vent_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$bt_hci(r0, &(0x7f0000000040)=ANY=[], 0xfdef) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = fcntl$dupfd(r2, 0x0, r2) bind$bt_hci(r3, &(0x7f0000000080)={0x1f, 0x1, 0x4}, 0x6) socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000140)={0x30, 0x1e, 0xc21, 0x0, 0x0, {0x2}, [@typed={0x8, 0x0, 0x0, 0x0, @u32}, @typed={0x14, 0x1, 0x0, 0x0, @ipv6=@private2}]}, 0x30}}, 0x0) getsockopt$bt_sco_SCO_CONNINFO(0xffffffffffffffff, 0x11, 0x2, &(0x7f00000000c0)=""/12, 0x0) read(r1, &(0x7f00000002c0)=""/240, 0xf0) 12:25:02 executing program 4: ioctl$RTC_UIE_ON(0xffffffffffffffff, 0x7003) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x2}, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0xfffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = dup2(0xffffffffffffffff, r0) perf_event_open(&(0x7f00000001c0)={0x2, 0x80, 0x8, 0x9, 0x4, 0x1, 0x0, 0x3b3d, 0x200a0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x2, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0xffff, 0x1, @perf_config_ext={0x7, 0x1}, 0x281, 0xffffffff, 0x4, 0x3, 0x401, 0xffffff47, 0x401, 0x0, 0x3, 0x0, 0x415}, 0x0, 0xffffffffffffffff, r0, 0x1) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000180)) pkey_mprotect(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x0, 0xffffffffffffffff) pkey_mprotect(&(0x7f0000ff4000/0x4000)=nil, 0x4000, 0x0, 0xffffffffffffffff) socket$inet_udp(0x2, 0x2, 0x0) getsockopt$inet_int(0xffffffffffffffff, 0x0, 0xe, 0x0, &(0x7f0000000280)) ioctl$sock_SIOCADDDLCI(0xffffffffffffffff, 0x8980, 0x0) ioctl$RTC_ALM_SET(r1, 0x40247007, 0x0) mmap$IORING_OFF_SQES(&(0x7f0000ff3000/0x2000)=nil, 0x2000, 0x2000002, 0x10, r1, 0x10000000) getsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, 0x0, 0x0) [ 1349.564964] EXT4-fs (loop1): bad geometry: block count 128 exceeds size of device (8 blocks) 12:25:02 executing program 7: syz_mount_image$ext4(0x0, 0x0, 0x0, 0x3, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}], 0x0, &(0x7f0000000180)) [ 1349.622858] EXT4-fs (loop2): ext4_check_descriptors: Inode table for group 0 overlaps superblock [ 1349.624064] EXT4-fs (loop2): group descriptors corrupted! 12:25:02 executing program 6: ioctl$RTC_UIE_ON(0xffffffffffffffff, 0x7003) r0 = perf_event_open(&(0x7f00000001c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x2}, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0xfffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = dup2(0xffffffffffffffff, r0) r2 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="02000000030000", 0x7, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000180)) pkey_mprotect(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x0, 0xffffffffffffffff) pkey_mprotect(&(0x7f0000ff4000/0x4000)=nil, 0x4000, 0x0, 0xffffffffffffffff) symlinkat(&(0x7f00000000c0)='./file0\x00', r2, &(0x7f0000000140)='./file0\x00') socket$inet_udp(0x2, 0x2, 0x0) getsockopt$inet_int(0xffffffffffffffff, 0x0, 0xe, 0x0, &(0x7f0000000280)) ioctl$RTC_ALM_SET(r1, 0x40247007, 0x0) getsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, 0x0, 0x0) 12:25:02 executing program 3: ioctl$RTC_UIE_ON(0xffffffffffffffff, 0x7003) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x2}, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0xfffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = dup2(0xffffffffffffffff, r0) perf_event_open(&(0x7f00000001c0)={0x2, 0x80, 0x8, 0x9, 0x4, 0x1, 0x0, 0x3b3d, 0x200a0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x2, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0xffff, 0x1, @perf_config_ext={0x7, 0x1}, 0x281, 0xffffffff, 0x4, 0x3, 0x401, 0xffffff47, 0x401, 0x0, 0x3, 0x0, 0x415}, 0x0, 0xffffffffffffffff, r0, 0x1) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000180)) pkey_mprotect(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x0, 0xffffffffffffffff) pkey_mprotect(&(0x7f0000ff4000/0x4000)=nil, 0x4000, 0x0, 0xffffffffffffffff) socket$inet_udp(0x2, 0x2, 0x0) getsockopt$inet_int(0xffffffffffffffff, 0x0, 0xe, 0x0, &(0x7f0000000280)) ioctl$sock_SIOCADDDLCI(0xffffffffffffffff, 0x8980, 0x0) ioctl$RTC_ALM_SET(r1, 0x40247007, 0x0) mmap$IORING_OFF_SQES(&(0x7f0000ff3000/0x2000)=nil, 0x2000, 0x2000002, 0x10, r1, 0x10000000) getsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, 0x0, 0x0) 12:25:02 executing program 0: r0 = creat(&(0x7f0000000040)='./file0\x00', 0x0) r1 = creat(&(0x7f0000000040)='./file0\x00', 0x0) fallocate(r1, 0x0, 0x0, 0x8800000) fallocate(r1, 0x3, 0x0, 0x8000) fallocate(r0, 0x8000000000000, 0x0, 0x8800000) [ 1349.696358] EXT4-fs (loop4): mounted filesystem without journal. Opts: ,errors=continue 12:25:02 executing program 5: r0 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000000)='/sys/power/resume', 0x22902, 0x0) r1 = openat$sr(0xffffffffffffff9c, &(0x7f0000000040), 0x260d01, 0x0) fcntl$notify(r1, 0x402, 0x80000019) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$bt_hci(r0, &(0x7f0000000040)=ANY=[], 0xfdef) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = fcntl$dupfd(r2, 0x0, r2) bind$bt_hci(r3, &(0x7f0000000080)={0x1f, 0x1, 0x4}, 0x6) socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000140)={0x30, 0x1e, 0xc21, 0x0, 0x0, {0x2}, [@typed={0x8, 0x0, 0x0, 0x0, @u32}, @typed={0x14, 0x1, 0x0, 0x0, @ipv6=@private2}]}, 0x30}}, 0x0) getsockopt$bt_sco_SCO_CONNINFO(0xffffffffffffffff, 0x11, 0x2, &(0x7f00000000c0)=""/12, 0x0) read(r1, &(0x7f00000002c0)=""/240, 0xf0) 12:25:02 executing program 1: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000180)) symlinkat(&(0x7f00000000c0)='./file0\x00', r0, &(0x7f0000000140)='./file0\x00') getsockopt$inet_int(0xffffffffffffffff, 0x0, 0xe, 0x0, &(0x7f0000000280)) ioctl$RTC_ALM_SET(0xffffffffffffffff, 0x40247007, 0x0) 12:25:02 executing program 2: ioctl$RTC_UIE_ON(0xffffffffffffffff, 0x7003) r0 = perf_event_open(&(0x7f00000001c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x2}, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0xfffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = dup2(0xffffffffffffffff, r0) r2 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="0200000003000000", 0x8, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000180)) pkey_mprotect(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x0, 0xffffffffffffffff) pkey_mprotect(&(0x7f0000ff4000/0x4000)=nil, 0x4000, 0x0, 0xffffffffffffffff) symlinkat(&(0x7f00000000c0)='./file0\x00', r2, &(0x7f0000000140)='./file0\x00') socket$inet_udp(0x2, 0x2, 0x0) getsockopt$inet_int(0xffffffffffffffff, 0x0, 0xe, 0x0, &(0x7f0000000280)) ioctl$RTC_ALM_SET(r1, 0x40247007, 0x0) getsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, 0x0, 0x0) 12:25:02 executing program 4: ioctl$RTC_UIE_ON(0xffffffffffffffff, 0x7003) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x2}, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0xfffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = dup2(0xffffffffffffffff, r0) perf_event_open(&(0x7f00000001c0)={0x2, 0x80, 0x8, 0x9, 0x4, 0x1, 0x0, 0x3b3d, 0x200a0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x2, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0xffff, 0x1, @perf_config_ext={0x7, 0x1}, 0x281, 0xffffffff, 0x4, 0x3, 0x401, 0xffffff47, 0x401, 0x0, 0x3, 0x0, 0x415}, 0x0, 0xffffffffffffffff, r0, 0x1) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000180)) pkey_mprotect(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x0, 0xffffffffffffffff) pkey_mprotect(&(0x7f0000ff4000/0x4000)=nil, 0x4000, 0x0, 0xffffffffffffffff) socket$inet_udp(0x2, 0x2, 0x0) getsockopt$inet_int(0xffffffffffffffff, 0x0, 0xe, 0x0, &(0x7f0000000280)) ioctl$sock_SIOCADDDLCI(0xffffffffffffffff, 0x8980, 0x0) ioctl$RTC_ALM_SET(r1, 0x40247007, 0x0) mmap$IORING_OFF_SQES(&(0x7f0000ff3000/0x2000)=nil, 0x2000, 0x2000002, 0x10, r1, 0x10000000) getsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, 0x0, 0x0) [ 1349.899523] EXT4-fs (loop6): ext4_check_descriptors: Inode table for group 0 overlaps superblock [ 1349.901642] EXT4-fs (loop6): group descriptors corrupted! [ 1350.003791] EXT4-fs (loop1): bad geometry: block count 128 exceeds size of device (8 blocks) [ 1350.087592] EXT4-fs (loop2): ext4_check_descriptors: Inode table for group 0 overlaps superblock [ 1350.090201] EXT4-fs (loop2): group descriptors corrupted! [ 1350.143767] EXT4-fs (loop4): mounted filesystem without journal. Opts: ,errors=continue 12:25:21 executing program 4: ioctl$RTC_UIE_ON(0xffffffffffffffff, 0x7003) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x2}, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0xfffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = dup2(0xffffffffffffffff, r0) perf_event_open(&(0x7f00000001c0)={0x2, 0x80, 0x8, 0x9, 0x4, 0x1, 0x0, 0x3b3d, 0x200a0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x2, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0xffff, 0x1, @perf_config_ext={0x7, 0x1}, 0x281, 0xffffffff, 0x4, 0x3, 0x401, 0xffffff47, 0x401, 0x0, 0x3, 0x0, 0x415}, 0x0, 0xffffffffffffffff, r0, 0x1) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000180)) pkey_mprotect(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x0, 0xffffffffffffffff) pkey_mprotect(&(0x7f0000ff4000/0x4000)=nil, 0x4000, 0x0, 0xffffffffffffffff) socket$inet_udp(0x2, 0x2, 0x0) getsockopt$inet_int(0xffffffffffffffff, 0x0, 0xe, 0x0, &(0x7f0000000280)) ioctl$sock_SIOCADDDLCI(0xffffffffffffffff, 0x8980, 0x0) ioctl$RTC_ALM_SET(r1, 0x40247007, 0x0) mmap$IORING_OFF_SQES(&(0x7f0000ff3000/0x2000)=nil, 0x2000, 0x2000002, 0x10, r1, 0x10000000) getsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, 0x0, 0x0) 12:25:21 executing program 7: syz_mount_image$ext4(0x0, 0x0, 0x0, 0x2, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0xffffffffdffffff8}], 0x0, &(0x7f0000000180)) 12:25:21 executing program 2: ioctl$RTC_UIE_ON(0xffffffffffffffff, 0x7003) r0 = perf_event_open(&(0x7f00000001c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x2}, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0xfffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = dup2(0xffffffffffffffff, r0) r2 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="0200000003000000", 0x8, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000180)) pkey_mprotect(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x0, 0xffffffffffffffff) pkey_mprotect(&(0x7f0000ff4000/0x4000)=nil, 0x4000, 0x0, 0xffffffffffffffff) symlinkat(&(0x7f00000000c0)='./file0\x00', r2, &(0x7f0000000140)='./file0\x00') socket$inet_udp(0x2, 0x2, 0x0) getsockopt$inet_int(0xffffffffffffffff, 0x0, 0xe, 0x0, &(0x7f0000000280)) ioctl$RTC_ALM_SET(r1, 0x40247007, 0x0) getsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, 0x0, 0x0) 12:25:21 executing program 6: ioctl$RTC_UIE_ON(0xffffffffffffffff, 0x7003) r0 = perf_event_open(&(0x7f00000001c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x2}, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0xfffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = dup2(0xffffffffffffffff, r0) r2 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="02000000030000", 0x7, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000180)) pkey_mprotect(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x0, 0xffffffffffffffff) pkey_mprotect(&(0x7f0000ff4000/0x4000)=nil, 0x4000, 0x0, 0xffffffffffffffff) symlinkat(&(0x7f00000000c0)='./file0\x00', r2, &(0x7f0000000140)='./file0\x00') socket$inet_udp(0x2, 0x2, 0x0) getsockopt$inet_int(0xffffffffffffffff, 0x0, 0xe, 0x0, &(0x7f0000000280)) ioctl$RTC_ALM_SET(r1, 0x40247007, 0x0) getsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, 0x0, 0x0) 12:25:21 executing program 3: ioctl$RTC_UIE_ON(0xffffffffffffffff, 0x7003) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x2}, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0xfffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = dup2(0xffffffffffffffff, r0) perf_event_open(&(0x7f00000001c0)={0x2, 0x80, 0x8, 0x9, 0x4, 0x1, 0x0, 0x3b3d, 0x200a0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x2, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0xffff, 0x1, @perf_config_ext={0x7, 0x1}, 0x281, 0xffffffff, 0x4, 0x3, 0x401, 0xffffff47, 0x401, 0x0, 0x3, 0x0, 0x415}, 0x0, 0xffffffffffffffff, r0, 0x1) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000180)) pkey_mprotect(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x0, 0xffffffffffffffff) pkey_mprotect(&(0x7f0000ff4000/0x4000)=nil, 0x4000, 0x0, 0xffffffffffffffff) socket$inet_udp(0x2, 0x2, 0x0) getsockopt$inet_int(0xffffffffffffffff, 0x0, 0xe, 0x0, &(0x7f0000000280)) ioctl$sock_SIOCADDDLCI(0xffffffffffffffff, 0x8980, 0x0) ioctl$RTC_ALM_SET(r1, 0x40247007, 0x0) mmap$IORING_OFF_SQES(&(0x7f0000ff3000/0x2000)=nil, 0x2000, 0x2000002, 0x10, r1, 0x10000000) getsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, 0x0, 0x0) 12:25:21 executing program 0: r0 = creat(&(0x7f0000000040)='./file0\x00', 0x0) r1 = creat(&(0x7f0000000040)='./file0\x00', 0x0) fallocate(r1, 0x0, 0x0, 0x8800000) fallocate(r1, 0x3, 0x0, 0x8000) fallocate(r0, 0x8060000000000, 0x0, 0x8800000) 12:25:21 executing program 5: r0 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000000)='/sys/power/resume', 0x22902, 0x0) r1 = openat$sr(0xffffffffffffff9c, &(0x7f0000000040), 0x260d01, 0x0) fcntl$notify(r1, 0x402, 0x80000019) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$bt_hci(r0, &(0x7f0000000040)=ANY=[], 0xfdef) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = fcntl$dupfd(r2, 0x0, r2) bind$bt_hci(r3, &(0x7f0000000080)={0x1f, 0x1, 0x4}, 0x6) socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000140)={0x30, 0x1e, 0xc21, 0x0, 0x0, {0x2}, [@typed={0x8, 0x0, 0x0, 0x0, @u32}, @typed={0x14, 0x1, 0x0, 0x0, @ipv6=@private2}]}, 0x30}}, 0x0) getsockopt$bt_sco_SCO_CONNINFO(0xffffffffffffffff, 0x11, 0x2, &(0x7f00000000c0)=""/12, &(0x7f0000000100)=0xc) read(0xffffffffffffffff, &(0x7f00000002c0)=""/240, 0xf0) 12:25:21 executing program 1: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000180)) symlinkat(&(0x7f00000000c0)='./file0\x00', r0, &(0x7f0000000140)='./file0\x00') getsockopt$inet_int(0xffffffffffffffff, 0x0, 0xe, 0x0, &(0x7f0000000280)) ioctl$RTC_ALM_SET(0xffffffffffffffff, 0x40247007, 0x0) [ 1369.160141] EXT4-fs (loop1): bad geometry: block count 128 exceeds size of device (8 blocks) 12:25:22 executing program 7: syz_mount_image$ext4(0x0, 0x0, 0x0, 0x1, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}], 0x0, &(0x7f0000000180)) [ 1369.247664] EXT4-fs (loop6): ext4_check_descriptors: Inode table for group 0 overlaps superblock [ 1369.250119] EXT4-fs (loop6): group descriptors corrupted! [ 1369.269126] EXT4-fs (loop2): ext4_check_descriptors: Inode table for group 0 overlaps superblock [ 1369.271339] EXT4-fs (loop2): group descriptors corrupted! 12:25:22 executing program 1: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000440)=[{0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000180)) symlinkat(&(0x7f00000000c0)='./file0\x00', r0, &(0x7f0000000140)='./file0\x00') getsockopt$inet_int(0xffffffffffffffff, 0x0, 0xe, 0x0, &(0x7f0000000280)) ioctl$RTC_ALM_SET(0xffffffffffffffff, 0x40247007, 0x0) [ 1369.296730] EXT4-fs (loop4): mounted filesystem without journal. Opts: ,errors=continue 12:25:22 executing program 3: ioctl$RTC_UIE_ON(0xffffffffffffffff, 0x7003) r0 = perf_event_open(&(0x7f00000001c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x2}, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0xfffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = dup2(0xffffffffffffffff, r0) r2 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="02000000030000", 0x7, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000180)) pkey_mprotect(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x0, 0xffffffffffffffff) pkey_mprotect(&(0x7f0000ff4000/0x4000)=nil, 0x4000, 0x0, 0xffffffffffffffff) symlinkat(&(0x7f00000000c0)='./file0\x00', r2, &(0x7f0000000140)='./file0\x00') socket$inet_udp(0x2, 0x2, 0x0) getsockopt$inet_int(0xffffffffffffffff, 0x0, 0xe, 0x0, &(0x7f0000000280)) ioctl$RTC_ALM_SET(r1, 0x40247007, 0x0) getsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, 0x0, 0x0) 12:25:22 executing program 5: r0 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000000)='/sys/power/resume', 0x22902, 0x0) r1 = openat$sr(0xffffffffffffff9c, &(0x7f0000000040), 0x260d01, 0x0) fcntl$notify(r1, 0x402, 0x80000019) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$bt_hci(r0, &(0x7f0000000040)=ANY=[], 0xfdef) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = fcntl$dupfd(r2, 0x0, r2) bind$bt_hci(r3, &(0x7f0000000080)={0x1f, 0x1, 0x4}, 0x6) socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000140)={0x30, 0x1e, 0xc21, 0x0, 0x0, {0x2}, [@typed={0x8, 0x0, 0x0, 0x0, @u32}, @typed={0x14, 0x1, 0x0, 0x0, @ipv6=@private2}]}, 0x30}}, 0x0) getsockopt$bt_sco_SCO_CONNINFO(0xffffffffffffffff, 0x11, 0x2, &(0x7f00000000c0)=""/12, &(0x7f0000000100)=0xc) read(0xffffffffffffffff, &(0x7f00000002c0)=""/240, 0xf0) 12:25:22 executing program 0: r0 = creat(&(0x7f0000000040)='./file0\x00', 0x0) r1 = creat(&(0x7f0000000040)='./file0\x00', 0x0) fallocate(r1, 0x0, 0x0, 0x8800000) fallocate(r1, 0x3, 0x0, 0x8000) fallocate(r0, 0x10000000000000, 0x0, 0x8800000) 12:25:22 executing program 4: ioctl$RTC_UIE_ON(0xffffffffffffffff, 0x7003) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x2}, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0xfffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = dup2(0xffffffffffffffff, r0) perf_event_open(&(0x7f00000001c0)={0x2, 0x80, 0x8, 0x9, 0x4, 0x1, 0x0, 0x3b3d, 0x200a0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x2, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0xffff, 0x1, @perf_config_ext={0x7, 0x1}, 0x281, 0xffffffff, 0x4, 0x3, 0x401, 0xffffff47, 0x401, 0x0, 0x3, 0x0, 0x415}, 0x0, 0xffffffffffffffff, r0, 0x1) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000180)) pkey_mprotect(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x0, 0xffffffffffffffff) pkey_mprotect(&(0x7f0000ff4000/0x4000)=nil, 0x4000, 0x0, 0xffffffffffffffff) socket$inet_udp(0x2, 0x2, 0x0) getsockopt$inet_int(0xffffffffffffffff, 0x0, 0xe, 0x0, &(0x7f0000000280)) ioctl$sock_SIOCADDDLCI(0xffffffffffffffff, 0x8980, 0x0) ioctl$RTC_ALM_SET(r1, 0x40247007, 0x0) mmap$IORING_OFF_SQES(&(0x7f0000ff3000/0x2000)=nil, 0x2000, 0x2000002, 0x10, r1, 0x10000000) getsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, 0x0, 0x0) 12:25:22 executing program 2: ioctl$RTC_UIE_ON(0xffffffffffffffff, 0x7003) r0 = perf_event_open(&(0x7f00000001c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x2}, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0xfffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = dup2(0xffffffffffffffff, r0) r2 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="0200000003000000", 0x8, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000180)) pkey_mprotect(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x0, 0xffffffffffffffff) pkey_mprotect(&(0x7f0000ff4000/0x4000)=nil, 0x4000, 0x0, 0xffffffffffffffff) symlinkat(&(0x7f00000000c0)='./file0\x00', r2, &(0x7f0000000140)='./file0\x00') socket$inet_udp(0x2, 0x2, 0x0) getsockopt$inet_int(0xffffffffffffffff, 0x0, 0xe, 0x0, &(0x7f0000000280)) ioctl$RTC_ALM_SET(r1, 0x40247007, 0x0) getsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, 0x0, 0x0) 12:25:22 executing program 6: ioctl$RTC_UIE_ON(0xffffffffffffffff, 0x7003) r0 = perf_event_open(&(0x7f00000001c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x2}, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0xfffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = dup2(0xffffffffffffffff, r0) r2 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="02000000030000", 0x7, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000180)) pkey_mprotect(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x0, 0xffffffffffffffff) pkey_mprotect(&(0x7f0000ff4000/0x4000)=nil, 0x4000, 0x0, 0xffffffffffffffff) symlinkat(&(0x7f00000000c0)='./file0\x00', r2, &(0x7f0000000140)='./file0\x00') socket$inet_udp(0x2, 0x2, 0x0) getsockopt$inet_int(0xffffffffffffffff, 0x0, 0xe, 0x0, &(0x7f0000000280)) ioctl$RTC_ALM_SET(r1, 0x40247007, 0x0) getsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, 0x0, 0x0) [ 1369.494490] EXT4-fs (loop1): VFS: Can't find ext4 filesystem [ 1369.621383] EXT4-fs (loop2): ext4_check_descriptors: Inode table for group 0 overlaps superblock [ 1369.623645] EXT4-fs (loop2): group descriptors corrupted! [ 1369.725330] EXT4-fs (loop4): mounted filesystem without journal. Opts: ,errors=continue [ 1369.793198] EXT4-fs (loop6): ext4_check_descriptors: Inode table for group 0 overlaps superblock [ 1369.797801] EXT4-fs (loop6): group descriptors corrupted! 12:25:41 executing program 6: ioctl$RTC_UIE_ON(0xffffffffffffffff, 0x7003) r0 = perf_event_open(&(0x7f00000001c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x2}, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0xfffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = dup2(0xffffffffffffffff, r0) r2 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="02000000030000", 0x7, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000180)) pkey_mprotect(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x0, 0xffffffffffffffff) pkey_mprotect(&(0x7f0000ff4000/0x4000)=nil, 0x4000, 0x0, 0xffffffffffffffff) symlinkat(&(0x7f00000000c0)='./file0\x00', r2, &(0x7f0000000140)='./file0\x00') socket$inet_udp(0x2, 0x2, 0x0) getsockopt$inet_int(0xffffffffffffffff, 0x0, 0xe, 0x0, &(0x7f0000000280)) ioctl$RTC_ALM_SET(r1, 0x40247007, 0x0) 12:25:41 executing program 7: syz_mount_image$ext4(0x0, 0x0, 0x0, 0x0, &(0x7f0000000440), 0x0, &(0x7f0000000180)) 12:25:41 executing program 0: r0 = creat(&(0x7f0000000040)='./file0\x00', 0x0) r1 = creat(&(0x7f0000000040)='./file0\x00', 0x0) fallocate(r1, 0x0, 0x0, 0x8800000) fallocate(r1, 0x3, 0x0, 0x8000) fallocate(r0, 0x80000000000000, 0x0, 0x8800000) 12:25:41 executing program 2: ioctl$RTC_UIE_ON(0xffffffffffffffff, 0x7003) r0 = perf_event_open(&(0x7f00000001c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x2}, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0xfffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = dup2(0xffffffffffffffff, r0) r2 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000180)) pkey_mprotect(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x0, 0xffffffffffffffff) pkey_mprotect(&(0x7f0000ff4000/0x4000)=nil, 0x4000, 0x0, 0xffffffffffffffff) symlinkat(&(0x7f00000000c0)='./file0\x00', r2, &(0x7f0000000140)='./file0\x00') socket$inet_udp(0x2, 0x2, 0x0) getsockopt$inet_int(0xffffffffffffffff, 0x0, 0xe, 0x0, &(0x7f0000000280)) ioctl$RTC_ALM_SET(r1, 0x40247007, 0x0) getsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, 0x0, 0x0) 12:25:41 executing program 1: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000440)=[{0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000180)) symlinkat(&(0x7f00000000c0)='./file0\x00', r0, &(0x7f0000000140)='./file0\x00') getsockopt$inet_int(0xffffffffffffffff, 0x0, 0xe, 0x0, &(0x7f0000000280)) ioctl$RTC_ALM_SET(0xffffffffffffffff, 0x40247007, 0x0) 12:25:41 executing program 3: r0 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000000)='/sys/power/resume', 0x22902, 0x0) r1 = openat$sr(0xffffffffffffff9c, &(0x7f0000000040), 0x260d01, 0x0) fcntl$notify(r1, 0x402, 0x80000019) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$bt_hci(r0, &(0x7f0000000040)=ANY=[], 0xfdef) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = fcntl$dupfd(r2, 0x0, r2) bind$bt_hci(r3, &(0x7f0000000080)={0x1f, 0x1, 0x4}, 0x6) socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000140)={0x30, 0x1e, 0xc21, 0x0, 0x0, {0x2}, [@typed={0x8, 0x0, 0x0, 0x0, @u32}, @typed={0x14, 0x1, 0x0, 0x0, @ipv6=@private2}]}, 0x30}}, 0x0) getsockopt$bt_sco_SCO_CONNINFO(0xffffffffffffffff, 0x11, 0x2, 0x0, &(0x7f0000000100)) read(r1, &(0x7f00000002c0)=""/240, 0xf0) 12:25:41 executing program 5: r0 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000000)='/sys/power/resume', 0x22902, 0x0) r1 = openat$sr(0xffffffffffffff9c, &(0x7f0000000040), 0x260d01, 0x0) fcntl$notify(r1, 0x402, 0x80000019) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$bt_hci(r0, &(0x7f0000000040)=ANY=[], 0xfdef) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = fcntl$dupfd(r2, 0x0, r2) bind$bt_hci(r3, &(0x7f0000000080)={0x1f, 0x1, 0x4}, 0x6) socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000140)={0x30, 0x1e, 0xc21, 0x0, 0x0, {0x2}, [@typed={0x8, 0x0, 0x0, 0x0, @u32}, @typed={0x14, 0x1, 0x0, 0x0, @ipv6=@private2}]}, 0x30}}, 0x0) getsockopt$bt_sco_SCO_CONNINFO(0xffffffffffffffff, 0x11, 0x2, &(0x7f00000000c0)=""/12, &(0x7f0000000100)=0xc) read(0xffffffffffffffff, &(0x7f00000002c0)=""/240, 0xf0) 12:25:41 executing program 4: ioctl$RTC_UIE_ON(0xffffffffffffffff, 0x7003) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x2}, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0xfffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = dup2(0xffffffffffffffff, r0) perf_event_open(&(0x7f00000001c0)={0x2, 0x80, 0x8, 0x9, 0x4, 0x1, 0x0, 0x3b3d, 0x200a0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x2, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0xffff, 0x1, @perf_config_ext={0x7, 0x1}, 0x281, 0xffffffff, 0x4, 0x3, 0x401, 0xffffff47, 0x401, 0x0, 0x3, 0x0, 0x415}, 0x0, 0xffffffffffffffff, r0, 0x1) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000180)) pkey_mprotect(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x0, 0xffffffffffffffff) pkey_mprotect(&(0x7f0000ff4000/0x4000)=nil, 0x4000, 0x0, 0xffffffffffffffff) socket$inet_udp(0x2, 0x2, 0x0) getsockopt$inet_int(0xffffffffffffffff, 0x0, 0xe, 0x0, &(0x7f0000000280)) ioctl$sock_SIOCADDDLCI(0xffffffffffffffff, 0x8980, 0x0) ioctl$RTC_ALM_SET(r1, 0x40247007, 0x0) mmap$IORING_OFF_SQES(&(0x7f0000ff3000/0x2000)=nil, 0x2000, 0x2000002, 0x10, r1, 0x10000000) getsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, 0x0, 0x0) [ 1388.629908] EXT4-fs (loop1): VFS: Can't find ext4 filesystem 12:25:41 executing program 0: r0 = creat(&(0x7f0000000040)='./file0\x00', 0x0) r1 = creat(&(0x7f0000000040)='./file0\x00', 0x0) fallocate(r1, 0x0, 0x0, 0x8800000) fallocate(r1, 0x3, 0x0, 0x8000) fallocate(r0, 0x80050000000000, 0x0, 0x8800000) [ 1388.655413] EXT4-fs (loop6): ext4_check_descriptors: Inode table for group 0 overlaps superblock [ 1388.657425] EXT4-fs (loop6): group descriptors corrupted! [ 1388.665689] EXT4-fs (loop2): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 1388.668295] EXT4-fs (loop2): group descriptors corrupted! 12:25:41 executing program 7: syz_mount_image$ext4(0x0, 0x0, 0x0, 0x0, &(0x7f0000000440), 0x0, 0x0) [ 1388.701401] EXT4-fs (loop4): mounted filesystem without journal. Opts: ,errors=continue 12:25:41 executing program 1: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000440)=[{0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000180)) symlinkat(&(0x7f00000000c0)='./file0\x00', r0, &(0x7f0000000140)='./file0\x00') getsockopt$inet_int(0xffffffffffffffff, 0x0, 0xe, 0x0, &(0x7f0000000280)) ioctl$RTC_ALM_SET(0xffffffffffffffff, 0x40247007, 0x0) 12:25:41 executing program 5: r0 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000000)='/sys/power/resume', 0x22902, 0x0) r1 = openat$sr(0xffffffffffffff9c, &(0x7f0000000040), 0x260d01, 0x0) fcntl$notify(r1, 0x402, 0x80000019) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$bt_hci(r0, &(0x7f0000000040)=ANY=[], 0xfdef) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = fcntl$dupfd(r2, 0x0, r2) bind$bt_hci(r3, &(0x7f0000000080)={0x1f, 0x1, 0x4}, 0x6) socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000140)={0x30, 0x1e, 0xc21, 0x0, 0x0, {0x2}, [@typed={0x8, 0x0, 0x0, 0x0, @u32}, @typed={0x14, 0x1, 0x0, 0x0, @ipv6=@private2}]}, 0x30}}, 0x0) getsockopt$bt_sco_SCO_CONNINFO(0xffffffffffffffff, 0x11, 0x2, &(0x7f00000000c0)=""/12, &(0x7f0000000100)=0xc) read(r1, 0x0, 0x0) 12:25:41 executing program 3: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_init_net_socket$802154_raw(0x24, 0x3, 0x0) sendmmsg$inet6(r0, &(0x7f0000004d00)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0) 12:25:41 executing program 4: ioctl$RTC_UIE_ON(0xffffffffffffffff, 0x7003) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x2}, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0xfffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = dup2(0xffffffffffffffff, r0) perf_event_open(&(0x7f00000001c0)={0x2, 0x80, 0x8, 0x9, 0x4, 0x1, 0x0, 0x3b3d, 0x200a0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x2, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0xffff, 0x1, @perf_config_ext={0x7, 0x1}, 0x281, 0xffffffff, 0x4, 0x3, 0x401, 0xffffff47, 0x401, 0x0, 0x3, 0x0, 0x415}, 0x0, 0xffffffffffffffff, r0, 0x1) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000180)) pkey_mprotect(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x0, 0xffffffffffffffff) pkey_mprotect(&(0x7f0000ff4000/0x4000)=nil, 0x4000, 0x0, 0xffffffffffffffff) socket$inet_udp(0x2, 0x2, 0x0) getsockopt$inet_int(0xffffffffffffffff, 0x0, 0xe, 0x0, &(0x7f0000000280)) ioctl$sock_SIOCADDDLCI(0xffffffffffffffff, 0x8980, 0x0) ioctl$RTC_ALM_SET(r1, 0x40247007, 0x0) mmap$IORING_OFF_SQES(&(0x7f0000ff3000/0x2000)=nil, 0x2000, 0x2000002, 0x10, r1, 0x10000000) getsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, 0x0, 0x0) 12:25:41 executing program 2: ioctl$RTC_UIE_ON(0xffffffffffffffff, 0x7003) r0 = perf_event_open(&(0x7f00000001c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x2}, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0xfffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = dup2(0xffffffffffffffff, r0) r2 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000180)) pkey_mprotect(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x0, 0xffffffffffffffff) pkey_mprotect(&(0x7f0000ff4000/0x4000)=nil, 0x4000, 0x0, 0xffffffffffffffff) symlinkat(&(0x7f00000000c0)='./file0\x00', r2, &(0x7f0000000140)='./file0\x00') socket$inet_udp(0x2, 0x2, 0x0) getsockopt$inet_int(0xffffffffffffffff, 0x0, 0xe, 0x0, &(0x7f0000000280)) ioctl$RTC_ALM_SET(r1, 0x40247007, 0x0) getsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, 0x0, 0x0) 12:25:41 executing program 6: ioctl$RTC_UIE_ON(0xffffffffffffffff, 0x7003) r0 = perf_event_open(&(0x7f00000001c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x2}, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0xfffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) dup2(0xffffffffffffffff, r0) r1 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="02000000030000", 0x7, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000180)) pkey_mprotect(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x0, 0xffffffffffffffff) pkey_mprotect(&(0x7f0000ff4000/0x4000)=nil, 0x4000, 0x0, 0xffffffffffffffff) symlinkat(&(0x7f00000000c0)='./file0\x00', r1, &(0x7f0000000140)='./file0\x00') socket$inet_udp(0x2, 0x2, 0x0) getsockopt$inet_int(0xffffffffffffffff, 0x0, 0xe, 0x0, &(0x7f0000000280)) 12:25:41 executing program 1: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000440)=[{0x0, 0x0, 0x400}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000180)) symlinkat(&(0x7f00000000c0)='./file0\x00', r0, &(0x7f0000000140)='./file0\x00') getsockopt$inet_int(0xffffffffffffffff, 0x0, 0xe, 0x0, &(0x7f0000000280)) ioctl$RTC_ALM_SET(0xffffffffffffffff, 0x40247007, 0x0) [ 1389.089214] EXT4-fs (loop2): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 1389.091770] EXT4-fs (loop2): group descriptors corrupted! [ 1389.115527] EXT4-fs (loop6): ext4_check_descriptors: Inode table for group 0 overlaps superblock [ 1389.117723] EXT4-fs (loop6): group descriptors corrupted! [ 1389.175425] EXT4-fs (loop1): VFS: Can't find ext4 filesystem [ 1389.191766] EXT4-fs (loop4): mounted filesystem without journal. Opts: ,errors=continue 12:25:59 executing program 3: ioctl$RTC_UIE_ON(0xffffffffffffffff, 0x7003) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x2}, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0xfffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = dup2(0xffffffffffffffff, r0) perf_event_open(&(0x7f00000001c0)={0x2, 0x80, 0x8, 0x9, 0x4, 0x1, 0x0, 0x3b3d, 0x200a0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x2, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0xffff, 0x1, @perf_config_ext={0x7, 0x1}, 0x281, 0xffffffff, 0x4, 0x3, 0x401, 0xffffff47, 0x401, 0x0, 0x3, 0x0, 0x415}, 0x0, 0xffffffffffffffff, r0, 0x1) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000180)) pkey_mprotect(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x0, 0xffffffffffffffff) pkey_mprotect(&(0x7f0000ff4000/0x4000)=nil, 0x4000, 0x0, 0xffffffffffffffff) socket$inet_udp(0x2, 0x2, 0x0) getsockopt$inet_int(0xffffffffffffffff, 0x0, 0xe, 0x0, &(0x7f0000000280)) ioctl$sock_SIOCADDDLCI(0xffffffffffffffff, 0x8980, 0x0) ioctl$RTC_ALM_SET(r1, 0x40247007, 0x0) mmap$IORING_OFF_SQES(&(0x7f0000ff3000/0x2000)=nil, 0x2000, 0x2000002, 0x10, r1, 0x10000000) getsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, 0x0, 0x0) 12:25:59 executing program 0: r0 = creat(&(0x7f0000000040)='./file0\x00', 0x0) r1 = creat(&(0x7f0000000040)='./file0\x00', 0x0) fallocate(r1, 0x0, 0x0, 0x8800000) fallocate(r1, 0x3, 0x0, 0x8000) fallocate(r0, 0x90050000000000, 0x0, 0x8800000) 12:25:59 executing program 4: ioctl$RTC_UIE_ON(0xffffffffffffffff, 0x7003) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x2}, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0xfffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = dup2(0xffffffffffffffff, r0) perf_event_open(&(0x7f00000001c0)={0x2, 0x80, 0x8, 0x9, 0x4, 0x1, 0x0, 0x3b3d, 0x200a0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0xffff, 0x1, @perf_config_ext={0x7, 0x1}, 0x281, 0xffffffff, 0x4, 0x3, 0x401, 0xffffff47, 0x401, 0x0, 0x3, 0x0, 0x415}, 0x0, 0xffffffffffffffff, r0, 0x1) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000180)) pkey_mprotect(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x0, 0xffffffffffffffff) pkey_mprotect(&(0x7f0000ff4000/0x4000)=nil, 0x4000, 0x0, 0xffffffffffffffff) socket$inet_udp(0x2, 0x2, 0x0) getsockopt$inet_int(0xffffffffffffffff, 0x0, 0xe, 0x0, &(0x7f0000000280)) ioctl$sock_SIOCADDDLCI(0xffffffffffffffff, 0x8980, 0x0) ioctl$RTC_ALM_SET(r1, 0x40247007, 0x0) mmap$IORING_OFF_SQES(&(0x7f0000ff3000/0x2000)=nil, 0x2000, 0x2000002, 0x10, r1, 0x10000000) getsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, 0x0, 0x0) 12:25:59 executing program 1: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000440)=[{0x0, 0x0, 0x400}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000180)) symlinkat(&(0x7f00000000c0)='./file0\x00', r0, &(0x7f0000000140)='./file0\x00') getsockopt$inet_int(0xffffffffffffffff, 0x0, 0xe, 0x0, &(0x7f0000000280)) ioctl$RTC_ALM_SET(0xffffffffffffffff, 0x40247007, 0x0) 12:25:59 executing program 2: ioctl$RTC_UIE_ON(0xffffffffffffffff, 0x7003) r0 = perf_event_open(&(0x7f00000001c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x2}, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0xfffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = dup2(0xffffffffffffffff, r0) r2 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000180)) pkey_mprotect(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x0, 0xffffffffffffffff) pkey_mprotect(&(0x7f0000ff4000/0x4000)=nil, 0x4000, 0x0, 0xffffffffffffffff) symlinkat(&(0x7f00000000c0)='./file0\x00', r2, &(0x7f0000000140)='./file0\x00') socket$inet_udp(0x2, 0x2, 0x0) getsockopt$inet_int(0xffffffffffffffff, 0x0, 0xe, 0x0, &(0x7f0000000280)) ioctl$RTC_ALM_SET(r1, 0x40247007, 0x0) getsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, 0x0, 0x0) 12:25:59 executing program 6: ioctl$RTC_UIE_ON(0xffffffffffffffff, 0x7003) r0 = perf_event_open(&(0x7f00000001c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x2}, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0xfffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) dup2(0xffffffffffffffff, r0) r1 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="02000000030000", 0x7, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000180)) pkey_mprotect(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x0, 0xffffffffffffffff) pkey_mprotect(&(0x7f0000ff4000/0x4000)=nil, 0x4000, 0x0, 0xffffffffffffffff) symlinkat(&(0x7f00000000c0)='./file0\x00', r1, &(0x7f0000000140)='./file0\x00') socket$inet_udp(0x2, 0x2, 0x0) 12:25:59 executing program 5: r0 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000000)='/sys/power/resume', 0x22902, 0x0) r1 = openat$sr(0xffffffffffffff9c, &(0x7f0000000040), 0x260d01, 0x0) fcntl$notify(r1, 0x402, 0x80000019) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$bt_hci(r0, &(0x7f0000000040)=ANY=[], 0xfdef) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = fcntl$dupfd(r2, 0x0, r2) bind$bt_hci(r3, &(0x7f0000000080)={0x1f, 0x1, 0x4}, 0x6) socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000140)={0x30, 0x1e, 0xc21, 0x0, 0x0, {0x2}, [@typed={0x8, 0x0, 0x0, 0x0, @u32}, @typed={0x14, 0x1, 0x0, 0x0, @ipv6=@private2}]}, 0x30}}, 0x0) getsockopt$bt_sco_SCO_CONNINFO(0xffffffffffffffff, 0x11, 0x2, &(0x7f00000000c0)=""/12, &(0x7f0000000100)=0xc) read(r1, 0x0, 0x0) 12:25:59 executing program 7: ioctl$RTC_UIE_ON(0xffffffffffffffff, 0x7003) r0 = perf_event_open(&(0x7f00000001c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x2}, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0xfffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = dup2(0xffffffffffffffff, r0) r2 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000180)) pkey_mprotect(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x0, 0xffffffffffffffff) pkey_mprotect(&(0x7f0000ff4000/0x4000)=nil, 0x4000, 0x0, 0xffffffffffffffff) symlinkat(&(0x7f00000000c0)='./file0\x00', r2, &(0x7f0000000140)='./file0\x00') socket$inet_udp(0x2, 0x2, 0x0) getsockopt$inet_int(0xffffffffffffffff, 0x0, 0xe, 0x0, &(0x7f0000000280)) ioctl$RTC_ALM_SET(r1, 0x40247007, 0x0) getsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, 0x0, 0x0) [ 1406.287234] EXT4-fs (loop4): mounted filesystem without journal. Opts: ,errors=continue [ 1406.309048] EXT4-fs (loop1): VFS: Can't find ext4 filesystem 12:25:59 executing program 4: ioctl$RTC_UIE_ON(0xffffffffffffffff, 0x7003) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x2}, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0xfffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = dup2(0xffffffffffffffff, r0) perf_event_open(&(0x7f00000001c0)={0x2, 0x80, 0x8, 0x9, 0x4, 0x1, 0x0, 0x3b3d, 0x200a0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0xffff, 0x1, @perf_config_ext={0x7, 0x1}, 0x281, 0xffffffff, 0x4, 0x3, 0x401, 0xffffff47, 0x401, 0x0, 0x3, 0x0, 0x415}, 0x0, 0xffffffffffffffff, r0, 0x1) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000180)) pkey_mprotect(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x0, 0xffffffffffffffff) pkey_mprotect(&(0x7f0000ff4000/0x4000)=nil, 0x4000, 0x0, 0xffffffffffffffff) socket$inet_udp(0x2, 0x2, 0x0) getsockopt$inet_int(0xffffffffffffffff, 0x0, 0xe, 0x0, &(0x7f0000000280)) ioctl$sock_SIOCADDDLCI(0xffffffffffffffff, 0x8980, 0x0) ioctl$RTC_ALM_SET(r1, 0x40247007, 0x0) mmap$IORING_OFF_SQES(&(0x7f0000ff3000/0x2000)=nil, 0x2000, 0x2000002, 0x10, r1, 0x10000000) getsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, 0x0, 0x0) [ 1406.371108] EXT4-fs (loop2): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 1406.372344] EXT4-fs (loop2): group descriptors corrupted! 12:25:59 executing program 2: ioctl$RTC_UIE_ON(0xffffffffffffffff, 0x7003) r0 = perf_event_open(&(0x7f00000001c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x2}, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0xfffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = dup2(0xffffffffffffffff, r0) r2 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000180)) pkey_mprotect(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x0, 0xffffffffffffffff) pkey_mprotect(&(0x7f0000ff4000/0x4000)=nil, 0x4000, 0x0, 0xffffffffffffffff) symlinkat(&(0x7f00000000c0)='./file0\x00', r2, &(0x7f0000000140)='./file0\x00') socket$inet_udp(0x2, 0x2, 0x0) getsockopt$inet_int(0xffffffffffffffff, 0x0, 0xe, 0x0, &(0x7f0000000280)) ioctl$RTC_ALM_SET(r1, 0x40247007, 0x0) getsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, 0x0, 0x0) [ 1406.447505] EXT4-fs (loop7): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 1406.448819] EXT4-fs (loop7): group descriptors corrupted! [ 1406.461332] EXT4-fs (loop6): ext4_check_descriptors: Inode table for group 0 overlaps superblock [ 1406.463772] EXT4-fs (loop6): group descriptors corrupted! 12:25:59 executing program 1: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000440)=[{0x0, 0x0, 0x400}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000180)) symlinkat(&(0x7f00000000c0)='./file0\x00', r0, &(0x7f0000000140)='./file0\x00') getsockopt$inet_int(0xffffffffffffffff, 0x0, 0xe, 0x0, &(0x7f0000000280)) ioctl$RTC_ALM_SET(0xffffffffffffffff, 0x40247007, 0x0) 12:25:59 executing program 5: r0 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000000)='/sys/power/resume', 0x22902, 0x0) r1 = openat$sr(0xffffffffffffff9c, &(0x7f0000000040), 0x260d01, 0x0) fcntl$notify(r1, 0x402, 0x80000019) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$bt_hci(r0, &(0x7f0000000040)=ANY=[], 0xfdef) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = fcntl$dupfd(r2, 0x0, r2) bind$bt_hci(r3, &(0x7f0000000080)={0x1f, 0x1, 0x4}, 0x6) socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000140)={0x30, 0x1e, 0xc21, 0x0, 0x0, {0x2}, [@typed={0x8, 0x0, 0x0, 0x0, @u32}, @typed={0x14, 0x1, 0x0, 0x0, @ipv6=@private2}]}, 0x30}}, 0x0) getsockopt$bt_sco_SCO_CONNINFO(0xffffffffffffffff, 0x11, 0x2, &(0x7f00000000c0)=""/12, &(0x7f0000000100)=0xc) read(r1, 0x0, 0x0) 12:25:59 executing program 3: ioctl$RTC_UIE_ON(0xffffffffffffffff, 0x7003) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x2}, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0xfffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = dup2(0xffffffffffffffff, r0) perf_event_open(&(0x7f00000001c0)={0x2, 0x80, 0x8, 0x9, 0x4, 0x1, 0x0, 0x3b3d, 0x200a0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x2, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0xffff, 0x1, @perf_config_ext={0x7, 0x1}, 0x281, 0xffffffff, 0x4, 0x3, 0x401, 0xffffff47, 0x401, 0x0, 0x3, 0x0, 0x415}, 0x0, 0xffffffffffffffff, r0, 0x1) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000180)) pkey_mprotect(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x0, 0xffffffffffffffff) pkey_mprotect(&(0x7f0000ff4000/0x4000)=nil, 0x4000, 0x0, 0xffffffffffffffff) socket$inet_udp(0x2, 0x2, 0x0) getsockopt$inet_int(0xffffffffffffffff, 0x0, 0xe, 0x0, &(0x7f0000000280)) ioctl$sock_SIOCADDDLCI(0xffffffffffffffff, 0x8980, 0x0) ioctl$RTC_ALM_SET(r1, 0x40247007, 0x0) mmap$IORING_OFF_SQES(&(0x7f0000ff3000/0x2000)=nil, 0x2000, 0x2000002, 0x10, r1, 0x10000000) getsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, 0x0, 0x0) 12:25:59 executing program 0: r0 = creat(&(0x7f0000000040)='./file0\x00', 0x0) r1 = creat(&(0x7f0000000040)='./file0\x00', 0x0) fallocate(r1, 0x0, 0x0, 0x8800000) fallocate(r1, 0x3, 0x0, 0x8000) fallocate(r0, 0x100000000000000, 0x0, 0x8800000) [ 1406.645789] EXT4-fs (loop4): mounted filesystem without journal. Opts: ,errors=continue [ 1406.674360] EXT4-fs (loop1): VFS: Can't find ext4 filesystem [ 1406.675206] EXT4-fs (loop2): bad geometry: block count 128 exceeds size of device (8 blocks) 12:26:16 executing program 4: ioctl$RTC_UIE_ON(0xffffffffffffffff, 0x7003) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x2}, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0xfffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = dup2(0xffffffffffffffff, r0) perf_event_open(&(0x7f00000001c0)={0x2, 0x80, 0x8, 0x9, 0x4, 0x1, 0x0, 0x3b3d, 0x200a0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0xffff, 0x1, @perf_config_ext={0x7, 0x1}, 0x281, 0xffffffff, 0x4, 0x3, 0x401, 0xffffff47, 0x401, 0x0, 0x3, 0x0, 0x415}, 0x0, 0xffffffffffffffff, r0, 0x1) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000180)) pkey_mprotect(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x0, 0xffffffffffffffff) pkey_mprotect(&(0x7f0000ff4000/0x4000)=nil, 0x4000, 0x0, 0xffffffffffffffff) socket$inet_udp(0x2, 0x2, 0x0) getsockopt$inet_int(0xffffffffffffffff, 0x0, 0xe, 0x0, &(0x7f0000000280)) ioctl$sock_SIOCADDDLCI(0xffffffffffffffff, 0x8980, 0x0) ioctl$RTC_ALM_SET(r1, 0x40247007, 0x0) mmap$IORING_OFF_SQES(&(0x7f0000ff3000/0x2000)=nil, 0x2000, 0x2000002, 0x10, r1, 0x10000000) getsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, 0x0, 0x0) 12:26:16 executing program 7: ioctl$RTC_UIE_ON(0xffffffffffffffff, 0x7003) r0 = perf_event_open(&(0x7f00000001c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x2}, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0xfffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = dup2(0xffffffffffffffff, r0) r2 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000", 0x1a, 0x2100}], 0x0, &(0x7f0000000180)) pkey_mprotect(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x0, 0xffffffffffffffff) pkey_mprotect(&(0x7f0000ff4000/0x4000)=nil, 0x4000, 0x0, 0xffffffffffffffff) symlinkat(&(0x7f00000000c0)='./file0\x00', r2, &(0x7f0000000140)='./file0\x00') socket$inet_udp(0x2, 0x2, 0x0) getsockopt$inet_int(0xffffffffffffffff, 0x0, 0xe, 0x0, &(0x7f0000000280)) ioctl$RTC_ALM_SET(r1, 0x40247007, 0x0) 12:26:16 executing program 0: r0 = creat(&(0x7f0000000040)='./file0\x00', 0x0) r1 = creat(&(0x7f0000000040)='./file0\x00', 0x0) fallocate(r1, 0x0, 0x0, 0x8800000) fallocate(r1, 0x3, 0x0, 0x8000) fallocate(r0, 0x200000000000000, 0x0, 0x8800000) 12:26:16 executing program 5: ioctl$RTC_UIE_ON(0xffffffffffffffff, 0x7003) r0 = perf_event_open(&(0x7f00000001c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x2}, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0xfffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = dup2(0xffffffffffffffff, r0) r2 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d}], 0x0, &(0x7f0000000180)) pkey_mprotect(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x0, 0xffffffffffffffff) pkey_mprotect(&(0x7f0000ff4000/0x4000)=nil, 0x4000, 0x0, 0xffffffffffffffff) symlinkat(&(0x7f00000000c0)='./file0\x00', r2, &(0x7f0000000140)='./file0\x00') socket$inet_udp(0x2, 0x2, 0x0) getsockopt$inet_int(0xffffffffffffffff, 0x0, 0xe, 0x0, &(0x7f0000000280)) ioctl$RTC_ALM_SET(r1, 0x40247007, 0x0) getsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, 0x0, 0x0) 12:26:16 executing program 1: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000440)=[{&(0x7f0000000040), 0x0, 0x400}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000180)) symlinkat(&(0x7f00000000c0)='./file0\x00', r0, &(0x7f0000000140)='./file0\x00') getsockopt$inet_int(0xffffffffffffffff, 0x0, 0xe, 0x0, &(0x7f0000000280)) ioctl$RTC_ALM_SET(0xffffffffffffffff, 0x40247007, 0x0) 12:26:16 executing program 2: ioctl$RTC_UIE_ON(0xffffffffffffffff, 0x7003) r0 = perf_event_open(&(0x7f00000001c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x2}, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0xfffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = dup2(0xffffffffffffffff, r0) r2 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000180)) pkey_mprotect(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x0, 0xffffffffffffffff) pkey_mprotect(&(0x7f0000ff4000/0x4000)=nil, 0x4000, 0x0, 0xffffffffffffffff) symlinkat(&(0x7f00000000c0)='./file0\x00', r2, &(0x7f0000000140)='./file0\x00') socket$inet_udp(0x2, 0x2, 0x0) getsockopt$inet_int(0xffffffffffffffff, 0x0, 0xe, 0x0, &(0x7f0000000280)) ioctl$RTC_ALM_SET(r1, 0x40247007, 0x0) getsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, 0x0, 0x0) 12:26:16 executing program 3: ioctl$RTC_UIE_ON(0xffffffffffffffff, 0x7003) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x2}, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0xfffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = dup2(0xffffffffffffffff, r0) perf_event_open(&(0x7f00000001c0)={0x2, 0x80, 0x8, 0x9, 0x4, 0x1, 0x0, 0x3b3d, 0x200a0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x2, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0xffff, 0x1, @perf_config_ext={0x7, 0x1}, 0x281, 0xffffffff, 0x4, 0x3, 0x401, 0xffffff47, 0x401, 0x0, 0x3, 0x0, 0x415}, 0x0, 0xffffffffffffffff, r0, 0x1) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000180)) pkey_mprotect(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x0, 0xffffffffffffffff) pkey_mprotect(&(0x7f0000ff4000/0x4000)=nil, 0x4000, 0x0, 0xffffffffffffffff) socket$inet_udp(0x2, 0x2, 0x0) getsockopt$inet_int(0xffffffffffffffff, 0x0, 0xe, 0x0, &(0x7f0000000280)) ioctl$sock_SIOCADDDLCI(0xffffffffffffffff, 0x8980, 0x0) ioctl$RTC_ALM_SET(r1, 0x40247007, 0x0) mmap$IORING_OFF_SQES(&(0x7f0000ff3000/0x2000)=nil, 0x2000, 0x2000002, 0x10, r1, 0x10000000) getsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, 0x0, 0x0) 12:26:16 executing program 6: ioctl$RTC_UIE_ON(0xffffffffffffffff, 0x7003) r0 = perf_event_open(&(0x7f00000001c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x2}, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0xfffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) dup2(0xffffffffffffffff, r0) r1 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="02000000030000", 0x7, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000180)) pkey_mprotect(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x0, 0xffffffffffffffff) pkey_mprotect(&(0x7f0000ff4000/0x4000)=nil, 0x4000, 0x0, 0xffffffffffffffff) symlinkat(&(0x7f00000000c0)='./file0\x00', r1, &(0x7f0000000140)='./file0\x00') socket$inet_udp(0x2, 0x2, 0x0) [ 1423.413302] EXT4-fs (loop1): VFS: Can't find ext4 filesystem [ 1423.442723] EXT4-fs error (device loop7): ext4_fill_super:4959: inode #2: comm syz-executor.7: iget: root inode unallocated [ 1423.473671] EXT4-fs (loop2): bad geometry: block count 128 exceeds size of device (8 blocks) [ 1423.476229] EXT4-fs (loop6): ext4_check_descriptors: Inode table for group 0 overlaps superblock [ 1423.478678] EXT4-fs (loop6): group descriptors corrupted! [ 1423.494491] EXT4-fs (loop7): get root inode failed [ 1423.496173] EXT4-fs (loop7): mount failed [ 1423.513481] EXT4-fs error (device loop5): ext4_fill_super:4959: inode #2: comm syz-executor.5: iget: root inode unallocated 12:26:16 executing program 0: r0 = creat(&(0x7f0000000040)='./file0\x00', 0x0) r1 = creat(&(0x7f0000000040)='./file0\x00', 0x0) fallocate(r1, 0x0, 0x0, 0x8800000) fallocate(r1, 0x3, 0x0, 0x8000) fallocate(r0, 0x300000000000000, 0x0, 0x8800000) [ 1423.528466] EXT4-fs (loop5): get root inode failed [ 1423.530037] EXT4-fs (loop5): mount failed 12:26:16 executing program 1: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000440)=[{&(0x7f0000000040), 0x0, 0x400}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000180)) symlinkat(&(0x7f00000000c0)='./file0\x00', r0, &(0x7f0000000140)='./file0\x00') getsockopt$inet_int(0xffffffffffffffff, 0x0, 0xe, 0x0, &(0x7f0000000280)) ioctl$RTC_ALM_SET(0xffffffffffffffff, 0x40247007, 0x0) 12:26:16 executing program 3: ioctl$RTC_UIE_ON(0xffffffffffffffff, 0x7003) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x2}, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0xfffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = dup2(0xffffffffffffffff, r0) perf_event_open(&(0x7f00000001c0)={0x2, 0x80, 0x8, 0x9, 0x4, 0x1, 0x0, 0x3b3d, 0x200a0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x2, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0xffff, 0x1, @perf_config_ext={0x7, 0x1}, 0x281, 0xffffffff, 0x4, 0x3, 0x401, 0xffffff47, 0x401, 0x0, 0x3, 0x0, 0x415}, 0x0, 0xffffffffffffffff, r0, 0x1) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000180)) pkey_mprotect(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x0, 0xffffffffffffffff) pkey_mprotect(&(0x7f0000ff4000/0x4000)=nil, 0x4000, 0x0, 0xffffffffffffffff) socket$inet_udp(0x2, 0x2, 0x0) getsockopt$inet_int(0xffffffffffffffff, 0x0, 0xe, 0x0, &(0x7f0000000280)) ioctl$sock_SIOCADDDLCI(0xffffffffffffffff, 0x8980, 0x0) ioctl$RTC_ALM_SET(r1, 0x40247007, 0x0) mmap$IORING_OFF_SQES(&(0x7f0000ff3000/0x2000)=nil, 0x2000, 0x2000002, 0x10, r1, 0x10000000) getsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, 0x0, 0x0) [ 1423.609303] EXT4-fs (loop4): mounted filesystem without journal. Opts: ,errors=continue 12:26:16 executing program 2: ioctl$RTC_UIE_ON(0xffffffffffffffff, 0x7003) r0 = perf_event_open(&(0x7f00000001c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x2}, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0xfffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = dup2(0xffffffffffffffff, r0) r2 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000180)) pkey_mprotect(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x0, 0xffffffffffffffff) pkey_mprotect(&(0x7f0000ff4000/0x4000)=nil, 0x4000, 0x0, 0xffffffffffffffff) symlinkat(&(0x7f00000000c0)='./file0\x00', r2, &(0x7f0000000140)='./file0\x00') socket$inet_udp(0x2, 0x2, 0x0) getsockopt$inet_int(0xffffffffffffffff, 0x0, 0xe, 0x0, &(0x7f0000000280)) ioctl$RTC_ALM_SET(r1, 0x40247007, 0x0) getsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, 0x0, 0x0) 12:26:16 executing program 7: ioctl$RTC_UIE_ON(0xffffffffffffffff, 0x7003) r0 = perf_event_open(&(0x7f00000001c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x2}, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0xfffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = dup2(0xffffffffffffffff, r0) r2 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d}], 0x0, &(0x7f0000000180)) pkey_mprotect(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x0, 0xffffffffffffffff) pkey_mprotect(&(0x7f0000ff4000/0x4000)=nil, 0x4000, 0x0, 0xffffffffffffffff) symlinkat(&(0x7f00000000c0)='./file0\x00', r2, &(0x7f0000000140)='./file0\x00') socket$inet_udp(0x2, 0x2, 0x0) getsockopt$inet_int(0xffffffffffffffff, 0x0, 0xe, 0x0, &(0x7f0000000280)) ioctl$RTC_ALM_SET(r1, 0x40247007, 0x0) getsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, 0x0, 0x0) 12:26:16 executing program 5: r0 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000000)='/sys/power/resume', 0x22902, 0x0) r1 = openat$sr(0xffffffffffffff9c, &(0x7f0000000040), 0x260d01, 0x0) fcntl$notify(r1, 0x402, 0x80000019) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$bt_hci(r0, &(0x7f0000000040)=ANY=[], 0xfdef) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = fcntl$dupfd(r2, 0x0, r2) bind$bt_hci(r3, &(0x7f0000000080)={0x1f, 0x1, 0x4}, 0x6) socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(0xffffffffffffffff, 0x0, 0x0) getsockopt$bt_sco_SCO_CONNINFO(0xffffffffffffffff, 0x11, 0x2, &(0x7f00000000c0)=""/12, &(0x7f0000000100)=0xc) read(r1, &(0x7f00000002c0)=""/240, 0xf0) 12:26:16 executing program 6: ioctl$RTC_UIE_ON(0xffffffffffffffff, 0x7003) r0 = perf_event_open(&(0x7f00000001c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x2}, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0xfffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) dup2(0xffffffffffffffff, r0) r1 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="02000000030000", 0x7, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000180)) pkey_mprotect(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x0, 0xffffffffffffffff) pkey_mprotect(&(0x7f0000ff4000/0x4000)=nil, 0x4000, 0x0, 0xffffffffffffffff) symlinkat(&(0x7f00000000c0)='./file0\x00', r1, &(0x7f0000000140)='./file0\x00') 12:26:16 executing program 4: ioctl$RTC_UIE_ON(0xffffffffffffffff, 0x7003) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x2}, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0xfffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = dup2(0xffffffffffffffff, r0) perf_event_open(&(0x7f00000001c0)={0x2, 0x80, 0x8, 0x9, 0x4, 0x1, 0x0, 0x3b3d, 0x200a0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x2, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0xffff, 0x1, @perf_config_ext={0x7, 0x1}, 0x281, 0xffffffff, 0x4, 0x3, 0x401, 0xffffff47, 0x401, 0x0, 0x3, 0x0, 0x415}, 0x0, 0xffffffffffffffff, r0, 0x1) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000180)) pkey_mprotect(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x0, 0xffffffffffffffff) pkey_mprotect(&(0x7f0000ff4000/0x4000)=nil, 0x4000, 0x0, 0xffffffffffffffff) socket$inet_udp(0x2, 0x2, 0x0) getsockopt$inet_int(0xffffffffffffffff, 0x0, 0xe, 0x0, &(0x7f0000000280)) ioctl$sock_SIOCADDDLCI(0xffffffffffffffff, 0x8980, 0x0) ioctl$RTC_ALM_SET(r1, 0x40247007, 0x0) mmap$IORING_OFF_SQES(&(0x7f0000ff3000/0x2000)=nil, 0x2000, 0x2000002, 0x10, r1, 0x10000000) getsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, 0x0, 0x0) [ 1423.771548] EXT4-fs (loop1): VFS: Can't find ext4 filesystem [ 1423.938264] EXT4-fs (loop2): bad geometry: block count 128 exceeds size of device (8 blocks) [ 1423.984369] EXT4-fs error (device loop7): ext4_fill_super:4959: inode #2: comm syz-executor.7: iget: root inode unallocated [ 1424.018451] EXT4-fs (loop6): ext4_check_descriptors: Inode table for group 0 overlaps superblock [ 1424.020818] EXT4-fs (loop6): group descriptors corrupted! [ 1424.029459] EXT4-fs (loop7): get root inode failed [ 1424.031218] EXT4-fs (loop7): mount failed [ 1424.057171] EXT4-fs (loop4): mounted filesystem without journal. Opts: ,errors=continue 12:26:36 executing program 0: r0 = creat(&(0x7f0000000040)='./file0\x00', 0x0) r1 = creat(&(0x7f0000000040)='./file0\x00', 0x0) fallocate(r1, 0x0, 0x0, 0x8800000) fallocate(r1, 0x3, 0x0, 0x8000) fallocate(r0, 0x400000000000000, 0x0, 0x8800000) 12:26:36 executing program 1: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000440)=[{&(0x7f0000000040), 0x0, 0x400}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000180)) symlinkat(&(0x7f00000000c0)='./file0\x00', r0, &(0x7f0000000140)='./file0\x00') getsockopt$inet_int(0xffffffffffffffff, 0x0, 0xe, 0x0, &(0x7f0000000280)) ioctl$RTC_ALM_SET(0xffffffffffffffff, 0x40247007, 0x0) 12:26:36 executing program 7: r0 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000000)='/sys/power/resume', 0x22902, 0x0) r1 = openat$sr(0xffffffffffffff9c, &(0x7f0000000040), 0x260d01, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$bt_hci(r0, &(0x7f0000000040)=ANY=[], 0xfdef) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = fcntl$dupfd(r2, 0x0, r2) bind$bt_hci(r3, &(0x7f0000000080)={0x1f, 0x1, 0x4}, 0x6) socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000140)={0x28, 0x1e, 0xc21, 0x0, 0x0, {0x2}, [@typed={0x14, 0x1, 0x0, 0x0, @ipv6=@private2}]}, 0x28}}, 0x0) getsockopt$bt_sco_SCO_CONNINFO(0xffffffffffffffff, 0x11, 0x2, &(0x7f00000000c0)=""/12, &(0x7f0000000100)=0xc) read(r1, &(0x7f00000002c0)=""/240, 0xf0) 12:26:36 executing program 4: ioctl$RTC_UIE_ON(0xffffffffffffffff, 0x7003) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x2}, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0xfffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = dup2(0xffffffffffffffff, r0) perf_event_open(&(0x7f00000001c0)={0x2, 0x80, 0x8, 0x9, 0x4, 0x1, 0x0, 0x3b3d, 0x200a0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x2, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0xffff, 0x1, @perf_config_ext={0x7, 0x1}, 0x281, 0xffffffff, 0x4, 0x3, 0x401, 0xffffff47, 0x401, 0x0, 0x3, 0x0, 0x415}, 0x0, 0xffffffffffffffff, r0, 0x1) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000180)) pkey_mprotect(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x0, 0xffffffffffffffff) pkey_mprotect(&(0x7f0000ff4000/0x4000)=nil, 0x4000, 0x0, 0xffffffffffffffff) socket$inet_udp(0x2, 0x2, 0x0) getsockopt$inet_int(0xffffffffffffffff, 0x0, 0xe, 0x0, &(0x7f0000000280)) ioctl$sock_SIOCADDDLCI(0xffffffffffffffff, 0x8980, 0x0) ioctl$RTC_ALM_SET(r1, 0x40247007, 0x0) mmap$IORING_OFF_SQES(&(0x7f0000ff3000/0x2000)=nil, 0x2000, 0x2000002, 0x10, r1, 0x10000000) getsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, 0x0, 0x0) 12:26:36 executing program 6: ioctl$RTC_UIE_ON(0xffffffffffffffff, 0x7003) r0 = perf_event_open(&(0x7f00000001c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x2}, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0xfffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) dup2(0xffffffffffffffff, r0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="02000000030000", 0x7, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000180)) pkey_mprotect(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x0, 0xffffffffffffffff) pkey_mprotect(&(0x7f0000ff4000/0x4000)=nil, 0x4000, 0x0, 0xffffffffffffffff) 12:26:36 executing program 5: ioctl$RTC_UIE_ON(0xffffffffffffffff, 0x7003) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x2}, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0xfffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = dup2(0xffffffffffffffff, r0) perf_event_open(&(0x7f00000001c0)={0x2, 0x80, 0x8, 0x9, 0x4, 0x0, 0x0, 0x3b3d, 0x200a0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x2, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0xffff, 0x1, @perf_config_ext={0x7, 0x1}, 0x281, 0xffffffff, 0x4, 0x3, 0x401, 0xffffff47, 0x401, 0x0, 0x3, 0x0, 0x415}, 0x0, 0xffffffffffffffff, r0, 0x1) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000180)) pkey_mprotect(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x0, 0xffffffffffffffff) pkey_mprotect(&(0x7f0000ff4000/0x4000)=nil, 0x4000, 0x0, 0xffffffffffffffff) socket$inet_udp(0x2, 0x2, 0x0) getsockopt$inet_int(0xffffffffffffffff, 0x0, 0xe, 0x0, &(0x7f0000000280)) ioctl$sock_SIOCADDDLCI(0xffffffffffffffff, 0x8980, 0x0) ioctl$RTC_ALM_SET(r1, 0x40247007, 0x0) mmap$IORING_OFF_SQES(&(0x7f0000ff3000/0x2000)=nil, 0x2000, 0x2000002, 0x10, r1, 0x10000000) getsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, 0x0, 0x0) 12:26:36 executing program 2: ioctl$RTC_UIE_ON(0xffffffffffffffff, 0x7003) r0 = perf_event_open(&(0x7f00000001c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x2}, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0xfffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = dup2(0xffffffffffffffff, r0) r2 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000180)) pkey_mprotect(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x0, 0xffffffffffffffff) pkey_mprotect(&(0x7f0000ff4000/0x4000)=nil, 0x4000, 0x0, 0xffffffffffffffff) symlinkat(&(0x7f00000000c0)='./file0\x00', r2, &(0x7f0000000140)='./file0\x00') socket$inet_udp(0x2, 0x2, 0x0) getsockopt$inet_int(0xffffffffffffffff, 0x0, 0xe, 0x0, &(0x7f0000000280)) ioctl$RTC_ALM_SET(r1, 0x40247007, 0x0) getsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, 0x0, 0x0) 12:26:36 executing program 3: ioctl$RTC_UIE_ON(0xffffffffffffffff, 0x7003) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x2}, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0xfffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = dup2(0xffffffffffffffff, r0) perf_event_open(&(0x7f00000001c0)={0x2, 0x80, 0x8, 0x9, 0x4, 0x1, 0x0, 0x3b3d, 0x200a0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x2, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0xffff, 0x1, @perf_config_ext={0x7, 0x1}, 0x281, 0xffffffff, 0x4, 0x3, 0x401, 0xffffff47, 0x401, 0x0, 0x3, 0x0, 0x415}, 0x0, 0xffffffffffffffff, r0, 0x1) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000180)) pkey_mprotect(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x0, 0xffffffffffffffff) pkey_mprotect(&(0x7f0000ff4000/0x4000)=nil, 0x4000, 0x0, 0xffffffffffffffff) socket$inet_udp(0x2, 0x2, 0x0) getsockopt$inet_int(0xffffffffffffffff, 0x0, 0xe, 0x0, &(0x7f0000000280)) ioctl$sock_SIOCADDDLCI(0xffffffffffffffff, 0x8980, 0x0) ioctl$RTC_ALM_SET(r1, 0x40247007, 0x0) mmap$IORING_OFF_SQES(&(0x7f0000ff3000/0x2000)=nil, 0x2000, 0x2000002, 0x10, r1, 0x10000000) getsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, 0x0, 0x0) [ 1443.333034] EXT4-fs (loop1): VFS: Can't find ext4 filesystem [ 1443.388555] EXT4-fs (loop6): ext4_check_descriptors: Inode table for group 0 overlaps superblock [ 1443.390598] EXT4-fs (loop6): group descriptors corrupted! [ 1443.404663] EXT4-fs (loop2): bad geometry: block count 128 exceeds size of device (8 blocks) [ 1443.416570] EXT4-fs (loop4): mounted filesystem without journal. Opts: ,errors=continue 12:26:36 executing program 1: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0", 0x2d, 0x400}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000180)) symlinkat(&(0x7f00000000c0)='./file0\x00', r0, &(0x7f0000000140)='./file0\x00') getsockopt$inet_int(0xffffffffffffffff, 0x0, 0xe, 0x0, &(0x7f0000000280)) ioctl$RTC_ALM_SET(0xffffffffffffffff, 0x40247007, 0x0) [ 1443.497792] EXT4-fs (loop5): mounted filesystem without journal. Opts: ,errors=continue 12:26:36 executing program 0: r0 = creat(&(0x7f0000000040)='./file0\x00', 0x0) r1 = creat(&(0x7f0000000040)='./file0\x00', 0x0) fallocate(r1, 0x0, 0x0, 0x8800000) fallocate(r1, 0x3, 0x0, 0x8000) fallocate(r0, 0x500000000000000, 0x0, 0x8800000) 12:26:36 executing program 7: r0 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000000)='/sys/power/resume', 0x22902, 0x0) r1 = openat$sr(0xffffffffffffff9c, &(0x7f0000000040), 0x260d01, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$bt_hci(r0, &(0x7f0000000040)=ANY=[], 0xfdef) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = fcntl$dupfd(r2, 0x0, r2) bind$bt_hci(r3, &(0x7f0000000080)={0x1f, 0x1, 0x4}, 0x6) socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000140)={0x28, 0x1e, 0xc21, 0x0, 0x0, {0x2}, [@typed={0x14, 0x1, 0x0, 0x0, @ipv6=@private2}]}, 0x28}}, 0x0) getsockopt$bt_sco_SCO_CONNINFO(0xffffffffffffffff, 0x11, 0x2, &(0x7f00000000c0)=""/12, &(0x7f0000000100)=0xc) read(r1, &(0x7f00000002c0)=""/240, 0xf0) 12:26:36 executing program 3: ioctl$RTC_UIE_ON(0xffffffffffffffff, 0x7003) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x2}, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0xfffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = dup2(0xffffffffffffffff, r0) perf_event_open(&(0x7f00000001c0)={0x2, 0x80, 0x8, 0x9, 0x4, 0x1, 0x0, 0x3b3d, 0x200a0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x2, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0xffff, 0x1, @perf_config_ext={0x7, 0x1}, 0x281, 0xffffffff, 0x4, 0x3, 0x401, 0xffffff47, 0x401, 0x0, 0x3, 0x0, 0x415}, 0x0, 0xffffffffffffffff, r0, 0x1) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000180)) pkey_mprotect(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x0, 0xffffffffffffffff) pkey_mprotect(&(0x7f0000ff4000/0x4000)=nil, 0x4000, 0x0, 0xffffffffffffffff) socket$inet_udp(0x2, 0x2, 0x0) getsockopt$inet_int(0xffffffffffffffff, 0x0, 0xe, 0x0, &(0x7f0000000280)) ioctl$sock_SIOCADDDLCI(0xffffffffffffffff, 0x8980, 0x0) ioctl$RTC_ALM_SET(r1, 0x40247007, 0x0) mmap$IORING_OFF_SQES(&(0x7f0000ff3000/0x2000)=nil, 0x2000, 0x2000002, 0x10, r1, 0x10000000) getsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, 0x0, 0x0) 12:26:36 executing program 4: ioctl$RTC_UIE_ON(0xffffffffffffffff, 0x7003) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x2}, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0xfffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = dup2(0xffffffffffffffff, r0) perf_event_open(&(0x7f00000001c0)={0x2, 0x80, 0x8, 0x9, 0x4, 0x1, 0x0, 0x3b3d, 0x200a0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x2, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0xffff, 0x1, @perf_config_ext={0x7, 0x1}, 0x281, 0xffffffff, 0x4, 0x3, 0x401, 0xffffff47, 0x401, 0x0, 0x3, 0x0, 0x415}, 0x0, 0xffffffffffffffff, r0, 0x1) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000180)) pkey_mprotect(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x0, 0xffffffffffffffff) pkey_mprotect(&(0x7f0000ff4000/0x4000)=nil, 0x4000, 0x0, 0xffffffffffffffff) socket$inet_udp(0x2, 0x2, 0x0) getsockopt$inet_int(0xffffffffffffffff, 0x0, 0xe, 0x0, &(0x7f0000000280)) ioctl$sock_SIOCADDDLCI(0xffffffffffffffff, 0x8980, 0x0) ioctl$RTC_ALM_SET(r1, 0x40247007, 0x0) mmap$IORING_OFF_SQES(&(0x7f0000ff3000/0x2000)=nil, 0x2000, 0x2000002, 0x10, r1, 0x10000000) getsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, 0x0, 0x0) 12:26:36 executing program 6: ioctl$RTC_UIE_ON(0xffffffffffffffff, 0x7003) r0 = perf_event_open(&(0x7f00000001c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x2}, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0xfffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) dup2(0xffffffffffffffff, r0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="02000000030000", 0x7, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000180)) pkey_mprotect(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x0, 0xffffffffffffffff) 12:26:36 executing program 2: ioctl$RTC_UIE_ON(0xffffffffffffffff, 0x7003) r0 = perf_event_open(&(0x7f00000001c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x2}, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0xfffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = dup2(0xffffffffffffffff, r0) r2 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000180)) pkey_mprotect(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x0, 0xffffffffffffffff) pkey_mprotect(&(0x7f0000ff4000/0x4000)=nil, 0x4000, 0x0, 0xffffffffffffffff) symlinkat(&(0x7f00000000c0)='./file0\x00', r2, &(0x7f0000000140)='./file0\x00') socket$inet_udp(0x2, 0x2, 0x0) getsockopt$inet_int(0xffffffffffffffff, 0x0, 0xe, 0x0, &(0x7f0000000280)) ioctl$RTC_ALM_SET(r1, 0x40247007, 0x0) getsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, 0x0, 0x0) 12:26:36 executing program 5: ioctl$RTC_UIE_ON(0xffffffffffffffff, 0x7003) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x2}, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0xfffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = dup2(0xffffffffffffffff, r0) perf_event_open(&(0x7f00000001c0)={0x2, 0x80, 0x8, 0x9, 0x4, 0x0, 0x0, 0x3b3d, 0x200a0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x2, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0xffff, 0x1, @perf_config_ext={0x7, 0x1}, 0x281, 0xffffffff, 0x4, 0x3, 0x401, 0xffffff47, 0x401, 0x0, 0x3, 0x0, 0x415}, 0x0, 0xffffffffffffffff, r0, 0x1) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000180)) pkey_mprotect(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x0, 0xffffffffffffffff) pkey_mprotect(&(0x7f0000ff4000/0x4000)=nil, 0x4000, 0x0, 0xffffffffffffffff) socket$inet_udp(0x2, 0x2, 0x0) getsockopt$inet_int(0xffffffffffffffff, 0x0, 0xe, 0x0, &(0x7f0000000280)) ioctl$sock_SIOCADDDLCI(0xffffffffffffffff, 0x8980, 0x0) ioctl$RTC_ALM_SET(r1, 0x40247007, 0x0) mmap$IORING_OFF_SQES(&(0x7f0000ff3000/0x2000)=nil, 0x2000, 0x2000002, 0x10, r1, 0x10000000) getsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, 0x0, 0x0) [ 1443.694981] EXT4-fs (loop1): VFS: Can't find ext4 filesystem 12:26:36 executing program 1: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0", 0x2d, 0x400}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000180)) symlinkat(&(0x7f00000000c0)='./file0\x00', r0, &(0x7f0000000140)='./file0\x00') getsockopt$inet_int(0xffffffffffffffff, 0x0, 0xe, 0x0, &(0x7f0000000280)) ioctl$RTC_ALM_SET(0xffffffffffffffff, 0x40247007, 0x0) [ 1443.911419] EXT4-fs (loop5): mounted filesystem without journal. Opts: ,errors=continue [ 1443.947733] EXT4-fs (loop6): ext4_check_descriptors: Inode table for group 0 overlaps superblock [ 1443.950227] EXT4-fs (loop6): group descriptors corrupted! [ 1443.956231] EXT4-fs (loop4): mounted filesystem without journal. Opts: ,errors=continue [ 1443.968819] EXT4-fs (loop2): bad geometry: block count 128 exceeds size of device (8 blocks) [ 1444.011974] EXT4-fs (loop1): VFS: Can't find ext4 filesystem 12:26:52 executing program 1: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0", 0x2d, 0x400}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000180)) symlinkat(&(0x7f00000000c0)='./file0\x00', r0, &(0x7f0000000140)='./file0\x00') getsockopt$inet_int(0xffffffffffffffff, 0x0, 0xe, 0x0, &(0x7f0000000280)) ioctl$RTC_ALM_SET(0xffffffffffffffff, 0x40247007, 0x0) 12:26:52 executing program 2: ioctl$RTC_UIE_ON(0xffffffffffffffff, 0x7003) r0 = perf_event_open(&(0x7f00000001c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x2}, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0xfffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = dup2(0xffffffffffffffff, r0) r2 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000180)) pkey_mprotect(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x0, 0xffffffffffffffff) pkey_mprotect(&(0x7f0000ff4000/0x4000)=nil, 0x4000, 0x0, 0xffffffffffffffff) symlinkat(&(0x7f00000000c0)='./file0\x00', r2, &(0x7f0000000140)='./file0\x00') socket$inet_udp(0x2, 0x2, 0x0) getsockopt$inet_int(0xffffffffffffffff, 0x0, 0xe, 0x0, &(0x7f0000000280)) ioctl$RTC_ALM_SET(r1, 0x40247007, 0x0) getsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, 0x0, 0x0) 12:26:52 executing program 7: r0 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000000)='/sys/power/resume', 0x22902, 0x0) r1 = openat$sr(0xffffffffffffff9c, &(0x7f0000000040), 0x260d01, 0x0) fcntl$notify(r1, 0x402, 0x80000019) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$bt_hci(r0, &(0x7f0000000040)=ANY=[], 0xfdef) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = fcntl$dupfd(r2, 0x0, 0xffffffffffffffff) bind$bt_hci(r3, &(0x7f0000000080)={0x1f, 0x1, 0x4}, 0x6) socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000140)={0x30, 0x1e, 0xc21, 0x0, 0x0, {0x2}, [@typed={0x8, 0x0, 0x0, 0x0, @u32}, @typed={0x14, 0x1, 0x0, 0x0, @ipv6=@private2}]}, 0x30}}, 0x0) getsockopt$bt_sco_SCO_CONNINFO(0xffffffffffffffff, 0x11, 0x2, &(0x7f00000000c0)=""/12, &(0x7f0000000100)=0xc) read(r1, &(0x7f00000002c0)=""/240, 0xf0) 12:26:52 executing program 4: ioctl$RTC_UIE_ON(0xffffffffffffffff, 0x7003) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x2}, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0xfffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = dup2(0xffffffffffffffff, r0) perf_event_open(&(0x7f00000001c0)={0x2, 0x80, 0x8, 0x9, 0x4, 0x1, 0x0, 0x3b3d, 0x200a0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x2, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0xffff, 0x1, @perf_config_ext={0x7, 0x1}, 0x281, 0xffffffff, 0x4, 0x3, 0x401, 0xffffff47, 0x401, 0x0, 0x3, 0x0, 0x415}, 0x0, 0xffffffffffffffff, r0, 0x1) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000180)) pkey_mprotect(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x0, 0xffffffffffffffff) pkey_mprotect(&(0x7f0000ff4000/0x4000)=nil, 0x4000, 0x0, 0xffffffffffffffff) socket$inet_udp(0x2, 0x2, 0x0) getsockopt$inet_int(0xffffffffffffffff, 0x0, 0xe, 0x0, &(0x7f0000000280)) ioctl$sock_SIOCADDDLCI(0xffffffffffffffff, 0x8980, 0x0) ioctl$RTC_ALM_SET(r1, 0x40247007, 0x0) mmap$IORING_OFF_SQES(&(0x7f0000ff3000/0x2000)=nil, 0x2000, 0x2000002, 0x10, r1, 0x10000000) getsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, 0x0, 0x0) 12:26:52 executing program 3: ioctl$RTC_UIE_ON(0xffffffffffffffff, 0x7003) r0 = perf_event_open(&(0x7f00000001c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x2}, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0xfffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = dup2(0xffffffffffffffff, r0) r2 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600), 0x0, 0x2100}], 0x0, &(0x7f0000000180)) pkey_mprotect(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x0, 0xffffffffffffffff) pkey_mprotect(&(0x7f0000ff4000/0x4000)=nil, 0x4000, 0x0, 0xffffffffffffffff) symlinkat(&(0x7f00000000c0)='./file0\x00', r2, &(0x7f0000000140)='./file0\x00') socket$inet_udp(0x2, 0x2, 0x0) getsockopt$inet_int(0xffffffffffffffff, 0x0, 0xe, 0x0, &(0x7f0000000280)) ioctl$RTC_ALM_SET(r1, 0x40247007, 0x0) getsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, 0x0, 0x0) 12:26:52 executing program 0: r0 = creat(&(0x7f0000000040)='./file0\x00', 0x0) r1 = creat(&(0x7f0000000040)='./file0\x00', 0x0) fallocate(r1, 0x0, 0x0, 0x8800000) fallocate(r1, 0x3, 0x0, 0x8000) fallocate(r0, 0x700000000000000, 0x0, 0x8800000) 12:26:52 executing program 6: ioctl$RTC_UIE_ON(0xffffffffffffffff, 0x7003) r0 = perf_event_open(&(0x7f00000001c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x2}, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0xfffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) dup2(0xffffffffffffffff, r0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="02000000030000", 0x7, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000180)) pkey_mprotect(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x0, 0xffffffffffffffff) 12:26:52 executing program 5: ioctl$RTC_UIE_ON(0xffffffffffffffff, 0x7003) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x2}, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0xfffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = dup2(0xffffffffffffffff, r0) perf_event_open(&(0x7f00000001c0)={0x2, 0x80, 0x8, 0x9, 0x4, 0x0, 0x0, 0x3b3d, 0x200a0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x2, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0xffff, 0x1, @perf_config_ext={0x7, 0x1}, 0x281, 0xffffffff, 0x4, 0x3, 0x401, 0xffffff47, 0x401, 0x0, 0x3, 0x0, 0x415}, 0x0, 0xffffffffffffffff, r0, 0x1) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000180)) pkey_mprotect(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x0, 0xffffffffffffffff) pkey_mprotect(&(0x7f0000ff4000/0x4000)=nil, 0x4000, 0x0, 0xffffffffffffffff) socket$inet_udp(0x2, 0x2, 0x0) getsockopt$inet_int(0xffffffffffffffff, 0x0, 0xe, 0x0, &(0x7f0000000280)) ioctl$sock_SIOCADDDLCI(0xffffffffffffffff, 0x8980, 0x0) ioctl$RTC_ALM_SET(r1, 0x40247007, 0x0) mmap$IORING_OFF_SQES(&(0x7f0000ff3000/0x2000)=nil, 0x2000, 0x2000002, 0x10, r1, 0x10000000) getsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, 0x0, 0x0) [ 1459.614833] EXT4-fs (loop1): VFS: Can't find ext4 filesystem [ 1459.621282] EXT4-fs (loop2): bad geometry: block count 128 exceeds size of device (8 blocks) [ 1459.709756] EXT4-fs (loop6): ext4_check_descriptors: Inode table for group 0 overlaps superblock [ 1459.710565] EXT4-fs (loop5): mounted filesystem without journal. Opts: ,errors=continue [ 1459.712128] EXT4-fs (loop6): group descriptors corrupted! 12:26:52 executing program 5: ioctl$RTC_UIE_ON(0xffffffffffffffff, 0x7003) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x2}, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0xfffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = dup2(0xffffffffffffffff, r0) perf_event_open(&(0x7f00000001c0)={0x2, 0x80, 0x8, 0x9, 0x4, 0x0, 0x0, 0x3b3d, 0x200a0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x2, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0xffff, 0x1, @perf_config_ext={0x7, 0x1}, 0x281, 0xffffffff, 0x4, 0x3, 0x401, 0xffffff47, 0x401, 0x0, 0x3, 0x0, 0x415}, 0x0, 0xffffffffffffffff, r0, 0x1) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000180)) pkey_mprotect(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x0, 0xffffffffffffffff) pkey_mprotect(&(0x7f0000ff4000/0x4000)=nil, 0x4000, 0x0, 0xffffffffffffffff) socket$inet_udp(0x2, 0x2, 0x0) getsockopt$inet_int(0xffffffffffffffff, 0x0, 0xe, 0x0, &(0x7f0000000280)) ioctl$sock_SIOCADDDLCI(0xffffffffffffffff, 0x8980, 0x0) ioctl$RTC_ALM_SET(r1, 0x40247007, 0x0) mmap$IORING_OFF_SQES(&(0x7f0000ff3000/0x2000)=nil, 0x2000, 0x2000002, 0x10, r1, 0x10000000) 12:26:52 executing program 1: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f", 0x44, 0x400}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000180)) symlinkat(&(0x7f00000000c0)='./file0\x00', r0, &(0x7f0000000140)='./file0\x00') getsockopt$inet_int(0xffffffffffffffff, 0x0, 0xe, 0x0, &(0x7f0000000280)) ioctl$RTC_ALM_SET(0xffffffffffffffff, 0x40247007, 0x0) [ 1459.847762] EXT4-fs (loop4): mounted filesystem without journal. Opts: ,errors=continue 12:26:52 executing program 3: ioctl$RTC_UIE_ON(0xffffffffffffffff, 0x7003) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x2}, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0xfffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = dup2(0xffffffffffffffff, r0) perf_event_open(&(0x7f00000001c0)={0x2, 0x80, 0x0, 0x9, 0x4, 0x1, 0x0, 0x3b3d, 0x200a0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x2, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0xffff, 0x1, @perf_config_ext={0x7, 0x1}, 0x281, 0xffffffff, 0x4, 0x3, 0x401, 0xffffff47, 0x401, 0x0, 0x3, 0x0, 0x415}, 0x0, 0xffffffffffffffff, r0, 0x1) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000180)) pkey_mprotect(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x0, 0xffffffffffffffff) pkey_mprotect(&(0x7f0000ff4000/0x4000)=nil, 0x4000, 0x0, 0xffffffffffffffff) socket$inet_udp(0x2, 0x2, 0x0) getsockopt$inet_int(0xffffffffffffffff, 0x0, 0xe, 0x0, &(0x7f0000000280)) ioctl$sock_SIOCADDDLCI(0xffffffffffffffff, 0x8980, 0x0) ioctl$RTC_ALM_SET(r1, 0x40247007, 0x0) mmap$IORING_OFF_SQES(&(0x7f0000ff3000/0x2000)=nil, 0x2000, 0x2000002, 0x10, r1, 0x10000000) getsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, 0x0, 0x0) 12:26:52 executing program 2: ioctl$RTC_UIE_ON(0xffffffffffffffff, 0x7003) r0 = perf_event_open(&(0x7f00000001c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x2}, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0xfffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = dup2(0xffffffffffffffff, r0) r2 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000440)=[{0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000180)) pkey_mprotect(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x0, 0xffffffffffffffff) pkey_mprotect(&(0x7f0000ff4000/0x4000)=nil, 0x4000, 0x0, 0xffffffffffffffff) symlinkat(&(0x7f00000000c0)='./file0\x00', r2, &(0x7f0000000140)='./file0\x00') socket$inet_udp(0x2, 0x2, 0x0) getsockopt$inet_int(0xffffffffffffffff, 0x0, 0xe, 0x0, &(0x7f0000000280)) ioctl$RTC_ALM_SET(r1, 0x40247007, 0x0) getsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, 0x0, 0x0) 12:26:52 executing program 0: r0 = creat(&(0x7f0000000040)='./file0\x00', 0x0) r1 = creat(&(0x7f0000000040)='./file0\x00', 0x0) fallocate(r1, 0x0, 0x0, 0x8800000) fallocate(r1, 0x3, 0x0, 0x8000) fallocate(r0, 0x800000000000000, 0x0, 0x8800000) 12:26:52 executing program 6: ioctl$RTC_UIE_ON(0xffffffffffffffff, 0x7003) r0 = perf_event_open(&(0x7f00000001c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x2}, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0xfffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) dup2(0xffffffffffffffff, r0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="02000000030000", 0x7, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000180)) pkey_mprotect(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x0, 0xffffffffffffffff) 12:26:52 executing program 7: ioctl$RTC_UIE_ON(0xffffffffffffffff, 0x7003) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x2}, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0xfffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = dup2(0xffffffffffffffff, r0) perf_event_open(&(0x7f00000001c0)={0x2, 0x80, 0x8, 0x0, 0x4, 0x1, 0x0, 0x3b3d, 0x200a0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x2, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0xffff, 0x1, @perf_config_ext={0x7, 0x1}, 0x281, 0xffffffff, 0x4, 0x3, 0x401, 0xffffff47, 0x401, 0x0, 0x3, 0x0, 0x415}, 0x0, 0xffffffffffffffff, r0, 0x1) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000180)) pkey_mprotect(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x0, 0xffffffffffffffff) pkey_mprotect(&(0x7f0000ff4000/0x4000)=nil, 0x4000, 0x0, 0xffffffffffffffff) socket$inet_udp(0x2, 0x2, 0x0) getsockopt$inet_int(0xffffffffffffffff, 0x0, 0xe, 0x0, &(0x7f0000000280)) ioctl$sock_SIOCADDDLCI(0xffffffffffffffff, 0x8980, 0x0) ioctl$RTC_ALM_SET(r1, 0x40247007, 0x0) mmap$IORING_OFF_SQES(&(0x7f0000ff3000/0x2000)=nil, 0x2000, 0x2000002, 0x10, r1, 0x10000000) getsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, 0x0, 0x0) 12:26:52 executing program 4: ioctl$RTC_UIE_ON(0xffffffffffffffff, 0x7003) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x2}, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0xfffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = dup2(0xffffffffffffffff, r0) perf_event_open(&(0x7f00000001c0)={0x2, 0x80, 0x8, 0x9, 0x4, 0x1, 0x0, 0x3b3d, 0x200a0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x2, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0xffff, 0x1, @perf_config_ext={0x7, 0x1}, 0x281, 0xffffffff, 0x4, 0x3, 0x401, 0xffffff47, 0x401, 0x0, 0x3, 0x0, 0x415}, 0x0, 0xffffffffffffffff, r0, 0x1) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000180)) pkey_mprotect(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x0, 0xffffffffffffffff) pkey_mprotect(&(0x7f0000ff4000/0x4000)=nil, 0x4000, 0x0, 0xffffffffffffffff) socket$inet_udp(0x2, 0x2, 0x0) getsockopt$inet_int(0xffffffffffffffff, 0x0, 0xe, 0x0, &(0x7f0000000280)) ioctl$sock_SIOCADDDLCI(0xffffffffffffffff, 0x8980, 0x0) ioctl$RTC_ALM_SET(r1, 0x40247007, 0x0) mmap$IORING_OFF_SQES(&(0x7f0000ff3000/0x2000)=nil, 0x2000, 0x2000002, 0x10, r1, 0x10000000) getsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, 0x0, 0x0) [ 1460.079816] EXT4-fs error (device loop1): ext4_fill_super:4959: inode #2: comm syz-executor.1: iget: root inode unallocated [ 1460.104837] EXT4-fs (loop1): get root inode failed [ 1460.105946] EXT4-fs (loop1): mount failed [ 1460.176501] EXT4-fs (loop2): VFS: Can't find ext4 filesystem [ 1460.198246] EXT4-fs (loop5): mounted filesystem without journal. Opts: ,errors=continue 12:26:52 executing program 3: ioctl$RTC_UIE_ON(0xffffffffffffffff, 0x7003) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x2}, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0xfffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = dup2(0xffffffffffffffff, r0) perf_event_open(&(0x7f00000001c0)={0x2, 0x80, 0x0, 0x9, 0x4, 0x1, 0x0, 0x3b3d, 0x200a0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x2, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0xffff, 0x1, @perf_config_ext={0x7, 0x1}, 0x281, 0xffffffff, 0x4, 0x3, 0x401, 0xffffff47, 0x401, 0x0, 0x3, 0x0, 0x415}, 0x0, 0xffffffffffffffff, r0, 0x1) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000180)) pkey_mprotect(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x0, 0xffffffffffffffff) pkey_mprotect(&(0x7f0000ff4000/0x4000)=nil, 0x4000, 0x0, 0xffffffffffffffff) socket$inet_udp(0x2, 0x2, 0x0) getsockopt$inet_int(0xffffffffffffffff, 0x0, 0xe, 0x0, &(0x7f0000000280)) ioctl$sock_SIOCADDDLCI(0xffffffffffffffff, 0x8980, 0x0) ioctl$RTC_ALM_SET(r1, 0x40247007, 0x0) mmap$IORING_OFF_SQES(&(0x7f0000ff3000/0x2000)=nil, 0x2000, 0x2000002, 0x10, r1, 0x10000000) getsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, 0x0, 0x0) [ 1460.243342] EXT4-fs (loop7): mounted filesystem without journal. Opts: ,errors=continue [ 1460.261507] EXT4-fs (loop6): ext4_check_descriptors: Inode table for group 0 overlaps superblock [ 1460.264505] EXT4-fs (loop6): group descriptors corrupted! 12:26:53 executing program 2: ioctl$RTC_UIE_ON(0xffffffffffffffff, 0x7003) r0 = perf_event_open(&(0x7f00000001c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x2}, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0xfffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = dup2(0xffffffffffffffff, r0) r2 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000440)=[{0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000180)) pkey_mprotect(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x0, 0xffffffffffffffff) pkey_mprotect(&(0x7f0000ff4000/0x4000)=nil, 0x4000, 0x0, 0xffffffffffffffff) symlinkat(&(0x7f00000000c0)='./file0\x00', r2, &(0x7f0000000140)='./file0\x00') socket$inet_udp(0x2, 0x2, 0x0) getsockopt$inet_int(0xffffffffffffffff, 0x0, 0xe, 0x0, &(0x7f0000000280)) ioctl$RTC_ALM_SET(r1, 0x40247007, 0x0) getsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, 0x0, 0x0) [ 1460.333857] EXT4-fs (loop4): mounted filesystem without journal. Opts: ,errors=continue 12:26:53 executing program 1: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f", 0x44, 0x400}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000180)) symlinkat(&(0x7f00000000c0)='./file0\x00', r0, &(0x7f0000000140)='./file0\x00') getsockopt$inet_int(0xffffffffffffffff, 0x0, 0xe, 0x0, &(0x7f0000000280)) ioctl$RTC_ALM_SET(0xffffffffffffffff, 0x40247007, 0x0) [ 1460.565532] EXT4-fs error (device loop1): ext4_fill_super:4959: inode #2: comm syz-executor.1: iget: root inode unallocated [ 1460.575142] EXT4-fs (loop2): VFS: Can't find ext4 filesystem [ 1460.578796] EXT4-fs (loop1): get root inode failed [ 1460.579851] EXT4-fs (loop1): mount failed 12:27:12 executing program 1: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f", 0x44, 0x400}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000180)) symlinkat(&(0x7f00000000c0)='./file0\x00', r0, &(0x7f0000000140)='./file0\x00') getsockopt$inet_int(0xffffffffffffffff, 0x0, 0xe, 0x0, &(0x7f0000000280)) ioctl$RTC_ALM_SET(0xffffffffffffffff, 0x40247007, 0x0) 12:27:12 executing program 5: ioctl$RTC_UIE_ON(0xffffffffffffffff, 0x7003) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x2}, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0xfffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = dup2(0xffffffffffffffff, r0) perf_event_open(&(0x7f00000001c0)={0x2, 0x80, 0x8, 0x9, 0x4, 0x0, 0x0, 0x3b3d, 0x200a0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x2, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0xffff, 0x1, @perf_config_ext={0x7, 0x1}, 0x281, 0xffffffff, 0x4, 0x3, 0x401, 0xffffff47, 0x401, 0x0, 0x3, 0x0, 0x415}, 0x0, 0xffffffffffffffff, r0, 0x1) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000180)) pkey_mprotect(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x0, 0xffffffffffffffff) pkey_mprotect(&(0x7f0000ff4000/0x4000)=nil, 0x4000, 0x0, 0xffffffffffffffff) socket$inet_udp(0x2, 0x2, 0x0) getsockopt$inet_int(0xffffffffffffffff, 0x0, 0xe, 0x0, &(0x7f0000000280)) ioctl$sock_SIOCADDDLCI(0xffffffffffffffff, 0x8980, 0x0) ioctl$RTC_ALM_SET(r1, 0x40247007, 0x0) 12:27:12 executing program 2: ioctl$RTC_UIE_ON(0xffffffffffffffff, 0x7003) r0 = perf_event_open(&(0x7f00000001c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x2}, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0xfffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = dup2(0xffffffffffffffff, r0) r2 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000440)=[{0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000180)) pkey_mprotect(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x0, 0xffffffffffffffff) pkey_mprotect(&(0x7f0000ff4000/0x4000)=nil, 0x4000, 0x0, 0xffffffffffffffff) symlinkat(&(0x7f00000000c0)='./file0\x00', r2, &(0x7f0000000140)='./file0\x00') socket$inet_udp(0x2, 0x2, 0x0) getsockopt$inet_int(0xffffffffffffffff, 0x0, 0xe, 0x0, &(0x7f0000000280)) ioctl$RTC_ALM_SET(r1, 0x40247007, 0x0) getsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, 0x0, 0x0) 12:27:12 executing program 7: ioctl$RTC_UIE_ON(0xffffffffffffffff, 0x7003) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x2}, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0xfffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = dup2(0xffffffffffffffff, r0) perf_event_open(&(0x7f00000001c0)={0x2, 0x80, 0x8, 0x0, 0x4, 0x1, 0x0, 0x3b3d, 0x200a0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x2, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0xffff, 0x1, @perf_config_ext={0x7, 0x1}, 0x281, 0xffffffff, 0x4, 0x3, 0x401, 0xffffff47, 0x401, 0x0, 0x3, 0x0, 0x415}, 0x0, 0xffffffffffffffff, r0, 0x1) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000180)) pkey_mprotect(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x0, 0xffffffffffffffff) pkey_mprotect(&(0x7f0000ff4000/0x4000)=nil, 0x4000, 0x0, 0xffffffffffffffff) socket$inet_udp(0x2, 0x2, 0x0) getsockopt$inet_int(0xffffffffffffffff, 0x0, 0xe, 0x0, &(0x7f0000000280)) ioctl$sock_SIOCADDDLCI(0xffffffffffffffff, 0x8980, 0x0) ioctl$RTC_ALM_SET(r1, 0x40247007, 0x0) mmap$IORING_OFF_SQES(&(0x7f0000ff3000/0x2000)=nil, 0x2000, 0x2000002, 0x10, r1, 0x10000000) getsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, 0x0, 0x0) 12:27:12 executing program 0: r0 = creat(&(0x7f0000000040)='./file0\x00', 0x0) r1 = creat(&(0x7f0000000040)='./file0\x00', 0x0) fallocate(r1, 0x0, 0x0, 0x8800000) fallocate(r1, 0x3, 0x0, 0x8000) fallocate(r0, 0x880050000000000, 0x0, 0x8800000) 12:27:12 executing program 4: ioctl$RTC_UIE_ON(0xffffffffffffffff, 0x7003) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x2}, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0xfffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = dup2(0xffffffffffffffff, r0) perf_event_open(&(0x7f00000001c0)={0x2, 0x80, 0x8, 0x9, 0x4, 0x1, 0x0, 0x3b3d, 0x200a0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x2, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0xffff, 0x1, @perf_config_ext={0x7, 0x1}, 0x281, 0xffffffff, 0x4, 0x3, 0x401, 0xffffff47, 0x401, 0x0, 0x3, 0x0, 0x415}, 0x0, 0xffffffffffffffff, r0, 0x1) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000180)) pkey_mprotect(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x0, 0xffffffffffffffff) pkey_mprotect(&(0x7f0000ff4000/0x4000)=nil, 0x4000, 0x0, 0xffffffffffffffff) socket$inet_udp(0x2, 0x2, 0x0) getsockopt$inet_int(0xffffffffffffffff, 0x0, 0xe, 0x0, &(0x7f0000000280)) ioctl$sock_SIOCADDDLCI(0xffffffffffffffff, 0x8980, 0x0) ioctl$RTC_ALM_SET(r1, 0x40247007, 0x0) mmap$IORING_OFF_SQES(&(0x7f0000ff3000/0x2000)=nil, 0x2000, 0x2000002, 0x10, r1, 0x10000000) getsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, 0x0, 0x0) 12:27:12 executing program 6: ioctl$RTC_UIE_ON(0xffffffffffffffff, 0x7003) r0 = perf_event_open(&(0x7f00000001c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x2}, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0xfffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) dup2(0xffffffffffffffff, r0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="02000000030000", 0x7, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000180)) pkey_mprotect(&(0x7f0000ff4000/0x4000)=nil, 0x4000, 0x0, 0xffffffffffffffff) 12:27:12 executing program 3: ioctl$RTC_UIE_ON(0xffffffffffffffff, 0x7003) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x2}, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0xfffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = dup2(0xffffffffffffffff, r0) perf_event_open(&(0x7f00000001c0)={0x2, 0x80, 0x0, 0x9, 0x4, 0x1, 0x0, 0x3b3d, 0x200a0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x2, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0xffff, 0x1, @perf_config_ext={0x7, 0x1}, 0x281, 0xffffffff, 0x4, 0x3, 0x401, 0xffffff47, 0x401, 0x0, 0x3, 0x0, 0x415}, 0x0, 0xffffffffffffffff, r0, 0x1) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000180)) pkey_mprotect(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x0, 0xffffffffffffffff) pkey_mprotect(&(0x7f0000ff4000/0x4000)=nil, 0x4000, 0x0, 0xffffffffffffffff) socket$inet_udp(0x2, 0x2, 0x0) getsockopt$inet_int(0xffffffffffffffff, 0x0, 0xe, 0x0, &(0x7f0000000280)) ioctl$sock_SIOCADDDLCI(0xffffffffffffffff, 0x8980, 0x0) ioctl$RTC_ALM_SET(r1, 0x40247007, 0x0) mmap$IORING_OFF_SQES(&(0x7f0000ff3000/0x2000)=nil, 0x2000, 0x2000002, 0x10, r1, 0x10000000) getsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, 0x0, 0x0) [ 1479.637115] EXT4-fs (loop2): VFS: Can't find ext4 filesystem [ 1479.652932] EXT4-fs error (device loop1): ext4_fill_super:4959: inode #2: comm syz-executor.1: iget: root inode unallocated [ 1479.660205] EXT4-fs (loop1): get root inode failed [ 1479.661763] EXT4-fs (loop1): mount failed [ 1479.674721] EXT4-fs (loop4): mounted filesystem without journal. Opts: ,errors=continue [ 1479.675840] EXT4-fs (loop5): mounted filesystem without journal. Opts: ,errors=continue [ 1479.728260] EXT4-fs (loop7): mounted filesystem without journal. Opts: ,errors=continue [ 1479.819852] EXT4-fs (loop6): ext4_check_descriptors: Inode table for group 0 overlaps superblock [ 1479.822383] EXT4-fs (loop6): group descriptors corrupted! 12:27:30 executing program 1: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f0000000000000000010000", 0x4f, 0x400}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000180)) symlinkat(&(0x7f00000000c0)='./file0\x00', r0, &(0x7f0000000140)='./file0\x00') getsockopt$inet_int(0xffffffffffffffff, 0x0, 0xe, 0x0, &(0x7f0000000280)) ioctl$RTC_ALM_SET(0xffffffffffffffff, 0x40247007, 0x0) 12:27:30 executing program 6: ioctl$RTC_UIE_ON(0xffffffffffffffff, 0x7003) r0 = perf_event_open(&(0x7f00000001c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x2}, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0xfffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) dup2(0xffffffffffffffff, r0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="02000000030000", 0x7, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000180)) pkey_mprotect(&(0x7f0000ff4000/0x4000)=nil, 0x4000, 0x0, 0xffffffffffffffff) 12:27:30 executing program 3: ioctl$RTC_UIE_ON(0xffffffffffffffff, 0x7003) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x2}, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0xfffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = dup2(0xffffffffffffffff, r0) perf_event_open(&(0x7f00000001c0)={0x2, 0x80, 0x8, 0x9, 0x4, 0x1, 0x0, 0x3b3d, 0x200a0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x2, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0xffff, 0x1, @perf_config_ext={0x7, 0x1}, 0x281, 0xffffffff, 0x4, 0x3, 0x401, 0xffffff47, 0x401, 0x0, 0x3, 0x0, 0x415}, 0x0, 0xffffffffffffffff, r0, 0x1) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000180)) pkey_mprotect(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x0, 0xffffffffffffffff) pkey_mprotect(&(0x7f0000ff4000/0x4000)=nil, 0x4000, 0x0, 0xffffffffffffffff) socket$inet_udp(0x2, 0x2, 0x0) getsockopt$inet_int(0xffffffffffffffff, 0x0, 0xe, 0x0, &(0x7f0000000280)) ioctl$sock_SIOCADDDLCI(0xffffffffffffffff, 0x8980, 0x0) ioctl$RTC_ALM_SET(r1, 0x40247007, 0x0) mmap$IORING_OFF_SQES(&(0x7f0000ff3000/0x2000)=nil, 0x2000, 0x2000002, 0x10, r1, 0x10000000) getsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, 0x0, 0x0) 12:27:30 executing program 2: ioctl$RTC_UIE_ON(0xffffffffffffffff, 0x7003) r0 = perf_event_open(&(0x7f00000001c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x2}, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0xfffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = dup2(0xffffffffffffffff, r0) r2 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000440)=[{0x0, 0x0, 0x400}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000180)) pkey_mprotect(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x0, 0xffffffffffffffff) pkey_mprotect(&(0x7f0000ff4000/0x4000)=nil, 0x4000, 0x0, 0xffffffffffffffff) symlinkat(&(0x7f00000000c0)='./file0\x00', r2, &(0x7f0000000140)='./file0\x00') socket$inet_udp(0x2, 0x2, 0x0) getsockopt$inet_int(0xffffffffffffffff, 0x0, 0xe, 0x0, &(0x7f0000000280)) ioctl$RTC_ALM_SET(r1, 0x40247007, 0x0) getsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, 0x0, 0x0) 12:27:30 executing program 5: ioctl$RTC_UIE_ON(0xffffffffffffffff, 0x7003) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x2}, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0xfffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) dup2(0xffffffffffffffff, r0) perf_event_open(&(0x7f00000001c0)={0x2, 0x80, 0x8, 0x9, 0x4, 0x0, 0x0, 0x3b3d, 0x200a0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x2, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0xffff, 0x1, @perf_config_ext={0x7, 0x1}, 0x281, 0xffffffff, 0x4, 0x3, 0x401, 0xffffff47, 0x401, 0x0, 0x3, 0x0, 0x415}, 0x0, 0xffffffffffffffff, r0, 0x1) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000180)) pkey_mprotect(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x0, 0xffffffffffffffff) pkey_mprotect(&(0x7f0000ff4000/0x4000)=nil, 0x4000, 0x0, 0xffffffffffffffff) socket$inet_udp(0x2, 0x2, 0x0) getsockopt$inet_int(0xffffffffffffffff, 0x0, 0xe, 0x0, &(0x7f0000000280)) ioctl$sock_SIOCADDDLCI(0xffffffffffffffff, 0x8980, 0x0) 12:27:30 executing program 0: r0 = creat(&(0x7f0000000040)='./file0\x00', 0x0) r1 = creat(&(0x7f0000000040)='./file0\x00', 0x0) fallocate(r1, 0x0, 0x0, 0x8800000) fallocate(r1, 0x3, 0x0, 0x8000) fallocate(r0, 0xc01000000000000, 0x0, 0x8800000) 12:27:30 executing program 7: ioctl$RTC_UIE_ON(0xffffffffffffffff, 0x7003) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x2}, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0xfffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = dup2(0xffffffffffffffff, r0) perf_event_open(&(0x7f00000001c0)={0x2, 0x80, 0x8, 0x0, 0x4, 0x1, 0x0, 0x3b3d, 0x200a0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x2, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0xffff, 0x1, @perf_config_ext={0x7, 0x1}, 0x281, 0xffffffff, 0x4, 0x3, 0x401, 0xffffff47, 0x401, 0x0, 0x3, 0x0, 0x415}, 0x0, 0xffffffffffffffff, r0, 0x1) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000180)) pkey_mprotect(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x0, 0xffffffffffffffff) pkey_mprotect(&(0x7f0000ff4000/0x4000)=nil, 0x4000, 0x0, 0xffffffffffffffff) socket$inet_udp(0x2, 0x2, 0x0) getsockopt$inet_int(0xffffffffffffffff, 0x0, 0xe, 0x0, &(0x7f0000000280)) ioctl$sock_SIOCADDDLCI(0xffffffffffffffff, 0x8980, 0x0) ioctl$RTC_ALM_SET(r1, 0x40247007, 0x0) mmap$IORING_OFF_SQES(&(0x7f0000ff3000/0x2000)=nil, 0x2000, 0x2000002, 0x10, r1, 0x10000000) getsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, 0x0, 0x0) 12:27:30 executing program 4: ioctl$RTC_UIE_ON(0xffffffffffffffff, 0x7003) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x2}, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0xfffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = dup2(0xffffffffffffffff, r0) perf_event_open(&(0x7f00000001c0)={0x2, 0x80, 0x8, 0x9, 0x4, 0x1, 0x0, 0x3b3d, 0x200a0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x2, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0xffff, 0x1, @perf_config_ext={0x7, 0x1}, 0x281, 0xffffffff, 0x4, 0x3, 0x401, 0xffffff47, 0x401, 0x0, 0x3, 0x0, 0x415}, 0x0, 0xffffffffffffffff, r0, 0x1) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000180)) pkey_mprotect(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x0, 0xffffffffffffffff) pkey_mprotect(&(0x7f0000ff4000/0x4000)=nil, 0x4000, 0x0, 0xffffffffffffffff) socket$inet_udp(0x2, 0x2, 0x0) getsockopt$inet_int(0xffffffffffffffff, 0x0, 0xe, 0x0, &(0x7f0000000280)) ioctl$sock_SIOCADDDLCI(0xffffffffffffffff, 0x8980, 0x0) ioctl$RTC_ALM_SET(r1, 0x40247007, 0x0) mmap$IORING_OFF_SQES(&(0x7f0000ff3000/0x2000)=nil, 0x2000, 0x2000002, 0x10, r1, 0x10000000) getsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, 0x0, 0x0) [ 1497.446833] EXT4-fs (loop1): invalid first ino: 0 [ 1497.523260] EXT4-fs (loop4): mounted filesystem without journal. Opts: ,errors=continue 12:27:30 executing program 1: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f0000000000000000010000", 0x4f, 0x400}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000180)) symlinkat(&(0x7f00000000c0)='./file0\x00', r0, &(0x7f0000000140)='./file0\x00') getsockopt$inet_int(0xffffffffffffffff, 0x0, 0xe, 0x0, &(0x7f0000000280)) ioctl$RTC_ALM_SET(0xffffffffffffffff, 0x40247007, 0x0) 12:27:30 executing program 3: ioctl$RTC_UIE_ON(0xffffffffffffffff, 0x7003) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x2}, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0xfffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = dup2(0xffffffffffffffff, r0) perf_event_open(&(0x7f00000001c0)={0x2, 0x80, 0x8, 0x9, 0x4, 0x1, 0x0, 0x3b3d, 0x200a0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x2, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0xffff, 0x1, @perf_config_ext={0x7, 0x1}, 0x281, 0xffffffff, 0x4, 0x3, 0x401, 0xffffff47, 0x401, 0x0, 0x3, 0x0, 0x415}, 0x0, 0xffffffffffffffff, r0, 0x1) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000180)) pkey_mprotect(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x0, 0xffffffffffffffff) pkey_mprotect(&(0x7f0000ff4000/0x4000)=nil, 0x4000, 0x0, 0xffffffffffffffff) socket$inet_udp(0x2, 0x2, 0x0) getsockopt$inet_int(0xffffffffffffffff, 0x0, 0xe, 0x0, &(0x7f0000000280)) ioctl$sock_SIOCADDDLCI(0xffffffffffffffff, 0x8980, 0x0) ioctl$RTC_ALM_SET(r1, 0x40247007, 0x0) mmap$IORING_OFF_SQES(&(0x7f0000ff3000/0x2000)=nil, 0x2000, 0x2000002, 0x10, r1, 0x10000000) getsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, 0x0, 0x0) [ 1497.575130] EXT4-fs (loop2): VFS: Can't find ext4 filesystem [ 1497.613173] EXT4-fs (loop6): ext4_check_descriptors: Inode table for group 0 overlaps superblock [ 1497.615683] EXT4-fs (loop6): group descriptors corrupted! [ 1497.636160] EXT4-fs (loop5): mounted filesystem without journal. Opts: ,errors=continue [ 1497.661738] EXT4-fs (loop7): mounted filesystem without journal. Opts: ,errors=continue 12:27:30 executing program 7: ioctl$RTC_UIE_ON(0xffffffffffffffff, 0x7003) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x2}, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0xfffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = dup2(0xffffffffffffffff, r0) perf_event_open(&(0x7f00000001c0)={0x2, 0x80, 0x8, 0x0, 0x4, 0x1, 0x0, 0x3b3d, 0x200a0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x2, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0xffff, 0x1, @perf_config_ext={0x7, 0x1}, 0x281, 0xffffffff, 0x4, 0x3, 0x401, 0xffffff47, 0x401, 0x0, 0x3, 0x0, 0x415}, 0x0, 0xffffffffffffffff, r0, 0x1) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000180)) pkey_mprotect(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x0, 0xffffffffffffffff) pkey_mprotect(&(0x7f0000ff4000/0x4000)=nil, 0x4000, 0x0, 0xffffffffffffffff) socket$inet_udp(0x2, 0x2, 0x0) getsockopt$inet_int(0xffffffffffffffff, 0x0, 0xe, 0x0, &(0x7f0000000280)) ioctl$sock_SIOCADDDLCI(0xffffffffffffffff, 0x8980, 0x0) ioctl$RTC_ALM_SET(r1, 0x40247007, 0x0) mmap$IORING_OFF_SQES(&(0x7f0000ff3000/0x2000)=nil, 0x2000, 0x2000002, 0x10, r1, 0x10000000) 12:27:30 executing program 2: ioctl$RTC_UIE_ON(0xffffffffffffffff, 0x7003) r0 = perf_event_open(&(0x7f00000001c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x2}, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0xfffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = dup2(0xffffffffffffffff, r0) r2 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000440)=[{0x0, 0x0, 0x400}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000180)) pkey_mprotect(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x0, 0xffffffffffffffff) pkey_mprotect(&(0x7f0000ff4000/0x4000)=nil, 0x4000, 0x0, 0xffffffffffffffff) symlinkat(&(0x7f00000000c0)='./file0\x00', r2, &(0x7f0000000140)='./file0\x00') socket$inet_udp(0x2, 0x2, 0x0) getsockopt$inet_int(0xffffffffffffffff, 0x0, 0xe, 0x0, &(0x7f0000000280)) ioctl$RTC_ALM_SET(r1, 0x40247007, 0x0) getsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, 0x0, 0x0) 12:27:30 executing program 0: r0 = creat(&(0x7f0000000040)='./file0\x00', 0x0) r1 = creat(&(0x7f0000000040)='./file0\x00', 0x0) fallocate(r1, 0x0, 0x0, 0x8800000) fallocate(r1, 0x3, 0x0, 0x8000) fallocate(r0, 0xd00000000000000, 0x0, 0x8800000) 12:27:30 executing program 4: ioctl$RTC_UIE_ON(0xffffffffffffffff, 0x7003) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x2}, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0xfffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = dup2(0xffffffffffffffff, r0) perf_event_open(&(0x7f00000001c0)={0x2, 0x80, 0x8, 0x9, 0x4, 0x1, 0x0, 0x3b3d, 0x200a0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x2, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0xffff, 0x1, @perf_config_ext={0x7, 0x1}, 0x281, 0xffffffff, 0x4, 0x3, 0x401, 0xffffff47, 0x401, 0x0, 0x3, 0x0, 0x415}, 0x0, 0xffffffffffffffff, r0, 0x1) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000180)) pkey_mprotect(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x0, 0xffffffffffffffff) pkey_mprotect(&(0x7f0000ff4000/0x4000)=nil, 0x4000, 0x0, 0xffffffffffffffff) socket$inet_udp(0x2, 0x2, 0x0) getsockopt$inet_int(0xffffffffffffffff, 0x0, 0xe, 0x0, &(0x7f0000000280)) ioctl$sock_SIOCADDDLCI(0xffffffffffffffff, 0x8980, 0x0) ioctl$RTC_ALM_SET(r1, 0x40247007, 0x0) mmap$IORING_OFF_SQES(&(0x7f0000ff3000/0x2000)=nil, 0x2000, 0x2000002, 0x10, r1, 0x10000000) getsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, 0x0, 0x0) 12:27:30 executing program 5: ioctl$RTC_UIE_ON(0xffffffffffffffff, 0x7003) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x2}, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0xfffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) dup2(0xffffffffffffffff, r0) perf_event_open(&(0x7f00000001c0)={0x2, 0x80, 0x8, 0x9, 0x4, 0x0, 0x0, 0x3b3d, 0x200a0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x2, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0xffff, 0x1, @perf_config_ext={0x7, 0x1}, 0x281, 0xffffffff, 0x4, 0x3, 0x401, 0xffffff47, 0x401, 0x0, 0x3, 0x0, 0x415}, 0x0, 0xffffffffffffffff, r0, 0x1) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000180)) pkey_mprotect(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x0, 0xffffffffffffffff) pkey_mprotect(&(0x7f0000ff4000/0x4000)=nil, 0x4000, 0x0, 0xffffffffffffffff) socket$inet_udp(0x2, 0x2, 0x0) getsockopt$inet_int(0xffffffffffffffff, 0x0, 0xe, 0x0, &(0x7f0000000280)) [ 1497.848651] EXT4-fs (loop1): invalid first ino: 0 12:27:30 executing program 6: ioctl$RTC_UIE_ON(0xffffffffffffffff, 0x7003) perf_event_open(&(0x7f00000001c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x2}, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0xfffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="02000000030000", 0x7, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000180)) pkey_mprotect(&(0x7f0000ff4000/0x4000)=nil, 0x4000, 0x0, 0xffffffffffffffff) 12:27:30 executing program 1: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f0000000000000000010000", 0x4f, 0x400}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000180)) symlinkat(&(0x7f00000000c0)='./file0\x00', r0, &(0x7f0000000140)='./file0\x00') getsockopt$inet_int(0xffffffffffffffff, 0x0, 0xe, 0x0, &(0x7f0000000280)) ioctl$RTC_ALM_SET(0xffffffffffffffff, 0x40247007, 0x0) 12:27:30 executing program 3: ioctl$RTC_UIE_ON(0xffffffffffffffff, 0x7003) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x2}, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0xfffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = dup2(0xffffffffffffffff, r0) perf_event_open(&(0x7f00000001c0)={0x2, 0x80, 0x8, 0x9, 0x4, 0x1, 0x0, 0x3b3d, 0x200a0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x2, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0xffff, 0x1, @perf_config_ext={0x7, 0x1}, 0x281, 0xffffffff, 0x4, 0x3, 0x401, 0xffffff47, 0x401, 0x0, 0x3, 0x0, 0x415}, 0x0, 0xffffffffffffffff, r0, 0x1) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000180)) pkey_mprotect(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x0, 0xffffffffffffffff) pkey_mprotect(&(0x7f0000ff4000/0x4000)=nil, 0x4000, 0x0, 0xffffffffffffffff) socket$inet_udp(0x2, 0x2, 0x0) getsockopt$inet_int(0xffffffffffffffff, 0x0, 0xe, 0x0, &(0x7f0000000280)) ioctl$sock_SIOCADDDLCI(0xffffffffffffffff, 0x8980, 0x0) ioctl$RTC_ALM_SET(r1, 0x40247007, 0x0) mmap$IORING_OFF_SQES(&(0x7f0000ff3000/0x2000)=nil, 0x2000, 0x2000002, 0x10, r1, 0x10000000) getsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, 0x0, 0x0) [ 1498.025274] EXT4-fs (loop2): VFS: Can't find ext4 filesystem [ 1498.064805] EXT4-fs (loop7): mounted filesystem without journal. Opts: ,errors=continue 12:27:30 executing program 0: r0 = creat(&(0x7f0000000040)='./file0\x00', 0x0) r1 = creat(&(0x7f0000000040)='./file0\x00', 0x0) fallocate(r1, 0x0, 0x0, 0x8800000) fallocate(r1, 0x3, 0x0, 0x8000) fallocate(r0, 0x1000000000000000, 0x0, 0x8800000) 12:27:30 executing program 7: ioctl$RTC_UIE_ON(0xffffffffffffffff, 0x7003) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x2}, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0xfffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = dup2(0xffffffffffffffff, r0) perf_event_open(&(0x7f00000001c0)={0x2, 0x80, 0x8, 0x0, 0x4, 0x1, 0x0, 0x3b3d, 0x200a0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x2, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0xffff, 0x1, @perf_config_ext={0x7, 0x1}, 0x281, 0xffffffff, 0x4, 0x3, 0x401, 0xffffff47, 0x401, 0x0, 0x3, 0x0, 0x415}, 0x0, 0xffffffffffffffff, r0, 0x1) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000180)) pkey_mprotect(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x0, 0xffffffffffffffff) pkey_mprotect(&(0x7f0000ff4000/0x4000)=nil, 0x4000, 0x0, 0xffffffffffffffff) socket$inet_udp(0x2, 0x2, 0x0) getsockopt$inet_int(0xffffffffffffffff, 0x0, 0xe, 0x0, &(0x7f0000000280)) ioctl$sock_SIOCADDDLCI(0xffffffffffffffff, 0x8980, 0x0) ioctl$RTC_ALM_SET(r1, 0x40247007, 0x0) 12:27:30 executing program 2: ioctl$RTC_UIE_ON(0xffffffffffffffff, 0x7003) r0 = perf_event_open(&(0x7f00000001c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x2}, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0xfffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = dup2(0xffffffffffffffff, r0) r2 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000440)=[{0x0, 0x0, 0x400}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000180)) pkey_mprotect(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x0, 0xffffffffffffffff) pkey_mprotect(&(0x7f0000ff4000/0x4000)=nil, 0x4000, 0x0, 0xffffffffffffffff) symlinkat(&(0x7f00000000c0)='./file0\x00', r2, &(0x7f0000000140)='./file0\x00') socket$inet_udp(0x2, 0x2, 0x0) getsockopt$inet_int(0xffffffffffffffff, 0x0, 0xe, 0x0, &(0x7f0000000280)) ioctl$RTC_ALM_SET(r1, 0x40247007, 0x0) getsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, 0x0, 0x0) [ 1498.173678] EXT4-fs (loop6): ext4_check_descriptors: Inode table for group 0 overlaps superblock [ 1498.175850] EXT4-fs (loop6): group descriptors corrupted! [ 1498.199780] EXT4-fs (loop4): mounted filesystem without journal. Opts: ,errors=continue [ 1498.200461] EXT4-fs (loop1): invalid first ino: 0 [ 1498.224550] EXT4-fs (loop5): mounted filesystem without journal. Opts: ,errors=continue 12:27:31 executing program 6: ioctl$RTC_UIE_ON(0xffffffffffffffff, 0x7003) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="02000000030000", 0x7, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000180)) pkey_mprotect(&(0x7f0000ff4000/0x4000)=nil, 0x4000, 0x0, 0xffffffffffffffff) 12:27:31 executing program 1: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b", 0x55, 0x400}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000180)) symlinkat(&(0x7f00000000c0)='./file0\x00', r0, &(0x7f0000000140)='./file0\x00') getsockopt$inet_int(0xffffffffffffffff, 0x0, 0xe, 0x0, &(0x7f0000000280)) ioctl$RTC_ALM_SET(0xffffffffffffffff, 0x40247007, 0x0) 12:27:31 executing program 5: ioctl$RTC_UIE_ON(0xffffffffffffffff, 0x7003) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x2}, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0xfffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) dup2(0xffffffffffffffff, r0) perf_event_open(&(0x7f00000001c0)={0x2, 0x80, 0x8, 0x9, 0x4, 0x0, 0x0, 0x3b3d, 0x200a0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x2, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0xffff, 0x1, @perf_config_ext={0x7, 0x1}, 0x281, 0xffffffff, 0x4, 0x3, 0x401, 0xffffff47, 0x401, 0x0, 0x3, 0x0, 0x415}, 0x0, 0xffffffffffffffff, r0, 0x1) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000180)) pkey_mprotect(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x0, 0xffffffffffffffff) pkey_mprotect(&(0x7f0000ff4000/0x4000)=nil, 0x4000, 0x0, 0xffffffffffffffff) socket$inet_udp(0x2, 0x2, 0x0) [ 1498.461392] EXT4-fs (loop2): VFS: Can't find ext4 filesystem [ 1498.561495] EXT4-fs (loop1): unsupported inode size: 0 [ 1498.562806] EXT4-fs (loop1): blocksize: 2048 [ 1498.587670] EXT4-fs (loop7): mounted filesystem without journal. Opts: ,errors=continue [ 1498.596624] EXT4-fs (loop6): ext4_check_descriptors: Inode table for group 0 overlaps superblock [ 1498.599022] EXT4-fs (loop6): group descriptors corrupted! [ 1498.701446] EXT4-fs (loop5): mounted filesystem without journal. Opts: ,errors=continue 12:27:50 executing program 5: ioctl$RTC_UIE_ON(0xffffffffffffffff, 0x7003) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x2}, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0xfffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) dup2(0xffffffffffffffff, r0) perf_event_open(&(0x7f00000001c0)={0x2, 0x80, 0x8, 0x9, 0x4, 0x0, 0x0, 0x3b3d, 0x200a0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x2, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0xffff, 0x1, @perf_config_ext={0x7, 0x1}, 0x281, 0xffffffff, 0x4, 0x3, 0x401, 0xffffff47, 0x401, 0x0, 0x3, 0x0, 0x415}, 0x0, 0xffffffffffffffff, r0, 0x1) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000180)) pkey_mprotect(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x0, 0xffffffffffffffff) pkey_mprotect(&(0x7f0000ff4000/0x4000)=nil, 0x4000, 0x0, 0xffffffffffffffff) 12:27:50 executing program 4: ioctl$RTC_UIE_ON(0xffffffffffffffff, 0x7003) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x2}, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0xfffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = dup2(0xffffffffffffffff, r0) perf_event_open(&(0x7f00000001c0)={0x2, 0x80, 0x8, 0x9, 0x4, 0x1, 0x0, 0x3b3d, 0x200a0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x2, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0xffff, 0x1, @perf_config_ext={0x7, 0x1}, 0x281, 0xffffffff, 0x4, 0x3, 0x401, 0xffffff47, 0x401, 0x0, 0x3, 0x0, 0x415}, 0x0, 0xffffffffffffffff, r0, 0x1) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000180)) pkey_mprotect(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x0, 0xffffffffffffffff) pkey_mprotect(&(0x7f0000ff4000/0x4000)=nil, 0x4000, 0x0, 0xffffffffffffffff) socket$inet_udp(0x2, 0x2, 0x0) getsockopt$inet_int(0xffffffffffffffff, 0x0, 0xe, 0x0, &(0x7f0000000280)) ioctl$sock_SIOCADDDLCI(0xffffffffffffffff, 0x8980, 0x0) ioctl$RTC_ALM_SET(r1, 0x40247007, 0x0) mmap$IORING_OFF_SQES(&(0x7f0000ff3000/0x2000)=nil, 0x2000, 0x2000002, 0x10, r1, 0x10000000) getsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, 0x0, 0x0) 12:27:50 executing program 0: r0 = creat(&(0x7f0000000040)='./file0\x00', 0x0) r1 = creat(&(0x7f0000000040)='./file0\x00', 0x0) fallocate(r1, 0x0, 0x0, 0x8800000) fallocate(r1, 0x3, 0x0, 0x8000) fallocate(r0, 0x1200000000000000, 0x0, 0x8800000) 12:27:50 executing program 1: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b", 0x55, 0x400}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000180)) symlinkat(&(0x7f00000000c0)='./file0\x00', r0, &(0x7f0000000140)='./file0\x00') getsockopt$inet_int(0xffffffffffffffff, 0x0, 0xe, 0x0, &(0x7f0000000280)) ioctl$RTC_ALM_SET(0xffffffffffffffff, 0x40247007, 0x0) 12:27:50 executing program 2: ioctl$RTC_UIE_ON(0xffffffffffffffff, 0x7003) r0 = perf_event_open(&(0x7f00000001c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x2}, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0xfffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = dup2(0xffffffffffffffff, r0) r2 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000440)=[{&(0x7f0000000040), 0x0, 0x400}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000180)) pkey_mprotect(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x0, 0xffffffffffffffff) pkey_mprotect(&(0x7f0000ff4000/0x4000)=nil, 0x4000, 0x0, 0xffffffffffffffff) symlinkat(&(0x7f00000000c0)='./file0\x00', r2, &(0x7f0000000140)='./file0\x00') socket$inet_udp(0x2, 0x2, 0x0) getsockopt$inet_int(0xffffffffffffffff, 0x0, 0xe, 0x0, &(0x7f0000000280)) ioctl$RTC_ALM_SET(r1, 0x40247007, 0x0) getsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, 0x0, 0x0) 12:27:50 executing program 6: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="02000000030000", 0x7, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000180)) pkey_mprotect(&(0x7f0000ff4000/0x4000)=nil, 0x4000, 0x0, 0xffffffffffffffff) 12:27:50 executing program 7: ioctl$RTC_UIE_ON(0xffffffffffffffff, 0x7003) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x2}, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0xfffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) dup2(0xffffffffffffffff, r0) perf_event_open(&(0x7f00000001c0)={0x2, 0x80, 0x8, 0x0, 0x4, 0x1, 0x0, 0x3b3d, 0x200a0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x2, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0xffff, 0x1, @perf_config_ext={0x7, 0x1}, 0x281, 0xffffffff, 0x4, 0x3, 0x401, 0xffffff47, 0x401, 0x0, 0x3, 0x0, 0x415}, 0x0, 0xffffffffffffffff, r0, 0x1) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000180)) pkey_mprotect(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x0, 0xffffffffffffffff) pkey_mprotect(&(0x7f0000ff4000/0x4000)=nil, 0x4000, 0x0, 0xffffffffffffffff) socket$inet_udp(0x2, 0x2, 0x0) getsockopt$inet_int(0xffffffffffffffff, 0x0, 0xe, 0x0, &(0x7f0000000280)) ioctl$sock_SIOCADDDLCI(0xffffffffffffffff, 0x8980, 0x0) 12:27:50 executing program 3: ioctl$RTC_UIE_ON(0xffffffffffffffff, 0x7003) r0 = perf_event_open(&(0x7f00000001c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x2}, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0xfffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) dup2(0xffffffffffffffff, r0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="02000000030000", 0x7, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000180)) pkey_mprotect(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x0, 0xffffffffffffffff) [ 1518.198927] EXT4-fs (loop1): unsupported inode size: 0 [ 1518.200314] EXT4-fs (loop1): blocksize: 2048 [ 1518.237987] EXT4-fs (loop6): ext4_check_descriptors: Inode table for group 0 overlaps superblock [ 1518.239985] EXT4-fs (loop6): group descriptors corrupted! 