(0x7f00000000c0)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000d1f4655fd1f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b00000000020000280200000284", 0x62, 0x400}, {&(0x7f0000010400)="030000000400000005000000d4", 0xd, 0x800}, {&(0x7f0000010500)="ffffffffff070000000000000000000000000000000000000000000000000080ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff", 0x400, 0xc00}, {&(0x7f0000000000)="ed41000000040000d0f4655fd1f465", 0xf, 0x1600}], 0x0, &(0x7f0000000280)=ANY=[]) setxattr$trusted_overlay_upper(&(0x7f0000000540)='./file0\x00', &(0x7f0000000580), &(0x7f00000005c0)={0x0, 0xfb, 0x139, 0x0, 0x0, "eacbf6ff0bc36f5a7bb9fe2ee7bb1e01", "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"}, 0x139, 0x0) getxattr(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)=@random={'security.', ':\x00'}, &(0x7f0000000140)=""/55, 0x37) 00:03:29 executing program 4: r0 = seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x7fffffff}]}) writev(r0, &(0x7f0000000100)=[{&(0x7f0000000080)="82df10034d610cfbad484b32bc17d8356ced97f992c2b8a39c166100c47b62899a0b675903ec266f408f8f603f030c1fe77116c4f69dbe7450cd4e0c6dce2ea73d2aaa4cab33443d2c", 0x49}], 0x1) mprotect(&(0x7f0000ffe000/0x1000)=nil, 0x1000, 0x0) [ 479.577528] FAULT_INJECTION: forcing a failure. [ 479.577528] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 479.579211] CPU: 0 PID: 5730 Comm: syz-executor.6 Not tainted 5.10.49 #1 [ 479.581139] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS rel-1.14.0-0-g155821a1990b-prebuilt.qemu.org 04/01/2014 [ 479.582686] Call Trace: [ 479.583063] dump_stack+0x107/0x163 [ 479.583586] should_fail.cold+0x5/0xa [ 479.584122] _copy_to_user+0x2e/0x180 [ 479.584654] simple_read_from_buffer+0xcc/0x160 [ 479.585333] proc_fail_nth_read+0x194/0x220 [ 479.585941] ? proc_fault_inject_read+0x230/0x230 [ 479.586608] ? security_file_permission+0x24e/0x570 [ 479.587342] ? proc_fault_inject_read+0x230/0x230 [ 479.587972] vfs_read+0x228/0x580 [ 479.588402] ksys_read+0x12d/0x250 [ 479.588837] ? __ia32_sys_pwrite64+0x230/0x230 [ 479.589461] ? lockdep_hardirqs_on_prepare+0x273/0x3e0 [ 479.590158] ? syscall_enter_from_user_mode+0x1d/0x50 [ 479.590876] do_syscall_64+0x33/0x40 [ 479.591536] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 479.592200] RIP: 0033:0x41935c [ 479.592616] Code: ec 28 48 89 54 24 18 48 89 74 24 10 89 7c 24 08 e8 f9 fc ff ff 48 8b 54 24 18 48 8b 74 24 10 41 89 c0 8b 7c 24 08 31 c0 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 48 89 44 24 08 e8 2f fd ff ff 48 [ 479.595293] RSP: 002b:00007fda0b62b170 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 479.596457] RAX: ffffffffffffffda RBX: ffffffffffffffff RCX: 000000000041935c [ 479.597500] RDX: 000000000000000f RSI: 00007fda0b62b1e0 RDI: 0000000000000003 [ 479.598537] RBP: 00007fda0b62b1d0 R08: 0000000000000000 R09: 0000000000000000 [ 479.599580] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 479.600838] R13: 00007fff09276edf R14: 00007fda0b62b300 R15: 0000000000022000 [ 479.628152] EXT4-fs error (device loop3): ext4_fill_super:4947: inode #2: comm syz-executor.3: iget: root inode unallocated [ 479.630930] EXT4-fs error (device loop0): ext4_fill_super:4947: inode #2: comm syz-executor.0: iget: root inode unallocated [ 479.636073] EXT4-fs (loop0): get root inode failed [ 479.636968] EXT4-fs (loop0): mount failed [ 479.647538] EXT4-fs (loop3): get root inode failed [ 479.648221] EXT4-fs (loop3): mount failed 00:03:29 executing program 6: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000040)='proc\x00', 0x0, 0x0) pivot_root(&(0x7f0000000000)='./file0\x00', &(0x7f0000000240)='.\x00') 00:03:29 executing program 5: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x7fffffff}]}) signalfd4(0xffffffffffffffff, &(0x7f00000000c0)={[0x40000000000000]}, 0x8, 0x0) 00:03:29 executing program 2: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x7fffffff}]}) signalfd4(0xffffffffffffffff, &(0x7f00000000c0)={[0x300]}, 0x8, 0x0) 00:03:29 executing program 0: syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000d1f4655fd1f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b00000000020000280200000284", 0x62, 0x400}, {&(0x7f0000010400)="030000000400000005000000d4", 0xd, 0x800}, {&(0x7f0000010500)="ffffffffff070000000000000000000000000000000000000000000000000080ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff", 0x400, 0xc00}, {&(0x7f0000000000), 0x0, 0x1600}], 0x0, &(0x7f0000000280)=ANY=[]) setxattr$trusted_overlay_upper(&(0x7f0000000540)='./file0\x00', &(0x7f0000000580), &(0x7f00000005c0)={0x0, 0xfb, 0x139, 0x0, 0x0, "eacbf6ff0bc36f5a7bb9fe2ee7bb1e01", "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"}, 0x139, 0x0) 