ 1521.627375] EXT4-fs (loop6): fragment/cluster size (16384) != block size (1024) 19:36:27 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000500100000f000000000000000000000004000000000002000020000020000000def4655fdef4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000008000000018000000", 0x60, 0x400}, {&(0x7f0000010100)="000000000000000000000000e58ca12e13a240e2b1a22f8d07e8e55f010040", 0x1f, 0x4e0}], 0x0, &(0x7f0000012b00)) [ 1521.703069] EXT4-fs (loop4): fragment/cluster size (16384) != block size (1024) 19:36:39 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000500100000f000000000000000000000004000000000002000020000020000000def4655fdef4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000008000000018000000", 0x60, 0x400}, {&(0x7f0000010100)="000000000000000000000000e58ca12e13a240e2b1a22f8d07e8e55f010040", 0x1f, 0x4e0}, {&(0x7f0000010200)="010000000000050040", 0x9, 0x560}, {0x0, 0x0, 0x1000000000c00}, {&(0x7f0000012000)="504d4d00504d4dff", 0x8, 0x10000}], 0x0, &(0x7f0000012b00)) 19:36:39 executing program 1: r0 = syz_io_uring_setup(0x2, &(0x7f0000000500), &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000ff6000/0xa000)=nil, &(0x7f0000000080)=0x0, &(0x7f0000000140)=0x0) r3 = io_uring_setup(0x3ddf, &(0x7f0000000680)) syz_io_uring_submit(r1, r2, &(0x7f0000000800)=@IORING_OP_SENDMSG={0x9, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0}, 0x0) r4 = eventfd(0x0) io_uring_register$IORING_REGISTER_EVENTFD(0xffffffffffffffff, 0x4, &(0x7f0000000000)=r4, 0x1) read$eventfd(r4, &(0x7f0000000040), 0x8) r5 = syz_io_uring_setup(0x3702, &(0x7f00000001c0), &(0x7f0000000000/0x3000)=nil, &(0x7f0000ffe000/0x2000)=nil, &(0x7f0000000140), &(0x7f0000000240)) r6 = dup2(r3, r5) r7 = dup2(r0, r6) io_uring_enter(r7, 0x1739, 0x0, 0x0, 0x0, 0x0) 19:36:39 executing program 2: r0 = syz_io_uring_setup(0x2, &(0x7f0000000500), &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000ff6000/0xa000)=nil, &(0x7f0000000080)=0x0, &(0x7f0000000140)=0x0) r3 = io_uring_setup(0x0, &(0x7f0000000680)) syz_io_uring_submit(r1, r2, &(0x7f0000000800)=@IORING_OP_SENDMSG={0x9, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0}, 0x0) r4 = eventfd(0x0) io_uring_register$IORING_REGISTER_EVENTFD(r0, 0x4, &(0x7f0000000000)=r4, 0x1) read$eventfd(r4, &(0x7f0000000040), 0x8) r5 = syz_io_uring_setup(0x3702, &(0x7f00000001c0), &(0x7f0000000000/0x3000)=nil, &(0x7f0000ffe000/0x2000)=nil, &(0x7f0000000140), &(0x7f0000000240)) r6 = dup2(r3, r5) r7 = dup2(r0, r6) io_uring_enter(r7, 0x1739, 0x0, 0x0, 0x0, 0x0) 19:36:39 executing program 7: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000500100000f000000000000000000000004000000000002000020000020000000def4655fdef4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000008000000018000000c20500002b02", 0x66}, {&(0x7f0000010100)="000000000000000000000000e58ca12e13a240e2b1a22f8d07e8e55f010040", 0x1f, 0x4e0}, {&(0x7f0000010200)="010000000000050040", 0x9, 0x560}, {0x0, 0x0, 0x1000000000c00}, {&(0x7f0000012000)="504d4d00504d4dff", 0x8, 0x10000}], 0x0, &(0x7f0000012b00)) 19:36:39 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000500100000f000000000000000000000004000000000002000020000020000000def4655fdef4655f0100ffff53ef010001000000ddf4655f00000000", 0x48, 0x400}], 0x0, &(0x7f0000012b00)) 19:36:39 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000012b00)) 19:36:39 executing program 6: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000500100000f000000000000000000000004000000000002000020000020000000def4655fdef4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000008000000018000000c20500002b", 0x65, 0x400}, {&(0x7f0000010100)="000000000000000000000000e58ca12e13a240e2b1a22f8d07e8e55f010040", 0x1f, 0x4e0}, {&(0x7f0000010200)="010000000000050040", 0x9, 0x560}, {0x0, 0x0, 0x1000000000c00}, {&(0x7f0000012000)="504d4d00504d4dff", 0x8, 0x10000}], 0x0, &(0x7f0000012b00)) 19:36:39 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000500100000f000000000000000000000004000000000002000020000020000000def4655fdef4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000008000000018000000", 0x60, 0x400}], 0x0, &(0x7f0000012b00)) [ 1534.446124] EXT4-fs (loop6): fragment/cluster size (16384) != block size (1024) [ 1534.464906] EXT4-fs (loop3): fragment/cluster size (16384) != block size (1024) 19:36:39 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000012b00)) [ 1534.469136] EXT4-fs (loop4): fragment/cluster size (16384) != block size (1024) [ 1534.476756] EXT4-fs (loop7): VFS: Can't find ext4 filesystem [ 1534.477942] EXT4-fs (loop0): fragment/cluster size (16384) != block size (1024) 19:36:39 executing program 6: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000500100000f000000000000000000000004000000000002000020000020000000def4655fdef4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000008000000018000000c20500002b02", 0x66}, {&(0x7f0000010100)="000000000000000000000000e58ca12e13a240e2b1a22f8d07e8e55f010040", 0x1f, 0x4e0}, {&(0x7f0000010200)="010000000000050040", 0x9, 0x560}, {0x0, 0x0, 0x1000000000c00}, {&(0x7f0000012000)="504d4d00504d4dff", 0x8, 0x10000}], 0x0, &(0x7f0000012b00)) 19:36:39 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000500100000f000000000000000000000004000000000002000020000020000000def4655fdef4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000008000000018000000", 0x60, 0x400}, {&(0x7f0000010100)="000000000000000000000000e58ca12e13a240e2b1a22f8d07e8e55f010040", 0x1f, 0x4e0}, {&(0x7f0000010200)="010000000000050040", 0x9, 0x560}, {0x0, 0x0, 0x1000000000c00}, {&(0x7f0000012000)="504d4d00504d4dff", 0x8, 0x10000}], 0x0, &(0x7f0000012b00)) 19:36:39 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000500100000f000000000000000000000004000000000002000020000020000000def4655f", 0x30, 0x400}], 0x0, &(0x7f0000012b00)) 19:36:40 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x0, &(0x7f0000000200), 0x0, &(0x7f0000012b00)) 19:36:40 executing program 7: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000500100000f000000000000000000000004000000000002000020000020000000def4655fdef4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000008000000018000000c20500002b02", 0x66}, {&(0x7f0000010100)="000000000000000000000000e58ca12e13a240e2b1a22f8d07e8e55f010040", 0x1f, 0x4e0}, {&(0x7f0000010200)="010000000000050040", 0x9, 0x560}, {0x0, 0x0, 0x1000000000c00}, {&(0x7f0000012000)="504d4d00504d4dff", 0x8, 0x10000}], 0x0, &(0x7f0000012b00)) [ 1534.669379] EXT4-fs (loop6): VFS: Can't find ext4 filesystem [ 1534.684852] EXT4-fs (loop0): VFS: Can't find ext4 filesystem [ 1534.707430] EXT4-fs (loop3): fragment/cluster size (16384) != block size (1024) 19:36:40 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000500100000f000000000000000000000004000000000002000020000020000000def4655fdef4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000008000000018000000", 0x60, 0x400}, {&(0x7f0000010100)="000000000000000000000000e58ca12e13a240e2b1a22f8d07e8e55f010040", 0x1f, 0x4e0}, {&(0x7f0000010200)="010000000000050040", 0x9, 0x560}, {0x0, 0x0, 0x1000000000c00}], 0x0, &(0x7f0000012b00)) 19:36:40 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000500100000f000000000000000000000004000000000002000020000020000000def4655f", 0x30, 0x400}], 0x0, &(0x7f0000012b00)) 19:36:40 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000500100000f000000000000000000000004000000000002000020000020000000def4655fdef4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000008000000018000000c20500", 0x63, 0x400}, {&(0x7f0000010100)="000000000000000000000000e58ca12e13a240e2b1a22f8d07e8e55f010040", 0x1f, 0x4e0}, {&(0x7f0000010200)="010000000000050040", 0x9, 0x560}, {0x0, 0x0, 0x1000000000c00}, {&(0x7f0000012000)="504d4d00504d4dff", 0x8, 0x10000}], 0x0, &(0x7f0000012b00)) [ 1534.800988] EXT4-fs (loop7): VFS: Can't find ext4 filesystem [ 1534.900964] EXT4-fs (loop3): fragment/cluster size (16384) != block size (1024) [ 1534.904528] EXT4-fs (loop4): VFS: Can't find ext4 filesystem [ 1534.926111] EXT4-fs (loop5): fragment/cluster size (16384) != block size (1024) [ 1534.959817] EXT4-fs (loop0): VFS: Can't find ext4 filesystem 19:36:52 executing program 7: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000500100000f000000000000000000000004000000000002000020000020000000def4655fdef4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000008000000018000000c20500002b02", 0x66, 0x400}, {&(0x7f0000010100)="000000000000000000000000e58ca12e13a240e2b1a22f8d07e8e55f010040", 0x1f, 0x4e0}, {&(0x7f0000010200)="010000000000050040", 0x9, 0x560}, {0x0, 0x0, 0x1000000000c00}, {&(0x7f0000012000)="504d4d00504d4dff", 0x8, 0x10000}], 0x0, 0x0) 19:36:52 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000500100000f000000000000000000000004000000000002000020000020000000def4655fdef4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000008000000018000000c20500", 0x63, 0x400}, {&(0x7f0000010100)="000000000000000000000000e58ca12e13a240e2b1a22f8d07e8e55f010040", 0x1f, 0x4e0}, {&(0x7f0000010200)="010000000000050040", 0x9, 0x560}, {0x0, 0x0, 0x1000000000c00}, {&(0x7f0000012000)="504d4d00504d4dff", 0x8, 0x10000}], 0x0, &(0x7f0000012b00)) 19:36:52 executing program 6: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000500100000f000000000000000000000004000000000002000020000020000000def4655fdef4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000008000000018000000c20500002b02", 0x66}, {&(0x7f0000010100)="000000000000000000000000e58ca12e13a240e2b1a22f8d07e8e55f010040", 0x1f, 0x4e0}, {&(0x7f0000010200)="010000000000050040", 0x9, 0x560}, {0x0, 0x0, 0x1000000000c00}, {&(0x7f0000012000)="504d4d00504d4dff", 0x8, 0x10000}], 0x0, &(0x7f0000012b00)) 19:36:52 executing program 2: r0 = syz_io_uring_setup(0x2, &(0x7f0000000500), &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000ff6000/0xa000)=nil, &(0x7f0000000080)=0x0, &(0x7f0000000140)=0x0) r3 = io_uring_setup(0x0, &(0x7f0000000680)) syz_io_uring_submit(r1, r2, &(0x7f0000000800)=@IORING_OP_SENDMSG={0x9, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0}, 0x0) r4 = eventfd(0x0) io_uring_register$IORING_REGISTER_EVENTFD(r0, 0x4, &(0x7f0000000000)=r4, 0x1) read$eventfd(r4, &(0x7f0000000040), 0x8) r5 = syz_io_uring_setup(0x3702, &(0x7f00000001c0), &(0x7f0000000000/0x3000)=nil, &(0x7f0000ffe000/0x2000)=nil, &(0x7f0000000140), &(0x7f0000000240)) r6 = dup2(r3, r5) r7 = dup2(r0, r6) io_uring_enter(r7, 0x1739, 0x0, 0x0, 0x0, 0x0) 19:36:52 executing program 1: r0 = syz_io_uring_setup(0x2, &(0x7f0000000500), &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000ff6000/0xa000)=nil, &(0x7f0000000080)=0x0, &(0x7f0000000140)=0x0) r3 = io_uring_setup(0x3ddf, &(0x7f0000000680)) syz_io_uring_submit(r1, r2, &(0x7f0000000800)=@IORING_OP_SENDMSG={0x9, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0}, 0x0) r4 = eventfd(0x0) io_uring_register$IORING_REGISTER_EVENTFD(0xffffffffffffffff, 0x4, &(0x7f0000000000)=r4, 0x1) read$eventfd(r4, &(0x7f0000000040), 0x8) r5 = syz_io_uring_setup(0x3702, &(0x7f00000001c0), &(0x7f0000000000/0x3000)=nil, &(0x7f0000ffe000/0x2000)=nil, &(0x7f0000000140), &(0x7f0000000240)) r6 = dup2(r3, r5) r7 = dup2(r0, r6) io_uring_enter(r7, 0x1739, 0x0, 0x0, 0x0, 0x0) 19:36:52 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000500100000f000000000000000000000004000000000002000020000020000000def4655fdef4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000008000000018000000", 0x60, 0x400}, {&(0x7f0000010100)="000000000000000000000000e58ca12e13a240e2b1a22f8d07e8e55f010040", 0x1f, 0x4e0}, {&(0x7f0000010200)="010000000000050040", 0x9, 0x560}], 0x0, &(0x7f0000012b00)) 19:36:52 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x0, &(0x7f0000000200), 0x0, &(0x7f0000012b00)) 19:36:52 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000500100000f000000000000000000000004000000000002000020000020000000def4655f", 0x30, 0x400}], 0x0, &(0x7f0000012b00)) [ 1546.870337] EXT4-fs (loop6): VFS: Can't find ext4 filesystem [ 1546.877532] EXT4-fs (loop5): fragment/cluster size (16384) != block size (1024) [ 1546.885941] EXT4-fs (loop0): VFS: Can't find ext4 filesystem 19:36:52 executing program 6: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000500100000f000000000000000000000004000000000002000020000020000000def4655fdef4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000008000000018000000c20500002b02", 0x66}, {&(0x7f0000010100)="000000000000000000000000e58ca12e13a240e2b1a22f8d07e8e55f010040", 0x1f, 0x4e0}, {&(0x7f0000010200)="010000000000050040", 0x9, 0x560}, {0x0, 0x0, 0x1000000000c00}, {&(0x7f0000012000)="504d4d00504d4dff", 0x8, 0x10000}], 0x0, &(0x7f0000012b00)) 19:36:52 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000500100000f000000000000000000000004000000000002000020000020000000def4655fdef4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000008000000018000000", 0x60, 0x400}, {&(0x7f0000010100)="000000000000000000000000e58ca12e13a240e2b1a22f8d07e8e55f010040", 0x1f, 0x4e0}], 0x0, &(0x7f0000012b00)) [ 1546.914216] EXT4-fs (loop4): VFS: Can't find ext4 filesystem [ 1546.915600] EXT4-fs (loop3): fragment/cluster size (16384) != block size (1024) 19:36:52 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x0, &(0x7f0000000200), 0x0, &(0x7f0000012b00)) 19:36:52 executing program 7: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000500100000f000000000000000000000004000000000002000020000020000000def4655fdef4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000008000000018000000c20500002b02", 0x66, 0x400}, {&(0x7f0000010100)="000000000000000000000000e58ca12e13a240e2b1a22f8d07e8e55f010040", 0x1f, 0x4e0}, {&(0x7f0000010200)="010000000000050040", 0x9, 0x560}, {0x0, 0x0, 0x1000000000c00}, {&(0x7f0000012000)="504d4d00504d4dff", 0x8, 0x10000}], 0x0, 0x0) [ 1546.958672] EXT4-fs (loop6): VFS: Can't find ext4 filesystem 19:36:52 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000500100000f000000000000000000000004000000000002000020000020000000def4655fdef4655f0100ffff53ef0100", 0x3c, 0x400}], 0x0, &(0x7f0000012b00)) [ 1546.990557] EXT4-fs (loop5): fragment/cluster size (16384) != block size (1024) [ 1547.004826] EXT4-fs (loop4): VFS: Can't find ext4 filesystem 19:36:52 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000500100000f000000000000000000000004000000000002000020000020000000def4655fdef4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000008000000018000000c20500", 0x63, 0x400}, {&(0x7f0000010100)="000000000000000000000000e58ca12e13a240e2b1a22f8d07e8e55f010040", 0x1f, 0x4e0}, {&(0x7f0000010200)="010000000000050040", 0x9, 0x560}, {0x0, 0x0, 0x1000000000c00}, {&(0x7f0000012000)="504d4d00504d4dff", 0x8, 0x10000}], 0x0, &(0x7f0000012b00)) 19:36:52 executing program 6: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000500100000f000000000000000000000004000000000002000020000020000000def4655fdef4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000008000000018000000c20500002b02", 0x66, 0x400}, {&(0x7f0000010100)="000000000000000000000000e58ca12e13a240e2b1a22f8d07e8e55f010040", 0x1f, 0x4e0}, {&(0x7f0000010200)="010000000000050040", 0x9, 0x560}, {0x0, 0x0, 0x1000000000c00}, {&(0x7f0000012000)="504d4d00504d4dff", 0x8, 0x10000}], 0x0, 0x0) 19:36:52 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{0x0, 0x0, 0x400}], 0x0, &(0x7f0000012b00)) 19:36:52 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000500100000f000000000000000000000004000000000002000020000020000000def4655fdef4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000008000000018000000", 0x60, 0x400}], 0x0, &(0x7f0000012b00)) 19:36:52 executing program 7: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000500100000f000000000000000000000004000000000002000020000020000000def4655fdef4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000008000000018000000c20500002b02", 0x66, 0x400}, {&(0x7f0000010100)="000000000000000000000000e58ca12e13a240e2b1a22f8d07e8e55f010040", 0x1f, 0x4e0}, {&(0x7f0000010200)="010000000000050040", 0x9, 0x560}, {0x0, 0x0, 0x1000000000c00}, {&(0x7f0000012000)="504d4d00504d4dff", 0x8, 0x10000}], 0x0, 0x0) [ 1547.084208] EXT4-fs (loop0): fragment/cluster size (16384) != block size (1024) [ 1547.124749] EXT4-fs (loop4): VFS: Can't find ext4 filesystem [ 1547.132812] EXT4-fs (loop3): fragment/cluster size (16384) != block size (1024) [ 1547.142353] EXT4-fs (loop5): fragment/cluster size (16384) != block size (1024) 19:37:04 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000500100000f000000000000000000000004000000000002000020000020000000def4655f", 0x30, 0x400}], 0x0, &(0x7f0000012b00)) 19:37:04 executing program 1: r0 = syz_io_uring_setup(0x2, &(0x7f0000000500), &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000ff6000/0xa000)=nil, &(0x7f0000000080)=0x0, &(0x7f0000000140)=0x0) r3 = io_uring_setup(0x3ddf, &(0x7f0000000680)) syz_io_uring_submit(r1, r2, &(0x7f0000000800)=@IORING_OP_SENDMSG={0x9, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0}, 0x0) r4 = eventfd(0x0) io_uring_register$IORING_REGISTER_EVENTFD(0xffffffffffffffff, 0x4, &(0x7f0000000000)=r4, 0x1) read$eventfd(r4, &(0x7f0000000040), 0x8) r5 = syz_io_uring_setup(0x3702, &(0x7f00000001c0), &(0x7f0000000000/0x3000)=nil, &(0x7f0000ffe000/0x2000)=nil, &(0x7f0000000140), &(0x7f0000000240)) r6 = dup2(r3, r5) r7 = dup2(r0, r6) io_uring_enter(r7, 0x1739, 0x0, 0x0, 0x0, 0x0) 19:37:04 executing program 2: r0 = syz_io_uring_setup(0x2, &(0x7f0000000500), &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000ff6000/0xa000)=nil, &(0x7f0000000080)=0x0, &(0x7f0000000140)=0x0) r3 = io_uring_setup(0x3ddf, 0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000800)=@IORING_OP_SENDMSG={0x9, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0}, 0x0) r4 = eventfd(0x0) io_uring_register$IORING_REGISTER_EVENTFD(r0, 0x4, &(0x7f0000000000)=r4, 0x1) read$eventfd(r4, &(0x7f0000000040), 0x8) r5 = syz_io_uring_setup(0x3702, &(0x7f00000001c0), &(0x7f0000000000/0x3000)=nil, &(0x7f0000ffe000/0x2000)=nil, &(0x7f0000000140), &(0x7f0000000240)) r6 = dup2(r3, r5) r7 = dup2(r0, r6) io_uring_enter(r7, 0x1739, 0x0, 0x0, 0x0, 0x0) 19:37:04 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x0, &(0x7f0000000200), 0x0, &(0x7f0000012b00)) 19:37:04 executing program 6: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000500100000f000000000000000000000004000000000002000020000020000000def4655fdef4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000008000000018000000c20500002b02", 0x66, 0x400}, {&(0x7f0000010100)="000000000000000000000000e58ca12e13a240e2b1a22f8d07e8e55f010040", 0x1f, 0x4e0}, {&(0x7f0000010200)="010000000000050040", 0x9, 0x560}, {0x0, 0x0, 0x1000000000c00}, {&(0x7f0000012000)="504d4d00504d4dff", 0x8, 0x10000}], 0x0, 0x0) 19:37:04 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000500100000f000000000000000000000004000000000002000020000020000000def4655fdef4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000008000000018000000c20500002b", 0x65, 0x400}, {&(0x7f0000010100)="000000000000000000000000e58ca12e13a240e2b1a22f8d07e8e55f010040", 0x1f, 0x4e0}, {&(0x7f0000010200)="010000000000050040", 0x9, 0x560}, {0x0, 0x0, 0x1000000000c00}, {&(0x7f0000012000)="504d4d00504d4dff", 0x8, 0x10000}], 0x0, &(0x7f0000012b00)) 19:37:04 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{0x0, 0x0, 0x400}], 0x0, &(0x7f0000012b00)) 19:37:04 executing program 7: r0 = syz_io_uring_setup(0x2, &(0x7f0000000500), &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000ff6000/0xa000)=nil, &(0x7f0000000080)=0x0, &(0x7f0000000140)=0x0) r3 = io_uring_setup(0x3ddf, &(0x7f0000000680)) syz_io_uring_submit(r1, r2, &(0x7f0000000800)=@IORING_OP_SENDMSG={0x9, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0}, 0x0) r4 = eventfd(0x0) io_uring_register$IORING_REGISTER_EVENTFD(0xffffffffffffffff, 0x4, &(0x7f0000000000)=r4, 0x1) read$eventfd(r4, &(0x7f0000000040), 0x8) r5 = syz_io_uring_setup(0x3702, &(0x7f00000001c0), &(0x7f0000000000/0x3000)=nil, &(0x7f0000ffe000/0x2000)=nil, &(0x7f0000000140), &(0x7f0000000240)) r6 = dup2(r3, r5) r7 = dup2(r0, r6) io_uring_enter(r7, 0x1739, 0x0, 0x0, 0x0, 0x0) [ 1558.768902] EXT4-fs (loop4): VFS: Can't find ext4 filesystem [ 1558.776766] EXT4-fs (loop3): fragment/cluster size (16384) != block size (1024) [ 1558.783337] EXT4-fs (loop5): VFS: Can't find ext4 filesystem [ 1558.788752] EXT4-fs (loop0): VFS: Can't find ext4 filesystem 19:37:04 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{0x0, 0x0, 0x400}], 0x0, &(0x7f0000012b00)) 19:37:04 executing program 6: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000500100000f000000000000000000000004000000000002000020000020000000def4655fdef4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000008000000018000000c20500002b02", 0x66, 0x400}, {&(0x7f0000010100)="000000000000000000000000e58ca12e13a240e2b1a22f8d07e8e55f010040", 0x1f, 0x4e0}, {&(0x7f0000010200)="010000000000050040", 0x9, 0x560}, {0x0, 0x0, 0x1000000000c00}, {&(0x7f0000012000)="504d4d00504d4dff", 0x8, 0x10000}], 0x0, 0x0) 19:37:04 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000500100000f000000000000000000000004000000000002000020000020000000def4655fdef4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000008000000018000000c20500002b", 0x65, 0x400}, {&(0x7f0000010100)="000000000000000000000000e58ca12e13a240e2b1a22f8d07e8e55f010040", 0x1f, 0x4e0}, {&(0x7f0000010200)="010000000000050040", 0x9, 0x560}, {0x0, 0x0, 0x1000000000c00}, {&(0x7f0000012000)="504d4d00504d4dff", 0x8, 0x10000}], 0x0, &(0x7f0000012b00)) 19:37:04 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x0, &(0x7f0000000200), 0x0, &(0x7f0000012b00)) 19:37:04 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000500100000f000000000000000000000004000000000002000020000020000000def4655f", 0x30, 0x400}], 0x0, &(0x7f0000012b00)) [ 1558.917886] EXT4-fs (loop3): fragment/cluster size (16384) != block size (1024) [ 1558.937629] EXT4-fs (loop4): VFS: Can't find ext4 filesystem [ 1558.945172] EXT4-fs (loop5): VFS: Can't find ext4 filesystem [ 1558.977202] EXT4-fs (loop0): VFS: Can't find ext4 filesystem 19:37:17 executing program 7: r0 = syz_io_uring_setup(0x2, &(0x7f0000000500), &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000ff6000/0xa000)=nil, &(0x7f0000000080)=0x0, &(0x7f0000000140)=0x0) r3 = io_uring_setup(0x3ddf, &(0x7f0000000680)) syz_io_uring_submit(r1, r2, &(0x7f0000000800)=@IORING_OP_SENDMSG={0x9, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0}, 0x0) r4 = eventfd(0x0) io_uring_register$IORING_REGISTER_EVENTFD(0xffffffffffffffff, 0x4, &(0x7f0000000000)=r4, 0x1) read$eventfd(r4, &(0x7f0000000040), 0x8) r5 = syz_io_uring_setup(0x3702, &(0x7f00000001c0), &(0x7f0000000000/0x3000)=nil, &(0x7f0000ffe000/0x2000)=nil, &(0x7f0000000140), &(0x7f0000000240)) r6 = dup2(r3, r5) r7 = dup2(r0, r6) io_uring_enter(r7, 0x1739, 0x0, 0x0, 0x0, 0x0) 19:37:17 executing program 2: r0 = syz_io_uring_setup(0x2, &(0x7f0000000500), &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000ff6000/0xa000)=nil, &(0x7f0000000080)=0x0, &(0x7f0000000140)=0x0) r3 = io_uring_setup(0x3ddf, 0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000800)=@IORING_OP_SENDMSG={0x9, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0}, 0x0) r4 = eventfd(0x0) io_uring_register$IORING_REGISTER_EVENTFD(r0, 0x4, &(0x7f0000000000)=r4, 0x1) read$eventfd(r4, &(0x7f0000000040), 0x8) r5 = syz_io_uring_setup(0x3702, &(0x7f00000001c0), &(0x7f0000000000/0x3000)=nil, &(0x7f0000ffe000/0x2000)=nil, &(0x7f0000000140), &(0x7f0000000240)) r6 = dup2(r3, r5) r7 = dup2(r0, r6) io_uring_enter(r7, 0x1739, 0x0, 0x0, 0x0, 0x0) 19:37:17 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000500100000f000000000000000000000004000000000002000020000020000000def4655fdef4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000008000000018000000c20500002b", 0x65, 0x400}, {&(0x7f0000010100)="000000000000000000000000e58ca12e13a240e2b1a22f8d07e8e55f010040", 0x1f, 0x4e0}, {&(0x7f0000010200)="010000000000050040", 0x9, 0x560}, {0x0, 0x0, 0x1000000000c00}, {&(0x7f0000012000)="504d4d00504d4dff", 0x8, 0x10000}], 0x0, &(0x7f0000012b00)) 19:37:17 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000500100000f000000000000000000000004000000000002000020000020000000def4655f", 0x30, 0x400}], 0x0, &(0x7f0000012b00)) 19:37:17 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x0, &(0x7f0000000200), 0x0, &(0x7f0000012b00)) 19:37:17 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000), 0x0, 0x400}], 0x0, &(0x7f0000012b00)) 19:37:17 executing program 6: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000500100000f000000000000000000000004000000000002000020000020000000def4655fdef4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000008000000018000000c20500002b02", 0x66, 0x400}, {&(0x7f0000010100)="000000000000000000000000e58ca12e13a240e2b1a22f8d07e8e55f010040", 0x1f, 0x4e0}, {&(0x7f0000010200)="010000000000050040", 0x9, 0x560}, {0x0, 0x0, 0x1000000000c00}, {&(0x7f0000012000)="504d4d00504d4dff", 0x8, 0x10000}], 0x0, 0x0) 19:37:17 executing program 1: r0 = syz_io_uring_setup(0x2, &(0x7f0000000500), &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000ff6000/0xa000)=nil, &(0x7f0000000080)=0x0, &(0x7f0000000140)=0x0) r3 = io_uring_setup(0x3ddf, &(0x7f0000000680)) syz_io_uring_submit(r1, r2, &(0x7f0000000800)=@IORING_OP_SENDMSG={0x9, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0}, 0x0) r4 = eventfd(0x0) io_uring_register$IORING_REGISTER_EVENTFD(r0, 0x4, 0x0, 0x1) read$eventfd(r4, &(0x7f0000000040), 0x8) r5 = syz_io_uring_setup(0x3702, &(0x7f00000001c0), &(0x7f0000000000/0x3000)=nil, &(0x7f0000ffe000/0x2000)=nil, &(0x7f0000000140), &(0x7f0000000240)) r6 = dup2(r3, r5) r7 = dup2(r0, r6) io_uring_enter(r7, 0x1739, 0x0, 0x0, 0x0, 0x0) [ 1572.434613] EXT4-fs (loop5): VFS: Can't find ext4 filesystem 19:37:17 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{0x0, 0x0, 0x400}], 0x0, &(0x7f0000012b00)) [ 1572.504017] EXT4-fs (loop3): fragment/cluster size (16384) != block size (1024) [ 1572.512096] EXT4-fs (loop4): VFS: Can't find ext4 filesystem [ 1572.513229] EXT4-fs (loop0): VFS: Can't find ext4 filesystem 19:37:17 executing program 6: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x0, &(0x7f0000000200), 0x0, &(0x7f0000012b00)) [ 1572.526930] EXT4-fs (loop5): VFS: Can't find ext4 filesystem 19:37:17 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000), 0x0, 0x400}], 0x0, &(0x7f0000012b00)) 19:37:18 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000500100000f000000000000000000000004000000000002000020000020000000def4655fdef4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000008000000018000000c20500002b02", 0x66}, {&(0x7f0000010100)="000000000000000000000000e58ca12e13a240e2b1a22f8d07e8e55f010040", 0x1f, 0x4e0}, {&(0x7f0000010200)="010000000000050040", 0x9, 0x560}, {0x0, 0x0, 0x1000000000c00}, {&(0x7f0000012000)="504d4d00504d4dff", 0x8, 0x10000}], 0x0, &(0x7f0000012b00)) 19:37:18 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000500100000f000000000000000000000004000000000002000020000020000000def4655fdef4655f0100", 0x36, 0x400}], 0x0, &(0x7f0000012b00)) 19:37:18 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{0x0, 0x0, 0x400}], 0x0, &(0x7f0000012b00)) [ 1572.678510] EXT4-fs (loop6): VFS: Can't find ext4 filesystem [ 1572.694165] EXT4-fs (loop4): VFS: Can't find ext4 filesystem [ 1572.710851] EXT4-fs (loop3): VFS: Can't find ext4 filesystem [ 1572.734469] EXT4-fs (loop0): VFS: Can't find ext4 filesystem 19:37:18 executing program 6: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000500100000f000000000000000000000004000000000002000020000020000000def4655fdef4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000008000000018000000", 0x60, 0x400}, {&(0x7f0000010100)="000000000000000000000000e58ca12e13a240e2b1a22f8d07e8e55f010040", 0x1f, 0x4e0}], 0x0, &(0x7f0000012b00)) 19:37:18 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000), 0x0, 0x400}], 0x0, &(0x7f0000012b00)) [ 1572.777049] EXT4-fs (loop5): VFS: Can't find ext4 filesystem [ 1572.807312] EXT4-fs (loop6): fragment/cluster size (16384) != block size (1024) [ 1572.830504] EXT4-fs (loop4): VFS: Can't find ext4 filesystem 19:37:29 executing program 7: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000500100000f000000000000000000000004000000000002000020000020000000def4655fdef4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000008000000018000000c20500", 0x63, 0x400}, {&(0x7f0000010100)="000000000000000000000000e58ca12e13a240e2b1a22f8d07e8e55f010040", 0x1f, 0x4e0}, {&(0x7f0000010200)="010000000000050040", 0x9, 0x560}, {0x0, 0x0, 0x1000000000c00}, {&(0x7f0000012000)="504d4d00504d4dff", 0x8, 0x10000}], 0x0, &(0x7f0000012b00)) 19:37:29 executing program 1: r0 = syz_io_uring_setup(0x2, &(0x7f0000000500), &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000ff6000/0xa000)=nil, &(0x7f0000000080)=0x0, &(0x7f0000000140)=0x0) r3 = io_uring_setup(0x3ddf, &(0x7f0000000680)) syz_io_uring_submit(r1, r2, &(0x7f0000000800)=@IORING_OP_SENDMSG={0x9, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0}, 0x0) r4 = eventfd(0x0) io_uring_register$IORING_REGISTER_EVENTFD(r0, 0x4, 0x0, 0x1) read$eventfd(r4, &(0x7f0000000040), 0x8) r5 = syz_io_uring_setup(0x3702, &(0x7f00000001c0), &(0x7f0000000000/0x3000)=nil, &(0x7f0000ffe000/0x2000)=nil, &(0x7f0000000140), &(0x7f0000000240)) r6 = dup2(r3, r5) r7 = dup2(r0, r6) io_uring_enter(r7, 0x1739, 0x0, 0x0, 0x0, 0x0) 19:37:29 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{0x0, 0x0, 0x400}], 0x0, &(0x7f0000012b00)) 19:37:29 executing program 6: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000500100000f000000000000000000000004000000000002000020000020000000def4655fdef4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000008000000018000000", 0x60, 0x400}, {&(0x7f0000010100)="000000000000000000000000e58ca12e13a240e2b1a22f8d07e8e55f010040", 0x1f, 0x4e0}], 0x0, &(0x7f0000012b00)) 19:37:29 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000500100000f000000000000000000000004000000000002000020000020000000def4655f", 0x30, 0x400}], 0x0, &(0x7f0000012b00)) 19:37:29 executing program 2: r0 = syz_io_uring_setup(0x2, &(0x7f0000000500), &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000ff6000/0xa000)=nil, &(0x7f0000000080)=0x0, &(0x7f0000000140)=0x0) r3 = io_uring_setup(0x3ddf, 0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000800)=@IORING_OP_SENDMSG={0x9, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0}, 0x0) r4 = eventfd(0x0) io_uring_register$IORING_REGISTER_EVENTFD(r0, 0x4, &(0x7f0000000000)=r4, 0x1) read$eventfd(r4, &(0x7f0000000040), 0x8) r5 = syz_io_uring_setup(0x3702, &(0x7f00000001c0), &(0x7f0000000000/0x3000)=nil, &(0x7f0000ffe000/0x2000)=nil, &(0x7f0000000140), &(0x7f0000000240)) r6 = dup2(r3, r5) r7 = dup2(r0, r6) io_uring_enter(r7, 0x1739, 0x0, 0x0, 0x0, 0x0) 19:37:29 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000500100000f000000000000000000000004000000000002000020000020000000def4655fdef4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000008000000018000000c20500002b02", 0x66}, {&(0x7f0000010100)="000000000000000000000000e58ca12e13a240e2b1a22f8d07e8e55f010040", 0x1f, 0x4e0}, {&(0x7f0000010200)="010000000000050040", 0x9, 0x560}, {0x0, 0x0, 0x1000000000c00}, {&(0x7f0000012000)="504d4d00504d4dff", 0x8, 0x10000}], 0x0, &(0x7f0000012b00)) 19:37:29 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000500100000f000000000000000000000004000000000002000020000020000000def4655fdef4655f0100", 0x36, 0x400}], 0x0, &(0x7f0000012b00)) [ 1584.585449] EXT4-fs (loop7): fragment/cluster size (16384) != block size (1024) 19:37:30 executing program 7: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000500100000f000000000000000000000004000000000002000020000020000000def4655fdef4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000008000000018000000c20500", 0x63, 0x400}, {&(0x7f0000010100)="000000000000000000000000e58ca12e13a240e2b1a22f8d07e8e55f010040", 0x1f, 0x4e0}, {&(0x7f0000010200)="010000000000050040", 0x9, 0x560}, {0x0, 0x0, 0x1000000000c00}, {&(0x7f0000012000)="504d4d00504d4dff", 0x8, 0x10000}], 0x0, &(0x7f0000012b00)) [ 1584.625502] EXT4-fs (loop3): VFS: Can't find ext4 filesystem [ 1584.629059] EXT4-fs (loop4): VFS: Can't find ext4 filesystem [ 1584.650895] EXT4-fs (loop0): VFS: Can't find ext4 filesystem [ 1584.651314] EXT4-fs (loop6): fragment/cluster size (16384) != block size (1024) [ 1584.665743] EXT4-fs (loop5): VFS: Can't find ext4 filesystem [ 1584.671101] EXT4-fs (loop7): fragment/cluster size (16384) != block size (1024) 19:37:30 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000500100000f000000000000000000000004000000000002000020000020000000def4655fdef4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000008000000018000000c20500002b02", 0x66}, {&(0x7f0000010100)="000000000000000000000000e58ca12e13a240e2b1a22f8d07e8e55f010040", 0x1f, 0x4e0}, {&(0x7f0000010200)="010000000000050040", 0x9, 0x560}, {0x0, 0x0, 0x1000000000c00}, {&(0x7f0000012000)="504d4d00504d4dff", 0x8, 0x10000}], 0x0, &(0x7f0000012b00)) [ 1584.746742] EXT4-fs (loop3): VFS: Can't find ext4 filesystem 19:37:30 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000500100000f000000000000000000000004000000000002000020000020000000def4655f", 0x30, 0x400}], 0x0, &(0x7f0000012b00)) 19:37:30 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000500100000f000000000000000000000004000000000002000020000020000000def4655fdef4655f0100", 0x36, 0x400}], 0x0, &(0x7f0000012b00)) 19:37:30 executing program 6: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000500100000f000000000000000000000004000000000002000020000020000000def4655fdef4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000008000000018000000", 0x60, 0x400}, {&(0x7f0000010100)="000000000000000000000000e58ca12e13a240e2b1a22f8d07e8e55f010040", 0x1f, 0x4e0}], 0x0, &(0x7f0000012b00)) 19:37:30 executing program 7: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000500100000f000000000000000000000004000000000002000020000020000000def4655fdef4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000008000000018000000c20500", 0x63, 0x400}, {&(0x7f0000010100)="000000000000000000000000e58ca12e13a240e2b1a22f8d07e8e55f010040", 0x1f, 0x4e0}, {&(0x7f0000010200)="010000000000050040", 0x9, 0x560}, {0x0, 0x0, 0x1000000000c00}, {&(0x7f0000012000)="504d4d00504d4dff", 0x8, 0x10000}], 0x0, &(0x7f0000012b00)) 19:37:30 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000), 0x0, 0x400}], 0x0, &(0x7f0000012b00)) [ 1584.793178] EXT4-fs (loop6): fragment/cluster size (16384) != block size (1024) [ 1584.801792] EXT4-fs (loop7): fragment/cluster size (16384) != block size (1024) 19:37:30 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000500100000f000000000000000000000004000000000002000020000020000000def4655fdef4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000008000000018000000c20500002b02", 0x66, 0x400}, {&(0x7f0000010100)="000000000000000000000000e58ca12e13a240e2b1a22f8d07e8e55f010040", 0x1f, 0x4e0}, {&(0x7f0000010200)="010000000000050040", 0x9, 0x560}, {0x0, 0x0, 0x1000000000c00}, {&(0x7f0000012000)="504d4d00504d4dff", 0x8, 0x10000}], 0x0, 0x0) 19:37:30 executing program 6: syz_mount_image$ext4(0x0, &(0x7f0000000180)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000500100000f000000000000000000000004000000000002000020000020000000def4655fdef4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000008000000018000000", 0x60, 0x400}, {&(0x7f0000010100)="000000000000000000000000e58ca12e13a240e2b1a22f8d07e8e55f010040", 0x1f, 0x4e0}], 0x0, &(0x7f0000012b00)) [ 1584.831942] EXT4-fs (loop4): VFS: Can't find ext4 filesystem [ 1584.874910] EXT4-fs (loop0): VFS: Can't find ext4 filesystem [ 1584.901954] EXT4-fs (loop5): VFS: Can't find ext4 filesystem 19:37:41 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000500100000f000000000000000000000004000000000002000020000020000000def4655fdef4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000008000000018000000c20500002b02", 0x66, 0x400}, {&(0x7f0000010100)="000000000000000000000000e58ca12e13a240e2b1a22f8d07e8e55f010040", 0x1f, 0x4e0}, {&(0x7f0000010200)="010000000000050040", 0x9, 0x560}, {0x0, 0x0, 0x1000000000c00}, {&(0x7f0000012000)="504d4d00504d4dff", 0x8, 0x10000}], 0x0, 0x0) 19:37:41 executing program 7: syz_mount_image$ext4(0x0, &(0x7f0000000180)='./file0\x00', 0x0, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000500100000f000000000000000000000004000000000002000020000020000000def4655fdef4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000008000000018000000c20500", 0x63, 0x400}, {&(0x7f0000010100)="000000000000000000000000e58ca12e13a240e2b1a22f8d07e8e55f010040", 0x1f, 0x4e0}, {&(0x7f0000010200)="010000000000050040", 0x9, 0x560}, {0x0, 0x0, 0x1000000000c00}, {&(0x7f0000012000)="504d4d00504d4dff", 0x8, 0x10000}], 0x0, &(0x7f0000012b00)) 19:37:41 executing program 1: r0 = syz_io_uring_setup(0x2, &(0x7f0000000500), &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000ff6000/0xa000)=nil, &(0x7f0000000080)=0x0, &(0x7f0000000140)=0x0) r3 = io_uring_setup(0x3ddf, &(0x7f0000000680)) syz_io_uring_submit(r1, r2, &(0x7f0000000800)=@IORING_OP_SENDMSG={0x9, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0}, 0x0) r4 = eventfd(0x0) io_uring_register$IORING_REGISTER_EVENTFD(r0, 0x4, 0x0, 0x1) read$eventfd(r4, &(0x7f0000000040), 0x8) r5 = syz_io_uring_setup(0x3702, &(0x7f00000001c0), &(0x7f0000000000/0x3000)=nil, &(0x7f0000ffe000/0x2000)=nil, &(0x7f0000000140), &(0x7f0000000240)) r6 = dup2(r3, r5) r7 = dup2(r0, r6) io_uring_enter(r7, 0x1739, 0x0, 0x0, 0x0, 0x0) 19:37:41 executing program 2: r0 = syz_io_uring_setup(0x2, &(0x7f0000000500), &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000ff6000/0xa000)=nil, &(0x7f0000000080), &(0x7f0000000140)=0x0) r2 = io_uring_setup(0x3ddf, &(0x7f0000000680)) syz_io_uring_submit(0x0, r1, &(0x7f0000000800)=@IORING_OP_SENDMSG={0x9, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0}, 0x0) r3 = eventfd(0x0) io_uring_register$IORING_REGISTER_EVENTFD(r0, 0x4, &(0x7f0000000000)=r3, 0x1) read$eventfd(r3, &(0x7f0000000040), 0x8) r4 = syz_io_uring_setup(0x3702, &(0x7f00000001c0), &(0x7f0000000000/0x3000)=nil, &(0x7f0000ffe000/0x2000)=nil, &(0x7f0000000140), &(0x7f0000000240)) r5 = dup2(r2, r4) r6 = dup2(r0, r5) io_uring_enter(r6, 0x1739, 0x0, 0x0, 0x0, 0x0) 19:37:41 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000500100000f000000000000000000000004000000000002000020000020000000def4655fdef4655f0100ffff53", 0x39, 0x400}], 0x0, &(0x7f0000012b00)) 19:37:41 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000), 0x0, 0x400}], 0x0, &(0x7f0000012b00)) 19:37:41 executing program 6: syz_mount_image$ext4(0x0, &(0x7f0000000180)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000500100000f000000000000000000000004000000000002000020000020000000def4655fdef4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000008000000018000000", 0x60, 0x400}, {&(0x7f0000010100)="000000000000000000000000e58ca12e13a240e2b1a22f8d07e8e55f010040", 0x1f, 0x4e0}], 0x0, &(0x7f0000012b00)) 19:37:41 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000500100000f000000000000000000000004000000000002000020000020000000def4655f", 0x30, 0x400}], 0x0, &(0x7f0000012b00)) [ 1596.410882] EXT4-fs (loop0): VFS: Can't find ext4 filesystem [ 1596.413116] EXT4-fs (loop4): VFS: Can't find ext4 filesystem 19:37:41 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000500100000f000000000000000000000004000000000002000020000020000000def4655fdef4655f0100ffff53", 0x39, 0x400}], 0x0, &(0x7f0000012b00)) [ 1596.455611] EXT4-fs (loop5): VFS: Can't find ext4 filesystem 19:37:41 executing program 7: syz_mount_image$ext4(0x0, &(0x7f0000000180)='./file0\x00', 0x0, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000500100000f000000000000000000000004000000000002000020000020000000def4655fdef4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000008000000018000000c20500", 0x63, 0x400}, {&(0x7f0000010100)="000000000000000000000000e58ca12e13a240e2b1a22f8d07e8e55f010040", 0x1f, 0x4e0}, {&(0x7f0000010200)="010000000000050040", 0x9, 0x560}, {0x0, 0x0, 0x1000000000c00}, {&(0x7f0000012000)="504d4d00504d4dff", 0x8, 0x10000}], 0x0, &(0x7f0000012b00)) 19:37:41 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000500100000f000000000000000000000004000000000002000020000020000000def4655fdef4655f0100ffff53ef010001000000ddf4655f00000000", 0x48, 0x400}], 0x0, &(0x7f0000012b00)) 19:37:41 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000), 0x0, 0x400}], 0x0, &(0x7f0000012b00)) 19:37:41 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000500100000f000000000000000000000004000000000002000020000020000000def4655fdef4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000008000000018000000c20500002b02", 0x66, 0x400}, {&(0x7f0000010100)="000000000000000000000000e58ca12e13a240e2b1a22f8d07e8e55f010040", 0x1f, 0x4e0}, {&(0x7f0000010200)="010000000000050040", 0x9, 0x560}, {0x0, 0x0, 0x1000000000c00}, {&(0x7f0000012000)="504d4d00504d4dff", 0x8, 0x10000}], 0x0, 0x0) 19:37:41 executing program 6: syz_mount_image$ext4(0x0, &(0x7f0000000180)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000500100000f000000000000000000000004000000000002000020000020000000def4655fdef4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000008000000018000000", 0x60, 0x400}, {&(0x7f0000010100)="000000000000000000000000e58ca12e13a240e2b1a22f8d07e8e55f010040", 0x1f, 0x4e0}], 0x0, &(0x7f0000012b00)) 19:37:41 executing program 7: syz_mount_image$ext4(0x0, &(0x7f0000000180)='./file0\x00', 0x0, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000500100000f000000000000000000000004000000000002000020000020000000def4655fdef4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000008000000018000000c20500", 0x63, 0x400}, {&(0x7f0000010100)="000000000000000000000000e58ca12e13a240e2b1a22f8d07e8e55f010040", 0x1f, 0x4e0}, {&(0x7f0000010200)="010000000000050040", 0x9, 0x560}, {0x0, 0x0, 0x1000000000c00}, {&(0x7f0000012000)="504d4d00504d4dff", 0x8, 0x10000}], 0x0, &(0x7f0000012b00)) [ 1596.548640] EXT4-fs (loop4): fragment/cluster size (16384) != block size (1024) [ 1596.600180] EXT4-fs (loop5): VFS: Can't find ext4 filesystem [ 1596.644771] EXT4-fs (loop0): VFS: Can't find ext4 filesystem 19:37:52 executing program 2: r0 = syz_io_uring_setup(0x2, &(0x7f0000000500), &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000ff6000/0xa000)=nil, &(0x7f0000000080), &(0x7f0000000140)=0x0) r2 = io_uring_setup(0x3ddf, &(0x7f0000000680)) syz_io_uring_submit(0x0, r1, &(0x7f0000000800)=@IORING_OP_SENDMSG={0x9, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0}, 0x0) r3 = eventfd(0x0) io_uring_register$IORING_REGISTER_EVENTFD(r0, 0x4, &(0x7f0000000000)=r3, 0x1) read$eventfd(r3, &(0x7f0000000040), 0x8) r4 = syz_io_uring_setup(0x3702, &(0x7f00000001c0), &(0x7f0000000000/0x3000)=nil, &(0x7f0000ffe000/0x2000)=nil, &(0x7f0000000140), &(0x7f0000000240)) r5 = dup2(r2, r4) r6 = dup2(r0, r5) io_uring_enter(r6, 0x1739, 0x0, 0x0, 0x0, 0x0) 19:37:52 executing program 1: r0 = syz_io_uring_setup(0x2, &(0x7f0000000500), &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000ff6000/0xa000)=nil, &(0x7f0000000080)=0x0, &(0x7f0000000140)=0x0) r3 = io_uring_setup(0x3ddf, &(0x7f0000000680)) syz_io_uring_submit(r1, r2, &(0x7f0000000800)=@IORING_OP_SENDMSG={0x9, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0}, 0x0) r4 = eventfd(0x0) io_uring_register$IORING_REGISTER_EVENTFD(r0, 0x4, &(0x7f0000000000), 0x1) read$eventfd(r4, &(0x7f0000000040), 0x8) r5 = syz_io_uring_setup(0x3702, &(0x7f00000001c0), &(0x7f0000000000/0x3000)=nil, &(0x7f0000ffe000/0x2000)=nil, &(0x7f0000000140), &(0x7f0000000240)) r6 = dup2(r3, r5) r7 = dup2(r0, r6) io_uring_enter(r7, 0x1739, 0x0, 0x0, 0x0, 0x0) 19:37:52 executing program 6: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', 0x0, 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000500100000f000000000000000000000004000000000002000020000020000000def4655fdef4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000008000000018000000", 0x60, 0x400}, {&(0x7f0000010100)="000000000000000000000000e58ca12e13a240e2b1a22f8d07e8e55f010040", 0x1f, 0x4e0}], 0x0, &(0x7f0000012b00)) 19:37:52 executing program 7: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', 0x0, 0x0, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000500100000f000000000000000000000004000000000002000020000020000000def4655fdef4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000008000000018000000c20500", 0x63, 0x400}, {&(0x7f0000010100)="000000000000000000000000e58ca12e13a240e2b1a22f8d07e8e55f010040", 0x1f, 0x4e0}, {&(0x7f0000010200)="010000000000050040", 0x9, 0x560}, {0x0, 0x0, 0x1000000000c00}, {&(0x7f0000012000)="504d4d00504d4dff", 0x8, 0x10000}], 0x0, &(0x7f0000012b00)) 19:37:52 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000500100000f000000000000000000000004000000000002000020000020000000def4655f", 0x30, 0x400}], 0x0, &(0x7f0000012b00)) 19:37:52 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000500100000f000000000000000000000004000000000002000020000020000000def4655f", 0x30, 0x400}], 0x0, &(0x7f0000012b00)) 19:37:52 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000500100000f000000000000000000000004000000000002000020000020000000def4655fdef4655f0100ffff53", 0x39, 0x400}], 0x0, &(0x7f0000012b00)) [ 1607.262747] EXT4-fs (loop4): VFS: Can't find ext4 filesystem 19:37:52 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000500100000f000000000000000000000004000000000002000020000020000000def4655f", 0x30, 0x400}], 0x0, &(0x7f0000012b00)) 19:37:52 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000500100000f000000000000000000000004000000000002000020000020000000def4655fdef4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000008000000018000000c20500002b02", 0x66, 0x400}, {&(0x7f0000010100)="000000000000000000000000e58ca12e13a240e2b1a22f8d07e8e55f010040", 0x1f, 0x4e0}, {&(0x7f0000010200)="010000000000050040", 0x9, 0x560}, {0x0, 0x0, 0x1000000000c00}, {&(0x7f0000012000)="504d4d00504d4dff", 0x8, 0x10000}], 0x0, 0x0) [ 1607.310562] EXT4-fs (loop5): VFS: Can't find ext4 filesystem [ 1607.320666] EXT4-fs (loop0): VFS: Can't find ext4 filesystem 19:37:52 executing program 7: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', 0x0, 0x0, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000500100000f000000000000000000000004000000000002000020000020000000def4655fdef4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000008000000018000000c20500", 0x63, 0x400}, {&(0x7f0000010100)="000000000000000000000000e58ca12e13a240e2b1a22f8d07e8e55f010040", 0x1f, 0x4e0}, {&(0x7f0000010200)="010000000000050040", 0x9, 0x560}, {0x0, 0x0, 0x1000000000c00}, {&(0x7f0000012000)="504d4d00504d4dff", 0x8, 0x10000}], 0x0, &(0x7f0000012b00)) [ 1607.351674] EXT4-fs (loop4): VFS: Can't find ext4 filesystem 19:37:52 executing program 6: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', 0x0, 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000500100000f000000000000000000000004000000000002000020000020000000def4655fdef4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000008000000018000000", 0x60, 0x400}, {&(0x7f0000010100)="000000000000000000000000e58ca12e13a240e2b1a22f8d07e8e55f010040", 0x1f, 0x4e0}], 0x0, &(0x7f0000012b00)) 19:37:52 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000500100000f000000000000000000000004000000000002000020000020000000def4655fdef4655f0100ffff53ef01", 0x3b, 0x400}], 0x0, &(0x7f0000012b00)) 19:37:52 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000500100000f000000000000000000000004000000000002000020000020000000def4655f", 0x30, 0x400}], 0x0, &(0x7f0000012b00)) 19:37:52 executing program 3: r0 = syz_io_uring_setup(0x2, &(0x7f0000000500), &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000ff6000/0xa000)=nil, &(0x7f0000000080), &(0x7f0000000140)=0x0) r2 = io_uring_setup(0x3ddf, &(0x7f0000000680)) syz_io_uring_submit(0x0, r1, &(0x7f0000000800)=@IORING_OP_SENDMSG={0x9, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0}, 0x0) r3 = eventfd(0x0) io_uring_register$IORING_REGISTER_EVENTFD(r0, 0x4, &(0x7f0000000000)=r3, 0x1) read$eventfd(r3, &(0x7f0000000040), 0x8) r4 = syz_io_uring_setup(0x3702, &(0x7f00000001c0), &(0x7f0000000000/0x3000)=nil, &(0x7f0000ffe000/0x2000)=nil, &(0x7f0000000140), &(0x7f0000000240)) r5 = dup2(r2, r4) r6 = dup2(r0, r5) io_uring_enter(r6, 0x1739, 0x0, 0x0, 0x0, 0x0) 19:37:52 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000500100000f000000000000000000000004000000000002000020000020000000def4655f", 0x30, 0x400}], 0x0, &(0x7f0000012b00)) [ 1607.499027] EXT4-fs (loop5): VFS: Can't find ext4 filesystem [ 1607.514432] EXT4-fs (loop4): VFS: Can't find ext4 filesystem [ 1607.543966] EXT4-fs (loop0): fragment/cluster size (16384) != block size (1024) 19:37:52 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000500100000f000000000000000000000004000000000002000020000020000000def4655f", 0x30, 0x400}], 0x0, &(0x7f0000012b00)) [ 1607.602604] EXT4-fs (loop5): VFS: Can't find ext4 filesystem 19:37:53 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000500100000f000000000000000000000004000000000002000020000020000000def4655fdef4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000012b00)) 19:37:53 executing program 6: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', 0x0, 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000500100000f000000000000000000000004000000000002000020000020000000def4655fdef4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000008000000018000000", 0x60, 0x400}, {&(0x7f0000010100)="000000000000000000000000e58ca12e13a240e2b1a22f8d07e8e55f010040", 0x1f, 0x4e0}], 0x0, &(0x7f0000012b00)) 19:37:53 executing program 7: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', 0x0, 0x0, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000500100000f000000000000000000000004000000000002000020000020000000def4655fdef4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000008000000018000000c20500", 0x63, 0x400}, {&(0x7f0000010100)="000000000000000000000000e58ca12e13a240e2b1a22f8d07e8e55f010040", 0x1f, 0x4e0}, {&(0x7f0000010200)="010000000000050040", 0x9, 0x560}, {0x0, 0x0, 0x1000000000c00}, {&(0x7f0000012000)="504d4d00504d4dff", 0x8, 0x10000}], 0x0, &(0x7f0000012b00)) 19:37:53 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000500100000f000000000000000000000004000000000002000020000020000000def4655fdef4655f0100ffff53ef0100", 0x3c, 0x400}], 0x0, &(0x7f0000012b00)) 19:37:53 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000500100000f000000000000000000000004000000000002000020000020000000def4655fdef4655f0100ffff53ef010001000000ddf4655f00000000", 0x48, 0x400}], 0x0, &(0x7f0000012b00)) 19:37:53 executing program 2: r0 = syz_io_uring_setup(0x2, &(0x7f0000000500), &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000ff6000/0xa000)=nil, &(0x7f0000000080), &(0x7f0000000140)=0x0) r2 = io_uring_setup(0x3ddf, &(0x7f0000000680)) syz_io_uring_submit(0x0, r1, &(0x7f0000000800)=@IORING_OP_SENDMSG={0x9, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0}, 0x0) r3 = eventfd(0x0) io_uring_register$IORING_REGISTER_EVENTFD(r0, 0x4, &(0x7f0000000000)=r3, 0x1) read$eventfd(r3, &(0x7f0000000040), 0x8) r4 = syz_io_uring_setup(0x3702, &(0x7f00000001c0), &(0x7f0000000000/0x3000)=nil, &(0x7f0000ffe000/0x2000)=nil, &(0x7f0000000140), &(0x7f0000000240)) r5 = dup2(r2, r4) r6 = dup2(r0, r5) io_uring_enter(r6, 0x1739, 0x0, 0x0, 0x0, 0x0) 19:37:53 executing program 1: r0 = syz_io_uring_setup(0x2, &(0x7f0000000500), &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000ff6000/0xa000)=nil, &(0x7f0000000080)=0x0, &(0x7f0000000140)=0x0) r3 = io_uring_setup(0x3ddf, &(0x7f0000000680)) syz_io_uring_submit(r1, r2, &(0x7f0000000800)=@IORING_OP_SENDMSG={0x9, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0}, 0x0) r4 = eventfd(0x0) io_uring_register$IORING_REGISTER_EVENTFD(r0, 0x4, &(0x7f0000000000), 0x1) read$eventfd(r4, &(0x7f0000000040), 0x8) r5 = syz_io_uring_setup(0x3702, &(0x7f00000001c0), &(0x7f0000000000/0x3000)=nil, &(0x7f0000ffe000/0x2000)=nil, &(0x7f0000000140), &(0x7f0000000240)) r6 = dup2(r3, r5) r7 = dup2(r0, r6) io_uring_enter(r7, 0x1739, 0x0, 0x0, 0x0, 0x0) [ 1608.181601] EXT4-fs (loop4): fragment/cluster size (16384) != block size (1024) 19:37:53 executing program 6: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000012b00)) [ 1608.207648] EXT4-fs (loop5): fragment/cluster size (16384) != block size (1024) [ 1608.209497] EXT4-fs (loop0): fragment/cluster size (16384) != block size (1024) 19:37:53 executing program 7: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000012b00)) 19:37:53 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000500100000f000000000000000000000004000000000002000020000020000000def4655f", 0x30, 0x400}], 0x0, &(0x7f0000012b00)) 19:37:53 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000500100000f000000000000000000000004000000000002000020000020000000def4655f", 0x30, 0x400}], 0x0, &(0x7f0000012b00)) 19:37:53 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000500100000f000000000000000000000004000000000002000020000020000000def4655fdef4655f0100ffff53", 0x39, 0x400}], 0x0, &(0x7f0000012b00)) [ 1608.365809] EXT4-fs (loop5): VFS: Can't find ext4 filesystem [ 1608.404828] EXT4-fs (loop4): VFS: Can't find ext4 filesystem [ 1608.409601] EXT4-fs (loop0): VFS: Can't find ext4 filesystem 19:38:07 executing program 3: r0 = syz_io_uring_setup(0x2, &(0x7f0000000500), &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000ff6000/0xa000)=nil, &(0x7f0000000080)=0x0, &(0x7f0000000140)=0x0) r3 = io_uring_setup(0x3ddf, &(0x7f0000000680)) syz_io_uring_submit(r1, r2, &(0x7f0000000800)=@IORING_OP_SENDMSG={0x9, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0}, 0x0) r4 = eventfd(0x0) io_uring_register$IORING_REGISTER_EVENTFD(r0, 0x4, &(0x7f0000000000), 0x1) read$eventfd(r4, &(0x7f0000000040), 0x8) r5 = syz_io_uring_setup(0x3702, &(0x7f00000001c0), &(0x7f0000000000/0x3000)=nil, &(0x7f0000ffe000/0x2000)=nil, &(0x7f0000000140), &(0x7f0000000240)) r6 = dup2(r3, r5) r7 = dup2(r0, r6) io_uring_enter(r7, 0x1739, 0x0, 0x0, 0x0, 0x0) 19:38:07 executing program 2: r0 = syz_io_uring_setup(0x2, &(0x7f0000000500), &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000ff6000/0xa000)=nil, &(0x7f0000000080)=0x0, &(0x7f0000000140)) r2 = io_uring_setup(0x3ddf, &(0x7f0000000680)) syz_io_uring_submit(r1, 0x0, &(0x7f0000000800)=@IORING_OP_SENDMSG={0x9, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0}, 0x0) r3 = eventfd(0x0) io_uring_register$IORING_REGISTER_EVENTFD(r0, 0x4, &(0x7f0000000000)=r3, 0x1) read$eventfd(r3, &(0x7f0000000040), 0x8) r4 = syz_io_uring_setup(0x3702, &(0x7f00000001c0), &(0x7f0000000000/0x3000)=nil, &(0x7f0000ffe000/0x2000)=nil, &(0x7f0000000140), &(0x7f0000000240)) r5 = dup2(r2, r4) r6 = dup2(r0, r5) io_uring_enter(r6, 0x1739, 0x0, 0x0, 0x0, 0x0) 19:38:07 executing program 1: r0 = syz_io_uring_setup(0x2, &(0x7f0000000500), &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000ff6000/0xa000)=nil, &(0x7f0000000080)=0x0, &(0x7f0000000140)=0x0) r3 = io_uring_setup(0x3ddf, &(0x7f0000000680)) syz_io_uring_submit(r1, r2, &(0x7f0000000800)=@IORING_OP_SENDMSG={0x9, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0}, 0x0) r4 = eventfd(0x0) io_uring_register$IORING_REGISTER_EVENTFD(r0, 0x4, &(0x7f0000000000), 0x1) read$eventfd(r4, &(0x7f0000000040), 0x8) r5 = syz_io_uring_setup(0x3702, &(0x7f00000001c0), &(0x7f0000000000/0x3000)=nil, &(0x7f0000ffe000/0x2000)=nil, &(0x7f0000000140), &(0x7f0000000240)) r6 = dup2(r3, r5) r7 = dup2(r0, r6) io_uring_enter(r7, 0x1739, 0x0, 0x0, 0x0, 0x0) 19:38:07 executing program 6: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000012b00)) 19:38:07 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000500100000f000000000000000000000004000000000002000020000020000000def4655f", 0x30, 0x400}], 0x0, &(0x7f0000012b00)) 19:38:07 executing program 7: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000012b00)) 19:38:07 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000500100000f000000000000000000000004000000000002000020000020000000def4655f", 0x30, 0x400}], 0x0, &(0x7f0000012b00)) 19:38:07 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000500100000f000000000000000000000004000000000002000020000020000000def4655fdef4655f0100ffff53", 0x39, 0x400}], 0x0, &(0x7f0000012b00)) [ 1622.302522] EXT4-fs (loop5): VFS: Can't find ext4 filesystem 19:38:07 executing program 6: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000012b00)) 19:38:07 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000500100000f000000000000000000000004000000000002000020000020000000def4655f", 0x30, 0x400}], 0x0, &(0x7f0000012b00)) [ 1622.331575] EXT4-fs (loop4): VFS: Can't find ext4 filesystem 19:38:07 executing program 7: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000012b00)) [ 1622.353181] EXT4-fs (loop0): VFS: Can't find ext4 filesystem 19:38:07 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000500100000f000000000000000000000004000000000002000020000020000000def4655fdef4655f0100ffff53", 0x39, 0x400}], 0x0, &(0x7f0000012b00)) 19:38:07 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000500100000f000000000000000000000004000000000002000020000020000000def4655f", 0x30, 0x400}], 0x0, &(0x7f0000012b00)) [ 1622.418324] EXT4-fs (loop5): VFS: Can't find ext4 filesystem 19:38:07 executing program 7: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000500100000f000000000000000000000004000000000002000020000020000000def4655fdef4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000008000000018000000c20500", 0x63, 0x400}, {&(0x7f0000010100)="000000000000000000000000e58ca12e13a240e2b1a22f8d07e8e55f010040", 0x1f, 0x4e0}, {&(0x7f0000010200)="010000000000050040", 0x9, 0x560}, {0x0, 0x0, 0x1000000000c00}], 0x0, &(0x7f0000012b00)) [ 1622.449923] EXT4-fs (loop4): VFS: Can't find ext4 filesystem [ 1622.451418] EXT4-fs (loop7): fragment/cluster size (16384) != block size (1024) 19:38:07 executing program 6: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000500100000f000000000000000000000004000000000002000020000020000000def4655fdef4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000008000000018000000", 0x60, 0x400}], 0x0, &(0x7f0000012b00)) 19:38:07 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000500100000f000000000000000000000004000000000002000020000020000000def4655fdef4655f0100ffff53ef0100", 0x3c, 0x400}], 0x0, &(0x7f0000012b00)) [ 1622.488385] EXT4-fs (loop0): VFS: Can't find ext4 filesystem [ 1622.528926] EXT4-fs (loop5): fragment/cluster size (16384) != block size (1024) [ 1622.572676] EXT4-fs (loop6): fragment/cluster size (16384) != block size (1024) 19:38:19 executing program 7: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000500100000f000000000000000000000004000000000002000020000020000000def4655fdef4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000008000000018000000c20500", 0x63, 0x400}, {&(0x7f0000010100)="000000000000000000000000e58ca12e13a240e2b1a22f8d07e8e55f010040", 0x1f, 0x4e0}, {&(0x7f0000010200)="010000000000050040", 0x9, 0x560}], 0x0, &(0x7f0000012b00)) 19:38:19 executing program 1: r0 = syz_io_uring_setup(0x2, &(0x7f0000000500), &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000ff6000/0xa000)=nil, &(0x7f0000000080)=0x0, &(0x7f0000000140)=0x0) r3 = io_uring_setup(0x3ddf, &(0x7f0000000680)) syz_io_uring_submit(r1, r2, &(0x7f0000000800)=@IORING_OP_SENDMSG={0x9, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0}, 0x0) r4 = eventfd(0x0) io_uring_register$IORING_REGISTER_EVENTFD(r0, 0x4, &(0x7f0000000000)=r4, 0x1) read$eventfd(0xffffffffffffffff, &(0x7f0000000040), 0x8) r5 = syz_io_uring_setup(0x3702, &(0x7f00000001c0), &(0x7f0000000000/0x3000)=nil, &(0x7f0000ffe000/0x2000)=nil, &(0x7f0000000140), &(0x7f0000000240)) r6 = dup2(r3, r5) r7 = dup2(r0, r6) io_uring_enter(r7, 0x1739, 0x0, 0x0, 0x0, 0x0) 19:38:19 executing program 3: r0 = syz_io_uring_setup(0x2, &(0x7f0000000500), &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000ff6000/0xa000)=nil, &(0x7f0000000080)=0x0, &(0x7f0000000140)=0x0) r3 = io_uring_setup(0x3ddf, &(0x7f0000000680)) syz_io_uring_submit(r1, r2, &(0x7f0000000800)=@IORING_OP_SENDMSG={0x9, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0}, 0x0) r4 = eventfd(0x0) io_uring_register$IORING_REGISTER_EVENTFD(r0, 0x4, 0x0, 0x1) read$eventfd(r4, &(0x7f0000000040), 0x8) r5 = syz_io_uring_setup(0x3702, &(0x7f00000001c0), &(0x7f0000000000/0x3000)=nil, &(0x7f0000ffe000/0x2000)=nil, &(0x7f0000000140), &(0x7f0000000240)) r6 = dup2(r3, r5) r7 = dup2(r0, r6) io_uring_enter(r7, 0x1739, 0x0, 0x0, 0x0, 0x0) 19:38:19 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000500100000f000000000000000000000004000000000002000020000020000000def4655fdef4655f0100ffff53ef", 0x3a}], 0x0, &(0x7f0000012b00)) 19:38:19 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000500100000f000000000000000000000004000000000002000020000020000000def4655fdef4655f0100", 0x36, 0x400}], 0x0, &(0x7f0000012b00)) 19:38:19 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000500100000f000000000000000000000004000000000002000020000020000000def4655f", 0x30, 0x400}], 0x0, &(0x7f0000012b00)) 19:38:19 executing program 2: r0 = syz_io_uring_setup(0x2, &(0x7f0000000500), &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000ff6000/0xa000)=nil, &(0x7f0000000080)=0x0, &(0x7f0000000140)) r2 = io_uring_setup(0x3ddf, &(0x7f0000000680)) syz_io_uring_submit(r1, 0x0, &(0x7f0000000800)=@IORING_OP_SENDMSG={0x9, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0}, 0x0) r3 = eventfd(0x0) io_uring_register$IORING_REGISTER_EVENTFD(r0, 0x4, &(0x7f0000000000)=r3, 0x1) read$eventfd(r3, &(0x7f0000000040), 0x8) r4 = syz_io_uring_setup(0x3702, &(0x7f00000001c0), &(0x7f0000000000/0x3000)=nil, &(0x7f0000ffe000/0x2000)=nil, &(0x7f0000000140), &(0x7f0000000240)) r5 = dup2(r2, r4) r6 = dup2(r0, r5) io_uring_enter(r6, 0x1739, 0x0, 0x0, 0x0, 0x0) 19:38:19 executing program 6: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x0, &(0x7f0000000200), 0x0, &(0x7f0000012b00)) [ 1634.001904] EXT4-fs (loop7): fragment/cluster size (16384) != block size (1024) [ 1634.002994] EXT4-fs (loop5): VFS: Can't find ext4 filesystem 19:38:19 executing program 7: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000500100000f000000000000000000000004000000000002000020000020000000def4655fdef4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000008000000018000000c20500", 0x63, 0x400}, {&(0x7f0000010100)="000000000000000000000000e58ca12e13a240e2b1a22f8d07e8e55f010040", 0x1f, 0x4e0}], 0x0, &(0x7f0000012b00)) 19:38:19 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000500100000f000000000000000000000004000000000002000020000020000000def4655f", 0x30, 0x400}], 0x0, &(0x7f0000012b00)) [ 1634.042370] EXT4-fs (loop6): VFS: Can't find ext4 filesystem [ 1634.044426] EXT4-fs (loop0): VFS: Can't find ext4 filesystem [ 1634.046450] EXT4-fs (loop4): VFS: Can't find ext4 filesystem [ 1634.060323] EXT4-fs (loop5): VFS: Can't find ext4 filesystem 19:38:19 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000500100000f000000000000000000000004000000000002000020000020000000def4655fdef4655f0100ffff53ef", 0x3a}], 0x0, &(0x7f0000012b00)) [ 1634.072605] EXT4-fs (loop7): fragment/cluster size (16384) != block size (1024) [ 1634.138780] EXT4-fs (loop0): VFS: Can't find ext4 filesystem 19:38:30 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000500100000f000000000000000000000004000000000002000020000020000000def4655f", 0x30, 0x400}], 0x0, &(0x7f0000012b00)) 19:38:30 executing program 1: r0 = syz_io_uring_setup(0x2, &(0x7f0000000500), &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000ff6000/0xa000)=nil, &(0x7f0000000080)=0x0, &(0x7f0000000140)=0x0) r3 = io_uring_setup(0x3ddf, &(0x7f0000000680)) syz_io_uring_submit(r1, r2, &(0x7f0000000800)=@IORING_OP_SENDMSG={0x9, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0}, 0x0) r4 = eventfd(0x0) io_uring_register$IORING_REGISTER_EVENTFD(r0, 0x4, &(0x7f0000000000)=r4, 0x1) read$eventfd(0xffffffffffffffff, &(0x7f0000000040), 0x8) r5 = syz_io_uring_setup(0x3702, &(0x7f00000001c0), &(0x7f0000000000/0x3000)=nil, &(0x7f0000ffe000/0x2000)=nil, &(0x7f0000000140), &(0x7f0000000240)) r6 = dup2(r3, r5) r7 = dup2(r0, r6) io_uring_enter(r7, 0x1739, 0x0, 0x0, 0x0, 0x0) 19:38:30 executing program 7: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000500100000f000000000000000000000004000000000002000020000020000000def4655fdef4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000008000000018000000c20500", 0x63, 0x400}], 0x0, &(0x7f0000012b00)) 19:38:30 executing program 2: r0 = syz_io_uring_setup(0x2, &(0x7f0000000500), &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000ff6000/0xa000)=nil, &(0x7f0000000080)=0x0, &(0x7f0000000140)) r2 = io_uring_setup(0x3ddf, &(0x7f0000000680)) syz_io_uring_submit(r1, 0x0, &(0x7f0000000800)=@IORING_OP_SENDMSG={0x9, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0}, 0x0) r3 = eventfd(0x0) io_uring_register$IORING_REGISTER_EVENTFD(r0, 0x4, &(0x7f0000000000)=r3, 0x1) read$eventfd(r3, &(0x7f0000000040), 0x8) r4 = syz_io_uring_setup(0x3702, &(0x7f00000001c0), &(0x7f0000000000/0x3000)=nil, &(0x7f0000ffe000/0x2000)=nil, &(0x7f0000000140), &(0x7f0000000240)) r5 = dup2(r2, r4) r6 = dup2(r0, r5) io_uring_enter(r6, 0x1739, 0x0, 0x0, 0x0, 0x0) 19:38:30 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000500100000f000000000000000000000004000000000002000020000020000000def4655fdef4655f0100", 0x36, 0x400}], 0x0, &(0x7f0000012b00)) 19:38:30 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000500100000f000000000000000000000004000000000002000020000020000000def4655f", 0x30, 0x400}], 0x0, &(0x7f0000012b00)) 19:38:30 executing program 6: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x0, &(0x7f0000000200), 0x0, &(0x7f0000012b00)) 19:38:30 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000500100000f000000000000000000000004000000000002000020000020000000def4655fdef4655f0100ffff53ef", 0x3a}], 0x0, &(0x7f0000012b00)) [ 1645.623088] EXT4-fs (loop7): unsupported descriptor size 0 [ 1645.624191] EXT4-fs (loop0): VFS: Can't find ext4 filesystem [ 1645.625609] EXT4-fs (loop4): VFS: Can't find ext4 filesystem 19:38:31 executing program 7: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000500100000f000000000000000000000004000000000002000020000020000000def4655fdef4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000008000000018000000c20500", 0x63, 0x400}], 0x0, &(0x7f0000012b00)) 19:38:31 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000500100000f000000000000000000000004000000000002000020000020000000def4655fdef4655f0100ffff53ef", 0x3a, 0x400}], 0x0, 0x0) [ 1645.670844] EXT4-fs (loop5): VFS: Can't find ext4 filesystem [ 1645.674909] EXT4-fs (loop3): VFS: Can't find ext4 filesystem 19:38:31 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000500100000f000000000000000000000004000000000002000020000020000000def4655fdef4655f0100", 0x36, 0x400}], 0x0, &(0x7f0000012b00)) [ 1645.681074] EXT4-fs (loop6): VFS: Can't find ext4 filesystem 19:38:31 executing program 1: r0 = syz_io_uring_setup(0x2, &(0x7f0000000500), &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000ff6000/0xa000)=nil, &(0x7f0000000080)=0x0, &(0x7f0000000140)=0x0) r3 = io_uring_setup(0x3ddf, &(0x7f0000000680)) syz_io_uring_submit(r1, r2, &(0x7f0000000800)=@IORING_OP_SENDMSG={0x9, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0}, 0x0) r4 = eventfd(0x0) io_uring_register$IORING_REGISTER_EVENTFD(r0, 0x4, &(0x7f0000000000)=r4, 0x1) read$eventfd(0xffffffffffffffff, &(0x7f0000000040), 0x8) r5 = syz_io_uring_setup(0x3702, &(0x7f00000001c0), &(0x7f0000000000/0x3000)=nil, &(0x7f0000ffe000/0x2000)=nil, &(0x7f0000000140), &(0x7f0000000240)) r6 = dup2(r3, r5) r7 = dup2(r0, r6) io_uring_enter(r7, 0x1739, 0x0, 0x0, 0x0, 0x0) 19:38:31 executing program 3: r0 = syz_io_uring_setup(0x2, &(0x7f0000000500), &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000ff6000/0xa000)=nil, &(0x7f0000000080)=0x0, &(0x7f0000000140)=0x0) r3 = io_uring_setup(0x3ddf, &(0x7f0000000680)) syz_io_uring_submit(r1, r2, &(0x7f0000000800)=@IORING_OP_SENDMSG={0x9, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0}, 0x0) r4 = eventfd(0x0) io_uring_register$IORING_REGISTER_EVENTFD(r0, 0x4, 0x0, 0x1) read$eventfd(r4, &(0x7f0000000040), 0x8) r5 = syz_io_uring_setup(0x3702, &(0x7f00000001c0), &(0x7f0000000000/0x3000)=nil, &(0x7f0000ffe000/0x2000)=nil, &(0x7f0000000140), &(0x7f0000000240)) r6 = dup2(r3, r5) r7 = dup2(r0, r6) io_uring_enter(r7, 0x1739, 0x0, 0x0, 0x0, 0x0) [ 1645.738727] EXT4-fs (loop7): unsupported descriptor size 0 19:38:31 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000500100000f000000000000000000000004000000000002000020000020000000def4655fdef4655f0100", 0x36, 0x400}], 0x0, &(0x7f0000012b00)) [ 1645.794396] EXT4-fs (loop4): VFS: Can't find ext4 filesystem [ 1645.809981] EXT4-fs (loop5): VFS: Can't find ext4 filesystem 19:38:44 executing program 6: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x0, &(0x7f0000000200), 0x0, &(0x7f0000012b00)) 19:38:44 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000500100000f000000000000000000000004000000000002000020000020000000def4655fdef4655f0100ffff53ef", 0x3a, 0x400}], 0x0, 0x0) 19:38:44 executing program 2: r0 = syz_io_uring_setup(0x2, &(0x7f0000000500), &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000ff6000/0xa000)=nil, &(0x7f0000000080)=0x0, &(0x7f0000000140)=0x0) r3 = io_uring_setup(0x3ddf, &(0x7f0000000680)) syz_io_uring_submit(r1, r2, 0x0, 0x0) r4 = eventfd(0x0) io_uring_register$IORING_REGISTER_EVENTFD(r0, 0x4, &(0x7f0000000000)=r4, 0x1) read$eventfd(r4, &(0x7f0000000040), 0x8) r5 = syz_io_uring_setup(0x3702, &(0x7f00000001c0), &(0x7f0000000000/0x3000)=nil, &(0x7f0000ffe000/0x2000)=nil, &(0x7f0000000140), &(0x7f0000000240)) r6 = dup2(r3, r5) r7 = dup2(r0, r6) io_uring_enter(r7, 0x1739, 0x0, 0x0, 0x0, 0x0) 19:38:44 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000500100000f000000000000000000000004000000000002000020000020000000def4655fdef4655f0100", 0x36, 0x400}], 0x0, &(0x7f0000012b00)) 19:38:44 executing program 1: r0 = syz_io_uring_setup(0x2, &(0x7f0000000500), &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000ff6000/0xa000)=nil, &(0x7f0000000080)=0x0, &(0x7f0000000140)=0x0) r3 = io_uring_setup(0x3ddf, &(0x7f0000000680)) syz_io_uring_submit(r1, r2, &(0x7f0000000800)=@IORING_OP_SENDMSG={0x9, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0}, 0x0) r4 = eventfd(0x0) io_uring_register$IORING_REGISTER_EVENTFD(r0, 0x4, &(0x7f0000000000)=r4, 0x1) read$eventfd(r4, 0x0, 0x0) r5 = syz_io_uring_setup(0x3702, &(0x7f00000001c0), &(0x7f0000000000/0x3000)=nil, &(0x7f0000ffe000/0x2000)=nil, &(0x7f0000000140), &(0x7f0000000240)) r6 = dup2(r3, r5) r7 = dup2(r0, r6) io_uring_enter(r7, 0x1739, 0x0, 0x0, 0x0, 0x0) 19:38:44 executing program 7: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000500100000f000000000000000000000004000000000002000020000020000000def4655fdef4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000008000000018000000c20500", 0x63, 0x400}], 0x0, &(0x7f0000012b00)) 19:38:44 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000500100000f000000000000000000000004000000000002000020000020000000def4655fdef4655f0100ffff53ef", 0x3a, 0x400}], 0x0, 0x0) 19:38:44 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000500100000f000000000000000000000004000000000002000020000020000000def4655fdef4655f0100ffff53", 0x39, 0x400}], 0x0, &(0x7f0000012b00)) [ 1658.630292] EXT4-fs (loop5): VFS: Can't find ext4 filesystem 19:38:44 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000500100000f000000000000000000000004000000000002000020000020000000def4655fdef4655f0100ffff53ef", 0x3a, 0x400}], 0x0, 0x0) 19:38:44 executing program 1: r0 = syz_io_uring_setup(0x2, &(0x7f0000000500), &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000ff6000/0xa000)=nil, &(0x7f0000000080)=0x0, &(0x7f0000000140)=0x0) r3 = io_uring_setup(0x3ddf, &(0x7f0000000680)) syz_io_uring_submit(r1, r2, &(0x7f0000000800)=@IORING_OP_SENDMSG={0x9, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0}, 0x0) r4 = eventfd(0x0) io_uring_register$IORING_REGISTER_EVENTFD(r0, 0x4, &(0x7f0000000000)=r4, 0x1) read$eventfd(r4, 0x0, 0x0) r5 = syz_io_uring_setup(0x3702, &(0x7f00000001c0), &(0x7f0000000000/0x3000)=nil, &(0x7f0000ffe000/0x2000)=nil, &(0x7f0000000140), &(0x7f0000000240)) r6 = dup2(r3, r5) r7 = dup2(r0, r6) io_uring_enter(r7, 0x1739, 0x0, 0x0, 0x0, 0x0) [ 1658.688074] EXT4-fs (loop7): unsupported descriptor size 0 [ 1658.695772] EXT4-fs (loop6): VFS: Can't find ext4 filesystem [ 1658.702887] EXT4-fs (loop4): VFS: Can't find ext4 filesystem 19:38:44 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000500100000f000000000000000000000004000000000002000020000020000000def4655fdef4655f0100", 0x36, 0x400}], 0x0, &(0x7f0000012b00)) 19:38:44 executing program 6: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{0x0, 0x0, 0x400}], 0x0, &(0x7f0000012b00)) 19:38:44 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000500100000f000000000000000000000004000000000002000020000020000000def4655fdef4655f0100ffff53", 0x39, 0x400}], 0x0, &(0x7f0000012b00)) 19:38:44 executing program 7: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000500100000f000000000000000000000004000000000002000020000020000000def4655fdef4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000008000000018000000c20500", 0x63, 0x400}, {0x0, 0x0, 0x4e0}], 0x0, &(0x7f0000012b00)) 19:38:44 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000500100000f000000000000000000000004000000000002000020000020000000def4655fdef4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000008000000018000000c20500", 0x63, 0x400}], 0x0, &(0x7f0000012b00)) 19:38:44 executing program 1: r0 = syz_io_uring_setup(0x2, &(0x7f0000000500), &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000ff6000/0xa000)=nil, &(0x7f0000000080)=0x0, &(0x7f0000000140)=0x0) r3 = io_uring_setup(0x3ddf, &(0x7f0000000680)) syz_io_uring_submit(r1, r2, &(0x7f0000000800)=@IORING_OP_SENDMSG={0x9, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0}, 0x0) r4 = eventfd(0x0) io_uring_register$IORING_REGISTER_EVENTFD(r0, 0x4, &(0x7f0000000000)=r4, 0x1) read$eventfd(r4, 0x0, 0x0) r5 = syz_io_uring_setup(0x3702, &(0x7f00000001c0), &(0x7f0000000000/0x3000)=nil, &(0x7f0000ffe000/0x2000)=nil, &(0x7f0000000140), &(0x7f0000000240)) r6 = dup2(r3, r5) r7 = dup2(r0, r6) io_uring_enter(r7, 0x1739, 0x0, 0x0, 0x0, 0x0) [ 1658.877918] EXT4-fs (loop4): VFS: Can't find ext4 filesystem [ 1658.897891] EXT4-fs (loop5): VFS: Can't find ext4 filesystem [ 1658.904933] EXT4-fs (loop7): unsupported descriptor size 0 [ 1658.909453] EXT4-fs (loop6): VFS: Can't find ext4 filesystem [ 1658.997524] EXT4-fs (loop3): unsupported descriptor size 0 19:38:55 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000500100000f000000000000000000000004000000000002000020000020000000def4655fdef4655f0100ffff53", 0x39, 0x400}], 0x0, &(0x7f0000012b00)) 19:38:55 executing program 2: r0 = syz_io_uring_setup(0x2, &(0x7f0000000500), &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000ff6000/0xa000)=nil, &(0x7f0000000080)=0x0, &(0x7f0000000140)=0x0) r3 = io_uring_setup(0x3ddf, &(0x7f0000000680)) syz_io_uring_submit(r1, r2, 0x0, 0x0) r4 = eventfd(0x0) io_uring_register$IORING_REGISTER_EVENTFD(r0, 0x4, &(0x7f0000000000)=r4, 0x1) read$eventfd(r4, &(0x7f0000000040), 0x8) r5 = syz_io_uring_setup(0x3702, &(0x7f00000001c0), &(0x7f0000000000/0x3000)=nil, &(0x7f0000ffe000/0x2000)=nil, &(0x7f0000000140), &(0x7f0000000240)) r6 = dup2(r3, r5) r7 = dup2(r0, r6) io_uring_enter(r7, 0x1739, 0x0, 0x0, 0x0, 0x0) 19:38:55 executing program 6: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{0x0, 0x0, 0x400}], 0x0, &(0x7f0000012b00)) 19:38:55 executing program 1: r0 = syz_io_uring_setup(0x2, &(0x7f0000000500), &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000ff6000/0xa000)=nil, &(0x7f0000000080)=0x0, &(0x7f0000000140)=0x0) r3 = io_uring_setup(0x3ddf, &(0x7f0000000680)) syz_io_uring_submit(r1, r2, &(0x7f0000000800)=@IORING_OP_SENDMSG={0x9, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0}, 0x0) r4 = eventfd(0x0) io_uring_register$IORING_REGISTER_EVENTFD(r0, 0x4, &(0x7f0000000000)=r4, 0x1) read$eventfd(r4, &(0x7f0000000040), 0x8) r5 = syz_io_uring_setup(0x0, &(0x7f00000001c0), &(0x7f0000000000/0x3000)=nil, &(0x7f0000ffe000/0x2000)=nil, &(0x7f0000000140), &(0x7f0000000240)) r6 = dup2(r3, r5) r7 = dup2(r0, r6) io_uring_enter(r7, 0x1739, 0x0, 0x0, 0x0, 0x0) 19:38:55 executing program 3: r0 = syz_io_uring_setup(0x2, &(0x7f0000000500), &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000ff6000/0xa000)=nil, &(0x7f0000000080)=0x0, &(0x7f0000000140)=0x0) r3 = io_uring_setup(0x3ddf, &(0x7f0000000680)) syz_io_uring_submit(r1, r2, &(0x7f0000000800)=@IORING_OP_SENDMSG={0x9, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0}, 0x0) r4 = eventfd(0x0) io_uring_register$IORING_REGISTER_EVENTFD(r0, 0x4, &(0x7f0000000000)=r4, 0x1) read$eventfd(r4, 0x0, 0x0) r5 = syz_io_uring_setup(0x3702, &(0x7f00000001c0), &(0x7f0000000000/0x3000)=nil, &(0x7f0000ffe000/0x2000)=nil, &(0x7f0000000140), &(0x7f0000000240)) r6 = dup2(r3, r5) r7 = dup2(r0, r6) io_uring_enter(r7, 0x1739, 0x0, 0x0, 0x0, 0x0) 19:38:55 executing program 7: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000500100000f000000000000000000000004000000000002000020000020000000def4655fdef4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000008000000018000000c20500", 0x63, 0x400}, {0x0, 0x0, 0x4e0}], 0x0, &(0x7f0000012b00)) 19:38:55 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000500100000f000000000000000000000004000000000002000020000020000000def4655fdef4655f0100ffff53", 0x39, 0x400}], 0x0, &(0x7f0000012b00)) [ 1670.227951] EXT4-fs (loop7): unsupported descriptor size 0 19:38:55 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000500100000f000000000000000000000004000000000002000020000020000000def4655fdef4655f0100", 0x36, 0x400}], 0x0, &(0x7f0000012b00)) [ 1670.238420] EXT4-fs (loop6): VFS: Can't find ext4 filesystem 19:38:55 executing program 7: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000500100000f000000000000000000000004000000000002000020000020000000def4655fdef4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000008000000018000000c20500", 0x63, 0x400}, {0x0, 0x0, 0x4e0}], 0x0, &(0x7f0000012b00)) 19:38:55 executing program 6: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{0x0, 0x0, 0x400}], 0x0, &(0x7f0000012b00)) [ 1670.272846] EXT4-fs (loop4): VFS: Can't find ext4 filesystem [ 1670.280856] EXT4-fs (loop5): VFS: Can't find ext4 filesystem 19:38:55 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000500100000f000000000000000000000004000000000002000020000020000000def4655fdef4655f0100ffff53ef01", 0x3b, 0x400}], 0x0, &(0x7f0000012b00)) [ 1670.311771] EXT4-fs (loop0): VFS: Can't find ext4 filesystem 19:38:55 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000500100000f000000000000000000000004000000000002000020000020000000def4655fdef4655f0100ffff53", 0x39, 0x400}], 0x0, &(0x7f0000012b00)) [ 1670.327958] EXT4-fs (loop7): unsupported descriptor size 0 [ 1670.341988] EXT4-fs (loop6): VFS: Can't find ext4 filesystem 19:38:55 executing program 0: r0 = syz_io_uring_setup(0x2, &(0x7f0000000500), &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000ff6000/0xa000)=nil, &(0x7f0000000080)=0x0, &(0x7f0000000140)=0x0) r3 = io_uring_setup(0x3ddf, &(0x7f0000000680)) syz_io_uring_submit(r1, r2, &(0x7f0000000800)=@IORING_OP_SENDMSG={0x9, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0}, 0x0) r4 = eventfd(0x0) io_uring_register$IORING_REGISTER_EVENTFD(r0, 0x4, &(0x7f0000000000)=r4, 0x1) read$eventfd(r4, 0x0, 0x0) r5 = syz_io_uring_setup(0x3702, &(0x7f00000001c0), &(0x7f0000000000/0x3000)=nil, &(0x7f0000ffe000/0x2000)=nil, &(0x7f0000000140), &(0x7f0000000240)) r6 = dup2(r3, r5) r7 = dup2(r0, r6) io_uring_enter(r7, 0x1739, 0x0, 0x0, 0x0, 0x0) [ 1670.392104] EXT4-fs (loop4): fragment/cluster size (16384) != block size (1024) [ 1670.394599] EXT4-fs (loop5): VFS: Can't find ext4 filesystem 19:39:10 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000), 0x0, 0x400}], 0x0, &(0x7f0000012b00)) 19:39:10 executing program 7: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000500100000f000000000000000000000004000000000002000020000020000000def4655fdef4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000008000000018000000c20500", 0x63, 0x400}, {&(0x7f0000010100), 0x0, 0x4e0}], 0x0, &(0x7f0000012b00)) 19:39:10 executing program 1: r0 = syz_io_uring_setup(0x2, &(0x7f0000000500), &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000ff6000/0xa000)=nil, &(0x7f0000000080)=0x0, &(0x7f0000000140)=0x0) r3 = io_uring_setup(0x3ddf, &(0x7f0000000680)) syz_io_uring_submit(r1, r2, &(0x7f0000000800)=@IORING_OP_SENDMSG={0x9, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0}, 0x0) r4 = eventfd(0x0) io_uring_register$IORING_REGISTER_EVENTFD(r0, 0x4, &(0x7f0000000000)=r4, 0x1) read$eventfd(r4, &(0x7f0000000040), 0x8) r5 = syz_io_uring_setup(0x0, &(0x7f00000001c0), &(0x7f0000000000/0x3000)=nil, &(0x7f0000ffe000/0x2000)=nil, &(0x7f0000000140), &(0x7f0000000240)) r6 = dup2(r3, r5) r7 = dup2(r0, r6) io_uring_enter(r7, 0x1739, 0x0, 0x0, 0x0, 0x0) 19:39:10 executing program 2: r0 = syz_io_uring_setup(0x2, &(0x7f0000000500), &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000ff6000/0xa000)=nil, &(0x7f0000000080)=0x0, &(0x7f0000000140)=0x0) r3 = io_uring_setup(0x3ddf, &(0x7f0000000680)) syz_io_uring_submit(r1, r2, 0x0, 0x0) r4 = eventfd(0x0) io_uring_register$IORING_REGISTER_EVENTFD(r0, 0x4, &(0x7f0000000000)=r4, 0x1) read$eventfd(r4, &(0x7f0000000040), 0x8) r5 = syz_io_uring_setup(0x3702, &(0x7f00000001c0), &(0x7f0000000000/0x3000)=nil, &(0x7f0000ffe000/0x2000)=nil, &(0x7f0000000140), &(0x7f0000000240)) r6 = dup2(r3, r5) r7 = dup2(r0, r6) io_uring_enter(r7, 0x1739, 0x0, 0x0, 0x0, 0x0) 19:39:10 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000500100000f000000000000000000000004000000000002000020000020000000def4655fdef4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000012b00)) 19:39:10 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000500100000f000000000000000000000004000000000002000020000020000000def4655fdef4655f0100ffff53", 0x39, 0x400}], 0x0, &(0x7f0000012b00)) 19:39:10 executing program 0: r0 = syz_io_uring_setup(0x2, &(0x7f0000000500), &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000ff6000/0xa000)=nil, &(0x7f0000000080)=0x0, &(0x7f0000000140)=0x0) r3 = io_uring_setup(0x3ddf, &(0x7f0000000680)) syz_io_uring_submit(r1, r2, &(0x7f0000000800)=@IORING_OP_SENDMSG={0x9, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0}, 0x0) r4 = eventfd(0x0) io_uring_register$IORING_REGISTER_EVENTFD(r0, 0x4, 0x0, 0x1) read$eventfd(r4, &(0x7f0000000040), 0x8) r5 = syz_io_uring_setup(0x3702, &(0x7f00000001c0), &(0x7f0000000000/0x3000)=nil, &(0x7f0000ffe000/0x2000)=nil, &(0x7f0000000140), &(0x7f0000000240)) r6 = dup2(r3, r5) r7 = dup2(r0, r6) io_uring_enter(r7, 0x1739, 0x0, 0x0, 0x0, 0x0) 19:39:10 executing program 6: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000), 0x0, 0x400}], 0x0, &(0x7f0000012b00)) [ 1684.981319] EXT4-fs (loop7): unsupported descriptor size 0 [ 1684.984663] EXT4-fs (loop3): VFS: Can't find ext4 filesystem [ 1685.003359] EXT4-fs (loop5): VFS: Can't find ext4 filesystem [ 1685.015220] EXT4-fs (loop4): fragment/cluster size (16384) != block size (1024) 19:39:10 executing program 7: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000500100000f000000000000000000000004000000000002000020000020000000def4655fdef4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000008000000018000000c20500", 0x63, 0x400}, {&(0x7f0000010100), 0x0, 0x4e0}], 0x0, &(0x7f0000012b00)) [ 1685.019212] EXT4-fs (loop6): VFS: Can't find ext4 filesystem 19:39:10 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000500100000f000000000000000000000004000000000002000020000020000000def4655fdef4655f0100ffff53ef01", 0x3b, 0x400}], 0x0, &(0x7f0000012b00)) 19:39:10 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000500100000f000000000000000000000004000000000002000020000020000000def4655fdef4655f0100ffff53", 0x39, 0x400}], 0x0, &(0x7f0000012b00)) 19:39:10 executing program 6: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000), 0x0, 0x400}], 0x0, &(0x7f0000012b00)) [ 1685.087066] EXT4-fs (loop7): unsupported descriptor size 0 19:39:10 executing program 3: syz_mount_image$ext4(0x0, &(0x7f0000000180)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000500100000f000000000000000000000004000000000002000020000020000000def4655fdef4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000008000000018000000", 0x60, 0x400}, {&(0x7f0000010100)="000000000000000000000000e58ca12e13a240e2b1a22f8d07e8e55f010040", 0x1f, 0x4e0}], 0x0, &(0x7f0000012b00)) 19:39:10 executing program 7: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000500100000f000000000000000000000004000000000002000020000020000000def4655fdef4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000008000000018000000c20500", 0x63, 0x400}, {&(0x7f0000010100), 0x0, 0x4e0}], 0x0, &(0x7f0000012b00)) [ 1685.112785] EXT4-fs (loop4): VFS: Can't find ext4 filesystem [ 1685.137306] EXT4-fs (loop5): fragment/cluster size (16384) != block size (1024) 19:39:10 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000500100000f000000000000000000000004000000000002000020000020000000def4655fdef4655f0100ffff53", 0x39, 0x400}], 0x0, &(0x7f0000012b00)) [ 1685.160391] EXT4-fs (loop6): VFS: Can't find ext4 filesystem 19:39:10 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000500100000f000000000000000000000004000000000002000020000020000000def4655fdef4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000012b00)) [ 1685.194129] EXT4-fs (loop7): unsupported descriptor size 0 [ 1685.226752] EXT4-fs (loop4): VFS: Can't find ext4 filesystem [ 1685.256024] EXT4-fs (loop5): fragment/cluster size (16384) != block size (1024) 19:39:22 executing program 1: r0 = syz_io_uring_setup(0x2, &(0x7f0000000500), &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000ff6000/0xa000)=nil, &(0x7f0000000080)=0x0, &(0x7f0000000140)=0x0) r3 = io_uring_setup(0x3ddf, &(0x7f0000000680)) syz_io_uring_submit(r1, r2, &(0x7f0000000800)=@IORING_OP_SENDMSG={0x9, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0}, 0x0) r4 = eventfd(0x0) io_uring_register$IORING_REGISTER_EVENTFD(r0, 0x4, &(0x7f0000000000)=r4, 0x1) read$eventfd(r4, &(0x7f0000000040), 0x8) r5 = syz_io_uring_setup(0x0, &(0x7f00000001c0), &(0x7f0000000000/0x3000)=nil, &(0x7f0000ffe000/0x2000)=nil, &(0x7f0000000140), &(0x7f0000000240)) r6 = dup2(r3, r5) r7 = dup2(r0, r6) io_uring_enter(r7, 0x1739, 0x0, 0x0, 0x0, 0x0) 19:39:22 executing program 0: r0 = syz_io_uring_setup(0x21, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, &(0x7f00000a0000)=nil, &(0x7f00000b0000)=nil, &(0x7f0000000180)=0x0, &(0x7f0000002a40)=0x0) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_io_uring_submit(r1, r2, &(0x7f0000000300)=@IORING_OP_OPENAT={0x12, 0x0, 0x0, 0xffffffffffffffff, 0x0, &(0x7f0000000100)='./cgroup/cgroup.procs/file0/../file0\x00'}, 0x0) io_uring_enter(r0, 0x76d3, 0x0, 0x0, 0x0, 0x0) r3 = syz_io_uring_setup(0x2, &(0x7f0000000500), &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000ff6000/0xa000)=nil, &(0x7f0000000080)=0x0, &(0x7f0000000140)=0x0) r6 = io_uring_setup(0x3ddf, &(0x7f0000000680)) syz_io_uring_submit(r4, r5, &(0x7f0000000800)=@IORING_OP_SENDMSG={0x9, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0}, 0x0) r7 = eventfd(0x0) io_uring_register$IORING_REGISTER_EVENTFD(r3, 0x4, &(0x7f0000000000)=r7, 0x1) read$eventfd(r7, &(0x7f0000000040), 0x8) r8 = syz_io_uring_setup(0x3702, &(0x7f00000001c0), &(0x7f0000000000/0x3000)=nil, &(0x7f0000ffe000/0x2000)=nil, &(0x7f0000000140), &(0x7f0000000240)) r9 = dup2(r6, r8) r10 = dup2(r3, r9) io_uring_enter(r10, 0x1739, 0x0, 0x0, 0x0, 0x0) 19:39:22 executing program 6: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000), 0x0, 0x400}], 0x0, &(0x7f0000012b00)) 19:39:22 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000500100000f000000000000000000000004000000000002000020000020000000def4655fdef4655f0100ffff53", 0x39, 0x400}], 0x0, &(0x7f0000012b00)) 19:39:22 executing program 7: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000500100000f000000000000000000000004000000000002000020000020000000def4655fdef4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000008000000018000000c20500", 0x63, 0x400}, {&(0x7f0000010100)="000000000000000000000000e58ca12e", 0x10, 0x4e0}], 0x0, &(0x7f0000012b00)) 19:39:22 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000), 0x0, 0x400}], 0x0, &(0x7f0000012b00)) 19:39:22 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000500100000f000000000000000000000004000000000002000020000020000000def4655fdef4655f0100ffff53", 0x39, 0x400}], 0x0, &(0x7f0000012b00)) 19:39:22 executing program 2: r0 = syz_io_uring_setup(0x2, &(0x7f0000000500), &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000ff6000/0xa000)=nil, &(0x7f0000000080)=0x0, &(0x7f0000000140)=0x0) r3 = io_uring_setup(0x3ddf, &(0x7f0000000680)) syz_io_uring_submit(r1, r2, &(0x7f0000000800)=@IORING_OP_SENDMSG={0x9, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0}, 0x0) r4 = eventfd(0x0) io_uring_register$IORING_REGISTER_EVENTFD(0xffffffffffffffff, 0x4, &(0x7f0000000000)=r4, 0x1) read$eventfd(r4, &(0x7f0000000040), 0x8) r5 = syz_io_uring_setup(0x3702, &(0x7f00000001c0), &(0x7f0000000000/0x3000)=nil, &(0x7f0000ffe000/0x2000)=nil, &(0x7f0000000140), &(0x7f0000000240)) r6 = dup2(r3, r5) r7 = dup2(r0, r6) io_uring_enter(r7, 0x1739, 0x0, 0x0, 0x0, 0x0) [ 1697.355007] EXT4-fs (loop3): VFS: Can't find ext4 filesystem [ 1697.357981] EXT4-fs (loop5): VFS: Can't find ext4 filesystem [ 1697.385742] EXT4-fs (loop7): unsupported descriptor size 0 [ 1697.388834] EXT4-fs (loop6): VFS: Can't find ext4 filesystem [ 1697.393837] EXT4-fs (loop4): VFS: Can't find ext4 filesystem 19:39:22 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000500100000f000000000000000000000004000000000002000020000020000000def4655fdef4655f0100ffff53ef", 0x3a}], 0x0, &(0x7f0000012b00)) 19:39:22 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000500100000f000000000000000000000004000000000002000020000020000000def4655fdef4655f0100ffff53", 0x39, 0x400}], 0x0, &(0x7f0000012b00)) 19:39:22 executing program 6: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000500100000f000000000000000000000004000000000002000020000020000000def4655f", 0x30, 0x400}], 0x0, &(0x7f0000012b00)) 19:39:22 executing program 7: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000500100000f000000000000000000000004000000000002000020000020000000def4655fdef4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000008000000018000000c20500", 0x63, 0x400}, {&(0x7f0000010100)="000000000000000000000000e58ca12e", 0x10, 0x4e0}], 0x0, &(0x7f0000012b00)) 19:39:22 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000500100000f000000000000000000000004000000000002000020000020000000def4655fdef4655f0100ffff53ef", 0x3a}], 0x0, &(0x7f0000012b00)) 19:39:22 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000500100000f000000000000000000000004000000000002000020000020000000def4655fdef4655f0100ffff53ef", 0x3a}], 0x0, &(0x7f0000012b00)) [ 1697.548404] EXT4-fs (loop5): VFS: Can't find ext4 filesystem [ 1697.564238] EXT4-fs (loop7): unsupported descriptor size 0 [ 1697.566256] EXT4-fs (loop3): VFS: Can't find ext4 filesystem 19:39:22 executing program 0: r0 = syz_io_uring_setup(0x2, &(0x7f0000000500), &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000ff6000/0xa000)=nil, &(0x7f0000000080)=0x0, &(0x7f0000000140)=0x0) r3 = io_uring_setup(0x3ddf, &(0x7f0000000680)) syz_io_uring_submit(r1, r2, &(0x7f0000000800)=@IORING_OP_SENDMSG={0x9, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0}, 0x0) r4 = eventfd(0x0) io_uring_register$IORING_REGISTER_EVENTFD(r0, 0x4, &(0x7f0000000000)=r4, 0x1) read$eventfd(r4, &(0x7f0000000040), 0x8) r5 = syz_io_uring_setup(0x0, &(0x7f00000001c0), &(0x7f0000000000/0x3000)=nil, &(0x7f0000ffe000/0x2000)=nil, &(0x7f0000000140), &(0x7f0000000240)) r6 = dup2(r3, r5) r7 = dup2(r0, r6) io_uring_enter(r7, 0x1739, 0x0, 0x0, 0x0, 0x0) [ 1697.596437] EXT4-fs (loop4): VFS: Can't find ext4 filesystem [ 1697.622492] EXT4-fs (loop6): VFS: Can't find ext4 filesystem 19:39:23 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000500100000f000000000000000000000004000000000002000020000020000000def4655fdef4655f0100ffff53", 0x39, 0x400}], 0x0, &(0x7f0000012b00)) [ 1697.698786] EXT4-fs (loop5): VFS: Can't find ext4 filesystem 19:39:35 executing program 0: r0 = syz_io_uring_setup(0x2, &(0x7f0000000500), &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000ff6000/0xa000)=nil, &(0x7f0000000080)=0x0, &(0x7f0000000140)=0x0) r3 = io_uring_setup(0x3ddf, &(0x7f0000000680)) syz_io_uring_submit(r1, r2, &(0x7f0000000800)=@IORING_OP_SENDMSG={0x9, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0}, 0x0) r4 = eventfd(0x0) io_uring_register$IORING_REGISTER_EVENTFD(r0, 0x4, &(0x7f0000000000)=r4, 0x1) read$eventfd(r4, &(0x7f0000000040), 0x8) r5 = syz_io_uring_setup(0x3702, &(0x7f00000001c0), &(0x7f0000000000/0x3000)=nil, &(0x7f0000ffe000/0x2000)=nil, &(0x7f0000000140), &(0x7f0000000240)) r6 = dup2(r3, r5) dup2(r0, r6) io_uring_enter(0xffffffffffffffff, 0x1739, 0x0, 0x0, 0x0, 0x0) 19:39:35 executing program 6: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000500100000f000000000000000000000004000000000002000020000020000000def4655f", 0x30, 0x400}], 0x0, &(0x7f0000012b00)) 19:39:35 executing program 7: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000500100000f000000000000000000000004000000000002000020000020000000def4655fdef4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000008000000018000000c20500", 0x63, 0x400}, {&(0x7f0000010100)="000000000000000000000000e58ca12e", 0x10, 0x4e0}], 0x0, &(0x7f0000012b00)) 19:39:35 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000500100000f000000000000000000000004000000000002000020000020000000def4655fdef4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000008000000018000000c20500002b0200"/120, 0x78, 0x400}, {&(0x7f0000010100)="000000000000000000000000e58ca12e13a240e2b1a22f8d07e8e55f010040", 0x1f, 0x4e0}, {&(0x7f0000010200)="010000000000050040", 0x9, 0x560}, {0x0, 0x0, 0x1000000000c00}, {&(0x7f0000012000)="504d4d00504d4dff", 0x8, 0x10000}], 0x0, &(0x7f0000012b00)) 19:39:35 executing program 2: r0 = syz_io_uring_setup(0x2, &(0x7f0000000500), &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000ff6000/0xa000)=nil, &(0x7f0000000080)=0x0, &(0x7f0000000140)=0x0) r3 = io_uring_setup(0x3ddf, &(0x7f0000000680)) syz_io_uring_submit(r1, r2, &(0x7f0000000800)=@IORING_OP_SENDMSG={0x9, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0}, 0x0) r4 = eventfd(0x0) io_uring_register$IORING_REGISTER_EVENTFD(0xffffffffffffffff, 0x4, &(0x7f0000000000)=r4, 0x1) read$eventfd(r4, &(0x7f0000000040), 0x8) r5 = syz_io_uring_setup(0x3702, &(0x7f00000001c0), &(0x7f0000000000/0x3000)=nil, &(0x7f0000ffe000/0x2000)=nil, &(0x7f0000000140), &(0x7f0000000240)) r6 = dup2(r3, r5) r7 = dup2(r0, r6) io_uring_enter(r7, 0x1739, 0x0, 