12:27:51 executing program 1: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b", 0x55, 0x400}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000180)) symlinkat(&(0x7f00000000c0)='./file0\x00', r0, &(0x7f0000000140)='./file0\x00') getsockopt$inet_int(0xffffffffffffffff, 0x0, 0xe, 0x0, &(0x7f0000000280)) ioctl$RTC_ALM_SET(0xffffffffffffffff, 0x40247007, 0x0) [ 1518.294441] EXT4-fs (loop2): VFS: Can't find ext4 filesystem [ 1518.340552] EXT4-fs (loop5): mounted filesystem without journal. Opts: ,errors=continue 12:27:51 executing program 3: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b", 0x55, 0x400}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000180)) symlinkat(&(0x7f00000000c0)='./file0\x00', r0, &(0x7f0000000140)='./file0\x00') getsockopt$inet_int(0xffffffffffffffff, 0x0, 0xe, 0x0, &(0x7f0000000280)) ioctl$RTC_ALM_SET(0xffffffffffffffff, 0x40247007, 0x0) [ 1518.362543] EXT4-fs (loop7): mounted filesystem without journal. Opts: ,errors=continue 12:27:51 executing program 0: r0 = creat(&(0x7f0000000040)='./file0\x00', 0x0) r1 = creat(&(0x7f0000000040)='./file0\x00', 0x0) fallocate(r1, 0x0, 0x0, 0x8800000) fallocate(r1, 0x3, 0x0, 0x8000) fallocate(r0, 0x2000000000000000, 0x0, 0x8800000) [ 1518.444770] EXT4-fs (loop1): unsupported inode size: 0 [ 1518.446033] EXT4-fs (loop1): blocksize: 2048 [ 1518.447580] EXT4-fs (loop4): mounted filesystem without journal. Opts: ,errors=continue 12:28:07 executing program 0: r0 = creat(&(0x7f0000000040)='./file0\x00', 0x0) r1 = creat(&(0x7f0000000040)='./file0\x00', 0x0) fallocate(r1, 0x0, 0x0, 0x8800000) fallocate(r1, 0x3, 0x0, 0x8000) fallocate(r0, 0x2103000000000000, 0x0, 0x8800000) 12:28:07 executing program 4: ioctl$RTC_UIE_ON(0xffffffffffffffff, 0x7003) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x2}, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0xfffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = dup2(0xffffffffffffffff, r0) perf_event_open(&(0x7f00000001c0)={0x2, 0x80, 0x8, 0x9, 0x4, 0x1, 0x0, 0x3b3d, 0x200a0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x2, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0xffff, 0x1, @perf_config_ext={0x7, 0x1}, 0x281, 0xffffffff, 0x4, 0x3, 0x401, 0xffffff47, 0x401, 0x0, 0x3, 0x0, 0x415}, 0x0, 0xffffffffffffffff, r0, 0x1) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000180)) pkey_mprotect(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x0, 0xffffffffffffffff) pkey_mprotect(&(0x7f0000ff4000/0x4000)=nil, 0x4000, 0x0, 0xffffffffffffffff) socket$inet_udp(0x2, 0x2, 0x0) getsockopt$inet_int(0xffffffffffffffff, 0x0, 0xe, 0x0, &(0x7f0000000280)) ioctl$sock_SIOCADDDLCI(0xffffffffffffffff, 0x8980, 0x0) ioctl$RTC_ALM_SET(r1, 0x40247007, 0x0) mmap$IORING_OFF_SQES(&(0x7f0000ff3000/0x2000)=nil, 0x2000, 0x2000002, 0x10, r1, 0x10000000) getsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, 0x0, 0x0) 12:28:07 executing program 6: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="02000000030000", 0x7, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000180)) pkey_mprotect(&(0x7f0000ff4000/0x4000)=nil, 0x4000, 0x0, 0xffffffffffffffff) 12:28:07 executing program 2: ioctl$RTC_UIE_ON(0xffffffffffffffff, 0x7003) r0 = perf_event_open(&(0x7f00000001c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x2}, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0xfffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = dup2(0xffffffffffffffff, r0) r2 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000440)=[{&(0x7f0000000040), 0x0, 0x400}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000180)) pkey_mprotect(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x0, 0xffffffffffffffff) pkey_mprotect(&(0x7f0000ff4000/0x4000)=nil, 0x4000, 0x0, 0xffffffffffffffff) symlinkat(&(0x7f00000000c0)='./file0\x00', r2, &(0x7f0000000140)='./file0\x00') socket$inet_udp(0x2, 0x2, 0x0) getsockopt$inet_int(0xffffffffffffffff, 0x0, 0xe, 0x0, &(0x7f0000000280)) ioctl$RTC_ALM_SET(r1, 0x40247007, 0x0) getsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, 0x0, 0x0) 12:28:07 executing program 5: ioctl$RTC_UIE_ON(0xffffffffffffffff, 0x7003) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x2}, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0xfffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) dup2(0xffffffffffffffff, r0) perf_event_open(&(0x7f00000001c0)={0x2, 0x80, 0x8, 0x9, 0x4, 0x0, 0x0, 0x3b3d, 0x200a0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x2, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0xffff, 0x1, @perf_config_ext={0x7, 0x1}, 0x281, 0xffffffff, 0x4, 0x3, 0x401, 0xffffff47, 0x401, 0x0, 0x3, 0x0, 0x415}, 0x0, 0xffffffffffffffff, r0, 0x1) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000180)) pkey_mprotect(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x0, 0xffffffffffffffff) 12:28:07 executing program 1: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b000000", 0x58, 0x400}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000180)) symlinkat(&(0x7f00000000c0)='./file0\x00', r0, &(0x7f0000000140)='./file0\x00') getsockopt$inet_int(0xffffffffffffffff, 0x0, 0xe, 0x0, &(0x7f0000000280)) ioctl$RTC_ALM_SET(0xffffffffffffffff, 0x40247007, 0x0) 12:28:07 executing program 7: ioctl$RTC_UIE_ON(0xffffffffffffffff, 0x7003) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x2}, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0xfffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) dup2(0xffffffffffffffff, r0) perf_event_open(&(0x7f00000001c0)={0x2, 0x80, 0x8, 0x0, 0x4, 0x1, 0x0, 0x3b3d, 0x200a0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x2, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0xffff, 0x1, @perf_config_ext={0x7, 0x1}, 0x281, 0xffffffff, 0x4, 0x3, 0x401, 0xffffff47, 0x401, 0x0, 0x3, 0x0, 0x415}, 0x0, 0xffffffffffffffff, r0, 0x1) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000180)) pkey_mprotect(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x0, 0xffffffffffffffff) pkey_mprotect(&(0x7f0000ff4000/0x4000)=nil, 0x4000, 0x0, 0xffffffffffffffff) socket$inet_udp(0x2, 0x2, 0x0) getsockopt$inet_int(0xffffffffffffffff, 0x0, 0xe, 0x0, &(0x7f0000000280)) 12:28:07 executing program 3: ioctl$RTC_UIE_ON(0xffffffffffffffff, 0x7003) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x2}, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0xfffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) dup2(0xffffffffffffffff, r0) perf_event_open(&(0x7f00000001c0)={0x2, 0x80, 0x8, 0x0, 0x4, 0x1, 0x0, 0x3b3d, 0x200a0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x2, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0xffff, 0x1, @perf_config_ext={0x7, 0x1}, 0x281, 0xffffffff, 0x4, 0x3, 0x401, 0xffffff47, 0x401, 0x0, 0x3, 0x0, 0x415}, 0x0, 0xffffffffffffffff, r0, 0x1) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000180)) pkey_mprotect(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x0, 0xffffffffffffffff) pkey_mprotect(&(0x7f0000ff4000/0x4000)=nil, 0x4000, 0x0, 0xffffffffffffffff) socket$inet_udp(0x2, 0x2, 0x0) getsockopt$inet_int(0xffffffffffffffff, 0x0, 0xe, 0x0, &(0x7f0000000280)) ioctl$sock_SIOCADDDLCI(0xffffffffffffffff, 0x8980, 0x0) [ 1534.381660] EXT4-fs (loop1): unsupported inode size: 0 [ 1534.382995] EXT4-fs (loop1): blocksize: 2048 [ 1534.449619] EXT4-fs (loop2): VFS: Can't find ext4 filesystem [ 1534.467658] EXT4-fs (loop4): mounted filesystem without journal. Opts: ,errors=continue 12:28:07 executing program 6: syz_mount_image$ext4(0x0, 0x0, 0x0, 0x4, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="02000000030000", 0x7, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000180)) pkey_mprotect(&(0x7f0000ff4000/0x4000)=nil, 0x4000, 0x0, 0xffffffffffffffff) 12:28:07 executing program 4: ioctl$RTC_UIE_ON(0xffffffffffffffff, 0x7003) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x2}, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0xfffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = dup2(0xffffffffffffffff, r0) perf_event_open(&(0x7f00000001c0)={0x2, 0x80, 0x8, 0x9, 0x4, 0x1, 0x0, 0x3b3d, 0x200a0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x2, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0xffff, 0x1, @perf_config_ext={0x7, 0x1}, 0x281, 0xffffffff, 0x4, 0x3, 0x401, 0xffffff47, 0x401, 0x0, 0x3, 0x0, 0x415}, 0x0, 0xffffffffffffffff, r0, 0x1) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000180)) pkey_mprotect(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x0, 0xffffffffffffffff) pkey_mprotect(&(0x7f0000ff4000/0x4000)=nil, 0x4000, 0x0, 0xffffffffffffffff) socket$inet_udp(0x2, 0x2, 0x0) getsockopt$inet_int(0xffffffffffffffff, 0x0, 0xe, 0x0, &(0x7f0000000280)) ioctl$sock_SIOCADDDLCI(0xffffffffffffffff, 0x8980, 0x0) ioctl$RTC_ALM_SET(r1, 0x40247007, 0x0) mmap$IORING_OFF_SQES(&(0x7f0000ff3000/0x2000)=nil, 0x2000, 0x2000002, 0x10, r1, 0x10000000) getsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, 0x0, 0x0) [ 1534.566736] EXT4-fs (loop5): mounted filesystem without journal. Opts: ,errors=continue 12:28:07 executing program 1: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b000000", 0x58, 0x400}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000180)) symlinkat(&(0x7f00000000c0)='./file0\x00', r0, &(0x7f0000000140)='./file0\x00') getsockopt$inet_int(0xffffffffffffffff, 0x0, 0xe, 0x0, &(0x7f0000000280)) ioctl$RTC_ALM_SET(0xffffffffffffffff, 0x40247007, 0x0) 12:28:07 executing program 3: ioctl$RTC_UIE_ON(0xffffffffffffffff, 0x7003) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x2}, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0xfffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) dup2(0xffffffffffffffff, r0) perf_event_open(&(0x7f00000001c0)={0x2, 0x80, 0x8, 0x0, 0x4, 0x1, 0x0, 0x3b3d, 0x200a0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x2, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0xffff, 0x1, @perf_config_ext={0x7, 0x1}, 0x281, 0xffffffff, 0x4, 0x3, 0x401, 0xffffff47, 0x401, 0x0, 0x3, 0x0, 0x415}, 0x0, 0xffffffffffffffff, r0, 0x1) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000180)) pkey_mprotect(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x0, 0xffffffffffffffff) pkey_mprotect(&(0x7f0000ff4000/0x4000)=nil, 0x4000, 0x0, 0xffffffffffffffff) socket$inet_udp(0x2, 0x2, 0x0) getsockopt$inet_int(0xffffffffffffffff, 0x0, 0xe, 0x0, &(0x7f0000000280)) ioctl$sock_SIOCADDDLCI(0xffffffffffffffff, 0x8980, 0x0) 12:28:07 executing program 0: r0 = creat(&(0x7f0000000040)='./file0\x00', 0x0) r1 = creat(&(0x7f0000000040)='./file0\x00', 0x0) fallocate(r1, 0x0, 0x0, 0x8800000) fallocate(r1, 0x3, 0x0, 0x8000) fallocate(r0, 0x6400000000000000, 0x0, 0x8800000) [ 1534.609814] EXT4-fs (loop7): mounted filesystem without journal. Opts: ,errors=continue 12:28:07 executing program 2: ioctl$RTC_UIE_ON(0xffffffffffffffff, 0x7003) r0 = perf_event_open(&(0x7f00000001c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x2}, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0xfffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = dup2(0xffffffffffffffff, r0) r2 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000440)=[{&(0x7f0000000040), 0x0, 0x400}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000180)) pkey_mprotect(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x0, 0xffffffffffffffff) pkey_mprotect(&(0x7f0000ff4000/0x4000)=nil, 0x4000, 0x0, 0xffffffffffffffff) symlinkat(&(0x7f00000000c0)='./file0\x00', r2, &(0x7f0000000140)='./file0\x00') socket$inet_udp(0x2, 0x2, 0x0) getsockopt$inet_int(0xffffffffffffffff, 0x0, 0xe, 0x0, &(0x7f0000000280)) ioctl$RTC_ALM_SET(r1, 0x40247007, 0x0) getsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, 0x0, 0x0) 12:28:07 executing program 5: ioctl$RTC_UIE_ON(0xffffffffffffffff, 0x7003) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x2}, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0xfffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) dup2(0xffffffffffffffff, r0) perf_event_open(&(0x7f00000001c0)={0x2, 0x80, 0x8, 0x9, 0x4, 0x0, 0x0, 0x3b3d, 0x200a0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x2, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0xffff, 0x1, @perf_config_ext={0x7, 0x1}, 0x281, 0xffffffff, 0x4, 0x3, 0x401, 0xffffff47, 0x401, 0x0, 0x3, 0x0, 0x415}, 0x0, 0xffffffffffffffff, r0, 0x1) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000180)) 12:28:07 executing program 6: syz_mount_image$ext4(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000180)) pkey_mprotect(&(0x7f0000ff4000/0x4000)=nil, 0x4000, 0x0, 0xffffffffffffffff) 12:28:07 executing program 7: ioctl$RTC_UIE_ON(0xffffffffffffffff, 0x7003) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x2}, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0xfffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) dup2(0xffffffffffffffff, r0) perf_event_open(&(0x7f00000001c0)={0x2, 0x80, 0x8, 0x0, 0x4, 0x1, 0x0, 0x3b3d, 0x200a0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x2, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0xffff, 0x1, @perf_config_ext={0x7, 0x1}, 0x281, 0xffffffff, 0x4, 0x3, 0x401, 0xffffff47, 0x401, 0x0, 0x3, 0x0, 0x415}, 0x0, 0xffffffffffffffff, r0, 0x1) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000180)) pkey_mprotect(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x0, 0xffffffffffffffff) pkey_mprotect(&(0x7f0000ff4000/0x4000)=nil, 0x4000, 0x0, 0xffffffffffffffff) socket$inet_udp(0x2, 0x2, 0x0) getsockopt$inet_int(0xffffffffffffffff, 0x0, 0xe, 0x0, &(0x7f0000000280)) [ 1534.812982] EXT4-fs (loop1): unsupported inode size: 0 [ 1534.814190] EXT4-fs (loop1): blocksize: 2048 12:28:07 executing program 3: ioctl$RTC_UIE_ON(0xffffffffffffffff, 0x7003) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x2}, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0xfffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) dup2(0xffffffffffffffff, r0) perf_event_open(&(0x7f00000001c0)={0x2, 0x80, 0x8, 0x0, 0x4, 0x1, 0x0, 0x3b3d, 0x200a0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x2, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0xffff, 0x1, @perf_config_ext={0x7, 0x1}, 0x281, 0xffffffff, 0x4, 0x3, 0x401, 0xffffff47, 0x401, 0x0, 0x3, 0x0, 0x415}, 0x0, 0xffffffffffffffff, r0, 0x1) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000180)) pkey_mprotect(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x0, 0xffffffffffffffff) pkey_mprotect(&(0x7f0000ff4000/0x4000)=nil, 0x4000, 0x0, 0xffffffffffffffff) socket$inet_udp(0x2, 0x2, 0x0) getsockopt$inet_int(0xffffffffffffffff, 0x0, 0xe, 0x0, &(0x7f0000000280)) ioctl$sock_SIOCADDDLCI(0xffffffffffffffff, 0x8980, 0x0) [ 1534.961360] EXT4-fs (loop4): mounted filesystem without journal. Opts: ,errors=continue [ 1535.025670] EXT4-fs (loop2): VFS: Can't find ext4 filesystem [ 1535.044602] EXT4-fs (loop5): mounted filesystem without journal. Opts: ,errors=continue [ 1535.093667] EXT4-fs (loop7): mounted filesystem without journal. Opts: ,errors=continue 12:28:26 executing program 1: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b000000", 0x58, 0x400}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000180)) symlinkat(&(0x7f00000000c0)='./file0\x00', r0, &(0x7f0000000140)='./file0\x00') getsockopt$inet_int(0xffffffffffffffff, 0x0, 0xe, 0x0, &(0x7f0000000280)) ioctl$RTC_ALM_SET(0xffffffffffffffff, 0x40247007, 0x0) 12:28:26 executing program 6: syz_mount_image$ext4(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000180)) pkey_mprotect(&(0x7f0000ff4000/0x4000)=nil, 0x4000, 0x0, 0xffffffffffffffff) 12:28:26 executing program 3: ioctl$RTC_UIE_ON(0xffffffffffffffff, 0x7003) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x2}, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0xfffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = dup2(0xffffffffffffffff, r0) perf_event_open(&(0x7f00000001c0)={0x2, 0x80, 0x8, 0x9, 0x4, 0x1, 0x0, 0x3b3d, 0x200a0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x2, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0xffff, 0x1, @perf_config_ext={0x7, 0x1}, 0x281, 0xffffffff, 0x4, 0x3, 0x401, 0xffffff47, 0x401, 0x0, 0x3, 0x0, 0x415}, 0x0, 0xffffffffffffffff, r0, 0x1) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000180)) pkey_mprotect(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x0, 0xffffffffffffffff) pkey_mprotect(&(0x7f0000ff4000/0x4000)=nil, 0x4000, 0x0, 0xffffffffffffffff) socket$inet_udp(0x2, 0x2, 0x0) getsockopt$inet_int(0xffffffffffffffff, 0x0, 0xe, 0x0, &(0x7f0000000280)) ioctl$sock_SIOCADDDLCI(0xffffffffffffffff, 0x8980, 0x0) ioctl$RTC_ALM_SET(r1, 0x40247007, 0x0) mmap$IORING_OFF_SQES(&(0x7f0000ff3000/0x2000)=nil, 0x2000, 0x2000002, 0x10, r1, 0x10000000) getsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, 0x0, 0x0) 12:28:26 executing program 7: ioctl$RTC_UIE_ON(0xffffffffffffffff, 0x7003) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x2}, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0xfffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) dup2(0xffffffffffffffff, r0) perf_event_open(&(0x7f00000001c0)={0x2, 0x80, 0x8, 0x0, 0x4, 0x1, 0x0, 0x3b3d, 0x200a0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x2, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0xffff, 0x1, @perf_config_ext={0x7, 0x1}, 0x281, 0xffffffff, 0x4, 0x3, 0x401, 0xffffff47, 0x401, 0x0, 0x3, 0x0, 0x415}, 0x0, 0xffffffffffffffff, r0, 0x1) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000180)) pkey_mprotect(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x0, 0xffffffffffffffff) pkey_mprotect(&(0x7f0000ff4000/0x4000)=nil, 0x4000, 0x0, 0xffffffffffffffff) socket$inet_udp(0x2, 0x2, 0x0) 12:28:26 executing program 4: ioctl$RTC_UIE_ON(0xffffffffffffffff, 0x7003) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x2}, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0xfffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = dup2(0xffffffffffffffff, r0) perf_event_open(&(0x7f00000001c0)={0x2, 0x80, 0x8, 0x9, 0x4, 0x1, 0x0, 0x3b3d, 0x200a0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x2, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0xffff, 0x1, @perf_config_ext={0x7, 0x1}, 0x281, 0xffffffff, 0x4, 0x3, 0x401, 0xffffff47, 0x401, 0x0, 0x3, 0x0, 0x415}, 0x0, 0xffffffffffffffff, r0, 0x1) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000180)) pkey_mprotect(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x0, 0xffffffffffffffff) pkey_mprotect(&(0x7f0000ff4000/0x4000)=nil, 0x4000, 0x0, 0xffffffffffffffff) socket$inet_udp(0x2, 0x2, 0x0) getsockopt$inet_int(0xffffffffffffffff, 0x0, 0xe, 0x0, &(0x7f0000000280)) ioctl$sock_SIOCADDDLCI(0xffffffffffffffff, 0x8980, 0x0) ioctl$RTC_ALM_SET(r1, 0x40247007, 0x0) mmap$IORING_OFF_SQES(&(0x7f0000ff3000/0x2000)=nil, 0x2000, 0x2000002, 0x10, r1, 0x10000000) getsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, 0x0, 0x0) 12:28:26 executing program 5: ioctl$RTC_UIE_ON(0xffffffffffffffff, 0x7003) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x2}, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0xfffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) dup2(0xffffffffffffffff, r0) perf_event_open(&(0x7f00000001c0)={0x2, 0x80, 0x8, 0x9, 0x4, 0x0, 0x0, 0x3b3d, 0x200a0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x2, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0xffff, 0x1, @perf_config_ext={0x7, 0x1}, 0x281, 0xffffffff, 0x4, 0x3, 0x401, 0xffffff47, 0x401, 0x0, 0x3, 0x0, 0x415}, 0x0, 0xffffffffffffffff, r0, 0x1) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000180)) 12:28:26 executing program 2: ioctl$RTC_UIE_ON(0xffffffffffffffff, 0x7003) r0 = perf_event_open(&(0x7f00000001c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x2}, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0xfffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = dup2(0xffffffffffffffff, r0) r2 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0", 0x2d, 0x400}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000180)) pkey_mprotect(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x0, 0xffffffffffffffff) pkey_mprotect(&(0x7f0000ff4000/0x4000)=nil, 0x4000, 0x0, 0xffffffffffffffff) symlinkat(&(0x7f00000000c0)='./file0\x00', r2, &(0x7f0000000140)='./file0\x00') socket$inet_udp(0x2, 0x2, 0x0) getsockopt$inet_int(0xffffffffffffffff, 0x0, 0xe, 0x0, &(0x7f0000000280)) ioctl$RTC_ALM_SET(r1, 0x40247007, 0x0) getsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, 0x0, 0x0) 12:28:26 executing program 0: r0 = creat(&(0x7f0000000040)='./file0\x00', 0x0) r1 = creat(&(0x7f0000000040)='./file0\x00', 0x0) fallocate(r1, 0x0, 0x0, 0x8800000) fallocate(r1, 0x3, 0x0, 0x8000) fallocate(r0, 0x8102000000000000, 0x0, 0x8800000) 12:28:26 executing program 6: syz_mount_image$ext4(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000180)) pkey_mprotect(&(0x7f0000ff4000/0x4000)=nil, 0x4000, 0x0, 0xffffffffffffffff) [ 1553.758167] EXT4-fs (loop1): unsupported inode size: 0 [ 1553.759667] EXT4-fs (loop1): blocksize: 2048 [ 1553.776279] EXT4-fs (loop2): VFS: Can't find ext4 filesystem 12:28:26 executing program 1: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b00000000", 0x59, 0x400}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000180)) symlinkat(&(0x7f00000000c0)='./file0\x00', r0, &(0x7f0000000140)='./file0\x00') getsockopt$inet_int(0xffffffffffffffff, 0x0, 0xe, 0x0, &(0x7f0000000280)) ioctl$RTC_ALM_SET(0xffffffffffffffff, 0x40247007, 0x0) [ 1553.824514] EXT4-fs (loop7): mounted filesystem without journal. Opts: ,errors=continue [ 1553.844854] EXT4-fs (loop5): mounted filesystem without journal. Opts: ,errors=continue [ 1553.864846] EXT4-fs (loop4): mounted filesystem without journal. Opts: ,errors=continue 12:28:26 executing program 3: ioctl$RTC_UIE_ON(0xffffffffffffffff, 0x7003) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x2}, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0xfffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = dup2(0xffffffffffffffff, r0) perf_event_open(&(0x7f00000001c0)={0x2, 0x80, 0x8, 0x9, 0x4, 0x1, 0x0, 0x3b3d, 0x200a0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x2, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0xffff, 0x1, @perf_config_ext={0x7, 0x1}, 0x281, 0xffffffff, 0x4, 0x3, 0x401, 0xffffff47, 0x401, 0x0, 0x3, 0x0, 0x415}, 0x0, 0xffffffffffffffff, r0, 0x1) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000180)) pkey_mprotect(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x0, 0xffffffffffffffff) pkey_mprotect(&(0x7f0000ff4000/0x4000)=nil, 0x4000, 0x0, 0xffffffffffffffff) socket$inet_udp(0x2, 0x2, 0x0) getsockopt$inet_int(0xffffffffffffffff, 0x0, 0xe, 0x0, &(0x7f0000000280)) ioctl$sock_SIOCADDDLCI(0xffffffffffffffff, 0x8980, 0x0) ioctl$RTC_ALM_SET(r1, 0x40247007, 0x0) mmap$IORING_OFF_SQES(&(0x7f0000ff3000/0x2000)=nil, 0x2000, 0x2000002, 0x10, r1, 0x10000000) getsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, 0x0, 0x0) 12:28:26 executing program 2: ioctl$RTC_UIE_ON(0xffffffffffffffff, 0x7003) r0 = perf_event_open(&(0x7f00000001c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x2}, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0xfffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = dup2(0xffffffffffffffff, r0) r2 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0", 0x2d, 0x400}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000180)) pkey_mprotect(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x0, 0xffffffffffffffff) pkey_mprotect(&(0x7f0000ff4000/0x4000)=nil, 0x4000, 0x0, 0xffffffffffffffff) symlinkat(&(0x7f00000000c0)='./file0\x00', r2, &(0x7f0000000140)='./file0\x00') socket$inet_udp(0x2, 0x2, 0x0) getsockopt$inet_int(0xffffffffffffffff, 0x0, 0xe, 0x0, &(0x7f0000000280)) ioctl$RTC_ALM_SET(r1, 0x40247007, 0x0) getsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, 0x0, 0x0) [ 1554.028771] EXT4-fs (loop1): unsupported inode size: 0 [ 1554.030213] EXT4-fs (loop1): blocksize: 2048 12:28:26 executing program 7: ioctl$RTC_UIE_ON(0xffffffffffffffff, 0x7003) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x2}, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0xfffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) dup2(0xffffffffffffffff, r0) perf_event_open(&(0x7f00000001c0)={0x2, 0x80, 0x8, 0x0, 0x4, 0x1, 0x0, 0x3b3d, 0x200a0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x2, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0xffff, 0x1, @perf_config_ext={0x7, 0x1}, 0x281, 0xffffffff, 0x4, 0x3, 0x401, 0xffffff47, 0x401, 0x0, 0x3, 0x0, 0x415}, 0x0, 0xffffffffffffffff, r0, 0x1) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000180)) pkey_mprotect(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x0, 0xffffffffffffffff) pkey_mprotect(&(0x7f0000ff4000/0x4000)=nil, 0x4000, 0x0, 0xffffffffffffffff) 12:28:26 executing program 4: ioctl$RTC_UIE_ON(0xffffffffffffffff, 0x7003) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x2}, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0xfffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = dup2(0xffffffffffffffff, r0) perf_event_open(&(0x7f00000001c0)={0x2, 0x80, 0x8, 0x9, 0x4, 0x1, 0x0, 0x3b3d, 0x200a0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x2, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0xffff, 0x1, @perf_config_ext={0x7, 0x1}, 0x281, 0xffffffff, 0x4, 0x3, 0x401, 0xffffff47, 0x401, 0x0, 0x3, 0x0, 0x415}, 0x0, 0xffffffffffffffff, r0, 0x1) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000180)) pkey_mprotect(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x0, 0xffffffffffffffff) pkey_mprotect(&(0x7f0000ff4000/0x4000)=nil, 0x4000, 0x0, 0xffffffffffffffff) socket$inet_udp(0x2, 0x2, 0x0) getsockopt$inet_int(0xffffffffffffffff, 0x0, 0xe, 0x0, &(0x7f0000000280)) ioctl$sock_SIOCADDDLCI(0xffffffffffffffff, 0x8980, 0x0) ioctl$RTC_ALM_SET(r1, 0x40247007, 0x0) mmap$IORING_OFF_SQES(&(0x7f0000ff3000/0x2000)=nil, 0x2000, 0x2000002, 0x10, r1, 0x10000000) getsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, 0x0, 0x0) [ 1554.189604] EXT4-fs (loop2): VFS: Can't find ext4 filesystem [ 1554.372790] EXT4-fs (loop7): mounted filesystem without journal. Opts: ,errors=continue [ 1554.398208] EXT4-fs (loop4): mounted filesystem without journal. Opts: ,errors=continue 12:28:42 executing program 4: ioctl$RTC_UIE_ON(0xffffffffffffffff, 0x7003) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x2}, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0xfffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = dup2(0xffffffffffffffff, r0) perf_event_open(&(0x7f00000001c0)={0x2, 0x80, 0x8, 0x9, 0x4, 0x1, 0x0, 0x3b3d, 0x200a0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x2, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0xffff, 0x1, @perf_config_ext={0x7, 0x1}, 0x281, 0xffffffff, 0x4, 0x3, 0x401, 0xffffff47, 0x401, 0x0, 0x3, 0x0, 0x415}, 0x0, 0xffffffffffffffff, r0, 0x1) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000180)) pkey_mprotect(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x0, 0xffffffffffffffff) pkey_mprotect(&(0x7f0000ff4000/0x4000)=nil, 0x4000, 0x0, 0xffffffffffffffff) socket$inet_udp(0x2, 0x2, 0x0) getsockopt$inet_int(0xffffffffffffffff, 0x0, 0xe, 0x0, &(0x7f0000000280)) ioctl$sock_SIOCADDDLCI(0xffffffffffffffff, 0x8980, 0x0) ioctl$RTC_ALM_SET(r1, 0x40247007, 0x0) mmap$IORING_OFF_SQES(&(0x7f0000ff3000/0x2000)=nil, 0x2000, 0x2000002, 0x10, r1, 0x10000000) getsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, 0x0, 0x0) 12:28:42 executing program 6: syz_mount_image$ext4(0x0, 0x0, 0x0, 0x3, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="02000000030000", 0x7, 0x800}], 0x0, &(0x7f0000000180)) pkey_mprotect(&(0x7f0000ff4000/0x4000)=nil, 0x4000, 0x0, 0xffffffffffffffff) 12:28:42 executing program 7: ioctl$RTC_UIE_ON(0xffffffffffffffff, 0x7003) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x2}, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0xfffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) dup2(0xffffffffffffffff, r0) perf_event_open(&(0x7f00000001c0)={0x2, 0x80, 0x8, 0x0, 0x4, 0x1, 0x0, 0x3b3d, 0x200a0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x2, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0xffff, 0x1, @perf_config_ext={0x7, 0x1}, 0x281, 0xffffffff, 0x4, 0x3, 0x401, 0xffffff47, 0x401, 0x0, 0x3, 0x0, 0x415}, 0x0, 0xffffffffffffffff, r0, 0x1) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000180)) pkey_mprotect(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x0, 0xffffffffffffffff) 12:28:42 executing program 1: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b00000000", 0x59, 0x400}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000180)) symlinkat(&(0x7f00000000c0)='./file0\x00', r0, &(0x7f0000000140)='./file0\x00') getsockopt$inet_int(0xffffffffffffffff, 0x0, 0xe, 0x0, &(0x7f0000000280)) ioctl$RTC_ALM_SET(0xffffffffffffffff, 0x40247007, 0x0) 12:28:42 executing program 5: ioctl$RTC_UIE_ON(0xffffffffffffffff, 0x7003) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x2}, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0xfffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) dup2(0xffffffffffffffff, r0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000180)) 12:28:42 executing program 0: r0 = creat(&(0x7f0000000040)='./file0\x00', 0x0) r1 = creat(&(0x7f0000000040)='./file0\x00', 0x0) fallocate(r1, 0x0, 0x0, 0x8800000) fallocate(r1, 0x3, 0x0, 0x8000) fallocate(r0, 0xf4ffffff00000000, 0x0, 0x8800000) 12:28:42 executing program 3: ioctl$RTC_UIE_ON(0xffffffffffffffff, 0x7003) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x2}, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0xfffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = dup2(0xffffffffffffffff, r0) perf_event_open(&(0x7f00000001c0)={0x2, 0x80, 0x8, 0x9, 0x4, 0x1, 0x0, 0x3b3d, 0x200a0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x2, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0xffff, 0x1, @perf_config_ext={0x7, 0x1}, 0x281, 0xffffffff, 0x4, 0x3, 0x401, 0xffffff47, 0x401, 0x0, 0x3, 0x0, 0x415}, 0x0, 0xffffffffffffffff, r0, 0x1) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000180)) pkey_mprotect(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x0, 0xffffffffffffffff) pkey_mprotect(&(0x7f0000ff4000/0x4000)=nil, 0x4000, 0x0, 0xffffffffffffffff) socket$inet_udp(0x2, 0x2, 0x0) getsockopt$inet_int(0xffffffffffffffff, 0x0, 0xe, 0x0, &(0x7f0000000280)) ioctl$sock_SIOCADDDLCI(0xffffffffffffffff, 0x8980, 0x0) ioctl$RTC_ALM_SET(r1, 0x40247007, 0x0) mmap$IORING_OFF_SQES(&(0x7f0000ff3000/0x2000)=nil, 0x2000, 0x2000002, 0x10, r1, 0x10000000) getsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, 0x0, 0x0) 12:28:42 executing program 2: ioctl$RTC_UIE_ON(0xffffffffffffffff, 0x7003) r0 = perf_event_open(&(0x7f00000001c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x2}, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0xfffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = dup2(0xffffffffffffffff, r0) r2 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0", 0x2d, 0x400}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000180)) pkey_mprotect(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x0, 0xffffffffffffffff) pkey_mprotect(&(0x7f0000ff4000/0x4000)=nil, 0x4000, 0x0, 0xffffffffffffffff) symlinkat(&(0x7f00000000c0)='./file0\x00', r2, &(0x7f0000000140)='./file0\x00') socket$inet_udp(0x2, 0x2, 0x0) getsockopt$inet_int(0xffffffffffffffff, 0x0, 0xe, 0x0, &(0x7f0000000280)) ioctl$RTC_ALM_SET(r1, 0x40247007, 0x0) getsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, 0x0, 0x0) [ 1570.279603] EXT4-fs (loop1): unsupported inode size: 0 [ 1570.280930] EXT4-fs (loop1): blocksize: 2048 12:28:43 executing program 6: syz_mount_image$ext4(0x0, 0x0, 0x0, 0x2, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0xffffffffdffffff8}], 0x0, &(0x7f0000000180)) pkey_mprotect(&(0x7f0000ff4000/0x4000)=nil, 0x4000, 0x0, 0xffffffffffffffff) [ 1570.315777] EXT4-fs (loop4): mounted filesystem without journal. Opts: ,errors=continue [ 1570.337430] EXT4-fs (loop7): mounted filesystem without journal. Opts: ,errors=continue [ 1570.339224] EXT4-fs (loop2): VFS: Can't find ext4 filesystem [ 1570.368487] EXT4-fs (loop5): mounted filesystem without journal. Opts: ,errors=continue 12:28:43 executing program 4: ioctl$RTC_UIE_ON(0xffffffffffffffff, 0x7003) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x2}, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0xfffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = dup2(0xffffffffffffffff, r0) perf_event_open(&(0x7f00000001c0)={0x2, 0x80, 0x8, 0x9, 0x4, 0x1, 0x0, 0x3b3d, 0x200a0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x2, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0xffff, 0x1, @perf_config_ext={0x7, 0x1}, 0x281, 0xffffffff, 0x4, 0x3, 0x401, 0xffffff47, 0x401, 0x0, 0x3, 0x0, 0x415}, 0x0, 0xffffffffffffffff, r0, 0x1) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000180)) pkey_mprotect(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x0, 0xffffffffffffffff) pkey_mprotect(&(0x7f0000ff4000/0x4000)=nil, 0x4000, 0x0, 0xffffffffffffffff) socket$inet_udp(0x2, 0x2, 0x0) getsockopt$inet_int(0xffffffffffffffff, 0x0, 0xe, 0x0, &(0x7f0000000280)) ioctl$sock_SIOCADDDLCI(0xffffffffffffffff, 0x8980, 0x0) ioctl$RTC_ALM_SET(r1, 0x40247007, 0x0) mmap$IORING_OFF_SQES(&(0x7f0000ff3000/0x2000)=nil, 0x2000, 0x2000002, 0x10, r1, 0x10000000) getsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, 0x0, 0x0) 12:28:43 executing program 1: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b00000000", 0x59, 0x400}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000180)) symlinkat(&(0x7f00000000c0)='./file0\x00', r0, &(0x7f0000000140)='./file0\x00') getsockopt$inet_int(0xffffffffffffffff, 0x0, 0xe, 0x0, &(0x7f0000000280)) ioctl$RTC_ALM_SET(0xffffffffffffffff, 0x40247007, 0x0) 12:28:43 executing program 3: ioctl$RTC_UIE_ON(0xffffffffffffffff, 0x7003) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x2}, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0xfffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = dup2(0xffffffffffffffff, r0) perf_event_open(&(0x7f00000001c0)={0x2, 0x80, 0x8, 0x9, 0x4, 0x1, 0x0, 0x3b3d, 0x200a0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x2, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0xffff, 0x1, @perf_config_ext={0x7, 0x1}, 0x281, 0xffffffff, 0x4, 0x3, 0x401, 0xffffff47, 0x401, 0x0, 0x3, 0x0, 0x415}, 0x0, 0xffffffffffffffff, r0, 0x1) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000180)) pkey_mprotect(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x0, 0xffffffffffffffff) pkey_mprotect(&(0x7f0000ff4000/0x4000)=nil, 0x4000, 0x0, 0xffffffffffffffff) socket$inet_udp(0x2, 0x2, 0x0) getsockopt$inet_int(0xffffffffffffffff, 0x0, 0xe, 0x0, &(0x7f0000000280)) ioctl$sock_SIOCADDDLCI(0xffffffffffffffff, 0x8980, 0x0) ioctl$RTC_ALM_SET(r1, 0x40247007, 0x0) mmap$IORING_OFF_SQES(&(0x7f0000ff3000/0x2000)=nil, 0x2000, 0x2000002, 0x10, r1, 0x10000000) getsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, 0x0, 0x0) 12:28:43 executing program 7: ioctl$RTC_UIE_ON(0xffffffffffffffff, 0x7003) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x2}, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0xfffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) dup2(0xffffffffffffffff, r0) perf_event_open(&(0x7f00000001c0)={0x2, 0x80, 0x8, 0x0, 0x4, 0x1, 0x0, 0x3b3d, 0x200a0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x2, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0xffff, 0x1, @perf_config_ext={0x7, 0x1}, 0x281, 0xffffffff, 0x4, 0x3, 0x401, 0xffffff47, 0x401, 0x0, 0x3, 0x0, 0x415}, 0x0, 0xffffffffffffffff, r0, 0x1) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000180)) 12:28:43 executing program 2: ioctl$RTC_UIE_ON(0xffffffffffffffff, 0x7003) r0 = perf_event_open(&(0x7f00000001c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x2}, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0xfffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = dup2(0xffffffffffffffff, r0) r2 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f", 0x44, 0x400}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000180)) pkey_mprotect(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x0, 0xffffffffffffffff) pkey_mprotect(&(0x7f0000ff4000/0x4000)=nil, 0x4000, 0x0, 0xffffffffffffffff) symlinkat(&(0x7f00000000c0)='./file0\x00', r2, &(0x7f0000000140)='./file0\x00') socket$inet_udp(0x2, 0x2, 0x0) getsockopt$inet_int(0xffffffffffffffff, 0x0, 0xe, 0x0, &(0x7f0000000280)) ioctl$RTC_ALM_SET(r1, 0x40247007, 0x0) getsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, 0x0, 0x0) 12:28:43 executing program 5: ioctl$RTC_UIE_ON(0xffffffffffffffff, 0x7003) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x2}, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0xfffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000180)) 12:28:43 executing program 0: r0 = creat(&(0x7f0000000040)='./file0\x00', 0x0) r1 = creat(&(0x7f0000000040)='./file0\x00', 0x0) fallocate(r1, 0x0, 0x0, 0x8800000) fallocate(r1, 0x3, 0x0, 0x8000) fallocate(r0, 0xfbffffff00000000, 0x0, 0x8800000) 12:28:43 executing program 6: syz_mount_image$ext4(0x0, 0x0, 0x0, 0x2, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0xffffffffdffffff8}], 0x0, &(0x7f0000000180)) pkey_mprotect(&(0x7f0000ff4000/0x4000)=nil, 0x4000, 0x0, 0xffffffffffffffff) [ 1570.584187] EXT4-fs (loop1): unsupported inode size: 0 [ 1570.585363] EXT4-fs (loop1): blocksize: 2048 [ 1570.717570] EXT4-fs (loop4): mounted filesystem without journal. Opts: ,errors=continue [ 1570.746399] EXT4-fs (loop7): mounted filesystem without journal. Opts: ,errors=continue [ 1570.879305] EXT4-fs error (device loop2): ext4_fill_super:4959: inode #2: comm syz-executor.2: iget: root inode unallocated [ 1570.883400] EXT4-fs (loop2): get root inode failed [ 1570.884638] EXT4-fs (loop2): mount failed [ 1570.909843] EXT4-fs (loop5): mounted filesystem without journal. Opts: ,errors=continue 12:29:02 executing program 7: ioctl$RTC_UIE_ON(0xffffffffffffffff, 0x7003) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x2}, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0xfffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) dup2(0xffffffffffffffff, r0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000180)) 12:29:02 executing program 1: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000180)) symlinkat(&(0x7f00000000c0)='./file0\x00', r0, &(0x7f0000000140)='./file0\x00') getsockopt$inet_int(0xffffffffffffffff, 0x0, 0xe, 0x0, &(0x7f0000000280)) ioctl$RTC_ALM_SET(0xffffffffffffffff, 0x40247007, 0x0) 12:29:02 executing program 2: ioctl$RTC_UIE_ON(0xffffffffffffffff, 0x7003) r0 = perf_event_open(&(0x7f00000001c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x2}, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0xfffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = dup2(0xffffffffffffffff, r0) r2 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f", 0x44, 0x400}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000180)) pkey_mprotect(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x0, 0xffffffffffffffff) pkey_mprotect(&(0x7f0000ff4000/0x4000)=nil, 0x4000, 0x0, 0xffffffffffffffff) symlinkat(&(0x7f00000000c0)='./file0\x00', r2, &(0x7f0000000140)='./file0\x00') socket$inet_udp(0x2, 0x2, 0x0) getsockopt$inet_int(0xffffffffffffffff, 0x0, 0xe, 0x0, &(0x7f0000000280)) ioctl$RTC_ALM_SET(r1, 0x40247007, 0x0) getsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, 0x0, 0x0) 12:29:02 executing program 5: ioctl$RTC_UIE_ON(0xffffffffffffffff, 0x7003) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000180)) 12:29:02 executing program 6: syz_mount_image$ext4(0x0, 0x0, 0x0, 0x2, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0xffffffffdffffff8}], 0x0, &(0x7f0000000180)) pkey_mprotect(&(0x7f0000ff4000/0x4000)=nil, 0x4000, 0x0, 0xffffffffffffffff) 12:29:02 executing program 4: ioctl$RTC_UIE_ON(0xffffffffffffffff, 0x7003) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x2}, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0xfffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = dup2(0xffffffffffffffff, r0) perf_event_open(&(0x7f00000001c0)={0x2, 0x80, 0x8, 0x9, 0x4, 0x1, 0x0, 0x3b3d, 0x200a0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x2, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0xffff, 0x1, @perf_config_ext={0x7, 0x1}, 0x281, 0xffffffff, 0x4, 0x3, 0x401, 0xffffff47, 0x401, 0x0, 0x3, 0x0, 0x415}, 0x0, 0xffffffffffffffff, r0, 0x1) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000180)) pkey_mprotect(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x0, 0xffffffffffffffff) pkey_mprotect(&(0x7f0000ff4000/0x4000)=nil, 0x4000, 0x0, 0xffffffffffffffff) socket$inet_udp(0x2, 0x2, 0x0) getsockopt$inet_int(0xffffffffffffffff, 0x0, 0xe, 0x0, &(0x7f0000000280)) ioctl$sock_SIOCADDDLCI(0xffffffffffffffff, 0x8980, 0x0) ioctl$RTC_ALM_SET(r1, 0x40247007, 0x0) mmap$IORING_OFF_SQES(&(0x7f0000ff3000/0x2000)=nil, 0x2000, 0x2000002, 0x10, r1, 0x10000000) getsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, 0x0, 0x0) 12:29:02 executing program 0: r0 = creat(&(0x7f0000000040)='./file0\x00', 0x0) r1 = creat(&(0x7f0000000040)='./file0\x00', 0x0) fallocate(r1, 0x0, 0x0, 0x8800000) fallocate(r1, 0x3, 0x0, 0x8000) fallocate(r0, 0xfeffffff00000000, 0x0, 0x8800000) 12:29:02 executing program 3: ioctl$RTC_UIE_ON(0xffffffffffffffff, 0x7003) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x2}, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0xfffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = dup2(0xffffffffffffffff, r0) perf_event_open(&(0x7f00000001c0)={0x2, 0x80, 0x8, 0x9, 0x4, 0x1, 0x0, 0x3b3d, 0x200a0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x2, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0xffff, 0x1, @perf_config_ext={0x7, 0x1}, 0x281, 0xffffffff, 0x4, 0x3, 0x401, 0xffffff47, 0x401, 0x0, 0x3, 0x0, 0x415}, 0x0, 0xffffffffffffffff, r0, 0x1) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000180)) pkey_mprotect(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x0, 0xffffffffffffffff) pkey_mprotect(&(0x7f0000ff4000/0x4000)=nil, 0x4000, 0x0, 0xffffffffffffffff) socket$inet_udp(0x2, 0x2, 0x0) getsockopt$inet_int(0xffffffffffffffff, 0x0, 0xe, 0x0, &(0x7f0000000280)) ioctl$sock_SIOCADDDLCI(0xffffffffffffffff, 0x8980, 0x0) ioctl$RTC_ALM_SET(r1, 0x40247007, 0x0) mmap$IORING_OFF_SQES(&(0x7f0000ff3000/0x2000)=nil, 0x2000, 0x2000002, 0x10, r1, 0x10000000) getsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, 0x0, 0x0) [ 1589.375749] EXT4-fs (loop1): VFS: Can't find ext4 filesystem 12:29:02 executing program 6: syz_mount_image$ext4(0x0, 0x0, 0x0, 0x1, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}], 0x0, &(0x7f0000000180)) pkey_mprotect(&(0x7f0000ff4000/0x4000)=nil, 0x4000, 0x0, 0xffffffffffffffff) [ 1589.486127] EXT4-fs (loop5): mounted filesystem without journal. Opts: ,errors=continue [ 1589.487822] EXT4-fs (loop4): mounted filesystem without journal. Opts: ,errors=continue [ 1589.518663] EXT4-fs (loop7): mounted filesystem without journal. Opts: ,errors=continue 12:29:02 executing program 4: ioctl$RTC_UIE_ON(0xffffffffffffffff, 0x7003) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x2}, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0xfffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = dup2(0xffffffffffffffff, r0) perf_event_open(&(0x7f00000001c0)={0x2, 0x80, 0x8, 0x9, 0x4, 0x1, 0x0, 0x3b3d, 0x200a0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x2, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0xffff, 0x1, @perf_config_ext={0x7, 0x1}, 0x281, 0xffffffff, 0x4, 0x3, 0x401, 0xffffff47, 0x401, 0x0, 0x3, 0x0, 0x415}, 0x0, 0xffffffffffffffff, r0, 0x1) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000180)) pkey_mprotect(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x0, 0xffffffffffffffff) pkey_mprotect(&(0x7f0000ff4000/0x4000)=nil, 0x4000, 0x0, 0xffffffffffffffff) socket$inet_udp(0x2, 0x2, 0x0) getsockopt$inet_int(0xffffffffffffffff, 0x0, 0xe, 0x0, &(0x7f0000000280)) ioctl$sock_SIOCADDDLCI(0xffffffffffffffff, 0x8980, 0x0) ioctl$RTC_ALM_SET(r1, 0x40247007, 0x0) mmap$IORING_OFF_SQES(&(0x7f0000ff3000/0x2000)=nil, 0x2000, 0x2000002, 0x10, r1, 0x10000000) getsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, 0x0, 0x0) 12:29:02 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000180)) 12:29:02 executing program 3: ioctl$RTC_UIE_ON(0xffffffffffffffff, 0x7003) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x2}, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0xfffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = dup2(0xffffffffffffffff, r0) perf_event_open(&(0x7f00000001c0)={0x2, 0x80, 0x8, 0x9, 0x4, 0x1, 0x0, 0x3b3d, 0x200a0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x2, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0xffff, 0x1, @perf_config_ext={0x7, 0x1}, 0x281, 0xffffffff, 0x4, 0x3, 0x401, 0xffffff47, 0x401, 0x0, 0x3, 0x0, 0x415}, 0x0, 0xffffffffffffffff, r0, 0x1) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000180)) pkey_mprotect(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x0, 0xffffffffffffffff) pkey_mprotect(&(0x7f0000ff4000/0x4000)=nil, 0x4000, 0x0, 0xffffffffffffffff) socket$inet_udp(0x2, 0x2, 0x0) getsockopt$inet_int(0xffffffffffffffff, 0x0, 0xe, 0x0, &(0x7f0000000280)) ioctl$sock_SIOCADDDLCI(0xffffffffffffffff, 0x8980, 0x0) ioctl$RTC_ALM_SET(r1, 0x40247007, 0x0) mmap$IORING_OFF_SQES(&(0x7f0000ff3000/0x2000)=nil, 0x2000, 0x2000002, 0x10, r1, 0x10000000) getsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, 0x0, 0x0) 12:29:02 executing program 0: r0 = creat(&(0x7f0000000040)='./file0\x00', 0x0) r1 = creat(&(0x7f0000000040)='./file0\x00', 0x0) fallocate(r1, 0x0, 0x0, 0x8800000) fallocate(r1, 0x3, 0x0, 0x8000) fallocate(r0, 0xff01000000000000, 0x0, 0x8800000) 12:29:02 executing program 7: ioctl$RTC_UIE_ON(0xffffffffffffffff, 0x7003) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x2}, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0xfffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000180)) [ 1589.605581] EXT4-fs error (device loop2): ext4_fill_super:4959: inode #2: comm syz-executor.2: iget: root inode unallocated 12:29:02 executing program 1: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000180)) symlinkat(&(0x7f00000000c0)='./file0\x00', r0, &(0x7f0000000140)='./file0\x00') getsockopt$inet_int(0xffffffffffffffff, 0x0, 0xe, 0x0, &(0x7f0000000280)) ioctl$RTC_ALM_SET(0xffffffffffffffff, 0x40247007, 0x0) [ 1589.610899] EXT4-fs (loop2): get root inode failed [ 1589.612459] EXT4-fs (loop2): mount failed 12:29:02 executing program 2: ioctl$RTC_UIE_ON(0xffffffffffffffff, 0x7003) r0 = perf_event_open(&(0x7f00000001c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x2}, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0xfffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = dup2(0xffffffffffffffff, r0) r2 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f", 0x44, 0x400}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000180)) pkey_mprotect(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x0, 0xffffffffffffffff) pkey_mprotect(&(0x7f0000ff4000/0x4000)=nil, 0x4000, 0x0, 0xffffffffffffffff) symlinkat(&(0x7f00000000c0)='./file0\x00', r2, &(0x7f0000000140)='./file0\x00') socket$inet_udp(0x2, 0x2, 0x0) getsockopt$inet_int(0xffffffffffffffff, 0x0, 0xe, 0x0, &(0x7f0000000280)) ioctl$RTC_ALM_SET(r1, 0x40247007, 0x0) getsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, 0x0, 0x0) 12:29:02 executing program 6: syz_mount_image$ext4(0x0, 0x0, 0x0, 0x0, &(0x7f0000000440), 0x0, &(0x7f0000000180)) pkey_mprotect(&(0x7f0000ff4000/0x4000)=nil, 0x4000, 0x0, 0xffffffffffffffff) [ 1589.942652] EXT4-fs (loop1): VFS: Can't find ext4 filesystem 12:29:02 executing program 3: ioctl$RTC_UIE_ON(0xffffffffffffffff, 0x7003) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x2}, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0xfffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000180)) [ 1589.949240] EXT4-fs (loop5): mounted filesystem without journal. Opts: ,errors=continue [ 1589.982125] EXT4-fs (loop7): mounted filesystem without journal. Opts: ,errors=continue 12:29:02 executing program 7: ioctl$RTC_UIE_ON(0xffffffffffffffff, 0x7003) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000180)) 12:29:02 executing program 6: syz_mount_image$ext4(0x0, 0x0, 0x0, 0x0, &(0x7f0000000440), 0x0, 0x0) pkey_mprotect(&(0x7f0000ff4000/0x4000)=nil, 0x4000, 0x0, 0xffffffffffffffff) [ 1590.081755] EXT4-fs error (device loop2): ext4_fill_super:4959: inode #2: comm syz-executor.2: iget: root inode unallocated [ 1590.111062] EXT4-fs (loop2): get root inode failed [ 1590.112818] EXT4-fs (loop2): mount failed [ 1590.120156] EXT4-fs (loop4): mounted filesystem without journal. Opts: ,errors=continue 12:29:02 executing program 5: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000180)) 12:29:02 executing program 0: r0 = creat(&(0x7f0000000040)='./file0\x00', 0x0) r1 = creat(&(0x7f0000000040)='./file0\x00', 0x0) fallocate(r1, 0x0, 0x0, 0x8800000) fallocate(r1, 0x3, 0x0, 0x8000) fallocate(r0, 0xff07000000000000, 0x0, 0x8800000) 12:29:02 executing program 1: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000180)) symlinkat(&(0x7f00000000c0)='./file0\x00', r0, &(0x7f0000000140)='./file0\x00') getsockopt$inet_int(0xffffffffffffffff, 0x0, 0xe, 0x0, &(0x7f0000000280)) ioctl$RTC_ALM_SET(0xffffffffffffffff, 0x40247007, 0x0) [ 1590.332690] EXT4-fs (loop7): mounted filesystem without journal. Opts: ,errors=continue [ 1590.367631] EXT4-fs (loop1): VFS: Can't find ext4 filesystem 12:29:17 executing program 2: ioctl$RTC_UIE_ON(0xffffffffffffffff, 0x7003) r0 = perf_event_open(&(0x7f00000001c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x2}, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0xfffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = dup2(0xffffffffffffffff, r0) r2 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f0000000000000000010000", 0x4f, 0x400}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000180)) pkey_mprotect(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x0, 0xffffffffffffffff) pkey_mprotect(&(0x7f0000ff4000/0x4000)=nil, 0x4000, 0x0, 0xffffffffffffffff) symlinkat(&(0x7f00000000c0)='./file0\x00', r2, &(0x7f0000000140)='./file0\x00') socket$inet_udp(0x2, 0x2, 0x0) getsockopt$inet_int(0xffffffffffffffff, 0x0, 0xe, 0x0, &(0x7f0000000280)) ioctl$RTC_ALM_SET(r1, 0x40247007, 0x0) getsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, 0x0, 0x0) 12:29:17 executing program 4: ioctl$RTC_UIE_ON(0xffffffffffffffff, 0x7003) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x2}, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0xfffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = dup2(0xffffffffffffffff, r0) perf_event_open(&(0x7f00000001c0)={0x2, 0x80, 0x8, 0x9, 0x4, 0x1, 0x0, 0x3b3d, 0x200a0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x2, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0xffff, 0x1, @perf_config_ext={0x7, 0x1}, 0x281, 0xffffffff, 0x4, 0x3, 0x401, 0xffffff47, 0x401, 0x0, 0x3, 0x0, 0x415}, 0x0, 0xffffffffffffffff, r0, 0x1) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000180)) pkey_mprotect(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x0, 0xffffffffffffffff) pkey_mprotect(&(0x7f0000ff4000/0x4000)=nil, 0x4000, 0x0, 0xffffffffffffffff) socket$inet_udp(0x2, 0x2, 0x0) getsockopt$inet_int(0xffffffffffffffff, 0x0, 0xe, 0x0, &(0x7f0000000280)) ioctl$sock_SIOCADDDLCI(0xffffffffffffffff, 0x8980, 0x0) ioctl$RTC_ALM_SET(r1, 0x40247007, 0x0) mmap$IORING_OFF_SQES(&(0x7f0000ff3000/0x2000)=nil, 0x2000, 0x2000002, 0x10, r1, 0x10000000) getsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, 0x0, 0x0) 12:29:17 executing program 0: r0 = creat(&(0x7f0000000040)='./file0\x00', 0x0) r1 = creat(&(0x7f0000000040)='./file0\x00', 0x0) fallocate(r1, 0x0, 0x0, 0x8800000) fallocate(r1, 0x3, 0x0, 0x8000) fallocate(r0, 0xffffffff00000000, 0x0, 0x8800000) 12:29:17 executing program 1: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, 0x0) symlinkat(&(0x7f00000000c0)='./file0\x00', r0, &(0x7f0000000140)='./file0\x00') getsockopt$inet_int(0xffffffffffffffff, 0x0, 0xe, 0x0, &(0x7f0000000280)) ioctl$RTC_ALM_SET(0xffffffffffffffff, 0x40247007, 0x0) 12:29:17 executing program 6: syz_mount_image$ext4(0x0, 0x0, 0x0, 0x0, &(0x7f0000000440), 0x0, 0x0) pkey_mprotect(&(0x7f0000ff4000/0x4000)=nil, 0x4000, 0x0, 0xffffffffffffffff) 12:29:17 executing program 7: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000180)) 12:29:17 executing program 5: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000180)) 12:29:17 executing program 3: ioctl$RTC_UIE_ON(0xffffffffffffffff, 0x7003) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x2}, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0xfffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000180)) [ 1604.498833] EXT4-fs (loop2): invalid first ino: 0 12:29:17 executing program 1: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, 0x0) symlinkat(&(0x7f00000000c0)='./file0\x00', r0, &(0x7f0000000140)='./file0\x00') getsockopt$inet_int(0xffffffffffffffff, 0x0, 0xe, 0x0, &(0x7f0000000280)) ioctl$RTC_ALM_SET(0xffffffffffffffff, 0x40247007, 0x0) [ 1604.579778] EXT4-fs (loop7): mounted filesystem without journal. Opts: ,errors=continue 12:29:17 executing program 5: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000180)) 12:29:17 executing program 3: ioctl$RTC_UIE_ON(0xffffffffffffffff, 0x7003) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x2}, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0xfffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000180)) [ 1604.657741] EXT4-fs (loop4): mounted filesystem without journal. Opts: ,errors=continue 12:29:35 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x2, &(0x7f0000000080)=0x90, 0x4) bind$inet6(0xffffffffffffffff, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) connect$inet6(0xffffffffffffffff, &(0x7f0000000000)={0xa, 0x4e20, 0x7ddd, @empty, 0x20000}, 0x1c) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x8, &(0x7f0000002ec0), 0x4) sendmsg$inet6(0xffffffffffffffff, &(0x7f00000006c0)={0x0, 0x0, &(0x7f0000000540)=[{&(0x7f00000001c0)="cf", 0xfffffdef}], 0x1}, 0x10044001) recvfrom$inet6(0xffffffffffffffff, &(0x7f0000001e00)=""/4096, 0x1000, 0xcd08, 0x0, 0x0) connect$inet6(0xffffffffffffffff, &(0x7f0000000240)={0xa, 0x4e20, 0x10001, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02', 0x1}, 0x1c) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unlink(&(0x7f0000000080)='./file0\x00') write$binfmt_elf64(r0, &(0x7f0000000100)=ANY=[@ANYBLOB="7f454c460000000000000000000000000000000000000000000000000000000040000000000000ebe58b5f47f713d5f153310b0eb0397100000000000000000010d787edc231bfd33dc9a526b7c0b17291408859423a3b46a620f56ea1f5df4c3f38796f25aab3f90cb28b2dfbb7cd9869bdff20875324"], 0x40) close(r0) ioctl$AUTOFS_DEV_IOCTL_READY(r0, 0xc0189376, &(0x7f0000000180)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32=r0, @ANYBLOB="ff0b0009dbfeef7f3200000a002e2f66a1dc49ca3f32593c5db2bcc55ce890d53f9b14ec8ba9af12260137294334cd2fe0dab4309afee7de5cdd9890f85742920bd6b4b76d3424b2b056770d83cc9f8e8177fda7fad202a73029b2f8db229079f91b29fffa01075b7f4d4e1dcf8e5f39f78ede67d7abc248879650c6d1e61bf70e47274c57a79dcb121bd59deaf54da495b90000000000"]) ioctl$F2FS_IOC_FLUSH_DEVICE(r1, 0x4008f50a, &(0x7f00000000c0)={0x8, 0x8}) r2 = syz_init_net_socket$802154_raw(0x24, 0x3, 0x0) sendmmsg$inet6(r2, &(0x7f0000004d00)=[{{0x0, 0x0, &(0x7f00000004c0)=[{&(0x7f0000000080)='K', 0x4c}], 0x1}}], 0x7ffff000, 0x0) 12:29:35 executing program 0: r0 = creat(&(0x7f0000000040)='./file0\x00', 0x0) r1 = creat(&(0x7f0000000040)='./file0\x00', 0x0) fallocate(r1, 0x0, 0x0, 0x8800000) fallocate(r1, 0x3, 0x0, 0x8000) fallocate(r0, 0x0, 0x2, 0x8800000) 12:29:35 executing program 1: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, 0x0) symlinkat(&(0x7f00000000c0)='./file0\x00', r0, &(0x7f0000000140)='./file0\x00') getsockopt$inet_int(0xffffffffffffffff, 0x0, 0xe, 0x0, &(0x7f0000000280)) ioctl$RTC_ALM_SET(0xffffffffffffffff, 0x40247007, 0x0) 12:29:35 executing program 4: ioctl$RTC_UIE_ON(0xffffffffffffffff, 0x7003) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x2}, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0xfffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = dup2(0xffffffffffffffff, r0) perf_event_open(&(0x7f00000001c0)={0x2, 0x80, 0x8, 0x9, 0x4, 0x1, 0x0, 0x3b3d, 0x200a0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x2, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0xffff, 0x1, @perf_config_ext={0x7, 0x1}, 0x281, 0xffffffff, 0x4, 0x3, 0x401, 0xffffff47, 0x401, 0x0, 0x3, 0x0, 0x415}, 0x0, 0xffffffffffffffff, r0, 0x1) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000180)) pkey_mprotect(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x0, 0xffffffffffffffff) pkey_mprotect(&(0x7f0000ff4000/0x4000)=nil, 0x4000, 0x0, 0xffffffffffffffff) socket$inet_udp(0x2, 0x2, 0x0) getsockopt$inet_int(0xffffffffffffffff, 0x0, 0xe, 0x0, &(0x7f0000000280)) ioctl$sock_SIOCADDDLCI(0xffffffffffffffff, 0x8980, 0x0) ioctl$RTC_ALM_SET(r1, 0x40247007, 0x0) mmap$IORING_OFF_SQES(&(0x7f0000ff3000/0x2000)=nil, 0x2000, 0x2000002, 0x10, r1, 0x10000000) getsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, 0x0, 0x0) 12:29:35 executing program 7: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000180)) 12:29:35 executing program 2: ioctl$RTC_UIE_ON(0xffffffffffffffff, 0x7003) r0 = perf_event_open(&(0x7f00000001c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x2}, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0xfffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = dup2(0xffffffffffffffff, r0) r2 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f0000000000000000010000", 0x4f, 0x400}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000180)) pkey_mprotect(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x0, 0xffffffffffffffff) pkey_mprotect(&(0x7f0000ff4000/0x4000)=nil, 0x4000, 0x0, 0xffffffffffffffff) symlinkat(&(0x7f00000000c0)='./file0\x00', r2, &(0x7f0000000140)='./file0\x00') socket$inet_udp(0x2, 0x2, 0x0) getsockopt$inet_int(0xffffffffffffffff, 0x0, 0xe, 0x0, &(0x7f0000000280)) ioctl$RTC_ALM_SET(r1, 0x40247007, 0x0) getsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, 0x0, 0x0) 12:29:35 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', 0x0, 0x0, 0x4, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000180)) 12:29:35 executing program 6: ioctl$RTC_UIE_ON(0xffffffffffffffff, 0x7003) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x2}, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0xfffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) dup2(0xffffffffffffffff, r0) perf_event_open(&(0x7f00000001c0)={0x2, 0x80, 0x8, 0x9, 0x4, 0x0, 0x0, 0x3b3d, 0x200a0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x2, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0xffff, 0x1, @perf_config_ext={0x7, 0x1}, 0x281, 0xffffffff, 0x4, 0x3, 0x401, 0xffffff47, 0x401, 0x0, 0x3, 0x0, 0x415}, 0x0, 0xffffffffffffffff, r0, 0x1) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000180)) pkey_mprotect(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x0, 0xffffffffffffffff) 12:29:35 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', 0x0, 0x0, 0x4, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000180)) [ 1622.473336] ieee802154 phy0 wpan0: encryption failed: -22 12:29:35 executing program 1: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000180)) symlinkat(0x0, r0, &(0x7f0000000140)='./file0\x00') getsockopt$inet_int(0xffffffffffffffff, 0x0, 0xe, 0x0, &(0x7f0000000280)) ioctl$RTC_ALM_SET(0xffffffffffffffff, 0x40247007, 0x0) [ 1622.548352] EXT4-fs (loop2): invalid first ino: 0 [ 1622.567674] EXT4-fs (loop6): mounted filesystem without journal. Opts: ,errors=continue 12:29:35 executing program 0: r0 = creat(&(0x7f0000000040)='./file0\x00', 0x0) r1 = creat(&(0x7f0000000040)='./file0\x00', 0x0) fallocate(r1, 0x0, 0x0, 0x8800000) fallocate(r1, 0x3, 0x0, 0x8000) fallocate(r0, 0x0, 0x3, 0x8800000) 12:29:35 executing program 7: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000180)) [ 1622.700605] EXT4-fs (loop4): mounted filesystem without journal. Opts: ,errors=continue 12:29:52 executing program 0: r0 = creat(&(0x7f0000000040)='./file0\x00', 0x0) r1 = creat(&(0x7f0000000040)='./file0\x00', 0x0) fallocate(r1, 0x0, 0x0, 0x8800000) fallocate(r1, 0x3, 0x0, 0x8000) fallocate(r0, 0x0, 0x4, 0x8800000) 12:29:52 executing program 4: ioctl$RTC_UIE_ON(0xffffffffffffffff, 0x7003) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x2}, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0xfffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = dup2(0xffffffffffffffff, r0) perf_event_open(&(0x7f00000001c0)={0x2, 0x80, 0x8, 0x9, 0x4, 0x1, 0x0, 0x3b3d, 0x200a0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x2, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0xffff, 0x1, @perf_config_ext={0x7, 0x1}, 0x281, 0xffffffff, 0x4, 0x3, 0x401, 0xffffff47, 0x401, 0x0, 0x3, 0x0, 0x415}, 0x0, 0xffffffffffffffff, r0, 0x1) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000180)) pkey_mprotect(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x0, 0xffffffffffffffff) pkey_mprotect(&(0x7f0000ff4000/0x4000)=nil, 0x4000, 0x0, 0xffffffffffffffff) socket$inet_udp(0x2, 0x2, 0x0) getsockopt$inet_int(0xffffffffffffffff, 0x0, 0xe, 0x0, &(0x7f0000000280)) ioctl$sock_SIOCADDDLCI(0xffffffffffffffff, 0x8980, 0x0) ioctl$RTC_ALM_SET(r1, 0x40247007, 0x0) mmap$IORING_OFF_SQES(&(0x7f0000ff3000/0x2000)=nil, 0x2000, 0x2000002, 0x10, r1, 0x10000000) getsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, 0x0, 0x0) 12:29:52 executing program 6: ioctl$RTC_UIE_ON(0xffffffffffffffff, 0x7003) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x2}, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0xfffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) dup2(0xffffffffffffffff, r0) perf_event_open(&(0x7f00000001c0)={0x2, 0x80, 0x8, 0x9, 0x4, 0x0, 0x0, 0x3b3d, 0x200a0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x2, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0xffff, 0x1, @perf_config_ext={0x7, 0x1}, 0x281, 0xffffffff, 0x4, 0x3, 0x401, 0xffffff47, 0x401, 0x0, 0x3, 0x0, 0x415}, 0x0, 0xffffffffffffffff, r0, 0x1) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000180)) pkey_mprotect(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x0, 0xffffffffffffffff) 12:29:52 executing program 1: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000180)) symlinkat(0x0, r0, &(0x7f0000000140)='./file0\x00') getsockopt$inet_int(0xffffffffffffffff, 0x0, 0xe, 0x0, &(0x7f0000000280)) ioctl$RTC_ALM_SET(0xffffffffffffffff, 0x40247007, 0x0) 12:29:52 executing program 2: ioctl$RTC_UIE_ON(0xffffffffffffffff, 0x7003) r0 = perf_event_open(&(0x7f00000001c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x2}, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0xfffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = dup2(0xffffffffffffffff, r0) r2 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f0000000000000000010000", 0x4f, 0x400}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000180)) pkey_mprotect(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x0, 0xffffffffffffffff) pkey_mprotect(&(0x7f0000ff4000/0x4000)=nil, 0x4000, 0x0, 0xffffffffffffffff) symlinkat(&(0x7f00000000c0)='./file0\x00', r2, &(0x7f0000000140)='./file0\x00') socket$inet_udp(0x2, 0x2, 0x0) getsockopt$inet_int(0xffffffffffffffff, 0x0, 0xe, 0x0, &(0x7f0000000280)) ioctl$RTC_ALM_SET(r1, 0x40247007, 0x0) getsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, 0x0, 0x0) 12:29:52 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', 0x0, 0x0, 0x4, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000180)) 12:29:52 executing program 7: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000180)) 12:29:52 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x2, &(0x7f0000000080)=0x90, 0x4) bind$inet6(0xffffffffffffffff, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) connect$inet6(0xffffffffffffffff, &(0x7f0000000000)={0xa, 0x4e20, 0x7ddd, @empty, 0x20000}, 0x1c) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x8, &(0x7f0000002ec0), 0x4) sendmsg$inet6(0xffffffffffffffff, &(0x7f00000006c0)={0x0, 0x0, &(0x7f0000000540)=[{&(0x7f00000001c0)="cf", 0xfffffdef}], 0x1}, 0x10044001) recvfrom$inet6(0xffffffffffffffff, &(0x7f0000001e00)=""/4096, 0x1000, 0xcd08, 0x0, 0x0) connect$inet6(0xffffffffffffffff, &(0x7f0000000240)={0xa, 0x4e20, 0x10001, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02', 0x1}, 0x1c) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unlink(&(0x7f0000000080)='./file0\x00') write$binfmt_elf64(r0, &(0x7f0000000100)=ANY=[@ANYBLOB="7f454c460000000000000000000000000000000000000000000000000000000040000000000000ebe58b5f47f713d5f153310b0eb0397100000000000000000010d787edc231bfd33dc9a526b7c0b17291408859423a3b46a620f56ea1f5df4c3f38796f25aab3f90cb28b2dfbb7cd9869bdff20875324"], 0x40) close(r0) ioctl$AUTOFS_DEV_IOCTL_READY(r0, 0xc0189376, &(0x7f0000000180)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32=r0, @ANYBLOB="ff0b0009dbfeef7f3200000a002e2f66a1dc49ca3f32593c5db2bcc55ce890d53f9b14ec8ba9af12260137294334cd2fe0dab4309afee7de5cdd9890f85742920bd6b4b76d3424b2b056770d83cc9f8e8177fda7fad202a73029b2f8db229079f91b29fffa01075b7f4d4e1dcf8e5f39f78ede67d7abc248879650c6d1e61bf70e47274c57a79dcb121bd59deaf54da495b90000000000"]) ioctl$F2FS_IOC_FLUSH_DEVICE(r1, 0x4008f50a, &(0x7f00000000c0)={0x8, 0x8}) r2 = syz_init_net_socket$802154_raw(0x24, 0x3, 0x0) sendmmsg$inet6(r2, &(0x7f0000004d00)=[{{0x0, 0x0, &(0x7f00000004c0)=[{&(0x7f0000000080)='K', 0x4c}], 0x1}}], 0x7ffff000, 0x0) [ 1639.655387] ieee802154 phy0 wpan0: encryption failed: -22 [ 1639.702176] EXT4-fs (loop1): mounted filesystem without journal. Opts: ,errors=continue [ 1639.718148] EXT4-fs (loop2): invalid first ino: 0 12:29:52 executing program 0: r0 = creat(&(0x7f0000000040)='./file0\x00', 0x0) r1 = creat(&(0x7f0000000040)='./file0\x00', 0x0) fallocate(r1, 0x0, 0x0, 0x8800000) fallocate(r1, 0x3, 0x0, 0x8000) fallocate(r0, 0x0, 0x5, 0x8800000) 12:29:52 executing program 7: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', 0x0, 0x0, 0x4, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000180)) 12:29:52 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000180)) [ 1639.814329] EXT4-fs (loop4): mounted filesystem without journal. Opts: ,errors=continue [ 1639.822772] EXT4-fs (loop6): mounted filesystem without journal. Opts: ,errors=continue 12:29:52 executing program 1: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000180)) symlinkat(0x0, r0, &(0x7f0000000140)='./file0\x00') getsockopt$inet_int(0xffffffffffffffff, 0x0, 0xe, 0x0, &(0x7f0000000280)) ioctl$RTC_ALM_SET(0xffffffffffffffff, 0x40247007, 0x0) 12:29:52 executing program 2: ioctl$RTC_UIE_ON(0xffffffffffffffff, 0x7003) r0 = perf_event_open(&(0x7f00000001c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x2}, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0xfffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = dup2(0xffffffffffffffff, r0) r2 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b", 0x55, 0x400}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000180)) pkey_mprotect(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x0, 0xffffffffffffffff) pkey_mprotect(&(0x7f0000ff4000/0x4000)=nil, 0x4000, 0x0, 0xffffffffffffffff) symlinkat(&(0x7f00000000c0)='./file0\x00', r2, &(0x7f0000000140)='./file0\x00') socket$inet_udp(0x2, 0x2, 0x0) getsockopt$inet_int(0xffffffffffffffff, 0x0, 0xe, 0x0, &(0x7f0000000280)) ioctl$RTC_ALM_SET(r1, 0x40247007, 0x0) getsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, 0x0, 0x0) 12:29:52 executing program 4: ioctl$RTC_UIE_ON(0xffffffffffffffff, 0x7003) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x2}, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0xfffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = dup2(0xffffffffffffffff, r0) perf_event_open(&(0x7f00000001c0)={0x2, 0x80, 0x8, 0x9, 0x4, 0x1, 0x0, 0x3b3d, 0x200a0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x2, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0xffff, 0x1, @perf_config_ext={0x7, 0x1}, 0x281, 0xffffffff, 0x4, 0x3, 0x401, 0xffffff47, 0x401, 0x0, 0x3, 0x0, 0x415}, 0x0, 0xffffffffffffffff, r0, 0x1) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000180)) pkey_mprotect(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x0, 0xffffffffffffffff) pkey_mprotect(&(0x7f0000ff4000/0x4000)=nil, 0x4000, 0x0, 0xffffffffffffffff) socket$inet_udp(0x2, 0x2, 0x0) getsockopt$inet_int(0xffffffffffffffff, 0x0, 0xe, 0x0, &(0x7f0000000280)) ioctl$sock_SIOCADDDLCI(0xffffffffffffffff, 0x8980, 0x0) ioctl$RTC_ALM_SET(r1, 0x40247007, 0x0) mmap$IORING_OFF_SQES(&(0x7f0000ff3000/0x2000)=nil, 0x2000, 0x2000002, 0x10, r1, 0x10000000) getsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, 0x0, 0x0) 12:29:52 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x2, &(0x7f0000000080)=0x90, 0x4) bind$inet6(0xffffffffffffffff, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) connect$inet6(0xffffffffffffffff, &(0x7f0000000000)={0xa, 0x4e20, 0x7ddd, @empty, 0x20000}, 0x1c) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x8, &(0x7f0000002ec0), 0x4) sendmsg$inet6(0xffffffffffffffff, &(0x7f00000006c0)={0x0, 0x0, &(0x7f0000000540)=[{&(0x7f00000001c0)="cf", 0xfffffdef}], 0x1}, 0x10044001) recvfrom$inet6(0xffffffffffffffff, &(0x7f0000001e00)=""/4096, 0x1000, 0xcd08, 0x0, 0x0) connect$inet6(0xffffffffffffffff, &(0x7f0000000240)={0xa, 0x4e20, 0x10001, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02', 0x1}, 0x1c) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unlink(&(0x7f0000000080)='./file0\x00') write$binfmt_elf64(r0, &(0x7f0000000100)=ANY=[@ANYBLOB="7f454c460000000000000000000000000000000000000000000000000000000040000000000000ebe58b5f47f713d5f153310b0eb0397100000000000000000010d787edc231bfd33dc9a526b7c0b17291408859423a3b46a620f56ea1f5df4c3f38796f25aab3f90cb28b2dfbb7cd9869bdff20875324"], 0x40) close(r0) ioctl$AUTOFS_DEV_IOCTL_READY(r0, 0xc0189376, &(0x7f0000000180)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32=r0, @ANYBLOB="ff0b0009dbfeef7f3200000a002e2f66a1dc49ca3f32593c5db2bcc55ce890d53f9b14ec8ba9af12260137294334cd2fe0dab4309afee7de5cdd9890f85742920bd6b4b76d3424b2b056770d83cc9f8e8177fda7fad202a73029b2f8db229079f91b29fffa01075b7f4d4e1dcf8e5f39f78ede67d7abc248879650c6d1e61bf70e47274c57a79dcb121bd59deaf54da495b90000000000"]) ioctl$F2FS_IOC_FLUSH_DEVICE(r1, 0x4008f50a, &(0x7f00000000c0)={0x8, 0x8}) r2 = syz_init_net_socket$802154_raw(0x24, 0x3, 0x0) sendmmsg$inet6(r2, &(0x7f0000004d00)=[{{0x0, 0x0, &(0x7f00000004c0)=[{&(0x7f0000000080)='K', 0x4c}], 0x1}}], 0x7ffff000, 0x0) 12:29:52 executing program 6: ioctl$RTC_UIE_ON(0xffffffffffffffff, 0x7003) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x2}, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0xfffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) dup2(0xffffffffffffffff, r0) perf_event_open(&(0x7f00000001c0)={0x2, 0x80, 0x8, 0x9, 0x4, 0x0, 0x0, 0x3b3d, 0x200a0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x2, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0xffff, 0x1, @perf_config_ext={0x7, 0x1}, 0x281, 0xffffffff, 0x4, 0x3, 0x401, 0xffffff47, 0x401, 0x0, 0x3, 0x0, 0x415}, 0x0, 0xffffffffffffffff, r0, 0x1) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000180)) pkey_mprotect(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x0, 0xffffffffffffffff) 12:29:52 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000180)) 12:29:52 executing program 7: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', 0x0, 0x0, 0x4, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000180)) 12:29:52 executing program 0: r0 = creat(&(0x7f0000000040)='./file0\x00', 0x0) r1 = creat(&(0x7f0000000040)='./file0\x00', 0x0) fallocate(r1, 0x0, 0x0, 0x8800000) fallocate(r1, 0x3, 0x0, 0x8000) fallocate(r0, 0x0, 0x7, 0x8800000) [ 1640.137963] EXT4-fs (loop1): mounted filesystem without journal. Opts: ,errors=continue [ 1640.204798] EXT4-fs (loop2): unsupported inode size: 0 [ 1640.206491] EXT4-fs (loop2): blocksize: 2048 [ 1640.280073] ieee802154 phy0 wpan0: encryption failed: -22 [ 1640.324351] EXT4-fs (loop4): mounted filesystem without journal. Opts: ,errors=continue [ 1640.389524] EXT4-fs (loop6): mounted filesystem without journal. Opts: ,errors=continue 12:30:11 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000180)) symlinkat(&(0x7f00000000c0)='./file0\x00', 0xffffffffffffffff, &(0x7f0000000140)='./file0\x00') getsockopt$inet_int(0xffffffffffffffff, 0x0, 0xe, 0x0, &(0x7f0000000280)) ioctl$RTC_ALM_SET(0xffffffffffffffff, 0x40247007, 0x0) 12:30:11 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x2, &(0x7f0000000080)=0x90, 0x4) bind$inet6(0xffffffffffffffff, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) connect$inet6(0xffffffffffffffff, &(0x7f0000000000)={0xa, 0x4e20, 0x7ddd, @empty, 0x20000}, 0x1c) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x8, &(0x7f0000002ec0), 0x4) sendmsg$inet6(0xffffffffffffffff, &(0x7f00000006c0)={0x0, 0x0, &(0x7f0000000540)=[{&(0x7f00000001c0)="cf", 0xfffffdef}], 0x1}, 0x10044001) recvfrom$inet6(0xffffffffffffffff, &(0x7f0000001e00)=""/4096, 0x1000, 0xcd08, 0x0, 0x0) connect$inet6(0xffffffffffffffff, &(0x7f0000000240)={0xa, 0x4e20, 0x10001, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02', 0x1}, 0x1c) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unlink(&(0x7f0000000080)='./file0\x00') write$binfmt_elf64(r0, &(0x7f0000000100)=ANY=[@ANYBLOB="7f454c460000000000000000000000000000000000000000000000000000000040000000000000ebe58b5f47f713d5f153310b0eb0397100000000000000000010d787edc231bfd33dc9a526b7c0b17291408859423a3b46a620f56ea1f5df4c3f38796f25aab3f90cb28b2dfbb7cd9869bdff20875324"], 0x40) close(r0) ioctl$AUTOFS_DEV_IOCTL_READY(r0, 0xc0189376, &(0x7f0000000180)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32=r0, @ANYBLOB="ff0b0009dbfeef7f3200000a002e2f66a1dc49ca3f32593c5db2bcc55ce890d53f9b14ec8ba9af12260137294334cd2fe0dab4309afee7de5cdd9890f85742920bd6b4b76d3424b2b056770d83cc9f8e8177fda7fad202a73029b2f8db229079f91b29fffa01075b7f4d4e1dcf8e5f39f78ede67d7abc248879650c6d1e61bf70e47274c57a79dcb121bd59deaf54da495b90000000000"]) ioctl$F2FS_IOC_FLUSH_DEVICE(r1, 0x4008f50a, &(0x7f00000000c0)={0x8, 0x8}) sendmmsg$inet6(0xffffffffffffffff, &(0x7f0000004d00)=[{{0x0, 0x0, &(0x7f00000004c0)=[{&(0x7f0000000080)='K', 0x4c}], 0x1}}], 0x7ffff000, 0x0) 12:30:11 executing program 6: ioctl$RTC_UIE_ON(0xffffffffffffffff, 0x7003) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x2}, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0xfffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) dup2(0xffffffffffffffff, r0) perf_event_open(&(0x7f00000001c0)={0x2, 0x80, 0x8, 0x9, 0x4, 0x0, 0x0, 0x3b3d, 0x200a0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x2, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0xffff, 0x1, @perf_config_ext={0x7, 0x1}, 0x281, 0xffffffff, 0x4, 0x3, 0x401, 0xffffff47, 0x401, 0x0, 0x3, 0x0, 0x415}, 0x0, 0xffffffffffffffff, r0, 0x1) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000180)) 12:30:11 executing program 0: r0 = creat(&(0x7f0000000040)='./file0\x00', 0x0) r1 = creat(&(0x7f0000000040)='./file0\x00', 0x0) fallocate(r1, 0x0, 0x0, 0x8800000) fallocate(r1, 0x3, 0x0, 0x8000) fallocate(r0, 0x0, 0x8, 0x8800000) 12:30:11 executing program 4: ioctl$RTC_UIE_ON(0xffffffffffffffff, 0x7003) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x2}, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0xfffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = dup2(0xffffffffffffffff, r0) perf_event_open(&(0x7f00000001c0)={0x2, 0x80, 0x8, 0x9, 0x4, 0x1, 0x0, 0x3b3d, 0x200a0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x2, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0xffff, 0x1, @perf_config_ext={0x7, 0x1}, 0x281, 0xffffffff, 0x4, 0x3, 0x401, 0xffffff47, 0x401, 0x0, 0x3, 0x0, 0x415}, 0x0, 0xffffffffffffffff, r0, 0x1) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000180)) pkey_mprotect(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x0, 0xffffffffffffffff) pkey_mprotect(&(0x7f0000ff4000/0x4000)=nil, 0x4000, 0x0, 0xffffffffffffffff) socket$inet_udp(0x2, 0x2, 0x0) getsockopt$inet_int(0xffffffffffffffff, 0x0, 0xe, 0x0, &(0x7f0000000280)) ioctl$sock_SIOCADDDLCI(0xffffffffffffffff, 0x8980, 0x0) ioctl$RTC_ALM_SET(r1, 0x40247007, 0x0) mmap$IORING_OFF_SQES(&(0x7f0000ff3000/0x2000)=nil, 0x2000, 0x2000002, 0x10, r1, 0x10000000) getsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, 0x0, 0x0) 12:30:11 executing program 7: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', 0x0, 0x0, 0x4, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000180)) 12:30:11 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000180)) 12:30:11 executing program 2: ioctl$RTC_UIE_ON(0xffffffffffffffff, 0x7003) r0 = perf_event_open(&(0x7f00000001c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x2}, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0xfffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = dup2(0xffffffffffffffff, r0) r2 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b", 0x55, 0x400}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000180)) pkey_mprotect(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x0, 0xffffffffffffffff) pkey_mprotect(&(0x7f0000ff4000/0x4000)=nil, 0x4000, 0x0, 0xffffffffffffffff) symlinkat(&(0x7f00000000c0)='./file0\x00', r2, &(0x7f0000000140)='./file0\x00') socket$inet_udp(0x2, 0x2, 0x0) getsockopt$inet_int(0xffffffffffffffff, 0x0, 0xe, 0x0, &(0x7f0000000280)) ioctl$RTC_ALM_SET(r1, 0x40247007, 0x0) getsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, 0x0, 0x0) 12:30:11 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}], 0x0, &(0x7f0000000180)) [ 1658.429662] EXT4-fs (loop1): mounted filesystem without journal. Opts: ,errors=continue [ 1658.437001] EXT4-fs (loop2): unsupported inode size: 0 [ 1658.437659] EXT4-fs (loop2): blocksize: 2048 12:30:11 executing program 7: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000180)) [ 1658.457483] EXT4-fs (loop6): mounted filesystem without journal. Opts: ,errors=continue 12:30:11 executing program 0: r0 = creat(&(0x7f0000000040)='./file0\x00', 0x0) r1 = creat(&(0x7f0000000040)='./file0\x00', 0x0) fallocate(r1, 0x0, 0x0, 0x8800000) fallocate(r1, 0x3, 0x0, 0x8000) fallocate(r0, 0x0, 0xd, 0x8800000) 12:30:11 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x2, &(0x7f0000000080)=0x90, 0x4) bind$inet6(0xffffffffffffffff, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) connect$inet6(0xffffffffffffffff, &(0x7f0000000000)={0xa, 0x4e20, 0x7ddd, @empty, 0x20000}, 0x1c) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x8, &(0x7f0000002ec0), 0x4) sendmsg$inet6(0xffffffffffffffff, &(0x7f00000006c0)={0x0, 0x0, &(0x7f0000000540)=[{&(0x7f00000001c0)="cf", 0xfffffdef}], 0x1}, 0x10044001) recvfrom$inet6(0xffffffffffffffff, &(0x7f0000001e00)=""/4096, 0x1000, 0xcd08, 0x0, 0x0) connect$inet6(0xffffffffffffffff, &(0x7f0000000240)={0xa, 0x4e20, 0x10001, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02', 0x1}, 0x1c) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unlink(&(0x7f0000000080)='./file0\x00') write$binfmt_elf64(r0, &(0x7f0000000100)=ANY=[@ANYBLOB="7f454c460000000000000000000000000000000000000000000000000000000040000000000000ebe58b5f47f713d5f153310b0eb0397100000000000000000010d787edc231bfd33dc9a526b7c0b17291408859423a3b46a620f56ea1f5df4c3f38796f25aab3f90cb28b2dfbb7cd9869bdff20875324"], 0x40) close(r0) ioctl$AUTOFS_DEV_IOCTL_READY(r0, 0xc0189376, &(0x7f0000000180)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32=r0, @ANYBLOB="ff0b0009dbfeef7f3200000a002e2f66a1dc49ca3f32593c5db2bcc55ce890d53f9b14ec8ba9af12260137294334cd2fe0dab4309afee7de5cdd9890f85742920bd6b4b76d3424b2b056770d83cc9f8e8177fda7fad202a73029b2f8db229079f91b29fffa01075b7f4d4e1dcf8e5f39f78ede67d7abc248879650c6d1e61bf70e47274c57a79dcb121bd59deaf54da495b90000000000"]) ioctl$F2FS_IOC_FLUSH_DEVICE(r1, 0x4008f50a, &(0x7f00000000c0)={0x8, 0x8}) sendmmsg$inet6(0xffffffffffffffff, &(0x7f0000004d00)=[{{0x0, 0x0, &(0x7f00000004c0)=[{&(0x7f0000000080)='K', 0x4c}], 0x1}}], 0x7ffff000, 0x0) [ 1658.474625] EXT4-fs (loop4): mounted filesystem without journal. Opts: ,errors=continue 12:30:11 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000180)) symlinkat(&(0x7f00000000c0)='./file0\x00', 0xffffffffffffffff, &(0x7f0000000140)='./file0\x00') getsockopt$inet_int(0xffffffffffffffff, 0x0, 0xe, 0x0, &(0x7f0000000280)) ioctl$RTC_ALM_SET(0xffffffffffffffff, 0x40247007, 0x0) 12:30:11 executing program 2: ioctl$RTC_UIE_ON(0xffffffffffffffff, 0x7003) r0 = perf_event_open(&(0x7f00000001c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x2}, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0xfffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = dup2(0xffffffffffffffff, r0) r2 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b", 0x55, 0x400}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000180)) pkey_mprotect(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x0, 0xffffffffffffffff) pkey_mprotect(&(0x7f0000ff4000/0x4000)=nil, 0x4000, 0x0, 0xffffffffffffffff) symlinkat(&(0x7f00000000c0)='./file0\x00', r2, &(0x7f0000000140)='./file0\x00') socket$inet_udp(0x2, 0x2, 0x0) getsockopt$inet_int(0xffffffffffffffff, 0x0, 0xe, 0x0, &(0x7f0000000280)) ioctl$RTC_ALM_SET(r1, 0x40247007, 0x0) getsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, 0x0, 0x0) [ 1658.579984] EXT4-fs error (device loop5): ext4_fill_super:4959: inode #2: comm syz-executor.5: iget: root inode unallocated [ 1658.584361] EXT4-fs (loop5): get root inode failed [ 1658.585744] EXT4-fs (loop5): mount failed 12:30:11 executing program 4: ioctl$RTC_UIE_ON(0xffffffffffffffff, 0x7003) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x2}, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0xfffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = dup2(0xffffffffffffffff, r0) perf_event_open(&(0x7f00000001c0)={0x2, 0x80, 0x8, 0x9, 0x4, 0x1, 0x0, 0x3b3d, 0x200a0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x2, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0xffff, 0x1, @perf_config_ext={0x7, 0x1}, 0x281, 0xffffffff, 0x4, 0x3, 0x401, 0xffffff47, 0x401, 0x0, 0x3, 0x0, 0x415}, 0x0, 0xffffffffffffffff, r0, 0x1) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000180)) pkey_mprotect(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x0, 0xffffffffffffffff) pkey_mprotect(&(0x7f0000ff4000/0x4000)=nil, 0x4000, 0x0, 0xffffffffffffffff) socket$inet_udp(0x2, 0x2, 0x0) getsockopt$inet_int(0xffffffffffffffff, 0x0, 0xe, 0x0, &(0x7f0000000280)) ioctl$sock_SIOCADDDLCI(0xffffffffffffffff, 0x8980, 0x0) ioctl$RTC_ALM_SET(r1, 0x40247007, 0x0) mmap$IORING_OFF_SQES(&(0x7f0000ff3000/0x2000)=nil, 0x2000, 0x2000002, 0x10, r1, 0x10000000) getsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, 0x0, 0x0) 12:30:11 executing program 7: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000180)) 12:30:11 executing program 6: ioctl$RTC_UIE_ON(0xffffffffffffffff, 0x7003) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x2}, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0xfffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) dup2(0xffffffffffffffff, r0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000180)) [ 1658.683219] EXT4-fs (loop1): mounted filesystem without journal. Opts: ,errors=continue [ 1658.734142] EXT4-fs (loop2): unsupported inode size: 0 [ 1658.735313] EXT4-fs (loop2): blocksize: 2048 [ 1658.778610] EXT4-fs (loop4): mounted filesystem without journal. Opts: ,errors=continue [ 1658.790579] EXT4-fs (loop6): mounted filesystem without journal. Opts: ,errors=continue 12:30:29 executing program 7: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000180)) 12:30:29 executing program 6: ioctl$RTC_UIE_ON(0xffffffffffffffff, 0x7003) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x2}, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0xfffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000180)) 12:30:29 executing program 4: ioctl$RTC_UIE_ON(0xffffffffffffffff, 0x7003) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x2}, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0xfffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = dup2(0xffffffffffffffff, r0) perf_event_open(&(0x7f00000001c0)={0x2, 0x80, 0x8, 0x9, 0x4, 0x1, 0x0, 0x3b3d, 0x200a0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x2, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0xffff, 0x1, @perf_config_ext={0x7, 0x1}, 0x281, 0xffffffff, 0x4, 0x3, 0x401, 0xffffff47, 0x401, 0x0, 0x3, 0x0, 0x415}, 0x0, 0xffffffffffffffff, r0, 0x1) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000180)) pkey_mprotect(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x0, 0xffffffffffffffff) pkey_mprotect(&(0x7f0000ff4000/0x4000)=nil, 0x4000, 0x0, 0xffffffffffffffff) socket$inet_udp(0x2, 0x2, 0x0) getsockopt$inet_int(0xffffffffffffffff, 0x0, 0xe, 0x0, &(0x7f0000000280)) ioctl$sock_SIOCADDDLCI(0xffffffffffffffff, 0x8980, 0x0) ioctl$RTC_ALM_SET(r1, 0x40247007, 0x0) mmap$IORING_OFF_SQES(&(0x7f0000ff3000/0x2000)=nil, 0x2000, 0x2000002, 0x10, r1, 0x10000000) getsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, 0x0, 0x0) 12:30:29 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000180)) symlinkat(&(0x7f00000000c0)='./file0\x00', 0xffffffffffffffff, &(0x7f0000000140)='./file0\x00') getsockopt$inet_int(0xffffffffffffffff, 0x0, 0xe, 0x0, &(0x7f0000000280)) ioctl$RTC_ALM_SET(0xffffffffffffffff, 0x40247007, 0x0) 12:30:29 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x2, &(0x7f0000000080)=0x90, 0x4) bind$inet6(0xffffffffffffffff, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) connect$inet6(0xffffffffffffffff, &(0x7f0000000000)={0xa, 0x4e20, 0x7ddd, @empty, 0x20000}, 0x1c) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x8, &(0x7f0000002ec0), 0x4) sendmsg$inet6(0xffffffffffffffff, &(0x7f00000006c0)={0x0, 0x0, &(0x7f0000000540)=[{&(0x7f00000001c0)="cf", 0xfffffdef}], 0x1}, 0x10044001) recvfrom$inet6(0xffffffffffffffff, &(0x7f0000001e00)=""/4096, 0x1000, 0xcd08, 0x0, 0x0) connect$inet6(0xffffffffffffffff, &(0x7f0000000240)={0xa, 0x4e20, 0x10001, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02', 0x1}, 0x1c) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unlink(&(0x7f0000000080)='./file0\x00') write$binfmt_elf64(r0, &(0x7f0000000100)=ANY=[@ANYBLOB="7f454c460000000000000000000000000000000000000000000000000000000040000000000000ebe58b5f47f713d5f153310b0eb0397100000000000000000010d787edc231bfd33dc9a526b7c0b17291408859423a3b46a620f56ea1f5df4c3f38796f25aab3f90cb28b2dfbb7cd9869bdff20875324"], 0x40) close(r0) ioctl$AUTOFS_DEV_IOCTL_READY(r0, 0xc0189376, &(0x7f0000000180)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32=r0, @ANYBLOB="ff0b0009dbfeef7f3200000a002e2f66a1dc49ca3f32593c5db2bcc55ce890d53f9b14ec8ba9af12260137294334cd2fe0dab4309afee7de5cdd9890f85742920bd6b4b76d3424b2b056770d83cc9f8e8177fda7fad202a73029b2f8db229079f91b29fffa01075b7f4d4e1dcf8e5f39f78ede67d7abc248879650c6d1e61bf70e47274c57a79dcb121bd59deaf54da495b90000000000"]) ioctl$F2FS_IOC_FLUSH_DEVICE(r1, 0x4008f50a, &(0x7f00000000c0)={0x8, 0x8}) sendmmsg$inet6(0xffffffffffffffff, &(0x7f0000004d00)=[{{0x0, 0x0, &(0x7f00000004c0)=[{&(0x7f0000000080)='K', 0x4c}], 0x1}}], 0x7ffff000, 0x0) 12:30:29 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}], 0x0, &(0x7f0000000180)) 12:30:29 executing program 0: r0 = creat(&(0x7f0000000040)='./file0\x00', 0x0) r1 = creat(&(0x7f0000000040)='./file0\x00', 0x0) fallocate(r1, 0x0, 0x0, 0x8800000) fallocate(r1, 0x3, 0x0, 0x8000) fallocate(r0, 0x0, 0x10, 0x8800000) 12:30:29 executing program 2: ioctl$RTC_UIE_ON(0xffffffffffffffff, 0x7003) r0 = perf_event_open(&(0x7f00000001c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x2}, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0xfffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = dup2(0xffffffffffffffff, r0) r2 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b000000", 0x58, 0x400}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000180)) pkey_mprotect(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x0, 0xffffffffffffffff) pkey_mprotect(&(0x7f0000ff4000/0x4000)=nil, 0x4000, 0x0, 0xffffffffffffffff) symlinkat(&(0x7f00000000c0)='./file0\x00', r2, &(0x7f0000000140)='./file0\x00') socket$inet_udp(0x2, 0x2, 0x0) getsockopt$inet_int(0xffffffffffffffff, 0x0, 0xe, 0x0, &(0x7f0000000280)) ioctl$RTC_ALM_SET(r1, 0x40247007, 0x0) getsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, 0x0, 0x0) [ 1677.273466] EXT4-fs (loop1): mounted filesystem without journal. Opts: ,errors=continue [ 1677.331518] EXT4-fs error (device loop5): ext4_fill_super:4959: inode #2: comm syz-executor.5: iget: root inode unallocated [ 1677.338198] EXT4-fs (loop5): get root inode failed [ 1677.339343] EXT4-fs (loop5): mount failed 12:30:30 executing program 7: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}], 0x0, &(0x7f0000000180)) [ 1677.381107] EXT4-fs (loop2): unsupported inode size: 0 [ 1677.382584] EXT4-fs (loop2): blocksize: 2048 12:30:30 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x2, &(0x7f0000000080)=0x90, 0x4) bind$inet6(0xffffffffffffffff, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) connect$inet6(0xffffffffffffffff, &(0x7f0000000000)={0xa, 0x4e20, 0x7ddd, @empty, 0x20000}, 0x1c) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x8, &(0x7f0000002ec0), 0x4) sendmsg$inet6(0xffffffffffffffff, &(0x7f00000006c0)={0x0, 0x0, &(0x7f0000000540)=[{&(0x7f00000001c0)="cf", 0xfffffdef}], 0x1}, 0x10044001) recvfrom$inet6(0xffffffffffffffff, &(0x7f0000001e00)=""/4096, 0x1000, 0xcd08, 0x0, 0x0) connect$inet6(0xffffffffffffffff, &(0x7f0000000240)={0xa, 0x4e20, 0x10001, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02', 0x1}, 0x1c) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unlink(&(0x7f0000000080)='./file0\x00') write$binfmt_elf64(r0, &(0x7f0000000100)=ANY=[@ANYBLOB="7f454c460000000000000000000000000000000000000000000000000000000040000000000000ebe58b5f47f713d5f153310b0eb0397100000000000000000010d787edc231bfd33dc9a526b7c0b17291408859423a3b46a620f56ea1f5df4c3f38796f25aab3f90cb28b2dfbb7cd9869bdff20875324"], 0x40) close(r0) ioctl$AUTOFS_DEV_IOCTL_READY(r0, 0xc0189376, &(0x7f0000000180)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32=r0, @ANYBLOB="ff0b0009dbfeef7f3200000a002e2f66a1dc49ca3f32593c5db2bcc55ce890d53f9b14ec8ba9af12260137294334cd2fe0dab4309afee7de5cdd9890f85742920bd6b4b76d3424b2b056770d83cc9f8e8177fda7fad202a73029b2f8db229079f91b29fffa01075b7f4d4e1dcf8e5f39f78ede67d7abc248879650c6d1e61bf70e47274c57a79dcb121bd59deaf54da495b90000000000"]) r1 = syz_init_net_socket$802154_raw(0x24, 0x3, 0x0) sendmmsg$inet6(r1, &(0x7f0000004d00)=[{{0x0, 0x0, &(0x7f00000004c0)=[{&(0x7f0000000080)='K', 0x4c}], 0x1}}], 0x7ffff000, 0x0) 12:30:30 executing program 0: r0 = creat(&(0x7f0000000040)='./file0\x00', 0x0) r1 = creat(&(0x7f0000000040)='./file0\x00', 0x0) fallocate(r1, 0x0, 0x0, 0x8800000) fallocate(r1, 0x3, 0x0, 0x8000) fallocate(r0, 0x0, 0x12, 0x8800000) [ 1677.399146] EXT4-fs (loop6): mounted filesystem without journal. Opts: ,errors=continue [ 1677.409692] EXT4-fs (loop4): mounted filesystem without journal. Opts: ,errors=continue 12:30:30 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}], 0x0, &(0x7f0000000180)) 12:30:30 executing program 1: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000180)) symlinkat(&(0x7f00000000c0)='./file0\x00', r0, 0x0) getsockopt$inet_int(0xffffffffffffffff, 0x0, 0xe, 0x0, &(0x7f0000000280)) ioctl$RTC_ALM_SET(0xffffffffffffffff, 0x40247007, 0x0) [ 1677.537768] ieee802154 phy0 wpan0: encryption failed: -22 [ 1677.620530] EXT4-fs error (device loop7): ext4_fill_super:4959: inode #2: comm syz-executor.7: iget: root inode unallocated [ 1677.623364] EXT4-fs (loop7): get root inode failed [ 1677.624578] EXT4-fs (loop7): mount failed [ 1677.702349] EXT4-fs error (device loop5): ext4_fill_super:4959: inode #2: comm syz-executor.5: iget: root inode unallocated [ 1677.706157] EXT4-fs (loop5): get root inode failed [ 1677.707264] EXT4-fs (loop5): mount failed 12:30:47 executing program 1: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000180)) symlinkat(&(0x7f00000000c0)='./file0\x00', r0, 0x0) getsockopt$inet_int(0xffffffffffffffff, 0x0, 0xe, 0x0, &(0x7f0000000280)) ioctl$RTC_ALM_SET(0xffffffffffffffff, 0x40247007, 0x0) 12:30:47 executing program 2: ioctl$RTC_UIE_ON(0xffffffffffffffff, 0x7003) r0 = perf_event_open(&(0x7f00000001c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x2}, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0xfffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = dup2(0xffffffffffffffff, r0) r2 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b000000", 0x58, 0x400}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000180)) pkey_mprotect(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x0, 0xffffffffffffffff) pkey_mprotect(&(0x7f0000ff4000/0x4000)=nil, 0x4000, 0x0, 0xffffffffffffffff) symlinkat(&(0x7f00000000c0)='./file0\x00', r2, &(0x7f0000000140)='./file0\x00') socket$inet_udp(0x2, 0x2, 0x0) getsockopt$inet_int(0xffffffffffffffff, 0x0, 0xe, 0x0, &(0x7f0000000280)) ioctl$RTC_ALM_SET(r1, 0x40247007, 0x0) getsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, 0x0, 0x0) 12:30:47 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {0x0, 0x0, 0x2100}], 0x0, &(0x7f0000000180)) 12:30:47 executing program 0: r0 = creat(&(0x7f0000000040)='./file0\x00', 0x0) r1 = creat(&(0x7f0000000040)='./file0\x00', 0x0) fallocate(r1, 0x0, 0x0, 0x8800000) fallocate(r1, 0x3, 0x0, 0x8000) fallocate(r0, 0x0, 0x64, 0x8800000) 12:30:47 executing program 4: ioctl$RTC_UIE_ON(0xffffffffffffffff, 0x7003) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x2}, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0xfffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = dup2(0xffffffffffffffff, r0) perf_event_open(&(0x7f00000001c0)={0x2, 0x80, 0x8, 0x9, 0x4, 0x1, 0x0, 0x3b3d, 0x200a0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x2, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0xffff, 0x1, @perf_config_ext={0x7, 0x1}, 0x281, 0xffffffff, 0x4, 0x3, 0x401, 0xffffff47, 0x401, 0x0, 0x3, 0x0, 0x415}, 0x0, 0xffffffffffffffff, r0, 0x1) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000180)) pkey_mprotect(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x0, 0xffffffffffffffff) pkey_mprotect(&(0x7f0000ff4000/0x4000)=nil, 0x4000, 0x0, 0xffffffffffffffff) socket$inet_udp(0x2, 0x2, 0x0) getsockopt$inet_int(0xffffffffffffffff, 0x0, 0xe, 0x0, &(0x7f0000000280)) ioctl$sock_SIOCADDDLCI(0xffffffffffffffff, 0x8980, 0x0) ioctl$RTC_ALM_SET(r1, 0x40247007, 0x0) mmap$IORING_OFF_SQES(&(0x7f0000ff3000/0x2000)=nil, 0x2000, 0x2000002, 0x10, r1, 0x10000000) getsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, 0x0, 0x0) 12:30:47 executing program 6: ioctl$RTC_UIE_ON(0xffffffffffffffff, 0x7003) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x2}, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0xfffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000180)) 12:30:47 executing program 7: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}], 0x0, &(0x7f0000000180)) 12:30:47 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x2, &(0x7f0000000080)=0x90, 0x4) bind$inet6(0xffffffffffffffff, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) connect$inet6(0xffffffffffffffff, &(0x7f0000000000)={0xa, 0x4e20, 0x7ddd, @empty, 0x20000}, 0x1c) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x8, &(0x7f0000002ec0), 0x4) sendmsg$inet6(0xffffffffffffffff, &(0x7f00000006c0)={0x0, 0x0, &(0x7f0000000540)=[{&(0x7f00000001c0)="cf", 0xfffffdef}], 0x1}, 0x10044001) recvfrom$inet6(0xffffffffffffffff, &(0x7f0000001e00)=""/4096, 0x1000, 0xcd08, 0x0, 0x0) connect$inet6(0xffffffffffffffff, &(0x7f0000000240)={0xa, 0x4e20, 0x10001, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02', 0x1}, 0x1c) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unlink(&(0x7f0000000080)='./file0\x00') write$binfmt_elf64(r0, &(0x7f0000000100)=ANY=[@ANYBLOB="7f454c460000000000000000000000000000000000000000000000000000000040000000000000ebe58b5f47f713d5f153310b0eb0397100000000000000000010d787edc231bfd33dc9a526b7c0b17291408859423a3b46a620f56ea1f5df4c3f38796f25aab3f90cb28b2dfbb7cd9869bdff20875324"], 0x40) close(r0) r1 = syz_init_net_socket$802154_raw(0x24, 0x3, 0x0) sendmmsg$inet6(r1, &(0x7f0000004d00)=[{{0x0, 0x0, &(0x7f00000004c0)=[{&(0x7f0000000080)='K', 0x4c}], 0x1}}], 0x7ffff000, 0x0) [ 1694.788202] EXT4-fs (loop2): unsupported inode size: 0 [ 1694.790095] EXT4-fs (loop2): blocksize: 2048 [ 1694.798705] ieee802154 phy0 wpan0: encryption failed: -22 [ 1694.803392] EXT4-fs (loop1): mounted filesystem without journal. Opts: ,errors=continue [ 1694.828823] EXT4-fs error (device loop7): ext4_fill_super:4959: inode #2: comm syz-executor.7: iget: root inode unallocated [ 1694.840438] EXT4-fs error (device loop5): ext4_fill_super:4959: inode #2: comm syz-executor.5: iget: root inode unallocated [ 1694.841004] EXT4-fs (loop7): get root inode failed [ 1694.843998] EXT4-fs (loop7): mount failed [ 1694.851694] EXT4-fs (loop5): get root inode failed [ 1694.852901] EXT4-fs (loop5): mount failed [ 1694.875739] EXT4-fs (loop4): mounted filesystem without journal. Opts: ,errors=continue 12:30:47 executing program 0: r0 = creat(&(0x7f0000000040)='./file0\x00', 0x0) r1 = creat(&(0x7f0000000040)='./file0\x00', 0x0) fallocate(r1, 0x0, 0x0, 0x8800000) fallocate(r1, 0x3, 0x0, 0x8000) fallocate(r0, 0x0, 0x10c, 0x8800000) 12:30:47 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {0x0, 0x0, 0x2100}], 0x0, &(0x7f0000000180)) 12:30:47 executing program 1: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000180)) symlinkat(&(0x7f00000000c0)='./file0\x00', r0, 0x0) getsockopt$inet_int(0xffffffffffffffff, 0x0, 0xe, 0x0, &(0x7f0000000280)) ioctl$RTC_ALM_SET(0xffffffffffffffff, 0x40247007, 0x0) [ 1695.006557] EXT4-fs (loop6): mounted filesystem without journal. Opts: ,errors=continue 12:30:47 executing program 2: ioctl$RTC_UIE_ON(0xffffffffffffffff, 0x7003) r0 = perf_event_open(&(0x7f00000001c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x2}, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0xfffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = dup2(0xffffffffffffffff, r0) r2 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b000000", 0x58, 0x400}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000180)) pkey_mprotect(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x0, 0xffffffffffffffff) pkey_mprotect(&(0x7f0000ff4000/0x4000)=nil, 0x4000, 0x0, 0xffffffffffffffff) symlinkat(&(0x7f00000000c0)='./file0\x00', r2, &(0x7f0000000140)='./file0\x00') socket$inet_udp(0x2, 0x2, 0x0) getsockopt$inet_int(0xffffffffffffffff, 0x0, 0xe, 0x0, &(0x7f0000000280)) ioctl$RTC_ALM_SET(r1, 0x40247007, 0x0) getsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, 0x0, 0x0) 12:30:47 executing program 4: ioctl$RTC_UIE_ON(0xffffffffffffffff, 0x7003) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x2}, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0xfffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = dup2(0xffffffffffffffff, r0) perf_event_open(&(0x7f00000001c0)={0x2, 0x80, 0x8, 0x9, 0x4, 0x1, 0x0, 0x3b3d, 0x200a0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x2, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0xffff, 0x1, @perf_config_ext={0x7, 0x1}, 0x281, 0xffffffff, 0x4, 0x3, 0x401, 0xffffff47, 0x401, 0x0, 0x3, 0x0, 0x415}, 0x0, 0xffffffffffffffff, r0, 0x1) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000180)) pkey_mprotect(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x0, 0xffffffffffffffff) pkey_mprotect(&(0x7f0000ff4000/0x4000)=nil, 0x4000, 0x0, 0xffffffffffffffff) socket$inet_udp(0x2, 0x2, 0x0) getsockopt$inet_int(0xffffffffffffffff, 0x0, 0xe, 0x0, &(0x7f0000000280)) ioctl$sock_SIOCADDDLCI(0xffffffffffffffff, 0x8980, 0x0) ioctl$RTC_ALM_SET(r1, 0x40247007, 0x0) mmap$IORING_OFF_SQES(&(0x7f0000ff3000/0x2000)=nil, 0x2000, 0x2000002, 0x10, r1, 0x10000000) getsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, 0x0, 0x0) 12:30:47 executing program 7: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}], 0x0, &(0x7f0000000180)) 12:30:47 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x2, &(0x7f0000000080)=0x90, 0x4) bind$inet6(0xffffffffffffffff, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) connect$inet6(0xffffffffffffffff, &(0x7f0000000000)={0xa, 0x4e20, 0x7ddd, @empty, 0x20000}, 0x1c) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x8, &(0x7f0000002ec0), 0x4) sendmsg$inet6(0xffffffffffffffff, &(0x7f00000006c0)={0x0, 0x0, &(0x7f0000000540)=[{&(0x7f00000001c0)="cf", 0xfffffdef}], 0x1}, 0x10044001) recvfrom$inet6(0xffffffffffffffff, &(0x7f0000001e00)=""/4096, 0x1000, 0xcd08, 0x0, 0x0) connect$inet6(0xffffffffffffffff, &(0x7f0000000240)={0xa, 0x4e20, 0x10001, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02', 0x1}, 0x1c) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unlink(&(0x7f0000000080)='./file0\x00') write$binfmt_elf64(r0, &(0x7f0000000100)=ANY=[@ANYBLOB="7f454c460000000000000000000000000000000000000000000000000000000040000000000000ebe58b5f47f713d5f153310b0eb0397100000000000000000010d787edc231bfd33dc9a526b7c0b17291408859423a3b46a620f56ea1f5df4c3f38796f25aab3f90cb28b2dfbb7cd9869bdff20875324"], 0x40) r1 = syz_init_net_socket$802154_raw(0x24, 0x3, 0x0) sendmmsg$inet6(r1, &(0x7f0000004d00)=[{{0x0, 0x0, &(0x7f00000004c0)=[{&(0x7f0000000080)='K', 0x4c}], 0x1}}], 0x7ffff000, 0x0) [ 1695.122026] EXT4-fs error (device loop5): ext4_fill_super:4959: inode #2: comm syz-executor.5: iget: root inode unallocated [ 1695.125760] EXT4-fs (loop5): get root inode failed [ 1695.127012] EXT4-fs (loop5): mount failed 12:30:47 executing program 0: r0 = creat(&(0x7f0000000040)='./file0\x00', 0x0) r1 = creat(&(0x7f0000000040)='./file0\x00', 0x0) fallocate(r1, 0x0, 0x0, 0x8800000) fallocate(r1, 0x3, 0x0, 0x8000) fallocate(r0, 0x0, 0x281, 0x8800000) 12:30:47 executing program 6: ioctl$RTC_UIE_ON(0xffffffffffffffff, 0x7003) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000180)) 12:30:47 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {0x0, 0x0, 0x2100}], 0x0, &(0x7f0000000180)) [ 1695.271729] EXT4-fs (loop1): mounted filesystem without journal. Opts: ,errors=continue [ 1695.324811] ieee802154 phy0 wpan0: encryption failed: -22 [ 1695.367186] EXT4-fs (loop2): unsupported inode size: 0 [ 1695.369149] EXT4-fs (loop2): blocksize: 2048 [ 1695.463570] EXT4-fs (loop4): mounted filesystem without journal. Opts: ,errors=continue [ 1695.466687] EXT4-fs error (device loop7): ext4_fill_super:4959: inode #2: comm syz-executor.7: iget: root inode unallocated [ 1695.475935] EXT4-fs (loop7): get root inode failed [ 1695.477055] EXT4-fs (loop7): mount failed [ 1695.548535] EXT4-fs error (device loop5): ext4_fill_super:4959: inode #2: comm syz-executor.5: iget: root inode unallocated [ 1695.556008] EXT4-fs (loop5): get root inode failed [ 1695.557229] EXT4-fs (loop5): mount failed 12:31:01 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600), 0x0, 0x2100}], 0x0, &(0x7f0000000180)) 12:31:01 executing program 2: ioctl$RTC_UIE_ON(0xffffffffffffffff, 0x7003) r0 = perf_event_open(&(0x7f00000001c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x2}, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0xfffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = dup2(0xffffffffffffffff, r0) r2 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b00000000", 0x59, 0x400}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000180)) pkey_mprotect(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x0, 0xffffffffffffffff) pkey_mprotect(&(0x7f0000ff4000/0x4000)=nil, 0x4000, 0x0, 0xffffffffffffffff) symlinkat(&(0x7f00000000c0)='./file0\x00', r2, &(0x7f0000000140)='./file0\x00') socket$inet_udp(0x2, 0x2, 0x0) getsockopt$inet_int(0xffffffffffffffff, 0x0, 0xe, 0x0, &(0x7f0000000280)) ioctl$RTC_ALM_SET(r1, 0x40247007, 0x0) getsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, 0x0, 0x0) 12:31:01 executing program 4: ioctl$RTC_UIE_ON(0xffffffffffffffff, 0x7003) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x2}, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0xfffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = dup2(0xffffffffffffffff, r0) perf_event_open(&(0x7f00000001c0)={0x2, 0x80, 0x8, 0x9, 0x4, 0x1, 0x0, 0x3b3d, 0x200a0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x2, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0xffff, 0x1, @perf_config_ext={0x7, 0x1}, 0x281, 0xffffffff, 0x4, 0x3, 0x401, 0xffffff47, 0x401, 0x0, 0x3, 0x0, 0x415}, 0x0, 0xffffffffffffffff, r0, 0x1) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000180)) pkey_mprotect(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x0, 0xffffffffffffffff) pkey_mprotect(&(0x7f0000ff4000/0x4000)=nil, 0x4000, 0x0, 0xffffffffffffffff) socket$inet_udp(0x2, 0x2, 0x0) getsockopt$inet_int(0xffffffffffffffff, 0x0, 0xe, 0x0, &(0x7f0000000280)) ioctl$sock_SIOCADDDLCI(0xffffffffffffffff, 0x8980, 0x0) ioctl$RTC_ALM_SET(r1, 0x40247007, 0x0) mmap$IORING_OFF_SQES(&(0x7f0000ff3000/0x2000)=nil, 0x2000, 0x2000002, 0x10, r1, 0x10000000) getsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, 0x0, 0x0) 12:31:01 executing program 6: ioctl$RTC_UIE_ON(0xffffffffffffffff, 0x7003) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000180)) 12:31:01 executing program 0: r0 = creat(&(0x7f0000000040)='./file0\x00', 0x0) r1 = creat(&(0x7f0000000040)='./file0\x00', 0x0) fallocate(r1, 0x0, 0x0, 0x8800000) fallocate(r1, 0x3, 0x0, 0x8000) fallocate(r0, 0x0, 0x300, 0x8800000) 12:31:01 executing program 3: openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x2, &(0x7f0000000080)=0x90, 0x4) bind$inet6(0xffffffffffffffff, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) connect$inet6(0xffffffffffffffff, &(0x7f0000000000)={0xa, 0x4e20, 0x7ddd, @empty, 0x20000}, 0x1c) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x8, &(0x7f0000002ec0), 0x4) sendmsg$inet6(0xffffffffffffffff, &(0x7f00000006c0)={0x0, 0x0, &(0x7f0000000540)=[{&(0x7f00000001c0)="cf", 0xfffffdef}], 0x1}, 0x10044001) recvfrom$inet6(0xffffffffffffffff, &(0x7f0000001e00)=""/4096, 0x1000, 0xcd08, 0x0, 0x0) connect$inet6(0xffffffffffffffff, &(0x7f0000000240)={0xa, 0x4e20, 0x10001, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02', 0x1}, 0x1c) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unlink(&(0x7f0000000080)='./file0\x00') r0 = syz_init_net_socket$802154_raw(0x24, 0x3, 0x0) sendmmsg$inet6(r0, &(0x7f0000004d00)=[{{0x0, 0x0, &(0x7f00000004c0)=[{&(0x7f0000000080)='K', 0x4c}], 0x1}}], 0x7ffff000, 0x0) 12:31:01 executing program 7: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {0x0, 0x0, 0x2100}], 0x0, &(0x7f0000000180)) 12:31:01 executing program 1: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000180)) symlinkat(&(0x7f00000000c0)='./file0\x00', r0, &(0x7f0000000140)='./file0\x00') getsockopt$inet_int(0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f0000000280)) ioctl$RTC_ALM_SET(0xffffffffffffffff, 0x40247007, 0x0) [ 1709.217032] ieee802154 phy0 wpan0: encryption failed: -22 [ 1709.220026] EXT4-fs (loop6): mounted filesystem without journal. Opts: ,errors=continue [ 1709.233337] EXT4-fs (loop1): mounted filesystem without journal. Opts: ,errors=continue [ 1709.267637] EXT4-fs error (device loop5): ext4_fill_super:4959: inode #2: comm syz-executor.5: iget: root inode unallocated [ 1709.270263] EXT4-fs (loop5): get root inode failed [ 1709.271207] EXT4-fs (loop5): mount failed [ 1709.288427] EXT4-fs error (device loop7): ext4_fill_super:4959: inode #2: comm syz-executor.7: iget: root inode unallocated [ 1709.290759] EXT4-fs (loop7): get root inode failed [ 1709.291642] EXT4-fs (loop7): mount failed 12:31:02 executing program 0: r0 = creat(&(0x7f0000000040)='./file0\x00', 0x0) r1 = creat(&(0x7f0000000040)='./file0\x00', 0x0) fallocate(r1, 0x0, 0x0, 0x8800000) fallocate(r1, 0x3, 0x0, 0x8000) fallocate(r0, 0x0, 0x321, 0x8800000) [ 1709.345340] EXT4-fs (loop2): unsupported inode size: 0 [ 1709.346564] EXT4-fs (loop2): blocksize: 2048 12:31:02 executing program 6: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000180)) 12:31:02 executing program 1: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000180)) symlinkat(&(0x7f00000000c0)='./file0\x00', r0, &(0x7f0000000140)='./file0\x00') getsockopt$inet_int(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) ioctl$RTC_ALM_SET(0xffffffffffffffff, 0x40247007, 0x0) 12:31:02 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600), 0x0, 0x2100}], 0x0, &(0x7f0000000180)) [ 1709.436320] EXT4-fs (loop4): mounted filesystem without journal. Opts: ,errors=continue 12:31:02 executing program 7: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {0x0, 0x0, 0x2100}], 0x0, &(0x7f0000000180)) [ 1709.505610] EXT4-fs (loop6): mounted filesystem without journal. Opts: ,errors=continue 12:31:02 executing program 3: openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x2, &(0x7f0000000080)=0x90, 0x4) bind$inet6(0xffffffffffffffff, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) connect$inet6(0xffffffffffffffff, &(0x7f0000000000)={0xa, 0x4e20, 0x7ddd, @empty, 0x20000}, 0x1c) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x8, &(0x7f0000002ec0), 0x4) sendmsg$inet6(0xffffffffffffffff, &(0x7f00000006c0)={0x0, 0x0, &(0x7f0000000540)=[{&(0x7f00000001c0)="cf", 0xfffffdef}], 0x1}, 0x10044001) recvfrom$inet6(0xffffffffffffffff, &(0x7f0000001e00)=""/4096, 0x1000, 0xcd08, 0x0, 0x0) connect$inet6(0xffffffffffffffff, &(0x7f0000000240)={0xa, 0x4e20, 0x10001, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02', 0x1}, 0x1c) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_init_net_socket$802154_raw(0x24, 0x3, 0x0) sendmmsg$inet6(r0, &(0x7f0000004d00)=[{{0x0, 0x0, &(0x7f00000004c0)=[{&(0x7f0000000080)='K', 0x4c}], 0x1}}], 0x7ffff000, 0x0) [ 1709.541512] EXT4-fs (loop1): mounted filesystem without journal. Opts: ,errors=continue 12:31:02 executing program 2: ioctl$RTC_UIE_ON(0xffffffffffffffff, 0x7003) r0 = perf_event_open(&(0x7f00000001c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x2}, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0xfffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = dup2(0xffffffffffffffff, r0) r2 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b00000000", 0x59, 0x400}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000180)) pkey_mprotect(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x0, 0xffffffffffffffff) pkey_mprotect(&(0x7f0000ff4000/0x4000)=nil, 0x4000, 0x0, 0xffffffffffffffff) symlinkat(&(0x7f00000000c0)='./file0\x00', r2, &(0x7f0000000140)='./file0\x00') socket$inet_udp(0x2, 0x2, 0x0) getsockopt$inet_int(0xffffffffffffffff, 0x0, 0xe, 0x0, &(0x7f0000000280)) ioctl$RTC_ALM_SET(r1, 0x40247007, 0x0) getsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, 0x0, 0x0) [ 1709.599969] EXT4-fs error (device loop5): ext4_fill_super:4959: inode #2: comm syz-executor.5: iget: root inode unallocated [ 1709.635459] ieee802154 phy0 wpan0: encryption failed: -22 [ 1709.637118] EXT4-fs (loop5): get root inode failed [ 1709.637668] EXT4-fs (loop5): mount failed 12:31:02 executing program 6: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000180)) 12:31:02 executing program 4: ioctl$RTC_UIE_ON(0xffffffffffffffff, 0x7003) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x2}, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0xfffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = dup2(0xffffffffffffffff, r0) perf_event_open(&(0x7f00000001c0)={0x2, 0x80, 0x8, 0x9, 0x4, 0x1, 0x0, 0x3b3d, 0x200a0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x2, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0xffff, 0x1, @perf_config_ext={0x7, 0x1}, 0x281, 0xffffffff, 0x4, 0x3, 0x401, 0xffffff47, 0x401, 0x0, 0x3, 0x0, 0x415}, 0x0, 0xffffffffffffffff, r0, 0x1) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000180)) pkey_mprotect(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x0, 0xffffffffffffffff) pkey_mprotect(&(0x7f0000ff4000/0x4000)=nil, 0x4000, 0x0, 0xffffffffffffffff) socket$inet_udp(0x2, 0x2, 0x0) getsockopt$inet_int(0xffffffffffffffff, 0x0, 0xe, 0x0, &(0x7f0000000280)) ioctl$sock_SIOCADDDLCI(0xffffffffffffffff, 0x8980, 0x0) ioctl$RTC_ALM_SET(r1, 0x40247007, 0x0) mmap$IORING_OFF_SQES(&(0x7f0000ff3000/0x2000)=nil, 0x2000, 0x2000002, 0x10, r1, 0x10000000) getsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, 0x0, 0x0) 12:31:02 executing program 1: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000180)) symlinkat(&(0x7f00000000c0)='./file0\x00', r0, &(0x7f0000000140)='./file0\x00') getsockopt$inet_int(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) ioctl$RTC_ALM_SET(0xffffffffffffffff, 0x40247007, 0x0) [ 1709.688533] EXT4-fs error (device loop7): ext4_fill_super:4959: inode #2: comm syz-executor.7: iget: root inode unallocated [ 1709.693792] EXT4-fs (loop7): get root inode failed [ 1709.694357] EXT4-fs (loop7): mount failed [ 1709.725466] EXT4-fs (loop2): unsupported inode size: 0 [ 1709.726315] EXT4-fs (loop2): blocksize: 2048 [ 1709.842168] EXT4-fs (loop4): mounted filesystem without journal. Opts: ,errors=continue [ 1709.882023] EXT4-fs (loop1): mounted filesystem without journal. Opts: ,errors=continue 12:31:20 executing program 3: openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x2, &(0x7f0000000080)=0x90, 0x4) bind$inet6(0xffffffffffffffff, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) connect$inet6(0xffffffffffffffff, &(0x7f0000000000)={0xa, 0x4e20, 0x7ddd, @empty, 0x20000}, 0x1c) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x8, &(0x7f0000002ec0), 0x4) sendmsg$inet6(0xffffffffffffffff, &(0x7f00000006c0)={0x0, 0x0, &(0x7f0000000540)=[{&(0x7f00000001c0)="cf", 0xfffffdef}], 0x1}, 0x10044001) recvfrom$inet6(0xffffffffffffffff, &(0x7f0000001e00)=""/4096, 0x1000, 0xcd08, 0x0, 0x0) connect$inet6(0xffffffffffffffff, &(0x7f0000000240)={0xa, 0x4e20, 0x10001, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02', 0x1}, 0x1c) r0 = syz_init_net_socket$802154_raw(0x24, 0x3, 0x0) sendmmsg$inet6(r0, &(0x7f0000004d00)=[{{0x0, 0x0, &(0x7f00000004c0)=[{&(0x7f0000000080)='K', 0x4c}], 0x1}}], 0x7ffff000, 0x0) 12:31:20 executing program 4: ioctl$RTC_UIE_ON(0xffffffffffffffff, 0x7003) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x2}, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0xfffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = dup2(0xffffffffffffffff, r0) perf_event_open(&(0x7f00000001c0)={0x2, 0x80, 0x8, 0x9, 0x4, 0x1, 0x0, 0x3b3d, 0x200a0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x2, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0xffff, 0x1, @perf_config_ext={0x7, 0x1}, 0x281, 0xffffffff, 0x4, 0x3, 0x401, 0xffffff47, 0x401, 0x0, 0x3, 0x0, 0x415}, 0x0, 0xffffffffffffffff, r0, 0x1) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000180)) pkey_mprotect(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x0, 0xffffffffffffffff) pkey_mprotect(&(0x7f0000ff4000/0x4000)=nil, 0x4000, 0x0, 0xffffffffffffffff) socket$inet_udp(0x2, 0x2, 0x0) getsockopt$inet_int(0xffffffffffffffff, 0x0, 0xe, 0x0, &(0x7f0000000280)) ioctl$sock_SIOCADDDLCI(0xffffffffffffffff, 0x8980, 0x0) ioctl$RTC_ALM_SET(r1, 0x40247007, 0x0) mmap$IORING_OFF_SQES(&(0x7f0000ff3000/0x2000)=nil, 0x2000, 0x2000002, 0x10, r1, 0x10000000) getsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, 0x0, 0x0) 12:31:20 executing program 7: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {0x0, 0x0, 0x2100}], 0x0, &(0x7f0000000180)) 12:31:20 executing program 2: ioctl$RTC_UIE_ON(0xffffffffffffffff, 0x7003) r0 = perf_event_open(&(0x7f00000001c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x2}, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0xfffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = dup2(0xffffffffffffffff, r0) r2 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b00000000", 0x59, 0x400}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000180)) pkey_mprotect(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x0, 0xffffffffffffffff) pkey_mprotect(&(0x7f0000ff4000/0x4000)=nil, 0x4000, 0x0, 0xffffffffffffffff) symlinkat(&(0x7f00000000c0)='./file0\x00', r2, &(0x7f0000000140)='./file0\x00') socket$inet_udp(0x2, 0x2, 0x0) getsockopt$inet_int(0xffffffffffffffff, 0x0, 0xe, 0x0, &(0x7f0000000280)) ioctl$RTC_ALM_SET(r1, 0x40247007, 0x0) getsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, 0x0, 0x0) 12:31:20 executing program 6: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000180)) 12:31:20 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600), 0x0, 0x2100}], 0x0, &(0x7f0000000180)) 12:31:20 executing program 1: ioctl$RTC_UIE_ON(0xffffffffffffffff, 0x7003) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x2}, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0xfffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000180)) 12:31:20 executing program 0: r0 = creat(&(0x7f0000000040)='./file0\x00', 0x0) r1 = creat(&(0x7f0000000040)='./file0\x00', 0x0) fallocate(r1, 0x0, 0x0, 0x8800000) fallocate(r1, 0x3, 0x0, 0x8000) fallocate(r0, 0x0, 0x500, 0x8800000) [ 1727.664684] EXT4-fs error (device loop5): ext4_fill_super:4959: inode #2: comm syz-executor.5: iget: root inode unallocated [ 1727.666192] EXT4-fs (loop5): get root inode failed [ 1727.666716] EXT4-fs (loop5): mount failed [ 1727.668850] ieee802154 phy0 wpan0: encryption failed: -22 12:31:20 executing program 0: r0 = creat(&(0x7f0000000040)='./file0\x00', 0x0) r1 = creat(&(0x7f0000000040)='./file0\x00', 0x0) fallocate(r1, 0x0, 0x0, 0x8800000) fallocate(r1, 0x3, 0x0, 0x8000) fallocate(r0, 0x0, 0x700, 0x8800000) [ 1727.732382] EXT4-fs error (device loop7): ext4_fill_super:4959: inode #2: comm syz-executor.7: iget: root inode unallocated [ 1727.736971] EXT4-fs (loop7): get root inode failed [ 1727.738147] EXT4-fs (loop7): mount failed [ 1727.738429] EXT4-fs (loop2): unsupported inode size: 0 [ 1727.740201] EXT4-fs (loop2): blocksize: 2048 [ 1727.764429] EXT4-fs (loop1): mounted filesystem without journal. Opts: ,errors=continue 12:31:20 executing program 3: openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x2, &(0x7f0000000080)=0x90, 0x4) bind$inet6(0xffffffffffffffff, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) connect$inet6(0xffffffffffffffff, &(0x7f0000000000)={0xa, 0x4e20, 0x7ddd, @empty, 0x20000}, 0x1c) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x8, &(0x7f0000002ec0), 0x4) sendmsg$inet6(0xffffffffffffffff, &(0x7f00000006c0)={0x0, 0x0, &(0x7f0000000540)=[{&(0x7f00000001c0)="cf", 0xfffffdef}], 0x1}, 0x10044001) recvfrom$inet6(0xffffffffffffffff, &(0x7f0000001e00)=""/4096, 0x1000, 0xcd08, 0x0, 0x0) connect$inet6(0xffffffffffffffff, &(0x7f0000000240)={0xa, 0x4e20, 0x10001, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02', 0x1}, 0x1c) r0 = syz_init_net_socket$802154_raw(0x24, 0x3, 0x0) sendmmsg$inet6(r0, &(0x7f0000004d00)=[{{0x0, 0x0, &(0x7f00000004c0)=[{&(0x7f0000000080)='K', 0x4c}], 0x1}}], 0x7ffff000, 0x0) 12:31:20 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f465", 0xf, 0x2100}], 0x0, &(0x7f0000000180)) 12:31:20 executing program 6: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000180)) [ 1727.783597] EXT4-fs (loop4): mounted filesystem without journal. Opts: ,errors=continue 12:31:20 executing program 7: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600), 0x0, 0x2100}], 0x0, &(0x7f0000000180)) 12:31:20 executing program 2: ioctl$RTC_UIE_ON(0xffffffffffffffff, 0x7003) r0 = perf_event_open(&(0x7f00000001c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x2}, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0xfffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = dup2(0xffffffffffffffff, r0) r2 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000180)) pkey_mprotect(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x0, 0xffffffffffffffff) pkey_mprotect(&(0x7f0000ff4000/0x4000)=nil, 0x4000, 0x0, 0xffffffffffffffff) symlinkat(&(0x7f00000000c0)='./file0\x00', r2, &(0x7f0000000140)='./file0\x00') socket$inet_udp(0x2, 0x2, 0x0) getsockopt$inet_int(0xffffffffffffffff, 0x0, 0xe, 0x0, &(0x7f0000000280)) ioctl$RTC_ALM_SET(r1, 0x40247007, 0x0) getsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, 0x0, 0x0) 12:31:20 executing program 4: ioctl$RTC_UIE_ON(0xffffffffffffffff, 0x7003) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x2}, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0xfffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = dup2(0xffffffffffffffff, r0) perf_event_open(&(0x7f00000001c0)={0x2, 0x80, 0x8, 0x9, 0x4, 0x1, 0x0, 0x3b3d, 0x200a0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x2, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0xffff, 0x1, @perf_config_ext={0x7, 0x1}, 0x281, 0xffffffff, 0x4, 0x3, 0x401, 0xffffff47, 0x401, 0x0, 0x3, 0x0, 0x415}, 0x0, 0xffffffffffffffff, r0, 0x1) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000180)) pkey_mprotect(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x0, 0xffffffffffffffff) pkey_mprotect(&(0x7f0000ff4000/0x4000)=nil, 0x4000, 0x0, 0xffffffffffffffff) socket$inet_udp(0x2, 0x2, 0x0) getsockopt$inet_int(0xffffffffffffffff, 0x0, 0xe, 0x0, &(0x7f0000000280)) ioctl$sock_SIOCADDDLCI(0xffffffffffffffff, 0x8980, 0x0) ioctl$RTC_ALM_SET(r1, 0x40247007, 0x0) mmap$IORING_OFF_SQES(&(0x7f0000ff3000/0x2000)=nil, 0x2000, 0x2000002, 0x10, r1, 0x10000000) getsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, 0x0, 0x0) [ 1727.930598] ieee802154 phy0 wpan0: encryption failed: -22 [ 1728.005004] EXT4-fs error (device loop5): ext4_fill_super:4959: inode #2: comm syz-executor.5: iget: root inode unallocated [ 1728.024934] EXT4-fs (loop5): get root inode failed [ 1728.026129] EXT4-fs (loop5): mount failed [ 1728.135031] EXT4-fs (loop2): VFS: Can't find ext4 filesystem [ 1728.148521] EXT4-fs (loop4): mounted filesystem without journal. Opts: ,errors=continue 12:31:38 executing program 2: ioctl$RTC_UIE_ON(0xffffffffffffffff, 0x7003) r0 = perf_event_open(&(0x7f00000001c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x2}, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0xfffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = dup2(0xffffffffffffffff, r0) r2 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000180)) pkey_mprotect(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x0, 0xffffffffffffffff) pkey_mprotect(&(0x7f0000ff4000/0x4000)=nil, 0x4000, 0x0, 0xffffffffffffffff) symlinkat(&(0x7f00000000c0)='./file0\x00', r2, &(0x7f0000000140)='./file0\x00') socket$inet_udp(0x2, 0x2, 0x0) getsockopt$inet_int(0xffffffffffffffff, 0x0, 0xe, 0x0, &(0x7f0000000280)) ioctl$RTC_ALM_SET(r1, 0x40247007, 0x0) getsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, 0x0, 0x0) 12:31:38 executing program 4: ioctl$RTC_UIE_ON(0xffffffffffffffff, 0x7003) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x2}, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0xfffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = dup2(0xffffffffffffffff, r0) perf_event_open(&(0x7f00000001c0)={0x2, 0x80, 0x8, 0x9, 0x4, 0x1, 0x0, 0x3b3d, 0x200a0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x2, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, @perf_config_ext={0x7, 0x1}, 0x281, 0xffffffff, 0x4, 0x3, 0x401, 0xffffff47, 0x401, 0x0, 0x3, 0x0, 0x415}, 0x0, 0xffffffffffffffff, r0, 0x1) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000180)) pkey_mprotect(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x0, 0xffffffffffffffff) pkey_mprotect(&(0x7f0000ff4000/0x4000)=nil, 0x4000, 0x0, 0xffffffffffffffff) socket$inet_udp(0x2, 0x2, 0x0) getsockopt$inet_int(0xffffffffffffffff, 0x0, 0xe, 0x0, &(0x7f0000000280)) ioctl$sock_SIOCADDDLCI(0xffffffffffffffff, 0x8980, 0x0) ioctl$RTC_ALM_SET(r1, 0x40247007, 0x0) mmap$IORING_OFF_SQES(&(0x7f0000ff3000/0x2000)=nil, 0x2000, 0x2000002, 0x10, r1, 0x10000000) getsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, 0x0, 0x0) 12:31:38 executing program 1: ioctl$RTC_UIE_ON(0xffffffffffffffff, 0x7003) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x2}, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0xfffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000180)) 12:31:38 executing program 6: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', 0x0, 0x0, 0x4, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000180)) 12:31:38 executing program 0: r0 = creat(&(0x7f0000000040)='./file0\x00', 0x0) r1 = creat(&(0x7f0000000040)='./file0\x00', 0x0) fallocate(r1, 0x0, 0x0, 0x8800000) fallocate(r1, 0x3, 0x0, 0x8000) fallocate(r0, 0x0, 0xc01, 0x8800000) 12:31:38 executing program 7: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600), 0x0, 0x2100}], 0x0, &(0x7f0000000180)) 12:31:38 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f465", 0xf, 0x2100}], 0x0, &(0x7f0000000180)) 12:31:38 executing program 3: openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x2, &(0x7f0000000080)=0x90, 0x4) bind$inet6(0xffffffffffffffff, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) connect$inet6(0xffffffffffffffff, &(0x7f0000000000)={0xa, 0x4e20, 0x7ddd, @empty, 0x20000}, 0x1c) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x8, &(0x7f0000002ec0), 0x4) sendmsg$inet6(0xffffffffffffffff, &(0x7f00000006c0)={0x0, 0x0, &(0x7f0000000540)=[{&(0x7f00000001c0)="cf", 0xfffffdef}], 0x1}, 0x10044001) recvfrom$inet6(0xffffffffffffffff, &(0x7f0000001e00)=""/4096, 0x1000, 0xcd08, 0x0, 0x0) connect$inet6(0xffffffffffffffff, &(0x7f0000000240)={0xa, 0x4e20, 0x10001, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02', 0x1}, 0x1c) r0 = syz_init_net_socket$802154_raw(0x24, 0x3, 0x0) sendmmsg$inet6(r0, &(0x7f0000004d00)=[{{0x0, 0x0, &(0x7f00000004c0)=[{&(0x7f0000000080)='K', 0x4c}], 0x1}}], 0x7ffff000, 0x0) [ 1745.915383] EXT4-fs error (device loop5): ext4_fill_super:4959: inode #2: comm syz-executor.5: iget: root inode unallocated [ 1745.919140] EXT4-fs (loop5): get root inode failed [ 1745.920336] EXT4-fs (loop5): mount failed [ 1745.978457] ieee802154 phy0 wpan0: encryption failed: -22 [ 1746.035473] EXT4-fs error (device loop7): ext4_fill_super:4959: inode #2: comm syz-executor.7: iget: root inode unallocated 12:31:38 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f465", 0xf, 0x2100}], 0x0, &(0x7f0000000180)) [ 1746.043505] EXT4-fs (loop2): VFS: Can't find ext4 filesystem [ 1746.052450] EXT4-fs (loop7): get root inode failed [ 1746.053707] EXT4-fs (loop7): mount failed 12:31:38 executing program 0: r0 = creat(&(0x7f0000000040)='./file0\x00', 0x0) r1 = creat(&(0x7f0000000040)='./file0\x00', 0x0) fallocate(r1, 0x0, 0x0, 0x8800000) fallocate(r1, 0x3, 0x0, 0x8000) fallocate(r0, 0x0, 0xd00, 0x8800000) 12:31:38 executing program 6: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', 0x0, 0x0, 0x4, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000180)) [ 1746.146613] EXT4-fs (loop4): mounted filesystem without journal. Opts: ,errors=continue [ 1746.163346] EXT4-fs (loop1): mounted filesystem without journal. Opts: ,errors=continue 12:31:56 executing program 3: openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x2, &(0x7f0000000080)=0x90, 0x4) bind$inet6(0xffffffffffffffff, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) connect$inet6(0xffffffffffffffff, &(0x7f0000000000)={0xa, 0x4e20, 0x7ddd, @empty, 0x20000}, 0x1c) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x8, &(0x7f0000002ec0), 0x4) sendmsg$inet6(0xffffffffffffffff, &(0x7f00000006c0)={0x0, 0x0, &(0x7f0000000540)=[{&(0x7f00000001c0)="cf", 0xfffffdef}], 0x1}, 0x10044001) recvfrom$inet6(0xffffffffffffffff, &(0x7f0000001e00)=""/4096, 0x1000, 0xcd08, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_init_net_socket$802154_raw(0x24, 0x3, 0x0) sendmmsg$inet6(r0, &(0x7f0000004d00)=[{{0x0, 0x0, &(0x7f00000004c0)=[{&(0x7f0000000080)='K', 0x4c}], 0x1}}], 0x7ffff000, 0x0) 12:31:56 executing program 2: ioctl$RTC_UIE_ON(0xffffffffffffffff, 0x7003) r0 = perf_event_open(&(0x7f00000001c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x2}, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0xfffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = dup2(0xffffffffffffffff, r0) r2 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000180)) pkey_mprotect(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x0, 0xffffffffffffffff) pkey_mprotect(&(0x7f0000ff4000/0x4000)=nil, 0x4000, 0x0, 0xffffffffffffffff) symlinkat(&(0x7f00000000c0)='./file0\x00', r2, &(0x7f0000000140)='./file0\x00') socket$inet_udp(0x2, 0x2, 0x0) getsockopt$inet_int(0xffffffffffffffff, 0x0, 0xe, 0x0, &(0x7f0000000280)) ioctl$RTC_ALM_SET(r1, 0x40247007, 0x0) getsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, 0x0, 0x0) 12:31:56 executing program 0: r0 = creat(&(0x7f0000000040)='./file0\x00', 0x0) r1 = creat(&(0x7f0000000040)='./file0\x00', 0x0) fallocate(r1, 0x0, 0x0, 0x8800000) fallocate(r1, 0x3, 0x0, 0x8000) fallocate(r0, 0x0, 0x1200, 0x8800000) 12:31:56 executing program 6: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', 0x0, 0x0, 0x4, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000180)) 12:31:56 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f0000", 0x16, 0x2100}], 0x0, &(0x7f0000000180)) 12:31:56 executing program 4: ioctl$RTC_UIE_ON(0xffffffffffffffff, 0x7003) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x2}, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0xfffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = dup2(0xffffffffffffffff, r0) perf_event_open(&(0x7f00000001c0)={0x2, 0x80, 0x8, 0x9, 0x4, 0x1, 0x0, 0x3b3d, 0x200a0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x2, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, @perf_config_ext={0x7, 0x1}, 0x281, 0xffffffff, 0x4, 0x3, 0x401, 0xffffff47, 0x401, 0x0, 0x3, 0x0, 0x415}, 0x0, 0xffffffffffffffff, r0, 0x1) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000180)) pkey_mprotect(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x0, 0xffffffffffffffff) pkey_mprotect(&(0x7f0000ff4000/0x4000)=nil, 0x4000, 0x0, 0xffffffffffffffff) socket$inet_udp(0x2, 0x2, 0x0) getsockopt$inet_int(0xffffffffffffffff, 0x0, 0xe, 0x0, &(0x7f0000000280)) ioctl$sock_SIOCADDDLCI(0xffffffffffffffff, 0x8980, 0x0) ioctl$RTC_ALM_SET(r1, 0x40247007, 0x0) mmap$IORING_OFF_SQES(&(0x7f0000ff3000/0x2000)=nil, 0x2000, 0x2000002, 0x10, r1, 0x10000000) getsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, 0x0, 0x0) 12:31:56 executing program 1: ioctl$RTC_UIE_ON(0xffffffffffffffff, 0x7003) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x2}, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0xfffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000180)) 12:31:56 executing program 7: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600), 0x0, 0x2100}], 0x0, &(0x7f0000000180)) [ 1763.298223] ieee802154 phy0 wpan0: encryption failed: -22 12:31:56 executing program 6: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000180)) [ 1763.335719] EXT4-fs error (device loop7): ext4_fill_super:4959: inode #2: comm syz-executor.7: iget: root inode unallocated [ 1763.339964] EXT4-fs (loop7): get root inode failed [ 1763.340749] EXT4-fs (loop7): mount failed [ 1763.387327] EXT4-fs error (device loop5): ext4_fill_super:4959: inode #2: comm syz-executor.5: iget: root inode unallocated [ 1763.391714] EXT4-fs (loop5): get root inode failed [ 1763.392732] EXT4-fs (loop5): mount failed 12:31:56 executing program 0: r0 = creat(&(0x7f0000000040)='./file0\x00', 0x0) r1 = creat(&(0x7f0000000040)='./file0\x00', 0x0) fallocate(r1, 0x0, 0x0, 0x8800000) fallocate(r1, 0x3, 0x0, 0x8000) fallocate(r0, 0x0, 0x2000, 0x8800000) 12:31:56 executing program 3: openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x2, &(0x7f0000000080)=0x90, 0x4) bind$inet6(0xffffffffffffffff, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) connect$inet6(0xffffffffffffffff, &(0x7f0000000000)={0xa, 0x4e20, 0x7ddd, @empty, 0x20000}, 0x1c) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x8, &(0x7f0000002ec0), 0x4) sendmsg$inet6(0xffffffffffffffff, &(0x7f00000006c0)={0x0, 0x0, &(0x7f0000000540)=[{&(0x7f00000001c0)="cf", 0xfffffdef}], 0x1}, 0x10044001) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_init_net_socket$802154_raw(0x24, 0x3, 0x0) sendmmsg$inet6(r0, &(0x7f0000004d00)=[{{0x0, 0x0, &(0x7f00000004c0)=[{&(0x7f0000000080)='K', 0x4c}], 0x1}}], 0x7ffff000, 0x0) [ 1763.457712] EXT4-fs (loop2): VFS: Can't find ext4 filesystem 12:31:56 executing program 7: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f465", 0xf, 0x2100}], 0x0, &(0x7f0000000180)) 12:31:56 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f0000", 0x16, 0x2100}], 0x0, &(0x7f0000000180)) [ 1763.473579] EXT4-fs (loop4): mounted filesystem without journal. Opts: ,errors=continue [ 1763.488751] EXT4-fs (loop1): mounted filesystem without journal. Opts: ,errors=continue 12:31:56 executing program 6: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000180)) 12:31:56 executing program 4: ioctl$RTC_UIE_ON(0xffffffffffffffff, 0x7003) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x2}, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0xfffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = dup2(0xffffffffffffffff, r0) perf_event_open(&(0x7f00000001c0)={0x2, 0x80, 0x8, 0x9, 0x4, 0x1, 0x0, 0x3b3d, 0x200a0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x2, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, @perf_config_ext={0x7, 0x1}, 0x281, 0xffffffff, 0x4, 0x3, 0x401, 0xffffff47, 0x401, 0x0, 0x3, 0x0, 0x415}, 0x0, 0xffffffffffffffff, r0, 0x1) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000180)) pkey_mprotect(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x0, 0xffffffffffffffff) pkey_mprotect(&(0x7f0000ff4000/0x4000)=nil, 0x4000, 0x0, 0xffffffffffffffff) socket$inet_udp(0x2, 0x2, 0x0) getsockopt$inet_int(0xffffffffffffffff, 0x0, 0xe, 0x0, &(0x7f0000000280)) ioctl$sock_SIOCADDDLCI(0xffffffffffffffff, 0x8980, 0x0) ioctl$RTC_ALM_SET(r1, 0x40247007, 0x0) mmap$IORING_OFF_SQES(&(0x7f0000ff3000/0x2000)=nil, 0x2000, 0x2000002, 0x10, r1, 0x10000000) getsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, 0x0, 0x0) 12:31:56 executing program 2: ioctl$RTC_UIE_ON(0xffffffffffffffff, 0x7003) r0 = perf_event_open(&(0x7f00000001c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x2}, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0xfffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = dup2(0xffffffffffffffff, r0) r2 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, 0x0) pkey_mprotect(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x0, 0xffffffffffffffff) pkey_mprotect(&(0x7f0000ff4000/0x4000)=nil, 0x4000, 0x0, 0xffffffffffffffff) symlinkat(&(0x7f00000000c0)='./file0\x00', r2, &(0x7f0000000140)='./file0\x00') socket$inet_udp(0x2, 0x2, 0x0) getsockopt$inet_int(0xffffffffffffffff, 0x0, 0xe, 0x0, &(0x7f0000000280)) ioctl$RTC_ALM_SET(r1, 0x40247007, 0x0) getsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, 0x0, 0x0) [ 1763.578420] ieee802154 phy0 wpan0: encryption failed: -22 12:31:56 executing program 1: ioctl$RTC_UIE_ON(0xffffffffffffffff, 0x7003) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000180)) 12:31:56 executing program 0: r0 = creat(&(0x7f0000000040)='./file0\x00', 0x0) r1 = creat(&(0x7f0000000040)='./file0\x00', 0x0) fallocate(r1, 0x0, 0x0, 0x8800000) fallocate(r1, 0x3, 0x0, 0x8000) fallocate(r0, 0x0, 0x2103, 0x8800000) 12:31:56 executing program 3: openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x2, &(0x7f0000000080)=0x90, 0x4) bind$inet6(0xffffffffffffffff, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) connect$inet6(0xffffffffffffffff, &(0x7f0000000000)={0xa, 0x4e20, 0x7ddd, @empty, 0x20000}, 0x1c) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x8, &(0x7f0000002ec0), 0x4) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_init_net_socket$802154_raw(0x24, 0x3, 0x0) sendmmsg$inet6(r0, &(0x7f0000004d00)=[{{0x0, 0x0, &(0x7f00000004c0)=[{&(0x7f0000000080)='K', 0x4c}], 0x1}}], 0x7ffff000, 0x0) 12:31:56 executing program 6: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000180)) [ 1763.755060] EXT4-fs error (device loop7): ext4_fill_super:4959: inode #2: comm syz-executor.7: iget: root inode unallocated [ 1763.757204] EXT4-fs (loop7): get root inode failed [ 1763.757759] EXT4-fs (loop7): mount failed [ 1763.771743] EXT4-fs error (device loop5): ext4_fill_super:4959: inode #2: comm syz-executor.5: iget: root inode unallocated [ 1763.773655] EXT4-fs (loop5): get root inode failed [ 1763.774272] EXT4-fs (loop5): mount failed 12:31:56 executing program 7: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f465", 0xf, 0x2100}], 0x0, &(0x7f0000000180)) [ 1763.810799] EXT4-fs (loop4): mounted filesystem without journal. Opts: ,errors=continue [ 1763.862463] ieee802154 phy0 wpan0: encryption failed: -22 [ 1763.908441] EXT4-fs (loop1): mounted filesystem without journal. Opts: ,errors=continue [ 1764.047491] EXT4-fs error (device loop7): ext4_fill_super:4959: inode #2: comm syz-executor.7: iget: root inode unallocated [ 1764.049747] EXT4-fs (loop7): get root inode failed [ 1764.050312] EXT4-fs (loop7): mount