00:03:29 executing program 3: syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000d1f4655fd1f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b00000000020000280200000284", 0x62, 0x400}, {&(0x7f0000010400)="030000000400000005000000d4", 0xd, 0x800}, {&(0x7f0000010500)="ffffffffff070000000000000000000000000000000000000000000000000080ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff", 0x400, 0xc00}, {&(0x7f0000000000)="ed41000000040000d0f4655fd1f465", 0xf, 0x1600}], 0x0, &(0x7f0000000280)=ANY=[]) setxattr$trusted_overlay_upper(&(0x7f0000000540)='./file0\x00', &(0x7f0000000580), &(0x7f00000005c0)={0x0, 0xfb, 0x139, 0x0, 0x0, "eacbf6ff0bc36f5a7bb9fe2ee7bb1e01", "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"}, 0x139, 0x0) getxattr(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)=@random={'security.', ':\x00'}, &(0x7f0000000140)=""/55, 0x37) 00:03:29 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_TCP_CONGESTION(r0, 0x6, 0xd, 0x0, 0x0) ioctl(r0, 0xfff, &(0x7f0000000100)="4f1160825b6375ddd43aba") r1 = signalfd4(r0, &(0x7f0000000080)={[0x6]}, 0x8, 0x80000) sendmsg$inet6(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000200)="ecfc0d7d654b3dfe07458e3c6a3aa4070b7863bf7b85aa5f10cbfbecbf54575083a446621e548aa44ccc52a510fd9cb76a41ddc435a0f93133291d39918200d515aed3e6b952fb78e80eced5e82a1871370c10b5b403b6751463fae2133e9389d115e22063c9666d5c32d9e08600187d3231d4c64bd4e434058e58478f80ab133ba01ea75775922c33e5418d8d4bc9588bc1a02d3954a520b559948c2a6f1fcd423859d10c29420c134b30f108b8bdf0d57245770c4bd0462b58ac697e34096e182b417eb32b21168dcc237d43e1656732d7e744cffdff3538de10b8e427e5853a79dc604d41413d63c964590ed8b9d48065285f4a101265", 0xf8}], 0x1, &(0x7f0000000000), 0x33}, 0x200000d5) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0xa, &(0x7f0000000040)={0x0, &(0x7f0000000040)}) mprotect(&(0x7f0000ffe000/0x1000)=nil, 0x1000, 0x0) [ 479.830216] EXT4-fs error (device loop0): ext4_fill_super:4947: inode #2: comm syz-executor.0: iget: root inode unallocated [ 479.832285] EXT4-fs (loop0): get root inode failed [ 479.833142] EXT4-fs (loop0): mount failed 00:03:29 executing program 5: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x7fffffff}]}) signalfd4(0xffffffffffffffff, &(0x7f00000000c0)={[0x80ffff00000000]}, 0x8, 0x0) [ 479.875102] EXT4-fs error (device loop3): ext4_fill_super:4947: inode #2: comm syz-executor.3: iget: root inode unallocated [ 479.879627] EXT4-fs (loop3): get root inode failed [ 479.880445] EXT4-fs (loop3): mount failed 00:03:29 executing program 2: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x7fffffff}]}) signalfd4(0xffffffffffffffff, &(0x7f00000000c0)={[0x4000]}, 0x8, 0x0) 00:03:29 executing program 6: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) stat(&(0x7f0000001cc0)='.\x00', &(0x7f0000001c00)={0x0, 0x0, 0x0, 0x0, 0x0}) setresuid(0x0, r0, 0x0) r1 = syz_open_dev$tty20(0xc, 0x4, 0x0) fchown(r1, 0x0, 0xffffffffffffffff) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000140)='./file0/file0\x00', 0xfffffffffffffffd, 0x3, &(0x7f0000000440)=[{&(0x7f0000000180)="fd528895cd65782151de5681f8bd47054ee6ebf6734a6a78b2f20ceed37d16d8dd409d0304267767d1d46b217f847843d5c33f51feb5ee09af00e5a45e312e399c5050a28f0ab75a7828cd755bc5829afb9e686c4ccf33a9fdea4f6f39365db462a6118e0ace9d3827f97a7dde87bf137a3e46749d2c8308b7f669", 0x7b, 0x8}, {&(0x7f0000000280)="d5b7d16c1140905b6a0f00c10f37a24b9a95d5b0142b54b216a7c06936f71697a00175b6990cc5c4c5cb70692655eb81cf6dd40d505131948896f0fe8f7d6a626e1196455dc56e565c3ccafce1d9c8ccd4e14907130163f74a31fe4d6e9e3fb8f8d4d15d92df38c3e3880f54d02a9cb3bb1528f7d44a16cd188fc639ba0d9df9b105f852d169a1166ff1b3e81c67b00cacec26772fc2344f1058e9cdb4068a9789fcb62e3fc47d3173c22a5c742edd0044ced9d1dfbf04c3addebaa667a3dcda2d50a3c447ee197d7e", 0xc9, 0x9}, {&(0x7f0000000380)="5a47e9e86597a05b4d89df5b9c81fc02a53942ccb2f76ad8e0a86dc15a50b86c0831b79ca4372a06625bd79b1af464f0c3417cf557c8cc0173a811269ad5c6206e5c73ff9836de74dad64cdcf2590a0071936eeefabc1d10a7f699e26413b5306313a2b8d4db83e235ea6cf047f13d9ab0a472f04ff2d36954e81352472fec6af825cfe16cb9398636c4b9837a9c444ae066aafd63da1a2a79ad4e3bfb66840cc1a8c1c3efc3", 0xa6, 0x1}], 0x800004, &(0x7f00000004c0)={[{@grpjquota_path={'grpjquota', 0x3d, './file0'}}, {@nodelalloc}, {@nodiscard}, {@resuid={'resuid', 0x3d, r0}}, {@usrjquota_path={'usrjquota', 0x3d, './file0'}}, {@nogrpid}], [{@pcr={'pcr', 0x3d, 0x2d}}]}) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000040)='proc\x00', 0x0, 0x0) pivot_root(&(0x7f0000000000)='./file0\x00', &(0x7f0000000240)='.