0x0, 0x0, 0x0) 19:39:35 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000500100000f000000000000000000000004000000000002000020000020000000def4655fdef4655f0100ffff53ef", 0x3a}], 0x0, &(0x7f0000012b00)) 19:39:35 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000500100000f000000000000000000000004000000000002000020000020000000def4655fdef4655f0100ffff53ef", 0x3a}], 0x0, &(0x7f0000012b00)) 19:39:35 executing program 1: r0 = syz_io_uring_setup(0x2, &(0x7f0000000500), &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000ff6000/0xa000)=nil, &(0x7f0000000080)=0x0, &(0x7f0000000140)=0x0) r3 = io_uring_setup(0x3ddf, &(0x7f0000000680)) syz_io_uring_submit(r1, r2, &(0x7f0000000800)=@IORING_OP_SENDMSG={0x9, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0}, 0x0) r4 = eventfd(0x0) io_uring_register$IORING_REGISTER_EVENTFD(r0, 0x4, &(0x7f0000000000)=r4, 0x1) read$eventfd(r4, &(0x7f0000000040), 0x8) r5 = syz_io_uring_setup(0x3702, 0x0, &(0x7f0000000000/0x3000)=nil, &(0x7f0000ffe000/0x2000)=nil, &(0x7f0000000140), &(0x7f0000000240)) r6 = dup2(r3, r5) r7 = dup2(r0, r6) io_uring_enter(r7, 0x1739, 0x0, 0x0, 0x0, 0x0) [ 1710.101426] EXT4-fs (loop6): VFS: Can't find ext4 filesystem [ 1710.125242] EXT4-fs (loop7): unsupported descriptor size 0 [ 1710.126668] EXT4-fs (loop4): VFS: Can't find ext4 filesystem [ 1710.130224] EXT4-fs (loop5): VFS: Can't find ext4 filesystem [ 1710.134272] EXT4-fs error (device loop3): ext4_fill_super:4947: inode #2: comm syz-executor.3: iget: root inode unallocated [ 1710.136374] EXT4-fs (loop3): get root inode failed [ 1710.137265] EXT4-fs (loop3): mount failed 19:39:35 executing program 6: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000500100000f000000000000000000000004000000000002000020000020000000def4655f", 0x30, 0x400}], 0x0, &(0x7f0000012b00)) 19:39:35 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000500100000f000000000000000000000004000000000002000020000020000000def4655fdef4655f0100ffff53ef", 0x3a, 0x400}], 0x0, 0x0) 19:39:35 executing program 7: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000500100000f000000000000000000000004000000000002000020000020000000def4655fdef4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000008000000018000000c20500", 0x63, 0x400}, {&(0x7f0000010100)="000000000000000000000000e58ca12e13a240e2b1a22f8d", 0x18, 0x4e0}], 0x0, &(0x7f0000012b00)) 19:39:35 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000500100000f000000000000000000000004000000000002000020000020000000def4655fdef4655f0100ffff53ef", 0x3a}], 0x0, &(0x7f0000012b00)) 19:39:35 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000500100000f000000000000000000000004000000000002000020000020000000def4655fdef4655f0100ffff53ef", 0x3a}], 0x0, &(0x7f0000012b00)) 19:39:35 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000500100000f000000000000000000000004000000000002000020000020000000def4655fdef4655f0100ffff53ef", 0x3a, 0x400}], 0x0, 0x0) [ 1710.328930] EXT4-fs (loop6): VFS: Can't find ext4 filesystem [ 1710.343657] EXT4-fs (loop7): unsupported descriptor size 0 [ 1710.354864] EXT4-fs (loop3): VFS: Can't find ext4 filesystem [ 1710.384059] EXT4-fs (loop5): VFS: Can't find ext4 filesystem 19:39:35 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000500100000f000000000000000000000004000000000002000020000020000000def4655fdef4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000008000000018000000c20500002b0200000000000000000000000000000000000073797a6b616c6c6572000000000000002f746d702f73797a2d696d61676567656e35373134333434333800"/192, 0xc0, 0x400}, {&(0x7f0000010100)="000000000000000000000000e58ca12e13a240e2b1a22f8d07e8e55f010040", 0x1f, 0x4e0}, {&(0x7f0000010200)="010000000000050040", 0x9, 0x560}, {0x0, 0x0, 0x1000000000c00}, {&(0x7f0000012000)="504d4d00504d4dff", 0x8, 0x10000}], 0x0, &(0x7f0000012b00)) [ 1710.508222] EXT4-fs error (device loop3): ext4_fill_super:4947: inode #2: comm syz-executor.3: iget: root inode unallocated [ 1710.510320] EXT4-fs (loop3): get root inode failed [ 1710.511754] EXT4-fs (loop3): mount failed 19:39:48 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000500100000f000000000000000000000004000000000002000020000020000000def4655fdef4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000008000000018000000c20500002b0200000000000000000000000000000000000073797a6b616c6c6572000000000000002f746d702f73797a2d696d61676567656e35373134333434333800"/192, 0xc0, 0x400}, {&(0x7f0000010100)="000000000000000000000000e58ca12e13a240e2b1a22f8d07e8e55f0100", 0x1e, 0x4e0}, {&(0x7f0000010200)="010000000000050040", 0x9, 0x560}, {0x0, 0x0, 0x1000000000c00}, {&(0x7f0000012000)="504d4d00504d4dff", 0x8, 0x10000}], 0x0, &(0x7f0000012b00)) 19:39:48 executing program 2: r0 = syz_io_uring_setup(0x2, &(0x7f0000000500), &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000ff6000/0xa000)=nil, &(0x7f0000000080)=0x0, &(0x7f0000000140)=0x0) r3 = io_uring_setup(0x3ddf, &(0x7f0000000680)) syz_io_uring_submit(r1, r2, &(0x7f0000000800)=@IORING_OP_SENDMSG={0x9, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0}, 0x0) r4 = eventfd(0x0) io_uring_register$IORING_REGISTER_EVENTFD(0xffffffffffffffff, 0x4, &(0x7f0000000000)=r4, 0x1) read$eventfd(r4, &(0x7f0000000040), 0x8) r5 = syz_io_uring_setup(0x3702, &(0x7f00000001c0), &(0x7f0000000000/0x3000)=nil, &(0x7f0000ffe000/0x2000)=nil, &(0x7f0000000140), &(0x7f0000000240)) r6 = dup2(r3, r5) r7 = dup2(r0, r6) io_uring_enter(r7, 0x1739, 0x0, 0x0, 0x0, 0x0) 19:39:48 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000500100000f000000000000000000000004000000000002000020000020000000def4655fdef4655f0100ffff53ef", 0x3a}], 0x0, &(0x7f0000012b00)) 19:39:48 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000500100000f000000000000000000000004000000000002000020000020000000def4655fdef4655f0100ffff53ef", 0x3a, 0x400}], 0x0, 0x0) 19:39:48 executing program 7: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000500100000f000000000000000000000004000000000002000020000020000000def4655fdef4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000008000000018000000c20500", 0x63, 0x400}, {&(0x7f0000010100)="000000000000000000000000e58ca12e13a240e2b1a22f8d", 0x18, 0x4e0}], 0x0, &(0x7f0000012b00)) 19:39:48 executing program 6: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000500100000f000000000000000000000004000000000002000020000020000000def4655fdef4655f0100ffff53ef010001000000ddf4655f00000000", 0x48, 0x400}], 0x0, &(0x7f0000012b00)) 19:39:48 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000500100000f000000000000000000000004000000000002000020000020000000def4655fdef4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000008000000018000000c20500002b0200000000000000000000000000000000000073797a6b616c6c6572000000000000002f746d702f73797a", 0x90, 0x400}, {&(0x7f0000010100)="000000000000000000000000e58ca12e13a240e2b1a22f8d07e8e55f010040", 0x1f, 0x4e0}, {&(0x7f0000010200)="010000000000050040", 0x9, 0x560}, {0x0, 0x0, 0x1000000000c00}, {&(0x7f0000012000)="504d4d00504d4dff", 0x8, 0x10000}], 0x0, &(0x7f0000012b00)) 19:39:48 executing program 1: r0 = syz_io_uring_setup(0x2, &(0x7f0000000500), &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000ff6000/0xa000)=nil, &(0x7f0000000080)=0x0, &(0x7f0000000140)=0x0) r3 = io_uring_setup(0x3ddf, &(0x7f0000000680)) syz_io_uring_submit(r1, r2, &(0x7f0000000800)=@IORING_OP_SENDMSG={0x9, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0}, 0x0) r4 = eventfd(0x0) io_uring_register$IORING_REGISTER_EVENTFD(r0, 0x4, &(0x7f0000000000)=r4, 0x1) read$eventfd(r4, &(0x7f0000000040), 0x8) r5 = syz_io_uring_setup(0x3702, 0x0, &(0x7f0000000000/0x3000)=nil, &(0x7f0000ffe000/0x2000)=nil, &(0x7f0000000140), &(0x7f0000000240)) r6 = dup2(r3, r5) r7 = dup2(r0, r6) io_uring_enter(r7, 0x1739, 0x0, 0x0, 0x0, 0x0) [ 1723.123068] EXT4-fs (loop0): unsupported descriptor size 0 [ 1723.145459] EXT4-fs (loop6): fragment/cluster size (16384) != block size (1024) [ 1723.150125] EXT4-fs error (device loop3): ext4_fill_super:4947: inode #2: comm syz-executor.3: iget: root inode unallocated [ 1723.153388] EXT4-fs (loop3): get root inode failed [ 1723.154550] EXT4-fs (loop3): mount failed [ 1723.155845] EXT4-fs (loop5): VFS: Can't find ext4 filesystem [ 1723.159966] EXT4-fs (loop7): unsupported descriptor size 0 19:39:48 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000500100000f000000000000000000000004000000000002000020000020000000def4655fdef4655f0100ffff53ef", 0x3a}], 0x0, &(0x7f0000012b00)) 19:39:48 executing program 6: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000500100000f000000000000000000000004000000000002000020000020000000def4655f", 0x30, 0x400}], 0x0, &(0x7f0000012b00)) 19:39:48 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000500100000f000000000000000000000004000000000002000020000020000000def4655fdef4655f0100ffff53ef", 0x3a, 0x400}], 0x0, 0x0) 19:39:48 executing program 7: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000500100000f000000000000000000000004000000000002000020000020000000def4655fdef4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000008000000018000000c20500", 0x63, 0x400}, {&(0x7f0000010100)="000000000000000000000000e58ca12e13a240e2b1a22f8d", 0x18, 0x4e0}], 0x0, &(0x7f0000012b00)) 19:39:48 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000500100000f000000000000000000000004000000000002000020000020000000def4655fdef4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000008000000018000000", 0x60, 0x400}, {&(0x7f0000010100)="000000000000000000000000e58ca12e13a240e2b1a22f8d07e8e55f010040", 0x1f, 0x4e0}, {&(0x7f0000010200)="010000000000050040", 0x9, 0x560}, {0x0, 0x0, 0x1000000000c00}, {&(0x7f0000012000)="504d4d00504d4dff", 0x8, 0x10000}], 0x0, &(0x7f0000012b00)) [ 1723.355192] EXT4-fs (loop6): VFS: Can't find ext4 filesystem [ 1723.387210] EXT4-fs (loop0): VFS: Can't find ext4 filesystem 19:39:48 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000500100000f000000000000000000000004000000000002000020000020000000def4655fdef4655f0100ffff53ef", 0x3a, 0x400}], 0x0, 0x0) [ 1723.413262] EXT4-fs (loop7): unsupported descriptor size 0 [ 1723.425939] EXT4-fs (loop3): fragment/cluster size (16384) != block size (1024) 19:39:48 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000500100000f000000000000000000000004000000000002000020000020000000def4655fdef4655f0100ffff53ef", 0x3a, 0x400}], 0x0, 0x0) 19:39:48 executing program 6: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000500100000f000000000000000000000004000000000002000020000020000000def4655f", 0x30, 0x400}], 0x0, &(0x7f0000012b00)) 19:39:48 executing program 0: r0 = syz_io_uring_setup(0x2, &(0x7f0000000500), &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000ff6000/0xa000)=nil, &(0x7f0000000080)=0x0, &(0x7f0000000140)=0x0) r3 = io_uring_setup(0x3ddf, &(0x7f0000000680)) syz_io_uring_submit(r1, r2, &(0x7f0000000800)=@IORING_OP_SENDMSG={0x9, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0}, 0x0) r4 = eventfd(0x0) io_uring_register$IORING_REGISTER_EVENTFD(r0, 0x4, &(0x7f0000000000)=r4, 0x1) read$eventfd(r4, &(0x7f0000000040), 0x8) r5 = syz_io_uring_setup(0x3702, &(0x7f00000001c0), &(0x7f0000000000/0x3000)=nil, &(0x7f0000ffe000/0x2000)=nil, &(0x7f0000000140), &(0x7f0000000240)) r6 = dup2(r3, r5) r7 = dup2(0xffffffffffffffff, r6) io_uring_enter(r7, 0x1739, 0x0, 0x0, 0x0, 0x0) [ 1723.528071] EXT4-fs (loop6): VFS: Can't find ext4 filesystem 19:40:01 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000500100000f000000000000000000000004000000000002000020000020000000def4655fdef4655f0100ffff53ef", 0x3a, 0x400}], 0x0, 0x0) 19:40:01 executing program 0: r0 = syz_io_uring_setup(0x2, &(0x7f0000000500), &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000ff6000/0xa000)=nil, &(0x7f0000000080)=0x0, &(0x7f0000000140)=0x0) r3 = io_uring_setup(0x3ddf, &(0x7f0000000680)) syz_io_uring_submit(r1, r2, &(0x7f0000000800)=@IORING_OP_SENDMSG={0x9, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0}, 0x0) r4 = eventfd(0x0) io_uring_register$IORING_REGISTER_EVENTFD(r0, 0x4, &(0x7f0000000000)=r4, 0x1) read$eventfd(r4, &(0x7f0000000040), 0x8) r5 = syz_io_uring_setup(0x3702, &(0x7f00000001c0), &(0x7f0000000000/0x3000)=nil, &(0x7f0000ffe000/0x2000)=nil, &(0x7f0000000140), &(0x7f0000000240)) dup2(r3, r5) r6 = dup2(r0, 0xffffffffffffffff) io_uring_enter(r6, 0x1739, 0x0, 0x0, 0x0, 0x0) 19:40:01 executing program 2: r0 = syz_io_uring_setup(0x2, &(0x7f0000000500), &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000ff6000/0xa000)=nil, &(0x7f0000000080)=0x0, &(0x7f0000000140)=0x0) r3 = io_uring_setup(0x3ddf, &(0x7f0000000680)) syz_io_uring_submit(r1, r2, &(0x7f0000000800)=@IORING_OP_SENDMSG={0x9, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0}, 0x0) r4 = eventfd(0x0) io_uring_register$IORING_REGISTER_EVENTFD(r0, 0x4, 0x0, 0x1) read$eventfd(r4, &(0x7f0000000040), 0x8) r5 = syz_io_uring_setup(0x3702, &(0x7f00000001c0), &(0x7f0000000000/0x3000)=nil, &(0x7f0000ffe000/0x2000)=nil, &(0x7f0000000140), &(0x7f0000000240)) r6 = dup2(r3, r5) r7 = dup2(r0, r6) io_uring_enter(r7, 0x1739, 0x0, 0x0, 0x0, 0x0) 19:40:01 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000500100000f000000000000000000000004000000000002000020000020000000def4655fdef4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000008000000018000000c20500002b0200000000000000000000000000000000000073797a6b616c6c6572000000000000002f746d702f73797a2d696d61676567656e35373134333434333800"/192, 0xc0, 0x400}, {&(0x7f0000010100)="000000000000000000000000e58ca12e", 0x10, 0x4e0}, {&(0x7f0000010200)="010000000000050040", 0x9, 0x560}, {0x0, 0x0, 0x1000000000c00}, {&(0x7f0000012000)="504d4d00504d4dff", 0x8, 0x10000}], 0x0, &(0x7f0000012b00)) 19:40:01 executing program 6: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000500100000f000000000000000000000004000000000002000020000020000000def4655f", 0x30, 0x400}], 0x0, &(0x7f0000012b00)) 19:40:01 executing program 1: r0 = syz_io_uring_setup(0x2, &(0x7f0000000500), &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000ff6000/0xa000)=nil, &(0x7f0000000080)=0x0, &(0x7f0000000140)=0x0) r3 = io_uring_setup(0x3ddf, &(0x7f0000000680)) syz_io_uring_submit(r1, r2, &(0x7f0000000800)=@IORING_OP_SENDMSG={0x9, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0}, 0x0) r4 = eventfd(0x0) io_uring_register$IORING_REGISTER_EVENTFD(r0, 0x4, &(0x7f0000000000)=r4, 0x1) read$eventfd(r4, &(0x7f0000000040), 0x8) r5 = syz_io_uring_setup(0x3702, 0x0, &(0x7f0000000000/0x3000)=nil, &(0x7f0000ffe000/0x2000)=nil, &(0x7f0000000140), &(0x7f0000000240)) r6 = dup2(r3, r5) r7 = dup2(r0, r6) io_uring_enter(r7, 0x1739, 0x0, 0x0, 0x0, 0x0) 19:40:01 executing program 7: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000500100000f000000000000000000000004000000000002000020000020000000def4655fdef4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000008000000018000000c20500", 0x63, 0x400}, {&(0x7f0000010100)="000000000000000000000000e58ca12e13a240e2b1a22f8d07e8e55f", 0x1c, 0x4e0}], 0x0, &(0x7f0000012b00)) 19:40:01 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000500100000f000000000000000000000004000000000002000020000020000000def4655fdef4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000008000000018000000c20500002b0200000000000000000000000000000000000073797a6b616c6c6572000000000000002f746d702f73797a2d696d61676567656e35373134333434333800"/192, 0xc0, 0x400}, {&(0x7f0000010100)="000000000000000000000000e58ca12e13a240e2b1a22f8d", 0x18, 0x4e0}, {&(0x7f0000010200)="010000000000050040", 0x9, 0x560}, {0x0, 0x0, 0x1000000000c00}, {&(0x7f0000012000)="504d4d00504d4dff", 0x8, 0x10000}], 0x0, &(0x7f0000012b00)) [ 1736.196921] EXT4-fs (loop3): unsupported descriptor size 0 [ 1736.209835] EXT4-fs (loop4): unsupported descriptor size 0 [ 1736.224518] EXT4-fs (loop6): VFS: Can't find ext4 filesystem [ 1736.236144] EXT4-fs (loop7): unsupported descriptor size 0 19:40:01 executing program 6: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000500100000f000000000000000000000004000000000002000020000020000000def4655fdef4655f0100ffff53ef0100", 0x3c, 0x400}], 0x0, &(0x7f0000012b00)) 19:40:01 executing program 7: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000500100000f000000000000000000000004000000000002000020000020000000def4655fdef4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000008000000018000000c20500", 0x63, 0x400}, {&(0x7f0000010100)="000000000000000000000000e58ca12e13a240e2b1a22f8d07e8e55f", 0x1c, 0x4e0}], 0x0, &(0x7f0000012b00)) 19:40:01 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000500100000f000000000000000000000004000000000002000020000020000000def4655fdef4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000008000000018000000c20500002b0200000000000000000000000000000000000073797a6b616c6c6572000000000000002f746d702f73797a2d696d61676567656e35373134333434333800"/192, 0xc0, 0x400}, {&(0x7f0000010100), 0x0, 0x4e0}, {&(0x7f0000010200)="010000000000050040", 0x9, 0x560}, {0x0, 0x0, 0x1000000000c00}, {&(0x7f0000012000)="504d4d00504d4dff", 0x8, 0x10000}], 0x0, &(0x7f0000012b00)) 19:40:01 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000500100000f000000000000000000000004000000000002000020000020000000def4655fdef4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000008000000018000000c20500002b0200000000000000000000000000000000000073797a6b616c6c6572000000000000002f746d702f73797a2d696d61676567656e35373134333434333800"/192, 0xc0, 0x400}, {&(0x7f0000010100)="000000000000000000000000e58ca12e13a240e2b1a22f8d07e8e55f01004000", 0x20, 0x4e0}, {&(0x7f0000010200)="010000000000050040", 0x9, 0x560}, {0x0, 0x0, 0x1000000000c00}, {&(0x7f0000012000)="504d4d00504d4dff", 0x8, 0x10000}], 0x0, &(0x7f0000012b00)) [ 1736.368107] EXT4-fs (loop6): fragment/cluster size (16384) != block size (1024) 19:40:01 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000500100000f000000000000000000000004000000000002000020000020000000def4655fdef4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000008000000018000000c20500002b0200000000000000000000000000000000000073797a6b616c6c6572000000000000002f746d702f73797a2d696d61676567656e35373134333434333800"/192, 0xc0, 0x400}, {&(0x7f0000010100)="000000000000000000000000e58ca12e", 0x10, 0x4e0}, {&(0x7f0000010200)="010000000000050040", 0x9, 0x560}, {0x0, 0x0, 0x1000000000c00}, {&(0x7f0000012000)="504d4d00504d4dff", 0x8, 0x10000}], 0x0, &(0x7f0000012b00)) [ 1736.406368] EXT4-fs (loop7): unsupported descriptor size 0 [ 1736.414658] EXT4-fs error (device loop4): ext4_fill_super:4947: inode #2: comm syz-executor.4: iget: root inode unallocated [ 1736.419391] EXT4-fs (loop4): get root inode failed [ 1736.420505] EXT4-fs (loop4): mount failed 19:40:01 executing program 6: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000500100000f000000000000000000000004000000000002000020000020000000def4655f", 0x30, 0x400}], 0x0, &(0x7f0000012b00)) [ 1736.438569] EXT4-fs (loop3): unsupported descriptor size 0 19:40:01 executing program 7: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000500100000f000000000000000000000004000000000002000020000020000000def4655fdef4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000008000000018000000c20500", 0x63, 0x400}, {&(0x7f0000010100)="000000000000000000000000e58ca12e13a240e2b1a22f8d07e8e55f", 0x1c, 0x4e0}], 0x0, &(0x7f0000012b00)) [ 1736.469506] EXT4-fs (loop6): VFS: Can't find ext4 filesystem [ 1736.472865] EXT4-fs (loop5): unsupported descriptor size 0 [ 1736.551777] EXT4-fs (loop7): unsupported descriptor size 0 19:40:14 executing program 0: r0 = syz_io_uring_setup(0x2, &(0x7f0000000500), &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000ff6000/0xa000)=nil, &(0x7f0000000080)=0x0, &(0x7f0000000140)=0x0) r3 = io_uring_setup(0x3ddf, &(0x7f0000000680)) syz_io_uring_submit(r1, r2, &(0x7f0000000800)=@IORING_OP_SENDMSG={0x9, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0}, 0x0) r4 = eventfd(0x0) io_uring_register$IORING_REGISTER_EVENTFD(r0, 0x4, 0x0, 0x1) read$eventfd(r4, &(0x7f0000000040), 0x8) r5 = syz_io_uring_setup(0x3702, &(0x7f00000001c0), &(0x7f0000000000/0x3000)=nil, &(0x7f0000ffe000/0x2000)=nil, &(0x7f0000000140), &(0x7f0000000240)) r6 = dup2(r3, r5) r7 = dup2(r0, r6) io_uring_enter(r7, 0x1739, 0x0, 0x0, 0x0, 0x0) 19:40:14 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x5, &(0x7f0000000200)=[{0x0, 0x0, 0x400}, {&(0x7f0000010100)="000000000000000000000000e58ca12e13a240e2b1a22f8d07e8e55f010040", 0x1f, 0x4e0}, {&(0x7f0000010200)="010000000000050040", 0x9, 0x560}, {0x0, 0x0, 0x1000000000c00}, {&(0x7f0000012000)="504d4d00504d4dff", 0x8, 0x10000}], 0x0, &(0x7f0000012b00)) 19:40:14 executing program 2: r0 = syz_io_uring_setup(0x2, &(0x7f0000000500), &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000ff6000/0xa000)=nil, &(0x7f0000000080)=0x0, &(0x7f0000000140)=0x0) r3 = io_uring_setup(0x3ddf, &(0x7f0000000680)) syz_io_uring_submit(r1, r2, &(0x7f0000000800)=@IORING_OP_SENDMSG={0x9, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0}, 0x0) r4 = eventfd(0x0) io_uring_register$IORING_REGISTER_EVENTFD(r0, 0x4, 0x0, 0x1) read$eventfd(r4, &(0x7f0000000040), 0x8) r5 = syz_io_uring_setup(0x3702, &(0x7f00000001c0), &(0x7f0000000000/0x3000)=nil, &(0x7f0000ffe000/0x2000)=nil, &(0x7f0000000140), &(0x7f0000000240)) r6 = dup2(r3, r5) r7 = dup2(r0, r6) io_uring_enter(r7, 0x1739, 0x0, 0x0, 0x0, 0x0) 19:40:14 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000500100000f000000000000000000000004000000000002000020000020000000def4655fdef4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000008000000018000000c20500002b0200000000000000000000000000000000000073797a6b616c6c6572000000000000002f746d702f73797a2d696d61676567656e35373134333434333800"/192, 0xc0, 0x400}, {&(0x7f0000010100), 0x0, 0x4e0}, {&(0x7f0000010200)="010000000000050040", 0x9, 0x560}, {0x0, 0x0, 0x1000000000c00}, {&(0x7f0000012000)="504d4d00504d4dff", 0x8, 0x10000}], 0x0, &(0x7f0000012b00)) 19:40:14 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000500100000f000000000000000000000004000000000002000020000020000000def4655fdef4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000008000000018000000c20500002b0200000000000000000000000000000000000073797a6b616c6c6572000000000000002f746d702f73797a2d696d61676567656e35373134333434333800"/192, 0xc0, 0x400}, {&(0x7f0000010100)="000000000000000000000000e58ca12e13a240e2b1a22f8d07e8e55f010040", 0x1f}, {&(0x7f0000010200)="010000000000050040", 0x9, 0x560}, {0x0, 0x0, 0x1000000000c00}, {&(0x7f0000012000)="504d4d00504d4dff", 0x8, 0x10000}], 0x0, &(0x7f0000012b00)) 19:40:14 executing program 7: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000500100000f000000000000000000000004000000000002000020000020000000def4655fdef4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000008000000018000000c20500", 0x63, 0x400}, {&(0x7f0000010100)="000000000000000000000000e58ca12e13a240e2b1a22f8d07e8e55f0100", 0x1e, 0x4e0}], 0x0, &(0x7f0000012b00)) 19:40:14 executing program 1: r0 = syz_io_uring_setup(0x2, &(0x7f0000000500), &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000ff6000/0xa000)=nil, &(0x7f0000000080)=0x0, &(0x7f0000000140)=0x0) r3 = io_uring_setup(0x3ddf, &(0x7f0000000680)) syz_io_uring_submit(r1, r2, &(0x7f0000000800)=@IORING_OP_SENDMSG={0x9, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0}, 0x0) r4 = eventfd(0x0) io_uring_register$IORING_REGISTER_EVENTFD(r0, 0x4, &(0x7f0000000000)=r4, 0x1) read$eventfd(r4, &(0x7f0000000040), 0x8) r5 = syz_io_uring_setup(0x3702, &(0x7f00000001c0), &(0x7f0000000000/0x3000)=nil, &(0x7f0000ffe000/0x2000)=nil, 0x0, &(0x7f0000000240)) r6 = dup2(r3, r5) r7 = dup2(r0, r6) io_uring_enter(r7, 0x1739, 0x0, 0x0, 0x0, 0x0) 19:40:14 executing program 6: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000500100000f000000000000000000000004000000000002000020000020000000def4655f", 0x30, 0x400}], 0x0, &(0x7f0000012b00)) [ 1749.168293] EXT4-fs (loop5): unsupported descriptor size 0 [ 1749.171070] EXT4-fs (loop4): unsupported descriptor size 0 [ 1749.173203] EXT4-fs (loop6): VFS: Can't find ext4 filesystem [ 1749.176230] EXT4-fs (loop7): unsupported descriptor size 0 [ 1749.183734] EXT4-fs (loop3): VFS: Can't find ext4 filesystem 19:40:14 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000500100000f000000000000000000000004000000000002000020000020000000def4655fdef4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000008000000018000000c20500002b0200000000000000000000000000000000000073797a6b616c6c6572000000000000002f746d702f73797a2d696d61676567656e35373134333434333800"/192, 0xc0, 0x400}, {0x0, 0x0, 0x4e0}, {&(0x7f0000010200)="010000000000050040", 0x9, 0x560}, {0x0, 0x0, 0x1000000000c00}, {&(0x7f0000012000)="504d4d00504d4dff", 0x8, 0x10000}], 0x0, &(0x7f0000012b00)) 19:40:14 executing program 3: r0 = syz_io_uring_setup(0x2, &(0x7f0000000500), &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000ff6000/0xa000)=nil, &(0x7f0000000080)=0x0, &(0x7f0000000140)=0x0) r3 = io_uring_setup(0x3ddf, &(0x7f0000000680)) syz_io_uring_submit(r1, r2, &(0x7f0000000800)=@IORING_OP_SENDMSG={0x9, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0}, 0x0) r4 = eventfd(0x0) io_uring_register$IORING_REGISTER_EVENTFD(r0, 0x4, &(0x7f0000000000)=r4, 0x1) read$eventfd(r4, &(0x7f0000000040), 0x8) r5 = syz_io_uring_setup(0x3702, &(0x7f00000001c0), &(0x7f0000000000/0x3000)=nil, &(0x7f0000ffe000/0x2000)=nil, &(0x7f0000000140), &(0x7f0000000240)) r6 = dup2(r3, r5) r7 = dup2(0xffffffffffffffff, r6) io_uring_enter(r7, 0x1739, 0x0, 0x0, 0x0, 0x0) 19:40:14 executing program 5: r0 = syz_io_uring_setup(0x21, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, &(0x7f00000a0000)=nil, &(0x7f00000b0000)=nil, &(0x7f0000000180)=0x0, &(0x7f0000002a40)=0x0) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_io_uring_submit(r1, r2, &(0x7f0000000300)=@IORING_OP_OPENAT={0x12, 0x0, 0x0, 0xffffffffffffffff, 0x0, &(0x7f0000000100)='./cgroup/cgroup.procs/file0/../file0\x00'}, 0x0) io_uring_enter(r0, 0x76d3, 0x0, 0x0, 0x0, 0x0) r3 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$netlbl_cipso(&(0x7f0000000000), r3) r4 = syz_io_uring_setup(0x2, &(0x7f0000000500), &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000ff6000/0xa000)=nil, &(0x7f0000000080)=0x0, &(0x7f0000000140)=0x0) r7 = io_uring_setup(0x3ddf, &(0x7f0000000680)) syz_io_uring_submit(r5, r6, &(0x7f0000000800)=@IORING_OP_SENDMSG={0x9, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0}, 0x0) io_uring_register$IORING_REGISTER_EVENTFD(r4, 0x4, &(0x7f0000000000), 0x1) read$eventfd(0xffffffffffffffff, &(0x7f0000000040), 0x8) r8 = syz_io_uring_setup(0x3702, &(0x7f00000001c0), &(0x7f0000000000/0x3000)=nil, &(0x7f0000ffe000/0x2000)=nil, &(0x7f0000000140), &(0x7f0000000240)) r9 = dup2(r7, r8) r10 = dup2(r4, r9) io_uring_enter(r10, 0x1739, 0x0, 0x0, 0x0, 0x0) 19:40:14 executing program 6: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000500100000f000000000000000000000004000000000002000020000020000000def4655f", 0x30, 0x400}], 0x0, &(0x7f0000012b00)) 19:40:14 executing program 7: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000500100000f000000000000000000000004000000000002000020000020000000def4655fdef4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000008000000018000000c20500", 0x63, 0x400}, {&(0x7f0000010100)="000000000000000000000000e58ca12e13a240e2b1a22f8d07e8e55f0100", 0x1e, 0x4e0}], 0x0, &(0x7f0000012b00)) [ 1749.309563] EXT4-fs (loop7): unsupported descriptor size 0 [ 1749.316408] EXT4-fs (loop6): VFS: Can't find ext4 filesystem [ 1749.330175] EXT4-fs (loop4): unsupported descriptor size 0 19:40:14 executing program 6: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000500100000f000000000000000000000004000000000002000020000020000000def4655fdef4655f0100", 0x36, 0x400}], 0x0, &(0x7f0000012b00)) [ 1749.395806] EXT4-fs (loop6): VFS: Can't find ext4 filesystem 19:40:26 executing program 3: r0 = syz_io_uring_setup(0x2, &(0x7f0000000500), &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000ff6000/0xa000)=nil, &(0x7f0000000080)=0x0, &(0x7f0000000140)=0x0) r3 = io_uring_setup(0x3ddf, &(0x7f0000000680)) syz_io_uring_submit(r1, r2, &(0x7f0000000800)=@IORING_OP_SENDMSG={0x9, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0}, 0x0) r4 = eventfd(0x0) io_uring_register$IORING_REGISTER_EVENTFD(r0, 0x4, 0x0, 0x1) read$eventfd(r4, &(0x7f0000000040), 0x8) r5 = syz_io_uring_setup(0x3702, &(0x7f00000001c0), &(0x7f0000000000/0x3000)=nil, &(0x7f0000ffe000/0x2000)=nil, &(0x7f0000000140), &(0x7f0000000240)) r6 = dup2(r3, r5) r7 = dup2(r0, r6) io_uring_enter(r7, 0x1739, 0x0, 0x0, 0x0, 0x0) 19:40:26 executing program 7: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000500100000f000000000000000000000004000000000002000020000020000000def4655fdef4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000008000000018000000c20500", 0x63, 0x400}, {&(0x7f0000010100)="000000000000000000000000e58ca12e13a240e2b1a22f8d07e8e55f0100", 0x1e, 0x4e0}], 0x0, &(0x7f0000012b00)) 19:40:26 executing program 6: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000500100000f000000000000000000000004000000000002000020000020000000def4655fdef4655f0100", 0x36, 0x400}], 0x0, &(0x7f0000012b00)) 19:40:26 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000500100000f000000000000000000000004000000000002000020000020000000def4655fdef4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000008000000018000000c20500", 0x63, 0x400}, {&(0x7f0000010100)="000000000000000000000000e58ca12e13a240e2b1a22f8d07e8e55f0100", 0x1e, 0x4e0}], 0x0, &(0x7f0000012b00)) 19:40:26 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000500100000f000000000000000000000004000000000002000020000020000000def4655fdef4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000008000000018000000c20500002b0200000000000000000000000000000000000073797a6b616c6c6572000000000000002f746d702f73797a2d696d61676567656e35373134333434333800"/192, 0xc0, 0x400}, {&(0x7f0000010100)="000000000000000000000000e58ca12e13a240e2b1a22f8d07e8e55f010040000c00000000000000ddf4655f00"/64, 0x40, 0x4e0}, {&(0x7f0000010200)="010000000000050040", 0x9}, {0x0, 0x0, 0x1000000000c00}, {&(0x7f0000012000)="504d4d00504d4dff", 0x8, 0x10000}], 0x0, &(0x7f0000012b00)) 19:40:26 executing program 1: r0 = syz_io_uring_setup(0x2, &(0x7f0000000500), &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000ff6000/0xa000)=nil, &(0x7f0000000080)=0x0, &(0x7f0000000140)=0x0) r3 = io_uring_setup(0x3ddf, &(0x7f0000000680)) syz_io_uring_submit(r1, r2, &(0x7f0000000800)=@IORING_OP_SENDMSG={0x9, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0}, 0x0) r4 = eventfd(0x0) io_uring_register$IORING_REGISTER_EVENTFD(r0, 0x4, &(0x7f0000000000)=r4, 0x1) read$eventfd(r4, &(0x7f0000000040), 0x8) r5 = syz_io_uring_setup(0x3702, &(0x7f00000001c0), &(0x7f0000000000/0x3000)=nil, &(0x7f0000ffe000/0x2000)=nil, 0x0, &(0x7f0000000240)) r6 = dup2(r3, r5) r7 = dup2(r0, r6) io_uring_enter(r7, 0x1739, 0x0, 0x0, 0x0, 0x0) 19:40:26 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000500100000f000000000000000000000004000000000002000020000020000000def4655fdef4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000008000000018000000c20500002b0200000000000000000000000000000000000073797a6b616c6c6572000000000000002f746d702f73797a2d696d61676567656e35373134333434333800"/192, 0xc0, 0x400}, {&(0x7f0000010100)="000000000000000000000000e58ca12e13a240e2b1a22f8d07e8e55f010040000c00000000000000ddf4655f00"/64, 0x40, 0x4e0}, {&(0x7f0000010200)="0100000000000500", 0x8, 0x560}, {0x0, 0x0, 0x1000000000c00}, {&(0x7f0000012000)="504d4d00504d4dff", 0x8, 0x10000}], 0x0, &(0x7f0000012b00)) 19:40:26 executing program 2: r0 = syz_io_uring_setup(0x2, &(0x7f0000000500), &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000ff6000/0xa000)=nil, &(0x7f0000000080)=0x0, &(0x7f0000000140)=0x0) r3 = io_uring_setup(0x3ddf, &(0x7f0000000680)) syz_io_uring_submit(r1, r2, &(0x7f0000000800)=@IORING_OP_SENDMSG={0x9, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0}, 0x0) r4 = eventfd(0x0) io_uring_register$IORING_REGISTER_EVENTFD(r0, 0x4, 0x0, 0x1) read$eventfd(r4, &(0x7f0000000040), 0x8) r5 = syz_io_uring_setup(0x3702, &(0x7f00000001c0), &(0x7f0000000000/0x3000)=nil, &(0x7f0000ffe000/0x2000)=nil, &(0x7f0000000140), &(0x7f0000000240)) r6 = dup2(r3, r5) r7 = dup2(r0, r6) io_uring_enter(r7, 0x1739, 0x0, 0x0, 0x0, 0x0) [ 1760.979524] EXT4-fs (loop7): unsupported descriptor size 0 [ 1760.993627] EXT4-fs (loop4): unsupported descriptor size 0 [ 1761.003390] EXT4-fs warning (device loop0): read_mmp_block:106: Error -117 while reading MMP block 0 [ 1761.007559] EXT4-fs (loop6): VFS: Can't find ext4 filesystem [ 1761.010623] EXT4-fs warning (device loop5): read_mmp_block:106: Error -117 while reading MMP block 0 19:40:26 executing program 4: r0 = syz_io_uring_setup(0x2, &(0x7f0000000500), &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000ff6000/0xa000)=nil, &(0x7f0000000080)=0x0, &(0x7f0000000140)=0x0) r3 = io_uring_setup(0x3ddf, &(0x7f0000000680)) syz_io_uring_submit(r1, r2, &(0x7f0000000800)=@IORING_OP_SENDMSG={0x9, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0}, 0x0) r4 = eventfd(0x0) io_uring_register$IORING_REGISTER_EVENTFD(r0, 0x4, &(0x7f0000000000)=r4, 0x1) read$eventfd(r4, &(0x7f0000000040), 0x8) r5 = syz_io_uring_setup(0x3702, &(0x7f00000001c0), &(0x7f0000000000/0x3000)=nil, &(0x7f0000ffe000/0x2000)=nil, 0x0, &(0x7f0000000240)) r6 = dup2(r3, r5) r7 = dup2(r0, r6) io_uring_enter(r7, 0x1739, 0x0, 0x0, 0x0, 0x0) 19:40:26 executing program 7: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000500100000f000000000000000000000004000000000002000020000020000000def4655fdef4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000008000000018000000c20500", 0x63, 0x400}, {&(0x7f0000010100)="000000000000000000000000e58ca12e13a240e2b1a22f8d07e8e55f010040", 0x1f}], 0x0, &(0x7f0000012b00)) 19:40:26 executing program 0: r0 = syz_io_uring_setup(0x2, &(0x7f0000000500), &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000ff6000/0xa000)=nil, &(0x7f0000000080)=0x0, &(0x7f0000000140)=0x0) r3 = io_uring_setup(0x3ddf, &(0x7f0000000680)) syz_io_uring_submit(r1, r2, &(0x7f0000000800)=@IORING_OP_SENDMSG={0x9, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0}, 0x0) r4 = eventfd(0x0) io_uring_register$IORING_REGISTER_EVENTFD(r0, 0x4, &(0x7f0000000000)=r4, 0x1) read$eventfd(r4, &(0x7f0000000040), 0x8) r5 = syz_io_uring_setup(0x3702, &(0x7f00000001c0), &(0x7f0000000000/0x3000)=nil, &(0x7f0000ffe000/0x2000)=nil, &(0x7f0000000140), 0x0) r6 = dup2(r3, r5) r7 = dup2(r0, r6) io_uring_enter(r7, 0x1739, 0x0, 0x0, 0x0, 0x0) 19:40:26 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000500100000f000000000000000000000004000000000002000020000020000000def4655fdef4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000008000000018000000c20500002b0200000000000000000000000000000000000073797a6b616c6c6572000000000000002f746d702f73797a2d696d61676567656e35373134333434333800"/192, 0xc0, 0x400}, {&(0x7f0000010100)="000000000000000000000000e58ca12e13a240e2b1a22f8d07e8e55f010040000c00000000000000ddf4655f00"/64, 0x40, 0x4e0}, {&(0x7f0000010200)="010000000000050040", 0x9, 0x560}, {0x0, 0x0, 0x1000000000c00}, {&(0x7f0000012000)="504d4d00504d4dff", 0x8, 0x10000}], 0x0, &(0x7f0000012b00)) 19:40:26 executing program 6: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000500100000f000000000000000000000004000000000002000020000020000000def4655fdef4655f0100", 0x36, 0x400}], 0x0, &(0x7f0000012b00)) [ 1761.120066] EXT4-fs (loop7): unsupported descriptor size 0 19:40:26 executing program 7: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000500100000f000000000000000000000004000000000002000020000020000000def4655fdef4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000008000000018000000c20500", 0x63, 0x400}, {&(0x7f0000010100)="000000000000000000000000e58ca12e13a240e2b1a22f8d07e8e55f010040", 0x1f}], 0x0, &(0x7f0000012b00)) [ 1761.158315] EXT4-fs error (device loop5): ext4_fill_super:4947: inode #2: comm syz-executor.5: iget: root inode unallocated [ 1761.162992] EXT4-fs (loop5): get root inode failed [ 1761.164135] EXT4-fs (loop5): mount failed [ 1761.164254] EXT4-fs (loop6): VFS: Can't find ext4 filesystem [ 1761.168425] EXT4-fs (loop7): unsupported descriptor size 0 19:40:26 executing program 7: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000500100000f000000000000000000000004000000000002000020000020000000def4655fdef4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000008000000018000000c20500", 0x63, 0x400}, {&(0x7f0000010100)="000000000000000000000000e58ca12e13a240e2b1a22f8d07e8e55f010040", 0x1f}], 0x0, &(0x7f0000012b00)) [ 1761.207053] EXT4-fs (loop7): unsupported descriptor size 0 19:40:26 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000500100000f000000000000000000000004000000000002000020000020000000def4655fdef4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000008000000018000000c20500002b0200000000000000000000000000000000000073797a6b616c6c6572000000000000002f746d702f73797a2d696d61676567656e35373134333434333800"/192, 0xc0, 0x400}, {&(0x7f0000010100), 0x0, 0x4e0}, {&(0x7f0000010200)="010000000000050040", 0x9, 0x560}, {0x0, 0x0, 0x1000000000c00}, {&(0x7f0000012000)="504d4d00504d4dff", 0x8, 0x10000}], 0x0, &(0x7f0000012b00)) [ 1761.254359] EXT4-fs (loop5): unsupported descriptor size 0 19:40:40 executing program 7: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010100)="000000000000000000000000e58ca12e13a240e2b1a22f8d07e8e55f010040", 0x1f, 0x4e0}], 0x0, &(0x7f0000012b00)) 19:40:40 executing program 5: r0 = syz_io_uring_setup(0x2, &(0x7f0000000500), &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000ff6000/0xa000)=nil, &(0x7f0000000080)=0x0, &(0x7f0000000140)=0x0) r3 = io_uring_setup(0x3ddf, &(0x7f0000000680)) syz_io_uring_submit(r1, r2, &(0x7f0000000800)=@IORING_OP_SENDMSG={0x9, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0}, 0x0) r4 = eventfd(0x0) io_uring_register$IORING_REGISTER_EVENTFD(r0, 0x4, &(0x7f0000000000)=r4, 0x1) read$eventfd(r4, &(0x7f0000000040), 0x8) r5 = syz_io_uring_setup(0x3702, &(0x7f00000001c0), &(0x7f0000000000/0x3000)=nil, &(0x7f0000ffe000/0x2000)=nil, &(0x7f0000000140), 0x0) r6 = dup2(r3, r5) r7 = dup2(r0, r6) io_uring_enter(r7, 0x1739, 0x0, 0x0, 0x0, 0x0) 19:40:40 executing program 6: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000500100000f000000000000000000000004000000000002000020000020000000def4655fdef4655f0100ffff53", 0x39, 0x400}], 0x0, &(0x7f0000012b00)) 19:40:40 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000500100000f000000000000000000000004000000000002000020000020000000def4655fdef4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000008000000018000000c20500002b0200000000000000000000000000000000000073797a6b616c6c6572000000000000002f746d702f73797a2d696d61676567656e35373134333434333800"/192, 0xc0, 0x400}, {&(0x7f0000010100), 0x0, 0x4e0}, {&(0x7f0000010200)="010000000000050040", 0x9, 0x560}, {0x0, 0x0, 0x1000000000c00}, {&(0x7f0000012000)="504d4d00504d4dff", 0x8, 0x10000}], 0x0, &(0x7f0000012b00)) 19:40:40 executing program 4: r0 = syz_io_uring_setup(0x2, &(0x7f0000000500), &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000ff6000/0xa000)=nil, &(0x7f0000000080)=0x0, &(0x7f0000000140)=0x0) r3 = io_uring_setup(0x3ddf, &(0x7f0000000680)) syz_io_uring_submit(r1, r2, &(0x7f0000000800)=@IORING_OP_SENDMSG={0x9, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0}, 0x0) r4 = eventfd(0x0) io_uring_register$IORING_REGISTER_EVENTFD(r0, 0x4, &(0x7f0000000000)=r4, 0x1) read$eventfd(r4, &(0x7f0000000040), 0x8) r5 = syz_io_uring_setup(0x3702, &(0x7f00000001c0), &(0x7f0000000000/0x3000)=nil, &(0x7f0000ffe000/0x2000)=nil, 0x0, &(0x7f0000000240)) r6 = dup2(r3, r5) r7 = dup2(r0, r6) io_uring_enter(r7, 0x1739, 0x0, 0x0, 0x0, 0x0) 19:40:40 executing program 3: r0 = syz_io_uring_setup(0x2, &(0x7f0000000500), &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000ff6000/0xa000)=nil, &(0x7f0000000080)=0x0, &(0x7f0000000140)=0x0) r3 = io_uring_setup(0x3ddf, &(0x7f0000000680)) syz_io_uring_submit(r1, r2, &(0x7f0000000800)=@IORING_OP_SENDMSG={0x9, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0}, 0x0) r4 = eventfd(0x0) io_uring_register$IORING_REGISTER_EVENTFD(r0, 0x4, &(0x7f0000000000)=r4, 0x1) read$eventfd(r4, &(0x7f0000000040), 0x8) r5 = syz_io_uring_setup(0x3702, &(0x7f00000001c0), &(0x7f0000000000/0x3000)=nil, &(0x7f0000ffe000/0x2000)=nil, &(0x7f0000000140), 0x0) r6 = dup2(r3, r5) r7 = dup2(r0, r6) io_uring_enter(r7, 0x1739, 0x0, 0x0, 0x0, 0x0) 19:40:40 executing program 2: r0 = syz_io_uring_setup(0x2, &(0x7f0000000500), &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000ff6000/0xa000)=nil, &(0x7f0000000080)=0x0, &(0x7f0000000140)=0x0) r3 = io_uring_setup(0x3ddf, &(0x7f0000000680)) syz_io_uring_submit(r1, r2, &(0x7f0000000800)=@IORING_OP_SENDMSG={0x9, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0}, 0x0) r4 = eventfd(0x0) io_uring_register$IORING_REGISTER_EVENTFD(r0, 0x4, &(0x7f0000000000), 0x1) read$eventfd(r4, &(0x7f0000000040), 0x8) r5 = syz_io_uring_setup(0x3702, &(0x7f00000001c0), &(0x7f0000000000/0x3000)=nil, &(0x7f0000ffe000/0x2000)=nil, &(0x7f0000000140), &(0x7f0000000240)) r6 = dup2(r3, r5) r7 = dup2(r0, r6) io_uring_enter(r7, 0x1739, 0x0, 0x0, 0x0, 0x0) 19:40:40 executing program 1: r0 = syz_io_uring_setup(0x2, &(0x7f0000000500), &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000ff6000/0xa000)=nil, &(0x7f0000000080)=0x0, &(0x7f0000000140)=0x0) r3 = io_uring_setup(0x3ddf, &(0x7f0000000680)) syz_io_uring_submit(r1, r2, &(0x7f0000000800)=@IORING_OP_SENDMSG={0x9, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0}, 0x0) r4 = eventfd(0x0) io_uring_register$IORING_REGISTER_EVENTFD(r0, 0x4, &(0x7f0000000000)=r4, 0x1) read$eventfd(r4, &(0x7f0000000040), 0x8) r5 = syz_io_uring_setup(0x3702, &(0x7f00000001c0), &(0x7f0000000000/0x3000)=nil, &(0x7f0000ffe000/0x2000)=nil, 0x0, &(0x7f0000000240)) r6 = dup2(r3, r5) r7 = dup2(r0, r6) io_uring_enter(r7, 0x1739, 0x0, 0x0, 0x0, 0x0) [ 1774.877910] EXT4-fs (loop7): VFS: Can't find ext4 filesystem [ 1774.891959] EXT4-fs (loop6): VFS: Can't find ext4 filesystem [ 1774.907319] EXT4-fs (loop0): unsupported descriptor size 0 19:40:40 executing program 7: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010100)="000000000000000000000000e58ca12e13a240e2b1a22f8d07e8e55f010040", 0x1f, 0x4e0}], 0x0, &(0x7f0000012b00)) 19:40:40 executing program 6: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000500100000f000000000000000000000004000000000002000020000020000000def4655fdef4655f0100ffff53", 0x39, 0x400}], 0x0, &(0x7f0000012b00)) 19:40:40 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000500100000f000000000000000000000004000000000002000020000020000000def4655fdef4655f0100ffff53", 0x39, 0x400}], 0x0, &(0x7f0000012b00)) [ 1774.962770] EXT4-fs (loop7): VFS: Can't find ext4 filesystem [ 1774.965371] EXT4-fs (loop6): VFS: Can't find ext4 filesystem 19:40:40 executing program 6: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000500100000f000000000000000000000004000000000002000020000020000000def4655fdef4655f0100ffff53", 0x39, 0x400}], 0x0, &(0x7f0000012b00)) 19:40:40 executing program 7: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010100)="000000000000000000000000e58ca12e13a240e2b1a22f8d07e8e55f010040", 0x1f, 0x4e0}], 0x0, &(0x7f0000012b00)) [ 1774.995065] EXT4-fs (loop0): VFS: Can't find ext4 filesystem [ 1775.018665] EXT4-fs (loop6): VFS: Can't find ext4 filesystem 19:40:40 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000500100000f000000000000000000000004000000000002000020000020000000def4655fdef4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000008000000018000000c20500002b0200000000000000000000000000000000000073797a6b616c6c6572000000000000002f746d702f73797a2d696d61676567656e35373134333434333800"/192, 0xc0, 0x400}, {&(0x7f0000010100), 0x0, 0x4e0}, {&(0x7f0000010200)="010000000000050040", 0x9, 0x560}, {0x0, 0x0, 0x1000000000c00}, {&(0x7f0000012000)="504d4d00504d4dff", 0x8, 0x10000}], 0x0, &(0x7f0000012b00)) [ 1775.044567] EXT4-fs (loop7): VFS: Can't find ext4 filesystem 19:40:40 executing program 6: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000500100000f000000000000000000000004000000000002000020000020000000def4655fdef4655f0100ffff53ef01", 0x3b, 0x400}], 0x0, &(0x7f0000012b00)) 19:40:40 executing program 7: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{0x0, 0x0, 0x400}, {&(0x7f0000010100)="000000000000000000000000e58ca12e13a240e2b1a22f8d07e8e55f010040", 0x1f, 0x4e0}], 0x0, &(0x7f0000012b00)) [ 1775.081006] EXT4-fs (loop6): fragment/cluster size (16384) != block size (1024) [ 1775.093378] EXT4-fs (loop0): unsupported descriptor size 0 19:40:40 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000500100000f000000000000000000000004000000000002000020000020000000def4655fdef4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000008000000018000000c20500002b0200000000000000000000000000000000000073797a6b616c6c6572000000000000002f746d702f73797a2d696d61676567656e35373134333434333800"/192, 0xc0, 0x400}, {&(0x7f0000010100)="000000000000000000000000e58ca12e13a240e2b1a22f8d07e8e55f010040000c00000000000000ddf4655f00"/64, 0x40, 0x4e0}, {&(0x7f0000010200)="0100000000000500", 0x8, 0x560}, {0x0, 0x0, 0x1000000000c00}, {&(0x7f0000012000)="504d4d00504d4dff", 0x8, 0x10000}], 0x0, &(0x7f0000012b00)) [ 1775.130223] EXT4-fs (loop7): VFS: Can't find ext4 filesystem [ 1775.146228] EXT4-fs warning (device loop0): read_mmp_block:106: Error -117 while reading MMP block 0 19:40:51 executing program 6: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000500100000f000000000000000000000004000000000002000020000020000000def4655fdef4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000012b00)) 19:40:51 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000500100000f000000000000000000000004000000000002000020000020000000def4655fdef4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000008000000018000000c20500002b0200000000000000000000000000000000000073797a6b616c6c6572000000000000002f746d702f73797a2d696d61676567656e35373134333434333800"/192, 0xc0, 0x400}, {&(0x7f0000010100)="000000000000000000000000e58ca12e13a240e2b1a22f8d07e8e55f010040000c00000000000000ddf4655f00"/64, 0x40, 0x4e0}, {&(0x7f0000010200)="0100000000000500", 0x8, 0x560}, {0x0, 0x0, 0x1000000000c00}, {&(0x7f0000012000)="504d4d00504d4dff", 0x8, 0x10000}], 0x0, &(0x7f0000012b00)) 19:40:51 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000500100000f000000000000000000000004000000000002000020000020000000def4655fdef4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000008000000018000000c20500002b0200000000000000000000000000000000000073797a6b616c6c6572000000000000002f746d702f73797a2d696d61676567656e35373134333434333800"/192, 0xc0, 0x400}, {&(0x7f0000010100)="000000000000000000000000e58ca12e13a240e2b1a22f8d07e8e55f010040000c00000000000000ddf4655f00"/64, 0x40, 0x4e0}, {&(0x7f0000010200)="0100000000000500", 0x8, 0x560}, {0x0, 0x0, 0x1000000000c00}, {&(0x7f0000012000)="504d4d00504d4dff", 0x8, 0x10000}], 0x0, &(0x7f0000012b00)) 19:40:51 executing program 2: r0 = syz_io_uring_setup(0x2, &(0x7f0000000500), &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000ff6000/0xa000)=nil, &(0x7f0000000080)=0x0, &(0x7f0000000140)=0x0) r3 = io_uring_setup(0x3ddf, &(0x7f0000000680)) syz_io_uring_submit(r1, r2, &(0x7f0000000800)=@IORING_OP_SENDMSG={0x9, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0}, 0x0) r4 = eventfd(0x0) io_uring_register$IORING_REGISTER_EVENTFD(r0, 0x4, &(0x7f0000000000), 0x1) read$eventfd(r4, &(0x7f0000000040), 0x8) r5 = syz_io_uring_setup(0x3702, &(0x7f00000001c0), &(0x7f0000000000/0x3000)=nil, &(0x7f0000ffe000/0x2000)=nil, &(0x7f0000000140), &(0x7f0000000240)) r6 = dup2(r3, r5) r7 = dup2(r0, r6) io_uring_enter(r7, 0x1739, 0x0, 0x0, 0x0, 0x0) 19:40:51 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000500100000f000000000000000000000004000000000002000020000020000000def4655fdef4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000008000000018000000c20500002b0200000000000000000000000000000000000073797a6b616c6c6572000000000000002f746d702f73797a2d696d61676567656e35373134333434333800"/192, 0xc0, 0x400}, {&(0x7f0000010100)="000000000000000000000000e58ca12e13a240e2b1a22f8d07e8e55f010040000c00000000000000ddf4655f00"/64, 0x40, 0x4e0}, {&(0x7f0000010200)="0100000000000500", 0x8, 0x560}, {0x0, 0x0, 0x1000000000c00}, {&(0x7f0000012000)="504d4d00504d4dff", 0x8, 0x10000}], 0x0, &(0x7f0000012b00)) 19:40:51 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000500100000f000000000000000000000004000000000002000020000020000000def4655fdef4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000008000000018000000c20500002b0200000000000000000000000000000000000073797a6b616c6c6572000000000000002f746d702f73797a2d696d61676567656e35373134333434333800"/192, 0xc0, 0x400}, {&(0x7f0000010100)="000000000000000000000000e58ca12e13a240e2b1a22f8d07e8e55f010040000c00000000000000ddf4655f00"/64, 0x40, 0x4e0}, {&(0x7f0000010200)="0100000000000500", 0x8, 0x560}, {0x0, 0x0, 0x1000000000c00}, {&(0x7f0000012000)="504d4d00504d4dff", 0x8, 0x10000}], 0x0, &(0x7f0000012b00)) 19:40:51 executing program 1: r0 = syz_io_uring_setup(0x2, &(0x7f0000000500), &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000ff6000/0xa000)=nil, &(0x7f0000000080)=0x0, &(0x7f0000000140)=0x0) r3 = io_uring_setup(0x3ddf, &(0x7f0000000680)) syz_io_uring_submit(r1, r2, &(0x7f0000000800)=@IORING_OP_SENDMSG={0x9, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0}, 0x0) r4 = eventfd(0x0) io_uring_register$IORING_REGISTER_EVENTFD(r0, 0x4, &(0x7f0000000000)=r4, 0x1) read$eventfd(r4, &(0x7f0000000040), 0x8) r5 = syz_io_uring_setup(0x3702, &(0x7f00000001c0), &(0x7f0000000000/0x3000)=nil, &(0x7f0000ffe000/0x2000)=nil, &(0x7f0000000140), 0x0) r6 = dup2(r3, r5) r7 = dup2(r0, r6) io_uring_enter(r7, 0x1739, 0x0, 0x0, 0x0, 0x0) 19:40:51 executing program 7: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{0x0, 0x0, 0x400}, {&(0x7f0000010100)="000000000000000000000000e58ca12e13a240e2b1a22f8d07e8e55f010040", 0x1f, 0x4e0}], 0x0, &(0x7f0000012b00)) [ 1786.555051] EXT4-fs warning (device loop0): read_mmp_block:106: Error -117 while reading MMP block 0 [ 1786.573399] EXT4-fs (loop6): fragment/cluster size (16384) != block size (1024) [ 1786.588372] EXT4-fs warning (device loop3): read_mmp_block:106: Error -117 while reading MMP block 0 [ 1786.590017] EXT4-fs warning (device loop4): read_mmp_block:106: Error -117 while reading MMP block 0 [ 1786.599793] EXT4-fs (loop7): VFS: Can't find ext4 filesystem [ 1786.602170] EXT4-fs warning (device loop5): read_mmp_block:106: Error -117 while reading MMP block 0 19:40:52 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000500100000f000000000000000000000004000000000002000020000020000000def4655fdef4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000008000000018000000c20500002b0200000000000000000000000000000000000073797a6b616c6c6572000000000000002f746d702f73797a2d696d61676567656e35373134333434333800"/192, 0xc0, 0x400}, {&(0x7f0000010100)="000000000000000000000000e58ca12e13a240e2b1a22f8d07e8e55f010040000c00000000000000ddf4655f00"/64, 0x40, 0x4e0}, {&(0x7f0000010200), 0x0, 0x560}, {0x0, 0x0, 0x1000000000c00}, {&(0x7f0000012000)="504d4d00504d4dff", 0x8, 0x10000}], 0x0, &(0x7f0000012b00)) 19:40:52 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000500100000f000000000000000000000004000000000002000020000020000000def4655fdef4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000008000000018000000c20500002b0200000000000000000000000000000000000073797a6b616c6c6572000000000000002f746d702f73797a2d696d61676567656e35373134333434333800"/192, 0xc0, 0x400}, {&(0x7f0000010100)="000000000000000000000000e58ca12e13a240e2b1a22f8d07e8e55f010040000c00000000000000ddf4655f00"/64, 0x40, 0x4e0}, {&(0x7f0000010200), 0x0, 0x560}, {0x0, 0x0, 0x1000000000c00}, {&(0x7f0000012000)="504d4d00504d4dff", 0x8, 0x10000}], 0x0, &(0x7f0000012b00)) 19:40:52 executing program 6: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000500100000f000000000000000000000004000000000002000020000020000000def4655fdef4655f0100ffff53", 0x39, 0x400}], 0x0, &(0x7f0000012b00)) 19:40:52 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000500100000f000000000000000000000004000000000002000020000020000000def4655fdef4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000008000000018000000c20500002b0200000000000000000000000000000000000073797a6b616c6c6572000000000000002f746d702f73797a2d696d61676567656e35373134333434333800"/192, 0xc0, 0x400}, {&(0x7f0000010100)="000000000000000000000000e58ca12e13a240e2b1a22f8d07e8e55f010040000c00000000000000ddf4655f00"/64, 0x40, 0x4e0}, {&(0x7f0000010200)="01000000000005004000000000000000", 0x10, 0x560}, {0x0, 0x0, 0x1000000000c00}, {&(0x7f0000012000)="504d4d00504d4dff", 0x8, 0x10000}], 0x0, &(0x7f0000012b00)) [ 1786.735157] EXT4-fs warning (device loop0): read_mmp_block:106: Error -117 while reading MMP block 0 19:40:52 executing program 7: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{0x0, 0x0, 0x400}, {&(0x7f0000010100)="000000000000000000000000e58ca12e13a240e2b1a22f8d07e8e55f010040", 0x1f, 0x4e0}], 0x0, &(0x7f0000012b00)) [ 1786.757118] EXT4-fs warning (device loop3): read_mmp_block:106: Error -117 while reading MMP block 0 19:40:52 executing program 4: r0 = syz_io_uring_setup(0x21, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, &(0x7f00000a0000)=nil, &(0x7f00000b0000)=nil, &(0x7f0000000180)=0x0, &(0x7f0000002a40)=0x0) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_io_uring_submit(r1, r2, &(0x7f0000000300)=@IORING_OP_OPENAT={0x12, 0x0, 0x0, 0xffffffffffffffff, 0x0, &(0x7f0000000100)='./cgroup/cgroup.procs/file0/../file0\x00'}, 0x0) io_uring_enter(r0, 0x76d3, 0x0, 0x0, 0x0, 0x0) r3 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$netlbl_cipso(&(0x7f0000000000), r3) r4 = syz_io_uring_setup(0x2, &(0x7f0000000500), &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000ff6000/0xa000)=nil, &(0x7f0000000080)=0x0, &(0x7f0000000140)=0x0) io_uring_setup(0x3ddf, &(0x7f0000000680)) syz_io_uring_submit(r5, r6, &(0x7f0000000800)=@IORING_OP_SENDMSG={0x9, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0}, 0x0) r7 = eventfd(0x0) io_uring_register$IORING_REGISTER_EVENTFD(r4, 0x4, &(0x7f0000000000)=r7, 0x1) read$eventfd(r7, &(0x7f0000000040), 0x8) syz_io_uring_setup(0x3702, &(0x7f00000001c0), &(0x7f0000000000/0x3000)=nil, &(0x7f0000ffe000/0x2000)=nil, &(0x7f0000000140), &(0x7f0000000240)) r8 = dup2(r4, 0xffffffffffffffff) io_uring_enter(r8, 0x1739, 0x0, 0x0, 0x0, 0x0) 19:40:52 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000500100000f000000000000000000000004000000000002000020000020000000def4655fdef4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000008000000018000000c20500002b0200000000000000000000000000000000000073797a6b616c6c6572000000000000002f746d702f73797a2d696d61676567656e35373134333434333800"/192, 0xc0, 0x400}, {&(0x7f0000010100)="000000000000000000000000e58ca12e13a240e2b1a22f8d07e8e55f010040000c00000000000000ddf4655f00"/64, 0x40, 0x4e0}, {&(0x7f0000010200)="010000000000050040", 0x9}, {0x0, 0x0, 0x1000000000c00}, {&(0x7f0000012000)="504d4d00504d4dff", 0x8, 0x10000}], 0x0, &(0x7f0000012b00)) 19:40:52 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000500100000f000000000000000000000004000000000002000020000020000000def4655fdef4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000008000000018000000c20500002b0200000000000000000000000000000000000073797a6b616c6c6572000000000000002f746d702f73797a2d696d61676567656e35373134333434333800"/192, 0xc0, 0x400}, {&(0x7f0000010100)="000000000000000000000000e58ca12e13a240e2b1a22f8d07e8e55f010040000c00000000000000ddf4655f00"/64, 0x40, 0x4e0}, {&(0x7f0000010200), 0x0, 0x560}, {0x0, 0x0, 0x1000000000c00}, {&(0x7f0000012000)="504d4d00504d4dff", 0x8, 0x10000}], 0x0, &(0x7f0000012b00)) [ 1786.812855] EXT4-fs (loop6): VFS: Can't find ext4 filesystem [ 1786.850797] EXT4-fs (loop7): VFS: Can't find ext4 filesystem 19:40:52 executing program 6: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000500100000f000000000000000000000004000000000002000020000020000000def4655fdef4655f0100ffff53", 0x39, 0x400}], 0x0, &(0x7f0000012b00)) [ 1786.872920] EXT4-fs error (device loop5): ext4_fill_super:4947: inode #2: comm syz-executor.5: iget: root inode unallocated [ 1786.873289] EXT4-fs warning (device loop0): read_mmp_block:106: Error -117 while reading MMP block 0 [ 1786.875605] EXT4-fs (loop5): get root inode failed [ 1786.878347] EXT4-fs (loop5): mount failed [ 1786.912531] EXT4-fs (loop6): VFS: Can't find ext4 filesystem [ 1786.916860] EXT4-fs warning (device loop3): read_mmp_block:106: Error -117 while reading MMP block 0 19:40:52 executing program 0: r0 = syz_io_uring_setup(0x2, &(0x7f0000000500), &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000ff6000/0xa000)=nil, &(0x7f0000000080)=0x0, &(0x7f0000000140)=0x0) r3 = io_uring_setup(0x3ddf, &(0x7f0000000680)) syz_io_uring_submit(r1, r2, &(0x7f0000000800)=@IORING_OP_SENDMSG={0x9, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0}, 0x0) r4 = eventfd(0x0) io_uring_register$IORING_REGISTER_EVENTFD(r0, 0x4, &(0x7f0000000000)=r4, 0x1) read$eventfd(r4, &(0x7f0000000040), 0x8) r5 = syz_io_uring_setup(0x3702, 0x0, &(0x7f0000000000/0x3000)=nil, &(0x7f0000ffe000/0x2000)=nil, &(0x7f0000000140), &(0x7f0000000240)) r6 = dup2(r3, r5) r7 = dup2(r0, r6) io_uring_enter(r7, 0x1739, 0x0, 0x0, 0x0, 0x0) 19:40:52 executing program 7: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000), 0x0, 0x400}, {&(0x7f0000010100)="000000000000000000000000e58ca12e13a240e2b1a22f8d07e8e55f010040", 0x1f, 0x4e0}], 0x0, &(0x7f0000012b00)) [ 1787.042354] EXT4-fs (loop7): VFS: Can't find ext4 filesystem 19:40:52 executing program 2: r0 = syz_io_uring_setup(0x2, &(0x7f0000000500), &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000ff6000/0xa000)=nil, &(0x7f0000000080)=0x0, &(0x7f0000000140)=0x0) r3 = io_uring_setup(0x3ddf, &(0x7f0000000680)) syz_io_uring_submit(r1, r2, &(0x7f0000000800)=@IORING_OP_SENDMSG={0x9, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0}, 0x0) r4 = eventfd(0x0) io_uring_register$IORING_REGISTER_EVENTFD(r0, 0x4, &(0x7f0000000000), 0x1) read$eventfd(r4, &(0x7f0000000040), 0x8) r5 = syz_io_uring_setup(0x3702, &(0x7f00000001c0), &(0x7f0000000000/0x3000)=nil, &(0x7f0000ffe000/0x2000)=nil, &(0x7f0000000140), &(0x7f0000000240)) r6 = dup2(r3, r5) r7 = dup2(r0, r6) io_uring_enter(r7, 0x1739, 0x0, 0x0, 0x0, 0x0) 19:40:52 executing program 6: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000500100000f000000000000000000000004000000000002000020000020000000def4655fdef4655f0100ffff53", 0x39, 0x400}], 0x0, &(0x7f0000012b00)) 19:40:52 executing program 3: r0 = syz_io_uring_setup(0x2, &(0x7f0000000500), &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000ff6000/0xa000)=nil, &(0x7f0000000080)=0x0, &(0x7f0000000140)=0x0) r3 = io_uring_setup(0x3ddf, &(0x7f0000000680)) syz_io_uring_submit(r1, r2, &(0x7f0000000800)=@IORING_OP_SENDMSG={0x9, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0}, 0x0) r4 = eventfd(0x0) io_uring_register$IORING_REGISTER_EVENTFD(r0, 0x4, &(0x7f0000000000)=r4, 0x1) read$eventfd(r4, &(0x7f0000000040), 0x8) r5 = syz_io_uring_setup(0x3702, 0x0, &(0x7f0000000000/0x3000)=nil, &(0x7f0000ffe000/0x2000)=nil, &(0x7f0000000140), &(0x7f0000000240)) r6 = dup2(r3, r5) r7 = dup2(r0, r6) io_uring_enter(r7, 0x1739, 0x0, 0x0, 0x0, 0x0) 19:40:52 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000500100000f000000000000000000000004000000000002000020000020000000def4655fdef4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000008000000018000000c20500002b0200000000000000000000000000000000000073797a6b616c6c6572000000000000002f746d702f73797a2d696d61676567656e35373134333434333800"/192, 0xc0, 0x400}, {&(0x7f0000010100)="000000000000000000000000e58ca12e13a240e2b1a22f8d07e8e55f010040000c00000000000000ddf4655f00"/64, 0x40, 0x4e0}, {0x0, 0x0, 0x560}, {0x0, 0x0, 0x1000000000c00}, {&(0x7f0000012000)="504d4d00504d4dff", 0x8, 0x10000}], 0x0, &(0x7f0000012b00)) 19:40:52 executing program 7: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000), 0x0, 0x400}, {&(0x7f0000010100)="000000000000000000000000e58ca12e13a240e2b1a22f8d07e8e55f010040", 0x1f, 0x4e0}], 0x0, &(0x7f0000012b00)) 19:40:52 executing program 1: r0 = syz_io_uring_setup(0x2, &(0x7f0000000500), &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000ff6000/0xa000)=nil, &(0x7f0000000080)=0x0, &(0x7f0000000140)=0x0) r3 = io_uring_setup(0x3ddf, &(0x7f0000000680)) syz_io_uring_submit(r1, r2, &(0x7f0000000800)=@IORING_OP_SENDMSG={0x9, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0}, 0x0) r4 = eventfd(0x0) io_uring_register$IORING_REGISTER_EVENTFD(r0, 0x4, &(0x7f0000000000)=r4, 0x1) read$eventfd(r4, &(0x7f0000000040), 0x8) r5 = syz_io_uring_setup(0x3702, &(0x7f00000001c0), &(0x7f0000000000/0x3000)=nil, &(0x7f0000ffe000/0x2000)=nil, &(0x7f0000000140), 0x0) r6 = dup2(r3, r5) r7 = dup2(r0, r6) io_uring_enter(r7, 0x1739, 0x0, 0x0, 0x0, 0x0) [ 1787.531860] EXT4-fs (loop6): VFS: Can't find ext4 filesystem [ 1787.599286] EXT4-fs warning (device loop5): read_mmp_block:106: Error -117 while reading MMP block 0 [ 1787.621138] EXT4-fs (loop7): VFS: Can't find ext4 filesystem 19:40:53 executing program 6: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000500100000f000000000000000000000004000000000002000020000020000000def4655fdef4655f0100ffff53ef", 0x3a}], 0x0, &(0x7f0000012b00)) 19:40:53 executing program 7: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000), 0x0, 0x400}, {&(0x7f0000010100)="000000000000000000000000e58ca12e13a240e2b1a22f8d07e8e55f010040", 0x1f, 0x4e0}], 0x0, &(0x7f0000012b00)) 19:40:53 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000500100000f000000000000000000000004000000000002000020000020000000def4655fdef4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000008000000018000000c20500002b0200000000000000000000000000000000000073797a6b616c6c6572000000000000002f746d702f73797a2d696d61676567656e35373134333434333800"/192, 0xc0, 0x400}, {&(0x7f0000010100)="000000000000000000000000e58ca12e13a240e2b1a22f8d07e8e55f010040000c00000000000000ddf4655f00"/64, 0x40, 0x4e0}, {0x0, 0x0, 0x560}, {0x0, 0x0, 0x1000000000c00}, {&(0x7f0000012000)="504d4d00504d4dff", 0x8, 0x10000}], 0x0, &(0x7f0000012b00)) [ 1787.833118] EXT4-fs (loop6): VFS: Can't find ext4 filesystem [ 1787.892356] EXT4-fs warning (device loop5): read_mmp_block:106: Error -117 while reading MMP block 0 [ 1787.912134] EXT4-fs (loop7): VFS: Can't find ext4 filesystem 19:41:06 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000500100000f000000000000000000000004000000000002000020000020000000def4655fdef4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000008000000018000000c20500002b0200000000000000000000000000000000000073797a6b616c6c6572000000000000002f746d702f73797a2d696d61676567656e35373134333434333800"/192, 0xc0, 0x400}, {&(0x7f0000010100)="000000000000000000000000e58ca12e13a240e2b1a22f8d07e8e55f010040000c00000000000000ddf4655f00"/64, 0x40, 0x4e0}, {&(0x7f0000010200)="0100000000000500400000000000000000000000000000003400000000000000", 0x20, 0x560}, {0x0}, {&(0x7f0000012000)="504d4d00504d4dff", 0x8, 0x10000}], 0x0, &(0x7f0000012b00)) 19:41:06 executing program 2: r0 = syz_io_uring_setup(0x2, &(0x7f0000000500), &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000ff6000/0xa000)=nil, &(0x7f0000000080)=0x0, &(0x7f0000000140)=0x0) r3 = io_uring_setup(0x3ddf, &(0x7f0000000680)) syz_io_uring_submit(r1, r2, &(0x7f0000000800)=@IORING_OP_SENDMSG={0x9, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0}, 0x0) r4 = eventfd(0x0) io_uring_register$IORING_REGISTER_EVENTFD(r0, 0x4, &(0x7f0000000000)=r4, 0x1) read$eventfd(0xffffffffffffffff, &(0x7f0000000040), 0x8) r5 = syz_io_uring_setup(0x3702, &(0x7f00000001c0), &(0x7f0000000000/0x3000)=nil, &(0x7f0000ffe000/0x2000)=nil, &(0x7f0000000140), &(0x7f0000000240)) r6 = dup2(r3, r5) r7 = dup2(r0, r6) io_uring_enter(r7, 0x1739, 0x0, 0x0, 0x0, 0x0) 19:41:06 executing program 1: r0 = syz_io_uring_setup(0x2, &(0x7f0000000500), &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000ff6000/0xa000)=nil, &(0x7f0000000080)=0x0, &(0x7f0000000140)=0x0) r3 = io_uring_setup(0x3ddf, &(0x7f0000000680)) syz_io_uring_submit(r1, r2, &(0x7f0000000800)=@IORING_OP_SENDMSG={0x9, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0}, 0x0) r4 = eventfd(0x0) io_uring_register$IORING_REGISTER_EVENTFD(r0, 0x4, &(0x7f0000000000)=r4, 0x1) read$eventfd(r4, &(0x7f0000000040), 0x8) r5 = syz_io_uring_setup(0x3702, &(0x7f00000001c0), &(0x7f0000000000/0x3000)=nil, &(0x7f0000ffe000/0x2000)=nil, &(0x7f0000000140), 0x0) r6 = dup2(r3, r5) r7 = dup2(r0, r6) io_uring_enter(r7, 0x1739, 0x0, 0x0, 0x0, 0x0) 19:41:06 executing program 7: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000500100000f000000000000000000000004000000000002000020000020000000def4655fdef4", 0x32, 0x400}, {&(0x7f0000010100)="000000000000000000000000e58ca12e13a240e2b1a22f8d07e8e55f010040", 0x1f, 0x4e0}], 0x0, &(0x7f0000012b00)) 19:41:06 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000500100000f000000000000000000000004000000000002000020000020000000def4655fdef4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000008000000018000000c20500002b0200000000000000000000000000000000000073797a6b616c6c6572000000000000002f746d702f73797a2d696d61676567656e35373134333434333800"/192, 0xc0, 0x400}, {&(0x7f0000010100)="000000000000000000000000e58ca12e13a240e2b1a22f8d07e8e55f010040000c00000000000000ddf4655f00"/64, 0x40, 0x4e0}, {0x0, 0x0, 0x560}, {0x0, 0x0, 0x1000000000c00}, {&(0x7f0000012000)="504d4d00504d4dff", 0x8, 0x10000}], 0x0, &(0x7f0000012b00)) 19:41:06 executing program 6: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000500100000f000000000000000000000004000000000002000020000020000000def4655fdef4655f0100ffff53ef", 0x3a}], 0x0, &(0x7f0000012b00)) 19:41:06 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000500100000f000000000000000000000004000000000002000020000020000000def4655fdef4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000008000000018000000c20500002b0200000000000000000000000000000000000073797a6b616c6c6572000000000000002f746d702f73797a2d696d61676567656e35373134333434333800"/192, 0xc0, 0x400}, {&(0x7f0000010100)="000000000000000000000000e58ca12e13a240e2b1a22f8d07e8e55f010040000c00000000000000ddf4655f00"/64, 0x40, 0x4e0}, {0x0, 0x0, 0x1000000000c00}, {&(0x7f0000012000)="504d4d00504d4dff", 0x8, 0x10000}], 0x0, &(0x7f0000012b00)) 19:41:06 executing program 3: r0 = syz_io_uring_setup(0x21, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, &(0x7f00000a0000)=nil, &(0x7f00000b0000)=nil, &(0x7f0000000180)=0x0, &(0x7f0000002a40)=0x0) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_io_uring_submit(r1, r2, &(0x7f0000000300)=@IORING_OP_OPENAT={0x12, 0x0, 0x0, 0xffffffffffffffff, 0x0, &(0x7f0000000100)='./cgroup/cgroup.procs/file0/../file0\x00'}, 0x0) io_uring_enter(r0, 0x76d3, 0x0, 0x0, 0x0, 0x0) r3 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$netlbl_cipso(&(0x7f0000000000), r3) r4 = syz_io_uring_setup(0x2, &(0x7f0000000500), &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000ff6000/0xa000)=nil, &(0x7f0000000080)=0x0, &(0x7f0000000140)=0x0) io_uring_setup(0x3ddf, &(0x7f0000000680)) syz_io_uring_submit(r5, r6, &(0x7f0000000800)=@IORING_OP_SENDMSG={0x9, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0}, 0x0) r7 = eventfd(0x0) io_uring_register$IORING_REGISTER_EVENTFD(r4, 0x4, &(0x7f0000000000)=r7, 0x1) read$eventfd(r7, &(0x7f0000000040), 0x8) syz_io_uring_setup(0x3702, &(0x7f00000001c0), &(0x7f0000000000/0x3000)=nil, &(0x7f0000ffe000/0x2000)=nil, &(0x7f0000000140), &(0x7f0000000240)) r8 = dup2(r4, 0xffffffffffffffff) io_uring_enter(r8, 0x1739, 0x0, 0x0, 0x0, 0x0) [ 1800.910525] EXT4-fs warning (device loop5): read_mmp_block:106: Error -117 while reading MMP block 0 [ 1800.918369] EXT4-fs (loop4): bad geometry: block count 512 exceeds size of device (128 blocks) [ 1800.923308] EXT4-fs (loop6): VFS: Can't find ext4 filesystem [ 1800.928478] EXT4-fs warning (device loop0): read_mmp_block:106: Error -117 while reading MMP block 0 [ 1800.933065] EXT4-fs (loop7): VFS: Can't find ext4 filesystem 19:41:19 executing program 2: r0 = syz_io_uring_setup(0x2, &(0x7f0000000500), &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000ff6000/0xa000)=nil, &(0x7f0000000080)=0x0, &(0x7f0000000140)=0x0) r3 = io_uring_setup(0x3ddf, &(0x7f0000000680)) syz_io_uring_submit(r1, r2, &(0x7f0000000800)=@IORING_OP_SENDMSG={0x9, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0}, 0x0) r4 = eventfd(0x0) io_uring_register$IORING_REGISTER_EVENTFD(r0, 0x4, &(0x7f0000000000)=r4, 0x1) read$eventfd(0xffffffffffffffff, &(0x7f0000000040), 0x8) r5 = syz_io_uring_setup(0x3702, &(0x7f00000001c0), &(0x7f0000000000/0x3000)=nil, &(0x7f0000ffe000/0x2000)=nil, &(0x7f0000000140), &(0x7f0000000240)) r6 = dup2(r3, r5) r7 = dup2(r0, r6) io_uring_enter(r7, 0x1739, 0x0, 0x0, 0x0, 0x0) 19:41:19 executing program 6: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000500100000f000000000000000000000004000000000002000020000020000000def4655fdef4655f0100ffff53ef", 0x3a}], 0x0, &(0x7f0000012b00)) 19:41:19 executing program 1: r0 = syz_io_uring_setup(0x2, &(0x7f0000000500), &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000ff6000/0xa000)=nil, &(0x7f0000000080)=0x0, &(0x7f0000000140)=0x0) io_uring_setup(0x3ddf, &(0x7f0000000680)) syz_io_uring_submit(r1, r2, &(0x7f0000000800)=@IORING_OP_SENDMSG={0x9, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0}, 0x0) r3 = eventfd(0x0) io_uring_register$IORING_REGISTER_EVENTFD(r0, 0x4, &(0x7f0000000000)=r3, 0x1) read$eventfd(r3, &(0x7f0000000040), 0x8) r4 = syz_io_uring_setup(0x3702, &(0x7f00000001c0), &(0x7f0000000000/0x3000)=nil, &(0x7f0000ffe000/0x2000)=nil, &(0x7f0000000140), &(0x7f0000000240)) r5 = dup2(0xffffffffffffffff, r4) r6 = dup2(r0, r5) io_uring_enter(r6, 0x1739, 0x0, 0x0, 0x0, 0x0) 19:41:19 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000500100000f000000000000000000000004000000000002000020000020000000def4655fdef4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000008000000018000000c20500002b0200000000000000000000000000000000000073797a6b616c6c6572000000000000002f746d702f73797a2d696d61676567656e35373134333434333800"/192, 0xc0, 0x400}, {&(0x7f0000010100)="000000000000000000000000e58ca12e13a240e2b1a22f8d07e8e55f010040000c00000000000000ddf4655f00"/64, 0x40, 0x4e0}, {&(0x7f0000010200)="0100000000000500400000000000000000000000000000003400000000000000", 0x20, 0x560}, {0x0, 0x0, 0x1000000000c00}, {&(0x7f0000012000)="504d4d00504d4dff", 0x8, 0x10000}], 0x0, &(0x7f0000012b00)) 19:41:19 executing program 0: syz_io_uring_setup(0x21, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, &(0x7f00000a0000)=nil, &(0x7f00000b0000)=nil, &(0x7f0000000180), &(0x7f0000002a40)) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r0 = syz_io_uring_setup(0x2, &(0x7f0000000500), &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000ff6000/0xa000)=nil, &(0x7f0000000080), &(0x7f0000000140)) r1 = io_uring_setup(0x3ddf, &(0x7f0000000680)) r2 = eventfd(0x0) io_uring_register$IORING_REGISTER_EVENTFD(r0, 0x4, &(0x7f0000000000)=r2, 0x1) read$eventfd(r2, &(0x7f0000000040), 0x8) r3 = syz_io_uring_setup(0x3702, &(0x7f00000001c0), &(0x7f0000000000/0x3000)=nil, &(0x7f0000ffe000/0x2000)=nil, &(0x7f0000000140), &(0x7f0000000240)) r4 = dup2(r1, r3) r5 = dup2(r0, r4) io_uring_enter(r5, 0x1739, 0x0, 0x0, 0x0, 0x0) 19:41:19 executing program 7: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000500100000f000000000000000000000004000000000002000020000020000000def4655fdef4", 0x32, 0x400}, {&(0x7f0000010100)="000000000000000000000000e58ca12e13a240e2b1a22f8d07e8e55f010040", 0x1f, 0x4e0}], 0x0, &(0x7f0000012b00)) 19:41:19 executing program 5: r0 = syz_io_uring_setup(0x21, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, &(0x7f00000a0000)=nil, &(0x7f00000b0000)=nil, &(0x7f0000000180)=0x0, &(0x7f0000002a40)=0x0) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_io_uring_submit(r1, r2, &(0x7f0000000300)=@IORING_OP_OPENAT={0x12, 0x0, 0x0, 0xffffffffffffffff, 0x0, &(0x7f0000000100)='./cgroup/cgroup.procs/file0/../file0\x00'}, 0x0) io_uring_enter(r0, 0x76d3, 0x0, 0x0, 0x0, 0x0) r3 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$netlbl_cipso(&(0x7f0000000000), r3) r4 = syz_io_uring_setup(0x2, &(0x7f0000000500), &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000ff6000/0xa000)=nil, &(0x7f0000000080)=0x0, &(0x7f0000000140)=0x0) r7 = io_uring_setup(0x3ddf, &(0x7f0000000680)) syz_io_uring_submit(r5, r6, &(0x7f0000000800)=@IORING_OP_SENDMSG={0x9, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0}, 0x0) r8 = eventfd(0x0) io_uring_register$IORING_REGISTER_EVENTFD(r4, 0x4, &(0x7f0000000000)=r8, 0x1) read$eventfd(r8, &(0x7f0000000040), 0x8) r9 = syz_io_uring_setup(0x3702, &(0x7f00000001c0), &(0x7f0000000000/0x3000)=nil, &(0x7f0000ffe000/0x2000)=nil, &(0x7f0000000140), &(0x7f0000000240)) dup2(r7, r9) io_uring_enter(0xffffffffffffffff, 0x1739, 0x0, 0x0, 0x0, 0x0) 19:41:19 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000500100000f000000000000000000000004000000000002000020000020000000def4655fdef4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000008000000018000000c20500002b0200000000000000000000000000000000000073797a6b616c6c6572000000000000002f746d702f73797a2d696d61676567656e35373134333434333800"/192, 0xc0, 0x400}, {&(0x7f0000010100)="000000000000000000000000e58ca12e13a240e2b1a22f8d07e8e55f010040000c00000000000000ddf4655f00"/64, 0x40, 0x4e0}, {&(0x7f0000010200)="0100000000000500400000000000000000000000000000003400000000000000", 0x20, 0x560}, {0x0}, {&(0x7f0000012000)="504d4d00504d4dff", 0x8, 0x10000}], 0x0, &(0x7f0000012b00)) [ 1813.796837] EXT4-fs (loop6): VFS: Can't find ext4 filesystem [ 1813.800603] EXT4-fs error (device loop3): ext4_fill_super:4947: inode #2: comm syz-executor.3: iget: root inode unallocated [ 1813.802609] EXT4-fs (loop3): get root inode failed [ 1813.803560] EXT4-fs (loop3): mount failed [ 1813.813407] EXT4-fs (loop4): bad geometry: block count 512 exceeds size of device (128 blocks) [ 1813.819891] EXT4-fs (loop7): VFS: Can't find ext4 filesystem 19:41:19 executing program 6: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000500100000f000000000000000000000004000000000002000020000020000000def4655fdef4655f0100ffff53ef", 0x3a, 0x400}], 0x0, 0x0) 19:41:19 executing program 2: r0 = syz_io_uring_setup(0x2, &(0x7f0000000500), &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000ff6000/0xa000)=nil, &(0x7f0000000080)=0x0, &(0x7f0000000140)=0x0) r3 = io_uring_setup(0x3ddf, &(0x7f0000000680)) syz_io_uring_submit(r1, r2, &(0x7f0000000800)=@IORING_OP_SENDMSG={0x9, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0}, 0x0) r4 = eventfd(0x0) io_uring_register$IORING_REGISTER_EVENTFD(r0, 0x4, &(0x7f0000000000)=r4, 0x1) read$eventfd(0xffffffffffffffff, &(0x7f0000000040), 0x8) r5 = syz_io_uring_setup(0x3702, &(0x7f00000001c0), &(0x7f0000000000/0x3000)=nil, &(0x7f0000ffe000/0x2000)=nil, &(0x7f0000000140), &(0x7f0000000240)) r6 = dup2(r3, r5) r7 = dup2(r0, r6) io_uring_enter(r7, 0x1739, 0x0, 0x0, 0x0, 0x0) 19:41:19 executing program 3: r0 = syz_io_uring_setup(0x2, &(0x7f0000000500), &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000ff6000/0xa000)=nil, &(0x7f0000000080)=0x0, &(0x7f0000000140)=0x0) r3 = io_uring_setup(0x3ddf, &(0x7f0000000680)) syz_io_uring_submit(r1, r2, &(0x7f0000000800)=@IORING_OP_SENDMSG={0x9, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0}, 0x0) r4 = eventfd(0x0) io_uring_register$IORING_REGISTER_EVENTFD(r0, 0x4, &(0x7f0000000000)=r4, 0x1) read$eventfd(r4, &(0x7f0000000040), 0x8) r5 = syz_io_uring_setup(0x0, &(0x7f00000001c0), &(0x7f0000000000/0x3000)=nil, &(0x7f0000ffe000/0x2000)=nil, &(0x7f0000000140), &(0x7f0000000240)) r6 = dup2(r3, r5) r7 = dup2(r0, r6) io_uring_enter(r7, 0x1739, 0x0, 0x0, 0x0, 0x0) 19:41:19 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000500100000f000000000000000000000004000000000002000020000020000000def4655fdef4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000008000000018000000c20500002b0200000000000000000000000000000000000073797a6b616c6c6572000000000000002f746d702f73797a2d696d61676567656e35373134333434333800"/192, 0xc0, 0x400}, {&(0x7f0000010100)="000000000000000000000000e58ca12e13a240e2b1a22f8d07e8e55f010040000c00000000000000ddf4655f00"/64, 0x40, 0x4e0}, {&(0x7f0000010200)="0100000000000500400000000000000000000000000000003400000000000000", 0x20, 0x560}, {&(0x7f0000010300)="03000000040000000500000015000f0003000400"/32, 0x20, 0x800}, {0x0}, {&(0x7f0000012000)="504d4d00504d4dff", 0x8, 0x10000}], 0x0, &(0x7f0000012b00)) 19:41:19 executing program 7: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000500100000f000000000000000000000004000000000002000020000020000000def4655fdef4", 0x32, 0x400}, {&(0x7f0000010100)="000000000000000000000000e58ca12e13a240e2b1a22f8d07e8e55f010040", 0x1f, 0x4e0}], 0x0, &(0x7f0000012b00)) 19:41:19 executing program 6: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000500100000f000000000000000000000004000000000002000020000020000000def4655fdef4655f0100ffff53ef", 0x3a, 0x400}], 0x0, 0x0) [ 1813.974160] EXT4-fs (loop4): bad geometry: block count 512 exceeds size of device (128 blocks) [ 1813.990454] EXT4-fs (loop7): VFS: Can't find ext4 filesystem 19:41:32 executing program 3: r0 = syz_io_uring_setup(0x2, &(0x7f0000000500), &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000ff6000/0xa000)=nil, &(0x7f0000000080)=0x0, &(0x7f0000000140)=0x0) r3 = io_uring_setup(0x3ddf, &(0x7f0000000680)) syz_io_uring_submit(r1, r2, &(0x7f0000000800)=@IORING_OP_SENDMSG={0x9, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0}, 0x0) r4 = eventfd(0x0) io_uring_register$IORING_REGISTER_EVENTFD(r0, 0x4, &(0x7f0000000000)=r4, 0x1) read$eventfd(r4, &(0x7f0000000040), 0x8) r5 = syz_io_uring_setup(0x3702, 0x0, &(0x7f0000000000/0x3000)=nil, &(0x7f0000ffe000/0x2000)=nil, &(0x7f0000000140), &(0x7f0000000240)) r6 = dup2(r3, r5) r7 = dup2(r0, r6) io_uring_enter(r7, 0x1739, 0x0, 0x0, 0x0, 0x0) 19:41:32 executing program 2: r0 = syz_io_uring_setup(0x2, &(0x7f0000000500), &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000ff6000/0xa000)=nil, &(0x7f0000000080)=0x0, &(0x7f0000000140)=0x0) r3 = io_uring_setup(0x3ddf, &(0x7f0000000680)) syz_io_uring_submit(r1, r2, &(0x7f0000000800)=@IORING_OP_SENDMSG={0x9, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0}, 0x0) r4 = eventfd(0x0) io_uring_register$IORING_REGISTER_EVENTFD(r0, 0x4, &(0x7f0000000000)=r4, 0x1) read$eventfd(r4, 0x0, 0x0) r5 = syz_io_uring_setup(0x3702, &(0x7f00000001c0), &(0x7f0000000000/0x3000)=nil, &(0x7f0000ffe000/0x2000)=nil, &(0x7f0000000140), &(0x7f0000000240)) r6 = dup2(r3, r5) r7 = dup2(r0, r6) io_uring_enter(r7, 0x1739, 0x0, 0x0, 0x0, 0x0) 19:41:32 executing program 6: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000500100000f000000000000000000000004000000000002000020000020000000def4655fdef4655f0100ffff53ef", 0x3a, 0x400}], 0x0, 0x0) 19:41:32 executing program 1: r0 = syz_io_uring_setup(0x2, &(0x7f0000000500), &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000ff6000/0xa000)=nil, &(0x7f0000000080)=0x0, &(0x7f0000000140)=0x0) io_uring_setup(0x3ddf, &(0x7f0000000680)) syz_io_uring_submit(r1, r2, &(0x7f0000000800)=@IORING_OP_SENDMSG={0x9, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0}, 0x0) r3 = eventfd(0x0) io_uring_register$IORING_REGISTER_EVENTFD(r0, 0x4, &(0x7f0000000000)=r3, 0x1) read$eventfd(r3, &(0x7f0000000040), 0x8) r4 = syz_io_uring_setup(0x3702, &(0x7f00000001c0), &(0x7f0000000000/0x3000)=nil, &(0x7f0000ffe000/0x2000)=nil, &(0x7f0000000140), &(0x7f0000000240)) r5 = dup2(0xffffffffffffffff, r4) r6 = dup2(r0, r5) io_uring_enter(r6, 0x1739, 0x0, 0x0, 0x0, 0x0) 19:41:32 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000500100000f000000000000000000000004000000000002000020000020000000def4655fdef4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000008000000018000000c20500002b0200000000000000000000000000000000000073797a6b616c6c6572000000000000002f746d702f73797a2d696d61676567656e35373134333434333800"/192, 0xc0, 0x400}, {&(0x7f0000010100)="000000000000000000000000e58ca12e13a240e2b1a22f8d07e8e55f010040000c00000000000000ddf4655f00"/64, 0x40, 0x4e0}, {&(0x7f0000010200)="0100000000000500400000000000000000000000000000003400000000000000", 0x20, 0x560}, {&(0x7f0000010300)="03000000040000000500000015000f0003000400"/32, 0x20, 0x800}, {0x0, 0x0, 0x1000000000c00}, {&(0x7f0000012000)="504d4d00504d4dff", 0x8, 0x10000}], 0x0, &(0x7f0000012b00)) 19:41:32 executing program 7: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000500100000f000000000000000000000004000000000002000020000020000000def4655fdef4655f0100ffff53ef010001000000ddf4655f00000000000000", 0x4b, 0x400}, {&(0x7f0000010100)="000000000000000000000000e58ca12e13a240e2b1a22f8d07e8e55f010040", 0x1f, 0x4e0}], 0x0, &(0x7f0000012b00)) 19:41:32 executing program 5: syz_io_uring_setup(0x21, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, &(0x7f00000a0000)=nil, &(0x7f00000b0000)=nil, &(0x7f0000000180), &(0x7f0000002a40)) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r0 = syz_io_uring_setup(0x2, &(0x7f0000000500), &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000ff6000/0xa000)=nil, &(0x7f0000000080)=0x0, &(0x7f0000000140)=0x0) r3 = io_uring_setup(0x3ddf, &(0x7f0000000680)) syz_io_uring_submit(r1, r2, &(0x7f0000000800)=@IORING_OP_SENDMSG={0x9, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0}, 0x0) io_uring_register$IORING_REGISTER_EVENTFD(r0, 0x4, &(0x7f0000000000), 0x1) read$eventfd(0xffffffffffffffff, &(0x7f0000000040), 0x8) r4 = syz_io_uring_setup(0x3702, &(0x7f00000001c0), &(0x7f0000000000/0x3000)=nil, &(0x7f0000ffe000/0x2000)=nil, &(0x7f0000000140), &(0x7f0000000240)) r5 = dup2(r3, r4) r6 = dup2(r0, r5) io_uring_enter(r6, 0x1739, 0x0, 0x0, 0x0, 0x0) 19:41:32 executing program 0: r0 = syz_io_uring_setup(0x2, &(0x7f0000000500), &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000ff6000/0xa000)=nil, &(0x7f0000000080)=0x0, &(0x7f0000000140)=0x0) r3 = io_uring_setup(0x3ddf, &(0x7f0000000680)) syz_io_uring_submit(r1, r2, &(0x7f0000000800)=@IORING_OP_SENDMSG={0x9, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0}, 0x0) r4 = eventfd(0x0) io_uring_register$IORING_REGISTER_EVENTFD(r0, 0x4, &(0x7f0000000000)=r4, 0x1) read$eventfd(r4, &(0x7f0000000040), 0x8) r5 = syz_io_uring_setup(0x0, &(0x7f00000001c0), &(0x7f0000000000/0x3000)=nil, &(0x7f0000ffe000/0x2000)=nil, &(0x7f0000000140), &(0x7f0000000240)) r6 = dup2(r3, r5) r7 = dup2(r0, r6) io_uring_enter(r7, 0x1739, 0x0, 0x0, 0x0, 0x0) [ 1826.770488] EXT4-fs error (device loop4): ext4_fill_super:4947: inode #2: comm syz-executor.4: iget: root inode unallocated [ 1826.773240] EXT4-fs (loop4): get root inode failed [ 1826.773886] EXT4-fs (loop4): mount failed [ 1826.780613] EXT4-fs (loop7): fragment/cluster size (16384) != block size (1024) 19:41:32 executing program 6: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000500100000f000000000000000000000004000000000002000020000020000000def4655fdef4655f0100ffff53ef", 0x3a, 0x400}], 0x0, 0x0) 19:41:32 executing program 2: r0 = syz_io_uring_setup(0x2, &(0x7f0000000500), &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000ff6000/0xa000)=nil, &(0x7f0000000080)=0x0, &(0x7f0000000140)=0x0) r3 = io_uring_setup(0x3ddf, &(0x7f0000000680)) syz_io_uring_submit(r1, r2, &(0x7f0000000800)=@IORING_OP_SENDMSG={0x9, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0}, 0x0) r4 = eventfd(0x0) io_uring_register$IORING_REGISTER_EVENTFD(r0, 0x4, &(0x7f0000000000)=r4, 0x1) read$eventfd(r4, 0x0, 0x0) r5 = syz_io_uring_setup(0x3702, &(0x7f00000001c0), &(0x7f0000000000/0x3000)=nil, &(0x7f0000ffe000/0x2000)=nil, &(0x7f0000000140), &(0x7f0000000240)) r6 = dup2(r3, r5) r7 = dup2(r0, r6) io_uring_enter(r7, 0x1739, 0x0, 0x0, 0x0, 0x0) 19:41:32 executing program 4: r0 = syz_io_uring_setup(0x2, &(0x7f0000000500), &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000ff6000/0xa000)=nil, &(0x7f0000000080)=0x0, &(0x7f0000000140)=0x0) r3 = io_uring_setup(0x3ddf, &(0x7f0000000680)) syz_io_uring_submit(r1, r2, &(0x7f0000000800)=@IORING_OP_SENDMSG={0x9, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0}, 0x0) r4 = eventfd(0x0) io_uring_register$IORING_REGISTER_EVENTFD(r0, 0x4, &(0x7f0000000000)=r4, 0x1) read$eventfd(0xffffffffffffffff, &(0x7f0000000040), 0x8) r5 = syz_io_uring_setup(0x3702, &(0x7f00000001c0), &(0x7f0000000000/0x3000)=nil, &(0x7f0000ffe000/0x2000)=nil, &(0x7f0000000140), &(0x7f0000000240)) r6 = dup2(r3, r5) r7 = dup2(r0, r6) io_uring_enter(r7, 0x1739, 0x0, 0x0, 0x0, 0x0) 19:41:32 executing program 7: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000500100000f000000000000000000000004000000000002000020000020000000def4655fdef465", 0x33, 0x400}, {&(0x7f0000010100)="000000000000000000000000e58ca12e13a240e2b1a22f8d07e8e55f010040", 0x1f, 0x4e0}], 0x0, &(0x7f0000012b00)) [ 1826.897726] EXT4-fs (loop7): VFS: Can't find ext4 filesystem 19:41:32 executing program 5: syz_io_uring_setup(0x21, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, &(0x7f00000a0000)=nil, &(0x7f00000b0000)=nil, &(0x7f0000000180), &(0x7f0000002a40)) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r0 = syz_io_uring_setup(0x2, &(0x7f0000000500), &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000ff6000/0xa000)=nil, &(0x7f0000000080)=0x0, &(0x7f0000000140)=0x0) r3 = io_uring_setup(0x3ddf, &(0x7f0000000680)) syz_io_uring_submit(r1, r2, &(0x7f0000000800)=@IORING_OP_SENDMSG={0x9, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0}, 0x0) io_uring_register$IORING_REGISTER_EVENTFD(r0, 0x4, &(0x7f0000000000), 0x1) read$eventfd(0xffffffffffffffff, &(0x7f0000000040), 0x8) r4 = syz_io_uring_setup(0x3702, &(0x7f00000001c0), &(0x7f0000000000/0x3000)=nil, &(0x7f0000ffe000/0x2000)=nil, &(0x7f0000000140), &(0x7f0000000240)) r5 = dup2(r3, r4) r6 = dup2(r0, r5) io_uring_enter(r6, 0x1739, 0x0, 0x0, 0x0, 0x0) 19:41:32 executing program 2: r0 = syz_io_uring_setup(0x2, &(0x7f0000000500), &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000ff6000/0xa000)=nil, &(0x7f0000000080)=0x0, &(0x7f0000000140)=0x0) r3 = io_uring_setup(0x3ddf, &(0x7f0000000680)) syz_io_uring_submit(r1, r2, &(0x7f0000000800)=@IORING_OP_SENDMSG={0x9, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0}, 0x0) r4 = eventfd(0x0) io_uring_register$IORING_REGISTER_EVENTFD(r0, 0x4, &(0x7f0000000000)=r4, 0x1) read$eventfd(r4, 0x0, 0x0) r5 = syz_io_uring_setup(0x3702, &(0x7f00000001c0), &(0x7f0000000000/0x3000)=nil, &(0x7f0000ffe000/0x2000)=nil, &(0x7f0000000140), &(0x7f0000000240)) r6 = dup2(r3, r5) r7 = dup2(r0, r6) io_uring_enter(r7, 0x1739, 0x0, 0x0, 0x0, 0x0) 19:41:32 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000500100000f000000000000000000000004000000000002000020000020000000def4655fdef4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000008000000018000000c20500002b0200000000000000000000000000000000000073797a6b616c6c6572000000000000002f746d702f73797a2d696d61676567656e35373134333434333800"/192, 0xc0, 0x400}, {&(0x7f0000010100)="000000000000000000000000e58ca12e13a240e2b1a22f8d07e8e55f010040000c00000000000000ddf4655f00"/64, 0x40, 0x4e0}, {&(0x7f0000010200)="0100000000000500400000000000000000000000000000003400000000000000", 0x20, 0x560}, {&(0x7f0000010300)="03000000040000000500000015000f0003000400"/32, 0x20, 0x800}, {&(0x7f0000012000)="504d4d00504d4dff", 0x8, 0x10000}], 0x0, &(0x7f0000012b00)) 19:41:32 executing program 6: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000500100000f000000000000000000000004000000000002000020000020000000def4655fdef4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000008000000018000000c20500002b0200000000000000000000000000000000000073797a6b616c6c6572000000000000002f746d702f73797a2d696d61676567656e35373134333434333800"/192, 0xc0, 0x400}, {&(0x7f0000010100)="000000000000000000000000e58ca12e13a240e2b1a22f8d07e8e55f010040000c00000000000000ddf4655f00"/64, 0x40, 0x4e0}, {&(0x7f0000010200)="0100000000000500400000000000000000000000000000003400000000000000", 0x20, 0x560}, {&(0x7f0000010300)="03000000040000000500000015000f0003000400"/32, 0x20, 0x800}, {&(0x7f0000010400)="ff070000ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff0100ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff0000000000000000ddf4655fddf4655fddf4655f00"/2080, 0x820, 0x1000000000c00}, {&(0x7f0000012000)="504d4d00504d4dff", 0x8}], 0x0, &(0x7f0000012b00)) [ 1827.000108] EXT4-fs (loop4): bad geometry: block count 512 exceeds size of device (128 blocks) [ 1827.046057] EXT4-fs warning (device loop6): read_mmp_block:106: Error -117 while reading MMP block 64 19:41:44 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000500100000f000000000000000000000004000000000002000020000020000000def4655fdef4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000008000000018000000c20500002b0200000000000000000000000000000000000073797a6b616c6c6572000000000000002f746d702f73797a2d696d61676567656e35373134333434333800"/192, 0xc0, 0x400}, {&(0x7f0000010100)="000000000000000000000000e58ca12e13a240e2b1a22f8d07e8e55f010040000c00000000000000ddf4655f00"/64, 0x40, 0x4e0}, {0x0, 0x0, 0x560}, {0x0, 0x0, 0x1000000000c00}, {&(0x7f0000012000)="504d4d00504d4dff", 0x8, 0x10000}], 0x0, &(0x7f0000012b00)) 19:41:44 executing program 1: r0 = syz_io_uring_setup(0x2, &(0x7f0000000500), &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000ff6000/0xa000)=nil, &(0x7f0000000080)=0x0, &(0x7f0000000140)=0x0) io_uring_setup(0x3ddf, &(0x7f0000000680)) syz_io_uring_submit(r1, r2, &(0x7f0000000800)=@IORING_OP_SENDMSG={0x9, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0}, 0x0) r3 = eventfd(0x0) io_uring_register$IORING_REGISTER_EVENTFD(r0, 0x4, &(0x7f0000000000)=r3, 0x1) read$eventfd(r3, &(0x7f0000000040), 0x8) r4 = syz_io_uring_setup(0x3702, &(0x7f00000001c0), &(0x7f0000000000/0x3000)=nil, &(0x7f0000ffe000/0x2000)=nil, &(0x7f0000000140), &(0x7f0000000240)) r5 = dup2(0xffffffffffffffff, r4) r6 = dup2(r0, r5) io_uring_enter(r6, 0x1739, 0x0, 0x0, 0x0, 0x0) 19:41:44 executing program 2: r0 = syz_io_uring_setup(0x2, &(0x7f0000000500), &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000ff6000/0xa000)=nil, &(0x7f0000000080)=0x0, &(0x7f0000000140)=0x0) r3 = io_uring_setup(0x3ddf, &(0x7f0000000680)) syz_io_uring_submit(r1, r2, &(0x7f0000000800)=@IORING_OP_SENDMSG={0x9, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0}, 0x0) r4 = eventfd(0x0) io_uring_register$IORING_REGISTER_EVENTFD(r0, 0x4, &(0x7f0000000000)=r4, 0x1) read$eventfd(r4, &(0x7f0000000040), 0x8) r5 = syz_io_uring_setup(0x0, &(0x7f00000001c0), &(0x7f0000000000/0x3000)=nil, &(0x7f0000ffe000/0x2000)=nil, &(0x7f0000000140), &(0x7f0000000240)) r6 = dup2(r3, r5) r7 = dup2(r0, r6) io_uring_enter(r7, 0x1739, 0x0, 0x0, 0x0, 0x0) 19:41:44 executing program 7: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000500100000f000000000000000000000004000000000002000020000020000000def4655fdef465", 0x33, 0x400}, {&(0x7f0000010100)="000000000000000000000000e58ca12e13a240e2b1a22f8d07e8e55f010040", 0x1f, 0x4e0}], 0x0, &(0x7f0000012b00)) 19:41:44 executing program 4: r0 = syz_io_uring_setup(0x2, &(0x7f0000000500), &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000ff6000/0xa000)=nil, &(0x7f0000000080)=0x0, &(0x7f0000000140)=0x0) r3 = io_uring_setup(0x3ddf, &(0x7f0000000680)) syz_io_uring_submit(r1, r2, &(0x7f0000000800)=@IORING_OP_SENDMSG={0x9, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0}, 0x0) r4 = eventfd(0x0) io_uring_register$IORING_REGISTER_EVENTFD(r0, 0x4, &(0x7f0000000000)=r4, 0x1) read$eventfd(r4, 0x0, 0x0) r5 = syz_io_uring_setup(0x3702, &(0x7f00000001c0), &(0x7f0000000000/0x3000)=nil, &(0x7f0000ffe000/0x2000)=nil, &(0x7f0000000140), &(0x7f0000000240)) r6 = dup2(r3, r5) r7 = dup2(r0, r6) io_uring_enter(r7, 0x1739, 0x0, 0x0, 0x0, 0x0) 19:41:44 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000500100000f000000000000000000000004000000000002000020000020000000def4655fdef4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000008000000018000000c20500002b0200000000000000000000000000000000000073797a6b616c6c6572000000000000002f746d702f73797a2d696d61676567656e35373134333434333800"/192, 0xc0, 0x400}, {&(0x7f0000010100)="000000000000000000000000e58ca12e13a240e2b1a22f8d07e8e55f010040000c00000000000000ddf4655f00"/64, 0x40, 0x4e0}, {&(0x7f0000010200)="0100000000000500", 0x8, 0x560}, {0x0, 0x0, 0x1000000000c00}, {&(0x7f0000012000)="504d4d00504d4dff", 0x8, 0x10000}], 0x0, &(0x7f0000012b00)) 19:41:44 executing program 6: r0 = syz_io_uring_setup(0x2, &(0x7f0000000500), &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000ff6000/0xa000)=nil, &(0x7f0000000080)=0x0, &(0x7f0000000140)=0x0) r3 = io_uring_setup(0x3ddf, &(0x7f0000000680)) syz_io_uring_submit(r1, r2, &(0x7f0000000800)=@IORING_OP_SENDMSG={0x9, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0}, 0x0) r4 = eventfd(0x0) io_uring_register$IORING_REGISTER_EVENTFD(r0, 0x4, &(0x7f0000000000)=r4, 0x1) read$eventfd(r4, &(0x7f0000000040), 0x8) r5 = syz_io_uring_setup(0x3702, 0x0, &(0x7f0000000000/0x3000)=nil, &(0x7f0000ffe000/0x2000)=nil, &(0x7f0000000140), &(0x7f0000000240)) r6 = dup2(r3, r5) r7 = dup2(r0, r6) io_uring_enter(r7, 0x1739, 0x0, 0x0, 0x0, 0x0) 19:41:44 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000500100000f000000000000000000000004000000000002000020000020000000def4655fdef4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000008000000018000000c20500002b0200000000000000000000000000000000000073797a6b616c6c6572000000000000002f746d702f73797a2d696d61676567656e35373134333434333800"/192, 0xc0, 0x400}, {&(0x7f0000010100)="000000000000000000000000e58ca12e13a240e2b1a22f8d07e8e55f010040000c00000000000000ddf4655f00"/64, 0x40, 0x4e0}, {&(0x7f0000010200), 0x0, 0x560}, {0x0, 0x0, 0x1000000000c00}, {&(0x7f0000012000)="504d4d00504d4dff", 0x8, 0x10000}], 0x0, &(0x7f0000012b00)) [ 1839.466765] EXT4-fs warning (device loop5): read_mmp_block:106: Error -117 while reading MMP block 0 [ 1839.473563] EXT4-fs (loop7): VFS: Can't find ext4 filesystem [ 1839.481378] EXT4-fs warning (device loop0): read_mmp_block:106: Error -117 while reading MMP block 0 [ 1839.493495] EXT4-fs warning (device loop3): read_mmp_block:106: Error -117 while reading MMP block 0 19:41:44 executing program 5: syz_io_uring_setup(0x21, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, &(0x7f00000a0000)=nil, &(0x7f00000b0000)=nil, &(0x7f0000000180), &(0x7f0000002a40)) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r0 = syz_io_uring_setup(0x2, &(0x7f0000000500), &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000ff6000/0xa000)=nil, &(0x7f0000000080)=0x0, &(0x7f0000000140)=0x0) r3 = io_uring_setup(0x3ddf, &(0x7f0000000680)) syz_io_uring_submit(r1, r2, &(0x7f0000000800)=@IORING_OP_SENDMSG={0x9, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0}, 0x0) r4 = eventfd(0x0) io_uring_register$IORING_REGISTER_EVENTFD(r0, 0x4, &(0x7f0000000000)=r4, 0x1) r5 = syz_io_uring_setup(0x3702, &(0x7f00000001c0), &(0x7f0000000000/0x3000)=nil, &(0x7f0000ffe000/0x2000)=nil, &(0x7f0000000140), &(0x7f0000000240)) r6 = dup2(r3, r5) r7 = dup2(r0, r6) io_uring_enter(r7, 0x1739, 0x0, 0x0, 0x0, 0x0) 19:41:44 executing program 3: r0 = syz_io_uring_setup(0x21, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, &(0x7f00000a0000)=nil, &(0x7f00000b0000)=nil, &(0x7f0000000180)=0x0, &(0x7f0000002a40)=0x0) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_io_uring_submit(r1, r2, &(0x7f0000000300)=@IORING_OP_OPENAT={0x12, 0x0, 0x0, 0xffffffffffffffff, 0x0, &(0x7f0000000100)='./cgroup/cgroup.procs/file0/../file0\x00'}, 0x0) io_uring_enter(r0, 0x76d3, 0x0, 0x0, 0x0, 0x0) r3 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$netlbl_cipso(&(0x7f0000000000), r3) r4 = syz_io_uring_setup(0x2, &(0x7f0000000500), &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000ff6000/0xa000)=nil, &(0x7f0000000080)=0x0, &(0x7f0000000140)=0x0) r7 = io_uring_setup(0x3ddf, &(0x7f0000000680)) syz_io_uring_submit(r5, r6, &(0x7f0000000800)=@IORING_OP_SENDMSG={0x9, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0}, 0x0) r8 = eventfd(0x0) io_uring_register$IORING_REGISTER_EVENTFD(r4, 0x4, &(0x7f0000000000)=r8, 0x1) read$eventfd(r8, &(0x7f0000000040), 0x8) r9 = syz_io_uring_setup(0x3702, &(0x7f00000001c0), &(0x7f0000000000/0x3000)=nil, &(0x7f0000ffe000/0x2000)=nil, &(0x7f0000000140), &(0x7f0000000240)) r10 = dup2(r7, r9) r11 = dup2(r4, r10) io_uring_enter(r11, 0x1739, 0x0, 0x0, 0x0, 0x0) 19:41:44 executing program 7: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000500100000f000000000000000000000004000000000002000020000020000000def4655fdef465", 0x33, 0x400}, {&(0x7f0000010100)="000000000000000000000000e58ca12e13a240e2b1a22f8d07e8e55f010040", 0x1f, 0x4e0}], 0x0, &(0x7f0000012b00)) 19:41:44 executing program 4: r0 = syz_io_uring_setup(0x21, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, &(0x7f00000a0000)=nil, &(0x7f00000b0000)=nil, &(0x7f0000000180)=0x0, &(0x7f0000002a40)=0x0) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_io_uring_submit(r1, r2, &(0x7f0000000300)=@IORING_OP_OPENAT={0x12, 0x0, 0x0, 0xffffffffffffffff, 0x0, &(0x7f0000000100)='./cgroup/cgroup.procs/file0/../file0\x00'}, 0x0) io_uring_enter(r0, 0x76d3, 0x0, 0x0, 0x0, 0x0) r3 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$netlbl_cipso(&(0x7f0000000000), r3) r4 = syz_io_uring_setup(0x2, &(0x7f0000000500), &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000ff6000/0xa000)=nil, &(0x7f0000000080)=0x0, &(0x7f0000000140)=0x0) r7 = io_uring_setup(0x3ddf, &(0x7f0000000680)) syz_io_uring_submit(r5, r6, &(0x7f0000000800)=@IORING_OP_SENDMSG={0x9, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0}, 0x0) r8 = eventfd(0x0) io_uring_register$IORING_REGISTER_EVENTFD(r4, 0x4, &(0x7f0000000000)=r8, 0x1) read$eventfd(r8, &(0x7f0000000040), 0x8) r9 = syz_io_uring_setup(0x3702, &(0x7f00000001c0), &(0x7f0000000000/0x3000)=nil, &(0x7f0000ffe000/0x2000)=nil, &(0x7f0000000140), &(0x7f0000000240)) r10 = dup2(r7, r9) r11 = dup2(r4, r10) io_uring_enter(r11, 0x1739, 0x0, 0x0, 0x0, 0x0) 19:41:44 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x9, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000500100000f000000000000000000000004000000000002000020000020000000def4655fdef4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000008000000018000000c20500002b0200000000000000000000000000000000000073797a6b616c6c6572000000000000002f746d702f73797a2d696d61676567656e35373134333434333800"/192, 0xc0, 0x400}, {&(0x7f0000010100)="000000000000000000000000e58ca12e13a240e2b1a22f8d07e8e55f010040000c00000000000000ddf4655f00"/64, 0x40, 0x4e0}, {&(0x7f0000010200)="0100000000000500400000000000000000000000000000003400000000000000", 0x20, 0x560}, {&(0x7f0000010300)="03000000040000000500000015000f0003000400"/32, 0x20, 0x800}, {&(0x7f0000010400)="ff070000ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff0100ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff0000000000000000ddf4655fddf4655fddf4655f00"/2080, 0x820, 0x1000000000c00}, {&(0x7f0000010d00)="ed41000000040000ddf4655fdef4655fdef4655f00000000000004002000000000000800050000000af301000400000000000000000000000100000010000000", 0x40, 0x1481}, {&(0x7f0000000300)="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", 0x204, 0x1980}, {&(0x7f0000011300)="020000000c0001022e000000020000000c0002022e2e00000b00000014000a026c6f73742b666f756e6400000c0000001000050266696c65300000000f0000001000050166696c6531", 0x49, 0x4000}, {&(0x7f0000012000)='PMM\x00PMM', 0x7, 0x10000}], 0x0, &(0x7f0000012b00)) [ 1839.587939] EXT4-fs (loop7): VFS: Can't find ext4 filesystem 19:41:45 executing program 7: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000500100000f000000000000000000000004000000000002000020000020000000def4655fdef4655f0100ffff53ef0100010000", 0x3f, 0x400}, {&(0x7f0000010100)="000000000000000000000000e58ca12e13a240e2b1a22f8d07e8e55f010040", 0x1f, 0x4e0}], 0x0, &(0x7f0000012b00)) [ 1839.649436] EXT4-fs (loop7): fragment/cluster size (16384) != block size (1024) 19:41:45 executing program 7: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000500100000f000000000000000000000004000000000002000020000020000000def4655fdef465", 0x33, 0x400}, {&(0x7f0000010100)="000000000000000000000000e58ca12e13a240e2b1a22f8d07e8e55f010040", 0x1f, 0x4e0}], 0x0, &(0x7f0000012b00)) [ 1839.703196] EXT4-fs (loop7): VFS: Can't find ext4 filesystem 19:41:45 executing program 5: r0 = syz_io_uring_setup(0x21, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, &(0x7f00000a0000)=nil, &(0x7f00000b0000)=nil, &(0x7f0000000180)=0x0, &(0x7f0000002a40)=0x0) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_io_uring_submit(r1, r2, &(0x7f0000000300)=@IORING_OP_OPENAT={0x12, 0x0, 0x0, 0xffffffffffffffff, 0x0, &(0x7f0000000100)='./cgroup/cgroup.procs/file0/../file0\x00'}, 0x0) io_uring_enter(r0, 0x76d3, 0x0, 0x0, 0x0, 0x0) r3 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r4 = syz_genetlink_get_family_id$netlbl_cipso(&(0x7f0000000000), r3) r5 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NLBL_CIPSOV4_C_REMOVE(r5, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000080)={0x14, r4, 0x1}, 0x14}}, 0x0) r6 = io_uring_setup(0x3ddf, &(0x7f0000000680)) syz_io_uring_submit(0x0, 0x0, &(0x7f0000000800)=@IORING_OP_SENDMSG={0x9, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0}, 0x0) r7 = eventfd(0x0) io_uring_register$IORING_REGISTER_EVENTFD(0xffffffffffffffff, 0x4, &(0x7f0000000000)=r7, 0x1) read$eventfd(r7, &(0x7f0000000040), 0x8) r8 = syz_io_uring_setup(0x3702, &(0x7f00000001c0), &(0x7f0000000000/0x3000)=nil, &(0x7f0000ffe000/0x2000)=nil, &(0x7f0000000140), &(0x7f0000000240)) r9 = dup2(r6, r8) r10 = dup2(0xffffffffffffffff, r9) io_uring_enter(r10, 0x1739, 0x0, 0x0, 0x0, 0x0) 19:41:45 executing program 7: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000500100000f000000000000000000000004000000000002000020000020000000def4655fdef465", 0x33, 0x400}, {&(0x7f0000010100)="000000000000000000000000e58ca12e13a240e2b1a22f8d07e8e55f010040", 0x1f, 0x4e0}], 0x0, &(0x7f0000012b00)) [ 1839.757598] EXT4-fs (loop7): VFS: Can't find ext4 filesystem [ 1840.463737] EXT4-fs warning (device loop0): ext4_multi_mount_protect:324: MMP startup interrupted, failing mount [ 1840.463737] 19:41:56 executing program 5: r0 = syz_io_uring_setup(0x21, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, &(0x7f00000a0000)=nil, &(0x7f00000b0000)=nil, &(0x7f0000000180)=0x0, &(0x7f0000002a40)=0x0) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_io_uring_submit(r1, r2, &(0x7f0000000300)=@IORING_OP_OPENAT={0x12, 0x0, 0x0, 0xffffffffffffffff, 0x0, &(0x7f0000000100)='./cgroup/cgroup.procs/file0/../file0\x00'}, 0x0) io_uring_enter(r0, 0x76d3, 0x0, 0x0, 0x0, 0x0) r3 = syz_io_uring_setup(0x2, &(0x7f0000000500), &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000ff6000/0xa000)=nil, &(0x7f0000000080)=0x0, &(0x7f0000000140)=0x0) r6 = io_uring_setup(0x3ddf, &(0x7f0000000680)) syz_io_uring_submit(r4, r5, &(0x7f0000000800)=@IORING_OP_SENDMSG={0x9, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0}, 0x0) r7 = eventfd(0x0) io_uring_register$IORING_REGISTER_EVENTFD(r3, 0x4, &(0x7f0000000000)=r7, 0x1) read$eventfd(r7, &(0x7f0000000040), 0x8) r8 = syz_io_uring_setup(0x3702, &(0x7f00000001c0), &(0x7f0000000000/0x3000)=nil, &(0x7f0000ffe000/0x2000)=nil, &(0x7f0000000140), &(0x7f0000000240)) r9 = dup2(r6, r8) r10 = dup2(r3, r9) io_uring_enter(r10, 0x1739, 0x0, 0x0, 0x0, 0x0) 19:41:56 executing program 4: r0 = syz_io_uring_setup(0x21, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, &(0x7f00000a0000)=nil, &(0x7f00000b0000)=nil, &(0x7f0000000180)=0x0, &(0x7f0000002a40)=0x0) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_io_uring_submit(r1, r2, &(0x7f0000000300)=@IORING_OP_OPENAT={0x12, 0x0, 0x0, 0xffffffffffffffff, 0x0, &(0x7f0000000100)='./cgroup/cgroup.procs/file0/../file0\x00'}, 0x0) io_uring_enter(r0, 0x76d3, 0x0, 0x0, 0x0, 0x0) r3 = syz_io_uring_setup(0x2, &(0x7f0000000500), &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000ff6000/0xa000)=nil, &(0x7f0000000080)=0x0, &(0x7f0000000140)=0x0) r6 = io_uring_setup(0x3ddf, &(0x7f0000000680)) syz_io_uring_submit(r4, r5, &(0x7f0000000800)=@IORING_OP_SENDMSG={0x9, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0}, 0x0) r7 = eventfd(0x0) io_uring_register$IORING_REGISTER_EVENTFD(r3, 0x4, &(0x7f0000000000)=r7, 0x1) read$eventfd(r7, &(0x7f0000000040), 0x8) r8 = syz_io_uring_setup(0x3702, &(0x7f00000001c0), &(0x7f0000000000/0x3000)=nil, &(0x7f0000ffe000/0x2000)=nil, &(0x7f0000000140), &(0x7f0000000240)) r9 = dup2(r6, r8) r10 = dup2(r3, r9) io_uring_enter(r10, 0x1739, 0x0, 0x0, 0x0, 0x0) 19:41:56 executing program 0: r0 = syz_io_uring_setup(0x21, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, &(0x7f00000a0000)=nil, &(0x7f00000b0000)=nil, &(0x7f0000000180)=0x0, &(0x7f0000002a40)=0x0) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_io_uring_submit(r1, r2, &(0x7f0000000300)=@IORING_OP_OPENAT={0x12, 0x0, 0x0, 0xffffffffffffffff, 0x0, &(0x7f0000000100)='./cgroup/cgroup.procs/file0/../file0\x00'}, 0x0) io_uring_enter(r0, 0x76d3, 0x0, 0x0, 0x0, 0x0) r3 = syz_io_uring_setup(0x2, &(0x7f0000000500), &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000ff6000/0xa000)=nil, &(0x7f0000000080)=0x0, &(0x7f0000000140)=0x0) r6 = io_uring_setup(0x3ddf, &(0x7f0000000680)) syz_io_uring_submit(r4, r5, &(0x7f0000000800)=@IORING_OP_SENDMSG={0x9, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0}, 0x0) r7 = eventfd(0x0) io_uring_register$IORING_REGISTER_EVENTFD(r3, 0x4, &(0x7f0000000000)=r7, 0x1) read$eventfd(r7, &(0x7f0000000040), 0x8) r8 = syz_io_uring_setup(0x3702, &(0x7f00000001c0), &(0x7f0000000000/0x3000)=nil, &(0x7f0000ffe000/0x2000)=nil, &(0x7f0000000140), &(0x7f0000000240)) r9 = dup2(r6, r8) r10 = dup2(r3, r9) io_uring_enter(r10, 0x1739, 0x0, 0x0, 0x0, 0x0) 19:41:56 executing program 1: r0 = syz_io_uring_setup(0x2, &(0x7f0000000500), &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000ff6000/0xa000)=nil, &(0x7f0000000080)=0x0, &(0x7f0000000140)=0x0) r3 = io_uring_setup(0x3ddf, &(0x7f0000000680)) syz_io_uring_submit(r1, r2, &(0x7f0000000800)=@IORING_OP_SENDMSG={0x9, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0}, 0x0) r4 = eventfd(0x0) io_uring_register$IORING_REGISTER_EVENTFD(r0, 0x4, &(0x7f0000000000)=r4, 0x1) read$eventfd(r4, &(0x7f0000000040), 0x8) syz_io_uring_setup(0x3702, &(0x7f00000001c0), &(0x7f0000000000/0x3000)=nil, &(0x7f0000ffe000/0x2000)=nil, &(0x7f0000000140), &(0x7f0000000240)) r5 = dup2(r3, 0xffffffffffffffff) r6 = dup2(r0, r5) io_uring_enter(r6, 0x1739, 0x0, 0x0, 0x0, 0x0) 19:41:56 executing program 3: r0 = syz_io_uring_setup(0x21, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, &(0x7f00000a0000)=nil, &(0x7f00000b0000)=nil, &(0x7f0000000180)=0x0, &(0x7f0000002a40)=0x0) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_io_uring_submit(r1, r2, &(0x7f0000000300)=@IORING_OP_OPENAT={0x12, 0x0, 0x0, 0xffffffffffffffff, 0x0, &(0x7f0000000100)='./cgroup/cgroup.procs/file0/../file0\x00'}, 0x0) io_uring_enter(r0, 0x76d3, 0x0, 0x0, 0x0, 0x0) r3 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r4 = syz_genetlink_get_family_id$netlbl_cipso(&(0x7f0000000000), r3) r5 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NLBL_CIPSOV4_C_REMOVE(r5, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000080)={0x14, r4, 0x1}, 0x14}}, 0x0) r6 = io_uring_setup(0x3ddf, &(0x7f0000000680)) syz_io_uring_submit(0x0, 0x0, &(0x7f0000000800)=@IORING_OP_SENDMSG={0x9, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0}, 0x0) r7 = eventfd(0x0) io_uring_register$IORING_REGISTER_EVENTFD(0xffffffffffffffff, 0x4, &(0x7f0000000000)=r7, 0x1) read$eventfd(r7, &(0x7f0000000040), 0x8) r8 = syz_io_uring_setup(0x3702, &(0x7f00000001c0), &(0x7f0000000000/0x3000)=nil, &(0x7f0000ffe000/0x2000)=nil, &(0x7f0000000140), &(0x7f0000000240)) r9 = dup2(r6, r8) r10 = dup2(0xffffffffffffffff, r9) io_uring_enter(r10, 0x1739, 0x0, 0x0, 0x0, 0x0) 19:41:56 executing program 7: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000500100000f000000000000000000000004000000000002000020000020000000def4655fdef465", 0x33, 0x400}, {&(0x7f0000010100)="000000000000000000000000e58ca12e13a240e2b1a22f8d07e8e55f010040", 0x1f, 0x4e0}], 0x0, &(0x7f0000012b00)) 19:41:56 executing program 2: r0 = syz_io_uring_setup(0x2, &(0x7f0000000500), &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000ff6000/0xa000)=nil, &(0x7f0000000080)=0x0, &(0x7f0000000140)=0x0) r3 = io_uring_setup(0x3ddf, &(0x7f0000000680)) syz_io_uring_submit(r1, r2, &(0x7f0000000800)=@IORING_OP_SENDMSG={0x9, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0}, 0x0) r4 = eventfd(0x0) io_uring_register$IORING_REGISTER_EVENTFD(r0, 0x4, &(0x7f0000000000)=r4, 0x1) read$eventfd(r4, &(0x7f0000000040), 0x8) r5 = syz_io_uring_setup(0x0, &(0x7f00000001c0), &(0x7f0000000000/0x3000)=nil, &(0x7f0000ffe000/0x2000)=nil, &(0x7f0000000140), &(0x7f0000000240)) r6 = dup2(r3, r5) r7 = dup2(r0, r6) io_uring_enter(r7, 0x1739, 0x0, 0x0, 0x0, 0x0) 19:41:56 executing program 6: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000500100000f000000000000000000000004000000000002000020000020000000def4655fdef4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000008000000018000000c20500002b0200000000000000000000000000000000000073797a6b616c6c6572000000000000002f746d702f73797a2d696d61676567656e35373134333434333800"/192, 0xc0, 0x400}, {&(0x7f0000010100)="000000000000000000000000e58ca12e13a240e2b1a22f8d07e8e55f010040000c00000000000000ddf4655f00"/64, 0x40, 0x4e0}, {&(0x7f0000010200)="0100000000000500400000000000000000000000000000003400000000000000", 0x20, 0x560}, {&(0x7f0000010300)="03000000040000000500000015000f0003000400"/32, 0x20, 0x800}, {0x0}], 0x0, &(0x7f0000012b00)) [ 1851.555122] EXT4-fs (loop7): VFS: Can't find ext4 filesystem 19:41:56 executing program 7: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000500100000f000000000000000000000004000000000002000020000020000000def4655fdef4655f0100ffff53", 0x39, 0x400}, {&(0x7f0000010100)="000000000000000000000000e58ca12e13a240e2b1a22f8d07e8e55f010040", 0x1f, 0x4e0}], 0x0, &(0x7f0000012b00)) [ 1851.584857] EXT4-fs (loop6): bad geometry: block count 512 exceeds size of device (4 blocks) [ 1851.596224] EXT4-fs (loop7): VFS: Can't find ext4 filesystem 19:41:57 executing program 6: r0 = syz_io_uring_setup(0x21, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, &(0x7f00000a0000)=nil, &(0x7f00000b0000)=nil, &(0x7f0000000180)=0x0, &(0x7f0000002a40)=0x0) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_io_uring_submit(r1, r2, &(0x7f0000000300)=@IORING_OP_OPENAT={0x12, 0x0, 0x0, 0xffffffffffffffff, 0x0, &(0x7f0000000100)='./cgroup/cgroup.procs/file0/../file0\x00'}, 0x0) io_uring_enter(r0, 0x76d3, 0x0, 0x0, 0x0, 0x0) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r3 = syz_io_uring_setup(0x2, &(0x7f0000000500), &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000ff6000/0xa000)=nil, &(0x7f0000000080)=0x0, &(0x7f0000000140)=0x0) r6 = io_uring_setup(0x3ddf, &(0x7f0000000680)) syz_io_uring_submit(r4, r5, &(0x7f0000000800)=@IORING_OP_SENDMSG={0x9, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0}, 0x0) r7 = eventfd(0x0) io_uring_register$IORING_REGISTER_EVENTFD(r3, 0x4, &(0x7f0000000000)=r7, 0x1) read$eventfd(r7, &(0x7f0000000040), 0x8) r8 = syz_io_uring_setup(0x3702, &(0x7f00000001c0), &(0x7f0000000000/0x3000)=nil, &(0x7f0000ffe000/0x2000)=nil, &(0x7f0000000140), &(0x7f0000000240)) r9 = dup2(r6, r8) r10 = dup2(r3, r9) io_uring_enter(r10, 0x1739, 0x0, 0x0, 0x0, 0x0) 19:41:57 executing program 7: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000500100000f000000000000000000000004000000000002000020000020000000def4655fdef4655f0100ffff53", 0x39, 0x400}, {&(0x7f0000010100)="000000000000000000000000e58ca12e13a240e2b1a22f8d07e8e55f010040", 0x1f, 0x4e0}], 0x0, &(0x7f0000012b00)) 19:42:10 executing program 7: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000500100000f000000000000000000000004000000000002000020000020000000def4655fdef4655f0100ffff53", 0x39, 0x400}, {&(0x7f0000010100)="000000000000000000000000e58ca12e13a240e2b1a22f8d07e8e55f010040", 0x1f, 0x4e0}], 0x0, &(0x7f0000012b00)) 19:42:10 executing program 4: r0 = syz_io_uring_setup(0x21, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, &(0x7f00000a0000)=nil, &(0x7f00000b0000)=nil, &(0x7f0000000180)=0x0, &(0x7f0000002a40)=0x0) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_io_uring_submit(r1, r2, &(0x7f0000000300)=@IORING_OP_OPENAT={0x12, 0x0, 0x0, 0xffffffffffffffff, 0x0, &(0x7f0000000100)='./cgroup/cgroup.procs/file0/../file0\x00'}, 0x0) io_uring_enter(r0, 0x76d3, 0x0, 0x0, 0x0, 0x0) r3 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r4 = syz_genetlink_get_family_id$netlbl_cipso(&(0x7f0000000000), r3) r5 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NLBL_CIPSOV4_C_REMOVE(r5, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000080)={0x14, r4, 0x1}, 0x14}}, 0x0) r6 = io_uring_setup(0x3ddf, &(0x7f0000000680)) syz_io_uring_submit(0x0, 0x0, &(0x7f0000000800)=@IORING_OP_SENDMSG={0x9, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0}, 0x0) r7 = eventfd(0x0) io_uring_register$IORING_REGISTER_EVENTFD(0xffffffffffffffff, 0x4, &(0x7f0000000000)=r7, 0x1) read$eventfd(r7, &(0x7f0000000040), 0x8) r8 = syz_io_uring_setup(0x3702, &(0x7f00000001c0), &(0x7f0000000000/0x3000)=nil, &(0x7f0000ffe000/0x2000)=nil, &(0x7f0000000140), &(0x7f0000000240)) r9 = dup2(r6, r8) r10 = dup2(0xffffffffffffffff, r9) io_uring_enter(r10, 0x1739, 0x0, 0x0, 0x0, 0x0) 19:42:10 executing program 2: r0 = syz_io_uring_setup(0x2, &(0x7f0000000500), &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000ff6000/0xa000)=nil, &(0x7f0000000080)=0x0, &(0x7f0000000140)=0x0) r3 = io_uring_setup(0x3ddf, &(0x7f0000000680)) syz_io_uring_submit(r1, r2, &(0x7f0000000800)=@IORING_OP_SENDMSG={0x9, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0}, 0x0) r4 = eventfd(0x0) io_uring_register$IORING_REGISTER_EVENTFD(r0, 0x4, &(0x7f0000000000)=r4, 0x1) read$eventfd(r4, &(0x7f0000000040), 0x8) r5 = syz_io_uring_setup(0x0, &(0x7f00000001c0), &(0x7f0000000000/0x3000)=nil, &(0x7f0000ffe000/0x2000)=nil, &(0x7f0000000140), &(0x7f0000000240)) r6 = dup2(r3, r5) r7 = dup2(r0, r6) io_uring_enter(r7, 0x1739, 0x0, 0x0, 0x0, 0x0) 19:42:10 executing program 1: r0 = syz_io_uring_setup(0x2, &(0x7f0000000500), &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000ff6000/0xa000)=nil, &(0x7f0000000080)=0x0, &(0x7f0000000140)=0x0) r3 = io_uring_setup(0x3ddf, &(0x7f0000000680)) syz_io_uring_submit(r1, r2, &(0x7f0000000800)=@IORING_OP_SENDMSG={0x9, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0}, 0x0) r4 = eventfd(0x0) io_uring_register$IORING_REGISTER_EVENTFD(r0, 0x4, &(0x7f0000000000)=r4, 0x1) read$eventfd(r4, &(0x7f0000000040), 0x8) syz_io_uring_setup(0x3702, &(0x7f00000001c0), &(0x7f0000000000/0x3000)=nil, &(0x7f0000ffe000/0x2000)=nil, &(0x7f0000000140), &(0x7f0000000240)) r5 = dup2(r3, 0xffffffffffffffff) r6 = dup2(r0, r5) io_uring_enter(r6, 0x1739, 0x0, 0x0, 0x0, 0x0) 19:42:10 executing program 0: r0 = syz_io_uring_setup(0x21, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, &(0x7f00000a0000)=nil, &(0x7f00000b0000)=nil, &(0x7f0000000180)=0x0, &(0x7f0000002a40)=0x0) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_io_uring_submit(r1, r2, &(0x7f0000000300)=@IORING_OP_OPENAT={0x12, 0x0, 0x0, 0xffffffffffffffff, 0x0, &(0x7f0000000100)='./cgroup/cgroup.procs/file0/../file0\x00'}, 0x0) io_uring_enter(r0, 0x76d3, 0x0, 0x0, 0x0, 0x0) r3 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$netlbl_cipso(&(0x7f0000000000), r3) r4 = syz_io_uring_setup(0x2, &(0x7f0000000500), &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000ff6000/0xa000)=nil, &(0x7f0000000080)=0x0, &(0x7f0000000140)=0x0) r7 = io_uring_setup(0x3ddf, &(0x7f0000000680)) syz_io_uring_submit(r5, r6, &(0x7f0000000800)=@IORING_OP_SENDMSG={0x9, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0}, 0x0) r8 = eventfd(0x0) io_uring_register$IORING_REGISTER_EVENTFD(r4, 0x4, &(0x7f0000000000)=r8, 0x1) read$eventfd(r8, &(0x7f0000000040), 0x8) r9 = syz_io_uring_setup(0x3702, &(0x7f00000001c0), &(0x7f0000000000/0x3000)=nil, &(0x7f0000ffe000/0x2000)=nil, &(0x7f0000000140), &(0x7f0000000240)) r10 = dup2(r7, r9) r11 = dup2(r4, r10) io_uring_enter(r11, 0x1739, 0x0, 0x0, 0x0, 0x0) 19:42:10 executing program 6: r0 = syz_io_uring_setup(0x21, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, &(0x7f00000a0000)=nil, &(0x7f00000b0000)=nil, &(0x7f0000000180)=0x0, &(0x7f0000002a40)=0x0) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_io_uring_submit(r1, r2, &(0x7f0000000300)=@IORING_OP_OPENAT={0x12, 0x0, 0x0, 0xffffffffffffffff, 0x0, &(0x7f0000000100)='./cgroup/cgroup.procs/file0/../file0\x00'}, 0x0) io_uring_enter(r0, 0x76d3, 0x0, 0x0, 0x0, 0x0) r3 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$netlbl_cipso(&(0x7f0000000000), r3) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r4 = syz_io_uring_setup(0x2, &(0x7f0000000500), &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000ff6000/0xa000)=nil, &(0x7f0000000080)=0x0, &(0x7f0000000140)=0x0) r7 = io_uring_setup(0x3ddf, &(0x7f0000000680)) syz_io_uring_submit(r5, r6, &(0x7f0000000800)=@IORING_OP_SENDMSG={0x9, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0}, 0x0) r8 = eventfd(0x0) io_uring_register$IORING_REGISTER_EVENTFD(r4, 0x4, &(0x7f0000000000)=r8, 0x1) read$eventfd(r8, &(0x7f0000000040), 0x8) r9 = syz_io_uring_setup(0x3702, &(0x7f00000001c0), &(0x7f0000000000/0x3000)=nil, &(0x7f0000ffe000/0x2000)=nil, &(0x7f0000000140), &(0x7f0000000240)) r10 = dup2(r7, r9) r11 = dup2(r4, r10) io_uring_enter(r11, 0x1739, 0x0, 0x0, 0x0, 0x0) 19:42:10 executing program 3: r0 = syz_io_uring_setup(0x21, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, &(0x7f00000a0000)=nil, &(0x7f00000b0000)=nil, &(0x7f0000000180)=0x0, &(0x7f0000002a40)=0x0) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_io_uring_submit(r1, r2, &(0x7f0000000300)=@IORING_OP_OPENAT={0x12, 0x0, 0x0, 0xffffffffffffffff, 0x0, &(0x7f0000000100)='./cgroup/cgroup.procs/file0/../file0\x00'}, 0x0) io_uring_enter(r0, 0x76d3, 0x0, 0x0, 0x0, 0x0) r3 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r4 = syz_genetlink_get_family_id$netlbl_cipso(&(0x7f0000000000), r3) r5 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NLBL_CIPSOV4_C_REMOVE(r5, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000080)={0x14, r4, 0x1}, 0x14}}, 0x0) r6 = syz_io_uring_setup(0x2, &(0x7f0000000500), &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000ff6000/0xa000)=nil, &(0x7f0000000080)=0x0, &(0x7f0000000140)=0x0) syz_io_uring_submit(r7, r8, &(0x7f0000000800)=@IORING_OP_SENDMSG={0x9, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0}, 0x0) r9 = eventfd(0x0) io_uring_register$IORING_REGISTER_EVENTFD(r6, 0x4, &(0x7f0000000000)=r9, 0x1) read$eventfd(r9, &(0x7f0000000040), 0x8) r10 = syz_io_uring_setup(0x3702, &(0x7f00000001c0), &(0x7f0000000000/0x3000)=nil, &(0x7f0000ffe000/0x2000)=nil, &(0x7f0000000140), &(0x7f0000000240)) r11 = dup2(0xffffffffffffffff, r10) r12 = dup2(r6, r11) io_uring_enter(r12, 0x1739, 0x0, 0x0, 0x0, 0x0) 19:42:10 executing program 5: r0 = syz_io_uring_setup(0x21, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, &(0x7f00000a0000)=nil, &(0x7f00000b0000)=nil, &(0x7f0000000180)=0x0, &(0x7f0000002a40)=0x0) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_io_uring_submit(r1, r2, &(0x7f0000000300)=@IORING_OP_OPENAT={0x12, 0x0, 0x0, 0xffffffffffffffff, 0x0, &(0x7f0000000100)='./cgroup/cgroup.procs/file0/../file0\x00'}, 0x0) io_uring_enter(r0, 0x76d3, 0x0, 0x0, 0x0, 0x0) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r3 = syz_io_uring_setup(0x2, &(0x7f0000000500), &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000ff6000/0xa000)=nil, &(0x7f0000000080)=0x0, &(0x7f0000000140)=0x0) r6 = io_uring_setup(0x3ddf, &(0x7f0000000680)) syz_io_uring_submit(r4, r5, &(0x7f0000000800)=@IORING_OP_SENDMSG={0x9, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0}, 0x0) r7 = eventfd(0x0) io_uring_register$IORING_REGISTER_EVENTFD(r3, 0x4, &(0x7f0000000000)=r7, 0x1) read$eventfd(r7, &(0x7f0000000040), 0x8) r8 = syz_io_uring_setup(0x3702, &(0x7f00000001c0), &(0x7f0000000000/0x3000)=nil, &(0x7f0000ffe000/0x2000)=nil, &(0x7f0000000140), &(0x7f0000000240)) r9 = dup2(r6, r8) r10 = dup2(r3, r9) io_uring_enter(r10, 0x1739, 0x0, 0x0, 0x0, 0x0) [ 1864.744244] EXT4-fs (loop7): VFS: Can't find ext4 filesystem 19:42:10 executing program 7: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000500100000f000000000000000000000004000000000002000020000020000000def4655fdef4655f0100ffff53ef0100", 0x3c, 0x400}, {&(0x7f0000010100)="000000000000000000000000e58ca12e13a240e2b1a22f8d07e8e55f010040", 0x1f, 0x4e0}], 0x0, &(0x7f0000012b00)) [ 1864.829845] EXT4-fs (loop7): fragment/cluster size (16384) != block size (1024) 19:42:10 executing program 7: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000500100000f000000000000000000000004000000000002000020000020000000def4655fdef4655f0100ffff53", 0x39, 0x400}, {&(0x7f0000010100)="000000000000000000000000e58ca12e13a240e2b1a22f8d07e8e55f010040", 0x1f, 0x4e0}], 0x0, &(0x7f0000012b00)) [ 1864.901563] EXT4-fs (loop7): VFS: Can't find ext4 filesystem 19:42:10 executing program 0: r0 = syz_io_uring_setup(0x2, &(0x7f0000000500), &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000ff6000/0xa000)=nil, &(0x7f0000000080)=0x0, &(0x7f0000000140)=0x0) r3 = io_uring_setup(0x3ddf, &(0x7f0000000680)) syz_io_uring_submit(r1, r2, &(0x7f0000000800)=@IORING_OP_SENDMSG={0x9, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0}, 0x0) r4 = eventfd(0x0) io_uring_register$IORING_REGISTER_EVENTFD(r0, 0x4, &(0x7f0000000000)=r4, 0x1) read$eventfd(r4, &(0x7f0000000040), 0x8) r5 = syz_io_uring_setup(0x0, &(0x7f00000001c0), &(0x7f0000000000/0x3000)=nil, &(0x7f0000ffe000/0x2000)=nil, &(0x7f0000000140), &(0x7f0000000240)) r6 = dup2(r3, r5) r7 = dup2(r0, r6) io_uring_enter(r7, 0x1739, 0x0, 0x0, 0x0, 0x0) 19:42:10 executing program 6: r0 = syz_io_uring_setup(0x2, &(0x7f0000000500), &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000ff6000/0xa000)=nil, &(0x7f0000000080)=0x0, &(0x7f0000000140)=0x0) r3 = io_uring_setup(0x3ddf, &(0x7f0000000680)) syz_io_uring_submit(r1, r2, &(0x7f0000000800)=@IORING_OP_SENDMSG={0x9, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0}, 0x0) r4 = eventfd(0x0) io_uring_register$IORING_REGISTER_EVENTFD(r0, 0x4, &(0x7f0000000000)=r4, 0x1) read$eventfd(r4, &(0x7f0000000040), 0x8) syz_io_uring_setup(0x3702, &(0x7f00000001c0), &(0x7f0000000000/0x3000)=nil, &(0x7f0000ffe000/0x2000)=nil, &(0x7f0000000140), &(0x7f0000000240)) r5 = dup2(r3, 0xffffffffffffffff) r6 = dup2(r0, r5) io_uring_enter(r6, 0x1739, 0x0, 0x0, 0x0, 0x0) 19:42:10 executing program 5: r0 = semget$private(0x0, 0x4, 0x45a) semctl$SETALL(r0, 0x0, 0x11, &(0x7f0000000040)=[0x8000]) r1 = semget$private(0x0, 0x4000, 0x0) semctl$SEM_STAT(r1, 0x0, 0x12, &(0x7f00000000c0)=""/148) semctl$IPC_RMID(r1, 0x0, 0x0) 19:42:10 executing program 7: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000500100000f000000000000000000000004000000000002000020000020000000def4655fdef4655f0100ffff53", 0x39, 0x400}, {&(0x7f0000010100)="000000000000000000000000e58ca12e13a240e2b1a22f8d07e8e55f010040", 0x1f, 0x4e0}], 0x0, &(0x7f0000012b00)) [ 1864.973264] EXT4-fs (loop7): VFS: Can't find ext4 filesystem 19:42:10 executing program 7: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000500100000f000000000000000000000004000000000002000020000020000000def4655fdef4655f0100ffff53", 0x39, 0x400}, {&(0x7f0000010100)="000000000000000000000000e58ca12e13a240e2b1a22f8d07e8e55f010040", 0x1f, 0x4e0}], 0x0, &(0x7f0000012b00)) 19:42:10 executing program 5: r0 = syz_io_uring_setup(0x21, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, &(0x7f00000a0000)=nil, &(0x7f00000b0000)=nil, &(0x7f0000000180)=0x0, &(0x7f0000002a40)=0x0) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_io_uring_submit(r1, r2, &(0x7f0000000300)=@IORING_OP_OPENAT={0x12, 0x0, 0x0, 0xffffffffffffffff, 0x0, &(0x7f0000000100)='./cgroup/cgroup.procs/file0/../file0\x00'}, 0x0) io_uring_enter(r0, 0x76d3, 0x0, 0x0, 0x0, 0x0) r3 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r4 = syz_genetlink_get_family_id$netlbl_cipso(&(0x7f0000000000), r3) r5 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NLBL_CIPSOV4_C_REMOVE(r5, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000080)={0x14, r4, 0x1}, 0x14}}, 0x0) r6 = io_uring_setup(0x3ddf, &(0x7f0000000680)) syz_io_uring_submit(0x0, 0x0, &(0x7f0000000800)=@IORING_OP_SENDMSG={0x9, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0}, 0x0) r7 = eventfd(0x0) io_uring_register$IORING_REGISTER_EVENTFD(0xffffffffffffffff, 0x4, &(0x7f0000000000)=r7, 0x1) read$eventfd(r7, &(0x7f0000000040), 0x8) r8 = syz_io_uring_setup(0x3702, &(0x7f00000001c0), &(0x7f0000000000/0x3000)=nil, &(0x7f0000ffe000/0x2000)=nil, &(0x7f0000000140), &(0x7f0000000240)) r9 = dup2(r6, r8) r10 = dup2(0xffffffffffffffff, r9) io_uring_enter(r10, 0x1739, 0x0, 0x0, 0x0, 0x0) [ 1865.027619] EXT4-fs (loop7): VFS: Can't find ext4 filesystem 19:42:10 executing program 7: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000500100000f000000000000000000000004000000000002000020000020000000def4655fdef4655f0100ffff53ef01", 0x3b, 0x400}, {&(0x7f0000010100)="000000000000000000000000e58ca12e13a240e2b1a22f8d07e8e55f010040", 0x1f, 0x4e0}], 0x0, &(0x7f0000012b00)) [ 1865.083999] EXT4-fs (loop7): fragment/cluster size (16384) != block size (1024) 19:42:11 executing program 4: semctl$SETALL(0x0, 0x0, 0x11, &(0x7f0000000040)=[0x8000]) r0 = semget(0x3, 0x2, 0x2) semctl$SETALL(r0, 0x0, 0x11, &(0x7f0000000080)=[0x5, 0xffff, 0x138, 0x5, 0x6, 0x7]) semop(0x0, &(0x7f0000000000)=[{0x4, 0xa0d, 0x800}, {0x4, 0x8000}, {0x2, 0x8000}, {0x3, 0xfa2b, 0x2800}, {0x4, 0x100, 0x1000}, {0x1, 0x557b, 0x1000}], 0x6) r1 = semget$private(0x0, 0x4000, 0x0) semctl$SEM_STAT(r1, 0x0, 0x12, &(0x7f00000000c0)=""/148) semop(r1, &(0x7f00000000c0)=[{0x2, 0x6, 0x800}, {0x1, 0x7fff, 0x1000}, {0x3, 0xffff, 0x1000}, {0x2, 0x8001, 0x1800}, {0x4, 0x8, 0x1000}, {0x3, 0x1ff, 0x1800}, {0x0, 0x7, 0x800}], 0x7) 19:42:11 executing program 7: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000500100000f000000000000000000000004000000000002000020000020000000def4655fdef4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000010100)="000000000000000000000000e58ca12e13a240e2b1a22f8d07e8e55f010040", 0x1f, 0x4e0}], 0x0, &(0x7f0000012b00)) 19:42:11 executing program 2: r0 = syz_io_uring_setup(0x2, &(0x7f0000000500), &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000ff6000/0xa000)=nil, &(0x7f0000000080)=0x0, &(0x7f0000000140)=0x0) r3 = io_uring_setup(0x3ddf, &(0x7f0000000680)) syz_io_uring_submit(r1, r2, &(0x7f0000000800)=@IORING_OP_SENDMSG={0x9, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0}, 0x0) r4 = eventfd(0x0) io_uring_register$IORING_REGISTER_EVENTFD(r0, 0x4, &(0x7f0000000000)=r4, 0x1) read$eventfd(r4, &(0x7f0000000040), 0x8) r5 = syz_io_uring_setup(0x3702, 0x0, &(0x7f0000000000/0x3000)=nil, &(0x7f0000ffe000/0x2000)=nil, &(0x7f0000000140), &(0x7f0000000240)) r6 = dup2(r3, r5) r7 = dup2(r0, r6) io_uring_enter(r7, 0x1739, 0x0, 0x0, 0x0, 0x0) 19:42:11 executing program 1: r0 = syz_io_uring_setup(0x2, &(0x7f0000000500), &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000ff6000/0xa000)=nil, &(0x7f0000000080)=0x0, &(0x7f0000000140)=0x0) r3 = io_uring_setup(0x3ddf, &(0x7f0000000680)) syz_io_uring_submit(r1, r2, &(0x7f0000000800)=@IORING_OP_SENDMSG={0x9, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0}, 0x0) r4 = eventfd(0x0) io_uring_register$IORING_REGISTER_EVENTFD(r0, 0x4, &(0x7f0000000000)=r4, 0x1) read$eventfd(r4, &(0x7f0000000040), 0x8) syz_io_uring_setup(0x3702, &(0x7f00000001c0), &(0x7f0000000000/0x3000)=nil, &(0x7f0000ffe000/0x2000)=nil, &(0x7f0000000140), &(0x7f0000000240)) r5 = dup2(r3, 0xffffffffffffffff) r6 = dup2(r0, r5) io_uring_enter(r6, 0x1739, 0x0, 0x0, 0x0, 0x0) 19:42:11 executing program 3: r0 = semget$private(0x0, 0x1, 0x8) semctl$SETALL(r0, 0x0, 0x11, &(0x7f0000000040)=[0x8000]) r1 = semget(0x1, 0x3, 0xb4) semctl$IPC_INFO(r1, 0x2, 0x3, &(0x7f0000000180)=""/89) r2 = semget$private(0x0, 0x4000, 0x0) semctl$SEM_STAT(r2, 0x0, 0x12, &(0x7f00000000c0)=""/148) semctl$SEM_INFO(r2, 0x0, 0x13, &(0x7f0000000200)=""/99) r3 = semget$private(0x0, 0x4000, 0x0) semctl$SEM_STAT(r3, 0x0, 0x12, &(0x7f00000000c0)=""/148) semctl$GETPID(r3, 0x0, 0xb, &(0x7f0000000080)=""/133) [ 1865.659457] EXT4-fs (loop7): fragment/cluster size (16384) != block size (1024) 19:42:11 executing program 3: r0 = semget$private(0x0, 0x4, 0x2) semctl$SETALL(r0, 0x0, 0x11, &(0x7f0000000040)) r1 = semget$private(0x0, 0x4000, 0x0) semctl$SEM_STAT(r1, 0x0, 0x12, &(0x7f00000000c0)=""/148) semtimedop(r1, &(0x7f0000000040)=[{0x1, 0x3f, 0x1000}, {0x4, 0x82f4, 0x1800}], 0x2, &(0x7f0000000100)={0x0, 0x989680}) semctl$GETPID(r0, 0x3, 0xb, &(0x7f0000000000)=""/63) semctl$GETPID(r0, 0x1, 0xb, &(0x7f0000000080)=""/119) 19:42:11 executing program 4: semctl$SETALL(0x0, 0x0, 0x11, &(0x7f0000000040)=[0x8000]) r0 = semget(0x3, 0x2, 0x2) semctl$SETALL(r0, 0x0, 0x11, &(0x7f0000000080)=[0x5, 0xffff, 0x138, 0x5, 0x6, 0x7]) semop(0x0, &(0x7f0000000000)=[{0x4, 0xa0d, 0x800}, {0x4, 0x8000}, {0x2, 0x8000}, {0x3, 0xfa2b, 0x2800}, {0x4, 0x100, 0x1000}, {0x1, 0x557b, 0x1000}], 0x6) r1 = semget$private(0x0, 0x4000, 0x0) semctl$SEM_STAT(r1, 0x0, 0x12, &(0x7f00000000c0)=""/148) semop(r1, &(0x7f00000000c0)=[{0x2, 0x6, 0x800}, {0x1, 0x7fff, 0x1000}, {0x3, 0xffff, 0x1000}, {0x2, 0x8001, 0x1800}, {0x4, 0x8, 0x1000}, {0x3, 0x1ff, 0x1800}, {0x0, 0x7, 0x800}], 0x7) 19:42:11 executing program 7: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000500100000f000000000000000000000004000000000002000020000020000000def4655fdef4655f0100ffff53", 0x39, 0x400}, {&(0x7f0000010100)="000000000000000000000000e58ca12e13a240e2b1a22f8d07e8e55f010040", 0x1f, 0x4e0}], 0x0, &(0x7f0000012b00)) 19:42:11 executing program 3: r0 = syz_io_uring_setup(0x21, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, &(0x7f00000a0000)=nil, &(0x7f00000b0000)=nil, &(0x7f0000000180)=0x0, &(0x7f0000002a40)=0x0) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_io_uring_submit(r1, r2, &(0x7f0000000300)=@IORING_OP_OPENAT={0x12, 0x0, 0x0, 0xffffffffffffffff, 0x0, &(0x7f0000000100)='./cgroup/cgroup.procs/file0/../file0\x00'}, 0x0) io_uring_enter(r0, 0x76d3, 0x0, 0x0, 0x0, 0x0) r3 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r4 = syz_genetlink_get_family_id$netlbl_cipso(&(0x7f0000000000), r3) r5 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NLBL_CIPSOV4_C_REMOVE(r5, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000080)={0x14, r4, 0x1}, 0x14}}, 0x0) r6 = syz_io_uring_setup(0x2, &(0x7f0000000500), &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000ff6000/0xa000)=nil, &(0x7f0000000080), &(0x7f0000000140)) r7 = io_uring_setup(0x3ddf, &(0x7f0000000680)) r8 = eventfd(0x0) io_uring_register$IORING_REGISTER_EVENTFD(r6, 0x4, &(0x7f0000000000)=r8, 0x1) read$eventfd(r8, &(0x7f0000000040), 0x8) r9 = syz_io_uring_setup(0x3702, &(0x7f00000001c0), &(0x7f0000000000/0x3000)=nil, &(0x7f0000ffe000/0x2000)=nil, &(0x7f0000000140), &(0x7f0000000240)) r10 = dup2(r7, r9) r11 = dup2(r6, r10) io_uring_enter(r11, 0x1739, 0x0, 0x0, 0x0, 0x0) [ 1865.766431] EXT4-fs (loop7): VFS: Can't find ext4 filesystem 19:42:11 executing program 0: r0 = syz_io_uring_setup(0x21, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, &(0x7f00000a0000)=nil, &(0x7f00000b0000)=nil, &(0x7f0000000180)=0x0, &(0x7f0000002a40)=0x0) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_io_uring_submit(r1, r2, &(0x7f0000000300)=@IORING_OP_OPENAT={0x12, 0x0, 0x0, 0xffffffffffffffff, 0x0, &(0x7f0000000100)='./cgroup/cgroup.procs/file0/../file0\x00'}, 0x0) io_uring_enter(r0, 0x76d3, 0x0, 0x0, 0x0, 0x0) r3 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r4 = syz_genetlink_get_family_id$netlbl_cipso(&(0x7f0000000000), r3) r5 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NLBL_CIPSOV4_C_REMOVE(r5, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000080)={0x14, r4, 0x1}, 0x14}}, 0x0) r6 = syz_io_uring_setup(0x2, &(0x7f0000000500), &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000ff6000/0xa000)=nil, &(0x7f0000000080)=0x0, &(0x7f0000000140)=0x0) syz_io_uring_submit(r7, r8, &(0x7f0000000800)=@IORING_OP_SENDMSG={0x9, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0}, 0x0) r9 = eventfd(0x0) io_uring_register$IORING_REGISTER_EVENTFD(r6, 0x4, &(0x7f0000000000)=r9, 0x1) read$eventfd(r9, &(0x7f0000000040), 0x8) r10 = syz_io_uring_setup(0x3702, &(0x7f00000001c0), &(0x7f0000000000/0x3000)=nil, &(0x7f0000ffe000/0x2000)=nil, &(0x7f0000000140), &(0x7f0000000240)) r11 = dup2(0xffffffffffffffff, r10) r12 = dup2(r6, r11) io_uring_enter(r12, 0x1739, 0x0, 0x0, 0x0, 0x0) 19:42:11 executing program 6: syz_mount_image$ext4(0x0, &(0x7f0000000180)='./file0\x00', 0x0, 0x8, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000500100000f000000000000000000000004000000000002000020000020000000def4655fdef4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000008000000018000000c20500002b0200000000000000000000000000000000000073797a6b616c6c6572000000000000002f746d702f73797a2d696d61676567656e35373134333434333800"/192, 0xc0, 0x400}, {&(0x7f0000010100)="000000000000000000000000e58ca12e13a240e2b1a22f8d07e8e55f010040000c00000000000000ddf4655f00"/64, 0x40, 0x4e0}, {&(0x7f0000010200)="0100000000000500400000000000000000000000000000003400000000000000", 0x20, 0x560}, {&(0x7f0000010300)="03000000040000000500000015000f0003000400"/32, 0x20, 0x800}, {&(0x7f0000010400)="ff070000ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff0100ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff0000000000000000ddf4655fddf4655fddf4655f00"/2080, 0x820, 0x1000000000c00}, {&(0x7f0000010d00)="ed41000000040000ddf4655fdef4655fdef4655f00000000000004002000000000000800050000000af301000400000000000000000000000100000010000000", 0x40, 0x1481}, {&(0x7f0000000300)="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", 0x204, 0x1980}, {&(0x7f0000011300)="020000000c0001022e000000020000000c0002022e2e00000b00000014000a026c6f73742b666f756e6400000c0000001000050266696c65300000000f0000001000050166696c6531", 0x49, 0x4000}], 0x0, &(0x7f0000012b00)) 19:42:11 executing program 4: semctl$SETALL(0x0, 0x0, 0x11, &(0x7f0000000040)=[0x8000]) r0 = semget(0x3, 0x2, 0x2) semctl$SETALL(r0, 0x0, 0x11, &(0x7f0000000080)=[0x5, 0xffff, 0x138, 0x5, 0x6, 0x7]) semop(0x0, &(0x7f0000000000)=[{0x4, 0xa0d, 0x800}, {0x4, 0x8000}, {0x2, 0x8000}, {0x3, 0xfa2b, 0x2800}, {0x4, 0x100, 0x1000}, {0x1, 0x557b, 0x1000}], 0x6) r1 = semget$private(0x0, 0x4000, 0x0) semctl$SEM_STAT(r1, 0x0, 0x12, &(0x7f00000000c0)=""/148) semop(r1, &(0x7f00000000c0)=[{0x2, 0x6, 0x800}, {0x1, 0x7fff, 0x1000}, {0x3, 0xffff, 0x1000}, {0x2, 0x8001, 0x1800}, {0x4, 0x8, 0x1000}, {0x3, 0x1ff, 0x1800}, {0x0, 0x7, 0x800}], 0x7) 19:42:11 executing program 7: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000500100000f000000000000000000000004000000000002000020000020000000def4655fdef4655f0100ffff53", 0x39, 0x400}, {&(0x7f0000010100)="000000000000000000000000e58ca12e13a240e2b1a22f8d07e8e55f010040", 0x1f, 0x4e0}], 0x0, &(0x7f0000012b00)) [ 1865.897252] EXT4-fs (loop7): VFS: Can't find ext4 filesystem 19:42:23 executing program 7: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000500100000f000000000000000000000004000000000002000020000020000000def4655fdef4655f0100ffff53", 0x39, 0x400}, {&(0x7f0000010100)="000000000000000000000000e58ca12e13a240e2b1a22f8d07e8e55f010040", 0x1f, 0x4e0}], 0x0, &(0x7f0000012b00)) 19:42:23 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x9, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000500100000f000000000000000000000004000000000002000020000020000000def4655fdef4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000008000000018000000c20500002b0200000000000000000000000000000000000073797a6b616c6c6572000000000000002f746d702f73797a2d696d61676567656e35373134333434333800"/192, 0xc0, 0x400}, {&(0x7f0000010100)="000000000000000000000000e58ca12e13a240e2b1a22f8d07e8e55f010040000c00000000000000ddf4655f00"/64, 0x40, 0x4e0}, {&(0x7f0000010200)="0100000000000500400000000000000000000000000000003400000000000000", 0x20, 0x560}, {&(0x7f0000010300)="03000000040000000500000015000f0003000400"/32, 0x20, 0x800}, {&(0x7f0000010400)="ff070000ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff0100ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff0000000000000000ddf4655fddf4655fddf4655f00"/2080, 0x820, 0x1000000000c00}, {&(0x7f0000010d00)="ed41000000040000ddf4655fdef4655fdef4655f00000000000004002000000000000800050000000af301000400000000000000000000000100000010000000", 0x40, 0x1481}, {&(0x7f0000000300)="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", 0x204, 0x1980}, {&(0x7f0000011300)="020000000c0001022e000000020000000c0002022e2e00000b00000014000a026c6f73742b666f756e6400000c0000001000050266696c65300000000f0000001000050166696c6531", 0x49, 0x4000}, {0x0, 0x0, 0x10000}], 0x0, &(0x7f0000012b00)) 19:42:23 executing program 0: semctl$SETALL(0x0, 0x0, 0x11, &(0x7f0000000000)=[0x8000, 0x3, 0x0]) r0 = semget(0x2, 0x1, 0x13) semctl$SETVAL(r0, 0x2, 0x10, &(0x7f0000000040)=0xc6f) 19:42:23 executing program 3: r0 = syz_io_uring_setup(0x21, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, &(0x7f00000a0000)=nil, &(0x7f00000b0000)=nil, &(0x7f0000000180)=0x0, &(0x7f0000002a40)=0x0) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_io_uring_submit(r1, r2, &(0x7f0000000300)=@IORING_OP_OPENAT={0x12, 0x0, 0x0, 0xffffffffffffffff, 0x0, &(0x7f0000000100)='./cgroup/cgroup.procs/file0/../file0\x00'}, 0x0) io_uring_enter(r0, 0x76d3, 0x0, 0x0, 0x0, 0x0) r3 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r4 = syz_genetlink_get_family_id$netlbl_cipso(&(0x7f0000000000), r3) r5 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NLBL_CIPSOV4_C_REMOVE(r5, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000080)={0x14, r4, 0x1}, 0x14}}, 0x0) r6 = syz_io_uring_setup(0x2, &(0x7f0000000500), &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000ff6000/0xa000)=nil, &(0x7f0000000080)=0x0, &(0x7f0000000140)=0x0) syz_io_uring_submit(r7, r8, &(0x7f0000000800)=@IORING_OP_SENDMSG={0x9, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0}, 0x0) r9 = eventfd(0x0) io_uring_register$IORING_REGISTER_EVENTFD(r6, 0x4, &(0x7f0000000000)=r9, 0x1) read$eventfd(r9, &(0x7f0000000040), 0x8) r10 = syz_io_uring_setup(0x3702, &(0x7f00000001c0), &(0x7f0000000000/0x3000)=nil, &(0x7f0000ffe000/0x2000)=nil, &(0x7f0000000140), &(0x7f0000000240)) r11 = dup2(0xffffffffffffffff, r10) r12 = dup2(r6, r11) io_uring_enter(r12, 0x1739, 0x0, 0x0, 0x0, 0x0) 19:42:23 executing program 6: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x9, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000500100000f000000000000000000000004000000000002000020000020000000def4655fdef4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000008000000018000000c20500002b0200000000000000000000000000000000000073797a6b616c6c6572000000000000002f746d702f73797a2d696d61676567656e35373134333434333800"/192, 0xc0, 0x400}, {&(0x7f0000010100)="000000000000000000000000e58ca12e13a240e2b1a22f8d07e8e55f010040000c00000000000000ddf4655f00"/64, 0x40, 0x4e0}, {&(0x7f0000010200)="0100000000000500400000000000000000000000000000003400000000000000", 0x20, 0x560}, {&(0x7f0000010300)="03000000040000000500000015000f0003000400"/32, 0x20, 0x800}, {&(0x7f0000010400)="ff070000ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff0100ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff0000000000000000ddf4655fddf4655fddf4655f00"/2080, 0x820, 0x1000000000c00}, {&(0x7f0000010d00)="ed41000000040000ddf4655fdef4655fdef4655f00000000000004002000000000000800050000000af301000400000000000000000000000100000010000000", 0x40, 0x1481}, {&(0x7f0000000300)="ed41000000040000def4655fdef4655fdef4655f00000000000002002000000000000800030000000af3010004000000000000000000000001000000000000000000000000000000000000000000000000000000000000000000000004511418000000000000006626319300000000000000000000000000ed8100001a040000def4655fdef4655fdef4655f00000000000001002000000000000800010000000af301000400000000000000000000000200000060000000000000000000000000000000000000000000000000000000000000000000000000000000521cdd1d000000000000000000000000000000000000000000000000ffa1000026000000def4655fdef4655fdef4655f00000000000001000000000000000000010000002f746d702f73797a2d696d6167656710074700945897fd58178880a5f5c8656e3537313433343433382f66696c65302f66696c65300000000000000000000000000000000000000000000073f249de000000000000000000000000000000000000000000000000ed8100000a000000def4655fdef4655fdef4655f00000000000001004000000000000800010000000af301000400e79b9e4f2f9e0df6dc3239179780127bed81021e6d547abad7e5a43c1428520da0173642da03ffb7029f8c88eb04ebf17c692fcdc9aafcc611f5e513989b823bcd53b4724577010000000000000000", 0x204, 0x1980}, {&(0x7f0000011300)="020000000c0001022e000000020000000c0002022e2e00000b00000014000a026c6f73742b666f756e6400000c0000001000050266696c65300000000f0000001000050166696c6531", 0x49, 0x4000}, {&(0x7f0000012000), 0x0, 0x10000}], 0x0, &(0x7f0000012b00)) 19:42:23 executing program 1: r0 = syz_io_uring_setup(0x2, &(0x7f0000000500), &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000ff6000/0xa000)=nil, &(0x7f0000000080)=0x0, &(0x7f0000000140)=0x0) r3 = io_uring_setup(0x3ddf, &(0x7f0000000680)) syz_io_uring_submit(r1, r2, &(0x7f0000000800)=@IORING_OP_SENDMSG={0x9, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0}, 0x0) r4 = eventfd(0x0) io_uring_register$IORING_REGISTER_EVENTFD(r0, 0x4, &(0x7f0000000000)=r4, 0x1) read$eventfd(r4, &(0x7f0000000040), 0x8) r5 = syz_io_uring_setup(0x3702, &(0x7f00000001c0), &(0x7f0000000000/0x3000)=nil, &(0x7f0000ffe000/0x2000)=nil, &(0x7f0000000140), &(0x7f0000000240)) r6 = dup2(r3, r5) r7 = dup2(0xffffffffffffffff, r6) io_uring_enter(r7, 0x1739, 0x0, 0x0, 0x0, 0x0) 19:42:23 executing program 2: r0 = syz_io_uring_setup(0x2, &(0x7f0000000500), &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000ff6000/0xa000)=nil, &(0x7f0000000080)=0x0, &(0x7f0000000140)=0x0) r3 = io_uring_setup(0x3ddf, &(0x7f0000000680)) syz_io_uring_submit(r1, r2, &(0x7f0000000800)=@IORING_OP_SENDMSG={0x9, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0}, 0x0) r4 = eventfd(0x0) io_uring_register$IORING_REGISTER_EVENTFD(r0, 0x4, &(0x7f0000000000)=r4, 0x1) read$eventfd(r4, &(0x7f0000000040), 0x8) r5 = syz_io_uring_setup(0x3702, 0x0, &(0x7f0000000000/0x3000)=nil, &(0x7f0000ffe000/0x2000)=nil, &(0x7f0000000140), &(0x7f0000000240)) r6 = dup2(r3, r5) r7 = dup2(r0, r6) io_uring_enter(r7, 0x1739, 0x0, 0x0, 0x0, 0x0) 19:42:23 executing program 4: r0 = semget$private(0x0, 0x3, 0x0) semctl$SETALL(r0, 0x0, 0x11, &(0x7f0000000040)=[0x8000]) r1 = semget$private(0x0, 0x4000, 0x0) semctl$SEM_STAT(r1, 0x0, 0x12, &(0x7f00000000c0)=""/147) r2 = socket$inet(0x2, 0xa, 0x0) semctl$SETALL(r1, 0x0, 0x11, &(0x7f0000000440)=[0xffff]) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000340)={0x0, 0x0, 0x0}, &(0x7f00000005c0)=0xc) syz_mount_image$tmpfs(&(0x7f00000000c0), &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000600)={[{@gid={'gid', 0x3d, r3}}]}) fcntl$getflags(r2, 0x3) getresuid(&(0x7f0000000080), &(0x7f00000003c0), &(0x7f0000000180)=0x0) r5 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$inet_int(r5, 0x0, 0x22, &(0x7f00000001c0), &(0x7f0000000400)=0x4) getresgid(&(0x7f0000000200), &(0x7f0000000240), &(0x7f0000000280)=0x0) getsockopt$SO_COOKIE(r5, 0x1, 0x39, &(0x7f0000000480), &(0x7f00000004c0)=0x8) semctl$SETVAL(r0, 0x4, 0x10, &(0x7f0000000380)) semctl$IPC_SET(r1, 0x0, 0x1, &(0x7f00000002c0)={{0x2, 0xee01, r3, r4, r6, 0x8, 0xffff}, 0x8000000000000a00, 0x401, 0x0, 0x0, 0x0, 0x0, 0xc76}) semop(r1, &(0x7f0000000000)=[{0x1, 0x92, 0x800}, {0x1, 0x4, 0x1af354f6e97829c5}, {0x3, 0xcfd5, 0x800}, {0x2, 0x20, 0x1000}, {0x0, 0x7, 0x800}, {0x1, 0x9eaf, 0x800}], 0x6) semget(0x1, 0x2, 0x208) [ 1878.600193] tmpfs: Bad value for 'gid' [ 1878.614004] EXT4-fs (loop7): VFS: Can't find ext4 filesystem [ 1878.649460] EXT4-fs warning (device loop6): read_mmp_block:106: Error -117 while reading MMP block 64 [ 1878.652780] EXT4-fs warning (device loop5): read_mmp_block:106: Error -117 while reading MMP block 64 19:42:24 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x8, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000500100000f000000000000000000000004000000000002000020000020000000def4655fdef4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000008000000018000000c20500002b0200000000000000000000000000000000000073797a6b616c6c6572000000000000002f746d702f73797a2d696d61676567656e35373134333434333800"/192, 0xc0, 0x400}, {&(0x7f0000010100)="000000000000000000000000e58ca12e13a240e2b1a22f8d07e8e55f010040000c00000000000000ddf4655f00"/64, 0x40, 0x4e0}, {&(0x7f0000010200)="0100000000000500400000000000000000000000000000003400000000000000", 0x20, 0x560}, {&(0x7f0000010300)="03000000040000000500000015000f0003000400"/32, 0x20, 0x800}, {&(0x7f0000010400)="ff070000ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff0100ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff0000000000000000ddf4655fddf4655fddf4655f00"/2080, 0x820, 0x1000000000c00}, {&(0x7f0000010d00)="ed41000000040000ddf4655fdef4655fdef4655f00000000000004002000000000000800050000000af301000400000000000000000000000100000010000000", 0x40, 0x1481}, {&(0x7f0000000300)="ed41000000040000def4655fdef4655fdef4655f00000000000002002000000000000800030000000af3010004000000000000000000000001000000000000000000000000000000000000000000000000000000000000000000000004511418000000000000006626319300000000000000000000000000ed8100001a040000def4655fdef4655fdef4655f00000000000001002000000000000800010000000af301000400000000000000000000000200000060000000000000000000000000000000000000000000000000000000000000000000000000000000521cdd1d000000000000000000000000000000000000000000000000ffa1000026000000def4655fdef4655fdef4655f00000000000001000000000000000000010000002f746d702f73797a2d696d6167656710074700945897fd58178880a5f5c8656e3537313433343433382f66696c65302f66696c65300000000000000000000000000000000000000000000073f249de000000000000000000000000000000000000000000000000ed8100000a000000def4655fdef4655fdef4655f00000000000001004000000000000800010000000af301000400e79b9e4f2f9e0df6dc3239179780127bed81021e6d547abad7e5a43c1428520da0173642da03ffb7029f8c88eb04ebf17c692fcdc9aafcc611f5e513989b823bcd53b4724577010000000000000000", 0x204, 0x1980}, {&(0x7f0000011300)="020000000c0001022e000000020000000c0002022e2e00000b00000014000a026c6f73742b666f756e6400000c0000001000050266696c65300000000f0000001000050166696c6531", 0x49, 0x4000}], 0x0, &(0x7f0000012b00)) 19:42:24 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x8, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000500100000f000000000000000000000004000000000002000020000020000000def4655fdef4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000008000000018000000c20500002b0200000000000000000000000000000000000073797a6b616c6c6572000000000000002f746d702f73797a2d696d61676567656e35373134333434333800"/192, 0xc0, 0x400}, {&(0x7f0000010100)="000000000000000000000000e58ca12e13a240e2b1a22f8d07e8e55f010040000c00000000000000ddf4655f00"/64, 0x40, 0x4e0}, {&(0x7f0000010200)="0100000000000500400000000000000000000000000000003400000000000000", 0x20, 0x560}, {&(0x7f0000010300)="03000000040000000500000015000f0003000400"/32, 0x20, 0x800}, {&(0x7f0000010400)="ff070000ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff0100ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff0000000000000000ddf4655fddf4655fddf4655f00"/2080, 0x820, 0x1000000000c00}, {&(0x7f0000010d00)="ed41000000040000ddf4655fdef4655fdef4655f00000000000004002000000000000800050000000af301000400000000000000000000000100000010000000", 0x40, 0x1481}, {&(0x7f0000000300)="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", 0x204, 0x1980}, {&(0x7f0000011300)="020000000c0001022e000000020000000c0002022e2e00000b00000014000a026c6f73742b666f756e6400000c0000001000050266696c65300000000f0000001000050166696c6531", 0x49, 0x4000}], 0x0, &(0x7f0000012b00)) 19:42:24 executing program 7: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000500100000f000000000000000000000004000000000002000020000020000000def4655fdef4655f0100ffff53ef", 0x3a}, {&(0x7f0000010100)="000000000000000000000000e58ca12e13a240e2b1a22f8d07e8e55f010040", 0x1f, 0x4e0}], 0x0, &(0x7f0000012b00)) 19:42:24 executing program 6: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x9, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000500100000f000000000000000000000004000000000002000020000020000000def4655fdef4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000008000000018000000c20500002b0200000000000000000000000000000000000073797a6b616c6c6572000000000000002f746d702f73797a2d696d61676567656e35373134333434333800"/192, 0xc0, 0x400}, {&(0x7f0000010100)="000000000000000000000000e58ca12e13a240e2b1a22f8d07e8e55f010040000c00000000000000ddf4655f00"/64, 0x40, 0x4e0}, {&(0x7f0000010200)="0100000000000500400000000000000000000000000000003400000000000000", 0x20, 0x560}, {&(0x7f0000010300)="03000000040000000500000015000f0003000400"/32, 0x20, 0x800}, {&(0x7f0000010400)="ff070000ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff0100ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff0000000000000000ddf4655fddf4655fddf4655f00"/2080, 0x820, 0x1000000000c00}, {&(0x7f0000010d00)="ed41000000040000ddf4655fdef4655fdef4655f00000000000004002000000000000800050000000af301000400000000000000000000000100000010000000", 0x40, 0x1481}, {&(0x7f0000000300)="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", 0x204, 0x1980}, {&(0x7f0000011300)="020000000c0001022e000000020000000c0002022e2e00000b00000014000a026c6f73742b666f756e6400000c0000001000050266696c65300000000f0000001000050166696c6531", 0x49, 0x4000}, {0x0, 0x0, 0x10000}], 0x0, &(0x7f0000012b00)) [ 1878.755240] EXT4-fs (loop7): VFS: Can't find ext4 filesystem [ 1878.758981] EXT4-fs warning (device loop4): read_mmp_block:106: Error -117 while reading MMP block 64 [ 1878.780191] EXT4-fs warning (device loop0): read_mmp_block:106: Error -117 while reading MMP block 64 [ 1878.781565] EXT4-fs warning (device loop6): read_mmp_block:106: Error -117 while reading MMP block 64 19:42:36 executing program 1: r0 = syz_io_uring_setup(0x2, &(0x7f0000000500), &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000ff6000/0xa000)=nil, &(0x7f0000000080)=0x0, &(0x7f0000000140)=0x0) r3 = io_uring_setup(0x3ddf, &(0x7f0000000680)) syz_io_uring_submit(r1, r2, &(0x7f0000000800)=@IORING_OP_SENDMSG={0x9, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0}, 0x0) r4 = eventfd(0x0) io_uring_register$IORING_REGISTER_EVENTFD(r0, 0x4, &(0x7f0000000000)=r4, 0x1) read$eventfd(r4, &(0x7f0000000040), 0x8) r5 = syz_io_uring_setup(0x3702, &(0x7f00000001c0), &(0x7f0000000000/0x3000)=nil, &(0x7f0000ffe000/0x2000)=nil, &(0x7f0000000140), &(0x7f0000000240)) r6 = dup2(r3, r5) r7 = dup2(0xffffffffffffffff, r6) io_uring_enter(r7, 0x1739, 0x0, 0x0, 0x0, 0x0) 19:42:36 executing program 2: r0 = syz_io_uring_setup(0x2, &(0x7f0000000500), &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000ff6000/0xa000)=nil, &(0x7f0000000080)=0x0, &(0x7f0000000140)=0x0) r3 = io_uring_setup(0x3ddf, &(0x7f0000000680)) syz_io_uring_submit(r1, r2, &(0x7f0000000800)=@IORING_OP_SENDMSG={0x9, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0}, 0x0) r4 = eventfd(0x0) io_uring_register$IORING_REGISTER_EVENTFD(r0, 0x4, &(0x7f0000000000)=r4, 0x1) read$eventfd(r4, &(0x7f0000000040), 0x8) r5 = syz_io_uring_setup(0x3702, 0x0, &(0x7f0000000000/0x3000)=nil, &(0x7f0000ffe000/0x2000)=nil, &(0x7f0000000140), &(0x7f0000000240)) r6 = dup2(r3, r5) r7 = dup2(r0, r6) io_uring_enter(r7, 0x1739, 0x0, 0x0, 0x0, 0x0) 19:42:36 executing program 5: r0 = syz_io_uring_setup(0x2, &(0x7f0000000500), &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000ff6000/0xa000)=nil, &(0x7f0000000080)=0x0, &(0x7f0000000140)=0x0) r3 = io_uring_setup(0x3ddf, &(0x7f0000000680)) syz_io_uring_submit(r1, r2, &(0x7f0000000800)=@IORING_OP_SENDMSG={0x9, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0}, 0x0) r4 = eventfd(0x0) io_uring_register$IORING_REGISTER_EVENTFD(r0, 0x4, &(0x7f0000000000)=r4, 0x1) read$eventfd(r4, &(0x7f0000000040), 0x8) r5 = syz_io_uring_setup(0x3702, 0x0, &(0x7f0000000000/0x3000)=nil, &(0x7f0000ffe000/0x2000)=nil, &(0x7f0000000140), &(0x7f0000000240)) r6 = dup2(r3, r5) r7 = dup2(r0, r6) io_uring_enter(r7, 0x1739, 0x0, 0x0, 0x0, 0x0) 19:42:36 executing program 7: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000500100000f000000000000000000000004000000000002000020000020000000def4655fdef4655f0100ffff53ef", 0x3a}, {&(0x7f0000010100)="000000000000000000000000e58ca12e13a240e2b1a22f8d07e8e55f010040", 0x1f, 0x4e0}], 0x0, &(0x7f0000012b00)) 19:42:36 executing program 4: r0 = syz_io_uring_setup(0x21, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, &(0x7f00000a0000)=nil, &(0x7f00000b0000)=nil, &(0x7f0000000180)=0x0, &(0x7f0000002a40)=0x0) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_io_uring_submit(r1, r2, &(0x7f0000000300)=@IORING_OP_OPENAT={0x12, 0x0, 0x0, 0xffffffffffffffff, 0x0, &(0x7f0000000100)='./cgroup/cgroup.procs/file0/../file0\x00'}, 0x0) io_uring_enter(r0, 0x76d3, 0x0, 0x0, 0x0, 0x0) r3 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r4 = syz_genetlink_get_family_id$netlbl_cipso(&(0x7f0000000000), r3) r5 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NLBL_CIPSOV4_C_REMOVE(r5, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000080)={0x14, r4, 0x1}, 0x14}}, 0x0) r6 = syz_io_uring_setup(0x2, &(0x7f0000000500), &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000ff6000/0xa000)=nil, &(0x7f0000000080)=0x0, &(0x7f0000000140)=0x0) r9 = io_uring_setup(0x3ddf, &(0x7f0000000680)) syz_io_uring_submit(r7, r8, &(0x7f0000000800)=@IORING_OP_SENDMSG={0x9, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0}, 0x0) io_uring_register$IORING_REGISTER_EVENTFD(r6, 0x4, &(0x7f0000000000), 0x1) read$eventfd(0xffffffffffffffff, &(0x7f0000000040), 0x8) r10 = syz_io_uring_setup(0x3702, &(0x7f00000001c0), &(0x7f0000000000/0x3000)=nil, &(0x7f0000ffe000/0x2000)=nil, &(0x7f0000000140), &(0x7f0000000240)) r11 = dup2(r9, r10) r12 = dup2(r6, r11) io_uring_enter(r12, 0x1739, 0x0, 0x0, 0x0, 0x0) 19:42:36 executing program 6: r0 = semget$private(0x0, 0x3, 0x0) r1 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000180), 0xffffffffffffffff) r2 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$ETHTOOL_MSG_STRSET_GET(r2, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000480)={&(0x7f0000000140)={0x2c, r1, 0x9, 0x0, 0x0, {}, [@ETHTOOL_A_STRSET_HEADER={0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'syz_tun\x00'}]}]}, 0x2c}}, 0x0) semctl$SETALL(r0, 0x0, 0x11, &(0x7f0000000040)=[0x8000]) semctl$IPC_RMID(r0, 0x0, 0x0) semop(r0, &(0x7f0000000080)=[{0x4, 0x8000, 0x800}, {0x2, 0xfff9, 0x2800}, {0x2, 0x403, 0x2800}, {0x1, 0x1946, 0x1400}, {0x1, 0x3, 0x1800}, {0x4, 0x1fd, 0x1000}, {0x3, 0x8001}, {0x2, 0x3, 0x1800}], 0x8) 19:42:36 executing program 3: r0 = syz_io_uring_setup(0x21, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, &(0x7f00000a0000)=nil, &(0x7f00000b0000)=nil, &(0x7f0000000180)=0x0, &(0x7f0000002a40)=0x0) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_io_uring_submit(r1, r2, &(0x7f0000000300)=@IORING_OP_OPENAT={0x12, 0x0, 0x0, 0xffffffffffffffff, 0x0, &(0x7f0000000100)='./cgroup/cgroup.procs/file0/../file0\x00'}, 0x0) io_uring_enter(r0, 0x76d3, 0x0, 0x0, 0x0, 0x0) r3 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r4 = syz_genetlink_get_family_id$netlbl_cipso(&(0x7f0000000000), r3) r5 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NLBL_CIPSOV4_C_REMOVE(r5, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000080)={0x14, r4, 0x1}, 0x14}}, 0x0) r6 = syz_io_uring_setup(0x2, &(0x7f0000000500), &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000ff6000/0xa000)=nil, &(0x7f0000000080)=0x0, &(0x7f0000000140)=0x0) r9 = io_uring_setup(0x3ddf, &(0x7f0000000680)) syz_io_uring_submit(r7, r8, &(0x7f0000000800)=@IORING_OP_SENDMSG={0x9, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0}, 0x0) r10 = eventfd(0x0) io_uring_register$IORING_REGISTER_EVENTFD(r6, 0x4, &(0x7f0000000000)=r10, 0x1) r11 = syz_io_uring_setup(0x3702, &(0x7f00000001c0), &(0x7f0000000000/0x3000)=nil, &(0x7f0000ffe000/0x2000)=nil, &(0x7f0000000140), &(0x7f0000000240)) r12 = dup2(r9, r11) r13 = dup2(r6, r12) io_uring_enter(r13, 0x1739, 0x0, 0x0, 0x0, 0x0) 19:42:36 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x8, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000500100000f000000000000000000000004000000000002000020000020000000def4655fdef4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000008000000018000000c20500002b0200000000000000000000000000000000000073797a6b616c6c6572000000000000002f746d702f73797a2d696d61676567656e35373134333434333800"/192, 0xc0, 0x400}, {&(0x7f0000010100)="000000000000000000000000e58ca12e13a240e2b1a22f8d07e8e55f010040000c00000000000000ddf4655f00"/64, 0x40, 0x4e0}, {&(0x7f0000010200)="0100000000000500400000000000000000000000000000003400000000000000", 0x20, 0x560}, {&(0x7f0000010300)="03000000040000000500000015000f0003000400"/32, 0x20, 0x800}, {&(0x7f0000010400)="ff070000ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff0100ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff0000000000000000ddf4655fddf4655fddf4655f00"/2080, 0x820, 0x1000000000c00}, {&(0x7f0000010d00)="ed41000000040000ddf4655fdef4655fdef4655f00000000000004002000000000000800050000000af301000400000000000000000000000100000010000000", 0x40, 0x1481}, {&(0x7f0000000300)="ed41000000040000def4655fdef4655fdef4655f00000000000002002000000000000800030000000af3010004000000000000000000000001000000000000000000000000000000000000000000000000000000000000000000000004511418000000000000006626319300000000000000000000000000ed8100001a040000def4655fdef4655fdef4655f00000000000001002000000000000800010000000af301000400000000000000000000000200000060000000000000000000000000000000000000000000000000000000000000000000000000000000521cdd1d000000000000000000000000000000000000000000000000ffa1000026000000def4655fdef4655fdef4655f00000000000001000000000000000000010000002f746d702f73797a2d696d6167656710074700945897fd58178880a5f5c8656e3537313433343433382f66696c65302f66696c65300000000000000000000000000000000000000000000073f249de000000000000000000000000000000000000000000000000ed8100000a000000def4655fdef4655fdef4655f00000000000001004000000000000800010000000af301000400e79b9e4f2f9e0df6dc3239179780127bed81021e6d547abad7e5a43c1428520da0173642da03ffb7029f8c88eb04ebf17c692fcdc9aafcc611f5e513989b823bcd53b4724577010000000000000000", 0x204, 0x1980}, {&(0x7f0000011300)="020000000c0001022e000000020000000c0002022e2e00000b00000014000a026c6f73742b666f756e6400000c0000001000050266696c65300000000f0000001000050166696c6531", 0x49, 0x4000}], 0x0, &(0x7f0000012b00)) [ 1891.562463] EXT4-fs (loop7): VFS: Can't find ext4 filesystem [ 1891.564556] EXT4-fs warning (device loop0): read_mmp_block:106: Error -117 while reading MMP block 64 19:42:48 executing program 6 (fault-call:0 fault-nth:0): syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000500100000f000000000000000000000004000000000002000020000020000000def4655fdef4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000012b00)) 19:42:48 executing program 1: r0 = syz_io_uring_setup(0x2, &(0x7f0000000500), &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000ff6000/0xa000)=nil, &(0x7f0000000080)=0x0, &(0x7f0000000140)=0x0) r3 = io_uring_setup(0x3ddf, &(0x7f0000000680)) syz_io_uring_submit(r1, r2, &(0x7f0000000800)=@IORING_OP_SENDMSG={0x9, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0}, 0x0) r4 = eventfd(0x0) io_uring_register$IORING_REGISTER_EVENTFD(r0, 0x4, &(0x7f0000000000)=r4, 0x1) read$eventfd(r4, &(0x7f0000000040), 0x8) r5 = syz_io_uring_setup(0x3702, &(0x7f00000001c0), &(0x7f0000000000/0x3000)=nil, &(0x7f0000ffe000/0x2000)=nil, &(0x7f0000000140), &(0x7f0000000240)) r6 = dup2(r3, r5) r7 = dup2(0xffffffffffffffff, r6) io_uring_enter(r7, 0x1739, 0x0, 0x0, 0x0, 0x0) 19:42:48 executing program 4: r0 = semget$private(0x0, 0x3, 0x0) semctl$SETALL(r0, 0x0, 0x11, &(0x7f0000000040)=[0x8000]) r1 = semget$private(0x0, 0x0, 0x0) semctl$SEM_STAT(r1, 0x0, 0x12, &(0x7f00000000c0)=""/148) semctl$IPC_RMID(r1, 0x0, 0x0) 19:42:48 executing program 7: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000500100000f000000000000000000000004000000000002000020000020000000def4655fdef4655f0100ffff53ef", 0x3a}, {&(0x7f0000010100)="000000000000000000000000e58ca12e13a240e2b1a22f8d07e8e55f010040", 0x1f, 0x4e0}], 0x0, &(0x7f0000012b00)) 19:42:48 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x9, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000500100000f000000000000000000000004000000000002000020000020000000def4655fdef4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000008000000018000000c20500002b0200000000000000000000000000000000000073797a6b616c6c6572000000000000002f746d702f73797a2d696d61676567656e35373134333434333800"/192, 0xc0, 0x400}, {&(0x7f0000010100)="000000000000000000000000e58ca12e13a240e2b1a22f8d07e8e55f010040000c00000000000000ddf4655f00"/64, 0x40, 0x4e0}, {&(0x7f0000010200)="0100000000000500400000000000000000000000000000003400000000000000", 0x20, 0x560}, {&(0x7f0000010300)="03000000040000000500000015000f0003000400"/32, 0x20, 0x800}, {&(0x7f0000010400)="ff070000ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff0100ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff0000000000000000ddf4655fddf4655fddf4655f00"/2080, 0x820, 0x1000000000c00}, {&(0x7f0000010d00)="ed41000000040000ddf4655fdef4655fdef4655f00000000000004002000000000000800050000000af301000400000000000000000000000100000010000000", 0x40, 0x1481}, {&(0x7f0000000300)="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", 0x204, 0x1980}, {&(0x7f0000011300)="020000000c0001022e000000020000000c0002022e2e00000b00000014000a026c6f73742b666f756e6400000c0000001000050266696c65300000000f0000001000050166696c6531", 0x49, 0x4000}, {&(0x7f0000012000)="504d4d00504d4dff", 0x8, 0x10000}], 0x0, &(0x7f0000012b00)) r0 = syz_mount_image$msdos(&(0x7f00000001c0), &(0x7f00000005c0)='./file1\x00', 0x80000000, 0x5, &(0x7f0000001780)=[{&(0x7f0000000600)="12ed3be486c8b3e35359d8c7a2487675f84a109dab29efb44bbb9abe6ee6d81bed0708cc", 0x24, 0x80000001}, {&(0x7f0000000640)="1b4d07055b656cbc19b8ea598729826b8e7df687ffe682a789bfaeec04430be757da0503ffbd9a4dfd802f81bfb0fed8c2d474bf001802a8b201d3959cb96d77c99e3715d7c8c2d1", 0x48}, {&(0x7f00000006c0)="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", 0x1000, 0x10000}, {&(0x7f00000016c0)="3d3e1803b6be09bd8a6050e111a66f2a77b279c38f376085c68986bc", 0x1c, 0x3ff}, {&(0x7f0000001700)="3634699577f674fd7868fdb1ab4110b9ac46902bc2aefa568c8b1d0c77b71c77ab115f6acbe646d79c7b6d65909177aad20a5e711bb09d3eadf4417832f730f81746572404fe6d72078a9a7116f9f164e2d1cc63ea2adaf80720b24f0d913b03088bef2e298f3f92d5757089370626b452a3f2e9b4", 0x75}], 0x800001, &(0x7f0000001800)={[{@dots}, {@dots}, {@fat=@allow_utime={'allow_utime', 0x3d, 0x6e100000000000}}], [{@appraise_type}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@smackfsroot={'smackfsroot', 0x3d, 'ext4\x00'}}, {@obj_role={'obj_role', 0x3d, '^\'}+{#,'}}, {@defcontext={'defcontext', 0x3d, 'system_u'}}, {@mask={'mask', 0x3d, 'MAY_EXEC'}}]}) linkat(r0, &(0x7f0000001900)='./file1\x00', r0, &(0x7f0000001940)='./file1\x00', 0x0) 19:42:48 executing program 0: r0 = syz_io_uring_setup(0x21, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, &(0x7f00000a0000)=nil, &(0x7f00000b0000)=nil, &(0x7f0000000180)=0x0, &(0x7f0000002a40)=0x0) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_io_uring_submit(r1, r2, &(0x7f0000000300)=@IORING_OP_OPENAT={0x12, 0x0, 0x0, 0xffffffffffffffff, 0x0, &(0x7f0000000100)='./cgroup/cgroup.procs/file0/../file0\x00'}, 0x0) io_uring_enter(r0, 0x76d3, 0x0, 0x0, 0x0, 0x0) r3 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r4 = syz_genetlink_get_family_id$netlbl_cipso(&(0x7f0000000000), r3) r5 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NLBL_CIPSOV4_C_REMOVE(r5, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000080)={0x14, r4, 0x1}, 0x14}}, 0x0) r6 = syz_io_uring_setup(0x2, &(0x7f0000000500), &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000ff6000/0xa000)=nil, &(0x7f0000000080)=0x0, &(0x7f0000000140)=0x0) r9 = io_uring_setup(0x3ddf, &(0x7f0000000680)) syz_io_uring_submit(r7, r8, &(0x7f0000000800)=@IORING_OP_SENDMSG={0x9, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0}, 0x0) r10 = eventfd(0x0) read$eventfd(r10, &(0x7f0000000040), 0x8) r11 = syz_io_uring_setup(0x3702, &(0x7f00000001c0), &(0x7f0000000000/0x3000)=nil, &(0x7f0000ffe000/0x2000)=nil, &(0x7f0000000140), &(0x7f0000000240)) r12 = dup2(r9, r11) r13 = dup2(r6, r12) io_uring_enter(r13, 0x1739, 0x0, 0x0, 0x0, 0x0) 19:42:48 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x9, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000500100000f000000000000000000000004000000000002000020000020000000def4655fdef4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000008000000018000000c20500002b0200000000000000000000000000000000000073797a6b616c6c6572000000000000002f746d702f73797a2d696d61676567656e35373134333434333800"/192, 0xc0, 0x400}, {&(0x7f0000010100)="000000000000000000000000e58ca12e13a240e2b1a22f8d07e8e55f010040000c00000000000000ddf4655f00"/64, 0x40, 0x4e0}, {&(0x7f0000010200)="0100000000000500400000000000000000000000000000003400000000000000", 0x20, 0x560}, {&(0x7f0000010300)="03000000040000000500000015000f0003000400"/32, 0x20, 0x800}, {&(0x7f0000010400)="ff070000ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff0100ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff0000000000000000ddf4655fddf4655fddf4655f00"/2080, 0x820, 0x1000000000c00}, {&(0x7f0000010d00)="ed41000000040000ddf4655fdef4655fdef4655f00000000000004002000000000000800050000000af301000400000000000000000000000100000010000000", 0x40, 0x1481}, {&(0x7f0000000300)="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", 0x204, 0x1980}, {&(0x7f0000011300)="020000000c0001022e000000020000000c0002022e2e00000b00000014000a026c6f73742b666f756e6400000c0000001000050266696c65300000000f0000001000050166696c6531", 0x49, 0x4000}, {&(0x7f0000012000)="504d4d00504d4dff", 0x8, 0x10000}], 0x0, &(0x7f0000012b00)) syz_mount_image$msdos(&(0x7f00000001c0), &(0x7f00000005c0)='./file1\x00', 0x80000000, 0x5, &(0x7f0000001780)=[{&(0x7f0000000600)="12ed3be486c8b3e35359d8c7a2487675f84a109dab29efb44bbb9abe6ee6d81bed0708cc", 0x24, 0x80000001}, {&(0x7f0000000640)="1b4d07055b656cbc19b8ea598729826b8e7df687ffe682a789bfaeec04430be757da0503ffbd9a4dfd802f81bfb0fed8c2d474bf001802a8b201d3959cb96d77c99e3715d7c8c2d1", 0x48}, {&(0x7f00000006c0)="36c82e9e9cca209ebf326c67d1419429e063ab46128b84a84f61aec12c77dff4c8f24c074cf32da4ae4e5b64bddc2c41436e4347ddc7ec4c92c1913c2cfc51a1bd93c36f84ee5e91ce28dbcc9ef366e386486b35e4615c61ec3eb8639bf1605b24fb261bf68e3df2e65bee2049b8849bc64ac68409cdc98e949428a943dc924c54803fd83078763ea53f62428394bde0c869f660e39fc4d8a5e938e2cd36369d33da9e9756a9b7c9cf4187d266ccbbe68eb87ddbd1cc41214d27429871506435dc88d83db50e99d6122f7482897cc4e19c0291dbbb034098eee7ada1b4e805a29aedabb8cdead0418f12faad60cdf97e0a17705d9b36d4be0300d51a50571996c50318f72d9272c1817de8ed23b93338a890f9b984a75f542adb07d458166ada91bb89193ce284416f5d6cb22e70a9bef743b8b6b83b4c3dacf64ef0bd54d98558ccefe83da68afdfb94a82dda7b2cf0afb46ff6a9584d2da865a8ee488b756901f39ce5efbc47009e00660a703c08969dfefe26d2f92dca7bd160da11c521b3698ff5c24a1bc2afa12d30abe5113047be9af841fc65afd23ad60f6aeb6e64c00983290f6121829bc482ef2c322e648ed3f4c7c0c79157567f99f6004c24a9838c8dc208375a63a8788ca4458695acebf54eb14739eb857e54ff3c6958afd74bf9fc27a4c8f6e7c661a2ca01fa8dafa7ea1162a302dd887b6b7ec74668fb8c6764e2325e64a302b8085406a6e468b461b2130b1e5292ff2eda3a6842754d3b9fc7268780b96b2a06dde989f3d99c2151326cc08d19fa7dd23fef8cee72de6e8281cbb877b6d03df5f0adcae38c76c1514ef60404c005695b626d08375c869562b9de520cc0c9f60c6015cc7a2fdcb556ccac3aaf71746497624cc293824f30d188ea064b1a009edc18d7361db63e066522add7d38a3767547033695ca737b3eeda82097d2f5af67dfb15a2ad5e5251eb0874b80d71be826eda7de58b1d928a888af910be4e05843db16db93fb9d0bf6fcd5212cbd501e9f83ca036e82219e1006b3426e1c0af292abeb741bffd16909fb5f05d0a438dcf8daf99849837312ae38288a8b84db9a657bcf3512d1324e11b1fe2bd032aa5c550e04aed77f6499d90ea8b51c02deb69115e4fbdf1bf3a2ed8a159014284f90419ed8a8b3edbde3ebc3ede248d78e93c0ce53a9dedbc6b5d7899f22854ad8a8f40f5c5c71a3ba60d875567ed319732c7ead94a5b2cf090bf3ef3b298d7b3201e20e767ea259099b6471156c67792f5b6d3f4cffff1042c0e271541a0be86663e4ad367c7f37290c35e3211961479153463e9196044d8d32763a24a78b3d57c879fe3a403ea39d4bb53dfa55aa8cab8bf216f418856c7262928878820e2b87ccfff0f1148cb04da8429ffc2155ce697b08b256d4b1bfa5360a09a6475224670826301cd222c2e62d69a23de00bf2bc529930f9fc6b7c69bbffdd749497049a50f25f0b3f49d51bda76da9e2eaf55e8e4e3ddc8590730da33492df9bd38aabb26abd119ab816a0968528d4c8fdca396bbf65bbb88c86cb8b8529cda081266b0064a88aac8105e848d2c15bcb508df7b0439795fc6cac82f007bf9a608640c49661a224418dd1792c2f86647a335142de27fb0a715bc3c1b2eae9b4d1e4df720fc8f5c380bd71cf72af90f2cdb8578fc35b2ef89d4b546934e212553616561ae27097d0f150bdca6e36e141f456397dcc88e8b5af1e32c6ee2a88001955cb1c2e50216d32d50ba6f7f8b1128dd43ae35659e8d7452ffe090b40a7d6d6969f934eeb21be8fc9f352ad413a22a4e1a57d3dee7d79a47a807e804edf0fdcec717eae340311f52be44a502349f7e7089875cee2c193aaf2ad6e112d75c0bbaec0f647878ade126eb28ceea3a0c6057c933ad5dd2875525ab62c31353a1832d2405708f86fff4050c3b7f66e07b17559cfe01158219bdcd99429c963f2a418cf7a33bd0024e1827462f62080f14aeb21b32c2da8c0f1e1324c0ba804d0df65bdb74b47f7148695af36a1006e29c7d95f5cc8af1bad30606e79dd2ceb48821b2266e21e0451f4bfb886fa77bb377a4368ad89e2cd49e22b1d414d8aac2a94d9cc0a5a9cec6f4f9fd4afcc7d363bdec791e7c1d20244f16c23d937b41f0df3b34b5aa021a12c4f9f38a18fcc6973b86deb0fb4c8b1d53a1fd3a2c67a10e4859b58b72105ddd1217d8eb3543ad42d846a84b62a3dcfa345994cf30a7378aad218cac01445cdf1d2dc75f788f33a2c38d5179557a7d3acf7292e6806ec8e3e043c28c304bc39dff5977f881902cb581918f2fe06819c080fc5f8175e77f44651fbe5a374f03748d48f7a2b51d1370dd48e0e2e0981fbdda972f681052ab2608d1d75cd6696ebb95aa9f8d3e291d1d999dd30f6230aadb2cd121b7bc226293bca4900ca5d2d57a659b16656c2b0ee4614d2a8191725b5994d606c3b760236559700832c43eb84f28b6ffc976e7d1010a5c72b0ee88197f6e1aa639662b767eb0dc3a703f689c8c5c5aedef34ce64411dbac0ada1efc5099c99af3a2d671dfbea9cfc305f2255f82c68bdd9e10fd5c52d9dbd5d683aaed928140b055a27fc2d447d936a1e47a5f3dd61aa5f2eb03258b38a652ae176e2da53702da7e02c89a1103ce75abe343c8913cc11d81164727b1e3e6e1a601f239b2837018fe0967e1da34058a70ad3b85aefe3ba9426882c1ec2e59935b7157b2cbf3c73ce83d7f46f7c8834f0476900cdaf018258270a9cb796609b1b0a244bf610bb460240517ccea0c6b1e87ff1c7aacf31ed5d271312edbb02319e0dcb54ef2823346902026a2935fe44ddbd7174a971cc2c3625bf7f48141b8b3b05aebab75d4bebb0840724df076627f7656df961e8c90e10496d0e02ec46c2070b21237f9263328bb20382fc62dfd12edf9224d44598121ee1991a85902127c4de8bf6f42aee4cc2a28bc28f02ca5e52f72701a3d3155f07cd3d9baa19cd8c1f774e7be50aaf9f3dca70a10183e8301f3cfb89a7d446fa36a4b6c3b537eeedd2a74951903b10f63e4fc272bac4d3c9d03abdec45a2f12236d38dd956645b9bcb4ad7cdfca474b2eb4b6e12d9304f91aa7a03f4985a768bec5db78ab7ecde018a6ac493d04031e802b6fffe8d0b68ecdb66cdc23b4f88a3d7926d170e503fe6a25099c248a72eb35344966777fd696c68dd114fe2382fc5f9861573377226e12565dd3f5f4091243c98d0d57819fb7851a4746a4061fcc929e99114ce6cea659a38103926330a70ba42bc00baa77c4367d9d0ab890aa8c8aeb6b0e7f4399d6172912aebc9ba5c5bd98f150e74059863fc0386cb1fbb1aa7c3aa739cdcdb758b4cdb10a66fbe895ec52333bc4c86443dcb8813dad84ff88ec3fc3ec1cecc4495e20ef2051641738127adb2a2ae52242f4cf50d318e08e8eae73e158790488231221ad9970459bdf68c6ecfbb2dc407b5aa12e0cbab5e4ed3d1ab8db6c653a56a73216cee4808782e7c08d7589af4c438bfcea74db7ac5209f967397b0ccb69735cea9a58ea624118946e108aca5eb8d6e17608e4a23c51c2e9db70a52a5d969f137e584dff2eabfe59c17a74ffcfa717288e769ade50c2f95b3735887bd8b5167285e06a7b0bb7ff097b665fb5852ec2e58bffcaf8581067a7dd5599bbccd91a51233ecfd3ac3f11caa120ea1de27e6b2ef415d46d95d6828188fe5d129f80d3699abe3e285b96db3bcadf52a432f37ce0aad4728f28bc99983221469883484b38fcab836d3b827440c77f3b349e9d73657423d64aae639262b0b84842df89e8fdc8ebf16c6c45bb9d7300a48a6aa6d528591c7d6a29b8b5c3b9fa79c4eb50172cf88ed5d64aed7c9e524c8f4abe93c4a77eab14b28ef2bec332cc9c9089e296eff9103788d8929049bbd9f44fe08549be1ad6d00beb8487ec124766ef15fa7411c933f58926ef4d1e47fe49e569ff31192762e09875aa884c114c3251ddc13181fd2256db1048c5a05b25b283d4c5907d30481bba03bf8f91768264bfe56bc1137f5e3862271b73bc4e44cd97153941e7726320f7f3722897e024585c34c3a3d0fc2375150eba131b526e76771e07e277de050ea01514c0b4dcef9dcf8ea89da500d3fab599a976ec5432ebfe14c6b02519a8248e1604213af1bf6374c2001014906ffd90a70a3d1187bf3c4ddb3375fc74940bbc87140966110fdd700fe5e3b048ff8c3be3787dd9076636f019291baf40c35725ced9b178dd141b5b9f4485c3a973c15636002a5c85e57afeb4a92f9bed3a9e3061c389de6f337a3cc211b75487a1eb29b9e200e6bbdd652ae6cb94870284ef53c7fac0f89bfeb4ad8ad462627615bae900a426911379e727261680f0294ad9f33d2a323cd9d6327dfd58128b0799328dfb2c43fda1f15cc368cc5d372c63f074c3e9f55f2cf36f2b2db45cb04fb0624f93e1dbea02551418035bfc32578701d5d7f8155a40dada5f2c247a785848701a58142e4c1b3c9522ee519e2994cbdc52d601415431fdeeb8d72f27e363d97bd0cd27ced25bdbdd55f33d2f043a64dd8377298bc61fe4d1cbceae9d00bab2bc5743524fd43573b410737cd68e84bb8eb4e88d10a00a4e0eca386462184ac43082a8431a88f81848b9f902ba09f77fce7fc9d872db14ce284a78ad96f887eea70a862d60fcdf03bdd4d3a74a0071051c04e27fb5cae12592508b0df89d15e86b2a41449913451b4963314f7bd10d8ad849ebbf77696db00a6109ccf67a1060c3b295cd73fe06ce16230337063d51e7952e128308664518e062bdecee167b11ed175410f83d4d76d8d91a6ecd84232048e7fa2c2dfd3644b6f1e934dde954ae62121eada87080036eaf14bca1bac073f283d9e7b594de8fec8a9ebf651d77dd2df36e49bd8f990f8503e219169a4684c16f52e5cfbef6b4381229970e1b37af89dc4d8a44de24865bffd3b1267b05c952d17c14171cb3d33332b90111d7527f71185e6f6964e2e64c2380e8897bb07f524696c97e0c386b8d1aba09274a69e510657a06ea0a9a510c038dee9a0b8c839b2e1e9f8381fcac83bdcab757830ffd310f8d5048bd311815bb7996ad39506d0e29f3f2bd76275066d8b7b7131544dee11e4a061bfd4ee8becf0a3958e3b4be9135761f9be331810ae834ba9b8ddf3d015f102379c433aa43c72e5273e0ab5a65b5022509842c021463ad8cc13399ee19598c20cd41671d6bdd086a34f7243ea19f3c50da8246b2815bf73737a94402f1fda01de567862b535546ebe691716841f1dd53a8ea83082aa2b83ed9564ab8d465513edfd2040adc4b6e25c96592397551d462e485b8fed588144e298eb385d3aaf59a50325959062194572ab6932ed24729afb3ab52c1af1342a8cbed552c401f7e659bc9e815b17047d91d51bf4778878f05ccf9ef7c1cdab22aff44ce38eaee806e63c8f5b0bcf73a9145ec4e8ea2298cae00530b3fd25e1febbee7fd80ffb66d0e8ba58e700a6feb71b10a95034eaae6cce120cb7733276ca121d0c25bb91752d70c6af6ff65ee8f8ebb0c92eb41e3dec5ee5ae9d60aced516ef89d90684b6f9ab384eaf756555b3295dcece6227f518f38a2b01718e7599fee44557f7e1376cb04ee1506ce584930d649980e9211470b8842a70668e0132250261a36e8fa602c580e6515bd1450185b30c868390de918f2c1616cb0cb5803c0f2e04044b940f8cd3649917adfa34c5f8f9f2a619ad82ab2f2ec235d394d0f9649293c1123090d73f4caad7d5812c69431272269ba3053e14927e2027eb1", 0x1000, 0x10000}, {&(0x7f00000016c0)="3d3e1803b6be09bd8a6050e111a66f2a77b279c38f376085c68986bc", 0x1c, 0x3ff}, {&(0x7f0000001700)="3634699577f674fd7868fdb1ab4110b9ac46902bc2aefa568c8b1d0c77b71c77ab115f6acbe646d79c7b6d65909177aad20a5e711bb09d3eadf4417832f730f81746572404fe6d72078a9a7116f9f164e2d1cc63ea2adaf80720b24f0d913b03088bef2e298f3f92d5757089370626b452a3f2e9b4", 0x75}], 0x800001, &(0x7f0000001800)={[{@dots}, {@dots}, {@fat=@allow_utime={'allow_utime', 0x3d, 0x6e100000000000}}], [{@appraise_type}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@smackfsroot={'smackfsroot', 0x3d, 'ext4\x00'}}, {@obj_role={'obj_role', 0x3d, '^\'}+{#,'}}, {@defcontext={'defcontext', 0x3d, 'system_u'}}, {@mask={'mask', 0x3d, 'MAY_EXEC'}}]}) 19:42:48 executing program 2: r0 = syz_io_uring_setup(0x2, &(0x7f0000000500), &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000ff6000/0xa000)=nil, &(0x7f0000000080)=0x0, &(0x7f0000000140)=0x0) r3 = io_uring_setup(0x3ddf, &(0x7f0000000680)) syz_io_uring_submit(r1, r2, &(0x7f0000000800)=@IORING_OP_SENDMSG={0x9, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0}, 0x0) r4 = eventfd(0x0) io_uring_register$IORING_REGISTER_EVENTFD(r0, 0x4, &(0x7f0000000000)=r4, 0x1) read$eventfd(r4, &(0x7f0000000040), 0x8) r5 = syz_io_uring_setup(0x3702, &(0x7f00000001c0), &(0x7f0000000000/0x3000)=nil, &(0x7f0000ffe000/0x2000)=nil, 0x0, &(0x7f0000000240)) r6 = dup2(r3, r5) r7 = dup2(r0, r6) io_uring_enter(r7, 0x1739, 0x0, 0x0, 0x0, 0x0) 19:42:48 executing program 4 (fault-call:0 fault-nth:0): syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000500100000f000000000000000000000004000000000002000020000020000000def4655fdef4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000012b00)) [ 1903.245437] FAULT_INJECTION: forcing a failure. [ 1903.245437] name failslab, interval 1, probability 0, space 0, times 1 [ 1903.247940] CPU: 0 PID: 15334 Comm: syz-executor.6 Not tainted 5.10.45 #1 [ 1903.249417] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS rel-1.14.0-0-g155821a1990b-prebuilt.qemu.org 04/01/2014 [ 1903.251764] Call Trace: [ 1903.252343] dump_stack+0x107/0x163 [ 1903.253133] should_fail.cold+0x5/0xa [ 1903.253939] ? __do_sys_memfd_create+0xfb/0x450 [ 1903.254888] should_failslab+0x5/0x10 [ 1903.255672] __kmalloc+0x72/0x3e0 [ 1903.256423] __do_sys_memfd_create+0xfb/0x450 [ 1903.257448] ? memfd_file_seals_ptr+0x150/0x150 [ 1903.258412] ? lockdep_hardirqs_on_prepare+0x273/0x3e0 [ 1903.259484] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1903.260538] do_syscall_64+0x33/0x40 [ 1903.261305] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 1903.262369] RIP: 0033:0x466609 [ 1903.263028] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1903.266914] RSP: 002b:00007f8698989f48 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 1903.268553] RAX: ffffffffffffffda RBX: 0000000020000200 RCX: 0000000000466609 [ 1903.270037] RDX: 0000000000000800 RSI: 0000000000000000 RDI: 00000000004bee66 [ 1903.271526] RBP: 0000000000000001 R08: 0000000000000400 R09: ffffffffffffffff [ 1903.273031] R10: 0000000000000001 R11: 0000000000000246 R12: 0000000008100000 [ 1903.274512] R13: 0000000020000180 R14: 0000000000000800 R15: 0000000020012b00 [ 1903.284392] EXT4-fs (loop7): VFS: Can't find ext4 filesystem 19:42:48 executing program 6 (fault-call:0 fault-nth:1): syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000500100000f000000000000000000000004000000000002000020000020000000def4655fdef4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000012b00)) 19:42:48 executing program 7: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000500100000f000000000000000000000004000000000002000020000020000000def4655fdef4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000010100)="000000000000000000000000e58ca12e13a240e2b1a22f8d07e8e55f010040", 0x1f, 0x4e0}], 0x0, 0x0) [ 1903.341015] FAULT_INJECTION: forcing a failure. [ 1903.341015] name failslab, interval 1, probability 0, space 0, times 0 [ 1903.342560] CPU: 1 PID: 15357 Comm: syz-executor.4 Not tainted 5.10.45 #1 [ 1903.343366] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS rel-1.14.0-0-g155821a1990b-prebuilt.qemu.org 04/01/2014 [ 1903.344706] Call Trace: [ 1903.345020] dump_stack+0x107/0x163 [ 1903.345456] should_fail.cold+0x5/0xa [ 1903.345908] ? __do_sys_memfd_create+0xfb/0x450 [ 1903.346446] should_failslab+0x5/0x10 [ 1903.346894] __kmalloc+0x72/0x3e0 [ 1903.347298] __do_sys_memfd_create+0xfb/0x450 [ 1903.347841] ? ksys_write+0x1a5/0x250 [ 1903.348279] ? memfd_file_seals_ptr+0x150/0x150 [ 1903.348817] ? lockdep_hardirqs_on_prepare+0x273/0x3e0 [ 1903.349440] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1903.350035] do_syscall_64+0x33/0x40 [ 1903.350470] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 1903.351073] RIP: 0033:0x466609 [ 1903.351444] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1903.353617] RSP: 002b:00007fd513a12f48 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 1903.354496] RAX: ffffffffffffffda RBX: 0000000020000200 RCX: 0000000000466609 [ 1903.355313] RDX: 0000000000000800 RSI: 0000000000000000 RDI: 00000000004bee66 [ 1903.356133] RBP: 0000000000000001 R08: 0000000000000400 R09: ffffffffffffffff [ 1903.356945] R10: 0000000000000001 R11: 0000000000000246 R12: 0000000008100000 [ 1903.357777] R13: 0000000020000180 R14: 0000000000000800 R15: 0000000020012b00 [ 1903.369033] EXT4-fs error (device loop5): ext4_fill_super:4947: inode #2: comm syz-executor.5: iget: bogus i_mode (166400) [ 1903.370606] EXT4-fs (loop5): get root inode failed [ 1903.371271] EXT4-fs (loop5): mount failed [ 1903.372485] EXT4-fs error (device loop3): ext4_fill_super:4947: inode #2: comm syz-executor.3: iget: bogus i_mode (166400) [ 1903.375961] EXT4-fs (loop3): get root inode failed [ 1903.377096] EXT4-fs (loop3): mount failed [ 1903.392342] FAULT_INJECTION: forcing a failure. [ 1903.392342] name failslab, interval 1, probability 0, space 0, times 0 [ 1903.394731] CPU: 0 PID: 15355 Comm: syz-executor.6 Not tainted 5.10.45 #1 [ 1903.396146] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS rel-1.14.0-0-g155821a1990b-prebuilt.qemu.org 04/01/2014 [ 1903.398485] Call Trace: [ 1903.399041] dump_stack+0x107/0x163 [ 1903.399799] should_fail.cold+0x5/0xa [ 1903.400585] ? create_object.isra.0+0x3a/0xa20 [ 1903.401558] should_failslab+0x5/0x10 [ 1903.402329] kmem_cache_alloc+0x5b/0x350 [ 1903.403167] create_object.isra.0+0x3a/0xa20 [ 1903.404061] ? __kasan_kmalloc.constprop.0+0xc2/0xd0 [ 1903.405097] __kmalloc+0x16e/0x3e0 [ 1903.405837] __do_sys_memfd_create+0xfb/0x450 [ 1903.406750] ? ksys_write+0x1a5/0x250 [ 1903.407526] ? memfd_file_seals_ptr+0x150/0x150 [ 1903.408486] ? lockdep_hardirqs_on_prepare+0x273/0x3e0 [ 1903.409571] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1903.410636] do_syscall_64+0x33/0x40 [ 1903.411398] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 1903.412454] RIP: 0033:0x466609 [ 1903.413123] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1903.416924] RSP: 002b:00007f8698989f48 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 1903.418498] RAX: ffffffffffffffda RBX: 0000000020000200 RCX: 0000000000466609 [ 1903.419953] RDX: 0000000000000800 RSI: 0000000000000000 RDI: 00000000004bee66 [ 1903.421428] RBP: 0000000000000001 R08: 0000000000000400 R09: ffffffffffffffff [ 1903.422892] R10: 0000000000000001 R11: 0000000000000246 R12: 0000000008100000 [ 1903.424350] R13: 0000000020000180 R14: 0000000000000800 R15: 0000000020012b00 19:42:48 executing program 4 (fault-call:0 fault-nth:1): syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000500100000f000000000000000000000004000000000002000020000020000000def4655fdef4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000012b00)) 19:42:48 executing program 5 (fault-call:0 fault-nth:0): syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000500100000f000000000000000000000004000000000002000020000020000000def4655fdef4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000012b00)) 19:42:48 executing program 7: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000500100000f000000000000000000000004000000000002000020000020000000def4655fdef4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000010100)="000000000000000000000000e58ca12e13a240e2b1a22f8d07e8e55f010040", 0x1f, 0x4e0}], 0x0, 0x0) [ 1903.480612] FAULT_INJECTION: forcing a failure. [ 1903.480612] name failslab, interval 1, probability 0, space 0, times 0 [ 1903.481996] CPU: 1 PID: 15377 Comm: syz-executor.5 Not tainted 5.10.45 #1 [ 1903.482751] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS rel-1.14.0-0-g155821a1990b-prebuilt.qemu.org 04/01/2014 [ 1903.483959] Call Trace: [ 1903.484253] dump_stack+0x107/0x163 [ 1903.484651] should_fail.cold+0x5/0xa [ 1903.485077] ? __do_sys_memfd_create+0xfb/0x450 [ 1903.485600] should_failslab+0x5/0x10 [ 1903.486018] __kmalloc+0x72/0x3e0 [ 1903.486404] __do_sys_memfd_create+0xfb/0x450 [ 1903.486902] ? ksys_write+0x1a5/0x250 [ 1903.487319] ? memfd_file_seals_ptr+0x150/0x150 [ 1903.487842] ? lockdep_hardirqs_on_prepare+0x273/0x3e0 [ 1903.488416] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1903.489009] do_syscall_64+0x33/0x40 [ 1903.489420] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 1903.489972] RIP: 0033:0x466609 [ 1903.490337] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1903.492378] RSP: 002b:00007f73482ddf48 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 1903.492555] FAULT_INJECTION: forcing a failure. [ 1903.492555] name failslab, interval 1, probability 0, space 0, times 0 [ 1903.493239] RAX: ffffffffffffffda RBX: 0000000020000200 RCX: 0000000000466609 [ 1903.493245] RDX: 0000000000000800 RSI: 0000000000000000 RDI: 00000000004bee66 [ 1903.493251] RBP: 0000000000000001 R08: 0000000000000400 R09: ffffffffffffffff [ 1903.493257] R10: 0000000000000001 R11: 0000000000000246 R12: 0000000008100000 [ 1903.493261] R13: 0000000020000180 R14: 0000000000000800 R15: 0000000020012b00 [ 1903.503381] CPU: 0 PID: 15378 Comm: syz-executor.4 Not tainted 5.10.45 #1 [ 1903.504793] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS rel-1.14.0-0-g155821a1990b-prebuilt.qemu.org 04/01/2014 [ 1903.507129] Call Trace: [ 1903.507680] dump_stack+0x107/0x163 [ 1903.508140] EXT4-fs (loop6): fragment/cluster size (16384) != block size (1024) [ 1903.508435] should_fail.cold+0x5/0xa [ 1903.508460] ? create_object.isra.0+0x3a/0xa20 [ 1903.510962] should_failslab+0x5/0x10 [ 1903.511098] FAULT_INJECTION: forcing a failure. [ 1903.511098] name failslab, interval 1, probability 0, space 0, times 0 [ 1903.511751] kmem_cache_alloc+0x5b/0x350 [ 1903.511778] create_object.isra.0+0x3a/0xa20 [ 1903.511801] ? __kasan_kmalloc.constprop.0+0xc2/0xd0 [ 1903.515733] __kmalloc+0x16e/0x3e0 [ 1903.516466] __do_sys_memfd_create+0xfb/0x450 [ 1903.517387] ? ksys_write+0x1a5/0x250 [ 1903.518163] ? memfd_file_seals_ptr+0x150/0x150 [ 1903.519121] ? lockdep_hardirqs_on_prepare+0x273/0x3e0 [ 1903.520187] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1903.521244] do_syscall_64+0x33/0x40 [ 1903.522019] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 1903.523065] RIP: 0033:0x466609 [ 1903.523721] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1903.527489] RSP: 002b:00007fd513a12f48 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 1903.529034] RAX: ffffffffffffffda RBX: 0000000020000200 RCX: 0000000000466609 [ 1903.530511] RDX: 0000000000000800 RSI: 0000000000000000 RDI: 00000000004bee66 [ 1903.531966] RBP: 0000000000000001 R08: 0000000000000400 R09: ffffffffffffffff [ 1903.533430] R10: 0000000000000001 R11: 0000000000000246 R12: 0000000008100000 [ 1903.534889] R13: 0000000020000180 R14: 0000000000000800 R15: 0000000020012b00 [ 1903.536378] CPU: 1 PID: 15381 Comm: syz-executor.5 Not tainted 5.10.45 #1 19:42:48 executing program 5 (fault-call:0 fault-nth:1): syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000500100000f000000000000000000000004000000000002000020000020000000def4655fdef4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000012b00)) [ 1903.537113] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS rel-1.14.0-0-g155821a1990b-prebuilt.qemu.org 04/01/2014 [ 1903.538530] Call Trace: [ 1903.538813] dump_stack+0x107/0x163 [ 1903.539205] should_fail.cold+0x5/0xa [ 1903.539626] ? create_object.isra.0+0x3a/0xa20 [ 1903.540122] should_failslab+0x5/0x10 [ 1903.540541] kmem_cache_alloc+0x5b/0x350 [ 1903.540992] create_object.isra.0+0x3a/0xa20 [ 1903.541477] ? __kasan_kmalloc.constprop.0+0xc2/0xd0 [ 1903.542039] __kmalloc+0x16e/0x3e0 [ 1903.542425] __do_sys_memfd_create+0xfb/0x450 [ 1903.542907] ? ksys_write+0x1a5/0x250 [ 1903.543312] ? memfd_file_seals_ptr+0x150/0x150 [ 1903.543822] ? lockdep_hardirqs_on_prepare+0x273/0x3e0 [ 1903.544379] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1903.544944] do_syscall_64+0x33/0x40 [ 1903.545360] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 1903.545909] RIP: 0033:0x466609 [ 1903.546264] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1903.548259] RSP: 002b:00007f73482ddf48 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 1903.549099] RAX: ffffffffffffffda RBX: 0000000020000200 RCX: 0000000000466609 [ 1903.549910] RDX: 0000000000000800 RSI: 0000000000000000 RDI: 00000000004bee66 [ 1903.550701] RBP: 0000000000000001 R08: 0000000000000400 R09: ffffffffffffffff [ 1903.551483] R10: 0000000000000001 R11: 0000000000000246 R12: 0000000008100000 [ 1903.552276] R13: 0000000020000180 R14: 0000000000000800 R15: 0000000020012b00 19:42:48 executing program 3 (fault-call:0 fault-nth:0): syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000500100000f000000000000000000000004000000000002000020000020000000def4655fdef4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000012b00)) [ 1903.573624] EXT4-fs (loop5): fragment/cluster size (16384) != block size (1024) 19:42:48 executing program 5 (fault-call:0 fault-nth:2): syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000500100000f000000000000000000000004000000000002000020000020000000def4655fdef4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000012b00)) [ 1903.599380] FAULT_INJECTION: forcing a failure. [ 1903.599380] name failslab, interval 1, probability 0, space 0, times 0 [ 1903.600706] CPU: 1 PID: 15387 Comm: syz-executor.3 Not tainted 5.10.45 #1 [ 1903.601466] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS rel-1.14.0-0-g155821a1990b-prebuilt.qemu.org 04/01/2014 [ 1903.602691] Call Trace: [ 1903.602990] dump_stack+0x107/0x163 [ 1903.603380] should_fail.cold+0x5/0xa [ 1903.603802] ? __do_sys_memfd_create+0xfb/0x450 [ 1903.604310] should_failslab+0x5/0x10 [ 1903.604721] __kmalloc+0x72/0x3e0 [ 1903.605094] __do_sys_memfd_create+0xfb/0x450 [ 1903.605582] ? ksys_write+0x1a5/0x250 [ 1903.605992] ? memfd_file_seals_ptr+0x150/0x150 [ 1903.606511] ? lockdep_hardirqs_on_prepare+0x273/0x3e0 [ 1903.607073] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1903.607641] do_syscall_64+0x33/0x40 [ 1903.608045] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 1903.608596] RIP: 0033:0x466609 [ 1903.608941] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1903.610939] RSP: 002b:00007fae06bc9f48 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 1903.611767] RAX: ffffffffffffffda RBX: 0000000020000200 RCX: 0000000000466609 [ 1903.612551] RDX: 0000000000000800 RSI: 0000000000000000 RDI: 00000000004bee66 [ 1903.613334] RBP: 0000000000000001 R08: 0000000000000400 R09: ffffffffffffffff [ 1903.614086] R10: 0000000000000001 R11: 0000000000000246 R12: 0000000008100000 [ 1903.614889] R13: 0000000020000180 R14: 0000000000000800 R15: 0000000020012b00 [ 1903.623154] EXT4-fs (loop4): fragment/cluster size (16384) != block size (1024) [ 1903.631894] FAULT_INJECTION: forcing a failure. [ 1903.631894] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 1903.634431] CPU: 0 PID: 15390 Comm: syz-executor.5 Not tainted 5.10.45 #1 [ 1903.635833] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS rel-1.14.0-0-g155821a1990b-prebuilt.qemu.org 04/01/2014 [ 1903.638173] Call Trace: [ 1903.638715] dump_stack+0x107/0x163 [ 1903.639463] should_fail.cold+0x5/0xa [ 1903.640252] _copy_from_user+0x2e/0x1b0 [ 1903.641078] __do_sys_memfd_create+0x16d/0x450 [ 1903.642050] ? memfd_file_seals_ptr+0x150/0x150 [ 1903.643007] ? lockdep_hardirqs_on_prepare+0x273/0x3e0 [ 1903.644086] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1903.645149] do_syscall_64+0x33/0x40 [ 1903.645909] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 1903.646968] RIP: 0033:0x466609 [ 1903.647619] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1903.651417] RSP: 002b:00007f73482ddf48 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 1903.652963] RAX: ffffffffffffffda RBX: 0000000020000200 RCX: 0000000000466609 [ 1903.654431] RDX: 0000000000000800 RSI: 0000000000000000 RDI: 00000000004bee66 [ 1903.655902] RBP: 0000000000000001 R08: 0000000000000400 R09: ffffffffffffffff [ 1903.657377] R10: 0000000000000001 R11: 0000000000000246 R12: 0000000008100000 [ 1903.658862] R13: 0000000020000180 R14: 0000000000000800 R15: 0000000020012b00 19:43:01 executing program 7: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000500100000f000000000000000000000004000000000002000020000020000000def4655fdef4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000010100)="000000000000000000000000e58ca12e13a240e2b1a22f8d07e8e55f010040", 0x1f, 0x4e0}], 0x0, 0x0) 19:43:01 executing program 4 (fault-call:0 fault-nth:2): syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000500100000f000000000000000000000004000000000002000020000020000000def4655fdef4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000012b00)) 19:43:01 executing program 6 (fault-call:0 fault-nth:2): syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000500100000f000000000000000000000004000000000002000020000020000000def4655fdef4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000012b00)) 19:43:01 executing program 2: r0 = syz_io_uring_setup(0x2, &(0x7f0000000500), &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000ff6000/0xa000)=nil, &(0x7f0000000080)=0x0, &(0x7f0000000140)=0x0) r3 = io_uring_setup(0x3ddf, &(0x7f0000000680)) syz_io_uring_submit(r1, r2, &(0x7f0000000800)=@IORING_OP_SENDMSG={0x9, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0}, 0x0) r4 = eventfd(0x0) io_uring_register$IORING_REGISTER_EVENTFD(r0, 0x4, &(0x7f0000000000)=r4, 0x1) read$eventfd(r4, &(0x7f0000000040), 0x8) r5 = syz_io_uring_setup(0x3702, &(0x7f00000001c0), &(0x7f0000000000/0x3000)=nil, &(0x7f0000ffe000/0x2000)=nil, 0x0, &(0x7f0000000240)) r6 = dup2(r3, r5) r7 = dup2(r0, r6) io_uring_enter(r7, 0x1739, 0x0, 0x0, 0x0, 0x0) 19:43:01 executing program 0 (fault-call:0 fault-nth:0): syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000500100000f000000000000000000000004000000000002000020000020000000def4655fdef4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000008000000018000000c20500002b02", 0x66, 0x400}, {&(0x7f0000010100)="000000000000000000000000e58ca12e13a240e2b1a22f8d07e8e55f010040", 0x1f, 0x4e0}, {&(0x7f0000010200)="010000000000050040", 0x9, 0x560}, {0x0, 0x0, 0x1000000000c00}, {&(0x7f0000012000)="504d4d00504d4dff", 0x8, 0x10000}], 0x0, &(0x7f0000012b00)) 19:43:01 executing program 5 (fault-call:0 fault-nth:3): syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000500100000f000000000000000000000004000000000002000020000020000000def4655fdef4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000012b00)) 19:43:01 executing program 3 (fault-call:0 fault-nth:1): syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000500100000f000000000000000000000004000000000002000020000020000000def4655fdef4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000012b00)) 19:43:01 executing program 1: r0 = syz_io_uring_setup(0x2, &(0x7f0000000500), &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000ff6000/0xa000)=nil, &(0x7f0000000080)=0x0, &(0x7f0000000140)=0x0) r3 = io_uring_setup(0x3ddf, &(0x7f0000000680)) syz_io_uring_submit(r1, r2, &(0x7f0000000800)=@IORING_OP_SENDMSG={0x9, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0}, 0x0) r4 = eventfd(0x0) io_uring_register$IORING_REGISTER_EVENTFD(r0, 0x4, &(0x7f0000000000)=r4, 0x1) read$eventfd(r4, &(0x7f0000000040), 0x8) r5 = syz_io_uring_setup(0x3702, &(0x7f00000001c0), &(0x7f0000000000/0x3000)=nil, &(0x7f0000ffe000/0x2000)=nil, &(0x7f0000000140), &(0x7f0000000240)) dup2(r3, r5) r6 = dup2(r0, 0xffffffffffffffff) io_uring_enter(r6, 0x1739, 0x0, 0x0, 0x0, 0x0) [ 1916.258427] FAULT_INJECTION: forcing a failure. [ 1916.258427] name failslab, interval 1, probability 0, space 0, times 0 [ 1916.260129] CPU: 0 PID: 15402 Comm: syz-executor.5 Not tainted 5.10.45 #1 [ 1916.260607] FAULT_INJECTION: forcing a failure. [ 1916.260607] name failslab, interval 1, probability 0, space 0, times 0 [ 1916.261047] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS rel-1.14.0-0-g155821a1990b-prebuilt.qemu.org 04/01/2014 [ 1916.261053] Call Trace: [ 1916.261073] dump_stack+0x107/0x163 [ 1916.261088] should_fail.cold+0x5/0xa [ 1916.261108] ? shmem_alloc_inode+0x18/0x40 [ 1916.266906] should_failslab+0x5/0x10 [ 1916.267420] kmem_cache_alloc+0x5b/0x350 [ 1916.267960] ? shmem_destroy_inode+0x70/0x70 [ 1916.268547] shmem_alloc_inode+0x18/0x40 [ 1916.269133] ? shmem_destroy_inode+0x70/0x70 [ 1916.269738] alloc_inode+0x63/0x230 [ 1916.270227] new_inode+0x23/0x240 [ 1916.270701] shmem_get_inode+0x15e/0xbc0 [ 1916.271256] __shmem_file_setup+0xb8/0x310 [ 1916.271836] ? _copy_from_user+0xfb/0x1b0 [ 1916.272401] __do_sys_memfd_create+0x271/0x450 [ 1916.273024] ? memfd_file_seals_ptr+0x150/0x150 [ 1916.273742] ? lockdep_hardirqs_on_prepare+0x273/0x3e0 [ 1916.274448] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1916.275185] do_syscall_64+0x33/0x40 [ 1916.275760] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 1916.276543] RIP: 0033:0x466609 [ 1916.277066] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1916.280091] RSP: 002b:00007f73482ddf48 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 1916.281110] RAX: ffffffffffffffda RBX: 0000000020000200 RCX: 0000000000466609 [ 1916.282053] RDX: 0000000000000800 RSI: 0000000000000000 RDI: 00000000004bee66 [ 1916.283105] RBP: 0000000000000001 R08: 0000000000000400 R09: ffffffffffffffff [ 1916.284203] R10: 0000000000000001 R11: 0000000000000246 R12: 0000000008100000 [ 1916.285303] R13: 0000000020000180 R14: 0000000000000800 R15: 0000000020012b00 [ 1916.286449] CPU: 1 PID: 15407 Comm: syz-executor.3 Not tainted 5.10.45 #1 [ 1916.287579] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS rel-1.14.0-0-g155821a1990b-prebuilt.qemu.org 04/01/2014 [ 1916.289310] Call Trace: [ 1916.289750] dump_stack+0x107/0x163 [ 1916.290234] should_fail.cold+0x5/0xa [ 1916.291143] ? create_object.isra.0+0x3a/0xa20 [ 1916.291834] should_failslab+0x5/0x10 [ 1916.292409] kmem_cache_alloc+0x5b/0x350 [ 1916.292988] create_object.isra.0+0x3a/0xa20 [ 1916.293647] ? __kasan_kmalloc.constprop.0+0xc2/0xd0 [ 1916.294365] __kmalloc+0x16e/0x3e0 [ 1916.294751] FAULT_INJECTION: forcing a failure. [ 1916.294751] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 1916.294863] __do_sys_memfd_create+0xfb/0x450 [ 1916.297367] ? ksys_write+0x1a5/0x250 [ 1916.297955] ? memfd_file_seals_ptr+0x150/0x150 [ 1916.298602] ? lockdep_hardirqs_on_prepare+0x273/0x3e0 [ 1916.299364] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1916.300120] do_syscall_64+0x33/0x40 [ 1916.300646] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 1916.301337] RIP: 0033:0x466609 [ 1916.301792] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1916.306264] RSP: 002b:00007fae06bc9f48 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 1916.308396] RAX: ffffffffffffffda RBX: 0000000020000200 RCX: 0000000000466609 [ 1916.309407] RDX: 0000000000000800 RSI: 0000000000000000 RDI: 00000000004bee66 [ 1916.310400] RBP: 0000000000000001 R08: 0000000000000400 R09: ffffffffffffffff [ 1916.311316] R10: 0000000000000001 R11: 0000000000000246 R12: 0000000008100000 [ 1916.312233] R13: 0000000020000180 R14: 0000000000000800 R15: 0000000020012b00 [ 1916.313181] CPU: 0 PID: 15405 Comm: syz-executor.6 Not tainted 5.10.45 #1 [ 1916.314148] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS rel-1.14.0-0-g155821a1990b-prebuilt.qemu.org 04/01/2014 [ 1916.315246] FAULT_INJECTION: forcing a failure. [ 1916.315246] name failslab, interval 1, probability 0, space 0, times 0 [ 1916.315649] Call Trace: [ 1916.315673] dump_stack+0x107/0x163 [ 1916.315689] should_fail.cold+0x5/0xa [ 1916.315707] _copy_from_user+0x2e/0x1b0 [ 1916.315728] __do_sys_memfd_create+0x16d/0x450 [ 1916.319849] ? memfd_file_seals_ptr+0x150/0x150 [ 1916.320550] ? lockdep_hardirqs_on_prepare+0x273/0x3e0 [ 1916.321337] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1916.322106] do_syscall_64+0x33/0x40 [ 1916.322671] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 1916.323483] RIP: 0033:0x466609 [ 1916.323977] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1916.326680] RSP: 002b:00007f8698989f48 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 1916.327816] RAX: ffffffffffffffda RBX: 0000000020000200 RCX: 0000000000466609 [ 1916.328858] RDX: 0000000000000800 RSI: 0000000000000000 RDI: 00000000004bee66 [ 1916.329923] RBP: 0000000000000001 R08: 0000000000000400 R09: ffffffffffffffff [ 1916.330963] R10: 0000000000000001 R11: 0000000000000246 R12: 0000000008100000 [ 1916.332015] R13: 0000000020000180 R14: 0000000000000800 R15: 0000000020012b00 [ 1916.333125] CPU: 1 PID: 15403 Comm: syz-executor.0 Not tainted 5.10.45 #1 [ 1916.334197] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS rel-1.14.0-0-g155821a1990b-prebuilt.qemu.org 04/01/2014 [ 1916.335849] Call Trace: [ 1916.336249] dump_stack+0x107/0x163 [ 1916.336791] should_fail.cold+0x5/0xa [ 1916.337361] ? __do_sys_memfd_create+0xfb/0x450 [ 1916.338090] should_failslab+0x5/0x10 [ 1916.338659] __kmalloc+0x72/0x3e0 [ 1916.339193] __do_sys_memfd_create+0xfb/0x450 [ 1916.339844] ? ksys_write+0x1a5/0x250 [ 1916.340410] ? memfd_file_seals_ptr+0x150/0x150 [ 1916.341065] ? lockdep_hardirqs_on_prepare+0x273/0x3e0 [ 1916.341823] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1916.342585] do_syscall_64+0x33/0x40 [ 1916.343133] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 1916.343912] RIP: 0033:0x466609 [ 1916.344388] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1916.347064] RSP: 002b:00007f52a9646f48 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 1916.348120] RAX: ffffffffffffffda RBX: 0000000020000200 RCX: 0000000000466609 [ 1916.349166] RDX: 0000000000020000 RSI: 0000000000000000 RDI: 00000000004bee66 [ 1916.350215] RBP: 0000000000000005 R08: 0000000000010000 R09: ffffffffffffffff [ 1916.352581] R10: 0000000000000005 R11: 0000000000000246 R12: 0000000008100000 [ 1916.353651] R13: 0000000020000180 R14: 0000000000201800 R15: 0000000020012b00 [ 1916.357085] FAULT_INJECTION: forcing a failure. [ 1916.357085] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 1916.358962] CPU: 1 PID: 15409 Comm: syz-executor.4 Not tainted 5.10.45 #1 [ 1916.359955] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS rel-1.14.0-0-g155821a1990b-prebuilt.qemu.org 04/01/2014 [ 1916.361647] Call Trace: [ 1916.361943] dump_stack+0x107/0x163 [ 1916.362339] should_fail.cold+0x5/0xa [ 1916.362753] _copy_from_user+0x2e/0x1b0 [ 1916.363184] __do_sys_memfd_create+0x16d/0x450 [ 1916.363675] ? memfd_file_seals_ptr+0x150/0x150 [ 1916.364189] ? lockdep_hardirqs_on_prepare+0x273/0x3e0 [ 1916.364760] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1916.365322] do_syscall_64+0x33/0x40 [ 1916.365842] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 1916.366610] RIP: 0033:0x466609 [ 1916.367111] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1916.369824] RSP: 002b:00007fd513a12f48 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 1916.370925] RAX: ffffffffffffffda RBX: 0000000020000200 RCX: 0000000000466609 [ 1916.371946] RDX: 0000000000000800 RSI: 0000000000000000 RDI: 00000000004bee66 [ 1916.372897] RBP: 0000000000000001 R08: 0000000000000400 R09: ffffffffffffffff [ 1916.373949] R10: 0000000000000001 R11: 0000000000000246 R12: 0000000008100000 [ 1916.374992] R13: 0000000020000180 R14: 0000000000000800 R15: 0000000020012b00 19:43:01 executing program 5 (fault-call:0 fault-nth:4): syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000500100000f000000000000000000000004000000000002000020000020000000def4655fdef4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000012b00)) [ 1916.489017] FAULT_INJECTION: forcing a failure. [ 1916.489017] name failslab, interval 1, probability 0, space 0, times 0 [ 1916.490582] CPU: 0 PID: 15428 Comm: syz-executor.5 Not tainted 5.10.45 #1 [ 1916.491451] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS rel-1.14.0-0-g155821a1990b-prebuilt.qemu.org 04/01/2014 [ 1916.492897] Call Trace: [ 1916.493244] dump_stack+0x107/0x163 [ 1916.493728] should_fail.cold+0x5/0xa [ 1916.494206] ? create_object.isra.0+0x3a/0xa20 [ 1916.494770] should_failslab+0x5/0x10 [ 1916.495240] kmem_cache_alloc+0x5b/0x350 [ 1916.495745] ? osq_unlock+0x1a0/0x1a0 [ 1916.496222] create_object.isra.0+0x3a/0xa20 [ 1916.496771] ? __kasan_kmalloc.constprop.0+0xc2/0xd0 [ 1916.497399] kmem_cache_alloc+0x159/0x350 [ 1916.497945] ? shmem_destroy_inode+0x70/0x70 [ 1916.498494] shmem_alloc_inode+0x18/0x40 [ 1916.499017] ? shmem_destroy_inode+0x70/0x70 [ 1916.499588] alloc_inode+0x63/0x230 [ 1916.500085] new_inode+0x23/0x240 [ 1916.500537] shmem_get_inode+0x15e/0xbc0 [ 1916.501071] __shmem_file_setup+0xb8/0x310 [ 1916.501639] ? _copy_from_user+0xfb/0x1b0 [ 1916.502174] __do_sys_memfd_create+0x271/0x450 [ 1916.502761] ? memfd_file_seals_ptr+0x150/0x150 [ 1916.503375] ? lockdep_hardirqs_on_prepare+0x273/0x3e0 [ 1916.504049] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1916.504861] do_syscall_64+0x33/0x40 [ 1916.505753] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 1916.506734] RIP: 0033:0x466609 [ 1916.507137] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1916.509530] RSP: 002b:00007f73482ddf48 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 1916.510464] RAX: ffffffffffffffda RBX: 0000000020000200 RCX: 0000000000466609 [ 1916.511339] RDX: 0000000000000800 RSI: 0000000000000000 RDI: 00000000004bee66 [ 1916.512285] RBP: 0000000000000001 R08: 0000000000000400 R09: ffffffffffffffff [ 1916.513162] R10: 0000000000000001 R11: 0000000000000246 R12: 0000000008100000 [ 1916.514123] R13: 0000000020000180 R14: 0000000000000800 R15: 0000000020012b00 [ 1916.543862] EXT4-fs (loop3): fragment/cluster size (16384) != block size (1024) 19:43:01 executing program 4 (fault-call:0 fault-nth:3): syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000500100000f000000000000000000000004000000000002000020000020000000def4655fdef4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000012b00)) 19:43:01 executing program 7 (fault-call:0 fault-nth:0): syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000500100000f000000000000000000000004000000000002000020000020000000def4655fdef4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000010100)="000000000000000000000000e58ca12e13a240e2b1a22f8d07e8e55f010040", 0x1f, 0x4e0}], 0x0, &(0x7f0000012b00)) 19:43:01 executing program 6 (fault-call:0 fault-nth:3): syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000500100000f000000000000000000000004000000000002000020000020000000def4655fdef4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000012b00)) 19:43:01 executing program 0 (fault-call:0 fault-nth:1): syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000500100000f000000000000000000000004000000000002000020000020000000def4655fdef4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000008000000018000000c20500002b02", 0x66, 0x400}, {&(0x7f0000010100)="000000000000000000000000e58ca12e13a240e2b1a22f8d07e8e55f010040", 0x1f, 0x4e0}, {&(0x7f0000010200)="010000000000050040", 0x9, 0x560}, {0x0, 0x0, 0x1000000000c00}, {&(0x7f0000012000)="504d4d00504d4dff", 0x8, 0x10000}], 0x0, &(0x7f0000012b00)) [ 1916.571490] FAULT_INJECTION: forcing a failure. [ 1916.571490] name failslab, interval 1, probability 0, space 0, times 0 [ 1916.573222] CPU: 1 PID: 15432 Comm: syz-executor.4 Not tainted 5.10.45 #1 [ 1916.574294] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS rel-1.14.0-0-g155821a1990b-prebuilt.qemu.org 04/01/2014 [ 1916.576034] Call Trace: [ 1916.576439] dump_stack+0x107/0x163 [ 1916.577001] should_fail.cold+0x5/0xa [ 1916.577616] ? shmem_alloc_inode+0x18/0x40 [ 1916.578238] should_failslab+0x5/0x10 [ 1916.578823] kmem_cache_alloc+0x5b/0x350 [ 1916.579464] ? shmem_destroy_inode+0x70/0x70 [ 1916.580134] shmem_alloc_inode+0x18/0x40 [ 1916.580768] ? shmem_destroy_inode+0x70/0x70 [ 1916.581506] alloc_inode+0x63/0x230 [ 1916.582057] new_inode+0x23/0x240 [ 1916.582612] shmem_get_inode+0x15e/0xbc0 [ 1916.583253] __shmem_file_setup+0xb8/0x310 [ 1916.583904] ? _copy_from_user+0xfb/0x1b0 [ 1916.584521] __do_sys_memfd_create+0x271/0x450 [ 1916.585222] ? memfd_file_seals_ptr+0x150/0x150 [ 1916.586006] ? lockdep_hardirqs_on_prepare+0x273/0x3e0 [ 1916.586822] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1916.587601] do_syscall_64+0x33/0x40 [ 1916.588153] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 1916.588912] RIP: 0033:0x466609 [ 1916.589408] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1916.592207] RSP: 002b:00007fd513a12f48 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 1916.594819] RAX: ffffffffffffffda RBX: 0000000020000200 RCX: 0000000000466609 [ 1916.595903] RDX: 0000000000000800 RSI: 0000000000000000 RDI: 00000000004bee66 [ 1916.596987] RBP: 0000000000000001 R08: 0000000000000400 R09: ffffffffffffffff [ 1916.598111] R10: 0000000000000001 R11: 0000000000000246 R12: 0000000008100000 19:43:02 executing program 3 (fault-call:0 fault-nth:2): syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000500100000f000000000000000000000004000000000002000020000020000000def4655fdef4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000012b00)) [ 1916.599147] R13: 0000000020000180 R14: 0000000000000800 R15: 0000000020012b00 [ 1916.612021] FAULT_INJECTION: forcing a failure. [ 1916.612021] name failslab, interval 1, probability 0, space 0, times 0 [ 1916.613569] CPU: 1 PID: 15437 Comm: syz-executor.6 Not tainted 5.10.45 #1 [ 1916.614504] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS rel-1.14.0-0-g155821a1990b-prebuilt.qemu.org 04/01/2014 [ 1916.616098] Call Trace: [ 1916.616513] dump_stack+0x107/0x163 [ 1916.617036] should_fail.cold+0x5/0xa [ 1916.617573] ? shmem_alloc_inode+0x18/0x40 [ 1916.618230] should_failslab+0x5/0x10 [ 1916.618721] kmem_cache_alloc+0x5b/0x350 [ 1916.619330] ? shmem_destroy_inode+0x70/0x70 [ 1916.619963] shmem_alloc_inode+0x18/0x40 [ 1916.620586] ? shmem_destroy_inode+0x70/0x70 [ 1916.621237] alloc_inode+0x63/0x230 [ 1916.621795] new_inode+0x23/0x240 [ 1916.622304] shmem_get_inode+0x15e/0xbc0 [ 1916.622906] __shmem_file_setup+0xb8/0x310 [ 1916.623550] ? _copy_from_user+0xfb/0x1b0 [ 1916.624169] __do_sys_memfd_create+0x271/0x450 [ 1916.624878] ? memfd_file_seals_ptr+0x150/0x150 [ 1916.625598] ? lockdep_hardirqs_on_prepare+0x273/0x3e0 [ 1916.626358] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1916.627111] do_syscall_64+0x33/0x40 [ 1916.627670] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 1916.628432] RIP: 0033:0x466609 [ 1916.628914] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1916.631603] RSP: 002b:00007f8698989f48 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 1916.632701] RAX: ffffffffffffffda RBX: 0000000020000200 RCX: 0000000000466609 [ 1916.633751] RDX: 0000000000000800 RSI: 0000000000000000 RDI: 00000000004bee66 [ 1916.634802] RBP: 0000000000000001 R08: 0000000000000400 R09: ffffffffffffffff [ 1916.635835] R10: 0000000000000001 R11: 0000000000000246 R12: 0000000008100000 [ 1916.636922] R13: 0000000020000180 R14: 0000000000000800 R15: 0000000020012b00 [ 1916.640022] FAULT_INJECTION: forcing a failure. [ 1916.640022] name failslab, interval 1, probability 0, space 0, times 0 [ 1916.641718] CPU: 1 PID: 15438 Comm: syz-executor.7 Not tainted 5.10.45 #1 [ 1916.642706] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS rel-1.14.0-0-g155821a1990b-prebuilt.qemu.org 04/01/2014 [ 1916.644369] Call Trace: [ 1916.644759] dump_stack+0x107/0x163 [ 1916.645325] should_fail.cold+0x5/0xa [ 1916.645973] ? __do_sys_memfd_create+0xfb/0x450 [ 1916.646679] should_failslab+0x5/0x10 [ 1916.647206] __kmalloc+0x72/0x3e0 [ 1916.647742] __do_sys_memfd_create+0xfb/0x450 [ 1916.648360] ? ksys_write+0x1a5/0x250 [ 1916.648906] ? memfd_file_seals_ptr+0x150/0x150 [ 1916.649600] ? lockdep_hardirqs_on_prepare+0x273/0x3e0 [ 1916.650324] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1916.651013] do_syscall_64+0x33/0x40 [ 1916.651523] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 1916.652209] RIP: 0033:0x466609 [ 1916.652653] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1916.655135] RSP: 002b:00007f4c69a47f48 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 1916.656245] RAX: ffffffffffffffda RBX: 0000000020000200 RCX: 0000000000466609 [ 1916.657346] RDX: 00000000000009c0 RSI: 0000000000000000 RDI: 00000000004bee66 [ 1916.658493] RBP: 0000000000000002 R08: 00000000000004e0 R09: ffffffffffffffff [ 1916.659597] R10: 0000000000000002 R11: 0000000000000246 R12: 0000000008100000 [ 1916.660659] R13: 0000000020000180 R14: 00000000000009c0 R15: 0000000020012b00 [ 1916.663565] FAULT_INJECTION: forcing a failure. [ 1916.663565] name failslab, interval 1, probability 0, space 0, times 0 [ 1916.665366] CPU: 1 PID: 15439 Comm: syz-executor.0 Not tainted 5.10.45 #1 [ 1916.666453] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS rel-1.14.0-0-g155821a1990b-prebuilt.qemu.org 04/01/2014 [ 1916.666906] FAULT_INJECTION: forcing a failure. [ 1916.666906] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 1916.668138] Call Trace: [ 1916.668159] dump_stack+0x107/0x163 [ 1916.668174] should_fail.cold+0x5/0xa [ 1916.668190] ? create_object.isra.0+0x3a/0xa20 [ 1916.668203] should_failslab+0x5/0x10 [ 1916.668220] kmem_cache_alloc+0x5b/0x350 [ 1916.673270] create_object.isra.0+0x3a/0xa20 [ 1916.673959] ? __kasan_kmalloc.constprop.0+0xc2/0xd0 [ 1916.674715] __kmalloc+0x16e/0x3e0 [ 1916.675248] __do_sys_memfd_create+0xfb/0x450 [ 1916.675923] ? ksys_write+0x1a5/0x250 [ 1916.676491] ? memfd_file_seals_ptr+0x150/0x150 [ 1916.677197] ? lockdep_hardirqs_on_prepare+0x273/0x3e0 [ 1916.677982] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1916.678750] do_syscall_64+0x33/0x40 [ 1916.679311] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 1916.680081] RIP: 0033:0x466609 [ 1916.680552] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1916.683299] RSP: 002b:00007f52a9646f48 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 1916.684427] RAX: ffffffffffffffda RBX: 0000000020000200 RCX: 0000000000466609 [ 1916.685517] RDX: 0000000000020000 RSI: 0000000000000000 RDI: 00000000004bee66 [ 1916.686591] RBP: 0000000000000005 R08: 0000000000010000 R09: ffffffffffffffff [ 1916.687650] R10: 0000000000000005 R11: 0000000000000246 R12: 0000000008100000 [ 1916.688703] R13: 0000000020000180 R14: 0000000000201800 R15: 0000000020012b00 [ 1916.689790] CPU: 0 PID: 15441 Comm: syz-executor.3 Not tainted 5.10.45 #1 [ 1916.690792] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS rel-1.14.0-0-g155821a1990b-prebuilt.qemu.org 04/01/2014 [ 1916.692383] Call Trace: [ 1916.692782] dump_stack+0x107/0x163 [ 1916.693281] should_fail.cold+0x5/0xa [ 1916.693847] _copy_from_user+0x2e/0x1b0 [ 1916.694402] __do_sys_memfd_create+0x16d/0x450 [ 1916.695043] ? memfd_file_seals_ptr+0x150/0x150 [ 1916.695674] ? lockdep_hardirqs_on_prepare+0x273/0x3e0 [ 1916.696411] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1916.697160] do_syscall_64+0x33/0x40 [ 1916.697726] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 1916.698466] RIP: 0033:0x466609 [ 1916.698933] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1916.701590] RSP: 002b:00007fae06bc9f48 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 1916.702671] RAX: ffffffffffffffda RBX: 0000000020000200 RCX: 0000000000466609 [ 1916.703687] RDX: 0000000000000800 RSI: 0000000000000000 RDI: 00000000004bee66 [ 1916.704725] RBP: 0000000000000001 R08: 0000000000000400 R09: ffffffffffffffff [ 1916.705759] R10: 0000000000000001 R11: 0000000000000246 R12: 0000000008100000 [ 1916.706805] R13: 0000000020000180 R14: 0000000000000800 R15: 0000000020012b00 [ 1916.732304] EXT4-fs (loop5): fragment/cluster size (16384) != block size (1024) 19:43:02 executing program 4 (fault-call:0 fault-nth:4): syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000500100000f000000000000000000000004000000000002000020000020000000def4655fdef4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000012b00)) 19:43:02 executing program 7 (fault-call:0 fault-nth:1): syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000500100000f000000000000000000000004000000000002000020000020000000def4655fdef4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000010100)="000000000000000000000000e58ca12e13a240e2b1a22f8d07e8e55f010040", 0x1f, 0x4e0}], 0x0, &(0x7f0000012b00)) [ 1916.767559] EXT4-fs error (device loop0): ext4_fill_super:4947: inode #2: comm syz-executor.0: iget: root inode unallocated [ 1916.770952] EXT4-fs (loop0): get root inode failed [ 1916.771722] EXT4-fs (loop0): mount failed [ 1916.790185] FAULT_INJECTION: forcing a failure. [ 1916.790185] name failslab, interval 1, probability 0, space 0, times 0 [ 1916.791779] CPU: 0 PID: 15448 Comm: syz-executor.7 Not tainted 5.10.45 #1 [ 1916.792683] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS rel-1.14.0-0-g155821a1990b-prebuilt.qemu.org 04/01/2014 [ 1916.794250] Call Trace: [ 1916.794611] dump_stack+0x107/0x163 [ 1916.795119] should_fail.cold+0x5/0xa [ 1916.795634] ? create_object.isra.0+0x3a/0xa20 [ 1916.796262] should_failslab+0x5/0x10 [ 1916.796751] kmem_cache_alloc+0x5b/0x350 [ 1916.797308] create_object.isra.0+0x3a/0xa20 [ 1916.797908] ? __kasan_kmalloc.constprop.0+0xc2/0xd0 19:43:02 executing program 6 (fault-call:0 fault-nth:4): syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000500100000f000000000000000000000004000000000002000020000020000000def4655fdef4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000012b00)) [ 1916.798794] __kmalloc+0x16e/0x3e0 [ 1916.799273] __do_sys_memfd_create+0xfb/0x450 [ 1916.799919] ? ksys_write+0x1a5/0x250 [ 1916.800465] ? memfd_file_seals_ptr+0x150/0x150 [ 1916.801142] ? lockdep_hardirqs_on_prepare+0x273/0x3e0 [ 1916.801916] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1916.802661] do_syscall_64+0x33/0x40 [ 1916.803187] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 1916.803922] RIP: 0033:0x466609 [ 1916.804377] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1916.806928] RSP: 002b:00007f4c69a47f48 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 1916.807947] RAX: ffffffffffffffda RBX: 0000000020000200 RCX: 0000000000466609 [ 1916.808923] RDX: 00000000000009c0 RSI: 0000000000000000 RDI: 00000000004bee66 [ 1916.809872] RBP: 0000000000000002 R08: 00000000000004e0 R09: ffffffffffffffff [ 1916.810911] R10: 0000000000000002 R11: 0000000000000246 R12: 0000000008100000 [ 1916.811944] R13: 0000000020000180 R14: 00000000000009c0 R15: 0000000020012b00 19:43:02 executing program 5 (fault-call:0 fault-nth:5): syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000500100000f000000000000000000000004000000000002000020000020000000def4655fdef4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000012b00)) 19:43:02 executing program 3 (fault-call:0 fault-nth:3): syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000500100000f000000000000000000000004000000000002000020000020000000def4655fdef4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000012b00)) [ 1916.823938] FAULT_INJECTION: forcing a failure. [ 1916.823938] name failslab, interval 1, probability 0, space 0, times 0 [ 1916.825571] CPU: 0 PID: 15449 Comm: syz-executor.4 Not tainted 5.10.45 #1 [ 1916.826471] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS rel-1.14.0-0-g155821a1990b-prebuilt.qemu.org 04/01/2014 [ 1916.828028] Call Trace: [ 1916.828429] dump_stack+0x107/0x163 [ 1916.828953] should_fail.cold+0x5/0xa [ 1916.829530] ? create_object.isra.0+0x3a/0xa20 [ 1916.830325] should_failslab+0x5/0x10 [ 1916.830910] kmem_cache_alloc+0x5b/0x350 [ 1916.831517] create_object.isra.0+0x3a/0xa20 [ 1916.832182] ? __kasan_kmalloc.constprop.0+0xc2/0xd0 [ 1916.832879] kmem_cache_alloc+0x159/0x350 [ 1916.833414] ? shmem_destroy_inode+0x70/0x70 [ 1916.834077] shmem_alloc_inode+0x18/0x40 [ 1916.834595] ? shmem_destroy_inode+0x70/0x70 [ 1916.835205] alloc_inode+0x63/0x230 [ 1916.835757] new_inode+0x23/0x240 [ 1916.836406] shmem_get_inode+0x15e/0xbc0 [ 1916.837005] __shmem_file_setup+0xb8/0x310 [ 1916.837627] ? _copy_from_user+0xfb/0x1b0 [ 1916.838213] __do_sys_memfd_create+0x271/0x450 [ 1916.838859] ? memfd_file_seals_ptr+0x150/0x150 [ 1916.839524] ? lockdep_hardirqs_on_prepare+0x273/0x3e0 [ 1916.840274] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1916.841015] do_syscall_64+0x33/0x40 [ 1916.841551] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 1916.842291] RIP: 0033:0x466609 [ 1916.842751] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1916.845430] RSP: 002b:00007fd513a12f48 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 1916.846501] RAX: ffffffffffffffda RBX: 0000000020000200 RCX: 0000000000466609 [ 1916.847486] RDX: 0000000000000800 RSI: 0000000000000000 RDI: 00000000004bee66 [ 1916.848493] RBP: 0000000000000001 R08: 0000000000000400 R09: ffffffffffffffff [ 1916.849618] R10: 0000000000000001 R11: 0000000000000246 R12: 0000000008100000 [ 1916.850540] R13: 0000000020000180 R14: 0000000000000800 R15: 0000000020012b00 [ 1916.859973] FAULT_INJECTION: forcing a failure. [ 1916.859973] name failslab, interval 1, probability 0, space 0, times 0 [ 1916.861641] CPU: 0 PID: 15454 Comm: syz-executor.3 Not tainted 5.10.45 #1 [ 1916.862551] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS rel-1.14.0-0-g155821a1990b-prebuilt.qemu.org 04/01/2014 [ 1916.864060] Call Trace: [ 1916.864423] dump_stack+0x107/0x163 [ 1916.864925] should_fail.cold+0x5/0xa [ 1916.865429] ? shmem_alloc_inode+0x18/0x40 [ 1916.866506] should_failslab+0x5/0x10 [ 1916.867106] kmem_cache_alloc+0x5b/0x350 [ 1916.867728] ? shmem_destroy_inode+0x70/0x70 [ 1916.868430] shmem_alloc_inode+0x18/0x40 [ 1916.868711] FAULT_INJECTION: forcing a failure. [ 1916.868711] name failslab, interval 1, probability 0, space 0, times 0 [ 1916.869040] ? shmem_destroy_inode+0x70/0x70 [ 1916.869059] alloc_inode+0x63/0x230 [ 1916.871864] new_inode+0x23/0x240 [ 1916.872389] shmem_get_inode+0x15e/0xbc0 [ 1916.873019] __shmem_file_setup+0xb8/0x310 [ 1916.873666] ? _copy_from_user+0xfb/0x1b0 [ 1916.874295] __do_sys_memfd_create+0x271/0x450 [ 1916.874992] ? memfd_file_seals_ptr+0x150/0x150 [ 1916.875705] ? lockdep_hardirqs_on_prepare+0x273/0x3e0 [ 1916.876507] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1916.877288] do_syscall_64+0x33/0x40 [ 1916.877823] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 1916.878383] RIP: 0033:0x466609 [ 1916.878780] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1916.881118] RSP: 002b:00007fae06bc9f48 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 1916.881973] RAX: ffffffffffffffda RBX: 0000000020000200 RCX: 0000000000466609 [ 1916.882758] RDX: 0000000000000800 RSI: 0000000000000000 RDI: 00000000004bee66 [ 1916.883546] RBP: 0000000000000001 R08: 0000000000000400 R09: ffffffffffffffff [ 1916.884321] R10: 0000000000000001 R11: 0000000000000246 R12: 0000000008100000 [ 1916.885104] R13: 0000000020000180 R14: 0000000000000800 R15: 0000000020012b00 [ 1916.885930] CPU: 1 PID: 15455 Comm: syz-executor.6 Not tainted 5.10.45 #1 [ 1916.886961] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS rel-1.14.0-0-g155821a1990b-prebuilt.qemu.org 04/01/2014 [ 1916.888555] Call Trace: [ 1916.888949] dump_stack+0x107/0x163 [ 1916.889479] should_fail.cold+0x5/0xa [ 1916.890115] ? create_object.isra.0+0x3a/0xa20 [ 1916.890775] should_failslab+0x5/0x10 [ 1916.891323] kmem_cache_alloc+0x5b/0x350 [ 1916.891923] create_object.isra.0+0x3a/0xa20 [ 1916.892561] ? __kasan_kmalloc.constprop.0+0xc2/0xd0 [ 1916.893288] kmem_cache_alloc+0x159/0x350 [ 1916.893900] ? shmem_destroy_inode+0x70/0x70 [ 1916.894531] shmem_alloc_inode+0x18/0x40 [ 1916.895120] ? shmem_destroy_inode+0x70/0x70 [ 1916.895747] alloc_inode+0x63/0x230 [ 1916.896275] new_inode+0x23/0x240 [ 1916.896780] shmem_get_inode+0x15e/0xbc0 [ 1916.897375] __shmem_file_setup+0xb8/0x310 [ 1916.897986] ? _copy_from_user+0xfb/0x1b0 [ 1916.898578] __do_sys_memfd_create+0x271/0x450 [ 1916.899238] ? memfd_file_seals_ptr+0x150/0x150 [ 1916.899913] ? lockdep_hardirqs_on_prepare+0x273/0x3e0 [ 1916.900664] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1916.901415] do_syscall_64+0x33/0x40 [ 1916.901974] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 1916.902718] RIP: 0033:0x466609 [ 1916.903188] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1916.905841] RSP: 002b:00007f8698989f48 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 1916.906921] RAX: ffffffffffffffda RBX: 0000000020000200 RCX: 0000000000466609 [ 1916.907942] RDX: 0000000000000800 RSI: 0000000000000000 RDI: 00000000004bee66 [ 1916.908949] RBP: 0000000000000001 R08: 0000000000000400 R09: ffffffffffffffff [ 1916.910010] R10: 0000000000000001 R11: 0000000000000246 R12: 0000000008100000 [ 1916.911022] R13: 0000000020000180 R14: 0000000000000800 R15: 0000000020012b00 [ 1916.915664] EXT4-fs (loop7): fragment/cluster size (16384) != block size (1024) [ 1916.926424] FAULT_INJECTION: forcing a failure. [ 1916.926424] name failslab, interval 1, probability 0, space 0, times 0 [ 1916.928112] CPU: 0 PID: 15458 Comm: syz-executor.5 Not tainted 5.10.45 #1 [ 1916.929136] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS rel-1.14.0-0-g155821a1990b-prebuilt.qemu.org 04/01/2014 [ 1916.930711] Call Trace: [ 1916.931092] dump_stack+0x107/0x163 [ 1916.931643] should_fail.cold+0x5/0xa [ 1916.932211] ? security_inode_alloc+0x34/0x160 [ 1916.932872] should_failslab+0x5/0x10 [ 1916.933415] kmem_cache_alloc+0x5b/0x350 [ 1916.934072] security_inode_alloc+0x34/0x160 [ 1916.934714] inode_init_always+0x503/0xc90 [ 1916.935325] alloc_inode+0x84/0x230 [ 1916.935869] new_inode+0x23/0x240 [ 1916.936532] shmem_get_inode+0x15e/0xbc0 [ 1916.937153] __shmem_file_setup+0xb8/0x310 [ 1916.937831] ? _copy_from_user+0xfb/0x1b0 [ 1916.938498] __do_sys_memfd_create+0x271/0x450 [ 1916.939199] ? memfd_file_seals_ptr+0x150/0x150 [ 1916.939898] ? lockdep_hardirqs_on_prepare+0x273/0x3e0 [ 1916.940724] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1916.941519] do_syscall_64+0x33/0x40 [ 1916.942038] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 1916.942616] RIP: 0033:0x466609 [ 1916.942975] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1916.945018] RSP: 002b:00007f73482ddf48 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 1916.946021] RAX: ffffffffffffffda RBX: 0000000020000200 RCX: 0000000000466609 [ 1916.947081] RDX: 0000000000000800 RSI: 0000000000000000 RDI: 00000000004bee66 [ 1916.948147] RBP: 0000000000000001 R08: 0000000000000400 R09: ffffffffffffffff [ 1916.949209] R10: 0000000000000001 R11: 0000000000000246 R12: 0000000008100000 [ 1916.950360] R13: 0000000020000180 R14: 0000000000000800 R15: 0000000020012b00 [ 1916.958006] EXT4-fs (loop4): fragment/cluster size (16384) != block size (1024) [ 1917.023477] EXT4-fs (loop6): fragment/cluster size (16384) != block size (1024) 19:43:13 executing program 0 (fault-call:0 fault-nth:2): syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000500100000f000000000000000000000004000000000002000020000020000000def4655fdef4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000008000000018000000c20500002b02", 0x66, 0x400}, {&(0x7f0000010100)="000000000000000000000000e58ca12e13a240e2b1a22f8d07e8e55f010040", 0x1f, 0x4e0}, {&(0x7f0000010200)="010000000000050040", 0x9, 0x560}, {0x0, 0x0, 0x1000000000c00}, {&(0x7f0000012000)="504d4d00504d4dff", 0x8, 0x10000}], 0x0, &(0x7f0000012b00)) 19:43:13 executing program 2: r0 = syz_io_uring_setup(0x2, &(0x7f0000000500), &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000ff6000/0xa000)=nil, &(0x7f0000000080)=0x0, &(0x7f0000000140)=0x0) r3 = io_uring_setup(0x3ddf, &(0x7f0000000680)) syz_io_uring_submit(r1, r2, &(0x7f0000000800)=@IORING_OP_SENDMSG={0x9, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0}, 0x0) r4 = eventfd(0x0) io_uring_register$IORING_REGISTER_EVENTFD(r0, 0x4, &(0x7f0000000000)=r4, 0x1) read$eventfd(r4, &(0x7f0000000040), 0x8) r5 = syz_io_uring_setup(0x3702, &(0x7f00000001c0), &(0x7f0000000000/0x3000)=nil, &(0x7f0000ffe000/0x2000)=nil, 0x0, &(0x7f0000000240)) r6 = dup2(r3, r5) r7 = dup2(r0, r6) io_uring_enter(r7, 0x1739, 0x0, 0x0, 0x0, 0x0) 19:43:13 executing program 3 (fault-call:0 fault-nth:4): syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000500100000f000000000000000000000004000000000002000020000020000000def4655fdef4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000012b00)) 19:43:13 executing program 7 (fault-call:0 fault-nth:2): syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000500100000f000000000000000000000004000000000002000020000020000000def4655fdef4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000010100)="000000000000000000000000e58ca12e13a240e2b1a22f8d07e8e55f010040", 0x1f, 0x4e0}], 0x0, &(0x7f0000012b00)) 19:43:13 executing program 5 (fault-call:0 fault-nth:6): syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000500100000f000000000000000000000004000000000002000020000020000000def4655fdef4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000012b00)) 19:43:13 executing program 4 (fault-call:0 fault-nth:5): syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000500100000f000000000000000000000004000000000002000020000020000000def4655fdef4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000012b00)) 19:43:13 executing program 6 (fault-call:0 fault-nth:5): syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000500100000f000000000000000000000004000000000002000020000020000000def4655fdef4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000012b00)) 19:43:13 executing program 1: r0 = syz_io_uring_setup(0x2, &(0x7f0000000500), &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000ff6000/0xa000)=nil, &(0x7f0000000080)=0x0, &(0x7f0000000140)=0x0) r3 = io_uring_setup(0x3ddf, &(0x7f0000000680)) syz_io_uring_submit(r1, r2, &(0x7f0000000800)=@IORING_OP_SENDMSG={0x9, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0}, 0x0) r4 = eventfd(0x0) io_uring_register$IORING_REGISTER_EVENTFD(r0, 0x4, &(0x7f0000000000)=r4, 0x1) read$eventfd(r4, &(0x7f0000000040), 0x8) r5 = syz_io_uring_setup(0x3702, &(0x7f00000001c0), &(0x7f0000000000/0x3000)=nil, &(0x7f0000ffe000/0x2000)=nil, &(0x7f0000000140), &(0x7f0000000240)) dup2(r3, r5) r6 = dup2(r0, 0xffffffffffffffff) io_uring_enter(r6, 0x1739, 0x0, 0x0, 0x0, 0x0) [ 1928.259566] FAULT_INJECTION: forcing a failure. [ 1928.259566] name failslab, interval 1, probability 0, space 0, times 0 [ 1928.260883] CPU: 0 PID: 15470 Comm: syz-executor.6 Not tainted 5.10.45 #1 [ 1928.261620] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS rel-1.14.0-0-g155821a1990b-prebuilt.qemu.org 04/01/2014 [ 1928.262883] Call Trace: [ 1928.263177] dump_stack+0x107/0x163 [ 1928.263582] should_fail.cold+0x5/0xa [ 1928.264001] ? security_inode_alloc+0x34/0x160 [ 1928.264497] should_failslab+0x5/0x10 [ 1928.264905] kmem_cache_alloc+0x5b/0x350 [ 1928.265350] security_inode_alloc+0x34/0x160 [ 1928.265860] inode_init_always+0x503/0xc90 [ 1928.266313] alloc_inode+0x84/0x230 [ 1928.266703] new_inode+0x23/0x240 [ 1928.267081] shmem_get_inode+0x15e/0xbc0 [ 1928.267518] __shmem_file_setup+0xb8/0x310 [ 1928.267972] ? _copy_from_user+0xfb/0x1b0 [ 1928.268001] FAULT_INJECTION: forcing a failure. [ 1928.268001] name failslab, interval 1, probability 0, space 0, times 0 [ 1928.268428] __do_sys_memfd_create+0x271/0x450 [ 1928.271296] ? memfd_file_seals_ptr+0x150/0x150 [ 1928.271799] ? lockdep_hardirqs_on_prepare+0x273/0x3e0 [ 1928.272362] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1928.272943] do_syscall_64+0x33/0x40 [ 1928.273360] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 1928.273943] RIP: 0033:0x466609 [ 1928.274289] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1928.276346] RSP: 002b:00007f8698989f48 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 1928.277226] RAX: ffffffffffffffda RBX: 0000000020000200 RCX: 0000000000466609 [ 1928.278003] RDX: 0000000000000800 RSI: 0000000000000000 RDI: 00000000004bee66 [ 1928.278815] RBP: 0000000000000001 R08: 0000000000000400 R09: ffffffffffffffff [ 1928.279590] R10: 0000000000000001 R11: 0000000000000246 R12: 0000000008100000 [ 1928.280390] R13: 0000000020000180 R14: 0000000000000800 R15: 0000000020012b00 [ 1928.281184] CPU: 1 PID: 15471 Comm: syz-executor.3 Not tainted 5.10.45 #1 [ 1928.282539] FAULT_INJECTION: forcing a failure. [ 1928.282539] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 1928.282673] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS rel-1.14.0-0-g155821a1990b-prebuilt.qemu.org 04/01/2014 [ 1928.282678] Call Trace: [ 1928.282697] dump_stack+0x107/0x163 [ 1928.287777] should_fail.cold+0x5/0xa [ 1928.288596] ? create_object.isra.0+0x3a/0xa20 [ 1928.289575] should_failslab+0x5/0x10 [ 1928.290411] kmem_cache_alloc+0x5b/0x350 [ 1928.291290] create_object.isra.0+0x3a/0xa20 [ 1928.292233] ? __kasan_kmalloc.constprop.0+0xc2/0xd0 [ 1928.293326] kmem_cache_alloc+0x159/0x350 [ 1928.294225] ? shmem_destroy_inode+0x70/0x70 [ 1928.295171] shmem_alloc_inode+0x18/0x40 [ 1928.296040] ? shmem_destroy_inode+0x70/0x70 [ 1928.296979] alloc_inode+0x63/0x230 [ 1928.297778] new_inode+0x23/0x240 [ 1928.298523] shmem_get_inode+0x15e/0xbc0 [ 1928.299400] __shmem_file_setup+0xb8/0x310 [ 1928.300304] ? _copy_from_user+0xfb/0x1b0 [ 1928.301196] __do_sys_memfd_create+0x271/0x450 [ 1928.302183] ? memfd_file_seals_ptr+0x150/0x150 [ 1928.303181] ? lockdep_hardirqs_on_prepare+0x273/0x3e0 [ 1928.304306] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1928.305413] do_syscall_64+0x33/0x40 [ 1928.306216] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 1928.307323] RIP: 0033:0x466609 [ 1928.308012] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1928.311995] RSP: 002b:00007fae06bc9f48 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 1928.313625] RAX: ffffffffffffffda RBX: 0000000020000200 RCX: 0000000000466609 [ 1928.315174] RDX: 0000000000000800 RSI: 0000000000000000 RDI: 00000000004bee66 [ 1928.316716] RBP: 0000000000000001 R08: 0000000000000400 R09: ffffffffffffffff [ 1928.318266] R10: 0000000000000001 R11: 0000000000000246 R12: 0000000008100000 [ 1928.319802] R13: 0000000020000180 R14: 0000000000000800 R15: 0000000020012b00 [ 1928.321358] CPU: 0 PID: 15472 Comm: syz-executor.0 Not tainted 5.10.45 #1 [ 1928.322098] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS rel-1.14.0-0-g155821a1990b-prebuilt.qemu.org 04/01/2014 [ 1928.323297] Call Trace: [ 1928.323579] dump_stack+0x107/0x163 [ 1928.323971] should_fail.cold+0x5/0xa [ 1928.324392] _copy_from_user+0x2e/0x1b0 [ 1928.324833] __do_sys_memfd_create+0x16d/0x450 [ 1928.325338] ? memfd_file_seals_ptr+0x150/0x150 [ 1928.325857] ? lockdep_hardirqs_on_prepare+0x273/0x3e0 [ 1928.326423] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1928.326999] do_syscall_64+0x33/0x40 [ 1928.327402] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 1928.327973] RIP: 0033:0x466609 [ 1928.328325] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1928.330392] RSP: 002b:00007f52a9646f48 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 1928.330865] FAULT_INJECTION: forcing a failure. [ 1928.330865] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 1928.331210] RAX: ffffffffffffffda RBX: 0000000020000200 RCX: 0000000000466609 [ 1928.331222] RDX: 0000000000020000 RSI: 0000000000000000 RDI: 00000000004bee66 [ 1928.335265] RBP: 0000000000000005 R08: 0000000000010000 R09: ffffffffffffffff [ 1928.336054] R10: 0000000000000005 R11: 0000000000000246 R12: 0000000008100000 [ 1928.336848] R13: 0000000020000180 R14: 0000000000201800 R15: 0000000020012b00 [ 1928.337720] CPU: 1 PID: 15473 Comm: syz-executor.7 Not tainted 5.10.45 #1 [ 1928.339193] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS rel-1.14.0-0-g155821a1990b-prebuilt.qemu.org 04/01/2014 [ 1928.341621] Call Trace: [ 1928.342196] dump_stack+0x107/0x163 [ 1928.342980] should_fail.cold+0x5/0xa [ 1928.343800] _copy_from_user+0x2e/0x1b0 [ 1928.344656] __do_sys_memfd_create+0x16d/0x450 [ 1928.345640] ? memfd_file_seals_ptr+0x150/0x150 [ 1928.346667] ? lockdep_hardirqs_on_prepare+0x273/0x3e0 [ 1928.347791] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1928.348894] do_syscall_64+0x33/0x40 [ 1928.349700] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 1928.350800] RIP: 0033:0x466609 [ 1928.351487] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1928.355444] RSP: 002b:00007f4c69a47f48 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 1928.357078] RAX: ffffffffffffffda RBX: 0000000020000200 RCX: 0000000000466609 [ 1928.358624] RDX: 00000000000009c0 RSI: 0000000000000000 RDI: 00000000004bee66 [ 1928.360151] RBP: 0000000000000002 R08: 00000000000004e0 R09: ffffffffffffffff [ 1928.361531] FAULT_INJECTION: forcing a failure. [ 1928.361531] name failslab, interval 1, probability 0, space 0, times 0 [ 1928.361685] R10: 0000000000000002 R11: 0000000000000246 R12: 0000000008100000 [ 1928.361696] R13: 0000000020000180 R14: 00000000000009c0 R15: 0000000020012b00 19:43:13 executing program 6 (fault-call:0 fault-nth:6): syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000500100000f000000000000000000000004000000000002000020000020000000def4655fdef4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000012b00)) [ 1928.364576] CPU: 0 PID: 15480 Comm: syz-executor.6 Not tainted 5.10.45 #1 [ 1928.365486] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS rel-1.14.0-0-g155821a1990b-prebuilt.qemu.org 04/01/2014 [ 1928.366702] Call Trace: [ 1928.366989] dump_stack+0x107/0x163 [ 1928.367385] should_fail.cold+0x5/0xa [ 1928.367791] ? create_object.isra.0+0x3a/0xa20 [ 1928.368280] should_failslab+0x5/0x10 [ 1928.368690] kmem_cache_alloc+0x5b/0x350 [ 1928.369130] create_object.isra.0+0x3a/0xa20 [ 1928.369594] ? __kasan_kmalloc.constprop.0+0xc2/0xd0 [ 1928.370147] kmem_cache_alloc+0x159/0x350 [ 1928.370589] security_inode_alloc+0x34/0x160 [ 1928.371061] inode_init_always+0x503/0xc90 [ 1928.371515] alloc_inode+0x84/0x230 [ 1928.371920] new_inode+0x23/0x240 [ 1928.372308] shmem_get_inode+0x15e/0xbc0 [ 1928.372761] __shmem_file_setup+0xb8/0x310 [ 1928.373227] ? _copy_from_user+0xfb/0x1b0 [ 1928.373700] __do_sys_memfd_create+0x271/0x450 [ 1928.374207] ? memfd_file_seals_ptr+0x150/0x150 [ 1928.374725] ? lockdep_hardirqs_on_prepare+0x273/0x3e0 [ 1928.375306] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1928.375879] do_syscall_64+0x33/0x40 [ 1928.376280] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 1928.376848] RIP: 0033:0x466609 [ 1928.377167] FAULT_INJECTION: forcing a failure. [ 1928.377167] name failslab, interval 1, probability 0, space 0, times 0 [ 1928.377201] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1928.377212] RSP: 002b:00007f8698989f48 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 1928.382437] RAX: ffffffffffffffda RBX: 0000000020000200 RCX: 0000000000466609 [ 1928.383225] RDX: 0000000000000800 RSI: 0000000000000000 RDI: 00000000004bee66 [ 1928.384013] RBP: 0000000000000001 R08: 0000000000000400 R09: ffffffffffffffff [ 1928.384804] R10: 0000000000000001 R11: 0000000000000246 R12: 0000000008100000 [ 1928.385604] R13: 0000000020000180 R14: 0000000000000800 R15: 0000000020012b00 [ 1928.386424] CPU: 1 PID: 15474 Comm: syz-executor.4 Not tainted 5.10.45 #1 [ 1928.387896] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS rel-1.14.0-0-g155821a1990b-prebuilt.qemu.org 04/01/2014 [ 1928.390382] Call Trace: [ 1928.390943] dump_stack+0x107/0x163 [ 1928.391723] should_fail.cold+0x5/0xa [ 1928.392534] ? security_inode_alloc+0x34/0x160 [ 1928.393506] should_failslab+0x5/0x10 [ 1928.394317] kmem_cache_alloc+0x5b/0x350 [ 1928.395185] security_inode_alloc+0x34/0x160 [ 1928.396122] inode_init_always+0x503/0xc90 [ 1928.396403] FAULT_INJECTION: forcing a failure. [ 1928.396403] name failslab, interval 1, probability 0, space 0, times 0 [ 1928.397031] alloc_inode+0x84/0x230 [ 1928.397048] new_inode+0x23/0x240 [ 1928.397067] shmem_get_inode+0x15e/0xbc0 [ 1928.400645] __shmem_file_setup+0xb8/0x310 [ 1928.401549] ? _copy_from_user+0xfb/0x1b0 [ 1928.402445] __do_sys_memfd_create+0x271/0x450 [ 1928.403428] ? memfd_file_seals_ptr+0x150/0x150 [ 1928.404431] ? lockdep_hardirqs_on_prepare+0x273/0x3e0 [ 1928.405560] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1928.406679] do_syscall_64+0x33/0x40 [ 1928.407473] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 1928.408566] RIP: 0033:0x466609 [ 1928.409255] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1928.413209] RSP: 002b:00007fd513a12f48 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 1928.414841] RAX: ffffffffffffffda RBX: 0000000020000200 RCX: 0000000000466609 [ 1928.416382] RDX: 0000000000000800 RSI: 0000000000000000 RDI: 00000000004bee66 [ 1928.417910] RBP: 0000000000000001 R08: 0000000000000400 R09: ffffffffffffffff [ 1928.419438] R10: 0000000000000001 R11: 0000000000000246 R12: 0000000008100000 [ 1928.420966] R13: 0000000020000180 R14: 0000000000000800 R15: 0000000020012b00 [ 1928.422526] CPU: 0 PID: 15485 Comm: syz-executor.0 Not tainted 5.10.45 #1 19:43:13 executing program 0 (fault-call:0 fault-nth:3): syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000500100000f000000000000000000000004000000000002000020000020000000def4655fdef4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000008000000018000000c20500002b02", 0x66, 0x400}, {&(0x7f0000010100)="000000000000000000000000e58ca12e13a240e2b1a22f8d07e8e55f010040", 0x1f, 0x4e0}, {&(0x7f0000010200)="010000000000050040", 0x9, 0x560}, {0x0, 0x0, 0x1000000000c00}, {&(0x7f0000012000)="504d4d00504d4dff", 0x8, 0x10000}], 0x0, &(0x7f0000012b00)) [ 1928.423300] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS rel-1.14.0-0-g155821a1990b-prebuilt.qemu.org 04/01/2014 [ 1928.424607] Call Trace: [ 1928.424883] dump_stack+0x107/0x163 [ 1928.425292] should_fail.cold+0x5/0xa [ 1928.425493] FAULT_INJECTION: forcing a failure. [ 1928.425493] name failslab, interval 1, probability 0, space 0, times 0 [ 1928.425711] ? shmem_alloc_inode+0x18/0x40 [ 1928.425719] should_failslab+0x5/0x10 [ 1928.425726] kmem_cache_alloc+0x5b/0x350 [ 1928.425735] ? shmem_destroy_inode+0x70/0x70 [ 1928.425743] shmem_alloc_inode+0x18/0x40 [ 1928.425749] ? shmem_destroy_inode+0x70/0x70 [ 1928.425756] alloc_inode+0x63/0x230 [ 1928.425765] new_inode+0x23/0x240 [ 1928.425774] shmem_get_inode+0x15e/0xbc0 [ 1928.425786] __shmem_file_setup+0xb8/0x310 [ 1928.425794] ? _copy_from_user+0xfb/0x1b0 [ 1928.425805] __do_sys_memfd_create+0x271/0x450 [ 1928.425815] ? memfd_file_seals_ptr+0x150/0x150 [ 1928.425825] ? lockdep_hardirqs_on_prepare+0x273/0x3e0 [ 1928.425833] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1928.425843] do_syscall_64+0x33/0x40 [ 1928.425850] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 1928.425855] RIP: 0033:0x466609 [ 1928.425863] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1928.425867] RSP: 002b:00007f52a9646f48 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 1928.425876] RAX: ffffffffffffffda RBX: 0000000020000200 RCX: 0000000000466609 [ 1928.425881] RDX: 0000000000020000 RSI: 0000000000000000 RDI: 00000000004bee66 [ 1928.425901] RBP: 0000000000000005 R08: 0000000000010000 R09: ffffffffffffffff [ 1928.441757] R10: 0000000000000005 R11: 0000000000000246 R12: 0000000008100000 [ 1928.442536] R13: 0000000020000180 R14: 0000000000201800 R15: 0000000020012b00 [ 1928.443348] CPU: 1 PID: 15475 Comm: syz-executor.5 Not tainted 5.10.45 #1 [ 1928.444769] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS rel-1.14.0-0-g155821a1990b-prebuilt.qemu.org 04/01/2014 [ 1928.447051] Call Trace: [ 1928.447588] dump_stack+0x107/0x163 [ 1928.448322] should_fail.cold+0x5/0xa [ 1928.449089] ? create_object.isra.0+0x3a/0xa20 [ 1928.450017] should_failslab+0x5/0x10 [ 1928.450785] kmem_cache_alloc+0x5b/0x350 [ 1928.451614] create_object.isra.0+0x3a/0xa20 [ 1928.452501] ? __kasan_kmalloc.constprop.0+0xc2/0xd0 [ 1928.453527] kmem_cache_alloc+0x159/0x350 [ 1928.454389] security_inode_alloc+0x34/0x160 [ 1928.455283] inode_init_always+0x503/0xc90 [ 1928.456136] alloc_inode+0x84/0x230 [ 1928.456884] new_inode+0x23/0x240 [ 1928.457588] shmem_get_inode+0x15e/0xbc0 [ 1928.458421] __shmem_file_setup+0xb8/0x310 [ 1928.459279] ? _copy_from_user+0xfb/0x1b0 [ 1928.460134] __do_sys_memfd_create+0x271/0x450 [ 1928.461060] ? memfd_file_seals_ptr+0x150/0x150 [ 1928.462014] ? lockdep_hardirqs_on_prepare+0x273/0x3e0 [ 1928.463075] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1928.464112] do_syscall_64+0x33/0x40 [ 1928.464862] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 1928.465903] RIP: 0033:0x466609 [ 1928.466550] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1928.470253] RSP: 002b:00007f73482ddf48 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 1928.471780] RAX: ffffffffffffffda RBX: 0000000020000200 RCX: 0000000000466609 [ 1928.473211] RDX: 0000000000000800 RSI: 0000000000000000 RDI: 00000000004bee66 [ 1928.474656] RBP: 0000000000000001 R08: 0000000000000400 R09: ffffffffffffffff [ 1928.476089] R10: 0000000000000001 R11: 0000000000000246 R12: 0000000008100000 [ 1928.477520] R13: 0000000020000180 R14: 0000000000000800 R15: 0000000020012b00 [ 1928.488334] EXT4-fs (loop6): fragment/cluster size (16384) != block size (1024) [ 1928.573245] EXT4-fs (loop3): fragment/cluster size (16384) != block size (1024) [ 1928.582867] EXT4-fs (loop5): fragment/cluster size (16384) != block size (1024) 19:43:27 executing program 0 (fault-call:0 fault-nth:4): syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000500100000f000000000000000000000004000000000002000020000020000000def4655fdef4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000008000000018000000c20500002b02", 0x66, 0x400}, {&(0x7f0000010100)="000000000000000000000000e58ca12e13a240e2b1a22f8d07e8e55f010040", 0x1f, 0x4e0}, {&(0x7f0000010200)="010000000000050040", 0x9, 0x560}, {0x0, 0x0, 0x1000000000c00}, {&(0x7f0000012000)="504d4d00504d4dff", 0x8, 0x10000}], 0x0, &(0x7f0000012b00)) 19:43:27 executing program 1: r0 = syz_io_uring_setup(0x2, &(0x7f0000000500), &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000ff6000/0xa000)=nil, &(0x7f0000000080)=0x0, &(0x7f0000000140)=0x0) r3 = io_uring_setup(0x3ddf, &(0x7f0000000680)) syz_io_uring_submit(r1, r2, &(0x7f0000000800)=@IORING_OP_SENDMSG={0x9, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0}, 0x0) r4 = eventfd(0x0) io_uring_register$IORING_REGISTER_EVENTFD(r0, 0x4, &(0x7f0000000000)=r4, 0x1) read$eventfd(r4, &(0x7f0000000040), 0x8) r5 = syz_io_uring_setup(0x3702, &(0x7f00000001c0), &(0x7f0000000000/0x3000)=nil, &(0x7f0000ffe000/0x2000)=nil, &(0x7f0000000140), &(0x7f0000000240)) dup2(r3, r5) r6 = dup2(r0, 0xffffffffffffffff) io_uring_enter(r6, 0x1739, 0x0, 0x0, 0x0, 0x0) 19:43:27 executing program 2: r0 = syz_io_uring_setup(0x2, &(0x7f0000000500), &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000ff6000/0xa000)=nil, &(0x7f0000000080)=0x0, &(0x7f0000000140)=0x0) r3 = io_uring_setup(0x3ddf, &(0x7f0000000680)) syz_io_uring_submit(r1, r2, &(0x7f0000000800)=@IORING_OP_SENDMSG={0x9, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0}, 0x0) r4 = eventfd(0x0) io_uring_register$IORING_REGISTER_EVENTFD(r0, 0x4, &(0x7f0000000000)=r4, 0x1) read$eventfd(r4, &(0x7f0000000040), 0x8) r5 = syz_io_uring_setup(0x3702, &(0x7f00000001c0), &(0x7f0000000000/0x3000)=nil, &(0x7f0000ffe000/0x2000)=nil, &(0x7f0000000140), 0x0) r6 = dup2(r3, r5) r7 = dup2(r0, r6) io_uring_enter(r7, 0x1739, 0x0, 0x0, 0x0, 0x0) 19:43:27 executing program 4 (fault-call:0 fault-nth:6): syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000500100000f000000000000000000000004000000000002000020000020000000def4655fdef4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000012b00)) 19:43:27 executing program 7 (fault-call:0 fault-nth:3): syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000500100000f000000000000000000000004000000000002000020000020000000def4655fdef4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000010100)="000000000000000000000000e58ca12e13a240e2b1a22f8d07e8e55f010040", 0x1f, 0x4e0}], 0x0, &(0x7f0000012b00)) 19:43:27 executing program 6 (fault-call:0 fault-nth:7): syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000500100000f000000000000000000000004000000000002000020000020000000def4655fdef4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000012b00)) 19:43:27 executing program 3 (fault-call:0 fault-nth:5): syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000500100000f000000000000000000000004000000000002000020000020000000def4655fdef4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000012b00)) 19:43:27 executing program 5 (fault-call:0 fault-nth:7): syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000500100000f000000000000000000000004000000000002000020000020000000def4655fdef4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000012b00)) [ 1942.091842] FAULT_INJECTION: forcing a failure. [ 1942.091842] name failslab, interval 1, probability 0, space 0, times 0 [ 1942.093359] CPU: 0 PID: 15515 Comm: syz-executor.6 Not tainted 5.10.45 #1 [ 1942.094215] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS rel-1.14.0-0-g155821a1990b-prebuilt.qemu.org 04/01/2014 [ 1942.095606] Call Trace: [ 1942.095940] dump_stack+0x107/0x163 [ 1942.096059] FAULT_INJECTION: forcing a failure. [ 1942.096059] name failslab, interval 1, probability 0, space 0, times 0 [ 1942.096416] should_fail.cold+0x5/0xa [ 1942.096436] ? __d_alloc+0x2a/0x990 [ 1942.098963] should_failslab+0x5/0x10 [ 1942.099385] kmem_cache_alloc+0x5b/0x350 [ 1942.099834] ? trace_hardirqs_on+0x5b/0x180 [ 1942.100367] __d_alloc+0x2a/0x990 [ 1942.100912] d_alloc_pseudo+0x19/0x70 [ 1942.101469] alloc_file_pseudo+0xce/0x250 [ 1942.102106] ? alloc_file+0x5a0/0x5a0 [ 1942.102650] ? shmem_get_inode+0x55c/0xbc0 [ 1942.103270] __shmem_file_setup+0x144/0x310 [ 1942.103928] ? _copy_from_user+0xfb/0x1b0 [ 1942.104553] __do_sys_memfd_create+0x271/0x450 [ 1942.105243] ? memfd_file_seals_ptr+0x150/0x150 [ 1942.105979] ? lockdep_hardirqs_on_prepare+0x273/0x3e0 [ 1942.106772] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1942.107546] do_syscall_64+0x33/0x40 [ 1942.108130] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 1942.108909] RIP: 0033:0x466609 [ 1942.109390] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1942.112160] RSP: 002b:00007f8698989f48 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 1942.113309] RAX: ffffffffffffffda RBX: 0000000020000200 RCX: 0000000000466609 [ 1942.114424] RDX: 0000000000000800 RSI: 0000000000000000 RDI: 00000000004bee66 [ 1942.115494] RBP: 0000000000000001 R08: 0000000000000400 R09: ffffffffffffffff [ 1942.116529] R10: 0000000000000001 R11: 0000000000000246 R12: 0000000008100000 [ 1942.117588] R13: 0000000020000180 R14: 0000000000000800 R15: 0000000020012b00 [ 1942.118604] CPU: 1 PID: 15517 Comm: syz-executor.0 Not tainted 5.10.45 #1 [ 1942.119582] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS rel-1.14.0-0-g155821a1990b-prebuilt.qemu.org 04/01/2014 [ 1942.119634] FAULT_INJECTION: forcing a failure. [ 1942.119634] name failslab, interval 1, probability 0, space 0, times 0 [ 1942.121187] Call Trace: [ 1942.121212] dump_stack+0x107/0x163 [ 1942.121228] should_fail.cold+0x5/0xa [ 1942.121242] ? create_object.isra.0+0x3a/0xa20 [ 1942.121259] should_failslab+0x5/0x10 [ 1942.125345] kmem_cache_alloc+0x5b/0x350 [ 1942.125985] create_object.isra.0+0x3a/0xa20 [ 1942.126661] ? __kasan_kmalloc.constprop.0+0xc2/0xd0 [ 1942.127467] kmem_cache_alloc+0x159/0x350 [ 1942.128088] ? shmem_destroy_inode+0x70/0x70 [ 1942.128747] shmem_alloc_inode+0x18/0x40 [ 1942.129327] ? shmem_destroy_inode+0x70/0x70 [ 1942.129990] alloc_inode+0x63/0x230 [ 1942.130530] new_inode+0x23/0x240 [ 1942.131045] shmem_get_inode+0x15e/0xbc0 [ 1942.131662] __shmem_file_setup+0xb8/0x310 [ 1942.132300] ? _copy_from_user+0xfb/0x1b0 [ 1942.132931] __do_sys_memfd_create+0x271/0x450 [ 1942.133613] ? memfd_file_seals_ptr+0x150/0x150 [ 1942.134330] ? lockdep_hardirqs_on_prepare+0x273/0x3e0 [ 1942.135121] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1942.135895] do_syscall_64+0x33/0x40 [ 1942.136461] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 1942.137231] RIP: 0033:0x466609 [ 1942.137725] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1942.140467] RSP: 002b:00007f52a9646f48 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 1942.141621] RAX: ffffffffffffffda RBX: 0000000020000200 RCX: 0000000000466609 [ 1942.142689] RDX: 0000000000020000 RSI: 0000000000000000 RDI: 00000000004bee66 [ 1942.143762] RBP: 0000000000000005 R08: 0000000000010000 R09: ffffffffffffffff [ 1942.144807] R10: 0000000000000005 R11: 0000000000000246 R12: 0000000008100000 [ 1942.145841] R13: 0000000020000180 R14: 0000000000201800 R15: 0000000020012b00 [ 1942.146907] CPU: 0 PID: 15516 Comm: syz-executor.5 Not tainted 5.10.45 #1 [ 1942.147746] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS rel-1.14.0-0-g155821a1990b-prebuilt.qemu.org 04/01/2014 [ 1942.149014] Call Trace: [ 1942.149314] dump_stack+0x107/0x163 [ 1942.149724] should_fail.cold+0x5/0xa [ 1942.150164] ? __d_alloc+0x2a/0x990 [ 1942.150847] should_failslab+0x5/0x10 [ 1942.151444] kmem_cache_alloc+0x5b/0x350 [ 1942.152125] ? trace_hardirqs_on+0x5b/0x180 [ 1942.152732] __d_alloc+0x2a/0x990 [ 1942.153252] d_alloc_pseudo+0x19/0x70 [ 1942.154007] alloc_file_pseudo+0xce/0x250 [ 1942.154619] ? alloc_file+0x5a0/0x5a0 [ 1942.155184] ? shmem_get_inode+0x55c/0xbc0 [ 1942.155805] __shmem_file_setup+0x144/0x310 [ 1942.156440] ? _copy_from_user+0xfb/0x1b0 [ 1942.157052] __do_sys_memfd_create+0x271/0x450 [ 1942.157721] ? memfd_file_seals_ptr+0x150/0x150 [ 1942.157765] FAULT_INJECTION: forcing a failure. [ 1942.157765] name failslab, interval 1, probability 0, space 0, times 0 [ 1942.158423] ? lockdep_hardirqs_on_prepare+0x273/0x3e0 [ 1942.160910] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1942.161690] do_syscall_64+0x33/0x40 [ 1942.162261] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 1942.163003] RIP: 0033:0x466609 [ 1942.163473] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1942.166240] RSP: 002b:00007f73482ddf48 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 1942.167384] RAX: ffffffffffffffda RBX: 0000000020000200 RCX: 0000000000466609 [ 1942.168426] RDX: 0000000000000800 RSI: 0000000000000000 RDI: 00000000004bee66 [ 1942.169487] RBP: 0000000000000001 R08: 0000000000000400 R09: ffffffffffffffff [ 1942.170557] R10: 0000000000000001 R11: 0000000000000246 R12: 0000000008100000 [ 1942.171598] R13: 0000000020000180 R14: 0000000000000800 R15: 0000000020012b00 [ 1942.172672] CPU: 1 PID: 15519 Comm: syz-executor.7 Not tainted 5.10.45 #1 [ 1942.173851] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS rel-1.14.0-0-g155821a1990b-prebuilt.qemu.org 04/01/2014 [ 1942.175774] Call Trace: [ 1942.175995] FAULT_INJECTION: forcing a failure. [ 1942.175995] name failslab, interval 1, probability 0, space 0, times 0 [ 1942.176146] dump_stack+0x107/0x163 [ 1942.178335] should_fail.cold+0x5/0xa [ 1942.178928] ? shmem_alloc_inode+0x18/0x40 [ 1942.179577] should_failslab+0x5/0x10 [ 1942.180142] kmem_cache_alloc+0x5b/0x350 [ 1942.180740] ? shmem_destroy_inode+0x70/0x70 [ 1942.181405] shmem_alloc_inode+0x18/0x40 [ 1942.182045] ? shmem_destroy_inode+0x70/0x70 [ 1942.182725] alloc_inode+0x63/0x230 [ 1942.183271] new_inode+0x23/0x240 [ 1942.183803] shmem_get_inode+0x15e/0xbc0 [ 1942.184359] __shmem_file_setup+0xb8/0x310 [ 1942.184932] ? _copy_from_user+0xfb/0x1b0 [ 1942.185540] __do_sys_memfd_create+0x271/0x450 [ 1942.186244] ? memfd_file_seals_ptr+0x150/0x150 [ 1942.186871] ? lockdep_hardirqs_on_prepare+0x273/0x3e0 [ 1942.187585] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1942.188275] do_syscall_64+0x33/0x40 [ 1942.188806] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 1942.189513] RIP: 0033:0x466609 [ 1942.189988] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1942.192463] RSP: 002b:00007f4c69a47f48 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 1942.193585] RAX: ffffffffffffffda RBX: 0000000020000200 RCX: 0000000000466609 [ 1942.194685] RDX: 00000000000009c0 RSI: 0000000000000000 RDI: 00000000004bee66 [ 1942.195756] RBP: 0000000000000002 R08: 00000000000004e0 R09: ffffffffffffffff [ 1942.196835] R10: 0000000000000002 R11: 0000000000000246 R12: 0000000008100000 [ 1942.197908] R13: 0000000020000180 R14: 00000000000009c0 R15: 0000000020012b00 [ 1942.198966] CPU: 0 PID: 15525 Comm: syz-executor.4 Not tainted 5.10.45 #1 [ 1942.199990] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS rel-1.14.0-0-g155821a1990b-prebuilt.qemu.org 04/01/2014 [ 1942.201619] Call Trace: [ 1942.202027] dump_stack+0x107/0x163 [ 1942.202550] should_fail.cold+0x5/0xa [ 1942.203144] ? create_object.isra.0+0x3a/0xa20 [ 1942.203205] FAULT_INJECTION: forcing a failure. [ 1942.203205] name failslab, interval 1, probability 0, space 0, times 0 [ 1942.203822] should_failslab+0x5/0x10 [ 1942.203835] kmem_cache_alloc+0x5b/0x350 [ 1942.203853] create_object.isra.0+0x3a/0xa20 [ 1942.203862] ? __kasan_kmalloc.constprop.0+0xc2/0xd0 [ 1942.203881] kmem_cache_alloc+0x159/0x350 [ 1942.208690] security_inode_alloc+0x34/0x160 [ 1942.209340] inode_init_always+0x503/0xc90 [ 1942.210000] alloc_inode+0x84/0x230 [ 1942.210544] new_inode+0x23/0x240 [ 1942.211057] shmem_get_inode+0x15e/0xbc0 [ 1942.211628] __shmem_file_setup+0xb8/0x310 [ 1942.212214] ? _copy_from_user+0xfb/0x1b0 [ 1942.212810] __do_sys_memfd_create+0x271/0x450 [ 1942.213476] ? memfd_file_seals_ptr+0x150/0x150 [ 1942.214168] ? lockdep_hardirqs_on_prepare+0x273/0x3e0 [ 1942.214920] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1942.215647] do_syscall_64+0x33/0x40 [ 1942.216197] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 1942.216945] RIP: 0033:0x466609 [ 1942.217404] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1942.220128] RSP: 002b:00007fd513a12f48 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 1942.221260] RAX: ffffffffffffffda RBX: 0000000020000200 RCX: 0000000000466609 [ 1942.222323] RDX: 0000000000000800 RSI: 0000000000000000 RDI: 00000000004bee66 [ 1942.223386] RBP: 0000000000000001 R08: 0000000000000400 R09: ffffffffffffffff [ 1942.224436] R10: 0000000000000001 R11: 0000000000000246 R12: 0000000008100000 [ 1942.225494] R13: 0000000020000180 R14: 0000000000000800 R15: 0000000020012b00 [ 1942.226565] CPU: 1 PID: 15521 Comm: syz-executor.3 Not tainted 5.10.45 #1 [ 1942.227626] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS rel-1.14.0-0-g155821a1990b-prebuilt.qemu.org 04/01/2014 [ 1942.229293] Call Trace: [ 1942.229696] dump_stack+0x107/0x163 [ 1942.230261] should_fail.cold+0x5/0xa [ 1942.230830] ? security_inode_alloc+0x34/0x160 [ 1942.231504] should_failslab+0x5/0x10 [ 1942.232070] kmem_cache_alloc+0x5b/0x350 [ 1942.232661] security_inode_alloc+0x34/0x160 [ 1942.233327] inode_init_always+0x503/0xc90 [ 1942.234014] alloc_inode+0x84/0x230 [ 1942.234556] new_inode+0x23/0x240 [ 1942.235080] shmem_get_inode+0x15e/0xbc0 [ 1942.235699] __shmem_file_setup+0xb8/0x310 [ 1942.236323] ? _copy_from_user+0xfb/0x1b0 [ 1942.236939] __do_sys_memfd_create+0x271/0x450 [ 1942.237627] ? memfd_file_seals_ptr+0x150/0x150 [ 1942.238350] ? lockdep_hardirqs_on_prepare+0x273/0x3e0 [ 1942.239131] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1942.239900] do_syscall_64+0x33/0x40 [ 1942.240450] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 1942.241186] RIP: 0033:0x466609 [ 1942.241665] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1942.243152] EXT4-fs (loop4): fragment/cluster size (16384) != block size (1024) [ 1942.244440] RSP: 002b:00007fae06bc9f48 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 1942.244455] RAX: ffffffffffffffda RBX: 0000000020000200 RCX: 0000000000466609 [ 1942.244462] RDX: 0000000000000800 RSI: 0000000000000000 RDI: 00000000004bee66 [ 1942.244469] RBP: 0000000000000001 R08: 0000000000000400 R09: ffffffffffffffff [ 1942.244476] R10: 0000000000000001 R11: 0000000000000246 R12: 0000000008100000 [ 1942.244482] R13: 0000000020000180 R14: 0000000000000800 R15: 0000000020012b00 19:43:27 executing program 6 (fault-call:0 fault-nth:8): syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000500100000f000000000000000000000004000000000002000020000020000000def4655fdef4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000012b00)) 19:43:27 executing program 5 (fault-call:0 fault-nth:8): syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000500100000f000000000000000000000004000000000002000020000020000000def4655fdef4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000012b00)) [ 1942.296432] FAULT_INJECTION: forcing a failure. [ 1942.296432] name failslab, interval 1, probability 0, space 0, times 0 [ 1942.298112] CPU: 0 PID: 15538 Comm: syz-executor.5 Not tainted 5.10.45 #1 [ 1942.299038] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS rel-1.14.0-0-g155821a1990b-prebuilt.qemu.org 04/01/2014 [ 1942.300560] Call Trace: [ 1942.300926] dump_stack+0x107/0x163 [ 1942.301414] should_fail.cold+0x5/0xa [ 1942.301957] ? create_object.isra.0+0x3a/0xa20 [ 1942.302572] should_failslab+0x5/0x10 [ 1942.303087] kmem_cache_alloc+0x5b/0x350 [ 1942.303635] ? mpol_shared_policy_init+0x1c0/0x3b0 [ 1942.304298] create_object.isra.0+0x3a/0xa20 [ 1942.304923] ? __kasan_kmalloc.constprop.0+0xc2/0xd0 [ 1942.305738] kmem_cache_alloc+0x159/0x350 [ 1942.306395] ? trace_hardirqs_on+0x5b/0x180 [ 1942.307032] __d_alloc+0x2a/0x990 [ 1942.307532] d_alloc_pseudo+0x19/0x70 [ 1942.308097] alloc_file_pseudo+0xce/0x250 [ 1942.308722] ? alloc_file+0x5a0/0x5a0 [ 1942.309287] ? shmem_get_inode+0x55c/0xbc0 [ 1942.309996] __shmem_file_setup+0x144/0x310 [ 1942.310653] ? _copy_from_user+0xfb/0x1b0 [ 1942.311301] __do_sys_memfd_create+0x271/0x450 [ 1942.312048] ? memfd_file_seals_ptr+0x150/0x150 [ 1942.312769] ? lockdep_hardirqs_on_prepare+0x273/0x3e0 [ 1942.313568] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1942.314361] do_syscall_64+0x33/0x40 [ 1942.314933] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 1942.315721] RIP: 0033:0x466609 [ 1942.316214] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1942.318992] RSP: 002b:00007f73482ddf48 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 1942.320133] RAX: ffffffffffffffda RBX: 0000000020000200 RCX: 0000000000466609 [ 1942.321208] RDX: 0000000000000800 RSI: 0000000000000000 RDI: 00000000004bee66 [ 1942.322355] RBP: 0000000000000001 R08: 0000000000000400 R09: ffffffffffffffff [ 1942.323461] R10: 0000000000000001 R11: 0000000000000246 R12: 0000000008100000 [ 1942.324537] R13: 0000000020000180 R14: 0000000000000800 R15: 0000000020012b00 [ 1942.328434] FAULT_INJECTION: forcing a failure. [ 1942.328434] name failslab, interval 1, probability 0, space 0, times 0 [ 1942.330203] CPU: 0 PID: 15539 Comm: syz-executor.6 Not tainted 5.10.45 #1 [ 1942.331013] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS rel-1.14.0-0-g155821a1990b-prebuilt.qemu.org 04/01/2014 [ 1942.332441] Call Trace: [ 1942.332768] dump_stack+0x107/0x163 [ 1942.333191] should_fail.cold+0x5/0xa [ 1942.333624] ? create_object.isra.0+0x3a/0xa20 [ 1942.334200] should_failslab+0x5/0x10 [ 1942.334639] kmem_cache_alloc+0x5b/0x350 [ 1942.335137] ? mpol_shared_policy_init+0x1c0/0x3b0 [ 1942.335706] create_object.isra.0+0x3a/0xa20 [ 1942.336211] ? __kasan_kmalloc.constprop.0+0xc2/0xd0 [ 1942.336794] kmem_cache_alloc+0x159/0x350 [ 1942.337281] ? trace_hardirqs_on+0x5b/0x180 [ 1942.337771] __d_alloc+0x2a/0x990 [ 1942.338278] d_alloc_pseudo+0x19/0x70 [ 1942.338805] alloc_file_pseudo+0xce/0x250 [ 1942.339289] ? alloc_file+0x5a0/0x5a0 [ 1942.339726] ? shmem_get_inode+0x55c/0xbc0 [ 1942.340215] __shmem_file_setup+0x144/0x310 [ 1942.340714] ? _copy_from_user+0xfb/0x1b0 [ 1942.341195] __do_sys_memfd_create+0x271/0x450 [ 1942.341733] ? memfd_file_seals_ptr+0x150/0x150 [ 1942.342390] ? lockdep_hardirqs_on_prepare+0x273/0x3e0 [ 1942.343019] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1942.343619] do_syscall_64+0x33/0x40 [ 1942.344062] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 1942.344650] RIP: 0033:0x466609 [ 1942.345028] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1942.347490] RSP: 002b:00007f8698989f48 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 1942.348460] RAX: ffffffffffffffda RBX: 0000000020000200 RCX: 0000000000466609 [ 1942.349287] RDX: 0000000000000800 RSI: 0000000000000000 RDI: 00000000004bee66 [ 1942.350194] RBP: 0000000000000001 R08: 0000000000000400 R09: ffffffffffffffff [ 1942.351014] R10: 0000000000000001 R11: 0000000000000246 R12: 0000000008100000 [ 1942.351840] R13: 0000000020000180 R14: 0000000000000800 R15: 0000000020012b00 19:43:27 executing program 4 (fault-call:0 fault-nth:7): syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000500100000f000000000000000000000004000000000002000020000020000000def4655fdef4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000012b00)) [ 1942.357571] EXT4-fs (loop5): fragment/cluster size (16384) != block size (1024) 19:43:27 executing program 5 (fault-call:0 fault-nth:9): syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000500100000f000000000000000000000004000000000002000020000020000000def4655fdef4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000012b00)) [ 1942.415638] FAULT_INJECTION: forcing a failure. [ 1942.415638] name failslab, interval 1, probability 0, space 0, times 0 [ 1942.417345] CPU: 1 PID: 15550 Comm: syz-executor.5 Not tainted 5.10.45 #1 [ 1942.418288] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS rel-1.14.0-0-g155821a1990b-prebuilt.qemu.org 04/01/2014 [ 1942.419866] Call Trace: [ 1942.420245] dump_stack+0x107/0x163 [ 1942.420750] should_fail.cold+0x5/0xa [ 1942.421261] ? __alloc_file+0x21/0x310 [ 1942.421785] should_failslab+0x5/0x10 [ 1942.422349] kmem_cache_alloc+0x5b/0x350 [ 1942.422907] __alloc_file+0x21/0x310 [ 1942.423410] alloc_empty_file+0x6d/0x170 [ 1942.423951] alloc_file+0x5e/0x5a0 [ 1942.424437] alloc_file_pseudo+0x16a/0x250 [ 1942.425012] ? alloc_file+0x5a0/0x5a0 [ 1942.425536] ? shmem_get_inode+0x55c/0xbc0 [ 1942.426171] __shmem_file_setup+0x144/0x310 [ 1942.426797] ? _copy_from_user+0xfb/0x1b0 [ 1942.427372] __do_sys_memfd_create+0x271/0x450 [ 1942.428001] ? memfd_file_seals_ptr+0x150/0x150 [ 1942.428767] ? lockdep_hardirqs_on_prepare+0x273/0x3e0 [ 1942.429580] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1942.430390] do_syscall_64+0x33/0x40 [ 1942.430960] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 1942.431746] RIP: 0033:0x466609 [ 1942.432251] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1942.435018] RSP: 002b:00007f73482ddf48 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 1942.436164] RAX: ffffffffffffffda RBX: 0000000020000200 RCX: 0000000000466609 [ 1942.437030] FAULT_INJECTION: forcing a failure. [ 1942.437030] name failslab, interval 1, probability 0, space 0, times 0 [ 1942.437242] RDX: 0000000000000800 RSI: 0000000000000000 RDI: 00000000004bee66 [ 1942.437256] RBP: 0000000000000001 R08: 0000000000000400 R09: ffffffffffffffff [ 1942.441094] R10: 0000000000000001 R11: 0000000000000246 R12: 0000000008100000 [ 1942.442203] R13: 0000000020000180 R14: 0000000000000800 R15: 0000000020012b00 [ 1942.443294] CPU: 0 PID: 15551 Comm: syz-executor.4 Not tainted 5.10.45 #1 [ 1942.444314] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS rel-1.14.0-0-g155821a1990b-prebuilt.qemu.org 04/01/2014 [ 1942.445993] Call Trace: [ 1942.446392] dump_stack+0x107/0x163 [ 1942.446936] should_fail.cold+0x5/0xa [ 1942.447512] ? __d_alloc+0x2a/0x990 [ 1942.448075] should_failslab+0x5/0x10 [ 1942.448655] kmem_cache_alloc+0x5b/0x350 [ 1942.449270] ? trace_hardirqs_on+0x5b/0x180 [ 1942.449935] __d_alloc+0x2a/0x990 [ 1942.450471] d_alloc_pseudo+0x19/0x70 [ 1942.451054] alloc_file_pseudo+0xce/0x250 [ 1942.451678] ? alloc_file+0x5a0/0x5a0 [ 1942.452237] ? shmem_get_inode+0x55c/0xbc0 [ 1942.452861] __shmem_file_setup+0x144/0x310 [ 1942.453523] ? _copy_from_user+0xfb/0x1b0 [ 1942.454173] __do_sys_memfd_create+0x271/0x450 [ 1942.454854] ? memfd_file_seals_ptr+0x150/0x150 [ 1942.455563] ? lockdep_hardirqs_on_prepare+0x273/0x3e0 [ 1942.456343] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1942.457131] do_syscall_64+0x33/0x40 [ 1942.457694] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 1942.458457] RIP: 0033:0x466609 [ 1942.458910] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1942.461636] RSP: 002b:00007fd513a12f48 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 1942.462782] RAX: ffffffffffffffda RBX: 0000000020000200 RCX: 0000000000466609 [ 1942.463828] RDX: 0000000000000800 RSI: 0000000000000000 RDI: 00000000004bee66 [ 1942.464874] RBP: 0000000000000001 R08: 0000000000000400 R09: ffffffffffffffff [ 1942.465979] R10: 0000000000000001 R11: 0000000000000246 R12: 0000000008100000 [ 1942.467024] R13: 0000000020000180 R14: 0000000000000800 R15: 0000000020012b00 [ 1942.470494] EXT4-fs (loop6): fragment/cluster size (16384) != block size (1024) 19:43:27 executing program 5 (fault-call:0 fault-nth:10): syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000500100000f000000000000000000000004000000000002000020000020000000def4655fdef4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000012b00)) 19:43:27 executing program 3 (fault-call:0 fault-nth:6): syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000500100000f000000000000000000000004000000000002000020000020000000def4655fdef4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000012b00)) 19:43:27 executing program 7 (fault-call:0 fault-nth:4): syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000500100000f000000000000000000000004000000000002000020000020000000def4655fdef4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000010100)="000000000000000000000000e58ca12e13a240e2b1a22f8d07e8e55f010040", 0x1f, 0x4e0}], 0x0, &(0x7f0000012b00)) [ 1942.521656] FAULT_INJECTION: forcing a failure. [ 1942.521656] name failslab, interval 1, probability 0, space 0, times 0 [ 1942.523452] CPU: 0 PID: 15556 Comm: syz-executor.5 Not tainted 5.10.45 #1 [ 1942.524386] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS rel-1.14.0-0-g155821a1990b-prebuilt.qemu.org 04/01/2014 [ 1942.525955] Call Trace: [ 1942.526327] dump_stack+0x107/0x163 [ 1942.526867] should_fail.cold+0x5/0xa [ 1942.527396] ? create_object.isra.0+0x3a/0xa20 [ 1942.528018] should_failslab+0x5/0x10 [ 1942.528536] kmem_cache_alloc+0x5b/0x350 [ 1942.529079] ? __d_instantiate+0x77/0x450 [ 1942.529696] create_object.isra.0+0x3a/0xa20 [ 1942.530367] ? __kasan_kmalloc.constprop.0+0xc2/0xd0 [ 1942.531136] kmem_cache_alloc+0x159/0x350 [ 1942.531769] __alloc_file+0x21/0x310 [ 1942.532333] alloc_empty_file+0x6d/0x170 [ 1942.532954] alloc_file+0x5e/0x5a0 [ 1942.533505] alloc_file_pseudo+0x16a/0x250 [ 1942.534174] ? alloc_file+0x5a0/0x5a0 [ 1942.534762] ? shmem_get_inode+0x55c/0xbc0 [ 1942.535400] __shmem_file_setup+0x144/0x310 19:43:27 executing program 6 (fault-call:0 fault-nth:9): syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000500100000f000000000000000000000004000000000002000020000020000000def4655fdef4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000012b00)) [ 1942.536054] ? _copy_from_user+0xfb/0x1b0 [ 1942.536996] __do_sys_memfd_create+0x271/0x450 [ 1942.537718] ? memfd_file_seals_ptr+0x150/0x150 [ 1942.538419] ? lockdep_hardirqs_on_prepare+0x273/0x3e0 [ 1942.539201] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1942.539979] do_syscall_64+0x33/0x40 [ 1942.540559] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 1942.541338] RIP: 0033:0x466609 [ 1942.541832] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1942.543186] FAULT_INJECTION: forcing a failure. [ 1942.543186] name failslab, interval 1, probability 0, space 0, times 0 [ 1942.544627] RSP: 002b:00007f73482ddf48 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 1942.544642] RAX: ffffffffffffffda RBX: 0000000020000200 RCX: 0000000000466609 [ 1942.544650] RDX: 0000000000000800 RSI: 0000000000000000 RDI: 00000000004bee66 [ 1942.544657] RBP: 0000000000000001 R08: 0000000000000400 R09: ffffffffffffffff [ 1942.544664] R10: 0000000000000001 R11: 0000000000000246 R12: 0000000008100000 [ 1942.544671] R13: 0000000020000180 R14: 0000000000000800 R15: 0000000020012b00 [ 1942.551821] FAULT_INJECTION: forcing a failure. [ 1942.551821] name failslab, interval 1, probability 0, space 0, times 0 [ 1942.552297] CPU: 1 PID: 15560 Comm: syz-executor.7 Not tainted 5.10.45 #1 [ 1942.552306] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS rel-1.14.0-0-g155821a1990b-prebuilt.qemu.org 04/01/2014 [ 1942.552316] Call Trace: [ 1942.558233] dump_stack+0x107/0x163 [ 1942.558790] should_fail.cold+0x5/0xa [ 1942.559390] ? create_object.isra.0+0x3a/0xa20 [ 1942.560118] should_failslab+0x5/0x10 [ 1942.560667] kmem_cache_alloc+0x5b/0x350 [ 1942.561238] create_object.isra.0+0x3a/0xa20 [ 1942.561854] ? __kasan_kmalloc.constprop.0+0xc2/0xd0 [ 1942.562599] kmem_cache_alloc+0x159/0x350 [ 1942.563214] ? shmem_destroy_inode+0x70/0x70 [ 1942.563893] shmem_alloc_inode+0x18/0x40 [ 1942.564526] ? shmem_destroy_inode+0x70/0x70 [ 1942.565203] alloc_inode+0x63/0x230 [ 1942.565762] new_inode+0x23/0x240 [ 1942.566314] shmem_get_inode+0x15e/0xbc0 [ 1942.566944] __shmem_file_setup+0xb8/0x310 [ 1942.567593] ? _copy_from_user+0xfb/0x1b0 [ 1942.568234] __do_sys_memfd_create+0x271/0x450 [ 1942.568940] ? memfd_file_seals_ptr+0x150/0x150 [ 1942.569646] ? lockdep_hardirqs_on_prepare+0x273/0x3e0 [ 1942.570461] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1942.571235] do_syscall_64+0x33/0x40 [ 1942.571800] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 1942.572590] RIP: 0033:0x466609 [ 1942.573085] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1942.575906] RSP: 002b:00007f4c69a47f48 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 1942.577075] RAX: ffffffffffffffda RBX: 0000000020000200 RCX: 0000000000466609 [ 1942.578161] RDX: 00000000000009c0 RSI: 0000000000000000 RDI: 00000000004bee66 [ 1942.579235] RBP: 0000000000000002 R08: 00000000000004e0 R09: ffffffffffffffff [ 1942.580432] R10: 0000000000000002 R11: 0000000000000246 R12: 0000000008100000 [ 1942.581552] R13: 0000000020000180 R14: 00000000000009c0 R15: 0000000020012b00 [ 1942.582694] CPU: 0 PID: 15559 Comm: syz-executor.3 Not tainted 5.10.45 #1 [ 1942.583780] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS rel-1.14.0-0-g155821a1990b-prebuilt.qemu.org 04/01/2014 [ 1942.585623] Call Trace: [ 1942.585998] dump_stack+0x107/0x163 [ 1942.586080] EXT4-fs error (device loop0): ext4_fill_super:4947: inode #2: comm syz-executor.0: iget: root inode unallocated [ 1942.586476] should_fail.cold+0x5/0xa [ 1942.586501] ? create_object.isra.0+0x3a/0xa20 [ 1942.588423] EXT4-fs (loop0): get root inode failed [ 1942.588652] should_failslab+0x5/0x10 [ 1942.589355] EXT4-fs (loop0): mount failed [ 1942.590052] kmem_cache_alloc+0x5b/0x350 [ 1942.590072] create_object.isra.0+0x3a/0xa20 [ 1942.590088] ? __kasan_kmalloc.constprop.0+0xc2/0xd0 [ 1942.593188] kmem_cache_alloc+0x159/0x350 [ 1942.593790] security_inode_alloc+0x34/0x160 [ 1942.594488] inode_init_always+0x503/0xc90 [ 1942.595123] alloc_inode+0x84/0x230 [ 1942.595664] new_inode+0x23/0x240 [ 1942.596180] shmem_get_inode+0x15e/0xbc0 [ 1942.596797] __shmem_file_setup+0xb8/0x310 [ 1942.597441] ? _copy_from_user+0xfb/0x1b0 [ 1942.598104] __do_sys_memfd_create+0x271/0x450 [ 1942.598790] ? memfd_file_seals_ptr+0x150/0x150 [ 1942.599471] ? lockdep_hardirqs_on_prepare+0x273/0x3e0 [ 1942.600251] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1942.601012] do_syscall_64+0x33/0x40 [ 1942.601569] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 1942.603184] RIP: 0033:0x466609 [ 1942.603665] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1942.606239] RSP: 002b:00007fae06bc9f48 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 1942.607344] RAX: ffffffffffffffda RBX: 0000000020000200 RCX: 0000000000466609 [ 1942.608428] RDX: 0000000000000800 RSI: 0000000000000000 RDI: 00000000004bee66 [ 1942.609496] RBP: 0000000000000001 R08: 0000000000000400 R09: ffffffffffffffff [ 1942.610588] R10: 0000000000000001 R11: 0000000000000246 R12: 0000000008100000 [ 1942.611700] R13: 0000000020000180 R14: 0000000000000800 R15: 0000000020012b00 [ 1942.647179] EXT4-fs (loop7): fragment/cluster size (16384) != block size (1024) [ 1942.681978] EXT4-fs (loop5): fragment/cluster size (16384) != block size (1024) [ 1942.706367] FAULT_INJECTION: forcing a failure. [ 1942.706367] name failslab, interval 1, probability 0, space 0, times 0 [ 1942.708660] CPU: 0 PID: 15565 Comm: syz-executor.6 Not tainted 5.10.45 #1 [ 1942.710834] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS rel-1.14.0-0-g155821a1990b-prebuilt.qemu.org 04/01/2014 [ 1942.712490] Call Trace: [ 1942.712903] dump_stack+0x107/0x163 [ 1942.713458] should_fail.cold+0x5/0xa [ 1942.714093] ? __alloc_file+0x21/0x310 [ 1942.714664] should_failslab+0x5/0x10 [ 1942.715234] kmem_cache_alloc+0x5b/0x350 [ 1942.715853] __alloc_file+0x21/0x310 [ 1942.716414] alloc_empty_file+0x6d/0x170 [ 1942.717038] alloc_file+0x5e/0x5a0 [ 1942.717590] alloc_file_pseudo+0x16a/0x250 [ 1942.718270] ? alloc_file+0x5a0/0x5a0 [ 1942.718858] ? shmem_get_inode+0x55c/0xbc0 [ 1942.719508] __shmem_file_setup+0x144/0x310 [ 1942.720173] ? _copy_from_user+0xfb/0x1b0 19:43:28 executing program 0 (fault-call:0 fault-nth:5): syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000500100000f000000000000000000000004000000000002000020000020000000def4655fdef4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000008000000018000000c20500002b02", 0x66, 0x400}, {&(0x7f0000010100)="000000000000000000000000e58ca12e13a240e2b1a22f8d07e8e55f010040", 0x1f, 0x4e0}, {&(0x7f0000010200)="010000000000050040", 0x9, 0x560}, {0x0, 0x0, 0x1000000000c00}, {&(0x7f0000012000)="504d4d00504d4dff", 0x8, 0x10000}], 0x0, &(0x7f0000012b00)) [ 1942.720932] __do_sys_memfd_create+0x271/0x450 [ 1942.721680] ? memfd_file_seals_ptr+0x150/0x150 [ 1942.722410] ? lockdep_hardirqs_on_prepare+0x273/0x3e0 [ 1942.723215] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1942.724011] do_syscall_64+0x33/0x40 [ 1942.724591] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 1942.725350] RIP: 0033:0x466609 [ 1942.725829] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1942.728597] RSP: 002b:00007f8698989f48 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 1942.729788] RAX: ffffffffffffffda RBX: 0000000020000200 RCX: 0000000000466609 [ 1942.730920] RDX: 0000000000000800 RSI: 0000000000000000 RDI: 00000000004bee66 [ 1942.731978] RBP: 0000000000000001 R08: 0000000000000400 R09: ffffffffffffffff [ 1942.733058] R10: 0000000000000001 R11: 0000000000000246 R12: 0000000008100000 [ 1942.734152] R13: 0000000020000180 R14: 0000000000000800 R15: 0000000020012b00 [ 1942.758157] FAULT_INJECTION: forcing a failure. [ 1942.758157] name failslab, interval 1, probability 0, space 0, times 0 [ 1942.759894] CPU: 1 PID: 15568 Comm: syz-executor.0 Not tainted 5.10.45 #1 [ 1942.760917] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS rel-1.14.0-0-g155821a1990b-prebuilt.qemu.org 04/01/2014 [ 1942.761588] EXT4-fs (loop3): fragment/cluster size (16384) != block size (1024) [ 1942.762596] Call Trace: [ 1942.762617] dump_stack+0x107/0x163 [ 1942.762639] should_fail.cold+0x5/0xa [ 1942.765195] ? security_inode_alloc+0x34/0x160 [ 1942.765862] ? security_inode_alloc+0x34/0x160 [ 1942.766483] should_failslab+0x5/0x10 [ 1942.767000] kmem_cache_alloc+0x5b/0x350 [ 1942.767611] security_inode_alloc+0x34/0x160 [ 1942.768261] inode_init_always+0x503/0xc90 [ 1942.768903] alloc_inode+0x84/0x230 [ 1942.769452] new_inode+0x23/0x240 [ 1942.769999] shmem_get_inode+0x15e/0xbc0 [ 1942.770611] __shmem_file_setup+0xb8/0x310 [ 1942.771240] ? _copy_from_user+0xfb/0x1b0 [ 1942.771895] __do_sys_memfd_create+0x271/0x450 [ 1942.772585] ? memfd_file_seals_ptr+0x150/0x150 [ 1942.773295] ? lockdep_hardirqs_on_prepare+0x273/0x3e0 [ 1942.774118] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1942.774889] do_syscall_64+0x33/0x40 [ 1942.775445] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 1942.776177] RIP: 0033:0x466609 [ 1942.776639] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1942.779344] RSP: 002b:00007f52a9646f48 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 1942.780493] RAX: ffffffffffffffda RBX: 0000000020000200 RCX: 0000000000466609 [ 1942.781576] RDX: 0000000000020000 RSI: 0000000000000000 RDI: 00000000004bee66 [ 1942.782648] RBP: 0000000000000005 R08: 0000000000010000 R09: ffffffffffffffff [ 1942.783713] R10: 0000000000000005 R11: 0000000000000246 R12: 0000000008100000 [ 1942.784787] R13: 0000000020000180 R14: 0000000000201800 R15: 0000000020012b00 [ 1954.686575] kmemleak: 1 new suspected memory leaks (see /sys/kernel/debug/kmemleak) BUG: memory leak unreferenced object 0xffff88800c664500 (size 16): comm "syz-executor.0", pid 15517, jiffies 4296609499 (age 18.277s) hex dump (first 16 bytes): d0 21 82 20 80 88 ff ff 00 20 b6 18 80 88 ff ff .!. ..... ...... backtrace: [<00000000d4b3f543>] ext4_multi_mount_protect+0x861/0xb20 [<000000006a40479a>] ext4_fill_super+0xa20e/0xcf20 [<000000002066b85d>] mount_bdev+0x331/0x3f0 [<000000005ab55d11>] legacy_get_tree+0x105/0x220 [<000000002257a97c>] vfs_get_tree+0x8e/0x2f0 [<000000007c4756de>] path_mount+0x139a/0x2080 [<00000000af68a48c>] __x64_sys_mount+0x27e/0x300 [<00000000c47efb07>] do_syscall_64+0x33/0x40 [<000000006637c8db>] entry_SYSCALL_64_after_hwframe+0x44/0xa9 BUG: leak checking failed VM DIAGNOSIS: 19:43:46 Registers: info registers vcpu 0 RAX=ffffffff83c50180 RBX=ffffffff84c32280 RCX=ffffffff83c380f8 RDX=0000000000000000 RSI=0000000000000000 RDI=ffffffff83c5052f RBP=fffffbfff0986450 RSP=ffffffff84c07e40 R8 =0000000000000001 R9 =ffff88806ce33feb R10=ffffed100d9c67fd R11=0000000000000001 R12=0000000000000000 R13=ffffffff8544f088 R14=0000000000000000 R15=dffffc0000000000 RIP=ffffffff83c5018e RFL=00000202 [-------] CPL=0 II=0 A20=1 SMM=0 HLT=1 ES =0000 0000000000000000 00000000 00000000 CS =0010 0000000000000000 ffffffff 00a09b00 DPL=0 CS64 [-RA] SS =0018 0000000000000000 ffffffff 00c09300 DPL=0 DS [-WA] DS =0000 0000000000000000 00000000 00000000 FS =0000 0000000000000000 00000000 00000000 GS =0000 ffff88806ce00000 00000000 00000000 LDT=0000 fffffe0000000000 00000000 00000000 TR =0040 fffffe0000003000 00004087 00008b00 DPL=0 TSS64-busy GDT= fffffe0000001000 0000007f IDT= fffffe0000000000 00000fff CR0=80050033 CR2=00007ffd326f6020 CR3=000000000e3be000 CR4=00350ef0 DR0=0000000000000000 DR1=0000000000000000 DR2=0000000000000000 DR3=0000000000000000 DR6=00000000ffff0ff0 DR7=0000000000000400 EFER=0000000000000d01 FCW=037f FSW=0000 [ST=0] FTW=00 MXCSR=00001fa0 FPR0=0000000000000000 0000 FPR1=0000000000000000 0000 FPR2=0000000000000000 0000 FPR3=0000000000000000 0000 FPR4=0000000000000000 0000 FPR5=cc80000000000000 4007 FPR6=cc80000000000000 4007 FPR7=cdc0000000000000 4008 XMM00=00000000000000000000000000000000 XMM01=00000000000000000000000000000000 XMM02=0000000000000000bfe62e42fefa39ef XMM03=0000ff00000000000000000000000000 XMM04=732f6c61636f6c2f7273752f3d485441 XMM05=622f6c61636f6c2f7273752f3a6e6962 XMM06=73752f3a6e6962732f7273752f3a6e69 XMM07=6e69622f3a6e6962732f3a6e69622f72 XMM08=00000000000000000000000000000000 XMM09=00000000000000000000000000000000 XMM10=00000000000000000000000000000000 XMM11=00000000000000000000000000000000 XMM12=00000000000000000000000000000000 XMM13=00000000000000000000000000000000 XMM14=00000000000000000000000000000000 XMM15=00000000000000000000000000000000 info registers vcpu 1 RAX=ffffffff83c50180 RBX=ffff88800852b280 RCX=ffffffff83c380f8 RDX=0000000000000000 RSI=0000000000000000 RDI=ffffffff83c5052f RBP=ffffed10010a5650 RSP=ffff88800856fe78 R8 =0000000000000001 R9 =ffff88806cf33feb R10=ffffed100d9e67fd R11=0000000000000001 R12=0000000000000001 R13=ffffffff8544f088 R14=0000000000000000 R15=dffffc0000000000 RIP=ffffffff83c5018e RFL=00000202 [-------] CPL=0 II=0 A20=1 SMM=0 HLT=1 ES =0000 0000000000000000 00000000 00000000 CS =0010 0000000000000000 ffffffff 00a09b00 DPL=0 CS64 [-RA] SS =0018 0000000000000000 ffffffff 00c09300 DPL=0 DS [-WA] DS =0000 0000000000000000 00000000 00000000 FS =0000 0000000000000000 00000000 00000000 GS =0000 ffff88806cf00000 00000000 00000000 LDT=0000 fffffe0000000000 00000000 00000000 TR =0040 fffffe000003e000 00004087 00008b00 DPL=0 TSS64-busy GDT= fffffe000003c000 0000007f IDT= fffffe0000000000 00000fff CR0=80050033 CR2=00007ffd327bd080 CR3=000000000e3be000 CR4=00350ee0 DR0=0000000000000000 DR1=0000000000000000 DR2=0000000000000000 DR3=0000000000000000 DR6=00000000ffff0ff0 DR7=0000000000000400 EFER=0000000000000d01 FCW=037f FSW=0000 [ST=0] FTW=00 MXCSR=00001fa0 FPR0=0000000000000000 0000 FPR1=0000000000000000 0000 FPR2=0000000000000000 0000 FPR3=0000000000000000 0000 FPR4=0000000000000000 0000 FPR5=cc80000000000000 4007 FPR6=cc80000000000000 4007 FPR7=cdc0000000000000 4008 XMM00=00000000000000000000000000000000 XMM01=00000000000000000000000000000000 XMM02=000000000000000041519bc800000000 XMM03=00000000000000000000000000000000 XMM04=6c74656e2220226b61656c222022726f XMM05=6d6d6f635f6464615f746d676d5f6c62 XMM06=22706d6f636365735f6f642220226e6f XMM07=31207375746174732074697865203a5d XMM08=30323130303030306637783028267b20 XMM09=3430353030643464343035223d293030 XMM10=317830202c387830202c226666643464 XMM11=302826202c307830202c5d7d30303030 XMM12=0a292930306232313030303030663778 XMM13=30303062303030303030303030303030 XMM14=30303038313030303030303038303030 XMM15=22323062323030303035303263303030