failed 12:32:14 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f0000", 0x16, 0x2100}], 0x0, &(0x7f0000000180)) 12:32:14 executing program 7: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f465", 0xf, 0x2100}], 0x0, &(0x7f0000000180)) 12:32:14 executing program 3: openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x2, &(0x7f0000000080)=0x90, 0x4) bind$inet6(0xffffffffffffffff, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) connect$inet6(0xffffffffffffffff, &(0x7f0000000000)={0xa, 0x4e20, 0x7ddd, @empty, 0x20000}, 0x1c) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_init_net_socket$802154_raw(0x24, 0x3, 0x0) sendmmsg$inet6(r0, &(0x7f0000004d00)=[{{0x0, 0x0, &(0x7f00000004c0)=[{&(0x7f0000000080)='K', 0x4c}], 0x1}}], 0x7ffff000, 0x0) 12:32:14 executing program 2: ioctl$RTC_UIE_ON(0xffffffffffffffff, 0x7003) r0 = perf_event_open(&(0x7f00000001c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x2}, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0xfffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = dup2(0xffffffffffffffff, r0) r2 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, 0x0) pkey_mprotect(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x0, 0xffffffffffffffff) pkey_mprotect(&(0x7f0000ff4000/0x4000)=nil, 0x4000, 0x0, 0xffffffffffffffff) symlinkat(&(0x7f00000000c0)='./file0\x00', r2, &(0x7f0000000140)='./file0\x00') socket$inet_udp(0x2, 0x2, 0x0) getsockopt$inet_int(0xffffffffffffffff, 0x0, 0xe, 0x0, &(0x7f0000000280)) ioctl$RTC_ALM_SET(r1, 0x40247007, 0x0) getsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, 0x0, 0x0) 12:32:14 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000180)) 12:32:14 executing program 6: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}], 0x0, &(0x7f0000000180)) 12:32:14 executing program 4: ioctl$RTC_UIE_ON(0xffffffffffffffff, 0x7003) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x2}, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0xfffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = dup2(0xffffffffffffffff, r0) perf_event_open(&(0x7f00000001c0)={0x2, 0x80, 0x8, 0x9, 0x4, 0x1, 0x0, 0x3b3d, 0x200a0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x2, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0xffff, 0x0, @perf_config_ext={0x7, 0x1}, 0x281, 0xffffffff, 0x4, 0x3, 0x401, 0xffffff47, 0x401, 0x0, 0x3, 0x0, 0x415}, 0x0, 0xffffffffffffffff, r0, 0x1) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000180)) pkey_mprotect(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x0, 0xffffffffffffffff) pkey_mprotect(&(0x7f0000ff4000/0x4000)=nil, 0x4000, 0x0, 0xffffffffffffffff) socket$inet_udp(0x2, 0x2, 0x0) getsockopt$inet_int(0xffffffffffffffff, 0x0, 0xe, 0x0, &(0x7f0000000280)) ioctl$sock_SIOCADDDLCI(0xffffffffffffffff, 0x8980, 0x0) ioctl$RTC_ALM_SET(r1, 0x40247007, 0x0) mmap$IORING_OFF_SQES(&(0x7f0000ff3000/0x2000)=nil, 0x2000, 0x2000002, 0x10, r1, 0x10000000) getsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, 0x0, 0x0) 12:32:14 executing program 0: r0 = creat(&(0x7f0000000040)='./file0\x00', 0x0) r1 = creat(&(0x7f0000000040)='./file0\x00', 0x0) fallocate(r1, 0x0, 0x0, 0x8800000) fallocate(r1, 0x3, 0x0, 0x8000) fallocate(r0, 0x0, 0x6400, 0x8800000) [ 1781.965370] ieee802154 phy0 wpan0: encryption failed: -22 [ 1781.982430] EXT4-fs error (device loop5): ext4_fill_super:4959: inode #2: comm syz-executor.5: iget: root inode unallocated [ 1781.987237] EXT4-fs (loop5): get root inode failed [ 1781.988465] EXT4-fs (loop5): mount failed [ 1782.005229] EXT4-fs error (device loop6): ext4_fill_super:4959: inode #2: comm syz-executor.6: iget: root inode unallocated [ 1782.011328] EXT4-fs (loop6): get root inode failed [ 1782.012449] EXT4-fs (loop6): mount failed [ 1782.035336] EXT4-fs error (device loop7): ext4_fill_super:4959: inode #2: comm syz-executor.7: iget: root inode unallocated [ 1782.041939] EXT4-fs (loop7): get root inode failed [ 1782.042546] EXT4-fs (loop7): mount failed 12:32:14 executing program 0: r0 = creat(&(0x7f0000000040)='./file0\x00', 0x0) r1 = creat(&(0x7f0000000040)='./file0\x00', 0x0) fallocate(r1, 0x0, 0x0, 0x8800000) fallocate(r1, 0x3, 0x0, 0x8000) fallocate(r0, 0x0, 0x8102, 0x8800000) 12:32:14 executing program 3: openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x2, &(0x7f0000000080)=0x90, 0x4) bind$inet6(0xffffffffffffffff, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_init_net_socket$802154_raw(0x24, 0x3, 0x0) sendmmsg$inet6(r0, &(0x7f0000004d00)=[{{0x0, 0x0, &(0x7f00000004c0)=[{&(0x7f0000000080)='K', 0x4c}], 0x1}}], 0x7ffff000, 0x0) [ 1782.075831] EXT4-fs (loop1): mounted filesystem without journal. Opts: ,errors=continue 12:32:14 executing program 7: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f0000", 0x16, 0x2100}], 0x0, &(0x7f0000000180)) 12:32:14 executing program 1: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000180)) [ 1782.132734] EXT4-fs (loop4): mounted filesystem without journal. Opts: ,errors=continue 12:32:14 executing program 2: ioctl$RTC_UIE_ON(0xffffffffffffffff, 0x7003) r0 = perf_event_open(&(0x7f00000001c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x2}, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0xfffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = dup2(0xffffffffffffffff, r0) r2 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, 0x0) pkey_mprotect(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x0, 0xffffffffffffffff) pkey_mprotect(&(0x7f0000ff4000/0x4000)=nil, 0x4000, 0x0, 0xffffffffffffffff) symlinkat(&(0x7f00000000c0)='./file0\x00', r2, &(0x7f0000000140)='./file0\x00') socket$inet_udp(0x2, 0x2, 0x0) getsockopt$inet_int(0xffffffffffffffff, 0x0, 0xe, 0x0, &(0x7f0000000280)) ioctl$RTC_ALM_SET(r1, 0x40247007, 0x0) getsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, 0x0, 0x0) 12:32:14 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000", 0x1a, 0x2100}], 0x0, &(0x7f0000000180)) 12:32:14 executing program 6: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}], 0x0, &(0x7f0000000180)) [ 1782.281599] ieee802154 phy0 wpan0: encryption failed: -22 [ 1782.387045] EXT4-fs error (device loop7): ext4_fill_super:4959: inode #2: comm syz-executor.7: iget: root inode unallocated [ 1782.389708] EXT4-fs (loop7): get root inode failed [ 1782.390800] EXT4-fs (loop7): mount failed [ 1782.404296] EXT4-fs error (device loop6): ext4_fill_super:4959: inode #2: comm syz-executor.6: iget: root inode unallocated [ 1782.407759] EXT4-fs error (device loop5): ext4_fill_super:4959: inode #2: comm syz-executor.5: iget: root inode unallocated [ 1782.410523] EXT4-fs (loop6): get root inode failed [ 1782.412073] EXT4-fs (loop6): mount failed [ 1782.422839] EXT4-fs (loop5): get root inode failed [ 1782.423807] EXT4-fs (loop5): mount failed 12:32:32 executing program 7: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f0000", 0x16, 0x2100}], 0x0, &(0x7f0000000180)) 12:32:32 executing program 4: ioctl$RTC_UIE_ON(0xffffffffffffffff, 0x7003) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x2}, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0xfffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = dup2(0xffffffffffffffff, r0) perf_event_open(&(0x7f00000001c0)={0x2, 0x80, 0x8, 0x9, 0x4, 0x1, 0x0, 0x3b3d, 0x200a0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x2, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0xffff, 0x0, @perf_config_ext={0x7, 0x1}, 0x281, 0xffffffff, 0x4, 0x3, 0x401, 0xffffff47, 0x401, 0x0, 0x3, 0x0, 0x415}, 0x0, 0xffffffffffffffff, r0, 0x1) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000180)) pkey_mprotect(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x0, 0xffffffffffffffff) pkey_mprotect(&(0x7f0000ff4000/0x4000)=nil, 0x4000, 0x0, 0xffffffffffffffff) socket$inet_udp(0x2, 0x2, 0x0) getsockopt$inet_int(0xffffffffffffffff, 0x0, 0xe, 0x0, &(0x7f0000000280)) ioctl$sock_SIOCADDDLCI(0xffffffffffffffff, 0x8980, 0x0) ioctl$RTC_ALM_SET(r1, 0x40247007, 0x0) mmap$IORING_OFF_SQES(&(0x7f0000ff3000/0x2000)=nil, 0x2000, 0x2000002, 0x10, r1, 0x10000000) getsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, 0x0, 0x0) 12:32:32 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000", 0x1a, 0x2100}], 0x0, &(0x7f0000000180)) 12:32:32 executing program 2: ioctl$RTC_UIE_ON(0xffffffffffffffff, 0x7003) r0 = perf_event_open(&(0x7f00000001c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x2}, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0xfffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = dup2(0xffffffffffffffff, r0) r2 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000180)) pkey_mprotect(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x0, 0xffffffffffffffff) pkey_mprotect(&(0x7f0000ff4000/0x4000)=nil, 0x4000, 0x0, 0xffffffffffffffff) symlinkat(0x0, r2, &(0x7f0000000140)='./file0\x00') socket$inet_udp(0x2, 0x2, 0x0) getsockopt$inet_int(0xffffffffffffffff, 0x0, 0xe, 0x0, &(0x7f0000000280)) ioctl$RTC_ALM_SET(r1, 0x40247007, 0x0) getsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, 0x0, 0x0) 12:32:32 executing program 0: r0 = creat(&(0x7f0000000040)='./file0\x00', 0x0) r1 = creat(&(0x7f0000000040)='./file0\x00', 0x0) fallocate(r1, 0x0, 0x0, 0x8800000) fallocate(r1, 0x3, 0x0, 0x8000) fallocate(r0, 0x0, 0xff01, 0x8800000) 12:32:32 executing program 1: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000180)) 12:32:32 executing program 3: openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x2, &(0x7f0000000080)=0x90, 0x4) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_init_net_socket$802154_raw(0x24, 0x3, 0x0) sendmmsg$inet6(r0, &(0x7f0000004d00)=[{{0x0, 0x0, &(0x7f00000004c0)=[{&(0x7f0000000080)='K', 0x4c}], 0x1}}], 0x7ffff000, 0x0) 12:32:32 executing program 6: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}], 0x0, &(0x7f0000000180)) [ 1799.519929] EXT4-fs error (device loop7): ext4_fill_super:4959: inode #2: comm syz-executor.7: iget: root inode unallocated [ 1799.526205] EXT4-fs (loop7): get root inode failed [ 1799.527361] EXT4-fs (loop7): mount failed [ 1799.530712] ieee802154 phy0 wpan0: encryption failed: -22 [ 1799.561236] EXT4-fs error (device loop5): ext4_fill_super:4959: inode #2: comm syz-executor.5: iget: root inode unallocated [ 1799.572669] EXT4-fs error (device loop6): ext4_fill_super:4959: inode #2: comm syz-executor.6: iget: root inode unallocated [ 1799.580037] EXT4-fs (loop5): get root inode failed [ 1799.581385] EXT4-fs (loop5): mount failed [ 1799.586007] EXT4-fs (loop6): get root inode failed [ 1799.587343] EXT4-fs (loop6): mount failed 12:32:32 executing program 1: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000180)) 12:32:32 executing program 7: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f0000", 0x16, 0x2100}], 0x0, &(0x7f0000000180)) [ 1799.664254] EXT4-fs (loop4): mounted filesystem without journal. Opts: ,errors=continue 12:32:32 executing program 6: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {0x0, 0x0, 0x2100}], 0x0, &(0x7f0000000180)) 12:32:32 executing program 0: r0 = creat(&(0x7f0000000040)='./file0\x00', 0x0) r1 = creat(&(0x7f0000000040)='./file0\x00', 0x0) fallocate(r1, 0x0, 0x0, 0x8800000) fallocate(r1, 0x3, 0x0, 0x8000) fallocate(r0, 0x0, 0xff07, 0x8800000) 12:32:32 executing program 3: openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_init_net_socket$802154_raw(0x24, 0x3, 0x0) sendmmsg$inet6(r0, &(0x7f0000004d00)=[{{0x0, 0x0, &(0x7f00000004c0)=[{&(0x7f0000000080)='K', 0x4c}], 0x1}}], 0x7ffff000, 0x0) [ 1799.739416] EXT4-fs (loop2): mounted filesystem without journal. Opts: ,errors=continue 12:32:32 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000", 0x1a, 0x2100}], 0x0, &(0x7f0000000180)) 12:32:32 executing program 4: ioctl$RTC_UIE_ON(0xffffffffffffffff, 0x7003) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x2}, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0xfffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = dup2(0xffffffffffffffff, r0) perf_event_open(&(0x7f00000001c0)={0x2, 0x80, 0x8, 0x9, 0x4, 0x1, 0x0, 0x3b3d, 0x200a0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x2, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0xffff, 0x0, @perf_config_ext={0x7, 0x1}, 0x281, 0xffffffff, 0x4, 0x3, 0x401, 0xffffff47, 0x401, 0x0, 0x3, 0x0, 0x415}, 0x0, 0xffffffffffffffff, r0, 0x1) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000180)) pkey_mprotect(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x0, 0xffffffffffffffff) pkey_mprotect(&(0x7f0000ff4000/0x4000)=nil, 0x4000, 0x0, 0xffffffffffffffff) socket$inet_udp(0x2, 0x2, 0x0) getsockopt$inet_int(0xffffffffffffffff, 0x0, 0xe, 0x0, &(0x7f0000000280)) ioctl$sock_SIOCADDDLCI(0xffffffffffffffff, 0x8980, 0x0) ioctl$RTC_ALM_SET(r1, 0x40247007, 0x0) mmap$IORING_OFF_SQES(&(0x7f0000ff3000/0x2000)=nil, 0x2000, 0x2000002, 0x10, r1, 0x10000000) getsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, 0x0, 0x0) 12:32:32 executing program 2: ioctl$RTC_UIE_ON(0xffffffffffffffff, 0x7003) r0 = perf_event_open(&(0x7f00000001c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x2}, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0xfffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = dup2(0xffffffffffffffff, r0) r2 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000180)) pkey_mprotect(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x0, 0xffffffffffffffff) pkey_mprotect(&(0x7f0000ff4000/0x4000)=nil, 0x4000, 0x0, 0xffffffffffffffff) symlinkat(0x0, r2, &(0x7f0000000140)='./file0\x00') socket$inet_udp(0x2, 0x2, 0x0) getsockopt$inet_int(0xffffffffffffffff, 0x0, 0xe, 0x0, &(0x7f0000000280)) ioctl$RTC_ALM_SET(r1, 0x40247007, 0x0) getsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, 0x0, 0x0) [ 1799.932472] ieee802154 phy0 wpan0: encryption failed: -22 [ 1799.938545] EXT4-fs error (device loop7): ext4_fill_super:4959: inode #2: comm syz-executor.7: iget: root inode unallocated [ 1799.942060] EXT4-fs (loop7): get root inode failed [ 1799.943261] EXT4-fs (loop7): mount failed [ 1799.960172] EXT4-fs error (device loop6): ext4_fill_super:4959: inode #2: comm syz-executor.6: iget: root inode unallocated [ 1799.963144] EXT4-fs error (device loop5): ext4_fill_super:4959: inode #2: comm syz-executor.5: iget: root inode unallocated [ 1799.970657] EXT4-fs (loop5): get root inode failed [ 1799.971881] EXT4-fs (loop5): mount failed [ 1799.989378] EXT4-fs (loop6): get root inode failed [ 1799.990643] EXT4-fs (loop6): mount failed [ 1800.173792] EXT4-fs (loop2): mounted filesystem without journal. Opts: ,errors=continue [ 1800.200614] EXT4-fs (loop4): mounted filesystem without journal. Opts: ,errors=continue 12:32:47 executing program 0: r0 = creat(&(0x7f0000000040)='./file0\x00', 0x0) r1 = creat(&(0x7f0000000040)='./file0\x00', 0x0) fallocate(r1, 0x0, 0x0, 0x8800000) fallocate(r1, 0x3, 0x0, 0x8000) fallocate(r0, 0x0, 0x58000, 0x8800000) 12:32:47 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', 0x0, 0x0, 0x4, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000180)) 12:32:47 executing program 4: ioctl$RTC_UIE_ON(0xffffffffffffffff, 0x7003) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x2}, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0xfffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = dup2(0xffffffffffffffff, r0) perf_event_open(&(0x7f00000001c0)={0x2, 0x80, 0x8, 0x9, 0x4, 0x1, 0x0, 0x3b3d, 0x200a0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x2, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0xffff, 0x1, @perf_config_ext={0x0, 0x1}, 0x281, 0xffffffff, 0x4, 0x3, 0x401, 0xffffff47, 0x401, 0x0, 0x3, 0x0, 0x415}, 0x0, 0xffffffffffffffff, r0, 0x1) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000180)) pkey_mprotect(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x0, 0xffffffffffffffff) pkey_mprotect(&(0x7f0000ff4000/0x4000)=nil, 0x4000, 0x0, 0xffffffffffffffff) socket$inet_udp(0x2, 0x2, 0x0) getsockopt$inet_int(0xffffffffffffffff, 0x0, 0xe, 0x0, &(0x7f0000000280)) ioctl$sock_SIOCADDDLCI(0xffffffffffffffff, 0x8980, 0x0) ioctl$RTC_ALM_SET(r1, 0x40247007, 0x0) mmap$IORING_OFF_SQES(&(0x7f0000ff3000/0x2000)=nil, 0x2000, 0x2000002, 0x10, r1, 0x10000000) getsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, 0x0, 0x0) 12:32:47 executing program 2: ioctl$RTC_UIE_ON(0xffffffffffffffff, 0x7003) r0 = perf_event_open(&(0x7f00000001c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x2}, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0xfffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = dup2(0xffffffffffffffff, r0) r2 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000180)) pkey_mprotect(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x0, 0xffffffffffffffff) pkey_mprotect(&(0x7f0000ff4000/0x4000)=nil, 0x4000, 0x0, 0xffffffffffffffff) symlinkat(0x0, r2, &(0x7f0000000140)='./file0\x00') socket$inet_udp(0x2, 0x2, 0x0) getsockopt$inet_int(0xffffffffffffffff, 0x0, 0xe, 0x0, &(0x7f0000000280)) ioctl$RTC_ALM_SET(r1, 0x40247007, 0x0) getsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, 0x0, 0x0) 12:32:47 executing program 6: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {0x0, 0x0, 0x2100}], 0x0, &(0x7f0000000180)) 12:32:47 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f0000000000000400", 0x1c, 0x2100}], 0x0, &(0x7f0000000180)) 12:32:47 executing program 3: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_init_net_socket$802154_raw(0x24, 0x3, 0x0) sendmmsg$inet6(r0, &(0x7f0000004d00)=[{{0x0, 0x0, &(0x7f00000004c0)=[{&(0x7f0000000080)='K', 0x4c}], 0x1}}], 0x7ffff000, 0x0) 12:32:47 executing program 7: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000", 0x1a, 0x2100}], 0x0, &(0x7f0000000180)) [ 1814.652808] ieee802154 phy0 wpan0: encryption failed: -22 [ 1814.685846] EXT4-fs error (device loop6): ext4_fill_super:4959: inode #2: comm syz-executor.6: iget: root inode unallocated [ 1814.689942] EXT4-fs (loop6): get root inode failed [ 1814.691092] EXT4-fs (loop6): mount failed [ 1814.713383] EXT4-fs error (device loop7): ext4_fill_super:4959: inode #2: comm syz-executor.7: iget: root inode unallocated [ 1814.718800] EXT4-fs (loop7): get root inode failed [ 1814.719749] EXT4-fs (loop7): mount failed [ 1814.731615] EXT4-fs (loop5): corrupt root inode, run e2fsck [ 1814.732709] EXT4-fs (loop5): mount failed [ 1814.773532] EXT4-fs (loop2): mounted filesystem without journal. Opts: ,errors=continue 12:32:47 executing program 0: r0 = creat(&(0x7f0000000040)='./file0\x00', 0x0) r1 = creat(&(0x7f0000000040)='./file0\x00', 0x0) fallocate(r1, 0x0, 0x0, 0x8800000) fallocate(r1, 0x3, 0x0, 0x8000) fallocate(r0, 0x0, 0x58008, 0x8800000) 12:32:47 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', 0x0, 0x0, 0x4, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000180)) 12:32:47 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f0000000000000400", 0x1c, 0x2100}], 0x0, &(0x7f0000000180)) 12:32:47 executing program 3: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_init_net_socket$802154_raw(0x24, 0x3, 0x0) sendmmsg$inet6(r0, &(0x7f0000004d00)=[{{0x0, 0x0, &(0x7f00000004c0)=[{&(0x7f0000000080)='K', 0x4c}], 0x1}}], 0x7ffff000, 0x0) 12:32:47 executing program 7: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000", 0x1a, 0x2100}], 0x0, &(0x7f0000000180)) 12:32:47 executing program 6: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {0x0, 0x0, 0x2100}], 0x0, &(0x7f0000000180)) [ 1814.830325] EXT4-fs (loop4): mounted filesystem without journal. Opts: ,errors=continue 12:32:47 executing program 2: ioctl$RTC_UIE_ON(0xffffffffffffffff, 0x7003) r0 = perf_event_open(&(0x7f00000001c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x2}, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0xfffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = dup2(0xffffffffffffffff, r0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000180)) pkey_mprotect(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x0, 0xffffffffffffffff) pkey_mprotect(&(0x7f0000ff4000/0x4000)=nil, 0x4000, 0x0, 0xffffffffffffffff) symlinkat(&(0x7f00000000c0)='./file0\x00', 0xffffffffffffffff, &(0x7f0000000140)='./file0\x00') socket$inet_udp(0x2, 0x2, 0x0) getsockopt$inet_int(0xffffffffffffffff, 0x0, 0xe, 0x0, &(0x7f0000000280)) ioctl$RTC_ALM_SET(r1, 0x40247007, 0x0) getsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, 0x0, 0x0) 12:32:47 executing program 4: ioctl$RTC_UIE_ON(0xffffffffffffffff, 0x7003) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x2}, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0xfffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = dup2(0xffffffffffffffff, r0) perf_event_open(&(0x7f00000001c0)={0x2, 0x80, 0x8, 0x9, 0x4, 0x1, 0x0, 0x3b3d, 0x200a0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x2, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0xffff, 0x1, @perf_config_ext={0x0, 0x1}, 0x281, 0xffffffff, 0x4, 0x3, 0x401, 0xffffff47, 0x401, 0x0, 0x3, 0x0, 0x415}, 0x0, 0xffffffffffffffff, r0, 0x1) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000180)) pkey_mprotect(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x0, 0xffffffffffffffff) pkey_mprotect(&(0x7f0000ff4000/0x4000)=nil, 0x4000, 0x0, 0xffffffffffffffff) socket$inet_udp(0x2, 0x2, 0x0) getsockopt$inet_int(0xffffffffffffffff, 0x0, 0xe, 0x0, &(0x7f0000000280)) ioctl$sock_SIOCADDDLCI(0xffffffffffffffff, 0x8980, 0x0) ioctl$RTC_ALM_SET(r1, 0x40247007, 0x0) mmap$IORING_OFF_SQES(&(0x7f0000ff3000/0x2000)=nil, 0x2000, 0x2000002, 0x10, r1, 0x10000000) getsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, 0x0, 0x0) [ 1814.951428] ieee802154 phy0 wpan0: encryption failed: -22 [ 1815.013403] EXT4-fs error (device loop7): ext4_fill_super:4959: inode #2: comm syz-executor.7: iget: root inode unallocated [ 1815.019961] EXT4-fs (loop7): get root inode failed [ 1815.021265] EXT4-fs (loop7): mount failed [ 1815.035337] EXT4-fs (loop5): corrupt root inode, run e2fsck [ 1815.036570] EXT4-fs (loop5): mount failed [ 1815.037791] EXT4-fs error (device loop6): ext4_fill_super:4959: inode #2: comm syz-executor.6: iget: root inode unallocated [ 1815.043458] EXT4-fs (loop6): get root inode failed [ 1815.044266] EXT4-fs (loop6): mount failed [ 1815.095623] EXT4-fs (loop4): mounted filesystem without journal. Opts: ,errors=continue [ 1815.124733] EXT4-fs (loop2): mounted filesystem without journal. Opts: ,errors=continue 12:33:04 executing program 0: r0 = creat(&(0x7f0000000040)='./file0\x00', 0x0) r1 = creat(&(0x7f0000000040)='./file0\x00', 0x0) fallocate(r1, 0x0, 0x0, 0x8800000) fallocate(r1, 0x3, 0x0, 0x8000) fallocate(r0, 0x0, 0x59000, 0x8800000) 12:33:04 executing program 2: ioctl$RTC_UIE_ON(0xffffffffffffffff, 0x7003) r0 = perf_event_open(&(0x7f00000001c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x2}, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0xfffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = dup2(0xffffffffffffffff, r0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000180)) pkey_mprotect(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x0, 0xffffffffffffffff) pkey_mprotect(&(0x7f0000ff4000/0x4000)=nil, 0x4000, 0x0, 0xffffffffffffffff) symlinkat(&(0x7f00000000c0)='./file0\x00', 0xffffffffffffffff, &(0x7f0000000140)='./file0\x00') socket$inet_udp(0x2, 0x2, 0x0) getsockopt$inet_int(0xffffffffffffffff, 0x0, 0xe, 0x0, &(0x7f0000000280)) ioctl$RTC_ALM_SET(r1, 0x40247007, 0x0) getsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, 0x0, 0x0) 12:33:04 executing program 4: ioctl$RTC_UIE_ON(0xffffffffffffffff, 0x7003) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x2}, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0xfffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = dup2(0xffffffffffffffff, r0) perf_event_open(&(0x7f00000001c0)={0x2, 0x80, 0x8, 0x9, 0x4, 0x1, 0x0, 0x3b3d, 0x200a0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x2, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0xffff, 0x1, @perf_config_ext={0x0, 0x1}, 0x281, 0xffffffff, 0x4, 0x3, 0x401, 0xffffff47, 0x401, 0x0, 0x3, 0x0, 0x415}, 0x0, 0xffffffffffffffff, r0, 0x1) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000180)) pkey_mprotect(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x0, 0xffffffffffffffff) pkey_mprotect(&(0x7f0000ff4000/0x4000)=nil, 0x4000, 0x0, 0xffffffffffffffff) socket$inet_udp(0x2, 0x2, 0x0) getsockopt$inet_int(0xffffffffffffffff, 0x0, 0xe, 0x0, &(0x7f0000000280)) ioctl$sock_SIOCADDDLCI(0xffffffffffffffff, 0x8980, 0x0) ioctl$RTC_ALM_SET(r1, 0x40247007, 0x0) mmap$IORING_OFF_SQES(&(0x7f0000ff3000/0x2000)=nil, 0x2000, 0x2000002, 0x10, r1, 0x10000000) getsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, 0x0, 0x0) 12:33:04 executing program 6: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600), 0x0, 0x2100}], 0x0, &(0x7f0000000180)) 12:33:04 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', 0x0, 0x0, 0x4, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000180)) 12:33:04 executing program 3: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_init_net_socket$802154_raw(0x24, 0x3, 0x0) sendmmsg$inet6(r0, &(0x7f0000004d00)=[{{0x0, 0x0, &(0x7f00000004c0)=[{&(0x7f0000000080)='K', 0x4c}], 0x1}}], 0x7ffff000, 0x0) 12:33:04 executing program 7: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000", 0x1a, 0x2100}], 0x0, &(0x7f0000000180)) 12:33:04 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f0000000000000400", 0x1c, 0x2100}], 0x0, &(0x7f0000000180)) [ 1831.550220] ieee802154 phy0 wpan0: encryption failed: -22 [ 1831.604727] EXT4-fs error (device loop7): ext4_fill_super:4959: inode #2: comm syz-executor.7: iget: root inode unallocated [ 1831.608221] EXT4-fs (loop7): get root inode failed [ 1831.609683] EXT4-fs (loop7): mount failed [ 1831.611403] EXT4-fs error (device loop6): ext4_fill_super:4959: inode #2: comm syz-executor.6: iget: root inode unallocated [ 1831.614426] EXT4-fs (loop6): get root inode failed [ 1831.615504] EXT4-fs (loop6): mount failed [ 1831.635494] EXT4-fs (loop5): corrupt root inode, run e2fsck [ 1831.637135] EXT4-fs (loop5): mount failed 12:33:04 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d}], 0x0, &(0x7f0000000180)) [ 1831.691644] EXT4-fs (loop2): mounted filesystem without journal. Opts: ,errors=continue [ 1831.715573] EXT4-fs (loop4): mounted filesystem without journal. Opts: ,errors=continue 12:33:04 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000180)) 12:33:04 executing program 3: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_init_net_socket$802154_raw(0x24, 0x3, 0x0) sendmmsg$inet6(r0, &(0x7f0000004d00)=[{{0x0, 0x0, &(0x7f00000004c0)=[{&(0x7f0000000080)='K', 0x4c}], 0x1}}], 0x7ffff000, 0x0) 12:33:04 executing program 0: r0 = creat(&(0x7f0000000040)='./file0\x00', 0x0) r1 = creat(&(0x7f0000000040)='./file0\x00', 0x0) fallocate(r1, 0x0, 0x0, 0x8800000) fallocate(r1, 0x3, 0x0, 0x8000) fallocate(r0, 0x0, 0x60800, 0x8800000) 12:33:04 executing program 6: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600), 0x0, 0x2100}], 0x0, &(0x7f0000000180)) 12:33:04 executing program 7: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f0000000000000400", 0x1c, 0x2100}], 0x0, &(0x7f0000000180)) [ 1831.849884] EXT4-fs error (device loop5): ext4_fill_super:4959: inode #2: comm syz-executor.5: iget: root inode unallocated [ 1831.875812] EXT4-fs (loop5): get root inode failed [ 1831.877307] EXT4-fs (loop5): mount failed [ 1831.904900] ieee802154 phy0 wpan0: encryption failed: -22 12:33:04 executing program 2: ioctl$RTC_UIE_ON(0xffffffffffffffff, 0x7003) r0 = perf_event_open(&(0x7f00000001c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x2}, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0xfffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = dup2(0xffffffffffffffff, r0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000180)) pkey_mprotect(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x0, 0xffffffffffffffff) pkey_mprotect(&(0x7f0000ff4000/0x4000)=nil, 0x4000, 0x0, 0xffffffffffffffff) symlinkat(&(0x7f00000000c0)='./file0\x00', 0xffffffffffffffff, &(0x7f0000000140)='./file0\x00') socket$inet_udp(0x2, 0x2, 0x0) getsockopt$inet_int(0xffffffffffffffff, 0x0, 0xe, 0x0, &(0x7f0000000280)) ioctl$RTC_ALM_SET(r1, 0x40247007, 0x0) getsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, 0x0, 0x0) 12:33:04 executing program 4: ioctl$RTC_UIE_ON(0xffffffffffffffff, 0x7003) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x2}, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0xfffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = dup2(0xffffffffffffffff, r0) perf_event_open(&(0x7f00000001c0)={0x2, 0x80, 0x8, 0x9, 0x4, 0x1, 0x0, 0x3b3d, 0x200a0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x2, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0xffff, 0x1, @perf_config_ext={0x7}, 0x281, 0xffffffff, 0x4, 0x3, 0x401, 0xffffff47, 0x401, 0x0, 0x3, 0x0, 0x415}, 0x0, 0xffffffffffffffff, r0, 0x1) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000180)) pkey_mprotect(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x0, 0xffffffffffffffff) pkey_mprotect(&(0x7f0000ff4000/0x4000)=nil, 0x4000, 0x0, 0xffffffffffffffff) socket$inet_udp(0x2, 0x2, 0x0) getsockopt$inet_int(0xffffffffffffffff, 0x0, 0xe, 0x0, &(0x7f0000000280)) ioctl$sock_SIOCADDDLCI(0xffffffffffffffff, 0x8980, 0x0) ioctl$RTC_ALM_SET(r1, 0x40247007, 0x0) mmap$IORING_OFF_SQES(&(0x7f0000ff3000/0x2000)=nil, 0x2000, 0x2000002, 0x10, r1, 0x10000000) getsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, 0x0, 0x0) [ 1832.043117] EXT4-fs (loop7): corrupt root inode, run e2fsck [ 1832.044669] EXT4-fs (loop7): mount failed [ 1832.126273] EXT4-fs error (device loop6): ext4_fill_super:4959: inode #2: comm syz-executor.6: iget: root inode unallocated [ 1832.141254] EXT4-fs (loop6): get root inode failed [ 1832.142346] EXT4-fs (loop6): mount failed [ 1832.242756] EXT4-fs (loop2): mounted filesystem without journal. Opts: ,errors=continue [ 1832.316798] EXT4-fs (loop4): mounted filesystem without journal. Opts: ,errors=continue 12:33:20 executing program 3: perf_event_open(&(0x7f0000000040)={0x0, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_init_net_socket$802154_raw(0x24, 0x3, 0x0) sendmmsg$inet6(r0, &(0x7f0000004d00)=[{{0x0, 0x0, &(0x7f00000004c0)=[{&(0x7f0000000080)='K', 0x4c}], 0x1}}], 0x7ffff000, 0x0) 12:33:20 executing program 4: ioctl$RTC_UIE_ON(0xffffffffffffffff, 0x7003) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x2}, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0xfffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = dup2(0xffffffffffffffff, r0) perf_event_open(&(0x7f00000001c0)={0x2, 0x80, 0x8, 0x9, 0x4, 0x1, 0x0, 0x3b3d, 0x200a0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x2, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0xffff, 0x1, @perf_config_ext={0x7}, 0x281, 0xffffffff, 0x4, 0x3, 0x401, 0xffffff47, 0x401, 0x0, 0x3, 0x0, 0x415}, 0x0, 0xffffffffffffffff, r0, 0x1) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000180)) pkey_mprotect(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x0, 0xffffffffffffffff) pkey_mprotect(&(0x7f0000ff4000/0x4000)=nil, 0x4000, 0x0, 0xffffffffffffffff) socket$inet_udp(0x2, 0x2, 0x0) getsockopt$inet_int(0xffffffffffffffff, 0x0, 0xe, 0x0, &(0x7f0000000280)) ioctl$sock_SIOCADDDLCI(0xffffffffffffffff, 0x8980, 0x0) ioctl$RTC_ALM_SET(r1, 0x40247007, 0x0) mmap$IORING_OFF_SQES(&(0x7f0000ff3000/0x2000)=nil, 0x2000, 0x2000002, 0x10, r1, 0x10000000) getsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, 0x0, 0x0) 12:33:20 executing program 2: ioctl$RTC_UIE_ON(0xffffffffffffffff, 0x7003) r0 = perf_event_open(&(0x7f00000001c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x2}, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0xfffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = dup2(0xffffffffffffffff, r0) r2 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000180)) pkey_mprotect(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x0, 0xffffffffffffffff) pkey_mprotect(&(0x7f0000ff4000/0x4000)=nil, 0x4000, 0x0, 0xffffffffffffffff) symlinkat(&(0x7f00000000c0)='./file0\x00', r2, 0x0) socket$inet_udp(0x2, 0x2, 0x0) getsockopt$inet_int(0xffffffffffffffff, 0x0, 0xe, 0x0, &(0x7f0000000280)) ioctl$RTC_ALM_SET(r1, 0x40247007, 0x0) getsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, 0x0, 0x0) 12:33:20 executing program 0: r0 = creat(&(0x7f0000000040)='./file0\x00', 0x0) r1 = creat(&(0x7f0000000040)='./file0\x00', 0x0) fallocate(r1, 0x0, 0x0, 0x8800000) fallocate(r1, 0x3, 0x0, 0x8000) fallocate(r0, 0x0, 0x80000, 0x8800000) 12:33:20 executing program 7: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f0000000000000400", 0x1c, 0x2100}], 0x0, &(0x7f0000000180)) 12:33:20 executing program 6: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600), 0x0, 0x2100}], 0x0, &(0x7f0000000180)) 12:33:20 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000180)) 12:33:20 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d}], 0x0, &(0x7f0000000180)) [ 1847.289315] ieee802154 phy0 wpan0: encryption failed: -22 [ 1847.308924] EXT4-fs error (device loop6): ext4_fill_super:4959: inode #2: comm syz-executor.6: iget: root inode unallocated [ 1847.314789] EXT4-fs (loop6): get root inode failed [ 1847.315951] EXT4-fs (loop6): mount failed [ 1847.356033] EXT4-fs (loop7): corrupt root inode, run e2fsck [ 1847.370988] EXT4-fs (loop7): mount failed [ 1847.383677] EXT4-fs error (device loop5): ext4_fill_super:4959: inode #2: comm syz-executor.5: iget: root inode unallocated [ 1847.397480] EXT4-fs (loop5): get root inode failed [ 1847.398694] EXT4-fs (loop5): mount failed 12:33:20 executing program 3: perf_event_open(&(0x7f0000000040)={0x0, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_init_net_socket$802154_raw(0x24, 0x3, 0x0) sendmmsg$inet6(r0, &(0x7f0000004d00)=[{{0x0, 0x0, &(0x7f00000004c0)=[{&(0x7f0000000080)='K', 0x4c}], 0x1}}], 0x7ffff000, 0x0) 12:33:20 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000180)) 12:33:20 executing program 6: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f465", 0xf, 0x2100}], 0x0, &(0x7f0000000180)) [ 1847.504166] EXT4-fs (loop4): mounted filesystem without journal. Opts: ,errors=continue [ 1847.536212] EXT4-fs (loop2): mounted filesystem without journal. Opts: ,errors=continue 12:33:20 executing program 0: r0 = creat(&(0x7f0000000040)='./file0\x00', 0x0) r1 = creat(&(0x7f0000000040)='./file0\x00', 0x0) fallocate(r1, 0x0, 0x0, 0x8800000) fallocate(r1, 0x3, 0x0, 0x8000) fallocate(r0, 0x0, 0x80600, 0x8800000) 12:33:20 executing program 7: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f0000000000000400", 0x1c, 0x2100}], 0x0, &(0x7f0000000180)) 12:33:20 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d}], 0x0, &(0x7f0000000180)) [ 1847.573194] ieee802154 phy0 wpan0: encryption failed: -22 12:33:20 executing program 2: ioctl$RTC_UIE_ON(0xffffffffffffffff, 0x7003) r0 = perf_event_open(&(0x7f00000001c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x2}, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0xfffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = dup2(0xffffffffffffffff, r0) r2 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000180)) pkey_mprotect(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x0, 0xffffffffffffffff) pkey_mprotect(&(0x7f0000ff4000/0x4000)=nil, 0x4000, 0x0, 0xffffffffffffffff) symlinkat(&(0x7f00000000c0)='./file0\x00', r2, 0x0) socket$inet_udp(0x2, 0x2, 0x0) getsockopt$inet_int(0xffffffffffffffff, 0x0, 0xe, 0x0, &(0x7f0000000280)) ioctl$RTC_ALM_SET(r1, 0x40247007, 0x0) getsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, 0x0, 0x0) 12:33:20 executing program 4: ioctl$RTC_UIE_ON(0xffffffffffffffff, 0x7003) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x2}, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0xfffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = dup2(0xffffffffffffffff, r0) perf_event_open(&(0x7f00000001c0)={0x2, 0x80, 0x8, 0x9, 0x4, 0x1, 0x0, 0x3b3d, 0x200a0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x2, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0xffff, 0x1, @perf_config_ext={0x7}, 0x281, 0xffffffff, 0x4, 0x3, 0x401, 0xffffff47, 0x401, 0x0, 0x3, 0x0, 0x415}, 0x0, 0xffffffffffffffff, r0, 0x1) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000180)) pkey_mprotect(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x0, 0xffffffffffffffff) pkey_mprotect(&(0x7f0000ff4000/0x4000)=nil, 0x4000, 0x0, 0xffffffffffffffff) socket$inet_udp(0x2, 0x2, 0x0) getsockopt$inet_int(0xffffffffffffffff, 0x0, 0xe, 0x0, &(0x7f0000000280)) ioctl$sock_SIOCADDDLCI(0xffffffffffffffff, 0x8980, 0x0) ioctl$RTC_ALM_SET(r1, 0x40247007, 0x0) mmap$IORING_OFF_SQES(&(0x7f0000ff3000/0x2000)=nil, 0x2000, 0x2000002, 0x10, r1, 0x10000000) getsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, 0x0, 0x0) 12:33:20 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}], 0x0, &(0x7f0000000180)) [ 1847.751511] EXT4-fs error (device loop6): ext4_fill_super:4959: inode #2: comm syz-executor.6: iget: root inode unallocated [ 1847.759930] EXT4-fs (loop6): get root inode failed [ 1847.761056] EXT4-fs (loop6): mount failed [ 1847.839351] EXT4-fs error (device loop5): ext4_fill_super:4959: inode #2: comm syz-executor.5: iget: root inode unallocated [ 1847.842384] EXT4-fs (loop5): get root inode failed [ 1847.843549] EXT4-fs (loop5): mount failed [ 1847.845530] EXT4-fs (loop7): corrupt root inode, run e2fsck [ 1847.847442] EXT4-fs (loop7): mount failed [ 1847.955414] EXT4-fs error (device loop1): ext4_fill_super:4959: inode #2: comm syz-executor.1: iget: root inode unallocated [ 1847.969313] EXT4-fs (loop1): get root inode failed [ 1847.970439] EXT4-fs (loop1): mount failed [ 1848.005797] EXT4-fs (loop2): mounted filesystem without journal. Opts: ,errors=continue [ 1848.044458] EXT4-fs (loop4): mounted filesystem without journal. Opts: ,errors=continue 12:33:37 executing program 0: r0 = creat(&(0x7f0000000040)='./file0\x00', 0x0) r1 = creat(&(0x7f0000000040)='./file0\x00', 0x0) fallocate(r1, 0x0, 0x0, 0x8800000) fallocate(r1, 0x3, 0x0, 0x8000) fallocate(r0, 0x0, 0x100000, 0x8800000) 12:33:37 executing program 4: ioctl$RTC_UIE_ON(0xffffffffffffffff, 0x7003) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x2}, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0xfffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = dup2(0xffffffffffffffff, r0) perf_event_open(&(0x7f00000001c0)={0x2, 0x80, 0x8, 0x9, 0x4, 0x1, 0x0, 0x3b3d, 0x200a0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x2, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0xffff, 0x1, @perf_config_ext={0x7, 0x1}, 0x0, 0xffffffff, 0x4, 0x3, 0x401, 0xffffff47, 0x401, 0x0, 0x3, 0x0, 0x415}, 0x0, 0xffffffffffffffff, r0, 0x1) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000180)) pkey_mprotect(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x0, 0xffffffffffffffff) pkey_mprotect(&(0x7f0000ff4000/0x4000)=nil, 0x4000, 0x0, 0xffffffffffffffff) socket$inet_udp(0x2, 0x2, 0x0) getsockopt$inet_int(0xffffffffffffffff, 0x0, 0xe, 0x0, &(0x7f0000000280)) ioctl$sock_SIOCADDDLCI(0xffffffffffffffff, 0x8980, 0x0) ioctl$RTC_ALM_SET(r1, 0x40247007, 0x0) mmap$IORING_OFF_SQES(&(0x7f0000ff3000/0x2000)=nil, 0x2000, 0x2000002, 0x10, r1, 0x10000000) getsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, 0x0, 0x0) 12:33:37 executing program 2: ioctl$RTC_UIE_ON(0xffffffffffffffff, 0x7003) r0 = perf_event_open(&(0x7f00000001c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x2}, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0xfffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = dup2(0xffffffffffffffff, r0) r2 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000180)) pkey_mprotect(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x0, 0xffffffffffffffff) pkey_mprotect(&(0x7f0000ff4000/0x4000)=nil, 0x4000, 0x0, 0xffffffffffffffff) symlinkat(&(0x7f00000000c0)='./file0\x00', r2, 0x0) socket$inet_udp(0x2, 0x2, 0x0) getsockopt$inet_int(0xffffffffffffffff, 0x0, 0xe, 0x0, &(0x7f0000000280)) ioctl$RTC_ALM_SET(r1, 0x40247007, 0x0) getsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, 0x0, 0x0) 12:33:37 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000180)) 12:33:37 executing program 7: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d}], 0x0, &(0x7f0000000180)) 12:33:37 executing program 3: perf_event_open(&(0x7f0000000040)={0x0, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_init_net_socket$802154_raw(0x24, 0x3, 0x0) sendmmsg$inet6(r0, &(0x7f0000004d00)=[{{0x0, 0x0, &(0x7f00000004c0)=[{&(0x7f0000000080)='K', 0x4c}], 0x1}}], 0x7ffff000, 0x0) 12:33:37 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}], 0x0, &(0x7f0000000180)) 12:33:37 executing program 6: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f465", 0xf, 0x2100}], 0x0, &(0x7f0000000180)) [ 1864.881568] ieee802154 phy0 wpan0: encryption failed: -22 [ 1864.923304] EXT4-fs error (device loop1): ext4_fill_super:4959: inode #2: comm syz-executor.1: iget: root inode unallocated [ 1864.925364] EXT4-fs (loop1): get root inode failed 12:33:37 executing program 3: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_init_net_socket$802154_raw(0x24, 0x3, 0x0) sendmmsg$inet6(r0, &(0x7f0000004d00)=[{{0x0, 0x0, &(0x7f00000004c0)=[{&(0x7f0000000080)='K', 0x4c}], 0x1}}], 0x7ffff000, 0x0) [ 1864.926134] EXT4-fs (loop1): mount failed [ 1864.945083] EXT4-fs (loop5): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 1864.946394] EXT4-fs (loop5): group descriptors corrupted! [ 1864.972134] EXT4-fs error (device loop7): ext4_fill_super:4959: inode #2: comm syz-executor.7: iget: root inode unallocated [ 1864.975329] EXT4-fs (loop7): get root inode failed [ 1864.976656] EXT4-fs (loop7): mount failed [ 1864.983439] EXT4-fs error (device loop6): ext4_fill_super:4959: inode #2: comm syz-executor.6: iget: root inode unallocated [ 1864.986129] EXT4-fs (loop6): get root inode failed [ 1864.986797] EXT4-fs (loop6): mount failed [ 1864.999550] EXT4-fs (loop4): mounted filesystem without journal. Opts: ,errors=continue [ 1865.004137] EXT4-fs (loop2): mounted filesystem without journal. Opts: ,errors=continue [ 1865.034484] ieee802154 phy0 wpan0: encryption failed: -22 12:33:37 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}], 0x0, &(0x7f0000000180)) [ 1865.181043] EXT4-fs error (device loop1): ext4_fill_super:4959: inode #2: comm syz-executor.1: iget: root inode unallocated [ 1865.184313] EXT4-fs (loop1): get root inode failed [ 1865.185526] EXT4-fs (loop1): mount failed 12:33:54 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {0x0, 0x0, 0x2100}], 0x0, &(0x7f0000000180)) 12:33:54 executing program 6: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f465", 0xf, 0x2100}], 0x0, &(0x7f0000000180)) 12:33:54 executing program 3: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_init_net_socket$802154_raw(0x24, 0x3, 0x0) sendmmsg$inet6(r0, &(0x7f0000004d00)=[{{0x0, 0x0, &(0x7f00000004c0)=[{&(0x7f0000000080)='K', 0x4c}], 0x1}}], 0x7ffff000, 0x0) 12:33:54 executing program 7: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d}], 0x0, &(0x7f0000000180)) 12:33:54 executing program 0: r0 = creat(&(0x7f0000000040)='./file0\x00', 0x0) r1 = creat(&(0x7f0000000040)='./file0\x00', 0x0) fallocate(r1, 0x0, 0x0, 0x8800000) fallocate(r1, 0x3, 0x0, 0x8000) fallocate(r0, 0x0, 0x800000, 0x8800000) 12:33:54 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000180)) 12:33:54 executing program 2: ioctl$RTC_UIE_ON(0xffffffffffffffff, 0x7003) r0 = perf_event_open(&(0x7f00000001c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x2}, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0xfffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = dup2(0xffffffffffffffff, r0) r2 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000180)) pkey_mprotect(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x0, 0xffffffffffffffff) pkey_mprotect(&(0x7f0000ff4000/0x4000)=nil, 0x4000, 0x0, 0xffffffffffffffff) symlinkat(&(0x7f00000000c0)='./file0\x00', r2, &(0x7f0000000140)='./file0\x00') socket$inet_udp(0x2, 0x2, 0x0) getsockopt$inet_int(0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f0000000280)) ioctl$RTC_ALM_SET(r1, 0x40247007, 0x0) getsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, 0x0, 0x0) 12:33:54 executing program 4: ioctl$RTC_UIE_ON(0xffffffffffffffff, 0x7003) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x2}, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0xfffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = dup2(0xffffffffffffffff, r0) perf_event_open(&(0x7f00000001c0)={0x2, 0x80, 0x8, 0x9, 0x4, 0x1, 0x0, 0x3b3d, 0x200a0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x2, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0xffff, 0x1, @perf_config_ext={0x7, 0x1}, 0x0, 0xffffffff, 0x4, 0x3, 0x401, 0xffffff47, 0x401, 0x0, 0x3, 0x0, 0x415}, 0x0, 0xffffffffffffffff, r0, 0x1) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000180)) pkey_mprotect(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x0, 0xffffffffffffffff) pkey_mprotect(&(0x7f0000ff4000/0x4000)=nil, 0x4000, 0x0, 0xffffffffffffffff) socket$inet_udp(0x2, 0x2, 0x0) getsockopt$inet_int(0xffffffffffffffff, 0x0, 0xe, 0x0, &(0x7f0000000280)) ioctl$sock_SIOCADDDLCI(0xffffffffffffffff, 0x8980, 0x0) ioctl$RTC_ALM_SET(r1, 0x40247007, 0x0) mmap$IORING_OFF_SQES(&(0x7f0000ff3000/0x2000)=nil, 0x2000, 0x2000002, 0x10, r1, 0x10000000) getsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, 0x0, 0x0) [ 1881.876815] ieee802154 phy0 wpan0: encryption failed: -22 [ 1881.923092] EXT4-fs error (device loop6): ext4_fill_super:4959: inode #2: comm syz-executor.6: iget: root inode unallocated [ 1881.936622] EXT4-fs (loop6): get root inode failed [ 1881.937815] EXT4-fs (loop6): mount failed [ 1881.958133] EXT4-fs error (device loop7): ext4_fill_super:4959: inode #2: comm syz-executor.7: iget: root inode unallocated [ 1881.965081] EXT4-fs (loop7): get root inode failed [ 1881.966196] EXT4-fs (loop7): mount failed [ 1881.973592] EXT4-fs (loop5): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 1881.975699] EXT4-fs (loop5): group descriptors corrupted! [ 1881.988701] EXT4-fs error (device loop1): ext4_fill_super:4959: inode #2: comm syz-executor.1: iget: root inode unallocated [ 1881.991545] EXT4-fs (loop1): get root inode failed [ 1881.992984] EXT4-fs (loop1): mount failed 12:33:54 executing program 3: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_init_net_socket$802154_raw(0x24, 0x3, 0x0) sendmmsg$inet6(r0, &(0x7f0000004d00)=[{{0x0, 0x0, &(0x7f00000004c0)=[{&(0x7f0000000080)='K', 0x4c}], 0x1}}], 0x7ffff000, 0x0) 12:33:54 executing program 0: r0 = creat(&(0x7f0000000040)='./file0\x00', 0x0) r1 = creat(&(0x7f0000000040)='./file0\x00', 0x0) fallocate(r1, 0x0, 0x0, 0x8800000) fallocate(r1, 0x3, 0x0, 0x8000) fallocate(r0, 0x0, 0x800500, 0x8800000) 12:33:54 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000180)) 12:33:54 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {0x0, 0x0, 0x2100}], 0x0, &(0x7f0000000180)) [ 1882.116431] EXT4-fs (loop2): mounted filesystem without journal. Opts: ,errors=continue 12:33:54 executing program 6: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f0000", 0x16, 0x2100}], 0x0, &(0x7f0000000180)) 12:33:54 executing program 7: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d}], 0x0, &(0x7f0000000180)) [ 1882.170140] EXT4-fs (loop4): mounted filesystem without journal. Opts: ,errors=continue [ 1882.179564] ieee802154 phy0 wpan0: encryption failed: -22 12:33:55 executing program 2: ioctl$RTC_UIE_ON(0xffffffffffffffff, 0x7003) r0 = perf_event_open(&(0x7f00000001c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x2}, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0xfffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = dup2(0xffffffffffffffff, r0) r2 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000180)) pkey_mprotect(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x0, 0xffffffffffffffff) pkey_mprotect(&(0x7f0000ff4000/0x4000)=nil, 0x4000, 0x0, 0xffffffffffffffff) symlinkat(&(0x7f00000000c0)='./file0\x00', r2, &(0x7f0000000140)='./file0\x00') socket$inet_udp(0x2, 0x2, 0x0) getsockopt$inet_int(0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f0000000280)) ioctl$RTC_ALM_SET(r1, 0x40247007, 0x0) getsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, 0x0, 0x0) 12:33:55 executing program 4: ioctl$RTC_UIE_ON(0xffffffffffffffff, 0x7003) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x2}, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0xfffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = dup2(0xffffffffffffffff, r0) perf_event_open(&(0x7f00000001c0)={0x2, 0x80, 0x8, 0x9, 0x4, 0x1, 0x0, 0x3b3d, 0x200a0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x2, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0xffff, 0x1, @perf_config_ext={0x7, 0x1}, 0x0, 0xffffffff, 0x4, 0x3, 0x401, 0xffffff47, 0x401, 0x0, 0x3, 0x0, 0x415}, 0x0, 0xffffffffffffffff, r0, 0x1) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000180)) pkey_mprotect(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x0, 0xffffffffffffffff) pkey_mprotect(&(0x7f0000ff4000/0x4000)=nil, 0x4000, 0x0, 0xffffffffffffffff) socket$inet_udp(0x2, 0x2, 0x0) getsockopt$inet_int(0xffffffffffffffff, 0x0, 0xe, 0x0, &(0x7f0000000280)) ioctl$sock_SIOCADDDLCI(0xffffffffffffffff, 0x8980, 0x0) ioctl$RTC_ALM_SET(r1, 0x40247007, 0x0) mmap$IORING_OFF_SQES(&(0x7f0000ff3000/0x2000)=nil, 0x2000, 0x2000002, 0x10, r1, 0x10000000) getsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, 0x0, 0x0) [ 1882.358191] EXT4-fs error (device loop6): ext4_fill_super:4959: inode #2: comm syz-executor.6: iget: root inode unallocated 12:33:55 executing program 0: r0 = creat(&(0x7f0000000040)='./file0\x00', 0x0) r1 = creat(&(0x7f0000000040)='./file0\x00', 0x0) fallocate(r1, 0x0, 0x0, 0x8800000) fallocate(r1, 0x3, 0x0, 0x8000) fallocate(r0, 0x0, 0x900500, 0x8800000) [ 1882.393100] EXT4-fs (loop5): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 1882.395542] EXT4-fs (loop5): group descriptors corrupted! [ 1882.406602] EXT4-fs (loop6): get root inode failed [ 1882.407385] EXT4-fs error (device loop7): ext4_fill_super:4959: inode #2: comm syz-executor.7: iget: root inode unallocated [ 1882.407952] EXT4-fs (loop6): mount failed [ 1882.412230] EXT4-fs (loop7): get root inode failed [ 1882.413291] EXT4-fs (loop7): mount failed [ 1882.429417] EXT4-fs error (device loop1): ext4_fill_super:4959: inode #2: comm syz-executor.1: iget: root inode unallocated 12:33:55 executing program 3: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_init_net_socket$802154_raw(0x24, 0x3, 0x0) sendmmsg$inet6(r0, &(0x7f0000004d00)=[{{0x0, 0x0, &(0x7f00000004c0)=[{&(0x7f0000000080)='K', 0x4c}], 0x1}}], 0x7ffff000, 0x0) [ 1882.434565] EXT4-fs (loop1): get root inode failed [ 1882.435867] EXT4-fs (loop1): mount failed [ 1882.586117] ieee802154 phy0 wpan0: encryption failed: -22 [ 1882.598805] EXT4-fs (loop2): mounted filesystem without journal. Opts: ,errors=continue [ 1882.697533] EXT4-fs (loop4): mounted filesystem without journal. Opts: ,errors=continue 12:34:14 executing program 4: ioctl$RTC_UIE_ON(0xffffffffffffffff, 0x7003) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x2}, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0xfffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = dup2(0xffffffffffffffff, r0) perf_event_open(&(0x7f00000001c0)={0x2, 0x80, 0x8, 0x9, 0x4, 0x1, 0x0, 0x3b3d, 0x200a0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x2, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0xffff, 0x1, @perf_config_ext={0x7, 0x1}, 0x281, 0x0, 0x4, 0x3, 0x401, 0xffffff47, 0x401, 0x0, 0x3, 0x0, 0x415}, 0x0, 0xffffffffffffffff, r0, 0x1) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000180)) pkey_mprotect(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x0, 0xffffffffffffffff) pkey_mprotect(&(0x7f0000ff4000/0x4000)=nil, 0x4000, 0x0, 0xffffffffffffffff) socket$inet_udp(0x2, 0x2, 0x0) getsockopt$inet_int(0xffffffffffffffff, 0x0, 0xe, 0x0, &(0x7f0000000280)) ioctl$sock_SIOCADDDLCI(0xffffffffffffffff, 0x8980, 0x0) ioctl$RTC_ALM_SET(r1, 0x40247007, 0x0) mmap$IORING_OFF_SQES(&(0x7f0000ff3000/0x2000)=nil, 0x2000, 0x2000002, 0x10, r1, 0x10000000) getsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, 0x0, 0x0) 12:34:14 executing program 0: r0 = creat(&(0x7f0000000040)='./file0\x00', 0x0) r1 = creat(&(0x7f0000000040)='./file0\x00', 0x0) fallocate(r1, 0x0, 0x0, 0x8800000) fallocate(r1, 0x3, 0x0, 0x8000) fallocate(r0, 0x0, 0x1000000, 0x8800000) 12:34:14 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {0x0, 0x0, 0x2100}], 0x0, &(0x7f0000000180)) 12:34:14 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0xffffffffdffffff8}, {0x0, 0x0, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000180)) 12:34:14 executing program 7: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000180)) 12:34:14 executing program 6: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f0000", 0x16, 0x2100}], 0x0, &(0x7f0000000180)) 12:34:14 executing program 3: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_init_net_socket$802154_raw(0x24, 0x3, 0x0) sendmmsg$inet6(r0, &(0x7f0000004d00)=[{{0x0, 0x0, &(0x7f00000004c0)=[{&(0x7f0000000080)='K', 0x4c}], 0x1}}], 0x7ffff000, 0x0) 12:34:14 executing program 2: ioctl$RTC_UIE_ON(0xffffffffffffffff, 0x7003) r0 = perf_event_open(&(0x7f00000001c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x2}, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0xfffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = dup2(0xffffffffffffffff, r0) r2 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000180)) pkey_mprotect(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x0, 0xffffffffffffffff) pkey_mprotect(&(0x7f0000ff4000/0x4000)=nil, 0x4000, 0x0, 0xffffffffffffffff) symlinkat(&(0x7f00000000c0)='./file0\x00', r2, &(0x7f0000000140)='./file0\x00') socket$inet_udp(0x2, 0x2, 0x0) getsockopt$inet_int(0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f0000000280)) ioctl$RTC_ALM_SET(r1, 0x40247007, 0x0) getsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, 0x0, 0x0) [ 1901.995241] ieee802154 phy0 wpan0: encryption failed: -22 [ 1902.028354] EXT4-fs (loop7): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 1902.030386] EXT4-fs (loop7): group descriptors corrupted! [ 1902.032009] EXT4-fs (loop5): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 1902.033961] EXT4-fs (loop5): group descriptors corrupted! [ 1902.064421] EXT4-fs error (device loop1): ext4_fill_super:4959: inode #2: comm syz-executor.1: iget: root inode unallocated [ 1902.067187] EXT4-fs (loop1): get root inode failed [ 1902.068295] EXT4-fs (loop1): mount failed [ 1902.090940] EXT4-fs error (device loop6): ext4_fill_super:4959: inode #2: comm syz-executor.6: iget: root inode unallocated [ 1902.123965] EXT4-fs (loop6): get root inode failed [ 1902.125068] EXT4-fs (loop6): mount failed 12:34:14 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600), 0x0, 0x2100}], 0x0, &(0x7f0000000180)) 12:34:14 executing program 3: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_init_net_socket$802154_raw(0x24, 0x3, 0x0) sendmmsg$inet6(r0, &(0x7f0000004d00)=[{{0x0, 0x0, &(0x7f00000004c0)=[{&(0x7f0000000080)='K', 0x4c}], 0x1}}], 0x7ffff000, 0x0) 12:34:14 executing program 0: r0 = creat(&(0x7f0000000040)='./file0\x00', 0x0) r1 = creat(&(0x7f0000000040)='./file0\x00', 0x0) fallocate(r1, 0x0, 0x0, 0x8800000) fallocate(r1, 0x3, 0x0, 0x8000) fallocate(r0, 0x0, 0x2000000, 0x8800000) 12:34:14 executing program 7: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000180)) [ 1902.263455] EXT4-fs (loop2): mounted filesystem without journal. Opts: ,errors=continue 12:34:15 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0xffffffffdffffff8}, {0x0, 0x0, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000180)) [ 1902.291160] EXT4-fs (loop4): mounted filesystem without journal. Opts: ,errors=continue 12:34:15 executing program 6: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f0000", 0x16, 0x2100}], 0x0, &(0x7f0000000180)) [ 1902.356415] EXT4-fs error (device loop1): ext4_fill_super:4959: inode #2: comm syz-executor.1: iget: root inode unallocated [ 1902.362435] EXT4-fs (loop1): get root inode failed [ 1902.363706] EXT4-fs (loop1): mount failed 12:34:15 executing program 2: ioctl$RTC_UIE_ON(0xffffffffffffffff, 0x7003) r0 = perf_event_open(&(0x7f00000001c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x2}, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0xfffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = dup2(0xffffffffffffffff, r0) r2 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000180)) pkey_mprotect(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x0, 0xffffffffffffffff) pkey_mprotect(&(0x7f0000ff4000/0x4000)=nil, 0x4000, 0x0, 0xffffffffffffffff) symlinkat(&(0x7f00000000c0)='./file0\x00', r2, &(0x7f0000000140)='./file0\x00') socket$inet_udp(0x2, 0x2, 0x0) getsockopt$inet_int(0xffffffffffffffff, 0x0, 0xe, 0x0, 0x0) ioctl$RTC_ALM_SET(r1, 0x40247007, 0x0) getsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, 0x0, 0x0) [ 1902.395510] ieee802154 phy0 wpan0: encryption failed: -22 [ 1902.429809] EXT4-fs (loop7): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 1902.431908] EXT4-fs (loop7): group descriptors corrupted! 12:34:15 executing program 4: ioctl$RTC_UIE_ON(0xffffffffffffffff, 0x7003) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x2}, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0xfffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = dup2(0xffffffffffffffff, r0) perf_event_open(&(0x7f00000001c0)={0x2, 0x80, 0x8, 0x9, 0x4, 0x1, 0x0, 0x3b3d, 0x200a0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x2, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0xffff, 0x1, @perf_config_ext={0x7, 0x1}, 0x281, 0x0, 0x4, 0x3, 0x401, 0xffffff47, 0x401, 0x0, 0x3, 0x0, 0x415}, 0x0, 0xffffffffffffffff, r0, 0x1) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000180)) pkey_mprotect(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x0, 0xffffffffffffffff) pkey_mprotect(&(0x7f0000ff4000/0x4000)=nil, 0x4000, 0x0, 0xffffffffffffffff) socket$inet_udp(0x2, 0x2, 0x0) getsockopt$inet_int(0xffffffffffffffff, 0x0, 0xe, 0x0, &(0x7f0000000280)) ioctl$sock_SIOCADDDLCI(0xffffffffffffffff, 0x8980, 0x0) ioctl$RTC_ALM_SET(r1, 0x40247007, 0x0) mmap$IORING_OFF_SQES(&(0x7f0000ff3000/0x2000)=nil, 0x2000, 0x2000002, 0x10, r1, 0x10000000) getsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, 0x0, 0x0) 12:34:15 executing program 3: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_init_net_socket$802154_raw(0x24, 0x3, 0x0) sendmmsg$inet6(0xffffffffffffffff, &(0x7f0000004d00)=[{{0x0, 0x0, &(0x7f00000004c0)=[{&(0x7f0000000080)='K', 0x4c}], 0x1}}], 0x7ffff000, 0x0) [ 1902.602035] EXT4-fs error (device loop6): ext4_fill_super:4959: inode #2: comm syz-executor.6: iget: root inode unallocated 12:34:15 executing program 0: r0 = creat(&(0x7f0000000040)='./file0\x00', 0x0) r1 = creat(&(0x7f0000000040)='./file0\x00', 0x0) fallocate(r1, 0x0, 0x0, 0x8800000) fallocate(r1, 0x3, 0x0, 0x8000) fallocate(r0, 0x0, 0x3000000, 0x8800000) [ 1902.609011] EXT4-fs (loop5): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 1902.611032] EXT4-fs (loop5): group descriptors corrupted! [ 1902.612653] EXT4-fs (loop6): get root inode failed [ 1902.613781] EXT4-fs (loop6): mount failed 12:34:15 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600), 0x0, 0x2100}], 0x0, &(0x7f0000000180)) [ 1902.710246] EXT4-fs (loop2): mounted filesystem without journal. Opts: ,errors=continue [ 1902.812522] EXT4-fs (loop4): mounted filesystem without journal. Opts: ,errors=continue [ 1902.870789] EXT4-fs error (device loop1): ext4_fill_super:4959: inode #2: comm syz-executor.1: iget: root inode unallocated [ 1902.888176] EXT4-fs (loop1): get root inode failed [ 1902.891449] EXT4-fs (loop1): mount failed 12:34:33 executing program 6: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000", 0x1a, 0x2100}], 0x0, &(0x7f0000000180)) 12:34:33 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600), 0x0, 0x2100}], 0x0, &(0x7f0000000180)) 12:34:33 executing program 7: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000180)) 12:34:33 executing program 4: ioctl$RTC_UIE_ON(0xffffffffffffffff, 0x7003) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x2}, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0xfffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = dup2(0xffffffffffffffff, r0) perf_event_open(&(0x7f00000001c0)={0x2, 0x80, 0x8, 0x9, 0x4, 0x1, 0x0, 0x3b3d, 0x200a0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x2, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0xffff, 0x1, @perf_config_ext={0x7, 0x1}, 0x281, 0x0, 0x4, 0x3, 0x401, 0xffffff47, 0x401, 0x0, 0x3, 0x0, 0x415}, 0x0, 0xffffffffffffffff, r0, 0x1) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000180)) pkey_mprotect(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x0, 0xffffffffffffffff) pkey_mprotect(&(0x7f0000ff4000/0x4000)=nil, 0x4000, 0x0, 0xffffffffffffffff) socket$inet_udp(0x2, 0x2, 0x0) getsockopt$inet_int(0xffffffffffffffff, 0x0, 0xe, 0x0, &(0x7f0000000280)) ioctl$sock_SIOCADDDLCI(0xffffffffffffffff, 0x8980, 0x0) ioctl$RTC_ALM_SET(r1, 0x40247007, 0x0) mmap$IORING_OFF_SQES(&(0x7f0000ff3000/0x2000)=nil, 0x2000, 0x2000002, 0x10, r1, 0x10000000) getsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, 0x0, 0x0) 12:34:33 executing program 2: ioctl$RTC_UIE_ON(0xffffffffffffffff, 0x7003) r0 = perf_event_open(&(0x7f00000001c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x2}, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0xfffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = dup2(0xffffffffffffffff, r0) r2 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000180)) pkey_mprotect(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x0, 0xffffffffffffffff) pkey_mprotect(&(0x7f0000ff4000/0x4000)=nil, 0x4000, 0x0, 0xffffffffffffffff) symlinkat(&(0x7f00000000c0)='./file0\x00', r2, &(0x7f0000000140)='./file0\x00') socket$inet_udp(0x2, 0x2, 0x0) getsockopt$inet_int(0xffffffffffffffff, 0x0, 0xe, 0x0, 0x0) ioctl$RTC_ALM_SET(r1, 0x40247007, 0x0) getsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, 0x0, 0x0) 12:34:33 executing program 3: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_init_net_socket$802154_raw(0x24, 0x3, 0x0) sendmmsg$inet6(0xffffffffffffffff, &(0x7f0000004d00)=[{{0x0, 0x0, &(0x7f00000004c0)=[{&(0x7f0000000080)='K', 0x4c}], 0x1}}], 0x7ffff000, 0x0) 12:34:33 executing program 0: r0 = creat(&(0x7f0000000040)='./file0\x00', 0x0) r1 = creat(&(0x7f0000000040)='./file0\x00', 0x0) fallocate(r1, 0x0, 0x0, 0x8800000) fallocate(r1, 0x3, 0x0, 0x8000) fallocate(r0, 0x0, 0x4000000, 0x8800000) 12:34:33 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0xffffffffdffffff8}, {0x0, 0x0, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000180)) [ 1920.411399] EXT4-fs error (device loop6): ext4_fill_super:4959: inode #2: comm syz-executor.6: iget: root inode unallocated [ 1920.415275] EXT4-fs (loop6): get root inode failed [ 1920.416573] EXT4-fs (loop6): mount failed [ 1920.429105] EXT4-fs (loop7): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 1920.431022] EXT4-fs (loop7): group descriptors corrupted! [ 1920.442170] EXT4-fs error (device loop1): ext4_fill_super:4959: inode #2: comm syz-executor.1: iget: root inode unallocated [ 1920.445277] EXT4-fs (loop1): get root inode failed [ 1920.446127] EXT4-fs (loop1): mount failed 12:34:33 executing program 3: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_init_net_socket$802154_raw(0x24, 0x3, 0x0) sendmmsg$inet6(0xffffffffffffffff, &(0x7f0000004d00)=[{{0x0, 0x0, &(0x7f00000004c0)=[{&(0x7f0000000080)='K', 0x4c}], 0x1}}], 0x7ffff000, 0x0) [ 1920.514421] EXT4-fs (loop5): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 1920.515939] EXT4-fs (loop5): group descriptors corrupted! 12:34:33 executing program 0: r0 = creat(&(0x7f0000000040)='./file0\x00', 0x0) r1 = creat(&(0x7f0000000040)='./file0\x00', 0x0) fallocate(r1, 0x0, 0x0, 0x8800000) fallocate(r1, 0x3, 0x0, 0x8000) fallocate(r0, 0x0, 0x5000000, 0x8800000) [ 1920.560464] EXT4-fs (loop4): mounted filesystem without journal. Opts: ,errors=continue [ 1920.593366] EXT4-fs (loop2): mounted filesystem without journal. Opts: ,errors=continue 12:34:33 executing program 6: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000", 0x1a, 0x2100}], 0x0, &(0x7f0000000180)) 12:34:33 executing program 7: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0xffffffffdffffff8}, {0x0, 0x0, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000180)) 12:34:33 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f465", 0xf, 0x2100}], 0x0, &(0x7f0000000180)) 12:34:33 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400), 0x0, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000180)) 12:34:33 executing program 4: ioctl$RTC_UIE_ON(0xffffffffffffffff, 0x7003) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x2}, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0xfffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = dup2(0xffffffffffffffff, r0) perf_event_open(&(0x7f00000001c0)={0x2, 0x80, 0x8, 0x9, 0x4, 0x1, 0x0, 0x3b3d, 0x200a0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x2, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0xffff, 0x1, @perf_config_ext={0x7, 0x1}, 0x281, 0xffffffff, 0x0, 0x3, 0x401, 0xffffff47, 0x401, 0x0, 0x3, 0x0, 0x415}, 0x0, 0xffffffffffffffff, r0, 0x1) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000180)) pkey_mprotect(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x0, 0xffffffffffffffff) pkey_mprotect(&(0x7f0000ff4000/0x4000)=nil, 0x4000, 0x0, 0xffffffffffffffff) socket$inet_udp(0x2, 0x2, 0x0) getsockopt$inet_int(0xffffffffffffffff, 0x0, 0xe, 0x0, &(0x7f0000000280)) ioctl$sock_SIOCADDDLCI(0xffffffffffffffff, 0x8980, 0x0) ioctl$RTC_ALM_SET(r1, 0x40247007, 0x0) mmap$IORING_OFF_SQES(&(0x7f0000ff3000/0x2000)=nil, 0x2000, 0x2000002, 0x10, r1, 0x10000000) getsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, 0x0, 0x0) 12:34:33 executing program 2: ioctl$RTC_UIE_ON(0xffffffffffffffff, 0x7003) r0 = perf_event_open(&(0x7f00000001c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x2}, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0xfffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = dup2(0xffffffffffffffff, r0) r2 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000180)) pkey_mprotect(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x0, 0xffffffffffffffff) pkey_mprotect(&(0x7f0000ff4000/0x4000)=nil, 0x4000, 0x0, 0xffffffffffffffff) symlinkat(&(0x7f00000000c0)='./file0\x00', r2, &(0x7f0000000140)='./file0\x00') socket$inet_udp(0x2, 0x2, 0x0) getsockopt$inet_int(0xffffffffffffffff, 0x0, 0xe, 0x0, 0x0) ioctl$RTC_ALM_SET(r1, 0x40247007, 0x0) getsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, 0x0, 0x0) [ 1920.862067] EXT4-fs (loop7): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 1920.864309] EXT4-fs (loop7): group descriptors corrupted! [ 1920.865802] EXT4-fs error (device loop1): ext4_fill_super:4959: inode #2: comm syz-executor.1: iget: root inode unallocated [ 1920.873482] EXT4-fs error (device loop6): ext4_fill_super:4959: inode #2: comm syz-executor.6: iget: root inode unallocated [ 1920.877113] EXT4-fs (loop1): get root inode failed [ 1920.878413] EXT4-fs (loop1): mount failed [ 1920.879552] EXT4-fs (loop5): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 1920.881540] EXT4-fs (loop5): group descriptors corrupted! [ 1920.897362] EXT4-fs (loop6): get root inode failed [ 1920.898907] EXT4-fs (loop6): mount failed [ 1920.986830] EXT4-fs (loop4): mounted filesystem without journal. Opts: ,errors=continue [ 1921.004753] EXT4-fs (loop2): mounted filesystem without journal. Opts: ,errors=continue 12:34:47 executing program 7: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0xffffffffdffffff8}, {0x0, 0x0, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000180)) 12:34:47 executing program 3: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_init_net_socket$802154_raw(0x24, 0x3, 0x0) sendmmsg$inet6(r0, 0x0, 0x0, 0x0) 12:34:47 executing program 2: ioctl$RTC_UIE_ON(0xffffffffffffffff, 0x7003) r0 = perf_event_open(&(0x7f00000001c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x2}, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0xfffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) dup2(0xffffffffffffffff, r0) r1 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000180)) pkey_mprotect(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x0, 0xffffffffffffffff) pkey_mprotect(&(0x7f0000ff4000/0x4000)=nil, 0x4000, 0x0, 0xffffffffffffffff) symlinkat(&(0x7f00000000c0)='./file0\x00', r1, &(0x7f0000000140)='./file0\x00') socket$inet_udp(0x2, 0x2, 0x0) getsockopt$inet_int(0xffffffffffffffff, 0x0, 0xe, 0x0, &(0x7f0000000280)) ioctl$RTC_ALM_SET(0xffffffffffffffff, 0x40247007, 0x0) getsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, 0x0, 0x0) 12:34:47 executing program 4: ioctl$RTC_UIE_ON(0xffffffffffffffff, 0x7003) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x2}, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0xfffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = dup2(0xffffffffffffffff, r0) perf_event_open(&(0x7f00000001c0)={0x2, 0x80, 0x8, 0x9, 0x4, 0x1, 0x0, 0x3b3d, 0x200a0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x2, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0xffff, 0x1, @perf_config_ext={0x7, 0x1}, 0x281, 0xffffffff, 0x0, 0x3, 0x401, 0xffffff47, 0x401, 0x0, 0x3, 0x0, 0x415}, 0x0, 0xffffffffffffffff, r0, 0x1) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000180)) pkey_mprotect(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x0, 0xffffffffffffffff) pkey_mprotect(&(0x7f0000ff4000/0x4000)=nil, 0x4000, 0x0, 0xffffffffffffffff) socket$inet_udp(0x2, 0x2, 0x0) getsockopt$inet_int(0xffffffffffffffff, 0x0, 0xe, 0x0, &(0x7f0000000280)) ioctl$sock_SIOCADDDLCI(0xffffffffffffffff, 0x8980, 0x0) ioctl$RTC_ALM_SET(r1, 0x40247007, 0x0) mmap$IORING_OFF_SQES(&(0x7f0000ff3000/0x2000)=nil, 0x2000, 0x2000002, 0x10, r1, 0x10000000) getsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, 0x0, 0x0) 12:34:47 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400), 0x0, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000180)) 12:34:47 executing program 6: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000", 0x1a, 0x2100}], 0x0, &(0x7f0000000180)) 12:34:47 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f465", 0xf, 0x2100}], 0x0, &(0x7f0000000180)) 12:34:47 executing program 0: r0 = creat(&(0x7f0000000040)='./file0\x00', 0x0) r1 = creat(&(0x7f0000000040)='./file0\x00', 0x0) fallocate(r1, 0x0, 0x0, 0x8800000) fallocate(r1, 0x3, 0x0, 0x8000) fallocate(r0, 0x0, 0x7000000, 0x8800000) [ 1934.834150] EXT4-fs (loop7): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 1934.835192] EXT4-fs (loop7): group descriptors corrupted! [ 1934.856115] EXT4-fs (loop5): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 1934.857135] EXT4-fs (loop5): group descriptors corrupted! [ 1934.881795] EXT4-fs error (device loop6): ext4_fill_super:4959: inode #2: comm syz-executor.6: iget: root inode unallocated [ 1934.893539] EXT4-fs (loop6): get root inode failed [ 1934.894471] EXT4-fs (loop6): mount failed 12:34:47 executing program 3: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_init_net_socket$802154_raw(0x24, 0x3, 0x0) sendmmsg$inet6(r0, 0x0, 0x0, 0x0) 12:34:47 executing program 7: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0xffffffffdffffff8}, {0x0, 0x0, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000180)) [ 1934.907535] EXT4-fs error (device loop1): ext4_fill_super:4959: inode #2: comm syz-executor.1: iget: root inode unallocated [ 1934.911380] EXT4-fs (loop1): get root inode failed [ 1934.912271] EXT4-fs (loop1): mount failed [ 1934.912538] EXT4-fs (loop2): mounted filesystem without journal. Opts: ,errors=continue 12:34:47 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400), 0x0, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000180)) 12:34:47 executing program 6: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f0000000000000400", 0x1c, 0x2100}], 0x0, &(0x7f0000000180)) 12:34:47 executing program 0: r0 = creat(&(0x7f0000000040)='./file0\x00', 0x0) r1 = creat(&(0x7f0000000040)='./file0\x00', 0x0) fallocate(r1, 0x0, 0x0, 0x8800000) fallocate(r1, 0x3, 0x0, 0x8000) fallocate(r0, 0x0, 0x8000000, 0x8800000) [ 1935.014086] EXT4-fs (loop4): mounted filesystem without journal. Opts: ,errors=continue 12:34:47 executing program 2: ioctl$RTC_UIE_ON(0xffffffffffffffff, 0x7003) r0 = perf_event_open(&(0x7f00000001c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x2}, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0xfffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) dup2(0xffffffffffffffff, r0) r1 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000180)) pkey_mprotect(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x0, 0xffffffffffffffff) pkey_mprotect(&(0x7f0000ff4000/0x4000)=nil, 0x4000, 0x0, 0xffffffffffffffff) symlinkat(&(0x7f00000000c0)='./file0\x00', r1, &(0x7f0000000140)='./file0\x00') socket$inet_udp(0x2, 0x2, 0x0) getsockopt$inet_int(0xffffffffffffffff, 0x0, 0xe, 0x0, &(0x7f0000000280)) ioctl$RTC_ALM_SET(0xffffffffffffffff, 0x40247007, 0x0) getsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, 0x0, 0x0) [ 1935.087740] EXT4-fs (loop7): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 1935.089751] EXT4-fs (loop7): group descriptors corrupted! [ 1935.098749] EXT4-fs (loop5): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock 12:34:47 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f465", 0xf, 0x2100}], 0x0, &(0x7f0000000180)) [ 1935.100611] EXT4-fs (loop5): group descriptors corrupted! [ 1935.186804] EXT4-fs (loop6): corrupt root inode, run e2fsck [ 1935.188772] EXT4-fs (loop6): mount failed [ 1935.313218] EXT4-fs (loop2): mounted filesystem without journal. Opts: ,errors=continue [ 1935.330415] EXT4-fs error (device loop1): ext4_fill_super:4959: inode #2: comm syz-executor.1: iget: root inode unallocated [ 1935.334498] EXT4-fs (loop1): get root inode failed [ 1935.335509] EXT4-fs (loop1): mount failed 12:35:10 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f0000", 0x16, 0x2100}], 0x0, &(0x7f0000000180)) 12:35:10 executing program 3: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_init_net_socket$802154_raw(0x24, 0x3, 0x0) sendmmsg$inet6(r0, 0x0, 0x0, 0x0) 12:35:10 executing program 2: ioctl$RTC_UIE_ON(0xffffffffffffffff, 0x7003) r0 = perf_event_open(&(0x7f00000001c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x2}, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0xfffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) dup2(0xffffffffffffffff, r0) r1 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000180)) pkey_mprotect(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x0, 0xffffffffffffffff) pkey_mprotect(&(0x7f0000ff4000/0x4000)=nil, 0x4000, 0x0, 0xffffffffffffffff) symlinkat(&(0x7f00000000c0)='./file0\x00', r1, &(0x7f0000000140)='./file0\x00') socket$inet_udp(0x2, 0x2, 0x0) getsockopt$inet_int(0xffffffffffffffff, 0x0, 0xe, 0x0, &(0x7f0000000280)) ioctl$RTC_ALM_SET(0xffffffffffffffff, 0x40247007, 0x0) getsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, 0x0, 0x0) 12:35:10 executing program 4: ioctl$RTC_UIE_ON(0xffffffffffffffff, 0x7003) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x2}, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0xfffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = dup2(0xffffffffffffffff, r0) perf_event_open(&(0x7f00000001c0)={0x2, 0x80, 0x8, 0x9, 0x4, 0x1, 0x0, 0x3b3d, 0x200a0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x2, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0xffff, 0x1, @perf_config_ext={0x7, 0x1}, 0x281, 0xffffffff, 0x0, 0x3, 0x401, 0xffffff47, 0x401, 0x0, 0x3, 0x0, 0x415}, 0x0, 0xffffffffffffffff, r0, 0x1) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000180)) pkey_mprotect(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x0, 0xffffffffffffffff) pkey_mprotect(&(0x7f0000ff4000/0x4000)=nil, 0x4000, 0x0, 0xffffffffffffffff) socket$inet_udp(0x2, 0x2, 0x0) getsockopt$inet_int(0xffffffffffffffff, 0x0, 0xe, 0x0, &(0x7f0000000280)) ioctl$sock_SIOCADDDLCI(0xffffffffffffffff, 0x8980, 0x0) ioctl$RTC_ALM_SET(r1, 0x40247007, 0x0) mmap$IORING_OFF_SQES(&(0x7f0000ff3000/0x2000)=nil, 0x2000, 0x2000002, 0x10, r1, 0x10000000) getsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, 0x0, 0x0) 12:35:10 executing program 0: r0 = creat(&(0x7f0000000040)='./file0\x00', 0x0) r1 = creat(&(0x7f0000000040)='./file0\x00', 0x0) fallocate(r1, 0x0, 0x0, 0x8800000) fallocate(r1, 0x3, 0x0, 0x8000) fallocate(r0, 0x0, 0x8800500, 0x8800000) 12:35:10 executing program 7: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400), 0x0, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000180)) 12:35:10 executing program 6: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f0000000000000400", 0x1c, 0x2100}], 0x0, &(0x7f0000000180)) 12:35:10 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="0200000003", 0x5, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000180)) [ 1957.486514] EXT4-fs error (device loop1): ext4_fill_super:4959: inode #2: comm syz-executor.1: iget: root inode unallocated [ 1957.493936] EXT4-fs (loop1): get root inode failed [ 1957.495245] EXT4-fs (loop1): mount failed [ 1957.504013] EXT4-fs (loop7): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 1957.505904] EXT4-fs (loop7): group descriptors corrupted! [ 1957.539652] EXT4-fs (loop5): ext4_check_descriptors: Inode table for group 0 overlaps superblock [ 1957.541991] EXT4-fs (loop5): group descriptors corrupted! 12:35:10 executing program 3: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_init_net_socket$802154_raw(0x24, 0x3, 0x0) sendmmsg$inet6(r0, &(0x7f0000004d00), 0x0, 0x0) [ 1957.583100] EXT4-fs (loop6): corrupt root inode, run e2fsck [ 1957.584785] EXT4-fs (loop6): mount failed 12:35:10 executing program 0: r0 = creat(&(0x7f0000000040)='./file0\x00', 0x0) r1 = creat(&(0x7f0000000040)='./file0\x00', 0x0) fallocate(r1, 0x0, 0x0, 0x8800000) fallocate(r1, 0x3, 0x0, 0x8000) fallocate(r0, 0x0, 0xc010000, 0x8800000) 12:35:10 executing program 7: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400), 0x0, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000180)) [ 1957.653629] EXT4-fs (loop4): mounted filesystem without journal. Opts: ,errors=continue 12:35:10 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f0000", 0x16, 0x2100}], 0x0, &(0x7f0000000180)) [ 1957.699503] EXT4-fs (loop2): mounted filesystem without journal. Opts: ,errors=continue 12:35:10 executing program 6: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f0000000000000400", 0x1c, 0x2100}], 0x0, &(0x7f0000000180)) 12:35:10 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="0200000003", 0x5, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000180)) 12:35:10 executing program 4: ioctl$RTC_UIE_ON(0xffffffffffffffff, 0x7003) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x2}, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0xfffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = dup2(0xffffffffffffffff, r0) perf_event_open(&(0x7f00000001c0)={0x2, 0x80, 0x8, 0x9, 0x4, 0x1, 0x0, 0x3b3d, 0x200a0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x2, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0xffff, 0x1, @perf_config_ext={0x7, 0x1}, 0x281, 0xffffffff, 0x4, 0x0, 0x401, 0xffffff47, 0x401, 0x0, 0x3, 0x0, 0x415}, 0x0, 0xffffffffffffffff, r0, 0x1) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000180)) pkey_mprotect(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x0, 0xffffffffffffffff) pkey_mprotect(&(0x7f0000ff4000/0x4000)=nil, 0x4000, 0x0, 0xffffffffffffffff) socket$inet_udp(0x2, 0x2, 0x0) getsockopt$inet_int(0xffffffffffffffff, 0x0, 0xe, 0x0, &(0x7f0000000280)) ioctl$sock_SIOCADDDLCI(0xffffffffffffffff, 0x8980, 0x0) ioctl$RTC_ALM_SET(r1, 0x40247007, 0x0) mmap$IORING_OFF_SQES(&(0x7f0000ff3000/0x2000)=nil, 0x2000, 0x2000002, 0x10, r1, 0x10000000) getsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, 0x0, 0x0) 12:35:10 executing program 3: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_init_net_socket$802154_raw(0x24, 0x3, 0x0) sendmmsg$inet6(r0, &(0x7f0000004d00), 0x0, 0x0) [ 1957.838818] EXT4-fs (loop7): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 1957.840876] EXT4-fs (loop7): group descriptors corrupted! [ 1957.885670] EXT4-fs error (device loop1): ext4_fill_super:4959: inode #2: comm syz-executor.1: iget: root inode unallocated [ 1957.897035] EXT4-fs (loop1): get root inode failed [ 1957.898107] EXT4-fs (loop1): mount failed 12:35:10 executing program 7: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400), 0x0, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000180)) [ 1957.990212] EXT4-fs (loop5): ext4_check_descriptors: Inode table for group 0 overlaps superblock [ 1957.992319] EXT4-fs (loop5): group descriptors corrupted! [ 1958.023070] EXT4-fs (loop6): corrupt root inode, run e2fsck [ 1958.025538] EXT4-fs (loop6): mount failed [ 1958.125481] EXT4-fs (loop4): mounted filesystem without journal. Opts: ,errors=continue [ 1958.193346] EXT4-fs (loop7): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 1958.195524] EXT4-fs (loop7): group descriptors corrupted! 12:35:27 executing program 7: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="0200000003", 0x5, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000180)) 12:35:27 executing program 0: r0 = creat(&(0x7f0000000040)='./file0\x00', 0x0) r1 = creat(&(0x7f0000000040)='./file0\x00', 0x0) fallocate(r1, 0x0, 0x0, 0x8800000) fallocate(r1, 0x3, 0x0, 0x8000) fallocate(r0, 0x0, 0xd000000, 0x8800000) 12:35:27 executing program 4: ioctl$RTC_UIE_ON(0xffffffffffffffff, 0x7003) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x2}, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0xfffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = dup2(0xffffffffffffffff, r0) perf_event_open(&(0x7f00000001c0)={0x2, 0x80, 0x8, 0x9, 0x4, 0x1, 0x0, 0x3b3d, 0x200a0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x2, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0xffff, 0x1, @perf_config_ext={0x7, 0x1}, 0x281, 0xffffffff, 0x4, 0x0, 0x401, 0xffffff47, 0x401, 0x0, 0x3, 0x0, 0x415}, 0x0, 0xffffffffffffffff, r0, 0x1) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000180)) pkey_mprotect(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x0, 0xffffffffffffffff) pkey_mprotect(&(0x7f0000ff4000/0x4000)=nil, 0x4000, 0x0, 0xffffffffffffffff) socket$inet_udp(0x2, 0x2, 0x0) getsockopt$inet_int(0xffffffffffffffff, 0x0, 0xe, 0x0, &(0x7f0000000280)) ioctl$sock_SIOCADDDLCI(0xffffffffffffffff, 0x8980, 0x0) ioctl$RTC_ALM_SET(r1, 0x40247007, 0x0) mmap$IORING_OFF_SQES(&(0x7f0000ff3000/0x2000)=nil, 0x2000, 0x2000002, 0x10, r1, 0x10000000) getsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, 0x0, 0x0) 12:35:27 executing program 3: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_init_net_socket$802154_raw(0x24, 0x3, 0x0) sendmmsg$inet6(r0, &(0x7f0000004d00), 0x0, 0x0) 12:35:27 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f0000", 0x16, 0x2100}], 0x0, &(0x7f0000000180)) 12:35:27 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="0200000003", 0x5, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000180)) 12:35:27 executing program 6: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d}], 0x0, &(0x7f0000000180)) 12:35:27 executing program 2: ioctl$RTC_UIE_ON(0xffffffffffffffff, 0x7003) r0 = perf_event_open(&(0x7f00000001c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x2}, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0xfffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) dup2(0xffffffffffffffff, r0) r1 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000180)) pkey_mprotect(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x0, 0xffffffffffffffff) pkey_mprotect(&(0x7f0000ff4000/0x4000)=nil, 0x4000, 0x0, 0xffffffffffffffff) symlinkat(&(0x7f00000000c0)='./file0\x00', r1, &(0x7f0000000140)='./file0\x00') socket$inet_udp(0x2, 0x2, 0x0) getsockopt$inet_int(0xffffffffffffffff, 0x0, 0xe, 0x0, &(0x7f0000000280)) ioctl$RTC_ALM_SET(0xffffffffffffffff, 0x40247007, 0x0) getsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, 0x0, 0x0) [ 1974.898218] EXT4-fs (loop7): ext4_check_descriptors: Inode table for group 0 overlaps superblock [ 1974.900262] EXT4-fs (loop7): group descriptors corrupted! [ 1974.904209] EXT4-fs error (device loop1): ext4_fill_super:4959: inode #2: comm syz-executor.1: iget: root inode unallocated [ 1974.910480] EXT4-fs (loop1): get root inode failed [ 1974.911796] EXT4-fs (loop1): mount failed [ 1974.934365] EXT4-fs error (device loop6): ext4_fill_super:4959: inode #2: comm syz-executor.6: iget: root inode unallocated [ 1974.938605] EXT4-fs (loop5): ext4_check_descriptors: Inode table for group 0 overlaps superblock [ 1974.940715] EXT4-fs (loop5): group descriptors corrupted! [ 1974.949244] EXT4-fs (loop6): get root inode failed [ 1974.950447] EXT4-fs (loop6): mount failed 12:35:27 executing program 7: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="0200000003", 0x5, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000180)) 12:35:27 executing program 3: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_init_net_socket$802154_raw(0x24, 0x3, 0x0) sendmmsg$inet6(r0, &(0x7f0000004d00)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0) [ 1975.053278] EXT4-fs (loop4): mounted filesystem without journal. Opts: ,errors=continue [ 1975.053791] EXT4-fs (loop2): mounted filesystem without journal. Opts: ,errors=continue 12:35:27 executing program 0: r0 = creat(&(0x7f0000000040)='./file0\x00', 0x0) r1 = creat(&(0x7f0000000040)='./file0\x00', 0x0) fallocate(r1, 0x0, 0x0, 0x8800000) fallocate(r1, 0x3, 0x0, 0x8000) fallocate(r0, 0x0, 0x10000000, 0x8800000) 12:35:27 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000", 0x1a, 0x2100}], 0x0, &(0x7f0000000180)) 12:35:27 executing program 6: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d}], 0x0, &(0x7f0000000180)) 12:35:27 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="02000000030000", 0x7, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000180)) 12:35:27 executing program 2: ioctl$RTC_UIE_ON(0xffffffffffffffff, 0x7003) r0 = perf_event_open(&(0x7f00000001c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x2}, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0xfffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) dup2(0xffffffffffffffff, r0) r1 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000180)) pkey_mprotect(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x0, 0xffffffffffffffff) pkey_mprotect(&(0x7f0000ff4000/0x4000)=nil, 0x4000, 0x0, 0xffffffffffffffff) symlinkat(&(0x7f00000000c0)='./file0\x00', r1, &(0x7f0000000140)='./file0\x00') socket$inet_udp(0x2, 0x2, 0x0) getsockopt$inet_int(0xffffffffffffffff, 0x0, 0xe, 0x0, &(0x7f0000000280)) ioctl$RTC_ALM_SET(0xffffffffffffffff, 0x40247007, 0x0) getsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, 0x0, 0x0) 12:35:27 executing program 4: ioctl$RTC_UIE_ON(0xffffffffffffffff, 0x7003) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x2}, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0xfffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = dup2(0xffffffffffffffff, r0) perf_event_open(&(0x7f00000001c0)={0x2, 0x80, 0x8, 0x9, 0x4, 0x1, 0x0, 0x3b3d, 0x200a0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x2, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0xffff, 0x1, @perf_config_ext={0x7, 0x1}, 0x281, 0xffffffff, 0x4, 0x0, 0x401, 0xffffff47, 0x401, 0x0, 0x3, 0x0, 0x415}, 0x0, 0xffffffffffffffff, r0, 0x1) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000180)) pkey_mprotect(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x0, 0xffffffffffffffff) pkey_mprotect(&(0x7f0000ff4000/0x4000)=nil, 0x4000, 0x0, 0xffffffffffffffff) socket$inet_udp(0x2, 0x2, 0x0) getsockopt$inet_int(0xffffffffffffffff, 0x0, 0xe, 0x0, &(0x7f0000000280)) ioctl$sock_SIOCADDDLCI(0xffffffffffffffff, 0x8980, 0x0) ioctl$RTC_ALM_SET(r1, 0x40247007, 0x0) mmap$IORING_OFF_SQES(&(0x7f0000ff3000/0x2000)=nil, 0x2000, 0x2000002, 0x10, r1, 0x10000000) getsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, 0x0, 0x0) [ 1975.265197] EXT4-fs (loop7): ext4_check_descriptors: Inode table for group 0 overlaps superblock [ 1975.267141] EXT4-fs (loop7): group descriptors corrupted! 12:35:28 executing program 3: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_init_net_socket$802154_raw(0x24, 0x3, 0x0) sendmmsg$inet6(r0, &(0x7f0000004d00)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0) [ 1975.367035] EXT4-fs error (device loop1): ext4_fill_super:4959: inode #2: comm syz-executor.1: iget: root inode unallocated [ 1975.379404] EXT4-fs (loop1): get root inode failed [ 1975.380637] EXT4-fs (loop1): mount failed 12:35:28 executing program 0: r0 = creat(&(0x7f0000000040)='./file0\x00', 0x0) r1 = creat(&(0x7f0000000040)='./file0\x00', 0x0) fallocate(r1, 0x0, 0x0, 0x8800000) fallocate(r1, 0x3, 0x0, 0x8000) fallocate(r0, 0x0, 0x12000000, 0x8800000) [ 1975.414390] EXT4-fs error (device loop6): ext4_fill_super:4959: inode #2: comm syz-executor.6: iget: root inode unallocated [ 1975.418926] EXT4-fs (loop6): get root inode failed [ 1975.420194] EXT4-fs (loop6): mount failed [ 1975.455031] EXT4-fs (loop5): ext4_check_descriptors: Inode table for group 0 overlaps superblock [ 1975.456980] EXT4-fs (loop5): group descriptors corrupted! [ 1975.505499] EXT4-fs (loop2): mounted filesystem without journal. Opts: ,errors=continue [ 1975.676348] EXT4-fs (loop4): mounted filesystem without journal. Opts: ,errors=continue 12:35:44 executing program 0: r0 = creat(&(0x7f0000000040)='./file0\x00', 0x0) r1 = creat(&(0x7f0000000040)='./file0\x00', 0x0) fallocate(r1, 0x0, 0x0, 0x8800000) fallocate(r1, 0x3, 0x0, 0x8000) fallocate(r0, 0x0, 0x20000000, 0x8800000) 12:35:44 executing program 7: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="0200000003", 0x5, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000180)) 12:35:44 executing program 4: ioctl$RTC_UIE_ON(0xffffffffffffffff, 0x7003) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x2}, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0xfffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = dup2(0xffffffffffffffff, r0) perf_event_open(&(0x7f00000001c0)={0x2, 0x80, 0x8, 0x9, 0x4, 0x1, 0x0, 0x3b3d, 0x200a0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x2, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0xffff, 0x1, @perf_config_ext={0x7, 0x1}, 0x281, 0xffffffff, 0x4, 0x3, 0x0, 0xffffff47, 0x401, 0x0, 0x3, 0x0, 0x415}, 0x0, 0xffffffffffffffff, r0, 0x1) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000180)) pkey_mprotect(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x0, 0xffffffffffffffff) pkey_mprotect(&(0x7f0000ff4000/0x4000)=nil, 0x4000, 0x0, 0xffffffffffffffff) socket$inet_udp(0x2, 0x2, 0x0) getsockopt$inet_int(0xffffffffffffffff, 0x0, 0xe, 0x0, &(0x7f0000000280)) ioctl$sock_SIOCADDDLCI(0xffffffffffffffff, 0x8980, 0x0) ioctl$RTC_ALM_SET(r1, 0x40247007, 0x0) mmap$IORING_OFF_SQES(&(0x7f0000ff3000/0x2000)=nil, 0x2000, 0x2000002, 0x10, r1, 0x10000000) getsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, 0x0, 0x0) 12:35:44 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="02000000030000", 0x7, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000180)) 12:35:44 executing program 6: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d}], 0x0, &(0x7f0000000180)) 12:35:44 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000", 0x1a, 0x2100}], 0x0, &(0x7f0000000180)) 12:35:44 executing program 3: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_init_net_socket$802154_raw(0x24, 0x3, 0x0) sendmmsg$inet6(r0, &(0x7f0000004d00)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0) 12:35:44 executing program 2: ioctl$RTC_UIE_ON(0xffffffffffffffff, 0x7003) r0 = perf_event_open(&(0x7f00000001c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x2}, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0xfffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) dup2(0xffffffffffffffff, r0) r1 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000180)) pkey_mprotect(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x0, 0xffffffffffffffff) pkey_mprotect(&(0x7f0000ff4000/0x4000)=nil, 0x4000, 0x0, 0xffffffffffffffff) symlinkat(&(0x7f00000000c0)='./file0\x00', r1, &(0x7f0000000140)='./file0\x00') socket$inet_udp(0x2, 0x2, 0x0) getsockopt$inet_int(0xffffffffffffffff, 0x0, 0xe, 0x0, &(0x7f0000000280)) ioctl$RTC_ALM_SET(0xffffffffffffffff, 0x40247007, 0x0) getsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, 0x0, 0x0) [ 1992.163747] EXT4-fs (loop7): ext4_check_descriptors: Inode table for group 0 overlaps superblock [ 1992.165414] EXT4-fs (loop7): group descriptors corrupted! [ 1992.210811] EXT4-fs (loop5): ext4_check_descriptors: Inode table for group 0 overlaps superblock [ 1992.213498] EXT4-fs (loop5): group descriptors corrupted! [ 1992.222816] EXT4-fs error (device loop1): ext4_fill_super:4959: inode #2: comm syz-executor.1: iget: root inode unallocated [ 1992.238923] EXT4-fs error (device loop6): ext4_fill_super:4959: inode #2: comm syz-executor.6: iget: root inode unallocated [ 1992.239678] EXT4-fs (loop1): get root inode failed [ 1992.242980] EXT4-fs (loop1): mount failed [ 1992.248147] EXT4-fs (loop6): get root inode failed [ 1992.249738] EXT4-fs (loop6): mount failed [ 1992.257786] EXT4-fs (loop4): mounted filesystem without journal. Opts: ,errors=continue [ 1992.274631] EXT4-fs (loop2): mounted filesystem without journal. Opts: ,errors=continue 12:36:04 executing program 7: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="02000000030000", 0x7, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000180)) 12:36:04 executing program 3: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_init_net_socket$802154_raw(0x24, 0x3, 0x0) sendmmsg$inet6(r0, &(0x7f0000004d00)=[{{0x0, 0x0, &(0x7f00000004c0)}}], 0x1, 0x0) 12:36:04 executing program 2: ioctl$RTC_UIE_ON(0xffffffffffffffff, 0x7003) r0 = perf_event_open(&(0x7f00000001c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x2}, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0xfffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) dup2(0xffffffffffffffff, r0) r1 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000180)) pkey_mprotect(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x0, 0xffffffffffffffff) pkey_mprotect(&(0x7f0000ff4000/0x4000)=nil, 0x4000, 0x0, 0xffffffffffffffff) symlinkat(&(0x7f00000000c0)='./file0\x00', r1, &(0x7f0000000140)='./file0\x00') socket$inet_udp(0x2, 0x2, 0x0) getsockopt$inet_int(0xffffffffffffffff, 0x0, 0xe, 0x0, &(0x7f0000000280)) ioctl$RTC_ALM_SET(0xffffffffffffffff, 0x40247007, 0x0) 12:36:04 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="02000000030000", 0x7, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000180)) 12:36:04 executing program 0: r0 = creat(&(0x7f0000000040)='./file0\x00', 0x0) r1 = creat(&(0x7f0000000040)='./file0\x00', 0x0) fallocate(r1, 0x0, 0x0, 0x8800000) fallocate(r1, 0x3, 0x0, 0x8000) fallocate(r0, 0x0, 0x21030000, 0x8800000) 12:36:04 executing program 6: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000180)) 12:36:04 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000", 0x1a, 0x2100}], 0x0, &(0x7f0000000180)) 12:36:04 executing program 4: ioctl$RTC_UIE_ON(0xffffffffffffffff, 0x7003) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x2}, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0xfffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = dup2(0xffffffffffffffff, r0) perf_event_open(&(0x7f00000001c0)={0x2, 0x80, 0x8, 0x9, 0x4, 0x1, 0x0, 0x3b3d, 0x200a0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x2, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0xffff, 0x1, @perf_config_ext={0x7, 0x1}, 0x281, 0xffffffff, 0x4, 0x3, 0x0, 0xffffff47, 0x401, 0x0, 0x3, 0x0, 0x415}, 0x0, 0xffffffffffffffff, r0, 0x1) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000180)) pkey_mprotect(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x0, 0xffffffffffffffff) pkey_mprotect(&(0x7f0000ff4000/0x4000)=nil, 0x4000, 0x0, 0xffffffffffffffff) socket$inet_udp(0x2, 0x2, 0x0) getsockopt$inet_int(0xffffffffffffffff, 0x0, 0xe, 0x0, &(0x7f0000000280)) ioctl$sock_SIOCADDDLCI(0xffffffffffffffff, 0x8980, 0x0) ioctl$RTC_ALM_SET(r1, 0x40247007, 0x0) mmap$IORING_OFF_SQES(&(0x7f0000ff3000/0x2000)=nil, 0x2000, 0x2000002, 0x10, r1, 0x10000000) getsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, 0x0, 0x0) [ 2011.786156] EXT4-fs (loop7): ext4_check_descriptors: Inode table for group 0 overlaps superblock [ 2011.788157] EXT4-fs (loop7): group descriptors corrupted! [ 2011.789969] EXT4-fs (loop6): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 2011.791880] EXT4-fs (loop6): group descriptors corrupted! [ 2011.799133] EXT4-fs error (device loop1): ext4_fill_super:4959: inode #2: comm syz-executor.1: iget: root inode unallocated [ 2011.806251] EXT4-fs (loop1): get root inode failed [ 2011.807582] EXT4-fs (loop1): mount failed 12:36:04 executing program 3: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_init_net_socket$802154_raw(0x24, 0x3, 0x0) sendmmsg$inet6(r0, &(0x7f0000004d00)=[{{0x0, 0x0, &(0x7f00000004c0)}}], 0x1, 0x0) [ 2011.829256] EXT4-fs (loop5): ext4_check_descriptors: Inode table for group 0 overlaps superblock [ 2011.831377] EXT4-fs (loop5): group descriptors corrupted! 12:36:04 executing program 0: r0 = creat(&(0x7f0000000040)='./file0\x00', 0x0) r1 = creat(&(0x7f0000000040)='./file0\x00', 0x0) fallocate(r1, 0x0, 0x0, 0x8800000) fallocate(r1, 0x3, 0x0, 0x8000) fallocate(r0, 0x0, 0x64000000, 0x8800000) [ 2011.924173] EXT4-fs (loop4): mounted filesystem without journal. Opts: ,errors=continue [ 2011.931202] EXT4-fs (loop2): mounted filesystem without journal. Opts: ,errors=continue 12:36:04 executing program 7: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="02000000030000", 0x7, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000180)) 12:36:04 executing program 6: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000180)) 12:36:04 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="0200000003000000", 0x8, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000180)) 12:36:04 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f0000000000000400", 0x1c, 0x2100}], 0x0, &(0x7f0000000180)) 12:36:04 executing program 2: ioctl$RTC_UIE_ON(0xffffffffffffffff, 0x7003) r0 = perf_event_open(&(0x7f00000001c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x2}, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0xfffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) dup2(0xffffffffffffffff, r0) r1 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000180)) pkey_mprotect(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x0, 0xffffffffffffffff) pkey_mprotect(&(0x7f0000ff4000/0x4000)=nil, 0x4000, 0x0, 0xffffffffffffffff) symlinkat(&(0x7f00000000c0)='./file0\x00', r1, &(0x7f0000000140)='./file0\x00') socket$inet_udp(0x2, 0x2, 0x0) getsockopt$inet_int(0xffffffffffffffff, 0x0, 0xe, 0x0, &(0x7f0000000280)) 12:36:04 executing program 4: ioctl$RTC_UIE_ON(0xffffffffffffffff, 0x7003) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x2}, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0xfffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = dup2(0xffffffffffffffff, r0) perf_event_open(&(0x7f00000001c0)={0x2, 0x80, 0x8, 0x9, 0x4, 0x1, 0x0, 0x3b3d, 0x200a0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x2, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0xffff, 0x1, @perf_config_ext={0x7, 0x1}, 0x281, 0xffffffff, 0x4, 0x3, 0x0, 0xffffff47, 0x401, 0x0, 0x3, 0x0, 0x415}, 0x0, 0xffffffffffffffff, r0, 0x1) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000180)) pkey_mprotect(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x0, 0xffffffffffffffff) pkey_mprotect(&(0x7f0000ff4000/0x4000)=nil, 0x4000, 0x0, 0xffffffffffffffff) socket$inet_udp(0x2, 0x2, 0x0) getsockopt$inet_int(0xffffffffffffffff, 0x0, 0xe, 0x0, &(0x7f0000000280)) ioctl$sock_SIOCADDDLCI(0xffffffffffffffff, 0x8980, 0x0) ioctl$RTC_ALM_SET(r1, 0x40247007, 0x0) mmap$IORING_OFF_SQES(&(0x7f0000ff3000/0x2000)=nil, 0x2000, 0x2000002, 0x10, r1, 0x10000000) getsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, 0x0, 0x0) 12:36:04 executing program 3: ioctl$RTC_UIE_ON(0xffffffffffffffff, 0x7003) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x2}, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0xfffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = dup2(0xffffffffffffffff, r0) perf_event_open(&(0x7f00000001c0)={0x2, 0x80, 0x8, 0x9, 0x4, 0x1, 0x0, 0x3b3d, 0x200a0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x2, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0xffff, 0x1, @perf_config_ext={0x7, 0x1}, 0x281, 0xffffffff, 0x4, 0x0, 0x401, 0xffffff47, 0x401, 0x0, 0x3, 0x0, 0x415}, 0x0, 0xffffffffffffffff, r0, 0x1) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000180)) pkey_mprotect(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x0, 0xffffffffffffffff) pkey_mprotect(&(0x7f0000ff4000/0x4000)=nil, 0x4000, 0x0, 0xffffffffffffffff) socket$inet_udp(0x2, 0x2, 0x0) getsockopt$inet_int(0xffffffffffffffff, 0x0, 0xe, 0x0, &(0x7f0000000280)) ioctl$sock_SIOCADDDLCI(0xffffffffffffffff, 0x8980, 0x0) ioctl$RTC_ALM_SET(r1, 0x40247007, 0x0) mmap$IORING_OFF_SQES(&(0x7f0000ff3000/0x2000)=nil, 0x2000, 0x2000002, 0x10, r1, 0x10000000) getsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, 0x0, 0x0) [ 2012.167603] EXT4-fs (loop7): ext4_check_descriptors: Inode table for group 0 overlaps superblock [ 2012.169509] EXT4-fs (loop7): group descriptors corrupted! [ 2012.209966] EXT4-fs (loop5): ext4_check_descriptors: Inode table for group 0 overlaps superblock [ 2012.212128] EXT4-fs (loop5): group descriptors corrupted! 12:36:05 executing program 7: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="02000000030000", 0x7, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000180)) [ 2012.237795] EXT4-fs (loop6): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 2012.239860] EXT4-fs (loop6): group descriptors corrupted! [ 2012.283565] EXT4-fs (loop1): corrupt root inode, run e2fsck [ 2012.285372] EXT4-fs (loop1): mount failed 12:36:05 executing program 6: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000180)) 12:36:05 executing program 3: ioctl$RTC_UIE_ON(0xffffffffffffffff, 0x7003) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x2}, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0xfffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = dup2(0xffffffffffffffff, r0) perf_event_open(&(0x7f00000001c0)={0x2, 0x80, 0x8, 0x9, 0x4, 0x1, 0x0, 0x3b3d, 0x200a0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x2, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0xffff, 0x1, @perf_config_ext={0x7, 0x1}, 0x281, 0xffffffff, 0x4, 0x0, 0x401, 0xffffff47, 0x401, 0x0, 0x3, 0x0, 0x415}, 0x0, 0xffffffffffffffff, r0, 0x1) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000180)) pkey_mprotect(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x0, 0xffffffffffffffff) pkey_mprotect(&(0x7f0000ff4000/0x4000)=nil, 0x4000, 0x0, 0xffffffffffffffff) socket$inet_udp(0x2, 0x2, 0x0) getsockopt$inet_int(0xffffffffffffffff, 0x0, 0xe, 0x0, &(0x7f0000000280)) ioctl$sock_SIOCADDDLCI(0xffffffffffffffff, 0x8980, 0x0) ioctl$RTC_ALM_SET(r1, 0x40247007, 0x0) mmap$IORING_OFF_SQES(&(0x7f0000ff3000/0x2000)=nil, 0x2000, 0x2000002, 0x10, r1, 0x10000000) getsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, 0x0, 0x0) 12:36:05 executing program 0: r0 = creat(&(0x7f0000000040)='./file0\x00', 0x0) r1 = creat(&(0x7f0000000040)='./file0\x00', 0x0) fallocate(r1, 0x0, 0x0, 0x8800000) fallocate(r1, 0x3, 0x0, 0x8000) fallocate(r0, 0x0, 0x81020000, 0x8800000) 12:36:05 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f0000000000000400", 0x1c, 0x2100}], 0x0, &(0x7f0000000180)) 12:36:05 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="0200000003000000", 0x8, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000180)) [ 2012.505033] EXT4-fs (loop7): ext4_check_descriptors: Inode table for group 0 overlaps superblock [ 2012.507776] EXT4-fs (loop7): group descriptors corrupted! [ 2012.510337] EXT4-fs (loop6): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 2012.512608] EXT4-fs (loop6): group descriptors corrupted! [ 2012.522290] EXT4-fs (loop2): mounted filesystem without journal. Opts: ,errors=continue [ 2012.564318] EXT4-fs (loop4): mounted filesystem without journal. Opts: ,errors=continue 12:36:05 executing program 6: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0xffffffffdffffff8}, {0x0, 0x0, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000180)) [ 2012.676987] EXT4-fs (loop1): corrupt root inode, run e2fsck [ 2012.686120] EXT4-fs (loop1): mount failed [ 2012.687369] EXT4-fs (loop5): ext4_check_descriptors: Inode table for group 0 overlaps superblock [ 2012.689576] EXT4-fs (loop5): group descriptors corrupted! [ 2012.798839] EXT4-fs (loop6): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 2012.801230] EXT4-fs (loop6): group descriptors corrupted! 12:36:22 executing program 6: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0xffffffffdffffff8}, {0x0, 0x0, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000180)) 12:36:22 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="0200000003000000", 0x8, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000180)) 12:36:22 executing program 0: r0 = creat(&(0x7f0000000040)='./file0\x00', 0x0) r1 = creat(&(0x7f0000000040)='./file0\x00', 0x0) fallocate(r1, 0x0, 0x0, 0x8800000) fallocate(r1, 0x3, 0x0, 0x8000) fallocate(r0, 0x0, 0xf4ffffff, 0x8800000) 12:36:22 executing program 3: ioctl$RTC_UIE_ON(0xffffffffffffffff, 0x7003) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x2}, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0xfffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = dup2(0xffffffffffffffff, r0) perf_event_open(&(0x7f00000001c0)={0x2, 0x80, 0x8, 0x9, 0x4, 0x1, 0x0, 0x3b3d, 0x200a0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x2, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0xffff, 0x1, @perf_config_ext={0x7, 0x1}, 0x281, 0xffffffff, 0x4, 0x0, 0x401, 0xffffff47, 0x401, 0x0, 0x3, 0x0, 0x415}, 0x0, 0xffffffffffffffff, r0, 0x1) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000180)) pkey_mprotect(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x0, 0xffffffffffffffff) pkey_mprotect(&(0x7f0000ff4000/0x4000)=nil, 0x4000, 0x0, 0xffffffffffffffff) socket$inet_udp(0x2, 0x2, 0x0) getsockopt$inet_int(0xffffffffffffffff, 0x0, 0xe, 0x0, &(0x7f0000000280)) ioctl$sock_SIOCADDDLCI(0xffffffffffffffff, 0x8980, 0x0) ioctl$RTC_ALM_SET(r1, 0x40247007, 0x0) mmap$IORING_OFF_SQES(&(0x7f0000ff3000/0x2000)=nil, 0x2000, 0x2000002, 0x10, r1, 0x10000000) getsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, 0x0, 0x0) 12:36:22 executing program 2: ioctl$RTC_UIE_ON(0xffffffffffffffff, 0x7003) r0 = perf_event_open(&(0x7f00000001c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x2}, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0xfffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) dup2(0xffffffffffffffff, r0) r1 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000180)) pkey_mprotect(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x0, 0xffffffffffffffff) pkey_mprotect(&(0x7f0000ff4000/0x4000)=nil, 0x4000, 0x0, 0xffffffffffffffff) symlinkat(&(0x7f00000000c0)='./file0\x00', r1, &(0x7f0000000140)='./file0\x00') socket$inet_udp(0x2, 0x2, 0x0) getsockopt$inet_int(0xffffffffffffffff, 0x0, 0xe, 0x0, &(0x7f0000000280)) 12:36:22 executing program 7: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="0200000003000000", 0x8, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000180)) 12:36:22 executing program 4: ioctl$RTC_UIE_ON(0xffffffffffffffff, 0x7003) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x2}, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0xfffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = dup2(0xffffffffffffffff, r0) perf_event_open(&(0x7f00000001c0)={0x2, 0x80, 0x8, 0x9, 0x4, 0x1, 0x0, 0x3b3d, 0x200a0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x2, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0xffff, 0x1, @perf_config_ext={0x7, 0x1}, 0x281, 0xffffffff, 0x4, 0x3, 0x401, 0x0, 0x401, 0x0, 0x3, 0x0, 0x415}, 0x0, 0xffffffffffffffff, r0, 0x1) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000180)) pkey_mprotect(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x0, 0xffffffffffffffff) pkey_mprotect(&(0x7f0000ff4000/0x4000)=nil, 0x4000, 0x0, 0xffffffffffffffff) socket$inet_udp(0x2, 0x2, 0x0) getsockopt$inet_int(0xffffffffffffffff, 0x0, 0xe, 0x0, &(0x7f0000000280)) ioctl$sock_SIOCADDDLCI(0xffffffffffffffff, 0x8980, 0x0) ioctl$RTC_ALM_SET(r1, 0x40247007, 0x0) mmap$IORING_OFF_SQES(&(0x7f0000ff3000/0x2000)=nil, 0x2000, 0x2000002, 0x10, r1, 0x10000000) getsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, 0x0, 0x0) 12:36:22 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f0000000000000400", 0x1c, 0x2100}], 0x0, &(0x7f0000000180)) [ 2029.351194] EXT4-fs (loop6): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 2029.352538] EXT4-fs (loop6): group descriptors corrupted! [ 2029.371229] EXT4-fs (loop5): ext4_check_descriptors: Inode table for group 0 overlaps superblock [ 2029.372523] EXT4-fs (loop5): group descriptors corrupted! [ 2029.406499] EXT4-fs (loop7): ext4_check_descriptors: Inode table for group 0 overlaps superblock [ 2029.408643] EXT4-fs (loop7): group descriptors corrupted! [ 2029.452513] EXT4-fs (loop1): corrupt root inode, run e2fsck [ 2029.453989] EXT4-fs (loop1): mount failed 12:36:22 executing program 6: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0xffffffffdffffff8}, {0x0, 0x0, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000180)) 12:36:22 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000180)) 12:36:22 executing program 7: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="0200000003000000", 0x8, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000180)) 12:36:22 executing program 3: ioctl$RTC_UIE_ON(0xffffffffffffffff, 0x7003) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x2}, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0xfffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = dup2(0xffffffffffffffff, r0) perf_event_open(&(0x7f00000001c0)={0x2, 0x80, 0x8, 0x9, 0x4, 0x1, 0x0, 0x3b3d, 0x200a0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x2, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0xffff, 0x1, @perf_config_ext={0x7, 0x1}, 0x281, 0xffffffff, 0x4, 0x3, 0x0, 0xffffff47, 0x401, 0x0, 0x3, 0x0, 0x415}, 0x0, 0xffffffffffffffff, r0, 0x1) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000180)) pkey_mprotect(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x0, 0xffffffffffffffff) pkey_mprotect(&(0x7f0000ff4000/0x4000)=nil, 0x4000, 0x0, 0xffffffffffffffff) socket$inet_udp(0x2, 0x2, 0x0) getsockopt$inet_int(0xffffffffffffffff, 0x0, 0xe, 0x0, &(0x7f0000000280)) ioctl$sock_SIOCADDDLCI(0xffffffffffffffff, 0x8980, 0x0) ioctl$RTC_ALM_SET(r1, 0x40247007, 0x0) mmap$IORING_OFF_SQES(&(0x7f0000ff3000/0x2000)=nil, 0x2000, 0x2000002, 0x10, r1, 0x10000000) getsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, 0x0, 0x0) [ 2029.567665] EXT4-fs (loop2): mounted filesystem without journal. Opts: ,errors=continue [ 2029.577212] EXT4-fs (loop4): mounted filesystem without journal. Opts: ,errors=continue 12:36:22 executing program 0: r0 = creat(&(0x7f0000000040)='./file0\x00', 0x0) r1 = creat(&(0x7f0000000040)='./file0\x00', 0x0) fallocate(r1, 0x0, 0x0, 0x8800000) fallocate(r1, 0x3, 0x0, 0x8000) fallocate(r0, 0x0, 0xfbffffff, 0x8800000) 12:36:22 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d}], 0x0, &(0x7f0000000180)) [ 2029.684625] EXT4-fs (loop5): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 2029.686689] EXT4-fs (loop5): group descriptors corrupted! [ 2029.699021] EXT4-fs (loop6): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 2029.700967] EXT4-fs (loop6): group descriptors corrupted! 12:36:22 executing program 2: ioctl$RTC_UIE_ON(0xffffffffffffffff, 0x7003) r0 = perf_event_open(&(0x7f00000001c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x2}, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0xfffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) dup2(0xffffffffffffffff, r0) r1 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000180)) pkey_mprotect(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x0, 0xffffffffffffffff) pkey_mprotect(&(0x7f0000ff4000/0x4000)=nil, 0x4000, 0x0, 0xffffffffffffffff) symlinkat(&(0x7f00000000c0)='./file0\x00', r1, &(0x7f0000000140)='./file0\x00') socket$inet_udp(0x2, 0x2, 0x0) [ 2029.822451] EXT4-fs (loop7): ext4_check_descriptors: Inode table for group 0 overlaps superblock [ 2029.824625] EXT4-fs (loop7): group descriptors corrupted! [ 2029.898039] EXT4-fs error (device loop1): ext4_fill_super:4959: inode #2: comm syz-executor.1: iget: root inode unallocated [ 2029.908290] EXT4-fs (loop1): get root inode failed [ 2029.909375] EXT4-fs (loop1): mount failed [ 2030.031710] EXT4-fs (loop2): mounted filesystem without journal. Opts: ,errors=continue 12:36:41 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000180)) 12:36:41 executing program 2: ioctl$RTC_UIE_ON(0xffffffffffffffff, 0x7003) r0 = perf_event_open(&(0x7f00000001c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x2}, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0xfffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) dup2(0xffffffffffffffff, r0) r1 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000180)) pkey_mprotect(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x0, 0xffffffffffffffff) pkey_mprotect(&(0x7f0000ff4000/0x4000)=nil, 0x4000, 0x0, 0xffffffffffffffff) symlinkat(&(0x7f00000000c0)='./file0\x00', r1, &(0x7f0000000140)='./file0\x00') 12:36:41 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d}], 0x0, &(0x7f0000000180)) 12:36:41 executing program 4: ioctl$RTC_UIE_ON(0xffffffffffffffff, 0x7003) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x2}, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0xfffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = dup2(0xffffffffffffffff, r0) perf_event_open(&(0x7f00000001c0)={0x2, 0x80, 0x8, 0x9, 0x4, 0x1, 0x0, 0x3b3d, 0x200a0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x2, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0xffff, 0x1, @perf_config_ext={0x7, 0x1}, 0x281, 0xffffffff, 0x4, 0x3, 0x401, 0x0, 0x401, 0x0, 0x3, 0x0, 0x415}, 0x0, 0xffffffffffffffff, r0, 0x1) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000180)) pkey_mprotect(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x0, 0xffffffffffffffff) pkey_mprotect(&(0x7f0000ff4000/0x4000)=nil, 0x4000, 0x0, 0xffffffffffffffff) socket$inet_udp(0x2, 0x2, 0x0) getsockopt$inet_int(0xffffffffffffffff, 0x0, 0xe, 0x0, &(0x7f0000000280)) ioctl$sock_SIOCADDDLCI(0xffffffffffffffff, 0x8980, 0x0) ioctl$RTC_ALM_SET(r1, 0x40247007, 0x0) mmap$IORING_OFF_SQES(&(0x7f0000ff3000/0x2000)=nil, 0x2000, 0x2000002, 0x10, r1, 0x10000000) getsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, 0x0, 0x0) 12:36:41 executing program 6: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400), 0x0, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000180)) 12:36:41 executing program 7: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="0200000003000000", 0x8, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000180)) 12:36:41 executing program 0: r0 = creat(&(0x7f0000000040)='./file0\x00', 0x0) r1 = creat(&(0x7f0000000040)='./file0\x00', 0x0) fallocate(r1, 0x0, 0x0, 0x8800000) fallocate(r1, 0x3, 0x0, 0x8000) fallocate(r0, 0x0, 0xfeffffff, 0x8800000) 12:36:41 executing program 3: ioctl$RTC_UIE_ON(0xffffffffffffffff, 0x7003) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x2}, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0xfffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = dup2(0xffffffffffffffff, r0) perf_event_open(&(0x7f00000001c0)={0x2, 0x80, 0x8, 0x9, 0x4, 0x1, 0x0, 0x3b3d, 0x200a0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x2, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0xffff, 0x1, @perf_config_ext={0x7, 0x1}, 0x281, 0xffffffff, 0x4, 0x3, 0x0, 0xffffff47, 0x401, 0x0, 0x3, 0x0, 0x415}, 0x0, 0xffffffffffffffff, r0, 0x1) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000180)) pkey_mprotect(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x0, 0xffffffffffffffff) pkey_mprotect(&(0x7f0000ff4000/0x4000)=nil, 0x4000, 0x0, 0xffffffffffffffff) socket$inet_udp(0x2, 0x2, 0x0) getsockopt$inet_int(0xffffffffffffffff, 0x0, 0xe, 0x0, &(0x7f0000000280)) ioctl$sock_SIOCADDDLCI(0xffffffffffffffff, 0x8980, 0x0) ioctl$RTC_ALM_SET(r1, 0x40247007, 0x0) mmap$IORING_OFF_SQES(&(0x7f0000ff3000/0x2000)=nil, 0x2000, 0x2000002, 0x10, r1, 0x10000000) getsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, 0x0, 0x0) [ 2048.770469] EXT4-fs (loop6): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 2048.772427] EXT4-fs (loop6): group descriptors corrupted! [ 2048.778231] EXT4-fs (loop5): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 2048.780338] EXT4-fs (loop5): group descriptors corrupted! [ 2048.791090] EXT4-fs error (device loop1): ext4_fill_super:4959: inode #2: comm syz-executor.1: iget: root inode unallocated [ 2048.794252] EXT4-fs (loop1): get root inode failed [ 2048.795366] EXT4-fs (loop1): mount failed [ 2048.798413] EXT4-fs (loop2): mounted filesystem without journal. Opts: ,errors=continue [ 2048.815598] EXT4-fs (loop7): ext4_check_descriptors: Inode table for group 0 overlaps superblock [ 2048.817548] EXT4-fs (loop7): group descriptors corrupted! [ 2048.985470] EXT4-fs (loop4): mounted filesystem without journal. Opts: ,errors=continue 12:37:00 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000180)) 12:37:00 executing program 3: ioctl$RTC_UIE_ON(0xffffffffffffffff, 0x7003) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x2}, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0xfffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = dup2(0xffffffffffffffff, r0) perf_event_open(&(0x7f00000001c0)={0x2, 0x80, 0x8, 0x9, 0x4, 0x1, 0x0, 0x3b3d, 0x200a0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x2, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0xffff, 0x1, @perf_config_ext={0x7, 0x1}, 0x281, 0xffffffff, 0x4, 0x3, 0x0, 0xffffff47, 0x401, 0x0, 0x3, 0x0, 0x415}, 0x0, 0xffffffffffffffff, r0, 0x1) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000180)) pkey_mprotect(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x0, 0xffffffffffffffff) pkey_mprotect(&(0x7f0000ff4000/0x4000)=nil, 0x4000, 0x0, 0xffffffffffffffff) socket$inet_udp(0x2, 0x2, 0x0) getsockopt$inet_int(0xffffffffffffffff, 0x0, 0xe, 0x0, &(0x7f0000000280)) ioctl$sock_SIOCADDDLCI(0xffffffffffffffff, 0x8980, 0x0) ioctl$RTC_ALM_SET(r1, 0x40247007, 0x0) mmap$IORING_OFF_SQES(&(0x7f0000ff3000/0x2000)=nil, 0x2000, 0x2000002, 0x10, r1, 0x10000000) getsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, 0x0, 0x0) 12:37:00 executing program 4: ioctl$RTC_UIE_ON(0xffffffffffffffff, 0x7003) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x2}, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0xfffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = dup2(0xffffffffffffffff, r0) perf_event_open(&(0x7f00000001c0)={0x2, 0x80, 0x8, 0x9, 0x4, 0x1, 0x0, 0x3b3d, 0x200a0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x2, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0xffff, 0x1, @perf_config_ext={0x7, 0x1}, 0x281, 0xffffffff, 0x4, 0x3, 0x401, 0x0, 0x401, 0x0, 0x3, 0x0, 0x415}, 0x0, 0xffffffffffffffff, r0, 0x1) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000180)) pkey_mprotect(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x0, 0xffffffffffffffff) pkey_mprotect(&(0x7f0000ff4000/0x4000)=nil, 0x4000, 0x0, 0xffffffffffffffff) socket$inet_udp(0x2, 0x2, 0x0) getsockopt$inet_int(0xffffffffffffffff, 0x0, 0xe, 0x0, &(0x7f0000000280)) ioctl$sock_SIOCADDDLCI(0xffffffffffffffff, 0x8980, 0x0) ioctl$RTC_ALM_SET(r1, 0x40247007, 0x0) mmap$IORING_OFF_SQES(&(0x7f0000ff3000/0x2000)=nil, 0x2000, 0x2000002, 0x10, r1, 0x10000000) getsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, 0x0, 0x0) 12:37:00 executing program 2: ioctl$RTC_UIE_ON(0xffffffffffffffff, 0x7003) r0 = perf_event_open(&(0x7f00000001c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x2}, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0xfffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) dup2(0xffffffffffffffff, r0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000180)) pkey_mprotect(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x0, 0xffffffffffffffff) pkey_mprotect(&(0x7f0000ff4000/0x4000)=nil, 0x4000, 0x0, 0xffffffffffffffff) 12:37:00 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d}], 0x0, &(0x7f0000000180)) 12:37:00 executing program 0: r0 = creat(&(0x7f0000000040)='./file0\x00', 0x0) r1 = creat(&(0x7f0000000040)='./file0\x00', 0x0) fallocate(r1, 0x0, 0x0, 0x8800000) fallocate(r1, 0x3, 0x0, 0x8000) fallocate(r0, 0x0, 0xff010000, 0x8800000) 12:37:00 executing program 6: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400), 0x0, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000180)) 12:37:00 executing program 7: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000180)) [ 2067.338804] EXT4-fs (loop5): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 2067.341028] EXT4-fs (loop5): group descriptors corrupted! [ 2067.357063] EXT4-fs (loop6): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 2067.359106] EXT4-fs (loop6): group descriptors corrupted! [ 2067.374005] EXT4-fs (loop7): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 2067.375945] EXT4-fs (loop7): group descriptors corrupted! [ 2067.414249] EXT4-fs error (device loop1): ext4_fill_super:4959: inode #2: comm syz-executor.1: iget: root inode unallocated [ 2067.419186] EXT4-fs (loop1): get root inode failed [ 2067.420293] EXT4-fs (loop1): mount failed 12:37:00 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000180)) 12:37:00 executing program 0: r0 = creat(&(0x7f0000000040)='./file0\x00', 0x0) r1 = creat(&(0x7f0000000040)='./file0\x00', 0x0) fallocate(r1, 0x0, 0x0, 0x8800000) fallocate(r1, 0x3, 0x0, 0x8000) fallocate(r0, 0x0, 0xff070000, 0x8800000) [ 2067.508799] EXT4-fs (loop2): mounted filesystem without journal. Opts: ,errors=continue [ 2067.512492] EXT4-fs (loop4): mounted filesystem without journal. Opts: ,errors=continue 12:37:00 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000180)) 12:37:00 executing program 6: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400), 0x0, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000180)) 12:37:00 executing program 3: ioctl$RTC_UIE_ON(0xffffffffffffffff, 0x7003) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x2}, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0xfffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = dup2(0xffffffffffffffff, r0) perf_event_open(&(0x7f00000001c0)={0x2, 0x80, 0x8, 0x9, 0x4, 0x1, 0x0, 0x3b3d, 0x200a0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x2, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0xffff, 0x1, @perf_config_ext={0x7, 0x1}, 0x281, 0xffffffff, 0x0, 0x3, 0x401, 0xffffff47, 0x401, 0x0, 0x3, 0x0, 0x415}, 0x0, 0xffffffffffffffff, r0, 0x1) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000180)) pkey_mprotect(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x0, 0xffffffffffffffff) pkey_mprotect(&(0x7f0000ff4000/0x4000)=nil, 0x4000, 0x0, 0xffffffffffffffff) socket$inet_udp(0x2, 0x2, 0x0) getsockopt$inet_int(0xffffffffffffffff, 0x0, 0xe, 0x0, &(0x7f0000000280)) ioctl$sock_SIOCADDDLCI(0xffffffffffffffff, 0x8980, 0x0) ioctl$RTC_ALM_SET(r1, 0x40247007, 0x0) mmap$IORING_OFF_SQES(&(0x7f0000ff3000/0x2000)=nil, 0x2000, 0x2000002, 0x10, r1, 0x10000000) getsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, 0x0, 0x0) 12:37:00 executing program 7: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000180)) [ 2067.626433] EXT4-fs (loop5): bad geometry: block count 128 exceeds size of device (8 blocks) 12:37:00 executing program 2: ioctl$RTC_UIE_ON(0xffffffffffffffff, 0x7003) r0 = perf_event_open(&(0x7f00000001c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x2}, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0xfffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) dup2(0xffffffffffffffff, r0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000180)) pkey_mprotect(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x0, 0xffffffffffffffff) 12:37:00 executing program 4: ioctl$RTC_UIE_ON(0xffffffffffffffff, 0x7003) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x2}, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0xfffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = dup2(0xffffffffffffffff, r0) perf_event_open(&(0x7f00000001c0)={0x2, 0x80, 0x8, 0x9, 0x4, 0x1, 0x0, 0x3b3d, 0x200a0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x2, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0xffff, 0x1, @perf_config_ext={0x7, 0x1}, 0x281, 0xffffffff, 0x4, 0x3, 0x401, 0xffffff47, 0x0, 0x0, 0x3, 0x0, 0x415}, 0x0, 0xffffffffffffffff, r0, 0x1) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000180)) pkey_mprotect(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x0, 0xffffffffffffffff) pkey_mprotect(&(0x7f0000ff4000/0x4000)=nil, 0x4000, 0x0, 0xffffffffffffffff) socket$inet_udp(0x2, 0x2, 0x0) getsockopt$inet_int(0xffffffffffffffff, 0x0, 0xe, 0x0, &(0x7f0000000280)) ioctl$sock_SIOCADDDLCI(0xffffffffffffffff, 0x8980, 0x0) ioctl$RTC_ALM_SET(r1, 0x40247007, 0x0) mmap$IORING_OFF_SQES(&(0x7f0000ff3000/0x2000)=nil, 0x2000, 0x2000002, 0x10, r1, 0x10000000) getsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, 0x0, 0x0) 12:37:00 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000180)) [ 2067.740389] EXT4-fs (loop6): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 2067.742461] EXT4-fs (loop6): group descriptors corrupted! [ 2067.748318] EXT4-fs (loop1): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 2067.750234] EXT4-fs (loop1): group descriptors corrupted! 12:37:00 executing program 6: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="0200000003", 0x5, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000180)) [ 2067.828450] EXT4-fs (loop7): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 2067.830437] EXT4-fs (loop7): group descriptors corrupted! 12:37:00 executing program 0: r0 = creat(&(0x7f0000000040)='./file0\x00', 0x0) r1 = creat(&(0x7f0000000040)='./file0\x00', 0x0) fallocate(r1, 0x0, 0x0, 0x8800000) fallocate(r1, 0x3, 0x0, 0x8000) fallocate(r0, 0x0, 0xfffffff4, 0x8800000) 12:37:00 executing program 7: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000180)) 12:37:00 executing program 3: ioctl$RTC_UIE_ON(0xffffffffffffffff, 0x7003) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x2}, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0xfffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = dup2(0xffffffffffffffff, r0) perf_event_open(&(0x7f00000001c0)={0x2, 0x80, 0x8, 0x9, 0x4, 0x1, 0x0, 0x3b3d, 0x200a0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x2, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0xffff, 0x1, @perf_config_ext={0x7, 0x1}, 0x281, 0xffffffff, 0x0, 0x3, 0x401, 0xffffff47, 0x401, 0x0, 0x3, 0x0, 0x415}, 0x0, 0xffffffffffffffff, r0, 0x1) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000180)) pkey_mprotect(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x0, 0xffffffffffffffff) pkey_mprotect(&(0x7f0000ff4000/0x4000)=nil, 0x4000, 0x0, 0xffffffffffffffff) socket$inet_udp(0x2, 0x2, 0x0) getsockopt$inet_int(0xffffffffffffffff, 0x0, 0xe, 0x0, &(0x7f0000000280)) ioctl$sock_SIOCADDDLCI(0xffffffffffffffff, 0x8980, 0x0) ioctl$RTC_ALM_SET(r1, 0x40247007, 0x0) mmap$IORING_OFF_SQES(&(0x7f0000ff3000/0x2000)=nil, 0x2000, 0x2000002, 0x10, r1, 0x10000000) getsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, 0x0, 0x0) 12:37:00 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000180)) 12:37:00 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000180)) [ 2067.993551] EXT4-fs (loop2): mounted filesystem without journal. Opts: ,errors=continue [ 2068.025414] EXT4-fs (loop4): mounted filesystem without journal. Opts: ,errors=continue [ 2068.049142] EXT4-fs (loop6): ext4_check_descriptors: Inode table for group 0 overlaps superblock [ 2068.051194] EXT4-fs (loop6): group descriptors corrupted! 