\x00') 00:03:43 executing program 1: ioctl$TUNSETQUEUE(0xffffffffffffffff, 0x400454d9, &(0x7f0000000b80)={'bond0\x00'}) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x7fffffff}]}) r0 = signalfd4(0xffffffffffffffff, &(0x7f00000000c0), 0x8, 0x0) openat(0xffffffffffffff9c, 0x0, 0x1c2, 0x27) openat$ptmx(0xffffffffffffff9c, &(0x7f00000001c0), 0x0, 0x0) r1 = creat(&(0x7f0000000080)='./file1\x00', 0x0) pwrite64(r1, &(0x7f0000000000)="a7", 0xfffffd6b, 0x0) accept$packet(r0, &(0x7f0000000080)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000100)=0x14) 00:03:43 executing program 7: ioctl$TUNSETQUEUE(0xffffffffffffffff, 0x400454d9, &(0x7f0000000b80)={'bond0\x00'}) openat(0xffffffffffffff9c, 0x0, 0x1c2, 0x27) r0 = creat(&(0x7f0000000080)='./file1\x00', 0x0) ioctl$BTRFS_IOC_SCRUB(r0, 0xc400941b, &(0x7f0000000600)={0x0, 0x62, 0x80000001}) pwrite64(r0, &(0x7f0000000000)="a7", 0xfffffd6b, 0x0) accept$packet(0xffffffffffffffff, &(0x7f0000000080)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000100)=0x14) 00:03:43 executing program 0: syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000d1f4655fd1f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b00000000020000280200000284", 0x62, 0x400}, {&(0x7f0000010400)="030000000400000005000000d4", 0xd, 0x800}, {&(0x7f0000010500)="ffffffffff070000000000000000000000000000000000000000000000000080ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff", 0x400, 0xc00}, {&(0x7f0000000000), 0x0, 0x1600}], 0x0, &(0x7f0000000280)=ANY=[]) setxattr$trusted_overlay_upper(&(0x7f0000000540)='./file0\x00', &(0x7f0000000580), &(0x7f00000005c0)={0x0, 0xfb, 0x139, 0x0, 0x0, "eacbf6ff0bc36f5a7bb9fe2ee7bb1e01", "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"}, 0x139, 0x0) 00:03:43 executing program 2: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x7fffffff}]}) signalfd4(0xffffffffffffffff, &(0x7f00000000c0)={[0x400000]}, 0x8, 0x0) 00:03:43 executing program 4: r0 = seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x0, &(0x7f0000000040)}) r1 = openat(0xffffffffffffff9c, 0x0, 0x1c2, 0x27) r2 = open(&(0x7f0000000040)='./file0\x00', 0x1810c1, 0x0) ioctl$BTRFS_IOC_SCRUB_PROGRESS(r1, 0xc400941d, &(0x7f0000000200)={0x0, 0x4, 0xd3, 0x1}) pwrite64(r2, &(0x7f0000000a40)="0f64800203d6484c7ddffad1", 0xc, 0x0) lseek(r2, 0x2, 0x3) fcntl$getflags(r2, 0x401) dup2(r1, r2) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r1, 0xc0502100, &(0x7f0000000080)={0x0}) ioctl$SECCOMP_IOCTL_NOTIF_SEND(r0, 0xc0182101, &(0x7f0000000100)={r3, 0x4, 0x1ff}) mprotect(&(0x7f0000ffe000/0x1000)=nil, 0x1000, 0x0) 00:03:43 executing program 5: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x7fffffff}]}) signalfd4(0xffffffffffffffff, &(0x7f00000000c0)={[0x300000000000000]}, 0x8, 0x0) 00:03:43 executing program 3: syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000d1f4655fd1f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b00000000020000280200000284", 0x62, 0x400}, {&(0x7f0000010400)="030000000400000005000000d4", 0xd, 0x800}, {&(0x7f0000010500)="ffffffffff070000000000000000000000000000000000000000000000000080ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff", 0x400, 0xc00}, {&(0x7f0000000000)="ed41000000040000d0f4655fd1f465", 0xf, 0x1600}], 0x0, &(0x7f0000000280)=ANY=[]) setxattr$trusted_overlay_upper(&(0x7f0000000540)='./file0\x00', &(0x7f0000000580), &(0x7f00000005c0)={0x0, 0xfb, 0x139, 0x0, 0x0, "eacbf6ff0bc36f5a7bb9fe2ee7bb1e01", "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"}, 0x139, 0x0) getxattr(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)=@random={'security.', ':\x00'}, &(0x7f0000000140)=""/55, 0x37) 00:03:43 executing program 6: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000040)='proc\x00', 0x0, 0x0) r0 = openat(0xffffffffffffff9c, 0x0, 0xc000, 0x27) r1 = open(&(0x7f0000000040)='./file0\x00', 0x1810c1, 0x0) ioctl$BTRFS_IOC_SCRUB_PROGRESS(r0, 0xc400941d, &(0x7f0000000200)={0x0, 0x4, 0xd3, 0x1}) pwrite64(r1, &(0x7f0000000a40)="0f64800203d6484c7ddffad1", 0xc, 0x0) lseek(r1, 0x2, 0x3) fcntl$getflags(r1, 0x401) dup2(r0, r1) name_to_handle_at(r0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000600)=ANY=[@ANYBLOB="1400000005000000f000090000000000403d58007f0000003f0000007e23643adcbadfb44ccf6792f65e838697b4b19ab6212ede6ed849cf15ec462a7ca70142850826186a86d88313ad5018532a57bd558ee2e22f631d1264e67242129328534203fb73187e6513a1ac179a4627b6"], &(0x7f0000000180), 0x400) pivot_root(&(0x7f0000000000)='./file0\x00', &(0x7f0000000240)='.\x00') [ 493.149042] EXT4-fs error (device loop0): ext4_fill_super:4947: inode #2: comm syz-executor.0: iget: root inode unallocated [ 493.151313] EXT4-fs (loop0): get root inode failed [ 493.152084] EXT4-fs (loop0): mount failed [ 493.174000] EXT4-fs error (device loop3): ext4_fill_super:4947: inode #2: comm syz-executor.3: iget: root inode unallocated [ 493.176554] EXT4-fs (loop3): get root inode failed [ 493.177354] EXT4-fs (loop3): mount failed 00:03:43 executing program 6: r0 = syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mknodat$loop(r0, &(0x7f00000001c0)='./file0\x00', 0x4, 0x1) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000040)='proc\x00', 0x0, 0x0) pivot_root(&(0x7f0000000000)='./file0\x00', &(0x7f0000000240)='.\x00') lsetxattr$trusted_overlay_redirect(&(0x7f00000000c0)='./file0/file0\x00', &(0x7f0000000140), &(0x7f0000000180)='./file0\x00', 0x8, 0x1) 00:03:43 executing program 0: syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000d1f4655fd1f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b00000000020000280200000284", 0x62, 0x400}, {&(0x7f0000010400)="030000000400000005000000d4", 0xd, 0x800}, {&(0x7f0000010500)="ffffffffff070000000000000000000000000000000000000000000000000080ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff", 0x400, 0xc00}, {&(0x7f0000000000), 0x0, 0x1600}], 0x0, &(0x7f0000000280)=ANY=[]) setxattr$trusted_overlay_upper(&(0x7f0000000540)='./file0\x00', &(0x7f0000000580), &(0x7f00000005c0)={0x0, 0xfb, 0x139, 0x0, 0x0, "eacbf6ff0bc36f5a7bb9fe2ee7bb1e01", "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"}, 0x139, 0x0) 00:03:43 executing program 5: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x7fffffff}]}) signalfd4(0xffffffffffffffff, &(0x7f00000000c0)={[0x400000000000000]}, 0x8, 0x0) 00:03:43 executing program 2: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x7fffffff}]}) signalfd4(0xffffffffffffffff, &(0x7f00000000c0)={[0x80ffff]}, 0x8, 0x0) 00:03:43 executing program 4: r0 = seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x7fffffff}]}) fstat(r0, &(0x7f00000000c0)) mprotect(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x5) mbind(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x0, &(0x7f0000000080)=0xfff, 0x8c5, 0x4) 00:03:43 executing program 3: syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000d1f4655fd1f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b00000000020000280200000284", 0x62, 0x400}, {&(0x7f0000010400)="030000000400000005000000d4", 0xd, 0x800}, {&(0x7f0000010500)="ffffffffff070000000000000000000000000000000000000000000000000080ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff", 0x400, 0xc00}, {&(0x7f0000000000)="ed41000000040000d0f4655fd1f4655fd1f4655f13ca", 0x16, 0x1600}], 0x0, &(0x7f0000000280)=ANY=[]) setxattr$trusted_overlay_upper(&(0x7f0000000540)='./file0\x00', &(0x7f0000000580), &(0x7f00000005c0)={0x0, 0xfb, 0x139, 0x0, 0x0, "eacbf6ff0bc36f5a7bb9fe2ee7bb1e01", "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"}, 0x139, 0x0) getxattr(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)=@random={'security.', ':\x00'}, &(0x7f0000000140)=""/55, 0x37) [ 493.324644] EXT4-fs error (device loop0): ext4_fill_super:4947: inode #2: comm syz-executor.0: iget: root inode unallocated [ 493.329484] EXT4-fs (loop0): get root inode failed [ 493.330186] EXT4-fs (loop0): mount failed 00:03:43 executing program 6: r0 = syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) copy_file_range(r0, &(0x7f00000002c0)=0x6, r0, 0x0, 0x7fffffff, 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000040)='proc\x00', 0x0, 0x0) creat(&(0x7f0000000300)='./file0\x00', 0x20) setxattr$security_selinux(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140), &(0x7f0000000180)='system_u:object_r:crond_exec_t:s0\x00', 0x22, 0x5) pivot_root(&(0x7f0000000000)='./file0\x00', &(0x7f0000000240)='.\x00') mount$bind(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000200)='./file0\x00', &(0x7f0000000280), 0x2088, 0x0) [ 493.385904] EXT4-fs error (device loop3): ext4_fill_super:4947: inode #2: comm syz-executor.3: iget: root inode unallocated [ 493.406334] EXT4-fs (loop3): get root inode failed [ 493.407783] EXT4-fs (loop3): mount failed 00:03:56 executing program 5: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x7fffffff}]}) signalfd4(0xffffffffffffffff, &(0x7f00000000c0), 0x200000c8, 0x0) 00:03:56 executing program 4: r0 = seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x7fffffff}]}) mprotect(&(0x7f0000ffe000/0x1000)=nil, 0x1000, 0x0) readv(r0, &(0x7f00000024c0)=[{&(0x7f0000000080)=""/215, 0xd7}, {&(0x7f0000000180)=""/76, 0x4c}, {&(0x7f0000000200)=""/123, 0x7b}, {&(0x7f0000000280)=""/213, 0xd5}, {&(0x7f0000000380)=""/72, 0x48}, {&(0x7f0000000400)=""/153, 0x99}, {&(0x7f00000004c0)=""/4096, 0x1000}, {&(0x7f00000014c0)=""/4096, 0x1000}], 0x8) 00:03:56 executing program 7: ioctl$TUNSETQUEUE(0xffffffffffffffff, 0x400454d9, &(0x7f0000000b80)={'bond0\x00'}) openat(0xffffffffffffff9c, 0x0, 0x1c2, 0x27) r0 = creat(&(0x7f0000000080)='./file1\x00', 0x0) ioctl$BTRFS_IOC_SCRUB(r0, 