12:37:00 executing program 2: ioctl$RTC_UIE_ON(0xffffffffffffffff, 0x7003) r0 = perf_event_open(&(0x7f00000001c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x2}, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0xfffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) dup2(0xffffffffffffffff, r0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000180)) [ 2068.100597] EXT4-fs (loop7): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 2068.102625] EXT4-fs (loop7): group descriptors corrupted! [ 2068.160394] EXT4-fs (loop5): bad geometry: block count 128 exceeds size of device (8 blocks) 12:37:00 executing program 6: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="0200000003", 0x5, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000180)) 12:37:00 executing program 0: r0 = creat(&(0x7f0000000040)='./file0\x00', 0x0) r1 = creat(&(0x7f0000000040)='./file0\x00', 0x0) fallocate(r1, 0x0, 0x0, 0x8800000) fallocate(r1, 0x3, 0x0, 0x8000) fallocate(r0, 0x0, 0xfffffffb, 0x8800000) [ 2068.202068] EXT4-fs (loop1): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 2068.204563] EXT4-fs (loop1): group descriptors corrupted! [ 2068.351960] EXT4-fs (loop6): ext4_check_descriptors: Inode table for group 0 overlaps superblock [ 2068.354232] EXT4-fs (loop6): group descriptors corrupted! [ 2068.397605] EXT4-fs (loop2): mounted filesystem without journal. Opts: ,errors=continue 12:37:19 executing program 0: r0 = creat(&(0x7f0000000040)='./file0\x00', 0x0) r1 = creat(&(0x7f0000000040)='./file0\x00', 0x0) fallocate(r1, 0x0, 0x0, 0x8800000) fallocate(r1, 0x3, 0x0, 0x8000) fallocate(r0, 0x0, 0xfffffffe, 0x8800000) 12:37:19 executing program 4: ioctl$RTC_UIE_ON(0xffffffffffffffff, 0x7003) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x2}, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0xfffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = dup2(0xffffffffffffffff, r0) perf_event_open(&(0x7f00000001c0)={0x2, 0x80, 0x8, 0x9, 0x4, 0x1, 0x0, 0x3b3d, 0x200a0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x2, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0xffff, 0x1, @perf_config_ext={0x7, 0x1}, 0x281, 0xffffffff, 0x4, 0x3, 0x401, 0xffffff47, 0x0, 0x0, 0x3, 0x0, 0x415}, 0x0, 0xffffffffffffffff, r0, 0x1) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000180)) pkey_mprotect(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x0, 0xffffffffffffffff) pkey_mprotect(&(0x7f0000ff4000/0x4000)=nil, 0x4000, 0x0, 0xffffffffffffffff) socket$inet_udp(0x2, 0x2, 0x0) getsockopt$inet_int(0xffffffffffffffff, 0x0, 0xe, 0x0, &(0x7f0000000280)) ioctl$sock_SIOCADDDLCI(0xffffffffffffffff, 0x8980, 0x0) ioctl$RTC_ALM_SET(r1, 0x40247007, 0x0) mmap$IORING_OFF_SQES(&(0x7f0000ff3000/0x2000)=nil, 0x2000, 0x2000002, 0x10, r1, 0x10000000) getsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, 0x0, 0x0) 12:37:19 executing program 2: ioctl$RTC_UIE_ON(0xffffffffffffffff, 0x7003) perf_event_open(&(0x7f00000001c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x2}, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0xfffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000180)) 12:37:19 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000180)) 12:37:19 executing program 7: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000180)) 12:37:19 executing program 3: ioctl$RTC_UIE_ON(0xffffffffffffffff, 0x7003) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x2}, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0xfffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = dup2(0xffffffffffffffff, r0) perf_event_open(&(0x7f00000001c0)={0x2, 0x80, 0x8, 0x9, 0x4, 0x1, 0x0, 0x3b3d, 0x200a0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x2, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0xffff, 0x1, @perf_config_ext={0x7, 0x1}, 0x281, 0xffffffff, 0x0, 0x3, 0x401, 0xffffff47, 0x401, 0x0, 0x3, 0x0, 0x415}, 0x0, 0xffffffffffffffff, r0, 0x1) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000180)) pkey_mprotect(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x0, 0xffffffffffffffff) pkey_mprotect(&(0x7f0000ff4000/0x4000)=nil, 0x4000, 0x0, 0xffffffffffffffff) socket$inet_udp(0x2, 0x2, 0x0) getsockopt$inet_int(0xffffffffffffffff, 0x0, 0xe, 0x0, &(0x7f0000000280)) ioctl$sock_SIOCADDDLCI(0xffffffffffffffff, 0x8980, 0x0) ioctl$RTC_ALM_SET(r1, 0x40247007, 0x0) mmap$IORING_OFF_SQES(&(0x7f0000ff3000/0x2000)=nil, 0x2000, 0x2000002, 0x10, r1, 0x10000000) getsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, 0x0, 0x0) 12:37:19 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000180)) 12:37:19 executing program 6: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="0200000003", 0x5, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000180)) [ 2086.767318] EXT4-fs (loop2): mounted filesystem without journal. Opts: ,errors=continue [ 2086.813968] EXT4-fs (loop7): bad geometry: block count 128 exceeds size of device (8 blocks) [ 2086.815999] EXT4-fs (loop6): ext4_check_descriptors: Inode table for group 0 overlaps superblock [ 2086.817980] EXT4-fs (loop6): group descriptors corrupted! [ 2086.832040] EXT4-fs (loop1): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 2086.834091] EXT4-fs (loop1): group descriptors corrupted! [ 2086.846562] EXT4-fs (loop5): bad geometry: block count 128 exceeds size of device (8 blocks) [ 2086.919889] EXT4-fs (loop4): mounted filesystem without journal. Opts: ,errors=continue 12:37:19 executing program 7: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000180)) 12:37:19 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000180)) 12:37:19 executing program 6: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="02000000030000", 0x7, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000180)) 12:37:19 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0xffffffffdffffff8}, {0x0, 0x0, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000180)) 12:37:19 executing program 0: r0 = creat(&(0x7f0000000040)='./file0\x00', 0x0) r1 = creat(&(0x7f0000000040)='./file0\x00', 0x0) fallocate(r1, 0x0, 0x0, 0x8800000) fallocate(r1, 0x3, 0x0, 0x8000) fallocate(r0, 0x0, 0x8000000000000, 0x8800000) 12:37:19 executing program 2: ioctl$RTC_UIE_ON(0xffffffffffffffff, 0x7003) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000180)) 12:37:19 executing program 4: ioctl$RTC_UIE_ON(0xffffffffffffffff, 0x7003) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x2}, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0xfffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = dup2(0xffffffffffffffff, r0) perf_event_open(&(0x7f00000001c0)={0x2, 0x80, 0x8, 0x9, 0x4, 0x1, 0x0, 0x3b3d, 0x200a0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x2, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0xffff, 0x1, @perf_config_ext={0x7, 0x1}, 0x281, 0xffffffff, 0x4, 0x3, 0x401, 0xffffff47, 0x0, 0x0, 0x3, 0x0, 0x415}, 0x0, 0xffffffffffffffff, r0, 0x1) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000180)) pkey_mprotect(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x0, 0xffffffffffffffff) pkey_mprotect(&(0x7f0000ff4000/0x4000)=nil, 0x4000, 0x0, 0xffffffffffffffff) socket$inet_udp(0x2, 0x2, 0x0) getsockopt$inet_int(0xffffffffffffffff, 0x0, 0xe, 0x0, &(0x7f0000000280)) ioctl$sock_SIOCADDDLCI(0xffffffffffffffff, 0x8980, 0x0) ioctl$RTC_ALM_SET(r1, 0x40247007, 0x0) mmap$IORING_OFF_SQES(&(0x7f0000ff3000/0x2000)=nil, 0x2000, 0x2000002, 0x10, r1, 0x10000000) getsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, 0x0, 0x0) [ 2087.158336] EXT4-fs (loop2): mounted filesystem without journal. Opts: ,errors=continue [ 2087.176737] EXT4-fs (loop5): bad geometry: block count 128 exceeds size of device (8 blocks) [ 2087.203159] EXT4-fs (loop7): bad geometry: block count 128 exceeds size of device (8 blocks) [ 2087.265465] EXT4-fs (loop6): ext4_check_descriptors: Inode table for group 0 overlaps superblock [ 2087.267620] EXT4-fs (loop6): group descriptors corrupted! [ 2087.282922] EXT4-fs (loop1): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 2087.284904] EXT4-fs (loop1): group descriptors corrupted! [ 2087.361468] EXT4-fs (loop4): mounted filesystem without journal. Opts: ,errors=continue 12:37:39 executing program 7: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000180)) 12:37:39 executing program 3: ioctl$RTC_UIE_ON(0xffffffffffffffff, 0x7003) r0 = perf_event_open(&(0x7f00000001c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x2}, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0xfffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = dup2(0xffffffffffffffff, r0) r2 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000180)) pkey_mprotect(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x0, 0xffffffffffffffff) pkey_mprotect(&(0x7f0000ff4000/0x4000)=nil, 0x4000, 0x0, 0xffffffffffffffff) symlinkat(&(0x7f00000000c0)='./file0\x00', r2, &(0x7f0000000140)='./file0\x00') socket$inet_udp(0x2, 0x2, 0x0) getsockopt$inet_int(0xffffffffffffffff, 0x0, 0xe, 0x0, 0x0) ioctl$RTC_ALM_SET(r1, 0x40247007, 0x0) getsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, 0x0, 0x0) 12:37:39 executing program 4: ioctl$RTC_UIE_ON(0xffffffffffffffff, 0x7003) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x2}, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0xfffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = dup2(0xffffffffffffffff, r0) perf_event_open(&(0x7f00000001c0)={0x2, 0x80, 0x8, 0x9, 0x4, 0x1, 0x0, 0x3b3d, 0x200a0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x2, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0xffff, 0x1, @perf_config_ext={0x7, 0x1}, 0x281, 0xffffffff, 0x4, 0x3, 0x401, 0xffffff47, 0x401, 0x0, 0x0, 0x0, 0x415}, 0x0, 0xffffffffffffffff, r0, 0x1) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000180)) pkey_mprotect(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x0, 0xffffffffffffffff) pkey_mprotect(&(0x7f0000ff4000/0x4000)=nil, 0x4000, 0x0, 0xffffffffffffffff) socket$inet_udp(0x2, 0x2, 0x0) getsockopt$inet_int(0xffffffffffffffff, 0x0, 0xe, 0x0, &(0x7f0000000280)) ioctl$sock_SIOCADDDLCI(0xffffffffffffffff, 0x8980, 0x0) ioctl$RTC_ALM_SET(r1, 0x40247007, 0x0) mmap$IORING_OFF_SQES(&(0x7f0000ff3000/0x2000)=nil, 0x2000, 0x2000002, 0x10, r1, 0x10000000) getsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, 0x0, 0x0) 12:37:39 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0xffffffffdffffff8}, {0x0, 0x0, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000180)) 12:37:39 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000180)) 12:37:39 executing program 0: r0 = creat(&(0x7f0000000040)='./file0\x00', 0x0) r1 = creat(&(0x7f0000000040)='./file0\x00', 0x0) fallocate(r1, 0x0, 0x0, 0x8800000) fallocate(r1, 0x3, 0x0, 0x8000) fallocate(r0, 0x0, 0x8060000000000, 0x8800000) 12:37:39 executing program 6: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="02000000030000", 0x7, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000180)) 12:37:39 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000180)) [ 2106.603644] EXT4-fs (loop1): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 2106.605713] EXT4-fs (loop1): group descriptors corrupted! [ 2106.661122] EXT4-fs (loop2): mounted filesystem without journal. Opts: ,errors=continue [ 2106.680174] EXT4-fs (loop5): bad geometry: block count 128 exceeds size of device (8 blocks) [ 2106.680568] EXT4-fs (loop6): ext4_check_descriptors: Inode table for group 0 overlaps superblock [ 2106.684365] EXT4-fs (loop6): group descriptors corrupted! [ 2106.686425] EXT4-fs (loop7): bad geometry: block count 128 exceeds size of device (8 blocks) 12:37:39 executing program 3: ioctl$RTC_UIE_ON(0xffffffffffffffff, 0x7003) r0 = perf_event_open(&(0x7f00000001c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x2}, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0xfffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = dup2(0xffffffffffffffff, r0) r2 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000180)) pkey_mprotect(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x0, 0xffffffffffffffff) pkey_mprotect(&(0x7f0000ff4000/0x4000)=nil, 0x4000, 0x0, 0xffffffffffffffff) symlinkat(&(0x7f00000000c0)='./file0\x00', r2, &(0x7f0000000140)='./file0\x00') socket$inet_udp(0x2, 0x2, 0x0) getsockopt$inet_int(0xffffffffffffffff, 0x0, 0xe, 0x0, 0x0) ioctl$RTC_ALM_SET(r1, 0x40247007, 0x0) getsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, 0x0, 0x0) 12:37:39 executing program 2: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000180)) [ 2106.778614] EXT4-fs (loop4): mounted filesystem without journal. Opts: ,errors=continue 12:37:57 executing program 2: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000180)) 12:37:57 executing program 3: ioctl$RTC_UIE_ON(0xffffffffffffffff, 0x7003) r0 = perf_event_open(&(0x7f00000001c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x2}, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0xfffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = dup2(0xffffffffffffffff, r0) r2 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000180)) pkey_mprotect(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x0, 0xffffffffffffffff) pkey_mprotect(&(0x7f0000ff4000/0x4000)=nil, 0x4000, 0x0, 0xffffffffffffffff) symlinkat(&(0x7f00000000c0)='./file0\x00', r2, &(0x7f0000000140)='./file0\x00') socket$inet_udp(0x2, 0x2, 0x0) getsockopt$inet_int(0xffffffffffffffff, 0x0, 0xe, 0x0, 0x0) ioctl$RTC_ALM_SET(r1, 0x40247007, 0x0) getsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, 0x0, 0x0) 12:37:57 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0xffffffffdffffff8}, {0x0, 0x0, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000180)) 12:37:57 executing program 6: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="02000000030000", 0x7, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000180)) 12:37:57 executing program 7: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000180)) 12:37:57 executing program 0: r0 = creat(&(0x7f0000000040)='./file0\x00', 0x0) r1 = creat(&(0x7f0000000040)='./file0\x00', 0x0) fallocate(r1, 0x0, 0x0, 0x8800000) fallocate(r1, 0x3, 0x0, 0x8000) fallocate(r0, 0x0, 0x10000000000000, 0x8800000) 12:37:57 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000440)=[{0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000180)) 12:37:57 executing program 4: ioctl$RTC_UIE_ON(0xffffffffffffffff, 0x7003) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x2}, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0xfffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = dup2(0xffffffffffffffff, r0) perf_event_open(&(0x7f00000001c0)={0x2, 0x80, 0x8, 0x9, 0x4, 0x1, 0x0, 0x3b3d, 0x200a0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x2, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0xffff, 0x1, @perf_config_ext={0x7, 0x1}, 0x281, 0xffffffff, 0x4, 0x3, 0x401, 0xffffff47, 0x401, 0x0, 0x0, 0x0, 0x415}, 0x0, 0xffffffffffffffff, r0, 0x1) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000180)) pkey_mprotect(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x0, 0xffffffffffffffff) pkey_mprotect(&(0x7f0000ff4000/0x4000)=nil, 0x4000, 0x0, 0xffffffffffffffff) socket$inet_udp(0x2, 0x2, 0x0) getsockopt$inet_int(0xffffffffffffffff, 0x0, 0xe, 0x0, &(0x7f0000000280)) ioctl$sock_SIOCADDDLCI(0xffffffffffffffff, 0x8980, 0x0) ioctl$RTC_ALM_SET(r1, 0x40247007, 0x0) mmap$IORING_OFF_SQES(&(0x7f0000ff3000/0x2000)=nil, 0x2000, 0x2000002, 0x10, r1, 0x10000000) getsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, 0x0, 0x0) [ 2124.335339] EXT4-fs (loop1): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 2124.336429] EXT4-fs (loop1): group descriptors corrupted! [ 2124.363059] EXT4-fs (loop7): bad geometry: block count 128 exceeds size of device (8 blocks) [ 2124.366067] EXT4-fs (loop6): ext4_check_descriptors: Inode table for group 0 overlaps superblock [ 2124.367839] EXT4-fs (loop5): VFS: Can't find ext4 filesystem [ 2124.368107] EXT4-fs (loop6): group descriptors corrupted! 12:37:57 executing program 2: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000180)) 12:37:57 executing program 3: ioctl$RTC_UIE_ON(0xffffffffffffffff, 0x7003) r0 = perf_event_open(&(0x7f00000001c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x2}, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0xfffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = dup2(0xffffffffffffffff, r0) r2 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000180)) pkey_mprotect(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x0, 0xffffffffffffffff) pkey_mprotect(&(0x7f0000ff4000/0x4000)=nil, 0x4000, 0x0, 0xffffffffffffffff) symlinkat(&(0x7f00000000c0)='./file0\x00', r2, 0x0) socket$inet_udp(0x2, 0x2, 0x0) getsockopt$inet_int(0xffffffffffffffff, 0x0, 0xe, 0x0, &(0x7f0000000280)) ioctl$RTC_ALM_SET(r1, 0x40247007, 0x0) getsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, 0x0, 0x0) 12:37:57 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400), 0x0, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000180)) 12:37:57 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000440)=[{0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000180)) [ 2124.433789] EXT4-fs (loop4): mounted filesystem without journal. Opts: ,errors=continue 12:37:57 executing program 0: r0 = creat(&(0x7f0000000040)='./file0\x00', 0x0) r1 = creat(&(0x7f0000000040)='./file0\x00', 0x0) fallocate(r1, 0x0, 0x0, 0x8800000) fallocate(r1, 0x3, 0x0, 0x8000) fallocate(r0, 0x0, 0x80000000000000, 0x8800000) 12:37:57 executing program 6: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="0200000003000000", 0x8, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000180)) 12:37:57 executing program 4: ioctl$RTC_UIE_ON(0xffffffffffffffff, 0x7003) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x2}, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0xfffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = dup2(0xffffffffffffffff, r0) perf_event_open(&(0x7f00000001c0)={0x2, 0x80, 0x8, 0x9, 0x4, 0x1, 0x0, 0x3b3d, 0x200a0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x2, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0xffff, 0x1, @perf_config_ext={0x7, 0x1}, 0x281, 0xffffffff, 0x4, 0x3, 0x401, 0xffffff47, 0x401, 0x0, 0x0, 0x0, 0x415}, 0x0, 0xffffffffffffffff, r0, 0x1) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000180)) pkey_mprotect(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x0, 0xffffffffffffffff) pkey_mprotect(&(0x7f0000ff4000/0x4000)=nil, 0x4000, 0x0, 0xffffffffffffffff) socket$inet_udp(0x2, 0x2, 0x0) getsockopt$inet_int(0xffffffffffffffff, 0x0, 0xe, 0x0, &(0x7f0000000280)) ioctl$sock_SIOCADDDLCI(0xffffffffffffffff, 0x8980, 0x0) ioctl$RTC_ALM_SET(r1, 0x40247007, 0x0) mmap$IORING_OFF_SQES(&(0x7f0000ff3000/0x2000)=nil, 0x2000, 0x2000002, 0x10, r1, 0x10000000) getsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, 0x0, 0x0) 12:37:57 executing program 7: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000180)) [ 2124.593977] EXT4-fs (loop1): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 2124.596097] EXT4-fs (loop1): group descriptors corrupted! [ 2124.606893] EXT4-fs (loop5): VFS: Can't find ext4 filesystem 12:37:57 executing program 3: ioctl$RTC_UIE_ON(0xffffffffffffffff, 0x7003) r0 = perf_event_open(&(0x7f00000001c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x2}, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0xfffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = dup2(0xffffffffffffffff, r0) r2 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000180)) pkey_mprotect(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x0, 0xffffffffffffffff) pkey_mprotect(&(0x7f0000ff4000/0x4000)=nil, 0x4000, 0x0, 0xffffffffffffffff) symlinkat(&(0x7f00000000c0)='./file0\x00', r2, 0x0) socket$inet_udp(0x2, 0x2, 0x0) getsockopt$inet_int(0xffffffffffffffff, 0x0, 0xe, 0x0, &(0x7f0000000280)) ioctl$RTC_ALM_SET(r1, 0x40247007, 0x0) getsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, 0x0, 0x0) 12:37:57 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', 0x0, 0x0, 0x4, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000180)) [ 2124.675891] EXT4-fs (loop7): bad geometry: block count 128 exceeds size of device (8 blocks) 12:37:57 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000440)=[{0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000180)) [ 2124.696055] EXT4-fs (loop6): ext4_check_descriptors: Inode table for group 0 overlaps superblock [ 2124.697977] EXT4-fs (loop6): group descriptors corrupted! 12:37:57 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400), 0x0, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000180)) 12:37:57 executing program 7: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000180)) [ 2124.826518] EXT4-fs (loop5): VFS: Can't find ext4 filesystem [ 2124.851425] EXT4-fs (loop1): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 2124.852471] EXT4-fs (loop1): group descriptors corrupted! [ 2124.856737] EXT4-fs (loop4): mounted filesystem without journal. Opts: ,errors=continue [ 2124.941220] EXT4-fs (loop7): bad geometry: block count 128 exceeds size of device (8 blocks) 12:38:13 executing program 0: r0 = creat(&(0x7f0000000040)='./file0\x00', 0x0) r1 = creat(&(0x7f0000000040)='./file0\x00', 0x0) fallocate(r1, 0x0, 0x0, 0x8800000) fallocate(r1, 0x3, 0x0, 0x8000) fallocate(r0, 0x0, 0x80050000000000, 0x8800000) 12:38:13 executing program 7: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000440)=[{0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000180)) 12:38:13 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000440)=[{0x0, 0x0, 0x400}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000180)) 12:38:13 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', 0x0, 0x0, 0x4, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000180)) 12:38:13 executing program 6: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="0200000003000000", 0x8, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000180)) 12:38:13 executing program 3: ioctl$RTC_UIE_ON(0xffffffffffffffff, 0x7003) r0 = perf_event_open(&(0x7f00000001c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x2}, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0xfffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = dup2(0xffffffffffffffff, r0) r2 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000180)) pkey_mprotect(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x0, 0xffffffffffffffff) pkey_mprotect(&(0x7f0000ff4000/0x4000)=nil, 0x4000, 0x0, 0xffffffffffffffff) symlinkat(&(0x7f00000000c0)='./file0\x00', r2, 0x0) socket$inet_udp(0x2, 0x2, 0x0) getsockopt$inet_int(0xffffffffffffffff, 0x0, 0xe, 0x0, &(0x7f0000000280)) ioctl$RTC_ALM_SET(r1, 0x40247007, 0x0) getsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, 0x0, 0x0) 12:38:13 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400), 0x0, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000180)) 12:38:13 executing program 4: ioctl$RTC_UIE_ON(0xffffffffffffffff, 0x7003) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x2}, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0xfffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = dup2(0xffffffffffffffff, r0) perf_event_open(&(0x7f00000001c0)={0x2, 0x80, 0x8, 0x9, 0x4, 0x1, 0x0, 0x3b3d, 0x200a0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x2, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0xffff, 0x1, @perf_config_ext={0x7, 0x1}, 0x281, 0xffffffff, 0x4, 0x3, 0x401, 0xffffff47, 0x401, 0x0, 0x3}, 0x0, 0xffffffffffffffff, r0, 0x1) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000180)) pkey_mprotect(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x0, 0xffffffffffffffff) pkey_mprotect(&(0x7f0000ff4000/0x4000)=nil, 0x4000, 0x0, 0xffffffffffffffff) socket$inet_udp(0x2, 0x2, 0x0) getsockopt$inet_int(0xffffffffffffffff, 0x0, 0xe, 0x0, &(0x7f0000000280)) ioctl$sock_SIOCADDDLCI(0xffffffffffffffff, 0x8980, 0x0) ioctl$RTC_ALM_SET(r1, 0x40247007, 0x0) mmap$IORING_OFF_SQES(&(0x7f0000ff3000/0x2000)=nil, 0x2000, 0x2000002, 0x10, r1, 0x10000000) getsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, 0x0, 0x0) [ 2141.111710] EXT4-fs (loop5): VFS: Can't find ext4 filesystem 12:38:13 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000440)=[{0x0, 0x0, 0x400}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000180)) [ 2141.182199] EXT4-fs (loop7): VFS: Can't find ext4 filesystem 12:38:13 executing program 0: r0 = creat(&(0x7f0000000040)='./file0\x00', 0x0) r1 = creat(&(0x7f0000000040)='./file0\x00', 0x0) fallocate(r1, 0x0, 0x0, 0x8800000) fallocate(r1, 0x3, 0x0, 0x8000) fallocate(r0, 0x0, 0x90050000000000, 0x8800000) [ 2141.201506] EXT4-fs (loop6): ext4_check_descriptors: Inode table for group 0 overlaps superblock [ 2141.203446] EXT4-fs (loop6): group descriptors corrupted! [ 2141.226403] EXT4-fs (loop1): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 2141.228443] EXT4-fs (loop1): group descriptors corrupted! 12:38:14 executing program 7: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000440)=[{0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000180)) 12:38:14 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', 0x0, 0x0, 0x4, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000180)) [ 2141.321330] EXT4-fs (loop4): mounted filesystem without journal. Opts: ,errors=continue 12:38:14 executing program 3: ioctl$RTC_UIE_ON(0xffffffffffffffff, 0x7003) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x2}, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0xfffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = dup2(0xffffffffffffffff, r0) perf_event_open(&(0x7f00000001c0)={0x2, 0x80, 0x8, 0x9, 0x4, 0x1, 0x0, 0x3b3d, 0x200a0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x2, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0xffff, 0x1, @perf_config_ext={0x7, 0x1}, 0x281, 0xffffffff, 0x4, 0x3, 0x401, 0xffffff47, 0x401, 0x0, 0x0, 0x0, 0x415}, 0x0, 0xffffffffffffffff, r0, 0x1) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000180)) pkey_mprotect(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x0, 0xffffffffffffffff) pkey_mprotect(&(0x7f0000ff4000/0x4000)=nil, 0x4000, 0x0, 0xffffffffffffffff) socket$inet_udp(0x2, 0x2, 0x0) getsockopt$inet_int(0xffffffffffffffff, 0x0, 0xe, 0x0, &(0x7f0000000280)) ioctl$sock_SIOCADDDLCI(0xffffffffffffffff, 0x8980, 0x0) ioctl$RTC_ALM_SET(r1, 0x40247007, 0x0) mmap$IORING_OFF_SQES(&(0x7f0000ff3000/0x2000)=nil, 0x2000, 0x2000002, 0x10, r1, 0x10000000) getsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, 0x0, 0x0) 12:38:14 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="0200000003", 0x5, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000180)) 12:38:14 executing program 6: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="0200000003000000", 0x8, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000180)) [ 2141.410709] EXT4-fs (loop5): VFS: Can't find ext4 filesystem [ 2141.461676] EXT4-fs (loop7): VFS: Can't find ext4 filesystem [ 2141.606390] EXT4-fs (loop1): ext4_check_descriptors: Inode table for group 0 overlaps superblock [ 2141.608572] EXT4-fs (loop1): group descriptors corrupted! [ 2141.638490] EXT4-fs (loop6): ext4_check_descriptors: Inode table for group 0 overlaps superblock [ 2141.641094] EXT4-fs (loop6): group descriptors corrupted! 12:38:32 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="0200000003", 0x5, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000180)) 12:38:32 executing program 4: ioctl$RTC_UIE_ON(0xffffffffffffffff, 0x7003) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x2}, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0xfffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = dup2(0xffffffffffffffff, r0) perf_event_open(&(0x7f00000001c0)={0x2, 0x80, 0x8, 0x9, 0x4, 0x1, 0x0, 0x3b3d, 0x200a0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x2, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0xffff, 0x1, @perf_config_ext={0x7, 0x1}, 0x281, 0xffffffff, 0x4, 0x3, 0x401, 0xffffff47, 0x401, 0x0, 0x3}, 0x0, 0xffffffffffffffff, r0, 0x1) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000180)) pkey_mprotect(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x0, 0xffffffffffffffff) pkey_mprotect(&(0x7f0000ff4000/0x4000)=nil, 0x4000, 0x0, 0xffffffffffffffff) socket$inet_udp(0x2, 0x2, 0x0) getsockopt$inet_int(0xffffffffffffffff, 0x0, 0xe, 0x0, &(0x7f0000000280)) ioctl$sock_SIOCADDDLCI(0xffffffffffffffff, 0x8980, 0x0) ioctl$RTC_ALM_SET(r1, 0x40247007, 0x0) mmap$IORING_OFF_SQES(&(0x7f0000ff3000/0x2000)=nil, 0x2000, 0x2000002, 0x10, r1, 0x10000000) getsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, 0x0, 0x0) 12:38:32 executing program 6: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000180)) 12:38:32 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000180)) 12:38:32 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000440)=[{0x0, 0x0, 0x400}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000180)) 12:38:32 executing program 0: r0 = creat(&(0x7f0000000040)='./file0\x00', 0x0) r1 = creat(&(0x7f0000000040)='./file0\x00', 0x0) fallocate(r1, 0x0, 0x0, 0x8800000) fallocate(r1, 0x3, 0x0, 0x8000) fallocate(r0, 0x0, 0x100000000000000, 0x8800000) 12:38:32 executing program 7: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000440)=[{0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000180)) 12:38:32 executing program 3: ioctl$RTC_UIE_ON(0xffffffffffffffff, 0x7003) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x2}, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0xfffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = dup2(0xffffffffffffffff, r0) perf_event_open(&(0x7f00000001c0)={0x2, 0x80, 0x8, 0x9, 0x4, 0x1, 0x0, 0x3b3d, 0x200a0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x2, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0xffff, 0x1, @perf_config_ext={0x7, 0x1}, 0x281, 0xffffffff, 0x4, 0x3, 0x401, 0xffffff47, 0x401, 0x0, 0x0, 0x0, 0x415}, 0x0, 0xffffffffffffffff, r0, 0x1) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000180)) pkey_mprotect(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x0, 0xffffffffffffffff) pkey_mprotect(&(0x7f0000ff4000/0x4000)=nil, 0x4000, 0x0, 0xffffffffffffffff) socket$inet_udp(0x2, 0x2, 0x0) getsockopt$inet_int(0xffffffffffffffff, 0x0, 0xe, 0x0, &(0x7f0000000280)) ioctl$sock_SIOCADDDLCI(0xffffffffffffffff, 0x8980, 0x0) ioctl$RTC_ALM_SET(r1, 0x40247007, 0x0) mmap$IORING_OFF_SQES(&(0x7f0000ff3000/0x2000)=nil, 0x2000, 0x2000002, 0x10, r1, 0x10000000) getsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, 0x0, 0x0) [ 2159.432349] EXT4-fs (loop5): VFS: Can't find ext4 filesystem [ 2159.486392] EXT4-fs (loop7): VFS: Can't find ext4 filesystem [ 2159.500125] EXT4-fs (loop6): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 2159.502191] EXT4-fs (loop6): group descriptors corrupted! [ 2159.512729] EXT4-fs (loop1): ext4_check_descriptors: Inode table for group 0 overlaps superblock [ 2159.515055] EXT4-fs (loop1): group descriptors corrupted! 12:38:32 executing program 3: ioctl$RTC_UIE_ON(0xffffffffffffffff, 0x7003) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x2}, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0xfffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = dup2(0xffffffffffffffff, r0) perf_event_open(&(0x7f00000001c0)={0x2, 0x80, 0x8, 0x9, 0x4, 0x1, 0x0, 0x3b3d, 0x200a0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x2, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0xffff, 0x1, @perf_config_ext={0x7, 0x1}, 0x281, 0xffffffff, 0x4, 0x3, 0x401, 0xffffff47, 0x401, 0x0, 0x0, 0x0, 0x415}, 0x0, 0xffffffffffffffff, r0, 0x1) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000180)) pkey_mprotect(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x0, 0xffffffffffffffff) pkey_mprotect(&(0x7f0000ff4000/0x4000)=nil, 0x4000, 0x0, 0xffffffffffffffff) socket$inet_udp(0x2, 0x2, 0x0) getsockopt$inet_int(0xffffffffffffffff, 0x0, 0xe, 0x0, &(0x7f0000000280)) ioctl$sock_SIOCADDDLCI(0xffffffffffffffff, 0x8980, 0x0) ioctl$RTC_ALM_SET(r1, 0x40247007, 0x0) mmap$IORING_OFF_SQES(&(0x7f0000ff3000/0x2000)=nil, 0x2000, 0x2000002, 0x10, r1, 0x10000000) getsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, 0x0, 0x0) 12:38:32 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000180)) 12:38:32 executing program 7: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000440)=[{0x0, 0x0, 0x400}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000180)) 12:38:32 executing program 0: r0 = creat(&(0x7f0000000040)='./file0\x00', 0x0) r1 = creat(&(0x7f0000000040)='./file0\x00', 0x0) fallocate(r1, 0x0, 0x0, 0x8800000) fallocate(r1, 0x3, 0x0, 0x8000) fallocate(r0, 0x0, 0x200000000000000, 0x8800000) 12:38:32 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000440)=[{&(0x7f0000000040), 0x0, 0x400}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000180)) [ 2159.651404] EXT4-fs (loop4): mounted filesystem without journal. Opts: ,errors=continue 12:38:32 executing program 6: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000180)) 12:38:32 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="0200000003", 0x5, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000180)) 12:38:32 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000180)) [ 2159.793355] EXT4-fs (loop7): VFS: Can't find ext4 filesystem [ 2159.861068] EXT4-fs (loop5): VFS: Can't find ext4 filesystem [ 2159.928633] EXT4-fs (loop6): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 2159.930565] EXT4-fs (loop6): group descriptors corrupted! [ 2159.984451] EXT4-fs (loop1): ext4_check_descriptors: Inode table for group 0 overlaps superblock [ 2159.985952] EXT4-fs (loop1): group descriptors corrupted! 12:38:50 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="02000000030000", 0x7, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000180)) 12:38:50 executing program 3: ioctl$RTC_UIE_ON(0xffffffffffffffff, 0x7003) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x2}, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0xfffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = dup2(0xffffffffffffffff, r0) perf_event_open(&(0x7f00000001c0)={0x2, 0x80, 0x8, 0x9, 0x4, 0x1, 0x0, 0x3b3d, 0x200a0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x2, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0xffff, 0x1, @perf_config_ext={0x7}, 0x281, 0xffffffff, 0x4, 0x3, 0x401, 0xffffff47, 0x401, 0x0, 0x3, 0x0, 0x415}, 0x0, 0xffffffffffffffff, r0, 0x1) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000180)) pkey_mprotect(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x0, 0xffffffffffffffff) pkey_mprotect(&(0x7f0000ff4000/0x4000)=nil, 0x4000, 0x0, 0xffffffffffffffff) socket$inet_udp(0x2, 0x2, 0x0) getsockopt$inet_int(0xffffffffffffffff, 0x0, 0xe, 0x0, &(0x7f0000000280)) ioctl$sock_SIOCADDDLCI(0xffffffffffffffff, 0x8980, 0x0) ioctl$RTC_ALM_SET(r1, 0x40247007, 0x0) mmap$IORING_OFF_SQES(&(0x7f0000ff3000/0x2000)=nil, 0x2000, 0x2000002, 0x10, r1, 0x10000000) getsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, 0x0, 0x0) 12:38:50 executing program 6: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000180)) 12:38:50 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000440)=[{&(0x7f0000000040), 0x0, 0x400}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000180)) 12:38:50 executing program 4: ioctl$RTC_UIE_ON(0xffffffffffffffff, 0x7003) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x2}, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0xfffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = dup2(0xffffffffffffffff, r0) perf_event_open(&(0x7f00000001c0)={0x2, 0x80, 0x8, 0x9, 0x4, 0x1, 0x0, 0x3b3d, 0x200a0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x2, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0xffff, 0x1, @perf_config_ext={0x7, 0x1}, 0x281, 0xffffffff, 0x4, 0x3, 0x401, 0xffffff47, 0x401, 0x0, 0x3}, 0x0, 0xffffffffffffffff, r0, 0x1) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000180)) pkey_mprotect(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x0, 0xffffffffffffffff) pkey_mprotect(&(0x7f0000ff4000/0x4000)=nil, 0x4000, 0x0, 0xffffffffffffffff) socket$inet_udp(0x2, 0x2, 0x0) getsockopt$inet_int(0xffffffffffffffff, 0x0, 0xe, 0x0, &(0x7f0000000280)) ioctl$sock_SIOCADDDLCI(0xffffffffffffffff, 0x8980, 0x0) ioctl$RTC_ALM_SET(r1, 0x40247007, 0x0) mmap$IORING_OFF_SQES(&(0x7f0000ff3000/0x2000)=nil, 0x2000, 0x2000002, 0x10, r1, 0x10000000) getsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, 0x0, 0x0) 12:38:50 executing program 7: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000440)=[{0x0, 0x0, 0x400}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000180)) 12:38:50 executing program 0: r0 = creat(&(0x7f0000000040)='./file0\x00', 0x0) r1 = creat(&(0x7f0000000040)='./file0\x00', 0x0) fallocate(r1, 0x0, 0x0, 0x8800000) fallocate(r1, 0x3, 0x0, 0x8000) fallocate(r0, 0x0, 0x300000000000000, 0x8800000) 12:38:50 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}], 0x0, &(0x7f0000000180)) [ 2177.816184] EXT4-fs (loop7): VFS: Can't find ext4 filesystem [ 2177.863783] EXT4-fs (loop1): ext4_check_descriptors: Inode table for group 0 overlaps superblock [ 2177.865922] EXT4-fs (loop1): group descriptors corrupted! [ 2177.903172] EXT4-fs (loop6): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 2177.905572] EXT4-fs (loop6): group descriptors corrupted! [ 2177.916217] EXT4-fs (loop5): VFS: Can't find ext4 filesystem [ 2177.934047] EXT4-fs error (device loop2): ext4_fill_super:4959: inode #2: comm syz-executor.2: iget: root inode unallocated 12:38:50 executing program 6: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000180)) [ 2177.974602] EXT4-fs (loop2): get root inode failed [ 2177.976098] EXT4-fs (loop2): mount failed [ 2178.074650] EXT4-fs (loop4): mounted filesystem without journal. Opts: ,errors=continue 12:38:50 executing program 7: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000440)=[{0x0, 0x0, 0x400}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000180)) 12:38:50 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="02000000030000", 0x7, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000180)) 12:38:50 executing program 0: r0 = creat(&(0x7f0000000040)='./file0\x00', 0x0) r1 = creat(&(0x7f0000000040)='./file0\x00', 0x0) fallocate(r1, 0x0, 0x0, 0x8800000) fallocate(r1, 0x3, 0x0, 0x8000) fallocate(r0, 0x0, 0x400000000000000, 0x8800000) 12:38:50 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000440)=[{&(0x7f0000000040), 0x0, 0x400}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000180)) 12:38:50 executing program 3: ioctl$RTC_UIE_ON(0xffffffffffffffff, 0x7003) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x2}, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0xfffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = dup2(0xffffffffffffffff, r0) perf_event_open(&(0x7f00000001c0)={0x2, 0x80, 0x8, 0x9, 0x4, 0x1, 0x0, 0x3b3d, 0x200a0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x2, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0xffff, 0x1, @perf_config_ext={0x7}, 0x281, 0xffffffff, 0x4, 0x3, 0x401, 0xffffff47, 0x401, 0x0, 0x3, 0x0, 0x415}, 0x0, 0xffffffffffffffff, r0, 0x1) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000180)) pkey_mprotect(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x0, 0xffffffffffffffff) pkey_mprotect(&(0x7f0000ff4000/0x4000)=nil, 0x4000, 0x0, 0xffffffffffffffff) socket$inet_udp(0x2, 0x2, 0x0) getsockopt$inet_int(0xffffffffffffffff, 0x0, 0xe, 0x0, &(0x7f0000000280)) ioctl$sock_SIOCADDDLCI(0xffffffffffffffff, 0x8980, 0x0) ioctl$RTC_ALM_SET(r1, 0x40247007, 0x0) mmap$IORING_OFF_SQES(&(0x7f0000ff3000/0x2000)=nil, 0x2000, 0x2000002, 0x10, r1, 0x10000000) getsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, 0x0, 0x0) 12:38:50 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}], 0x0, &(0x7f0000000180)) [ 2178.145200] EXT4-fs (loop6): bad geometry: block count 128 exceeds size of device (8 blocks) 12:38:50 executing program 4: ioctl$RTC_UIE_ON(0xffffffffffffffff, 0x7003) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x2}, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0xfffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = dup2(0xffffffffffffffff, r0) perf_event_open(&(0x7f00000001c0)={0x2, 0x80, 0x8, 0x9, 0x4, 0x1, 0x0, 0x3b3d, 0x200a0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x2, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0xffff, 0x1, @perf_config_ext={0x7, 0x1}, 0x281, 0xffffffff, 0x4, 0x3, 0x401, 0xffffff47, 0x401, 0x0, 0x3, 0x0, 0x415}, 0x0, 0x0, r0, 0x1) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000180)) pkey_mprotect(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x0, 0xffffffffffffffff) pkey_mprotect(&(0x7f0000ff4000/0x4000)=nil, 0x4000, 0x0, 0xffffffffffffffff) socket$inet_udp(0x2, 0x2, 0x0) getsockopt$inet_int(0xffffffffffffffff, 0x0, 0xe, 0x0, &(0x7f0000000280)) ioctl$sock_SIOCADDDLCI(0xffffffffffffffff, 0x8980, 0x0) ioctl$RTC_ALM_SET(r1, 0x40247007, 0x0) mmap$IORING_OFF_SQES(&(0x7f0000ff3000/0x2000)=nil, 0x2000, 0x2000002, 0x10, r1, 0x10000000) getsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, 0x0, 0x0) [ 2178.342417] EXT4-fs (loop5): VFS: Can't find ext4 filesystem [ 2178.361485] EXT4-fs (loop1): ext4_check_descriptors: Inode table for group 0 overlaps superblock [ 2178.363507] EXT4-fs (loop1): group descriptors corrupted! [ 2178.373003] EXT4-fs (loop7): VFS: Can't find ext4 filesystem [ 2178.377973] EXT4-fs error (device loop2): ext4_fill_super:4959: inode #2: comm syz-executor.2: iget: root inode unallocated [ 2178.395248] EXT4-fs (loop2): get root inode failed [ 2178.396348] EXT4-fs (loop2): mount failed [ 2178.519582] EXT4-fs (loop4): mounted filesystem without journal. Opts: ,errors=continue 12:39:08 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0", 0x2d, 0x400}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000180)) 12:39:08 executing program 4: ioctl$RTC_UIE_ON(0xffffffffffffffff, 0x7003) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x2}, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0xfffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = dup2(0xffffffffffffffff, r0) perf_event_open(&(0x7f00000001c0)={0x2, 0x80, 0x8, 0x9, 0x4, 0x1, 0x0, 0x3b3d, 0x200a0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x2, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0xffff, 0x1, @perf_config_ext={0x7, 0x1}, 0x281, 0xffffffff, 0x4, 0x3, 0x401, 0xffffff47, 0x401, 0x0, 0x3, 0x0, 0x415}, 0x0, 0x0, r0, 0x1) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000180)) pkey_mprotect(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x0, 0xffffffffffffffff) pkey_mprotect(&(0x7f0000ff4000/0x4000)=nil, 0x4000, 0x0, 0xffffffffffffffff) socket$inet_udp(0x2, 0x2, 0x0) getsockopt$inet_int(0xffffffffffffffff, 0x0, 0xe, 0x0, &(0x7f0000000280)) ioctl$sock_SIOCADDDLCI(0xffffffffffffffff, 0x8980, 0x0) ioctl$RTC_ALM_SET(r1, 0x40247007, 0x0) mmap$IORING_OFF_SQES(&(0x7f0000ff3000/0x2000)=nil, 0x2000, 0x2000002, 0x10, r1, 0x10000000) getsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, 0x0, 0x0) 12:39:08 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="02000000030000", 0x7, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000180)) 12:39:08 executing program 0: r0 = creat(&(0x7f0000000040)='./file0\x00', 0x0) r1 = creat(&(0x7f0000000040)='./file0\x00', 0x0) fallocate(r1, 0x0, 0x0, 0x8800000) fallocate(r1, 0x3, 0x0, 0x8000) fallocate(r0, 0x0, 0x500000000000000, 0x8800000) 12:39:08 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}], 0x0, &(0x7f0000000180)) 12:39:08 executing program 7: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000440)=[{&(0x7f0000000040), 0x0, 0x400}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000180)) 12:39:08 executing program 3: ioctl$RTC_UIE_ON(0xffffffffffffffff, 0x7003) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x2}, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0xfffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = dup2(0xffffffffffffffff, r0) perf_event_open(&(0x7f00000001c0)={0x2, 0x80, 0x8, 0x9, 0x4, 0x1, 0x0, 0x3b3d, 0x200a0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x2, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0xffff, 0x1, @perf_config_ext={0x7}, 0x281, 0xffffffff, 0x4, 0x3, 0x401, 0xffffff47, 0x401, 0x0, 0x3, 0x0, 0x415}, 0x0, 0xffffffffffffffff, r0, 0x1) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000180)) pkey_mprotect(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x0, 0xffffffffffffffff) pkey_mprotect(&(0x7f0000ff4000/0x4000)=nil, 0x4000, 0x0, 0xffffffffffffffff) socket$inet_udp(0x2, 0x2, 0x0) getsockopt$inet_int(0xffffffffffffffff, 0x0, 0xe, 0x0, &(0x7f0000000280)) ioctl$sock_SIOCADDDLCI(0xffffffffffffffff, 0x8980, 0x0) ioctl$RTC_ALM_SET(r1, 0x40247007, 0x0) mmap$IORING_OFF_SQES(&(0x7f0000ff3000/0x2000)=nil, 0x2000, 0x2000002, 0x10, r1, 0x10000000) getsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, 0x0, 0x0) 12:39:08 executing program 6: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000180)) [ 2196.023738] EXT4-fs (loop7): VFS: Can't find ext4 filesystem [ 2196.032219] EXT4-fs (loop1): ext4_check_descriptors: Inode table for group 0 overlaps superblock [ 2196.034436] EXT4-fs (loop1): group descriptors corrupted! [ 2196.038648] EXT4-fs (loop5): VFS: Can't find ext4 filesystem [ 2196.040260] EXT4-fs error (device loop2): ext4_fill_super:4959: inode #2: comm syz-executor.2: iget: root inode unallocated [ 2196.063580] EXT4-fs (loop6): bad geometry: block count 128 exceeds size of device (8 blocks) [ 2196.067233] EXT4-fs (loop2): get root inode failed [ 2196.068761] EXT4-fs (loop2): mount failed 12:39:08 executing program 0: r0 = creat(&(0x7f0000000040)='./file0\x00', 0x0) r1 = creat(&(0x7f0000000040)='./file0\x00', 0x0) fallocate(r1, 0x0, 0x0, 0x8800000) fallocate(r1, 0x3, 0x0, 0x8000) fallocate(r0, 0x0, 0x700000000000000, 0x8800000) 12:39:08 executing program 3: ioctl$RTC_UIE_ON(0xffffffffffffffff, 0x7003) r0 = perf_event_open(&(0x7f00000001c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x2}, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0xfffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = dup2(0xffffffffffffffff, r0) r2 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000180)) pkey_mprotect(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x0, 0xffffffffffffffff) pkey_mprotect(&(0x7f0000ff4000/0x4000)=nil, 0x4000, 0x0, 0xffffffffffffffff) symlinkat(&(0x7f00000000c0)='./file0\x00', r2, &(0x7f0000000140)='./file0\x00') socket$inet_udp(0x2, 0x2, 0x0) getsockopt$inet_int(0xffffffffffffffff, 0x0, 0xe, 0x0, &(0x7f0000000280)) ioctl$RTC_ALM_SET(r1, 0x40247007, 0x0) getsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, 0x0, 0x0) 12:39:08 executing program 7: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000440)=[{&(0x7f0000000040), 0x0, 0x400}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000180)) 12:39:08 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="0200000003000000", 0x8, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000180)) 12:39:08 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0", 0x2d, 0x400}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000180)) 12:39:08 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {0x0, 0x0, 0x2100}], 0x0, &(0x7f0000000180)) [ 2196.209180] EXT4-fs (loop4): mounted filesystem without journal. Opts: ,errors=continue 12:39:09 executing program 6: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000180)) 12:39:09 executing program 4: ioctl$RTC_UIE_ON(0xffffffffffffffff, 0x7003) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x2}, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0xfffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = dup2(0xffffffffffffffff, r0) perf_event_open(&(0x7f00000001c0)={0x2, 0x80, 0x8, 0x9, 0x4, 0x1, 0x0, 0x3b3d, 0x200a0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x2, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0xffff, 0x1, @perf_config_ext={0x7, 0x1}, 0x281, 0xffffffff, 0x4, 0x3, 0x401, 0xffffff47, 0x401, 0x0, 0x3, 0x0, 0x415}, 0x0, 0x0, r0, 0x1) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000180)) pkey_mprotect(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x0, 0xffffffffffffffff) pkey_mprotect(&(0x7f0000ff4000/0x4000)=nil, 0x4000, 0x0, 0xffffffffffffffff) socket$inet_udp(0x2, 0x2, 0x0) getsockopt$inet_int(0xffffffffffffffff, 0x0, 0xe, 0x0, &(0x7f0000000280)) ioctl$sock_SIOCADDDLCI(0xffffffffffffffff, 0x8980, 0x0) ioctl$RTC_ALM_SET(r1, 0x40247007, 0x0) mmap$IORING_OFF_SQES(&(0x7f0000ff3000/0x2000)=nil, 0x2000, 0x2000002, 0x10, r1, 0x10000000) getsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, 0x0, 0x0) [ 2196.416826] EXT4-fs (loop7): VFS: Can't find ext4 filesystem [ 2196.427022] EXT4-fs (loop5): VFS: Can't find ext4 filesystem [ 2196.467392] EXT4-fs (loop6): bad geometry: block count 128 exceeds size of device (8 blocks) [ 2196.474192] EXT4-fs error (device loop2): ext4_fill_super:4959: inode #2: comm syz-executor.2: iget: root inode unallocated [ 2196.477047] EXT4-fs (loop2): get root inode failed [ 2196.478260] EXT4-fs (loop2): mount failed [ 2196.627468] EXT4-fs (loop4): mounted filesystem without journal. Opts: ,errors=continue 12:39:27 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="0200000003000000", 0x8, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000180)) 12:39:27 executing program 0: r0 = creat(&(0x7f0000000040)='./file0\x00', 0x0) r1 = creat(&(0x7f0000000040)='./file0\x00', 0x0) fallocate(r1, 0x0, 0x0, 0x8800000) fallocate(r1, 0x3, 0x0, 0x8000) fallocate(r0, 0x0, 0x800000000000000, 0x8800000) 12:39:27 executing program 4: ioctl$RTC_UIE_ON(0xffffffffffffffff, 0x7003) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x2}, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0xfffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = dup2(0xffffffffffffffff, r0) perf_event_open(&(0x7f00000001c0)={0x2, 0x80, 0x8, 0x9, 0x4, 0x1, 0x0, 0x3b3d, 0x200a0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x2, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0xffff, 0x1, @perf_config_ext={0x7, 0x1}, 0x281, 0xffffffff, 0x4, 0x3, 0x401, 0xffffff47, 0x401, 0x0, 0x3, 0x0, 0x415}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000180)) pkey_mprotect(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x0, 0xffffffffffffffff) pkey_mprotect(&(0x7f0000ff4000/0x4000)=nil, 0x4000, 0x0, 0xffffffffffffffff) socket$inet_udp(0x2, 0x2, 0x0) getsockopt$inet_int(0xffffffffffffffff, 0x0, 0xe, 0x0, &(0x7f0000000280)) ioctl$sock_SIOCADDDLCI(0xffffffffffffffff, 0x8980, 0x0) ioctl$RTC_ALM_SET(r1, 0x40247007, 0x0) mmap$IORING_OFF_SQES(&(0x7f0000ff3000/0x2000)=nil, 0x2000, 0x2000002, 0x10, r1, 0x10000000) getsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, 0x0, 0x0) 12:39:27 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0", 0x2d, 0x400}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000180)) 12:39:27 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {0x0, 0x0, 0x2100}], 0x0, &(0x7f0000000180)) 12:39:27 executing program 3: ioctl$RTC_UIE_ON(0xffffffffffffffff, 0x7003) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x2}, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0xfffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = dup2(0xffffffffffffffff, r0) perf_event_open(&(0x7f00000001c0)={0x2, 0x80, 0x8, 0x9, 0x4, 0x1, 0x0, 0x3b3d, 0x200a0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x2, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0xffff, 0x1, @perf_config_ext={0x7, 0x1}, 0x281, 0xffffffff, 0x4, 0x3, 0x401, 0xffffff47, 0x401, 0x0, 0x3, 0x0, 0x415}, 0x0, 0xffffffffffffffff, r0, 0x1) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000180)) pkey_mprotect(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x0, 0xffffffffffffffff) pkey_mprotect(&(0x7f0000ff4000/0x4000)=nil, 0x4000, 0x0, 0xffffffffffffffff) socket$inet_udp(0x2, 0x2, 0x0) getsockopt$inet_int(0xffffffffffffffff, 0x0, 0xe, 0x0, &(0x7f0000000280)) ioctl$sock_SIOCADDDLCI(0xffffffffffffffff, 0x8980, 0x0) ioctl$RTC_ALM_SET(r1, 0x40247007, 0x0) mmap$IORING_OFF_SQES(&(0x7f0000ff3000/0x2000)=nil, 0x2000, 0x2000002, 0x10, r1, 0x10000000) getsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, 0x0, 0x0) 12:39:27 executing program 6: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000180)) 12:39:27 executing program 7: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000440)=[{&(0x7f0000000040), 0x0, 0x400}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000180)) [ 2214.824490] EXT4-fs (loop5): VFS: Can't find ext4 filesystem [ 2214.854464] EXT4-fs error (device loop2): ext4_fill_super:4959: inode #2: comm syz-executor.2: iget: root inode unallocated [ 2214.861590] EXT4-fs (loop2): get root inode failed [ 2214.862775] EXT4-fs (loop2): mount failed [ 2214.884586] EXT4-fs (loop6): bad geometry: block count 128 exceeds size of device (8 blocks) [ 2214.890361] EXT4-fs (loop1): ext4_check_descriptors: Inode table for group 0 overlaps superblock [ 2214.892508] EXT4-fs (loop1): group descriptors corrupted! [ 2214.894010] EXT4-fs (loop7): VFS: Can't find ext4 filesystem 12:39:27 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f", 0x44, 0x400}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000180)) 12:39:27 executing program 3: ioctl$RTC_UIE_ON(0xffffffffffffffff, 0x7003) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x2}, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0xfffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = dup2(0xffffffffffffffff, r0) perf_event_open(&(0x7f00000001c0)={0x2, 0x80, 0x8, 0x9, 0x4, 0x1, 0x0, 0x3b3d, 0x200a0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x2, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0xffff, 0x1, @perf_config_ext={0x7, 0x1}, 0x281, 0xffffffff, 0x4, 0x3, 0x401, 0xffffff47, 0x401, 0x0, 0x3, 0x0, 0x415}, 0x0, 0xffffffffffffffff, r0, 0x1) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000180)) pkey_mprotect(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x0, 0xffffffffffffffff) pkey_mprotect(&(0x7f0000ff4000/0x4000)=nil, 0x4000, 0x0, 0xffffffffffffffff) socket$inet_udp(0x2, 0x2, 0x0) getsockopt$inet_int(0xffffffffffffffff, 0x0, 0xe, 0x0, &(0x7f0000000280)) ioctl$sock_SIOCADDDLCI(0xffffffffffffffff, 0x8980, 0x0) ioctl$RTC_ALM_SET(r1, 0x40247007, 0x0) mmap$IORING_OFF_SQES(&(0x7f0000ff3000/0x2000)=nil, 0x2000, 0x2000002, 0x10, r1, 0x10000000) getsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, 0x0, 0x0) 12:39:27 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="0200000003000000", 0x8, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000180)) 12:39:27 executing program 0: r0 = creat(&(0x7f0000000040)='./file0\x00', 0x0) r1 = creat(&(0x7f0000000040)='./file0\x00', 0x0) fallocate(r1, 0x0, 0x0, 0x8800000) fallocate(r1, 0x3, 0x0, 0x8000) fallocate(r0, 0x0, 0x880050000000000, 0x8800000) 12:39:27 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {0x0, 0x0, 0x2100}], 0x0, &(0x7f0000000180)) [ 2215.041285] EXT4-fs (loop4): mounted filesystem without journal. Opts: ,errors=continue 12:39:27 executing program 7: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0", 0x2d, 0x400}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000180)) 12:39:27 executing program 6: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000180)) 12:39:27 executing program 4: ioctl$RTC_UIE_ON(0xffffffffffffffff, 0x7003) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x2}, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0xfffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = dup2(0xffffffffffffffff, r0) perf_event_open(&(0x7f00000001c0)={0x2, 0x80, 0x8, 0x9, 0x4, 0x1, 0x0, 0x3b3d, 0x200a0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x2, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0xffff, 0x1, @perf_config_ext={0x7, 0x1}, 0x281, 0xffffffff, 0x4, 0x3, 0x401, 0xffffff47, 0x401, 0x0, 0x3, 0x0, 0x415}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000180)) pkey_mprotect(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x0, 0xffffffffffffffff) pkey_mprotect(&(0x7f0000ff4000/0x4000)=nil, 0x4000, 0x0, 0xffffffffffffffff) socket$inet_udp(0x2, 0x2, 0x0) getsockopt$inet_int(0xffffffffffffffff, 0x0, 0xe, 0x0, &(0x7f0000000280)) ioctl$sock_SIOCADDDLCI(0xffffffffffffffff, 0x8980, 0x0) ioctl$RTC_ALM_SET(r1, 0x40247007, 0x0) mmap$IORING_OFF_SQES(&(0x7f0000ff3000/0x2000)=nil, 0x2000, 0x2000002, 0x10, r1, 0x10000000) getsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, 0x0, 0x0) [ 2215.121454] EXT4-fs error (device loop5): ext4_fill_super:4959: inode #2: comm syz-executor.5: iget: root inode unallocated [ 2215.124718] EXT4-fs (loop5): get root inode failed [ 2215.126177] EXT4-fs (loop5): mount failed 12:39:27 executing program 3: ioctl$RTC_UIE_ON(0xffffffffffffffff, 0x7003) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x2}, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0xfffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = dup2(0xffffffffffffffff, r0) perf_event_open(&(0x7f00000001c0)={0x2, 0x80, 0x8, 0x9, 0x4, 0x1, 0x0, 0x3b3d, 0x200a0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x2, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0xffff, 0x1, @perf_config_ext={0x7, 0x1}, 0x281, 0xffffffff, 0x4, 0x3, 0x401, 0xffffff47, 0x401, 0x0, 0x3, 0x0, 0x415}, 0x0, 0xffffffffffffffff, r0, 0x1) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000180)) pkey_mprotect(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x0, 0xffffffffffffffff) pkey_mprotect(&(0x7f0000ff4000/0x4000)=nil, 0x4000, 0x0, 0xffffffffffffffff) socket$inet_udp(0x2, 0x2, 0x0) getsockopt$inet_int(0xffffffffffffffff, 0x0, 0xe, 0x0, &(0x7f0000000280)) ioctl$sock_SIOCADDDLCI(0xffffffffffffffff, 0x8980, 0x0) ioctl$RTC_ALM_SET(r1, 0x40247007, 0x0) mmap$IORING_OFF_SQES(&(0x7f0000ff3000/0x2000)=nil, 0x2000, 0x2000002, 0x10, r1, 0x10000000) getsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, 0x0, 0x0) [ 2215.219923] EXT4-fs (loop1): ext4_check_descriptors: Inode table for group 0 overlaps superblock [ 2215.221489] EXT4-fs (loop1): group descriptors corrupted! [ 2215.286728] EXT4-fs (loop6): bad geometry: block count 128 exceeds size of device (8 blocks) [ 2215.301964] EXT4-fs (loop7): VFS: Can't find ext4 filesystem [ 2215.326737] EXT4-fs error (device loop2): ext4_fill_super:4959: inode #2: comm syz-executor.2: iget: root inode unallocated [ 2215.333107] EXT4-fs (loop2): get root inode failed [ 2215.334250] EXT4-fs (loop2): mount failed [ 2215.371331] EXT4-fs (loop4): mounted filesystem without journal. Opts: ,errors=continue 12:39:46 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f", 0x44, 0x400}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000180)) 12:39:46 executing program 3: r0 = creat(&(0x7f0000000040)='./file0\x00', 0x0) r1 = creat(&(0x7f0000000040)='./file0\x00', 0x0) fallocate(r1, 0x0, 0x0, 0x8800000) fallocate(r1, 0x3, 0x0, 0x8000) fallocate(r0, 0x0, 0x880050000000000, 0x8800000) 12:39:46 executing program 4: ioctl$RTC_UIE_ON(0xffffffffffffffff, 0x7003) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x2}, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0xfffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = dup2(0xffffffffffffffff, r0) perf_event_open(&(0x7f00000001c0)={0x2, 0x80, 0x8, 0x9, 0x4, 0x1, 0x0, 0x3b3d, 0x200a0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x2, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0xffff, 0x1, @perf_config_ext={0x7, 0x1}, 0x281, 0xffffffff, 0x4, 0x3, 0x401, 0xffffff47, 0x401, 0x0, 0x3, 0x0, 0x415}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000180)) pkey_mprotect(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x0, 0xffffffffffffffff) pkey_mprotect(&(0x7f0000ff4000/0x4000)=nil, 0x4000, 0x0, 0xffffffffffffffff) socket$inet_udp(0x2, 0x2, 0x0) getsockopt$inet_int(0xffffffffffffffff, 0x0, 0xe, 0x0, &(0x7f0000000280)) ioctl$sock_SIOCADDDLCI(0xffffffffffffffff, 0x8980, 0x0) ioctl$RTC_ALM_SET(r1, 0x40247007, 0x0) mmap$IORING_OFF_SQES(&(0x7f0000ff3000/0x2000)=nil, 0x2000, 0x2000002, 0x10, r1, 0x10000000) getsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, 0x0, 0x0) 12:39:46 executing program 6: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000180)) 12:39:46 executing program 0: r0 = creat(&(0x7f0000000040)='./file0\x00', 0x0) r1 = creat(&(0x7f0000000040)='./file0\x00', 0x0) fallocate(r1, 0x0, 0x0, 0x8800000) fallocate(r1, 0x3, 0x0, 0x8000) fallocate(r0, 0x0, 0xc01000000000000, 0x8800000) 12:39:46 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000180)) 12:39:46 executing program 7: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0", 0x2d, 0x400}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000180)) 12:39:46 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600), 0x0, 0x2100}], 0x0, &(0x7f0000000180)) [ 2233.676580] EXT4-fs (loop6): bad geometry: block count 128 exceeds size of device (8 blocks) [ 2233.685411] EXT4-fs (loop7): VFS: Can't find ext4 filesystem [ 2233.691913] EXT4-fs error (device loop5): ext4_fill_super:4959: inode #2: comm syz-executor.5: iget: root inode unallocated [ 2233.692064] EXT4-fs (loop1): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 2233.696339] EXT4-fs (loop1): group descriptors corrupted! [ 2233.696720] EXT4-fs (loop5): get root inode failed [ 2233.698730] EXT4-fs (loop5): mount failed [ 2233.714721] EXT4-fs (loop4): mounted filesystem without journal. Opts: ,errors=continue [ 2233.727962] EXT4-fs error (device loop2): ext4_fill_super:4959: inode #2: comm syz-executor.2: iget: root inode unallocated [ 2233.733912] EXT4-fs (loop2): get root inode failed [ 2233.735036] EXT4-fs (loop2): mount failed 12:39:46 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f", 0x44, 0x400}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000180)) 12:39:46 executing program 4: ioctl$RTC_UIE_ON(0xffffffffffffffff, 0x7003) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x2}, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0xfffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = dup2(0xffffffffffffffff, r0) perf_event_open(&(0x7f00000001c0)={0x2, 0x80, 0x8, 0x9, 0x4, 0x1, 0x0, 0x3b3d, 0x200a0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x2, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0xffff, 0x1, @perf_config_ext={0x7, 0x1}, 0x281, 0xffffffff, 0x4, 0x3, 0x401, 0xffffff47, 0x401, 0x0, 0x3, 0x0, 0x415}, 0x0, 0xffffffffffffffff, r0, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000180)) pkey_mprotect(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x0, 0xffffffffffffffff) pkey_mprotect(&(0x7f0000ff4000/0x4000)=nil, 0x4000, 0x0, 0xffffffffffffffff) socket$inet_udp(0x2, 0x2, 0x0) getsockopt$inet_int(0xffffffffffffffff, 0x0, 0xe, 0x0, &(0x7f0000000280)) ioctl$sock_SIOCADDDLCI(0xffffffffffffffff, 0x8980, 0x0) ioctl$RTC_ALM_SET(r1, 0x40247007, 0x0) mmap$IORING_OFF_SQES(&(0x7f0000ff3000/0x2000)=nil, 0x2000, 0x2000002, 0x10, r1, 0x10000000) getsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, 0x0, 0x0) 12:39:46 executing program 3: ioctl$RTC_UIE_ON(0xffffffffffffffff, 0x7003) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x2}, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0xfffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = dup2(0xffffffffffffffff, r0) perf_event_open(&(0x7f00000001c0)={0x2, 0x80, 0x8, 0x9, 0x4, 0x1, 0x0, 0x3b3d, 0x200a0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x2, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0xffff, 0x1, @perf_config_ext={0x7, 0x1}, 0x281, 0xffffffff, 0x4, 0x3, 0x401, 0xffffff47, 0x401, 0x0, 0x3, 0x0, 0x415}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000180)) pkey_mprotect(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x0, 0xffffffffffffffff) pkey_mprotect(&(0x7f0000ff4000/0x4000)=nil, 0x4000, 0x0, 0xffffffffffffffff) socket$inet_udp(0x2, 0x2, 0x0) getsockopt$inet_int(0xffffffffffffffff, 0x0, 0xe, 0x0, &(0x7f0000000280)) ioctl$sock_SIOCADDDLCI(0xffffffffffffffff, 0x8980, 0x0) ioctl$RTC_ALM_SET(r1, 0x40247007, 0x0) mmap$IORING_OFF_SQES(&(0x7f0000ff3000/0x2000)=nil, 0x2000, 0x2000002, 0x10, r1, 0x10000000) getsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, 0x0, 0x0) 12:39:46 executing program 0: r0 = creat(&(0x7f0000000040)='./file0\x00', 0x0) r1 = creat(&(0x7f0000000040)='./file0\x00', 0x0) fallocate(r1, 0x0, 0x0, 0x8800000) fallocate(r1, 0x3, 0x0, 0x8000) fallocate(r0, 0x0, 0xd00000000000000, 0x8800000) 12:39:46 executing program 7: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0", 0x2d, 0x400}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000180)) 12:39:46 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000180)) 12:39:46 executing program 6: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000440)=[{0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000180)) [ 2233.950301] EXT4-fs error (device loop5): ext4_fill_super:4959: inode #2: comm syz-executor.5: iget: root inode unallocated [ 2233.960771] EXT4-fs (loop5): get root inode failed [ 2233.961951] EXT4-fs (loop5): mount failed [ 2234.046531] EXT4-fs (loop6): VFS: Can't find ext4 filesystem [ 2234.076879] EXT4-fs (loop7): VFS: Can't find ext4 filesystem [ 2234.113251] EXT4-fs (loop1): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 2234.115174] EXT4-fs (loop1): group descriptors corrupted! [ 2234.187783] EXT4-fs (loop4): mounted filesystem without journal. Opts: ,errors=continue 12:40:03 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f0000000000000000010000", 0x4f, 0x400}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000180)) 12:40:03 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600), 0x0, 0x2100}], 0x0, &(0x7f0000000180)) 12:40:03 executing program 4: ioctl$RTC_UIE_ON(0xffffffffffffffff, 0x7003) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x2}, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0xfffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = dup2(0xffffffffffffffff, r0) perf_event_open(&(0x7f00000001c0)={0x2, 0x80, 0x8, 0x9, 0x4, 0x1, 0x0, 0x3b3d, 0x200a0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x2, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0xffff, 0x1, @perf_config_ext={0x7, 0x1}, 0x281, 0xffffffff, 0x4, 0x3, 0x401, 0xffffff47, 0x401, 0x0, 0x3, 0x0, 0x415}, 0x0, 0xffffffffffffffff, r0, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000180)) pkey_mprotect(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x0, 0xffffffffffffffff) pkey_mprotect(&(0x7f0000ff4000/0x4000)=nil, 0x4000, 0x0, 0xffffffffffffffff) socket$inet_udp(0x2, 0x2, 0x0) getsockopt$inet_int(0xffffffffffffffff, 0x0, 0xe, 0x0, &(0x7f0000000280)) ioctl$sock_SIOCADDDLCI(0xffffffffffffffff, 0x8980, 0x0) ioctl$RTC_ALM_SET(r1, 0x40247007, 0x0) mmap$IORING_OFF_SQES(&(0x7f0000ff3000/0x2000)=nil, 0x2000, 0x2000002, 0x10, r1, 0x10000000) getsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, 0x0, 0x0) 12:40:03 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000180)) 12:40:03 executing program 3: ioctl$RTC_UIE_ON(0xffffffffffffffff, 0x7003) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x2}, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0xfffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = dup2(0xffffffffffffffff, r0) perf_event_open(&(0x7f00000001c0)={0x2, 0x80, 0x8, 0x9, 0x4, 0x1, 0x0, 0x3b3d, 0x200a0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x2, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0xffff, 0x1, @perf_config_ext={0x7, 0x1}, 0x281, 0xffffffff, 0x4, 0x3, 0x401, 0xffffff47, 0x401, 0x0, 0x3, 0x0, 0x415}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000180)) pkey_mprotect(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x0, 0xffffffffffffffff) pkey_mprotect(&(0x7f0000ff4000/0x4000)=nil, 0x4000, 0x0, 0xffffffffffffffff) socket$inet_udp(0x2, 0x2, 0x0) getsockopt$inet_int(0xffffffffffffffff, 0x0, 0xe, 0x0, &(0x7f0000000280)) ioctl$sock_SIOCADDDLCI(0xffffffffffffffff, 0x8980, 0x0) ioctl$RTC_ALM_SET(r1, 0x40247007, 0x0) mmap$IORING_OFF_SQES(&(0x7f0000ff3000/0x2000)=nil, 0x2000, 0x2000002, 0x10, r1, 0x10000000) getsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, 0x0, 0x0) 12:40:03 executing program 7: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f", 0x44, 0x400}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000180)) 12:40:03 executing program 0: r0 = creat(&(0x7f0000000040)='./file0\x00', 0x0) r1 = creat(&(0x7f0000000040)='./file0\x00', 0x0) fallocate(r1, 0x0, 0x0, 0x8800000) fallocate(r1, 0x3, 0x0, 0x8000) fallocate(r0, 0x0, 0x1000000000000000, 0x8800000) 12:40:03 executing program 6: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000440)=[{0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000180)) [ 2251.044754] EXT4-fs error (device loop2): ext4_fill_super:4959: inode #2: comm syz-executor.2: iget: root inode unallocated [ 2251.052576] EXT4-fs (loop1): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 2251.054635] EXT4-fs (loop1): group descriptors corrupted! [ 2251.056462] EXT4-fs (loop5): invalid first ino: 0 [ 2251.065381] EXT4-fs (loop6): VFS: Can't find ext4 filesystem [ 2251.073490] EXT4-fs (loop2): get root inode failed [ 2251.074712] EXT4-fs (loop2): mount failed [ 2251.092204] EXT4-fs (loop4): mounted filesystem without journal. Opts: ,errors=continue 12:40:03 executing program 6: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000440)=[{0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000180)) 12:40:03 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000180)) [ 2251.165302] EXT4-fs error (device loop7): ext4_fill_super:4959: inode #2: comm syz-executor.7: iget: root inode unallocated [ 2251.168646] EXT4-fs (loop7): get root inode failed [ 2251.169765] EXT4-fs (loop7): mount failed 12:40:03 executing program 3: ioctl$RTC_UIE_ON(0xffffffffffffffff, 0x7003) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x2}, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0xfffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = dup2(0xffffffffffffffff, r0) perf_event_open(&(0x7f00000001c0)={0x2, 0x80, 0x8, 0x9, 0x4, 0x1, 0x0, 0x3b3d, 0x200a0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x2, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0xffff, 0x1, @perf_config_ext={0x7, 0x1}, 0x281, 0xffffffff, 0x4, 0x3, 0x401, 0xffffff47, 0x401, 0x0, 0x3, 0x0, 0x415}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000180)) pkey_mprotect(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x0, 0xffffffffffffffff) pkey_mprotect(&(0x7f0000ff4000/0x4000)=nil, 0x4000, 0x0, 0xffffffffffffffff) socket$inet_udp(0x2, 0x2, 0x0) getsockopt$inet_int(0xffffffffffffffff, 0x0, 0xe, 0x0, &(0x7f0000000280)) ioctl$sock_SIOCADDDLCI(0xffffffffffffffff, 0x8980, 0x0) ioctl$RTC_ALM_SET(r1, 0x40247007, 0x0) mmap$IORING_OFF_SQES(&(0x7f0000ff3000/0x2000)=nil, 0x2000, 0x2000002, 0x10, r1, 0x10000000) getsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, 0x0, 0x0) 12:40:04 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600), 0x0, 0x2100}], 0x0, &(0x7f0000000180)) 12:40:04 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f0000000000000000010000", 0x4f, 0x400}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000180)) 12:40:04 executing program 0: r0 = creat(&(0x7f0000000040)='./file0\x00', 0x0) r1 = creat(&(0x7f0000000040)='./file0\x00', 0x0) fallocate(r1, 0x0, 0x0, 0x8800000) fallocate(r1, 0x3, 0x0, 0x8000) fallocate(r0, 0x0, 0x1200000000000000, 0x8800000) 12:40:04 executing program 4: ioctl$RTC_UIE_ON(0xffffffffffffffff, 0x7003) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x2}, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0xfffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = dup2(0xffffffffffffffff, r0) perf_event_open(&(0x7f00000001c0)={0x2, 0x80, 0x8, 0x9, 0x4, 0x1, 0x0, 0x3b3d, 0x200a0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x2, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0xffff, 0x1, @perf_config_ext={0x7, 0x1}, 0x281, 0xffffffff, 0x4, 0x3, 0x401, 0xffffff47, 0x401, 0x0, 0x3, 0x0, 0x415}, 0x0, 0xffffffffffffffff, r0, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000180)) pkey_mprotect(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x0, 0xffffffffffffffff) pkey_mprotect(&(0x7f0000ff4000/0x4000)=nil, 0x4000, 0x0, 0xffffffffffffffff) socket$inet_udp(0x2, 0x2, 0x0) getsockopt$inet_int(0xffffffffffffffff, 0x0, 0xe, 0x0, &(0x7f0000000280)) ioctl$sock_SIOCADDDLCI(0xffffffffffffffff, 0x8980, 0x0) ioctl$RTC_ALM_SET(r1, 0x40247007, 0x0) mmap$IORING_OFF_SQES(&(0x7f0000ff3000/0x2000)=nil, 0x2000, 0x2000002, 0x10, r1, 0x10000000) getsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, 0x0, 0x0) 12:40:04 executing program 7: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f", 0x44, 0x400}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000180)) [ 2251.349862] EXT4-fs (loop6): VFS: Can't find ext4 filesystem [ 2251.434067] EXT4-fs (loop1): bad geometry: block count 128 exceeds size of device (8 blocks) [ 2251.510101] EXT4-fs (loop5): invalid first ino: 0 [ 2251.581702] EXT4-fs error (device loop7): ext4_fill_super:4959: inode #2: comm syz-executor.7: iget: root inode unallocated [ 2251.582411] EXT4-fs (loop4): mounted filesystem without journal. Opts: ,errors=continue [ 2251.602684] EXT4-fs (loop7): get root inode failed [ 2251.603888] EXT4-fs (loop7): mount failed 12:40:22 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000180)) 12:40:22 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f465", 0xf, 0x2100}], 0x0, &(0x7f0000000180)) 12:40:22 executing program 0: r0 = creat(&(0x7f0000000040)='./file0\x00', 0x0) r1 = creat(&(0x7f0000000040)='./file0\x00', 0x0) fallocate(r1, 0x0, 0x0, 0x8800000) fallocate(r1, 0x3, 0x0, 0x8000) fallocate(r0, 0x0, 0x2000000000000000, 0x8800000) 12:40:22 executing program 3: ioctl$RTC_UIE_ON(0xffffffffffffffff, 0x7003) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x2}, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0xfffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = dup2(0xffffffffffffffff, r0) perf_event_open(&(0x7f00000001c0)={0x2, 0x80, 0x8, 0x9, 0x4, 0x1, 0x0, 0x3b3d, 0x200a0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x2, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0xffff, 0x1, @perf_config_ext={0x7, 0x1}, 0x281, 0xffffffff, 0x4, 0x3, 0x401, 0xffffff47, 0x401, 0x0, 0x3, 0x0, 0x415}, 0x0, 0xffffffffffffffff, r0, 0x1) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000180)) pkey_mprotect(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x0, 0xffffffffffffffff) pkey_mprotect(&(0x7f0000ff4000/0x4000)=nil, 0x4000, 0x0, 0xffffffffffffffff) socket$inet_udp(0x2, 0x2, 0x0) getsockopt$inet_int(0xffffffffffffffff, 0x0, 0xe, 0x0, &(0x7f0000000280)) ioctl$sock_SIOCADDDLCI(0xffffffffffffffff, 0x8980, 0x0) ioctl$RTC_ALM_SET(r1, 0x40247007, 0x0) mmap$IORING_OFF_SQES(&(0x7f0000ff3000/0x2000)=nil, 0x2000, 0x2000002, 0x10, r1, 0x10000000) getsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, 0x0, 0x0) 12:40:22 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f0000000000000000010000", 0x4f, 0x400}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000180)) 12:40:22 executing program 7: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f", 0x44, 0x400}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000180)) 12:40:22 executing program 4: ioctl$RTC_UIE_ON(0xffffffffffffffff, 0x7003) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x2}, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0xfffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = dup2(0xffffffffffffffff, r0) perf_event_open(&(0x7f00000001c0)={0x2, 0x80, 0x8, 0x9, 0x4, 0x1, 0x0, 0x3b3d, 0x200a0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x2, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0xffff, 0x1, @perf_config_ext={0x7, 0x1}, 0x281, 0xffffffff, 0x4, 0x3, 0x401, 0xffffff47, 0x401, 0x0, 0x3, 0x0, 0x415}, 0x0, 0xffffffffffffffff, r0, 0x1) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000180)) pkey_mprotect(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x0, 0xffffffffffffffff) pkey_mprotect(&(0x7f0000ff4000/0x4000)=nil, 0x4000, 0x0, 0xffffffffffffffff) socket$inet_udp(0x2, 0x2, 0x0) getsockopt$inet_int(0xffffffffffffffff, 0x0, 0xe, 0x0, &(0x7f0000000280)) ioctl$sock_SIOCADDDLCI(0xffffffffffffffff, 0x8980, 0x0) ioctl$RTC_ALM_SET(r1, 0x40247007, 0x0) mmap$IORING_OFF_SQES(&(0x7f0000ff3000/0x2000)=nil, 0x2000, 0x2000002, 0x10, r1, 0x10000000) getsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, 0x0, 0x0) 12:40:22 executing program 6: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000440)=[{0x0, 0x0, 0x400}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000180)) [ 2269.546230] EXT4-fs (loop5): invalid first ino: 0 [ 2269.548002] EXT4-fs (loop1): bad geometry: block count 128 exceeds size of device (8 blocks) [ 2269.551355] EXT4-fs error (device loop7): ext4_fill_super:4959: inode #2: comm syz-executor.7: iget: root inode unallocated [ 2269.556099] EXT4-fs (loop6): VFS: Can't find ext4 filesystem [ 2269.558696] EXT4-fs error (device loop2): ext4_fill_super:4959: inode #2: comm syz-executor.2: iget: root inode unallocated [ 2269.559109] EXT4-fs (loop7): get root inode failed [ 2269.560770] EXT4-fs (loop2): get root inode failed [ 2269.561465] EXT4-fs (loop7): mount failed [ 2269.561954] EXT4-fs (loop2): mount failed 12:40:22 executing program 0: r0 = creat(&(0x7f0000000040)='./file0\x00', 0x0) r1 = creat(&(0x7f0000000040)='./file0\x00', 0x0) fallocate(r1, 0x0, 0x0, 0x8800000) fallocate(r1, 0x3, 0x0, 0x8000) fallocate(r0, 0x0, 0x2103000000000000, 0x8800000) 12:40:22 executing program 4: ioctl$RTC_UIE_ON(0xffffffffffffffff, 0x7003) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x2}, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0xfffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = dup2(0xffffffffffffffff, r0) perf_event_open(&(0x7f00000001c0)={0x2, 0x80, 0x8, 0x9, 0x4, 0x1, 0x0, 0x3b3d, 0x200a0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x2, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0xffff, 0x1, @perf_config_ext={0x7, 0x1}, 0x281, 0xffffffff, 0x4, 0x3, 0x401, 0xffffff47, 0x401, 0x0, 0x3, 0x0, 0x415}, 0x0, 0xffffffffffffffff, r0, 0x1) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000180)) pkey_mprotect(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x0, 0xffffffffffffffff) pkey_mprotect(&(0x7f0000ff4000/0x4000)=nil, 0x4000, 0x0, 0xffffffffffffffff) socket$inet_udp(0x2, 0x2, 0x0) getsockopt$inet_int(0xffffffffffffffff, 0x0, 0xe, 0x0, &(0x7f0000000280)) ioctl$sock_SIOCADDDLCI(0xffffffffffffffff, 0x8980, 0x0) ioctl$RTC_ALM_SET(r1, 0x40247007, 0x0) mmap$IORING_OFF_SQES(&(0x7f0000ff3000/0x2000)=nil, 0x2000, 0x2000002, 0x10, r1, 0x10000000) getsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, 0x0, 0x0) 12:40:22 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f465", 0xf, 0x2100}], 0x0, &(0x7f0000000180)) 12:40:22 executing program 6: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000440)=[{0x0, 0x0, 0x400}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000180)) 12:40:22 executing program 7: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f0000000000000000010000", 0x4f, 0x400}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000180)) 12:40:22 executing program 3: ioctl$RTC_UIE_ON(0xffffffffffffffff, 0x7003) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x2}, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0xfffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = dup2(0xffffffffffffffff, r0) perf_event_open(&(0x7f00000001c0)={0x2, 0x80, 0x8, 0x9, 0x4, 0x1, 0x0, 0x3b3d, 0x200a0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x2, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0xffff, 0x1, @perf_config_ext={0x7, 0x1}, 0x281, 0xffffffff, 0x4, 0x3, 0x401, 0xffffff47, 0x401, 0x0, 0x3, 0x0, 0x415}, 0x0, 0xffffffffffffffff, r0, 0x1) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000180)) pkey_mprotect(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x0, 0xffffffffffffffff) pkey_mprotect(&(0x7f0000ff4000/0x4000)=nil, 0x4000, 0x0, 0xffffffffffffffff) socket$inet_udp(0x2, 0x2, 0x0) getsockopt$inet_int(0xffffffffffffffff, 0x0, 0xe, 0x0, &(0x7f0000000280)) ioctl$sock_SIOCADDDLCI(0xffffffffffffffff, 0x8980, 0x0) ioctl$RTC_ALM_SET(r1, 0x40247007, 0x0) mmap$IORING_OFF_SQES(&(0x7f0000ff3000/0x2000)=nil, 0x2000, 0x2000002, 0x10, r1, 0x10000000) getsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, 0x0, 0x0) 12:40:22 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b", 0x55, 0x400}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000180)) 12:40:22 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000180)) 12:40:22 executing program 3: ioctl$RTC_UIE_ON(0xffffffffffffffff, 0x7003) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x2}, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0xfffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = dup2(0xffffffffffffffff, r0) perf_event_open(&(0x7f00000001c0)={0x2, 0x80, 0x8, 0x9, 0x4, 0x1, 0x0, 0x3b3d, 0x200a0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x2, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0xffff, 0x1, @perf_config_ext={0x7, 0x1}, 0x281, 0xffffffff, 0x4, 0x3, 0x401, 0xffffff47, 0x401, 0x0, 0x3, 0x0, 0x415}, 0x0, 0xffffffffffffffff, r0, 0x1) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000180)) pkey_mprotect(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x0, 0xffffffffffffffff) pkey_mprotect(&(0x7f0000ff4000/0x4000)=nil, 0x4000, 0x0, 0xffffffffffffffff) socket$inet_udp(0x2, 0x2, 0x0) getsockopt$inet_int(0xffffffffffffffff, 0x0, 0xe, 0x0, &(0x7f0000000280)) ioctl$sock_SIOCADDDLCI(0xffffffffffffffff, 0x8980, 0x0) ioctl$RTC_ALM_SET(r1, 0x40247007, 0x0) mmap$IORING_OFF_SQES(&(0x7f0000ff3000/0x2000)=nil, 0x2000, 0x2000002, 0x10, r1, 0x10000000) getsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, 0x0, 0x0) [ 2269.873510] EXT4-fs (loop5): unsupported inode size: 0 [ 2269.874791] EXT4-fs (loop5): blocksize: 2048 [ 2269.877822] EXT4-fs (loop1): bad geometry: block count 128 exceeds size of device (8 blocks) [ 2269.903213] EXT4-fs (loop6): VFS: Can't find ext4 filesystem [ 2269.915518] EXT4-fs (loop7): invalid first ino: 0 [ 2269.924547] EXT4-fs error (device loop2): ext4_fill_super:4959: inode #2: comm syz-executor.2: iget: root inode unallocated [ 2269.928253] EXT4-fs (loop2): get root inode failed [ 2269.929371] EXT4-fs (loop2): mount failed 12:40:22 executing program 4: ioctl$RTC_UIE_ON(0xffffffffffffffff, 0x7003) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x2}, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0xfffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = dup2(0xffffffffffffffff, r0) perf_event_open(&(0x7f00000001c0)={0x2, 0x80, 0x8, 0x9, 0x4, 0x1, 0x0, 0x3b3d, 0x200a0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x2, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0xffff, 0x1, @perf_config_ext={0x7, 0x1}, 0x281, 0xffffffff, 0x4, 0x3, 0x401, 0xffffff47, 0x401, 0x0, 0x3, 0x0, 0x415}, 0x0, 0xffffffffffffffff, r0, 0x1) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000180)) pkey_mprotect(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x0, 0xffffffffffffffff) pkey_mprotect(&(0x7f0000ff4000/0x4000)=nil, 0x4000, 0x0, 0xffffffffffffffff) socket$inet_udp(0x2, 0x2, 0x0) getsockopt$inet_int(0xffffffffffffffff, 0x0, 0xe, 0x0, &(0x7f0000000280)) ioctl$sock_SIOCADDDLCI(0xffffffffffffffff, 0x8980, 0x0) ioctl$RTC_ALM_SET(r1, 0x40247007, 0x0) mmap$IORING_OFF_SQES(&(0x7f0000ff3000/0x2000)=nil, 0x2000, 0x2000002, 0x10, r1, 0x10000000) getsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, 0x0, 0x0) 12:40:42 executing program 4: ioctl$RTC_UIE_ON(0xffffffffffffffff, 0x7003) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x2}, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0xfffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = dup2(0xffffffffffffffff, r0) perf_event_open(&(0x7f00000001c0)={0x2, 0x80, 0x8, 0x9, 0x4, 0x1, 0x0, 0x3b3d, 0x200a0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x2, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0xffff, 0x1, @perf_config_ext={0x7, 0x1}, 0x281, 0xffffffff, 0x4, 0x3, 0x401, 0xffffff47, 0x401, 0x0, 0x3, 0x0, 0x415}, 0x0, 0xffffffffffffffff, r0, 0x1) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', 0x0, 0x0, 0x4, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000180)) pkey_mprotect(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x0, 0xffffffffffffffff) pkey_mprotect(&(0x7f0000ff4000/0x4000)=nil, 0x4000, 0x0, 0xffffffffffffffff) socket$inet_udp(0x2, 0x2, 0x0) getsockopt$inet_int(0xffffffffffffffff, 0x0, 0xe, 0x0, &(0x7f0000000280)) ioctl$sock_SIOCADDDLCI(0xffffffffffffffff, 0x8980, 0x0) ioctl$RTC_ALM_SET(r1, 0x40247007, 0x0) mmap$IORING_OFF_SQES(&(0x7f0000ff3000/0x2000)=nil, 0x2000, 0x2000002, 0x10, r1, 0x10000000) getsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, 0x0, 0x0) 12:40:42 executing program 0: r0 = creat(&(0x7f0000000040)='./file0\x00', 0x0) r1 = creat(&(0x7f0000000040)='./file0\x00', 0x0) fallocate(r1, 0x0, 0x0, 0x8800000) fallocate(r1, 0x3, 0x0, 0x8000) fallocate(r0, 0x0, 0x6400000000000000, 0x8800000) 12:40:42 executing program 3: ioctl$RTC_UIE_ON(0xffffffffffffffff, 0x7003) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x2}, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0xfffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = dup2(0xffffffffffffffff, r0) perf_event_open(&(0x7f00000001c0)={0x2, 0x80, 0x8, 0x9, 0x4, 0x1, 0x0, 0x3b3d, 0x200a0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x2, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0xffff, 0x1, @perf_config_ext={0x7, 0x1}, 0x281, 0xffffffff, 0x4, 0x3, 0x401, 0xffffff47, 0x401, 0x0, 0x3, 0x0, 0x415}, 0x0, 0xffffffffffffffff, r0, 0x1) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000180)) pkey_mprotect(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x0, 0xffffffffffffffff) pkey_mprotect(&(0x7f0000ff4000/0x4000)=nil, 0x4000, 0x0, 0xffffffffffffffff) socket$inet_udp(0x2, 0x2, 0x0) getsockopt$inet_int(0xffffffffffffffff, 0x0, 0xe, 0x0, &(0x7f0000000280)) ioctl$sock_SIOCADDDLCI(0xffffffffffffffff, 0x8980, 0x0) ioctl$RTC_ALM_SET(r1, 0x40247007, 0x0) mmap$IORING_OFF_SQES(&(0x7f0000ff3000/0x2000)=nil, 0x2000, 0x2000002, 0x10, r1, 0x10000000) getsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, 0x0, 0x0) 12:40:42 executing program 7: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f0000000000000000010000", 0x4f, 0x400}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000180)) 12:40:42 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b", 0x55, 0x400}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000180)) 12:40:42 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000180)) 12:40:42 executing program 6: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000440)=[{0x0, 0x0, 0x400}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000180)) 12:40:42 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f465", 0xf, 0x2100}], 0x0, &(0x7f0000000180)) [ 2290.135757] EXT4-fs (loop5): unsupported inode size: 0 [ 2290.137119] EXT4-fs (loop5): blocksize: 2048 [ 2290.148067] EXT4-fs (loop1): bad geometry: block count 128 exceeds size of device (8 blocks) [ 2290.163887] EXT4-fs (loop7): invalid first ino: 0 12:40:42 executing program 4: ioctl$RTC_UIE_ON(0xffffffffffffffff, 0x7003) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x2}, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0xfffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = dup2(0xffffffffffffffff, r0) perf_event_open(&(0x7f00000001c0)={0x2, 0x80, 0x8, 0x9, 0x4, 0x1, 0x0, 0x3b3d, 0x200a0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x2, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0xffff, 0x1, @perf_config_ext={0x7, 0x1}, 0x281, 0xffffffff, 0x4, 0x3, 0x401, 0xffffff47, 0x401, 0x0, 0x3, 0x0, 0x415}, 0x0, 0xffffffffffffffff, r0, 0x1) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', 0x0, 0x0, 0x4, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000180)) pkey_mprotect(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x0, 0xffffffffffffffff) pkey_mprotect(&(0x7f0000ff4000/0x4000)=nil, 0x4000, 0x0, 0xffffffffffffffff) socket$inet_udp(0x2, 0x2, 0x0) getsockopt$inet_int(0xffffffffffffffff, 0x0, 0xe, 0x0, &(0x7f0000000280)) ioctl$sock_SIOCADDDLCI(0xffffffffffffffff, 0x8980, 0x0) ioctl$RTC_ALM_SET(r1, 0x40247007, 0x0) mmap$IORING_OFF_SQES(&(0x7f0000ff3000/0x2000)=nil, 0x2000, 0x2000002, 0x10, r1, 0x10000000) getsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, 0x0, 0x0) [ 2290.187296] EXT4-fs (loop6): VFS: Can't find ext4 filesystem [ 2290.200890] EXT4-fs error (device loop2): ext4_fill_super:4959: inode #2: comm syz-executor.2: iget: root inode unallocated [ 2290.202478] EXT4-fs (loop2): get root inode failed [ 2290.203343] EXT4-fs (loop2): mount failed 12:40:43 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000180)) symlinkat(&(0x7f00000000c0)='./file0\x00', 0xffffffffffffffff, &(0x7f0000000140)='./file0\x00') getsockopt$inet_int(0xffffffffffffffff, 0x0, 0xe, 0x0, &(0x7f0000000280)) ioctl$RTC_ALM_SET(0xffffffffffffffff, 0x40247007, 0x0) 12:40:43 executing program 7: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f0000000000000000010000", 0x4f, 0x400}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000180)) 12:40:43 executing program 0: r0 = creat(&(0x7f0000000040)='./file0\x00', 0x0) r1 = creat(&(0x7f0000000040)='./file0\x00', 0x0) fallocate(r1, 0x0, 0x0, 0x8800000) fallocate(r1, 0x3, 0x0, 0x8000) fallocate(r0, 0x0, 0x8102000000000000, 0x8800000) 12:40:43 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b", 0x55, 0x400}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000180)) 12:40:43 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000180)) [ 2290.447536] EXT4-fs (loop1): bad geometry: block count 128 exceeds size of device (8 blocks) [ 2290.465879] EXT4-fs (loop5): unsupported inode size: 0 [ 2290.466480] EXT4-fs (loop5): blocksize: 2048 [ 2290.467926] EXT4-fs (loop7): invalid first ino: 0 12:40:59 executing program 0: r0 = creat(&(0x7f0000000040)='./file0\x00', 0x0) r1 = creat(&(0x7f0000000040)='./file0\x00', 0x0) fallocate(r1, 0x0, 0x0, 0x8800000) fallocate(r1, 0x3, 0x0, 0x8000) fallocate(r0, 0x0, 0xf4ffffff00000000, 0x8800000) 12:40:59 executing program 6: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000440)=[{&(0x7f0000000040), 0x0, 0x400}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000180)) 12:40:59 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000180)) symlinkat(&(0x7f00000000c0)='./file0\x00', 0xffffffffffffffff, &(0x7f0000000140)='./file0\x00') getsockopt$inet_int(0xffffffffffffffff, 0x0, 0xe, 0x0, &(0x7f0000000280)) ioctl$RTC_ALM_SET(0xffffffffffffffff, 0x40247007, 0x0) 12:40:59 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f0000", 0x16, 0x2100}], 0x0, &(0x7f0000000180)) 12:40:59 executing program 4: ioctl$RTC_UIE_ON(0xffffffffffffffff, 0x7003) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x2}, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0xfffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = dup2(0xffffffffffffffff, r0) perf_event_open(&(0x7f00000001c0)={0x2, 0x80, 0x8, 0x9, 0x4, 0x1, 0x0, 0x3b3d, 0x200a0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x2, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0xffff, 0x1, @perf_config_ext={0x7, 0x1}, 0x281, 0xffffffff, 0x4, 0x3, 0x401, 0xffffff47, 0x401, 0x0, 0x3, 0x0, 0x415}, 0x0, 0xffffffffffffffff, r0, 0x1) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', 0x0, 0x0, 0x4, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000180)) pkey_mprotect(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x0, 0xffffffffffffffff) pkey_mprotect(&(0x7f0000ff4000/0x4000)=nil, 0x4000, 0x0, 0xffffffffffffffff) socket$inet_udp(0x2, 0x2, 0x0) getsockopt$inet_int(0xffffffffffffffff, 0x0, 0xe, 0x0, &(0x7f0000000280)) ioctl$sock_SIOCADDDLCI(0xffffffffffffffff, 0x8980, 0x0) ioctl$RTC_ALM_SET(r1, 0x40247007, 0x0) mmap$IORING_OFF_SQES(&(0x7f0000ff3000/0x2000)=nil, 0x2000, 0x2000002, 0x10, r1, 0x10000000) getsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, 0x0, 0x0) 12:40:59 executing program 7: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b", 0x55, 0x400}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000180)) 12:40:59 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b000000", 0x58, 0x400}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000180)) 12:40:59 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000180)) [ 2306.846679] EXT4-fs (loop6): VFS: Can't find ext4 filesystem [ 2306.868149] EXT4-fs error (device loop2): ext4_fill_super:4959: inode #2: comm syz-executor.2: iget: root inode unallocated [ 2306.873204] EXT4-fs (loop2): get root inode failed [ 2306.874305] EXT4-fs (loop2): mount failed [ 2306.876265] EXT4-fs (loop7): unsupported inode size: 0 [ 2306.877537] EXT4-fs (loop7): blocksize: 2048 [ 2306.892772] EXT4-fs (loop1): bad geometry: block count 128 exceeds size of device (8 blocks) [ 2306.898112] EXT4-fs (loop5): unsupported inode size: 0 [ 2306.899387] EXT4-fs (loop5): blocksize: 2048 12:40:59 executing program 4: ioctl$RTC_UIE_ON(0xffffffffffffffff, 0x7003) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x2}, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0xfffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = dup2(0xffffffffffffffff, r0) perf_event_open(&(0x7f00000001c0)={0x2, 0x80, 0x8, 0x9, 0x4, 0x1, 0x0, 0x3b3d, 0x200a0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x2, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0xffff, 0x1, @perf_config_ext={0x7, 0x1}, 0x281, 0xffffffff, 0x4, 0x3, 0x401, 0xffffff47, 0x401, 0x0, 0x3, 0x0, 0x415}, 0x0, 0xffffffffffffffff, r0, 0x1) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000180)) pkey_mprotect(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x0, 0xffffffffffffffff) pkey_mprotect(&(0x7f0000ff4000/0x4000)=nil, 0x4000, 0x0, 0xffffffffffffffff) socket$inet_udp(0x2, 0x2, 0x0) getsockopt$inet_int(0xffffffffffffffff, 0x0, 0xe, 0x0, &(0x7f0000000280)) ioctl$sock_SIOCADDDLCI(0xffffffffffffffff, 0x8980, 0x0) ioctl$RTC_ALM_SET(r1, 0x40247007, 0x0) mmap$IORING_OFF_SQES(&(0x7f0000ff3000/0x2000)=nil, 0x2000, 0x2000002, 0x10, r1, 0x10000000) getsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, 0x0, 0x0) 12:40:59 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f0000", 0x16, 0x2100}], 0x0, &(0x7f0000000180)) 12:40:59 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000180)) symlinkat(&(0x7f00000000c0)='./file0\x00', 0xffffffffffffffff, &(0x7f0000000140)='./file0\x00') getsockopt$inet_int(0xffffffffffffffff, 0x0, 0xe, 0x0, &(0x7f0000000280)) ioctl$RTC_ALM_SET(0xffffffffffffffff, 0x40247007, 0x0) 12:40:59 executing program 0: r0 = creat(&(0x7f0000000040)='./file0\x00', 0x0) r1 = creat(&(0x7f0000000040)='./file0\x00', 0x0) fallocate(r1, 0x0, 0x0, 0x8800000) fallocate(r1, 0x3, 0x0, 0x8000) fallocate(r0, 0x0, 0xfbffffff00000000, 0x8800000) 12:40:59 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000440)=[{0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000180)) 12:40:59 executing program 7: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b", 0x55, 0x400}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000180)) 12:40:59 executing program 6: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000440)=[{&(0x7f0000000040), 0x0, 0x400}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000180)) 12:40:59 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b000000", 0x58, 0x400}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000180)) [ 2307.265977] EXT4-fs (loop7): unsupported inode size: 0 [ 2307.268119] EXT4-fs (loop7): blocksize: 2048 [ 2307.303415] EXT4-fs (loop5): unsupported inode size: 0 [ 2307.304701] EXT4-fs (loop5): blocksize: 2048 [ 2307.344162] EXT4-fs error (device loop2): ext4_fill_super:4959: inode #2: comm syz-executor.2: iget: root inode unallocated [ 2307.348739] EXT4-fs (loop1): VFS: Can't find ext4 filesystem [ 2307.352293] EXT4-fs (loop6): VFS: Can't find ext4 filesystem [ 2307.361187] EXT4-fs (loop2): get root inode failed [ 2307.362396] EXT4-fs (loop2): mount failed 12:41:16 executing program 4: ioctl$RTC_UIE_ON(0xffffffffffffffff, 0x7003) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x2}, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0xfffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = dup2(0xffffffffffffffff, r0) perf_event_open(&(0x7f00000001c0)={0x2, 0x80, 0x8, 0x9, 0x4, 0x1, 0x0, 0x3b3d, 0x200a0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x2, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0xffff, 0x1, @perf_config_ext={0x7, 0x1}, 0x281, 0xffffffff, 0x4, 0x3, 0x401, 0xffffff47, 0x401, 0x0, 0x3, 0x0, 0x415}, 0x0, 0xffffffffffffffff, r0, 0x1) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000180)) pkey_mprotect(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x0, 0xffffffffffffffff) pkey_mprotect(&(0x7f0000ff4000/0x4000)=nil, 0x4000, 0x0, 0xffffffffffffffff) socket$inet_udp(0x2, 0x2, 0x0) getsockopt$inet_int(0xffffffffffffffff, 0x0, 0xe, 0x0, &(0x7f0000000280)) ioctl$sock_SIOCADDDLCI(0xffffffffffffffff, 0x8980, 0x0) ioctl$RTC_ALM_SET(r1, 0x40247007, 0x0) mmap$IORING_OFF_SQES(&(0x7f0000ff3000/0x2000)=nil, 0x2000, 0x2000002, 0x10, r1, 0x10000000) getsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, 0x0, 0x0) 12:41:16 executing program 7: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b", 0x55, 0x400}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000180)) 12:41:16 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f0000", 0x16, 0x2100}], 0x0, &(0x7f0000000180)) 12:41:16 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000440)=[{0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000180)) 12:41:16 executing program 0: r0 = creat(&(0x7f0000000040)='./file0\x00', 0x0) r1 = creat(&(0x7f0000000040)='./file0\x00', 0x0) fallocate(r1, 0x0, 0x0, 0x8800000) fallocate(r1, 0x3, 0x0, 0x8000) fallocate(r0, 0x0, 0xfeffffff00000000, 0x8800000) 12:41:16 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b000000", 0x58, 0x400}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000180)) 12:41:16 executing program 6: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000440)=[{&(0x7f0000000040), 0x0, 0x400}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000180)) 12:41:16 executing program 3: ioctl$RTC_UIE_ON(0xffffffffffffffff, 0x7003) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x2}, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0xfffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) dup2(0xffffffffffffffff, r0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000180)) [ 2323.701468] EXT4-fs (loop6): VFS: Can't find ext4 filesystem [ 2323.703192] EXT4-fs (loop5): unsupported inode size: 0 [ 2323.704378] EXT4-fs (loop5): blocksize: 2048 [ 2323.735084] EXT4-fs (loop1): VFS: Can't find ext4 filesystem [ 2323.736783] EXT4-fs (loop7): unsupported inode size: 0 [ 2323.738060] EXT4-fs (loop7): blocksize: 2048 12:41:16 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b00000000", 0x59, 0x400}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000180)) [ 2323.758106] EXT4-fs error (device loop2): ext4_fill_super:4959: inode #2: comm syz-executor.2: iget: root inode unallocated [ 2323.772975] EXT4-fs (loop2): get root inode failed [ 2323.774325] EXT4-fs (loop2): mount failed 12:41:16 executing program 3: ioctl$RTC_UIE_ON(0xffffffffffffffff, 0x7003) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x2}, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0xfffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) dup2(0xffffffffffffffff, r0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000180)) 12:41:16 executing program 6: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0", 0x2d, 0x400}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000180)) 12:41:16 executing program 4: ioctl$RTC_UIE_ON(0xffffffffffffffff, 0x7003) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x2}, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0xfffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = dup2(0xffffffffffffffff, r0) perf_event_open(&(0x7f00000001c0)={0x2, 0x80, 0x8, 0x9, 0x4, 0x1, 0x0, 0x3b3d, 0x200a0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x2, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0xffff, 0x1, @perf_config_ext={0x7, 0x1}, 0x281, 0xffffffff, 0x4, 0x3, 0x401, 0xffffff47, 0x401, 0x0, 0x3, 0x0, 0x415}, 0x0, 0xffffffffffffffff, r0, 0x1) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000180)) pkey_mprotect(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x0, 0xffffffffffffffff) pkey_mprotect(&(0x7f0000ff4000/0x4000)=nil, 0x4000, 0x0, 0xffffffffffffffff) socket$inet_udp(0x2, 0x2, 0x0) getsockopt$inet_int(0xffffffffffffffff, 0x0, 0xe, 0x0, &(0x7f0000000280)) ioctl$sock_SIOCADDDLCI(0xffffffffffffffff, 0x8980, 0x0) ioctl$RTC_ALM_SET(r1, 0x40247007, 0x0) mmap$IORING_OFF_SQES(&(0x7f0000ff3000/0x2000)=nil, 0x2000, 0x2000002, 0x10, r1, 0x10000000) getsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, 0x0, 0x0) 12:41:16 executing program 7: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b000000", 0x58, 0x400}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000180)) 12:41:16 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000440)=[{0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000180)) 12:41:16 executing program 0: r0 = creat(&(0x7f0000000040)='./file0\x00', 0x0) r1 = creat(&(0x7f0000000040)='./file0\x00', 0x0) fallocate(r1, 0x0, 0x0, 0x8800000) fallocate(r1, 0x3, 0x0, 0x8000) fallocate(r0, 0x0, 0xff01000000000000, 0x8800000) 12:41:16 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000", 0x1a, 0x2100}], 0x0, &(0x7f0000000180)) [ 2323.967783] EXT4-fs (loop5): unsupported inode size: 0 [ 2323.969029] EXT4-fs (loop5): blocksize: 2048 [ 2324.014285] EXT4-fs (loop6): VFS: Can't find ext4 filesystem 12:41:16 executing program 6: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0", 0x2d, 0x400}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000180)) 12:41:16 executing program 3: ioctl$RTC_UIE_ON(0xffffffffffffffff, 0x7003) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x2}, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0xfffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) dup2(0xffffffffffffffff, r0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000180)) [ 2324.142351] EXT4-fs (loop7): unsupported inode size: 0 [ 2324.143611] EXT4-fs (loop7): blocksize: 2048 [ 2324.203090] EXT4-fs (loop1): VFS: Can't find ext4 filesystem [ 2324.215218] EXT4-fs error (device loop2): ext4_fill_super:4959: inode #2: comm syz-executor.2: iget: root inode unallocated [ 2324.237909] EXT4-fs (loop2): get root inode failed [ 2324.239073] EXT4-fs (loop2): mount failed [ 2324.416435] EXT4-fs (loop6): VFS: Can't find ext4 filesystem 12:41:34 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b00000000", 0x59, 0x400}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000180)) 12:41:34 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000440)=[{0x0, 0x0, 0x400}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000180)) 12:41:34 executing program 6: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0", 0x2d, 0x400}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000180)) 12:41:34 executing program 3: ioctl$RTC_UIE_ON(0xffffffffffffffff, 0x7003) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x2}, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0xfffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = dup2(0xffffffffffffffff, r0) perf_event_open(&(0x7f00000001c0)={0x0, 0x80, 0x8, 0x9, 0x4, 0x1, 0x0, 0x3b3d, 0x200a0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x2, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0xffff, 0x1, @perf_config_ext={0x7, 0x1}, 0x281, 0xffffffff, 0x4, 0x3, 0x401, 0xffffff47, 0x401, 0x0, 0x3, 0x0, 0x415}, 0x0, 0xffffffffffffffff, r0, 0x1) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000180)) pkey_mprotect(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x0, 0xffffffffffffffff) pkey_mprotect(&(0x7f0000ff4000/0x4000)=nil, 0x4000, 0x0, 0xffffffffffffffff) socket$inet_udp(0x2, 0x2, 0x0) getsockopt$inet_int(0xffffffffffffffff, 0x0, 0xe, 0x0, &(0x7f0000000280)) ioctl$sock_SIOCADDDLCI(0xffffffffffffffff, 0x8980, 0x0) ioctl$RTC_ALM_SET(r1, 0x40247007, 0x0) mmap$IORING_OFF_SQES(&(0x7f0000ff3000/0x2000)=nil, 0x2000, 0x2000002, 0x10, r1, 0x10000000) getsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, 0x0, 0x0) 12:41:34 executing program 0: r0 = creat(&(0x7f0000000040)='./file0\x00', 0x0) r1 = creat(&(0x7f0000000040)='./file0\x00', 0x0) fallocate(r1, 0x0, 0x0, 0x8800000) fallocate(r1, 0x3, 0x0, 0x8000) fallocate(r0, 0x0, 0xff07000000000000, 0x8800000) 12:41:34 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000", 0x1a, 0x2100}], 0x0, &(0x7f0000000180)) 12:41:34 executing program 4: ioctl$RTC_UIE_ON(0xffffffffffffffff, 0x7003) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x2}, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0xfffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = dup2(0xffffffffffffffff, r0) perf_event_open(&(0x7f00000001c0)={0x2, 0x80, 0x8, 0x9, 0x4, 0x1, 0x0, 0x3b3d, 0x200a0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x2, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0xffff, 0x1, @perf_config_ext={0x7, 0x1}, 0x281, 0xffffffff, 0x4, 0x3, 0x401, 0xffffff47, 0x401, 0x0, 0x3, 0x0, 0x415}, 0x0, 0xffffffffffffffff, r0, 0x1) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}], 0x0, &(0x7f0000000180)) pkey_mprotect(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x0, 0xffffffffffffffff) pkey_mprotect(&(0x7f0000ff4000/0x4000)=nil, 0x4000, 0x0, 0xffffffffffffffff) socket$inet_udp(0x2, 0x2, 0x0) getsockopt$inet_int(0xffffffffffffffff, 0x0, 0xe, 0x0, &(0x7f0000000280)) ioctl$sock_SIOCADDDLCI(0xffffffffffffffff, 0x8980, 0x0) ioctl$RTC_ALM_SET(r1, 0x40247007, 0x0) mmap$IORING_OFF_SQES(&(0x7f0000ff3000/0x2000)=nil, 0x2000, 0x2000002, 0x10, r1, 0x10000000) getsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, 0x0, 0x0) 12:41:34 executing program 7: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b000000", 0x58, 0x400}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000180)) [ 2342.106193] EXT4-fs (loop6): VFS: Can't find ext4 filesystem [ 2342.149414] EXT4-fs (loop5): unsupported inode size: 0 [ 2342.150853] EXT4-fs (loop5): blocksize: 2048 12:41:34 executing program 3: ioctl$RTC_UIE_ON(0xffffffffffffffff, 0x7003) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x2}, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0xfffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = dup2(0xffffffffffffffff, r0) perf_event_open(&(0x7f00000001c0)={0x0, 0x80, 0x8, 0x9, 0x4, 0x1, 0x0, 0x3b3d, 0x200a0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x2, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0xffff, 0x1, @perf_config_ext={0x7, 0x1}, 0x281, 0xffffffff, 0x4, 0x3, 0x401, 0xffffff47, 0x401, 0x0, 0x3, 0x0, 0x415}, 0x0, 0xffffffffffffffff, r0, 0x1) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000180)) pkey_mprotect(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x0, 0xffffffffffffffff) pkey_mprotect(&(0x7f0000ff4000/0x4000)=nil, 0x4000, 0x0, 0xffffffffffffffff) socket$inet_udp(0x2, 0x2, 0x0) getsockopt$inet_int(0xffffffffffffffff, 0x0, 0xe, 0x0, &(0x7f0000000280)) ioctl$sock_SIOCADDDLCI(0xffffffffffffffff, 0x8980, 0x0) ioctl$RTC_ALM_SET(r1, 0x40247007, 0x0) mmap$IORING_OFF_SQES(&(0x7f0000ff3000/0x2000)=nil, 0x2000, 0x2000002, 0x10, r1, 0x10000000) getsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, 0x0, 0x0) [ 2342.165718] EXT4-fs error (device loop2): ext4_fill_super:4959: inode #2: comm syz-executor.2: iget: root inode unallocated [ 2342.166848] EXT4-fs error (device loop4): ext4_fill_super:4959: inode #2: comm syz-executor.4: iget: root inode unallocated [ 2342.174186] EXT4-fs (loop4): get root inode failed [ 2342.175468] EXT4-fs (loop4): mount failed [ 2342.183335] EXT4-fs (loop2): get root inode failed [ 2342.184469] EXT4-fs (loop2): mount failed [ 2342.197530] EXT4-fs (loop1): VFS: Can't find ext4 filesystem [ 2342.220401] EXT4-fs (loop7): unsupported inode size: 0 [ 2342.221625] EXT4-fs (loop7): blocksize: 2048 12:41:52 executing program 3: ioctl$RTC_UIE_ON(0xffffffffffffffff, 0x7003) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x2}, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0xfffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = dup2(0xffffffffffffffff, r0) perf_event_open(&(0x7f00000001c0)={0x0, 0x80, 0x8, 0x9, 0x4, 0x1, 0x0, 0x3b3d, 0x200a0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x2, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0xffff, 0x1, @perf_config_ext={0x7, 0x1}, 0x281, 0xffffffff, 0x4, 0x3, 0x401, 0xffffff47, 0x401, 0x0, 0x3, 0x0, 0x415}, 0x0, 0xffffffffffffffff, r0, 0x1) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000180)) pkey_mprotect(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x0, 0xffffffffffffffff) pkey_mprotect(&(0x7f0000ff4000/0x4000)=nil, 0x4000, 0x0, 0xffffffffffffffff) socket$inet_udp(0x2, 0x2, 0x0) getsockopt$inet_int(0xffffffffffffffff, 0x0, 0xe, 0x0, &(0x7f0000000280)) ioctl$sock_SIOCADDDLCI(0xffffffffffffffff, 0x8980, 0x0) ioctl$RTC_ALM_SET(r1, 0x40247007, 0x0) mmap$IORING_OFF_SQES(&(0x7f0000ff3000/0x2000)=nil, 0x2000, 0x2000002, 0x10, r1, 0x10000000) getsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, 0x0, 0x0) 12:41:52 executing program 4: ioctl$RTC_UIE_ON(0xffffffffffffffff, 0x7003) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x2}, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0xfffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = dup2(0xffffffffffffffff, r0) perf_event_open(&(0x7f00000001c0)={0x2, 0x80, 0x8, 0x9, 0x4, 0x1, 0x0, 0x3b3d, 0x200a0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x2, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0xffff, 0x1, @perf_config_ext={0x7, 0x1}, 0x281, 0xffffffff, 0x4, 0x3, 0x401, 0xffffff47, 0x401, 0x0, 0x3, 0x0, 0x415}, 0x0, 0xffffffffffffffff, r0, 0x1) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}], 0x0, &(0x7f0000000180)) pkey_mprotect(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x0, 0xffffffffffffffff) pkey_mprotect(&(0x7f0000ff4000/0x4000)=nil, 0x4000, 0x0, 0xffffffffffffffff) socket$inet_udp(0x2, 0x2, 0x0) getsockopt$inet_int(0xffffffffffffffff, 0x0, 0xe, 0x0, &(0x7f0000000280)) ioctl$sock_SIOCADDDLCI(0xffffffffffffffff, 0x8980, 0x0) ioctl$RTC_ALM_SET(r1, 0x40247007, 0x0) mmap$IORING_OFF_SQES(&(0x7f0000ff3000/0x2000)=nil, 0x2000, 0x2000002, 0x10, r1, 0x10000000) getsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, 0x0, 0x0) 12:41:52 executing program 7: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b000000", 0x58, 0x400}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000180)) 12:41:52 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b00000000", 0x59, 0x400}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000180)) 12:41:52 executing program 6: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f", 0x44, 0x400}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000180)) 12:41:52 executing program 0: r0 = creat(&(0x7f0000000040)='./file0\x00', 0x0) r1 = creat(&(0x7f0000000040)='./file0\x00', 0x0) fallocate(r1, 0x0, 0x0, 0x8800000) fallocate(r1, 0x3, 0x0, 0x8000) fallocate(r0, 0x0, 0xffffffff00000000, 0x8800000) 12:41:52 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000440)=[{0x0, 0x0, 0x400}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000180)) 12:41:52 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000", 0x1a, 0x2100}], 0x0, &(0x7f0000000180)) [ 2360.051604] EXT4-fs (loop7): unsupported inode size: 0 [ 2360.052867] EXT4-fs (loop7): blocksize: 2048 [ 2360.084905] EXT4-fs (loop5): unsupported inode size: 0 [ 2360.086588] EXT4-fs (loop5): blocksize: 2048 [ 2360.115310] EXT4-fs error (device loop2): ext4_fill_super:4959: inode #2: comm syz-executor.2: iget: root inode unallocated [ 2360.118989] EXT4-fs (loop2): get root inode failed [ 2360.120096] EXT4-fs (loop2): mount failed 12:41:52 executing program 7: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b00000000", 0x59, 0x400}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000180)) [ 2360.134901] EXT4-fs (loop1): VFS: Can't find ext4 filesystem [ 2360.135398] EXT4-fs error (device loop4): ext4_fill_super:4959: inode #2: comm syz-executor.4: iget: root inode unallocated [ 2360.148208] EXT4-fs (loop4): get root inode failed [ 2360.150129] EXT4-fs (loop4): mount failed [ 2360.154651] EXT4-fs error (device loop6): ext4_fill_super:4959: inode #2: comm syz-executor.6: iget: root inode unallocated [ 2360.175295] EXT4-fs (loop6): get root inode failed [ 2360.176731] EXT4-fs (loop6): mount failed 12:41:52 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f0000000000000400", 0x1c, 0x2100}], 0x0, &(0x7f0000000180)) 12:41:53 executing program 0: r0 = creat(&(0x7f0000000040)='./file0\x00', 0x0) r1 = creat(&(0x7f0000000040)='./file0\x00', 0x0) fallocate(r1, 0x0, 0x0, 0x8800000) fallocate(r1, 0x3, 0x0, 0x8000) fallocate(r0, 0x0, 0x0, 0x4000) 12:41:53 executing program 3: r0 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000000)='/sys/power/resume', 0x22902, 0x0) r1 = openat$sr(0xffffffffffffff9c, &(0x7f0000000040), 0x260d01, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$bt_hci(r0, &(0x7f0000000040)=ANY=[], 0xfdef) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = fcntl$dupfd(r2, 0x0, r2) bind$bt_hci(r3, &(0x7f0000000080)={0x1f, 0x1, 0x4}, 0x6) socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000140)={0x30, 0x0, 0xc21, 0x0, 0x0, {0x2}, [@typed={0x8, 0x0, 0x0, 0x0, @u32}, @typed={0x14, 0x1, 0x0, 0x0, @ipv6=@private2}]}, 0x30}}, 0x0) getsockopt$bt_sco_SCO_CONNINFO(0xffffffffffffffff, 0x11, 0x2, &(0x7f00000000c0)=""/12, &(0x7f0000000100)=0xc) read(r1, &(0x7f00000002c0)=""/240, 0xf0) 12:41:53 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000180)) 12:41:53 executing program 6: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f", 0x44, 0x400}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000180)) 12:41:53 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000440)=[{0x0, 0x0, 0x400}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000180)) 12:41:53 executing program 4: ioctl$RTC_UIE_ON(0xffffffffffffffff, 0x7003) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x2}, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0xfffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = dup2(0xffffffffffffffff, r0) perf_event_open(&(0x7f00000001c0)={0x2, 0x80, 0x8, 0x9, 0x4, 0x1, 0x0, 0x3b3d, 0x200a0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x2, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0xffff, 0x1, @perf_config_ext={0x7, 0x1}, 0x281, 0xffffffff, 0x4, 0x3, 0x401, 0xffffff47, 0x401, 0x0, 0x3, 0x0, 0x415}, 0x0, 0xffffffffffffffff, r0, 0x1) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}], 0x0, &(0x7f0000000180)) pkey_mprotect(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x0, 0xffffffffffffffff) pkey_mprotect(&(0x7f0000ff4000/0x4000)=nil, 0x4000, 0x0, 0xffffffffffffffff) socket$inet_udp(0x2, 0x2, 0x0) getsockopt$inet_int(0xffffffffffffffff, 0x0, 0xe, 0x0, &(0x7f0000000280)) ioctl$sock_SIOCADDDLCI(0xffffffffffffffff, 0x8980, 0x0) ioctl$RTC_ALM_SET(r1, 0x40247007, 0x0) mmap$IORING_OFF_SQES(&(0x7f0000ff3000/0x2000)=nil, 0x2000, 0x2000002, 0x10, r1, 0x10000000) getsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, 0x0, 0x0) [ 2360.341996] EXT4-fs (loop7): unsupported inode size: 0 [ 2360.343421] EXT4-fs (loop7): blocksize: 2048 12:41:53 executing program 7: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b00000000", 0x59, 0x400}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000180)) [ 2360.451296] EXT4-fs (loop2): corrupt root inode, run e2fsck [ 2360.455278] EXT4-fs (loop2): mount failed 12:41:53 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f0000000000000400", 0x1c, 0x2100}], 0x0, &(0x7f0000000180)) [ 2360.541244] EXT4-fs (loop5): VFS: Can't find ext4 filesystem [ 2360.567089] EXT4-fs (loop1): VFS: Can't find ext4 filesystem [ 2360.571520] EXT4-fs error (device loop6): ext4_fill_super:4959: inode #2: comm syz-executor.6: iget: root inode unallocated [ 2360.580429] EXT4-fs (loop6): get root inode failed [ 2360.581636] EXT4-fs (loop6): mount failed 12:41:53 executing program 3: ioctl$RTC_UIE_ON(0xffffffffffffffff, 0x7003) r0 = perf_event_open(&(0x7f00000001c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x2}, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0xfffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = dup2(0xffffffffffffffff, r0) r2 = syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000180)) pkey_mprotect(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x0, 0xffffffffffffffff) pkey_mprotect(&(0x7f0000ff4000/0x4000)=nil, 0x4000, 0x0, 0xffffffffffffffff) symlinkat(&(0x7f00000000c0)='./file0\x00', r2, &(0x7f0000000140)='./file0\x00') socket$inet_udp(0x2, 0x2, 0x0) getsockopt$inet_int(0xffffffffffffffff, 0x0, 0xe, 0x0, &(0x7f0000000280)) ioctl$RTC_ALM_SET(r1, 0x40247007, 0x0) getsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, 0x0, 0x0) 12:41:53 executing program 0: r0 = creat(&(0x7f0000000040)='./file0\x00', 0x0) r1 = creat(&(0x7f0000000040)='./file0\x00', 0x0) fallocate(r1, 0x0, 0x0, 0x8800000) fallocate(r1, 0x3, 0x0, 0x8000) fallocate(r0, 0x0, 0x0, 0x20000) [ 2360.684709] EXT4-fs error (device loop4): ext4_fill_super:4959: inode #2: comm syz-executor.4: iget: root inode unallocated [ 2360.717795] EXT4-fs (loop4): get root inode failed [ 2360.722508] EXT4-fs (loop4): mount failed [ 2360.742054] EXT4-fs (loop7): unsupported inode size: 0 [ 2360.743230] EXT4-fs (loop7): blocksize: 2048 [ 2360.805783] EXT4-fs (loop2): corrupt root inode, run e2fsck [ 2360.808569] EXT4-fs (loop2): mount failed 12:42:12 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000180)) 12:42:12 executing program 6: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f", 0x44, 0x400}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000180)) 12:42:12 executing program 0: r0 = creat(&(0x7f0000000040)='./file0\x00', 0x0) r1 = creat(&(0x7f0000000040)='./file0\x00', 0x0) fallocate(r1, 0x0, 0x0, 0x8800000) fallocate(r1, 0x3, 0x0, 0x8000) fallocate(r0, 0x0, 0x0, 0x40000) 12:42:12 executing program 3: ioctl$RTC_UIE_ON(0xffffffffffffffff, 0x7003) r0 = perf_event_open(&(0x7f00000001c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x2}, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0xfffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = dup2(0xffffffffffffffff, r0) r2 = syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000180)) pkey_mprotect(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x0, 0xffffffffffffffff) pkey_mprotect(&(0x7f0000ff4000/0x4000)=nil, 0x4000, 0x0, 0xffffffffffffffff) symlinkat(&(0x7f00000000c0)='./file0\x00', r2, &(0x7f0000000140)='./file0\x00') socket$inet_udp(0x2, 0x2, 0x0) getsockopt$inet_int(0xffffffffffffffff, 0x0, 0xe, 0x0, &(0x7f0000000280)) ioctl$RTC_ALM_SET(r1, 0x40247007, 0x0) getsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, 0x0, 0x0) 12:42:12 executing program 7: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b00000000", 0x59, 0x400}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000180)) 12:42:12 executing program 4: ioctl$RTC_UIE_ON(0xffffffffffffffff, 0x7003) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x2}, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0xfffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = dup2(0xffffffffffffffff, r0) perf_event_open(&(0x7f00000001c0)={0x2, 0x80, 0x8, 0x9, 0x4, 0x1, 0x0, 0x3b3d, 0x200a0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x2, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0xffff, 0x1, @perf_config_ext={0x7, 0x1}, 0x281, 0xffffffff, 0x4, 0x3, 0x401, 0xffffff47, 0x401, 0x0, 0x3, 0x0, 0x415}, 0x0, 0xffffffffffffffff, r0, 0x1) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {0x0, 0x0, 0x2100}], 0x0, &(0x7f0000000180)) pkey_mprotect(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x0, 0xffffffffffffffff) pkey_mprotect(&(0x7f0000ff4000/0x4000)=nil, 0x4000, 0x0, 0xffffffffffffffff) socket$inet_udp(0x2, 0x2, 0x0) getsockopt$inet_int(0xffffffffffffffff, 0x0, 0xe, 0x0, &(0x7f0000000280)) ioctl$sock_SIOCADDDLCI(0xffffffffffffffff, 0x8980, 0x0) ioctl$RTC_ALM_SET(r1, 0x40247007, 0x0) mmap$IORING_OFF_SQES(&(0x7f0000ff3000/0x2000)=nil, 0x2000, 0x2000002, 0x10, r1, 0x10000000) getsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, 0x0, 0x0) 12:42:12 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f0000000000000400", 0x1c, 0x2100}], 0x0, &(0x7f0000000180)) 12:42:12 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000440)=[{&(0x7f0000000040), 0x0, 0x400}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000180)) [ 2379.741589] EXT4-fs (loop5): VFS: Can't find ext4 filesystem [ 2379.771407] EXT4-fs error (device loop6): ext4_fill_super:4959: inode #2: comm syz-executor.6: iget: root inode unallocated [ 2379.771581] EXT4-fs (loop7): unsupported inode size: 0 [ 2379.774967] EXT4-fs (loop7): blocksize: 2048 [ 2379.775246] EXT4-fs (loop1): VFS: Can't find ext4 filesystem [ 2379.779122] EXT4-fs (loop6): get root inode failed [ 2379.780254] EXT4-fs (loop6): mount failed [ 2379.818808] EXT4-fs error (device loop4): ext4_fill_super:4959: inode #2: comm syz-executor.4: iget: root inode unallocated 12:42:12 executing program 3: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_init_net_socket$802154_raw(0x24, 0x3, 0x0) sendmmsg$inet6(r0, &(0x7f0000004d00)=[{{0x0, 0x0, &(0x7f00000004c0)}}], 0x1, 0x0) (fail_nth: 1) [ 2379.835906] EXT4-fs (loop2): corrupt root inode, run e2fsck [ 2379.837255] EXT4-fs (loop2): mount failed [ 2379.850284] EXT4-fs (loop4): get root inode failed [ 2379.851690] EXT4-fs (loop4): mount failed 12:42:12 executing program 7: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000180)) 12:42:12 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000440)=[{&(0x7f0000000040), 0x0, 0x400}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000180)) [ 2379.932529] FAULT_INJECTION: forcing a failure. [ 2379.932529] name fail_usercopy, interval 1, probability 0, space 0, times 0 12:42:12 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000180)) [ 2379.935020] CPU: 1 PID: 12420 Comm: syz-executor.3 Not tainted 5.10.163 #1 [ 2379.936478] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2379.938209] Call Trace: [ 2379.938759] dump_stack+0x107/0x167 [ 2379.939518] should_fail.cold+0x5/0xa [ 2379.940309] _copy_from_user+0x2e/0x1b0 [ 2379.941124] __copy_msghdr_from_user+0x91/0x4b0 [ 2379.942064] ? __ia32_sys_shutdown+0x80/0x80 [ 2379.942961] ? __lock_acquire+0xbb1/0x5b00 [ 2379.943854] sendmsg_copy_msghdr+0xa1/0x160 [ 2379.944724] ? do_recvmmsg+0x6d0/0x6d0 [ 2379.945512] ? perf_trace_lock+0xac/0x490 [ 2379.946358] ? __lockdep_reset_lock+0x180/0x180 [ 2379.947306] ? perf_trace_lock+0xac/0x490 [ 2379.948165] ? __lock_acquire+0x1657/0x5b00 [ 2379.949054] ___sys_sendmsg+0xc6/0x170 [ 2379.949854] ? sendmsg_copy_msghdr+0x160/0x160 [ 2379.950792] ? __fget_files+0x26d/0x480 [ 2379.951594] ? lock_downgrade+0x6d0/0x6d0 [ 2379.952448] ? lock_downgrade+0x6d0/0x6d0 12:42:12 executing program 0: r0 = creat(&(0x7f0000000040)='./file0\x00', 0x0) r1 = creat(&(0x7f0000000040)='./file0\x00', 0x0) fallocate(r1, 0x0, 0x0, 0x8800000) fallocate(r1, 0x3, 0x0, 0x8000) fallocate(r0, 0x0, 0x0, 0x80000) 12:42:12 executing program 6: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f0000000000000000010000", 0x4f, 0x400}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000180)) [ 2379.953298] ? __fget_files+0x296/0x480 [ 2379.954253] ? __fget_light+0xea/0x290 [ 2379.955051] __sys_sendmmsg+0x195/0x470 [ 2379.955885] ? __ia32_sys_sendmsg+0xb0/0xb0 [ 2379.956762] ? lock_downgrade+0x6d0/0x6d0 [ 2379.957614] ? ksys_write+0x12d/0x260 [ 2379.958394] ? __mutex_unlock_slowpath+0xe1/0x600 [ 2379.959373] ? wait_for_completion_io+0x270/0x270 [ 2379.960357] ? rcu_read_lock_any_held+0x75/0xa0 [ 2379.961295] ? vfs_write+0x354/0xa30 [ 2379.962057] ? fput_many+0x2f/0x1a0 [ 2379.962794] ? ksys_write+0x1a9/0x260 [ 2379.963580] __x64_sys_sendmmsg+0x99/0x100 [ 2379.964448] ? syscall_enter_from_user_mode+0x1d/0x50 [ 2379.965491] do_syscall_64+0x33/0x40 [ 2379.966248] entry_SYSCALL_64_after_hwframe+0x61/0xc6 [ 2379.967284] RIP: 0033:0x7ff509121b19 [ 2379.968065] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2379.971818] RSP: 002b:00007ff506697188 EFLAGS: 00000246 ORIG_RAX: 0000000000000133 [ 2379.973373] RAX: ffffffffffffffda RBX: 00007ff509234f60 RCX: 00007ff509121b19 [ 2379.974813] RDX: 0000000000000001 RSI: 0000000020004d00 RDI: 0000000000000005 [ 2379.976266] RBP: 00007ff5066971d0 R08: 0000000000000000 R09: 0000000000000000 [ 2379.977705] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 2379.979146] R13: 00007ffde412486f R14: 00007ff506697300 R15: 0000000000022000 12:42:12 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d}], 0x0, &(0x7f0000000180)) 12:42:12 executing program 4: ioctl$RTC_UIE_ON(0xffffffffffffffff, 0x7003) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x2}, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0xfffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = dup2(0xffffffffffffffff, r0) perf_event_open(&(0x7f00000001c0)={0x2, 0x80, 0x8, 0x9, 0x4, 0x1, 0x0, 0x3b3d, 0x200a0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x2, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0xffff, 0x1, @perf_config_ext={0x7, 0x1}, 0x281, 0xffffffff, 0x4, 0x3, 0x401, 0xffffff47, 0x401, 0x0, 0x3, 0x0, 0x415}, 0x0, 0xffffffffffffffff, r0, 0x1) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {0x0, 0x0, 0x2100}], 0x0, &(0x7f0000000180)) pkey_mprotect(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x0, 0xffffffffffffffff) pkey_mprotect(&(0x7f0000ff4000/0x4000)=nil, 0x4000, 0x0, 0xffffffffffffffff) socket$inet_udp(0x2, 0x2, 0x0) getsockopt$inet_int(0xffffffffffffffff, 0x0, 0xe, 0x0, &(0x7f0000000280)) ioctl$sock_SIOCADDDLCI(0xffffffffffffffff, 0x8980, 0x0) ioctl$RTC_ALM_SET(r1, 0x40247007, 0x0) mmap$IORING_OFF_SQES(&(0x7f0000ff3000/0x2000)=nil, 0x2000, 0x2000002, 0x10, r1, 0x10000000) getsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, 0x0, 0x0) 12:42:12 executing program 3: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_init_net_socket$802154_raw(0x24, 0x3, 0x0) sendmmsg$inet6(r0, &(0x7f0000004d00)=[{{0x0, 0x0, &(0x7f00000004c0)}}], 0x1, 0x0) (fail_nth: 2) [ 2380.109352] EXT4-fs (loop7): VFS: Can't find ext4 filesystem [ 2380.169709] EXT4-fs (loop1): VFS: Can't find ext4 filesystem [ 2380.171194] EXT4-fs (loop5): VFS: Can't find ext4 filesystem [ 2380.193359] EXT4-fs error (device loop2): ext4_fill_super:4959: inode #2: comm syz-executor.2: iget: root inode unallocated [ 2380.209445] EXT4-fs (loop2): get root inode failed [ 2380.210529] EXT4-fs (loop2): mount failed [ 2380.212689] EXT4-fs (loop6): invalid first ino: 0 [ 2380.250165] FAULT_INJECTION: forcing a failure. [ 2380.250165] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 2380.252872] CPU: 1 PID: 12443 Comm: syz-executor.3 Not tainted 5.10.163 #1 [ 2380.254263] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2380.255958] Call Trace: [ 2380.256495] dump_stack+0x107/0x167 [ 2380.257249] should_fail.cold+0x5/0xa [ 2380.258025] _copy_to_user+0x2e/0x180 [ 2380.258810] simple_read_from_buffer+0xcc/0x160 [ 2380.259749] proc_fail_nth_read+0x198/0x230 [ 2380.260644] ? proc_sessionid_read+0x230/0x230 [ 2380.261566] ? security_file_permission+0x24e/0x570 [ 2380.262584] ? perf_trace_initcall_start+0x101/0x380 [ 2380.263617] ? proc_sessionid_read+0x230/0x230 [ 2380.264553] vfs_read+0x228/0x580 [ 2380.265263] ksys_read+0x12d/0x260 [ 2380.266052] ? vfs_write+0xa30/0xa30 [ 2380.266820] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 2380.267890] ? syscall_enter_from_user_mode+0x1d/0x50 [ 2380.268938] do_syscall_64+0x33/0x40 [ 2380.269699] entry_SYSCALL_64_after_hwframe+0x61/0xc6 [ 2380.270750] RIP: 0033:0x7ff5090d469c [ 2380.271510] Code: ec 28 48 89 54 24 18 48 89 74 24 10 89 7c 24 08 e8 f9 fc ff ff 48 8b 54 24 18 48 8b 74 24 10 41 89 c0 8b 7c 24 08 31 c0 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 48 89 44 24 08 e8 2f fd ff ff 48 [ 2380.275242] RSP: 002b:00007ff506697170 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 2380.276831] RAX: ffffffffffffffda RBX: 0000000000000001 RCX: 00007ff5090d469c [ 2380.278282] RDX: 000000000000000f RSI: 00007ff5066971e0 RDI: 0000000000000004 [ 2380.279728] RBP: 00007ff5066971d0 R08: 0000000000000000 R09: 0000000000000000 [ 2380.281188] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 2380.282698] R13: 00007ffde412486f R14: 00007ff506697300 R15: 0000000000022000 [ 2380.373770] EXT4-fs error (device loop4): ext4_fill_super:4959: inode #2: comm syz-executor.4: iget: root inode unallocated [ 2380.384601] EXT4-fs (loop4): get root inode failed [ 2380.386187] EXT4-fs (loop4): mount failed 12:42:30 executing program 7: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000180)) 12:42:30 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, 0x0) 12:42:30 executing program 3: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_init_net_socket$802154_raw(0x24, 0x3, 0x0) sendmmsg$inet6(r0, &(0x7f0000004d00)=[{{0x0, 0x0, &(0x7f00000004c0)}}], 0x1, 0x0) 12:42:30 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d}], 0x0, &(0x7f0000000180)) 12:42:30 executing program 6: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f0000000000000000010000", 0x4f, 0x400}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000180)) 12:42:30 executing program 0: r0 = creat(&(0x7f0000000040)='./file0\x00', 0x0) r1 = creat(&(0x7f0000000040)='./file0\x00', 0x0) fallocate(r1, 0x0, 0x0, 0x8800000) fallocate(r1, 0x3, 0x0, 0x8000) fallocate(r0, 0x0, 0x0, 0x100000) 12:42:30 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000440)=[{&(0x7f0000000040), 0x0, 0x400}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000180)) 12:42:30 executing program 4: ioctl$RTC_UIE_ON(0xffffffffffffffff, 0x7003) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x2}, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0xfffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = dup2(0xffffffffffffffff, r0) perf_event_open(&(0x7f00000001c0)={0x2, 0x80, 0x8, 0x9, 0x4, 0x1, 0x0, 0x3b3d, 0x200a0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x2, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0xffff, 0x1, @perf_config_ext={0x7, 0x1}, 0x281, 0xffffffff, 0x4, 0x3, 0x401, 0xffffff47, 0x401, 0x0, 0x3, 0x0, 0x415}, 0x0, 0xffffffffffffffff, r0, 0x1) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {0x0, 0x0, 0x2100}], 0x0, &(0x7f0000000180)) pkey_mprotect(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x0, 0xffffffffffffffff) pkey_mprotect(&(0x7f0000ff4000/0x4000)=nil, 0x4000, 0x0, 0xffffffffffffffff) socket$inet_udp(0x2, 0x2, 0x0) getsockopt$inet_int(0xffffffffffffffff, 0x0, 0xe, 0x0, &(0x7f0000000280)) ioctl$sock_SIOCADDDLCI(0xffffffffffffffff, 0x8980, 0x0) ioctl$RTC_ALM_SET(r1, 0x40247007, 0x0) mmap$IORING_OFF_SQES(&(0x7f0000ff3000/0x2000)=nil, 0x2000, 0x2000002, 0x10, r1, 0x10000000) getsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, 0x0, 0x0) [ 2398.192776] EXT4-fs (loop7): VFS: Can't find ext4 filesystem [ 2398.243647] EXT4-fs (loop1): VFS: Can't find ext4 filesystem [ 2398.247171] EXT4-fs (loop6): invalid first ino: 0 12:42:31 executing program 7: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000180)) [ 2398.282529] EXT4-fs error (device loop2): ext4_fill_super:4959: inode #2: comm syz-executor.2: iget: root inode unallocated [ 2398.286700] EXT4-fs (loop2): get root inode failed [ 2398.287760] EXT4-fs (loop2): mount failed 12:42:31 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, 0x0) 12:42:31 executing program 3: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_init_net_socket$802154_raw(0x24, 0x3, 0x0) sendmmsg$inet6(r0, &(0x7f0000004d00)=[{{0x0, 0x0, &(0x7f00000004c0)}}], 0x1, 0x0) 12:42:31 executing program 0: r0 = creat(&(0x7f0000000040)='./file0\x00', 0x0) r1 = creat(&(0x7f0000000040)='./file0\x00', 0x0) fallocate(r1, 0x0, 0x0, 0x8800000) fallocate(r1, 0x3, 0x0, 0x8000) fallocate(r0, 0x0, 0x0, 0x400000) 12:42:31 executing program 6: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f0000000000000000010000", 0x4f, 0x400}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000180)) 12:42:31 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0", 0x2d, 0x400}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000180)) [ 2398.422670] EXT4-fs error (device loop4): ext4_fill_super:4959: inode #2: comm syz-executor.4: iget: root inode unallocated 12:42:31 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d}], 0x0, &(0x7f0000000180)) [ 2398.451391] EXT4-fs (loop4): get root inode failed [ 2398.452744] EXT4-fs (loop4): mount failed [ 2398.572376] EXT4-fs (loop7): VFS: Can't find ext4 filesystem 12:42:31 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, 0x0) [ 2398.624348] EXT4-fs (loop1): VFS: Can't find ext4 filesystem [ 2398.663069] EXT4-fs (loop6): invalid first ino: 0 [ 2398.740199] EXT4-fs error (device loop2): ext4_fill_super:4959: inode #2: comm syz-executor.2: iget: root inode unallocated [ 2398.743014] EXT4-fs (loop2): get root inode failed [ 2398.744152] EXT4-fs (loop2): mount failed 12:42:31 executing program 4: ioctl$RTC_UIE_ON(0xffffffffffffffff, 0x7003) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x2}, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0xfffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = dup2(0xffffffffffffffff, r0) perf_event_open(&(0x7f00000001c0)={0x2, 0x80, 0x8, 0x9, 0x4, 0x1, 0x0, 0x3b3d, 0x200a0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x2, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0xffff, 0x1, @perf_config_ext={0x7, 0x1}, 0x281, 0xffffffff, 0x4, 0x3, 0x401, 0xffffff47, 0x401, 0x0, 0x3, 0x0, 0x415}, 0x0, 0xffffffffffffffff, r0, 0x1) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600), 0x0, 0x2100}], 0x0, &(0x7f0000000180)) pkey_mprotect(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x0, 0xffffffffffffffff) pkey_mprotect(&(0x7f0000ff4000/0x4000)=nil, 0x4000, 0x0, 0xffffffffffffffff) socket$inet_udp(0x2, 0x2, 0x0) getsockopt$inet_int(0xffffffffffffffff, 0x0, 0xe, 0x0, &(0x7f0000000280)) ioctl$sock_SIOCADDDLCI(0xffffffffffffffff, 0x8980, 0x0) ioctl$RTC_ALM_SET(r1, 0x40247007, 0x0) mmap$IORING_OFF_SQES(&(0x7f0000ff3000/0x2000)=nil, 0x2000, 0x2000002, 0x10, r1, 0x10000000) getsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, 0x0, 0x0) [ 2398.939238] EXT4-fs error (device loop4): ext4_fill_super:4959: inode #2: comm syz-executor.4: iget: root inode unallocated [ 2398.944191] EXT4-fs (loop4): get root inode failed [ 2398.946217] EXT4-fs (loop4): mount failed 12:42:47 executing program 7: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, 0x0) 12:42:47 executing program 4: ioctl$RTC_UIE_ON(0xffffffffffffffff, 0x7003) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x2}, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0xfffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = dup2(0xffffffffffffffff, r0) perf_event_open(&(0x7f00000001c0)={0x2, 0x80, 0x8, 0x9, 0x4, 0x1, 0x0, 0x3b3d, 0x200a0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x2, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0xffff, 0x1, @perf_config_ext={0x7, 0x1}, 0x281, 0xffffffff, 0x4, 0x3, 0x401, 0xffffff47, 0x401, 0x0, 0x3, 0x0, 0x415}, 0x0, 0xffffffffffffffff, r0, 0x1) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600), 0x0, 0x2100}], 0x0, &(0x7f0000000180)) pkey_mprotect(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x0, 0xffffffffffffffff) pkey_mprotect(&(0x7f0000ff4000/0x4000)=nil, 0x4000, 0x0, 0xffffffffffffffff) socket$inet_udp(0x2, 0x2, 0x0) getsockopt$inet_int(0xffffffffffffffff, 0x0, 0xe, 0x0, &(0x7f0000000280)) ioctl$sock_SIOCADDDLCI(0xffffffffffffffff, 0x8980, 0x0) ioctl$RTC_ALM_SET(r1, 0x40247007, 0x0) mmap$IORING_OFF_SQES(&(0x7f0000ff3000/0x2000)=nil, 0x2000, 0x2000002, 0x10, r1, 0x10000000) getsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, 0x0, 0x0) 12:42:47 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000180)) (fail_nth: 1) 12:42:47 executing program 6: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b", 0x55, 0x400}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000180)) 12:42:47 executing program 3: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_init_net_socket$802154_raw(0x24, 0x3, 0x0) sendmmsg$inet6(r0, &(0x7f0000004d00)=[{{0x0, 0x4, &(0x7f00000004c0)}}], 0x1, 0x0) 12:42:47 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0", 0x2d, 0x400}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000180)) 12:42:47 executing program 0: r0 = creat(&(0x7f0000000040)='./file0\x00', 0x0) r1 = creat(&(0x7f0000000040)='./file0\x00', 0x0) fallocate(r1, 0x0, 0x0, 0x8800000) fallocate(r1, 0x3, 0x0, 0x8000) fallocate(r0, 0x0, 0x0, 0x800000) 12:42:47 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000180)) [ 2414.756146] FAULT_INJECTION: forcing a failure. [ 2414.756146] name failslab, interval 1, probability 0, space 0, times 0 [ 2414.758609] CPU: 1 PID: 12537 Comm: syz-executor.5 Not tainted 5.10.163 #1 [ 2414.760002] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2414.761710] Call Trace: [ 2414.762248] dump_stack+0x107/0x167 [ 2414.762997] should_fail.cold+0x5/0xa [ 2414.763781] ? __do_sys_memfd_create+0xfb/0x450 [ 2414.764735] should_failslab+0x5/0x20 [ 2414.765506] __kmalloc+0x72/0x3f0 [ 2414.766214] __do_sys_memfd_create+0xfb/0x450 [ 2414.767378] ? memfd_file_seals_ptr+0x170/0x170 [ 2414.768512] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 2414.769766] ? syscall_enter_from_user_mode+0x1d/0x50 [ 2414.770997] do_syscall_64+0x33/0x40 [ 2414.771884] entry_SYSCALL_64_after_hwframe+0x61/0xc6 [ 2414.773109] RIP: 0033:0x7f8cf1820b19 [ 2414.773992] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2414.778187] RSP: 002b:00007f8ceed95f48 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 2414.779718] RAX: ffffffffffffffda RBX: 0000000020000440 RCX: 00007f8cf1820b19 [ 2414.781156] RDX: 0000000000004200 RSI: 0000000000000000 RDI: 00007f8cf187a0fb [ 2414.782659] RBP: 0000000000000004 R08: 0000000000002100 R09: ffffffffffffffff [ 2414.784094] R10: 0000000000000004 R11: 0000000000000246 R12: 0000000008100000 [ 2414.785551] R13: 0000000020000100 R14: 0000000000fffff0 R15: 0000000020000180 [ 2414.833960] EXT4-fs (loop2): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 2414.835957] EXT4-fs (loop2): group descriptors corrupted! 