0xc400941b, &(0x7f0000000600)={0x0, 0x62, 0x80000001}) pwrite64(r0, &(0x7f0000000000)="a7", 0xfffffd6b, 0x0) accept$packet(0xffffffffffffffff, &(0x7f0000000080)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000100)=0x14) 00:03:56 executing program 1: ioctl$TUNSETQUEUE(0xffffffffffffffff, 0x400454d9, &(0x7f0000000b80)={'bond0\x00'}) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x7fffffff}]}) r0 = signalfd4(0xffffffffffffffff, &(0x7f00000000c0), 0x8, 0x0) openat(0xffffffffffffff9c, 0x0, 0x1c2, 0x27) openat$ptmx(0xffffffffffffff9c, &(0x7f00000001c0), 0x0, 0x0) r1 = creat(&(0x7f0000000080)='./file1\x00', 0x0) pwrite64(r1, &(0x7f0000000000)="a7", 0xfffffd6b, 0x0) accept$packet(r0, &(0x7f0000000080)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000100)=0x14) 00:03:56 executing program 0: syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000d1f4655fd1f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b00000000020000280200000284", 0x62, 0x400}, {&(0x7f0000010400)="030000000400000005000000d4", 0xd, 0x800}, {&(0x7f0000010500)="ffffffffff070000000000000000000000000000000000000000000000000080ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff", 0x400, 0xc00}, {&(0x7f0000000000)="ed41000000040000d0f4655fd1f465", 0xf, 0x1600}], 0x0, &(0x7f0000000280)=ANY=[]) setxattr$trusted_overlay_upper(&(0x7f0000000540)='./file0\x00', &(0x7f0000000580), &(0x7f00000005c0)={0x0, 0xfb, 0x139, 0x0, 0x0, "eacbf6ff0bc36f5a7bb9fe2ee7bb1e01", "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"}, 0x139, 0x0) 00:03:56 executing program 3: syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000d1f4655fd1f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b00000000020000280200000284", 0x62, 0x400}, {&(0x7f0000010400)="030000000400000005000000d4", 0xd, 0x800}, {&(0x7f0000010500)="ffffffffff070000000000000000000000000000000000000000000000000080ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff", 0x400, 0xc00}, {&(0x7f0000000000)="ed41000000040000d0f4655fd1f4655fd1f4655f13ca", 0x16, 0x1600}], 0x0, &(0x7f0000000280)=ANY=[]) setxattr$trusted_overlay_upper(&(0x7f0000000540)='./file0\x00', &(0x7f0000000580), &(0x7f00000005c0)={0x0, 0xfb, 0x139, 0x0, 0x0, "eacbf6ff0bc36f5a7bb9fe2ee7bb1e01", "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"}, 0x139, 0x0) getxattr(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)=@random={'security.', ':\x00'}, &(0x7f0000000140)=""/55, 0x37) 00:03:56 executing program 6: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000040)='proc\x00', 0x0, 0x0) pivot_root(&(0x7f0000000000)='./file0\x00', &(0x7f0000000240)='.\x00') rename(&(0x7f00000000c0)='./file1\x00', &(0x7f0000000140)='./file0\x00') 00:03:56 executing program 2: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x7fffffff}]}) signalfd4(0xffffffffffffffff, &(0x7f00000000c0)={[0x3000000]}, 0x8, 0x0) [ 506.624562] EXT4-fs error (device loop3): ext4_fill_super:4947: inode #2: comm syz-executor.3: iget: root inode unallocated [ 506.626667] EXT4-fs (loop3): get root inode failed [ 506.627403] EXT4-fs (loop3): mount failed [ 506.630339] EXT4-fs error (device loop0): ext4_fill_super:4947: inode #2: comm syz-executor.0: iget: root inode unallocated [ 506.636617] EXT4-fs (loop0): get root inode failed [ 506.637353] EXT4-fs (loop0): mount failed 00:03:56 executing program 4: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x7fffffff}]}) mprotect(&(0x7f0000ffe000/0x1000)=nil, 0x1000, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, 0x0, 0x8100, 0x0) ioctl$TIOCSIG(r0, 0x40045436, 0x0) readahead(r0, 0x1, 0x6) 00:03:56 executing program 2: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x7fffffff}]}) signalfd4(0xffffffffffffffff, &(0x7f00000000c0)={[0x4000000]}, 0x8, 0x0) 00:03:56 executing program 5: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x7fffffff}]}) signalfd4(0xffffffffffffffff, &(0x7f00000000c0), 0x8, 0x3) 00:03:56 executing program 3: syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000d1f4655fd1f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b00000000020000280200000284", 0x62, 0x400}, {&(0x7f0000010400)="030000000400000005000000d4", 0xd, 0x800}, {&(0x7f0000010500)="ffffffffff070000000000000000000000000000000000000000000000000080ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff", 0x400, 0xc00}, {&(0x7f0000000000)="ed41000000040000d0f4655fd1f4655fd1f4655f13ca", 0x16, 0x1600}], 0x0, &(0x7f0000000280)=ANY=[]) setxattr$trusted_overlay_upper(&(0x7f0000000540)='./file0\x00', &(0x7f0000000580), &(0x7f00000005c0)={0x0, 0xfb, 0x139, 0x0, 0x0, "eacbf6ff0bc36f5a7bb9fe2ee7bb1e01", "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"}, 0x139, 