12:42:47 executing program 7: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, 0x0) [ 2414.870175] EXT4-fs (loop1): VFS: Can't find ext4 filesystem [ 2414.872861] EXT4-fs error (device loop4): ext4_fill_super:4959: inode #2: comm syz-executor.4: iget: root inode unallocated [ 2414.878112] EXT4-fs (loop4): get root inode failed [ 2414.879403] EXT4-fs (loop4): mount failed [ 2414.888440] EXT4-fs (loop6): unsupported inode size: 0 [ 2414.891535] EXT4-fs (loop6): blocksize: 2048 12:43:05 executing program 7: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, 0x0) 12:43:05 executing program 4: ioctl$RTC_UIE_ON(0xffffffffffffffff, 0x7003) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x2}, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0xfffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = dup2(0xffffffffffffffff, r0) perf_event_open(&(0x7f00000001c0)={0x2, 0x80, 0x8, 0x9, 0x4, 0x1, 0x0, 0x3b3d, 0x200a0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x2, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0xffff, 0x1, @perf_config_ext={0x7, 0x1}, 0x281, 0xffffffff, 0x4, 0x3, 0x401, 0xffffff47, 0x401, 0x0, 0x3, 0x0, 0x415}, 0x0, 0xffffffffffffffff, r0, 0x1) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600), 0x0, 0x2100}], 0x0, &(0x7f0000000180)) pkey_mprotect(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x0, 0xffffffffffffffff) pkey_mprotect(&(0x7f0000ff4000/0x4000)=nil, 0x4000, 0x0, 0xffffffffffffffff) socket$inet_udp(0x2, 0x2, 0x0) getsockopt$inet_int(0xffffffffffffffff, 0x0, 0xe, 0x0, &(0x7f0000000280)) ioctl$sock_SIOCADDDLCI(0xffffffffffffffff, 0x8980, 0x0) ioctl$RTC_ALM_SET(r1, 0x40247007, 0x0) mmap$IORING_OFF_SQES(&(0x7f0000ff3000/0x2000)=nil, 0x2000, 0x2000002, 0x10, r1, 0x10000000) getsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, 0x0, 0x0) 12:43:05 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0", 0x2d, 0x400}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000180)) 12:43:05 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000180)) (fail_nth: 2) 12:43:05 executing program 3: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_init_net_socket$802154_raw(0x24, 0x3, 0x0) sendmmsg$inet6(r0, &(0x7f0000004d00)=[{{0x0, 0x7f00, &(0x7f00000004c0)}}], 0x1, 0x0) 12:43:05 executing program 6: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b", 0x55, 0x400}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000180)) 12:43:05 executing program 0: r0 = creat(&(0x7f0000000040)='./file0\x00', 0x0) r1 = creat(&(0x7f0000000040)='./file0\x00', 0x0) fallocate(r1, 0x0, 0x0, 0x8800000) fallocate(r1, 0x3, 0x0, 0x8000) fallocate(r0, 0x0, 0x0, 0x8800002) 12:43:05 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000180)) [ 2433.162875] FAULT_INJECTION: forcing a failure. [ 2433.162875] name failslab, interval 1, probability 0, space 0, times 0 [ 2433.165625] CPU: 0 PID: 12574 Comm: syz-executor.5 Not tainted 5.10.163 #1 [ 2433.167312] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2433.169316] Call Trace: [ 2433.169956] dump_stack+0x107/0x167 [ 2433.170832] should_fail.cold+0x5/0xa [ 2433.171750] ? create_object.isra.0+0x3a/0xa20 [ 2433.172881] should_failslab+0x5/0x20 [ 2433.173805] kmem_cache_alloc+0x5b/0x360 [ 2433.174810] create_object.isra.0+0x3a/0xa20 [ 2433.175863] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 2433.177113] __kmalloc+0x16e/0x3f0 [ 2433.177993] __do_sys_memfd_create+0xfb/0x450 [ 2433.179077] ? ksys_write+0x1a9/0x260 [ 2433.180017] ? memfd_file_seals_ptr+0x170/0x170 [ 2433.181164] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 2433.182463] ? syscall_enter_from_user_mode+0x1d/0x50 [ 2433.183719] do_syscall_64+0x33/0x40 [ 2433.184628] entry_SYSCALL_64_after_hwframe+0x61/0xc6 [ 2433.185899] RIP: 0033:0x7f8cf1820b19 [ 2433.186802] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2433.191354] RSP: 002b:00007f8ceed95f48 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 2433.193246] RAX: ffffffffffffffda RBX: 0000000020000440 RCX: 00007f8cf1820b19 [ 2433.194997] RDX: 0000000000004200 RSI: 0000000000000000 RDI: 00007f8cf187a0fb [ 2433.196764] RBP: 0000000000000004 R08: 0000000000002100 R09: ffffffffffffffff [ 2433.198503] R10: 0000000000000004 R11: 0000000000000246 R12: 0000000008100000 [ 2433.200193] R13: 0000000020000100 R14: 0000000000fffff0 R15: 0000000020000180 [ 2433.201823] hpet: Lost 1 RTC interrupts [ 2433.295647] EXT4-fs (loop1): VFS: Can't find ext4 filesystem [ 2433.299440] EXT4-fs (loop6): unsupported inode size: 0 [ 2433.300742] EXT4-fs (loop6): blocksize: 2048 [ 2433.334514] EXT4-fs (loop2): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 2433.336952] EXT4-fs (loop2): group descriptors corrupted! [ 2433.347115] EXT4-fs error (device loop4): ext4_fill_super:4959: inode #2: comm syz-executor.4: iget: root inode unallocated [ 2433.356801] EXT4-fs (loop5): mounted filesystem without journal. Opts: ,errors=continue 12:43:06 executing program 6: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b", 0x55, 0x400}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000180)) 12:43:06 executing program 3: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_init_net_socket$802154_raw(0x24, 0x3, 0x0) sendmmsg$inet6(r0, &(0x7f0000004d00)=[{{0x0, 0x40000, &(0x7f00000004c0)}}], 0x1, 0x0) [ 2433.374443] EXT4-fs (loop4): get root inode failed [ 2433.376426] EXT4-fs (loop4): mount failed 12:43:06 executing program 0: r0 = creat(&(0x7f0000000040)='./file0\x00', 0x0) r1 = creat(&(0x7f0000000040)='./file0\x00', 0x0) fallocate(r1, 0x0, 0x0, 0x8800000) fallocate(r1, 0x3, 0x0, 0x8000) fallocate(r0, 0x0, 0x0, 0x8800003) 12:43:06 executing program 7: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000180)) (fail_nth: 1) 12:43:06 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000180)) 12:43:06 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000180)) (fail_nth: 3) 12:43:06 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f", 0x44, 0x400}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000180)) 12:43:06 executing program 4: ioctl$RTC_UIE_ON(0xffffffffffffffff, 0x7003) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x2}, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0xfffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = dup2(0xffffffffffffffff, r0) perf_event_open(&(0x7f00000001c0)={0x2, 0x80, 0x8, 0x9, 0x4, 0x1, 0x0, 0x3b3d, 0x200a0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x2, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0xffff, 0x1, @perf_config_ext={0x7, 0x1}, 0x281, 0xffffffff, 0x4, 0x3, 0x401, 0xffffff47, 0x401, 0x0, 0x3, 0x0, 0x415}, 0x0, 0xffffffffffffffff, r0, 0x1) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f465", 0xf, 0x2100}], 0x0, &(0x7f0000000180)) pkey_mprotect(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x0, 0xffffffffffffffff) pkey_mprotect(&(0x7f0000ff4000/0x4000)=nil, 0x4000, 0x0, 0xffffffffffffffff) socket$inet_udp(0x2, 0x2, 0x0) getsockopt$inet_int(0xffffffffffffffff, 0x0, 0xe, 0x0, &(0x7f0000000280)) ioctl$sock_SIOCADDDLCI(0xffffffffffffffff, 0x8980, 0x0) ioctl$RTC_ALM_SET(r1, 0x40247007, 0x0) mmap$IORING_OFF_SQES(&(0x7f0000ff3000/0x2000)=nil, 0x2000, 0x2000002, 0x10, r1, 0x10000000) getsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, 0x0, 0x0) [ 2433.575694] FAULT_INJECTION: forcing a failure. [ 2433.575694] name failslab, interval 1, probability 0, space 0, times 0 [ 2433.577761] CPU: 1 PID: 12602 Comm: syz-executor.7 Not tainted 5.10.163 #1 [ 2433.578112] EXT4-fs (loop6): unsupported inode size: 0 [ 2433.579019] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2433.579025] Call Trace: [ 2433.579048] dump_stack+0x107/0x167 [ 2433.579067] should_fail.cold+0x5/0xa [ 2433.579085] ? __do_sys_memfd_create+0xfb/0x450 [ 2433.579103] should_failslab+0x5/0x20 [ 2433.579117] __kmalloc+0x72/0x3f0 [ 2433.579136] __do_sys_memfd_create+0xfb/0x450 [ 2433.579150] ? ksys_write+0x1a9/0x260 [ 2433.579164] ? memfd_file_seals_ptr+0x170/0x170 [ 2433.579185] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 2433.579203] ? syscall_enter_from_user_mode+0x1d/0x50 [ 2433.579221] do_syscall_64+0x33/0x40 [ 2433.579238] entry_SYSCALL_64_after_hwframe+0x61/0xc6 [ 2433.579248] RIP: 0033:0x7fca42405b19 [ 2433.579263] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 12:43:06 executing program 7: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000180)) (fail_nth: 2) [ 2433.579280] RSP: 002b:00007fca3f97af48 EFLAGS: 00000246 [ 2433.580510] EXT4-fs (loop6): blocksize: 2048 [ 2433.581882] ORIG_RAX: 000000000000013f [ 2433.581892] RAX: ffffffffffffffda RBX: 0000000020000440 RCX: 00007fca42405b19 [ 2433.581905] RDX: 0000000000004200 RSI: 0000000000000000 RDI: 00007fca4245f0fb [ 2433.581914] RBP: 0000000000000004 R08: 0000000000002100 R09: ffffffffffffffff [ 2433.581922] R10: 0000000000000004 R11: 0000000000000246 R12: 0000000008100000 [ 2433.581931] R13: 0000000020000100 R14: 0000000000fffff0 R15: 0000000020000180 12:43:06 executing program 6: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b000000", 0x58, 0x400}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000180)) 12:43:06 executing program 3: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_init_net_socket$802154_raw(0x24, 0x3, 0x0) sendmmsg$inet6(r0, &(0x7f0000004d00)=[{{0x0, 0x7f000000, &(0x7f00000004c0)}}], 0x1, 0x0) [ 2433.702498] EXT4-fs (loop2): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 2433.705309] EXT4-fs (loop2): group descriptors corrupted! 12:43:06 executing program 0: r0 = creat(&(0x7f0000000040)='./file0\x00', 0x0) r1 = creat(&(0x7f0000000040)='./file0\x00', 0x0) fallocate(r1, 0x0, 0x0, 0x8800000) fallocate(r1, 0x3, 0x0, 0x8000) fallocate(r0, 0x0, 0x0, 0x8800004) [ 2433.737505] FAULT_INJECTION: forcing a failure. [ 2433.737505] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 2433.740492] CPU: 0 PID: 12609 Comm: syz-executor.5 Not tainted 5.10.163 #1 [ 2433.742097] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2433.743971] Call Trace: [ 2433.744580] dump_stack+0x107/0x167 [ 2433.745399] should_fail.cold+0x5/0xa [ 2433.746259] _copy_from_user+0x2e/0x1b0 [ 2433.747166] __do_sys_memfd_create+0x16d/0x450 [ 2433.748180] ? memfd_file_seals_ptr+0x170/0x170 [ 2433.749250] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 2433.750440] ? syscall_enter_from_user_mode+0x1d/0x50 [ 2433.751621] do_syscall_64+0x33/0x40 [ 2433.752452] entry_SYSCALL_64_after_hwframe+0x61/0xc6 [ 2433.753638] RIP: 0033:0x7f8cf1820b19 [ 2433.754476] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2433.758577] RSP: 002b:00007f8ceed95f48 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 2433.760274] RAX: ffffffffffffffda RBX: 0000000020000440 RCX: 00007f8cf1820b19 [ 2433.761885] RDX: 0000000000004200 RSI: 0000000000000000 RDI: 00007f8cf187a0fb [ 2433.763467] RBP: 0000000000000004 R08: 0000000000002100 R09: ffffffffffffffff [ 2433.765088] R10: 0000000000000004 R11: 0000000000000246 R12: 0000000008100000 [ 2433.766873] R13: 0000000020000100 R14: 0000000000fffff0 R15: 0000000020000180 [ 2433.768864] hpet: Lost 1 RTC interrupts [ 2433.801045] FAULT_INJECTION: forcing a failure. [ 2433.801045] name failslab, interval 1, probability 0, space 0, times 0 [ 2433.803981] CPU: 0 PID: 12615 Comm: syz-executor.7 Not tainted 5.10.163 #1 [ 2433.805712] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2433.807703] Call Trace: [ 2433.808351] dump_stack+0x107/0x167 [ 2433.809284] should_fail.cold+0x5/0xa [ 2433.810246] ? create_object.isra.0+0x3a/0xa20 [ 2433.811397] should_failslab+0x5/0x20 [ 2433.812332] kmem_cache_alloc+0x5b/0x360 [ 2433.813329] create_object.isra.0+0x3a/0xa20 [ 2433.814419] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 12:43:06 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000180)) (fail_nth: 4) [ 2433.815694] __kmalloc+0x16e/0x3f0 [ 2433.816653] __do_sys_memfd_create+0xfb/0x450 [ 2433.817789] ? ksys_write+0x1a9/0x260 [ 2433.818720] ? memfd_file_seals_ptr+0x170/0x170 [ 2433.819843] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 2433.821113] ? syscall_enter_from_user_mode+0x1d/0x50 [ 2433.822369] do_syscall_64+0x33/0x40 [ 2433.823311] entry_SYSCALL_64_after_hwframe+0x61/0xc6 [ 2433.824583] RIP: 0033:0x7fca42405b19 [ 2433.825502] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2433.829908] RSP: 002b:00007fca3f97af48 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 2433.831757] RAX: ffffffffffffffda RBX: 0000000020000440 RCX: 00007fca42405b19 [ 2433.833503] RDX: 0000000000004200 RSI: 0000000000000000 RDI: 00007fca4245f0fb [ 2433.835270] RBP: 0000000000000004 R08: 0000000000002100 R09: ffffffffffffffff [ 2433.837034] R10: 0000000000000004 R11: 0000000000000246 R12: 0000000008100000 [ 2433.838782] R13: 0000000020000100 R14: 0000000000fffff0 R15: 0000000020000180 [ 2433.840814] hpet: Lost 1 RTC interrupts 12:43:06 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0xffffffffdffffff8}, {0x0, 0x0, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000180)) [ 2433.855212] EXT4-fs error (device loop1): ext4_fill_super:4959: inode #2: comm syz-executor.1: iget: root inode unallocated [ 2433.858259] EXT4-fs (loop1): get root inode failed [ 2433.859086] EXT4-fs (loop1): mount failed [ 2433.898876] EXT4-fs error (device loop4): ext4_fill_super:4959: inode #2: comm syz-executor.4: iget: root inode unallocated [ 2433.906116] EXT4-fs (loop4): get root inode failed [ 2433.907757] EXT4-fs (loop4): mount failed [ 2433.910250] EXT4-fs (loop7): mounted filesystem without journal. Opts: ,errors=continue [ 2433.968747] EXT4-fs (loop6): unsupported inode size: 0 [ 2433.970246] EXT4-fs (loop6): blocksize: 2048 [ 2434.016245] FAULT_INJECTION: forcing a failure. [ 2434.016245] name failslab, interval 1, probability 0, space 0, times 0 [ 2434.019280] CPU: 0 PID: 12635 Comm: syz-executor.5 Not tainted 5.10.163 #1 [ 2434.021017] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2434.023079] Call Trace: [ 2434.023749] dump_stack+0x107/0x167 [ 2434.024673] should_fail.cold+0x5/0xa [ 2434.025630] ? shmem_alloc_inode+0x18/0x40 [ 2434.026687] should_failslab+0x5/0x20 [ 2434.027715] kmem_cache_alloc+0x5b/0x360 [ 2434.028752] ? shmem_destroy_inode+0x70/0x70 [ 2434.029856] shmem_alloc_inode+0x18/0x40 [ 2434.030863] ? shmem_destroy_inode+0x70/0x70 [ 2434.031932] alloc_inode+0x63/0x240 [ 2434.032862] new_inode+0x23/0x250 [ 2434.033725] shmem_get_inode+0x15e/0xbc0 [ 2434.034728] __shmem_file_setup+0xb8/0x320 [ 2434.035771] ? _copy_from_user+0xfb/0x1b0 [ 2434.036805] __do_sys_memfd_create+0x275/0x450 [ 2434.037926] ? memfd_file_seals_ptr+0x170/0x170 [ 2434.039079] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 2434.040371] ? syscall_enter_from_user_mode+0x1d/0x50 [ 2434.041670] do_syscall_64+0x33/0x40 [ 2434.042592] entry_SYSCALL_64_after_hwframe+0x61/0xc6 [ 2434.043843] RIP: 0033:0x7f8cf1820b19 [ 2434.044778] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2434.049257] RSP: 002b:00007f8ceed95f48 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 2434.051111] RAX: ffffffffffffffda RBX: 0000000020000440 RCX: 00007f8cf1820b19 [ 2434.052890] RDX: 0000000000004200 RSI: 0000000000000000 RDI: 00007f8cf187a0fb [ 2434.054631] RBP: 0000000000000004 R08: 0000000000002100 R09: ffffffffffffffff [ 2434.056367] R10: 0000000000000004 R11: 0000000000000246 R12: 0000000008100000 [ 2434.058123] R13: 0000000020000100 R14: 0000000000fffff0 R15: 0000000020000180 [ 2434.060026] hpet: Lost 1 RTC interrupts [ 2434.106771] EXT4-fs (loop2): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 2434.109063] EXT4-fs (loop2): group descriptors corrupted! 12:43:21 executing program 4: ioctl$RTC_UIE_ON(0xffffffffffffffff, 0x7003) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x2}, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0xfffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = dup2(0xffffffffffffffff, r0) perf_event_open(&(0x7f00000001c0)={0x2, 0x80, 0x8, 0x9, 0x4, 0x1, 0x0, 0x3b3d, 0x200a0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x2, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0xffff, 0x1, @perf_config_ext={0x7, 0x1}, 0x281, 0xffffffff, 0x4, 0x3, 0x401, 0xffffff47, 0x401, 0x0, 0x3, 0x0, 0x415}, 0x0, 0xffffffffffffffff, r0, 0x1) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f465", 0xf, 0x2100}], 0x0, &(0x7f0000000180)) pkey_mprotect(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x0, 0xffffffffffffffff) pkey_mprotect(&(0x7f0000ff4000/0x4000)=nil, 0x4000, 0x0, 0xffffffffffffffff) socket$inet_udp(0x2, 0x2, 0x0) getsockopt$inet_int(0xffffffffffffffff, 0x0, 0xe, 0x0, &(0x7f0000000280)) ioctl$sock_SIOCADDDLCI(0xffffffffffffffff, 0x8980, 0x0) ioctl$RTC_ALM_SET(r1, 0x40247007, 0x0) mmap$IORING_OFF_SQES(&(0x7f0000ff3000/0x2000)=nil, 0x2000, 0x2000002, 0x10, r1, 0x10000000) getsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, 0x0, 0x0) 12:43:21 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0xffffffffdffffff8}, {0x0, 0x0, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000180)) 12:43:21 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000180)) (fail_nth: 5) 12:43:21 executing program 0: r0 = creat(&(0x7f0000000040)='./file0\x00', 0x0) r1 = creat(&(0x7f0000000040)='./file0\x00', 0x0) fallocate(r1, 0x0, 0x0, 0x8800000) fallocate(r1, 0x3, 0x0, 0x8000) fallocate(r0, 0x0, 0x0, 0x8800005) 12:43:21 executing program 3: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_init_net_socket$802154_raw(0x24, 0x3, 0x0) sendmmsg$inet6(r0, &(0x7f0000004d00)=[{{0x0, 0xeffdffff, &(0x7f00000004c0)}}], 0x1, 0x0) 12:43:21 executing program 6: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b000000", 0x58, 0x400}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000180)) 12:43:21 executing program 7: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000180)) (fail_nth: 3) 12:43:21 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f", 0x44, 0x400}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000180)) [ 2449.217759] EXT4-fs (loop6): unsupported inode size: 0 [ 2449.219059] EXT4-fs (loop6): blocksize: 2048 [ 2449.234748] FAULT_INJECTION: forcing a failure. [ 2449.234748] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 2449.237497] CPU: 1 PID: 12658 Comm: syz-executor.7 Not tainted 5.10.163 #1 [ 2449.239139] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2449.240972] Call Trace: [ 2449.241559] dump_stack+0x107/0x167 [ 2449.242372] should_fail.cold+0x5/0xa [ 2449.243226] _copy_from_user+0x2e/0x1b0 [ 2449.244103] __do_sys_memfd_create+0x16d/0x450 [ 2449.245100] ? memfd_file_seals_ptr+0x170/0x170 [ 2449.246113] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 2449.247250] ? syscall_enter_from_user_mode+0x1d/0x50 [ 2449.248370] do_syscall_64+0x33/0x40 [ 2449.249200] entry_SYSCALL_64_after_hwframe+0x61/0xc6 [ 2449.250309] RIP: 0033:0x7fca42405b19 [ 2449.251114] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2449.255273] RSP: 002b:00007fca3f97af48 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 2449.256964] RAX: ffffffffffffffda RBX: 0000000020000440 RCX: 00007fca42405b19 [ 2449.258539] RDX: 0000000000004200 RSI: 0000000000000000 RDI: 00007fca4245f0fb [ 2449.260119] RBP: 0000000000000004 R08: 0000000000002100 R09: ffffffffffffffff [ 2449.261690] R10: 0000000000000004 R11: 0000000000000246 R12: 0000000008100000 [ 2449.263256] R13: 0000000020000100 R14: 0000000000fffff0 R15: 0000000020000180 [ 2449.265945] FAULT_INJECTION: forcing a failure. [ 2449.265945] name failslab, interval 1, probability 0, space 0, times 0 [ 2449.268694] CPU: 1 PID: 12659 Comm: syz-executor.5 Not tainted 5.10.163 #1 [ 2449.270222] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2449.272048] Call Trace: [ 2449.272627] dump_stack+0x107/0x167 [ 2449.273444] should_fail.cold+0x5/0xa [ 2449.274280] ? create_object.isra.0+0x3a/0xa20 [ 2449.275296] should_failslab+0x5/0x20 [ 2449.276147] kmem_cache_alloc+0x5b/0x360 [ 2449.277073] create_object.isra.0+0x3a/0xa20 [ 2449.278037] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 2449.279159] kmem_cache_alloc+0x159/0x360 [ 2449.280077] ? shmem_destroy_inode+0x70/0x70 [ 2449.281051] shmem_alloc_inode+0x18/0x40 [ 2449.281940] ? shmem_destroy_inode+0x70/0x70 [ 2449.282955] alloc_inode+0x63/0x240 [ 2449.283752] new_inode+0x23/0x250 [ 2449.284521] shmem_get_inode+0x15e/0xbc0 [ 2449.285451] __shmem_file_setup+0xb8/0x320 [ 2449.286379] ? _copy_from_user+0xfb/0x1b0 [ 2449.287292] __do_sys_memfd_create+0x275/0x450 [ 2449.288292] ? memfd_file_seals_ptr+0x170/0x170 [ 2449.289332] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 2449.290485] ? syscall_enter_from_user_mode+0x1d/0x50 [ 2449.291621] do_syscall_64+0x33/0x40 [ 2449.292440] entry_SYSCALL_64_after_hwframe+0x61/0xc6 [ 2449.293571] RIP: 0033:0x7f8cf1820b19 [ 2449.294391] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2449.298454] RSP: 002b:00007f8ceed95f48 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 2449.300122] RAX: ffffffffffffffda RBX: 0000000020000440 RCX: 00007f8cf1820b19 [ 2449.301686] RDX: 0000000000004200 RSI: 0000000000000000 RDI: 00007f8cf187a0fb [ 2449.303248] RBP: 0000000000000004 R08: 0000000000002100 R09: ffffffffffffffff [ 2449.304820] R10: 0000000000000004 R11: 0000000000000246 R12: 0000000008100000 [ 2449.306381] R13: 0000000020000100 R14: 0000000000fffff0 R15: 0000000020000180 [ 2449.351162] EXT4-fs (loop2): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 2449.353309] EXT4-fs (loop2): group descriptors corrupted! [ 2449.372162] EXT4-fs error (device loop1): ext4_fill_super:4959: inode #2: comm syz-executor.1: iget: root inode unallocated [ 2449.374853] EXT4-fs error (device loop4): ext4_fill_super:4959: inode #2: comm syz-executor.4: iget: root inode unallocated [ 2449.381597] EXT4-fs (loop4): get root inode failed [ 2449.383166] EXT4-fs (loop4): mount failed [ 2449.388888] EXT4-fs (loop1): get root inode failed [ 2449.390037] EXT4-fs (loop1): mount failed 12:43:22 executing program 6: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b000000", 0x58, 0x400}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000180)) 12:43:22 executing program 3: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_init_net_socket$802154_raw(0x24, 0x3, 0x0) sendmmsg$inet6(r0, &(0x7f0000004d00)=[{{0x0, 0xfffffdef, &(0x7f00000004c0)}}], 0x1, 0x0) 12:43:22 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0xffffffffdffffff8}, {0x0, 0x0, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000180)) 12:43:22 executing program 4: ioctl$RTC_UIE_ON(0xffffffffffffffff, 0x7003) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x2}, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0xfffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = dup2(0xffffffffffffffff, r0) perf_event_open(&(0x7f00000001c0)={0x2, 0x80, 0x8, 0x9, 0x4, 0x1, 0x0, 0x3b3d, 0x200a0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x2, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0xffff, 0x1, @perf_config_ext={0x7, 0x1}, 0x281, 0xffffffff, 0x4, 0x3, 0x401, 0xffffff47, 0x401, 0x0, 0x3, 0x0, 0x415}, 0x0, 0xffffffffffffffff, r0, 0x1) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f465", 0xf, 0x2100}], 0x0, &(0x7f0000000180)) pkey_mprotect(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x0, 0xffffffffffffffff) pkey_mprotect(&(0x7f0000ff4000/0x4000)=nil, 0x4000, 0x0, 0xffffffffffffffff) socket$inet_udp(0x2, 0x2, 0x0) getsockopt$inet_int(0xffffffffffffffff, 0x0, 0xe, 0x0, &(0x7f0000000280)) ioctl$sock_SIOCADDDLCI(0xffffffffffffffff, 0x8980, 0x0) ioctl$RTC_ALM_SET(r1, 0x40247007, 0x0) mmap$IORING_OFF_SQES(&(0x7f0000ff3000/0x2000)=nil, 0x2000, 0x2000002, 0x10, r1, 0x10000000) getsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, 0x0, 0x0) 12:43:22 executing program 7: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000180)) (fail_nth: 4) 12:43:22 executing program 0: r0 = creat(&(0x7f0000000040)='./file0\x00', 0x0) r1 = creat(&(0x7f0000000040)='./file0\x00', 0x0) fallocate(r1, 0x0, 0x0, 0x8800000) fallocate(r1, 0x3, 0x0, 0x8000) fallocate(r0, 0x0, 0x0, 0x8800007) 12:43:22 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f", 0x44, 0x400}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000180)) [ 2449.562152] EXT4-fs (loop6): unsupported inode size: 0 [ 2449.563721] EXT4-fs (loop6): blocksize: 2048 [ 2449.626499] EXT4-fs (loop5): mounted filesystem without journal. Opts: ,errors=continue [ 2449.698705] FAULT_INJECTION: forcing a failure. [ 2449.698705] name failslab, interval 1, probability 0, space 0, times 0 [ 2449.701310] CPU: 1 PID: 12684 Comm: syz-executor.7 Not tainted 5.10.163 #1 [ 2449.702801] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2449.704672] Call Trace: [ 2449.705263] dump_stack+0x107/0x167 [ 2449.706063] should_fail.cold+0x5/0xa [ 2449.706889] ? shmem_alloc_inode+0x18/0x40 [ 2449.707802] should_failslab+0x5/0x20 [ 2449.708623] kmem_cache_alloc+0x5b/0x360 [ 2449.709529] ? shmem_destroy_inode+0x70/0x70 [ 2449.710481] shmem_alloc_inode+0x18/0x40 [ 2449.711358] ? shmem_destroy_inode+0x70/0x70 [ 2449.712306] alloc_inode+0x63/0x240 [ 2449.713101] new_inode+0x23/0x250 [ 2449.713854] shmem_get_inode+0x15e/0xbc0 [ 2449.714738] __shmem_file_setup+0xb8/0x320 [ 2449.715666] ? _copy_from_user+0xfb/0x1b0 [ 2449.716574] __do_sys_memfd_create+0x275/0x450 [ 2449.717589] ? memfd_file_seals_ptr+0x170/0x170 [ 2449.718617] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 2449.719770] ? syscall_enter_from_user_mode+0x1d/0x50 [ 2449.721012] do_syscall_64+0x33/0x40 [ 2449.721837] entry_SYSCALL_64_after_hwframe+0x61/0xc6 [ 2449.722960] RIP: 0033:0x7fca42405b19 [ 2449.723778] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2449.727834] RSP: 002b:00007fca3f97af48 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 2449.729525] RAX: ffffffffffffffda RBX: 0000000020000440 RCX: 00007fca42405b19 [ 2449.731090] RDX: 0000000000004200 RSI: 0000000000000000 RDI: 00007fca4245f0fb [ 2449.732632] RBP: 0000000000000004 R08: 0000000000002100 R09: ffffffffffffffff [ 2449.734177] R10: 0000000000000004 R11: 0000000000000246 R12: 0000000008100000 [ 2449.735791] R13: 0000000020000100 R14: 0000000000fffff0 R15: 0000000020000180 [ 2449.798826] EXT4-fs error (device loop1): ext4_fill_super:4959: inode #2: comm syz-executor.1: iget: root inode unallocated [ 2449.805164] EXT4-fs (loop1): get root inode failed [ 2449.806392] EXT4-fs (loop1): mount failed [ 2449.809154] EXT4-fs (loop2): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 2449.809170] EXT4-fs (loop2): group descriptors corrupted! 12:43:40 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f0000000000000000010000", 0x4f, 0x400}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000180)) 12:43:40 executing program 6: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b00000000", 0x59, 0x400}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000180)) 12:43:40 executing program 7: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000180)) (fail_nth: 5) 12:43:40 executing program 4: ioctl$RTC_UIE_ON(0xffffffffffffffff, 0x7003) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x2}, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0xfffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = dup2(0xffffffffffffffff, r0) perf_event_open(&(0x7f00000001c0)={0x2, 0x80, 0x8, 0x9, 0x4, 0x1, 0x0, 0x3b3d, 0x200a0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x2, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0xffff, 0x1, @perf_config_ext={0x7, 0x1}, 0x281, 0xffffffff, 0x4, 0x3, 0x401, 0xffffff47, 0x401, 0x0, 0x3, 0x0, 0x415}, 0x0, 0xffffffffffffffff, r0, 0x1) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f0000", 0x16, 0x2100}], 0x0, &(0x7f0000000180)) pkey_mprotect(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x0, 0xffffffffffffffff) pkey_mprotect(&(0x7f0000ff4000/0x4000)=nil, 0x4000, 0x0, 0xffffffffffffffff) socket$inet_udp(0x2, 0x2, 0x0) getsockopt$inet_int(0xffffffffffffffff, 0x0, 0xe, 0x0, &(0x7f0000000280)) ioctl$sock_SIOCADDDLCI(0xffffffffffffffff, 0x8980, 0x0) ioctl$RTC_ALM_SET(r1, 0x40247007, 0x0) mmap$IORING_OFF_SQES(&(0x7f0000ff3000/0x2000)=nil, 0x2000, 0x2000002, 0x10, r1, 0x10000000) getsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, 0x0, 0x0) 12:43:40 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000180)) (fail_nth: 6) 12:43:40 executing program 3: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_init_net_socket$802154_raw(0x24, 0x3, 0x0) sendmmsg$inet6(r0, &(0x7f0000004d00)=[{{0x0, 0xffffff7f, &(0x7f00000004c0)}}], 0x1, 0x0) 12:43:40 executing program 0: r0 = creat(&(0x7f0000000040)='./file0\x00', 0x0) r1 = creat(&(0x7f0000000040)='./file0\x00', 0x0) fallocate(r1, 0x0, 0x0, 0x8800000) fallocate(r1, 0x3, 0x0, 0x8000) fallocate(r0, 0x0, 0x0, 0x8800008) 12:43:40 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400), 0x0, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000180)) [ 2467.827784] FAULT_INJECTION: forcing a failure. [ 2467.827784] name failslab, interval 1, probability 0, space 0, times 0 [ 2467.832107] CPU: 0 PID: 12706 Comm: syz-executor.5 Not tainted 5.10.163 #1 [ 2467.833566] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2467.835280] Call Trace: [ 2467.835836] dump_stack+0x107/0x167 [ 2467.836589] should_fail.cold+0x5/0xa [ 2467.837385] ? security_inode_alloc+0x34/0x160 [ 2467.838340] should_failslab+0x5/0x20 [ 2467.839130] kmem_cache_alloc+0x5b/0x360 [ 2467.839970] security_inode_alloc+0x34/0x160 [ 2467.840875] inode_init_always+0xa4e/0xd10 [ 2467.841753] ? shmem_destroy_inode+0x70/0x70 [ 2467.842655] alloc_inode+0x84/0x240 [ 2467.843404] new_inode+0x23/0x250 [ 2467.844120] shmem_get_inode+0x15e/0xbc0 [ 2467.844965] __shmem_file_setup+0xb8/0x320 [ 2467.845912] ? _copy_from_user+0xfb/0x1b0 [ 2467.846772] __do_sys_memfd_create+0x275/0x450 [ 2467.847715] ? memfd_file_seals_ptr+0x170/0x170 [ 2467.848675] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 2467.849768] ? syscall_enter_from_user_mode+0x1d/0x50 [ 2467.850828] do_syscall_64+0x33/0x40 [ 2467.851596] entry_SYSCALL_64_after_hwframe+0x61/0xc6 [ 2467.852645] RIP: 0033:0x7f8cf1820b19 [ 2467.853431] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2467.857175] RSP: 002b:00007f8ceed95f48 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 2467.858738] RAX: ffffffffffffffda RBX: 0000000020000440 RCX: 00007f8cf1820b19 [ 2467.860202] RDX: 0000000000004200 RSI: 0000000000000000 RDI: 00007f8cf187a0fb [ 2467.861670] RBP: 0000000000000004 R08: 0000000000002100 R09: ffffffffffffffff [ 2467.863130] R10: 0000000000000004 R11: 0000000000000246 R12: 0000000008100000 [ 2467.864588] R13: 0000000020000100 R14: 0000000000fffff0 R15: 0000000020000180 [ 2467.866221] hpet: Lost 1 RTC interrupts [ 2467.874800] FAULT_INJECTION: forcing a failure. [ 2467.874800] name failslab, interval 1, probability 0, space 0, times 0 [ 2467.877721] CPU: 0 PID: 12710 Comm: syz-executor.7 Not tainted 5.10.163 #1 [ 2467.879146] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2467.880846] Call Trace: [ 2467.881412] dump_stack+0x107/0x167 [ 2467.882167] should_fail.cold+0x5/0xa [ 2467.882958] ? create_object.isra.0+0x3a/0xa20 [ 2467.883915] should_failslab+0x5/0x20 [ 2467.884712] kmem_cache_alloc+0x5b/0x360 [ 2467.885568] create_object.isra.0+0x3a/0xa20 [ 2467.886483] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 2467.887547] kmem_cache_alloc+0x159/0x360 [ 2467.888417] ? shmem_destroy_inode+0x70/0x70 [ 2467.889342] shmem_alloc_inode+0x18/0x40 [ 2467.890183] ? shmem_destroy_inode+0x70/0x70 [ 2467.891095] alloc_inode+0x63/0x240 [ 2467.891856] new_inode+0x23/0x250 [ 2467.892607] shmem_get_inode+0x15e/0xbc0 [ 2467.893498] __shmem_file_setup+0xb8/0x320 [ 2467.894373] ? _copy_from_user+0xfb/0x1b0 [ 2467.895260] __do_sys_memfd_create+0x275/0x450 [ 2467.896207] ? memfd_file_seals_ptr+0x170/0x170 [ 2467.897210] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 2467.898295] ? syscall_enter_from_user_mode+0x1d/0x50 [ 2467.899374] do_syscall_64+0x33/0x40 [ 2467.900141] entry_SYSCALL_64_after_hwframe+0x61/0xc6 [ 2467.901238] RIP: 0033:0x7fca42405b19 [ 2467.902003] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2467.905941] RSP: 002b:00007fca3f97af48 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 2467.907510] RAX: ffffffffffffffda RBX: 0000000020000440 RCX: 00007fca42405b19 [ 2467.909032] RDX: 0000000000004200 RSI: 0000000000000000 RDI: 00007fca4245f0fb [ 2467.910504] RBP: 0000000000000004 R08: 0000000000002100 R09: ffffffffffffffff [ 2467.911968] R10: 0000000000000004 R11: 0000000000000246 R12: 0000000008100000 [ 2467.913456] R13: 0000000020000100 R14: 0000000000fffff0 R15: 0000000020000180 [ 2467.915066] hpet: Lost 1 RTC interrupts [ 2467.954940] EXT4-fs (loop6): unsupported inode size: 0 [ 2467.956289] EXT4-fs (loop6): blocksize: 2048 [ 2467.966512] EXT4-fs (loop1): invalid first ino: 0 [ 2467.979173] EXT4-fs (loop2): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 2467.981319] EXT4-fs (loop2): group descriptors corrupted! 12:43:40 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000180)) (fail_nth: 7) 12:43:40 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f0000000000000000010000", 0x4f, 0x400}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000180)) 12:43:40 executing program 3: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_init_net_socket$802154_raw(0x24, 0x3, 0x0) sendmmsg$inet6(r0, &(0x7f0000004d00)=[{{0x0, 0x0, &(0x7f00000004c0), 0x4}}], 0x1, 0x0) [ 2468.080952] EXT4-fs (loop7): mounted filesystem without journal. Opts: ,errors=continue [ 2468.089167] EXT4-fs error (device loop4): ext4_fill_super:4959: inode #2: comm syz-executor.4: iget: root inode unallocated 12:43:40 executing program 0: r0 = creat(&(0x7f0000000040)='./file0\x00', 0x0) r1 = creat(&(0x7f0000000040)='./file0\x00', 0x0) fallocate(r1, 0x0, 0x0, 0x8800000) fallocate(r1, 0x3, 0x0, 0x8000) fallocate(r0, 0x0, 0x0, 0x880000d) [ 2468.109208] EXT4-fs (loop4): get root inode failed [ 2468.110708] EXT4-fs (loop4): mount failed 12:43:40 executing program 6: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b00000000", 0x59, 0x400}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000180)) 12:43:40 executing program 7: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000180)) (fail_nth: 6) 12:43:40 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400), 0x0, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000180)) 12:43:41 executing program 4: ioctl$RTC_UIE_ON(0xffffffffffffffff, 0x7003) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x2}, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0xfffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = dup2(0xffffffffffffffff, r0) perf_event_open(&(0x7f00000001c0)={0x2, 0x80, 0x8, 0x9, 0x4, 0x1, 0x0, 0x3b3d, 0x200a0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x2, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0xffff, 0x1, @perf_config_ext={0x7, 0x1}, 0x281, 0xffffffff, 0x4, 0x3, 0x401, 0xffffff47, 0x401, 0x0, 0x3, 0x0, 0x415}, 0x0, 0xffffffffffffffff, r0, 0x1) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f0000", 0x16, 0x2100}], 0x0, &(0x7f0000000180)) pkey_mprotect(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x0, 0xffffffffffffffff) pkey_mprotect(&(0x7f0000ff4000/0x4000)=nil, 0x4000, 0x0, 0xffffffffffffffff) socket$inet_udp(0x2, 0x2, 0x0) getsockopt$inet_int(0xffffffffffffffff, 0x0, 0xe, 0x0, &(0x7f0000000280)) ioctl$sock_SIOCADDDLCI(0xffffffffffffffff, 0x8980, 0x0) ioctl$RTC_ALM_SET(r1, 0x40247007, 0x0) mmap$IORING_OFF_SQES(&(0x7f0000ff3000/0x2000)=nil, 0x2000, 0x2000002, 0x10, r1, 0x10000000) getsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, 0x0, 0x0) [ 2468.253413] FAULT_INJECTION: forcing a failure. [ 2468.253413] name failslab, interval 1, probability 0, space 0, times 0 [ 2468.256072] CPU: 1 PID: 12733 Comm: syz-executor.5 Not tainted 5.10.163 #1 [ 2468.257521] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2468.259254] Call Trace: [ 2468.259802] dump_stack+0x107/0x167 [ 2468.260560] should_fail.cold+0x5/0xa [ 2468.261364] ? create_object.isra.0+0x3a/0xa20 [ 2468.262308] should_failslab+0x5/0x20 [ 2468.263091] kmem_cache_alloc+0x5b/0x360 [ 2468.263959] create_object.isra.0+0x3a/0xa20 [ 2468.264878] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 2468.265960] kmem_cache_alloc+0x159/0x360 [ 2468.266826] security_inode_alloc+0x34/0x160 [ 2468.267814] inode_init_always+0xa4e/0xd10 [ 2468.268743] ? shmem_destroy_inode+0x70/0x70 [ 2468.269677] alloc_inode+0x84/0x240 [ 2468.270432] new_inode+0x23/0x250 [ 2468.271156] shmem_get_inode+0x15e/0xbc0 [ 2468.271993] __shmem_file_setup+0xb8/0x320 [ 2468.272881] ? _copy_from_user+0xfb/0x1b0 [ 2468.273752] __do_sys_memfd_create+0x275/0x450 [ 2468.274699] ? memfd_file_seals_ptr+0x170/0x170 [ 2468.275665] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 2468.276749] ? syscall_enter_from_user_mode+0x1d/0x50 [ 2468.277876] do_syscall_64+0x33/0x40 [ 2468.278653] entry_SYSCALL_64_after_hwframe+0x61/0xc6 [ 2468.279721] RIP: 0033:0x7f8cf1820b19 [ 2468.280498] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2468.284442] RSP: 002b:00007f8ceed95f48 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 2468.286034] RAX: ffffffffffffffda RBX: 0000000020000440 RCX: 00007f8cf1820b19 [ 2468.287528] RDX: 0000000000004200 RSI: 0000000000000000 RDI: 00007f8cf187a0fb [ 2468.288988] RBP: 0000000000000004 R08: 0000000000002100 R09: ffffffffffffffff [ 2468.290493] R10: 0000000000000004 R11: 0000000000000246 R12: 0000000008100000 [ 2468.291958] R13: 0000000020000100 R14: 0000000000fffff0 R15: 0000000020000180 [ 2468.319566] EXT4-fs (loop1): invalid first ino: 0 [ 2468.326424] EXT4-fs (loop5): mounted filesystem without journal. Opts: ,errors=continue [ 2468.374547] EXT4-fs (loop6): unsupported inode size: 0 [ 2468.375885] EXT4-fs (loop6): blocksize: 2048 12:43:41 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000180)) (fail_nth: 8) 12:43:41 executing program 3: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_init_net_socket$802154_raw(0x24, 0x3, 0x0) sendmmsg$inet6(r0, &(0x7f0000004d00)=[{{0x0, 0x0, &(0x7f00000004c0), 0x7f00}}], 0x1, 0x0) [ 2468.452501] FAULT_INJECTION: forcing a failure. [ 2468.452501] name failslab, interval 1, probability 0, space 0, times 0 [ 2468.454908] CPU: 1 PID: 12747 Comm: syz-executor.7 Not tainted 5.10.163 #1 [ 2468.456418] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2468.458231] Call Trace: [ 2468.458784] dump_stack+0x107/0x167 [ 2468.459545] should_fail.cold+0x5/0xa [ 2468.460359] ? security_inode_alloc+0x34/0x160 [ 2468.461315] should_failslab+0x5/0x20 [ 2468.462260] kmem_cache_alloc+0x5b/0x360 [ 2468.463186] security_inode_alloc+0x34/0x160 [ 2468.464095] inode_init_always+0xa4e/0xd10 [ 2468.464956] ? shmem_destroy_inode+0x70/0x70 [ 2468.465870] alloc_inode+0x84/0x240 [ 2468.466607] new_inode+0x23/0x250 [ 2468.467315] shmem_get_inode+0x15e/0xbc0 [ 2468.468148] __shmem_file_setup+0xb8/0x320 [ 2468.469020] ? _copy_from_user+0xfb/0x1b0 [ 2468.469964] __do_sys_memfd_create+0x275/0x450 [ 2468.471006] ? memfd_file_seals_ptr+0x170/0x170 [ 2468.472043] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 2468.473144] ? syscall_enter_from_user_mode+0x1d/0x50 [ 2468.474204] do_syscall_64+0x33/0x40 [ 2468.474973] entry_SYSCALL_64_after_hwframe+0x61/0xc6 [ 2468.476014] RIP: 0033:0x7fca42405b19 [ 2468.476771] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2468.480708] RSP: 002b:00007fca3f97af48 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 2468.482288] RAX: ffffffffffffffda RBX: 0000000020000440 RCX: 00007fca42405b19 [ 2468.483756] RDX: 0000000000004200 RSI: 0000000000000000 RDI: 00007fca4245f0fb [ 2468.485290] RBP: 0000000000000004 R08: 0000000000002100 R09: ffffffffffffffff [ 2468.486911] R10: 0000000000000004 R11: 0000000000000246 R12: 0000000008100000 [ 2468.488366] R13: 0000000020000100 R14: 0000000000fffff0 R15: 0000000020000180 [ 2468.497167] EXT4-fs (loop2): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 2468.499119] EXT4-fs (loop2): group descriptors corrupted! [ 2468.566522] EXT4-fs error (device loop4): ext4_fill_super:4959: inode #2: comm syz-executor.4: iget: root inode unallocated [ 2468.570101] EXT4-fs (loop4): get root inode failed [ 2468.571397] EXT4-fs (loop4): mount failed [ 2468.621056] FAULT_INJECTION: forcing a failure. [ 2468.621056] name failslab, interval 1, probability 0, space 0, times 0 [ 2468.623353] CPU: 1 PID: 12755 Comm: syz-executor.5 Not tainted 5.10.163 #1 [ 2468.624762] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2468.626457] Call Trace: [ 2468.627028] dump_stack+0x107/0x167 [ 2468.627762] should_fail.cold+0x5/0xa [ 2468.628540] ? __d_alloc+0x2a/0x990 [ 2468.629294] should_failslab+0x5/0x20 [ 2468.630069] kmem_cache_alloc+0x5b/0x360 [ 2468.630869] ? trace_hardirqs_on+0x5b/0x180 [ 2468.631748] __d_alloc+0x2a/0x990 [ 2468.632440] d_alloc_pseudo+0x19/0x70 [ 2468.633226] alloc_file_pseudo+0xce/0x250 [ 2468.634052] ? alloc_file+0x5a0/0x5a0 [ 2468.634836] ? shmem_get_inode+0x55c/0xbc0 [ 2468.635704] __shmem_file_setup+0x144/0x320 [ 2468.636582] ? _copy_from_user+0xfb/0x1b0 [ 2468.637435] __do_sys_memfd_create+0x275/0x450 [ 2468.638368] ? memfd_file_seals_ptr+0x170/0x170 [ 2468.639319] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 2468.640385] ? syscall_enter_from_user_mode+0x1d/0x50 [ 2468.641449] do_syscall_64+0x33/0x40 [ 2468.642251] entry_SYSCALL_64_after_hwframe+0x61/0xc6 [ 2468.643295] RIP: 0033:0x7f8cf1820b19 [ 2468.644032] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2468.647824] RSP: 002b:00007f8ceed95f48 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 2468.649388] RAX: ffffffffffffffda RBX: 0000000020000440 RCX: 00007f8cf1820b19 [ 2468.650844] RDX: 0000000000004200 RSI: 0000000000000000 RDI: 00007f8cf187a0fb [ 2468.652305] RBP: 0000000000000004 R08: 0000000000002100 R09: ffffffffffffffff [ 2468.653773] R10: 0000000000000004 R11: 0000000000000246 R12: 0000000008100000 [ 2468.655225] R13: 0000000020000100 R14: 0000000000fffff0 R15: 0000000020000180 12:44:00 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000180)) (fail_nth: 9) 12:44:00 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f0000000000000000010000", 0x4f, 0x400}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000180)) 12:44:00 executing program 3: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_init_net_socket$802154_raw(0x24, 0x3, 0x0) sendmmsg$inet6(r0, &(0x7f0000004d00)=[{{0x0, 0x0, &(0x7f00000004c0), 0x40000}}], 0x1, 0x0) 12:44:00 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400), 0x0, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000180)) 12:44:00 executing program 0: r0 = creat(&(0x7f0000000040)='./file0\x00', 0x0) r1 = creat(&(0x7f0000000040)='./file0\x00', 0x0) fallocate(r1, 0x0, 0x0, 0x8800000) fallocate(r1, 0x3, 0x0, 0x8000) fallocate(r0, 0x0, 0x0, 0x8800010) 12:44:00 executing program 6: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b00000000", 0x59, 0x400}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000180)) 12:44:00 executing program 4: ioctl$RTC_UIE_ON(0xffffffffffffffff, 0x7003) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x2}, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0xfffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = dup2(0xffffffffffffffff, r0) perf_event_open(&(0x7f00000001c0)={0x2, 0x80, 0x8, 0x9, 0x4, 0x1, 0x0, 0x3b3d, 0x200a0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x2, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0xffff, 0x1, @perf_config_ext={0x7, 0x1}, 0x281, 0xffffffff, 0x4, 0x3, 0x401, 0xffffff47, 0x401, 0x0, 0x3, 0x0, 0x415}, 0x0, 0xffffffffffffffff, r0, 0x1) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f0000", 0x16, 0x2100}], 0x0, &(0x7f0000000180)) pkey_mprotect(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x0, 0xffffffffffffffff) pkey_mprotect(&(0x7f0000ff4000/0x4000)=nil, 0x4000, 0x0, 0xffffffffffffffff) socket$inet_udp(0x2, 0x2, 0x0) getsockopt$inet_int(0xffffffffffffffff, 0x0, 0xe, 0x0, &(0x7f0000000280)) ioctl$sock_SIOCADDDLCI(0xffffffffffffffff, 0x8980, 0x0) ioctl$RTC_ALM_SET(r1, 0x40247007, 0x0) mmap$IORING_OFF_SQES(&(0x7f0000ff3000/0x2000)=nil, 0x2000, 0x2000002, 0x10, r1, 0x10000000) getsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, 0x0, 0x0) 12:44:00 executing program 7: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000180)) (fail_nth: 7) [ 2487.909976] FAULT_INJECTION: forcing a failure. [ 2487.909976] name failslab, interval 1, probability 0, space 0, times 0 [ 2487.912389] CPU: 0 PID: 12777 Comm: syz-executor.5 Not tainted 5.10.163 #1 [ 2487.913852] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2487.915571] Call Trace: [ 2487.916124] dump_stack+0x107/0x167 [ 2487.916894] should_fail.cold+0x5/0xa [ 2487.917699] ? create_object.isra.0+0x3a/0xa20 [ 2487.918651] should_failslab+0x5/0x20 [ 2487.919449] kmem_cache_alloc+0x5b/0x360 [ 2487.920296] create_object.isra.0+0x3a/0xa20 [ 2487.921211] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 2487.922299] kmem_cache_alloc+0x159/0x360 [ 2487.923166] ? trace_hardirqs_on+0x5b/0x180 [ 2487.924105] __d_alloc+0x2a/0x990 [ 2487.924831] d_alloc_pseudo+0x19/0x70 [ 2487.925641] alloc_file_pseudo+0xce/0x250 [ 2487.926504] ? alloc_file+0x5a0/0x5a0 [ 2487.927314] ? shmem_get_inode+0x55c/0xbc0 [ 2487.928222] __shmem_file_setup+0x144/0x320 [ 2487.929132] ? _copy_from_user+0xfb/0x1b0 [ 2487.930024] __do_sys_memfd_create+0x275/0x450 [ 2487.930990] ? memfd_file_seals_ptr+0x170/0x170 [ 2487.931980] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 2487.933093] ? syscall_enter_from_user_mode+0x1d/0x50 [ 2487.934193] do_syscall_64+0x33/0x40 [ 2487.934973] entry_SYSCALL_64_after_hwframe+0x61/0xc6 [ 2487.936080] RIP: 0033:0x7f8cf1820b19 [ 2487.936858] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2487.940696] RSP: 002b:00007f8ceed95f48 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 2487.942268] RAX: ffffffffffffffda RBX: 0000000020000440 RCX: 00007f8cf1820b19 [ 2487.943728] RDX: 0000000000004200 RSI: 0000000000000000 RDI: 00007f8cf187a0fb [ 2487.945186] RBP: 0000000000000004 R08: 0000000000002100 R09: ffffffffffffffff [ 2487.946660] R10: 0000000000000004 R11: 0000000000000246 R12: 0000000008100000 [ 2487.948135] R13: 0000000020000100 R14: 0000000000fffff0 R15: 0000000020000180 [ 2487.949764] hpet: Lost 1 RTC interrupts [ 2487.966295] FAULT_INJECTION: forcing a failure. [ 2487.966295] name failslab, interval 1, probability 0, space 0, times 0 [ 2487.968868] CPU: 0 PID: 12782 Comm: syz-executor.7 Not tainted 5.10.163 #1 [ 2487.970338] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2487.972044] Call Trace: [ 2487.972583] dump_stack+0x107/0x167 [ 2487.973349] should_fail.cold+0x5/0xa [ 2487.974137] ? create_object.isra.0+0x3a/0xa20 [ 2487.975080] should_failslab+0x5/0x20 [ 2487.975867] kmem_cache_alloc+0x5b/0x360 [ 2487.976705] create_object.isra.0+0x3a/0xa20 [ 2487.977608] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 2487.978648] kmem_cache_alloc+0x159/0x360 [ 2487.979501] security_inode_alloc+0x34/0x160 12:44:00 executing program 3: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_init_net_socket$802154_raw(0x24, 0x3, 0x0) sendmmsg$inet6(r0, &(0x7f0000004d00)=[{{0x0, 0x0, &(0x7f00000004c0), 0x7f000000}}], 0x1, 0x0) [ 2487.980404] inode_init_always+0xa4e/0xd10 [ 2487.981386] ? shmem_destroy_inode+0x70/0x70 [ 2487.982279] alloc_inode+0x84/0x240 [ 2487.983013] new_inode+0x23/0x250 [ 2487.983715] shmem_get_inode+0x15e/0xbc0 [ 2487.984544] __shmem_file_setup+0xb8/0x320 [ 2487.985407] ? _copy_from_user+0xfb/0x1b0 [ 2487.986247] __do_sys_memfd_create+0x275/0x450 [ 2487.987169] ? memfd_file_seals_ptr+0x170/0x170 [ 2487.988113] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 2487.989174] ? syscall_enter_from_user_mode+0x1d/0x50 [ 2487.990267] do_syscall_64+0x33/0x40 [ 2487.991024] entry_SYSCALL_64_after_hwframe+0x61/0xc6 [ 2487.992059] RIP: 0033:0x7fca42405b19 [ 2487.992822] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2487.996538] RSP: 002b:00007fca3f97af48 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 2487.998108] RAX: ffffffffffffffda RBX: 0000000020000440 RCX: 00007fca42405b19 [ 2487.999559] RDX: 0000000000004200 RSI: 0000000000000000 RDI: 00007fca4245f0fb [ 2488.001033] RBP: 0000000000000004 R08: 0000000000002100 R09: ffffffffffffffff [ 2488.002482] R10: 0000000000000004 R11: 0000000000000246 R12: 0000000008100000 [ 2488.003920] R13: 0000000020000100 R14: 0000000000fffff0 R15: 0000000020000180 [ 2488.005590] hpet: Lost 2 RTC interrupts [ 2488.027738] EXT4-fs (loop2): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 2488.029716] EXT4-fs (loop2): group descriptors corrupted! [ 2488.055057] EXT4-fs (loop6): unsupported inode size: 0 [ 2488.056181] EXT4-fs (loop6): blocksize: 2048 [ 2488.068965] EXT4-fs (loop1): invalid first ino: 0 [ 2488.107773] EXT4-fs (loop7): mounted filesystem without journal. Opts: ,errors=continue [ 2488.109620] EXT4-fs error (device loop4): ext4_fill_super:4959: inode #2: comm syz-executor.4: iget: root inode unallocated [ 2488.110322] EXT4-fs (loop5): mounted filesystem without journal. Opts: ,errors=continue [ 2488.127634] EXT4-fs (loop4): get root inode failed [ 2488.129056] EXT4-fs (loop4): mount failed 12:44:00 executing program 6: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000180)) 12:44:00 executing program 0: r0 = creat(&(0x7f0000000040)='./file0\x00', 0x0) r1 = creat(&(0x7f0000000040)='./file0\x00', 0x0) fallocate(r1, 0x0, 0x0, 0x8800000) fallocate(r1, 0x3, 0x0, 0x8000) fallocate(r0, 0x0, 0x0, 0x8800012) 12:44:00 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000180)) (fail_nth: 10) 12:44:00 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="0200000003", 0x5, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000180)) [ 2488.381127] EXT4-fs (loop6): VFS: Can't find ext4 filesystem [ 2488.404438] FAULT_INJECTION: forcing a failure. [ 2488.404438] name failslab, interval 1, probability 0, space 0, times 0 [ 2488.406835] CPU: 0 PID: 12807 Comm: syz-executor.5 Not tainted 5.10.163 #1 [ 2488.408296] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2488.410184] Call Trace: [ 2488.410738] dump_stack+0x107/0x167 [ 2488.411503] should_fail.cold+0x5/0xa [ 2488.412297] ? __alloc_file+0x21/0x320 [ 2488.413105] should_failslab+0x5/0x20 [ 2488.413918] kmem_cache_alloc+0x5b/0x360 [ 2488.414768] __alloc_file+0x21/0x320 [ 2488.415546] alloc_empty_file+0x6d/0x170 [ 2488.416391] alloc_file+0x59/0x5a0 [ 2488.417142] alloc_file_pseudo+0x16a/0x250 [ 2488.418031] ? alloc_file+0x5a0/0x5a0 [ 2488.418830] ? shmem_get_inode+0x55c/0xbc0 [ 2488.419711] __shmem_file_setup+0x144/0x320 [ 2488.420601] ? _copy_from_user+0xfb/0x1b0 [ 2488.421466] __do_sys_memfd_create+0x275/0x450 [ 2488.422416] ? memfd_file_seals_ptr+0x170/0x170 [ 2488.423392] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 2488.424479] ? syscall_enter_from_user_mode+0x1d/0x50 [ 2488.425565] do_syscall_64+0x33/0x40 [ 2488.426339] entry_SYSCALL_64_after_hwframe+0x61/0xc6 [ 2488.427400] RIP: 0033:0x7f8cf1820b19 [ 2488.428172] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2488.431978] RSP: 002b:00007f8ceed95f48 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 2488.433574] RAX: ffffffffffffffda RBX: 0000000020000440 RCX: 00007f8cf1820b19 [ 2488.435046] RDX: 0000000000004200 RSI: 0000000000000000 RDI: 00007f8cf187a0fb [ 2488.436520] RBP: 0000000000000004 R08: 0000000000002100 R09: ffffffffffffffff [ 2488.438001] R10: 0000000000000004 R11: 0000000000000246 R12: 0000000008100000 [ 2488.439476] R13: 0000000020000100 R14: 0000000000fffff0 R15: 0000000020000180 [ 2488.441126] hpet: Lost 2 RTC interrupts [ 2488.446710] EXT4-fs (loop2): ext4_check_descriptors: Inode table for group 0 overlaps superblock [ 2488.449193] EXT4-fs (loop2): group descriptors corrupted! 12:44:16 executing program 7: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000180)) (fail_nth: 8) 12:44:16 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="0200000003", 0x5, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000180)) 12:44:16 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000180)) (fail_nth: 11) 12:44:16 executing program 3: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_init_net_socket$802154_raw(0x24, 0x3, 0x0) sendmmsg$inet6(r0, &(0x7f0000004d00)=[{{0x0, 0x0, &(0x7f00000004c0), 0xeffdffff}}], 0x1, 0x0) 12:44:16 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b", 0x55, 0x400}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000180)) 12:44:16 executing program 4: ioctl$RTC_UIE_ON(0xffffffffffffffff, 0x7003) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x2}, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0xfffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = dup2(0xffffffffffffffff, r0) perf_event_open(&(0x7f00000001c0)={0x2, 0x80, 0x8, 0x9, 0x4, 0x1, 0x0, 0x3b3d, 0x200a0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x2, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0xffff, 0x1, @perf_config_ext={0x7, 0x1}, 0x281, 0xffffffff, 0x4, 0x3, 0x401, 0xffffff47, 0x401, 0x0, 0x3, 0x0, 0x415}, 0x0, 0xffffffffffffffff, r0, 0x1) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000", 0x1a, 0x2100}], 0x0, &(0x7f0000000180)) pkey_mprotect(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x0, 0xffffffffffffffff) pkey_mprotect(&(0x7f0000ff4000/0x4000)=nil, 0x4000, 0x0, 0xffffffffffffffff) socket$inet_udp(0x2, 0x2, 0x0) getsockopt$inet_int(0xffffffffffffffff, 0x0, 0xe, 0x0, &(0x7f0000000280)) ioctl$sock_SIOCADDDLCI(0xffffffffffffffff, 0x8980, 0x0) ioctl$RTC_ALM_SET(r1, 0x40247007, 0x0) mmap$IORING_OFF_SQES(&(0x7f0000ff3000/0x2000)=nil, 0x2000, 0x2000002, 0x10, r1, 0x10000000) getsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, 0x0, 0x0) 12:44:16 executing program 6: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000180)) 12:44:16 executing program 0: r0 = creat(&(0x7f0000000040)='./file0\x00', 0x0) r1 = creat(&(0x7f0000000040)='./file0\x00', 0x0) fallocate(r1, 0x0, 0x0, 0x8800000) fallocate(r1, 0x3, 0x0, 0x8000) fallocate(r0, 0x0, 0x0, 0x8800064) [ 2503.848708] FAULT_INJECTION: forcing a failure. [ 2503.848708] name failslab, interval 1, probability 0, space 0, times 0 [ 2503.851542] CPU: 0 PID: 12826 Comm: syz-executor.5 Not tainted 5.10.163 #1 [ 2503.853183] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2503.855154] Call Trace: [ 2503.855794] dump_stack+0x107/0x167 [ 2503.856672] should_fail.cold+0x5/0xa [ 2503.857608] ? create_object.isra.0+0x3a/0xa20 [ 2503.858697] should_failslab+0x5/0x20 [ 2503.859604] kmem_cache_alloc+0x5b/0x360 [ 2503.860572] create_object.isra.0+0x3a/0xa20 [ 2503.861679] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 2503.862890] kmem_cache_alloc+0x159/0x360 [ 2503.863885] __alloc_file+0x21/0x320 [ 2503.864778] alloc_empty_file+0x6d/0x170 [ 2503.865962] alloc_file+0x59/0x5a0 [ 2503.866831] alloc_file_pseudo+0x16a/0x250 [ 2503.867847] ? alloc_file+0x5a0/0x5a0 [ 2503.868765] ? shmem_get_inode+0x55c/0xbc0 [ 2503.869804] __shmem_file_setup+0x144/0x320 [ 2503.870841] ? _copy_from_user+0xfb/0x1b0 [ 2503.871747] __do_sys_memfd_create+0x275/0x450 [ 2503.872714] ? memfd_file_seals_ptr+0x170/0x170 [ 2503.873711] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 2503.874810] ? syscall_enter_from_user_mode+0x1d/0x50 [ 2503.875901] do_syscall_64+0x33/0x40 [ 2503.876681] entry_SYSCALL_64_after_hwframe+0x61/0xc6 [ 2503.877761] RIP: 0033:0x7f8cf1820b19 [ 2503.878533] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2503.883578] RSP: 002b:00007f8ceed95f48 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 2503.885378] RAX: ffffffffffffffda RBX: 0000000020000440 RCX: 00007f8cf1820b19 [ 2503.887077] RDX: 0000000000004200 RSI: 0000000000000000 RDI: 00007f8cf187a0fb [ 2503.888686] RBP: 0000000000000004 R08: 0000000000002100 R09: ffffffffffffffff [ 2503.890184] R10: 0000000000000004 R11: 0000000000000246 R12: 0000000008100000 [ 2503.891658] R13: 0000000020000100 R14: 0000000000fffff0 R15: 0000000020000180 [ 2503.893498] hpet: Lost 2 RTC interrupts [ 2503.910191] FAULT_INJECTION: forcing a failure. [ 2503.910191] name failslab, interval 1, probability 0, space 0, times 0 [ 2503.912354] CPU: 1 PID: 12831 Comm: syz-executor.7 Not tainted 5.10.163 #1 [ 2503.913778] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2503.915340] Call Trace: [ 2503.915846] dump_stack+0x107/0x167 [ 2503.916540] should_fail.cold+0x5/0xa [ 2503.917266] ? __d_alloc+0x2a/0x990 [ 2503.917967] should_failslab+0x5/0x20 [ 2503.918686] kmem_cache_alloc+0x5b/0x360 [ 2503.919456] ? trace_hardirqs_on+0x5b/0x180 [ 2503.920246] __d_alloc+0x2a/0x990 [ 2503.920805] d_alloc_pseudo+0x19/0x70 [ 2503.921415] alloc_file_pseudo+0xce/0x250 [ 2503.922103] ? alloc_file+0x5a0/0x5a0 [ 2503.922713] ? shmem_get_inode+0x55c/0xbc0 [ 2503.923383] __shmem_file_setup+0x144/0x320 [ 2503.924156] ? _copy_from_user+0xfb/0x1b0 [ 2503.924810] __do_sys_memfd_create+0x275/0x450 [ 2503.925548] ? memfd_file_seals_ptr+0x170/0x170 [ 2503.926284] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 2503.927114] ? syscall_enter_from_user_mode+0x1d/0x50 [ 2503.927927] do_syscall_64+0x33/0x40 [ 2503.928541] entry_SYSCALL_64_after_hwframe+0x61/0xc6 [ 2503.929359] RIP: 0033:0x7fca42405b19 [ 2503.929977] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2503.932892] RSP: 002b:00007fca3f97af48 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 2503.934109] RAX: ffffffffffffffda RBX: 0000000020000440 RCX: 00007fca42405b19 [ 2503.935261] RDX: 0000000000004200 RSI: 0000000000000000 RDI: 00007fca4245f0fb [ 2503.936386] RBP: 0000000000000004 R08: 0000000000002100 R09: ffffffffffffffff [ 2503.937531] R10: 0000000000000004 R11: 0000000000000246 R12: 0000000008100000 [ 2503.938677] R13: 0000000020000100 R14: 0000000000fffff0 R15: 0000000020000180 [ 2503.957395] EXT4-fs (loop2): ext4_check_descriptors: Inode table for group 0 overlaps superblock [ 2503.958771] EXT4-fs (loop2): group descriptors corrupted! [ 2504.001253] EXT4-fs (loop6): VFS: Can't find ext4 filesystem [ 2504.031921] EXT4-fs (loop1): unsupported inode size: 0 [ 2504.033917] EXT4-fs (loop1): blocksize: 2048 [ 2504.043134] EXT4-fs (loop5): mounted filesystem without journal. Opts: ,errors=continue [ 2504.045161] EXT4-fs error (device loop4): ext4_fill_super:4959: inode #2: comm syz-executor.4: iget: root inode unallocated 12:44:16 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="0200000003", 0x5, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000180)) [ 2504.066426] EXT4-fs (loop4): get root inode failed [ 2504.068167] EXT4-fs (loop4): mount failed 12:44:16 executing program 7: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000180)) (fail_nth: 9) 12:44:16 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b", 0x55, 0x400}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000180)) 12:44:16 executing program 3: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_init_net_socket$802154_raw(0x24, 0x3, 0x0) sendmmsg$inet6(r0, &(0x7f0000004d00)=[{{0x0, 0x0, &(0x7f00000004c0), 0xfffffdef}}], 0x1, 0x0) 12:44:16 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000180)) (fail_nth: 12) 12:44:17 executing program 6: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000180)) 12:44:17 executing program 0: r0 = creat(&(0x7f0000000040)='./file0\x00', 0x0) r1 = creat(&(0x7f0000000040)='./file0\x00', 0x0) fallocate(r1, 0x0, 0x0, 0x8800000) fallocate(r1, 0x3, 0x0, 0x8000) fallocate(r0, 0x0, 0x0, 0x880010c) 12:44:17 executing program 4: ioctl$RTC_UIE_ON(0xffffffffffffffff, 0x7003) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x2}, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0xfffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = dup2(0xffffffffffffffff, r0) perf_event_open(&(0x7f00000001c0)={0x2, 0x80, 0x8, 0x9, 0x4, 0x1, 0x0, 0x3b3d, 0x200a0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x2, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0xffff, 0x1, @perf_config_ext={0x7, 0x1}, 0x281, 0xffffffff, 0x4, 0x3, 0x401, 0xffffff47, 0x401, 0x0, 0x3, 0x0, 0x415}, 0x0, 0xffffffffffffffff, r0, 0x1) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000", 0x1a, 0x2100}], 0x0, &(0x7f0000000180)) pkey_mprotect(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x0, 0xffffffffffffffff) pkey_mprotect(&(0x7f0000ff4000/0x4000)=nil, 0x4000, 0x0, 0xffffffffffffffff) socket$inet_udp(0x2, 0x2, 0x0) getsockopt$inet_int(0xffffffffffffffff, 0x0, 0xe, 0x0, &(0x7f0000000280)) ioctl$sock_SIOCADDDLCI(0xffffffffffffffff, 0x8980, 0x0) ioctl$RTC_ALM_SET(r1, 0x40247007, 0x0) mmap$IORING_OFF_SQES(&(0x7f0000ff3000/0x2000)=nil, 0x2000, 0x2000002, 0x10, r1, 0x10000000) getsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, 0x0, 0x0) [ 2504.269561] FAULT_INJECTION: forcing a failure. [ 2504.269561] name failslab, interval 1, probability 0, space 0, times 0 [ 2504.271340] CPU: 1 PID: 12848 Comm: syz-executor.7 Not tainted 5.10.163 #1 [ 2504.272269] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2504.273385] Call Trace: [ 2504.273759] dump_stack+0x107/0x167 [ 2504.274247] should_fail.cold+0x5/0xa [ 2504.274758] ? create_object.isra.0+0x3a/0xa20 [ 2504.275390] should_failslab+0x5/0x20 [ 2504.275901] kmem_cache_alloc+0x5b/0x360 [ 2504.276449] create_object.isra.0+0x3a/0xa20 [ 2504.277046] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 2504.277766] kmem_cache_alloc+0x159/0x360 [ 2504.278316] ? trace_hardirqs_on+0x5b/0x180 [ 2504.278910] __d_alloc+0x2a/0x990 [ 2504.279388] d_alloc_pseudo+0x19/0x70 [ 2504.279896] alloc_file_pseudo+0xce/0x250 [ 2504.280472] ? alloc_file+0x5a0/0x5a0 [ 2504.281010] ? shmem_get_inode+0x55c/0xbc0 [ 2504.281613] __shmem_file_setup+0x144/0x320 [ 2504.282229] ? _copy_from_user+0xfb/0x1b0 [ 2504.282814] __do_sys_memfd_create+0x275/0x450 [ 2504.283508] ? memfd_file_seals_ptr+0x170/0x170 [ 2504.284154] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 2504.284893] ? syscall_enter_from_user_mode+0x1d/0x50 [ 2504.285611] do_syscall_64+0x33/0x40 [ 2504.286136] entry_SYSCALL_64_after_hwframe+0x61/0xc6 [ 2504.286871] RIP: 0033:0x7fca42405b19 [ 2504.287409] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2504.290028] RSP: 002b:00007fca3f97af48 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 2504.291120] RAX: ffffffffffffffda RBX: 0000000020000440 RCX: 00007fca42405b19 [ 2504.292145] RDX: 0000000000004200 RSI: 0000000000000000 RDI: 00007fca4245f0fb [ 2504.293150] RBP: 0000000000000004 R08: 0000000000002100 R09: ffffffffffffffff [ 2504.294162] R10: 0000000000000004 R11: 0000000000000246 R12: 0000000008100000 [ 2504.295172] R13: 0000000020000100 R14: 0000000000fffff0 R15: 0000000020000180 12:44:17 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="02000000030000", 0x7, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000180)) [ 2504.363908] EXT4-fs (loop7): mounted filesystem without journal. Opts: ,errors=continue 12:44:17 executing program 7: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000180)) (fail_nth: 10) 12:44:17 executing program 3: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_init_net_socket$802154_raw(0x24, 0x3, 0x0) sendmmsg$inet6(r0, &(0x7f0000004d00)=[{{0x0, 0x0, &(0x7f00000004c0), 0xffffff7f}}], 0x1, 0x0) [ 2504.466708] FAULT_INJECTION: forcing a failure. [ 2504.466708] name failslab, interval 1, probability 0, space 0, times 0 [ 2504.468239] CPU: 1 PID: 12862 Comm: syz-executor.5 Not tainted 5.10.163 #1 [ 2504.469067] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2504.470067] Call Trace: [ 2504.470383] dump_stack+0x107/0x167 [ 2504.470869] should_fail.cold+0x5/0xa [ 2504.471345] ? security_file_alloc+0x34/0x170 [ 2504.471851] should_failslab+0x5/0x20 [ 2504.472306] kmem_cache_alloc+0x5b/0x360 [ 2504.472780] security_file_alloc+0x34/0x170 [ 2504.473287] __alloc_file+0xb6/0x320 [ 2504.473754] alloc_empty_file+0x6d/0x170 [ 2504.474208] alloc_file+0x59/0x5a0 [ 2504.474653] alloc_file_pseudo+0x16a/0x250 [ 2504.475150] ? alloc_file+0x5a0/0x5a0 [ 2504.475615] ? shmem_get_inode+0x55c/0xbc0 [ 2504.476139] __shmem_file_setup+0x144/0x320 [ 2504.476613] ? _copy_from_user+0xfb/0x1b0 [ 2504.477126] __do_sys_memfd_create+0x275/0x450 [ 2504.477630] ? memfd_file_seals_ptr+0x170/0x170 [ 2504.478208] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 2504.478872] ? syscall_enter_from_user_mode+0x1d/0x50 [ 2504.479506] do_syscall_64+0x33/0x40 [ 2504.479969] entry_SYSCALL_64_after_hwframe+0x61/0xc6 [ 2504.480597] RIP: 0033:0x7f8cf1820b19 [ 2504.481058] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2504.483351] RSP: 002b:00007f8ceed95f48 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 2504.484278] RAX: ffffffffffffffda RBX: 0000000020000440 RCX: 00007f8cf1820b19 [ 2504.485155] RDX: 0000000000004200 RSI: 0000000000000000 RDI: 00007f8cf187a0fb [ 2504.486055] RBP: 0000000000000004 R08: 0000000000002100 R09: ffffffffffffffff [ 2504.486983] R10: 0000000000000004 R11: 0000000000000246 R12: 0000000008100000 [ 2504.487854] R13: 0000000020000100 R14: 0000000000fffff0 R15: 0000000020000180 [ 2504.558131] EXT4-fs error (device loop4): ext4_fill_super:4959: inode #2: comm syz-executor.4: iget: root inode unallocated [ 2504.560656] EXT4-fs (loop4): get root inode failed [ 2504.561495] EXT4-fs (loop4): mount failed [ 2504.571986] EXT4-fs (loop6): VFS: Can't find ext4 filesystem [ 2504.576293] EXT4-fs (loop2): ext4_check_descriptors: Inode table for group 0 overlaps superblock [ 2504.577310] EXT4-fs (loop2): group descriptors corrupted! [ 2504.601047] FAULT_INJECTION: forcing a failure. [ 2504.601047] name failslab, interval 1, probability 0, space 0, times 0 [ 2504.603873] CPU: 1 PID: 12873 Comm: syz-executor.7 Not tainted 5.10.163 #1 [ 2504.605627] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2504.607712] Call Trace: [ 2504.608384] dump_stack+0x107/0x167 [ 2504.609298] should_fail.cold+0x5/0xa [ 2504.610259] ? __alloc_file+0x21/0x320 [ 2504.611221] should_failslab+0x5/0x20 [ 2504.612264] kmem_cache_alloc+0x5b/0x360 [ 2504.613295] __alloc_file+0x21/0x320 [ 2504.614266] alloc_empty_file+0x6d/0x170 [ 2504.615186] alloc_file+0x59/0x5a0 [ 2504.615986] alloc_file_pseudo+0x16a/0x250 [ 2504.616949] ? alloc_file+0x5a0/0x5a0 [ 2504.617817] ? shmem_get_inode+0x55c/0xbc0 [ 2504.618774] __shmem_file_setup+0x144/0x320 [ 2504.619733] ? _copy_from_user+0xfb/0x1b0 [ 2504.620673] __do_sys_memfd_create+0x275/0x450 [ 2504.621710] ? memfd_file_seals_ptr+0x170/0x170 [ 2504.622746] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 2504.623906] ? syscall_enter_from_user_mode+0x1d/0x50 [ 2504.625054] do_syscall_64+0x33/0x40 [ 2504.625927] entry_SYSCALL_64_after_hwframe+0x61/0xc6 [ 2504.627119] RIP: 0033:0x7fca42405b19 [ 2504.627945] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2504.632014] RSP: 002b:00007fca3f97af48 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 2504.633785] RAX: ffffffffffffffda RBX: 0000000020000440 RCX: 00007fca42405b19 [ 2504.635430] RDX: 0000000000004200 RSI: 0000000000000000 RDI: 00007fca4245f0fb [ 2504.637045] RBP: 0000000000000004 R08: 0000000000002100 R09: ffffffffffffffff [ 2504.638688] R10: 0000000000000004 R11: 0000000000000246 R12: 0000000008100000 [ 2504.640334] R13: 0000000020000100 R14: 0000000000fffff0 R15: 0000000020000180 12:44:32 executing program 7: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000180)) (fail_nth: 11) 12:44:32 executing program 3: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_init_net_socket$802154_raw(0x24, 0x3, 0x0) sendmmsg$inet6(r0, &(0x7f0000004d00)=[{{0x0, 0x0, &(0x7f00000004c0), 0x4000000000000}}], 0x1, 0x0) 12:44:32 executing program 6: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, 0x0) 12:44:32 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000180)) (fail_nth: 13) 12:44:32 executing program 0: r0 = creat(&(0x7f0000000040)='./file0\x00', 0x0) r1 = creat(&(0x7f0000000040)='./file0\x00', 0x0) fallocate(r1, 0x0, 0x0, 0x8800000) fallocate(r1, 0x3, 0x0, 0x8000) fallocate(r0, 0x0, 0x0, 0x8800281) 12:44:32 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="02000000030000", 0x7, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000180)) 12:44:32 executing program 4: ioctl$RTC_UIE_ON(0xffffffffffffffff, 0x7003) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x2}, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0xfffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = dup2(0xffffffffffffffff, r0) perf_event_open(&(0x7f00000001c0)={0x2, 0x80, 0x8, 0x9, 0x4, 0x1, 0x0, 0x3b3d, 0x200a0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x2, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0xffff, 0x1, @perf_config_ext={0x7, 0x1}, 0x281, 0xffffffff, 0x4, 0x3, 0x401, 0xffffff47, 0x401, 0x0, 0x3, 0x0, 0x415}, 0x0, 0xffffffffffffffff, r0, 0x1) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000", 0x1a, 0x2100}], 0x0, &(0x7f0000000180)) pkey_mprotect(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x0, 0xffffffffffffffff) pkey_mprotect(&(0x7f0000ff4000/0x4000)=nil, 0x4000, 0x0, 0xffffffffffffffff) socket$inet_udp(0x2, 0x2, 0x0) getsockopt$inet_int(0xffffffffffffffff, 0x0, 0xe, 0x0, &(0x7f0000000280)) ioctl$sock_SIOCADDDLCI(0xffffffffffffffff, 0x8980, 0x0) ioctl$RTC_ALM_SET(r1, 0x40247007, 0x0) mmap$IORING_OFF_SQES(&(0x7f0000ff3000/0x2000)=nil, 0x2000, 0x2000002, 0x10, r1, 0x10000000) getsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, 0x0, 0x0) 12:44:32 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b", 0x55, 0x400}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000180)) [ 2519.655462] FAULT_INJECTION: forcing a failure. [ 2519.655462] name failslab, interval 1, probability 0, space 0, times 0 [ 2519.657891] CPU: 0 PID: 12888 Comm: syz-executor.7 Not tainted 5.10.163 #1 [ 2519.659335] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2519.661020] Call Trace: [ 2519.661567] dump_stack+0x107/0x167 [ 2519.662326] should_fail.cold+0x5/0xa [ 2519.663109] ? create_object.isra.0+0x3a/0xa20 [ 2519.664035] should_failslab+0x5/0x20 [ 2519.664819] kmem_cache_alloc+0x5b/0x360 [ 2519.665639] create_object.isra.0+0x3a/0xa20 [ 2519.666565] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 2519.667606] kmem_cache_alloc+0x159/0x360 [ 2519.668462] __alloc_file+0x21/0x320 [ 2519.669216] alloc_empty_file+0x6d/0x170 [ 2519.670065] alloc_file+0x59/0x5a0 [ 2519.670797] alloc_file_pseudo+0x16a/0x250 [ 2519.671662] ? alloc_file+0x5a0/0x5a0 [ 2519.672519] ? shmem_get_inode+0x55c/0xbc0 [ 2519.673497] __shmem_file_setup+0x144/0x320 [ 2519.674491] ? _copy_from_user+0xfb/0x1b0 [ 2519.675537] __do_sys_memfd_create+0x275/0x450 [ 2519.676593] ? memfd_file_seals_ptr+0x170/0x170 [ 2519.677698] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 2519.678916] ? syscall_enter_from_user_mode+0x1d/0x50 [ 2519.680279] do_syscall_64+0x33/0x40 [ 2519.681386] entry_SYSCALL_64_after_hwframe+0x61/0xc6 [ 2519.682808] RIP: 0033:0x7fca42405b19 [ 2519.683807] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2519.687717] RSP: 002b:00007fca3f97af48 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 2519.689316] RAX: ffffffffffffffda RBX: 0000000020000440 RCX: 00007fca42405b19 [ 2519.690939] RDX: 0000000000004200 RSI: 0000000000000000 RDI: 00007fca4245f0fb [ 2519.692593] RBP: 0000000000000004 R08: 0000000000002100 R09: ffffffffffffffff [ 2519.694285] R10: 0000000000000004 R11: 0000000000000246 R12: 0000000008100000 [ 2519.695953] R13: 0000000020000100 R14: 0000000000fffff0 R15: 0000000020000180 [ 2519.697909] hpet: Lost 2 RTC interrupts [ 2519.720249] FAULT_INJECTION: forcing a failure. [ 2519.720249] name failslab, interval 1, probability 0, space 0, times 0 [ 2519.722999] CPU: 0 PID: 12893 Comm: syz-executor.5 Not tainted 5.10.163 #1 [ 2519.724546] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2519.726307] Call Trace: [ 2519.726880] dump_stack+0x107/0x167 [ 2519.727647] should_fail.cold+0x5/0xa [ 2519.728459] ? create_object.isra.0+0x3a/0xa20 [ 2519.729498] should_failslab+0x5/0x20 [ 2519.730431] kmem_cache_alloc+0x5b/0x360 [ 2519.731392] ? percpu_ref_put_many.constprop.0+0x4e/0x100 [ 2519.732689] create_object.isra.0+0x3a/0xa20 [ 2519.733763] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 2519.734974] kmem_cache_alloc+0x159/0x360 [ 2519.735971] security_file_alloc+0x34/0x170 [ 2519.737028] __alloc_file+0xb6/0x320 [ 2519.737942] alloc_empty_file+0x6d/0x170 [ 2519.738908] alloc_file+0x59/0x5a0 [ 2519.739745] alloc_file_pseudo+0x16a/0x250 [ 2519.740745] ? alloc_file+0x5a0/0x5a0 [ 2519.741666] ? shmem_get_inode+0x55c/0xbc0 [ 2519.742696] __shmem_file_setup+0x144/0x320 [ 2519.743711] ? _copy_from_user+0xfb/0x1b0 [ 2519.744696] __do_sys_memfd_create+0x275/0x450 [ 2519.745806] ? memfd_file_seals_ptr+0x170/0x170 [ 2519.746896] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 2519.748104] ? syscall_enter_from_user_mode+0x1d/0x50 [ 2519.749297] do_syscall_64+0x33/0x40 [ 2519.750180] entry_SYSCALL_64_after_hwframe+0x61/0xc6 [ 2519.751360] RIP: 0033:0x7f8cf1820b19 [ 2519.752222] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2519.756431] RSP: 002b:00007f8ceed95f48 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 2519.758185] RAX: ffffffffffffffda RBX: 0000000020000440 RCX: 00007f8cf1820b19 [ 2519.759823] RDX: 0000000000004200 RSI: 0000000000000000 RDI: 00007f8cf187a0fb [ 2519.761457] RBP: 0000000000000004 R08: 0000000000002100 R09: ffffffffffffffff [ 2519.763113] R10: 0000000000000004 R11: 0000000000000246 R12: 0000000008100000 [ 2519.764746] R13: 0000000020000100 R14: 0000000000fffff0 R15: 0000000020000180 [ 2519.766613] hpet: Lost 1 RTC interrupts [ 2519.832806] EXT4-fs (loop1): unsupported inode size: 0 [ 2519.834017] EXT4-fs (loop1): blocksize: 2048 [ 2519.844014] EXT4-fs (loop2): ext4_check_descriptors: Inode table for group 0 overlaps superblock [ 2519.846082] EXT4-fs (loop2): group descriptors corrupted! 12:44:32 executing program 3: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_init_net_socket$802154_raw(0x24, 0x3, 0x0) sendmmsg$inet6(r0, &(0x7f0000004d00)=[{{0x0, 0x0, &(0x7f00000004c0), 0x7f00000000000000}}], 0x1, 0x0) 12:44:32 executing program 6: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, 0x0) [ 2519.857639] EXT4-fs error (device loop4): ext4_fill_super:4959: inode #2: comm syz-executor.4: iget: root inode unallocated [ 2519.861304] EXT4-fs (loop4): get root inode failed [ 2519.862760] EXT4-fs (loop4): mount failed [ 2519.879246] EXT4-fs (loop7): mounted filesystem without journal. Opts: ,errors=continue 12:44:32 executing program 0: r0 = creat(&(0x7f0000000040)='./file0\x00', 0x0) r1 = creat(&(0x7f0000000040)='./file0\x00', 0x0) fallocate(r1, 0x0, 0x0, 0x8800000) fallocate(r1, 0x3, 0x0, 0x8000) fallocate(r0, 0x0, 0x0, 0x8800300) [ 2519.913766] EXT4-fs (loop5): mounted filesystem without journal. Opts: ,errors=continue 12:44:52 executing program 7: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000180)) (fail_nth: 12) 12:44:52 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b000000", 0x58, 0x400}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000180)) 12:44:52 executing program 6: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, 0x0) 12:44:52 executing program 0: r0 = creat(&(0x7f0000000040)='./file0\x00', 0x0) r1 = creat(&(0x7f0000000040)='./file0\x00', 0x0) fallocate(r1, 0x0, 0x0, 0x8800000) fallocate(r1, 0x3, 0x0, 0x8000) fallocate(r0, 0x0, 0x0, 0x8800321) 12:44:52 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000180)) (fail_nth: 14) 12:44:52 executing program 4: ioctl$RTC_UIE_ON(0xffffffffffffffff, 0x7003) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x2}, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0xfffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = dup2(0xffffffffffffffff, r0) perf_event_open(&(0x7f00000001c0)={0x2, 0x80, 0x8, 0x9, 0x4, 0x1, 0x0, 0x3b3d, 0x200a0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x2, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0xffff, 0x1, @perf_config_ext={0x7, 0x1}, 0x281, 0xffffffff, 0x4, 0x3, 0x401, 0xffffff47, 0x401, 0x0, 0x3, 0x0, 0x415}, 0x0, 0xffffffffffffffff, r0, 0x1) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f0000000000000400", 0x1c, 0x2100}], 0x0, &(0x7f0000000180)) pkey_mprotect(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x0, 0xffffffffffffffff) pkey_mprotect(&(0x7f0000ff4000/0x4000)=nil, 0x4000, 0x0, 0xffffffffffffffff) socket$inet_udp(0x2, 0x2, 0x0) getsockopt$inet_int(0xffffffffffffffff, 0x0, 0xe, 0x0, &(0x7f0000000280)) ioctl$sock_SIOCADDDLCI(0xffffffffffffffff, 0x8980, 0x0) ioctl$RTC_ALM_SET(r1, 0x40247007, 0x0) mmap$IORING_OFF_SQES(&(0x7f0000ff3000/0x2000)=nil, 0x2000, 0x2000002, 0x10, r1, 0x10000000) getsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, 0x0, 0x0) 12:44:52 executing program 3: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_init_net_socket$802154_raw(0x24, 0x3, 0x0) sendmmsg$inet6(r0, &(0x7f0000004d00)=[{{0x0, 0x0, &(0x7f00000004c0), 0xeffdffff00000000}}], 0x1, 0x0) 12:44:52 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="02000000030000", 0x7, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000180)) [ 2539.857611] FAULT_INJECTION: forcing a failure. [ 2539.857611] name fail_page_alloc, interval 1, probability 0, space 0, times 1 [ 2539.860302] CPU: 0 PID: 12938 Comm: syz-executor.5 Not tainted 5.10.163 #1 [ 2539.861660] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2539.863334] Call Trace: [ 2539.863861] dump_stack+0x107/0x167 [ 2539.864582] should_fail.cold+0x5/0xa [ 2539.865341] __alloc_pages_nodemask+0x182/0x680 [ 2539.866271] ? __alloc_pages_slowpath.constprop.0+0x2220/0x2220 [ 2539.867477] ? lock_downgrade+0x6d0/0x6d0 [ 2539.868314] alloc_pages_vma+0xbb/0x410 [ 2539.869115] shmem_alloc_page+0x10f/0x1e0 [ 2539.869931] ? shmem_init_inode+0x20/0x20 [ 2539.870810] ? percpu_counter_add_batch+0x8b/0x140 [ 2539.871788] ? __vm_enough_memory+0x184/0x360 [ 2539.872700] shmem_getpage_gfp.constprop.0+0x512/0x1920 [ 2539.873760] ? shmem_unuse_inode+0xed0/0xed0 [ 2539.874627] ? ktime_get_coarse_real_ts64+0x15a/0x190 [ 2539.875648] ? iov_iter_fault_in_readable+0x9a/0x410 [ 2539.876674] shmem_write_begin+0xf7/0x1d0 [ 2539.877491] generic_perform_write+0x20a/0x4f0 [ 2539.878414] ? trace_event_raw_event_file_check_and_advance_wb_err+0x4a0/0x4a0 [ 2539.879825] ? evict_inodes+0x420/0x420 [ 2539.880604] ? generic_write_checks+0x2ad/0x390 [ 2539.881517] __generic_file_write_iter+0x39d/0x5d0 [ 2539.882486] generic_file_write_iter+0xdb/0x230 [ 2539.883393] ? iov_iter_init+0x3c/0x130 [ 2539.884168] new_sync_write+0x42c/0x660 [ 2539.884944] ? new_sync_read+0x6f0/0x6f0 [ 2539.885736] ? __x64_sys_pwrite64+0x201/0x260 [ 2539.886622] ? lock_release+0x6b0/0x6b0 [ 2539.887400] ? selinux_file_permission+0x36/0x510 [ 2539.888359] vfs_write+0x747/0xa30 [ 2539.889061] __x64_sys_pwrite64+0x201/0x260 [ 2539.889902] ? ksys_pwrite64+0x1b0/0x1b0 [ 2539.890715] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 2539.891737] ? syscall_enter_from_user_mode+0x1d/0x50 [ 2539.892746] do_syscall_64+0x33/0x40 [ 2539.893475] entry_SYSCALL_64_after_hwframe+0x61/0xc6 [ 2539.894481] RIP: 0033:0x7f8cf17d3ab7 [ 2539.895210] Code: 08 89 3c 24 48 89 4c 24 18 e8 e5 f8 ff ff 4c 8b 54 24 18 48 8b 54 24 10 41 89 c0 48 8b 74 24 08 8b 3c 24 b8 12 00 00 00 0f 05 <48> 3d 00 f0 ff ff 77 31 44 89 c7 48 89 04 24 e8 15 f9 ff ff 48 8b [ 2539.898778] RSP: 002b:00007f8ceed95f20 EFLAGS: 00000293 ORIG_RAX: 0000000000000012 [ 2539.900248] RAX: ffffffffffffffda RBX: 00007f8cf186a970 RCX: 00007f8cf17d3ab7 [ 2539.901623] RDX: 000000000000005a RSI: 0000000020000040 RDI: 0000000000000004 [ 2539.903012] RBP: 0000000000000004 R08: 0000000000000000 R09: ffffffffffffffff [ 2539.904388] R10: 0000000000000400 R11: 0000000000000293 R12: 0000000000000004 [ 2539.905762] R13: 0000000000000004 R14: 0000000020000440 R15: 0000000000000000 [ 2539.907373] hpet: Lost 2 RTC interrupts [ 2539.936784] EXT4-fs (loop2): ext4_check_descriptors: Inode table for group 0 overlaps superblock [ 2539.938749] EXT4-fs (loop2): group descriptors corrupted! [ 2539.950713] FAULT_INJECTION: forcing a failure. [ 2539.950713] name failslab, interval 1, probability 0, space 0, times 0 [ 2539.953087] CPU: 1 PID: 12948 Comm: syz-executor.7 Not tainted 5.10.163 #1 [ 2539.954544] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2539.956361] Call Trace: [ 2539.956932] dump_stack+0x107/0x167 [ 2539.957704] should_fail.cold+0x5/0xa [ 2539.958534] ? security_file_alloc+0x34/0x170 [ 2539.959483] should_failslab+0x5/0x20 [ 2539.960284] kmem_cache_alloc+0x5b/0x360 [ 2539.961151] security_file_alloc+0x34/0x170 [ 2539.962077] __alloc_file+0xb6/0x320 [ 2539.962871] alloc_empty_file+0x6d/0x170 [ 2539.963739] alloc_file+0x59/0x5a0 [ 2539.964520] alloc_file_pseudo+0x16a/0x250 [ 2539.965429] ? alloc_file+0x5a0/0x5a0 [ 2539.966268] ? shmem_get_inode+0x55c/0xbc0 [ 2539.967140] __shmem_file_setup+0x144/0x320 [ 2539.968062] ? _copy_from_user+0xfb/0x1b0 [ 2539.968953] __do_sys_memfd_create+0x275/0x450 [ 2539.969958] ? memfd_file_seals_ptr+0x170/0x170 [ 2539.970921] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 2539.972055] ? syscall_enter_from_user_mode+0x1d/0x50 [ 2539.973129] do_syscall_64+0x33/0x40 [ 2539.973894] entry_SYSCALL_64_after_hwframe+0x61/0xc6 [ 2539.974949] RIP: 0033:0x7fca42405b19 [ 2539.975707] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2539.979450] RSP: 002b:00007fca3f97af48 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 2539.981012] RAX: ffffffffffffffda RBX: 0000000020000440 RCX: 00007fca42405b19 [ 2539.982482] RDX: 0000000000004200 RSI: 0000000000000000 RDI: 00007fca4245f0fb [ 2539.983939] RBP: 0000000000000004 R08: 0000000000002100 R09: ffffffffffffffff [ 2539.985384] R10: 0000000000000004 R11: 0000000000000246 R12: 0000000008100000 [ 2539.986880] R13: 0000000020000100 R14: 0000000000fffff0 R15: 0000000020000180 [ 2539.998914] EXT4-fs (loop1): unsupported inode size: 0 [ 2540.000008] EXT4-fs (loop1): blocksize: 2048 [ 2540.005081] EXT4-fs (loop5): VFS: Can't find ext4 filesystem [ 2540.051118] EXT4-fs (loop4): corrupt root inode, run e2fsck [ 2540.052708] EXT4-fs (loop4): mount failed 12:44:52 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b000000", 0x58, 0x400}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000180)) 12:44:52 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000180)) (fail_nth: 15) 12:44:52 executing program 3: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_init_net_socket$802154_raw(0x24, 0x3, 0x0) sendmmsg$inet6(r0, &(0x7f0000004d00)=[{{0x0, 0x0, &(0x7f00000004c0), 0xffffff7f00000000}}], 0x1, 0x0) 12:44:52 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="0200000003000000", 0x8, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000180)) 12:44:52 executing program 0: r0 = creat(&(0x7f0000000040)='./file0\x00', 0x0) r1 = creat(&(0x7f0000000040)='./file0\x00', 0x0) fallocate(r1, 0x0, 0x0, 0x8800000) fallocate(r1, 0x3, 0x0, 0x8000) fallocate(r0, 0x0, 0x0, 0x8800500) 12:44:52 executing program 4: ioctl$RTC_UIE_ON(0xffffffffffffffff, 0x7003) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x2}, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0xfffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = dup2(0xffffffffffffffff, r0) perf_event_open(&(0x7f00000001c0)={0x2, 0x80, 0x8, 0x9, 0x4, 0x1, 0x0, 0x3b3d, 0x200a0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x2, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0xffff, 0x1, @perf_config_ext={0x7, 0x1}, 0x281, 0xffffffff, 0x4, 0x3, 0x401, 0xffffff47, 0x401, 0x0, 0x3, 0x0, 0x415}, 0x0, 0xffffffffffffffff, r0, 0x1) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f0000000000000400", 0x1c, 0x2100}], 0x0, &(0x7f0000000180)) pkey_mprotect(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x0, 0xffffffffffffffff) pkey_mprotect(&(0x7f0000ff4000/0x4000)=nil, 0x4000, 0x0, 0xffffffffffffffff) socket$inet_udp(0x2, 0x2, 0x0) getsockopt$inet_int(0xffffffffffffffff, 0x0, 0xe, 0x0, &(0x7f0000000280)) ioctl$sock_SIOCADDDLCI(0xffffffffffffffff, 0x8980, 0x0) ioctl$RTC_ALM_SET(r1, 0x40247007, 0x0) mmap$IORING_OFF_SQES(&(0x7f0000ff3000/0x2000)=nil, 0x2000, 0x2000002, 0x10, r1, 0x10000000) getsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, 0x0, 0x0) 12:44:52 executing program 7: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000180)) (fail_nth: 13) [ 2540.205211] EXT4-fs (loop1): unsupported inode size: 0 [ 2540.206521] EXT4-fs (loop1): blocksize: 2048 12:44:53 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b000000", 0x58, 0x400}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000180)) 12:44:53 executing program 6: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000180)) (fail_nth: 1) [ 2540.378088] FAULT_INJECTION: forcing a failure. [ 2540.378088] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 2540.380517] CPU: 1 PID: 12969 Comm: syz-executor.5 Not tainted 5.10.163 #1 [ 2540.381940] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2540.383644] Call Trace: [ 2540.384193] dump_stack+0x107/0x167 [ 2540.384945] should_fail.cold+0x5/0xa [ 2540.385735] iov_iter_copy_from_user_atomic+0x49b/0xdb0 [ 2540.386856] ? shmem_write_begin+0xf7/0x1d0 [ 2540.387736] ? shmem_write_begin+0x100/0x1d0 [ 2540.388644] generic_perform_write+0x279/0x4f0 [ 2540.389596] ? trace_event_raw_event_file_check_and_advance_wb_err+0x4a0/0x4a0 [ 2540.391081] ? evict_inodes+0x420/0x420 [ 2540.391894] ? generic_write_checks+0x2ad/0x390 [ 2540.392848] __generic_file_write_iter+0x39d/0x5d0 [ 2540.393973] generic_file_write_iter+0xdb/0x230 [ 2540.394919] ? iov_iter_init+0x3c/0x130 [ 2540.395731] new_sync_write+0x42c/0x660 [ 2540.396544] ? new_sync_read+0x6f0/0x6f0 [ 2540.397370] ? __x64_sys_pwrite64+0x201/0x260 [ 2540.398295] ? lock_release+0x6b0/0x6b0 [ 2540.399105] ? selinux_file_permission+0x36/0x510 [ 2540.400103] vfs_write+0x747/0xa30 [ 2540.400832] __x64_sys_pwrite64+0x201/0x260 [ 2540.401696] ? ksys_pwrite64+0x1b0/0x1b0 [ 2540.402538] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 2540.403597] ? syscall_enter_from_user_mode+0x1d/0x50 [ 2540.404651] do_syscall_64+0x33/0x40 [ 2540.405410] entry_SYSCALL_64_after_hwframe+0x61/0xc6 [ 2540.406459] RIP: 0033:0x7f8cf17d3ab7 [ 2540.407216] Code: 08 89 3c 24 48 89 4c 24 18 e8 e5 f8 ff ff 4c 8b 54 24 18 48 8b 54 24 10 41 89 c0 48 8b 74 24 08 8b 3c 24 b8 12 00 00 00 0f 05 <48> 3d 00 f0 ff ff 77 31 44 89 c7 48 89 04 24 e8 15 f9 ff ff 48 8b [ 2540.410990] RSP: 002b:00007f8ceed95f20 EFLAGS: 00000293 ORIG_RAX: 0000000000000012 [ 2540.412549] RAX: ffffffffffffffda RBX: 00007f8cf186a970 RCX: 00007f8cf17d3ab7 [ 2540.414003] RDX: 000000000000005a RSI: 0000000020000040 RDI: 0000000000000004 [ 2540.415462] RBP: 0000000000000004 R08: 0000000000000000 R09: ffffffffffffffff [ 2540.416921] R10: 0000000000000400 R11: 0000000000000293 R12: 0000000000000004 [ 2540.418389] R13: 0000000000000004 R14: 0000000020000440 R15: 0000000000000000 [ 2540.447536] FAULT_INJECTION: forcing a failure. [ 2540.447536] name failslab, interval 1, probability 0, space 0, times 0 [ 2540.449855] CPU: 1 PID: 12974 Comm: syz-executor.6 Not tainted 5.10.163 #1 [ 2540.451282] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2540.452956] Call Trace: [ 2540.453494] dump_stack+0x107/0x167 [ 2540.454249] should_fail.cold+0x5/0xa [ 2540.455023] ? __do_sys_memfd_create+0xfb/0x450 [ 2540.456050] should_failslab+0x5/0x20 [ 2540.456837] __kmalloc+0x72/0x3f0 [ 2540.457557] __do_sys_memfd_create+0xfb/0x450 [ 2540.458501] ? ksys_write+0x1a9/0x260 [ 2540.459290] ? memfd_file_seals_ptr+0x170/0x170 [ 2540.460254] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 2540.461338] ? syscall_enter_from_user_mode+0x1d/0x50 [ 2540.462414] do_syscall_64+0x33/0x40 [ 2540.463189] entry_SYSCALL_64_after_hwframe+0x61/0xc6 [ 2540.464229] RIP: 0033:0x7f290af69b19 [ 2540.464997] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2540.468759] RSP: 002b:00007f29084def48 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 2540.470336] RAX: ffffffffffffffda RBX: 0000000020000440 RCX: 00007f290af69b19 [ 2540.471880] RDX: 0000000000004200 RSI: 0000000000000000 RDI: 00007f290afc30fb [ 2540.473340] RBP: 0000000000000004 R08: 0000000000002100 R09: ffffffffffffffff [ 2540.474788] R10: 0000000000000004 R11: 0000000000000246 R12: 0000000008100000 [ 2540.476227] R13: 0000000020000100 R14: 0000000000fffff0 R15: 0000000020000180 12:44:53 executing program 3: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_init_net_socket$802154_raw(0x24, 0x3, 0x0) sendmmsg$inet6(r0, &(0x7f0000004d00)=[{{0x0, 0x0, &(0x7f00000004c0), 0x0, 0x0, 0x4}}], 0x1, 0x0) [ 2540.495499] EXT4-fs (loop2): ext4_check_descriptors: Inode table for group 0 overlaps superblock [ 2540.497705] EXT4-fs (loop2): group descriptors corrupted! [ 2540.509982] FAULT_INJECTION: forcing a failure. [ 2540.509982] name failslab, interval 1, probability 0, space 0, times 0 [ 2540.512484] CPU: 0 PID: 12976 Comm: syz-executor.7 Not tainted 5.10.163 #1 [ 2540.513938] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2540.515698] Call Trace: [ 2540.516254] dump_stack+0x107/0x167 [ 2540.517019] should_fail.cold+0x5/0xa [ 2540.517817] ? create_object.isra.0+0x3a/0xa20 [ 2540.518805] should_failslab+0x5/0x20 [ 2540.519601] kmem_cache_alloc+0x5b/0x360 [ 2540.520446] ? percpu_ref_put_many.constprop.0+0x4e/0x100 [ 2540.521593] create_object.isra.0+0x3a/0xa20 [ 2540.522540] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 2540.523593] kmem_cache_alloc+0x159/0x360 [ 2540.524459] security_file_alloc+0x34/0x170 [ 2540.525354] __alloc_file+0xb6/0x320 [ 2540.526156] alloc_empty_file+0x6d/0x170 [ 2540.526999] alloc_file+0x59/0x5a0 [ 2540.527741] alloc_file_pseudo+0x16a/0x250 [ 2540.528622] ? alloc_file+0x5a0/0x5a0 [ 2540.529414] ? shmem_get_inode+0x55c/0xbc0 [ 2540.530309] __shmem_file_setup+0x144/0x320 [ 2540.531205] ? _copy_from_user+0xfb/0x1b0 [ 2540.532064] __do_sys_memfd_create+0x275/0x450 [ 2540.533009] ? memfd_file_seals_ptr+0x170/0x170 [ 2540.533996] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 2540.535081] ? syscall_enter_from_user_mode+0x1d/0x50 [ 2540.536152] do_syscall_64+0x33/0x40 [ 2540.536952] entry_SYSCALL_64_after_hwframe+0x61/0xc6 [ 2540.538020] RIP: 0033:0x7fca42405b19 [ 2540.538811] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2540.542651] RSP: 002b:00007fca3f97af48 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 2540.544237] RAX: ffffffffffffffda RBX: 0000000020000440 RCX: 00007fca42405b19 [ 2540.545717] RDX: 0000000000004200 RSI: 0000000000000000 RDI: 00007fca4245f0fb [ 2540.547210] RBP: 0000000000000004 R08: 0000000000002100 R09: ffffffffffffffff [ 2540.548686] R10: 0000000000000004 R11: 0000000000000246 R12: 0000000008100000 [ 2540.550183] R13: 0000000020000100 R14: 0000000000fffff0 R15: 0000000020000180 [ 2540.551818] hpet: Lost 2 RTC interrupts [ 2540.585773] EXT4-fs (loop5): mounted filesystem without journal. Opts: ,errors=continue [ 2540.590257] EXT4-fs (loop4): corrupt root inode, run e2fsck [ 2540.593327] EXT4-fs (loop7): mounted filesystem without journal. Opts: ,errors=continue [ 2540.598759] EXT4-fs (loop4): mount failed [ 2540.720882] EXT4-fs (loop1): unsupported inode size: 0 [ 2540.722147] EXT4-fs (loop1): blocksize: 2048 12:45:09 executing program 3: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_init_net_socket$802154_raw(0x24, 0x3, 0x0) sendmmsg$inet6(r0, &(0x7f0000004d00)=[{{0x0, 0x0, &(0x7f00000004c0), 0x0, 0x0, 0x7f00}}], 0x1, 0x0) 12:45:09 executing program 0: r0 = creat(&(0x7f0000000040)='./file0\x00', 0x0) r1 = creat(&(0x7f0000000040)='./file0\x00', 0x0) fallocate(r1, 0x0, 0x0, 0x8800000) fallocate(r1, 0x3, 0x0, 0x8000) fallocate(r0, 0x0, 0x0, 0x8800700) 12:45:09 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b00000000", 0x59, 0x400}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000180)) 12:45:09 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="0200000003000000", 0x8, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000180)) 12:45:09 executing program 6: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000180)) (fail_nth: 2) 12:45:09 executing program 7: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000180)) (fail_nth: 14) 12:45:09 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000180)) (fail_nth: 16) 12:45:09 executing program 4: ioctl$RTC_UIE_ON(0xffffffffffffffff, 0x7003) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x2}, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0xfffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = dup2(0xffffffffffffffff, r0) perf_event_open(&(0x7f00000001c0)={0x2, 0x80, 0x8, 0x9, 0x4, 0x1, 0x0, 0x3b3d, 0x200a0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x2, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0xffff, 0x1, @perf_config_ext={0x7, 0x1}, 0x281, 0xffffffff, 0x4, 0x3, 0x401, 0xffffff47, 0x401, 0x0, 0x3, 0x0, 0x415}, 0x0, 0xffffffffffffffff, r0, 0x1) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f0000000000000400", 0x1c, 0x2100}], 0x0, &(0x7f0000000180)) pkey_mprotect(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x0, 0xffffffffffffffff) pkey_mprotect(&(0x7f0000ff4000/0x4000)=nil, 0x4000, 0x0, 0xffffffffffffffff) socket$inet_udp(0x2, 0x2, 0x0) getsockopt$inet_int(0xffffffffffffffff, 0x0, 0xe, 0x0, &(0x7f0000000280)) ioctl$sock_SIOCADDDLCI(0xffffffffffffffff, 0x8980, 0x0) ioctl$RTC_ALM_SET(r1, 0x40247007, 0x0) mmap$IORING_OFF_SQES(&(0x7f0000ff3000/0x2000)=nil, 0x2000, 0x2000002, 0x10, r1, 0x10000000) getsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, 0x0, 0x0) [ 2557.251610] FAULT_INJECTION: forcing a failure. [ 2557.251610] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 2557.253557] CPU: 1 PID: 13000 Comm: syz-executor.5 Not tainted 5.10.163 #1 [ 2557.254644] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2557.255918] Call Trace: [ 2557.256327] dump_stack+0x107/0x167 [ 2557.256892] should_fail.cold+0x5/0xa [ 2557.257495] iov_iter_copy_from_user_atomic+0x49b/0xdb0 [ 2557.258323] ? shmem_write_begin+0xf7/0x1d0 [ 2557.258981] ? shmem_write_begin+0x100/0x1d0 [ 2557.259666] generic_perform_write+0x279/0x4f0 [ 2557.260385] ? trace_event_raw_event_file_check_and_advance_wb_err+0x4a0/0x4a0 [ 2557.261505] ? evict_inodes+0x420/0x420 [ 2557.262126] ? generic_write_checks+0x2ad/0x390 [ 2557.262824] __generic_file_write_iter+0x39d/0x5d0 [ 2557.263404] generic_file_write_iter+0xdb/0x230 [ 2557.263944] ? iov_iter_init+0x3c/0x130 [ 2557.264415] new_sync_write+0x42c/0x660 [ 2557.264876] ? new_sync_read+0x6f0/0x6f0 [ 2557.265346] ? __x64_sys_pwrite64+0x201/0x260 [ 2557.265877] ? lock_release+0x6b0/0x6b0 [ 2557.266327] ? selinux_file_permission+0x36/0x510 [ 2557.266910] vfs_write+0x747/0xa30 [ 2557.267314] __x64_sys_pwrite64+0x201/0x260 [ 2557.267821] ? ksys_pwrite64+0x1b0/0x1b0 [ 2557.268349] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 2557.268972] ? syscall_enter_from_user_mode+0x1d/0x50 [ 2557.269542] do_syscall_64+0x33/0x40 [ 2557.269986] entry_SYSCALL_64_after_hwframe+0x61/0xc6 [ 2557.270574] RIP: 0033:0x7f8cf17d3ab7 [ 2557.271009] Code: 08 89 3c 24 48 89 4c 24 18 e8 e5 f8 ff ff 4c 8b 54 24 18 48 8b 54 24 10 41 89 c0 48 8b 74 24 08 8b 3c 24 b8 12 00 00 00 0f 05 <48> 3d 00 f0 ff ff 77 31 44 89 c7 48 89 04 24 e8 15 f9 ff ff 48 8b [ 2557.273027] RSP: 002b:00007f8ceed95f20 EFLAGS: 00000293 ORIG_RAX: 0000000000000012 [ 2557.273913] RAX: ffffffffffffffda RBX: 00007f8cf186a970 RCX: 00007f8cf17d3ab7 [ 2557.274735] RDX: 0000000000000009 RSI: 0000000020010400 RDI: 0000000000000004 [ 2557.275555] RBP: 0000000000000004 R08: 0000000000000000 R09: ffffffffffffffff [ 2557.276367] R10: 0000000000000800 R11: 0000000000000293 R12: 0000000000000004 [ 2557.277195] R13: 0000000000000004 R14: 0000000020000470 R15: 0000000000000002 [ 2557.301505] FAULT_INJECTION: forcing a failure. [ 2557.301505] name failslab, interval 1, probability 0, space 0, times 0 [ 2557.304074] CPU: 0 PID: 13009 Comm: syz-executor.6 Not tainted 5.10.163 #1 [ 2557.305564] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2557.307298] Call Trace: [ 2557.307872] dump_stack+0x107/0x167 [ 2557.308629] should_fail.cold+0x5/0xa [ 2557.309426] ? create_object.isra.0+0x3a/0xa20 [ 2557.310383] should_failslab+0x5/0x20 [ 2557.311176] kmem_cache_alloc+0x5b/0x360 [ 2557.312025] create_object.isra.0+0x3a/0xa20 [ 2557.312331] FAULT_INJECTION: forcing a failure. [ 2557.312331] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 2557.312942] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 2557.312967] __kmalloc+0x16e/0x3f0 [ 2557.316074] __do_sys_memfd_create+0xfb/0x450 [ 2557.316999] ? ksys_write+0x1a9/0x260 [ 2557.317784] ? memfd_file_seals_ptr+0x170/0x170 [ 2557.318762] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 2557.319849] ? syscall_enter_from_user_mode+0x1d/0x50 [ 2557.320915] do_syscall_64+0x33/0x40 [ 2557.321693] entry_SYSCALL_64_after_hwframe+0x61/0xc6 [ 2557.322763] RIP: 0033:0x7f290af69b19 [ 2557.323535] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2557.327354] RSP: 002b:00007f29084def48 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 2557.328923] RAX: ffffffffffffffda RBX: 0000000020000440 RCX: 00007f290af69b19 [ 2557.330395] RDX: 0000000000004200 RSI: 0000000000000000 RDI: 00007f290afc30fb [ 2557.331867] RBP: 0000000000000004 R08: 0000000000002100 R09: ffffffffffffffff [ 2557.333332] R10: 0000000000000004 R11: 0000000000000246 R12: 0000000008100000 [ 2557.334813] R13: 0000000020000100 R14: 0000000000fffff0 R15: 0000000020000180 [ 2557.336309] CPU: 1 PID: 13012 Comm: syz-executor.7 Not tainted 5.10.163 #1 [ 2557.336469] hpet: Lost 1 RTC interrupts [ 2557.337152] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2557.337166] Call Trace: [ 2557.339276] dump_stack+0x107/0x167 [ 2557.339675] should_fail.cold+0x5/0xa [ 2557.340107] __alloc_pages_nodemask+0x182/0x680 [ 2557.340634] ? __alloc_pages_slowpath.constprop.0+0x2220/0x2220 [ 2557.341297] ? lock_downgrade+0x6d0/0x6d0 [ 2557.341774] alloc_pages_vma+0xbb/0x410 [ 2557.342235] shmem_alloc_page+0x10f/0x1e0 [ 2557.342702] ? shmem_init_inode+0x20/0x20 [ 2557.343189] ? percpu_counter_add_batch+0x8b/0x140 [ 2557.343732] ? __vm_enough_memory+0x184/0x360 [ 2557.344242] shmem_getpage_gfp.constprop.0+0x512/0x1920 [ 2557.344854] ? shmem_unuse_inode+0xed0/0xed0 [ 2557.345352] ? ktime_get_coarse_real_ts64+0x15a/0x190 [ 2557.345930] ? iov_iter_fault_in_readable+0x9a/0x410 [ 2557.346516] shmem_write_begin+0xf7/0x1d0 [ 2557.346989] generic_perform_write+0x20a/0x4f0 [ 2557.347515] ? trace_event_raw_event_file_check_and_advance_wb_err+0x4a0/0x4a0 [ 2557.348330] ? evict_inodes+0x420/0x420 [ 2557.348772] ? generic_write_checks+0x2ad/0x390 [ 2557.349289] __generic_file_write_iter+0x39d/0x5d0 [ 2557.349838] generic_file_write_iter+0xdb/0x230 [ 2557.350368] ? iov_iter_init+0x3c/0x130 [ 2557.350813] new_sync_write+0x42c/0x660 [ 2557.351249] ? new_sync_read+0x6f0/0x6f0 [ 2557.351702] ? __x64_sys_pwrite64+0x201/0x260 [ 2557.352205] ? lock_release+0x6b0/0x6b0 [ 2557.352646] ? selinux_file_permission+0x36/0x510 [ 2557.353189] vfs_write+0x747/0xa30 [ 2557.353590] __x64_sys_pwrite64+0x201/0x260 [ 2557.354056] ? ksys_pwrite64+0x1b0/0x1b0 [ 2557.354532] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 2557.355115] ? syscall_enter_from_user_mode+0x1d/0x50 [ 2557.355682] do_syscall_64+0x33/0x40 [ 2557.356093] entry_SYSCALL_64_after_hwframe+0x61/0xc6 [ 2557.356657] RIP: 0033:0x7fca423b8ab7 [ 2557.357068] Code: 08 89 3c 24 48 89 4c 24 18 e8 e5 f8 ff ff 4c 8b 54 24 18 48 8b 54 24 10 41 89 c0 48 8b 74 24 08 8b 3c 24 b8 12 00 00 00 0f 05 <48> 3d 00 f0 ff ff 77 31 44 89 c7 48 89 04 24 e8 15 f9 ff ff 48 8b [ 2557.359087] RSP: 002b:00007fca3f97af20 EFLAGS: 00000293 ORIG_RAX: 0000000000000012 [ 2557.359926] RAX: ffffffffffffffda RBX: 00007fca4244f970 RCX: 00007fca423b8ab7 [ 2557.360707] RDX: 000000000000005a RSI: 0000000020000040 RDI: 0000000000000004 [ 2557.361494] RBP: 0000000000000004 R08: 0000000000000000 R09: ffffffffffffffff [ 2557.362366] R10: 0000000000000400 R11: 0000000000000293 R12: 0000000000000004 [ 2557.363157] R13: 0000000000000004 R14: 0000000020000440 R15: 0000000000000000 [ 2557.390424] EXT4-fs (loop4): corrupt root inode, run e2fsck [ 2557.394328] EXT4-fs (loop4): mount failed [ 2557.402146] EXT4-fs (loop2): ext4_check_descriptors: Inode table for group 0 overlaps superblock [ 2557.402954] EXT4-fs (loop5): mounted filesystem without journal. Opts: ,errors=continue [ 2557.404347] EXT4-fs (loop2): group descriptors corrupted! [ 2557.427128] EXT4-fs (loop1): unsupported inode size: 0 [ 2557.428290] EXT4-fs (loop1): blocksize: 2048 12:45:10 executing program 3: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_init_net_socket$802154_raw(0x24, 0x3, 0x0) sendmmsg$inet6(r0, &(0x7f0000004d00)=[{{0x0, 0x0, &(0x7f00000004c0), 0x0, 0x0, 0x40000}}], 0x1, 0x0) 12:45:10 executing program 0: r0 = creat(&(0x7f0000000040)='./file0\x00', 0x0) r1 = creat(&(0x7f0000000040)='./file0\x00', 0x0) fallocate(r1, 0x0, 0x0, 0x8800000) fallocate(r1, 0x3, 0x0, 0x8000) fallocate(r0, 0x0, 0x0, 0x8800c01) 12:45:10 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000180)) (fail_nth: 17) [ 2557.475448] EXT4-fs (loop7): VFS: Can't find ext4 filesystem 12:45:10 executing program 4: ioctl$RTC_UIE_ON(0xffffffffffffffff, 0x7003) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x2}, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0xfffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = dup2(0xffffffffffffffff, r0) perf_event_open(&(0x7f00000001c0)={0x2, 0x80, 0x8, 0x9, 0x4, 0x1, 0x0, 0x3b3d, 0x200a0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x2, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0xffff, 0x1, @perf_config_ext={0x7, 0x1}, 0x281, 0xffffffff, 0x4, 0x3, 0x401, 0xffffff47, 0x401, 0x0, 0x3, 0x0, 0x415}, 0x0, 0xffffffffffffffff, r0, 0x1) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d}], 0x0, &(0x7f0000000180)) pkey_mprotect(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x0, 0xffffffffffffffff) pkey_mprotect(&(0x7f0000ff4000/0x4000)=nil, 0x4000, 0x0, 0xffffffffffffffff) socket$inet_udp(0x2, 0x2, 0x0) getsockopt$inet_int(0xffffffffffffffff, 0x0, 0xe, 0x0, &(0x7f0000000280)) ioctl$sock_SIOCADDDLCI(0xffffffffffffffff, 0x8980, 0x0) ioctl$RTC_ALM_SET(r1, 0x40247007, 0x0) mmap$IORING_OFF_SQES(&(0x7f0000ff3000/0x2000)=nil, 0x2000, 0x2000002, 0x10, r1, 0x10000000) getsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, 0x0, 0x0) [ 2557.511253] EXT4-fs (loop6): mounted filesystem without journal. Opts: ,errors=continue 12:45:10 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="0200000003000000", 0x8, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000180)) 12:45:10 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b00000000", 0x59, 0x400}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000180)) 12:45:10 executing program 6: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000180)) (fail_nth: 3) 12:45:10 executing program 7: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000180)) (fail_nth: 15) [ 2557.697496] FAULT_INJECTION: forcing a failure. [ 2557.697496] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 2557.700080] CPU: 0 PID: 13037 Comm: syz-executor.5 Not tainted 5.10.163 #1 [ 2557.701519] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2557.703261] Call Trace: [ 2557.703820] dump_stack+0x107/0x167 [ 2557.704587] should_fail.cold+0x5/0xa [ 2557.705393] __alloc_pages_nodemask+0x182/0x680 [ 2557.706406] ? __alloc_pages_slowpath.constprop.0+0x2220/0x2220 [ 2557.707653] ? lock_downgrade+0x6d0/0x6d0 [ 2557.708541] alloc_pages_vma+0xbb/0x410 [ 2557.709377] shmem_alloc_page+0x10f/0x1e0 [ 2557.710245] ? shmem_init_inode+0x20/0x20 [ 2557.711136] ? percpu_counter_add_batch+0x8b/0x140 [ 2557.712160] ? __vm_enough_memory+0x184/0x360 [ 2557.713096] shmem_getpage_gfp.constprop.0+0x512/0x1920 [ 2557.714241] ? shmem_unuse_inode+0xed0/0xed0 [ 2557.715158] ? ktime_get_coarse_real_ts64+0x15a/0x190 [ 2557.716227] ? iov_iter_fault_in_readable+0x9a/0x410 [ 2557.717287] shmem_write_begin+0xf7/0x1d0 [ 2557.718160] generic_perform_write+0x20a/0x4f0 [ 2557.719139] ? trace_event_raw_event_file_check_and_advance_wb_err+0x4a0/0x4a0 [ 2557.720644] ? evict_inodes+0x420/0x420 [ 2557.721478] ? generic_write_checks+0x2ad/0x390 [ 2557.722482] __generic_file_write_iter+0x39d/0x5d0 [ 2557.723506] generic_file_write_iter+0xdb/0x230 [ 2557.724481] ? iov_iter_init+0x3c/0x130 [ 2557.725314] new_sync_write+0x42c/0x660 [ 2557.726143] ? new_sync_read+0x6f0/0x6f0 [ 2557.727003] ? __x64_sys_pwrite64+0x201/0x260 [ 2557.727936] ? lock_release+0x6b0/0x6b0 [ 2557.728762] ? selinux_file_permission+0x36/0x510 [ 2557.729788] vfs_write+0x747/0xa30 [ 2557.730557] __x64_sys_pwrite64+0x201/0x260 [ 2557.731453] ? ksys_pwrite64+0x1b0/0x1b0 [ 2557.732301] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 2557.733402] ? syscall_enter_from_user_mode+0x1d/0x50 [ 2557.734480] do_syscall_64+0x33/0x40 [ 2557.735252] entry_SYSCALL_64_after_hwframe+0x61/0xc6 [ 2557.736309] RIP: 0033:0x7f8cf17d3ab7 [ 2557.737096] Code: 08 89 3c 24 48 89 4c 24 18 e8 e5 f8 ff ff 4c 8b 54 24 18 48 8b 54 24 10 41 89 c0 48 8b 74 24 08 8b 3c 24 b8 12 00 00 00 0f 05 <48> 3d 00 f0 ff ff 77 31 44 89 c7 48 89 04 24 e8 15 f9 ff ff 48 8b [ 2557.740948] RSP: 002b:00007f8ceed95f20 EFLAGS: 00000293 ORIG_RAX: 0000000000000012 [ 2557.742534] RAX: ffffffffffffffda RBX: 00007f8cf186a970 RCX: 00007f8cf17d3ab7 [ 2557.744003] RDX: 000000000000001d RSI: 0000000020011600 RDI: 0000000000000004 [ 2557.745468] RBP: 0000000000000004 R08: 0000000000000000 R09: ffffffffffffffff [ 2557.746944] R10: 0000000000002100 R11: 0000000000000293 R12: 0000000000000004 [ 2557.748417] R13: 0000000000000004 R14: 0000000020000488 R15: 0000000000000003 [ 2557.750076] hpet: Lost 2 RTC interrupts [ 2557.778127] EXT4-fs (loop2): ext4_check_descriptors: Inode table for group 0 overlaps superblock [ 2557.780284] EXT4-fs (loop2): group descriptors corrupted! 12:45:10 executing program 3: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_init_net_socket$802154_raw(0x24, 0x3, 0x0) sendmmsg$inet6(r0, &(0x7f0000004d00)=[{{0x0, 0x0, &(0x7f00000004c0), 0x0, 0x0, 0x7f000000}}], 0x1, 0x0) [ 2557.836977] EXT4-fs (loop1): unsupported inode size: 0 [ 2557.838157] EXT4-fs (loop1): blocksize: 2048 12:45:10 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000180)) [ 2557.848382] FAULT_INJECTION: forcing a failure. [ 2557.848382] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 2557.851068] CPU: 0 PID: 13042 Comm: syz-executor.7 Not tainted 5.10.163 #1 [ 2557.852574] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2557.854307] Call Trace: [ 2557.854877] dump_stack+0x107/0x167 [ 2557.855634] should_fail.cold+0x5/0xa [ 2557.856433] iov_iter_copy_from_user_atomic+0x49b/0xdb0 [ 2557.857539] ? shmem_write_begin+0xf7/0x1d0 [ 2557.858441] ? shmem_write_begin+0x100/0x1d0 [ 2557.859358] generic_perform_write+0x279/0x4f0 [ 2557.860320] ? trace_event_raw_event_file_check_and_advance_wb_err+0x4a0/0x4a0 [ 2557.861821] ? evict_inodes+0x420/0x420 [ 2557.862707] ? generic_write_checks+0x2ad/0x390 [ 2557.863672] __generic_file_write_iter+0x39d/0x5d0 [ 2557.864687] generic_file_write_iter+0xdb/0x230 [ 2557.865644] ? iov_iter_init+0x3c/0x130 [ 2557.866488] new_sync_write+0x42c/0x660 [ 2557.867306] ? new_sync_read+0x6f0/0x6f0 [ 2557.868146] ? __x64_sys_pwrite64+0x201/0x260 [ 2557.869081] ? lock_release+0x6b0/0x6b0 [ 2557.869907] ? selinux_file_permission+0x36/0x510 [ 2557.870936] vfs_write+0x747/0xa30 [ 2557.871688] __x64_sys_pwrite64+0x201/0x260 [ 2557.872586] ? ksys_pwrite64+0x1b0/0x1b0 [ 2557.873432] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 2557.874539] ? syscall_enter_from_user_mode+0x1d/0x50 [ 2557.875641] do_syscall_64+0x33/0x40 [ 2557.876419] entry_SYSCALL_64_after_hwframe+0x61/0xc6 [ 2557.877477] RIP: 0033:0x7fca423b8ab7 [ 2557.878262] Code: 08 89 3c 24 48 89 4c 24 18 e8 e5 f8 ff ff 4c 8b 54 24 18 48 8b 54 24 10 41 89 c0 48 8b 74 24 08 8b 3c 24 b8 12 00 00 00 0f 05 <48> 3d 00 f0 ff ff 77 31 44 89 c7 48 89 04 24 e8 15 f9 ff ff 48 8b [ 2557.882080] RSP: 002b:00007fca3f97af20 EFLAGS: 00000293 ORIG_RAX: 0000000000000012 [ 2557.883681] RAX: ffffffffffffffda RBX: 00007fca4244f970 RCX: 00007fca423b8ab7 [ 2557.885160] RDX: 000000000000005a RSI: 0000000020000040 RDI: 0000000000000004 [ 2557.886648] RBP: 0000000000000004 R08: 0000000000000000 R09: ffffffffffffffff [ 2557.888127] R10: 0000000000000400 R11: 0000000000000293 R12: 0000000000000004 [ 2557.889605] R13: 0000000000000004 R14: 0000000020000440 R15: 0000000000000000 [ 2557.891227] hpet: Lost 1 RTC interrupts [ 2557.945783] FAULT_INJECTION: forcing a failure. [ 2557.945783] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 2557.948372] CPU: 0 PID: 13045 Comm: syz-executor.6 Not tainted 5.10.163 #1 [ 2557.949817] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2557.951556] Call Trace: [ 2557.952112] dump_stack+0x107/0x167 [ 2557.952876] should_fail.cold+0x5/0xa [ 2557.953677] _copy_from_user+0x2e/0x1b0 [ 2557.954530] __do_sys_memfd_create+0x16d/0x450 [ 2557.955485] ? memfd_file_seals_ptr+0x170/0x170 [ 2557.956483] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 2557.957580] ? syscall_enter_from_user_mode+0x1d/0x50 [ 2557.958666] do_syscall_64+0x33/0x40 [ 2557.959444] entry_SYSCALL_64_after_hwframe+0x61/0xc6 [ 2557.960509] RIP: 0033:0x7f290af69b19 [ 2557.961286] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2557.965118] RSP: 002b:00007f29084def48 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 2557.966720] RAX: ffffffffffffffda RBX: 0000000020000440 RCX: 00007f290af69b19 [ 2557.968208] RDX: 0000000000004200 RSI: 0000000000000000 RDI: 00007f290afc30fb [ 2557.969701] RBP: 0000000000000004 R08: 0000000000002100 R09: ffffffffffffffff [ 2557.971196] R10: 0000000000000004 R11: 0000000000000246 R12: 0000000008100000 [ 2557.972681] R13: 0000000020000100 R14: 0000000000fffff0 R15: 0000000020000180 [ 2557.974345] hpet: Lost 1 RTC interrupts [ 2558.093528] EXT4-fs (loop7): mounted filesystem without journal. Opts: ,errors=continue [ 2558.118461] EXT4-fs (loop2): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 2558.120507] EXT4-fs (loop2): group descriptors corrupted! 