0x0) getxattr(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)=@random={'security.', ':\x00'}, &(0x7f0000000140)=""/55, 0x37) 00:03:56 executing program 0: syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000d1f4655fd1f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b00000000020000280200000284", 0x62, 0x400}, {&(0x7f0000010400)="030000000400000005000000d4", 0xd, 0x800}, {&(0x7f0000010500)="ffffffffff070000000000000000000000000000000000000000000000000080ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff", 0x400, 0xc00}, {&(0x7f0000000000)="ed41000000040000d0f4655fd1f465", 0xf, 0x1600}], 0x0, &(0x7f0000000280)=ANY=[]) setxattr$trusted_overlay_upper(&(0x7f0000000540)='./file0\x00', &(0x7f0000000580), &(0x7f00000005c0)={0x0, 0xfb, 0x139, 0x0, 0x0, "eacbf6ff0bc36f5a7bb9fe2ee7bb1e01", "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"}, 0x139, 0x0) 00:03:56 executing program 6: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000040)='proc\x00', 0x0, 0x0) link(&(0x7f0000001440)='./file0\x00', &(0x7f0000001480)='./file0\x00') pivot_root(&(0x7f0000000000)='./file0\x00', &(0x7f0000000240)='.\x00') syz_mount_image$tmpfs(&(0x7f00000000c0), &(0x7f0000000140)='./file0\x00', 0x6, 0x5, &(0x7f0000001340)=[{&(0x7f0000000180)="5c68bd118cb9f67fbc16f71a01e5981f3c2567d134c75f3893f5541bcf6f11bdae2f708e7272df11089858e891900813e5f0", 0x32, 0x816}, {&(0x7f00000001c0)="d252abf2e748ec", 0x7, 0x7}, {&(0x7f0000000200)="a6095c50a74e3a73f3c92d7456c300afafa1868fd6bcc012e4cf0ce09634eceaa456ab38323e5409f8", 0x29, 0x4}, {&(0x7f0000000280)="aea8f4074c7bdc7e1a925b33bcbf2c1d048201a0e7c0141bcd13482aae146b4489453b28719dd05337d8116f699ee9123b22f699fa48ea90b0f00e48fe7c4330895f28fe5754091ade5531be5a55430307026fc46e375ccf3fde6284a7f161ccd5c665645daaa1f757a520020318027f39ddd2ec3468edf16ad742e842719fb2f7dea6166674453ea6058904d78ea80e3eb9180244e1ae0478009794e00fe942ee7a2eaf36b073677c2427c2a94268f712667fb6e153cf4258c4d1766e522a86fe6c893ea8a3590ca7ebf058e68817587877d6f7d80aa861d494b598feeb8475e71237dc2f8d8a71919025ee32ba2b43c0b1ca1a42b2b86f7ea096efc0fb9f31208827801928ce006db0c88dfbe44cec9370fa09b23f2b71d161a2e8dc7bf55baa3645e789f7f9ac54967a10d90603a834bf88d09f3e4069883a607dc20a37f53506c4e839a94585e5970337a4c06c7f601a3625286e9e817538bad8f58526a408ba421507e21f0405551d5fcf1209fcfc45000d3d97e1b4b417d421bf7c5e624abff9241cdad204e33df5d212c8b8038cf32e235f6f45f098ec5d3a3bafdc3bb87bfb9e0294f3a0fe7e8424d5d029d1f3070871be36a9948bf98803a917a9de708ab5b9a9076886f1570d7fc7699b4ded584f77ec3197c4df8a95a0931c7c015b8e758d2935736572614eab18bb027c90e9f8cffb6bb3f142c5588526c6af7f5f8f21dbd8f1e229fef1127501c894f719b2182f93fe1873ac5910179963d95ff466c2a5fb9a88173ad330784990a59b640686ed35c36bed75820ad0d3d9b6b34abb4e5f8c60512539951af7b2aef4dc4ce13ef6268db23e731f8a433292631b27542182a005ecb814d06c779721a22b260a5a29d51bfeed184d7fcc733a579242386d71aa0dea198cc6873dbfa88e99854058f36d076b82f4f186f44e56f84162b5f28677698a2445c9abb78f7eb3e33d28406ad55f64337f61022c16379dff98596c651c602e013aacfb8c1cac97e3bb4377ea2297f8d25e334050f1671c922b936eb6ec316f3dca688e6d2f3c2bbbbb7390b96fd839eb660af62ebb02fef1f6be992e806fd32f16698801c78ebdc2e6de45022fa7333bedcf6780c72c4e9263a2f1c1d3ed0abf5f9cb2f79fb0bc52d6ca5d9bafa4fb5cacef6b2e64ce058cae9ce2b67bc034fd7e9b703d8bfe1c766414d5911145cfd0c5cf84daf351df14647361571ef58e1fee3bad85287e7ff78b215ed4c2cc77bd19b7b948f28d7c4c616cf1e321cfc75283925e59d376e38b52cb080db0eb777253ed444947f79ec49f4928919cb28c511af7292ab5bbd5585c99da1bf415ea005cffa2a13cb523bb9e803d474df56469899dc0d13e1f339a459866a9fcfd14e3180ecdbb087a0fe1a2b56793c4f49bdb1053055318a96aa9865ab6ce263221082a27a2ca1d0b77e336b611934e63783769ea2eccffe4d3f1f8fe3057652a035e299f6c3219706d2e4c9c98ee0a972e2592fa4f2fea637a3beab31addf26ab1ea49f53d45131cb217e04b5887d022096ebdfb9b84e9674a9676a76cde222eb277c2d62097033b7e7b0585f0ad82f46ecdc1d74486a38849f9c77da3f55537693a79fe5346e902de735e4ec6596f4ae4b191493003d99829e152e85a27a78dbc3dd58d62313289292d46a12a946e0110b0086ee5f6f73bd3eaa6de404f1f4ff00071a43b5bbd19d6fdad7d1c7b20e1ceffd0c97739c3dee14ac5f8a913624be27cb70969330c96b275d2b30a11b6e716a1aa9f4b8d6497149522faa9d49a307790cd964854a910ebcd5e78e12e37b15666d1d6df3249d0efb40c7621e7f2b296f8986b1644039ce46b4b64644cb8932b3e0a252c88deb1532971c486bb86036a8c59d24a409606f5a5ce5969060f61a87b52d8626c813ed76d8b7005c75f090d7078b3295686e85841550fd6ed4df55ec8e04ad8e726c1fd655a4b882055b62f5b9c29580cb3f11aad9bb83e76e260f7c8d72bf5f2f7a554b53ebce976fd6aa690a1fd7894d1df24d87e359fd6e8dc8a3ad846cbee304fff8e421c323cda3dd1d67f8d49d847d750375d07355f44ad6fdf3b1e2a63da3d11621f0b52de48979fe8b6891269c7402b42b7b7dccbe22a9e650e15623caaf0210440dac1bafd2d5a6a8eeee89384025cb4df4a8c468727819188f7c1fe107f6947663993d54422b1b36674781be76c8b8d354abd6edc561c2095