12:45:35 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000180)) (fail_nth: 18) 12:45:35 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000180)) 12:45:35 executing program 7: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000180)) (fail_nth: 16) 12:45:35 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b00000000", 0x59, 0x400}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000180)) 12:45:35 executing program 0: r0 = creat(&(0x7f0000000040)='./file0\x00', 0x0) r1 = creat(&(0x7f0000000040)='./file0\x00', 0x0) fallocate(r1, 0x0, 0x0, 0x8800000) fallocate(r1, 0x3, 0x0, 0x8000) fallocate(r0, 0x0, 0x0, 0x8800d00) 12:45:35 executing program 4: ioctl$RTC_UIE_ON(0xffffffffffffffff, 0x7003) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x2}, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0xfffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = dup2(0xffffffffffffffff, r0) perf_event_open(&(0x7f00000001c0)={0x2, 0x80, 0x8, 0x9, 0x4, 0x1, 0x0, 0x3b3d, 0x200a0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x2, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0xffff, 0x1, @perf_config_ext={0x7, 0x1}, 0x281, 0xffffffff, 0x4, 0x3, 0x401, 0xffffff47, 0x401, 0x0, 0x3, 0x0, 0x415}, 0x0, 0xffffffffffffffff, r0, 0x1) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d}], 0x0, &(0x7f0000000180)) pkey_mprotect(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x0, 0xffffffffffffffff) pkey_mprotect(&(0x7f0000ff4000/0x4000)=nil, 0x4000, 0x0, 0xffffffffffffffff) socket$inet_udp(0x2, 0x2, 0x0) getsockopt$inet_int(0xffffffffffffffff, 0x0, 0xe, 0x0, &(0x7f0000000280)) ioctl$sock_SIOCADDDLCI(0xffffffffffffffff, 0x8980, 0x0) ioctl$RTC_ALM_SET(r1, 0x40247007, 0x0) mmap$IORING_OFF_SQES(&(0x7f0000ff3000/0x2000)=nil, 0x2000, 0x2000002, 0x10, r1, 0x10000000) getsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, 0x0, 0x0) 12:45:35 executing program 3: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_init_net_socket$802154_raw(0x24, 0x3, 0x0) sendmmsg$inet6(r0, &(0x7f0000004d00)=[{{0x0, 0x0, &(0x7f00000004c0), 0x0, 0x0, 0xeffdffff}}], 0x1, 0x0) 12:45:35 executing program 6: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000180)) (fail_nth: 4) [ 2583.033237] FAULT_INJECTION: forcing a failure. [ 2583.033237] name failslab, interval 1, probability 0, space 0, times 0 [ 2583.035925] CPU: 1 PID: 13067 Comm: syz-executor.5 Not tainted 5.10.163 #1 [ 2583.037504] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2583.039214] Call Trace: [ 2583.039850] dump_stack+0x107/0x167 [ 2583.040722] should_fail.cold+0x5/0xa [ 2583.041549] ? xas_alloc+0x336/0x440 [ 2583.042319] should_failslab+0x5/0x20 [ 2583.043110] kmem_cache_alloc+0x5b/0x360 [ 2583.043934] ? trace_hardirqs_on+0x5b/0x180 [ 2583.044820] xas_alloc+0x336/0x440 [ 2583.045546] xas_create+0x60b/0x1040 [ 2583.046327] xas_create_range+0x18b/0x600 [ 2583.047202] shmem_add_to_page_cache+0x759/0x1150 [ 2583.048215] ? shmem_getattr+0x180/0x180 [ 2583.049071] shmem_getpage_gfp.constprop.0+0x64a/0x1920 [ 2583.050238] ? shmem_unuse_inode+0xed0/0xed0 [ 2583.051155] ? ktime_get_coarse_real_ts64+0x15a/0x190 [ 2583.052216] ? iov_iter_fault_in_readable+0x9a/0x410 [ 2583.053262] shmem_write_begin+0xf7/0x1d0 [ 2583.054120] generic_perform_write+0x20a/0x4f0 [ 2583.055080] ? trace_event_raw_event_file_check_and_advance_wb_err+0x4a0/0x4a0 [ 2583.056566] ? evict_inodes+0x420/0x420 [ 2583.057393] ? generic_write_checks+0x2ad/0x390 [ 2583.058350] __generic_file_write_iter+0x39d/0x5d0 [ 2583.059370] generic_file_write_iter+0xdb/0x230 [ 2583.060325] ? iov_iter_init+0x3c/0x130 [ 2583.061140] new_sync_write+0x42c/0x660 [ 2583.061966] ? new_sync_read+0x6f0/0x6f0 [ 2583.062807] ? __x64_sys_pwrite64+0x201/0x260 [ 2583.063728] ? lock_release+0x6b0/0x6b0 [ 2583.064552] ? selinux_file_permission+0x36/0x510 [ 2583.065618] vfs_write+0x747/0xa30 [ 2583.066356] __x64_sys_pwrite64+0x201/0x260 [ 2583.067259] ? ksys_pwrite64+0x1b0/0x1b0 [ 2583.068117] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 2583.069194] ? syscall_enter_from_user_mode+0x1d/0x50 [ 2583.070249] do_syscall_64+0x33/0x40 [ 2583.071025] entry_SYSCALL_64_after_hwframe+0x61/0xc6 [ 2583.072070] RIP: 0033:0x7f8cf17d3ab7 [ 2583.072844] Code: 08 89 3c 24 48 89 4c 24 18 e8 e5 f8 ff ff 4c 8b 54 24 18 48 8b 54 24 10 41 89 c0 48 8b 74 24 08 8b 3c 24 b8 12 00 00 00 0f 05 <48> 3d 00 f0 ff ff 77 31 44 89 c7 48 89 04 24 e8 15 f9 ff ff 48 8b [ 2583.076628] RSP: 002b:00007f8ceed95f20 EFLAGS: 00000293 ORIG_RAX: 0000000000000012 [ 2583.078176] RAX: ffffffffffffffda RBX: 00007f8cf186a970 RCX: 00007f8cf17d3ab7 [ 2583.079659] RDX: 000000000000001d RSI: 0000000020011600 RDI: 0000000000000004 [ 2583.081183] RBP: 0000000000000004 R08: 0000000000000000 R09: ffffffffffffffff [ 2583.082662] R10: 0000000000002100 R11: 0000000000000293 R12: 0000000000000004 [ 2583.084110] R13: 0000000000000004 R14: 0000000020000488 R15: 0000000000000003 [ 2583.087535] FAULT_INJECTION: forcing a failure. [ 2583.087535] name failslab, interval 1, probability 0, space 0, times 0 [ 2583.090001] CPU: 0 PID: 13071 Comm: syz-executor.6 Not tainted 5.10.163 #1 [ 2583.091463] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2583.093184] Call Trace: [ 2583.093739] dump_stack+0x107/0x167 [ 2583.094513] should_fail.cold+0x5/0xa [ 2583.095309] ? shmem_alloc_inode+0x18/0x40 [ 2583.096194] should_failslab+0x5/0x20 [ 2583.097039] kmem_cache_alloc+0x5b/0x360 [ 2583.097890] ? shmem_destroy_inode+0x70/0x70 [ 2583.098822] shmem_alloc_inode+0x18/0x40 [ 2583.099752] ? shmem_destroy_inode+0x70/0x70 [ 2583.100663] alloc_inode+0x63/0x240 [ 2583.101418] new_inode+0x23/0x250 [ 2583.102145] shmem_get_inode+0x15e/0xbc0 [ 2583.103016] __shmem_file_setup+0xb8/0x320 [ 2583.103895] ? _copy_from_user+0xfb/0x1b0 [ 2583.104762] __do_sys_memfd_create+0x275/0x450 [ 2583.105715] ? memfd_file_seals_ptr+0x170/0x170 [ 2583.106697] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 2583.107789] ? syscall_enter_from_user_mode+0x1d/0x50 [ 2583.108861] do_syscall_64+0x33/0x40 [ 2583.109641] entry_SYSCALL_64_after_hwframe+0x61/0xc6 [ 2583.110721] RIP: 0033:0x7f290af69b19 [ 2583.111499] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2583.115324] RSP: 002b:00007f29084def48 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 2583.116899] RAX: ffffffffffffffda RBX: 0000000020000440 RCX: 00007f290af69b19 [ 2583.118391] RDX: 0000000000004200 RSI: 0000000000000000 RDI: 00007f290afc30fb [ 2583.119905] RBP: 0000000000000004 R08: 0000000000002100 R09: ffffffffffffffff [ 2583.121404] R10: 0000000000000004 R11: 0000000000000246 R12: 0000000008100000 [ 2583.122912] R13: 0000000020000100 R14: 0000000000fffff0 R15: 0000000020000180 [ 2583.124548] hpet: Lost 1 RTC interrupts [ 2583.128887] EXT4-fs (loop2): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 2583.130798] EXT4-fs (loop2): group descriptors corrupted! [ 2583.158747] FAULT_INJECTION: forcing a failure. [ 2583.158747] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 2583.160538] EXT4-fs (loop5): mounted filesystem without journal. Opts: ,errors=continue [ 2583.161696] CPU: 0 PID: 13078 Comm: syz-executor.7 Not tainted 5.10.163 #1 [ 2583.164566] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2583.166345] Call Trace: [ 2583.166926] dump_stack+0x107/0x167 [ 2583.167706] should_fail.cold+0x5/0xa [ 2583.168531] iov_iter_copy_from_user_atomic+0x49b/0xdb0 [ 2583.169652] ? shmem_write_begin+0xf7/0x1d0 [ 2583.170576] ? shmem_write_begin+0x100/0x1d0 [ 2583.171505] generic_perform_write+0x279/0x4f0 [ 2583.172466] ? __mnt_drop_write_file+0x9/0x70 [ 2583.173412] ? trace_event_raw_event_file_check_and_advance_wb_err+0x4a0/0x4a0 [ 2583.174966] ? evict_inodes+0x420/0x420 [ 2583.175805] ? generic_write_checks+0x2ad/0x390 [ 2583.176785] __generic_file_write_iter+0x39d/0x5d0 [ 2583.177817] generic_file_write_iter+0xdb/0x230 [ 2583.178808] ? iov_iter_init+0x3c/0x130 [ 2583.179647] new_sync_write+0x42c/0x660 [ 2583.180478] ? new_sync_read+0x6f0/0x6f0 [ 2583.181328] ? __x64_sys_pwrite64+0x201/0x260 [ 2583.182275] ? lock_release+0x6b0/0x6b0 [ 2583.183113] ? selinux_file_permission+0x36/0x510 [ 2583.184139] vfs_write+0x747/0xa30 [ 2583.184895] __x64_sys_pwrite64+0x201/0x260 [ 2583.185792] ? ksys_pwrite64+0x1b0/0x1b0 [ 2583.186654] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 2583.187757] ? syscall_enter_from_user_mode+0x1d/0x50 [ 2583.188798] do_syscall_64+0x33/0x40 [ 2583.189579] entry_SYSCALL_64_after_hwframe+0x61/0xc6 [ 2583.190663] RIP: 0033:0x7fca423b8ab7 [ 2583.191442] Code: 08 89 3c 24 48 89 4c 24 18 e8 e5 f8 ff ff 4c 8b 54 24 18 48 8b 54 24 10 41 89 c0 48 8b 74 24 08 8b 3c 24 b8 12 00 00 00 0f 05 <48> 3d 00 f0 ff ff 77 31 44 89 c7 48 89 04 24 e8 15 f9 ff ff 48 8b [ 2583.195253] RSP: 002b:00007fca3f97af20 EFLAGS: 00000293 ORIG_RAX: 0000000000000012 [ 2583.196844] RAX: ffffffffffffffda RBX: 00007fca4244f970 RCX: 00007fca423b8ab7 [ 2583.198329] RDX: 0000000000000009 RSI: 0000000020010400 RDI: 0000000000000004 [ 2583.199826] RBP: 0000000000000004 R08: 0000000000000000 R09: ffffffffffffffff [ 2583.201316] R10: 0000000000000800 R11: 0000000000000293 R12: 0000000000000004 [ 2583.202818] R13: 0000000000000004 R14: 0000000020000470 R15: 0000000000000002 [ 2583.204457] hpet: Lost 1 RTC interrupts [ 2583.225580] EXT4-fs (loop1): unsupported inode size: 0 [ 2583.226946] EXT4-fs (loop1): blocksize: 2048 12:45:36 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000180)) (fail_nth: 19) 12:45:36 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000180)) [ 2583.253807] EXT4-fs error (device loop4): ext4_fill_super:4959: inode #2: comm syz-executor.4: iget: root inode unallocated [ 2583.259586] EXT4-fs (loop4): get root inode failed [ 2583.260892] EXT4-fs (loop4): mount failed 12:45:36 executing program 0: r0 = creat(&(0x7f0000000040)='./file0\x00', 0x0) r1 = creat(&(0x7f0000000040)='./file0\x00', 0x0) fallocate(r1, 0x0, 0x0, 0x8800000) fallocate(r1, 0x3, 0x0, 0x8000) fallocate(r0, 0x0, 0x0, 0x8801200) 12:45:36 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000180)) 12:45:36 executing program 3: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_init_net_socket$802154_raw(0x24, 0x3, 0x0) sendmmsg$inet6(r0, &(0x7f0000004d00)=[{{0x0, 0x0, &(0x7f00000004c0), 0x0, 0x0, 0xfffffdef}}], 0x1, 0x0) 12:45:36 executing program 4: ioctl$RTC_UIE_ON(0xffffffffffffffff, 0x7003) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x2}, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0xfffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = dup2(0xffffffffffffffff, r0) perf_event_open(&(0x7f00000001c0)={0x2, 0x80, 0x8, 0x9, 0x4, 0x1, 0x0, 0x3b3d, 0x200a0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x2, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0xffff, 0x1, @perf_config_ext={0x7, 0x1}, 0x281, 0xffffffff, 0x4, 0x3, 0x401, 0xffffff47, 0x401, 0x0, 0x3, 0x0, 0x415}, 0x0, 0xffffffffffffffff, r0, 0x1) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d}], 0x0, &(0x7f0000000180)) pkey_mprotect(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x0, 0xffffffffffffffff) pkey_mprotect(&(0x7f0000ff4000/0x4000)=nil, 0x4000, 0x0, 0xffffffffffffffff) socket$inet_udp(0x2, 0x2, 0x0) getsockopt$inet_int(0xffffffffffffffff, 0x0, 0xe, 0x0, &(0x7f0000000280)) ioctl$sock_SIOCADDDLCI(0xffffffffffffffff, 0x8980, 0x0) ioctl$RTC_ALM_SET(r1, 0x40247007, 0x0) mmap$IORING_OFF_SQES(&(0x7f0000ff3000/0x2000)=nil, 0x2000, 0x2000002, 0x10, r1, 0x10000000) getsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, 0x0, 0x0) 12:45:36 executing program 6: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000180)) (fail_nth: 5) [ 2583.416181] EXT4-fs (loop7): mounted filesystem without journal. Opts: ,errors=continue 12:45:36 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000180)) 12:45:36 executing program 7: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000180)) (fail_nth: 17) [ 2583.478051] FAULT_INJECTION: forcing a failure. [ 2583.478051] name failslab, interval 1, probability 0, space 0, times 0 [ 2583.480320] CPU: 1 PID: 13092 Comm: syz-executor.5 Not tainted 5.10.163 #1 [ 2583.481709] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2583.483403] Call Trace: [ 2583.483945] dump_stack+0x107/0x167 [ 2583.484688] should_fail.cold+0x5/0xa [ 2583.485461] ? __memcg_kmem_charge+0x68/0x140 [ 2583.486369] ? create_object.isra.0+0x3a/0xa20 [ 2583.487364] should_failslab+0x5/0x20 [ 2583.488138] kmem_cache_alloc+0x5b/0x360 [ 2583.488970] create_object.isra.0+0x3a/0xa20 [ 2583.489861] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 2583.490932] kmem_cache_alloc+0x159/0x360 [ 2583.491774] ? trace_hardirqs_on+0x5b/0x180 [ 2583.492659] xas_alloc+0x336/0x440 [ 2583.493382] xas_create+0x60b/0x1040 [ 2583.494173] xas_create_range+0x18b/0x600 [ 2583.495033] shmem_add_to_page_cache+0x759/0x1150 [ 2583.496025] ? shmem_getattr+0x180/0x180 [ 2583.496873] shmem_getpage_gfp.constprop.0+0x64a/0x1920 [ 2583.497968] ? shmem_unuse_inode+0xed0/0xed0 [ 2583.498879] ? ktime_get_coarse_real_ts64+0x15a/0x190 [ 2583.499919] ? iov_iter_fault_in_readable+0x9a/0x410 [ 2583.500948] shmem_write_begin+0xf7/0x1d0 [ 2583.501801] generic_perform_write+0x20a/0x4f0 [ 2583.502760] ? trace_event_raw_event_file_check_and_advance_wb_err+0x4a0/0x4a0 [ 2583.504268] ? evict_inodes+0x420/0x420 [ 2583.505085] ? generic_write_checks+0x2ad/0x390 [ 2583.506040] __generic_file_write_iter+0x39d/0x5d0 [ 2583.507046] generic_file_write_iter+0xdb/0x230 [ 2583.507986] ? iov_iter_init+0x3c/0x130 [ 2583.508807] new_sync_write+0x42c/0x660 [ 2583.509619] ? new_sync_read+0x6f0/0x6f0 [ 2583.510457] ? __x64_sys_pwrite64+0x201/0x260 [ 2583.511391] ? lock_release+0x6b0/0x6b0 [ 2583.512212] ? selinux_file_permission+0x36/0x510 [ 2583.513214] vfs_write+0x747/0xa30 [ 2583.513952] __x64_sys_pwrite64+0x201/0x260 [ 2583.514844] ? ksys_pwrite64+0x1b0/0x1b0 [ 2583.515678] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 2583.516742] ? syscall_enter_from_user_mode+0x1d/0x50 [ 2583.517800] do_syscall_64+0x33/0x40 [ 2583.518613] entry_SYSCALL_64_after_hwframe+0x61/0xc6 [ 2583.519712] RIP: 0033:0x7f8cf17d3ab7 [ 2583.520453] Code: 08 89 3c 24 48 89 4c 24 18 e8 e5 f8 ff ff 4c 8b 54 24 18 48 8b 54 24 10 41 89 c0 48 8b 74 24 08 8b 3c 24 b8 12 00 00 00 0f 05 <48> 3d 00 f0 ff ff 77 31 44 89 c7 48 89 04 24 e8 15 f9 ff ff 48 8b [ 2583.524137] RSP: 002b:00007f8ceed95f20 EFLAGS: 00000293 ORIG_RAX: 0000000000000012 [ 2583.525660] RAX: ffffffffffffffda RBX: 00007f8cf186a970 RCX: 00007f8cf17d3ab7 [ 2583.527102] RDX: 000000000000001d RSI: 0000000020011600 RDI: 0000000000000004 [ 2583.528540] RBP: 0000000000000004 R08: 0000000000000000 R09: ffffffffffffffff [ 2583.529978] R10: 0000000000002100 R11: 0000000000000293 R12: 0000000000000004 [ 2583.531435] R13: 0000000000000004 R14: 0000000020000488 R15: 0000000000000003 12:45:36 executing program 0: r0 = creat(&(0x7f0000000040)='./file0\x00', 0x0) r1 = creat(&(0x7f0000000040)='./file0\x00', 0x0) fallocate(r1, 0x0, 0x0, 0x8800000) fallocate(r1, 0x3, 0x0, 0x8000) fallocate(r0, 0x0, 0x0, 0x8802000) [ 2583.665340] FAULT_INJECTION: forcing a failure. [ 2583.665340] name failslab, interval 1, probability 0, space 0, times 0 [ 2583.667733] CPU: 0 PID: 13105 Comm: syz-executor.6 Not tainted 5.10.163 #1 [ 2583.669133] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2583.670872] Call Trace: [ 2583.671410] dump_stack+0x107/0x167 [ 2583.672169] should_fail.cold+0x5/0xa [ 2583.672963] ? create_object.isra.0+0x3a/0xa20 [ 2583.673895] should_failslab+0x5/0x20 [ 2583.674695] kmem_cache_alloc+0x5b/0x360 [ 2583.675574] create_object.isra.0+0x3a/0xa20 [ 2583.676474] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 2583.677529] kmem_cache_alloc+0x159/0x360 [ 2583.678393] ? shmem_destroy_inode+0x70/0x70 [ 2583.679322] shmem_alloc_inode+0x18/0x40 [ 2583.680159] ? shmem_destroy_inode+0x70/0x70 [ 2583.681056] alloc_inode+0x63/0x240 [ 2583.681806] new_inode+0x23/0x250 [ 2583.682540] shmem_get_inode+0x15e/0xbc0 [ 2583.683403] __shmem_file_setup+0xb8/0x320 [ 2583.684285] ? _copy_from_user+0xfb/0x1b0 [ 2583.685147] __do_sys_memfd_create+0x275/0x450 [ 2583.686105] ? memfd_file_seals_ptr+0x170/0x170 [ 2583.687093] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 2583.688179] ? syscall_enter_from_user_mode+0x1d/0x50 [ 2583.689271] do_syscall_64+0x33/0x40 [ 2583.690045] entry_SYSCALL_64_after_hwframe+0x61/0xc6 [ 2583.691110] RIP: 0033:0x7f290af69b19 [ 2583.691881] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2583.695682] RSP: 002b:00007f29084def48 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 2583.697262] RAX: ffffffffffffffda RBX: 0000000020000440 RCX: 00007f290af69b19 [ 2583.698769] RDX: 0000000000004200 RSI: 0000000000000000 RDI: 00007f290afc30fb [ 2583.700247] RBP: 0000000000000004 R08: 0000000000002100 R09: ffffffffffffffff [ 2583.701706] R10: 0000000000000004 R11: 0000000000000246 R12: 0000000008100000 [ 2583.703175] R13: 0000000020000100 R14: 0000000000fffff0 R15: 0000000020000180 [ 2583.704781] hpet: Lost 1 RTC interrupts [ 2583.739543] EXT4-fs (loop5): mounted filesystem without journal. Opts: ,errors=continue [ 2583.754189] EXT4-fs (loop1): VFS: Can't find ext4 filesystem [ 2583.792594] EXT4-fs (loop2): bad geometry: block count 128 exceeds size of device (8 blocks) [ 2583.802118] FAULT_INJECTION: forcing a failure. [ 2583.802118] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 2583.804621] CPU: 0 PID: 13114 Comm: syz-executor.7 Not tainted 5.10.163 #1 [ 2583.806059] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2583.807768] Call Trace: [ 2583.808318] dump_stack+0x107/0x167 [ 2583.809072] should_fail.cold+0x5/0xa [ 2583.809865] __alloc_pages_nodemask+0x182/0x680 [ 2583.810852] ? __alloc_pages_slowpath.constprop.0+0x2220/0x2220 [ 2583.812084] ? lock_downgrade+0x6d0/0x6d0 [ 2583.812962] alloc_pages_vma+0xbb/0x410 [ 2583.813795] shmem_alloc_page+0x10f/0x1e0 [ 2583.814668] ? shmem_init_inode+0x20/0x20 [ 2583.815593] ? percpu_counter_add_batch+0x8b/0x140 [ 2583.816627] ? __vm_enough_memory+0x184/0x360 [ 2583.817564] shmem_getpage_gfp.constprop.0+0x512/0x1920 [ 2583.818703] ? shmem_unuse_inode+0xed0/0xed0 [ 2583.819617] ? ktime_get_coarse_real_ts64+0x15a/0x190 [ 2583.820683] ? iov_iter_fault_in_readable+0x9a/0x410 [ 2583.821740] shmem_write_begin+0xf7/0x1d0 [ 2583.822627] generic_perform_write+0x20a/0x4f0 [ 2583.823591] ? trace_event_raw_event_file_check_and_advance_wb_err+0x4a0/0x4a0 [ 2583.825104] ? evict_inodes+0x420/0x420 [ 2583.825937] ? generic_write_checks+0x2ad/0x390 [ 2583.826921] __generic_file_write_iter+0x39d/0x5d0 [ 2583.827945] generic_file_write_iter+0xdb/0x230 [ 2583.828904] ? iov_iter_init+0x3c/0x130 [ 2583.829731] new_sync_write+0x42c/0x660 [ 2583.830568] ? new_sync_read+0x6f0/0x6f0 [ 2583.831408] ? __x64_sys_pwrite64+0x201/0x260 [ 2583.832341] ? lock_release+0x6b0/0x6b0 [ 2583.833159] ? selinux_file_permission+0x36/0x510 [ 2583.834182] vfs_write+0x747/0xa30 [ 2583.834929] __x64_sys_pwrite64+0x201/0x260 [ 2583.835792] ? ksys_pwrite64+0x1b0/0x1b0 [ 2583.836626] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 2583.837674] ? syscall_enter_from_user_mode+0x1d/0x50 [ 2583.838747] do_syscall_64+0x33/0x40 [ 2583.839507] entry_SYSCALL_64_after_hwframe+0x61/0xc6 [ 2583.840556] RIP: 0033:0x7fca423b8ab7 [ 2583.841320] Code: 08 89 3c 24 48 89 4c 24 18 e8 e5 f8 ff ff 4c 8b 54 24 18 48 8b 54 24 10 41 89 c0 48 8b 74 24 08 8b 3c 24 b8 12 00 00 00 0f 05 <48> 3d 00 f0 ff ff 77 31 44 89 c7 48 89 04 24 e8 15 f9 ff ff 48 8b [ 2583.845123] RSP: 002b:00007fca3f97af20 EFLAGS: 00000293 ORIG_RAX: 0000000000000012 [ 2583.846698] RAX: ffffffffffffffda RBX: 00007fca4244f970 RCX: 00007fca423b8ab7 [ 2583.848157] RDX: 000000000000001d RSI: 0000000020011600 RDI: 0000000000000004 [ 2583.849628] RBP: 0000000000000004 R08: 0000000000000000 R09: ffffffffffffffff [ 2583.851103] R10: 0000000000002100 R11: 0000000000000293 R12: 0000000000000004 [ 2583.852555] R13: 0000000000000004 R14: 0000000020000488 R15: 0000000000000003 [ 2583.854162] hpet: Lost 2 RTC interrupts 12:45:36 executing program 3: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_init_net_socket$802154_raw(0x24, 0x3, 0x0) sendmmsg$inet6(r0, &(0x7f0000004d00)=[{{0x0, 0x0, &(0x7f00000004c0), 0x0, 0x0, 0xffffff7f}}], 0x1, 0x0) [ 2583.935610] EXT4-fs (loop6): mounted filesystem without journal. Opts: ,errors=continue [ 2583.948386] EXT4-fs error (device loop4): ext4_fill_super:4959: inode #2: comm syz-executor.4: iget: root inode unallocated [ 2583.957241] EXT4-fs error (device loop7): ext4_fill_super:4959: inode #2: comm syz-executor.7: iget: root inode unallocated [ 2583.987558] EXT4-fs (loop7): get root inode failed [ 2583.988793] EXT4-fs (loop7): mount failed [ 2583.990218] EXT4-fs (loop4): get root inode failed [ 2583.992162] EXT4-fs (loop4): mount failed 12:45:53 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000180)) (fail_nth: 20) 12:45:53 executing program 4: ioctl$RTC_UIE_ON(0xffffffffffffffff, 0x7003) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x2}, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0xfffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = dup2(0xffffffffffffffff, r0) perf_event_open(&(0x7f00000001c0)={0x2, 0x80, 0x8, 0x9, 0x4, 0x1, 0x0, 0x3b3d, 0x200a0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x2, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0xffff, 0x1, @perf_config_ext={0x7, 0x1}, 0x281, 0xffffffff, 0x4, 0x3, 0x401, 0xffffff47, 0x401, 0x0, 0x3, 0x0, 0x415}, 0x0, 0xffffffffffffffff, r0, 0x1) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000180)) pkey_mprotect(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x0, 0xffffffffffffffff) pkey_mprotect(&(0x7f0000ff4000/0x4000)=nil, 0x4000, 0x0, 0xffffffffffffffff) socket$inet_udp(0x2, 0x2, 0x0) getsockopt$inet_int(0xffffffffffffffff, 0x0, 0xe, 0x0, &(0x7f0000000280)) ioctl$sock_SIOCADDDLCI(0xffffffffffffffff, 0x8980, 0x0) ioctl$RTC_ALM_SET(r1, 0x40247007, 0x0) mmap$IORING_OFF_SQES(&(0x7f0000ff3000/0x2000)=nil, 0x2000, 0x2000002, 0x10, r1, 0x10000000) getsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, 0x0, 0x0) 12:45:53 executing program 0: r0 = creat(&(0x7f0000000040)='./file0\x00', 0x0) r1 = creat(&(0x7f0000000040)='./file0\x00', 0x0) fallocate(r1, 0x0, 0x0, 0x8800000) fallocate(r1, 0x3, 0x0, 0x8000) fallocate(r0, 0x0, 0x0, 0x8802103) 12:45:53 executing program 6: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000180)) (fail_nth: 6) 12:45:53 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000180)) 12:45:53 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000180)) 12:45:53 executing program 7: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000180)) (fail_nth: 18) 12:45:53 executing program 3: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_init_net_socket$802154_raw(0x24, 0x3, 0x0) sendmmsg$inet6(r0, &(0x7f0000004d00)=[{{0x0, 0x0, &(0x7f00000004c0), 0x0, 0x0, 0x4000000000000}}], 0x1, 0x0) [ 2601.231411] FAULT_INJECTION: forcing a failure. [ 2601.231411] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 2601.234091] CPU: 0 PID: 13137 Comm: syz-executor.5 Not tainted 5.10.163 #1 [ 2601.235639] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2601.237490] Call Trace: [ 2601.238095] dump_stack+0x107/0x167 [ 2601.238927] should_fail.cold+0x5/0xa [ 2601.239811] iov_iter_copy_from_user_atomic+0x49b/0xdb0 [ 2601.241010] ? shmem_write_begin+0xf7/0x1d0 [ 2601.241984] ? shmem_write_begin+0x100/0x1d0 [ 2601.243020] generic_perform_write+0x279/0x4f0 [ 2601.244083] ? trace_event_raw_event_file_check_and_advance_wb_err+0x4a0/0x4a0 [ 2601.245724] ? evict_inodes+0x420/0x420 [ 2601.246650] ? generic_write_checks+0x2ad/0x390 [ 2601.247726] __generic_file_write_iter+0x39d/0x5d0 [ 2601.248821] generic_file_write_iter+0xdb/0x230 [ 2601.249785] ? iov_iter_init+0x3c/0x130 [ 2601.250610] new_sync_write+0x42c/0x660 [ 2601.251448] ? new_sync_read+0x6f0/0x6f0 [ 2601.252298] ? __x64_sys_pwrite64+0x201/0x260 [ 2601.253230] ? lock_release+0x6b0/0x6b0 [ 2601.254056] ? selinux_file_permission+0x36/0x510 [ 2601.255105] vfs_write+0x747/0xa30 [ 2601.255848] __x64_sys_pwrite64+0x201/0x260 [ 2601.256743] ? ksys_pwrite64+0x1b0/0x1b0 [ 2601.257584] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 2601.258827] ? syscall_enter_from_user_mode+0x1d/0x50 [ 2601.259998] do_syscall_64+0x33/0x40 [ 2601.260849] entry_SYSCALL_64_after_hwframe+0x61/0xc6 [ 2601.262007] RIP: 0033:0x7f8cf17d3ab7 [ 2601.262873] Code: 08 89 3c 24 48 89 4c 24 18 e8 e5 f8 ff ff 4c 8b 54 24 18 48 8b 54 24 10 41 89 c0 48 8b 74 24 08 8b 3c 24 b8 12 00 00 00 0f 05 <48> 3d 00 f0 ff ff 77 31 44 89 c7 48 89 04 24 e8 15 f9 ff ff 48 8b [ 2601.267050] RSP: 002b:00007f8ceed95f20 EFLAGS: 00000293 ORIG_RAX: 0000000000000012 [ 2601.268683] RAX: ffffffffffffffda RBX: 00007f8cf186a970 RCX: 00007f8cf17d3ab7 [ 2601.270170] RDX: 000000000000001d RSI: 0000000020011600 RDI: 0000000000000004 [ 2601.271656] RBP: 0000000000000004 R08: 0000000000000000 R09: ffffffffffffffff [ 2601.273138] R10: 0000000000002100 R11: 0000000000000293 R12: 0000000000000004 [ 2601.274623] R13: 0000000000000004 R14: 0000000020000488 R15: 0000000000000003 [ 2601.276331] hpet: Lost 2 RTC interrupts [ 2601.328149] FAULT_INJECTION: forcing a failure. [ 2601.328149] name failslab, interval 1, probability 0, space 0, times 0 [ 2601.330669] CPU: 0 PID: 13147 Comm: syz-executor.7 Not tainted 5.10.163 #1 [ 2601.332285] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2601.334156] Call Trace: [ 2601.334772] dump_stack+0x107/0x167 [ 2601.335605] should_fail.cold+0x5/0xa [ 2601.336473] ? xas_alloc+0x336/0x440 [ 2601.337317] should_failslab+0x5/0x20 [ 2601.338177] kmem_cache_alloc+0x5b/0x360 [ 2601.339118] ? __lockdep_reset_lock+0x180/0x180 [ 2601.340165] xas_alloc+0x336/0x440 [ 2601.340972] xas_create+0x60b/0x1040 [ 2601.341837] xas_create_range+0x18b/0x600 [ 2601.342800] shmem_add_to_page_cache+0x759/0x1150 [ 2601.343907] ? shmem_getattr+0x180/0x180 [ 2601.344854] shmem_getpage_gfp.constprop.0+0x64a/0x1920 [ 2601.346078] ? shmem_unuse_inode+0xed0/0xed0 [ 2601.347080] ? ktime_get_coarse_real_ts64+0x15a/0x190 [ 2601.348250] ? iov_iter_fault_in_readable+0x9a/0x410 [ 2601.349399] shmem_write_begin+0xf7/0x1d0 [ 2601.350346] generic_perform_write+0x20a/0x4f0 [ 2601.351410] ? trace_event_raw_event_file_check_and_advance_wb_err+0x4a0/0x4a0 [ 2601.353046] ? evict_inodes+0x420/0x420 [ 2601.353947] ? generic_write_checks+0x2ad/0x390 [ 2601.355008] __generic_file_write_iter+0x39d/0x5d0 [ 2601.356111] generic_file_write_iter+0xdb/0x230 [ 2601.357158] ? iov_iter_init+0x3c/0x130 [ 2601.358058] new_sync_write+0x42c/0x660 [ 2601.358956] ? new_sync_read+0x6f0/0x6f0 [ 2601.359878] ? __x64_sys_pwrite64+0x201/0x260 [ 2601.360618] EXT4-fs (loop5): mounted filesystem without journal. Opts: ,errors=continue [ 2601.360891] ? lock_release+0x6b0/0x6b0 [ 2601.363298] ? selinux_file_permission+0x36/0x510 [ 2601.364422] vfs_write+0x747/0xa30 [ 2601.365242] __x64_sys_pwrite64+0x201/0x260 [ 2601.366237] ? ksys_pwrite64+0x1b0/0x1b0 [ 2601.367163] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 2601.368342] ? syscall_enter_from_user_mode+0x1d/0x50 [ 2601.369498] do_syscall_64+0x33/0x40 [ 2601.370340] entry_SYSCALL_64_after_hwframe+0x61/0xc6 [ 2601.371522] RIP: 0033:0x7fca423b8ab7 [ 2601.372357] Code: 08 89 3c 24 48 89 4c 24 18 e8 e5 f8 ff ff 4c 8b 54 24 18 48 8b 54 24 10 41 89 c0 48 8b 74 24 08 8b 3c 24 b8 12 00 00 00 0f 05 <48> 3d 00 f0 ff ff 77 31 44 89 c7 48 89 04 24 e8 15 f9 ff ff 48 8b [ 2601.376460] RSP: 002b:00007fca3f97af20 EFLAGS: 00000293 ORIG_RAX: 0000000000000012 [ 2601.378175] RAX: ffffffffffffffda RBX: 00007fca4244f970 RCX: 00007fca423b8ab7 [ 2601.379774] RDX: 000000000000001d RSI: 0000000020011600 RDI: 0000000000000004 [ 2601.381362] RBP: 0000000000000004 R08: 0000000000000000 R09: ffffffffffffffff [ 2601.382962] R10: 0000000000002100 R11: 0000000000000293 R12: 0000000000000004 [ 2601.384556] R13: 0000000000000004 R14: 0000000020000488 R15: 0000000000000003 [ 2601.386452] hpet: Lost 3 RTC interrupts [ 2601.399768] FAULT_INJECTION: forcing a failure. [ 2601.399768] name failslab, interval 1, probability 0, space 0, times 0 [ 2601.401752] CPU: 1 PID: 13157 Comm: syz-executor.6 Not tainted 5.10.163 #1 [ 2601.402950] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2601.404345] Call Trace: [ 2601.404793] dump_stack+0x107/0x167 [ 2601.405417] should_fail.cold+0x5/0xa [ 2601.406069] ? security_inode_alloc+0x34/0x160 [ 2601.406848] should_failslab+0x5/0x20 [ 2601.407487] kmem_cache_alloc+0x5b/0x360 [ 2601.408176] security_inode_alloc+0x34/0x160 [ 2601.408924] inode_init_always+0xa4e/0xd10 [ 2601.409844] ? shmem_destroy_inode+0x70/0x70 [ 2601.410790] alloc_inode+0x84/0x240 [ 2601.411566] new_inode+0x23/0x250 [ 2601.412309] shmem_get_inode+0x15e/0xbc0 [ 2601.413176] __shmem_file_setup+0xb8/0x320 [ 2601.414075] ? _copy_from_user+0xfb/0x1b0 [ 2601.414972] __do_sys_memfd_create+0x275/0x450 [ 2601.415941] ? memfd_file_seals_ptr+0x170/0x170 [ 2601.416951] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 2601.418059] ? syscall_enter_from_user_mode+0x1d/0x50 [ 2601.419157] do_syscall_64+0x33/0x40 [ 2601.419941] entry_SYSCALL_64_after_hwframe+0x61/0xc6 [ 2601.421027] RIP: 0033:0x7f290af69b19 [ 2601.421813] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2601.425789] RSP: 002b:00007f29084def48 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 2601.427419] RAX: ffffffffffffffda RBX: 0000000020000440 RCX: 00007f290af69b19 [ 2601.428945] RDX: 0000000000004200 RSI: 0000000000000000 RDI: 00007f290afc30fb [ 2601.430460] RBP: 0000000000000004 R08: 0000000000002100 R09: ffffffffffffffff [ 2601.431966] R10: 0000000000000004 R11: 0000000000000246 R12: 0000000008100000 [ 2601.433466] R13: 0000000020000100 R14: 0000000000fffff0 R15: 0000000020000180 [ 2601.448663] EXT4-fs (loop2): bad geometry: block count 128 exceeds size of device (8 blocks) [ 2601.465588] EXT4-fs (loop1): VFS: Can't find ext4 filesystem [ 2601.506001] EXT4-fs (loop7): mounted filesystem without journal. Opts: ,errors=continue 12:45:54 executing program 7: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000180)) (fail_nth: 19) 12:45:54 executing program 3: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_init_net_socket$802154_raw(0x24, 0x3, 0x0) sendmmsg$inet6(r0, &(0x7f0000004d00)=[{{0x0, 0x0, &(0x7f00000004c0), 0x0, 0x0, 0x7f00000000000000}}], 0x1, 0x0) 12:45:54 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000180)) (fail_nth: 21) [ 2601.588374] EXT4-fs (loop4): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 2601.591309] EXT4-fs (loop4): group descriptors corrupted! [ 2601.757174] FAULT_INJECTION: forcing a failure. [ 2601.757174] name failslab, interval 1, probability 0, space 0, times 0 [ 2601.758801] CPU: 0 PID: 13169 Comm: syz-executor.7 Not tainted 5.10.163 #1 [ 2601.759847] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2601.761111] Call Trace: [ 2601.761509] dump_stack+0x107/0x167 [ 2601.762037] should_fail.cold+0x5/0xa [ 2601.762588] ? __memcg_kmem_charge+0x68/0x140 [ 2601.763227] ? create_object.isra.0+0x3a/0xa20 [ 2601.763875] should_failslab+0x5/0x20 [ 2601.764408] kmem_cache_alloc+0x5b/0x360 [ 2601.764986] create_object.isra.0+0x3a/0xa20 [ 2601.765657] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 2601.766369] kmem_cache_alloc+0x159/0x360 [ 2601.767000] ? trace_hardirqs_on+0x5b/0x180 [ 2601.767618] xas_alloc+0x336/0x440 [ 2601.768162] xas_create+0x60b/0x1040 [ 2601.768697] xas_create_range+0x18b/0x600 [ 2601.769315] shmem_add_to_page_cache+0x759/0x1150 [ 2601.770006] ? shmem_getattr+0x180/0x180 [ 2601.770591] shmem_getpage_gfp.constprop.0+0x64a/0x1920 [ 2601.771363] ? shmem_unuse_inode+0xed0/0xed0 [ 2601.772039] ? ktime_get_coarse_real_ts64+0x15a/0x190 [ 2601.772781] ? iov_iter_fault_in_readable+0x9a/0x410 [ 2601.773496] shmem_write_begin+0xf7/0x1d0 [ 2601.774083] generic_perform_write+0x20a/0x4f0 [ 2601.774763] ? trace_event_raw_event_file_check_and_advance_wb_err+0x4a0/0x4a0 [ 2601.775784] ? evict_inodes+0x420/0x420 [ 2601.776342] ? generic_write_checks+0x2ad/0x390 [ 2601.777014] __generic_file_write_iter+0x39d/0x5d0 [ 2601.777716] generic_file_write_iter+0xdb/0x230 [ 2601.778392] ? iov_iter_init+0x3c/0x130 [ 2601.778957] new_sync_write+0x42c/0x660 [ 2601.779562] ? new_sync_read+0x6f0/0x6f0 [ 2601.780161] ? __x64_sys_pwrite64+0x201/0x260 [ 2601.780839] ? lock_release+0x6b0/0x6b0 [ 2601.781401] ? selinux_file_permission+0x36/0x510 [ 2601.782149] vfs_write+0x747/0xa30 [ 2601.782653] __x64_sys_pwrite64+0x201/0x260 [ 2601.783258] ? ksys_pwrite64+0x1b0/0x1b0 [ 2601.783829] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 2601.784586] ? syscall_enter_from_user_mode+0x1d/0x50 [ 2601.785316] do_syscall_64+0x33/0x40 [ 2601.785843] entry_SYSCALL_64_after_hwframe+0x61/0xc6 [ 2601.786552] RIP: 0033:0x7fca423b8ab7 [ 2601.787120] Code: 08 89 3c 24 48 89 4c 24 18 e8 e5 f8 ff ff 4c 8b 54 24 18 48 8b 54 24 10 41 89 c0 48 8b 74 24 08 8b 3c 24 b8 12 00 00 00 0f 05 <48> 3d 00 f0 ff ff 77 31 44 89 c7 48 89 04 24 e8 15 f9 ff ff 48 8b [ 2601.789922] RSP: 002b:00007fca3f97af20 EFLAGS: 00000293 ORIG_RAX: 0000000000000012 [ 2601.790988] RAX: ffffffffffffffda RBX: 00007fca4244f970 RCX: 00007fca423b8ab7 [ 2601.791972] RDX: 000000000000001d RSI: 0000000020011600 RDI: 0000000000000004 [ 2601.792957] RBP: 0000000000000004 R08: 0000000000000000 R09: ffffffffffffffff [ 2601.794030] R10: 0000000000002100 R11: 0000000000000293 R12: 0000000000000004 [ 2601.795089] R13: 0000000000000004 R14: 0000000020000488 R15: 0000000000000003 [ 2601.796249] hpet: Lost 1 RTC interrupts [ 2601.807653] FAULT_INJECTION: forcing a failure. [ 2601.807653] name failslab, interval 1, probability 0, space 0, times 0 [ 2601.810685] CPU: 1 PID: 13170 Comm: syz-executor.5 Not tainted 5.10.163 #1 [ 2601.812475] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2601.814456] Call Trace: [ 2601.815073] dump_stack+0x107/0x167 [ 2601.815979] should_fail.cold+0x5/0xa [ 2601.816874] ? getname_flags.part.0+0x50/0x4f0 [ 2601.817930] should_failslab+0x5/0x20 [ 2601.818833] kmem_cache_alloc+0x5b/0x360 [ 2601.819862] getname_flags.part.0+0x50/0x4f0 [ 2601.821013] getname+0x8e/0xd0 [ 2601.821860] do_sys_openat2+0xf9/0x420 [ 2601.822846] ? build_open_flags+0x6f0/0x6f0 [ 2601.823924] ? rcu_read_lock_any_held+0x75/0xa0 [ 2601.825163] __x64_sys_openat+0x13f/0x1f0 [ 2601.826183] ? __ia32_sys_open+0x1c0/0x1c0 [ 2601.827354] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 2601.828658] ? syscall_enter_from_user_mode+0x1d/0x50 [ 2601.829952] do_syscall_64+0x33/0x40 [ 2601.830945] entry_SYSCALL_64_after_hwframe+0x61/0xc6 [ 2601.832260] RIP: 0033:0x7f8cf17d3a04 [ 2601.833315] Code: 84 00 00 00 00 00 44 89 54 24 0c e8 96 f9 ff ff 44 8b 54 24 0c 44 89 e2 48 89 ee 41 89 c0 bf 9c ff ff ff b8 01 01 00 00 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 89 44 24 0c e8 c8 f9 ff ff 8b 44 [ 2601.838073] RSP: 002b:00007f8ceed95ed0 EFLAGS: 00000293 ORIG_RAX: 0000000000000101 [ 2601.840109] RAX: ffffffffffffffda RBX: 00007f8cf186a970 RCX: 00007f8cf17d3a04 [ 2601.841930] RDX: 0000000000000002 RSI: 00007f8ceed96000 RDI: 00000000ffffff9c [ 2601.843753] RBP: 00007f8ceed96000 R08: 0000000000000000 R09: ffffffffffffffff [ 2601.845477] R10: 0000000000000000 R11: 0000000000000293 R12: 0000000000000002 [ 2601.847238] R13: 0000000000000004 R14: 00000000200004a0 R15: 0000000000000004 [ 2601.863658] EXT4-fs (loop7): mounted filesystem without journal. Opts: ,errors=continue 12:46:10 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000180)) (fail_nth: 22) 12:46:10 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000180)) 12:46:10 executing program 7: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000180)) (fail_nth: 20) 12:46:10 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000180)) 12:46:10 executing program 0: r0 = creat(&(0x7f0000000040)='./file0\x00', 0x0) r1 = creat(&(0x7f0000000040)='./file0\x00', 0x0) fallocate(r1, 0x0, 0x0, 0x8800000) fallocate(r1, 0x3, 0x0, 0x8000) fallocate(r0, 0x0, 0x0, 0x8806400) 12:46:10 executing program 6: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000180)) (fail_nth: 7) 12:46:10 executing program 4: ioctl$RTC_UIE_ON(0xffffffffffffffff, 0x7003) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x2}, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0xfffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = dup2(0xffffffffffffffff, r0) perf_event_open(&(0x7f00000001c0)={0x2, 0x80, 0x8, 0x9, 0x4, 0x1, 0x0, 0x3b3d, 0x200a0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x2, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0xffff, 0x1, @perf_config_ext={0x7, 0x1}, 0x281, 0xffffffff, 0x4, 0x3, 0x401, 0xffffff47, 0x401, 0x0, 0x3, 0x0, 0x415}, 0x0, 0xffffffffffffffff, r0, 0x1) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000180)) pkey_mprotect(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x0, 0xffffffffffffffff) pkey_mprotect(&(0x7f0000ff4000/0x4000)=nil, 0x4000, 0x0, 0xffffffffffffffff) socket$inet_udp(0x2, 0x2, 0x0) getsockopt$inet_int(0xffffffffffffffff, 0x0, 0xe, 0x0, &(0x7f0000000280)) ioctl$sock_SIOCADDDLCI(0xffffffffffffffff, 0x8980, 0x0) ioctl$RTC_ALM_SET(r1, 0x40247007, 0x0) mmap$IORING_OFF_SQES(&(0x7f0000ff3000/0x2000)=nil, 0x2000, 0x2000002, 0x10, r1, 0x10000000) getsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, 0x0, 0x0) 12:46:10 executing program 3: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_init_net_socket$802154_raw(0x24, 0x3, 0x0) sendmmsg$inet6(r0, &(0x7f0000004d00)=[{{0x0, 0x0, &(0x7f00000004c0), 0x0, 0x0, 0xeffdffff00000000}}], 0x1, 0x0) [ 2618.239298] FAULT_INJECTION: forcing a failure. [ 2618.239298] name failslab, interval 1, probability 0, space 0, times 0 [ 2618.241058] CPU: 1 PID: 13182 Comm: syz-executor.5 Not tainted 5.10.163 #1 [ 2618.242141] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2618.243428] Call Trace: [ 2618.243841] dump_stack+0x107/0x167 [ 2618.244398] should_fail.cold+0x5/0xa [ 2618.244981] ? create_object.isra.0+0x3a/0xa20 [ 2618.245685] should_failslab+0x5/0x20 [ 2618.246248] kmem_cache_alloc+0x5b/0x360 [ 2618.246865] ? __generic_file_write_iter+0x1a4/0x5d0 [ 2618.247640] create_object.isra.0+0x3a/0xa20 [ 2618.248084] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 2618.248593] kmem_cache_alloc+0x159/0x360 [ 2618.249053] getname_flags.part.0+0x50/0x4f0 [ 2618.249500] getname+0x8e/0xd0 [ 2618.249837] do_sys_openat2+0xf9/0x420 [ 2618.250237] ? build_open_flags+0x6f0/0x6f0 [ 2618.250708] ? rcu_read_lock_any_held+0x75/0xa0 [ 2618.251200] __x64_sys_openat+0x13f/0x1f0 [ 2618.251640] ? __ia32_sys_open+0x1c0/0x1c0 [ 2618.252086] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 2618.252654] ? syscall_enter_from_user_mode+0x1d/0x50 [ 2618.253205] do_syscall_64+0x33/0x40 [ 2618.253733] entry_SYSCALL_64_after_hwframe+0x61/0xc6 [ 2618.254277] RIP: 0033:0x7f8cf17d3a04 [ 2618.254677] Code: 84 00 00 00 00 00 44 89 54 24 0c e8 96 f9 ff ff 44 8b 54 24 0c 44 89 e2 48 89 ee 41 89 c0 bf 9c ff ff ff b8 01 01 00 00 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 89 44 24 0c e8 c8 f9 ff ff 8b 44 [ 2618.256690] RSP: 002b:00007f8ceed95ed0 EFLAGS: 00000293 ORIG_RAX: 0000000000000101 [ 2618.257539] RAX: ffffffffffffffda RBX: 00007f8cf186a970 RCX: 00007f8cf17d3a04 [ 2618.258327] RDX: 0000000000000002 RSI: 00007f8ceed96000 RDI: 00000000ffffff9c [ 2618.259143] RBP: 00007f8ceed96000 R08: 0000000000000000 R09: ffffffffffffffff [ 2618.259939] R10: 0000000000000000 R11: 0000000000000293 R12: 0000000000000002 [ 2618.260734] R13: 0000000000000004 R14: 00000000200004a0 R15: 0000000000000004 [ 2618.265696] FAULT_INJECTION: forcing a failure. [ 2618.265696] name failslab, interval 1, probability 0, space 0, times 0 [ 2618.267149] CPU: 1 PID: 13185 Comm: syz-executor.6 Not tainted 5.10.163 #1 [ 2618.267921] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2618.268848] Call Trace: [ 2618.269227] dump_stack+0x107/0x167 [ 2618.269639] should_fail.cold+0x5/0xa [ 2618.270064] ? create_object.isra.0+0x3a/0xa20 [ 2618.270568] should_failslab+0x5/0x20 [ 2618.271003] kmem_cache_alloc+0x5b/0x360 [ 2618.271458] create_object.isra.0+0x3a/0xa20 [ 2618.271950] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 2618.272466] kmem_cache_alloc+0x159/0x360 [ 2618.272928] security_inode_alloc+0x34/0x160 [ 2618.273411] inode_init_always+0xa4e/0xd10 [ 2618.273879] ? shmem_destroy_inode+0x70/0x70 [ 2618.274370] alloc_inode+0x84/0x240 [ 2618.274782] new_inode+0x23/0x250 [ 2618.275172] shmem_get_inode+0x15e/0xbc0 [ 2618.275633] __shmem_file_setup+0xb8/0x320 [ 2618.276100] ? _copy_from_user+0xfb/0x1b0 [ 2618.276570] __do_sys_memfd_create+0x275/0x450 [ 2618.277082] ? memfd_file_seals_ptr+0x170/0x170 [ 2618.277599] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 2618.278184] ? syscall_enter_from_user_mode+0x1d/0x50 [ 2618.278749] do_syscall_64+0x33/0x40 [ 2618.279156] entry_SYSCALL_64_after_hwframe+0x61/0xc6 [ 2618.279720] RIP: 0033:0x7f290af69b19 [ 2618.280096] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2618.282146] RSP: 002b:00007f29084def48 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 2618.282992] RAX: ffffffffffffffda RBX: 0000000020000440 RCX: 00007f290af69b19 [ 2618.283791] RDX: 0000000000004200 RSI: 0000000000000000 RDI: 00007f290afc30fb [ 2618.284581] RBP: 0000000000000004 R08: 0000000000002100 R09: ffffffffffffffff [ 2618.285434] R10: 0000000000000004 R11: 0000000000000246 R12: 0000000008100000 [ 2618.286225] R13: 0000000020000100 R14: 0000000000fffff0 R15: 0000000020000180 [ 2618.288292] FAULT_INJECTION: forcing a failure. [ 2618.288292] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 2618.289592] CPU: 1 PID: 13186 Comm: syz-executor.7 Not tainted 5.10.163 #1 [ 2618.290364] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2618.291303] Call Trace: [ 2618.291598] dump_stack+0x107/0x167 [ 2618.292010] should_fail.cold+0x5/0xa [ 2618.292440] iov_iter_copy_from_user_atomic+0x49b/0xdb0 [ 2618.293037] ? shmem_write_begin+0xf7/0x1d0 [ 2618.293514] ? shmem_write_begin+0x100/0x1d0 [ 2618.294010] generic_perform_write+0x279/0x4f0 [ 2618.294534] ? trace_event_raw_event_file_check_and_advance_wb_err+0x4a0/0x4a0 [ 2618.295056] EXT4-fs (loop2): bad geometry: block count 128 exceeds size of device (8 blocks) [ 2618.295316] ? evict_inodes+0x420/0x420 [ 2618.295333] ? generic_write_checks+0x2ad/0x390 [ 2618.297687] __generic_file_write_iter+0x39d/0x5d0 [ 2618.298219] generic_file_write_iter+0xdb/0x230 [ 2618.298735] ? iov_iter_init+0x3c/0x130 [ 2618.299182] new_sync_write+0x42c/0x660 [ 2618.299631] ? new_sync_read+0x6f0/0x6f0 [ 2618.300074] ? __x64_sys_pwrite64+0x201/0x260 [ 2618.300693] ? lock_release+0x6b0/0x6b0 [ 2618.301143] ? selinux_file_permission+0x36/0x510 [ 2618.301682] vfs_write+0x747/0xa30 [ 2618.302089] __x64_sys_pwrite64+0x201/0x260 [ 2618.302575] ? ksys_pwrite64+0x1b0/0x1b0 [ 2618.303042] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 2618.303623] ? syscall_enter_from_user_mode+0x1d/0x50 [ 2618.304177] do_syscall_64+0x33/0x40 [ 2618.304595] entry_SYSCALL_64_after_hwframe+0x61/0xc6 [ 2618.305169] RIP: 0033:0x7fca423b8ab7 [ 2618.305579] Code: 08 89 3c 24 48 89 4c 24 18 e8 e5 f8 ff ff 4c 8b 54 24 18 48 8b 54 24 10 41 89 c0 48 8b 74 24 08 8b 3c 24 b8 12 00 00 00 0f 05 <48> 3d 00 f0 ff ff 77 31 44 89 c7 48 89 04 24 e8 15 f9 ff ff 48 8b [ 2618.307649] RSP: 002b:00007fca3f97af20 EFLAGS: 00000293 ORIG_RAX: 0000000000000012 [ 2618.308499] RAX: ffffffffffffffda RBX: 00007fca4244f970 RCX: 00007fca423b8ab7 [ 2618.309292] RDX: 000000000000001d RSI: 0000000020011600 RDI: 0000000000000004 [ 2618.310089] RBP: 0000000000000004 R08: 0000000000000000 R09: ffffffffffffffff [ 2618.310888] R10: 0000000000002100 R11: 0000000000000293 R12: 0000000000000004 [ 2618.311685] R13: 0000000000000004 R14: 0000000020000488 R15: 0000000000000003 [ 2618.345129] EXT4-fs (loop1): VFS: Can't find ext4 filesystem [ 2618.353578] EXT4-fs (loop7): mounted filesystem without journal. Opts: ,errors=continue [ 2618.395925] EXT4-fs (loop6): mounted filesystem without journal. Opts: ,errors=continue [ 2618.418433] EXT4-fs (loop5): mounted filesystem without journal. Opts: ,errors=continue 12:46:11 executing program 3: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_init_net_socket$802154_raw(0x24, 0x3, 0x0) sendmmsg$inet6(r0, &(0x7f0000004d00)=[{{0x0, 0x0, &(0x7f00000004c0), 0x0, 0x0, 0xffffff7f00000000}}], 0x1, 0x0) [ 2618.477583] EXT4-fs (loop4): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 2618.479660] EXT4-fs (loop4): group descriptors corrupted! 12:46:11 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000180)) 12:46:11 executing program 7: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000180)) (fail_nth: 21) 12:46:11 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, 0x0) 12:46:11 executing program 0: r0 = creat(&(0x7f0000000040)='./file0\x00', 0x0) r1 = creat(&(0x7f0000000040)='./file0\x00', 0x0) fallocate(r1, 0x0, 0x0, 0x8800000) fallocate(r1, 0x3, 0x0, 0x8000) fallocate(r0, 0x0, 0x0, 0x8808102) 12:46:11 executing program 6: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000180)) (fail_nth: 8) 12:46:11 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000180)) (fail_nth: 23) 12:46:11 executing program 4: ioctl$RTC_UIE_ON(0xffffffffffffffff, 0x7003) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x2}, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0xfffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = dup2(0xffffffffffffffff, r0) perf_event_open(&(0x7f00000001c0)={0x2, 0x80, 0x8, 0x9, 0x4, 0x1, 0x0, 0x3b3d, 0x200a0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x2, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0xffff, 0x1, @perf_config_ext={0x7, 0x1}, 0x281, 0xffffffff, 0x4, 0x3, 0x401, 0xffffff47, 0x401, 0x0, 0x3, 0x0, 0x415}, 0x0, 0xffffffffffffffff, r0, 0x1) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000180)) pkey_mprotect(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x0, 0xffffffffffffffff) pkey_mprotect(&(0x7f0000ff4000/0x4000)=nil, 0x4000, 0x0, 0xffffffffffffffff) socket$inet_udp(0x2, 0x2, 0x0) getsockopt$inet_int(0xffffffffffffffff, 0x0, 0xe, 0x0, &(0x7f0000000280)) ioctl$sock_SIOCADDDLCI(0xffffffffffffffff, 0x8980, 0x0) ioctl$RTC_ALM_SET(r1, 0x40247007, 0x0) mmap$IORING_OFF_SQES(&(0x7f0000ff3000/0x2000)=nil, 0x2000, 0x2000002, 0x10, r1, 0x10000000) getsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, 0x0, 0x0) [ 2618.696457] EXT4-fs (loop2): bad geometry: block count 128 exceeds size of device (8 blocks) [ 2618.703301] FAULT_INJECTION: forcing a failure. [ 2618.703301] name failslab, interval 1, probability 0, space 0, times 0 [ 2618.704529] CPU: 1 PID: 13224 Comm: syz-executor.7 Not tainted 5.10.163 #1 [ 2618.705275] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2618.706176] Call Trace: [ 2618.706468] dump_stack+0x107/0x167 [ 2618.706958] should_fail.cold+0x5/0xa [ 2618.707379] ? getname_flags.part.0+0x50/0x4f0 [ 2618.707873] should_failslab+0x5/0x20 [ 2618.708284] kmem_cache_alloc+0x5b/0x360 [ 2618.708734] getname_flags.part.0+0x50/0x4f0 [ 2618.709212] getname+0x8e/0xd0 [ 2618.709561] do_sys_openat2+0xf9/0x420 [ 2618.709981] ? build_open_flags+0x6f0/0x6f0 [ 2618.710453] ? rcu_read_lock_any_held+0x75/0xa0 [ 2618.710920] __x64_sys_openat+0x13f/0x1f0 [ 2618.711381] ? __ia32_sys_open+0x1c0/0x1c0 [ 2618.711843] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 2618.712403] ? syscall_enter_from_user_mode+0x1d/0x50 [ 2618.712922] do_syscall_64+0x33/0x40 [ 2618.713324] entry_SYSCALL_64_after_hwframe+0x61/0xc6 [ 2618.713873] RIP: 0033:0x7fca423b8a04 [ 2618.714255] Code: 84 00 00 00 00 00 44 89 54 24 0c e8 96 f9 ff ff 44 8b 54 24 0c 44 89 e2 48 89 ee 41 89 c0 bf 9c ff ff ff b8 01 01 00 00 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 89 44 24 0c e8 c8 f9 ff ff 8b 44 [ 2618.716224] RSP: 002b:00007fca3f97aed0 EFLAGS: 00000293 ORIG_RAX: 0000000000000101 [ 2618.716983] RAX: ffffffffffffffda RBX: 00007fca4244f970 RCX: 00007fca423b8a04 [ 2618.717691] RDX: 0000000000000002 RSI: 00007fca3f97b000 RDI: 00000000ffffff9c [ 2618.718401] RBP: 00007fca3f97b000 R08: 0000000000000000 R09: ffffffffffffffff [ 2618.719111] R10: 0000000000000000 R11: 0000000000000293 R12: 0000000000000002 [ 2618.719817] R13: 0000000000000004 R14: 00000000200004a0 R15: 0000000000000004 [ 2618.744094] FAULT_INJECTION: forcing a failure. [ 2618.744094] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 2618.747348] CPU: 1 PID: 13225 Comm: syz-executor.5 Not tainted 5.10.163 #1 [ 2618.749189] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2618.751328] Call Trace: [ 2618.752038] dump_stack+0x107/0x167 [ 2618.752992] should_fail.cold+0x5/0xa [ 2618.753928] strncpy_from_user+0x34/0x470 [ 2618.754840] getname_flags.part.0+0x95/0x4f0 [ 2618.755821] getname+0x8e/0xd0 [ 2618.756523] do_sys_openat2+0xf9/0x420 [ 2618.757374] ? build_open_flags+0x6f0/0x6f0 [ 2618.758322] ? rcu_read_lock_any_held+0x75/0xa0 [ 2618.759350] __x64_sys_openat+0x13f/0x1f0 [ 2618.760256] ? __ia32_sys_open+0x1c0/0x1c0 [ 2618.761185] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 2618.762327] ? syscall_enter_from_user_mode+0x1d/0x50 [ 2618.763482] do_syscall_64+0x33/0x40 [ 2618.764297] entry_SYSCALL_64_after_hwframe+0x61/0xc6 [ 2618.765415] RIP: 0033:0x7f8cf17d3a04 [ 2618.766237] Code: 84 00 00 00 00 00 44 89 54 24 0c e8 96 f9 ff ff 44 8b 54 24 0c 44 89 e2 48 89 ee 41 89 c0 bf 9c ff ff ff b8 01 01 00 00 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 89 44 24 0c e8 c8 f9 ff ff 8b 44 [ 2618.770440] RSP: 002b:00007f8ceed95ed0 EFLAGS: 00000293 ORIG_RAX: 0000000000000101 [ 2618.772165] RAX: ffffffffffffffda RBX: 00007f8cf186a970 RCX: 00007f8cf17d3a04 [ 2618.773760] RDX: 0000000000000002 RSI: 00007f8ceed96000 RDI: 00000000ffffff9c [ 2618.775384] RBP: 00007f8ceed96000 R08: 0000000000000000 R09: ffffffffffffffff [ 2618.776937] R10: 0000000000000000 R11: 0000000000000293 R12: 0000000000000002 [ 2618.778476] R13: 0000000000000004 R14: 00000000200004a0 R15: 0000000000000004 [ 2618.790884] FAULT_INJECTION: forcing a failure. [ 2618.790884] name failslab, interval 1, probability 0, space 0, times 0 [ 2618.793331] CPU: 1 PID: 13226 Comm: syz-executor.6 Not tainted 5.10.163 #1 [ 2618.794819] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2618.796624] Call Trace: [ 2618.797198] dump_stack+0x107/0x167 [ 2618.798148] should_fail.cold+0x5/0xa 12:46:11 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000180)) [ 2618.798995] ? __d_alloc+0x2a/0x990 12:46:11 executing program 3: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_init_net_socket$802154_raw(0x24, 0x3, 0x0) sendmmsg$inet6(r0, &(0x7f0000004d00)=[{{0x0, 0x0, &(0x7f00000004c0)}}], 0x1, 0x0) 12:46:11 executing program 0: r0 = creat(&(0x7f0000000040)='./file0\x00', 0x0) r1 = creat(&(0x7f0000000040)='./file0\x00', 0x0) fallocate(r1, 0x0, 0x0, 0x8800000) fallocate(r1, 0x3, 0x0, 0x8000) fallocate(r0, 0x0, 0x0, 0x880ff01) [ 2618.799916] should_failslab+0x5/0x20 [ 2618.800853] kmem_cache_alloc+0x5b/0x360 [ 2618.801737] ? trace_hardirqs_on+0x5b/0x180 [ 2618.802673] __d_alloc+0x2a/0x990 [ 2618.803455] d_alloc_pseudo+0x19/0x70 [ 2618.804310] alloc_file_pseudo+0xce/0x250 [ 2618.805243] ? alloc_file+0x5a0/0x5a0 [ 2618.806103] ? shmem_get_inode+0x55c/0xbc0 [ 2618.807071] __shmem_file_setup+0x144/0x320 [ 2618.808035] ? _copy_from_user+0xfb/0x1b0 [ 2618.808965] __do_sys_memfd_create+0x275/0x450 [ 2618.809989] ? memfd_file_seals_ptr+0x170/0x170 [ 2618.811045] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 2618.812221] ? syscall_enter_from_user_mode+0x1d/0x50 [ 2618.813380] do_syscall_64+0x33/0x40 [ 2618.814216] entry_SYSCALL_64_after_hwframe+0x61/0xc6 [ 2618.815385] RIP: 0033:0x7f290af69b19 [ 2618.816301] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2618.820416] RSP: 002b:00007f29084def48 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 2618.822080] RAX: ffffffffffffffda RBX: 0000000020000440 RCX: 00007f290af69b19 [ 2618.823530] RDX: 0000000000004200 RSI: 0000000000000000 RDI: 00007f290afc30fb [ 2618.824951] RBP: 0000000000000004 R08: 0000000000002100 R09: ffffffffffffffff [ 2618.826603] R10: 0000000000000004 R11: 0000000000000246 R12: 0000000008100000 [ 2618.828157] R13: 0000000020000100 R14: 0000000000fffff0 R15: 0000000020000180 12:46:11 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, 0x0) [ 2618.862319] EXT4-fs (loop4): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 2618.864557] EXT4-fs (loop4): group descriptors corrupted! [ 2619.009808] EXT4-fs (loop2): bad geometry: block count 128 exceeds size of device (8 blocks) 12:46:27 executing program 7: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000180)) (fail_nth: 22) 12:46:27 executing program 0: r0 = creat(&(0x7f0000000040)='./file0\x00', 0x0) r1 = creat(&(0x7f0000000040)='./file0\x00', 0x0) fallocate(r1, 0x0, 0x0, 0x8800000) fallocate(r1, 0x3, 0x0, 0x8000) fallocate(r0, 0x0, 0x0, 0x880ff07) 12:46:27 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000180)) (fail_nth: 24) 12:46:27 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000180)) 12:46:27 executing program 3: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_init_net_socket$802154_raw(0x24, 0x3, 0x0) sendmmsg$inet6(r0, &(0x7f0000004d00)=[{{0x0, 0x0, &(0x7f00000004c0), 0x0, 0x0, 0x0, 0x4}}], 0x1, 0x0) 12:46:27 executing program 4: ioctl$RTC_UIE_ON(0xffffffffffffffff, 0x7003) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x2}, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0xfffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = dup2(0xffffffffffffffff, r0) perf_event_open(&(0x7f00000001c0)={0x2, 0x80, 0x8, 0x9, 0x4, 0x1, 0x0, 0x3b3d, 0x200a0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x2, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0xffff, 0x1, @perf_config_ext={0x7, 0x1}, 0x281, 0xffffffff, 0x4, 0x3, 0x401, 0xffffff47, 0x401, 0x0, 0x3, 0x0, 0x415}, 0x0, 0xffffffffffffffff, r0, 0x1) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0xffffffffdffffff8}, {0x0, 0x0, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000180)) pkey_mprotect(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x0, 0xffffffffffffffff) pkey_mprotect(&(0x7f0000ff4000/0x4000)=nil, 0x4000, 0x0, 0xffffffffffffffff) socket$inet_udp(0x2, 0x2, 0x0) getsockopt$inet_int(0xffffffffffffffff, 0x0, 0xe, 0x0, &(0x7f0000000280)) ioctl$sock_SIOCADDDLCI(0xffffffffffffffff, 0x8980, 0x0) ioctl$RTC_ALM_SET(r1, 0x40247007, 0x0) mmap$IORING_OFF_SQES(&(0x7f0000ff3000/0x2000)=nil, 0x2000, 0x2000002, 0x10, r1, 0x10000000) getsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, 0x0, 0x0) 12:46:27 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, 0x0) 12:46:27 executing program 6: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000180)) (fail_nth: 9) [ 2635.009740] FAULT_INJECTION: forcing a failure. [ 2635.009740] name failslab, interval 1, probability 0, space 0, times 0 [ 2635.011985] CPU: 0 PID: 13255 Comm: syz-executor.7 Not tainted 5.10.163 #1 [ 2635.013328] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2635.014927] Call Trace: [ 2635.015457] dump_stack+0x107/0x167 [ 2635.016169] should_fail.cold+0x5/0xa [ 2635.016909] ? create_object.isra.0+0x3a/0xa20 [ 2635.017795] should_failslab+0x5/0x20 [ 2635.018532] kmem_cache_alloc+0x5b/0x360 [ 2635.019461] ? __generic_file_write_iter+0x1a4/0x5d0 [ 2635.020803] create_object.isra.0+0x3a/0xa20 [ 2635.021961] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 2635.023338] kmem_cache_alloc+0x159/0x360 [ 2635.024452] getname_flags.part.0+0x50/0x4f0 [ 2635.025628] getname+0x8e/0xd0 [ 2635.026488] do_sys_openat2+0xf9/0x420 [ 2635.027536] ? build_open_flags+0x6f0/0x6f0 [ 2635.028694] ? rcu_read_lock_any_held+0x75/0xa0 [ 2635.029940] __x64_sys_openat+0x13f/0x1f0 [ 2635.031041] ? __ia32_sys_open+0x1c0/0x1c0 [ 2635.032114] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 2635.033517] ? syscall_enter_from_user_mode+0x1d/0x50 [ 2635.034907] do_syscall_64+0x33/0x40 [ 2635.035935] entry_SYSCALL_64_after_hwframe+0x61/0xc6 [ 2635.037172] RIP: 0033:0x7fca423b8a04 [ 2635.038051] Code: 84 00 00 00 00 00 44 89 54 24 0c e8 96 f9 ff ff 44 8b 54 24 0c 44 89 e2 48 89 ee 41 89 c0 bf 9c ff ff ff b8 01 01 00 00 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 89 44 24 0c e8 c8 f9 ff ff 8b 44 [ 2635.042262] RSP: 002b:00007fca3f97aed0 EFLAGS: 00000293 ORIG_RAX: 0000000000000101 [ 2635.043943] RAX: ffffffffffffffda RBX: 00007fca4244f970 RCX: 00007fca423b8a04 [ 2635.045599] RDX: 0000000000000002 RSI: 00007fca3f97b000 RDI: 00000000ffffff9c [ 2635.047217] RBP: 00007fca3f97b000 R08: 0000000000000000 R09: ffffffffffffffff [ 2635.048785] R10: 0000000000000000 R11: 0000000000000293 R12: 0000000000000002 [ 2635.050460] R13: 0000000000000004 R14: 00000000200004a0 R15: 0000000000000004 [ 2635.052196] hpet: Lost 2 RTC interrupts [ 2635.074275] EXT4-fs (loop2): bad geometry: block count 128 exceeds size of device (8 blocks) [ 2635.075159] FAULT_INJECTION: forcing a failure. [ 2635.075159] name failslab, interval 1, probability 0, space 0, times 0 [ 2635.078682] CPU: 0 PID: 13260 Comm: syz-executor.5 Not tainted 5.10.163 #1 [ 2635.080404] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2635.082444] Call Trace: [ 2635.083102] dump_stack+0x107/0x167 [ 2635.084014] should_fail.cold+0x5/0xa [ 2635.084960] ? __alloc_file+0x21/0x320 [ 2635.085926] should_failslab+0x5/0x20 [ 2635.086865] kmem_cache_alloc+0x5b/0x360 [ 2635.087889] __alloc_file+0x21/0x320 [ 2635.088655] alloc_empty_file+0x6d/0x170 [ 2635.089491] path_openat+0xde/0x26d0 [ 2635.090267] ? path_lookupat+0x860/0x860 [ 2635.091095] ? perf_trace_lock+0xac/0x490 [ 2635.091944] ? __lockdep_reset_lock+0x180/0x180 [ 2635.092893] ? lock_acquire+0x197/0x490 [ 2635.093707] ? __lockdep_reset_lock+0x180/0x180 [ 2635.094664] do_filp_open+0x190/0x3e0 [ 2635.095444] ? may_open_dev+0xf0/0xf0 [ 2635.096222] ? __alloc_fd+0x2a5/0x620 [ 2635.096998] ? lock_downgrade+0x6d0/0x6d0 [ 2635.097847] ? rwlock_bug.part.0+0x90/0x90 [ 2635.098724] ? _raw_spin_unlock+0x1a/0x30 [ 2635.099588] ? __alloc_fd+0x2a5/0x620 [ 2635.100382] do_sys_openat2+0x171/0x420 [ 2635.101197] ? build_open_flags+0x6f0/0x6f0 [ 2635.102131] ? rcu_read_lock_any_held+0x75/0xa0 [ 2635.103088] __x64_sys_openat+0x13f/0x1f0 [ 2635.103950] ? __ia32_sys_open+0x1c0/0x1c0 [ 2635.104821] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 2635.105896] ? syscall_enter_from_user_mode+0x1d/0x50 [ 2635.106950] do_syscall_64+0x33/0x40 [ 2635.107714] entry_SYSCALL_64_after_hwframe+0x61/0xc6 [ 2635.108756] RIP: 0033:0x7f8cf17d3a04 [ 2635.109518] Code: 84 00 00 00 00 00 44 89 54 24 0c e8 96 f9 ff ff 44 8b 54 24 0c 44 89 e2 48 89 ee 41 89 c0 bf 9c ff ff ff b8 01 01 00 00 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 89 44 24 0c e8 c8 f9 ff ff 8b 44 [ 2635.113269] RSP: 002b:00007f8ceed95ed0 EFLAGS: 00000293 ORIG_RAX: 0000000000000101 [ 2635.114832] RAX: ffffffffffffffda RBX: 00007f8cf186a970 RCX: 00007f8cf17d3a04 [ 2635.116301] RDX: 0000000000000002 RSI: 00007f8ceed96000 RDI: 00000000ffffff9c [ 2635.117766] RBP: 00007f8ceed96000 R08: 0000000000000000 R09: ffffffffffffffff [ 2635.119250] R10: 0000000000000000 R11: 0000000000000293 R12: 0000000000000002 [ 2635.120719] R13: 0000000000000004 R14: 00000000200004a0 R15: 0000000000000004 [ 2635.122417] hpet: Lost 2 RTC interrupts [ 2635.134102] FAULT_INJECTION: forcing a failure. [ 2635.134102] name failslab, interval 1, probability 0, space 0, times 0 [ 2635.136590] CPU: 0 PID: 13263 Comm: syz-executor.6 Not tainted 5.10.163 #1 [ 2635.138264] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2635.140331] Call Trace: [ 2635.141038] dump_stack+0x107/0x167 [ 2635.141912] should_fail.cold+0x5/0xa [ 2635.142831] ? create_object.isra.0+0x3a/0xa20 [ 2635.143939] should_failslab+0x5/0x20 [ 2635.144858] kmem_cache_alloc+0x5b/0x360 [ 2635.145832] create_object.isra.0+0x3a/0xa20 [ 2635.146882] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 2635.147962] kmem_cache_alloc+0x159/0x360 [ 2635.148806] ? trace_hardirqs_on+0x5b/0x180 [ 2635.149690] __d_alloc+0x2a/0x990 [ 2635.150405] d_alloc_pseudo+0x19/0x70 [ 2635.151191] alloc_file_pseudo+0xce/0x250 [ 2635.152033] ? alloc_file+0x5a0/0x5a0 [ 2635.152813] ? shmem_get_inode+0x55c/0xbc0 [ 2635.153680] __shmem_file_setup+0x144/0x320 [ 2635.154553] ? _copy_from_user+0xfb/0x1b0 [ 2635.155402] __do_sys_memfd_create+0x275/0x450 [ 2635.156332] ? memfd_file_seals_ptr+0x170/0x170 [ 2635.157316] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 2635.158387] ? syscall_enter_from_user_mode+0x1d/0x50 [ 2635.159454] do_syscall_64+0x33/0x40 [ 2635.160211] entry_SYSCALL_64_after_hwframe+0x61/0xc6 [ 2635.161250] RIP: 0033:0x7f290af69b19 [ 2635.162012] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2635.165910] RSP: 002b:00007f29084def48 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 2635.167524] RAX: ffffffffffffffda RBX: 0000000020000440 RCX: 00007f290af69b19 [ 2635.169026] RDX: 0000000000004200 RSI: 0000000000000000 RDI: 00007f290afc30fb [ 2635.170533] RBP: 0000000000000004 R08: 0000000000002100 R09: ffffffffffffffff [ 2635.172010] R10: 0000000000000004 R11: 0000000000000246 R12: 0000000008100000 [ 2635.173470] R13: 0000000020000100 R14: 0000000000fffff0 R15: 0000000020000180 [ 2635.175115] hpet: Lost 1 RTC interrupts [ 2635.261527] EXT4-fs (loop7): mounted filesystem without journal. Opts: ,errors=continue 12:46:28 executing program 0: r0 = creat(&(0x7f0000000040)='./file0\x00', 0x0) r1 = creat(&(0x7f0000000040)='./file0\x00', 0x0) fallocate(r1, 0x0, 0x0, 0x8800000) fallocate(r1, 0x3, 0x0, 0x8000) fallocate(r0, 0x0, 0x0, 0xffffffff000) [ 2635.286094] EXT4-fs (loop4): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 2635.288307] EXT4-fs (loop4): group descriptors corrupted! [ 2635.314113] EXT4-fs (loop6): mounted filesystem without journal. Opts: ,errors=continue 12:46:28 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000180)) (fail_nth: 25) 12:46:28 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000440)=[{0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000180)) 12:46:28 executing program 3: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_init_net_socket$802154_raw(0x24, 0x3, 0x0) sendmmsg$inet6(r0, &(0x7f0000004d00)=[{{0x0, 0x0, &(0x7f00000004c0), 0x0, 0x0, 0x0, 0x7f00}}], 0x1, 0x0) 12:46:28 executing program 7: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000180)) (fail_nth: 23) [ 2635.501560] FAULT_INJECTION: forcing a failure. [ 2635.501560] name failslab, interval 1, probability 0, space 0, times 0 [ 2635.504067] CPU: 0 PID: 13278 Comm: syz-executor.5 Not tainted 5.10.163 #1 [ 2635.505482] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2635.507166] Call Trace: [ 2635.507730] dump_stack+0x107/0x167 [ 2635.508479] should_fail.cold+0x5/0xa [ 2635.509259] ? create_object.isra.0+0x3a/0xa20 [ 2635.510191] should_failslab+0x5/0x20 [ 2635.510969] kmem_cache_alloc+0x5b/0x360 [ 2635.511805] create_object.isra.0+0x3a/0xa20 [ 2635.512701] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 2635.513738] kmem_cache_alloc+0x159/0x360 [ 2635.514590] __alloc_file+0x21/0x320 [ 2635.515355] alloc_empty_file+0x6d/0x170 [ 2635.516190] path_openat+0xde/0x26d0 [ 2635.516965] ? path_lookupat+0x860/0x860 [ 2635.517793] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 2635.518872] ? lock_acquire+0x197/0x490 [ 2635.519870] do_filp_open+0x190/0x3e0 [ 2635.520788] ? may_open_dev+0xf0/0xf0 [ 2635.521708] ? __alloc_fd+0x2a5/0x620 [ 2635.522623] ? lock_downgrade+0x6d0/0x6d0 [ 2635.523642] ? rwlock_bug.part.0+0x90/0x90 [ 2635.524675] ? _raw_spin_unlock+0x1a/0x30 [ 2635.525673] ? __alloc_fd+0x2a5/0x620 [ 2635.526607] do_sys_openat2+0x171/0x420 [ 2635.527578] ? build_open_flags+0x6f0/0x6f0 [ 2635.528626] ? rcu_read_lock_any_held+0x75/0xa0 [ 2635.529753] __x64_sys_openat+0x13f/0x1f0 [ 2635.530750] ? __ia32_sys_open+0x1c0/0x1c0 [ 2635.531807] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 2635.532941] ? syscall_enter_from_user_mode+0x1d/0x50 [ 2635.533992] do_syscall_64+0x33/0x40 [ 2635.534750] entry_SYSCALL_64_after_hwframe+0x61/0xc6 [ 2635.535804] RIP: 0033:0x7f8cf17d3a04 [ 2635.536564] Code: 84 00 00 00 00 00 44 89 54 24 0c e8 96 f9 ff ff 44 8b 54 24 0c 44 89 e2 48 89 ee 41 89 c0 bf 9c ff ff ff b8 01 01 00 00 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 89 44 24 0c e8 c8 f9 ff ff 8b 44 [ 2635.540321] RSP: 002b:00007f8ceed95ed0 EFLAGS: 00000293 ORIG_RAX: 0000000000000101 [ 2635.541866] RAX: ffffffffffffffda RBX: 00007f8cf186a970 RCX: 00007f8cf17d3a04 [ 2635.543332] RDX: 0000000000000002 RSI: 00007f8ceed96000 RDI: 00000000ffffff9c [ 2635.544828] RBP: 00007f8ceed96000 R08: 0000000000000000 R09: ffffffffffffffff [ 2635.546276] R10: 0000000000000000 R11: 0000000000000293 R12: 0000000000000002 [ 2635.547726] R13: 0000000000000004 R14: 00000000200004a0 R15: 0000000000000004 [ 2635.549341] hpet: Lost 1 RTC interrupts [ 2635.598418] EXT4-fs (loop5): mounted filesystem without journal. Opts: ,errors=continue [ 2635.637061] EXT4-fs (loop2): VFS: Can't find ext4 filesystem [ 2635.650782] FAULT_INJECTION: forcing a failure. [ 2635.650782] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 2635.653418] CPU: 1 PID: 13286 Comm: syz-executor.7 Not tainted 5.10.163 #1 [ 2635.654782] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2635.656511] Call Trace: [ 2635.657054] dump_stack+0x107/0x167 [ 2635.657897] should_fail.cold+0x5/0xa [ 2635.658755] strncpy_from_user+0x34/0x470 [ 2635.659603] getname_flags.part.0+0x95/0x4f0 [ 2635.660539] getname+0x8e/0xd0 [ 2635.661188] do_sys_openat2+0xf9/0x420 [ 2635.662074] ? build_open_flags+0x6f0/0x6f0 [ 2635.663021] ? rcu_read_lock_any_held+0x75/0xa0 [ 2635.663978] __x64_sys_openat+0x13f/0x1f0 [ 2635.664816] ? __ia32_sys_open+0x1c0/0x1c0 [ 2635.665674] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 2635.666809] ? syscall_enter_from_user_mode+0x1d/0x50 [ 2635.667959] do_syscall_64+0x33/0x40 [ 2635.668784] entry_SYSCALL_64_after_hwframe+0x61/0xc6 [ 2635.669915] RIP: 0033:0x7fca423b8a04 [ 2635.670720] Code: 84 00 00 00 00 00 44 89 54 24 0c e8 96 f9 ff ff 44 8b 54 24 0c 44 89 e2 48 89 ee 41 89 c0 bf 9c ff ff ff b8 01 01 00 00 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 89 44 24 0c e8 c8 f9 ff ff 8b 44 [ 2635.674650] RSP: 002b:00007fca3f97aed0 EFLAGS: 00000293 ORIG_RAX: 0000000000000101 [ 2635.676327] RAX: ffffffffffffffda RBX: 00007fca4244f970 RCX: 00007fca423b8a04 [ 2635.677728] RDX: 0000000000000002 RSI: 00007fca3f97b000 RDI: 00000000ffffff9c [ 2635.679128] RBP: 00007fca3f97b000 R08: 0000000000000000 R09: ffffffffffffffff [ 2635.680562] R10: 0000000000000000 R11: 0000000000000293 R12: 0000000000000002 [ 2635.681964] R13: 0000000000000004 R14: 00000000200004a0 R15: 0000000000000004 12:46:44 executing program 7: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000180)) (fail_nth: 24) 12:46:44 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000440)=[{0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000180)) 12:46:44 executing program 0: r0 = creat(&(0x7f0000000000)='./file0\x00', 0x0) r1 = creat(&(0x7f0000000040)='./file0\x00', 0x0) fallocate(r1, 0x0, 0x0, 0x8800000) fallocate(r1, 0x3, 0x0, 0x8000) r2 = fcntl$dupfd(r0, 0x406, r0) pwrite64(0xffffffffffffffff, &(0x7f0000000080)="55f87a91a755f805801f3a6597f8b54fcb71efdb187dbd044c3a6628a0530af80f02e1f63e9e38666df7d1c9538d3bb0da221d176d6707d046d0bac8c8eadb2e31b1135b6e6e483926c878d9399269e50a58fcb750a6d875b100f6a1c39d42983a1d76ab8bad2d4a2ef95953220495fc3a4e4f361bfd78f8c089339a5c7c8626bf9aecb7deb153af585385d0111705fcb09acc7ef8eddc35e781a2aff41f2bc7720ce50eea449dbda7ac20a041c3d7f3520279e3d190067bea95a6f69e4ebcb498d3e153de3d1c5c4d35207d519cc954c47f28c9c6c8b94436a7c394fcb26f17dbcccc2dddb3f955a93a0053b05287e961f7c1c322a8b7e6e912ac98d8ff1aa0ea53a3987327cf9ab9595fc75d6c33538e4c551c9b96ebe1e434cd00efdb643292d85f1b115a8641aa6a244e36bb1f3de7d4d1c71bc1c20f8a2247dea2e81480fb41aba8a4332fc547c000a66e8abe485720624298f5dba621c99740a0c9e0e1ba8fc0f552932c0dfd73d99fe1689c983f6c7f65c5a0076ddc1a452c05d1ce0e4c59d7f14eb9111aef982d3ca5b3c596fd0c55251e5924c769525cd846df31dc11266e2cd5227da6b7abb133b6c4aae9f82a6b4f31bb4a752f1f275d48daab6317ecc2646d9c2e6c6b6eaf046e74e00d7ab47c45727d4df27f5f09f9ea4119f6a3f3bd8635cc05b51d8323d7d972bd69228dbbe01f1f238144d7bf17d459e0c7f2b2b0daf86d54937a85cb0a80edce6e0a873ee1ae7373ac4b195780117068793e46b97fe79a057cb7cff0cd7feb953e896722aef13cf0d2cff7878cd9790f1a3c1894dc43432c2484f67c33fa06d087964bdb8d24675f2bb9a91a343412301441d1b1099791fa5cc65b2e2f385518ac52aa6bd97210977847639c7af3eb60ab9b2163be03fd077465aee498ba4182a83169714558558a58eba961f52780e1f7471167c39466924a8fe12b966aafc43b340ddebed2ae982fa7ae4d74d0f85de5076fd5f6fc5e06786f88724961ded6e6b26723dd62e594eff59f080c81f59aa0a7666c5bf6c62da545052f1b10ef3dca917072b6731201ec37bf3218f705393076079ba625bdddcb2e657801daab4c33c96b95826affe93e28207b6a583da16642ebda1d1fcbd0c0e26c96a81cdbc52df8660f7f47a1df3b237b64ec80ee03710b55950061ea92990ccf4b38de60637112fedbb784fa291537308f553314a6bbdb3ae34fb5f4011884197077a16766bf6096ee4da08373df90935c1d0a9c88aa84b2c57d33f85142e26bb2d2351328487f6de97f7fc60d9196ac8c8780cec17eeadc121578871bd118ec4fcf7fe5c93917a95400b9700db3132721cb5f4b917fcbf5023052febb95a2804d2fdc6c919d5186d49a9703cce393b4b4781b30ed22408a5871977400848822dcaebf478b97acfc8c8ab41a8d96f8a2de76fa42cb4ef1ff9c48d9f1b8b998e8f2e8dda2ee325be156cd626f320cea56c2c1db860f641f8cd0021e996c55acd825eade394a1b1bbe304d9a6cbd4f20eb6680e935d26821b6ed454c4d57fcbf47523e5f3d5725fec736b420856cd671cce71f92be285623c3d8d425d88da39a033b0f420183b142191c92c228a14d31db9982e70ae1a4051915d6e7a5ff2baf8061db09a0db1211a660b6ba23ca213a6af88b4c452e656114492cc2abea918813e0878d515657c9c66a367cd8b3d47b322083e1b0f90a0bc9b3ec92b4ccd40f42565a2177f7e32937ce7541ea7703f93ffa411a3d182cbeb545d7989e773191774c6fb99dd91e8cb1cfb1c622cceb2ee918032fa13ed2a914c021f146651d7823384926be7e005ccfbe6ef771205f67e65dc3e13b87f5a130d8532c68e7a1955d9f249fb26dc2cc426933e8b38861f4b5e5a7df78d9f28287192713c811035550067670270063d8946d60574d398ebbf15f4943986ece2c9a6d5c71fd509a3be9cdc2cbdef2f1c1b84643d30e16b6c4166d944ce368c59c1d373b5d93e983b9c884b65dad37da0b15995d77c7e123a6146de1c90c11e668a7a7c2a04cbdd7f185a2d6ecb0b641633dcccd26ecc122c21768139b340d3292ac151f2b7ef037edebaac2eb476f5aa1f916536f06935d676b6061f6aa227b95eeb4026d922d5a6fab12305543869899a734c49ea52f0ede1efecd3d7b1cc3fb9ec74839e1f4e5d77db897e9f8da557cfd147991fffa794499ef9794b73d49f55f00106db207c3e0b515393072d8d97c75cb6f57f84b7a564ad5bb548dd5ad4c24b401a7e8371184d063a4ee6a1086ef0e12cd42a15e0aa633c701b93c76f16275dc47521006d276aed93cec32cac9b08367cfcba40a3af0feaaa849db43117e92bb64dd3f63c38fe9014bce97ff8383cd6bd1a71be30a6e1f496eec30155890f85ae5aacec3a06af952cc1f21320fae9f5bc7470c232ea3d8a534951406da043c11f1a5b38f5c25fe27aa151ee5504cae3fd848cccb2213876e92cccdec7574b7cffef96f3143ddc9476901d2bd3322f6a46e2638b467c467365e7583a9e7ade2d4f6708937b821bea58c1f94d3e58a65d54320ecb66f18f8019a47e303e61e2fe9a72d5ed30abb9bf4110f8c9b6780c4d441fbe4b60002dbf63077499e978ec14d630ecf2adcf1a3b98f592dab625f1cd67b2374d365fa9dd492462c3db99aaf2f0314a7bed62ede7cedc0373dd3c020e3d3b873706eb8d371bb7773286cfa89d79338b3469f9890234a5bb69d0f54e7c5a31866a158787490e0c4a889810b9df47e99b91e385b7596b996ec93eeedfe59b133e45d7e91c94396658df05eaa1bfbcdc597a75e18709b70138706c8934b80e5ffbc6a54729293748d7de4826d83e99c6b324f85ea983dcc3f03a7f78a0d1447c5da93d8574aaa117612b926dbcab845bbe30fa5ed673e230f2cc40d2579b0fae331abfad089d240c02cc665929f8501c21023a45bc2baede2b73ea4df358359adc1bb3b761bfdebbc3108315535c642d4283f25ac140b4b73fde1383fc286eb093dde08fbf070f60b75f1a70026650f5c1759aae3b335bd8b2181bab7af29c1020f2103701d7611a5fe803333c1315186c0375023cd0da22d504da5e2c5f82e8c832d9ce96e4c77d73064ea3409e96c8b4f772629dc187e4bd52e78901d6a371ff8c3c46c22764ff60cddf663c945abc13ab6d42d6b062fc93057a0e211ebc772cfd2985dc319e44c5699845a4eaf5d25637ff93d74de610b8c01674fd85490b74e3cbea4330629fc545c38f0e5f3bf16897bfdd1aa17c932a82267c53791ff52de12b37e929cd3381506c94a366a56ae738ed0f8f734e75fa67c1213d178cecd8e33372bc95486bbce2db25baf337cc9df059804bd85febd79652b27faa4ed7a888f048de37380cf1de58e1b13b9f67440f6ffc7a07c908bde5b7b0dd66a85fb138771a3e54d7da18e07a0e9a057571fd61adc9f642f859d406501f707022c363dc1392b19fd85ebcce7db662f2907feb6601f40a3fea5a58392c3060a840ce05fb571c4fd6e5fab898fc927bf217fdedecff1a3e80f378633df9e17469dfe1f31a86fa89f267da2f19c5129baa5237ab96f6a29800d759ae966ee6c1ff2c7c3c7bbf86dce54a309950e0c044457ee49d68797343bec9d1590424a37499626a373070cc714417c572207cc83c0045697fa3d2a241903af5b3ede9a14cb1c6a1318c701638c6cc1654328ea95fd6de4001d131dcf6896938a62c6b7c070f6f9565cb75ce3aecefb11769f40f5df4060d18a2e7c6bcb0683ad932b0a07cb0e9c28203bc6899ae13dbc5143ed1b93d72c961fb7e2335dd22f34df33e7d56cfa0418da1191f89c50ebb7a571ba36be4ad75475636d4e36657183cd04279eed1b3245dcbf5b10b19a091b972a93ea6b1ae1243a0a9925f9bbf9802d4346795181248f00e13f0f1af9b4350766125f499824be5682cb3db54154cdef967e1722e932a7a85559d875f8e5a6fed39af7558c7d173beee5d4864da078370d9e2a6f7b77e60d9bf3b9ab8ae3a9f387a5147cf558605a473578cd430aacaec3e9de6f87772669929bed3dfd4f06f5c338e8c42842cd9211047542ed784e66ab78c3ea8e25333ddcb850d69293e7e79bb69db32f0c82d1598907fa7701a333de647787df923ee33dac0e089f3e99b35d75417222bc0fb6f034bebd8240e4396357bf9461a5bbc957e2ac88e48efe61918e9608e8c3e41d73154e7d9a0d651cd099b4dbacc460e479f050c2b7348f685b1f3a57e38f733bdc87fb8d4125e77613386954f116f4abacad7e73765c8887cd2de7d0a8a0faa9dc80a43ea097f59a085e1a6275ce628090ade53b3b2c20b5cbfdae4029e7e908c896fcd71b9e6838c2daa57c626dddcdadb2e242e5f8290701355e4bef5a55b5fe3edcc9e2111689919eecb17b148a08c9efd49f4ae6fc49ffeca48493023096d4bb1bfbb398396de42f58da8cec09898a7fd3cae5f60d5c73b0bc1ad8d8fbbad411f33d74a7232a31d2ff34d9d37f8ade209d4876ce24aa0061257cde768d7c0e61c512b8fb7d774d71405ddc35d5d6b754c02a7fe7840d23f9552c7861c2cfe6274b421b6ef0c41952ff8d023f1f9b7a57c31d78ab84045dc578f43b7d4f8e61e5bb574564c8ba7263eb48f30bafaf016621ddcafe762b642fcb41818836ac8ee00b51a2ab3cbb6ea299e1d5c07b0b3ad51df52a573c67543f1d653aca44c5eddee44badbefa25dc69eac9726ec4a864d84796e0373693ccac46c05d87a8e767d2ab9e3c66256d4d7a86df6f7e5a37f50d59d57e17187d9cf1e785d6396a0dd307a415f318d693c7160e8db63aaa86efad3114e059970d07dc85e558a427f76e5f05206a5d2e1afb9d203891bfe596ad8ebc7e201d9baad0454ef48c3a2dc6bf57ede153237de794dfd1adf304df1f17fc9fc361bef040b0363669a0aac8e7db2c96ada2ce4d3085e6e3e352ab9f9e8737feddd503568b7ab7062f998411792481513b1f1cdf6369d44c57877a608d3a70ed5b95de182530b4d50e0503c2a0e3c024a31daf37d98223c32ce63c518d8f3a68efdfa10dce4a05ab82a4b9deef218953b7028f740d00091ac92a9aafbdb53ea19c7f3c26554517c0ce59e6a9a0305f6588bbc7ad49cb360138d652335495e54522fac5eef29a344b2f806a2737b89a4cf96c74b120dbb7535d5338bafabbb842e04214cea191755637759f43721ceb844cb249925ae7ad58e8523571d4a951a1eb189464305059e90f92e775e3d589589f8f37a72c49bdf7c9081742f6b693f638c74f6c7cd4386364af249ab4db33f7535c9a2cd4700911c256a9335266aef67ba4af2bc1e14201bbbb4d6573af7b747285f92d875e7aebe002190fef9ac2cac80a44c6dfc58f512ace14f66fef0082a656135666977112b243dad979f5a3eaa48ba2bc5bd2d8503b8ea80b38b4da7d835ed06527204992aec2c4555946e4a6cb638794d1d279fd5646792810a37195e70148f799b9305fb4da0895ab07523c308731f21279977782c00cfec134a037e8cd37805d95331520f0fc75610cd58f7651a9db0660f81c8d2897fea7d99f04ef9e3c39aa0a7c3ec9a53948a74b63816483e8dd5e062e6db56ffb1dd8a755efde523e01b2aad639588dec1f6af12e5fd6b7a8b4431e3142ce03732416fe5ba9e9519ee33493e2c61a9f59aa8a610d47d8acf4a733b0f5ee69667da1a2b16cce61d9d3ca265e017a937ba0e413026cfa958f20a4fecdad6e781a2fe0cf4688a31dec872b5bbf963c452fad340e6b8fc3e3654653069ccd", 0x1000, 0x0) fallocate(r2, 0x26, 0x0, 0x8800000) write$binfmt_elf64(r1, &(0x7f0000001080)={{0x7f, 0x45, 0x4c, 0x46, 0x80, 0xfe, 0x1, 0x6, 0x2, 0x3, 0x3e, 0x7fffffff, 0x256, 0x40, 0x35c, 0xc4, 0x8, 0x38, 0x1, 0x2, 0x5, 0x40}, [{0x70000000, 0x101, 0x5, 0x3, 0xffffffff, 0x20, 0x6, 0xfffffffffffffffd}, {0x2, 0x9, 0x1, 0x9, 0x8, 0x800, 0x1}], "1a8047", ['\x00', '\x00', '\x00', '\x00', '\x00', '\x00']}, 0x6b3) 12:46:44 executing program 6: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000180)) (fail_nth: 10) 12:46:44 executing program 1: ioctl$RTC_UIE_ON(0xffffffffffffffff, 0x7003) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x2}, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0xfffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = dup2(0xffffffffffffffff, r0) perf_event_open(&(0x7f00000001c0)={0x2, 0x80, 0x8, 0x9, 0x4, 0x1, 0x0, 0x3b3d, 0x200a0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x2, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0xffff, 0x1, @perf_config_ext={0x7, 0x1}, 0x281, 0xffffffff, 0x4, 0x3, 0x401, 0xffffff47, 0x401, 0x0, 0x3, 0x0, 0x415}, 0x0, 0xffffffffffffffff, r0, 0x1) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d}], 0x0, &(0x7f0000000180)) pkey_mprotect(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x0, 0xffffffffffffffff) pkey_mprotect(&(0x7f0000ff4000/0x4000)=nil, 0x4000, 0x0, 0xffffffffffffffff) socket$inet_udp(0x2, 0x2, 0x0) getsockopt$inet_int(0xffffffffffffffff, 0x0, 0xe, 0x0, &(0x7f0000000280)) ioctl$sock_SIOCADDDLCI(0xffffffffffffffff, 0x8980, 0x0) ioctl$RTC_ALM_SET(r1, 0x40247007, 0x0) mmap$IORING_OFF_SQES(&(0x7f0000ff3000/0x2000)=nil, 0x2000, 0x2000002, 0x10, r1, 0x10000000) getsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, 0x0, 0x0) 12:46:44 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000180)) (fail_nth: 26) 12:46:44 executing program 3: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_init_net_socket$802154_raw(0x24, 0x3, 0x0) sendmmsg$inet6(r0, &(0x7f0000004d00)=[{{0x0, 0x0, &(0x7f00000004c0), 0x0, 0x0, 0x0, 0x40000}}], 0x1, 0x0) 12:46:44 executing program 4: ioctl$RTC_UIE_ON(0xffffffffffffffff, 0x7003) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x2}, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0xfffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = dup2(0xffffffffffffffff, r0) perf_event_open(&(0x7f00000001c0)={0x2, 0x80, 0x8, 0x9, 0x4, 0x1, 0x0, 0x3b3d, 0x200a0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x2, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0xffff, 0x1, @perf_config_ext={0x7, 0x1}, 0x281, 0xffffffff, 0x4, 0x3, 0x401, 0xffffff47, 0x401, 0x0, 0x3, 0x0, 0x415}, 0x0, 0xffffffffffffffff, r0, 0x1) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0xffffffffdffffff8}, {0x0, 0x0, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000180)) pkey_mprotect(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x0, 0xffffffffffffffff) pkey_mprotect(&(0x7f0000ff4000/0x4000)=nil, 0x4000, 0x0, 0xffffffffffffffff) socket$inet_udp(0x2, 0x2, 0x0) getsockopt$inet_int(0xffffffffffffffff, 0x0, 0xe, 0x0, &(0x7f0000000280)) ioctl$sock_SIOCADDDLCI(0xffffffffffffffff, 0x8980, 0x0) ioctl$RTC_ALM_SET(r1, 0x40247007, 0x0) mmap$IORING_OFF_SQES(&(0x7f0000ff3000/0x2000)=nil, 0x2000, 0x2000002, 0x10, r1, 0x10000000) getsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, 0x0, 0x0) [ 2651.953015] FAULT_INJECTION: forcing a failure. [ 2651.953015] name failslab, interval 1, probability 0, space 0, times 0 [ 2651.954132] EXT4-fs (loop2): VFS: Can't find ext4 filesystem [ 2651.955649] CPU: 0 PID: 13301 Comm: syz-executor.7 Not tainted 5.10.163 #1 [ 2651.957705] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2651.959562] Call Trace: [ 2651.960153] dump_stack+0x107/0x167 [ 2651.960963] should_fail.cold+0x5/0xa [ 2651.961810] ? __alloc_file+0x21/0x320 [ 2651.962681] should_failslab+0x5/0x20 [ 2651.963543] kmem_cache_alloc+0x5b/0x360 [ 2651.964460] __alloc_file+0x21/0x320 [ 2651.965299] alloc_empty_file+0x6d/0x170 [ 2651.966213] path_openat+0xde/0x26d0 [ 2651.967059] ? path_lookupat+0x860/0x860 [ 2651.967985] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 2651.968300] FAULT_INJECTION: forcing a failure. [ 2651.968300] name failslab, interval 1, probability 0, space 0, times 0 [ 2651.969154] ? lock_acquire+0x197/0x490 [ 2651.969187] do_filp_open+0x190/0x3e0 [ 2651.972082] ? may_open_dev+0xf0/0xf0 [ 2651.972932] ? __alloc_fd+0x2a5/0x620 [ 2651.973778] ? lock_downgrade+0x6d0/0x6d0 [ 2651.974704] ? rwlock_bug.part.0+0x90/0x90 [ 2651.975655] ? _raw_spin_unlock+0x1a/0x30 [ 2651.976566] ? __alloc_fd+0x2a5/0x620 [ 2651.977419] do_sys_openat2+0x171/0x420 [ 2651.978307] ? build_open_flags+0x6f0/0x6f0 [ 2651.979267] ? rcu_read_lock_any_held+0x75/0xa0 [ 2651.980318] __x64_sys_openat+0x13f/0x1f0 [ 2651.981227] ? __ia32_sys_open+0x1c0/0x1c0 [ 2651.982174] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 2651.983319] ? syscall_enter_from_user_mode+0x1d/0x50 [ 2651.984483] do_syscall_64+0x33/0x40 [ 2651.985301] entry_SYSCALL_64_after_hwframe+0x61/0xc6 [ 2651.986441] RIP: 0033:0x7fca423b8a04 [ 2651.987254] Code: 84 00 00 00 00 00 44 89 54 24 0c e8 96 f9 ff ff 44 8b 54 24 0c 44 89 e2 48 89 ee 41 89 c0 bf 9c ff ff ff b8 01 01 00 00 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 89 44 24 0c e8 c8 f9 ff ff 8b 44 [ 2651.991326] RSP: 002b:00007fca3f97aed0 EFLAGS: 00000293 ORIG_RAX: 0000000000000101 [ 2651.993041] RAX: ffffffffffffffda RBX: 00007fca4244f970 RCX: 00007fca423b8a04 [ 2651.994629] RDX: 0000000000000002 RSI: 00007fca3f97b000 RDI: 00000000ffffff9c [ 2651.996218] RBP: 00007fca3f97b000 R08: 0000000000000000 R09: ffffffffffffffff [ 2651.997808] R10: 0000000000000000 R11: 0000000000000293 R12: 0000000000000002 [ 2651.999412] R13: 0000000000000004 R14: 00000000200004a0 R15: 0000000000000004 [ 2652.001021] CPU: 1 PID: 13302 Comm: syz-executor.6 Not tainted 5.10.163 #1 [ 2652.001190] hpet: Lost 2 RTC interrupts [ 2652.001814] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2652.001825] Call Trace: [ 2652.003900] dump_stack+0x107/0x167 [ 2652.004364] should_fail.cold+0x5/0xa [ 2652.004769] ? __alloc_file+0x21/0x320 [ 2652.005261] should_failslab+0x5/0x20 [ 2652.005700] kmem_cache_alloc+0x5b/0x360 [ 2652.006173] __alloc_file+0x21/0x320 [ 2652.006568] alloc_empty_file+0x6d/0x170 [ 2652.006992] alloc_file+0x59/0x5a0 [ 2652.007371] alloc_file_pseudo+0x16a/0x250 [ 2652.007834] ? alloc_file+0x5a0/0x5a0 [ 2652.008240] ? shmem_get_inode+0x55c/0xbc0 [ 2652.008696] __shmem_file_setup+0x144/0x320 [ 2652.009163] ? _copy_from_user+0xfb/0x1b0 [ 2652.009599] __do_sys_memfd_create+0x275/0x450 [ 2652.010089] ? memfd_file_seals_ptr+0x170/0x170 [ 2652.010577] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 2652.011135] ? syscall_enter_from_user_mode+0x1d/0x50 [ 2652.011703] do_syscall_64+0x33/0x40 [ 2652.012098] entry_SYSCALL_64_after_hwframe+0x61/0xc6 [ 2652.012641] RIP: 0033:0x7f290af69b19 [ 2652.013037] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2652.014971] RSP: 002b:00007f29084def48 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 2652.015795] RAX: ffffffffffffffda RBX: 0000000020000440 RCX: 00007f290af69b19 [ 2652.016559] RDX: 0000000000004200 RSI: 0000000000000000 RDI: 00007f290afc30fb [ 2652.017317] RBP: 0000000000000004 R08: 0000000000002100 R09: ffffffffffffffff [ 2652.018076] R10: 0000000000000004 R11: 0000000000000246 R12: 0000000008100000 [ 2652.018829] R13: 0000000020000100 R14: 0000000000fffff0 R15: 0000000020000180 [ 2652.024932] FAULT_INJECTION: forcing a failure. [ 2652.024932] name failslab, interval 1, probability 0, space 0, times 0 [ 2652.027477] CPU: 0 PID: 13307 Comm: syz-executor.5 Not tainted 5.10.163 #1 [ 2652.029021] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2652.030865] Call Trace: [ 2652.031458] dump_stack+0x107/0x167 [ 2652.032278] should_fail.cold+0x5/0xa [ 2652.033129] ? security_file_alloc+0x34/0x170 [ 2652.034125] should_failslab+0x5/0x20 [ 2652.034974] kmem_cache_alloc+0x5b/0x360 [ 2652.035936] security_file_alloc+0x34/0x170 [ 2652.036903] __alloc_file+0xb6/0x320 [ 2652.037732] alloc_empty_file+0x6d/0x170 12:46:44 executing program 6: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000180)) (fail_nth: 11) [ 2652.038643] path_openat+0xde/0x26d0 [ 2652.039640] ? path_lookupat+0x860/0x860 [ 2652.040540] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 2652.041710] ? lock_acquire+0x197/0x490 [ 2652.042605] do_filp_open+0x190/0x3e0 [ 2652.043453] ? may_open_dev+0xf0/0xf0 [ 2652.044307] ? __alloc_fd+0x2a5/0x620 [ 2652.045252] ? lock_downgrade+0x6d0/0x6d0 [ 2652.046183] ? rwlock_bug.part.0+0x90/0x90 [ 2652.047143] ? _raw_spin_unlock+0x1a/0x30 [ 2652.048080] ? __alloc_fd+0x2a5/0x620 [ 2652.048945] do_sys_openat2+0x171/0x420 [ 2652.049840] ? build_open_flags+0x6f0/0x6f0 [ 2652.050823] ? rcu_read_lock_any_held+0x75/0xa0 [ 2652.051879] __x64_sys_openat+0x13f/0x1f0 [ 2652.052811] ? __ia32_sys_open+0x1c0/0x1c0 [ 2652.053770] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 2652.054949] ? syscall_enter_from_user_mode+0x1d/0x50 [ 2652.056121] do_syscall_64+0x33/0x40 [ 2652.056960] entry_SYSCALL_64_after_hwframe+0x61/0xc6 [ 2652.058109] RIP: 0033:0x7f8cf17d3a04 [ 2652.058945] Code: 84 00 00 00 00 00 44 89 54 24 0c e8 96 f9 ff ff 44 8b 54 24 0c 44 89 e2 48 89 ee 41 89 c0 bf 9c ff ff ff b8 01 01 00 00 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 89 44 24 0c e8 c8 f9 ff ff 8b 44 [ 2652.063080] RSP: 002b:00007f8ceed95ed0 EFLAGS: 00000293 ORIG_RAX: 0000000000000101 [ 2652.064810] RAX: ffffffffffffffda RBX: 00007f8cf186a970 RCX: 00007f8cf17d3a04 [ 2652.066422] RDX: 0000000000000002 RSI: 00007f8ceed96000 RDI: 00000000ffffff9c [ 2652.068038] RBP: 00007f8ceed96000 R08: 0000000000000000 R09: ffffffffffffffff [ 2652.069648] R10: 0000000000000000 R11: 0000000000000293 R12: 0000000000000002 [ 2652.071256] R13: 0000000000000004 R14: 00000000200004a0 R15: 0000000000000004 [ 2652.073173] hpet: Lost 2 RTC interrupts 12:46:44 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000440)=[{0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000180)) 12:46:44 executing program 3: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_init_net_socket$802154_raw(0x24, 0x3, 0x0) sendmmsg$inet6(r0, &(0x7f0000004d00)=[{{0x0, 0x0, &(0x7f00000004c0), 0x0, 0x0, 0x0, 0x7f000000}}], 0x1, 0x0) 12:46:44 executing program 7: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000180)) (fail_nth: 25) [ 2652.173527] EXT4-fs (loop4): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 2652.175733] EXT4-fs (loop4): group descriptors corrupted! [ 2652.180905] EXT4-fs error (device loop1): ext4_fill_super:4959: inode #2: comm syz-executor.1: iget: root inode unallocated [ 2652.190717] EXT4-fs (loop1): get root inode failed [ 2652.191905] EXT4-fs (loop1): mount failed 12:46:44 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000180)) (fail_nth: 27) [ 2652.266353] FAULT_INJECTION: forcing a failure. [ 2652.266353] name failslab, interval 1, probability 0, space 0, times 0 [ 2652.269242] CPU: 0 PID: 13319 Comm: syz-executor.6 Not tainted 5.10.163 #1 [ 2652.270881] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2652.272847] Call Trace: [ 2652.273547] dump_stack+0x107/0x167 [ 2652.274420] should_fail.cold+0x5/0xa [ 2652.275343] ? create_object.isra.0+0x3a/0xa20 [ 2652.276428] should_failslab+0x5/0x20 [ 2652.277330] kmem_cache_alloc+0x5b/0x360 [ 2652.278299] create_object.isra.0+0x3a/0xa20 [ 2652.279339] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 2652.280555] kmem_cache_alloc+0x159/0x360 [ 2652.281547] __alloc_file+0x21/0x320 [ 2652.282428] alloc_empty_file+0x6d/0x170 [ 2652.283395] alloc_file+0x59/0x5a0 [ 2652.284276] alloc_file_pseudo+0x16a/0x250 [ 2652.285289] ? alloc_file+0x5a0/0x5a0 [ 2652.286208] ? shmem_get_inode+0x55c/0xbc0 [ 2652.287229] __shmem_file_setup+0x144/0x320 [ 2652.288279] ? _copy_from_user+0xfb/0x1b0 [ 2652.289263] __do_sys_memfd_create+0x275/0x450 [ 2652.290355] ? memfd_file_seals_ptr+0x170/0x170 [ 2652.291382] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 2652.292472] ? syscall_enter_from_user_mode+0x1d/0x50 [ 2652.293536] do_syscall_64+0x33/0x40 [ 2652.294306] entry_SYSCALL_64_after_hwframe+0x61/0xc6 [ 2652.295359] RIP: 0033:0x7f290af69b19 [ 2652.296148] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2652.299966] RSP: 002b:00007f29084def48 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 2652.301544] RAX: ffffffffffffffda RBX: 0000000020000440 RCX: 00007f290af69b19 [ 2652.303033] RDX: 0000000000004200 RSI: 0000000000000000 RDI: 00007f290afc30fb [ 2652.304542] RBP: 0000000000000004 R08: 0000000000002100 R09: ffffffffffffffff [ 2652.306045] R10: 0000000000000004 R11: 0000000000000246 R12: 0000000008100000 [ 2652.307542] R13: 0000000020000100 R14: 0000000000fffff0 R15: 0000000020000180 [ 2652.309253] hpet: Lost 2 RTC interrupts 12:46:45 executing program 0: r0 = creat(&(0x7f0000000040)='./file0\x00', 0x0) r1 = creat(&(0x7f0000000040)='./file0\x00', 0x0) fallocate(r1, 0x0, 0x0, 0x8800000) r2 = syz_init_net_socket$802154_raw(0x24, 0x3, 0x0) bind$802154_raw(r2, &(0x7f0000000000)={0x24, @long={0x3, 0x2, {0xaaaaaaaaaaaa0002}}}, 0x14) bind$802154_raw(r2, &(0x7f0000000040)={0x24, @short={0x2, 0x2367f916dda8ac21, 0xaaa0}}, 0x14) sendmmsg$inet6(r2, &(0x7f0000004d00)=[{{0x0, 0x0, &(0x7f00000004c0)=[{&(0x7f0000000080)='K', 0x4c}], 0x1}}], 0x7ffff000, 0x0) r3 = fsopen(&(0x7f0000000100)='cgroup2\x00', 0x1) fallocate(r3, 0x40, 0x1000000000000002, 0x1003) fallocate(r0, 0x0, 0x0, 0x8800000) 12:46:45 executing program 4: ioctl$RTC_UIE_ON(0xffffffffffffffff, 0x7003) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x2}, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0xfffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = dup2(0xffffffffffffffff, r0) perf_event_open(&(0x7f00000001c0)={0x2, 0x80, 0x8, 0x9, 0x4, 0x1, 0x0, 0x3b3d, 0x200a0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x2, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0xffff, 0x1, @perf_config_ext={0x7, 0x1}, 0x281, 0xffffffff, 0x4, 0x3, 0x401, 0xffffff47, 0x401, 0x0, 0x3, 0x0, 0x415}, 0x0, 0xffffffffffffffff, r0, 0x1) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0xffffffffdffffff8}, {0x0, 0x0, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000180)) pkey_mprotect(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x0, 0xffffffffffffffff) pkey_mprotect(&(0x7f0000ff4000/0x4000)=nil, 0x4000, 0x0, 0xffffffffffffffff) socket$inet_udp(0x2, 0x2, 0x0) getsockopt$inet_int(0xffffffffffffffff, 0x0, 0xe, 0x0, &(0x7f0000000280)) ioctl$sock_SIOCADDDLCI(0xffffffffffffffff, 0x8980, 0x0) ioctl$RTC_ALM_SET(r1, 0x40247007, 0x0) mmap$IORING_OFF_SQES(&(0x7f0000ff3000/0x2000)=nil, 0x2000, 0x2000002, 0x10, r1, 0x10000000) getsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, 0x0, 0x0) 12:46:45 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="0200000003000000", 0x8, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000180)) [ 2652.414063] FAULT_INJECTION: forcing a failure. [ 2652.414063] name failslab, interval 1, probability 0, space 0, times 0 [ 2652.415775] CPU: 1 PID: 13328 Comm: syz-executor.7 Not tainted 5.10.163 #1 [ 2652.416772] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2652.417780] Call Trace: [ 2652.418172] dump_stack+0x107/0x167 [ 2652.418699] should_fail.cold+0x5/0xa [ 2652.419170] ? create_object.isra.0+0x3a/0xa20 [ 2652.419848] should_failslab+0x5/0x20 [ 2652.420395] kmem_cache_alloc+0x5b/0x360 [ 2652.420976] create_object.isra.0+0x3a/0xa20 [ 2652.421601] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 2652.422328] kmem_cache_alloc+0x159/0x360 [ 2652.422927] __alloc_file+0x21/0x320 [ 2652.423393] alloc_empty_file+0x6d/0x170 [ 2652.423989] path_openat+0xde/0x26d0 [ 2652.424526] ? path_lookupat+0x860/0x860 [ 2652.425108] ? perf_trace_lock+0xac/0x490 [ 2652.425771] ? __lockdep_reset_lock+0x180/0x180 [ 2652.426448] ? lock_acquire+0x197/0x490 [ 2652.427018] ? __lockdep_reset_lock+0x180/0x180 [ 2652.427694] do_filp_open+0x190/0x3e0 [ 2652.428234] ? may_open_dev+0xf0/0xf0 [ 2652.428777] ? __alloc_fd+0x2a5/0x620 [ 2652.429317] ? lock_downgrade+0x6d0/0x6d0 [ 2652.429914] ? rwlock_bug.part.0+0x90/0x90 [ 2652.430522] ? _raw_spin_unlock+0x1a/0x30 [ 2652.431108] ? __alloc_fd+0x2a5/0x620 [ 2652.431595] do_sys_openat2+0x171/0x420 [ 2652.432162] ? build_open_flags+0x6f0/0x6f0 [ 2652.432787] ? rcu_read_lock_any_held+0x75/0xa0 [ 2652.433452] __x64_sys_openat+0x13f/0x1f0 [ 2652.434042] ? __ia32_sys_open+0x1c0/0x1c0 [ 2652.434652] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 2652.435283] ? syscall_enter_from_user_mode+0x1d/0x50 [ 2652.436035] do_syscall_64+0x33/0x40 [ 2652.436566] entry_SYSCALL_64_after_hwframe+0x61/0xc6 [ 2652.437298] RIP: 0033:0x7fca423b8a04 [ 2652.437747] Code: 84 00 00 00 00 00 44 89 54 24 0c e8 96 f9 ff ff 44 8b 54 24 0c 44 89 e2 48 89 ee 41 89 c0 bf 9c ff ff ff b8 01 01 00 00 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 89 44 24 0c e8 c8 f9 ff ff 8b 44 [ 2652.440379] RSP: 002b:00007fca3f97aed0 EFLAGS: 00000293 ORIG_RAX: 0000000000000101 [ 2652.441581] RAX: ffffffffffffffda RBX: 00007fca4244f970 RCX: 00007fca423b8a04 [ 2652.442592] RDX: 0000000000000002 RSI: 00007fca3f97b000 RDI: 00000000ffffff9c [ 2652.443481] RBP: 00007fca3f97b000 R08: 0000000000000000 R09: ffffffffffffffff [ 2652.444492] R10: 0000000000000000 R11: 0000000000000293 R12: 0000000000000002 [ 2652.445499] R13: 0000000000000004 R14: 00000000200004a0 R15: 0000000000000004 [ 2652.451684] EXT4-fs (loop6): mounted filesystem without journal. Opts: ,errors=continue [ 2652.473765] EXT4-fs (loop7): mounted filesystem without journal. Opts: ,errors=continue [ 2652.482613] EXT4-fs (loop2): VFS: Can't find ext4 filesystem 12:46:45 executing program 7: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000180)) (fail_nth: 26) 12:46:45 executing program 6: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000180)) (fail_nth: 12) [ 2652.510497] FAULT_INJECTION: forcing a failure. [ 2652.510497] name failslab, interval 1, probability 0, space 0, times 0 [ 2652.513012] CPU: 0 PID: 13335 Comm: syz-executor.5 Not tainted 5.10.163 #1 [ 2652.514542] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2652.516256] Call Trace: [ 2652.516806] dump_stack+0x107/0x167 [ 2652.517561] should_fail.cold+0x5/0xa [ 2652.518348] ? create_object.isra.0+0x3a/0xa20 [ 2652.519290] should_failslab+0x5/0x20 [ 2652.520129] kmem_cache_alloc+0x5b/0x360 [ 2652.520973] ? percpu_ref_put_many.constprop.0+0x4e/0x100 [ 2652.522142] create_object.isra.0+0x3a/0xa20 [ 2652.523122] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 2652.524209] kmem_cache_alloc+0x159/0x360 [ 2652.525098] security_file_alloc+0x34/0x170 [ 2652.526008] __alloc_file+0xb6/0x320 [ 2652.526799] alloc_empty_file+0x6d/0x170 [ 2652.527679] path_openat+0xde/0x26d0 [ 2652.528482] ? path_lookupat+0x860/0x860 [ 2652.529336] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 2652.530442] ? lock_acquire+0x197/0x490 [ 2652.531300] do_filp_open+0x190/0x3e0 [ 2652.532112] ? may_open_dev+0xf0/0xf0 [ 2652.532922] ? __alloc_fd+0x2a5/0x620 [ 2652.533728] ? lock_downgrade+0x6d0/0x6d0 [ 2652.534607] ? rwlock_bug.part.0+0x90/0x90 [ 2652.535528] ? _raw_spin_unlock+0x1a/0x30 [ 2652.536405] ? __alloc_fd+0x2a5/0x620 [ 2652.537217] do_sys_openat2+0x171/0x420 [ 2652.538065] ? build_open_flags+0x6f0/0x6f0 [ 2652.538967] ? rcu_read_lock_any_held+0x75/0xa0 [ 2652.539974] __x64_sys_openat+0x13f/0x1f0 [ 2652.540847] ? __ia32_sys_open+0x1c0/0x1c0 [ 2652.541742] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 2652.542846] ? syscall_enter_from_user_mode+0x1d/0x50 [ 2652.543935] do_syscall_64+0x33/0x40 [ 2652.544714] entry_SYSCALL_64_after_hwframe+0x61/0xc6 [ 2652.545791] RIP: 0033:0x7f8cf17d3a04 [ 2652.546565] Code: 84 00 00 00 00 00 44 89 54 24 0c e8 96 f9 ff ff 44 8b 54 24 0c 44 89 e2 48 89 ee 41 89 c0 bf 9c ff ff ff b8 01 01 00 00 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 89 44 24 0c e8 c8 f9 ff ff 8b 44 [ 2652.550442] RSP: 002b:00007f8ceed95ed0 EFLAGS: 00000293 ORIG_RAX: 0000000000000101 [ 2652.552059] RAX: ffffffffffffffda RBX: 00007f8cf186a970 RCX: 00007f8cf17d3a04 [ 2652.553557] RDX: 0000000000000002 RSI: 00007f8ceed96000 RDI: 00000000ffffff9c [ 2652.555055] RBP: 00007f8ceed96000 R08: 0000000000000000 R09: ffffffffffffffff [ 2652.556583] R10: 0000000000000000 R11: 0000000000000293 R12: 0000000000000002 [ 2652.558082] R13: 0000000000000004 R14: 00000000200004a0 R15: 0000000000000004 [ 2652.559802] hpet: Lost 2 RTC interrupts [ 2652.628326] EXT4-fs (loop5): mounted filesystem without journal. Opts: ,errors=continue [ 2652.637551] ieee802154 phy0 wpan0: encryption failed: -22 [ 2652.683998] EXT4-fs (loop1): ext4_check_descriptors: Inode table for group 0 overlaps superblock [ 2652.685932] EXT4-fs (loop1): group descriptors corrupted! [ 2652.690362] EXT4-fs (loop4): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 2652.690630] ieee802154 phy0 wpan0: encryption failed: -22 [ 2652.693530] EXT4-fs (loop4): group descriptors corrupted! [ 2652.795337] FAULT_INJECTION: forcing a failure. [ 2652.795337] name failslab, interval 1, probability 0, space 0, times 0 [ 2652.796862] CPU: 1 PID: 13353 Comm: syz-executor.6 Not tainted 5.10.163 #1 [ 2652.797641] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2652.798520] Call Trace: [ 2652.798808] dump_stack+0x107/0x167 [ 2652.799218] should_fail.cold+0x5/0xa [ 2652.799664] ? create_object.isra.0+0x3a/0xa20 [ 2652.800183] should_failslab+0x5/0x20 [ 2652.800612] kmem_cache_alloc+0x5b/0x360 [ 2652.801134] create_object.isra.0+0x3a/0xa20 [ 2652.801629] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 2652.802207] kmem_cache_alloc+0x159/0x360 [ 2652.802650] __alloc_file+0x21/0x320 [ 2652.803073] alloc_empty_file+0x6d/0x170 [ 2652.803550] alloc_file+0x59/0x5a0 [ 2652.803959] alloc_file_pseudo+0x16a/0x250 [ 2652.804435] ? alloc_file+0x5a0/0x5a0 [ 2652.804874] ? shmem_get_inode+0x55c/0xbc0 [ 2652.805384] __shmem_file_setup+0x144/0x320 [ 2652.805908] ? _copy_from_user+0xfb/0x1b0 [ 2652.806393] __do_sys_memfd_create+0x275/0x450 [ 2652.806930] ? memfd_file_seals_ptr+0x170/0x170 [ 2652.807504] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 2652.808121] ? syscall_enter_from_user_mode+0x1d/0x50 [ 2652.808727] do_syscall_64+0x33/0x40 [ 2652.809168] entry_SYSCALL_64_after_hwframe+0x61/0xc6 [ 2652.809768] RIP: 0033:0x7f290af69b19 [ 2652.810208] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2652.812375] RSP: 002b:00007f29084def48 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 2652.813277] RAX: ffffffffffffffda RBX: 0000000020000440 RCX: 00007f290af69b19 [ 2652.814113] RDX: 0000000000004200 RSI: 0000000000000000 RDI: 00007f290afc30fb [ 2652.814850] RBP: 0000000000000004 R08: 0000000000002100 R09: ffffffffffffffff [ 2652.815684] R10: 0000000000000004 R11: 0000000000000246 R12: 0000000008100000 [ 2652.816592] R13: 0000000020000100 R14: 0000000000fffff0 R15: 0000000020000180 [ 2652.820025] FAULT_INJECTION: forcing a failure. [ 2652.820025] name failslab, interval 1, probability 0, space 0, times 0 [ 2652.821435] CPU: 1 PID: 13354 Comm: syz-executor.7 Not tainted 5.10.163 #1 [ 2652.822254] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2652.823117] Call Trace: [ 2652.823524] dump_stack+0x107/0x167 [ 2652.823957] should_fail.cold+0x5/0xa [ 2652.824413] ? security_file_alloc+0x34/0x170 [ 2652.824944] should_failslab+0x5/0x20 [ 2652.825393] kmem_cache_alloc+0x5b/0x360 [ 2652.825877] security_file_alloc+0x34/0x170 [ 2652.826390] __alloc_file+0xb6/0x320 [ 2652.826827] alloc_empty_file+0x6d/0x170 [ 2652.827301] path_openat+0xde/0x26d0 [ 2652.827758] ? path_lookupat+0x860/0x860 [ 2652.828240] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 2652.828853] ? lock_acquire+0x197/0x490 [ 2652.829328] do_filp_open+0x190/0x3e0 [ 2652.829773] ? may_open_dev+0xf0/0xf0 [ 2652.830227] ? __alloc_fd+0x2a5/0x620 [ 2652.830670] ? lock_downgrade+0x6d0/0x6d0 [ 2652.831151] ? rwlock_bug.part.0+0x90/0x90 [ 2652.831655] ? _raw_spin_unlock+0x1a/0x30 [ 2652.832186] ? __alloc_fd+0x2a5/0x620 [ 2652.832636] do_sys_openat2+0x171/0x420 [ 2652.833102] ? build_open_flags+0x6f0/0x6f0 [ 2652.833621] ? rcu_read_lock_any_held+0x75/0xa0 [ 2652.834169] __x64_sys_openat+0x13f/0x1f0 [ 2652.834653] ? __ia32_sys_open+0x1c0/0x1c0 [ 2652.835161] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 2652.835778] ? syscall_enter_from_user_mode+0x1d/0x50 [ 2652.836376] do_syscall_64+0x33/0x40 [ 2652.836809] entry_SYSCALL_64_after_hwframe+0x61/0xc6 [ 2652.837408] RIP: 0033:0x7fca423b8a04 [ 2652.837842] Code: 84 00 00 00 00 00 44 89 54 24 0c e8 96 f9 ff ff 44 8b 54 24 0c 44 89 e2 48 89 ee 41 89 c0 bf 9c ff ff ff b8 01 01 00 00 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 89 44 24 0c e8 c8 f9 ff ff 8b 44 [ 2652.839990] RSP: 002b:00007fca3f97aed0 EFLAGS: 00000293 ORIG_RAX: 0000000000000101 [ 2652.840878] RAX: ffffffffffffffda RBX: 00007fca4244f970 RCX: 00007fca423b8a04 [ 2652.841712] RDX: 0000000000000002 RSI: 00007fca3f97b000 RDI: 00000000ffffff9c [ 2652.842548] RBP: 00007fca3f97b000 R08: 0000000000000000 R09: ffffffffffffffff [ 2652.843378] R10: 0000000000000000 R11: 0000000000000293 R12: 0000000000000002 [ 2652.844218] R13: 0000000000000004 R14: 00000000200004a0 R15: 0000000000000004 [ 2652.873437] EXT4-fs (loop6): mounted filesystem without journal. Opts: ,errors=continue 12:47:01 executing program 6: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000180)) (fail_nth: 13) 12:47:01 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000440)=[{0x0, 0x0, 0x400}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000180)) 12:47:01 executing program 7: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000180)) (fail_nth: 27) 12:47:01 executing program 0: r0 = creat(&(0x7f0000000040)='./file0\x00', 0x0) r1 = creat(&(0x7f0000000040)='./file0\x00', 0x0) fallocate(r1, 0x0, 0x0, 0x8800000) creat(&(0x7f0000000100)='./file0\x00', 0x10) fallocate(r1, 0x3, 0x0, 0x8000) fallocate(r0, 0x0, 0x0, 0x8800000) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = fcntl$dupfd(r2, 0x0, r2) sendmsg$nl_generic(r3, &(0x7f0000000280)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000140)={0x30, 0x1e, 0xc21, 0x0, 0x0, {0x2}, [@typed={0x8, 0x0, 0x0, 0x0, @u32}, @typed={0x14, 0x1, 0x0, 0x0, @ipv6=@private1}]}, 0x30}}, 0x0) epoll_ctl$EPOLL_CTL_ADD(r3, 0x1, r0, &(0x7f0000000000)={0x5}) ioctl$AUTOFS_DEV_IOCTL_ISMOUNTPOINT(r3, 0xc018937e, &(0x7f0000000080)={{0x1, 0x1, 0x18, r3, @out_args}, './file0\x00'}) epoll_ctl$EPOLL_CTL_ADD(r4, 0x1, r1, &(0x7f00000000c0)={0x9000000d}) 12:47:01 executing program 3: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_init_net_socket$802154_raw(0x24, 0x3, 0x0) sendmmsg$inet6(r0, &(0x7f0000004d00)=[{{0x0, 0x0, &(0x7f00000004c0), 0x0, 0x0, 0x0, 0xeffdffff}}], 0x1, 0x0) 12:47:01 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000180)) (fail_nth: 28) 12:47:01 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000180)) (fail_nth: 1) 12:47:01 executing program 4: ioctl$RTC_UIE_ON(0xffffffffffffffff, 0x7003) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x2}, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0xfffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = dup2(0xffffffffffffffff, r0) perf_event_open(&(0x7f00000001c0)={0x2, 0x80, 0x8, 0x9, 0x4, 0x1, 0x0, 0x3b3d, 0x200a0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x2, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0xffff, 0x1, @perf_config_ext={0x7, 0x1}, 0x281, 0xffffffff, 0x4, 0x3, 0x401, 0xffffff47, 0x401, 0x0, 0x3, 0x0, 0x415}, 0x0, 0xffffffffffffffff, r0, 0x1) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400), 0x0, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000180)) pkey_mprotect(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x0, 0xffffffffffffffff) pkey_mprotect(&(0x7f0000ff4000/0x4000)=nil, 0x4000, 0x0, 0xffffffffffffffff) socket$inet_udp(0x2, 0x2, 0x0) getsockopt$inet_int(0xffffffffffffffff, 0x0, 0xe, 0x0, &(0x7f0000000280)) ioctl$sock_SIOCADDDLCI(0xffffffffffffffff, 0x8980, 0x0) ioctl$RTC_ALM_SET(r1, 0x40247007, 0x0) mmap$IORING_OFF_SQES(&(0x7f0000ff3000/0x2000)=nil, 0x2000, 0x2000002, 0x10, r1, 0x10000000) getsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, 0x0, 0x0) [ 2668.836541] FAULT_INJECTION: forcing a failure. [ 2668.836541] name failslab, interval 1, probability 0, space 0, times 0 [ 2668.838941] CPU: 0 PID: 13370 Comm: syz-executor.7 Not tainted 5.10.163 #1 [ 2668.840390] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2668.842230] Call Trace: [ 2668.842785] dump_stack+0x107/0x167 [ 2668.843551] should_fail.cold+0x5/0xa [ 2668.844352] ? create_object.isra.0+0x3a/0xa20 [ 2668.845299] should_failslab+0x5/0x20 [ 2668.846091] kmem_cache_alloc+0x5b/0x360 [ 2668.846934] ? percpu_ref_put_many.constprop.0+0x4e/0x100 [ 2668.848112] create_object.isra.0+0x3a/0xa20 [ 2668.849025] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 2668.850081] kmem_cache_alloc+0x159/0x360 [ 2668.850952] security_file_alloc+0x34/0x170 [ 2668.851873] __alloc_file+0xb6/0x320 [ 2668.852650] alloc_empty_file+0x6d/0x170 [ 2668.853499] path_openat+0xde/0x26d0 [ 2668.854287] ? path_lookupat+0x860/0x860 [ 2668.855135] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 2668.856231] ? lock_acquire+0x197/0x490 [ 2668.857070] do_filp_open+0x190/0x3e0 [ 2668.857860] ? may_open_dev+0xf0/0xf0 [ 2668.858651] ? __alloc_fd+0x2a5/0x620 [ 2668.859441] ? lock_downgrade+0x6d0/0x6d0 [ 2668.860318] ? rwlock_bug.part.0+0x90/0x90 [ 2668.861210] ? _raw_spin_unlock+0x1a/0x30 [ 2668.862070] ? __alloc_fd+0x2a5/0x620 [ 2668.862871] do_sys_openat2+0x171/0x420 [ 2668.863718] ? build_open_flags+0x6f0/0x6f0 [ 2668.864627] ? rcu_read_lock_any_held+0x75/0xa0 [ 2668.865598] __x64_sys_openat+0x13f/0x1f0 [ 2668.866461] ? __ia32_sys_open+0x1c0/0x1c0 [ 2668.867348] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 2668.868448] ? syscall_enter_from_user_mode+0x1d/0x50 [ 2668.869523] do_syscall_64+0x33/0x40 [ 2668.870299] entry_SYSCALL_64_after_hwframe+0x61/0xc6 [ 2668.871363] RIP: 0033:0x7fca423b8a04 [ 2668.872155] Code: 84 00 00 00 00 00 44 89 54 24 0c e8 96 f9 ff ff 44 8b 54 24 0c 44 89 e2 48 89 ee 41 89 c0 bf 9c ff ff ff b8 01 01 00 00 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 89 44 24 0c e8 c8 f9 ff ff 8b 44 [ 2668.875974] RSP: 002b:00007fca3f97aed0 EFLAGS: 00000293 ORIG_RAX: 0000000000000101 [ 2668.877554] RAX: ffffffffffffffda RBX: 00007fca4244f970 RCX: 00007fca423b8a04 [ 2668.879033] RDX: 0000000000000002 RSI: 00007fca3f97b000 RDI: 00000000ffffff9c [ 2668.880528] RBP: 00007fca3f97b000 R08: 0000000000000000 R09: ffffffffffffffff [ 2668.882009] R10: 0000000000000000 R11: 0000000000000293 R12: 0000000000000002 [ 2668.883486] R13: 0000000000000004 R14: 00000000200004a0 R15: 0000000000000004 [ 2668.885172] hpet: Lost 2 RTC interrupts [ 2668.891614] FAULT_INJECTION: forcing a failure. [ 2668.891614] name failslab, interval 1, probability 0, space 0, times 0 [ 2668.894239] CPU: 0 PID: 13371 Comm: syz-executor.6 Not tainted 5.10.163 #1 [ 2668.895776] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2668.897491] Call Trace: [ 2668.898041] dump_stack+0x107/0x167 [ 2668.898801] should_fail.cold+0x5/0xa [ 2668.899591] ? create_object.isra.0+0x3a/0xa20 [ 2668.900551] should_failslab+0x5/0x20 [ 2668.901340] kmem_cache_alloc+0x5b/0x360 [ 2668.902187] ? percpu_ref_put_many.constprop.0+0x4e/0x100 [ 2668.903328] create_object.isra.0+0x3a/0xa20 [ 2668.904248] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 2668.905306] kmem_cache_alloc+0x159/0x360 [ 2668.906175] security_file_alloc+0x34/0x170 [ 2668.907077] __alloc_file+0xb6/0x320 [ 2668.907870] alloc_empty_file+0x6d/0x170 [ 2668.908719] alloc_file+0x59/0x5a0 [ 2668.909465] alloc_file_pseudo+0x16a/0x250 [ 2668.910344] ? alloc_file+0x5a0/0x5a0 [ 2668.911141] ? shmem_get_inode+0x55c/0xbc0 [ 2668.912036] __shmem_file_setup+0x144/0x320 [ 2668.912933] ? _copy_from_user+0xfb/0x1b0 [ 2668.913798] __do_sys_memfd_create+0x275/0x450 [ 2668.914745] ? memfd_file_seals_ptr+0x170/0x170 [ 2668.915732] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 2668.916824] ? syscall_enter_from_user_mode+0x1d/0x50 [ 2668.917902] do_syscall_64+0x33/0x40 [ 2668.918680] entry_SYSCALL_64_after_hwframe+0x61/0xc6 [ 2668.919752] RIP: 0033:0x7f290af69b19 [ 2668.920530] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2668.924353] RSP: 002b:00007f29084def48 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 2668.925933] RAX: ffffffffffffffda RBX: 0000000020000440 RCX: 00007f290af69b19 [ 2668.927411] RDX: 0000000000004200 RSI: 0000000000000000 RDI: 00007f290afc30fb [ 2668.928899] RBP: 0000000000000004 R08: 0000000000002100 R09: ffffffffffffffff [ 2668.930381] R10: 0000000000000004 R11: 0000000000000246 R12: 0000000008100000 [ 2668.931869] R13: 0000000020000100 R14: 0000000000fffff0 R15: 0000000020000180 [ 2668.933503] hpet: Lost 2 RTC interrupts [ 2668.960225] FAULT_INJECTION: forcing a failure. [ 2668.960225] name failslab, interval 1, probability 0, space 0, times 0 [ 2668.963002] CPU: 0 PID: 13374 Comm: syz-executor.5 Not tainted 5.10.163 #1 [ 2668.964469] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2668.966206] Call Trace: [ 2668.966773] dump_stack+0x107/0x167 [ 2668.967543] should_fail.cold+0x5/0xa [ 2668.968366] ? __kthread_create_on_node+0xd1/0x400 [ 2668.969395] should_failslab+0x5/0x20 [ 2668.970199] kmem_cache_alloc_trace+0x55/0x360 [ 2668.971169] ? loop_info64_to_compat+0x5f0/0x5f0 [ 2668.972176] __kthread_create_on_node+0xd1/0x400 [ 2668.973225] ? __kthread_parkme+0x1d0/0x1d0 [ 2668.974150] ? __mutex_lock+0x425/0x12a0 [ 2668.975010] ? loop_configure+0xcb5/0x1480 [ 2668.975915] ? do_raw_spin_unlock+0x4f/0x220 [ 2668.976836] ? loop_info64_to_compat+0x5f0/0x5f0 [ 2668.977829] kthread_create_on_node+0xbb/0x100 [ 2668.978802] ? __kthread_create_on_node+0x400/0x400 [ 2668.979876] ? lockdep_init_map_type+0x2c7/0x780 [ 2668.980887] ? lockdep_init_map_type+0x2c7/0x780 [ 2668.981906] loop_configure+0x3e3/0x1480 [ 2668.982784] lo_ioctl+0xa72/0x1760 [ 2668.983546] ? avc_has_extended_perms+0x7f1/0xec0 [ 2668.984594] ? loop_set_status_old+0x250/0x250 [ 2668.985554] ? avc_ss_reset+0x180/0x180 [ 2668.986389] ? find_held_lock+0x2c/0x110 [ 2668.987252] ? __lock_acquire+0xbb1/0x5b00 [ 2668.988201] ? selinux_inode_getsecctx+0x90/0x90 [ 2668.989189] ? generic_block_fiemap+0x60/0x60 [ 2668.990136] ? loop_set_status_old+0x250/0x250 [ 2668.991106] blkdev_ioctl+0x291/0x710 [ 2668.991939] ? blkdev_common_ioctl+0x1870/0x1870 [ 2668.992951] ? selinux_file_ioctl+0xb1/0x260 [ 2668.993897] block_ioctl+0xf9/0x140 [ 2668.994670] ? blkdev_read_iter+0x1c0/0x1c0 [ 2668.995593] __x64_sys_ioctl+0x19a/0x210 [ 2668.996485] do_syscall_64+0x33/0x40 [ 2668.997286] entry_SYSCALL_64_after_hwframe+0x61/0xc6 [ 2668.998355] RIP: 0033:0x7f8cf18208d7 [ 2668.999151] Code: 3c 1c 48 f7 d8 49 39 c4 72 b8 e8 a4 54 02 00 85 c0 78 bd 48 83 c4 08 4c 89 e0 5b 41 5c c3 0f 1f 44 00 00 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2669.003021] RSP: 002b:00007f8ceed95f48 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 2669.004640] RAX: ffffffffffffffda RBX: 00007f8cf186a970 RCX: 00007f8cf18208d7 [ 2669.006146] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 2669.007657] RBP: 0000000000000005 R08: 0000000000000000 R09: ffffffffffffffff [ 2669.009161] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000004 [ 2669.010660] R13: 0000000000000004 R14: 00000000200004a0 R15: 0000000000000004 [ 2669.012419] hpet: Lost 2 RTC interrupts [ 2669.021433] FAULT_INJECTION: forcing a failure. [ 2669.021433] name failslab, interval 1, probability 0, space 0, times 0 [ 2669.023836] CPU: 0 PID: 13385 Comm: syz-executor.1 Not tainted 5.10.163 #1 [ 2669.025294] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2669.027047] Call Trace: [ 2669.027617] dump_stack+0x107/0x167 [ 2669.028425] should_fail.cold+0x5/0xa [ 2669.029243] ? __do_sys_memfd_create+0xfb/0x450 [ 2669.030235] should_failslab+0x5/0x20 [ 2669.031049] __kmalloc+0x72/0x3f0 [ 2669.031813] __do_sys_memfd_create+0xfb/0x450 [ 2669.032763] ? ksys_write+0x1a9/0x260 [ 2669.033571] ? memfd_file_seals_ptr+0x170/0x170 [ 2669.034559] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 2669.035719] ? syscall_enter_from_user_mode+0x1d/0x50 [ 2669.036815] do_syscall_64+0x33/0x40 [ 2669.037604] entry_SYSCALL_64_after_hwframe+0x61/0xc6 [ 2669.038692] RIP: 0033:0x7f26b1c90b19 [ 2669.039487] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2669.043362] RSP: 002b:00007f26af205f48 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 2669.044976] RAX: ffffffffffffffda RBX: 0000000020000440 RCX: 00007f26b1c90b19 [ 2669.046482] RDX: 0000000000004200 RSI: 0000000000000000 RDI: 00007f26b1cea0fb [ 2669.048006] RBP: 0000000000000004 R08: 0000000000002100 R09: ffffffffffffffff [ 2669.049510] R10: 0000000000000004 R11: 0000000000000246 R12: 0000000008100000 [ 2669.051011] R13: 0000000020000100 R14: 0000000000fffff0 R15: 0000000020000180 [ 2669.052739] hpet: Lost 1 RTC interrupts [ 2669.068443] EXT4-fs (loop2): VFS: Can't find ext4 filesystem [ 2669.127504] EXT4-fs (loop7): mounted filesystem without journal. Opts: ,errors=continue [ 2669.131280] EXT4-fs (loop6): mounted filesystem without journal. Opts: ,errors=continue [ 2669.141987] EXT4-fs (loop4): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 2669.145421] EXT4-fs (loop4): group descriptors corrupted! 12:47:01 executing program 3: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_init_net_socket$802154_raw(0x24, 0x3, 0x0) sendmmsg$inet6(r0, &(0x7f0000004d00)=[{{0x0, 0x0, &(0x7f00000004c0), 0x0, 0x0, 0x0, 0xfffffdef}}], 0x1, 0x0) 12:47:01 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000440)=[{0x0, 0x0, 0x400}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000180)) 12:47:02 executing program 7: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000180)) (fail_nth: 28) 12:47:02 executing program 6: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000180)) (fail_nth: 14) [ 2669.371769] EXT4-fs (loop2): VFS: Can't find ext4 filesystem [ 2669.421283] FAULT_INJECTION: forcing a failure. [ 2669.421283] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 2669.423753] CPU: 0 PID: 13403 Comm: syz-executor.6 Not tainted 5.10.163 #1 [ 2669.425168] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2669.426895] Call Trace: [ 2669.427446] dump_stack+0x107/0x167 [ 2669.428219] should_fail.cold+0x5/0xa [ 2669.429008] __alloc_pages_nodemask+0x182/0x680 [ 2669.429974] ? __alloc_pages_slowpath.constprop.0+0x2220/0x2220 [ 2669.431201] ? lock_downgrade+0x6d0/0x6d0 [ 2669.432083] alloc_pages_vma+0xbb/0x410 [ 2669.432904] shmem_alloc_page+0x10f/0x1e0 [ 2669.433752] ? shmem_init_inode+0x20/0x20 [ 2669.434631] ? percpu_counter_add_batch+0x8b/0x140 [ 2669.435648] ? __vm_enough_memory+0x184/0x360 [ 2669.436576] shmem_getpage_gfp.constprop.0+0x512/0x1920 [ 2669.437686] ? shmem_unuse_inode+0xed0/0xed0 [ 2669.438589] ? ktime_get_coarse_real_ts64+0x15a/0x190 [ 2669.439663] ? iov_iter_fault_in_readable+0x9a/0x410 [ 2669.440713] shmem_write_begin+0xf7/0x1d0 [ 2669.441571] generic_perform_write+0x20a/0x4f0 [ 2669.442525] ? trace_event_raw_event_file_check_and_advance_wb_err+0x4a0/0x4a0 [ 2669.444058] ? evict_inodes+0x420/0x420 [ 2669.444877] ? generic_write_checks+0x2ad/0x390 [ 2669.445849] __generic_file_write_iter+0x39d/0x5d0 [ 2669.446859] generic_file_write_iter+0xdb/0x230 [ 2669.447830] ? iov_iter_init+0x3c/0x130 [ 2669.448647] new_sync_write+0x42c/0x660 [ 2669.449461] ? new_sync_read+0x6f0/0x6f0 [ 2669.450293] ? __x64_sys_pwrite64+0x201/0x260 [ 2669.451211] ? lock_release+0x6b0/0x6b0 [ 2669.452038] ? selinux_file_permission+0x36/0x510 [ 2669.453048] vfs_write+0x747/0xa30 [ 2669.453783] __x64_sys_pwrite64+0x201/0x260 [ 2669.454674] ? ksys_pwrite64+0x1b0/0x1b0 [ 2669.455512] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 2669.456627] ? syscall_enter_from_user_mode+0x1d/0x50 [ 2669.457689] do_syscall_64+0x33/0x40 [ 2669.458456] entry_SYSCALL_64_after_hwframe+0x61/0xc6 [ 2669.459501] RIP: 0033:0x7f290af1cab7 [ 2669.460280] Code: 08 89 3c 24 48 89 4c 24 18 e8 e5 f8 ff ff 4c 8b 54 24 18 48 8b 54 24 10 41 89 c0 48 8b 74 24 08 8b 3c 24 b8 12 00 00 00 0f 05 <48> 3d 00 f0 ff ff 77 31 44 89 c7 48 89 04 24 e8 15 f9 ff ff 48 8b [ 2669.464046] RSP: 002b:00007f29084def20 EFLAGS: 00000293 ORIG_RAX: 0000000000000012 [ 2669.465602] RAX: ffffffffffffffda RBX: 00007f290afb3970 RCX: 00007f290af1cab7 [ 2669.467059] RDX: 000000000000005a RSI: 0000000020000040 RDI: 0000000000000004 [ 2669.468533] RBP: 0000000000000004 R08: 0000000000000000 R09: ffffffffffffffff [ 2669.469988] R10: 0000000000000400 R11: 0000000000000293 R12: 0000000000000004 [ 2669.471442] R13: 0000000000000004 R14: 0000000020000440 R15: 0000000000000000 [ 2669.473135] hpet: Lost 3 RTC interrupts [ 2669.482610] FAULT_INJECTION: forcing a failure. [ 2669.482610] name failslab, interval 1, probability 0, space 0, times 0 [ 2669.485130] CPU: 0 PID: 13404 Comm: syz-executor.7 Not tainted 5.10.163 #1 [ 2669.486552] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2669.488311] Call Trace: [ 2669.488861] dump_stack+0x107/0x167 [ 2669.489626] should_fail.cold+0x5/0xa [ 2669.490411] ? create_object.isra.0+0x3a/0xa20 [ 2669.491364] should_failslab+0x5/0x20 [ 2669.492318] kmem_cache_alloc+0x5b/0x360 [ 2669.493177] ? percpu_ref_put_many.constprop.0+0x4e/0x100 [ 2669.494335] create_object.isra.0+0x3a/0xa20 [ 2669.495259] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 2669.496347] kmem_cache_alloc+0x159/0x360 [ 2669.497230] security_file_alloc+0x34/0x170 [ 2669.498144] __alloc_file+0xb6/0x320 [ 2669.498933] alloc_empty_file+0x6d/0x170 [ 2669.499822] path_openat+0xde/0x26d0 [ 2669.500628] ? path_lookupat+0x860/0x860 [ 2669.501489] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 2669.502593] ? lock_acquire+0x197/0x490 [ 2669.503444] do_filp_open+0x190/0x3e0 [ 2669.504278] ? may_open_dev+0xf0/0xf0 [ 2669.505086] ? __alloc_fd+0x2a5/0x620 [ 2669.505896] ? lock_downgrade+0x6d0/0x6d0 [ 2669.506779] ? rwlock_bug.part.0+0x90/0x90 [ 2669.507698] ? _raw_spin_unlock+0x1a/0x30 [ 2669.508569] ? __alloc_fd+0x2a5/0x620 [ 2669.509402] do_sys_openat2+0x171/0x420 [ 2669.510244] ? build_open_flags+0x6f0/0x6f0 [ 2669.511162] ? rcu_read_lock_any_held+0x75/0xa0 [ 2669.512150] __x64_sys_openat+0x13f/0x1f0 [ 2669.513034] ? __ia32_sys_open+0x1c0/0x1c0 [ 2669.513925] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 2669.515029] ? syscall_enter_from_user_mode+0x1d/0x50 [ 2669.516129] do_syscall_64+0x33/0x40 [ 2669.516921] entry_SYSCALL_64_after_hwframe+0x61/0xc6 [ 2669.518002] RIP: 0033:0x7fca423b8a04 [ 2669.518787] Code: 84 00 00 00 00 00 44 89 54 24 0c e8 96 f9 ff ff 44 8b 54 24 0c 44 89 e2 48 89 ee 41 89 c0 bf 9c ff ff ff b8 01 01 00 00 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 89 44 24 0c e8 c8 f9 ff ff 8b 44 [ 2669.522635] RSP: 002b:00007fca3f97aed0 EFLAGS: 00000293 ORIG_RAX: 0000000000000101 [ 2669.524240] RAX: ffffffffffffffda RBX: 00007fca4244f970 RCX: 00007fca423b8a04 [ 2669.525736] RDX: 0000000000000002 RSI: 00007fca3f97b000 RDI: 00000000ffffff9c [ 2669.527244] RBP: 00007fca3f97b000 R08: 0000000000000000 R09: ffffffffffffffff [ 2669.528764] R10: 0000000000000000 R11: 0000000000000293 R12: 0000000000000002 [ 2669.530270] R13: 0000000000000004 R14: 00000000200004a0 R15: 0000000000000004 [ 2669.531981] hpet: Lost 1 RTC interrupts [ 2669.611055] EXT4-fs (loop6): VFS: Can't find ext4 filesystem [ 2669.626983] EXT4-fs (loop7): mounted filesystem without journal. Opts: ,errors=continue 12:47:19 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000180)) (fail_nth: 2) 12:47:19 executing program 4: ioctl$RTC_UIE_ON(0xffffffffffffffff, 0x7003) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x2}, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0xfffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = dup2(0xffffffffffffffff, r0) perf_event_open(&(0x7f00000001c0)={0x2, 0x80, 0x8, 0x9, 0x4, 0x1, 0x0, 0x3b3d, 0x200a0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x2, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0xffff, 0x1, @perf_config_ext={0x7, 0x1}, 0x281, 0xffffffff, 0x4, 0x3, 0x401, 0xffffff47, 0x401, 0x0, 0x3, 0x0, 0x415}, 0x0, 0xffffffffffffffff, r0, 0x1) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400), 0x0, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000180)) pkey_mprotect(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x0, 0xffffffffffffffff) pkey_mprotect(&(0x7f0000ff4000/0x4000)=nil, 0x4000, 0x0, 0xffffffffffffffff) socket$inet_udp(0x2, 0x2, 0x0) getsockopt$inet_int(0xffffffffffffffff, 0x0, 0xe, 0x0, &(0x7f0000000280)) ioctl$sock_SIOCADDDLCI(0xffffffffffffffff, 0x8980, 0x0) ioctl$RTC_ALM_SET(r1, 0x40247007, 0x0) mmap$IORING_OFF_SQES(&(0x7f0000ff3000/0x2000)=nil, 0x2000, 0x2000002, 0x10, r1, 0x10000000) getsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, 0x0, 0x0) 12:47:19 executing program 7: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000180)) (fail_nth: 29) 12:47:19 executing program 6: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000180)) (fail_nth: 15) 12:47:19 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000180)) (fail_nth: 29) 12:47:19 executing program 3: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_init_net_socket$802154_raw(0x24, 0x3, 0x0) sendmmsg$inet6(r0, &(0x7f0000004d00)=[{{0x0, 0x0, &(0x7f00000004c0), 0x0, 0x0, 0x0, 0xffffff7f}}], 0x1, 0x0) 12:47:19 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000440)=[{0x0, 0x0, 0x400}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000180)) 12:47:19 executing program 0: r0 = creat(&(0x7f0000000040)='./file0\x00', 0x0) r1 = creat(&(0x7f0000000040)='./file0\x00', 0x0) fallocate(r1, 0x0, 0x0, 0x8800000) openat(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x8800, 0x126) fallocate(r1, 0x3, 0x0, 0x8000) fallocate(r0, 0x0, 0x0, 0x8800000) [ 2686.478081] FAULT_INJECTION: forcing a failure. [ 2686.478081] name failslab, interval 1, probability 0, space 0, times 0 [ 2686.479759] CPU: 1 PID: 13421 Comm: syz-executor.7 Not tainted 5.10.163 #1 [ 2686.480779] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2686.482000] Call Trace: [ 2686.482387] dump_stack+0x107/0x167 [ 2686.482942] should_fail.cold+0x5/0xa [ 2686.483528] ? create_object.isra.0+0x3a/0xa20 [ 2686.484219] should_failslab+0x5/0x20 [ 2686.484805] kmem_cache_alloc+0x5b/0x360 [ 2686.485419] create_object.isra.0+0x3a/0xa20 [ 2686.486086] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 2686.486841] kmem_cache_alloc_trace+0x151/0x360 [ 2686.487544] ? loop_info64_to_compat+0x5f0/0x5f0 [ 2686.488300] __kthread_create_on_node+0xd1/0x400 [ 2686.489115] ? __kthread_parkme+0x1d0/0x1d0 [ 2686.489766] ? __mutex_lock+0x425/0x12a0 [ 2686.490360] ? loop_configure+0xcb5/0x1480 [ 2686.491004] ? do_raw_spin_unlock+0x4f/0x220 [ 2686.491641] ? loop_info64_to_compat+0x5f0/0x5f0 [ 2686.492363] kthread_create_on_node+0xbb/0x100 [ 2686.493038] ? __kthread_create_on_node+0x400/0x400 [ 2686.493794] ? lockdep_init_map_type+0x2c7/0x780 [ 2686.494483] ? lockdep_init_map_type+0x2c7/0x780 [ 2686.495204] loop_configure+0x3e3/0x1480 [ 2686.495804] lo_ioctl+0xa72/0x1760 [ 2686.496351] ? avc_has_extended_perms+0x7f1/0xec0 [ 2686.497073] ? loop_set_status_old+0x250/0x250 [ 2686.497826] ? avc_ss_reset+0x180/0x180 [ 2686.498563] ? find_held_lock+0x2c/0x110 [ 2686.499251] ? __lock_acquire+0xbb1/0x5b00 [ 2686.500345] ? selinux_inode_getsecctx+0x90/0x90 [ 2686.501548] ? generic_block_fiemap+0x60/0x60 [ 2686.502694] ? loop_set_status_old+0x250/0x250 [ 2686.503867] blkdev_ioctl+0x291/0x710 [ 2686.504984] ? blkdev_common_ioctl+0x1870/0x1870 [ 2686.506234] ? selinux_file_ioctl+0xb1/0x260 [ 2686.507330] block_ioctl+0xf9/0x140 [ 2686.508142] ? blkdev_read_iter+0x1c0/0x1c0 [ 2686.509048] __x64_sys_ioctl+0x19a/0x210 [ 2686.509881] do_syscall_64+0x33/0x40 [ 2686.510655] entry_SYSCALL_64_after_hwframe+0x61/0xc6 [ 2686.511710] RIP: 0033:0x7fca424058d7 [ 2686.512473] Code: 3c 1c 48 f7 d8 49 39 c4 72 b8 e8 a4 54 02 00 85 c0 78 bd 48 83 c4 08 4c 89 e0 5b 41 5c c3 0f 1f 44 00 00 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2686.516275] RSP: 002b:00007fca3f97af48 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 2686.517851] RAX: ffffffffffffffda RBX: 00007fca4244f970 RCX: 00007fca424058d7 [ 2686.519303] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 2686.520858] RBP: 0000000000000005 R08: 0000000000000000 R09: ffffffffffffffff [ 2686.522319] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000004 [ 2686.523790] R13: 0000000000000004 R14: 00000000200004a0 R15: 0000000000000004 [ 2686.527523] FAULT_INJECTION: forcing a failure. [ 2686.527523] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 2686.529925] CPU: 1 PID: 13426 Comm: syz-executor.6 Not tainted 5.10.163 #1 [ 2686.531350] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2686.533061] Call Trace: [ 2686.533605] dump_stack+0x107/0x167 [ 2686.534369] should_fail.cold+0x5/0xa [ 2686.535167] iov_iter_copy_from_user_atomic+0x49b/0xdb0 [ 2686.536335] ? shmem_write_begin+0xf7/0x1d0 [ 2686.537225] ? shmem_write_begin+0x100/0x1d0 [ 2686.538146] generic_perform_write+0x279/0x4f0 [ 2686.539118] ? trace_event_raw_event_file_check_and_advance_wb_err+0x4a0/0x4a0 [ 2686.540607] ? evict_inodes+0x420/0x420 [ 2686.541424] ? generic_write_checks+0x2ad/0x390 [ 2686.542386] __generic_file_write_iter+0x39d/0x5d0 [ 2686.543403] generic_file_write_iter+0xdb/0x230 [ 2686.544366] ? iov_iter_init+0x3c/0x130 [ 2686.545192] new_sync_write+0x42c/0x660 [ 2686.546010] ? new_sync_read+0x6f0/0x6f0 [ 2686.546851] ? __x64_sys_pwrite64+0x201/0x260 [ 2686.547786] ? lock_release+0x6b0/0x6b0 [ 2686.548605] ? selinux_file_permission+0x36/0x510 [ 2686.549608] vfs_write+0x747/0xa30 [ 2686.550356] __x64_sys_pwrite64+0x201/0x260 [ 2686.551324] ? ksys_pwrite64+0x1b0/0x1b0 [ 2686.552185] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 2686.553271] ? syscall_enter_from_user_mode+0x1d/0x50 [ 2686.554307] do_syscall_64+0x33/0x40 [ 2686.555067] entry_SYSCALL_64_after_hwframe+0x61/0xc6 [ 2686.556103] RIP: 0033:0x7f290af1cab7 [ 2686.556859] Code: 08 89 3c 24 48 89 4c 24 18 e8 e5 f8 ff ff 4c 8b 54 24 18 48 8b 54 24 10 41 89 c0 48 8b 74 24 08 8b 3c 24 b8 12 00 00 00 0f 05 <48> 3d 00 f0 ff ff 77 31 44 89 c7 48 89 04 24 e8 15 f9 ff ff 48 8b [ 2686.560543] RSP: 002b:00007f29084def20 EFLAGS: 00000293 ORIG_RAX: 0000000000000012 [ 2686.562078] RAX: ffffffffffffffda RBX: 00007f290afb3970 RCX: 00007f290af1cab7 [ 2686.563475] RDX: 000000000000005a RSI: 0000000020000040 RDI: 0000000000000004 [ 2686.564876] RBP: 0000000000000004 R08: 0000000000000000 R09: ffffffffffffffff [ 2686.566277] R10: 0000000000000400 R11: 0000000000000293 R12: 0000000000000004 [ 2686.567791] R13: 0000000000000004 R14: 0000000020000440 R15: 0000000000000000 [ 2686.570501] FAULT_INJECTION: forcing a failure. [ 2686.570501] name failslab, interval 1, probability 0, space 0, times 0 [ 2686.573152] CPU: 0 PID: 13424 Comm: syz-executor.1 Not tainted 5.10.163 #1 [ 2686.574685] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2686.576533] Call Trace: [ 2686.577144] dump_stack+0x107/0x167 [ 2686.577966] should_fail.cold+0x5/0xa [ 2686.578820] ? create_object.isra.0+0x3a/0xa20 [ 2686.580104] should_failslab+0x5/0x20 [ 2686.581053] kmem_cache_alloc+0x5b/0x360 [ 2686.582056] create_object.isra.0+0x3a/0xa20 [ 2686.583165] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 2686.584430] __kmalloc+0x16e/0x3f0 [ 2686.585312] __do_sys_memfd_create+0xfb/0x450 [ 2686.586409] ? ksys_write+0x1a9/0x260 [ 2686.587343] ? memfd_file_seals_ptr+0x170/0x170 [ 2686.588518] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 2686.589670] ? syscall_enter_from_user_mode+0x1d/0x50 [ 2686.590805] do_syscall_64+0x33/0x40 [ 2686.591626] entry_SYSCALL_64_after_hwframe+0x61/0xc6 [ 2686.592757] RIP: 0033:0x7f26b1c90b19 [ 2686.593578] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2686.597637] RSP: 002b:00007f26af205f48 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 2686.599310] RAX: ffffffffffffffda RBX: 0000000020000440 RCX: 00007f26b1c90b19 [ 2686.600891] RDX: 0000000000004200 RSI: 0000000000000000 RDI: 00007f26b1cea0fb [ 2686.602451] RBP: 0000000000000004 R08: 0000000000002100 R09: ffffffffffffffff [ 2686.604023] R10: 0000000000000004 R11: 0000000000000246 R12: 0000000008100000 [ 2686.605597] R13: 0000000020000100 R14: 0000000000fffff0 R15: 0000000020000180 [ 2686.607382] hpet: Lost 1 RTC interrupts [ 2686.630204] FAULT_INJECTION: forcing a failure. [ 2686.630204] name failslab, interval 1, probability 0, space 0, times 0 [ 2686.633161] CPU: 0 PID: 13420 Comm: syz-executor.5 Not tainted 5.10.163 #1 [ 2686.634694] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2686.636641] Call Trace: [ 2686.637230] dump_stack+0x107/0x167 [ 2686.638049] should_fail.cold+0x5/0xa [ 2686.638894] ? create_object.isra.0+0x3a/0xa20 [ 2686.639917] should_failslab+0x5/0x20 [ 2686.640768] kmem_cache_alloc+0x5b/0x360 [ 2686.641677] create_object.isra.0+0x3a/0xa20 [ 2686.642659] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 2686.643783] kmem_cache_alloc_trace+0x151/0x360 [ 2686.644840] ? loop_info64_to_compat+0x5f0/0x5f0 [ 2686.645911] __kthread_create_on_node+0xd1/0x400 [ 2686.646971] ? __kthread_parkme+0x1d0/0x1d0 [ 2686.647945] ? __mutex_lock+0x425/0x12a0 [ 2686.648850] ? loop_configure+0xcb5/0x1480 [ 2686.649797] ? do_raw_spin_unlock+0x4f/0x220 [ 2686.650767] ? loop_info64_to_compat+0x5f0/0x5f0 [ 2686.651827] kthread_create_on_node+0xbb/0x100 [ 2686.652843] ? __kthread_create_on_node+0x400/0x400 [ 2686.653965] ? lockdep_init_map_type+0x2c7/0x780 [ 2686.655008] ? lockdep_init_map_type+0x2c7/0x780 [ 2686.656091] loop_configure+0x3e3/0x1480 [ 2686.657003] lo_ioctl+0xa72/0x1760 [ 2686.657799] ? avc_has_extended_perms+0x7f1/0xec0 [ 2686.658864] ? loop_set_status_old+0x250/0x250 [ 2686.659891] ? avc_ss_reset+0x180/0x180 [ 2686.660773] ? find_held_lock+0x2c/0x110 [ 2686.661690] ? __lock_acquire+0xbb1/0x5b00 [ 2686.662678] ? selinux_inode_getsecctx+0x90/0x90 [ 2686.663738] ? generic_block_fiemap+0x60/0x60 [ 2686.664743] ? loop_set_status_old+0x250/0x250 [ 2686.665761] blkdev_ioctl+0x291/0x710 [ 2686.666602] ? blkdev_common_ioctl+0x1870/0x1870 [ 2686.667664] ? selinux_file_ioctl+0xb1/0x260 [ 2686.668657] block_ioctl+0xf9/0x140 [ 2686.669469] ? blkdev_read_iter+0x1c0/0x1c0 [ 2686.670422] __x64_sys_ioctl+0x19a/0x210 [ 2686.671336] do_syscall_64+0x33/0x40 [ 2686.672165] entry_SYSCALL_64_after_hwframe+0x61/0xc6 [ 2686.673306] RIP: 0033:0x7f8cf18208d7 [ 2686.674130] Code: 3c 1c 48 f7 d8 49 39 c4 72 b8 e8 a4 54 02 00 85 c0 78 bd 48 83 c4 08 4c 89 e0 5b 41 5c c3 0f 1f 44 00 00 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2686.678258] RSP: 002b:00007f8ceed95f48 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 2686.679961] RAX: ffffffffffffffda RBX: 00007f8cf186a970 RCX: 00007f8cf18208d7 [ 2686.681569] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 2686.683167] RBP: 0000000000000005 R08: 0000000000000000 R09: ffffffffffffffff [ 2686.684778] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000004 [ 2686.686374] R13: 0000000000000004 R14: 00000000200004a0 R15: 0000000000000004 [ 2686.688200] hpet: Lost 2 RTC interrupts 12:47:19 executing program 3: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_init_net_socket$802154_raw(0x24, 0x3, 0x0) sendmmsg$inet6(r0, &(0x7f0000004d00)=[{{0x0, 0x0, &(0x7f00000004c0)}}], 0x1, 0x0) 12:47:19 executing program 0: r0 = creat(&(0x7f0000000040)='./file0\x00', 0x0) r1 = creat(&(0x7f0000000040)='./file0\x00', 0x141) fallocate(r1, 0x0, 0x0, 0x8800000) fallocate(r1, 0x3, 0x0, 0x8000) fallocate(r0, 0x0, 0x0, 0x8800000) [ 2686.814996] EXT4-fs (loop2): VFS: Can't find ext4 filesystem [ 2686.862152] EXT4-fs (loop4): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 2686.867678] EXT4-fs (loop4): group descriptors corrupted! [ 2686.876400] EXT4-fs (loop7): mounted filesystem without journal. Opts: ,errors=continue [ 2686.880417] EXT4-fs (loop5): mounted filesystem without journal. Opts: ,errors=continue [ 2686.884068] EXT4-fs (loop1): mounted filesystem without journal. Opts: ,errors=continue [ 2686.888634] EXT4-fs (loop6): mounted filesystem without journal. Opts: ,errors=continue 12:47:19 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000440)=[{&(0x7f0000000040), 0x0, 0x400}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000180)) 12:47:19 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000180)) (fail_nth: 30) 12:47:19 executing program 6: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000180)) (fail_nth: 16) 12:47:19 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000180)) (fail_nth: 3) 12:47:19 executing program 7: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000180)) (fail_nth: 30) 12:47:19 executing program 4: ioctl$RTC_UIE_ON(0xffffffffffffffff, 0x7003) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x2}, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0xfffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = dup2(0xffffffffffffffff, r0) perf_event_open(&(0x7f00000001c0)={0x2, 0x80, 0x8, 0x9, 0x4, 0x1, 0x0, 0x3b3d, 0x200a0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x2, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0xffff, 0x1, @perf_config_ext={0x7, 0x1}, 0x281, 0xffffffff, 0x4, 0x3, 0x401, 0xffffff47, 0x401, 0x0, 0x3, 0x0, 0x415}, 0x0, 0xffffffffffffffff, r0, 0x1) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400), 0x0, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000180)) pkey_mprotect(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x0, 0xffffffffffffffff) pkey_mprotect(&(0x7f0000ff4000/0x4000)=nil, 0x4000, 0x0, 0xffffffffffffffff) socket$inet_udp(0x2, 0x2, 0x0) getsockopt$inet_int(0xffffffffffffffff, 0x0, 0xe, 0x0, &(0x7f0000000280)) ioctl$sock_SIOCADDDLCI(0xffffffffffffffff, 0x8980, 0x0) ioctl$RTC_ALM_SET(r1, 0x40247007, 0x0) mmap$IORING_OFF_SQES(&(0x7f0000ff3000/0x2000)=nil, 0x2000, 0x2000002, 0x10, r1, 0x10000000) getsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, 0x0, 0x0) 12:47:19 executing program 3: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_init_net_socket$802154_raw(0x24, 0x3, 0x0) sendmmsg$inet6(r0, &(0x7f0000004d00)=[{{0x0, 0x0, &(0x7f00000004c0)}, 0x4}], 0x1, 0x0) 12:47:19 executing program 0: r0 = creat(&(0x7f0000000040)='./file0\x00', 0x0) r1 = creat(&(0x7f0000000040)='./file0\x00', 0x0) r2 = syz_init_net_socket$802154_raw(0x24, 0x3, 0x0) bind$802154_raw(r2, &(0x7f0000000000)={0x24, @long={0x3, 0x2, {0xaaaaaaaaaaaa0002}}}, 0x14) bind$802154_raw(r2, &(0x7f0000000040)={0x24, @short={0x2, 0x2367f916dda8ac21, 0xaaa0}}, 0x14) sendmmsg$inet6(r2, &(0x7f0000004d00)=[{{0x0, 0x0, &(0x7f00000004c0)=[{&(0x7f0000000080)='K', 0x4c}], 0x1}}], 0x7ffff000, 0x0) sendfile(r1, r2, &(0x7f0000000080)=0x8000, 0xffffffffffffff8c) fallocate(r1, 0x0, 0x0, 0x8800000) fallocate(r1, 0x3, 0x0, 0x8000) fallocate(r0, 0x0, 0x0, 0x8800000) ioctl$FITRIM(r0, 0xc0185879, &(0x7f0000000000)={0x7fffffff, 0x6}) r3 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCGIFINDEX(r3, 0x8914, &(0x7f0000000140)={'lo\x00', 0x0}) setsockopt$inet6_IPV6_PKTINFO(0xffffffffffffffff, 0x29, 0x32, &(0x7f0000000040)={@private0, r4}, 0x14) bind$packet(r1, &(0x7f00000000c0)={0x11, 0x3, r4, 0x1, 0x5, 0x6, @local}, 0x14) [ 2687.168229] EXT4-fs (loop2): VFS: Can't find ext4 filesystem [ 2687.273453] FAULT_INJECTION: forcing a failure. [ 2687.273453] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 2687.275880] CPU: 1 PID: 13460 Comm: syz-executor.6 Not tainted 5.10.163 #1 [ 2687.277269] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2687.278954] Call Trace: [ 2687.279500] dump_stack+0x107/0x167 [ 2687.280272] should_fail.cold+0x5/0xa [ 2687.281066] iov_iter_copy_from_user_atomic+0x49b/0xdb0 [ 2687.282169] ? shmem_write_begin+0xf7/0x1d0 [ 2687.283045] ? shmem_write_begin+0x100/0x1d0 [ 2687.283948] generic_perform_write+0x279/0x4f0 [ 2687.284900] ? trace_event_raw_event_file_check_and_advance_wb_err+0x4a0/0x4a0 [ 2687.286421] ? evict_inodes+0x420/0x420 [ 2687.287226] ? generic_write_checks+0x2ad/0x390 [ 2687.288190] __generic_file_write_iter+0x39d/0x5d0 [ 2687.289182] generic_file_write_iter+0xdb/0x230 [ 2687.290113] ? iov_iter_init+0x3c/0x130 [ 2687.290917] new_sync_write+0x42c/0x660 [ 2687.291717] ? new_sync_read+0x6f0/0x6f0 [ 2687.292545] ? __x64_sys_pwrite64+0x201/0x260 [ 2687.293456] ? lock_release+0x6b0/0x6b0 [ 2687.294262] ? selinux_file_permission+0x36/0x510 [ 2687.295257] vfs_write+0x747/0xa30 [ 2687.295992] __x64_sys_pwrite64+0x201/0x260 [ 2687.296864] ? ksys_pwrite64+0x1b0/0x1b0 [ 2687.297690] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 2687.298750] ? syscall_enter_from_user_mode+0x1d/0x50 [ 2687.299794] do_syscall_64+0x33/0x40 [ 2687.300564] entry_SYSCALL_64_after_hwframe+0x61/0xc6 [ 2687.301658] RIP: 0033:0x7f290af1cab7 [ 2687.302412] Code: 08 89 3c 24 48 89 4c 24 18 e8 e5 f8 ff ff 4c 8b 54 24 18 48 8b 54 24 10 41 89 c0 48 8b 74 24 08 8b 3c 24 b8 12 00 00 00 0f 05 <48> 3d 00 f0 ff ff 77 31 44 89 c7 48 89 04 24 e8 15 f9 ff ff 48 8b [ 2687.306127] RSP: 002b:00007f29084def20 EFLAGS: 00000293 ORIG_RAX: 0000000000000012 [ 2687.307660] RAX: ffffffffffffffda RBX: 00007f290afb3970 RCX: 00007f290af1cab7 [ 2687.309102] RDX: 0000000000000009 RSI: 0000000020010400 RDI: 0000000000000004 [ 2687.310540] RBP: 0000000000000004 R08: 0000000000000000 R09: ffffffffffffffff [ 2687.311991] R10: 0000000000000800 R11: 0000000000000293 R12: 0000000000000004 [ 2687.313429] R13: 0000000000000004 R14: 0000000020000470 R15: 0000000000000002 12:47:20 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000440)=[{&(0x7f0000000040), 0x0, 0x400}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000180)) [ 2687.333438] FAULT_INJECTION: forcing a failure. [ 2687.333438] name failslab, interval 1, probability 0, space 0, times 0 [ 2687.335785] CPU: 1 PID: 13463 Comm: syz-executor.7 Not tainted 5.10.163 #1 [ 2687.337184] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2687.338861] Call Trace: [ 2687.339400] dump_stack+0x107/0x167 [ 2687.340156] should_fail.cold+0x5/0xa [ 2687.340931] ? __kernfs_new_node+0xd4/0x850 [ 2687.341818] should_failslab+0x5/0x20 [ 2687.342597] kmem_cache_alloc+0x5b/0x360 [ 2687.343417] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 2687.344501] __kernfs_new_node+0xd4/0x850 [ 2687.345341] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 2687.346400] ? lock_chain_count+0x20/0x20 [ 2687.347239] ? kernfs_dop_revalidate+0x3a0/0x3a0 [ 2687.348301] ? find_held_lock+0x2c/0x110 [ 2687.349132] ? set_user_nice.part.0+0x2fd/0x760 [ 2687.350079] kernfs_create_dir_ns+0x9c/0x230 [ 2687.350974] internal_create_group+0x793/0xb30 [ 2687.351921] ? set_user_nice.part.0+0x2fd/0x760 [ 2687.352861] ? sysfs_remove_group+0x170/0x170 [ 2687.353770] ? lockdep_init_map_type+0x2c7/0x780 [ 2687.354734] ? blk_queue_flag_set+0x22/0x30 [ 2687.355605] ? __loop_update_dio+0x2d2/0x690 [ 2687.356506] loop_configure+0x954/0x1480 [ 2687.357339] lo_ioctl+0xa72/0x1760 [ 2687.358060] ? avc_has_extended_perms+0x7f1/0xec0 [ 2687.359038] ? loop_set_status_old+0x250/0x250 [ 2687.359983] ? avc_ss_reset+0x180/0x180 [ 2687.360792] ? find_held_lock+0x2c/0x110 [ 2687.361623] ? __lock_acquire+0xbb1/0x5b00 [ 2687.362531] ? selinux_inode_getsecctx+0x90/0x90 [ 2687.363490] ? generic_block_fiemap+0x60/0x60 [ 2687.364572] ? loop_set_status_old+0x250/0x250 [ 2687.365609] blkdev_ioctl+0x291/0x710 [ 2687.366426] ? blkdev_common_ioctl+0x1870/0x1870 [ 2687.367386] ? selinux_file_ioctl+0xb1/0x260 [ 2687.368291] block_ioctl+0xf9/0x140 [ 2687.369024] ? blkdev_read_iter+0x1c0/0x1c0 [ 2687.369894] __x64_sys_ioctl+0x19a/0x210 [ 2687.370715] do_syscall_64+0x33/0x40 [ 2687.371470] entry_SYSCALL_64_after_hwframe+0x61/0xc6 [ 2687.372513] RIP: 0033:0x7fca424058d7 [ 2687.373297] Code: 3c 1c 48 f7 d8 49 39 c4 72 b8 e8 a4 54 02 00 85 c0 78 bd 48 83 c4 08 4c 89 e0 5b 41 5c c3 0f 1f 44 00 00 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2687.377247] RSP: 002b:00007fca3f97af48 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 2687.378786] RAX: ffffffffffffffda RBX: 00007fca4244f970 RCX: 00007fca424058d7 [ 2687.380302] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 2687.381740] RBP: 0000000000000005 R08: 0000000000000000 R09: ffffffffffffffff [ 2687.383180] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000004 [ 2687.384632] R13: 0000000000000004 R14: 00000000200004a0 R15: 0000000000000004 [ 2687.398477] FAULT_INJECTION: forcing a failure. [ 2687.398477] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 2687.401063] CPU: 1 PID: 13468 Comm: syz-executor.1 Not tainted 5.10.163 #1 [ 2687.402458] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2687.404170] Call Trace: [ 2687.404706] dump_stack+0x107/0x167 [ 2687.405444] should_fail.cold+0x5/0xa [ 2687.406221] _copy_from_user+0x2e/0x1b0 [ 2687.407029] __do_sys_memfd_create+0x16d/0x450 [ 2687.407965] ? memfd_file_seals_ptr+0x170/0x170 [ 2687.408913] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 2687.409975] ? syscall_enter_from_user_mode+0x1d/0x50 [ 2687.411095] do_syscall_64+0x33/0x40 [ 2687.411852] entry_SYSCALL_64_after_hwframe+0x61/0xc6 [ 2687.412914] RIP: 0033:0x7f26b1c90b19 [ 2687.413669] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2687.417387] RSP: 002b:00007f26af205f48 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 2687.418927] RAX: ffffffffffffffda RBX: 0000000020000440 RCX: 00007f26b1c90b19 [ 2687.420374] RDX: 0000000000004200 RSI: 0000000000000000 RDI: 00007f26b1cea0fb [ 2687.421813] RBP: 0000000000000004 R08: 0000000000002100 R09: ffffffffffffffff [ 2687.423255] R10: 0000000000000004 R11: 0000000000000246 R12: 0000000008100000 [ 2687.424713] R13: 0000000020000100 R14: 0000000000fffff0 R15: 0000000020000180 [ 2687.440345] FAULT_INJECTION: forcing a failure. [ 2687.440345] name failslab, interval 1, probability 0, space 0, times 0 [ 2687.443098] CPU: 0 PID: 13466 Comm: syz-executor.5 Not tainted 5.10.163 #1 [ 2687.444643] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2687.446472] Call Trace: [ 2687.447062] dump_stack+0x107/0x167 [ 2687.447887] should_fail.cold+0x5/0xa [ 2687.448737] ? __kernfs_new_node+0xd4/0x850 [ 2687.449695] should_failslab+0x5/0x20 [ 2687.450540] kmem_cache_alloc+0x5b/0x360 [ 2687.451438] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 2687.452617] __kernfs_new_node+0xd4/0x850 [ 2687.453531] ? lock_chain_count+0x20/0x20 [ 2687.454445] ? kernfs_dop_revalidate+0x3a0/0x3a0 [ 2687.455488] ? lock_acquire+0x197/0x490 [ 2687.456371] ? task_rq_lock+0xab/0x270 [ 2687.457237] ? find_held_lock+0x2c/0x110 [ 2687.458157] ? set_user_nice.part.0+0x2fd/0x760 [ 2687.459190] kernfs_create_dir_ns+0x9c/0x230 [ 2687.460188] internal_create_group+0x793/0xb30 [ 2687.461201] ? set_user_nice.part.0+0x2fd/0x760 [ 2687.462226] ? sysfs_remove_group+0x170/0x170 [ 2687.463219] ? lockdep_init_map_type+0x2c7/0x780 [ 2687.464274] ? blk_queue_flag_set+0x22/0x30 [ 2687.465221] ? __loop_update_dio+0x2d2/0x690 [ 2687.466196] loop_configure+0x954/0x1480 [ 2687.467104] lo_ioctl+0xa72/0x1760 [ 2687.467893] ? avc_has_extended_perms+0x7f1/0xec0 [ 2687.468959] ? loop_set_status_old+0x250/0x250 [ 2687.469969] ? avc_ss_reset+0x180/0x180 [ 2687.470850] ? find_held_lock+0x2c/0x110 [ 2687.471757] ? __lock_acquire+0xbb1/0x5b00 [ 2687.472769] ? selinux_inode_getsecctx+0x90/0x90 [ 2687.473812] ? generic_block_fiemap+0x60/0x60 [ 2687.474809] ? loop_set_status_old+0x250/0x250 [ 2687.475812] blkdev_ioctl+0x291/0x710 [ 2687.476662] ? blkdev_common_ioctl+0x1870/0x1870 [ 2687.477715] ? selinux_file_ioctl+0xb1/0x260 [ 2687.478689] block_ioctl+0xf9/0x140 [ 2687.479491] ? blkdev_read_iter+0x1c0/0x1c0 [ 2687.480450] __x64_sys_ioctl+0x19a/0x210 [ 2687.481348] do_syscall_64+0x33/0x40 [ 2687.482172] entry_SYSCALL_64_after_hwframe+0x61/0xc6 [ 2687.483299] RIP: 0033:0x7f8cf18208d7 [ 2687.484134] Code: 3c 1c 48 f7 d8 49 39 c4 72 b8 e8 a4 54 02 00 85 c0 78 bd 48 83 c4 08 4c 89 e0 5b 41 5c c3 0f 1f 44 00 00 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2687.488195] RSP: 002b:00007f8ceed95f48 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 2687.489874] RAX: ffffffffffffffda RBX: 00007f8cf186a970 RCX: 00007f8cf18208d7 [ 2687.491442] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 2687.493018] RBP: 0000000000000005 R08: 0000000000000000 R09: ffffffffffffffff [ 2687.494586] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000004 [ 2687.496171] R13: 0000000000000004 R14: 00000000200004a0 R15: 0000000000000004 [ 2687.497998] hpet: Lost 2 RTC interrupts [ 2687.538209] ieee802154 phy0 wpan0: encryption failed: -22 [ 2687.542650] EXT4-fs (loop5): mounted filesystem without journal. Opts: ,errors=continue 12:47:20 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000180)) (fail_nth: 4) [ 2687.588284] EXT4-fs (loop7): mounted filesystem without journal. Opts: ,errors=continue [ 2687.592625] EXT4-fs (loop6): mounted filesystem without journal. Opts: ,errors=continue [ 2687.631687] EXT4-fs (loop4): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 2687.634198] EXT4-fs (loop4): group descriptors corrupted! 12:47:20 executing program 3: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_init_net_socket$802154_raw(0x24, 0x3, 0x0) sendmmsg$inet6(r0, &(0x7f0000004d00)=[{{0x0, 0x0, &(0x7f00000004c0)}, 0x7f00}], 0x1, 0x0) [ 2687.695616] ieee802154 phy0 wpan0: encryption failed: -22 [ 2687.725775] EXT4-fs (loop2): VFS: Can't find ext4 filesystem [ 2687.839850] FAULT_INJECTION: forcing a failure. [ 2687.839850] name failslab, interval 1, probability 0, space 0, times 0 [ 2687.842431] CPU: 0 PID: 13488 Comm: syz-executor.1 Not tainted 5.10.163 #1 [ 2687.843976] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2687.845814] Call Trace: [ 2687.846408] dump_stack+0x107/0x167 [ 2687.847224] should_fail.cold+0x5/0xa [ 2687.848124] ? shmem_alloc_inode+0x18/0x40 [ 2687.849070] should_failslab+0x5/0x20 [ 2687.849913] kmem_cache_alloc+0x5b/0x360 [ 2687.850814] ? shmem_destroy_inode+0x70/0x70 [ 2687.851787] shmem_alloc_inode+0x18/0x40 [ 2687.852704] ? shmem_destroy_inode+0x70/0x70 [ 2687.853670] alloc_inode+0x63/0x240 [ 2687.854472] new_inode+0x23/0x250 [ 2687.855244] shmem_get_inode+0x15e/0xbc0 [ 2687.856163] __shmem_file_setup+0xb8/0x320 [ 2687.857097] ? _copy_from_user+0xfb/0x1b0 [ 2687.858016] __do_sys_memfd_create+0x275/0x450 [ 2687.859027] ? memfd_file_seals_ptr+0x170/0x170 [ 2687.860067] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 2687.861225] ? syscall_enter_from_user_mode+0x1d/0x50 [ 2687.862367] do_syscall_64+0x33/0x40 [ 2687.863192] entry_SYSCALL_64_after_hwframe+0x61/0xc6 [ 2687.864341] RIP: 0033:0x7f26b1c90b19 [ 2687.865167] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2687.869228] RSP: 002b:00007f26af205f48 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 2687.870919] RAX: ffffffffffffffda RBX: 0000000020000440 RCX: 00007f26b1c90b19 [ 2687.872505] RDX: 0000000000004200 RSI: 0000000000000000 RDI: 00007f26b1cea0fb [ 2687.874076] RBP: 0000000000000004 R08: 0000000000002100 R09: ffffffffffffffff [ 2687.875645] R10: 0000000000000004 R11: 0000000000000246 R12: 0000000008100000 [ 2687.877227] R13: 0000000020000100 R14: 0000000000fffff0 R15: 0000000020000180 [ 2687.878994] hpet: Lost 1 RTC interrupts 12:47:35 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000180)) (fail_nth: 31) 12:47:35 executing program 3: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_init_net_socket$802154_raw(0x24, 0x3, 0x0) sendmmsg$inet6(r0, &(0x7f0000004d00)=[{{0x0, 0x0, &(0x7f00000004c0)}, 0x40000}], 0x1, 0x0) 12:47:35 executing program 6: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000180)) (fail_nth: 17) 12:47:35 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000180)) (fail_nth: 5) 12:47:35 executing program 4: ioctl$RTC_UIE_ON(0xffffffffffffffff, 0x7003) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x2}, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0xfffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = dup2(0xffffffffffffffff, r0) perf_event_open(&(0x7f00000001c0)={0x2, 0x80, 0x8, 0x9, 0x4, 0x1, 0x0, 0x3b3d, 0x200a0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x2, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0xffff, 0x1, @perf_config_ext={0x7, 0x1}, 0x281, 0xffffffff, 0x4, 0x3, 0x401, 0xffffff47, 0x401, 0x0, 0x3, 0x0, 0x415}, 0x0, 0xffffffffffffffff, r0, 0x1) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="0200000003", 0x5, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000180)) pkey_mprotect(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x0, 0xffffffffffffffff) pkey_mprotect(&(0x7f0000ff4000/0x4000)=nil, 0x4000, 0x0, 0xffffffffffffffff) socket$inet_udp(0x2, 0x2, 0x0) getsockopt$inet_int(0xffffffffffffffff, 0x0, 0xe, 0x0, &(0x7f0000000280)) ioctl$sock_SIOCADDDLCI(0xffffffffffffffff, 0x8980, 0x0) ioctl$RTC_ALM_SET(r1, 0x40247007, 0x0) mmap$IORING_OFF_SQES(&(0x7f0000ff3000/0x2000)=nil, 0x2000, 0x2000002, 0x10, r1, 0x10000000) getsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, 0x0, 0x0) 12:47:35 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000440)=[{&(0x7f0000000040), 0x0, 0x400}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000180)) 12:47:35 executing program 0: r0 = creat(&(0x7f0000000040)='./file0\x00', 0x0) fallocate(r0, 0x2, 0xfffffffffffffffd, 0x8800000) fallocate(r0, 0x3, 0x0, 0x8000) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x8800000) ioctl$AUTOFS_DEV_IOCTL_READY(0xffffffffffffffff, 0xc0189376, &(0x7f0000000000)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0xfffffff7}}, './file0\x00'}) r2 = syz_init_net_socket$802154_raw(0x24, 0x3, 0x0) bind$802154_raw(r2, &(0x7f0000000000)={0x24, @long={0x3, 0x2, {0xaaaaaaaaaaaa0002}}}, 0x14) bind$802154_raw(r2, &(0x7f0000000040)={0x24, @short={0x2, 0x2367f916dda8ac21, 0xaaa0}}, 0x14) sendmmsg$inet6(r2, &(0x7f0000004d00)=[{{0x0, 0x0, &(0x7f00000004c0)=[{&(0x7f0000000080)='K', 0x4c}], 0x1}}], 0x7ffff000, 0x0) dup2(r1, r2) dup(r1) setsockopt$IP_VS_SO_SET_DELDEST(r0, 0x0, 0x488, &(0x7f0000000080)={{0x88, @initdev={0xac, 0x1e, 0x1, 0x0}, 0x4e24, 0x0, 'lblcr\x00', 0x0, 0x6, 0x3b}, {@empty, 0x4e24, 0x20002, 0x5, 0x0, 0x5}}, 0x44) 12:47:35 executing program 7: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000180)) (fail_nth: 31) [ 2703.035579] FAULT_INJECTION: forcing a failure. [ 2703.035579] name failslab, interval 1, probability 0, space 0, times 0 [ 2703.038294] CPU: 0 PID: 13502 Comm: syz-executor.5 Not tainted 5.10.163 #1 [ 2703.039724] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2703.041440] Call Trace: [ 2703.041992] dump_stack+0x107/0x167 [ 2703.042752] should_fail.cold+0x5/0xa [ 2703.043544] ? create_object.isra.0+0x3a/0xa20 [ 2703.044507] should_failslab+0x5/0x20 [ 2703.045293] kmem_cache_alloc+0x5b/0x360 [ 2703.046142] create_object.isra.0+0x3a/0xa20 [ 2703.047054] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 2703.048110] kmem_cache_alloc+0x159/0x360 [ 2703.048972] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 2703.050060] __kernfs_new_node+0xd4/0x850 [ 2703.050915] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 2703.052020] ? lock_chain_count+0x20/0x20 [ 2703.052894] ? kernfs_dop_revalidate+0x3a0/0x3a0 [ 2703.053886] ? find_held_lock+0x2c/0x110 [ 2703.054728] ? set_user_nice.part.0+0x2fd/0x760 [ 2703.055695] kernfs_create_dir_ns+0x9c/0x230 [ 2703.056614] internal_create_group+0x793/0xb30 [ 2703.057561] ? set_user_nice.part.0+0x2fd/0x760 [ 2703.058519] ? sysfs_remove_group+0x170/0x170 [ 2703.059447] ? lockdep_init_map_type+0x2c7/0x780 [ 2703.060433] ? blk_queue_flag_set+0x22/0x30 [ 2703.061320] ? __loop_update_dio+0x2d2/0x690 [ 2703.062238] loop_configure+0x954/0x1480 [ 2703.063091] lo_ioctl+0xa72/0x1760 [ 2703.063826] ? avc_has_extended_perms+0x7f1/0xec0 [ 2703.064837] ? loop_set_status_old+0x250/0x250 [ 2703.065782] ? avc_ss_reset+0x180/0x180 [ 2703.066607] ? find_held_lock+0x2c/0x110 [ 2703.067454] ? __lock_acquire+0xbb1/0x5b00 [ 2703.068389] ? selinux_inode_getsecctx+0x90/0x90 [ 2703.069367] ? generic_block_fiemap+0x60/0x60 [ 2703.070302] ? loop_set_status_old+0x250/0x250 [ 2703.071239] blkdev_ioctl+0x291/0x710 [ 2703.072030] ? blkdev_common_ioctl+0x1870/0x1870 [ 2703.073023] ? selinux_file_ioctl+0xb1/0x260 [ 2703.073945] block_ioctl+0xf9/0x140 [ 2703.074689] ? blkdev_read_iter+0x1c0/0x1c0 [ 2703.075584] __x64_sys_ioctl+0x19a/0x210 [ 2703.076449] do_syscall_64+0x33/0x40 [ 2703.077223] entry_SYSCALL_64_after_hwframe+0x61/0xc6 [ 2703.078287] RIP: 0033:0x7f8cf18208d7 [ 2703.079059] Code: 3c 1c 48 f7 d8 49 39 c4 72 b8 e8 a4 54 02 00 85 c0 78 bd 48 83 c4 08 4c 89 e0 5b 41 5c c3 0f 1f 44 00 00 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2703.082866] RSP: 002b:00007f8ceed95f48 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 2703.084450] RAX: ffffffffffffffda RBX: 00007f8cf186a970 RCX: 00007f8cf18208d7 [ 2703.085928] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 2703.087402] RBP: 0000000000000005 R08: 0000000000000000 R09: ffffffffffffffff [ 2703.088890] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000004 [ 2703.090359] R13: 0000000000000004 R14: 00000000200004a0 R15: 0000000000000004 [ 2703.092019] hpet: Lost 2 RTC interrupts [ 2703.117766] FAULT_INJECTION: forcing a failure. [ 2703.117766] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 2703.120292] CPU: 0 PID: 13505 Comm: syz-executor.6 Not tainted 5.10.163 #1 [ 2703.121725] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2703.123440] Call Trace: [ 2703.123988] dump_stack+0x107/0x167 [ 2703.124761] should_fail.cold+0x5/0xa [ 2703.125555] __alloc_pages_nodemask+0x182/0x680 [ 2703.126534] ? __alloc_pages_slowpath.constprop.0+0x2220/0x2220 [ 2703.127771] ? lock_downgrade+0x6d0/0x6d0 [ 2703.128670] alloc_pages_vma+0xbb/0x410 [ 2703.129535] shmem_alloc_page+0x10f/0x1e0 [ 2703.130400] ? shmem_init_inode+0x20/0x20 [ 2703.131285] ? percpu_counter_add_batch+0x8b/0x140 [ 2703.132319] ? __vm_enough_memory+0x184/0x360 [ 2703.133249] shmem_getpage_gfp.constprop.0+0x512/0x1920 [ 2703.134364] ? shmem_unuse_inode+0xed0/0xed0 [ 2703.135279] ? ktime_get_coarse_real_ts64+0x15a/0x190 [ 2703.136358] ? iov_iter_fault_in_readable+0x9a/0x410 [ 2703.137415] shmem_write_begin+0xf7/0x1d0 [ 2703.138280] generic_perform_write+0x20a/0x4f0 [ 2703.139241] ? trace_event_raw_event_file_check_and_advance_wb_err+0x4a0/0x4a0 [ 2703.140739] ? evict_inodes+0x420/0x420 [ 2703.141562] ? generic_write_checks+0x2ad/0x390 [ 2703.142525] __generic_file_write_iter+0x39d/0x5d0 [ 2703.143544] generic_file_write_iter+0xdb/0x230 [ 2703.144508] ? iov_iter_init+0x3c/0x130 [ 2703.145333] new_sync_write+0x42c/0x660 [ 2703.146152] ? new_sync_read+0x6f0/0x6f0 [ 2703.146991] ? __x64_sys_pwrite64+0x201/0x260 [ 2703.147919] ? lock_release+0x6b0/0x6b0 [ 2703.148758] ? selinux_file_permission+0x36/0x510 [ 2703.149772] vfs_write+0x747/0xa30 [ 2703.150512] __x64_sys_pwrite64+0x201/0x260 [ 2703.151397] ? ksys_pwrite64+0x1b0/0x1b0 [ 2703.152260] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 2703.153330] ? syscall_enter_from_user_mode+0x1d/0x50 [ 2703.154395] do_syscall_64+0x33/0x40 [ 2703.155161] entry_SYSCALL_64_after_hwframe+0x61/0xc6 [ 2703.156225] RIP: 0033:0x7f290af1cab7 [ 2703.156987] Code: 08 89 3c 24 48 89 4c 24 18 e8 e5 f8 ff ff 4c 8b 54 24 18 48 8b 54 24 10 41 89 c0 48 8b 74 24 08 8b 3c 24 b8 12 00 00 00 0f 05 <48> 3d 00 f0 ff ff 77 31 44 89 c7 48 89 04 24 e8 15 f9 ff ff 48 8b [ 2703.160834] RSP: 002b:00007f29084def20 EFLAGS: 00000293 ORIG_RAX: 0000000000000012 [ 2703.162427] RAX: ffffffffffffffda RBX: 00007f290afb3970 RCX: 00007f290af1cab7 [ 2703.163921] RDX: 000000000000001d RSI: 0000000020011600 RDI: 0000000000000004 [ 2703.165420] RBP: 0000000000000004 R08: 0000000000000000 R09: ffffffffffffffff [ 2703.166906] R10: 0000000000002100 R11: 0000000000000293 R12: 0000000000000004 [ 2703.168408] R13: 0000000000000004 R14: 0000000020000488 R15: 0000000000000003 [ 2703.170131] hpet: Lost 2 RTC interrupts [ 2703.185524] EXT4-fs (loop5): mounted filesystem without journal. Opts: ,errors=continue [ 2703.189193] FAULT_INJECTION: forcing a failure. [ 2703.189193] name failslab, interval 1, probability 0, space 0, times 0 [ 2703.191572] CPU: 0 PID: 13513 Comm: syz-executor.1 Not tainted 5.10.163 #1 [ 2703.193052] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2703.194769] Call Trace: [ 2703.195323] dump_stack+0x107/0x167 [ 2703.196089] should_fail.cold+0x5/0xa [ 2703.196882] ? create_object.isra.0+0x3a/0xa20 [ 2703.197829] should_failslab+0x5/0x20 [ 2703.198616] kmem_cache_alloc+0x5b/0x360 [ 2703.199456] create_object.isra.0+0x3a/0xa20 [ 2703.200373] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 2703.201425] kmem_cache_alloc+0x159/0x360 [ 2703.202284] ? shmem_destroy_inode+0x70/0x70 [ 2703.203195] shmem_alloc_inode+0x18/0x40 [ 2703.204027] ? shmem_destroy_inode+0x70/0x70 [ 2703.204947] alloc_inode+0x63/0x240 [ 2703.205701] new_inode+0x23/0x250 [ 2703.206421] shmem_get_inode+0x15e/0xbc0 [ 2703.207275] __shmem_file_setup+0xb8/0x320 [ 2703.208156] ? _copy_from_user+0xfb/0x1b0 [ 2703.209010] __do_sys_memfd_create+0x275/0x450 [ 2703.209952] ? memfd_file_seals_ptr+0x170/0x170 [ 2703.210920] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 2703.212004] ? syscall_enter_from_user_mode+0x1d/0x50 [ 2703.213089] do_syscall_64+0x33/0x40 [ 2703.213859] entry_SYSCALL_64_after_hwframe+0x61/0xc6 [ 2703.214910] RIP: 0033:0x7f26b1c90b19 [ 2703.215681] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2703.219466] RSP: 002b:00007f26af205f48 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 2703.221048] RAX: ffffffffffffffda RBX: 0000000020000440 RCX: 00007f26b1c90b19 [ 2703.222518] RDX: 0000000000004200 RSI: 0000000000000000 RDI: 00007f26b1cea0fb [ 2703.223978] RBP: 0000000000000004 R08: 0000000000002100 R09: ffffffffffffffff [ 2703.225455] R10: 0000000000000004 R11: 0000000000000246 R12: 0000000008100000 [ 2703.226931] R13: 0000000020000100 R14: 0000000000fffff0 R15: 0000000020000180 [ 2703.228588] hpet: Lost 2 RTC interrupts [ 2703.250459] ieee802154 phy0 wpan0: encryption failed: -22 [ 2703.260082] FAULT_INJECTION: forcing a failure. [ 2703.260082] name failslab, interval 1, probability 0, space 0, times 0 [ 2703.262469] CPU: 0 PID: 13511 Comm: syz-executor.7 Not tainted 5.10.163 #1 [ 2703.263902] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2703.265644] Call Trace: [ 2703.266204] dump_stack+0x107/0x167 [ 2703.266997] should_fail.cold+0x5/0xa [ 2703.267888] ? create_object.isra.0+0x3a/0xa20 [ 2703.268858] should_failslab+0x5/0x20 [ 2703.269652] kmem_cache_alloc+0x5b/0x360 [ 2703.270526] create_object.isra.0+0x3a/0xa20 [ 2703.271445] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 2703.272522] kmem_cache_alloc+0x159/0x360 [ 2703.273387] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 2703.274475] __kernfs_new_node+0xd4/0x850 [ 2703.275334] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 2703.276430] ? lock_chain_count+0x20/0x20 [ 2703.277293] ? kernfs_dop_revalidate+0x3a0/0x3a0 [ 2703.278294] ? find_held_lock+0x2c/0x110 [ 2703.279145] ? set_user_nice.part.0+0x2fd/0x760 [ 2703.280117] kernfs_create_dir_ns+0x9c/0x230 [ 2703.281040] internal_create_group+0x793/0xb30 [ 2703.281985] ? set_user_nice.part.0+0x2fd/0x760 [ 2703.282955] ? sysfs_remove_group+0x170/0x170 [ 2703.283884] ? lockdep_init_map_type+0x2c7/0x780 [ 2703.284895] ? blk_queue_flag_set+0x22/0x30 [ 2703.285793] ? __loop_update_dio+0x2d2/0x690 [ 2703.286707] loop_configure+0x954/0x1480 [ 2703.287562] lo_ioctl+0xa72/0x1760 [ 2703.288304] ? avc_has_extended_perms+0x7f1/0xec0 [ 2703.289293] ? loop_set_status_old+0x250/0x250 [ 2703.290245] ? avc_ss_reset+0x180/0x180 [ 2703.291078] ? find_held_lock+0x2c/0x110 [ 2703.291926] ? __lock_acquire+0xbb1/0x5b00 [ 2703.292873] ? selinux_inode_getsecctx+0x90/0x90 [ 2703.293862] ? generic_block_fiemap+0x60/0x60 [ 2703.294800] ? loop_set_status_old+0x250/0x250 [ 2703.295737] blkdev_ioctl+0x291/0x710 [ 2703.296531] ? blkdev_common_ioctl+0x1870/0x1870 [ 2703.297526] ? selinux_file_ioctl+0xb1/0x260 [ 2703.298446] block_ioctl+0xf9/0x140 [ 2703.299197] ? blkdev_read_iter+0x1c0/0x1c0 [ 2703.300115] __x64_sys_ioctl+0x19a/0x210 [ 2703.300964] do_syscall_64+0x33/0x40 [ 2703.301738] entry_SYSCALL_64_after_hwframe+0x61/0xc6 [ 2703.302801] RIP: 0033:0x7fca424058d7 [ 2703.303574] Code: 3c 1c 48 f7 d8 49 39 c4 72 b8 e8 a4 54 02 00 85 c0 78 bd 48 83 c4 08 4c 89 e0 5b 41 5c c3 0f 1f 44 00 00 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2703.307399] RSP: 002b:00007fca3f97af48 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 2703.308989] RAX: ffffffffffffffda RBX: 00007fca4244f970 RCX: 00007fca424058d7 [ 2703.310466] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 2703.311937] RBP: 0000000000000005 R08: 0000000000000000 R09: ffffffffffffffff [ 2703.313434] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000004 [ 2703.314909] R13: 0000000000000004 R14: 00000000200004a0 R15: 0000000000000004 [ 2703.316606] hpet: Lost 2 RTC interrupts 12:47:36 executing program 3: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_init_net_socket$802154_raw(0x24, 0x3, 0x0) sendmmsg$inet6(r0, &(0x7f0000004d00)=[{{0x0, 0x0, &(0x7f00000004c0)}, 0x7f000000}], 0x1, 0x0) [ 2703.334414] EXT4-fs (loop2): VFS: Can't find ext4 filesystem [ 2703.374964] ieee802154 phy0 wpan0: encryption failed: -22 [ 2703.388487] EXT4-fs (loop4): ext4_check_descriptors: Inode table for group 0 overlaps superblock [ 2703.390652] EXT4-fs (loop4): group descriptors corrupted! [ 2703.395543] EXT4-fs (loop1): mounted filesystem without journal. Opts: ,errors=continue [ 2703.411150] EXT4-fs (loop7): mounted filesystem without journal. Opts: ,errors=continue [ 2703.437045] EXT4-fs error (device loop6): ext4_fill_super:4959: inode #2: comm syz-executor.6: iget: root inode unallocated [ 2703.440094] EXT4-fs (loop6): get root inode failed [ 2703.441196] EXT4-fs (loop6): mount failed 12:47:52 executing program 4: ioctl$RTC_UIE_ON(0xffffffffffffffff, 0x7003) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x2}, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0xfffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = dup2(0xffffffffffffffff, r0) perf_event_open(&(0x7f00000001c0)={0x2, 0x80, 0x8, 0x9, 0x4, 0x1, 0x0, 0x3b3d, 0x200a0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x2, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0xffff, 0x1, @perf_config_ext={0x7, 0x1}, 0x281, 0xffffffff, 0x4, 0x3, 0x401, 0xffffff47, 0x401, 0x0, 0x3, 0x0, 0x415}, 0x0, 0xffffffffffffffff, r0, 0x1) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="0200000003", 0x5, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000180)) pkey_mprotect(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x0, 0xffffffffffffffff) pkey_mprotect(&(0x7f0000ff4000/0x4000)=nil, 0x4000, 0x0, 0xffffffffffffffff) socket$inet_udp(0x2, 0x2, 0x0) getsockopt$inet_int(0xffffffffffffffff, 0x0, 0xe, 0x0, &(0x7f0000000280)) ioctl$sock_SIOCADDDLCI(0xffffffffffffffff, 0x8980, 0x0) ioctl$RTC_ALM_SET(r1, 0x40247007, 0x0) mmap$IORING_OFF_SQES(&(0x7f0000ff3000/0x2000)=nil, 0x2000, 0x2000002, 0x10, r1, 0x10000000) getsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, 0x0, 0x0) 12:47:52 executing program 3: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_init_net_socket$802154_raw(0x24, 0x3, 0x0) sendmmsg$inet6(r0, &(0x7f0000004d00)=[{{0x0, 0x0, &(0x7f00000004c0)}, 0xeffdffff}], 0x1, 0x0) 12:47:52 executing program 0: r0 = creat(&(0x7f0000000000)='./file0\x00', 0x11) r1 = creat(&(0x7f0000000040)='./file0\x00', 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = fcntl$dupfd(r2, 0x0, r2) sendmsg$nl_generic(r3, &(0x7f0000000280)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000140)=ANY=[@ANYBLOB="300000001e0020f700000000000000000200000008000000000000001400010002000000000000"], 0x30}}, 0x0) openat(r3, &(0x7f0000000080)='./file0\x00', 0x402, 0x2) fallocate(r1, 0x0, 0x0, 0x8800000) fcntl$setsig(r2, 0xa, 0x20) r4 = syz_init_net_socket$802154_raw(0x24, 0x3, 0x0) bind$802154_raw(r4, &(0x7f0000000000)={0x24, @long={0x3, 0x2, {0xaaaaaaaaaaaa0002}}}, 0x14) bind$802154_raw(r4, &(0x7f0000000040)={0x24, @short={0x2, 0x2367f916dda8ac21, 0xaaa0}}, 0x14) sendmmsg$inet6(r0, &(0x7f0000004d00)=[{{0x0, 0x0, &(0x7f00000004c0)=[{&(0x7f0000000080)='K', 0x1}], 0x1, 0x0, 0x23}}], 0x1, 0x0) fcntl$dupfd(r3, 0x0, r4) fcntl$dupfd(r0, 0x406, r1) fallocate(r1, 0x3, 0x0, 0x8000) fallocate(r0, 0x0, 0x0, 0x8800000) 12:47:52 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000180)) (fail_nth: 6) 12:47:52 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000180)) (fail_nth: 32) 12:47:52 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0", 0x2d, 0x400}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000180)) 12:47:52 executing program 6: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000180)) (fail_nth: 18) 12:47:52 executing program 7: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000180)) (fail_nth: 32) [ 2719.809236] FAULT_INJECTION: forcing a failure. [ 2719.809236] name failslab, interval 1, probability 0, space 0, times 0 [ 2719.810718] CPU: 0 PID: 13552 Comm: syz-executor.6 Not tainted 5.10.163 #1 [ 2719.811613] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2719.812707] Call Trace: [ 2719.813055] dump_stack+0x107/0x167 [ 2719.813541] should_fail.cold+0x5/0xa [ 2719.814047] ? xas_alloc+0x336/0x440 [ 2719.814541] should_failslab+0x5/0x20 [ 2719.815050] kmem_cache_alloc+0x5b/0x360 [ 2719.815588] ? __lockdep_reset_lock+0x180/0x180 [ 2719.816205] xas_alloc+0x336/0x440 [ 2719.816705] xas_create+0x60b/0x1040 [ 2719.817252] xas_create_range+0x18b/0x600 [ 2719.817805] shmem_add_to_page_cache+0x759/0x1150 [ 2719.818446] ? shmem_getattr+0x180/0x180 [ 2719.819005] shmem_getpage_gfp.constprop.0+0x64a/0x1920 [ 2719.819716] ? shmem_unuse_inode+0xed0/0xed0 [ 2719.820304] ? ktime_get_coarse_real_ts64+0x15a/0x190 [ 2719.820993] ? iov_iter_fault_in_readable+0x9a/0x410 [ 2719.821657] shmem_write_begin+0xf7/0x1d0 [ 2719.822208] generic_perform_write+0x20a/0x4f0 [ 2719.822815] ? trace_event_raw_event_file_check_and_advance_wb_err+0x4a0/0x4a0 [ 2719.823772] ? evict_inodes+0x420/0x420 [ 2719.824306] ? generic_write_checks+0x2ad/0x390 [ 2719.824925] __generic_file_write_iter+0x39d/0x5d0 [ 2719.825578] generic_file_write_iter+0xdb/0x230 [ 2719.826185] ? iov_iter_init+0x3c/0x130 [ 2719.826713] new_sync_write+0x42c/0x660 [ 2719.827232] ? new_sync_read+0x6f0/0x6f0 [ 2719.827768] ? __x64_sys_pwrite64+0x201/0x260 [ 2719.828380] ? lock_release+0x6b0/0x6b0 [ 2719.828901] ? selinux_file_permission+0x36/0x510 [ 2719.829547] vfs_write+0x747/0xa30 [ 2719.830011] __x64_sys_pwrite64+0x201/0x260 [ 2719.830586] ? ksys_pwrite64+0x1b0/0x1b0 [ 2719.831129] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 2719.831838] ? syscall_enter_from_user_mode+0x1d/0x50 [ 2719.832521] do_syscall_64+0x33/0x40 [ 2719.833012] entry_SYSCALL_64_after_hwframe+0x61/0xc6 [ 2719.833683] RIP: 0033:0x7f290af1cab7 [ 2719.834181] Code: 08 89 3c 24 48 89 4c 24 18 e8 e5 f8 ff ff 4c 8b 54 24 18 48 8b 54 24 10 41 89 c0 48 8b 74 24 08 8b 3c 24 b8 12 00 00 00 0f 05 <48> 3d 00 f0 ff ff 77 31 44 89 c7 48 89 04 24 e8 15 f9 ff ff 48 8b [ 2719.834497] FAULT_INJECTION: forcing a failure. [ 2719.834497] name failslab, interval 1, probability 0, space 0, times 0 [ 2719.836619] RSP: 002b:00007f29084def20 EFLAGS: 00000293 ORIG_RAX: 0000000000000012 [ 2719.836633] RAX: ffffffffffffffda RBX: 00007f290afb3970 RCX: 00007f290af1cab7 [ 2719.836641] RDX: 000000000000001d RSI: 0000000020011600 RDI: 0000000000000004 [ 2719.836648] RBP: 0000000000000004 R08: 0000000000000000 R09: ffffffffffffffff [ 2719.836656] R10: 0000000000002100 R11: 0000000000000293 R12: 0000000000000004 [ 2719.836663] R13: 0000000000000004 R14: 0000000020000488 R15: 0000000000000003 [ 2719.836817] hpet: Lost 1 RTC interrupts [ 2719.850644] CPU: 1 PID: 13549 Comm: syz-executor.7 Not tainted 5.10.163 #1 [ 2719.852210] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2719.854103] Call Trace: [ 2719.854708] dump_stack+0x107/0x167 [ 2719.855541] should_fail.cold+0x5/0xa [ 2719.856418] ? __kernfs_new_node+0xd4/0x850 [ 2719.857404] should_failslab+0x5/0x20 [ 2719.858273] kmem_cache_alloc+0x5b/0x360 [ 2719.859209] __kernfs_new_node+0xd4/0x850 [ 2719.860174] ? kernfs_dop_revalidate+0x3a0/0x3a0 [ 2719.861273] ? lock_downgrade+0x6d0/0x6d0 [ 2719.862215] ? mutex_lock_io_nested+0x1110/0x1110 [ 2719.863304] ? __kernfs_new_node+0x549/0x850 [ 2719.864388] ? __mutex_unlock_slowpath+0xe1/0x600 [ 2719.865471] ? __lockdep_reset_lock+0x180/0x180 [ 2719.866522] kernfs_new_node+0x93/0x120 [ 2719.867433] __kernfs_create_file+0x51/0x350 [ 2719.868480] sysfs_add_file_mode_ns+0x221/0x560 [ 2719.869544] internal_create_group+0x324/0xb30 [ 2719.870586] ? sysfs_remove_group+0x170/0x170 [ 2719.871598] ? lockdep_init_map_type+0x2c7/0x780 [ 2719.872692] ? blk_queue_flag_set+0x22/0x30 [ 2719.873658] ? __loop_update_dio+0x2d2/0x690 [ 2719.874651] loop_configure+0x954/0x1480 [ 2719.875579] lo_ioctl+0xa72/0x1760 [ 2719.876392] ? avc_has_extended_perms+0x7f1/0xec0 [ 2719.877480] ? loop_set_status_old+0x250/0x250 [ 2719.878523] ? avc_ss_reset+0x180/0x180 [ 2719.879423] ? find_held_lock+0x2c/0x110 [ 2719.880479] ? __lock_acquire+0xbb1/0x5b00 [ 2719.881510] ? selinux_inode_getsecctx+0x90/0x90 [ 2719.882592] ? generic_block_fiemap+0x60/0x60 [ 2719.883616] ? loop_set_status_old+0x250/0x250 [ 2719.884658] blkdev_ioctl+0x291/0x710 [ 2719.885522] ? blkdev_common_ioctl+0x1870/0x1870 [ 2719.886610] ? selinux_file_ioctl+0xb1/0x260 [ 2719.887607] block_ioctl+0xf9/0x140 [ 2719.888441] ? blkdev_read_iter+0x1c0/0x1c0 [ 2719.889418] __x64_sys_ioctl+0x19a/0x210 [ 2719.890357] do_syscall_64+0x33/0x40 [ 2719.891200] entry_SYSCALL_64_after_hwframe+0x61/0xc6 [ 2719.892382] RIP: 0033:0x7fca424058d7 [ 2719.893224] Code: 3c 1c 48 f7 d8 49 39 c4 72 b8 e8 a4 54 02 00 85 c0 78 bd 48 83 c4 08 4c 89 e0 5b 41 5c c3 0f 1f 44 00 00 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2719.897422] RSP: 002b:00007fca3f97af48 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 2719.899139] RAX: ffffffffffffffda RBX: 00007fca4244f970 RCX: 00007fca424058d7 [ 2719.900760] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 2719.902376] RBP: 0000000000000005 R08: 0000000000000000 R09: ffffffffffffffff [ 2719.904006] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000004 [ 2719.905641] R13: 0000000000000004 R14: 00000000200004a0 R15: 0000000000000004 [ 2719.926008] FAULT_INJECTION: forcing a failure. [ 2719.926008] name failslab, interval 1, probability 0, space 0, times 0 [ 2719.928800] CPU: 1 PID: 13559 Comm: syz-executor.5 Not tainted 5.10.163 #1 [ 2719.930397] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2719.932326] Call Trace: [ 2719.932940] dump_stack+0x107/0x167 [ 2719.933784] should_fail.cold+0x5/0xa [ 2719.934663] ? __kernfs_new_node+0xd4/0x850 [ 2719.935647] should_failslab+0x5/0x20 [ 2719.936521] kmem_cache_alloc+0x5b/0x360 [ 2719.937453] __kernfs_new_node+0xd4/0x850 [ 2719.938407] ? kernfs_dop_revalidate+0x3a0/0x3a0 [ 2719.939483] ? lock_downgrade+0x6d0/0x6d0 [ 2719.940445] ? mutex_lock_io_nested+0x1110/0x1110 [ 2719.941537] ? __kernfs_new_node+0x549/0x850 [ 2719.942606] ? __mutex_unlock_slowpath+0xe1/0x600 [ 2719.943713] kernfs_new_node+0x93/0x120 [ 2719.944633] __kernfs_create_file+0x51/0x350 [ 2719.945642] sysfs_add_file_mode_ns+0x221/0x560 [ 2719.946706] internal_create_group+0x324/0xb30 [ 2719.947749] ? sysfs_remove_group+0x170/0x170 [ 2719.948777] ? lockdep_init_map_type+0x2c7/0x780 [ 2719.949854] ? blk_queue_flag_set+0x22/0x30 [ 2719.950830] ? __loop_update_dio+0x2d2/0x690 [ 2719.951828] loop_configure+0x954/0x1480 [ 2719.952785] lo_ioctl+0xa72/0x1760 [ 2719.953591] ? avc_has_extended_perms+0x7f1/0xec0 [ 2719.954684] ? loop_set_status_old+0x250/0x250 [ 2719.955717] ? avc_ss_reset+0x180/0x180 [ 2719.956629] ? find_held_lock+0x2c/0x110 [ 2719.957560] ? __lock_acquire+0xbb1/0x5b00 [ 2719.958627] ? selinux_inode_getsecctx+0x90/0x90 [ 2719.959689] ? generic_block_fiemap+0x60/0x60 [ 2719.960738] ? loop_set_status_old+0x250/0x250 [ 2719.961777] blkdev_ioctl+0x291/0x710 [ 2719.962633] ? blkdev_common_ioctl+0x1870/0x1870 [ 2719.963713] ? selinux_file_ioctl+0xb1/0x260 [ 2719.964713] block_ioctl+0xf9/0x140 [ 2719.965540] ? blkdev_read_iter+0x1c0/0x1c0 [ 2719.966506] __x64_sys_ioctl+0x19a/0x210 [ 2719.967424] do_syscall_64+0x33/0x40 [ 2719.968260] entry_SYSCALL_64_after_hwframe+0x61/0xc6 [ 2719.969421] RIP: 0033:0x7f8cf18208d7 [ 2719.970257] Code: 3c 1c 48 f7 d8 49 39 c4 72 b8 e8 a4 54 02 00 85 c0 78 bd 48 83 c4 08 4c 89 e0 5b 41 5c c3 0f 1f 44 00 00 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2719.974419] RSP: 002b:00007f8ceed95f48 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 2719.976119] RAX: ffffffffffffffda RBX: 00007f8cf186a970 RCX: 00007f8cf18208d7 [ 2719.977730] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 2719.979323] RBP: 0000000000000005 R08: 0000000000000000 R09: ffffffffffffffff [ 2719.980927] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000004 [ 2719.982521] R13: 0000000000000004 R14: 00000000200004a0 R15: 0000000000000004 [ 2719.996447] FAULT_INJECTION: forcing a failure. [ 2719.996447] name failslab, interval 1, probability 0, space 0, times 0 [ 2719.998464] CPU: 1 PID: 13563 Comm: syz-executor.1 Not tainted 5.10.163 #1 [ 2719.999705] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2720.001194] Call Trace: [ 2720.001704] dump_stack+0x107/0x167 [ 2720.002428] should_fail.cold+0x5/0xa [ 2720.003122] ? security_inode_alloc+0x34/0x160 [ 2720.003938] should_failslab+0x5/0x20 [ 2720.004616] kmem_cache_alloc+0x5b/0x360 [ 2720.005390] security_inode_alloc+0x34/0x160 [ 2720.006200] inode_init_always+0xa4e/0xd10 [ 2720.006965] ? shmem_destroy_inode+0x70/0x70 [ 2720.007754] alloc_inode+0x84/0x240 [ 2720.008458] new_inode+0x23/0x250 [ 2720.009091] shmem_get_inode+0x15e/0xbc0 [ 2720.009851] __shmem_file_setup+0xb8/0x320 [ 2720.010659] ? _copy_from_user+0xfb/0x1b0 [ 2720.011432] __do_sys_memfd_create+0x275/0x450 [ 2720.012279] ? memfd_file_seals_ptr+0x170/0x170 [ 2720.013180] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 2720.014162] ? syscall_enter_from_user_mode+0x1d/0x50 [ 2720.015119] do_syscall_64+0x33/0x40 [ 2720.015806] entry_SYSCALL_64_after_hwframe+0x61/0xc6 [ 2720.016685] RIP: 0033:0x7f26b1c90b19 [ 2720.017267] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2720.019964] RSP: 002b:00007f26af205f48 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 2720.021181] RAX: ffffffffffffffda RBX: 0000000020000440 RCX: 00007f26b1c90b19 [ 2720.022257] RDX: 0000000000004200 RSI: 0000000000000000 RDI: 00007f26b1cea0fb [ 2720.023312] RBP: 0000000000000004 R08: 0000000000002100 R09: ffffffffffffffff [ 2720.024385] R10: 0000000000000004 R11: 0000000000000246 R12: 0000000008100000 [ 2720.025428] R13: 0000000020000100 R14: 0000000000fffff0 R15: 0000000020000180 [ 2720.039114] EXT4-fs (loop2): VFS: Can't find ext4 filesystem [ 2720.061634] EXT4-fs (loop4): ext4_check_descriptors: Inode table for group 0 overlaps superblock [ 2720.063057] EXT4-fs (loop4): group descriptors corrupted! 12:47:52 executing program 3: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_init_net_socket$802154_raw(0x24, 0x3, 0x0) sendmmsg$inet6(r0, &(0x7f0000004d00)=[{{0x0, 0x0, &(0x7f00000004c0)}, 0xfffffdef}], 0x1, 0x0) 12:47:52 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0", 0x2d, 0x400}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000180)) [ 2720.090222] EXT4-fs (loop5): mounted filesystem without journal. Opts: ,errors=continue [ 2720.122248] EXT4-fs (loop7): mounted filesystem without journal. Opts: ,errors=continue [ 2720.141083] EXT4-fs (loop6): mounted filesystem without journal. Opts: ,errors=continue 12:47:53 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000180)) (fail_nth: 7) 12:47:53 executing program 0: r0 = creat(&(0x7f0000000040)='./file0\x00', 0x0) r1 = creat(&(0x7f0000000040)='./file0\x00', 0x0) fallocate(r1, 0x0, 0x0, 0x8800000) ioctl$INCFS_IOC_CREATE_FILE(r1, 0xc058671e, &(0x7f0000000280)={{'\x00', 0x1}, {0x3}, 0x100, 0x0, 0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)="48a808e60670b248a88b4e8641471969accffb6a627c57ad25ae4d0ebc135f676876f2cf9bcf44678f38251835ae7655ccc09a22a052dbff3ec8e8a172ca1770592940b7f52662ba6951", 0x4a, 0x0, &(0x7f0000000140)={0x2, 0xca, {0x1, 0xc, 0x8, "f38675f420474d4b", 0xb5, "6ca920b660a2d6557360b4e19fc3292b5b4ca4a425194d07ed109f42b2180a357eb6ddd50d0b386a0c7f192673bfb04eb17a5d163fe3b51b1e595e02e971d65586c3b088aec7eb98b150743b14b6a9bf2bea4bba6d04586d512ad5d17e85f38e7c7a8fb485d7edd297c087dd39d14abeb99ccd0d8c2015434bfcf8ddf9005dcdd8260d91980999a207dce2f7c28dddf20da72c7d68dafeb10bc5ccf395b7d2ffcbedef97c8fcaba2750901e4b5e9072a9377c6800c"}, 0x40, "52aaf2d28aa1b6074863d1adadfef34243216b1b19cfaa836be897b2f4f9022b10a0f3232b1f790c96116bbce67f330205d89c0bb07a84711b88ab6809345199"}, 0x116}) fallocate(r1, 0x3, 0x0, 0x8000) fallocate(r0, 0x0, 0x0, 0x8800000) 12:47:53 executing program 4: ioctl$RTC_UIE_ON(0xffffffffffffffff, 0x7003) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x2}, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0xfffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = dup2(0xffffffffffffffff, r0) perf_event_open(&(0x7f00000001c0)={0x2, 0x80, 0x8, 0x9, 0x4, 0x1, 0x0, 0x3b3d, 0x200a0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x2, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0xffff, 0x1, @perf_config_ext={0x7, 0x1}, 0x281, 0xffffffff, 0x4, 0x3, 0x401, 0xffffff47, 0x401, 0x0, 0x3, 0x0, 0x415}, 0x0, 0xffffffffffffffff, r0, 0x1) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="0200000003", 0x5, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000180)) pkey_mprotect(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x0, 0xffffffffffffffff) pkey_mprotect(&(0x7f0000ff4000/0x4000)=nil, 0x4000, 0x0, 0xffffffffffffffff) socket$inet_udp(0x2, 0x2, 0x0) getsockopt$inet_int(0xffffffffffffffff, 0x0, 0xe, 0x0, &(0x7f0000000280)) ioctl$sock_SIOCADDDLCI(0xffffffffffffffff, 0x8980, 0x0) ioctl$RTC_ALM_SET(r1, 0x40247007, 0x0) mmap$IORING_OFF_SQES(&(0x7f0000ff3000/0x2000)=nil, 0x2000, 0x2000002, 0x10, r1, 0x10000000) getsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, 0x0, 0x0) 12:47:53 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000180)) (fail_nth: 33) 12:47:53 executing program 7: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000180)) (fail_nth: 33) 12:47:53 executing program 6: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000180)) (fail_nth: 19) [ 2720.362120] EXT4-fs (loop2): VFS: Can't find ext4 filesystem 12:47:53 executing program 3: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_init_net_socket$802154_raw(0x24, 0x3, 0x0) sendmmsg$inet6(r0, &(0x7f0000004d00)=[{{0x0, 0x0, &(0x7f00000004c0)}, 0xffffff7f}], 0x1, 0x0) 12:47:53 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0", 0x2d, 0x400}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000180)) [ 2720.432408] FAULT_INJECTION: forcing a failure. [ 2720.432408] name failslab, interval 1, probability 0, space 0, times 0 [ 2720.434936] CPU: 1 PID: 13580 Comm: syz-executor.1 Not tainted 5.10.163 #1 [ 2720.436382] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2720.438104] Call Trace: [ 2720.438664] dump_stack+0x107/0x167 [ 2720.439422] should_fail.cold+0x5/0xa [ 2720.440220] ? create_object.isra.0+0x3a/0xa20 [ 2720.441180] should_failslab+0x5/0x20 [ 2720.441957] kmem_cache_alloc+0x5b/0x360 [ 2720.442884] create_object.isra.0+0x3a/0xa20 [ 2720.443779] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 2720.444827] kmem_cache_alloc+0x159/0x360 [ 2720.445680] security_inode_alloc+0x34/0x160 [ 2720.446581] inode_init_always+0xa4e/0xd10 [ 2720.447440] ? shmem_destroy_inode+0x70/0x70 [ 2720.448342] alloc_inode+0x84/0x240 [ 2720.449081] new_inode+0x23/0x250 [ 2720.449791] shmem_get_inode+0x15e/0xbc0 [ 2720.450627] __shmem_file_setup+0xb8/0x320 [ 2720.451486] ? _copy_from_user+0xfb/0x1b0 [ 2720.452347] __do_sys_memfd_create+0x275/0x450 [ 2720.453273] ? memfd_file_seals_ptr+0x170/0x170 [ 2720.454219] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 2720.455280] ? syscall_enter_from_user_mode+0x1d/0x50 [ 2720.456329] do_syscall_64+0x33/0x40 [ 2720.457125] entry_SYSCALL_64_after_hwframe+0x61/0xc6 [ 2720.458239] RIP: 0033:0x7f26b1c90b19 [ 2720.458991] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2720.462730] RSP: 002b:00007f26af205f48 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 2720.464266] RAX: ffffffffffffffda RBX: 0000000020000440 RCX: 00007f26b1c90b19 [ 2720.465712] RDX: 0000000000004200 RSI: 0000000000000000 RDI: 00007f26b1cea0fb [ 2720.467153] RBP: 0000000000000004 R08: 0000000000002100 R09: ffffffffffffffff [ 2720.468602] R10: 0000000000000004 R11: 0000000000000246 R12: 0000000008100000 [ 2720.470041] R13: 0000000020000100 R14: 0000000000fffff0 R15: 0000000020000180 [ 2720.511291] EXT4-fs (loop1): mounted filesystem without journal. Opts: ,errors=continue [ 2720.558166] FAULT_INJECTION: forcing a failure. [ 2720.558166] name failslab, interval 1, probability 0, space 0, times 0 [ 2720.560552] CPU: 0 PID: 13587 Comm: syz-executor.5 Not tainted 5.10.163 #1 [ 2720.561984] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2720.563701] Call Trace: [ 2720.564259] dump_stack+0x107/0x167 [ 2720.565054] should_fail.cold+0x5/0xa [ 2720.565854] ? create_object.isra.0+0x3a/0xa20 [ 2720.566807] should_failslab+0x5/0x20 [ 2720.567652] kmem_cache_alloc+0x5b/0x360 [ 2720.568506] create_object.isra.0+0x3a/0xa20 [ 2720.569417] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 2720.570472] kmem_cache_alloc+0x159/0x360 [ 2720.571343] __kernfs_new_node+0xd4/0x850 [ 2720.572210] ? kernfs_dop_revalidate+0x3a0/0x3a0 [ 2720.573241] ? lock_downgrade+0x6d0/0x6d0 [ 2720.574112] ? mutex_lock_io_nested+0x1110/0x1110 [ 2720.575127] ? __kernfs_new_node+0x549/0x850 [ 2720.576040] ? __mutex_unlock_slowpath+0xe1/0x600 [ 2720.577070] kernfs_new_node+0x93/0x120 [ 2720.577904] __kernfs_create_file+0x51/0x350 [ 2720.578829] sysfs_add_file_mode_ns+0x221/0x560 [ 2720.579800] internal_create_group+0x324/0xb30 [ 2720.580819] ? sysfs_remove_group+0x170/0x170 [ 2720.581763] ? lockdep_init_map_type+0x2c7/0x780 [ 2720.582748] ? blk_queue_flag_set+0x22/0x30 [ 2720.583641] ? __loop_update_dio+0x2d2/0x690 [ 2720.584582] loop_configure+0x954/0x1480 [ 2720.585437] lo_ioctl+0xa72/0x1760 [ 2720.586182] ? avc_has_extended_perms+0x7f1/0xec0 [ 2720.587181] ? loop_set_status_old+0x250/0x250 [ 2720.588127] ? avc_ss_reset+0x180/0x180 [ 2720.588976] ? __lock_acquire+0xbb1/0x5b00 [ 2720.589906] ? selinux_inode_getsecctx+0x90/0x90 [ 2720.590897] ? generic_block_fiemap+0x60/0x60 [ 2720.591822] ? vvar_fault+0x3d0/0x740 [ 2720.592614] ? __switch_to_asm+0x34/0x60 [ 2720.593471] ? loop_set_status_old+0x250/0x250 [ 2720.594415] blkdev_ioctl+0x291/0x710 [ 2720.595205] ? blkdev_common_ioctl+0x1870/0x1870 [ 2720.596190] ? selinux_file_ioctl+0xb1/0x260 [ 2720.597151] block_ioctl+0xf9/0x140 [ 2720.597913] ? blkdev_read_iter+0x1c0/0x1c0 [ 2720.598812] __x64_sys_ioctl+0x19a/0x210 [ 2720.599662] do_syscall_64+0x33/0x40 [ 2720.600453] entry_SYSCALL_64_after_hwframe+0x61/0xc6 [ 2720.601525] RIP: 0033:0x7f8cf18208d7 [ 2720.602306] Code: 3c 1c 48 f7 d8 49 39 c4 72 b8 e8 a4 54 02 00 85 c0 78 bd 48 83 c4 08 4c 89 e0 5b 41 5c c3 0f 1f 44 00 00 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2720.606142] RSP: 002b:00007f8ceed95f48 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 2720.607719] RAX: ffffffffffffffda RBX: 00007f8cf186a970 RCX: 00007f8cf18208d7 [ 2720.609207] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 2720.610703] RBP: 0000000000000005 R08: 0000000000000000 R09: ffffffffffffffff [ 2720.612176] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000004 [ 2720.613656] R13: 0000000000000004 R14: 00000000200004a0 R15: 0000000000000004 [ 2720.615310] hpet: Lost 3 RTC interrupts [ 2720.636095] EXT4-fs (loop4): ext4_check_descriptors: Inode table for group 0 overlaps superblock [ 2720.638298] EXT4-fs (loop4): group descriptors corrupted! 12:47:53 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000180)) (fail_nth: 8) [ 2720.691403] EXT4-fs (loop5): mounted filesystem without journal. Opts: ,errors=continue [ 2720.705618] FAULT_INJECTION: forcing a failure. [ 2720.705618] name failslab, interval 1, probability 0, space 0, times 0 [ 2720.707995] CPU: 0 PID: 13597 Comm: syz-executor.6 Not tainted 5.10.163 #1 [ 2720.709450] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2720.711188] Call Trace: [ 2720.711742] dump_stack+0x107/0x167 [ 2720.712533] should_fail.cold+0x5/0xa [ 2720.713339] ? __memcg_kmem_charge+0x68/0x140 [ 2720.714272] ? create_object.isra.0+0x3a/0xa20 [ 2720.715322] should_failslab+0x5/0x20 [ 2720.716126] kmem_cache_alloc+0x5b/0x360 [ 2720.717012] create_object.isra.0+0x3a/0xa20 [ 2720.717925] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 2720.718988] kmem_cache_alloc+0x159/0x360 [ 2720.719854] ? __lockdep_reset_lock+0x180/0x180 [ 2720.720836] xas_alloc+0x336/0x440 [ 2720.721577] xas_create+0x60b/0x1040 [ 2720.722372] xas_create_range+0x18b/0x600 [ 2720.723254] shmem_add_to_page_cache+0x759/0x1150 [ 2720.724270] ? shmem_getattr+0x180/0x180 [ 2720.725164] shmem_getpage_gfp.constprop.0+0x64a/0x1920 [ 2720.726292] ? shmem_unuse_inode+0xed0/0xed0 [ 2720.727211] ? ktime_get_coarse_real_ts64+0x15a/0x190 [ 2720.728284] ? iov_iter_fault_in_readable+0x9a/0x410 [ 2720.729374] shmem_write_begin+0xf7/0x1d0 [ 2720.730249] generic_perform_write+0x20a/0x4f0 [ 2720.731222] ? trace_event_raw_event_file_check_and_advance_wb_err+0x4a0/0x4a0 [ 2720.732740] ? evict_inodes+0x420/0x420 [ 2720.733571] ? generic_write_checks+0x2ad/0x390 [ 2720.734547] __generic_file_write_iter+0x39d/0x5d0 [ 2720.735568] generic_file_write_iter+0xdb/0x230 [ 2720.736546] ? iov_iter_init+0x3c/0x130 [ 2720.737379] new_sync_write+0x42c/0x660 [ 2720.738212] ? new_sync_read+0x6f0/0x6f0 [ 2720.739081] ? __x64_sys_pwrite64+0x201/0x260 [ 2720.740016] ? lock_release+0x6b0/0x6b0 [ 2720.740868] ? selinux_file_permission+0x36/0x510 [ 2720.741896] vfs_write+0x747/0xa30 [ 2720.742645] __x64_sys_pwrite64+0x201/0x260 [ 2720.743549] ? ksys_pwrite64+0x1b0/0x1b0 [ 2720.744406] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 2720.745500] ? syscall_enter_from_user_mode+0x1d/0x50 [ 2720.746589] do_syscall_64+0x33/0x40 [ 2720.747365] entry_SYSCALL_64_after_hwframe+0x61/0xc6 [ 2720.748449] RIP: 0033:0x7f290af1cab7 [ 2720.749228] Code: 08 89 3c 24 48 89 4c 24 18 e8 e5 f8 ff ff 4c 8b 54 24 18 48 8b 54 24 10 41 89 c0 48 8b 74 24 08 8b 3c 24 b8 12 00 00 00 0f 05 <48> 3d 00 f0 ff ff 77 31 44 89 c7 48 89 04 24 e8 15 f9 ff ff 48 8b [ 2720.753038] RSP: 002b:00007f29084def20 EFLAGS: 00000293 ORIG_RAX: 0000000000000012 [ 2720.754610] RAX: ffffffffffffffda RBX: 00007f290afb3970 RCX: 00007f290af1cab7 [ 2720.756091] RDX: 000000000000001d RSI: 0000000020011600 RDI: 0000000000000004 [ 2720.757572] RBP: 0000000000000004 R08: 0000000000000000 R09: ffffffffffffffff [ 2720.759054] R10: 0000000000002100 R11: 0000000000000293 R12: 0000000000000004 [ 2720.760552] R13: 0000000000000004 R14: 0000000020000488 R15: 0000000000000003 [ 2720.762341] hpet: Lost 3 RTC interrupts 12:47:53 executing program 0: getsockopt$IP_VS_SO_GET_DESTS(0xffffffffffffffff, 0x0, 0x484, &(0x7f0000000080)=""/141, &(0x7f0000000000)=0x8d) r0 = creat(&(0x7f0000000040)='./file0\x00', 0x0) r1 = creat(&(0x7f0000000040)='./file0\x00', 0x0) fallocate(r1, 0x0, 0x0, 0x8800000) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000000140)={0x0, ""/256, 0x0, 0x0, 0x0, 0x0, ""/16, ""/16, ""/16, 0x0, 0x0}) ioctl$BTRFS_IOC_WAIT_SYNC(0xffffffffffffffff, 0x40089416, &(0x7f0000000000)=r2) ioctl$BTRFS_IOC_SNAP_CREATE_V2(r0, 0x50009417, &(0x7f00000001c0)={{r0}, r2, 0x2, @inherit={0x68, &(0x7f0000000140)={0x1, 0x4, 0x7fff, 0xffffffff, {0x3c, 0xfffffffffffffc01, 0x0, 0x9, 0x10000}, [0x7, 0x3, 0x0, 0x100000000]}}, @name="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"}) fallocate(r1, 0x3, 0x0, 0x8000) fallocate(r0, 0x0, 0x0, 0x8800000) [ 2720.780106] FAULT_INJECTION: forcing a failure. [ 2720.780106] name failslab, interval 1, probability 0, space 0, times 0 [ 2720.783399] CPU: 0 PID: 13600 Comm: syz-executor.7 Not tainted 5.10.163 #1 [ 2720.785128] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2720.786886] Call Trace: [ 2720.787434] dump_stack+0x107/0x167 [ 2720.788198] should_fail.cold+0x5/0xa [ 2720.789001] ? create_object.isra.0+0x3a/0xa20 [ 2720.789949] should_failslab+0x5/0x20 [ 2720.790737] kmem_cache_alloc+0x5b/0x360 [ 2720.791587] create_object.isra.0+0x3a/0xa20 [ 2720.792511] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 2720.793567] kmem_cache_alloc+0x159/0x360 [ 2720.794437] __kernfs_new_node+0xd4/0x850 [ 2720.795321] ? kernfs_dop_revalidate+0x3a0/0x3a0 [ 2720.796323] ? lock_downgrade+0x6d0/0x6d0 [ 2720.797205] ? mutex_lock_io_nested+0x1110/0x1110 [ 2720.798205] ? __kernfs_new_node+0x549/0x850 [ 2720.799125] ? __mutex_unlock_slowpath+0xe1/0x600 [ 2720.800143] kernfs_new_node+0x93/0x120 [ 2720.800985] __kernfs_create_file+0x51/0x350 [ 2720.801948] sysfs_add_file_mode_ns+0x221/0x560 [ 2720.802931] internal_create_group+0x324/0xb30 [ 2720.803892] ? sysfs_remove_group+0x170/0x170 [ 2720.804863] ? lockdep_init_map_type+0x2c7/0x780 [ 2720.805873] ? blk_queue_flag_set+0x22/0x30 [ 2720.806747] ? __loop_update_dio+0x2d2/0x690 [ 2720.807679] loop_configure+0x954/0x1480 [ 2720.808563] lo_ioctl+0xa72/0x1760 [ 2720.809314] ? avc_has_extended_perms+0x7f1/0xec0 [ 2720.810331] ? loop_set_status_old+0x250/0x250 [ 2720.811291] ? avc_ss_reset+0x180/0x180 [ 2720.812130] ? find_held_lock+0x2c/0x110 [ 2720.813000] ? __lock_acquire+0xbb1/0x5b00 [ 2720.813940] ? selinux_inode_getsecctx+0x90/0x90 [ 2720.814937] ? generic_block_fiemap+0x60/0x60 [ 2720.815889] ? loop_set_status_old+0x250/0x250 [ 2720.816864] blkdev_ioctl+0x291/0x710 [ 2720.817671] ? blkdev_common_ioctl+0x1870/0x1870 [ 2720.818687] ? selinux_file_ioctl+0xb1/0x260 [ 2720.819640] block_ioctl+0xf9/0x140 [ 2720.820424] ? blkdev_read_iter+0x1c0/0x1c0 [ 2720.821353] __x64_sys_ioctl+0x19a/0x210 [ 2720.822231] do_syscall_64+0x33/0x40 [ 2720.823013] entry_SYSCALL_64_after_hwframe+0x61/0xc6 [ 2720.824084] RIP: 0033:0x7fca424058d7 [ 2720.824873] Code: 3c 1c 48 f7 d8 49 39 c4 72 b8 e8 a4 54 02 00 85 c0 78 bd 48 83 c4 08 4c 89 e0 5b 41 5c c3 0f 1f 44 00 00 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2720.828733] RSP: 002b:00007fca3f97af48 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 2720.830326] RAX: ffffffffffffffda RBX: 00007fca4244f970 RCX: 00007fca424058d7 [ 2720.831815] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 2720.833311] RBP: 0000000000000005 R08: 0000000000000000 R09: ffffffffffffffff [ 2720.834800] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000004 [ 2720.836288] R13: 0000000000000004 R14: 00000000200004a0 R15: 0000000000000004 [ 2720.837977] hpet: Lost 3 RTC interrupts 12:47:53 executing program 3: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_init_net_socket$802154_raw(0x24, 0x3, 0x0) sendmmsg$inet6(r0, &(0x7f0000004d00)=[{{0x0, 0x0, &(0x7f00000004c0)}}], 0x324, 0x0) [ 2720.927870] EXT4-fs (loop2): VFS: Can't find ext4 filesystem [ 2720.966465] EXT4-fs (loop7): mounted filesystem without journal. Opts: ,errors=continue [ 2721.038246] EXT4-fs (loop6): mounted filesystem without journal. Opts: ,errors=continue [ 2721.102212] FAULT_INJECTION: forcing a failure. [ 2721.102212] name failslab, interval 1, probability 0, space 0, times 0 [ 2721.104585] CPU: 1 PID: 13610 Comm: syz-executor.1 Not tainted 5.10.163 #1 [ 2721.105943] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2721.107593] Call Trace: [ 2721.108123] dump_stack+0x107/0x167 [ 2721.108868] should_fail.cold+0x5/0xa [ 2721.109632] ? __d_alloc+0x2a/0x990 [ 2721.110360] should_failslab+0x5/0x20 [ 2721.111125] kmem_cache_alloc+0x5b/0x360 [ 2721.111951] ? trace_hardirqs_on+0x5b/0x180 [ 2721.112822] __d_alloc+0x2a/0x990 [ 2721.113519] d_alloc_pseudo+0x19/0x70 [ 2721.114359] alloc_file_pseudo+0xce/0x250 [ 2721.115190] ? alloc_file+0x5a0/0x5a0 [ 2721.115954] ? shmem_get_inode+0x55c/0xbc0 [ 2721.116848] __shmem_file_setup+0x144/0x320 [ 2721.117707] ? _copy_from_user+0xfb/0x1b0 [ 2721.118531] __do_sys_memfd_create+0x275/0x450 [ 2721.119437] ? memfd_file_seals_ptr+0x170/0x170 [ 2721.120377] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 2721.121472] ? syscall_enter_from_user_mode+0x1d/0x50 [ 2721.122508] do_syscall_64+0x33/0x40 [ 2721.123286] entry_SYSCALL_64_after_hwframe+0x61/0xc6 [ 2721.124327] RIP: 0033:0x7f26b1c90b19 [ 2721.125092] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2721.128762] RSP: 002b:00007f26af205f48 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 2721.130388] RAX: ffffffffffffffda RBX: 0000000020000440 RCX: 00007f26b1c90b19 [ 2721.131846] RDX: 0000000000004200 RSI: 0000000000000000 RDI: 00007f26b1cea0fb [ 2721.133319] RBP: 0000000000000004 R08: 0000000000002100 R09: ffffffffffffffff [ 2721.134785] R10: 0000000000000004 R11: 0000000000000246 R12: 0000000008100000 [ 2721.136246] R13: 0000000020000100 R14: 0000000000fffff0 R15: 0000000020000180 12:48:12 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000180)) (fail_nth: 34) 12:48:12 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000180)) (fail_nth: 9) 12:48:12 executing program 3: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_init_net_socket$802154_raw(0x24, 0x3, 0x0) sendmmsg$inet6(r0, &(0x7f0000004d00)=[{{0x0, 0x0, &(0x7f00000004c0)}}], 0x500, 0x0) 12:48:12 executing program 4: ioctl$RTC_UIE_ON(0xffffffffffffffff, 0x7003) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x2}, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0xfffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = dup2(0xffffffffffffffff, r0) perf_event_open(&(0x7f00000001c0)={0x2, 0x80, 0x8, 0x9, 0x4, 0x1, 0x0, 0x3b3d, 0x200a0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x2, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0xffff, 0x1, @perf_config_ext={0x7, 0x1}, 0x281, 0xffffffff, 0x4, 0x3, 0x401, 0xffffff47, 0x401, 0x0, 0x3, 0x0, 0x415}, 0x0, 0xffffffffffffffff, r0, 0x1) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="02000000030000", 0x7, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000180)) pkey_mprotect(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x0, 0xffffffffffffffff) pkey_mprotect(&(0x7f0000ff4000/0x4000)=nil, 0x4000, 0x0, 0xffffffffffffffff) socket$inet_udp(0x2, 0x2, 0x0) getsockopt$inet_int(0xffffffffffffffff, 0x0, 0xe, 0x0, &(0x7f0000000280)) ioctl$sock_SIOCADDDLCI(0xffffffffffffffff, 0x8980, 0x0) ioctl$RTC_ALM_SET(r1, 0x40247007, 0x0) mmap$IORING_OFF_SQES(&(0x7f0000ff3000/0x2000)=nil, 0x2000, 0x2000002, 0x10, r1, 0x10000000) getsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, 0x0, 0x0) 12:48:12 executing program 7: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000180)) (fail_nth: 34) 12:48:12 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f", 0x44, 0x400}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000180)) 12:48:12 executing program 6: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000180)) (fail_nth: 20) 12:48:12 executing program 0: r0 = creat(&(0x7f0000000040)='./file0\x00', 0x8) r1 = creat(&(0x7f0000000040)='./file0\x00', 0x0) fallocate(r1, 0x0, 0x0, 0x8800000) fallocate(r1, 0x4a, 0x2, 0x1000) fallocate(r0, 0x0, 0x0, 0x8800000) [ 2739.346864] FAULT_INJECTION: forcing a failure. [ 2739.346864] name failslab, interval 1, probability 0, space 0, times 0 [ 2739.349474] CPU: 0 PID: 13628 Comm: syz-executor.1 Not tainted 5.10.163 #1 [ 2739.350918] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2739.352749] Call Trace: [ 2739.353312] dump_stack+0x107/0x167 [ 2739.354082] should_fail.cold+0x5/0xa [ 2739.354885] ? create_object.isra.0+0x3a/0xa20 [ 2739.355860] should_failslab+0x5/0x20 [ 2739.356674] kmem_cache_alloc+0x5b/0x360 [ 2739.357531] create_object.isra.0+0x3a/0xa20 [ 2739.358452] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 2739.359515] kmem_cache_alloc+0x159/0x360 [ 2739.360381] ? trace_hardirqs_on+0x5b/0x180 [ 2739.361316] __d_alloc+0x2a/0x990 [ 2739.362049] d_alloc_pseudo+0x19/0x70 [ 2739.362846] alloc_file_pseudo+0xce/0x250 [ 2739.363714] ? alloc_file+0x5a0/0x5a0 [ 2739.364549] ? shmem_get_inode+0x55c/0xbc0 [ 2739.365444] __shmem_file_setup+0x144/0x320 [ 2739.366348] ? _copy_from_user+0xfb/0x1b0 [ 2739.367214] __do_sys_memfd_create+0x275/0x450 [ 2739.368168] ? memfd_file_seals_ptr+0x170/0x170 [ 2739.369150] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 2739.370242] ? syscall_enter_from_user_mode+0x1d/0x50 [ 2739.371318] do_syscall_64+0x33/0x40 [ 2739.372096] entry_SYSCALL_64_after_hwframe+0x61/0xc6 [ 2739.373185] RIP: 0033:0x7f26b1c90b19 [ 2739.373960] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2739.377785] RSP: 002b:00007f26af205f48 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 2739.379372] RAX: ffffffffffffffda RBX: 0000000020000440 RCX: 00007f26b1c90b19 [ 2739.380873] RDX: 0000000000004200 RSI: 0000000000000000 RDI: 00007f26b1cea0fb [ 2739.382356] RBP: 0000000000000004 R08: 0000000000002100 R09: ffffffffffffffff [ 2739.383834] R10: 0000000000000004 R11: 0000000000000246 R12: 0000000008100000 [ 2739.385331] R13: 0000000020000100 R14: 0000000000fffff0 R15: 0000000020000180 [ 2739.387003] hpet: Lost 1 RTC interrupts [ 2739.394000] FAULT_INJECTION: forcing a failure. [ 2739.394000] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 2739.396580] CPU: 0 PID: 13629 Comm: syz-executor.6 Not tainted 5.10.163 #1 [ 2739.397985] FAULT_INJECTION: forcing a failure. [ 2739.397985] name failslab, interval 1, probability 0, space 0, times 0 [ 2739.400385] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2739.400392] Call Trace: [ 2739.400415] dump_stack+0x107/0x167 [ 2739.400440] should_fail.cold+0x5/0xa [ 2739.400474] iov_iter_copy_from_user_atomic+0x49b/0xdb0 [ 2739.400501] ? shmem_write_begin+0xf7/0x1d0 [ 2739.406387] ? shmem_write_begin+0x100/0x1d0 [ 2739.407312] generic_perform_write+0x279/0x4f0 [ 2739.408278] ? trace_event_raw_event_file_check_and_advance_wb_err+0x4a0/0x4a0 [ 2739.409807] ? evict_inodes+0x420/0x420 [ 2739.410632] ? generic_write_checks+0x2ad/0x390 [ 2739.411643] __generic_file_write_iter+0x39d/0x5d0 [ 2739.412706] generic_file_write_iter+0xdb/0x230 [ 2739.413681] ? iov_iter_init+0x3c/0x130 [ 2739.414523] new_sync_write+0x42c/0x660 [ 2739.415361] ? new_sync_read+0x6f0/0x6f0 [ 2739.416218] ? __x64_sys_pwrite64+0x201/0x260 [ 2739.417186] ? lock_release+0x6b0/0x6b0 [ 2739.418031] ? selinux_file_permission+0x36/0x510 [ 2739.419067] vfs_write+0x747/0xa30 [ 2739.419830] __x64_sys_pwrite64+0x201/0x260 [ 2739.420753] ? ksys_pwrite64+0x1b0/0x1b0 [ 2739.421614] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 2739.422705] ? syscall_enter_from_user_mode+0x1d/0x50 [ 2739.423784] do_syscall_64+0x33/0x40 [ 2739.424576] entry_SYSCALL_64_after_hwframe+0x61/0xc6 [ 2739.425639] RIP: 0033:0x7f290af1cab7 [ 2739.426415] Code: 08 89 3c 24 48 89 4c 24 18 e8 e5 f8 ff ff 4c 8b 54 24 18 48 8b 54 24 10 41 89 c0 48 8b 74 24 08 8b 3c 24 b8 12 00 00 00 0f 05 <48> 3d 00 f0 ff ff 77 31 44 89 c7 48 89 04 24 e8 15 f9 ff ff 48 8b [ 2739.430229] RSP: 002b:00007f29084def20 EFLAGS: 00000293 ORIG_RAX: 0000000000000012 [ 2739.431810] RAX: ffffffffffffffda RBX: 00007f290afb3970 RCX: 00007f290af1cab7 [ 2739.433305] RDX: 000000000000001d RSI: 0000000020011600 RDI: 0000000000000004 [ 2739.434787] RBP: 0000000000000004 R08: 0000000000000000 R09: ffffffffffffffff [ 2739.436266] R10: 0000000000002100 R11: 0000000000000293 R12: 0000000000000004 [ 2739.437751] R13: 0000000000000004 R14: 0000000020000488 R15: 0000000000000003 [ 2739.439262] CPU: 1 PID: 13633 Comm: syz-executor.7 Not tainted 5.10.163 #1 [ 2739.439375] hpet: Lost 1 RTC interrupts [ 2739.440717] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2739.443251] Call Trace: [ 2739.443795] dump_stack+0x107/0x167 [ 2739.444565] should_fail.cold+0x5/0xa [ 2739.445350] ? radix_tree_node_alloc.constprop.0+0x1e3/0x300 [ 2739.446528] should_failslab+0x5/0x20 [ 2739.447306] kmem_cache_alloc+0x5b/0x360 [ 2739.448149] radix_tree_node_alloc.constprop.0+0x1e3/0x300 [ 2739.449298] idr_get_free+0x4b5/0x8f0 [ 2739.450100] idr_alloc_u32+0x170/0x2d0 [ 2739.450903] ? __fprop_inc_percpu_max+0x130/0x130 [ 2739.451893] ? lock_acquire+0x197/0x490 [ 2739.452731] ? __kernfs_new_node+0xff/0x850 [ 2739.453626] idr_alloc_cyclic+0x102/0x230 [ 2739.454481] ? idr_alloc+0x130/0x130 [ 2739.455247] ? rwlock_bug.part.0+0x90/0x90 [ 2739.456139] __kernfs_new_node+0x117/0x850 [ 2739.457017] ? perf_trace_lock+0xac/0x490 [ 2739.457860] ? perf_trace_lock+0xac/0x490 [ 2739.458757] ? lock_chain_count+0x20/0x20 [ 2739.459608] ? kernfs_dop_revalidate+0x3a0/0x3a0 [ 2739.460583] ? __lockdep_reset_lock+0x180/0x180 [ 2739.461531] ? __lockdep_reset_lock+0x180/0x180 [ 2739.462488] ? find_held_lock+0x2c/0x110 [ 2739.463324] ? set_user_nice.part.0+0x2fd/0x760 [ 2739.464279] kernfs_create_dir_ns+0x9c/0x230 [ 2739.465192] internal_create_group+0x793/0xb30 [ 2739.466132] ? set_user_nice.part.0+0x2fd/0x760 [ 2739.467081] ? sysfs_remove_group+0x170/0x170 [ 2739.468000] ? lockdep_init_map_type+0x2c7/0x780 [ 2739.468985] ? blk_queue_flag_set+0x22/0x30 [ 2739.469862] ? __loop_update_dio+0x2d2/0x690 [ 2739.470764] loop_configure+0x954/0x1480 [ 2739.471611] lo_ioctl+0xa72/0x1760 [ 2739.472336] ? avc_has_extended_perms+0x7f1/0xec0 [ 2739.473332] ? loop_set_status_old+0x250/0x250 [ 2739.474304] ? avc_ss_reset+0x180/0x180 [ 2739.475122] ? find_held_lock+0x2c/0x110 [ 2739.475962] ? __lock_acquire+0xbb1/0x5b00 [ 2739.476914] ? selinux_inode_getsecctx+0x90/0x90 [ 2739.477881] ? generic_block_fiemap+0x60/0x60 [ 2739.478809] ? loop_set_status_old+0x250/0x250 [ 2739.479735] blkdev_ioctl+0x291/0x710 [ 2739.480514] ? blkdev_common_ioctl+0x1870/0x1870 [ 2739.481498] ? selinux_file_ioctl+0xb1/0x260 [ 2739.482403] block_ioctl+0xf9/0x140 [ 2739.483143] ? blkdev_read_iter+0x1c0/0x1c0 [ 2739.484024] __x64_sys_ioctl+0x19a/0x210 [ 2739.484866] do_syscall_64+0x33/0x40 [ 2739.485632] entry_SYSCALL_64_after_hwframe+0x61/0xc6 [ 2739.486674] RIP: 0033:0x7fca424058d7 [ 2739.487437] Code: 3c 1c 48 f7 d8 49 39 c4 72 b8 e8 a4 54 02 00 85 c0 78 bd 48 83 c4 08 4c 89 e0 5b 41 5c c3 0f 1f 44 00 00 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2739.491225] RSP: 002b:00007fca3f97af48 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 2739.492788] RAX: ffffffffffffffda RBX: 00007fca4244f970 RCX: 00007fca424058d7 [ 2739.494239] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 2739.495694] RBP: 0000000000000005 R08: 0000000000000000 R09: ffffffffffffffff [ 2739.497163] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000004 [ 2739.498620] R13: 0000000000000004 R14: 00000000200004a0 R15: 0000000000000004 [ 2739.525046] FAULT_INJECTION: forcing a failure. [ 2739.525046] name failslab, interval 1, probability 0, space 0, times 0 [ 2739.527337] CPU: 1 PID: 13631 Comm: syz-executor.5 Not tainted 5.10.163 #1 [ 2739.528753] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2739.530465] Call Trace: [ 2739.531006] dump_stack+0x107/0x167 [ 2739.531756] should_fail.cold+0x5/0xa [ 2739.532560] ? __kernfs_new_node+0xd4/0x850 [ 2739.533443] should_failslab+0x5/0x20 [ 2739.534229] kmem_cache_alloc+0x5b/0x360 [ 2739.535092] __kernfs_new_node+0xd4/0x850 [ 2739.535949] ? kernfs_dop_revalidate+0x3a0/0x3a0 [ 2739.536991] ? __mutex_unlock_slowpath+0xe1/0x600 [ 2739.537988] ? wait_for_completion_io+0x270/0x270 [ 2739.538983] ? kernfs_next_descendant_post+0x1a7/0x2a0 [ 2739.540062] kernfs_new_node+0x93/0x120 [ 2739.540898] __kernfs_create_file+0x51/0x350 [ 2739.541795] sysfs_add_file_mode_ns+0x221/0x560 [ 2739.542752] internal_create_group+0x324/0xb30 [ 2739.543689] ? sysfs_remove_group+0x170/0x170 [ 2739.544611] ? lockdep_init_map_type+0x2c7/0x780 [ 2739.545573] ? blk_queue_flag_set+0x22/0x30 [ 2739.546463] ? __loop_update_dio+0x2d2/0x690 [ 2739.547363] loop_configure+0x954/0x1480 [ 2739.548211] lo_ioctl+0xa72/0x1760 [ 2739.548937] ? avc_has_extended_perms+0x7f1/0xec0 [ 2739.549925] ? loop_set_status_old+0x250/0x250 [ 2739.550872] ? avc_ss_reset+0x180/0x180 [ 2739.551685] ? find_held_lock+0x2c/0x110 [ 2739.552580] ? __lock_acquire+0xbb1/0x5b00 [ 2739.553494] ? selinux_inode_getsecctx+0x90/0x90 [ 2739.554462] ? generic_block_fiemap+0x60/0x60 [ 2739.555372] ? loop_set_status_old+0x250/0x250 [ 2739.556305] blkdev_ioctl+0x291/0x710 [ 2739.557075] ? blkdev_common_ioctl+0x1870/0x1870 [ 2739.558063] ? selinux_file_ioctl+0xb1/0x260 [ 2739.558978] block_ioctl+0xf9/0x140 [ 2739.559726] ? blkdev_read_iter+0x1c0/0x1c0 [ 2739.560627] __x64_sys_ioctl+0x19a/0x210 [ 2739.561472] do_syscall_64+0x33/0x40 [ 2739.562247] entry_SYSCALL_64_after_hwframe+0x61/0xc6 [ 2739.563298] RIP: 0033:0x7f8cf18208d7 [ 2739.564065] Code: 3c 1c 48 f7 d8 49 39 c4 72 b8 e8 a4 54 02 00 85 c0 78 bd 48 83 c4 08 4c 89 e0 5b 41 5c c3 0f 1f 44 00 00 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2739.567871] RSP: 002b:00007f8ceed95f48 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 2739.569457] RAX: ffffffffffffffda RBX: 00007f8cf186a970 RCX: 00007f8cf18208d7 [ 2739.570920] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 2739.572376] RBP: 0000000000000005 R08: 0000000000000000 R09: ffffffffffffffff [ 2739.573836] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000004 [ 2739.575302] R13: 0000000000000004 R14: 00000000200004a0 R15: 0000000000000004 [ 2739.616769] EXT4-fs (loop4): ext4_check_descriptors: Inode table for group 0 overlaps superblock [ 2739.618692] EXT4-fs (loop4): group descriptors corrupted! [ 2739.642586] EXT4-fs (loop1): mounted filesystem without journal. Opts: ,errors=continue [ 2739.643367] EXT4-fs (loop7): mounted filesystem without journal. Opts: ,errors=continue [ 2739.661181] EXT4-fs (loop6): mounted filesystem without journal. Opts: ,errors=continue [ 2739.679139] EXT4-fs error (device loop2): ext4_fill_super:4959: inode #2: comm syz-executor.2: iget: root inode unallocated [ 2739.684291] EXT4-fs (loop2): get root inode failed [ 2739.685598] EXT4-fs (loop2): mount failed [ 2739.771696] EXT4-fs (loop5): mounted filesystem without journal. Opts: ,errors=continue 12:48:12 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000180)) (fail_nth: 10) 12:48:12 executing program 4: ioctl$RTC_UIE_ON(0xffffffffffffffff, 0x7003) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x2}, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0xfffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = dup2(0xffffffffffffffff, r0) perf_event_open(&(0x7f00000001c0)={0x2, 0x80, 0x8, 0x9, 0x4, 0x1, 0x0, 0x3b3d, 0x200a0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x2, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0xffff, 0x1, @perf_config_ext={0x7, 0x1}, 0x281, 0xffffffff, 0x4, 0x3, 0x401, 0xffffff47, 0x401, 0x0, 0x3, 0x0, 0x415}, 0x0, 0xffffffffffffffff, r0, 0x1) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="02000000030000", 0x7, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000180)) pkey_mprotect(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x0, 0xffffffffffffffff) pkey_mprotect(&(0x7f0000ff4000/0x4000)=nil, 0x4000, 0x0, 0xffffffffffffffff) socket$inet_udp(0x2, 0x2, 0x0) getsockopt$inet_int(0xffffffffffffffff, 0x0, 0xe, 0x0, &(0x7f0000000280)) ioctl$sock_SIOCADDDLCI(0xffffffffffffffff, 0x8980, 0x0) ioctl$RTC_ALM_SET(r1, 0x40247007, 0x0) mmap$IORING_OFF_SQES(&(0x7f0000ff3000/0x2000)=nil, 0x2000, 0x2000002, 0x10, r1, 0x10000000) getsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, 0x0, 0x0) 12:48:12 executing program 6: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000180)) (fail_nth: 21) 12:48:12 executing program 0: r0 = creat(&(0x7f0000000040)='./file0\x00', 0x0) r1 = openat2(r0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080)={0x82000, 0x40, 0x4}, 0x18) openat(r1, &(0x7f0000000140)='./file0\x00', 0x0, 0x120) r2 = syz_init_net_socket$802154_raw(0x24, 0x3, 0x0) bind$802154_raw(r2, &(0x7f0000000000)={0x24, @long={0x3, 0x2, {0xaaaaaaaaaaaa0002}}}, 0x14) bind$802154_raw(r2, &(0x7f0000000040)={0x24, @short={0x2, 0x2367f916dda8ac21, 0xaaa0}}, 0x14) sendmmsg$inet6(r2, &(0x7f0000000100)=[{{0x0, 0x0, &(0x7f00000004c0)=[{&(0x7f0000000080)='K', 0x1}], 0x1}}], 0x1, 0x0) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(r1, 0xc018937d, &(0x7f00000000c0)={{0x1, 0x1, 0x18, r2, {0x40}}, './file0\x00'}) r3 = creat(&(0x7f0000000040)='./file0\x00', 0x9) fallocate(r3, 0x0, 0x0, 0x8800000) fallocate(r3, 0x3, 0x0, 0x8000) fallocate(r0, 0x0, 0x0, 0x8800000) r4 = syz_init_net_socket$802154_raw(0x24, 0x3, 0x0) bind$802154_raw(r4, &(0x7f0000000000)={0x24, @long={0x3, 0x2, {0xaaaaaaaaaaaa0002}}}, 0x14) bind$802154_raw(r4, &(0x7f0000000040)={0x24, @short={0x2, 0x2367f916dda8ac21, 0xaaa0}}, 0x14) sendmmsg$inet6(r4, &(0x7f0000004d00)=[{{0x0, 0x0, &(0x7f00000004c0)=[{&(0x7f0000000080)='K', 0x4c}], 0x1}}], 0x7ffff000, 0x0) dup3(r3, r4, 0x0) 12:48:12 executing program 7: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000180)) (fail_nth: 35) 12:48:12 executing program 3: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_init_net_socket$802154_raw(0x24, 0x3, 0x0) sendmmsg$inet6(r0, &(0x7f0000004d00)=[{{0x0, 0x0, &(0x7f00000004c0)}}], 0x1, 0x4) 12:48:12 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f", 0x44, 0x400}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000180)) [ 2739.894141] ieee802154 phy0 wpan0: encryption failed: -22 [ 2739.924176] EXT4-fs (loop4): ext4_check_descriptors: Inode table for group 0 overlaps superblock [ 2739.926272] EXT4-fs (loop4): group descriptors corrupted! 12:48:12 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000180)) (fail_nth: 35) [ 2739.980267] ieee802154 phy0 wpan0: encryption failed: -22 12:48:12 executing program 4: ioctl$RTC_UIE_ON(0xffffffffffffffff, 0x7003) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x2}, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0xfffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = dup2(0xffffffffffffffff, r0) perf_event_open(&(0x7f00000001c0)={0x2, 0x80, 0x8, 0x9, 0x4, 0x1, 0x0, 0x3b3d, 0x200a0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x2, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0xffff, 0x1, @perf_config_ext={0x7, 0x1}, 0x281, 0xffffffff, 0x4, 0x3, 0x401, 0xffffff47, 0x401, 0x0, 0x3, 0x0, 0x415}, 0x0, 0xffffffffffffffff, r0, 0x1) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="02000000030000", 0x7, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000180)) pkey_mprotect(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x0, 0xffffffffffffffff) pkey_mprotect(&(0x7f0000ff4000/0x4000)=nil, 0x4000, 0x0, 0xffffffffffffffff) socket$inet_udp(0x2, 0x2, 0x0) getsockopt$inet_int(0xffffffffffffffff, 0x0, 0xe, 0x0, &(0x7f0000000280)) ioctl$sock_SIOCADDDLCI(0xffffffffffffffff, 0x8980, 0x0) ioctl$RTC_ALM_SET(r1, 0x40247007, 0x0) mmap$IORING_OFF_SQES(&(0x7f0000ff3000/0x2000)=nil, 0x2000, 0x2000002, 0x10, r1, 0x10000000) getsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, 0x0, 0x0) [ 2740.017420] FAULT_INJECTION: forcing a failure. [ 2740.017420] name failslab, interval 1, probability 0, space 0, times 0 [ 2740.020015] CPU: 0 PID: 13665 Comm: syz-executor.1 Not tainted 5.10.163 #1 [ 2740.021552] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2740.023577] Call Trace: [ 2740.024230] dump_stack+0x107/0x167 [ 2740.025144] should_fail.cold+0x5/0xa [ 2740.026089] ? __alloc_file+0x21/0x320 [ 2740.027054] should_failslab+0x5/0x20 [ 2740.027993] kmem_cache_alloc+0x5b/0x360 [ 2740.029012] __alloc_file+0x21/0x320 [ 2740.029935] alloc_empty_file+0x6d/0x170 [ 2740.030944] alloc_file+0x59/0x5a0 [ 2740.031843] alloc_file_pseudo+0x16a/0x250 [ 2740.032908] ? alloc_file+0x5a0/0x5a0 [ 2740.033752] ? shmem_get_inode+0x55c/0xbc0 [ 2740.034681] __shmem_file_setup+0x144/0x320 [ 2740.035578] ? _copy_from_user+0xfb/0x1b0 [ 2740.036479] __do_sys_memfd_create+0x275/0x450 [ 2740.037443] ? memfd_file_seals_ptr+0x170/0x170 [ 2740.038428] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 2740.039523] ? syscall_enter_from_user_mode+0x1d/0x50 [ 2740.040678] do_syscall_64+0x33/0x40 [ 2740.041448] entry_SYSCALL_64_after_hwframe+0x61/0xc6 [ 2740.042522] RIP: 0033:0x7f26b1c90b19 [ 2740.043303] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2740.047264] RSP: 002b:00007f26af205f48 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 2740.048881] RAX: ffffffffffffffda RBX: 0000000020000440 RCX: 00007f26b1c90b19 [ 2740.050371] RDX: 0000000000004200 RSI: 0000000000000000 RDI: 00007f26b1cea0fb [ 2740.051858] RBP: 0000000000000004 R08: 0000000000002100 R09: ffffffffffffffff [ 2740.053352] R10: 0000000000000004 R11: 0000000000000246 R12: 0000000008100000 [ 2740.054823] R13: 0000000020000100 R14: 0000000000fffff0 R15: 0000000020000180 [ 2740.056514] hpet: Lost 2 RTC interrupts [ 2740.068347] FAULT_INJECTION: forcing a failure. [ 2740.068347] name failslab, interval 1, probability 0, space 0, times 0 [ 2740.070771] CPU: 0 PID: 13667 Comm: syz-executor.6 Not tainted 5.10.163 #1 [ 2740.072250] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2740.074010] Call Trace: [ 2740.074562] dump_stack+0x107/0x167 [ 2740.075333] should_fail.cold+0x5/0xa [ 2740.076119] ? getname_flags.part.0+0x50/0x4f0 [ 2740.077080] should_failslab+0x5/0x20 [ 2740.077869] kmem_cache_alloc+0x5b/0x360 [ 2740.078733] getname_flags.part.0+0x50/0x4f0 [ 2740.079648] getname+0x8e/0xd0 [ 2740.080315] do_sys_openat2+0xf9/0x420 [ 2740.081115] ? build_open_flags+0x6f0/0x6f0 [ 2740.082019] ? rcu_read_lock_any_held+0x75/0xa0 [ 2740.082996] __x64_sys_openat+0x13f/0x1f0 [ 2740.083903] ? __ia32_sys_open+0x1c0/0x1c0 [ 2740.084800] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 2740.085922] ? syscall_enter_from_user_mode+0x1d/0x50 [ 2740.086982] do_syscall_64+0x33/0x40 [ 2740.087763] entry_SYSCALL_64_after_hwframe+0x61/0xc6 [ 2740.088825] RIP: 0033:0x7f290af1ca04 [ 2740.089611] Code: 84 00 00 00 00 00 44 89 54 24 0c e8 96 f9 ff ff 44 8b 54 24 0c 44 89 e2 48 89 ee 41 89 c0 bf 9c ff ff ff b8 01 01 00 00 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 89 44 24 0c e8 c8 f9 ff ff 8b 44 [ 2740.093388] RSP: 002b:00007f29084deed0 EFLAGS: 00000293 ORIG_RAX: 0000000000000101 [ 2740.095009] RAX: ffffffffffffffda RBX: 00007f290afb3970 RCX: 00007f290af1ca04 [ 2740.096469] RDX: 0000000000000002 RSI: 00007f29084df000 RDI: 00000000ffffff9c [ 2740.097942] RBP: 00007f29084df000 R08: 0000000000000000 R09: ffffffffffffffff [ 2740.099409] R10: 0000000000000000 R11: 0000000000000293 R12: 0000000000000002 [ 2740.100895] R13: 0000000000000004 R14: 00000000200004a0 R15: 0000000000000004 [ 2740.102538] hpet: Lost 1 RTC interrupts [ 2740.110596] ieee802154 phy0 wpan0: encryption failed: -22 [ 2740.143047] FAULT_INJECTION: forcing a failure. [ 2740.143047] name failslab, interval 1, probability 0, space 0, times 0 [ 2740.145734] CPU: 0 PID: 13672 Comm: syz-executor.7 Not tainted 5.10.163 #1 [ 2740.147205] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2740.148922] Call Trace: 12:48:12 executing program 6: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000180)) (fail_nth: 22) [ 2740.149476] dump_stack+0x107/0x167 [ 2740.150411] should_fail.cold+0x5/0xa [ 2740.151202] ? create_object.isra.0+0x3a/0xa20 [ 2740.152149] should_failslab+0x5/0x20 [ 2740.152971] kmem_cache_alloc+0x5b/0x360 [ 2740.153817] create_object.isra.0+0x3a/0xa20 [ 2740.154717] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 2740.155774] kmem_cache_alloc+0x159/0x360 [ 2740.156651] __kernfs_new_node+0xd4/0x850 [ 2740.157505] ? kernfs_dop_revalidate+0x3a0/0x3a0 [ 2740.158473] ? lock_downgrade+0x6d0/0x6d0 [ 2740.159330] ? mutex_lock_io_nested+0x1110/0x1110 [ 2740.160313] ? __kernfs_new_node+0x549/0x850 [ 2740.161250] ? __mutex_unlock_slowpath+0xe1/0x600 [ 2740.162247] kernfs_new_node+0x93/0x120 [ 2740.163070] __kernfs_create_file+0x51/0x350 [ 2740.163980] sysfs_add_file_mode_ns+0x221/0x560 [ 2740.164955] internal_create_group+0x324/0xb30 [ 2740.165898] ? sysfs_remove_group+0x170/0x170 [ 2740.166818] ? lockdep_init_map_type+0x2c7/0x780 [ 2740.167792] ? blk_queue_flag_set+0x22/0x30 [ 2740.168689] ? __loop_update_dio+0x2d2/0x690 [ 2740.169610] loop_configure+0x954/0x1480 [ 2740.170455] lo_ioctl+0xa72/0x1760 [ 2740.171205] ? avc_has_extended_perms+0x7f1/0xec0 [ 2740.172196] ? loop_set_status_old+0x250/0x250 [ 2740.173187] ? avc_ss_reset+0x180/0x180 [ 2740.174005] ? find_held_lock+0x2c/0x110 [ 2740.174878] ? __lock_acquire+0xbb1/0x5b00 [ 2740.175799] ? selinux_inode_getsecctx+0x90/0x90 [ 2740.176810] ? generic_block_fiemap+0x60/0x60 [ 2740.177746] ? loop_set_status_old+0x250/0x250 [ 2740.178709] blkdev_ioctl+0x291/0x710 [ 2740.179495] ? blkdev_common_ioctl+0x1870/0x1870 [ 2740.180503] ? selinux_file_ioctl+0xb1/0x260 [ 2740.181423] block_ioctl+0xf9/0x140 [ 2740.182190] ? blkdev_read_iter+0x1c0/0x1c0 [ 2740.183085] __x64_sys_ioctl+0x19a/0x210 [ 2740.183951] do_syscall_64+0x33/0x40 [ 2740.184740] entry_SYSCALL_64_after_hwframe+0x61/0xc6 [ 2740.185836] RIP: 0033:0x7fca424058d7 [ 2740.186613] Code: 3c 1c 48 f7 d8 49 39 c4 72 b8 e8 a4 54 02 00 85 c0 78 bd 48 83 c4 08 4c 89 e0 5b 41 5c c3 0f 1f 44 00 00 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2740.190514] RSP: 002b:00007fca3f97af48 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 2740.192106] RAX: ffffffffffffffda RBX: 00007fca4244f970 RCX: 00007fca424058d7 [ 2740.193643] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 2740.195156] RBP: 0000000000000005 R08: 0000000000000000 R09: ffffffffffffffff [ 2740.196679] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000004 [ 2740.198184] R13: 0000000000000004 R14: 00000000200004a0 R15: 0000000000000004 [ 2740.199973] hpet: Lost 2 RTC interrupts [ 2740.201245] ieee802154 phy0 wpan0: encryption failed: -22 12:48:13 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000180)) (fail_nth: 11) [ 2740.242455] EXT4-fs (loop7): mounted filesystem without journal. Opts: ,errors=continue [ 2740.293335] EXT4-fs error (device loop2): ext4_fill_super:4959: inode #2: comm syz-executor.2: iget: root inode unallocated [ 2740.297929] EXT4-fs (loop2): get root inode failed [ 2740.299167] EXT4-fs (loop2): mount failed 12:48:13 executing program 7: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000180)) (fail_nth: 36) [ 2740.359068] FAULT_INJECTION: forcing a failure. [ 2740.359068] name failslab, interval 1, probability 0, space 0, times 0 [ 2740.361687] CPU: 0 PID: 13681 Comm: syz-executor.5 Not tainted 5.10.163 #1 [ 2740.363163] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2740.364898] Call Trace: [ 2740.365454] dump_stack+0x107/0x167 [ 2740.366211] should_fail.cold+0x5/0xa [ 2740.367006] ? create_object.isra.0+0x3a/0xa20 [ 2740.367948] should_failslab+0x5/0x20 [ 2740.368736] kmem_cache_alloc+0x5b/0x360 [ 2740.369593] create_object.isra.0+0x3a/0xa20 [ 2740.370528] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 2740.371600] kmem_cache_alloc+0x159/0x360 [ 2740.372481] __kernfs_new_node+0xd4/0x850 [ 2740.373375] ? kernfs_dop_revalidate+0x3a0/0x3a0 [ 2740.374375] ? __mutex_unlock_slowpath+0xe1/0x600 [ 2740.375394] ? wait_for_completion_io+0x270/0x270 [ 2740.376414] ? kernfs_next_descendant_post+0x1a7/0x2a0 [ 2740.377535] kernfs_new_node+0x93/0x120 [ 2740.378379] __kernfs_create_file+0x51/0x350 [ 2740.379314] sysfs_add_file_mode_ns+0x221/0x560 [ 2740.380305] internal_create_group+0x324/0xb30 [ 2740.381286] ? sysfs_remove_group+0x170/0x170 [ 2740.382232] ? lockdep_init_map_type+0x2c7/0x780 [ 2740.383237] ? blk_queue_flag_set+0x22/0x30 [ 2740.384140] ? __loop_update_dio+0x2d2/0x690 [ 2740.385069] loop_configure+0x954/0x1480 [ 2740.385933] lo_ioctl+0xa72/0x1760 [ 2740.386690] ? avc_has_extended_perms+0x7f1/0xec0 [ 2740.387716] ? loop_set_status_old+0x250/0x250 [ 2740.388682] ? avc_ss_reset+0x180/0x180 [ 2740.389510] ? find_held_lock+0x2c/0x110 [ 2740.390367] ? __lock_acquire+0xbb1/0x5b00 [ 2740.391302] ? selinux_inode_getsecctx+0x90/0x90 [ 2740.392303] ? generic_block_fiemap+0x60/0x60 [ 2740.393260] ? loop_set_status_old+0x250/0x250 [ 2740.394191] blkdev_ioctl+0x291/0x710 [ 2740.394975] ? blkdev_common_ioctl+0x1870/0x1870 [ 2740.395957] ? selinux_file_ioctl+0xb1/0x260 [ 2740.396879] block_ioctl+0xf9/0x140 [ 2740.397633] ? blkdev_read_iter+0x1c0/0x1c0 [ 2740.398519] __x64_sys_ioctl+0x19a/0x210 [ 2740.399356] do_syscall_64+0x33/0x40 [ 2740.400121] entry_SYSCALL_64_after_hwframe+0x61/0xc6 [ 2740.401177] RIP: 0033:0x7f8cf18208d7 [ 2740.401948] Code: 3c 1c 48 f7 d8 49 39 c4 72 b8 e8 a4 54 02 00 85 c0 78 bd 48 83 c4 08 4c 89 e0 5b 41 5c c3 0f 1f 44 00 00 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2740.405733] RSP: 002b:00007f8ceed95f48 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 2740.407293] RAX: ffffffffffffffda RBX: 00007f8cf186a970 RCX: 00007f8cf18208d7 [ 2740.408761] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 2740.410226] RBP: 0000000000000005 R08: 0000000000000000 R09: ffffffffffffffff [ 2740.411690] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000004 [ 2740.413159] R13: 0000000000000004 R14: 00000000200004a0 R15: 0000000000000004 [ 2740.414851] hpet: Lost 3 RTC interrupts [ 2740.446263] FAULT_INJECTION: forcing a failure. [ 2740.446263] name failslab, interval 1, probability 0, space 0, times 0 [ 2740.448589] CPU: 0 PID: 13687 Comm: syz-executor.6 Not tainted 5.10.163 #1 [ 2740.450005] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2740.451706] Call Trace: [ 2740.452256] dump_stack+0x107/0x167 [ 2740.453020] should_fail.cold+0x5/0xa [ 2740.453804] ? create_object.isra.0+0x3a/0xa20 [ 2740.454826] should_failslab+0x5/0x20 [ 2740.455608] kmem_cache_alloc+0x5b/0x360 [ 2740.456439] ? __generic_file_write_iter+0x1a4/0x5d0 [ 2740.457497] create_object.isra.0+0x3a/0xa20 [ 2740.458423] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 2740.459466] kmem_cache_alloc+0x159/0x360 [ 2740.460325] getname_flags.part.0+0x50/0x4f0 [ 2740.461255] getname+0x8e/0xd0 [ 2740.461917] do_sys_openat2+0xf9/0x420 [ 2740.462731] ? build_open_flags+0x6f0/0x6f0 [ 2740.463626] ? rcu_read_lock_any_held+0x75/0xa0 [ 2740.464617] __x64_sys_openat+0x13f/0x1f0 [ 2740.465467] ? __ia32_sys_open+0x1c0/0x1c0 [ 2740.466345] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 2740.467418] ? syscall_enter_from_user_mode+0x1d/0x50 [ 2740.468478] do_syscall_64+0x33/0x40 [ 2740.469251] entry_SYSCALL_64_after_hwframe+0x61/0xc6 [ 2740.470298] RIP: 0033:0x7f290af1ca04 [ 2740.471066] Code: 84 00 00 00 00 00 44 89 54 24 0c e8 96 f9 ff ff 44 8b 54 24 0c 44 89 e2 48 89 ee 41 89 c0 bf 9c ff ff ff b8 01 01 00 00 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 89 44 24 0c e8 c8 f9 ff ff 8b 44 [ 2740.474868] RSP: 002b:00007f29084deed0 EFLAGS: 00000293 ORIG_RAX: 0000000000000101 [ 2740.476442] RAX: ffffffffffffffda RBX: 00007f290afb3970 RCX: 00007f290af1ca04 [ 2740.477933] RDX: 0000000000000002 RSI: 00007f29084df000 RDI: 00000000ffffff9c [ 2740.479408] RBP: 00007f29084df000 R08: 0000000000000000 R09: ffffffffffffffff [ 2740.480886] R10: 0000000000000000 R11: 0000000000000293 R12: 0000000000000002 [ 2740.482355] R13: 0000000000000004 R14: 00000000200004a0 R15: 0000000000000004 [ 2740.484009] hpet: Lost 1 RTC interrupts [ 2740.504992] EXT4-fs (loop5): mounted filesystem without journal. Opts: ,errors=continue [ 2740.517671] EXT4-fs (loop6): mounted filesystem without journal. Opts: ,errors=continue [ 2740.547393] FAULT_INJECTION: forcing a failure. [ 2740.547393] name failslab, interval 1, probability 0, space 0, times 0 [ 2740.549788] CPU: 0 PID: 13693 Comm: syz-executor.1 Not tainted 5.10.163 #1 [ 2740.551225] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2740.553001] Call Trace: [ 2740.553552] dump_stack+0x107/0x167 [ 2740.554314] should_fail.cold+0x5/0xa [ 2740.555100] ? create_object.isra.0+0x3a/0xa20 [ 2740.556068] should_failslab+0x5/0x20 [ 2740.556861] kmem_cache_alloc+0x5b/0x360 [ 2740.557702] create_object.isra.0+0x3a/0xa20 [ 2740.558610] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 2740.559657] kmem_cache_alloc+0x159/0x360 [ 2740.560520] __alloc_file+0x21/0x320 [ 2740.561302] alloc_empty_file+0x6d/0x170 [ 2740.562144] alloc_file+0x59/0x5a0 [ 2740.562877] alloc_file_pseudo+0x16a/0x250 [ 2740.563753] ? alloc_file+0x5a0/0x5a0 [ 2740.564540] ? shmem_get_inode+0x55c/0xbc0 [ 2740.565431] __shmem_file_setup+0x144/0x320 [ 2740.566325] ? _copy_from_user+0xfb/0x1b0 [ 2740.567183] __do_sys_memfd_create+0x275/0x450 [ 2740.568118] ? memfd_file_seals_ptr+0x170/0x170 [ 2740.569103] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 2740.570190] ? syscall_enter_from_user_mode+0x1d/0x50 [ 2740.571260] do_syscall_64+0x33/0x40 [ 2740.572026] entry_SYSCALL_64_after_hwframe+0x61/0xc6 [ 2740.573094] RIP: 0033:0x7f26b1c90b19 [ 2740.573866] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2740.577760] RSP: 002b:00007f26af205f48 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 2740.579317] RAX: ffffffffffffffda RBX: 0000000020000440 RCX: 00007f26b1c90b19 [ 2740.580798] RDX: 0000000000004200 RSI: 0000000000000000 RDI: 00007f26b1cea0fb [ 2740.582270] RBP: 0000000000000004 R08: 0000000000002100 R09: ffffffffffffffff [ 2740.583739] R10: 0000000000000004 R11: 0000000000000246 R12: 0000000008100000 [ 2740.585214] R13: 0000000020000100 R14: 0000000000fffff0 R15: 0000000020000180 [ 2740.586874] hpet: Lost 2 RTC interrupts [ 2740.627194] EXT4-fs (loop4): ext4_check_descriptors: Inode table for group 0 overlaps superblock [ 2740.629305] EXT4-fs (loop4): group descriptors corrupted! [ 2740.695792] EXT4-fs (loop1): mounted filesystem without journal. Opts: ,errors=continue [ 2740.757612] FAULT_INJECTION: forcing a failure. [ 2740.757612] name failslab, interval 1, probability 0, space 0, times 0 [ 2740.760167] CPU: 1 PID: 13699 Comm: syz-executor.7 Not tainted 5.10.163 #1 [ 2740.761712] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2740.763543] Call Trace: [ 2740.764124] dump_stack+0x107/0x167 [ 2740.764943] should_fail.cold+0x5/0xa [ 2740.765891] ? __kernfs_new_node+0xd4/0x850 [ 2740.766802] should_failslab+0x5/0x20 [ 2740.767652] kmem_cache_alloc+0x5b/0x360 [ 2740.768596] __kernfs_new_node+0xd4/0x850 [ 2740.769433] ? kernfs_dop_revalidate+0x3a0/0x3a0 [ 2740.770510] ? __mutex_unlock_slowpath+0xe1/0x600 [ 2740.771577] ? wait_for_completion_io+0x270/0x270 [ 2740.772648] ? kernfs_next_descendant_post+0x1a7/0x2a0 [ 2740.773791] kernfs_new_node+0x93/0x120 [ 2740.774656] __kernfs_create_file+0x51/0x350 [ 2740.775653] sysfs_add_file_mode_ns+0x221/0x560 [ 2740.776605] internal_create_group+0x324/0xb30 [ 2740.777643] ? sysfs_remove_group+0x170/0x170 [ 2740.778661] ? lockdep_init_map_type+0x2c7/0x780 [ 2740.779628] ? blk_queue_flag_set+0x22/0x30 [ 2740.780562] ? __loop_update_dio+0x2d2/0x690 [ 2740.781551] loop_configure+0x954/0x1480 [ 2740.782417] lo_ioctl+0xa72/0x1760 [ 2740.783178] ? avc_has_extended_perms+0x7f1/0xec0 [ 2740.784254] ? loop_set_status_old+0x250/0x250 [ 2740.785326] ? avc_ss_reset+0x180/0x180 [ 2740.786129] ? find_held_lock+0x2c/0x110 [ 2740.786996] ? __lock_acquire+0xbb1/0x5b00 [ 2740.787891] ? selinux_inode_getsecctx+0x90/0x90 [ 2740.788858] ? generic_block_fiemap+0x60/0x60 [ 2740.789770] ? loop_set_status_old+0x250/0x250 [ 2740.790685] blkdev_ioctl+0x291/0x710 [ 2740.791447] ? blkdev_common_ioctl+0x1870/0x1870 [ 2740.792398] ? selinux_file_ioctl+0xb1/0x260 [ 2740.793300] block_ioctl+0xf9/0x140 [ 2740.794024] ? blkdev_read_iter+0x1c0/0x1c0 [ 2740.794891] __x64_sys_ioctl+0x19a/0x210 [ 2740.795705] do_syscall_64+0x33/0x40 [ 2740.796459] entry_SYSCALL_64_after_hwframe+0x61/0xc6 [ 2740.797501] RIP: 0033:0x7fca424058d7 [ 2740.798256] Code: 3c 1c 48 f7 d8 49 39 c4 72 b8 e8 a4 54 02 00 85 c0 78 bd 48 83 c4 08 4c 89 e0 5b 41 5c c3 0f 1f 44 00 00 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2740.802024] RSP: 002b:00007fca3f97af48 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 2740.803553] RAX: ffffffffffffffda RBX: 00007fca4244f970 RCX: 00007fca424058d7 [ 2740.804993] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 2740.806414] RBP: 0000000000000005 R08: 0000000000000000 R09: ffffffffffffffff [ 2740.807843] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000004 [ 2740.809283] R13: 0000000000000004 R14: 00000000200004a0 R15: 0000000000000004 [ 2740.885727] EXT4-fs (loop7): mounted filesystem without journal. Opts: ,errors=continue 12:48:31 executing program 7: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000180)) (fail_nth: 37) 12:48:31 executing program 0: r0 = creat(&(0x7f0000000040)='./file0\x00', 0x0) r1 = creat(&(0x7f0000000040)='./file0\x00', 0x0) r2 = openat$random(0xffffffffffffff9c, &(0x7f0000000000), 0x101640, 0x0) r3 = openat$thread_pidfd(0xffffffffffffff9c, &(0x7f0000000080), 0x10000, 0x0) r4 = seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0xa, &(0x7f0000000100)={0x6, &(0x7f00000000c0)=[{0x3, 0x8, 0xf7, 0x5}, {0x1, 0x81, 0x2d, 0x1}, {0x4, 0xfa, 0x20, 0x4a}, {0x3ff, 0x0, 0xfe, 0xdbac719}, {0x7fff, 0x6, 0x6, 0xfffffffe}, {0x7e, 0x5, 0xff, 0x5}]}) ioctl$AUTOFS_DEV_IOCTL_PROTOSUBVER(0xffffffffffffffff, 0xc0189373, &(0x7f0000000140)={{0x1, 0x1, 0x18, r1, {0xffffffff}}, './file0\x00'}) r6 = eventfd(0x4) r7 = syz_init_net_socket$802154_raw(0x24, 0x3, 0x0) r8 = openat$sr(0xffffffffffffff9c, &(0x7f0000000300), 0x200400, 0x0) r9 = syz_mount_image$msdos(&(0x7f0000000340), &(0x7f0000000380)='./file0\x00', 0x3f, 0x2, &(0x7f0000000580)=[{&(0x7f00000003c0)="9922db8ea9aa12b2cc09677bd2813b52fb3c12728677fec33178d116fcef10a6be19f1b66a8e2d165b39c2206274dd8ca108e0b6713f745248974500f3c87c2410e12b5a175d815c7baf102d1e591d2c721ce25d8fd411cc86eeb7d93a75c015664c5414d95d8a6c2a01d501a4aee4942fc4e4e61d233873e7f184621c61ef28de98dceafdad80b52688331532d0e137d814d57b438fe9a952d59bf6ac3a15f81f0649fdc61241e06ed7aa1eea0cc604e1d13111db7acb6f62186e7b9aa04febe3189a2a92e4674ee035c870504494ceea4141bc35bd249407", 0xd9, 0x4d5}, {&(0x7f0000000500)="f310e92606007e9e76322f06413e2fb5d3a7ce541a4a7d7abb53a32798c1ec20a33e1077ff5a0f7d70569d1965f1f5271196ddd167e79eacdcf5d4c5aa8e0c94321f2509b635d7e20b4c0dc19d9bc6aebf0d784f33513f", 0x57, 0x100000000}], 0x44000, &(0x7f00000005c0)={[{@nodots}, {@dots}], [{@smackfstransmute={'smackfstransmute', 0x3d, '+'}}, {@seclabel}, {@pcr={'pcr', 0x3d, 0x10}}]}) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(r8, 0xc0189379, &(0x7f0000000640)={{0x1, 0x1, 0x18, r9}, './file0\x00'}) bind$802154_raw(r7, &(0x7f0000000000)={0x24, @long={0x3, 0x2, {0xaaaaaaaaaaaa0002}}}, 0x14) bind$802154_raw(r7, &(0x7f0000000040)={0x24, @short={0x2, 0x2367f916dda8ac21, 0xaaa0}}, 0x14) sendmmsg$inet6(r7, &(0x7f0000004d00)=[{{0x0, 0x0, &(0x7f00000004c0)=[{&(0x7f0000000080)='K', 0x4c}], 0x1}}], 0x7ffff000, 0x0) r10 = openat$pidfd(0xffffffffffffff9c, &(0x7f0000000180), 0x800, 0x0) clock_gettime(0x0, &(0x7f0000000240)={0x0, 0x0}) ppoll(&(0x7f00000001c0)=[{r2, 0x8180}, {r3, 0x113}, {r1, 0x8d}, {r4, 0x408}, {r1}, {r5, 0x408}, {r6, 0x180}, {r7, 0x628c}, {r10, 0x2}], 0x9, &(0x7f0000000280)={r11, r12+10000000}, &(0x7f00000002c0)={[0x1]}, 0x8) fallocate(r1, 0x0, 0x0, 0x8800000) fallocate(r1, 0x3, 0x0, 0x8000) fallocate(r0, 0x0, 0x0, 0x8800000) 12:48:31 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000180)) (fail_nth: 12) 12:48:31 executing program 6: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000180)) (fail_nth: 23) 12:48:31 executing program 3: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_init_net_socket$802154_raw(0x24, 0x3, 0x0) sendmmsg$inet6(r0, &(0x7f0000004d00)=[{{0x0, 0x0, &(0x7f00000004c0)}}], 0x1, 0x7f00) 12:48:31 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f", 0x44, 0x400}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000180)) 12:48:31 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000180)) (fail_nth: 36) 12:48:31 executing program 4: ioctl$RTC_UIE_ON(0xffffffffffffffff, 0x7003) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x2}, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0xfffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = dup2(0xffffffffffffffff, r0) perf_event_open(&(0x7f00000001c0)={0x2, 0x80, 0x8, 0x9, 0x4, 0x1, 0x0, 0x3b3d, 0x200a0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x2, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0xffff, 0x1, @perf_config_ext={0x7, 0x1}, 0x281, 0xffffffff, 0x4, 0x3, 0x401, 0xffffff47, 0x401, 0x0, 0x3, 0x0, 0x415}, 0x0, 0xffffffffffffffff, r0, 0x1) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="0200000003000000", 0x8, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000180)) pkey_mprotect(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x0, 0xffffffffffffffff) pkey_mprotect(&(0x7f0000ff4000/0x4000)=nil, 0x4000, 0x0, 0xffffffffffffffff) socket$inet_udp(0x2, 0x2, 0x0) getsockopt$inet_int(0xffffffffffffffff, 0x0, 0xe, 0x0, &(0x7f0000000280)) ioctl$sock_SIOCADDDLCI(0xffffffffffffffff, 0x8980, 0x0) ioctl$RTC_ALM_SET(r1, 0x40247007, 0x0) mmap$IORING_OFF_SQES(&(0x7f0000ff3000/0x2000)=nil, 0x2000, 0x2000002, 0x10, r1, 0x10000000) getsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, 0x0, 0x0) [ 2758.760201] FAULT_INJECTION: forcing a failure. [ 2758.760201] name failslab, interval 1, probability 0, space 0, times 0 [ 2758.762538] CPU: 1 PID: 13723 Comm: syz-executor.1 Not tainted 5.10.163 #1 [ 2758.763963] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2758.765860] Call Trace: [ 2758.766503] dump_stack+0x107/0x167 [ 2758.767264] should_fail.cold+0x5/0xa [ 2758.768051] ? security_file_alloc+0x34/0x170 [ 2758.769060] should_failslab+0x5/0x20 [ 2758.769954] kmem_cache_alloc+0x5b/0x360 [ 2758.770886] security_file_alloc+0x34/0x170 [ 2758.771774] __alloc_file+0xb6/0x320 [ 2758.772527] alloc_empty_file+0x6d/0x170 [ 2758.773382] alloc_file+0x59/0x5a0 [ 2758.774112] alloc_file_pseudo+0x16a/0x250 [ 2758.774971] ? alloc_file+0x5a0/0x5a0 [ 2758.775683] ieee802154 phy0 wpan0: encryption failed: -22 [ 2758.775751] ? shmem_get_inode+0x55c/0xbc0 [ 2758.777780] __shmem_file_setup+0x144/0x320 [ 2758.778661] ? _copy_from_user+0xfb/0x1b0 [ 2758.779506] __do_sys_memfd_create+0x275/0x450 [ 2758.780430] ? memfd_file_seals_ptr+0x170/0x170 [ 2758.781389] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 2758.782456] ? syscall_enter_from_user_mode+0x1d/0x50 [ 2758.783508] do_syscall_64+0x33/0x40 [ 2758.784265] entry_SYSCALL_64_after_hwframe+0x61/0xc6 [ 2758.785318] RIP: 0033:0x7f26b1c90b19 [ 2758.786079] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2758.789898] RSP: 002b:00007f26af205f48 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 2758.791436] RAX: ffffffffffffffda RBX: 0000000020000440 RCX: 00007f26b1c90b19 [ 2758.792896] RDX: 0000000000004200 RSI: 0000000000000000 RDI: 00007f26b1cea0fb [ 2758.794337] RBP: 0000000000000004 R08: 0000000000002100 R09: ffffffffffffffff [ 2758.795983] R10: 0000000000000004 R11: 0000000000000246 R12: 0000000008100000 [ 2758.797529] R13: 0000000020000100 R14: 0000000000fffff0 R15: 0000000020000180 [ 2758.800495] FAULT_INJECTION: forcing a failure. [ 2758.800495] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 2758.801567] EXT4-fs error (device loop2): ext4_fill_super:4959: inode #2: comm syz-executor.2: iget: root inode unallocated [ 2758.803077] CPU: 1 PID: 13725 Comm: syz-executor.6 Not tainted 5.10.163 #1 [ 2758.803088] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2758.803094] Call Trace: [ 2758.803116] dump_stack+0x107/0x167 [ 2758.803139] should_fail.cold+0x5/0xa [ 2758.803163] strncpy_from_user+0x34/0x470 [ 2758.803191] getname_flags.part.0+0x95/0x4f0 [ 2758.803216] getname+0x8e/0xd0 [ 2758.803242] do_sys_openat2+0xf9/0x420 [ 2758.810296] FAULT_INJECTION: forcing a failure. [ 2758.810296] name failslab, interval 1, probability 0, space 0, times 0 [ 2758.810941] ? build_open_flags+0x6f0/0x6f0 [ 2758.810976] ? rcu_read_lock_any_held+0x75/0xa0 [ 2758.818157] __x64_sys_openat+0x13f/0x1f0 [ 2758.818996] ? __ia32_sys_open+0x1c0/0x1c0 [ 2758.819869] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 2758.820938] ? syscall_enter_from_user_mode+0x1d/0x50 [ 2758.821983] do_syscall_64+0x33/0x40 [ 2758.822737] entry_SYSCALL_64_after_hwframe+0x61/0xc6 [ 2758.823771] RIP: 0033:0x7f290af1ca04 [ 2758.824525] Code: 84 00 00 00 00 00 44 89 54 24 0c e8 96 f9 ff ff 44 8b 54 24 0c 44 89 e2 48 89 ee 41 89 c0 bf 9c ff ff ff b8 01 01 00 00 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 89 44 24 0c e8 c8 f9 ff ff 8b 44 [ 2758.828240] RSP: 002b:00007f29084deed0 EFLAGS: 00000293 ORIG_RAX: 0000000000000101 [ 2758.829791] RAX: ffffffffffffffda RBX: 00007f290afb3970 RCX: 00007f290af1ca04 [ 2758.831228] RDX: 0000000000000002 RSI: 00007f29084df000 RDI: 00000000ffffff9c [ 2758.832662] RBP: 00007f29084df000 R08: 0000000000000000 R09: ffffffffffffffff [ 2758.834160] R10: 0000000000000000 R11: 0000000000000293 R12: 0000000000000002 [ 2758.835601] R13: 0000000000000004 R14: 00000000200004a0 R15: 0000000000000004 [ 2758.837086] CPU: 0 PID: 13724 Comm: syz-executor.7 Not tainted 5.10.163 #1 [ 2758.838536] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2758.840276] Call Trace: [ 2758.840849] dump_stack+0x107/0x167 [ 2758.841618] should_fail.cold+0x5/0xa [ 2758.842417] ? create_object.isra.0+0x3a/0xa20 [ 2758.843379] should_failslab+0x5/0x20 [ 2758.844180] kmem_cache_alloc+0x5b/0x360 [ 2758.845042] create_object.isra.0+0x3a/0xa20 [ 2758.845962] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 2758.847030] kmem_cache_alloc+0x159/0x360 [ 2758.847907] __kernfs_new_node+0xd4/0x850 [ 2758.848782] ? kernfs_dop_revalidate+0x3a0/0x3a0 [ 2758.849818] ? __mutex_unlock_slowpath+0xe1/0x600 [ 2758.850830] ? wait_for_completion_io+0x270/0x270 [ 2758.851839] ? kernfs_next_descendant_post+0x1a7/0x2a0 [ 2758.852957] kernfs_new_node+0x93/0x120 [ 2758.853796] __kernfs_create_file+0x51/0x350 [ 2758.854724] sysfs_add_file_mode_ns+0x221/0x560 [ 2758.855711] internal_create_group+0x324/0xb30 [ 2758.856674] ? sysfs_remove_group+0x170/0x170 [ 2758.857628] ? lockdep_init_map_type+0x2c7/0x780 [ 2758.858623] ? blk_queue_flag_set+0x22/0x30 [ 2758.859522] ? __loop_update_dio+0x2d2/0x690 [ 2758.860448] loop_configure+0x954/0x1480 [ 2758.861329] lo_ioctl+0xa72/0x1760 [ 2758.862090] ? avc_has_extended_perms+0x7f1/0xec0 [ 2758.863101] ? loop_set_status_old+0x250/0x250 [ 2758.864060] ? avc_ss_reset+0x180/0x180 [ 2758.864908] ? find_held_lock+0x2c/0x110 [ 2758.865771] ? __lock_acquire+0xbb1/0x5b00 [ 2758.866711] ? selinux_inode_getsecctx+0x90/0x90 [ 2758.867705] ? generic_block_fiemap+0x60/0x60 [ 2758.868654] ? loop_set_status_old+0x250/0x250 [ 2758.869644] blkdev_ioctl+0x291/0x710 [ 2758.870442] ? blkdev_common_ioctl+0x1870/0x1870 [ 2758.871437] ? selinux_file_ioctl+0xb1/0x260 [ 2758.872365] block_ioctl+0xf9/0x140 [ 2758.873131] ? blkdev_read_iter+0x1c0/0x1c0 [ 2758.874035] __x64_sys_ioctl+0x19a/0x210 [ 2758.874894] do_syscall_64+0x33/0x40 [ 2758.875677] entry_SYSCALL_64_after_hwframe+0x61/0xc6 [ 2758.876756] RIP: 0033:0x7fca424058d7 [ 2758.877542] Code: 3c 1c 48 f7 d8 49 39 c4 72 b8 e8 a4 54 02 00 85 c0 78 bd 48 83 c4 08 4c 89 e0 5b 41 5c c3 0f 1f 44 00 00 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2758.881398] RSP: 002b:00007fca3f97af48 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 2758.883017] RAX: ffffffffffffffda RBX: 00007fca4244f970 RCX: 00007fca424058d7 [ 2758.884507] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 2758.886006] RBP: 0000000000000005 R08: 0000000000000000 R09: ffffffffffffffff [ 2758.887495] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000004 [ 2758.888996] R13: 0000000000000004 R14: 00000000200004a0 R15: 0000000000000004 [ 2758.890744] hpet: Lost 2 RTC interrupts [ 2758.895187] EXT4-fs (loop2): get root inode failed [ 2758.896385] EXT4-fs (loop2): mount failed [ 2758.975309] FAULT_INJECTION: forcing a failure. [ 2758.975309] name failslab, interval 1, probability 0, space 0, times 0 [ 2758.977778] CPU: 0 PID: 13722 Comm: syz-executor.5 Not tainted 5.10.163 #1 [ 2758.979233] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2758.980993] Call Trace: [ 2758.981568] dump_stack+0x107/0x167 [ 2758.982350] should_fail.cold+0x5/0xa [ 2758.983146] ? __kernfs_new_node+0xd4/0x850 [ 2758.984062] should_failslab+0x5/0x20 [ 2758.984886] kmem_cache_alloc+0x5b/0x360 [ 2758.985734] __kernfs_new_node+0xd4/0x850 [ 2758.986620] ? kernfs_dop_revalidate+0x3a0/0x3a0 [ 2758.987613] ? __mutex_unlock_slowpath+0xe1/0x600 [ 2758.988646] ? wait_for_completion_io+0x270/0x270 [ 2758.989673] ? kernfs_next_descendant_post+0x1a7/0x2a0 [ 2758.990805] kernfs_new_node+0x93/0x120 [ 2758.991659] __kernfs_create_file+0x51/0x350 [ 2758.992598] sysfs_add_file_mode_ns+0x221/0x560 [ 2758.993697] internal_create_group+0x324/0xb30 [ 2758.994666] ? sysfs_remove_group+0x170/0x170 [ 2758.995589] ? lockdep_init_map_type+0x2c7/0x780 [ 2758.996583] ? blk_queue_flag_set+0x22/0x30 [ 2758.997475] ? __loop_update_dio+0x2d2/0x690 [ 2758.998404] loop_configure+0x954/0x1480 [ 2758.999255] lo_ioctl+0xa72/0x1760 [ 2759.000001] ? avc_has_extended_perms+0x7f1/0xec0 [ 2759.001004] ? loop_set_status_old+0x250/0x250 [ 2759.001966] ? avc_ss_reset+0x180/0x180 [ 2759.002802] ? __lock_acquire+0xbb1/0x5b00 [ 2759.003750] ? selinux_inode_getsecctx+0x90/0x90 [ 2759.004728] ? generic_block_fiemap+0x60/0x60 [ 2759.005685] ? vvar_fault+0x3d0/0x740 [ 2759.006465] ? __switch_to_asm+0x34/0x60 [ 2759.007331] ? loop_set_status_old+0x250/0x250 [ 2759.008294] blkdev_ioctl+0x291/0x710 [ 2759.009107] ? blkdev_common_ioctl+0x1870/0x1870 [ 2759.010120] ? selinux_file_ioctl+0xb1/0x260 [ 2759.011049] block_ioctl+0xf9/0x140 [ 2759.011812] ? blkdev_read_iter+0x1c0/0x1c0 [ 2759.012717] __x64_sys_ioctl+0x19a/0x210 [ 2759.013583] do_syscall_64+0x33/0x40 [ 2759.014369] entry_SYSCALL_64_after_hwframe+0x61/0xc6 [ 2759.015444] RIP: 0033:0x7f8cf18208d7 [ 2759.016229] Code: 3c 1c 48 f7 d8 49 39 c4 72 b8 e8 a4 54 02 00 85 c0 78 bd 48 83 c4 08 4c 89 e0 5b 41 5c c3 0f 1f 44 00 00 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2759.020090] RSP: 002b:00007f8ceed95f48 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 2759.021692] RAX: ffffffffffffffda RBX: 00007f8cf186a970 RCX: 00007f8cf18208d7 [ 2759.023187] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 2759.024679] RBP: 0000000000000005 R08: 0000000000000000 R09: ffffffffffffffff [ 2759.026211] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000004 [ 2759.027730] R13: 0000000000000004 R14: 00000000200004a0 R15: 0000000000000004 [ 2759.029450] hpet: Lost 2 RTC interrupts [ 2759.062424] EXT4-fs (loop4): ext4_check_descriptors: Inode table for group 0 overlaps superblock [ 2759.064593] EXT4-fs (loop4): group descriptors corrupted! [ 2759.068006] EXT4-fs (loop5): mounted filesystem without journal. Opts: ,errors=continue [ 2759.081917] EXT4-fs (loop7): mounted filesystem without journal. Opts: ,errors=continue 12:48:46 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000180)) (fail_nth: 13) 12:48:46 executing program 3: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_init_net_socket$802154_raw(0x24, 0x3, 0x0) sendmmsg$inet6(r0, &(0x7f0000004d00)=[{{0x0, 0x0, &(0x7f00000004c0)}}], 0x1, 0x40000) 12:48:46 executing program 4: ioctl$RTC_UIE_ON(0xffffffffffffffff, 0x7003) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x2}, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0xfffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = dup2(0xffffffffffffffff, r0) perf_event_open(&(0x7f00000001c0)={0x2, 0x80, 0x8, 0x9, 0x4, 0x1, 0x0, 0x3b3d, 0x200a0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x2, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0xffff, 0x1, @perf_config_ext={0x7, 0x1}, 0x281, 0xffffffff, 0x4, 0x3, 0x401, 0xffffff47, 0x401, 0x0, 0x3, 0x0, 0x415}, 0x0, 0xffffffffffffffff, r0, 0x1) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="0200000003000000", 0x8, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000180)) pkey_mprotect(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x0, 0xffffffffffffffff) pkey_mprotect(&(0x7f0000ff4000/0x4000)=nil, 0x4000, 0x0, 0xffffffffffffffff) socket$inet_udp(0x2, 0x2, 0x0) getsockopt$inet_int(0xffffffffffffffff, 0x0, 0xe, 0x0, &(0x7f0000000280)) ioctl$sock_SIOCADDDLCI(0xffffffffffffffff, 0x8980, 0x0) ioctl$RTC_ALM_SET(r1, 0x40247007, 0x0) mmap$IORING_OFF_SQES(&(0x7f0000ff3000/0x2000)=nil, 0x2000, 0x2000002, 0x10, r1, 0x10000000) getsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, 0x0, 0x0) 12:48:46 executing program 7: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000180)) (fail_nth: 38) 12:48:46 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f0000000000000000010000", 0x4f, 0x400}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000180)) 12:48:46 executing program 0: r0 = creat(&(0x7f0000000040)='./file0\x00', 0x0) r1 = creat(&(0x7f0000000040)='./file0\x00', 0x0) fallocate(r1, 0x0, 0x0, 0x8800000) r2 = syz_init_net_socket$802154_raw(0x24, 0x3, 0x0) bind$802154_raw(r2, &(0x7f0000000000)={0x24, @long={0x3, 0x2, {0xaaaaaaaaaaaa0002}}}, 0x14) bind$802154_raw(r2, &(0x7f0000000040)={0x24, @short={0x2, 0x2367f916dda8ac21, 0xaaa0}}, 0x14) sendmmsg$inet6(r2, &(0x7f0000004d00)=[{{0x0, 0x0, &(0x7f00000004c0)=[{&(0x7f0000000080)='K', 0x4c}], 0x1}}], 0x7ffff000, 0x0) r3 = syz_mount_image$vfat(&(0x7f0000000400), &(0x7f0000000440)='./file0\x00', 0x3, 0x5, &(0x7f00000007c0)=[{&(0x7f0000000480)="944e83ebdd3049b5ab082d685d8a6c6ab96111578e5678dd8bc7", 0x1a, 0xfd0}, {&(0x7f0000000500)="36eed64166cc9f87764c021a1986c663ae43e147a7cf07174b89f507b0b00a9a9bd262746ce8bad39fc0c49b1a99864b7c6ddb0cccc9bd74936e46e9cec56897b7e91a7387bd6cdd5150b80bd3f5bcba7417b0d8b3544ab7ae45e298a0e1ca1e90bddbc6ca8ac5189cf2717dee5d3c26e94699aa0f18ed1e28df", 0x7a, 0x7d6c}, {&(0x7f0000000580)="56495cbb3c689b2ed132177f9f31717dd0ee4839431c116946d1a33eaa98a72f75eb6cf5caa631e766bd248370ae4ebea4463f0aa6f876d2c8d179d8a8888714645a6e5fa7683e95f6f519a925d1068ddd87354f15c29a0a44f120ff6c79bc9bdeef1a0c143ec1a8d7a66b", 0x6b, 0xffff}, {&(0x7f0000000600)="946b06db2aa85bac2ab2fcfa893db100238d91f63712ad1a74543945abd987ec527d7a59236033de6053b75e34e6fc50df996de394a0251e14299f0f5339e4235a36ea7528ae494c9b79330c9e9aab21ef82800691bc73aedcce9c5ae20c83c6a2d987122f8368c5682b6025f1057da86c26515941147fb51a7f955ebbfa912d69dd737cf5533d5e8d4d984c20007a6bab3b4b9df7387b87ed4bca46f95d82da003843368fdcb535d5eb4ff61f115a", 0xaf, 0x3fe2}, {&(0x7f00000006c0)="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", 0xfc, 0x6}], 0xc0000, &(0x7f0000000840)={[{@nonumtail}], [{@subj_type}, {@dont_appraise}, {@rootcontext={'rootcontext', 0x3d, 'root'}}, {@obj_role={'obj_role', 0x3d, '#'}}]}) openat(r3, &(0x7f00000008c0)='./file0\x00', 0xe0502, 0x88) pwritev(r2, &(0x7f0000000380)=[{&(0x7f0000000080)="838106b7061e85540f4615a7e57f6dbccbe8b0af073b465990bd27379c21c5207f220194cfcfb7c53b1ce1a8770b12de2e71fd101a2e8584d6a607ed15c53c54ca92810c601caf433a3749799377be7f6fd6deee87d0850a5644b63ee3bf1c814ab82c273419c990b8bf081f97d7539420b9d89957", 0x75}, {&(0x7f0000000100)="4149fa681dcaeaaa2e23e22ff4afce2f978744856ca367c5ca1c63abe1f966729a931d4ab86f2fc026ea4f4a183ac6d71a215a699493816736c5146dd923d84c44884aa9451aa078681d923bf700155e268d8122f8b2534a555959eae9019e812197c9df999ac10eacd03a731b6aa0f1475dfead23119190007ec6b3668339f187a5a0772835991f5089454c1b53555af47debdabe76e91b70e26691a35a10149227c252b959b30a4b0b68b08186b2eb865046696ce9458956a40d08740b66774e3ec512ea9535d5f1ea9181ed2d59", 0xcf}, {&(0x7f0000000200)="e89f05bfdf58714b974637e09a70704649549c5c831cfe76da506317141519824b9f3e656304450ce764db30783f0ad96c7ab20fd6178c16f539941078dce4ef1a8479563d9ae650294fbb7626da0e14c3011e0c5700d1d1", 0x58}, {&(0x7f0000000280)="13391dc3f70a1624e582e65a4f17e85088ce075b8eac0af413af4d3eb132f1bee06fc1a032b4978ac2ba97f16fcc14cdeb02fe06f60038a407fea111e78d4c835c2ad5796d30aa44c796818d07387e44fbda9b600a821d564b1d85", 0x5b}, {&(0x7f0000000300)="bebf539d42d3e778c0265222a88560fb70689036afa4c74ee657c5c293c53df51e2afca9b213c9ea99035ca978214721fefa3c8ad519d17b20dfeccf6f8186dc99d778be2b03c782630e10256126a8af53db8c713f38a8b23765a33463d978029e65bd35a9b686ee2ed30918", 0x6c}], 0x5, 0x53, 0x6e) fallocate(r1, 0x3, 0x0, 0x8000) fallocate(r0, 0x0, 0x0, 0x8800000) 12:48:46 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000180)) (fail_nth: 37) 12:48:46 executing program 6: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000180)) (fail_nth: 24) [ 2773.851408] FAULT_INJECTION: forcing a failure. [ 2773.851408] name failslab, interval 1, probability 0, space 0, times 0 [ 2773.854105] CPU: 1 PID: 13750 Comm: syz-executor.1 Not tainted 5.10.163 #1 [ 2773.855520] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2773.857232] Call Trace: [ 2773.857776] dump_stack+0x107/0x167 [ 2773.858526] should_fail.cold+0x5/0xa [ 2773.859306] ? create_object.isra.0+0x3a/0xa20 [ 2773.860241] should_failslab+0x5/0x20 [ 2773.861030] kmem_cache_alloc+0x5b/0x360 [ 2773.861867] ? percpu_ref_put_many.constprop.0+0x4e/0x100 [ 2773.862991] create_object.isra.0+0x3a/0xa20 [ 2773.863887] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 2773.864961] kmem_cache_alloc+0x159/0x360 [ 2773.865829] security_file_alloc+0x34/0x170 [ 2773.866704] __alloc_file+0xb6/0x320 [ 2773.867462] alloc_empty_file+0x6d/0x170 [ 2773.868292] alloc_file+0x59/0x5a0 [ 2773.869031] alloc_file_pseudo+0x16a/0x250 [ 2773.869896] ? alloc_file+0x5a0/0x5a0 [ 2773.870676] ? shmem_get_inode+0x55c/0xbc0 [ 2773.871544] __shmem_file_setup+0x144/0x320 [ 2773.872420] ? _copy_from_user+0xfb/0x1b0 [ 2773.873268] __do_sys_memfd_create+0x275/0x450 [ 2773.874199] ? memfd_file_seals_ptr+0x170/0x170 [ 2773.875150] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 2773.876212] ? syscall_enter_from_user_mode+0x1d/0x50 [ 2773.877273] do_syscall_64+0x33/0x40 [ 2773.878032] entry_SYSCALL_64_after_hwframe+0x61/0xc6 [ 2773.879049] RIP: 0033:0x7f26b1c90b19 [ 2773.879803] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2773.883587] RSP: 002b:00007f26af205f48 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 2773.885150] RAX: ffffffffffffffda RBX: 0000000020000440 RCX: 00007f26b1c90b19 [ 2773.886594] RDX: 0000000000004200 RSI: 0000000000000000 RDI: 00007f26b1cea0fb [ 2773.888040] RBP: 0000000000000004 R08: 0000000000002100 R09: ffffffffffffffff [ 2773.889488] R10: 0000000000000004 R11: 0000000000000246 R12: 0000000008100000 [ 2773.890938] R13: 0000000020000100 R14: 0000000000fffff0 R15: 0000000020000180 [ 2773.907263] FAULT_INJECTION: forcing a failure. [ 2773.907263] name failslab, interval 1, probability 0, space 0, times 0 [ 2773.908626] CPU: 0 PID: 13757 Comm: syz-executor.6 Not tainted 5.10.163 #1 [ 2773.909440] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2773.910406] Call Trace: [ 2773.910728] dump_stack+0x107/0x167 [ 2773.911163] should_fail.cold+0x5/0xa [ 2773.911619] ? __alloc_file+0x21/0x320 [ 2773.912077] should_failslab+0x5/0x20 [ 2773.912499] kmem_cache_alloc+0x5b/0x360 [ 2773.912995] __alloc_file+0x21/0x320 [ 2773.913440] alloc_empty_file+0x6d/0x170 [ 2773.913912] path_openat+0xde/0x26d0 [ 2773.914368] ? path_lookupat+0x860/0x860 [ 2773.914867] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 2773.915505] ? lock_acquire+0x197/0x490 [ 2773.916000] do_filp_open+0x190/0x3e0 [ 2773.916463] ? may_open_dev+0xf0/0xf0 [ 2773.916936] ? __alloc_fd+0x2a5/0x620 [ 2773.917403] ? lock_downgrade+0x6d0/0x6d0 [ 2773.917912] ? rwlock_bug.part.0+0x90/0x90 [ 2773.918444] ? _raw_spin_unlock+0x1a/0x30 [ 2773.918943] ? __alloc_fd+0x2a5/0x620 [ 2773.919424] do_sys_openat2+0x171/0x420 [ 2773.919907] ? build_open_flags+0x6f0/0x6f0 [ 2773.920437] ? rcu_read_lock_any_held+0x75/0xa0 [ 2773.921013] __x64_sys_openat+0x13f/0x1f0 [ 2773.921505] ? __ia32_sys_open+0x1c0/0x1c0 [ 2773.922029] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 2773.922666] ? syscall_enter_from_user_mode+0x1d/0x50 [ 2773.923295] do_syscall_64+0x33/0x40 [ 2773.923749] entry_SYSCALL_64_after_hwframe+0x61/0xc6 [ 2773.924370] RIP: 0033:0x7f290af1ca04 [ 2773.924826] Code: 84 00 00 00 00 00 44 89 54 24 0c e8 96 f9 ff ff 44 8b 54 24 0c 44 89 e2 48 89 ee 41 89 c0 bf 9c ff ff ff b8 01 01 00 00 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 89 44 24 0c e8 c8 f9 ff ff 8b 44 [ 2773.927068] RSP: 002b:00007f29084deed0 EFLAGS: 00000293 ORIG_RAX: 0000000000000101 [ 2773.927988] RAX: ffffffffffffffda RBX: 00007f290afb3970 RCX: 00007f290af1ca04 [ 2773.928844] RDX: 0000000000000002 RSI: 00007f29084df000 RDI: 00000000ffffff9c [ 2773.929712] RBP: 00007f29084df000 R08: 0000000000000000 R09: ffffffffffffffff [ 2773.930575] R10: 0000000000000000 R11: 0000000000000293 R12: 0000000000000002 [ 2773.931436] R13: 0000000000000004 R14: 00000000200004a0 R15: 0000000000000004 [ 2773.932364] hpet: Lost 1 RTC interrupts [ 2773.935193] FAULT_INJECTION: forcing a failure. [ 2773.935193] name failslab, interval 1, probability 0, space 0, times 0 [ 2773.936556] CPU: 0 PID: 13752 Comm: syz-executor.7 Not tainted 5.10.163 #1 [ 2773.937400] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2773.938404] Call Trace: [ 2773.938733] dump_stack+0x107/0x167 [ 2773.939190] should_fail.cold+0x5/0xa [ 2773.939627] ? __kernfs_new_node+0xd4/0x850 [ 2773.940125] should_failslab+0x5/0x20 [ 2773.940575] kmem_cache_alloc+0x5b/0x360 [ 2773.941075] __kernfs_new_node+0xd4/0x850 [ 2773.941588] ? kernfs_dop_revalidate+0x3a0/0x3a0 [ 2773.942164] ? __mutex_unlock_slowpath+0xe1/0x600 [ 2773.942749] ? wait_for_completion_io+0x270/0x270 [ 2773.943361] ? kernfs_next_descendant_post+0x1a7/0x2a0 [ 2773.944005] kernfs_new_node+0x93/0x120 [ 2773.944489] __kernfs_create_file+0x51/0x350 [ 2773.945035] sysfs_add_file_mode_ns+0x221/0x560 [ 2773.945603] internal_create_group+0x324/0xb30 [ 2773.946163] ? sysfs_remove_group+0x170/0x170 [ 2773.946709] ? blk_queue_flag_set+0x22/0x30 [ 2773.947227] ? __loop_update_dio+0x2d2/0x690 [ 2773.947755] loop_configure+0x954/0x1480 [ 2773.948248] lo_ioctl+0xa72/0x1760 [ 2773.948683] ? avc_has_extended_perms+0x7f1/0xec0 [ 2773.949263] ? loop_set_status_old+0x250/0x250 [ 2773.949829] ? avc_ss_reset+0x180/0x180 [ 2773.950305] ? find_held_lock+0x2c/0x110 [ 2773.950803] ? __lock_acquire+0xbb1/0x5b00 [ 2773.951338] ? selinux_inode_getsecctx+0x90/0x90 [ 2773.951908] ? generic_block_fiemap+0x60/0x60 [ 2773.952461] ? loop_set_status_old+0x250/0x250 [ 2773.953018] blkdev_ioctl+0x291/0x710 [ 2773.953472] ? blkdev_common_ioctl+0x1870/0x1870 [ 2773.954047] ? selinux_file_ioctl+0xb1/0x260 [ 2773.954580] block_ioctl+0xf9/0x140 [ 2773.955020] ? blkdev_read_iter+0x1c0/0x1c0 [ 2773.955534] __x64_sys_ioctl+0x19a/0x210 [ 2773.956030] do_syscall_64+0x33/0x40 [ 2773.956483] entry_SYSCALL_64_after_hwframe+0x61/0xc6 [ 2773.957109] RIP: 0033:0x7fca424058d7 [ 2773.957561] Code: 3c 1c 48 f7 d8 49 39 c4 72 b8 e8 a4 54 02 00 85 c0 78 bd 48 83 c4 08 4c 89 e0 5b 41 5c c3 0f 1f 44 00 00 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2773.959780] RSP: 002b:00007fca3f97af48 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 2773.960688] RAX: ffffffffffffffda RBX: 00007fca4244f970 RCX: 00007fca424058d7 [ 2773.961542] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 2773.962382] RBP: 0000000000000005 R08: 0000000000000000 R09: ffffffffffffffff [ 2773.963232] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000004 [ 2773.964096] R13: 0000000000000004 R14: 00000000200004a0 R15: 0000000000000004 [ 2773.965036] hpet: Lost 1 RTC interrupts 12:48:46 executing program 3: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_init_net_socket$802154_raw(0x24, 0x3, 0x0) sendmmsg$inet6(r0, &(0x7f0000004d00)=[{{0x0, 0x0, &(0x7f00000004c0)}}], 0x1, 0x7f000000) [ 2773.986964] FAULT_INJECTION: forcing a failure. [ 2773.986964] name failslab, interval 1, probability 0, space 0, times 0 [ 2773.988400] CPU: 0 PID: 13755 Comm: syz-executor.5 Not tainted 5.10.163 #1 [ 2773.989228] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2773.990217] Call Trace: [ 2773.990535] dump_stack+0x107/0x167 [ 2773.990968] should_fail.cold+0x5/0xa [ 2773.991412] ? create_object.isra.0+0x3a/0xa20 [ 2773.991951] should_failslab+0x5/0x20 [ 2773.992399] kmem_cache_alloc+0x5b/0x360 [ 2773.992884] create_object.isra.0+0x3a/0xa20 [ 2773.993406] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 2773.994007] kmem_cache_alloc+0x159/0x360 [ 2773.994505] __kernfs_new_node+0xd4/0x850 [ 2773.995002] ? kernfs_dop_revalidate+0x3a0/0x3a0 [ 2773.995556] ? __mutex_unlock_slowpath+0xe1/0x600 [ 2773.996132] ? wait_for_completion_io+0x270/0x270 [ 2773.996645] ? kernfs_next_descendant_post+0x1a7/0x2a0 [ 2773.997278] kernfs_new_node+0x93/0x120 [ 2773.997704] __kernfs_create_file+0x51/0x350 [ 2773.998226] sysfs_add_file_mode_ns+0x221/0x560 [ 2773.998777] internal_create_group+0x324/0xb30 [ 2773.999312] ? sysfs_remove_group+0x170/0x170 [ 2773.999793] ? lockdep_init_map_type+0x2c7/0x780 [ 2774.000356] ? blk_queue_flag_set+0x22/0x30 [ 2774.000867] ? __loop_update_dio+0x2d2/0x690 [ 2774.001400] loop_configure+0x954/0x1480 [ 2774.001889] lo_ioctl+0xa72/0x1760 [ 2774.002310] ? avc_has_extended_perms+0x7f1/0xec0 [ 2774.002881] ? loop_set_status_old+0x250/0x250 [ 2774.003409] ? avc_ss_reset+0x180/0x180 [ 2774.003883] ? find_held_lock+0x2c/0x110 [ 2774.004373] ? __lock_acquire+0xbb1/0x5b00 [ 2774.004896] ? selinux_inode_getsecctx+0x90/0x90 [ 2774.005458] ? generic_block_fiemap+0x60/0x60 [ 2774.005991] ? loop_set_status_old+0x250/0x250 [ 2774.006516] blkdev_ioctl+0x291/0x710 [ 2774.006952] ? blkdev_common_ioctl+0x1870/0x1870 [ 2774.007499] ? selinux_file_ioctl+0xb1/0x260 [ 2774.008028] block_ioctl+0xf9/0x140 [ 2774.008453] ? blkdev_read_iter+0x1c0/0x1c0 [ 2774.008964] __x64_sys_ioctl+0x19a/0x210 [ 2774.009462] do_syscall_64+0x33/0x40 [ 2774.009885] entry_SYSCALL_64_after_hwframe+0x61/0xc6 [ 2774.010462] RIP: 0033:0x7f8cf18208d7 [ 2774.010885] Code: 3c 1c 48 f7 d8 49 39 c4 72 b8 e8 a4 54 02 00 85 c0 78 bd 48 83 c4 08 4c 89 e0 5b 41 5c c3 0f 1f 44 00 00 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2774.012966] RSP: 002b:00007f8ceed95f48 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 2774.013826] RAX: ffffffffffffffda RBX: 00007f8cf186a970 RCX: 00007f8cf18208d7 [ 2774.014636] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 2774.015432] RBP: 0000000000000005 R08: 0000000000000000 R09: ffffffffffffffff [ 2774.016230] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000004 [ 2774.017037] R13: 0000000000000004 R14: 00000000200004a0 R15: 0000000000000004 [ 2774.017960] hpet: Lost 1 RTC interrupts 12:48:46 executing program 6: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000180)) (fail_nth: 25) [ 2774.023075] ieee802154 phy0 wpan0: encryption failed: -22 [ 2774.058088] EXT4-fs (loop2): invalid first ino: 0 [ 2774.102263] EXT4-fs (loop7): mounted filesystem without journal. Opts: ,errors=continue [ 2774.102597] EXT4-fs (loop1): mounted filesystem without journal. Opts: ,errors=continue [ 2774.115486] EXT4-fs (loop5): mounted filesystem without journal. Opts: ,errors=continue [ 2774.157388] EXT4-fs (loop4): ext4_check_descriptors: Inode table for group 0 overlaps superblock 12:48:46 executing program 7: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000180)) (fail_nth: 39) [ 2774.159393] EXT4-fs (loop4): group descriptors corrupted! [ 2774.183591] ieee802154 phy0 wpan0: encryption failed: -22 [ 2774.203217] FAULT_INJECTION: forcing a failure. [ 2774.203217] name failslab, interval 1, probability 0, space 0, times 0 12:48:46 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f0000000000000000010000", 0x4f, 0x400}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000180)) [ 2774.205533] CPU: 1 PID: 13777 Comm: syz-executor.6 Not tainted 5.10.163 #1 [ 2774.206981] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2774.208788] Call Trace: [ 2774.209362] dump_stack+0x107/0x167 [ 2774.210109] should_fail.cold+0x5/0xa [ 2774.210888] ? create_object.isra.0+0x3a/0xa20 [ 2774.211817] should_failslab+0x5/0x20 [ 2774.212591] kmem_cache_alloc+0x5b/0x360 [ 2774.213430] create_object.isra.0+0x3a/0xa20 [ 2774.214327] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 2774.215362] kmem_cache_alloc+0x159/0x360 [ 2774.216214] __alloc_file+0x21/0x320 [ 2774.216977] alloc_empty_file+0x6d/0x170 [ 2774.217818] path_openat+0xde/0x26d0 [ 2774.218592] ? path_lookupat+0x860/0x860 [ 2774.219425] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 2774.220489] ? lock_acquire+0x197/0x490 [ 2774.221327] do_filp_open+0x190/0x3e0 [ 2774.222100] ? may_open_dev+0xf0/0xf0 [ 2774.222880] ? __alloc_fd+0x2a5/0x620 [ 2774.223655] ? lock_downgrade+0x6d0/0x6d0 [ 2774.224567] ? rwlock_bug.part.0+0x90/0x90 [ 2774.225446] ? _raw_spin_unlock+0x1a/0x30 [ 2774.226287] ? __alloc_fd+0x2a5/0x620 [ 2774.227073] do_sys_openat2+0x171/0x420 [ 2774.227884] ? build_open_flags+0x6f0/0x6f0 [ 2774.228769] ? rcu_read_lock_any_held+0x75/0xa0 [ 2774.229734] __x64_sys_openat+0x13f/0x1f0 [ 2774.230578] ? __ia32_sys_open+0x1c0/0x1c0 [ 2774.231449] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 2774.232518] ? syscall_enter_from_user_mode+0x1d/0x50 [ 2774.233592] do_syscall_64+0x33/0x40 [ 2774.234352] entry_SYSCALL_64_after_hwframe+0x61/0xc6 [ 2774.235394] RIP: 0033:0x7f290af1ca04 [ 2774.236157] Code: 84 00 00 00 00 00 44 89 54 24 0c e8 96 f9 ff ff 44 8b 54 24 0c 44 89 e2 48 89 ee 41 89 c0 bf 9c ff ff ff b8 01 01 00 00 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 89 44 24 0c e8 c8 f9 ff ff 8b 44 [ 2774.240072] RSP: 002b:00007f29084deed0 EFLAGS: 00000293 ORIG_RAX: 0000000000000101 [ 2774.241635] RAX: ffffffffffffffda RBX: 00007f290afb3970 RCX: 00007f290af1ca04 [ 2774.243111] RDX: 0000000000000002 RSI: 00007f29084df000 RDI: 00000000ffffff9c [ 2774.244581] RBP: 00007f29084df000 R08: 0000000000000000 R09: ffffffffffffffff [ 2774.246058] R10: 0000000000000000 R11: 0000000000000293 R12: 0000000000000002 [ 2774.247495] R13: 0000000000000004 R14: 00000000200004a0 R15: 0000000000000004 12:48:47 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000180)) (fail_nth: 38) 12:48:47 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000180)) (fail_nth: 14) 12:48:47 executing program 4: ioctl$RTC_UIE_ON(0xffffffffffffffff, 0x7003) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x2}, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0xfffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = dup2(0xffffffffffffffff, r0) perf_event_open(&(0x7f00000001c0)={0x2, 0x80, 0x8, 0x9, 0x4, 0x1, 0x0, 0x3b3d, 0x200a0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x2, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0xffff, 0x1, @perf_config_ext={0x7, 0x1}, 0x281, 0xffffffff, 0x4, 0x3, 0x401, 0xffffff47, 0x401, 0x0, 0x3, 0x0, 0x415}, 0x0, 0xffffffffffffffff, r0, 0x1) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="0200000003000000", 0x8, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000180)) pkey_mprotect(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x0, 0xffffffffffffffff) pkey_mprotect(&(0x7f0000ff4000/0x4000)=nil, 0x4000, 0x0, 0xffffffffffffffff) socket$inet_udp(0x2, 0x2, 0x0) getsockopt$inet_int(0xffffffffffffffff, 0x0, 0xe, 0x0, &(0x7f0000000280)) ioctl$sock_SIOCADDDLCI(0xffffffffffffffff, 0x8980, 0x0) ioctl$RTC_ALM_SET(r1, 0x40247007, 0x0) mmap$IORING_OFF_SQES(&(0x7f0000ff3000/0x2000)=nil, 0x2000, 0x2000002, 0x10, r1, 0x10000000) getsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, 0x0, 0x0) 12:48:47 executing program 3: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_init_net_socket$802154_raw(0x24, 0x3, 0x0) sendmmsg$inet6(r0, &(0x7f0000004d00)=[{{0x0, 0x0, &(0x7f00000004c0)}}], 0x1, 0xeffdffff) 12:48:47 executing program 0: r0 = creat(&(0x7f0000000040)='./file0\x00', 0x0) r1 = creat(&(0x7f0000000040)='./file0\x00', 0x0) fallocate(r1, 0x0, 0x0, 0x8800000) fallocate(r1, 0x3, 0x0, 0x8000) fallocate(r0, 0x0, 0x0, 0x8800000) ioctl$sock_ipv6_tunnel_SIOCGET6RD(0xffffffffffffffff, 0x89f8, &(0x7f0000000000)={'ip6tnl0\x00', &(0x7f0000000080)={'ip6tnl0\x00', 0x0, 0x29, 0x9d, 0x0, 0x1000, 0x0, @remote, @private2={0xfc, 0x2, '\x00', 0x1}, 0x80, 0x7, 0x5, 0x8}}) setsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x22, &(0x7f0000000100)={{{@in=@multicast1, @in6=@loopback, 0x4e20, 0x7, 0x4e22, 0x153, 0x2, 0x20, 0xc0, 0xff, r2, 0xffffffffffffffff}, {0x7ff, 0x10001, 0x9, 0x5, 0x6, 0x8, 0x2, 0x684d}, {0x80000001, 0x8000, 0x8, 0xfff}, 0x80000000, 0x6e6bb6, 0x0, 0x0, 0x3, 0x3}, {{@in=@multicast1, 0x4d6, 0x2b}, 0xa, @in=@remote, 0x3500, 0x3, 0x0, 0x5, 0xfffffc00, 0x5, 0x9}}, 0xe8) [ 2774.341411] EXT4-fs (loop6): mounted filesystem without journal. Opts: ,errors=continue 12:48:47 executing program 6: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000180)) (fail_nth: 26) [ 2774.445519] FAULT_INJECTION: forcing a failure. [ 2774.445519] name failslab, interval 1, probability 0, space 0, times 0 [ 2774.448115] CPU: 0 PID: 13783 Comm: syz-executor.7 Not tainted 5.10.163 #1 [ 2774.449626] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2774.451354] Call Trace: [ 2774.451908] dump_stack+0x107/0x167 [ 2774.452702] should_fail.cold+0x5/0xa [ 2774.453509] ? create_object.isra.0+0x3a/0xa20 [ 2774.454455] should_failslab+0x5/0x20 [ 2774.455239] kmem_cache_alloc+0x5b/0x360 [ 2774.456095] create_object.isra.0+0x3a/0xa20 [ 2774.457051] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 2774.458105] kmem_cache_alloc+0x159/0x360 [ 2774.459014] __kernfs_new_node+0xd4/0x850 [ 2774.459889] ? kernfs_dop_revalidate+0x3a0/0x3a0 [ 2774.460894] ? __mutex_unlock_slowpath+0xe1/0x600 [ 2774.461910] ? wait_for_completion_io+0x270/0x270 [ 2774.462914] ? kernfs_next_descendant_post+0x1a7/0x2a0 [ 2774.464010] kernfs_new_node+0x93/0x120 [ 2774.464841] __kernfs_create_file+0x51/0x350 [ 2774.465780] sysfs_add_file_mode_ns+0x221/0x560 [ 2774.466753] internal_create_group+0x324/0xb30 [ 2774.467706] ? sysfs_remove_group+0x170/0x170 [ 2774.468638] ? lockdep_init_map_type+0x2c7/0x780 [ 2774.469631] ? blk_queue_flag_set+0x22/0x30 [ 2774.470525] ? __loop_update_dio+0x2d2/0x690 [ 2774.471438] loop_configure+0x954/0x1480 [ 2774.472290] lo_ioctl+0xa72/0x1760 [ 2774.473045] ? avc_has_extended_perms+0x7f1/0xec0 [ 2774.474044] ? loop_set_status_old+0x250/0x250 [ 2774.474989] ? avc_ss_reset+0x180/0x180 [ 2774.475817] ? find_held_lock+0x2c/0x110 [ 2774.476667] ? __lock_acquire+0xbb1/0x5b00 [ 2774.477611] ? selinux_inode_getsecctx+0x90/0x90 [ 2774.478599] ? generic_block_fiemap+0x60/0x60 [ 2774.479546] ? loop_set_status_old+0x250/0x250 [ 2774.480492] blkdev_ioctl+0x291/0x710 [ 2774.481295] ? blkdev_common_ioctl+0x1870/0x1870 [ 2774.482293] ? selinux_file_ioctl+0xb1/0x260 [ 2774.483212] block_ioctl+0xf9/0x140 [ 2774.483964] ? blkdev_read_iter+0x1c0/0x1c0 [ 2774.484859] __x64_sys_ioctl+0x19a/0x210 [ 2774.485713] do_syscall_64+0x33/0x40 [ 2774.486488] entry_SYSCALL_64_after_hwframe+0x61/0xc6 [ 2774.487547] RIP: 0033:0x7fca424058d7 [ 2774.488319] Code: 3c 1c 48 f7 d8 49 39 c4 72 b8 e8 a4 54 02 00 85 c0 78 bd 48 83 c4 08 4c 89 e0 5b 41 5c c3 0f 1f 44 00 00 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2774.492124] RSP: 002b:00007fca3f97af48 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 2774.493713] RAX: ffffffffffffffda RBX: 00007fca4244f970 RCX: 00007fca424058d7 [ 2774.495186] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 2774.496657] RBP: 0000000000000005 R08: 0000000000000000 R09: ffffffffffffffff [ 2774.498136] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000004 [ 2774.499609] R13: 0000000000000004 R14: 00000000200004a0 R15: 0000000000000004 [ 2774.501293] hpet: Lost 2 RTC interrupts [ 2774.586438] EXT4-fs (loop2): invalid first ino: 0 [ 2774.611368] EXT4-fs (loop7): mounted filesystem without journal. Opts: ,errors=continue [ 2774.616935] FAULT_INJECTION: forcing a failure. [ 2774.616935] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 2774.618287] CPU: 1 PID: 13797 Comm: syz-executor.1 Not tainted 5.10.163 #1 [ 2774.619040] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2774.619935] Call Trace: [ 2774.620239] dump_stack+0x107/0x167 [ 2774.620649] should_fail.cold+0x5/0xa [ 2774.621104] __alloc_pages_nodemask+0x182/0x680 [ 2774.621641] ? __alloc_pages_slowpath.constprop.0+0x2220/0x2220 [ 2774.622317] ? lock_downgrade+0x6d0/0x6d0 [ 2774.622800] alloc_pages_vma+0xbb/0x410 [ 2774.623254] shmem_alloc_page+0x10f/0x1e0 [ 2774.623729] ? shmem_init_inode+0x20/0x20 [ 2774.624218] ? percpu_counter_add_batch+0x8b/0x140 [ 2774.624784] ? __vm_enough_memory+0x184/0x360 [ 2774.625306] shmem_getpage_gfp.constprop.0+0x512/0x1920 [ 2774.625915] ? shmem_unuse_inode+0xed0/0xed0 [ 2774.626411] ? ktime_get_coarse_real_ts64+0x15a/0x190 [ 2774.627188] ? iov_iter_fault_in_readable+0x9a/0x410 [ 2774.627767] shmem_write_begin+0xf7/0x1d0 [ 2774.628236] generic_perform_write+0x20a/0x4f0 [ 2774.628758] ? trace_event_raw_event_file_check_and_advance_wb_err+0x4a0/0x4a0 [ 2774.629588] ? evict_inodes+0x420/0x420 [ 2774.630039] ? generic_write_checks+0x2ad/0x390 [ 2774.630642] __generic_file_write_iter+0x39d/0x5d0 [ 2774.631208] FAULT_INJECTION: forcing a failure. [ 2774.631208] name failslab, interval 1, probability 0, space 0, times 0 [ 2774.631218] generic_file_write_iter+0xdb/0x230 [ 2774.631238] ? iov_iter_init+0x3c/0x130 [ 2774.634503] new_sync_write+0x42c/0x660 [ 2774.634958] ? new_sync_read+0x6f0/0x6f0 [ 2774.635415] ? __x64_sys_pwrite64+0x201/0x260 [ 2774.635921] ? lock_release+0x6b0/0x6b0 [ 2774.636369] ? selinux_file_permission+0x36/0x510 [ 2774.636928] vfs_write+0x747/0xa30 [ 2774.637339] __x64_sys_pwrite64+0x201/0x260 [ 2774.637826] ? ksys_pwrite64+0x1b0/0x1b0 [ 2774.638277] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 2774.638872] ? syscall_enter_from_user_mode+0x1d/0x50 [ 2774.639446] do_syscall_64+0x33/0x40 [ 2774.639866] entry_SYSCALL_64_after_hwframe+0x61/0xc6 [ 2774.640452] RIP: 0033:0x7f26b1c43ab7 [ 2774.640878] Code: 08 89 3c 24 48 89 4c 24 18 e8 e5 f8 ff ff 4c 8b 54 24 18 48 8b 54 24 10 41 89 c0 48 8b 74 24 08 8b 3c 24 b8 12 00 00 00 0f 05 <48> 3d 00 f0 ff ff 77 31 44 89 c7 48 89 04 24 e8 15 f9 ff ff 48 8b [ 2774.642952] RSP: 002b:00007f26af205f20 EFLAGS: 00000293 ORIG_RAX: 0000000000000012 [ 2774.643815] RAX: ffffffffffffffda RBX: 00007f26b1cda970 RCX: 00007f26b1c43ab7 [ 2774.644609] RDX: 000000000000005a RSI: 0000000020000040 RDI: 0000000000000004 [ 2774.645426] RBP: 0000000000000004 R08: 0000000000000000 R09: ffffffffffffffff [ 2774.646289] R10: 0000000000000400 R11: 0000000000000293 R12: 0000000000000004 [ 2774.647083] R13: 0000000000000004 R14: 0000000020000440 R15: 0000000000000000 [ 2774.647907] CPU: 0 PID: 13796 Comm: syz-executor.5 Not tainted 5.10.163 #1 [ 2774.649356] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2774.651125] Call Trace: [ 2774.651740] dump_stack+0x107/0x167 [ 2774.652499] should_fail.cold+0x5/0xa [ 2774.653311] ? create_object.isra.0+0x3a/0xa20 [ 2774.654265] should_failslab+0x5/0x20 [ 2774.655065] kmem_cache_alloc+0x5b/0x360 [ 2774.655920] create_object.isra.0+0x3a/0xa20 [ 2774.656834] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 2774.657900] kmem_cache_alloc+0x159/0x360 [ 2774.658770] __kernfs_new_node+0xd4/0x850 [ 2774.659637] ? kernfs_dop_revalidate+0x3a0/0x3a0 [ 2774.660630] ? __mutex_unlock_slowpath+0xe1/0x600 [ 2774.661648] ? wait_for_completion_io+0x270/0x270 [ 2774.662652] ? kernfs_next_descendant_post+0x1a7/0x2a0 [ 2774.663750] kernfs_new_node+0x93/0x120 [ 2774.664585] __kernfs_create_file+0x51/0x350 [ 2774.665526] sysfs_add_file_mode_ns+0x221/0x560 [ 2774.666501] internal_create_group+0x324/0xb30 [ 2774.667458] ? sysfs_remove_group+0x170/0x170 [ 2774.668395] ? lockdep_init_map_type+0x2c7/0x780 [ 2774.669394] ? blk_queue_flag_set+0x22/0x30 [ 2774.670287] ? __loop_update_dio+0x2d2/0x690 [ 2774.671204] loop_configure+0x954/0x1480 [ 2774.672063] lo_ioctl+0xa72/0x1760 [ 2774.672808] ? avc_has_extended_perms+0x7f1/0xec0 [ 2774.673829] ? loop_set_status_old+0x250/0x250 [ 2774.674778] ? avc_ss_reset+0x180/0x180 [ 2774.675612] ? find_held_lock+0x2c/0x110 [ 2774.676464] ? __lock_acquire+0xbb1/0x5b00 [ 2774.677405] ? selinux_inode_getsecctx+0x90/0x90 [ 2774.678422] ? generic_block_fiemap+0x60/0x60 [ 2774.679405] ? loop_set_status_old+0x250/0x250 [ 2774.680348] blkdev_ioctl+0x291/0x710 [ 2774.681152] ? blkdev_common_ioctl+0x1870/0x1870 [ 2774.682150] ? selinux_file_ioctl+0xb1/0x260 [ 2774.683078] block_ioctl+0xf9/0x140 [ 2774.683836] ? blkdev_read_iter+0x1c0/0x1c0 [ 2774.684738] __x64_sys_ioctl+0x19a/0x210 [ 2774.685604] do_syscall_64+0x33/0x40 [ 2774.686387] entry_SYSCALL_64_after_hwframe+0x61/0xc6 [ 2774.687474] RIP: 0033:0x7f8cf18208d7 [ 2774.688253] Code: 3c 1c 48 f7 d8 49 39 c4 72 b8 e8 a4 54 02 00 85 c0 78 bd 48 83 c4 08 4c 89 e0 5b 41 5c c3 0f 1f 44 00 00 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2774.692141] RSP: 002b:00007f8ceed95f48 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 2774.693747] RAX: ffffffffffffffda RBX: 00007f8cf186a970 RCX: 00007f8cf18208d7 [ 2774.695239] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 2774.696726] RBP: 0000000000000005 R08: 0000000000000000 R09: ffffffffffffffff [ 2774.698224] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000004 [ 2774.699707] R13: 0000000000000004 R14: 00000000200004a0 R15: 0000000000000004 [ 2774.701436] hpet: Lost 2 RTC interrupts 12:48:47 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f0000000000000000010000", 0x4f, 0x400}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000180)) [ 2774.754723] EXT4-fs (loop1): VFS: Can't find ext4 filesystem [ 2774.769482] EXT4-fs (loop5): mounted filesystem without journal. Opts: ,errors=continue [ 2774.794965] FAULT_INJECTION: forcing a failure. [ 2774.794965] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 2774.797470] CPU: 0 PID: 13809 Comm: syz-executor.6 Not tainted 5.10.163 #1 [ 2774.798920] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2774.800697] Call Trace: [ 2774.801331] dump_stack+0x107/0x167 [ 2774.802107] should_fail.cold+0x5/0xa [ 2774.802959] strncpy_from_user+0x34/0x470 [ 2774.803841] getname_flags.part.0+0x95/0x4f0 [ 2774.804783] getname+0x8e/0xd0 [ 2774.805480] do_sys_openat2+0xf9/0x420 [ 2774.806330] ? build_open_flags+0x6f0/0x6f0 [ 2774.807251] ? rcu_read_lock_any_held+0x75/0xa0 [ 2774.808219] __x64_sys_openat+0x13f/0x1f0 [ 2774.809095] ? __ia32_sys_open+0x1c0/0x1c0 [ 2774.809985] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 2774.811098] ? syscall_enter_from_user_mode+0x1d/0x50 [ 2774.812188] do_syscall_64+0x33/0x40 [ 2774.812976] entry_SYSCALL_64_after_hwframe+0x61/0xc6 [ 2774.814084] RIP: 0033:0x7f290af1ca04 [ 2774.814869] Code: 84 00 00 00 00 00 44 89 54 24 0c e8 96 f9 ff ff 44 8b 54 24 0c 44 89 e2 48 89 ee 41 89 c0 bf 9c ff ff ff b8 01 01 00 00 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 89 44 24 0c e8 c8 f9 ff ff 8b 44 [ 2774.818744] RSP: 002b:00007f29084deed0 EFLAGS: 00000293 ORIG_RAX: 0000000000000101 [ 2774.820352] RAX: ffffffffffffffda RBX: 00007f290afb3970 RCX: 00007f290af1ca04 [ 2774.821879] RDX: 0000000000000002 RSI: 00007f29084df000 RDI: 00000000ffffff9c [ 2774.823378] RBP: 00007f29084df000 R08: 0000000000000000 R09: ffffffffffffffff [ 2774.824870] R10: 0000000000000000 R11: 0000000000000293 R12: 0000000000000002 [ 2774.826381] R13: 0000000000000004 R14: 00000000200004a0 R15: 0000000000000004 [ 2774.828035] hpet: Lost 1 RTC interrupts [ 2774.830039] EXT4-fs (loop4): ext4_check_descriptors: Inode table for group 0 overlaps superblock [ 2774.832170] EXT4-fs (loop4): group descriptors corrupted! 