583d556336362904b10d604acc77434cd7e03403ee93f6ded9584baf21df7ae05f2562e901b07b00852790383069d3a3f5a37f78f9220e249d03532ad741775aa77f283b5ada514085673b18515488684d7cf15893f04a01f33a93b783dcc156eb58426f2d2d0560b69530e1944a40bd1471090eaabd34019743ba9807d9638b3d8162fc1c759b7feb14c1059a534d11f8ddce29aecb051433c9b530480b93adc413ec6090d017b500fc8a96ade7e8dd8e651365b8b06fb0e665c1282c483032e78ceb02f0217d2b11de83589e6873f3714794c6d41d67a56b6f2fbc0edd62d873e4e0ce58ed03921f9aab957827f236c3527e17e67c17c582b5b4b71221827cddae3bfac8b65086de5d20b9bed3d329fe8c4aeb15ac08dd0ec3c447616d21e3986445cc1783b5f187aef37b27b2ad1028b4ce73d5ce0ff4e1b45e418f973baa8227ec4f67ad2f854584f606c1d0d9e271ec82c520c625b6a4d11fcf438f5ead94d55ba2acbc620e87aec09721103594a12bef4965d2fc5ecabda59289109d192080f248e61749a4075ea3c4a6775217b593074a555ecbaa55d862b763633397e9e00390261425509d531f6c60a4a8bc06d1c6dd7b3d6ccff377dfeb8d76be14d3815db9b96eef2c9a5c632ccebcea2daa7b5eca26c8a0b3cae7c660e3d940b9be6077e3c6636084d8a7496c8ee45cef214c2cb81f8f4a0ac77ede580457631160262cbc28499c221860fd4b56fad80c8e47757b250b6d0762aa3f4b5724e2e98b3b373a0d1aede39ec9c0f1a2cbfc0fcb2be94729cb63ff7dcd351afcb83aa4d226c44ddd1d354987b7f880f342feb0229e0f58dbf5e27943b3614d22e1653220c74fb9fb49cad6c4051cec4687dc368ec9d94a36a29a3b66d25de2779cf095b90415f0f9e0d381855af5d5fc5db393bca0f9eb6bf43be6a85b897b051dd2f996decf6124a69e501291f0b30beccb8014da3897807015188a310ba24921fa93154841f30a819e236524587335ce34d285dd8f0776ed6f867055f46b06324827ae0d787b40c2478bc78bec61b330ea39978d8926aecb78934d8dd89178219221030dadbd8937454b0752158c40ed35f276748ce56d98fa8288da892994862dbf997949659da3367fe6e603deb3cb18543020020c5775bf5852cd85cece04a470f4acfa41342c5d829a2963ae42efeffdf7513eabcaf4e3b7fe3b6e0aa275bfdc5e5d99d80f2c7bc1d7636d1f20f60b64bf6ab265650426d99a884c7d5a676b759bd396f0ceeb9322e9594e849425ad19498878ebbe09d4b435e49c856d380736bba8ef61999b79816b9e614b4bdf0044e519a3ef27495d4322326034436a9a60566f7de453e37f9dc64bc92db37fb69cbf0491a6c607e068e00bb7e283d3e854537826761ec09276e513199be35849fdbbb658cdda0b6d9d642a4350c4e6c8d31a9b1eaf3ad41c15e76dfa383520de98f2caeb29faf50739c3e73da302fe020973d42d45535cc594deeb0658e67eb3d73bf844702d3d570067ad46e6b7f384d7b4a703c86fb8f997009b3a14b22bf4c5bc20641ad17f37250178826706a5004f24240d66f46616fb18fc87c4057a824d24d3d9bee47d34de6c16aec44402df96a0f7a4c08053e7c5a25a79ef49567737a1851bc0bc31eb11ef1f744b3dceca7f400dd65508f3525c6c2e648fc76ce82ad4ca01cb567c15bc34cceb842db011200b35d29f39f22021483e1ea7bc20a028292fbab386ee1ee670242d40c9a3146fa0d5f48b879a8866c3d6e0b33f3766a5f44c64916a5aa63ad16f8e1eb8b551e0dc8a177d74795c7f2e55de4f3d9067dcae52329f204feda647f210435a30b4f3e033bef6aa98186c5d1b5a737236d188e703dba433c2e235ead3570c8a2fa562e5b374843275c81e8c540efa17a22d1c653dcdb294e84b4725d82db235454cf7d369dded5116cb3f771704c2553c9877c4b0097affeee89fd5a1251b4b323a1bc76d3876621afd1ac56ff5628f5c560fb6a203fc3540ac3992282948f3edc66be39bc650ec19b3853a53ceb73a2cccc1d07eb8a049ebab5098da390605864846876da311f7d23eec20a2ec0b7a3815d18bbe9b38a360cbbaa995bc780f28953cfcc020889e19110840bea9c26576bd5ef819c0b3945b4ebe4a605b4eec476d214ee4aefe2ce4db12d832bad9feb9f936f97f7a3fc6d1bc7eb18f8a21b9d7f0be4c2c378682a0ecb4f21020c3c210cd74f772d984fd8b01f97815fdde465a8b25000d79fa64c539c848036e3a64d42c60183d814e8f9f132c48cfa5d3e1df7647b883ed0887b0fd32b41f1163d214dd3ec1bf92d8e358508e27b5ba07c157460b4bf1f65dd7c483c78bdcfa0c99fe0a75130bde66b3b91b64c80b56ac5614340bb6ba6b73b42ed7acd5cd3cdc74e7b3838c48b698d0243fb5febcbad55d3b7cf0e5dee4ac0760e6c44c1f9f3e8187d46c1a612c878e2bb0ab03cf67300e59cfb5c8307e1b8b8b266d15238405ce865f36c11880dcb98a2a0128b50ae79030f6fd6bce6ec9a7e6b8bbedafef22bad57142ec4fb0047b42a110dec4b7e78a10d9056bcb1fb432e7f205bdd03747415a001aee06e0be75a0865cd81f50e967d7806d49ecfd601f86f1c5cf58c93d15adff8072659fe4540bff0a37d72227efb6b408eb30baf5c7eb1f4281271fe26448bc249aeb220d5774574425c4636b938607be727fb53d71fcc5adaa81282d3e93df2d0f26962a1fb9f96d9ae2e8843b3f61f029878f11dc7cd8a8b8d7066d4e83319948846dff5b0075fd85027f7121c0de87ed6a3507af9b64b6cc027f1011f5b240a1ef58e49bf0ffbc66723aea71bba29cda53d78fa28b46751af831f78d65688557cc2cb35b38c4b8953e6c78f295f242d288686df66d0f6554f76c44145df1c77b246fb7b45337509526b6f4a9031cf9af8f61a7d6ba2ec1b2cacf31209fe165c30704c215fda29c9a7a48466fd796fdda0e8f7ed887a9c61b81e1b660243578860aa092bc6e453c252aa7b58482cf4e652064ccc8301dd83df1b120e0e9ecae88667081c6846ad0d10c48d8b954070951d172a4ae442849554587257c60fafe304b04b3c873f53dc2a7606f87c9b8e03b8921faef59824271091c4d5968a0792eaad61fb0efa821785dabe74dc5cbe91c358cf4af59322a1d97655285feffa04680431960ff2a8b6c870a41685701fd32974c2fa81eb78a98607fd4e87c31b6a7b8ba8a48bdf00f8171a4870bc1701f40c240e1e233e59985d21ae05fa6197f8a8820399136220d220fccc97f914dd7a560d176179b17846f3465377c7e6f365adc17efd38765319019fbde8aef54aa954222904d3b6bb7c01f7f17ccce0d58155aeb48080388d27b256972e65721a046f5d34779742932eb154d628af6c5bb9d1525df0e6940fc9cf5d93b30baef587aa71ba269b98928a108538a32b96ff510318fe74534a10169a52feefcfcce44eb2eac2339ba38c4968be5751d874a2b46da6d7605ef64b91993300c030e718ca9e99f9e0bd0322a48973f0f300ae966d43e43e469069e", 