12:48:47 executing program 7: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000180)) (fail_nth: 40) 12:48:47 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000180)) (fail_nth: 15) 12:48:47 executing program 3: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_init_net_socket$802154_raw(0x24, 0x3, 0x0) sendmmsg$inet6(r0, &(0x7f0000004d00)=[{{0x0, 0x0, &(0x7f00000004c0)}}], 0x1, 0xfffffdef) [ 2775.018517] EXT4-fs (loop2): invalid first ino: 0 [ 2775.088652] FAULT_INJECTION: forcing a failure. [ 2775.088652] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 2775.091233] CPU: 1 PID: 13819 Comm: syz-executor.1 Not tainted 5.10.163 #1 [ 2775.092668] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2775.094397] Call Trace: [ 2775.094957] dump_stack+0x107/0x167 [ 2775.095736] should_fail.cold+0x5/0xa [ 2775.096549] iov_iter_copy_from_user_atomic+0x49b/0xdb0 [ 2775.097684] ? shmem_write_begin+0xf7/0x1d0 [ 2775.098586] ? shmem_write_begin+0x100/0x1d0 [ 2775.099620] generic_perform_write+0x279/0x4f0 [ 2775.100576] ? trace_event_raw_event_file_check_and_advance_wb_err+0x4a0/0x4a0 [ 2775.102093] ? evict_inodes+0x420/0x420 [ 2775.102924] ? generic_write_checks+0x2ad/0x390 [ 2775.103919] __generic_file_write_iter+0x39d/0x5d0 [ 2775.104946] generic_file_write_iter+0xdb/0x230 [ 2775.105953] ? iov_iter_init+0x3c/0x130 [ 2775.106778] new_sync_write+0x42c/0x660 [ 2775.107630] ? new_sync_read+0x6f0/0x6f0 [ 2775.108470] ? __x64_sys_pwrite64+0x201/0x260 [ 2775.109433] ? lock_release+0x6b0/0x6b0 [ 2775.110253] ? selinux_file_permission+0x36/0x510 [ 2775.111293] vfs_write+0x747/0xa30 [ 2775.112040] __x64_sys_pwrite64+0x201/0x260 [ 2775.112938] ? ksys_pwrite64+0x1b0/0x1b0 [ 2775.113800] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 2775.114971] ? syscall_enter_from_user_mode+0x1d/0x50 [ 2775.116064] do_syscall_64+0x33/0x40 [ 2775.116832] entry_SYSCALL_64_after_hwframe+0x61/0xc6 [ 2775.117912] RIP: 0033:0x7f26b1c43ab7 [ 2775.118683] Code: 08 89 3c 24 48 89 4c 24 18 e8 e5 f8 ff ff 4c 8b 54 24 18 48 8b 54 24 10 41 89 c0 48 8b 74 24 08 8b 3c 24 b8 12 00 00 00 0f 05 <48> 3d 00 f0 ff ff 77 31 44 89 c7 48 89 04 24 e8 15 f9 ff ff 48 8b [ 2775.122497] RSP: 002b:00007f26af205f20 EFLAGS: 00000293 ORIG_RAX: 0000000000000012 [ 2775.124057] RAX: ffffffffffffffda RBX: 00007f26b1cda970 RCX: 00007f26b1c43ab7 [ 2775.125546] RDX: 000000000000005a RSI: 0000000020000040 RDI: 0000000000000004 [ 2775.127029] RBP: 0000000000000004 R08: 0000000000000000 R09: ffffffffffffffff [ 2775.128512] R10: 0000000000000400 R11: 0000000000000293 R12: 0000000000000004 [ 2775.129999] R13: 0000000000000004 R14: 0000000020000440 R15: 0000000000000000 [ 2775.149419] FAULT_INJECTION: forcing a failure. [ 2775.149419] name failslab, interval 1, probability 0, space 0, times 0 [ 2775.152096] CPU: 1 PID: 13818 Comm: syz-executor.7 Not tainted 5.10.163 #1 [ 2775.153530] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2775.155243] Call Trace: [ 2775.155789] dump_stack+0x107/0x167 [ 2775.156557] should_fail.cold+0x5/0xa [ 2775.157357] ? __kernfs_new_node+0xd4/0x850 [ 2775.158255] should_failslab+0x5/0x20 [ 2775.159076] kmem_cache_alloc+0x5b/0x360 [ 2775.159924] __kernfs_new_node+0xd4/0x850 [ 2775.160797] ? kernfs_dop_revalidate+0x3a0/0x3a0 [ 2775.161893] ? __mutex_unlock_slowpath+0xe1/0x600 [ 2775.162913] ? wait_for_completion_io+0x270/0x270 [ 2775.163926] ? kernfs_next_descendant_post+0x1a7/0x2a0 [ 2775.165043] kernfs_new_node+0x93/0x120 [ 2775.165871] __kernfs_create_file+0x51/0x350 [ 2775.166804] sysfs_add_file_mode_ns+0x221/0x560 [ 2775.167777] internal_create_group+0x324/0xb30 [ 2775.168732] ? sysfs_remove_group+0x170/0x170 [ 2775.169715] ? lockdep_init_map_type+0x2c7/0x780 [ 2775.170700] ? blk_queue_flag_set+0x22/0x30 [ 2775.171597] ? __loop_update_dio+0x2d2/0x690 [ 2775.172508] loop_configure+0x954/0x1480 [ 2775.173371] lo_ioctl+0xa72/0x1760 [ 2775.174108] ? avc_has_extended_perms+0x7f1/0xec0 [ 2775.175113] ? loop_set_status_old+0x250/0x250 [ 2775.176072] ? avc_ss_reset+0x180/0x180 [ 2775.176899] ? find_held_lock+0x2c/0x110 [ 2775.177855] ? __lock_acquire+0xbb1/0x5b00 [ 2775.178875] ? selinux_inode_getsecctx+0x90/0x90 [ 2775.180058] ? generic_block_fiemap+0x60/0x60 [ 2775.181011] ? loop_set_status_old+0x250/0x250 [ 2775.181951] blkdev_ioctl+0x291/0x710 [ 2775.182736] ? blkdev_common_ioctl+0x1870/0x1870 [ 2775.183723] ? selinux_file_ioctl+0xb1/0x260 [ 2775.184641] block_ioctl+0xf9/0x140 [ 2775.185398] ? blkdev_read_iter+0x1c0/0x1c0 [ 2775.186311] __x64_sys_ioctl+0x19a/0x210 [ 2775.187267] do_syscall_64+0x33/0x40 [ 2775.188151] entry_SYSCALL_64_after_hwframe+0x61/0xc6 [ 2775.189311] RIP: 0033:0x7fca424058d7 [ 2775.190185] Code: 3c 1c 48 f7 d8 49 39 c4 72 b8 e8 a4 54 02 00 85 c0 78 bd 48 83 c4 08 4c 89 e0 5b 41 5c c3 0f 1f 44 00 00 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2775.194473] RSP: 002b:00007fca3f97af48 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 2775.196263] RAX: ffffffffffffffda RBX: 00007fca4244f970 RCX: 00007fca424058d7 [ 2775.197911] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 2775.199643] RBP: 0000000000000005 R08: 0000000000000000 R09: ffffffffffffffff [ 2775.201264] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000004 [ 2775.202951] R13: 0000000000000004 R14: 00000000200004a0 R15: 0000000000000004 [ 2775.257340] EXT4-fs (loop7): mounted filesystem without journal. Opts: ,errors=continue [ 2775.279703] EXT4-fs (loop1): mounted filesystem without journal. Opts: ,errors=continue 12:49:08 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000180)) (fail_nth: 39) 12:49:08 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000180)) (fail_nth: 16) 12:49:08 executing program 7: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000180)) (fail_nth: 41) 12:49:08 executing program 6: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000180)) (fail_nth: 27) 12:49:08 executing program 0: shmat(0x0, &(0x7f0000ffb000/0x4000)=nil, 0x3000) r0 = creat(&(0x7f0000000040)='./file0\x00', 0x0) mmap$binder(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x1, 0x11, r0, 0x2) r1 = creat(&(0x7f0000000040)='./file0\x00', 0x20) fallocate(r1, 0x41, 0x0, 0x400) r2 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) ioctl$FS_IOC_RESVSP(r2, 0x40305828, &(0x7f00000000c0)={0x0, 0x1, 0x800, 0x20}) ioctl$FAT_IOCTL_SET_ATTRIBUTES(r1, 0x40047211, &(0x7f0000000000)) fallocate(r1, 0xb, 0x0, 0x7fff) r3 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000100), 0x40200, 0x0) fallocate(r3, 0x0, 0x4001, 0x8800000) 12:49:08 executing program 4: ioctl$RTC_UIE_ON(0xffffffffffffffff, 0x7003) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x2}, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0xfffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = dup2(0xffffffffffffffff, r0) perf_event_open(&(0x7f00000001c0)={0x2, 0x80, 0x8, 0x9, 0x4, 0x1, 0x0, 0x3b3d, 0x200a0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x2, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0xffff, 0x1, @perf_config_ext={0x7, 0x1}, 0x281, 0xffffffff, 0x4, 0x3, 0x401, 0xffffff47, 0x401, 0x0, 0x3, 0x0, 0x415}, 0x0, 0xffffffffffffffff, r0, 0x1) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000180)) pkey_mprotect(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x0, 0xffffffffffffffff) pkey_mprotect(&(0x7f0000ff4000/0x4000)=nil, 0x4000, 0x0, 0xffffffffffffffff) socket$inet_udp(0x2, 0x2, 0x0) getsockopt$inet_int(0xffffffffffffffff, 0x0, 0xe, 0x0, &(0x7f0000000280)) ioctl$sock_SIOCADDDLCI(0xffffffffffffffff, 0x8980, 0x0) ioctl$RTC_ALM_SET(r1, 0x40247007, 0x0) mmap$IORING_OFF_SQES(&(0x7f0000ff3000/0x2000)=nil, 0x2000, 0x2000002, 0x10, r1, 0x10000000) getsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, 0x0, 0x0) 12:49:08 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b", 0x55, 0x400}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000180)) 12:49:08 executing program 3: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_init_net_socket$802154_raw(0x24, 0x3, 0x0) sendmmsg$inet6(r0, &(0x7f0000004d00)=[{{0x0, 0x0, &(0x7f00000004c0)}}], 0x1, 0xffffff7f) [ 2795.500758] FAULT_INJECTION: forcing a failure. [ 2795.500758] name failslab, interval 1, probability 0, space 0, times 0 [ 2795.503311] CPU: 0 PID: 13837 Comm: syz-executor.7 Not tainted 5.10.163 #1 [ 2795.504819] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2795.506580] Call Trace: [ 2795.507145] dump_stack+0x107/0x167 [ 2795.507916] should_fail.cold+0x5/0xa [ 2795.508714] ? create_object.isra.0+0x3a/0xa20 [ 2795.509684] should_failslab+0x5/0x20 [ 2795.510477] kmem_cache_alloc+0x5b/0x360 [ 2795.511329] create_object.isra.0+0x3a/0xa20 [ 2795.512250] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 2795.513327] kmem_cache_alloc+0x159/0x360 [ 2795.514200] __kernfs_new_node+0xd4/0x850 [ 2795.515069] ? kernfs_dop_revalidate+0x3a0/0x3a0 [ 2795.516062] ? __mutex_unlock_slowpath+0xe1/0x600 [ 2795.517059] ? asm_sysvec_call_function_single+0x12/0x20 [ 2795.518188] ? trace_hardirqs_on+0x5b/0x180 [ 2795.519091] ? wait_for_completion_io+0x270/0x270 [ 2795.520094] ? kernfs_next_descendant_post+0x1a7/0x2a0 [ 2795.521190] kernfs_new_node+0x93/0x120 [ 2795.522043] __kernfs_create_file+0x51/0x350 [ 2795.522964] sysfs_add_file_mode_ns+0x221/0x560 [ 2795.523940] internal_create_group+0x324/0xb30 [ 2795.524900] ? sysfs_remove_group+0x170/0x170 [ 2795.525844] ? lockdep_init_map_type+0x2c7/0x780 [ 2795.526850] ? blk_queue_flag_set+0x22/0x30 [ 2795.527745] ? __loop_update_dio+0x2d2/0x690 [ 2795.528661] loop_configure+0x954/0x1480 [ 2795.529530] lo_ioctl+0xa72/0x1760 [ 2795.530271] ? avc_has_extended_perms+0x7f1/0xec0 [ 2795.531274] ? loop_set_status_old+0x250/0x250 [ 2795.532226] ? avc_ss_reset+0x180/0x180 [ 2795.533060] ? find_held_lock+0x2c/0x110 [ 2795.533919] ? __lock_acquire+0xbb1/0x5b00 [ 2795.534859] ? selinux_inode_getsecctx+0x90/0x90 [ 2795.535848] ? generic_block_fiemap+0x60/0x60 [ 2795.536789] ? loop_set_status_old+0x250/0x250 [ 2795.537750] blkdev_ioctl+0x291/0x710 [ 2795.538546] ? blkdev_common_ioctl+0x1870/0x1870 [ 2795.539544] ? selinux_file_ioctl+0xb1/0x260 [ 2795.540473] block_ioctl+0xf9/0x140 [ 2795.541239] ? blkdev_read_iter+0x1c0/0x1c0 [ 2795.542146] __x64_sys_ioctl+0x19a/0x210 [ 2795.543002] do_syscall_64+0x33/0x40 [ 2795.543780] entry_SYSCALL_64_after_hwframe+0x61/0xc6 [ 2795.544849] RIP: 0033:0x7fca424058d7 [ 2795.545633] Code: 3c 1c 48 f7 d8 49 39 c4 72 b8 e8 a4 54 02 00 85 c0 78 bd 48 83 c4 08 4c 89 e0 5b 41 5c c3 0f 1f 44 00 00 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2795.549479] RSP: 002b:00007fca3f97af48 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 2795.551069] RAX: ffffffffffffffda RBX: 00007fca4244f970 RCX: 00007fca424058d7 [ 2795.552550] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 2795.554045] RBP: 0000000000000005 R08: 0000000000000000 R09: ffffffffffffffff [ 2795.555528] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000004 [ 2795.557014] R13: 0000000000000004 R14: 00000000200004a0 R15: 0000000000000004 [ 2795.558751] hpet: Lost 3 RTC interrupts [ 2795.572559] FAULT_INJECTION: forcing a failure. [ 2795.572559] name failslab, interval 1, probability 0, space 0, times 0 [ 2795.575087] CPU: 0 PID: 13842 Comm: syz-executor.6 Not tainted 5.10.163 #1 [ 2795.576518] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2795.578243] Call Trace: [ 2795.578800] dump_stack+0x107/0x167 [ 2795.579563] should_fail.cold+0x5/0xa [ 2795.580357] ? create_object.isra.0+0x3a/0xa20 [ 2795.581315] should_failslab+0x5/0x20 [ 2795.582108] kmem_cache_alloc+0x5b/0x360 [ 2795.582946] ? percpu_ref_put_many.constprop.0+0x4e/0x100 [ 2795.584115] create_object.isra.0+0x3a/0xa20 [ 2795.585134] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 2795.586202] kmem_cache_alloc+0x159/0x360 [ 2795.587067] security_file_alloc+0x34/0x170 [ 2795.587968] __alloc_file+0xb6/0x320 [ 2795.588739] alloc_empty_file+0x6d/0x170 [ 2795.589604] path_openat+0xde/0x26d0 [ 2795.590395] ? path_lookupat+0x860/0x860 [ 2795.591244] ? perf_trace_lock+0xac/0x490 [ 2795.592097] ? __lockdep_reset_lock+0x180/0x180 [ 2795.593061] ? lock_acquire+0x197/0x490 [ 2795.593893] ? __lockdep_reset_lock+0x180/0x180 [ 2795.594874] do_filp_open+0x190/0x3e0 [ 2795.595661] ? may_open_dev+0xf0/0xf0 [ 2795.596458] ? __alloc_fd+0x2a5/0x620 [ 2795.597244] ? lock_downgrade+0x6d0/0x6d0 [ 2795.598125] ? rwlock_bug.part.0+0x90/0x90 [ 2795.599017] ? _raw_spin_unlock+0x1a/0x30 [ 2795.599874] ? __alloc_fd+0x2a5/0x620 [ 2795.600687] do_sys_openat2+0x171/0x420 [ 2795.601532] ? build_open_flags+0x6f0/0x6f0 [ 2795.602445] ? rcu_read_lock_any_held+0x75/0xa0 [ 2795.603417] __x64_sys_openat+0x13f/0x1f0 [ 2795.604296] ? __ia32_sys_open+0x1c0/0x1c0 [ 2795.605184] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 2795.606298] ? syscall_enter_from_user_mode+0x1d/0x50 [ 2795.607381] do_syscall_64+0x33/0x40 [ 2795.608175] entry_SYSCALL_64_after_hwframe+0x61/0xc6 [ 2795.609239] RIP: 0033:0x7f290af1ca04 [ 2795.610048] Code: 84 00 00 00 00 00 44 89 54 24 0c e8 96 f9 ff ff 44 8b 54 24 0c 44 89 e2 48 89 ee 41 89 c0 bf 9c ff ff ff b8 01 01 00 00 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 89 44 24 0c e8 c8 f9 ff ff 8b 44 [ 2795.613876] RSP: 002b:00007f29084deed0 EFLAGS: 00000293 ORIG_RAX: 0000000000000101 [ 2795.615453] RAX: ffffffffffffffda RBX: 00007f290afb3970 RCX: 00007f290af1ca04 [ 2795.616941] RDX: 0000000000000002 RSI: 00007f29084df000 RDI: 00000000ffffff9c [ 2795.618433] RBP: 00007f29084df000 R08: 0000000000000000 R09: ffffffffffffffff [ 2795.619927] R10: 0000000000000000 R11: 0000000000000293 R12: 0000000000000002 [ 2795.621400] R13: 0000000000000004 R14: 00000000200004a0 R15: 0000000000000004 [ 2795.623089] hpet: Lost 2 RTC interrupts [ 2795.636420] FAULT_INJECTION: forcing a failure. [ 2795.636420] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 2795.639024] CPU: 0 PID: 13847 Comm: syz-executor.1 Not tainted 5.10.163 #1 [ 2795.640575] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2795.642309] Call Trace: [ 2795.642860] dump_stack+0x107/0x167 [ 2795.643621] should_fail.cold+0x5/0xa [ 2795.644427] iov_iter_copy_from_user_atomic+0x49b/0xdb0 [ 2795.645571] ? shmem_write_begin+0xf7/0x1d0 [ 2795.646490] ? shmem_write_begin+0x100/0x1d0 [ 2795.647427] generic_perform_write+0x279/0x4f0 [ 2795.648407] ? trace_event_raw_event_file_check_and_advance_wb_err+0x4a0/0x4a0 [ 2795.649926] ? evict_inodes+0x420/0x420 [ 2795.650758] ? generic_write_checks+0x2ad/0x390 [ 2795.651733] __generic_file_write_iter+0x39d/0x5d0 [ 2795.652758] generic_file_write_iter+0xdb/0x230 [ 2795.653740] ? iov_iter_init+0x3c/0x130 [ 2795.654569] new_sync_write+0x42c/0x660 [ 2795.655396] ? new_sync_read+0x6f0/0x6f0 [ 2795.656243] ? __x64_sys_pwrite64+0x201/0x260 [ 2795.657184] ? lock_release+0x6b0/0x6b0 [ 2795.658032] ? selinux_file_permission+0x36/0x510 [ 2795.659060] vfs_write+0x747/0xa30 [ 2795.659805] __x64_sys_pwrite64+0x201/0x260 [ 2795.660701] ? ksys_pwrite64+0x1b0/0x1b0 [ 2795.661554] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 2795.662639] ? syscall_enter_from_user_mode+0x1d/0x50 [ 2795.663709] do_syscall_64+0x33/0x40 [ 2795.664505] entry_SYSCALL_64_after_hwframe+0x61/0xc6 [ 2795.665591] RIP: 0033:0x7f26b1c43ab7 [ 2795.666367] Code: 08 89 3c 24 48 89 4c 24 18 e8 e5 f8 ff ff 4c 8b 54 24 18 48 8b 54 24 10 41 89 c0 48 8b 74 24 08 8b 3c 24 b8 12 00 00 00 0f 05 <48> 3d 00 f0 ff ff 77 31 44 89 c7 48 89 04 24 e8 15 f9 ff ff 48 8b [ 2795.670185] RSP: 002b:00007f26af205f20 EFLAGS: 00000293 ORIG_RAX: 0000000000000012 [ 2795.671760] RAX: ffffffffffffffda RBX: 00007f26b1cda970 RCX: 00007f26b1c43ab7 [ 2795.673246] RDX: 0000000000000009 RSI: 0000000020010400 RDI: 0000000000000004 [ 2795.674752] RBP: 0000000000000004 R08: 0000000000000000 R09: ffffffffffffffff [ 2795.676243] R10: 0000000000000800 R11: 0000000000000293 R12: 0000000000000004 [ 2795.677744] R13: 0000000000000004 R14: 0000000020000470 R15: 0000000000000002 [ 2795.679436] hpet: Lost 2 RTC interrupts [ 2795.688390] FAULT_INJECTION: forcing a failure. [ 2795.688390] name failslab, interval 1, probability 0, space 0, times 0 [ 2795.690975] CPU: 0 PID: 13840 Comm: syz-executor.5 Not tainted 5.10.163 #1 [ 2795.692415] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2795.694136] Call Trace: [ 2795.694687] dump_stack+0x107/0x167 [ 2795.695452] should_fail.cold+0x5/0xa [ 2795.696242] ? create_object.isra.0+0x3a/0xa20 [ 2795.697204] should_failslab+0x5/0x20 [ 2795.698016] kmem_cache_alloc+0x5b/0x360 [ 2795.698868] create_object.isra.0+0x3a/0xa20 [ 2795.699781] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 2795.700841] kmem_cache_alloc+0x159/0x360 [ 2795.701716] __kernfs_new_node+0xd4/0x850 [ 2795.702591] ? kernfs_dop_revalidate+0x3a0/0x3a0 [ 2795.703581] ? __mutex_unlock_slowpath+0xe1/0x600 [ 2795.704600] ? wait_for_completion_io+0x270/0x270 [ 2795.705619] ? kernfs_next_descendant_post+0x1a7/0x2a0 [ 2795.706728] kernfs_new_node+0x93/0x120 [ 2795.707562] __kernfs_create_file+0x51/0x350 [ 2795.708483] sysfs_add_file_mode_ns+0x221/0x560 [ 2795.709495] internal_create_group+0x324/0xb30 [ 2795.710456] ? sysfs_remove_group+0x170/0x170 [ 2795.711395] ? lockdep_init_map_type+0x2c7/0x780 [ 2795.712384] ? blk_queue_flag_set+0x22/0x30 [ 2795.713284] ? __loop_update_dio+0x2d2/0x690 [ 2795.714207] loop_configure+0x954/0x1480 [ 2795.715070] lo_ioctl+0xa72/0x1760 [ 2795.715807] ? avc_has_extended_perms+0x7f1/0xec0 [ 2795.716810] ? loop_set_status_old+0x250/0x250 [ 2795.717780] ? avc_ss_reset+0x180/0x180 [ 2795.718630] ? find_held_lock+0x2c/0x110 [ 2795.719485] ? __lock_acquire+0xbb1/0x5b00 [ 2795.720418] ? selinux_inode_getsecctx+0x90/0x90 [ 2795.721413] ? generic_block_fiemap+0x60/0x60 [ 2795.722358] ? loop_set_status_old+0x250/0x250 [ 2795.723319] blkdev_ioctl+0x291/0x710 [ 2795.724115] ? blkdev_common_ioctl+0x1870/0x1870 [ 2795.725118] ? selinux_file_ioctl+0xb1/0x260 [ 2795.726048] block_ioctl+0xf9/0x140 [ 2795.726802] ? blkdev_read_iter+0x1c0/0x1c0 [ 2795.727711] __x64_sys_ioctl+0x19a/0x210 [ 2795.728558] do_syscall_64+0x33/0x40 [ 2795.729365] entry_SYSCALL_64_after_hwframe+0x61/0xc6 [ 2795.730447] RIP: 0033:0x7f8cf18208d7 [ 2795.731225] Code: 3c 1c 48 f7 d8 49 39 c4 72 b8 e8 a4 54 02 00 85 c0 78 bd 48 83 c4 08 4c 89 e0 5b 41 5c c3 0f 1f 44 00 00 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2795.735101] RSP: 002b:00007f8ceed95f48 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 2795.736702] RAX: ffffffffffffffda RBX: 00007f8cf186a970 RCX: 00007f8cf18208d7 [ 2795.738210] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 2795.739700] RBP: 0000000000000005 R08: 0000000000000000 R09: ffffffffffffffff [ 2795.741183] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000004 [ 2795.742676] R13: 0000000000000004 R14: 00000000200004a0 R15: 0000000000000004 [ 2795.744354] hpet: Lost 2 RTC interrupts 12:49:08 executing program 3: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_init_net_socket$802154_raw(0x24, 0x3, 0x0) sendmmsg$inet6(r0, &(0x7f0000004d00)=[{{0x0, 0x0, &(0x7f00000004c0)}}], 0x1, 0x4000000000000) [ 2795.801346] EXT4-fs (loop2): unsupported inode size: 0 [ 2795.802980] EXT4-fs (loop2): blocksize: 2048 [ 2795.838204] EXT4-fs (loop1): mounted filesystem without journal. Opts: ,errors=continue [ 2795.838272] EXT4-fs (loop7): mounted filesystem without journal. Opts: ,errors=continue [ 2795.843300] EXT4-fs (loop5): mounted filesystem without journal. Opts: ,errors=continue [ 2795.847465] EXT4-fs (loop6): mounted filesystem without journal. Opts: ,errors=continue 12:49:08 executing program 0: r0 = creat(&(0x7f0000000040)='./file0\x00', 0x0) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000080)='gid_map\x00') r1 = creat(&(0x7f0000000040)='./file0\x00', 0x0) fallocate(r1, 0x0, 0x0, 0x8800000) fallocate(r1, 0x3, 0x0, 0x8000) r2 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$sock_int(r2, 0x1, 0x12, &(0x7f00000003c0)=0x1000, 0xfffffffffffffde7) ioctl$sock_inet_tcp_SIOCATMARK(r2, 0x8905, &(0x7f0000000000)) fallocate(r0, 0x0, 0x0, 0x8800000) [ 2795.861811] EXT4-fs (loop4): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 2795.864085] EXT4-fs (loop4): group descriptors corrupted! 12:49:25 executing program 0: r0 = creat(&(0x7f0000000040)='./file0\x00', 0x0) r1 = creat(&(0x7f0000000040)='./file0\x00', 0x0) ioctl$BTRFS_IOC_RESIZE(0xffffffffffffffff, 0x50009403, &(0x7f0000000000)={{r0}, {@void, @actul_num={@val=0x2b, 0xfff, 0x45}}}) fallocate(r1, 0x0, 0x0, 0x8800000) fallocate(r1, 0x3, 0x0, 0x8000) fallocate(r0, 0x0, 0x0, 0x8800000) 12:49:25 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b", 0x55, 0x400}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000180)) 12:49:25 executing program 3: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_init_net_socket$802154_raw(0x24, 0x3, 0x0) sendmmsg$inet6(r0, &(0x7f0000004d00)=[{{0x0, 0x0, &(0x7f00000004c0)}}], 0x1, 0x7f00000000000000) 12:49:25 executing program 6: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000180)) (fail_nth: 28) 12:49:25 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000180)) (fail_nth: 40) 12:49:25 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000180)) (fail_nth: 17) 12:49:25 executing program 7: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000180)) (fail_nth: 42) 12:49:25 executing program 4: ioctl$RTC_UIE_ON(0xffffffffffffffff, 0x7003) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x2}, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0xfffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = dup2(0xffffffffffffffff, r0) perf_event_open(&(0x7f00000001c0)={0x2, 0x80, 0x8, 0x9, 0x4, 0x1, 0x0, 0x3b3d, 0x200a0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x2, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0xffff, 0x1, @perf_config_ext={0x7, 0x1}, 0x281, 0xffffffff, 0x4, 0x3, 0x401, 0xffffff47, 0x401, 0x0, 0x3, 0x0, 0x415}, 0x0, 0xffffffffffffffff, r0, 0x1) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000180)) pkey_mprotect(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x0, 0xffffffffffffffff) pkey_mprotect(&(0x7f0000ff4000/0x4000)=nil, 0x4000, 0x0, 0xffffffffffffffff) socket$inet_udp(0x2, 0x2, 0x0) getsockopt$inet_int(0xffffffffffffffff, 0x0, 0xe, 0x0, &(0x7f0000000280)) ioctl$sock_SIOCADDDLCI(0xffffffffffffffff, 0x8980, 0x0) ioctl$RTC_ALM_SET(r1, 0x40247007, 0x0) mmap$IORING_OFF_SQES(&(0x7f0000ff3000/0x2000)=nil, 0x2000, 0x2000002, 0x10, r1, 0x10000000) getsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, 0x0, 0x0) [ 2812.935269] FAULT_INJECTION: forcing a failure. [ 2812.935269] name failslab, interval 1, probability 0, space 0, times 0 [ 2812.937850] CPU: 1 PID: 13883 Comm: syz-executor.5 Not tainted 5.10.163 #1 [ 2812.939453] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2812.941140] Call Trace: [ 2812.941698] dump_stack+0x107/0x167 [ 2812.942456] should_fail.cold+0x5/0xa [ 2812.943245] ? __kernfs_new_node+0xd4/0x850 [ 2812.944218] should_failslab+0x5/0x20 [ 2812.945066] kmem_cache_alloc+0x5b/0x360 [ 2812.946038] __kernfs_new_node+0xd4/0x850 [ 2812.946963] ? kernfs_dop_revalidate+0x3a0/0x3a0 [ 2812.947934] ? __mutex_unlock_slowpath+0xe1/0x600 [ 2812.949003] ? wait_for_completion_io+0x270/0x270 [ 2812.950122] ? kernfs_next_descendant_post+0x1a7/0x2a0 [ 2812.951248] kernfs_new_node+0x93/0x120 [ 2812.952081] __kernfs_create_file+0x51/0x350 [ 2812.952979] sysfs_add_file_mode_ns+0x221/0x560 [ 2812.953948] internal_create_group+0x324/0xb30 [ 2812.954890] ? sysfs_remove_group+0x170/0x170 [ 2812.955827] ? lockdep_init_map_type+0x2c7/0x780 [ 2812.956798] ? blk_queue_flag_set+0x22/0x30 [ 2812.957692] ? __loop_update_dio+0x2d2/0x690 [ 2812.958598] loop_configure+0x954/0x1480 [ 2812.959511] lo_ioctl+0xa72/0x1760 [ 2812.960242] ? avc_has_extended_perms+0x7f1/0xec0 [ 2812.961230] ? loop_set_status_old+0x250/0x250 [ 2812.962178] ? avc_ss_reset+0x180/0x180 [ 2812.962993] ? find_held_lock+0x2c/0x110 [ 2812.963839] ? __lock_acquire+0xbb1/0x5b00 [ 2812.964756] ? selinux_inode_getsecctx+0x90/0x90 [ 2812.965742] ? generic_block_fiemap+0x60/0x60 [ 2812.966674] ? loop_set_status_old+0x250/0x250 [ 2812.967604] blkdev_ioctl+0x291/0x710 [ 2812.968382] ? blkdev_common_ioctl+0x1870/0x1870 [ 2812.969362] ? selinux_file_ioctl+0xb1/0x260 [ 2812.970278] block_ioctl+0xf9/0x140 [ 2812.971014] ? blkdev_read_iter+0x1c0/0x1c0 [ 2812.971891] __x64_sys_ioctl+0x19a/0x210 [ 2812.972726] do_syscall_64+0x33/0x40 [ 2812.973486] entry_SYSCALL_64_after_hwframe+0x61/0xc6 [ 2812.974549] RIP: 0033:0x7f8cf18208d7 [ 2812.975377] Code: 3c 1c 48 f7 d8 49 39 c4 72 b8 e8 a4 54 02 00 85 c0 78 bd 48 83 c4 08 4c 89 e0 5b 41 5c c3 0f 1f 44 00 00 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2812.979115] RSP: 002b:00007f8ceed95f48 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 2812.980691] RAX: ffffffffffffffda RBX: 00007f8cf186a970 RCX: 00007f8cf18208d7 [ 2812.982139] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 2812.983584] RBP: 0000000000000005 R08: 0000000000000000 R09: ffffffffffffffff [ 2812.985031] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000004 [ 2812.986499] R13: 0000000000000004 R14: 00000000200004a0 R15: 0000000000000004 [ 2813.016313] FAULT_INJECTION: forcing a failure. [ 2813.016313] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 2813.018851] CPU: 1 PID: 13891 Comm: syz-executor.1 Not tainted 5.10.163 #1 [ 2813.020270] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2813.022084] Call Trace: [ 2813.022626] dump_stack+0x107/0x167 [ 2813.023379] should_fail.cold+0x5/0xa [ 2813.024161] __alloc_pages_nodemask+0x182/0x680 [ 2813.025134] ? __alloc_pages_slowpath.constprop.0+0x2220/0x2220 [ 2813.026359] ? lock_downgrade+0x6d0/0x6d0 [ 2813.027223] alloc_pages_vma+0xbb/0x410 [ 2813.028041] shmem_alloc_page+0x10f/0x1e0 [ 2813.028881] ? shmem_init_inode+0x20/0x20 [ 2813.029781] ? percpu_counter_add_batch+0x8b/0x140 [ 2813.030785] ? __vm_enough_memory+0x184/0x360 [ 2813.031697] shmem_getpage_gfp.constprop.0+0x512/0x1920 [ 2813.032933] ? shmem_unuse_inode+0xed0/0xed0 [ 2813.033945] ? ktime_get_coarse_real_ts64+0x15a/0x190 [ 2813.035080] ? iov_iter_fault_in_readable+0x9a/0x410 [ 2813.036230] shmem_write_begin+0xf7/0x1d0 [ 2813.037240] generic_perform_write+0x20a/0x4f0 [ 2813.038235] ? trace_event_raw_event_file_check_and_advance_wb_err+0x4a0/0x4a0 [ 2813.039731] ? evict_inodes+0x420/0x420 [ 2813.040558] ? generic_write_checks+0x2ad/0x390 [ 2813.041532] __generic_file_write_iter+0x39d/0x5d0 [ 2813.042549] generic_file_write_iter+0xdb/0x230 [ 2813.043514] ? iov_iter_init+0x3c/0x130 [ 2813.044327] new_sync_write+0x42c/0x660 [ 2813.045137] ? new_sync_read+0x6f0/0x6f0 [ 2813.045983] ? __x64_sys_pwrite64+0x201/0x260 [ 2813.046908] ? lock_release+0x6b0/0x6b0 [ 2813.047748] ? selinux_file_permission+0x36/0x510 [ 2813.048756] vfs_write+0x747/0xa30 [ 2813.049514] __x64_sys_pwrite64+0x201/0x260 [ 2813.050402] ? ksys_pwrite64+0x1b0/0x1b0 [ 2813.051251] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 2813.052319] ? syscall_enter_from_user_mode+0x1d/0x50 [ 2813.053487] do_syscall_64+0x33/0x40 [ 2813.054265] entry_SYSCALL_64_after_hwframe+0x61/0xc6 [ 2813.055316] RIP: 0033:0x7f26b1c43ab7 [ 2813.056092] Code: 08 89 3c 24 48 89 4c 24 18 e8 e5 f8 ff ff 4c 8b 54 24 18 48 8b 54 24 10 41 89 c0 48 8b 74 24 08 8b 3c 24 b8 12 00 00 00 0f 05 <48> 3d 00 f0 ff ff 77 31 44 89 c7 48 89 04 24 e8 15 f9 ff ff 48 8b [ 2813.059874] RSP: 002b:00007f26af205f20 EFLAGS: 00000293 ORIG_RAX: 0000000000000012 [ 2813.061436] RAX: ffffffffffffffda RBX: 00007f26b1cda970 RCX: 00007f26b1c43ab7 [ 2813.062906] RDX: 000000000000001d RSI: 0000000020011600 RDI: 0000000000000004 [ 2813.064370] RBP: 0000000000000004 R08: 0000000000000000 R09: ffffffffffffffff [ 2813.065842] R10: 0000000000002100 R11: 0000000000000293 R12: 0000000000000004 [ 2813.067306] R13: 0000000000000004 R14: 0000000020000488 R15: 0000000000000003 [ 2813.076854] FAULT_INJECTION: forcing a failure. [ 2813.076854] name failslab, interval 1, probability 0, space 0, times 0 [ 2813.079326] CPU: 1 PID: 13886 Comm: syz-executor.7 Not tainted 5.10.163 #1 [ 2813.080738] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2813.082519] Call Trace: [ 2813.083168] dump_stack+0x107/0x167 [ 2813.083943] should_fail.cold+0x5/0xa [ 2813.084764] ? __kernfs_new_node+0xd4/0x850 [ 2813.085659] should_failslab+0x5/0x20 [ 2813.086430] kmem_cache_alloc+0x5b/0x360 [ 2813.087260] __kernfs_new_node+0xd4/0x850 [ 2813.088112] ? kernfs_dop_revalidate+0x3a0/0x3a0 [ 2813.089076] ? __mutex_unlock_slowpath+0xe1/0x600 [ 2813.090067] ? wait_for_completion_io+0x270/0x270 [ 2813.091062] ? kernfs_next_descendant_post+0x1a7/0x2a0 [ 2813.092132] kernfs_new_node+0x93/0x120 [ 2813.092957] __kernfs_create_file+0x51/0x350 [ 2813.093866] sysfs_add_file_mode_ns+0x221/0x560 [ 2813.094818] internal_create_group+0x324/0xb30 [ 2813.095783] ? sysfs_remove_group+0x170/0x170 [ 2813.096697] ? lockdep_init_map_type+0x2c7/0x780 [ 2813.097712] ? blk_queue_flag_set+0x22/0x30 [ 2813.098581] ? __loop_update_dio+0x2d2/0x690 [ 2813.099480] loop_configure+0x954/0x1480 [ 2813.100382] lo_ioctl+0xa72/0x1760 [ 2813.101108] ? avc_has_extended_perms+0x7f1/0xec0 [ 2813.102099] ? loop_set_status_old+0x250/0x250 [ 2813.103034] ? avc_ss_reset+0x180/0x180 [ 2813.103843] ? find_held_lock+0x2c/0x110 [ 2813.104680] ? __lock_acquire+0xbb1/0x5b00 [ 2813.105596] ? selinux_inode_getsecctx+0x90/0x90 [ 2813.106558] ? generic_block_fiemap+0x60/0x60 [ 2813.107475] ? loop_set_status_old+0x250/0x250 [ 2813.108427] blkdev_ioctl+0x291/0x710 [ 2813.109198] ? blkdev_common_ioctl+0x1870/0x1870 [ 2813.110208] ? selinux_file_ioctl+0xb1/0x260 [ 2813.111108] block_ioctl+0xf9/0x140 [ 2813.111858] ? blkdev_read_iter+0x1c0/0x1c0 [ 2813.112733] __x64_sys_ioctl+0x19a/0x210 [ 2813.113588] do_syscall_64+0x33/0x40 [ 2813.114367] entry_SYSCALL_64_after_hwframe+0x61/0xc6 [ 2813.115490] RIP: 0033:0x7fca424058d7 [ 2813.116263] Code: 3c 1c 48 f7 d8 49 39 c4 72 b8 e8 a4 54 02 00 85 c0 78 bd 48 83 c4 08 4c 89 e0 5b 41 5c c3 0f 1f 44 00 00 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2813.120032] RSP: 002b:00007fca3f97af48 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 2813.121594] RAX: ffffffffffffffda RBX: 00007fca4244f970 RCX: 00007fca424058d7 [ 2813.123047] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 2813.124521] RBP: 0000000000000005 R08: 0000000000000000 R09: ffffffffffffffff [ 2813.125980] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000004 [ 2813.127434] R13: 0000000000000004 R14: 00000000200004a0 R15: 0000000000000004 [ 2813.135507] FAULT_INJECTION: forcing a failure. [ 2813.135507] name failslab, interval 1, probability 0, space 0, times 0 [ 2813.137927] CPU: 0 PID: 13888 Comm: syz-executor.6 Not tainted 5.10.163 #1 [ 2813.139366] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2813.141087] Call Trace: [ 2813.141648] dump_stack+0x107/0x167 [ 2813.142412] should_fail.cold+0x5/0xa [ 2813.143210] ? __kthread_create_on_node+0xd1/0x400 [ 2813.144241] should_failslab+0x5/0x20 [ 2813.145036] kmem_cache_alloc_trace+0x55/0x360 [ 2813.145999] ? loop_info64_to_compat+0x5f0/0x5f0 [ 2813.147028] __kthread_create_on_node+0xd1/0x400 [ 2813.148015] ? __kthread_parkme+0x1d0/0x1d0 [ 2813.148921] ? __mutex_lock+0x425/0x12a0 [ 2813.149776] ? loop_configure+0xcb5/0x1480 [ 2813.150657] ? do_raw_spin_unlock+0x4f/0x220 [ 2813.151569] ? loop_info64_to_compat+0x5f0/0x5f0 [ 2813.152552] kthread_create_on_node+0xbb/0x100 [ 2813.153512] ? __kthread_create_on_node+0x400/0x400 [ 2813.154557] ? lockdep_init_map_type+0x2c7/0x780 [ 2813.155550] ? lockdep_init_map_type+0x2c7/0x780 [ 2813.156549] loop_configure+0x3e3/0x1480 [ 2813.157406] lo_ioctl+0xa72/0x1760 [ 2813.158167] ? avc_has_extended_perms+0x7f1/0xec0 [ 2813.159175] ? loop_set_status_old+0x250/0x250 [ 2813.160126] ? avc_ss_reset+0x180/0x180 [ 2813.160956] ? find_held_lock+0x2c/0x110 [ 2813.161823] ? __lock_acquire+0xbb1/0x5b00 [ 2813.162764] ? selinux_inode_getsecctx+0x90/0x90 [ 2813.163766] ? generic_block_fiemap+0x60/0x60 [ 2813.164717] ? loop_set_status_old+0x250/0x250 [ 2813.165685] blkdev_ioctl+0x291/0x710 [ 2813.166491] ? blkdev_common_ioctl+0x1870/0x1870 [ 2813.167484] ? selinux_file_ioctl+0xb1/0x260 [ 2813.168414] block_ioctl+0xf9/0x140 [ 2813.169169] ? blkdev_read_iter+0x1c0/0x1c0 [ 2813.170083] __x64_sys_ioctl+0x19a/0x210 [ 2813.170934] do_syscall_64+0x33/0x40 [ 2813.171713] entry_SYSCALL_64_after_hwframe+0x61/0xc6 [ 2813.172777] RIP: 0033:0x7f290af698d7 [ 2813.173562] Code: 3c 1c 48 f7 d8 49 39 c4 72 b8 e8 a4 54 02 00 85 c0 78 bd 48 83 c4 08 4c 89 e0 5b 41 5c c3 0f 1f 44 00 00 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2813.177376] RSP: 002b:00007f29084def48 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 2813.178981] RAX: ffffffffffffffda RBX: 00007f290afb3970 RCX: 00007f290af698d7 [ 2813.180463] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 2813.181953] RBP: 0000000000000005 R08: 0000000000000000 R09: ffffffffffffffff [ 2813.183439] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000004 [ 2813.184917] R13: 0000000000000004 R14: 00000000200004a0 R15: 0000000000000004 [ 2813.186576] hpet: Lost 2 RTC interrupts [ 2813.228473] EXT4-fs (loop7): mounted filesystem without journal. Opts: ,errors=continue [ 2813.242386] EXT4-fs (loop2): unsupported inode size: 0 [ 2813.243551] EXT4-fs (loop2): blocksize: 2048 [ 2813.246673] EXT4-fs (loop5): mounted filesystem without journal. Opts: ,errors=continue [ 2813.258363] EXT4-fs (loop4): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 2813.260504] EXT4-fs (loop4): group descriptors corrupted! [ 2813.295574] EXT4-fs error (device loop1): ext4_fill_super:4959: inode #2: comm syz-executor.1: iget: root inode unallocated [ 2813.298339] EXT4-fs (loop1): get root inode failed [ 2813.299459] EXT4-fs (loop1): mount failed 12:49:26 executing program 4: ioctl$RTC_UIE_ON(0xffffffffffffffff, 0x7003) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x2}, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0xfffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = dup2(0xffffffffffffffff, r0) perf_event_open(&(0x7f00000001c0)={0x2, 0x80, 0x8, 0x9, 0x4, 0x1, 0x0, 0x3b3d, 0x200a0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x2, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0xffff, 0x1, @perf_config_ext={0x7, 0x1}, 0x281, 0xffffffff, 0x4, 0x3, 0x401, 0xffffff47, 0x401, 0x0, 0x3, 0x0, 0x415}, 0x0, 0xffffffffffffffff, r0, 0x1) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000180)) pkey_mprotect(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x0, 0xffffffffffffffff) pkey_mprotect(&(0x7f0000ff4000/0x4000)=nil, 0x4000, 0x0, 0xffffffffffffffff) socket$inet_udp(0x2, 0x2, 0x0) getsockopt$inet_int(0xffffffffffffffff, 0x0, 0xe, 0x0, &(0x7f0000000280)) ioctl$sock_SIOCADDDLCI(0xffffffffffffffff, 0x8980, 0x0) ioctl$RTC_ALM_SET(r1, 0x40247007, 0x0) mmap$IORING_OFF_SQES(&(0x7f0000ff3000/0x2000)=nil, 0x2000, 0x2000002, 0x10, r1, 0x10000000) getsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, 0x0, 0x0) 12:49:26 executing program 0: r0 = creat(&(0x7f0000000040)='./file0\x00', 0x0) r1 = creat(&(0x7f0000000040)='./file0\x00', 0x0) fallocate(r1, 0x0, 0x0, 0x8800000) fallocate(r1, 0x3, 0x0, 0x8000) fallocate(r0, 0x0, 0x0, 0x8800000) ioctl$F2FS_IOC_ABORT_VOLATILE_WRITE(r0, 0xf505, 0x0) 12:49:26 executing program 3: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_init_net_socket$802154_raw(0x24, 0x3, 0x0) sendmmsg$inet6(r0, &(0x7f0000004d00)=[{{0x0, 0x0, &(0x7f00000004c0)}}], 0x1, 0xeffdffff00000000) 12:49:26 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b", 0x55, 0x400}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000180)) 12:49:26 executing program 6: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000180)) (fail_nth: 29) 12:49:26 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000180)) (fail_nth: 41) 12:49:26 executing program 7: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000180)) (fail_nth: 43) 12:49:26 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000180)) (fail_nth: 18) [ 2813.520513] EXT4-fs (loop4): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 2813.522899] EXT4-fs (loop4): group descriptors corrupted! 12:49:26 executing program 4: ioctl$RTC_UIE_ON(0xffffffffffffffff, 0x7003) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x2}, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0xfffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = dup2(0xffffffffffffffff, r0) perf_event_open(&(0x7f00000001c0)={0x2, 0x80, 0x8, 0x9, 0x4, 0x1, 0x0, 0x3b3d, 0x200a0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x2, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0xffff, 0x1, @perf_config_ext={0x7, 0x1}, 0x281, 0xffffffff, 0x4, 0x3, 0x401, 0xffffff47, 0x401, 0x0, 0x3, 0x0, 0x415}, 0x0, 0xffffffffffffffff, r0, 0x1) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000180)) pkey_mprotect(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x0, 0xffffffffffffffff) pkey_mprotect(&(0x7f0000ff4000/0x4000)=nil, 0x4000, 0x0, 0xffffffffffffffff) socket$inet_udp(0x2, 0x2, 0x0) getsockopt$inet_int(0xffffffffffffffff, 0x0, 0xe, 0x0, &(0x7f0000000280)) ioctl$sock_SIOCADDDLCI(0xffffffffffffffff, 0x8980, 0x0) ioctl$RTC_ALM_SET(r1, 0x40247007, 0x0) mmap$IORING_OFF_SQES(&(0x7f0000ff3000/0x2000)=nil, 0x2000, 0x2000002, 0x10, r1, 0x10000000) getsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, 0x0, 0x0) [ 2813.596157] FAULT_INJECTION: forcing a failure. [ 2813.596157] name failslab, interval 1, probability 0, space 0, times 0 [ 2813.598581] CPU: 1 PID: 13923 Comm: syz-executor.6 Not tainted 5.10.163 #1 [ 2813.600096] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2813.601796] Call Trace: [ 2813.602352] dump_stack+0x107/0x167 [ 2813.603101] should_fail.cold+0x5/0xa [ 2813.603880] ? create_object.isra.0+0x3a/0xa20 [ 2813.604817] should_failslab+0x5/0x20 [ 2813.605603] kmem_cache_alloc+0x5b/0x360 [ 2813.606439] create_object.isra.0+0x3a/0xa20 [ 2813.607348] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 2813.608408] kmem_cache_alloc_trace+0x151/0x360 [ 2813.609365] ? loop_info64_to_compat+0x5f0/0x5f0 [ 2813.610355] __kthread_create_on_node+0xd1/0x400 [ 2813.611336] ? __kthread_parkme+0x1d0/0x1d0 [ 2813.612241] ? __mutex_lock+0x425/0x12a0 [ 2813.613076] ? loop_configure+0xcb5/0x1480 [ 2813.613956] ? do_raw_spin_unlock+0x4f/0x220 [ 2813.614856] ? loop_info64_to_compat+0x5f0/0x5f0 [ 2813.615914] kthread_create_on_node+0xbb/0x100 [ 2813.616842] ? __kthread_create_on_node+0x400/0x400 [ 2813.617888] ? lockdep_init_map_type+0x2c7/0x780 [ 2813.618856] ? lockdep_init_map_type+0x2c7/0x780 [ 2813.619844] loop_configure+0x3e3/0x1480 [ 2813.620682] lo_ioctl+0xa72/0x1760 [ 2813.621420] ? avc_has_extended_perms+0x7f1/0xec0 [ 2813.622407] ? loop_set_status_old+0x250/0x250 [ 2813.623367] ? avc_ss_reset+0x180/0x180 [ 2813.624230] ? find_held_lock+0x2c/0x110 [ 2813.625133] ? __lock_acquire+0xbb1/0x5b00 [ 2813.626076] ? selinux_inode_getsecctx+0x90/0x90 [ 2813.627067] ? generic_block_fiemap+0x60/0x60 [ 2813.628030] ? loop_set_status_old+0x250/0x250 [ 2813.629009] blkdev_ioctl+0x291/0x710 [ 2813.629811] ? blkdev_common_ioctl+0x1870/0x1870 [ 2813.630773] ? selinux_file_ioctl+0xb1/0x260 [ 2813.631738] block_ioctl+0xf9/0x140 12:49:26 executing program 3: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_init_net_socket$802154_raw(0x24, 0x3, 0x0) sendmmsg$inet6(r0, &(0x7f0000004d00)=[{{0x0, 0x0, &(0x7f00000004c0)}}], 0x1, 0xffffff7f00000000) [ 2813.632474] ? blkdev_read_iter+0x1c0/0x1c0 [ 2813.633433] __x64_sys_ioctl+0x19a/0x210 [ 2813.634278] do_syscall_64+0x33/0x40 [ 2813.635038] entry_SYSCALL_64_after_hwframe+0x61/0xc6 [ 2813.636075] RIP: 0033:0x7f290af698d7 [ 2813.636829] Code: 3c 1c 48 f7 d8 49 39 c4 72 b8 e8 a4 54 02 00 85 c0 78 bd 48 83 c4 08 4c 89 e0 5b 41 5c c3 0f 1f 44 00 00 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2813.640545] RSP: 002b:00007f29084def48 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 2813.642091] RAX: ffffffffffffffda RBX: 00007f290afb3970 RCX: 00007f290af698d7 [ 2813.643541] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 2813.644984] RBP: 0000000000000005 R08: 0000000000000000 R09: ffffffffffffffff [ 2813.646445] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000004 [ 2813.647944] R13: 0000000000000004 R14: 00000000200004a0 R15: 0000000000000004 [ 2813.683861] FAULT_INJECTION: forcing a failure. [ 2813.683861] name failslab, interval 1, probability 0, space 0, times 0 [ 2813.686316] CPU: 0 PID: 13927 Comm: syz-executor.7 Not tainted 5.10.163 #1 [ 2813.687757] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2813.689488] Call Trace: [ 2813.690079] dump_stack+0x107/0x167 [ 2813.690851] should_fail.cold+0x5/0xa [ 2813.691650] ? create_object.isra.0+0x3a/0xa20 [ 2813.692609] should_failslab+0x5/0x20 [ 2813.693405] kmem_cache_alloc+0x5b/0x360 [ 2813.694291] create_object.isra.0+0x3a/0xa20 [ 2813.695212] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 2813.696296] kmem_cache_alloc+0x159/0x360 [ 2813.697176] __kernfs_new_node+0xd4/0x850 [ 2813.698063] ? kernfs_dop_revalidate+0x3a0/0x3a0 [ 2813.699078] ? __mutex_unlock_slowpath+0xe1/0x600 [ 2813.700092] ? wait_for_completion_io+0x270/0x270 [ 2813.701141] ? kernfs_next_descendant_post+0x1a7/0x2a0 [ 2813.702268] kernfs_new_node+0x93/0x120 [ 2813.703127] __kernfs_create_file+0x51/0x350 [ 2813.704058] sysfs_add_file_mode_ns+0x221/0x560 [ 2813.705063] internal_create_group+0x324/0xb30 [ 2813.706038] ? sysfs_remove_group+0x170/0x170 [ 2813.706985] ? lockdep_init_map_type+0x2c7/0x780 [ 2813.707986] ? blk_queue_flag_set+0x22/0x30 [ 2813.708887] ? __loop_update_dio+0x2d2/0x690 [ 2813.709836] loop_configure+0x954/0x1480 [ 2813.710701] lo_ioctl+0xa72/0x1760 [ 2813.711451] ? avc_has_extended_perms+0x7f1/0xec0 [ 2813.712464] ? loop_set_status_old+0x250/0x250 [ 2813.713426] ? avc_ss_reset+0x180/0x180 [ 2813.714271] ? find_held_lock+0x2c/0x110 [ 2813.715134] ? __lock_acquire+0xbb1/0x5b00 [ 2813.716075] ? selinux_inode_getsecctx+0x90/0x90 [ 2813.717067] ? generic_block_fiemap+0x60/0x60 [ 2813.718061] ? loop_set_status_old+0x250/0x250 [ 2813.719019] blkdev_ioctl+0x291/0x710 [ 2813.719829] ? blkdev_common_ioctl+0x1870/0x1870 [ 2813.720828] ? selinux_file_ioctl+0xb1/0x260 [ 2813.721780] block_ioctl+0xf9/0x140 [ 2813.722560] ? blkdev_read_iter+0x1c0/0x1c0 [ 2813.723465] __x64_sys_ioctl+0x19a/0x210 [ 2813.724323] do_syscall_64+0x33/0x40 [ 2813.725114] entry_SYSCALL_64_after_hwframe+0x61/0xc6 [ 2813.726199] RIP: 0033:0x7fca424058d7 [ 2813.726984] Code: 3c 1c 48 f7 d8 49 39 c4 72 b8 e8 a4 54 02 00 85 c0 78 bd 48 83 c4 08 4c 89 e0 5b 41 5c c3 0f 1f 44 00 00 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2813.730856] RSP: 002b:00007fca3f97af48 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 2813.732451] RAX: ffffffffffffffda RBX: 00007fca4244f970 RCX: 00007fca424058d7 [ 2813.733951] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 2813.735441] RBP: 0000000000000005 R08: 0000000000000000 R09: ffffffffffffffff [ 2813.736952] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000004 [ 2813.738468] R13: 0000000000000004 R14: 00000000200004a0 R15: 0000000000000004 [ 2813.740146] hpet: Lost 2 RTC interrupts [ 2813.749170] FAULT_INJECTION: forcing a failure. [ 2813.749170] name failslab, interval 1, probability 0, space 0, times 0 [ 2813.751007] EXT4-fs (loop6): mounted filesystem without journal. Opts: ,errors=continue [ 2813.751545] CPU: 0 PID: 13932 Comm: syz-executor.1 Not tainted 5.10.163 #1 [ 2813.751565] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2813.756391] Call Trace: [ 2813.756949] dump_stack+0x107/0x167 [ 2813.757725] should_fail.cold+0x5/0xa [ 2813.758521] ? xas_alloc+0x336/0x440 [ 2813.759304] should_failslab+0x5/0x20 [ 2813.760101] kmem_cache_alloc+0x5b/0x360 [ 2813.760953] ? trace_hardirqs_on+0x5b/0x180 [ 2813.761870] xas_alloc+0x336/0x440 [ 2813.762631] xas_create+0x60b/0x1040 [ 2813.763430] xas_create_range+0x18b/0x600 [ 2813.764321] shmem_add_to_page_cache+0x759/0x1150 [ 2813.765345] ? shmem_getattr+0x180/0x180 [ 2813.766253] shmem_getpage_gfp.constprop.0+0x64a/0x1920 [ 2813.767390] ? shmem_unuse_inode+0xed0/0xed0 [ 2813.768314] ? ktime_get_coarse_real_ts64+0x15a/0x190 [ 2813.769401] ? iov_iter_fault_in_readable+0x9a/0x410 [ 2813.770497] shmem_write_begin+0xf7/0x1d0 [ 2813.771375] generic_perform_write+0x20a/0x4f0 [ 2813.772350] ? trace_event_raw_event_file_check_and_advance_wb_err+0x4a0/0x4a0 [ 2813.773889] ? evict_inodes+0x420/0x420 [ 2813.774724] ? generic_write_checks+0x2ad/0x390 [ 2813.775703] __generic_file_write_iter+0x39d/0x5d0 [ 2813.776741] generic_file_write_iter+0xdb/0x230 [ 2813.777725] ? iov_iter_init+0x3c/0x130 [ 2813.778564] new_sync_write+0x42c/0x660 [ 2813.779401] ? new_sync_read+0x6f0/0x6f0 [ 2813.780254] ? __x64_sys_pwrite64+0x201/0x260 [ 2813.781208] ? lock_release+0x6b0/0x6b0 [ 2813.782056] ? selinux_file_permission+0x36/0x510 [ 2813.783089] vfs_write+0x747/0xa30 [ 2813.783842] __x64_sys_pwrite64+0x201/0x260 [ 2813.784752] ? ksys_pwrite64+0x1b0/0x1b0 [ 2813.785634] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 2813.786732] ? syscall_enter_from_user_mode+0x1d/0x50 [ 2813.787809] do_syscall_64+0x33/0x40 [ 2813.788591] entry_SYSCALL_64_after_hwframe+0x61/0xc6 [ 2813.789679] RIP: 0033:0x7f26b1c43ab7 [ 2813.790459] Code: 08 89 3c 24 48 89 4c 24 18 e8 e5 f8 ff ff 4c 8b 54 24 18 48 8b 54 24 10 41 89 c0 48 8b 74 24 08 8b 3c 24 b8 12 00 00 00 0f 05 <48> 3d 00 f0 ff ff 77 31 44 89 c7 48 89 04 24 e8 15 f9 ff ff 48 8b [ 2813.794317] RSP: 002b:00007f26af205f20 EFLAGS: 00000293 ORIG_RAX: 0000000000000012 [ 2813.795910] RAX: ffffffffffffffda RBX: 00007f26b1cda970 RCX: 00007f26b1c43ab7 [ 2813.797398] RDX: 000000000000001d RSI: 0000000020011600 RDI: 0000000000000004 [ 2813.798896] RBP: 0000000000000004 R08: 0000000000000000 R09: ffffffffffffffff [ 2813.800415] R10: 0000000000002100 R11: 0000000000000293 R12: 0000000000000004 [ 2813.801924] R13: 0000000000000004 R14: 0000000020000488 R15: 0000000000000003 [ 2813.803663] hpet: Lost 3 RTC interrupts 12:49:26 executing program 0: r0 = creat(&(0x7f0000000040)='./file0\x00', 0x0) r1 = creat(&(0x7f0000000040)='./file0\x00', 0x0) fallocate(r1, 0x0, 0x0, 0x8800000) r2 = socket$nl_route(0x10, 0x3, 0x0) fallocate(r2, 0x54, 0x8000, 0x0) fallocate(r1, 0x3, 0x0, 0x8000) fallocate(r0, 0x0, 0x0, 0x8800000) [ 2813.825558] EXT4-fs (loop2): unsupported inode size: 0 [ 2813.826952] EXT4-fs (loop2): blocksize: 2048 [ 2813.844519] FAULT_INJECTION: forcing a failure. [ 2813.844519] name failslab, interval 1, probability 0, space 0, times 0 [ 2813.847010] CPU: 1 PID: 13933 Comm: syz-executor.5 Not tainted 5.10.163 #1 [ 2813.848437] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2813.850252] Call Trace: [ 2813.850794] dump_stack+0x107/0x167 [ 2813.851556] should_fail.cold+0x5/0xa [ 2813.852343] ? create_object.isra.0+0x3a/0xa20 [ 2813.853284] should_failslab+0x5/0x20 [ 2813.854072] kmem_cache_alloc+0x5b/0x360 [ 2813.854906] create_object.isra.0+0x3a/0xa20 [ 2813.855933] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 2813.857107] kmem_cache_alloc+0x159/0x360 [ 2813.858072] __kernfs_new_node+0xd4/0x850 [ 2813.858926] ? kernfs_dop_revalidate+0x3a0/0x3a0 [ 2813.860006] ? __mutex_unlock_slowpath+0xe1/0x600 [ 2813.860994] ? wait_for_completion_io+0x270/0x270 [ 2813.861989] ? kernfs_next_descendant_post+0x1a7/0x2a0 [ 2813.863070] kernfs_new_node+0x93/0x120 [ 2813.863892] __kernfs_create_file+0x51/0x350 [ 2813.864801] sysfs_add_file_mode_ns+0x221/0x560 [ 2813.865827] internal_create_group+0x324/0xb30 [ 2813.866787] ? sysfs_remove_group+0x170/0x170 [ 2813.867706] ? lockdep_init_map_type+0x2c7/0x780 [ 2813.868675] ? blk_queue_flag_set+0x22/0x30 [ 2813.869568] ? __loop_update_dio+0x2d2/0x690 [ 2813.870483] loop_configure+0x954/0x1480 [ 2813.871332] lo_ioctl+0xa72/0x1760 [ 2813.872070] ? avc_has_extended_perms+0x7f1/0xec0 [ 2813.873064] ? loop_set_status_old+0x250/0x250 [ 2813.874108] ? avc_ss_reset+0x180/0x180 [ 2813.875023] ? find_held_lock+0x2c/0x110 [ 2813.876027] ? __lock_acquire+0xbb1/0x5b00 [ 2813.876944] ? selinux_inode_getsecctx+0x90/0x90 [ 2813.877989] ? generic_block_fiemap+0x60/0x60 [ 2813.878913] ? loop_set_status_old+0x250/0x250 [ 2813.879839] blkdev_ioctl+0x291/0x710 [ 2813.880615] ? blkdev_common_ioctl+0x1870/0x1870 [ 2813.881667] ? selinux_file_ioctl+0xb1/0x260 [ 2813.882569] block_ioctl+0xf9/0x140 [ 2813.883322] ? blkdev_read_iter+0x1c0/0x1c0 [ 2813.884202] __x64_sys_ioctl+0x19a/0x210 [ 2813.885039] do_syscall_64+0x33/0x40 [ 2813.885808] entry_SYSCALL_64_after_hwframe+0x61/0xc6 [ 2813.886874] RIP: 0033:0x7f8cf18208d7 [ 2813.887633] Code: 3c 1c 48 f7 d8 49 39 c4 72 b8 e8 a4 54 02 00 85 c0 78 bd 48 83 c4 08 4c 89 e0 5b 41 5c c3 0f 1f 44 00 00 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2813.891756] RSP: 002b:00007f8ceed95f48 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 2813.893442] RAX: ffffffffffffffda RBX: 00007f8cf186a970 RCX: 00007f8cf18208d7 [ 2813.894908] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 2813.896363] RBP: 0000000000000005 R08: 0000000000000000 R09: ffffffffffffffff [ 2813.897897] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000004 [ 2813.899354] R13: 0000000000000004 R14: 00000000200004a0 R15: 0000000000000004 [ 2813.943785] EXT4-fs (loop1): mounted filesystem without journal. Opts: ,errors=continue [ 2813.945793] EXT4-fs (loop7): mounted filesystem without journal. Opts: ,errors=continue [ 2813.986796] EXT4-fs (loop5): mounted filesystem without journal. Opts: ,errors=continue [ 2814.142615] EXT4-fs (loop4): bad geometry: block count 128 exceeds size of device (8 blocks) 12:49:45 executing program 6: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000180)) (fail_nth: 30) 12:49:45 executing program 0: r0 = creat(&(0x7f0000000080)='./file0\x00', 0xa0) r1 = creat(&(0x7f0000000040)='./file0\x00', 0x0) r2 = syz_genetlink_get_family_id$nl80211(&(0x7f00000000c0), r1) sendmsg$NL80211_CMD_GET_POWER_SAVE(r1, &(0x7f0000000180)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f0000000140)={&(0x7f0000000100)={0x14, r2, 0x100, 0x70bd25, 0x25dfdbfe, {{}, {@void, @void}}, ["", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x4}, 0x5) fallocate(r1, 0x0, 0x0, 0x8800000) fallocate(r1, 0x3, 0x0, 0x8000) fallocate(r0, 0x0, 0x0, 0x8800000) 12:49:45 executing program 4: ioctl$RTC_UIE_ON(0xffffffffffffffff, 0x7003) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x2}, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0xfffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = dup2(0xffffffffffffffff, r0) perf_event_open(&(0x7f00000001c0)={0x2, 0x80, 0x8, 0x9, 0x4, 0x1, 0x0, 0x3b3d, 0x200a0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x2, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0xffff, 0x1, @perf_config_ext={0x7, 0x1}, 0x281, 0xffffffff, 0x4, 0x3, 0x401, 0xffffff47, 0x401, 0x0, 0x3, 0x0, 0x415}, 0x0, 0xffffffffffffffff, r0, 0x1) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000180)) pkey_mprotect(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x0, 0xffffffffffffffff) pkey_mprotect(&(0x7f0000ff4000/0x4000)=nil, 0x4000, 0x0, 0xffffffffffffffff) socket$inet_udp(0x2, 0x2, 0x0) getsockopt$inet_int(0xffffffffffffffff, 0x0, 0xe, 0x0, &(0x7f0000000280)) ioctl$sock_SIOCADDDLCI(0xffffffffffffffff, 0x8980, 0x0) ioctl$RTC_ALM_SET(r1, 0x40247007, 0x0) mmap$IORING_OFF_SQES(&(0x7f0000ff3000/0x2000)=nil, 0x2000, 0x2000002, 0x10, r1, 0x10000000) getsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, 0x0, 0x0) 12:49:45 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000180)) (fail_nth: 42) 12:49:45 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b000000", 0x58, 0x400}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000180)) 12:49:45 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000180)) (fail_nth: 19) 12:49:45 executing program 7: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000180)) (fail_nth: 44) 12:49:45 executing program 3: r0 = perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fcntl$setlease(r0, 0x400, 0x1) r1 = syz_init_net_socket$802154_raw(0x24, 0x3, 0x0) ioctl$sock_SIOCGIFVLAN_ADD_VLAN_CMD(r1, 0x8982, &(0x7f00000001c0)={0x0, 'veth0_virt_wifi\x00', {0x3}, 0x5d0}) syz_init_net_socket$802154_raw(0x24, 0x3, 0x0) r2 = perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x94, 0x0, 0x0, 0x4, 0x0, 0x0, 0x2008, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) flistxattr(r2, 0x0, 0x0) perf_event_open(&(0x7f0000000140)={0x4, 0x80, 0x7, 0x1f, 0x7, 0x1f, 0x0, 0x20, 0x104, 0x4, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x40, 0x2, @perf_bp={&(0x7f0000000100), 0x2}, 0x44001, 0x4, 0x800, 0x4, 0x5, 0x7, 0x7f, 0x0, 0x24, 0x0, 0x20}, 0xffffffffffffffff, 0xf, r2, 0x9) sendmmsg$inet6(r1, &(0x7f0000004d00)=[{{0x0, 0x0, &(0x7f00000004c0)}}], 0x1, 0x0) bind$802154_raw(r1, &(0x7f0000000000)={0x24, @short={0x2, 0x2, 0xaaa0}}, 0x14) ioctl$BTRFS_IOC_QGROUP_ASSIGN(r1, 0x40189429, &(0x7f00000000c0)={0x1, 0x116, 0x9}) [ 2833.214585] FAULT_INJECTION: forcing a failure. [ 2833.214585] name failslab, interval 1, probability 0, space 0, times 0 [ 2833.217339] CPU: 0 PID: 13963 Comm: syz-executor.1 Not tainted 5.10.163 #1 [ 2833.219003] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2833.220984] Call Trace: [ 2833.221626] dump_stack+0x107/0x167 [ 2833.222522] should_fail.cold+0x5/0xa [ 2833.223447] ? create_object.isra.0+0x3a/0xa20 [ 2833.224550] should_failslab+0x5/0x20 [ 2833.225487] kmem_cache_alloc+0x5b/0x360 [ 2833.226486] create_object.isra.0+0x3a/0xa20 [ 2833.227549] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 2833.228778] kmem_cache_alloc+0x159/0x360 [ 2833.229808] ? trace_hardirqs_on+0x5b/0x180 [ 2833.230863] xas_alloc+0x336/0x440 [ 2833.231732] xas_create+0x60b/0x1040 [ 2833.232546] xas_create_range+0x18b/0x600 [ 2833.233430] shmem_add_to_page_cache+0x759/0x1150 [ 2833.234453] ? shmem_getattr+0x180/0x180 [ 2833.235318] shmem_getpage_gfp.constprop.0+0x64a/0x1920 [ 2833.236448] ? shmem_unuse_inode+0xed0/0xed0 [ 2833.237367] ? ktime_get_coarse_real_ts64+0x15a/0x190 [ 2833.238460] ? iov_iter_fault_in_readable+0x9a/0x410 [ 2833.239513] shmem_write_begin+0xf7/0x1d0 [ 2833.240387] generic_perform_write+0x20a/0x4f0 [ 2833.241352] ? trace_event_raw_event_file_check_and_advance_wb_err+0x4a0/0x4a0 [ 2833.242876] ? evict_inodes+0x420/0x420 [ 2833.243705] ? generic_write_checks+0x2ad/0x390 [ 2833.244680] __generic_file_write_iter+0x39d/0x5d0 [ 2833.245702] generic_file_write_iter+0xdb/0x230 [ 2833.246678] ? iov_iter_init+0x3c/0x130 [ 2833.247504] new_sync_write+0x42c/0x660 [ 2833.248334] ? new_sync_read+0x6f0/0x6f0 [ 2833.249174] ? __x64_sys_pwrite64+0x201/0x260 [ 2833.250126] ? lock_release+0x6b0/0x6b0 [ 2833.250946] ? selinux_file_permission+0x36/0x510 [ 2833.251973] vfs_write+0x747/0xa30 [ 2833.252721] __x64_sys_pwrite64+0x201/0x260 [ 2833.253612] ? ksys_pwrite64+0x1b0/0x1b0 [ 2833.254473] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 2833.255557] ? syscall_enter_from_user_mode+0x1d/0x50 [ 2833.256632] do_syscall_64+0x33/0x40 [ 2833.257410] entry_SYSCALL_64_after_hwframe+0x61/0xc6 [ 2833.258477] RIP: 0033:0x7f26b1c43ab7 [ 2833.259243] Code: 08 89 3c 24 48 89 4c 24 18 e8 e5 f8 ff ff 4c 8b 54 24 18 48 8b 54 24 10 41 89 c0 48 8b 74 24 08 8b 3c 24 b8 12 00 00 00 0f 05 <48> 3d 00 f0 ff ff 77 31 44 89 c7 48 89 04 24 e8 15 f9 ff ff 48 8b [ 2833.263069] RSP: 002b:00007f26af205f20 EFLAGS: 00000293 ORIG_RAX: 0000000000000012 [ 2833.264636] RAX: ffffffffffffffda RBX: 00007f26b1cda970 RCX: 00007f26b1c43ab7 [ 2833.266128] RDX: 000000000000001d RSI: 0000000020011600 RDI: 0000000000000004 [ 2833.267599] RBP: 0000000000000004 R08: 0000000000000000 R09: ffffffffffffffff [ 2833.269061] R10: 0000000000002100 R11: 0000000000000293 R12: 0000000000000004 [ 2833.270544] R13: 0000000000000004 R14: 0000000020000488 R15: 0000000000000003 [ 2833.272289] hpet: Lost 3 RTC interrupts [ 2833.275065] FAULT_INJECTION: forcing a failure. [ 2833.275065] name failslab, interval 1, probability 0, space 0, times 0 [ 2833.277922] CPU: 1 PID: 13965 Comm: syz-executor.5 Not tainted 5.10.163 #1 [ 2833.279587] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2833.281313] Call Trace: [ 2833.281856] dump_stack+0x107/0x167 [ 2833.282587] should_fail.cold+0x5/0xa [ 2833.283354] ? __kernfs_new_node+0xd4/0x850 [ 2833.284224] should_failslab+0x5/0x20 [ 2833.284985] kmem_cache_alloc+0x5b/0x360 [ 2833.285827] __kernfs_new_node+0xd4/0x850 [ 2833.286666] ? kernfs_dop_revalidate+0x3a0/0x3a0 [ 2833.287624] ? __mutex_unlock_slowpath+0xe1/0x600 [ 2833.288604] ? wait_for_completion_io+0x270/0x270 [ 2833.289580] ? kernfs_next_descendant_post+0x1a7/0x2a0 [ 2833.290652] kernfs_new_node+0x93/0x120 [ 2833.291461] __kernfs_create_file+0x51/0x350 [ 2833.292357] sysfs_add_file_mode_ns+0x221/0x560 [ 2833.293297] internal_create_group+0x324/0xb30 [ 2833.294231] ? sysfs_remove_group+0x170/0x170 [ 2833.295132] ? lockdep_init_map_type+0x2c7/0x780 [ 2833.296086] ? blk_queue_flag_set+0x22/0x30 [ 2833.296946] ? __loop_update_dio+0x2d2/0x690 [ 2833.297847] loop_configure+0x954/0x1480 [ 2833.298686] lo_ioctl+0xa72/0x1760 [ 2833.299400] ? avc_has_extended_perms+0x7f1/0xec0 [ 2833.300379] ? loop_set_status_old+0x250/0x250 [ 2833.301298] ? avc_ss_reset+0x180/0x180 [ 2833.302142] ? find_held_lock+0x2c/0x110 [ 2833.302972] ? __lock_acquire+0xbb1/0x5b00 [ 2833.303940] ? selinux_inode_getsecctx+0x90/0x90 [ 2833.304889] ? generic_block_fiemap+0x60/0x60 [ 2833.305808] ? loop_set_status_old+0x250/0x250 [ 2833.306724] blkdev_ioctl+0x291/0x710 [ 2833.307488] ? blkdev_common_ioctl+0x1870/0x1870 [ 2833.308440] ? selinux_file_ioctl+0xb1/0x260 [ 2833.309327] block_ioctl+0xf9/0x140 [ 2833.310057] ? blkdev_read_iter+0x1c0/0x1c0 [ 2833.310917] __x64_sys_ioctl+0x19a/0x210 [ 2833.311734] do_syscall_64+0x33/0x40 [ 2833.312478] entry_SYSCALL_64_after_hwframe+0x61/0xc6 [ 2833.313498] RIP: 0033:0x7f8cf18208d7 [ 2833.314253] Code: 3c 1c 48 f7 d8 49 39 c4 72 b8 e8 a4 54 02 00 85 c0 78 bd 48 83 c4 08 4c 89 e0 5b 41 5c c3 0f 1f 44 00 00 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2833.317895] RSP: 002b:00007f8ceed95f48 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 2833.319455] RAX: ffffffffffffffda RBX: 00007f8cf186a970 RCX: 00007f8cf18208d7 [ 2833.320901] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 2833.322355] RBP: 0000000000000005 R08: 0000000000000000 R09: ffffffffffffffff [ 2833.323808] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000004 [ 2833.325305] R13: 0000000000000004 R14: 00000000200004a0 R15: 0000000000000004 [ 2833.355887] FAULT_INJECTION: forcing a failure. [ 2833.355887] name failslab, interval 1, probability 0, space 0, times 0 [ 2833.358837] CPU: 0 PID: 13971 Comm: syz-executor.6 Not tainted 5.10.163 #1 [ 2833.360498] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2833.362490] Call Trace: [ 2833.363132] dump_stack+0x107/0x167 [ 2833.364010] should_fail.cold+0x5/0xa [ 2833.364930] ? __kernfs_new_node+0xd4/0x850 [ 2833.366018] should_failslab+0x5/0x20 [ 2833.366930] kmem_cache_alloc+0x5b/0x360 [ 2833.367906] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 2833.369173] __kernfs_new_node+0xd4/0x850 [ 2833.370182] ? perf_trace_lock+0xac/0x490 [ 2833.371175] ? perf_trace_lock+0xac/0x490 [ 2833.372171] ? lock_chain_count+0x20/0x20 [ 2833.373167] ? kernfs_dop_revalidate+0x3a0/0x3a0 [ 2833.374310] ? __lockdep_reset_lock+0x180/0x180 [ 2833.375411] ? __lockdep_reset_lock+0x180/0x180 [ 2833.376525] ? find_held_lock+0x2c/0x110 [ 2833.377498] ? set_user_nice.part.0+0x2fd/0x760 [ 2833.378622] kernfs_create_dir_ns+0x9c/0x230 [ 2833.379681] internal_create_group+0x793/0xb30 [ 2833.380783] ? set_user_nice.part.0+0x2fd/0x760 [ 2833.381916] ? sysfs_remove_group+0x170/0x170 [ 2833.382996] ? lockdep_init_map_type+0x2c7/0x780 [ 2833.384142] ? blk_queue_flag_set+0x22/0x30 [ 2833.385170] ? __loop_update_dio+0x2d2/0x690 [ 2833.386237] loop_configure+0x954/0x1480 [ 2833.387234] lo_ioctl+0xa72/0x1760 [ 2833.388094] ? avc_has_extended_perms+0x7f1/0xec0 [ 2833.389254] ? loop_set_status_old+0x250/0x250 [ 2833.390382] ? avc_ss_reset+0x180/0x180 [ 2833.391343] ? find_held_lock+0x2c/0x110 [ 2833.392337] ? __lock_acquire+0xbb1/0x5b00 [ 2833.393434] ? selinux_inode_getsecctx+0x90/0x90 [ 2833.394591] ? generic_block_fiemap+0x60/0x60 [ 2833.395694] ? loop_set_status_old+0x250/0x250 [ 2833.396804] blkdev_ioctl+0x291/0x710 [ 2833.397728] ? blkdev_common_ioctl+0x1870/0x1870 [ 2833.398893] ? selinux_file_ioctl+0xb1/0x260 [ 2833.400118] block_ioctl+0xf9/0x140 [ 2833.401001] ? blkdev_read_iter+0x1c0/0x1c0 [ 2833.402058] __x64_sys_ioctl+0x19a/0x210 [ 2833.403051] do_syscall_64+0x33/0x40 [ 2833.403960] entry_SYSCALL_64_after_hwframe+0x61/0xc6 [ 2833.405207] RIP: 0033:0x7f290af698d7 [ 2833.406115] Code: 3c 1c 48 f7 d8 49 39 c4 72 b8 e8 a4 54 02 00 85 c0 78 bd 48 83 c4 08 4c 89 e0 5b 41 5c c3 0f 1f 44 00 00 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2833.410073] RSP: 002b:00007f29084def48 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 2833.411626] RAX: ffffffffffffffda RBX: 00007f290afb3970 RCX: 00007f290af698d7 [ 2833.413084] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 2833.414552] RBP: 0000000000000005 R08: 0000000000000000 R09: ffffffffffffffff [ 2833.416007] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000004 [ 2833.417460] R13: 0000000000000004 R14: 00000000200004a0 R15: 0000000000000004 [ 2833.419170] hpet: Lost 3 RTC interrupts [ 2833.438661] FAULT_INJECTION: forcing a failure. [ 2833.438661] name failslab, interval 1, probability 0, space 0, times 0 [ 2833.441268] CPU: 1 PID: 13973 Comm: syz-executor.7 Not tainted 5.10.163 #1 [ 2833.442666] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2833.444440] Call Trace: [ 2833.444998] dump_stack+0x107/0x167 [ 2833.445764] should_fail.cold+0x5/0xa [ 2833.446543] ? kobject_uevent_env+0x22b/0xf90 [ 2833.447467] ? dev_uevent_filter+0xd0/0xd0 [ 2833.448333] should_failslab+0x5/0x20 [ 2833.449124] kmem_cache_alloc_trace+0x55/0x360 [ 2833.450057] ? loop_configure+0xad2/0x1480 [ 2833.450924] ? dev_uevent_filter+0xd0/0xd0 [ 2833.451789] kobject_uevent_env+0x22b/0xf90 [ 2833.452653] loop_configure+0x116c/0x1480 [ 2833.453505] lo_ioctl+0xa72/0x1760 [ 2833.454228] ? avc_has_extended_perms+0x7f1/0xec0 [ 2833.455190] ? loop_set_status_old+0x250/0x250 [ 2833.456102] ? avc_ss_reset+0x180/0x180 [ 2833.456915] ? __lock_acquire+0xbb1/0x5b00 [ 2833.457822] ? selinux_inode_getsecctx+0x90/0x90 [ 2833.458757] ? generic_block_fiemap+0x60/0x60 [ 2833.459680] ? loop_set_status_old+0x250/0x250 [ 2833.460582] blkdev_ioctl+0x291/0x710 [ 2833.461341] ? blkdev_common_ioctl+0x1870/0x1870 [ 2833.462308] ? selinux_file_ioctl+0xb1/0x260 [ 2833.463187] block_ioctl+0xf9/0x140 [ 2833.463909] ? blkdev_read_iter+0x1c0/0x1c0 [ 2833.464766] __x64_sys_ioctl+0x19a/0x210 [ 2833.465577] do_syscall_64+0x33/0x40 [ 2833.466332] entry_SYSCALL_64_after_hwframe+0x61/0xc6 [ 2833.467355] RIP: 0033:0x7fca424058d7 [ 2833.468103] Code: 3c 1c 48 f7 d8 49 39 c4 72 b8 e8 a4 54 02 00 85 c0 78 bd 48 83 c4 08 4c 89 e0 5b 41 5c c3 0f 1f 44 00 00 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2833.471762] RSP: 002b:00007fca3f97af48 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 2833.473271] RAX: ffffffffffffffda RBX: 00007fca4244f970 RCX: 00007fca424058d7 [ 2833.474680] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 2833.476121] RBP: 0000000000000005 R08: 0000000000000000 R09: ffffffffffffffff [ 2833.477517] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000004 [ 2833.478926] R13: 0000000000000004 R14: 00000000200004a0 R15: 0000000000000004 [ 2833.508570] EXT4-fs (loop2): unsupported inode size: 0 [ 2833.509697] EXT4-fs (loop2): blocksize: 2048 [ 2833.512483] EXT4-fs (loop5): mounted filesystem without journal. Opts: ,errors=continue [ 2833.541669] EXT4-fs (loop1): mounted filesystem without journal. Opts: ,errors=continue [ 2833.559468] EXT4-fs (loop4): bad geometry: block count 128 exceeds size of device (8 blocks) 12:49:46 executing program 0: r0 = creat(&(0x7f0000000040)='./file0\x00', 0x0) r1 = creat(&(0x7f0000000040)='./file0\x00', 0x0) fallocate(r1, 0x0, 0x0, 0x8800000) fallocate(r1, 0x3, 0x0, 0x8000) fallocate(r0, 0x0, 0x0, 0x8800000) openat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x402142, 0x45a8395ace1efdb2) 12:49:46 executing program 3: recvmsg$unix(0xffffffffffffffff, &(0x7f0000000500)={&(0x7f00000000c0)=@abs, 0x6e, &(0x7f0000000000)=[{&(0x7f0000000140)=""/167, 0xa7}, {&(0x7f0000000200)=""/68, 0x44}, {&(0x7f0000000280)=""/222, 0xde}, {&(0x7f0000000380)=""/219, 0xdb}], 0x4, &(0x7f0000000480)=ANY=[@ANYBLOB="14000000000000000100000001000000", @ANYRES32, @ANYBLOB="000000001c000000000000000100000002000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="0000001e280000000000b6f00069201da5", @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB="1c000000000000000100000002000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB='\x00\x00\x00\x00'], 0x80}, 0x10040) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, r0, 0x0, 0xffffffffffffffff, 0x0) r1 = syz_init_net_socket$802154_raw(0x24, 0x3, 0x0) sendmmsg$inet6(r1, &(0x7f0000004d00)=[{{0x0, 0x0, &(0x7f00000004c0)}}], 0x1, 0x0) [ 2833.629656] EXT4-fs (loop6): mounted filesystem without journal. Opts: ,errors=continue 12:49:46 executing program 4: ioctl$RTC_UIE_ON(0xffffffffffffffff, 0x7003) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x2}, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0xfffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = dup2(0xffffffffffffffff, r0) perf_event_open(&(0x7f00000001c0)={0x2, 0x80, 0x8, 0x9, 0x4, 0x1, 0x0, 0x3b3d, 0x200a0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x2, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0xffff, 0x1, @perf_config_ext={0x7, 0x1}, 0x281, 0xffffffff, 0x4, 0x3, 0x401, 0xffffff47, 0x401, 0x0, 0x3, 0x0, 0x415}, 0x0, 0xffffffffffffffff, r0, 0x1) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000180)) pkey_mprotect(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x0, 0xffffffffffffffff) pkey_mprotect(&(0x7f0000ff4000/0x4000)=nil, 0x4000, 0x0, 0xffffffffffffffff) socket$inet_udp(0x2, 0x2, 0x0) getsockopt$inet_int(0xffffffffffffffff, 0x0, 0xe, 0x0, &(0x7f0000000280)) ioctl$sock_SIOCADDDLCI(0xffffffffffffffff, 0x8980, 0x0) ioctl$RTC_ALM_SET(r1, 0x40247007, 0x0) mmap$IORING_OFF_SQES(&(0x7f0000ff3000/0x2000)=nil, 0x2000, 0x2000002, 0x10, r1, 0x10000000) getsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, 0x0, 0x0) 12:49:46 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b000000", 0x58, 0x400}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000180)) 12:49:46 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000180)) (fail_nth: 43) 12:49:46 executing program 6: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000180)) (fail_nth: 31) 12:49:46 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000180)) (fail_nth: 20) [ 2833.734575] EXT4-fs (loop7): mounted filesystem without journal. Opts: ,errors=continue 12:49:46 executing program 7: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000180)) (fail_nth: 45) [ 2833.889671] FAULT_INJECTION: forcing a failure. [ 2833.889671] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 2833.892704] CPU: 0 PID: 14010 Comm: syz-executor.1 Not tainted 5.10.163 #1 [ 2833.894389] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2833.896351] Call Trace: [ 2833.897085] dump_stack+0x107/0x167 [ 2833.898106] should_fail.cold+0x5/0xa [ 2833.899181] iov_iter_copy_from_user_atomic+0x49b/0xdb0 [ 2833.900639] ? shmem_write_begin+0xf7/0x1d0 [ 2833.901816] ? shmem_write_begin+0x100/0x1d0 [ 2833.903020] generic_perform_write+0x279/0x4f0 [ 2833.904274] ? trace_event_raw_event_file_check_and_advance_wb_err+0x4a0/0x4a0 [ 2833.906244] ? evict_inodes+0x420/0x420 [ 2833.907178] ? generic_write_checks+0x2ad/0x390 [ 2833.908270] __generic_file_write_iter+0x39d/0x5d0 [ 2833.909433] generic_file_write_iter+0xdb/0x230 [ 2833.910531] ? iov_iter_init+0x3c/0x130 [ 2833.911469] new_sync_write+0x42c/0x660 [ 2833.912403] ? new_sync_read+0x6f0/0x6f0 [ 2833.913353] ? __x64_sys_pwrite64+0x201/0x260 [ 2833.914418] ? lock_release+0x6b0/0x6b0 [ 2833.915348] ? selinux_file_permission+0x36/0x510 [ 2833.916498] vfs_write+0x747/0xa30 [ 2833.917345] __x64_sys_pwrite64+0x201/0x260 [ 2833.918350] ? ksys_pwrite64+0x1b0/0x1b0 [ 2833.919300] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 2833.920513] ? syscall_enter_from_user_mode+0x1d/0x50 [ 2833.921705] do_syscall_64+0x33/0x40 [ 2833.922576] entry_SYSCALL_64_after_hwframe+0x61/0xc6 [ 2833.923756] RIP: 0033:0x7f26b1c43ab7 [ 2833.924614] Code: 08 89 3c 24 48 89 4c 24 18 e8 e5 f8 ff ff 4c 8b 54 24 18 48 8b 54 24 10 41 89 c0 48 8b 74 24 08 8b 3c 24 b8 12 00 00 00 0f 05 <48> 3d 00 f0 ff ff 77 31 44 89 c7 48 89 04 24 e8 15 f9 ff ff 48 8b [ 2833.928860] RSP: 002b:00007f26af205f20 EFLAGS: 00000293 ORIG_RAX: 0000000000000012 [ 2833.930633] RAX: ffffffffffffffda RBX: 00007f26b1cda970 RCX: 00007f26b1c43ab7 [ 2833.932270] RDX: 000000000000001d RSI: 0000000020011600 RDI: 0000000000000004 [ 2833.933928] RBP: 0000000000000004 R08: 0000000000000000 R09: ffffffffffffffff [ 2833.935570] R10: 0000000000002100 R11: 0000000000000293 R12: 0000000000000004 [ 2833.937202] R13: 0000000000000004 R14: 0000000020000488 R15: 0000000000000003 [ 2833.939059] hpet: Lost 2 RTC interrupts [ 2834.031284] EXT4-fs (loop4): bad geometry: block count 128 exceeds size of device (8 blocks) [ 2834.077062] FAULT_INJECTION: forcing a failure. [ 2834.077062] name failslab, interval 1, probability 0, space 0, times 0 [ 2834.078743] CPU: 1 PID: 14015 Comm: syz-executor.7 Not tainted 5.10.163 #1 [ 2834.079684] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2834.080820] Call Trace: [ 2834.081192] dump_stack+0x107/0x167 [ 2834.081692] should_fail.cold+0x5/0xa [ 2834.082231] ? create_object.isra.0+0x3a/0xa20 [ 2834.082858] should_failslab+0x5/0x20 [ 2834.083378] kmem_cache_alloc+0x5b/0x360 [ 2834.083944] create_object.isra.0+0x3a/0xa20 [ 2834.084587] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 2834.085282] kmem_cache_alloc+0x159/0x360 [ 2834.085871] radix_tree_node_alloc.constprop.0+0x1e3/0x300 [ 2834.086646] idr_get_free+0x4b5/0x8f0 [ 2834.087176] idr_alloc_u32+0x170/0x2d0 [ 2834.087728] ? __fprop_inc_percpu_max+0x130/0x130 [ 2834.088398] ? lock_acquire+0x197/0x490 [ 2834.088940] ? __kernfs_new_node+0xff/0x850 [ 2834.089553] idr_alloc_cyclic+0x102/0x230 [ 2834.090205] ? idr_alloc+0x130/0x130 [ 2834.090724] ? rwlock_bug.part.0+0x90/0x90 [ 2834.091314] __kernfs_new_node+0x117/0x850 [ 2834.091914] ? kernfs_dop_revalidate+0x3a0/0x3a0 [ 2834.092566] ? __mutex_unlock_slowpath+0xe1/0x600 [ 2834.093244] ? wait_for_completion_io+0x270/0x270 [ 2834.093928] ? kernfs_next_descendant_post+0x1a7/0x2a0 [ 2834.094668] kernfs_new_node+0x93/0x120 [ 2834.095227] __kernfs_create_file+0x51/0x350 [ 2834.095844] sysfs_add_file_mode_ns+0x221/0x560 [ 2834.096499] internal_create_group+0x324/0xb30 [ 2834.097138] ? sysfs_remove_group+0x170/0x170 [ 2834.097778] ? lockdep_init_map_type+0x2c7/0x780 [ 2834.098444] ? blk_queue_flag_set+0x22/0x30 [ 2834.099049] ? __loop_update_dio+0x2d2/0x690 [ 2834.099673] loop_configure+0x954/0x1480 [ 2834.100302] lo_ioctl+0xa72/0x1760 [ 2834.100803] ? avc_has_extended_perms+0x7f1/0xec0 [ 2834.101488] ? loop_set_status_old+0x250/0x250 [ 2834.102146] ? avc_ss_reset+0x180/0x180 [ 2834.102708] ? find_held_lock+0x2c/0x110 [ 2834.103292] ? __lock_acquire+0xbb1/0x5b00 [ 2834.103931] ? selinux_inode_getsecctx+0x90/0x90 [ 2834.104548] ? generic_block_fiemap+0x60/0x60 [ 2834.105190] ? loop_set_status_old+0x250/0x250 [ 2834.105842] blkdev_ioctl+0x291/0x710 [ 2834.106379] ? blkdev_common_ioctl+0x1870/0x1870 [ 2834.107057] ? selinux_file_ioctl+0xb1/0x260 [ 2834.107684] block_ioctl+0xf9/0x140 [ 2834.108191] ? blkdev_read_iter+0x1c0/0x1c0 [ 2834.108798] __x64_sys_ioctl+0x19a/0x210 [ 2834.109385] do_syscall_64+0x33/0x40 [ 2834.109927] entry_SYSCALL_64_after_hwframe+0x61/0xc6 [ 2834.110647] RIP: 0033:0x7fca424058d7 [ 2834.111175] Code: 3c 1c 48 f7 d8 49 39 c4 72 b8 e8 a4 54 02 00 85 c0 78 bd 48 83 c4 08 4c 89 e0 5b 41 5c c3 0f 1f 44 00 00 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2834.113775] RSP: 002b:00007fca3f97af48 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 2834.114846] RAX: ffffffffffffffda RBX: 00007fca4244f970 RCX: 00007fca424058d7 [ 2834.115886] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 2834.116861] RBP: 0000000000000005 R08: 0000000000000000 R09: ffffffffffffffff [ 2834.117854] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000004 [ 2834.118837] R13: 0000000000000004 R14: 00000000200004a0 R15: 0000000000000004 [ 2834.181415] EXT4-fs (loop7): mounted filesystem without journal. Opts: ,errors=continue 12:50:00 executing program 7: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000180)) (fail_nth: 46) 12:50:00 executing program 3: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x2, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f0000000300)={0x2, 0x80, 0x94, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c205, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) flistxattr(r0, 0x0, 0x0) perf_event_open$cgroup(&(0x7f0000000140)={0x4, 0x80, 0x8, 0x9b, 0x6, 0x5, 0x0, 0x7, 0x380a, 0x2, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x3, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0xff0000, 0x0, @perf_bp={&(0x7f0000000000), 0x2}, 0xa05, 0x11, 0x5, 0x1, 0x1ff, 0x1, 0x43e, 0x0, 0x1f, 0x0, 0x6}, 0xffffffffffffffff, 0x1, r0, 0x4) r1 = perf_event_open(&(0x7f00000000c0)={0x3, 0x80, 0x40, 0x7, 0x81, 0xda, 0x0, 0x1, 0x400, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x2, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0xfffffff7, 0x0, @perf_config_ext={0x1d0, 0x200}, 0x81, 0x6, 0x1f, 0x6, 0x81, 0x3ff, 0x1000, 0x0, 0x4, 0x0, 0xdbff}, 0xffffffffffffffff, 0xa, 0xffffffffffffffff, 0x8) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x2400, 0x0) r2 = syz_init_net_socket$802154_raw(0x24, 0x3, 0x0) r3 = accept4$inet6(0xffffffffffffffff, 0x0, &(0x7f00000001c0), 0x800) read(r3, &(0x7f0000000200)=""/209, 0xd1) sendmmsg$inet6(r2, &(0x7f0000004d00)=[{{0x0, 0x0, &(0x7f00000004c0)}}], 0x1, 0x0) 12:50:00 executing program 4: ioctl$RTC_UIE_ON(0xffffffffffffffff, 0x7003) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x2}, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0xfffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = dup2(0xffffffffffffffff, r0) perf_event_open(&(0x7f00000001c0)={0x2, 0x80, 0x8, 0x9, 0x4, 0x1, 0x0, 0x3b3d, 0x200a0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x2, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0xffff, 0x1, @perf_config_ext={0x7, 0x1}, 0x281, 0xffffffff, 0x4, 0x3, 0x401, 0xffffff47, 0x401, 0x0, 0x3, 0x0, 0x415}, 0x0, 0xffffffffffffffff, r0, 0x1) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000180)) pkey_mprotect(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x0, 0xffffffffffffffff) pkey_mprotect(&(0x7f0000ff4000/0x4000)=nil, 0x4000, 0x0, 0xffffffffffffffff) socket$inet_udp(0x2, 0x2, 0x0) getsockopt$inet_int(0xffffffffffffffff, 0x0, 0xe, 0x0, &(0x7f0000000280)) ioctl$sock_SIOCADDDLCI(0xffffffffffffffff, 0x8980, 0x0) ioctl$RTC_ALM_SET(r1, 0x40247007, 0x0) mmap$IORING_OFF_SQES(&(0x7f0000ff3000/0x2000)=nil, 0x2000, 0x2000002, 0x10, r1, 0x10000000) getsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, 0x0, 0x0) 12:50:00 executing program 6: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000180)) 12:50:00 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b000000", 0x58, 0x400}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000180)) 12:50:00 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000180)) 12:50:00 executing program 0: r0 = syz_init_net_socket$802154_raw(0x24, 0x3, 0x0) bind$802154_raw(r0, &(0x7f0000000040)={0x24, @short={0x2, 0x2367f916dda8ac21, 0xaaa0}}, 0x14) sendmmsg$inet6(r0, &(0x7f0000004d00)=[{{0x0, 0x0, &(0x7f00000004c0)=[{&(0x7f0000000080)='K', 0x4c}], 0x1}}], 0x7ffff000, 0x0) ioctl$INCFS_IOC_FILL_BLOCKS(r0, 0x80106720, &(0x7f0000000000)={0x4, &(0x7f0000001240)=[{0x6, 0x71, &(0x7f0000000080)="3cb23d9e427fbfa07850667c7083419e14be049f0aba5337ba711dacf8b3c5cb89c27c9371ab6582cfac3135b9c5bcdce07fe2d3bb1b0713ea4c64810a207d47e2a9254ccebf9d5869a8c9e3ef8240007d4d78da0456a0fda73d47170b0af90263e2ace28a30bee66086014b12631fb5e6", 0x1}, {0x3, 0x8d, &(0x7f0000000100)="c8350ac435a05f43d3834874e4605f19d5e59c34e93f9c743a1f671a66d3eaebbb41e60207c58a301c394d7595fbd591b856b72dea7e8708b698907d0ffb2985618620ed665491c7892bd9d1bfd09958274020fae129000ce381af9711bfde7d0ab968f097200bd398dca2e3b291097556352d66e0fb42890cd311ecca7764680a4bb2a870077c13c9946b46af", 0x1}, {0xfffffffb, 0x1000, &(0x7f00000001c0)="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", 0x1, 0x1}, {0x6, 0x75, &(0x7f00000011c0)="4bf0e17d44ccf7e7b01204b8419e6a69d9e6e994b85a6556d4e327175be04f785b20a528204ca6cfd67d7945e9e28d54075248dc4db24b46d6859b94b8a9292fce165dd491719970887144231bebd51ba024ab06a8fd4e4603b4b5752306761a091846614b26b29054d9e6327348d56c1a0790d016", 0x1}]}) r1 = creat(&(0x7f0000000040)='./file0\x00', 0x0) r2 = creat(&(0x7f0000000040)='./file0\x00', 0x0) fallocate(r2, 0x0, 0x0, 0x8800000) fallocate(r2, 0x3, 0x0, 0x8000) fallocate(r1, 0x0, 0x0, 0x8800000) r3 = syz_io_uring_complete(0x0) openat(r3, &(0x7f00000012c0)='./file0\x00', 0x50f340, 0x110) 12:50:00 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000180)) (fail_nth: 21) [ 2848.067796] FAULT_INJECTION: forcing a failure. [ 2848.067796] name failslab, interval 1, probability 0, space 0, times 0 [ 2848.070447] CPU: 0 PID: 14032 Comm: syz-executor.1 Not tainted 5.10.163 #1 [ 2848.070939] FAULT_INJECTION: forcing a failure. [ 2848.070939] name failslab, interval 1, probability 0, space 0, times 0 [ 2848.071894] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2848.071903] Call Trace: [ 2848.071932] dump_stack+0x107/0x167 [ 2848.071956] should_fail.cold+0x5/0xa [ 2848.071989] ? getname_flags.part.0+0x50/0x4f0 [ 2848.078983] should_failslab+0x5/0x20 [ 2848.079776] kmem_cache_alloc+0x5b/0x360 [ 2848.080638] getname_flags.part.0+0x50/0x4f0 [ 2848.081551] getname+0x8e/0xd0 [ 2848.082247] do_sys_openat2+0xf9/0x420 [ 2848.083064] ? build_open_flags+0x6f0/0x6f0 [ 2848.083980] ? rcu_read_lock_any_held+0x75/0xa0 [ 2848.084990] __x64_sys_openat+0x13f/0x1f0 [ 2848.085846] ? __ia32_sys_open+0x1c0/0x1c0 [ 2848.086757] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 2848.087840] ? syscall_enter_from_user_mode+0x1d/0x50 [ 2848.088905] do_syscall_64+0x33/0x40 [ 2848.089676] entry_SYSCALL_64_after_hwframe+0x61/0xc6 [ 2848.090746] RIP: 0033:0x7f26b1c43a04 [ 2848.091516] Code: 84 00 00 00 00 00 44 89 54 24 0c e8 96 f9 ff ff 44 8b 54 24 0c 44 89 e2 48 89 ee 41 89 c0 bf 9c ff ff ff b8 01 01 00 00 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 89 44 24 0c e8 c8 f9 ff ff 8b 44 [ 2848.095327] RSP: 002b:00007f26af205ed0 EFLAGS: 00000293 ORIG_RAX: 0000000000000101 [ 2848.096892] RAX: ffffffffffffffda RBX: 00007f26b1cda970 RCX: 00007f26b1c43a04 [ 2848.098366] RDX: 0000000000000002 RSI: 00007f26af206000 RDI: 00000000ffffff9c [ 2848.099836] RBP: 00007f26af206000 R08: 0000000000000000 R09: ffffffffffffffff [ 2848.101296] R10: 0000000000000000 R11: 0000000000000293 R12: 0000000000000002 [ 2848.102787] R13: 0000000000000004 R14: 00000000200004a0 R15: 0000000000000004 [ 2848.104287] CPU: 1 PID: 14030 Comm: syz-executor.7 Not tainted 5.10.163 #1 [ 2848.104469] hpet: Lost 1 RTC interrupts [ 2848.105793] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2848.108322] Call Trace: [ 2848.108880] dump_stack+0x107/0x167 [ 2848.109632] should_fail.cold+0x5/0xa [ 2848.110581] ? __kernfs_new_node+0xd4/0x850 [ 2848.111466] should_failslab+0x5/0x20 [ 2848.112246] kmem_cache_alloc+0x5b/0x360 [ 2848.113082] __kernfs_new_node+0xd4/0x850 [ 2848.114119] ? kernfs_dop_revalidate+0x3a0/0x3a0 [ 2848.115111] ? __mutex_unlock_slowpath+0xe1/0x600 [ 2848.116294] ? wait_for_completion_io+0x270/0x270 [ 2848.117379] ? kernfs_next_descendant_post+0x1a7/0x2a0 [ 2848.118500] kernfs_new_node+0x93/0x120 [ 2848.119434] __kernfs_create_file+0x51/0x350 [ 2848.120336] sysfs_add_file_mode_ns+0x221/0x560 [ 2848.121433] internal_create_group+0x324/0xb30 [ 2848.122428] ? sysfs_remove_group+0x170/0x170 [ 2848.123356] ? lockdep_init_map_type+0x2c7/0x780 [ 2848.124429] ? blk_queue_flag_set+0x22/0x30 [ 2848.125488] ? __loop_update_dio+0x2d2/0x690 [ 2848.126491] loop_configure+0x954/0x1480 [ 2848.127521] lo_ioctl+0xa72/0x1760 [ 2848.128405] ? avc_has_extended_perms+0x7f1/0xec0 [ 2848.129389] ? loop_set_status_old+0x250/0x250 [ 2848.130344] ? avc_ss_reset+0x180/0x180 [ 2848.131157] ? find_held_lock+0x2c/0x110 [ 2848.132064] ? __lock_acquire+0xbb1/0x5b00 [ 2848.132983] ? selinux_inode_getsecctx+0x90/0x90 [ 2848.133953] ? generic_block_fiemap+0x60/0x60 [ 2848.134893] ? loop_set_status_old+0x250/0x250 [ 2848.135818] blkdev_ioctl+0x291/0x710 [ 2848.136595] ? blkdev_common_ioctl+0x1870/0x1870 [ 2848.137569] ? selinux_file_ioctl+0xb1/0x260 [ 2848.138478] block_ioctl+0xf9/0x140 [ 2848.139221] ? blkdev_read_iter+0x1c0/0x1c0 [ 2848.140103] __x64_sys_ioctl+0x19a/0x210 [ 2848.140933] do_syscall_64+0x33/0x40 [ 2848.141690] entry_SYSCALL_64_after_hwframe+0x61/0xc6 [ 2848.142757] RIP: 0033:0x7fca424058d7 [ 2848.143516] Code: 3c 1c 48 f7 d8 49 39 c4 72 b8 e8 a4 54 02 00 85 c0 78 bd 48 83 c4 08 4c 89 e0 5b 41 5c c3 0f 1f 44 00 00 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2848.147361] RSP: 002b:00007fca3f97af48 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 2848.148930] RAX: ffffffffffffffda RBX: 00007fca4244f970 RCX: 00007fca424058d7 [ 2848.150416] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 2848.151872] RBP: 0000000000000005 R08: 0000000000000000 R09: ffffffffffffffff [ 2848.153349] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000004 [ 2848.154813] R13: 0000000000000004 R14: 00000000200004a0 R15: 0000000000000004 [ 2848.170358] ieee802154 phy0 wpan0: encryption failed: -22 12:50:01 executing program 3: r0 = syz_init_net_socket$802154_raw(0x24, 0x3, 0x0) r1 = signalfd4(r0, &(0x7f0000000000)={[0x5]}, 0x8, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r1, 0x40042409, 0x1) sendmmsg$inet6(r0, &(0x7f0000004d00)=[{{0x0, 0x0, &(0x7f0000000280)=[{&(0x7f00000000c0)="40f58f351330953d809d6df614f4582190ad081cc9262fbfec1cd2233a84d720e022c9fc0d8f5d58a8060740219c2e6d0b3521a9556847e93e27c1e0fbaf6e6b5b1869dad7489ab9082a46ad8ae6f7186aac82a5bb3bb69fe21eece991c84513cf6ed75b413632f8ef7f0dd0806ce5a2d268b38bd416fc77bc946718561c6f8467bfc31929558068b53b43dd86705e73", 0x90}, {&(0x7f0000000180)="ae7db178ee026c0ed12e33fc17227185c656f54b2b87f24db8772d5ffcbd7fb707ca5fbb19197e61fbb4d660fedf1409ad5f59bd3621c850912bc081ae9f83c91ad43680fccfd750ce4d49bf50385287c1ed0647a6aa79c07b9f2e64a2dc9c88bc6e51c5dafdb2bba09c3d6915db21dc77bb0b6503edf8c3cc3864ca56605c44e757973d200e3dfae9066aa511543452dcfe6ef4d2112726463faf7fdc3e13569a301631e7a50f8315c9bd36a1456eac1d3246f29e5f35e7f429b7fdb150d0bc556ced0ecdf1daef7b601cc989533a25243b57eedaf56b1e0b763ca47739d873c61ffbe78ff4cb694c49982aeff3a2fd7887569047", 0xf5}], 0x2}}], 0x1, 0x0) [ 2848.237254] EXT4-fs (loop2): unsupported inode size: 0 [ 2848.238461] EXT4-fs (loop2): blocksize: 2048 12:50:01 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000180)) (fail_nth: 22) [ 2848.263786] EXT4-fs (loop7): mounted filesystem without journal. Opts: ,errors=continue [ 2848.268611] EXT4-fs (loop5): mounted filesystem without journal. Opts: ,errors=continue [ 2848.275511] EXT4-fs (loop6): mounted filesystem without journal. Opts: ,errors=continue [ 2848.299223] ieee802154 phy0 wpan0: encryption failed: -22 [ 2848.323043] EXT4-fs (loop4): bad geometry: block count 128 exceeds size of device (8 blocks) 12:50:01 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b00000000", 0x59, 0x400}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000180)) 12:50:01 executing program 7: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000180)) (fail_nth: 47) [ 2848.394126] FAULT_INJECTION: forcing a failure. [ 2848.394126] name failslab, interval 1, probability 0, space 0, times 0 [ 2848.396450] CPU: 1 PID: 14056 Comm: syz-executor.1 Not tainted 5.10.163 #1 [ 2848.397982] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2848.399658] Call Trace: [ 2848.400211] dump_stack+0x107/0x167 [ 2848.400965] should_fail.cold+0x5/0xa [ 2848.401752] ? create_object.isra.0+0x3a/0xa20 [ 2848.402699] should_failslab+0x5/0x20 [ 2848.403478] kmem_cache_alloc+0x5b/0x360 [ 2848.404314] ? __generic_file_write_iter+0x1a4/0x5d0 [ 2848.405362] create_object.isra.0+0x3a/0xa20 [ 2848.406269] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 2848.407317] kmem_cache_alloc+0x159/0x360 [ 2848.408172] getname_flags.part.0+0x50/0x4f0 [ 2848.409195] getname+0x8e/0xd0 [ 2848.409878] do_sys_openat2+0xf9/0x420 [ 2848.410718] ? build_open_flags+0x6f0/0x6f0 [ 2848.411696] ? rcu_read_lock_any_held+0x75/0xa0 [ 2848.412973] __x64_sys_openat+0x13f/0x1f0 [ 2848.414025] ? __ia32_sys_open+0x1c0/0x1c0 [ 2848.415106] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 2848.416393] ? syscall_enter_from_user_mode+0x1d/0x50 [ 2848.417649] do_syscall_64+0x33/0x40 [ 2848.418603] entry_SYSCALL_64_after_hwframe+0x61/0xc6 [ 2848.419642] RIP: 0033:0x7f26b1c43a04 [ 2848.420399] Code: 84 00 00 00 00 00 44 89 54 24 0c e8 96 f9 ff ff 44 8b 54 24 0c 44 89 e2 48 89 ee 41 89 c0 bf 9c ff ff ff b8 01 01 00 00 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 89 44 24 0c e8 c8 f9 ff ff 8b 44 [ 2848.424229] RSP: 002b:00007f26af205ed0 EFLAGS: 00000293 ORIG_RAX: 0000000000000101 [ 2848.425786] RAX: ffffffffffffffda RBX: 00007f26b1cda970 RCX: 00007f26b1c43a04 [ 2848.427315] RDX: 0000000000000002 RSI: 00007f26af206000 RDI: 00000000ffffff9c [ 2848.428884] RBP: 00007f26af206000 R08: 0000000000000000 R09: ffffffffffffffff [ 2848.430407] R10: 0000000000000000 R11: 0000000000000293 R12: 0000000000000002 [ 2848.431880] R13: 0000000000000004 R14: 00000000200004a0 R15: 0000000000000004 12:50:01 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x2, 0x4, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000180)) 12:50:01 executing program 6: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x2, 0x4, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000180)) 12:50:01 executing program 3: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x300, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={0x0, 0xb}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_init_net_socket$802154_raw(0x24, 0x3, 0x0) sendmmsg$inet6(r0, &(0x7f0000004d00)=[{{0x0, 0x0, &(0x7f00000004c0)}}], 0x1, 0x0) 12:50:01 executing program 4: ioctl$RTC_UIE_ON(0xffffffffffffffff, 0x7003) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x2}, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0xfffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = dup2(0xffffffffffffffff, r0) perf_event_open(&(0x7f00000001c0)={0x2, 0x80, 0x8, 0x9, 0x4, 0x1, 0x0, 0x3b3d, 0x200a0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x2, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0xffff, 0x1, @perf_config_ext={0x7, 0x1}, 0x281, 0xffffffff, 0x4, 0x3, 0x401, 0xffffff47, 0x401, 0x0, 0x3, 0x0, 0x415}, 0x0, 0xffffffffffffffff, r0, 0x1) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000180)) pkey_mprotect(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x0, 0xffffffffffffffff) pkey_mprotect(&(0x7f0000ff4000/0x4000)=nil, 0x4000, 0x0, 0xffffffffffffffff) socket$inet_udp(0x2, 0x2, 0x0) getsockopt$inet_int(0xffffffffffffffff, 0x0, 0xe, 0x0, &(0x7f0000000280)) ioctl$sock_SIOCADDDLCI(0xffffffffffffffff, 0x8980, 0x0) ioctl$RTC_ALM_SET(r1, 0x40247007, 0x0) mmap$IORING_OFF_SQES(&(0x7f0000ff3000/0x2000)=nil, 0x2000, 0x2000002, 0x10, r1, 0x10000000) getsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, 0x0, 0x0) 12:50:01 executing program 0: r0 = creat(&(0x7f0000000040)='./file0\x00', 0x0) r1 = creat(&(0x7f0000000080)='./file0\x00', 0x79) fallocate(r1, 0x0, 0x0, 0x8800000) fallocate(r1, 0x3, 0x0, 0x8000) fallocate(r0, 0x0, 0x0, 0x8800000) [ 2848.598377] EXT4-fs (loop2): unsupported inode size: 0 [ 2848.599550] EXT4-fs (loop2): blocksize: 2048 [ 2848.614537] EXT4-fs (loop1): mounted filesystem without journal. Opts: ,errors=continue [ 2848.667715] FAULT_INJECTION: forcing a failure. [ 2848.667715] name failslab, interval 1, probability 0, space 0, times 0 [ 2848.670046] CPU: 0 PID: 14068 Comm: syz-executor.7 Not tainted 5.10.163 #1 [ 2848.671462] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2848.673162] Call Trace: [ 2848.673711] dump_stack+0x107/0x167 [ 2848.674495] should_fail.cold+0x5/0xa [ 2848.675277] ? create_object.isra.0+0x3a/0xa20 [ 2848.676221] should_failslab+0x5/0x20 [ 2848.677001] kmem_cache_alloc+0x5b/0x360 [ 2848.677836] ? kmem_cache_alloc_trace+0x151/0x360 [ 2848.678869] create_object.isra.0+0x3a/0xa20 [ 2848.679779] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 2848.680848] __kmalloc+0x16e/0x3f0 [ 2848.681591] kobject_get_path+0xc4/0x1d0 [ 2848.682454] kobject_uevent_env+0x251/0xf90 [ 2848.683360] loop_configure+0x116c/0x1480 [ 2848.684225] lo_ioctl+0xa72/0x1760 [ 2848.684964] ? avc_has_extended_perms+0x7f1/0xec0 [ 2848.685972] ? loop_set_status_old+0x250/0x250 [ 2848.686915] ? avc_ss_reset+0x180/0x180 [ 2848.687737] ? find_held_lock+0x2c/0x110 [ 2848.688579] ? __lock_acquire+0xbb1/0x5b00 [ 2848.689503] ? selinux_inode_getsecctx+0x90/0x90 [ 2848.690500] ? generic_block_fiemap+0x60/0x60 [ 2848.691435] ? loop_set_status_old+0x250/0x250 [ 2848.692367] blkdev_ioctl+0x291/0x710 [ 2848.693155] ? blkdev_common_ioctl+0x1870/0x1870 [ 2848.694243] ? selinux_file_ioctl+0xb1/0x260 [ 2848.695162] block_ioctl+0xf9/0x140 [ 2848.695908] ? blkdev_read_iter+0x1c0/0x1c0 [ 2848.696795] __x64_sys_ioctl+0x19a/0x210 [ 2848.697635] do_syscall_64+0x33/0x40 [ 2848.698421] entry_SYSCALL_64_after_hwframe+0x61/0xc6 [ 2848.699480] RIP: 0033:0x7fca424058d7 [ 2848.700247] Code: 3c 1c 48 f7 d8 49 39 c4 72 b8 e8 a4 54 02 00 85 c0 78 bd 48 83 c4 08 4c 89 e0 5b 41 5c c3 0f 1f 44 00 00 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2848.704010] RSP: 002b:00007fca3f97af48 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 2848.705566] RAX: ffffffffffffffda RBX: 00007fca4244f970 RCX: 00007fca424058d7 [ 2848.707035] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 2848.708497] RBP: 0000000000000005 R08: 0000000000000000 R09: ffffffffffffffff [ 2848.709975] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000004 [ 2848.711453] R13: 0000000000000004 R14: 00000000200004a0 R15: 0000000000000004 [ 2848.713088] hpet: Lost 2 RTC interrupts 12:50:01 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b00000000", 0x59, 0x400}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000180)) [ 2848.743219] EXT4-fs (loop7): mounted filesystem without journal. Opts: ,errors=continue [ 2848.830510] EXT4-fs (loop5): mounted filesystem without journal. Opts: ,errors=continue [ 2848.931680] EXT4-fs (loop4): bad geometry: block count 128 exceeds size of device (8 blocks) [ 2848.996257] EXT4-fs (loop2): unsupported inode size: 0 [ 2848.997416] EXT4-fs (loop2): blocksize: 2048 12:50:18 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000180)) (fail_nth: 23) 12:50:18 executing program 4: ioctl$RTC_UIE_ON(0xffffffffffffffff, 0x7003) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x2}, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0xfffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = dup2(0xffffffffffffffff, r0) perf_event_open(&(0x7f00000001c0)={0x2, 0x80, 0x8, 0x9, 0x4, 0x1, 0x0, 0x3b3d, 0x200a0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x2, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0xffff, 0x1, @perf_config_ext={0x7, 0x1}, 0x281, 0xffffffff, 0x4, 0x3, 0x401, 0xffffff47, 0x401, 0x0, 0x3, 0x0, 0x415}, 0x0, 0xffffffffffffffff, r0, 0x1) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000180)) pkey_mprotect(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x0, 0xffffffffffffffff) pkey_mprotect(&(0x7f0000ff4000/0x4000)=nil, 0x4000, 0x0, 0xffffffffffffffff) socket$inet_udp(0x2, 0x2, 0x0) getsockopt$inet_int(0xffffffffffffffff, 0x0, 0xe, 0x0, &(0x7f0000000280)) ioctl$sock_SIOCADDDLCI(0xffffffffffffffff, 0x8980, 0x0) ioctl$RTC_ALM_SET(r1, 0x40247007, 0x0) mmap$IORING_OFF_SQES(&(0x7f0000ff3000/0x2000)=nil, 0x2000, 0x2000002, 0x10, r1, 0x10000000) getsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, 0x0, 0x0) 12:50:18 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b00000000", 0x59, 0x400}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000180)) 12:50:18 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x3, 0x4, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000180)) 12:50:18 executing program 6: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x3, 0x4, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000180)) 12:50:18 executing program 0: r0 = creat(&(0x7f0000000040)='./file0\x00', 0x0) r1 = creat(&(0x7f0000000040)='./file0\x00', 0x0) fallocate(r1, 0x0, 0x0, 0x8800000) fallocate(r1, 0x3, 0x0, 0x8000) fallocate(r0, 0x0, 0x0, 0x8800000) ioctl$sock_SIOCSIFVLAN_DEL_VLAN_CMD(0xffffffffffffffff, 0x8983, &(0x7f0000000000)={0x1, 'veth1_to_hsr\x00', {}, 0xffb2}) 12:50:18 executing program 7: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000180)) (fail_nth: 48) 12:50:18 executing program 3: perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0x4, 0x0, 0x0, 0x20, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_init_net_socket$802154_raw(0x24, 0x3, 0x0) sendmmsg$inet6(r0, &(0x7f0000005b80)=[{{&(0x7f0000000000)={0xa, 0x4e24, 0xffffffff, @private0={0xfc, 0x0, '\x00', 0x1}, 0xffffffff}, 0x0, &(0x7f00000002c0)=[{&(0x7f0000000140)="9f2029d1832f6eae7724a0f9e00cc2e1f648cfffe9952143bbc9f8f6423141dbfdf01acb848eab15efedc01740d4ee0d8214cf88202370c0391f56b85db53c697024702aa7b21dfef2bcca85d46b16776cb2a02b95523c645a56dbb0d396a9dc9c6ca61b44e5ace1be51e84136003f010450f2780477c62c5bb0e9a511906027dd4a9412332bc2e8f01be389f5a7b9dbca0eb78f22d3acc6cd4b6503dede3b834c83db874a23c8c10e427a1d36cdcd56c179f091cb1c4affa79aebc85c66c32139cc6548d86d16cb938e"}, {&(0x7f0000000040)="5d403d27031c0ecf080e299b98f19d05978764f99e1911d5481f194ba4d1337f99d36d9f0457069c79084e66a5d4ec4874dfc0868ba8627f8cee9246c863145ee7d6debf0a3f3447c0d3e5e84f986719dcf351d5c2"}, {&(0x7f0000000240)="81c010365dc7717d98c2892b8fb875f92f07aa42f19e48701b7d7daef3f90d99fc46002eb6f4020688713ea65817d853415ad4c7905ba015be72e0399c1bc868373a9da9c5c3f6f5"}]}}, {{&(0x7f0000000300)={0xa, 0x4e22, 0x8, @ipv4={'\x00', '\xff\xff', @dev={0xac, 0x14, 0x14, 0x20}}, 0x7}, 0x0, &(0x7f00000004c0)=[{&(0x7f0000000340)="8cff188935c313341afb0c2db09a5954418c792d3d2ddb6c8a7083e976549bf1a16029c86c14ead32d0205a0a219229f00b055f8a853a7d548d9782033d746a7877536657cb3474b6f26df265b962aa98a7ed5333b86c256f2f9bd06e1077e13aee55884e04c0070827c"}, {&(0x7f00000003c0)="1f939bd36d549a63980f8745c146f547aaa371499e6e2be55dacd338ca48c9a21f5260cafeb2d5879a98c3951c5880eb2419bd963082e7d1ce3e05c086f7354caa1a524cd791f83d027a809645dbc1dace251962b12e3795116832a2f0d43e1ed984ea0b52105fcf2a9b07c1f0d2f967893cacd79f6928099b045e8a7af567a2bb05283613d4f7a91a1ea702eb5ec99ed3a73c9dea502c5d360ac9fb12d86ae21eeda2a6f5703df9606ac65219edc9f8366ec46bb9f92cce69c32da8efcbd9c52627329a7efc966f8759d0800ec05688e35023de02b5a5eb21581e9c7535290ad9e8d707ae5280f98fe6720d5716fb09e5"}], 0x0, &(0x7f0000000500)=[@dstopts_2292={{0x0, 0x29, 0x4, {0x3c, 0x0, '\x00', [@padn={0x1, 0x0, [0x0, 0x0]}]}}}, @dstopts_2292={{0x0, 0x29, 0x4, {0x3e, 0x0, '\x00', [@padn={0x1, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0]}, @padn={0x1, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}, @calipso={0x7, 0x0, {0x3, 0x0, 0x8, 0xfe01, [0x100000000, 0x2, 0x5, 0x1e, 0x5, 0x2, 0x10001]}}, @padn={0x1, 0x0, [0x0]}, @generic={0x9, 0x0, "d29b067f29b326b977964f439ff489e4ac8096c6169af82238bae0f791f42034379ca133386bc1e9121b9f04725bdba6d82191cfa2189f28752bdb25e4861f9ab1532e14399deabf3e64af1f144daeac2e5067e744c3b91b9843256bd0070ffc418f5fe5257513e59cc955d2b3ac2126e17e24984b2d364bf3954796d2fa684698909dbb1c5f08a10d4b3188df2f3f5bec7dbeef932cf0f690648f91acaabde7019ab9f74374d6203788440dc3016e1a84c795623ace5fdd948611c737340686a33d5c07d686bc79fa9ef04b3bc3273ee52d9d55ae5611bf22d8"}, @pad1, @padn={0x1, 0x0, [0x0, 0x0, 0x0]}]}}}, @hopopts_2292={{0x0, 0x29, 0x36, {0x0, 0x0, '\x00', [@enc_lim={0x4, 0x1, 0x4}, @ra={0x5, 0x2, 0x7}]}}}, @tclass={{0x0, 0x29, 0x43, 0x10001}}, @flowinfo={{0x0, 0x29, 0xb, 0x3}}]}}, {{0x0, 0x0, &(0x7f0000000900)=[{&(0x7f00000006c0)="9990c599f7ef9dd7979d7f096c015226036692c3bb9a1bfd217a53da2e5ecae4b6cfd9f32b39386038664e1e178ccac9bf69fed9bcf394036a73bf9ab537c807783327c445ab8c3849211046f9192aa50d16d0fdfd486785757bb77c"}, {&(0x7f0000000740)="ab938a6e081e8c00a674e7532e558e9d72f7e43a5f68e3d030c824456bf3f1d9749cf31f4807604422cca074fc314cf55c755eae3b4ca3e45272dd98b665502fe11a9e248a51652b30174123ed9b9a5aa7bc9552e4b9a79aea6a465e31e8aed3161b5ce37dfd0427a587590962f0d5f5e024d160686484397104b9106a25491cbcd2e7956d10ed788d59c6640ef9795167223a736f76a0febe3cd2eccae4d4"}, {&(0x7f0000000800)="56c3339ffa50e865775a262ce649ee156098307edd4bec09c979df7103268b6a8deac5d311fb84275048ded0928a9c281fafba0232436dcb10a1de4c4da6b4cc1d4050b431a4340a8f29b12f1fd79ac53023994e6e5cd233734212299da04f80dfb1d77d27fc8d3fec1207bf061e29903f0a04ce3526f9c9ada13425e682bea72e80db93a14f911adb3fe470664db41b7514b118aa79e34b42cb4f2116d214f727b1dc4f8641ce12b14147d57a9edd8e49ef8c729529e54cb08448586ba16aa3fd24b1c9de1daed00610b4039b5af43cfcda081548315ef07aee51f9c2cf5d26bc62fe2480e34212120441f205785c18be65535da41a6984e92bf49f"}], 0x0, &(0x7f0000000940)=[@dstopts_2292={{0x0, 0x29, 0x4, {0x5c, 0x0, '\x00', [@calipso={0x7, 0x0, {0x0, 0x0, 0x7f, 0x51, [0xe5]}}, @enc_lim, @generic={0x9, 0x0, "6a2badc74dca4fbb871a81680c434a2869119b4090e78dbc67e1b9c0c3d99c668fb6c6f2e77df6d7aece3830d2ab46f166651b7c702a8ac91b88eb46f46fb37daf147bc4a3b612a26d7198241d0793c740658aead4f86933363e06955f6017cbb9c0f0af4228a5"}]}}}, @flowinfo={{0x0, 0x29, 0xb, 0x6}}]}}, {{&(0x7f0000000a00)={0xa, 0x4e20, 0x4ee, @mcast1, 0x5}, 0x0, &(0x7f0000001ec0)=[{&(0x7f0000000a40)="c725af25b70cb74aca2da87175253167fd510e18733b9ecd9fdedad6f6de984ede5d8d959a0fe5d21571"}, {&(0x7f0000000a80)="10f7e85c45e2695a6bfefe6476209dee1f45bbd4f8afa108d3561faac86a9222e693fa3c49b6b989d432aaa7d6c68ef94de0a4a2088fd401a47f1c3ea543deacbef11486fe1b5ebc804f08cf5bee41e3433f21d521037a72c569c1766f8db3476a993560bdcc75920fc1d3a85822e2620262cb5afc3207e078fd95c5674a63004def3d402977a81e20964a056d1e4caf0a91d1c3bb48f8d4d850bde992eeb23a072e31a0d8757e6c1d4b6d507198d3f02713f3a82436688174617002f6170767a57c6068f6bc6e735caf492f8ba415f2d233f50bdb88c9b977173647"}, {&(0x7f0000000b80)="099c3cbfdc9fa2d621444ba45cd1edae8f9eb571720220433f6c054b6fd304c059b486c7cfb9f02fe42c29c012fae269f2912b6dfc0d5d8ce23eb641cab498376f03166c6db14835e2d7e60760f29de4300075dce9c9bb4be36e21e22ff02f323064f1"}, {&(0x7f0000000c00)="d26ef1af74852cf2a8df39a1fbedef8e14638f1b70c9f72054b110406afc83d445835db5d87bc6b862922ca382589ab41a7090fb93aafe9cf7c806705286a18763ec1cb55771f0f540f239b9f0705b9abf5171cd"}, {&(0x7f0000000c80)="715b8167fe7f4a6fb9f49c5ddd3e552453bd9c7988d27eec28f3f7e679619596ba823313810ea1b01006f029444dfed691acddfa4e22733717c4f49f4607f63a95f1c09163fdbebf"}, {&(0x7f0000000d00)="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"}, {&(0x7f0000001d00)="dfb61533ff3d7db624f9c2228d04579c4cb5c23d3c93ead58999ffca2e2f3716753cd51f70602351b930fcda029dd7f7786cedc30dd043f63f1d5c0ee9f4c62cc82dbce42467d151d62efc7cbe746a16ca27285fcd49288a90aa9e6746e3da2578ccb57df7f87e3299951a2ddf5e195511c50fe0"}, {&(0x7f0000001d80)="972dcb9666c298978dcc9e12602cd4efad78e0be8d50afa5a816eebac17ecd27a492e2d8cdd7fae42bc66d0c6c070be510b6818447b598d5e59425da39cbdc4411b7b85de37b7263165af8eaf1eb6323f2f60289bf2e18cbe5b1448af14b37407032ed39690280477d96d2c36587c839cc4844233a34595ac6b594e1d4827af45e311bdfc64345a0aacc9fd66612e033a0cdf5d269ff62b362f094ab55cfcdfebcfffc7c53330f3ba83c3494dfee626e4fc93e073967693edce42a4a804fa5c86610796948e986e00f9a4599922e9eb1be21197d"}, {&(0x7f0000001e80)}], 0x0, &(0x7f0000001f80)=[@hopopts_2292={{0x0, 0x29, 0x36, {0x6, 0x0, '\x00', [@pad1]}}}, @rthdr_2292={{0x0, 0x29, 0x39, {0x8e, 0x0, 0x1, 0x16, 0x0, [@loopback, @remote]}}}]}}, {{&(0x7f0000002000)={0xa, 0x4e20, 0x2, @remote, 0x488280}, 0x0, &(0x7f0000003440)=[{&(0x7f0000002040)="1cedfddd5e0675b211bdd4da3938473390c4fd696e1b4eefcef0c31b46e7ffcd830ce79e3fc27f45ac3a86898f8ecc642c31e54f26489ac0f9a155665619c06c139a99709cd13a"}, {&(0x7f00000020c0)="573a6ebf02dc03428f7e0167ddabdec4ec563d657bf55245f8f0d3c5701f6eb8a714433707ed5bb52bd767dc5d9729d2dfc36b2a8e9147bb3d2ea335abfe2b365dc4f37bea3bf144f569e030d5ae847842713e4fce586838b501774eaefc9e29de90f93e16427db0d0a532b95b1839aa0905c80de6404c169212607c24e5592bd88ba61f9545f8d5cdcaa297f29bf8b93f2945ce3d88cd"}, {&(0x7f0000002180)="caf682782815f4171ad1d33737dd9730ea5d65c4d7c0163148070fcf46d0d56cf8773b5b8daa7fcd401a550f2b4055ce2e3434722fd0323ff1035f6f935e0d26f3ffc5ec5715d49d40bfb4b44b7b0466d0d8579a738c999fdea154dc443816bae753133027bb3aecf323b7d2cc406e881d14b1f9bb7746fde385adbd9d810fb6239449b679b5bfd08203d387625a50de"}, {&(0x7f0000002240)="f56723517df9d75ce127279270e91e94ba7ba54543d9c6227883331f6121993834be5a4e29aaa5c0742c3c7c35d9121d0e1786f88aeed52292bdef00eecdc093d236d2833957af"}, {&(0x7f00000022c0)="ff2bc50364d43ade7defa9af94acbca65ef6c6b22d72f64e598d8cee97b4409bc7a2cb86a1946fee2cc87bd28102d268bb89a1df94348ab18f7f32f4fffb1db886836097fad7ce0cc147f641e24ca862756f862b1991b9df03dbc0ac70df2b9f782bc8c8080b60ad0179b4c8b793490f38537a0f6b5cacb136182f34a3d721eb5814a89b98d51513cddd2842bf2417e06d3a4ed9e5d2d4bc2ecf8c14456ad3c0ca1dcd8e93c6c3b78f5180352ab83d819bea7dd1718318a73cd106b882d1579349f88fa080cff330edace00cc53c89120d76b8b883df8e5cd00b9c5c9a3236121ca3bb325cc75fcc1695bde8ad82c3b6bbbb7e9db7bdfcd303dd36ef6aca74d7b5e0d4b43edf018adee6c6715e9d2ead42d792a161fbfd0dbe415bd33d26f477e48d99fc5d2b9d2dab1e8107d8d2a685913183fc5b5019e7319d07caa0d96a0a1dbc00f08e90d3b4902079710b4278ce882cb619f312117816c70f03272298bff487cf034ffeebe5b88f82e041b6d7016d42ce60bba30419ec2bbe820540607043c91e7192e384c2a64e330107da0eff8389fe05005cadd529ff252f528f6be8b6da32c614405f7f3bfc0fa76954951415994c02c305f593e9cf4283959a4b9c8fc1dd7d975edb2d7cda11c56d361cd298b0c968f81a4380c98d8a8160a280c129c85e0bcbb4064996bcffbf146dff7681a5c1d0e45583d713137843956a1f45c672de12e66d37b292d4603ac3f22dcf2794e05dfb334724db5ce09ece3fc4553fb2c0b1351c77a353021a21f6b5aa279745ae333492eaf77cd4c827c74cffe201c70a951a6968a0e0bb8cdced32975a0b0b8ac08360c7a637ca772844035978f94d301aed2df18e67bf76a4b0e4c9f7b5ba39fc75464c4473447d199482529fa439c870f52a9230e167fd4085d8a81cf9e4a8b3a61c951342d94332fc25939482e321f8dcce696f1c1f41077bfaf1e1573d054c57ce20635bfba9808695f40e3fde61540d23b2f70d9d97fa17deaa84ef09d049d9430f1246ac0fb49c8f2275e6404c623d0d2d105df1d04aa67783eefc78a144dea070351923d1452ae72dca934e345497a80d12299349a3fcd2ebbb3044445096ff147383988de20b1a8676c8b735612def6435d1bc68a6da5752d2ccf86b4490c37847aef05eb5542cc8c7ca52780afb945e008d3abc75a98b03bb9e8064c153163d6c7e16abf7a762094c3adfbfc89f85eba68dfe3bd6c673b09b4f8bef9115eb3bb0cfc393b4cba45cae844fb797281373f863f44b56eb3a07e3d0273524c00f12c4cee8329e1aefe2c5d8f9d4374479d02634bc4a4e7475f41cc138fd140bed477f362b23692a14bae6692640554a42b3d8f2dddcea365e9661510e3f1df8113d9f23cb209d3a784fed4d0e7b632d5d06b6607aad178faa8ea6ffe4464cbeebe25710822122da115f39c92f3fb6843e20ab3229ca3a9ac0fb4263e051f7598d3bf6e26b17de3d476f7a7c0ec1dbae712d914e945dfb1928ed1e27911f2d7b706f2dc25c3ec8485b187c9a2a0437f8970d0f04adb0722254a3496c8c235d607e6b7213057d52dfc9d1ca2d7c924b2f8ac8cf40de516ee9d43131e11b3dbafce7a9c6026d9c09168bc9f04e103d25ae8d8e8eb2eae48a6a75cbf3f43283eb29120bf0cd2b1c13a3eb1d09abdbbd4f8e29aff27f5ac51fd0b14aedd162b958970b1f08f1abe48f51cdeded6af152eb42fc7cae3fadd0d34df30b70a1a323b69b9787261c70f6706d89fe3b9a1a7e34478a421f06200ca575e39448d2f6c1217fc271488fa3aca93d233f118a20dd221b275aff76518a9c1dcbf3b677ce7b9684a5a17ba7dba951d08ece3b21c5345e1b0c84499379662fbde7cc5e844d579a1fbe84743d5d49fa8a3c9ed35e73f35d3ba981cd1e92a7e440cb4a15f43c6ee2d769cd2732d5f3da5a4f1e3798a0e0ba056d9194065da97925cb84010e72cc294a44fe4b68cec05c896f4bf9e9177c6aaa601c7b836a137761685d95e8ba54cde926d43d7f109f39b7323c96466d3c7e808812982a8aa1c59fa6a6bb890f9c1066cb952d092b526c81dafe84cc902b59dd82b2ad062d81ab0202693d79598268d77dac4b71d2619b77a9a28fbf583a4bca0f90ea1b68c6e2ab746cce62d03e3f44594f100839be279458a86d41a72d069a50e9a505d9f2211e313f00498734e81062a7902b99bab5b1d7b15cddb724c6d9387d945984c6e0b067f01f4a60e22c7059aba715b316a0a70cd51a6dffb084f82574e4eeea75d9a418e29db8a4bfb2481e00925040b581f69f04134434f2f320f7150050fc108d9a56928217e9983a48416373001d3be7c194460110d04d7a9b78d54ce0c6c9da84768e728b0844f8db198dded7c1335bd279e5f8c0ecf14d65f636d9eb2f83c18e5a7ca9226aca9dfcecfb269ea8dc818f7071d4381c5bcc9a2e9bd60c5a993b40b30be0a0094b27408749b41aa2369736cbf2b84eb67e31f5650c5f35565dcb10439d96c24243645ed6005d16377c69cec87e17aa2020cc68f44bce6bcd598fd9df457acffbffc512ba58da51ea6843ef0c1fa9f19c7376e48c11e63dfb6d08a9bc4752ff006ec05d605f9a0550f43469aea28a39c99529b7b278b2c821588c833c54a7102f2130476a6e03889b93b2fce42a6cbd95c7dbdaa21d77e3dadcd24ce9567be2c0ca7699c173bcdbfa4ee01b6891b3474b48b346cd8af7ec664df9cf8ef3cb4f686b6c391fec12aa2ac05416234aece57e6580a15de6ac717ea673271d8fda342fcfc8b6321e68aede09dd11ac91144a0324d00a8e8001844822014c13727f460445a610997a03a4cdb723ab8cacf5f71c74f6885c03cd1e2d1997009361db72a2846757caa38b6fd49014fe4dd9e303fec1c4ec706f2be7b7fd1b107584072747308698fd2255fabd3adb69d763120afb54dd48c4675e07d3956b455849980274054af491d883b99e96e5b24b4c07aa394b39d0ee4b7a03cb32a0a8d67d055b7808d98306c380eb8749ede42ca9964e3e35bb80311074dd7bbcb2e33be474f4f27dd83e813249119e8f8ea9fe4533330686a4af1756cc40a2dbfe480b88dc132a78b90df2759faa0307f405a4a860cb00ec6392ad04dafc1f04646df8c00291a531ad9ea2ef36ec26009c132b30d30e2723efc0cb326e65bf6ba433a32ea8fee33d6d126e01811fbf2fe49593158250947fe11ee5e55bc96ea73c9a39fe37fd3b144f0f163bda8e5189ec11e58c21c863f0e95d8ea38ebaf2961e6f7af7fc4dce9cbdb0e8970dd3c3388c8b8149bc238213cbb533d42eb094f87a8e75b7031c56239565927881003e6bcb363811984f80a5fbb000f00dda166aa7284fe10e49ee9da90fd04b61b27f35016927ee27257b4471cdcfd52e4e451722cc29a678914e034776d80b625e46beacbf02e5d61068696264506770447ea6384bf1514534a2c6e4050eb15b1c35d645adea96c2a5a953306c85a43dc1038f8b305a4cb98fec3034ce01b08d7690d2014997657e9859810b50bc19d311c9f94c8669a71293d99ebcb033880e69b4a0870dc55775f44797843a9d65eee86cb9ff73885e64eabb01b8010af8908689c3bd5fe426e4b663bcb6acf6c3ad5934c4b009a1bfc151972ca71c7cf6526dc4d0a7ca008f42ff729fa64b31e91b56f6c485a0fe0190c169282364303678fb67b7a3073b6bae20904cabf2685f96af1ad66b5e9714833bd3e7fdc6538b60e26b2b69f50133e50d0ab38a1a7efb3218b09b4676ed2e156e5601dc6fef24cfec882081f9303cb174e62b4c0bdd361335f3b10405099be74b16b25df43cd4210fdb63588497f8fc7e7fdc96d25088b5274fd57f1b2aeff23aae82d7372f0690c50af173b8d9f19af7c4a8b165de758e083342b63d2d0b5a701531bf8d82052a72a158a34bcb9ddb191a7d4dd307ffc9b144b2e89395a16ba06d01a476af3d10f1f061bfa31be82a64d71f946605e5f4b08bee30b61fe7b789e7115a589c2cb0d459d1d8dc3a74cee87586ec724feb5c12d968034bf9a98e253cdfb1144db308db86da5918b6815125404b46094a8c00e7a2a352dd057268ea34e05cc12e42eee83907e851ebb9dce72bbd458c6ae2465379899ae3ecfd81b3a9c86372b28ccff5513d26c8c0a952988121b710431ed564e403aff7b1345808977b90de835f3752a0bee73d16a1eb67f111625de54aae3779838ba865a642eb1c29eb671db23b355c503ea70a51146d7f1f50a60d5e54d5dc2cbe9d5f5283e9fb0b1e897141d3d4c7df01b922041cc2d9789610f5f24aa918d9a3949d10d17ee0fe835b85621cff888a5fd22a584614f39e6d291aedff13817b9119efd57716950ced9517935b85828c38c71b9d7f110af36116726f3e7acda65741844d08a786323720fb5e5410b36076c9a36f9ed5bcc01a4e793b9b7594854de1771b6c0d26f94c5102db128aaa60033603e929cca6eb8d5285db9c23adea108911ac0b7413d2dac182bc4f0b2321549b732efdf4525014945ccee2c5bad6de25ca516abcc1a586e746bc193c1b880aea626054e855426ef83e1a0f52280c1d7f519adcbe4fefd7b6e9452d1963e2788ddb4ab44d9ea7446a6250caebd0a3c72cd51fc06b6f5c8f40cbdd4addf65d26eed911c66a154717fcc08576c785cce40a5409503275376cd3e41601260c715e3a8d9a8f515a77d1d3e43b896bd408a589c21c93f497cbd59d30abb20905f4346b0b8acd3cbe4672cc0ba59c8fc838c966d3760e9542ca81e41c9de1dfd270f223df60662325d3063e20c40f99c39bf30c6a0e0f0bd66037c98c892d8bd6532969caa17f432cba605237f78b9e79da16231ebb7311dd0144297f35aff6f485c64afedf9480fa004529acdfcf2874276c4e45015339d40364614864a9689f13ef94a61c76ab0708afd17346a4bce06d660f5cca4a89c9b2049c3b2c034959115e08392e81077c947b41983099a6a3fec6658b5dfe5d160219f6f631451c28f76b87d528b8428d266cd35ea0412fe0a555d82332195de6a5269a5cf8d717856d09fbab3f714143d795521e934e7ba9971ac3e1d085ac7b46deee861f70e6bc13afafdbd7891214e771e2fc84808f36c39293bd8f74c848ddd0e40ddf79636ec9f1eb6aef39e80dd8db77d76646fab975058f34b1de4721a82e8ba13cc39823226e1d64b12203a9448952b68b9dae07676d193e42b81550195077e6937c0e2ab1a231c19dcc7e043f18b699bdaf7d9d4cc74b9807861ab23221408701ef8289eaf00fbde3d70ffaee52de9de3da3eeeedf567af12299da55459b1ac86d14e1ce3a469f98597f17556048977d84fb033699a6fb545a295da5656fefee73bbcc7f8993a93885150ae2a9776c5d9f6fff3061c36d940e479e7130eb39078dc5db8ea8fb738781b6fa0549e64b56b4aff24a2ed5b9587fec0311b8d7e974badb25e2225f60e951d2453bfb0403e500a4089834085cf9b42f96fa4273cc0476277ed5db16ca484f989105fda916984a6ff2f53d446f5bb22ae1f7aacbf8dd98d526c17b0932ac30239bef37c13c72aa898a0c9ac303af7a5b9ce7fe1b9fd6995a2a33bd379a30c7e775bc3e65c1c82224447f41776a8cf330e49862334537a9c81ed8f6fa7abff2aabeeb8714105979ab21d7cf65b1eccefae6f31b8df68ca6fb0911757bf092f56555705a791a938244a293206c2246c9674f2b98084bf27ce4436f9b4994e49c59d96208003ddcd10afe43446de3be7c22654128cdfda6e429613e39ac2524fec"}, {&(0x7f00000032c0)="e582fa3434bdca1efaec828201e421a5f0da91b8b4a31182ab268a178f7a55ac5c26af31f150b02487b0530df333266db6a672846d3337f50b16ad88decf20dc7786dd0176421c4235d49ebee2df2e37fa3689409c2c6d394f808666fc6585b4ccca52dc5537ea86db9163af707e7f9ce10232371165ac50798807c40abaa14062de3e7ef9cb6535cf910817d5c6542ca7f43c96e5910e"}, {&(0x7f0000003380)="66e1b840e724fdfb9b997556f7f31fa35889464c541d44127ec92fbed58c9a5a0c40d098f2f9836f6a05787618ff309502c144a76ea87d8d2425464ffbcc64c760f0eb9bb40a6f19416ea46b90fd454da0d56478d0b7600704cd509999d54403c213f6bc14a7f129c2b4ac3084094a4ad57bec9141db499209cb8350a16f87f472"}], 0x0, &(0x7f00000034c0)=[@hopopts_2292={{0x0, 0x29, 0x36, {0x89, 0x0, '\x00', [@generic={0xd1, 0x0, "ab5b0deaedb9484a5f1a39a55ea15ebde37b8069846039532ce5569202c5e32f8f07feba5e2f2dacfa6d4cb92d8333cd9bafa2d340c0ce5a95e40884262e8113336415ff8eb3590f7de92780d3c33e2fdd20533d789be8ecd549244abd7a5fc97c2225a1f5e62917a2731501a0e5262ebd1078e29615e5e37fd43d888fd7bb93e38bd428ece16da78649675bc2043fd0300b3d2662d08882bcd552b2fa9e18d4b381d8ffa81bb2eb78d4a2"}, @generic={0x5, 0x0, "0f476a8e4312420c9793ff3422d73fc394def092fb00a4f04cca81533141f8669f9f806e16903062d0b1c166eecc8659f331653e47dbc953792cd04497e86cf2ca2e15ad83a832ac60098e6730bbaaee8f81259fe2c24440aa31ca438a51ae89291e9ad2ee8f299a01fbcbb3b4ea9cbeeac2009843d4167e35437f835dc8b28a3c3377294e28987cf04e9e4f2824a82d67577751437a811ffc98"}, @enc_lim={0x4, 0x1, 0x8}, @padn={0x1, 0x0, [0x0, 0x0, 0x0]}, @enc_lim={0x4, 0x1, 0x1}, @generic={0x3f, 0x0, "4fa5c070af90f40283d10219de56d64f5a239ce312295eec4031f8e0cf1d20654651150f034f3463053a39ed158c885e36672a5fd6684839e9f9d7d941a021d263434e8b0e21010bc4995d6d9cde7ab2f2ffd1cb0e51817c80eb77478dcc11494030f5d878c72394a8ee4fd4e6581fd3da5c0934e7861aa4fd799217d5707654762fcf5d56fab1ea3da3a04ab460713bf15f6ca87d3e7871cb15bdd33fec14769118117d1179e770939c4ba542719fd5ec5c34edb69d270fe5160eaa9bfaea59b35679b834a73292ebaef8b7e05aa6135f7397f284a1"}]}}}, @dontfrag={{0x0, 0x29, 0x3e, 0x3}}, @rthdr={{0x0, 0x29, 0x39, {0x29, 0x0, 0x2, 0x1, 0x0, [@dev={0xfe, 0x80, '\x00', 0x14}, @loopback]}}}, @dstopts={{0x0, 0x29, 0x37, {0x0, 0x0, '\x00', [@jumbo={0xc2, 0x4, 0xfffffff9}, @calipso={0x7, 0x0, {0x0, 0x0, 0x4, 0xb0dc, [0x1f]}}, @calipso={0x7, 0x0, {0x1, 0x0, 0xea, 0x5, [0x400, 0x7, 0x7ff, 0x80, 0x4, 0x30ada262, 0x2]}}, @padn={0x1, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}, @pad1, @ra={0x5, 0x2, 0x7}, @padn={0x1, 0x0, [0x0, 0x0, 0x0]}, @enc_lim={0x4, 0x1, 0x1}]}}}, @tclass={{0x0, 0x29, 0x43, 0xfffffffa}}, @tclass={{0x0, 0x29, 0x43, 0xeb}}, @hopopts={{0x0, 0x29, 0x36, {0x2b, 0x0, '\x00', [@enc_lim={0x4, 0x1, 0x1}, @enc_lim, @jumbo={0xc2, 0x4, 0x1}]}}}, @rthdrdstopts={{0x0, 0x29, 0x37, {0x1d, 0x0, '\x00', [@jumbo, @padn={0x1, 0x0, [0x0]}, @calipso={0x7, 0x0, {0x0, 0x0, 0x9, 0xcaf1, [0x7, 0x20]}}, @jumbo={0xc2, 0x4, 0x40}, @generic={0xa3, 0x0, "19b16269cb4cc6e8b741175caf9762dbdcf351f852d7e7cec4d795639c705fa5ace1ff0791d8d63a5f6ae29718ca666ca9cc9926e96b6c07c1cb827c1324ccf5941f451bdd347021484275841f17ec8c22d50f62656755af28b2d2fdf5420871fc54d35b18b8c2647e1a3b0e9c955725c5bf701b818cab1a39569fbc8898aea43845e6375e92e31857df0315048add434c62a2837b8634b699a6b6297c1dc7cc0c47cde8e6126b7a69fe7a1c3128352ea3b5b5bf747707e2521234268a625c7a8d20d072d632ca"}]}}}, @rthdr={{0x0, 0x29, 0x39, {0x3b, 0x0, 0x0, 0xfe, 0x0, [@remote, @local, @private2={0xfc, 0x2, '\x00', 0x1}, @empty, @private2={0xfc, 0x2, '\x00', 0x1}, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}]}}}]}}, {{&(0x7f0000003a00)={0xa, 0x4e24, 0x10001, @remote, 0x8}, 0x0, &(0x7f0000005b00)=[{&(0x7f0000003a40)="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"}, {&(0x7f0000004a40)="3bac74dd06d51452658eaa00aabff48c547592f9b298b2e9def1808464afaaf7d584b54d61757f938ad2ffcd100c5540155aa6534f09198520ce9f39112d3b485959399f050deb57fbb93bb77eb8f06c3c60b5ec4ad2f920a6c99b5dcfc944b05eb4dbee80d6f2"}, {&(0x7f0000004ac0)="0745c6008d2fa6c58b10829ea1ab6b1038d14c74167093577d045590c0a05029ee0a45393e40f10e"}, {&(0x7f0000004b00)="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"}], 0x0, &(0x7f0000005b40)=[@flowinfo={{0x0, 0x29, 0xb, 0x574}}, @hoplimit={{0x0, 0x29, 0x34, 0x6}}]}}], 0x4000002, 0x0) [ 2865.445156] FAULT_INJECTION: forcing a failure. [ 2865.445156] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 2865.446948] CPU: 1 PID: 14100 Comm: syz-executor.1 Not tainted 5.10.163 #1 [ 2865.447988] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2865.449197] Call Trace: [ 2865.449605] dump_stack+0x107/0x167 [ 2865.450142] should_fail.cold+0x5/0xa [ 2865.450707] strncpy_from_user+0x34/0x470 [ 2865.451318] getname_flags.part.0+0x95/0x4f0 [ 2865.451965] getname+0x8e/0xd0 [ 2865.452431] do_sys_openat2+0xf9/0x420 [ 2865.453024] ? build_open_flags+0x6f0/0x6f0 [ 2865.453669] ? rcu_read_lock_any_held+0x75/0xa0 [ 2865.454354] __x64_sys_openat+0x13f/0x1f0 [ 2865.454917] FAULT_INJECTION: forcing a failure. [ 2865.454917] name failslab, interval 1, probability 0, space 0, times 0 [ 2865.454970] ? __ia32_sys_open+0x1c0/0x1c0 [ 2865.457386] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 2865.458208] ? syscall_enter_from_user_mode+0x1d/0x50 [ 2865.458938] do_syscall_64+0x33/0x40 [ 2865.459412] entry_SYSCALL_64_after_hwframe+0x61/0xc6 [ 2865.460178] RIP: 0033:0x7f26b1c43a04 [ 2865.460652] Code: 84 00 00 00 00 00 44 89 54 24 0c e8 96 f9 ff ff 44 8b 54 24 0c 44 89 e2 48 89 ee 41 89 c0 bf 9c ff ff ff b8 01 01 00 00 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 89 44 24 0c e8 c8 f9 ff ff 8b 44 [ 2865.462955] RSP: 002b:00007f26af205ed0 EFLAGS: 00000293 ORIG_RAX: 0000000000000101 [ 2865.463917] RAX: ffffffffffffffda RBX: 00007f26b1cda970 RCX: 00007f26b1c43a04 [ 2865.464807] RDX: 0000000000000002 RSI: 00007f26af206000 RDI: 00000000ffffff9c [ 2865.465695] RBP: 00007f26af206000 R08: 0000000000000000 R09: ffffffffffffffff [ 2865.466600] R10: 0000000000000000 R11: 0000000000000293 R12: 0000000000000002 [ 2865.467550] R13: 0000000000000004 R14: 00000000200004a0 R15: 0000000000000004 [ 2865.468522] CPU: 0 PID: 14102 Comm: syz-executor.7 Not tainted 5.10.163 #1 [ 2865.469499] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2865.470661] Call Trace: [ 2865.471033] dump_stack+0x107/0x167 [ 2865.471544] should_fail.cold+0x5/0xa [ 2865.472071] ? kobject_uevent_env+0x22b/0xf90 [ 2865.472686] ? dev_uevent_filter+0xd0/0xd0 [ 2865.473266] should_failslab+0x5/0x20 [ 2865.473794] kmem_cache_alloc_trace+0x55/0x360 [ 2865.474449] ? loop_configure+0xad2/0x1480 [ 2865.475028] ? dev_uevent_filter+0xd0/0xd0 [ 2865.475649] kobject_uevent_env+0x22b/0xf90 [ 2865.476255] loop_configure+0x116c/0x1480 [ 2865.476837] lo_ioctl+0xa72/0x1760 [ 2865.477435] ? avc_has_extended_perms+0x7f1/0xec0 [ 2865.478091] ? loop_set_status_old+0x250/0x250 [ 2865.478743] ? avc_ss_reset+0x180/0x180 [ 2865.479303] ? find_held_lock+0x2c/0x110 [ 2865.479868] ? __lock_acquire+0xbb1/0x5b00 [ 2865.480492] ? selinux_inode_getsecctx+0x90/0x90 [ 2865.481150] ? generic_block_fiemap+0x60/0x60 [ 2865.481774] ? loop_set_status_old+0x250/0x250 [ 2865.482418] blkdev_ioctl+0x291/0x710 [ 2865.482938] ? blkdev_common_ioctl+0x1870/0x1870 [ 2865.483614] ? selinux_file_ioctl+0xb1/0x260 [ 2865.484223] block_ioctl+0xf9/0x140 [ 2865.484729] ? blkdev_read_iter+0x1c0/0x1c0 [ 2865.485331] __x64_sys_ioctl+0x19a/0x210 [ 2865.485896] do_syscall_64+0x33/0x40 [ 2865.486448] entry_SYSCALL_64_after_hwframe+0x61/0xc6 [ 2865.487151] RIP: 0033:0x7fca424058d7 [ 2865.487673] Code: 3c 1c 48 f7 d8 49 39 c4 72 b8 e8 a4 54 02 00 85 c0 78 bd 48 83 c4 08 4c 89 e0 5b 41 5c c3 0f 1f 44 00 00 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2865.490219] RSP: 002b:00007fca3f97af48 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 2865.491281] RAX: ffffffffffffffda RBX: 00007fca4244f970 RCX: 00007fca424058d7 [ 2865.492271] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 2865.493261] RBP: 0000000000000005 R08: 0000000000000000 R09: ffffffffffffffff [ 2865.494263] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000004 [ 2865.495249] R13: 0000000000000004 R14: 00000000200004a0 R15: 0000000000000004 [ 2865.496370] hpet: Lost 1 RTC interrupts 12:50:18 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000180)) (fail_nth: 24) [ 2865.540919] EXT4-fs (loop2): unsupported inode size: 0 [ 2865.541817] EXT4-fs (loop2): blocksize: 2048 [ 2865.569664] EXT4-fs (loop4): bad geometry: block count 128 exceeds size of device (8 blocks) [ 2865.572141] EXT4-fs (loop6): mounted filesystem without journal. Opts: ,errors=continue [ 2865.572865] EXT4-fs (loop5): mounted filesystem without journal. Opts: ,errors=continue [ 2865.576071] EXT4-fs (loop7): mounted filesystem without journal. Opts: ,errors=continue 12:50:18 executing program 3: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000000)={'sit0\x00'}) r0 = syz_init_net_socket$802154_raw(0x24, 0x3, 0x0) sendmmsg$inet6(r0, &(0x7f0000004d00)=[{{0x0, 0x0, &(0x7f00000004c0)}}], 0x1, 0x0) r1 = syz_init_net_socket$802154_raw(0x24, 0x3, 0x0) bind$802154_raw(r1, &(0x7f0000000000)={0x24, @long={0x3, 0x2, {0xaaaaaaaaaaaa0002}}}, 0x14) bind$802154_raw(r1, &(0x7f0000000040)={0x24, @short={0x2, 0x2367f916dda8ac21, 0xaaa0}}, 0x14) sendmmsg$inet6(r1, &(0x7f0000004d00)=[{{0x0, 0x0, &(0x7f00000004c0)=[{&(0x7f0000000080)='K', 0x4c}], 0x1}}], 0x7ffff000, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f00000000c0)={'ip6gre0\x00'}) 12:50:18 executing program 6: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x4, 0x4, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000180)) [ 2865.660158] FAULT_INJECTION: forcing a failure. [ 2865.660158] name failslab, interval 1, probability 0, space 0, times 0 [ 2865.662764] CPU: 0 PID: 14123 Comm: syz-executor.1 Not tainted 5.10.163 #1 12:50:18 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000180)) [ 2865.664296] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2865.666153] Call Trace: [ 2865.666721] dump_stack+0x107/0x167 [ 2865.667494] should_fail.cold+0x5/0xa [ 2865.668296] ? __alloc_file+0x21/0x320 [ 2865.669114] ? __alloc_file+0x21/0x320 [ 2865.669924] should_failslab+0x5/0x20 [ 2865.670719] kmem_cache_alloc+0x5b/0x360 [ 2865.671575] __alloc_file+0x21/0x320 [ 2865.672356] alloc_empty_file+0x6d/0x170 [ 2865.673199] path_openat+0xde/0x26d0 [ 2865.673973] ? path_lookupat+0x860/0x860 [ 2865.674826] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 2865.676002] ? lock_acquire+0x197/0x490 [ 2865.676929] do_filp_open+0x190/0x3e0 [ 2865.677805] ? may_open_dev+0xf0/0xf0 [ 2865.678692] ? __alloc_fd+0x2a5/0x620 [ 2865.679565] ? lock_downgrade+0x6d0/0x6d0 [ 2865.680522] ? rwlock_bug.part.0+0x90/0x90 [ 2865.681504] ? _raw_spin_unlock+0x1a/0x30 [ 2865.682473] ? __alloc_fd+0x2a5/0x620 [ 2865.683361] do_sys_openat2+0x171/0x420 [ 2865.684280] ? build_open_flags+0x6f0/0x6f0 [ 2865.685283] ? rcu_read_lock_any_held+0x75/0xa0 [ 2865.686365] __x64_sys_openat+0x13f/0x1f0 [ 2865.687319] ? __ia32_sys_open+0x1c0/0x1c0 [ 2865.688298] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 2865.689502] ? syscall_enter_from_user_mode+0x1d/0x50 [ 2865.690709] do_syscall_64+0x33/0x40 [ 2865.691568] entry_SYSCALL_64_after_hwframe+0x61/0xc6 [ 2865.692744] RIP: 0033:0x7f26b1c43a04 [ 2865.693605] Code: 84 00 00 00 00 00 44 89 54 24 0c e8 96 f9 ff ff 44 8b 54 24 0c 44 89 e2 48 89 ee 41 89 c0 bf 9c ff ff ff b8 01 01 00 00 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 89 44 24 0c e8 c8 f9 ff ff 8b 44 [ 2865.697814] RSP: 002b:00007f26af205ed0 EFLAGS: 00000293 ORIG_RAX: 0000000000000101 [ 2865.699578] RAX: ffffffffffffffda RBX: 00007f26b1cda970 RCX: 00007f26b1c43a04 [ 2865.701209] RDX: 0000000000000002 RSI: 00007f26af206000 RDI: 00000000ffffff9c [ 2865.702850] RBP: 00007f26af206000 R08: 0000000000000000 R09: ffffffffffffffff [ 2865.704485] R10: 0000000000000000 R11: 0000000000000293 R12: 0000000000000002 [ 2865.706115] R13: 0000000000000004 R14: 00000000200004a0 R15: 0000000000000004 [ 2865.708063] hpet: Lost 2 RTC interrupts 12:50:18 executing program 0: r0 = creat(&(0x7f0000000040)='./file0\x00', 0x0) r1 = creat(&(0x7f0000000040)='./file0\x00', 0x0) fallocate(r1, 0x0, 0x0, 0x8800000) openat(r1, &(0x7f0000000000)='./file0\x00', 0x604040, 0xb) fallocate(r1, 0x3, 0x0, 0x8000) fallocate(r0, 0x0, 0x0, 0x8800000) [ 2865.834483] ieee802154 phy0 wpan0: encryption failed: -22 [ 2865.898150] EXT4-fs (loop2): VFS: Can't find ext4 filesystem [ 2865.928611] EXT4-fs (loop6): mounted filesystem without journal. Opts: ,errors=continue [ 2865.981652] ieee802154 phy0 wpan0: encryption failed: -22 2023/01/16 12:50:21 Manager.Poll call failed: read tcp 127.0.0.1:54406->127.0.0.1:43519: i/o timeout VM DIAGNOSIS: 12:55:19 Registers: info registers vcpu 0 RAX=ffffffff83e32480 RBX=ffffffff84e322c0 RCX=ffffffff83e19dcc RDX=0000000000000000 RSI=0000000000000000 RDI=ffffffff83e32843 RBP=fffffbfff09c6458 RSP=ffffffff84e07e40 R8 =0000000000000001 R9 =ffff88806ce3c12b R10=ffffed100d9c7825 R11=0000000000000001 R12=0000000000000000 R13=ffffffff85671988 R14=0000000000000000 R15=dffffc0000000000 RIP=ffffffff83e3248e RFL=00000206 [-----P-] CPL=0 II=0 A20=1 SMM=0 HLT=1 ES =0000 0000000000000000 00000000 00000000 CS =0010 0000000000000000 ffffffff 00a09b00 DPL=0 CS64 [-RA] SS =0018 0000000000000000 ffffffff 00c09300 DPL=0 DS [-WA] DS =0000 0000000000000000 00000000 00000000 FS =0000 0000000000000000 00000000 00000000 GS =0000 ffff88806ce00000 00000000 00000000 LDT=0000 fffffe0000000000 00000000 00000000 TR =0040 fffffe0000003000 00004087 00008b00 DPL=0 TSS64-busy GDT= fffffe0000001000 0000007f IDT= fffffe0000000000 00000fff CR0=80050033 CR2=000055b70351b52c CR3=000000000cc48000 CR4=00350ef0 DR0=0000000000000000 DR1=0000000000000000 DR2=0000000000000000 DR3=0000000000000000 DR6=00000000ffff0ff0 DR7=0000000000000600 EFER=0000000000000d01 FCW=037f FSW=0000 [ST=0] FTW=00 MXCSR=00001f80 FPR0=0000000000000000 0000 FPR1=0000000000000000 0000 FPR2=0000000000000000 0000 FPR3=0000000000000000 0000 FPR4=0000000000000000 0000 FPR5=0000000000000000 0000 FPR6=0000000000000000 0000 FPR7=0000000000000000 0000 XMM00=00000000000000000000000000000000 XMM01=00000000000000000000000000000000 XMM02=00000000000000000000000000000000 XMM03=746f72702f6374652f00656372000a23 XMM04=40404040404040404040404040404040 XMM05=5a5a5a5a5a5a5a5a5a5a5a5a5a5a5a5a XMM06=20202020202020202020202020202020 XMM07=00000000000000000000000000000000 XMM08=3270682820262620294c4c554e203d21 XMM09=00000000000000000000000000000000 XMM10=00000000000000000000000000000000 XMM11=00000000000000000000000000000000 XMM12=00000000000000000000000000000000 XMM13=00000000000000000000000000000000 XMM14=00000000000000000000000000000000 XMM15=00000000000000000000000000000000 info registers vcpu 1 RAX=ffffffff83e32480 RBX=ffff888008570000 RCX=ffffffff83e19dcc RDX=0000000000000000 RSI=0000000000000000 RDI=ffffffff83e32843 RBP=ffffed10010ae000 RSP=ffff88800857fe78 R8 =0000000000000001 R9 =ffff88806cf3c12b R10=ffffed100d9e7825 R11=0000000000000001 R12=0000000000000001 R13=ffffffff85671988 R14=0000000000000000 R15=dffffc0000000000 RIP=ffffffff83e3248e RFL=00000202 [-------] CPL=0 II=0 A20=1 SMM=0 HLT=1 ES =0000 0000000000000000 00000000 00000000 CS =0010 0000000000000000 ffffffff 00a09b00 DPL=0 CS64 [-RA] SS =0018 0000000000000000 ffffffff 00c09300 DPL=0 DS [-WA] DS =0000 0000000000000000 00000000 00000000 FS =0000 0000000000000000 00000000 00000000 GS =0000 ffff88806cf00000 00000000 00000000 LDT=0000 fffffe0000000000 00000000 00000000 TR =0040 fffffe000004a000 00004087 00008b00 DPL=0 TSS64-busy GDT= fffffe0000048000 0000007f IDT= fffffe0000000000 00000fff CR0=80050033 CR2=00007f7752651010 CR3=0000000016cb4000 CR4=00350ee0 DR0=0000000000000000 DR1=0000000000000000 DR2=0000000000000000 DR3=0000000000000000 DR6=00000000ffff0ff0 DR7=0000000000000400 EFER=0000000000000d01 FCW=037f FSW=0000 [ST=0] FTW=00 MXCSR=00001f80 FPR0=0000000000000000 0000 FPR1=0000000000000000 0000 FPR2=0000000000000000 0000 FPR3=0000000000000000 0000 FPR4=0000000000000000 0000 FPR5=0000000000000000 0000 FPR6=0000000000000000 0000 FPR7=0000000000000000 0000 XMM00=25252525252525252525252525252525 XMM01=ffff00ff0000ffff0000000000000000 XMM02=ffff0000000000ff0000000000000000 XMM03=732f646d65747379732f6e75722f2065 XMM04=40404040404040404040404040404040 XMM05=5a5a5a5a5a5a5a5a5a5a5a5a5a5a5a5a XMM06=20202020202020202020202020202020 XMM07=00000000000000000000000000000000 XMM08=000073252f732500242b5d2d5f392d30 XMM09=00000000000000000000000000000000 XMM10=00000000000000000000000000000000 XMM11=00000000000000000000000000000000 XMM12=00000000000000000000000000000000 XMM13=00000000000000000000000000000000 XMM14=00000000000000000000000000000000 XMM15=00000000000000000000000000000000