0x1000, 0x2}, {&(0x7f0000001280)="bd711ffcbeb41525add40d95b448d447841024c8c16ce9a28c526c81e5bb14496d5a3e37c996062065a8e687dff30b3d5ab8a4aec19ce158306a9c05443ba13e2d06e9c090cfd4f6edef10a21fddbe32d1eec6fd446c6616577df6aa1fd7f21f1a498a316bb97b19fc8029c1108843f375ac77c2f67ec812f401f52c9772adbf11e0e07ec8e2b51868dcc9e86a", 0x8d, 0x4}], 0x2042000, &(0x7f00000014c0)={[{@mpol={'mpol', 0x3d, {'local', '', @val={0x3a, [0x35, 0x30, 0x2c, 0x37, 0x36, 0x2c, 0x35]}}}}, {@nr_blocks={'nr_blocks', 0x3d, [0x2d, 0x30, 0x32, 0x2d, 0x2, 0x30]}}, {@nr_inodes={'nr_inodes', 0x3d, [0x30, 0x36, 0x31, 0x37]}}, {@uid={'uid', 0x3d, 0xee01}}, {@huge_never}, {@nr_blocks={'nr_blocks', 0x3d, [0x5c, 0x67, 0x6b, 0x78, 0x39]}}, {@nr_blocks={'nr_blocks', 0x3d, [0x30]}}], [{@obj_user={'obj_user', 0x3d, ']'}}]}) 00:03:56 executing program 5: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x7fffffff}]}) signalfd4(0xffffffffffffffff, &(0x7f00000000c0), 0x8, 0x4) 00:03:56 executing program 2: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x7fffffff}]}) signalfd4(0xffffffffffffffff, &(0x7f00000000c0)={[0xffff8000]}, 0x8, 0x0) [ 506.774965] EXT4-fs error (device loop3): ext4_fill_super:4947: inode #2: comm syz-executor.3: iget: root inode unallocated [ 506.780268] EXT4-fs (loop3): get root inode failed [ 506.781111] EXT4-fs (loop3): mount failed [ 506.790680] EXT4-fs error (device loop0): ext4_fill_super:4947: inode #2: comm syz-executor.0: iget: root inode unallocated 00:03:56 executing program 4: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x0, &(0x7f0000000100)}) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0xa, &(0x7f00000000c0)={0x2, &(0x7f0000000080)=[{0x9, 0x6, 0xdb, 0xcb}, {0x14d, 0xfc, 0x5, 0x5}]}) mprotect(&(0x7f0000ffe000/0x1000)=nil, 0x1000, 0x0) [ 506.799636] EXT4-fs (loop0): get root inode failed [ 506.800287] EXT4-fs (loop0): mount failed 00:03:56 executing program 0: syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000d1f4655fd1f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b00000000020000280200000284", 0x62, 0x400}, {&(0x7f0000010400)="030000000400000005000000d4", 0xd, 0x800}, {&(0x7f0000010500)="ffffffffff070000000000000000000000000000000000000000000000000080ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff", 0x400, 0xc00}, {&(0x7f0000000000)="ed41000000040000d0f4655fd1f465", 0xf, 0x1600}], 0x0, &(0x7f0000000280)=ANY=[]) setxattr$trusted_overlay_upper(&(0x7f0000000540)='./file0\x00', &(0x7f0000000580), &(0x7f00000005c0)={0x0, 0xfb, 0x139, 0x0, 0x0, "eacbf6ff0bc36f5a7bb9fe2ee7bb1e01", "a49dbbc75b5fc0caa97cab3ee231b0d7cf3b9be24c0fb2c145c6f2190b4a29cc525f550d79c74a03eda157db2eae62fde8958cce2a8a4c9d0374e4d6ae09ef4ee733ce4046bee0170cff57584e0671d4f286b9691d37721b43778a4afb3c3d05fd5446d2e0bac5326f43d23126410dfb85efa26b9e1ae8d056c3ebcde0c95e1443304d7a93eb4077f76047b6e13f0e79a9631ac2bd43143854803c698a7f02933d9cbdca121cc857aacabf858f3f904c9dfedb6c03186d99490f35f09de8ab897ea7c58f07dca416e1db55c7a849a91b98d0e0c0c7bf058d86a2e997a0557800a34bb7f5806f2e15e99981cc3fe615a3ff396f7d8da30ea24626263abf0ad50a0ce2dafc55f2b0286b2204114a6754b336a913a75e66ed6a3efd132f668369692f46039d"}, 0x139, 0x0) [ 506.903718] EXT4-fs error (device loop0): ext4_fill_super:4947: inode #2: comm syz-executor.0: iget: root inode unallocated [ 506.908498] EXT4-fs (loop0): get root inode failed [ 506.909175] EXT4-fs (loop0): mount failed 00:04:10 executing program 3: syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000d1f4655fd1f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b00000000020000280200000284", 0x62, 0x400}, {&(0x7f0000010400)="030000000400000005000000d4", 0xd, 0x800}, {&(0x7f0000010500)="ffffffffff070000000000000000000000000000000000000000000000000080ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff", 0x400, 0xc00}, {&(0x7f0000000000)="ed41000000040000d0f4655fd1f4655fd1f4655f13ca7302f6e9", 0x1a, 0x1600}], 0x0, &(0x7f0000000280)=ANY=[]) setxattr$trusted_overlay_upper(&(0x7f0000000540)='./file0\x00', &(0x7f0000000580), &(0x7f00000005c0)={0x0, 0xfb, 0x139, 0x0, 0x0, "eacbf6ff0bc36f5a7bb9fe2ee7bb1e01", "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"}, 0x139, 0x0) getxattr(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)=@random={'security.', ':\x00'}, &(0x7f0000000140)=""/55, 0x37) 00:04:10 executing program 1: ioctl$TUNSETQUEUE(0xffffffffffffffff, 0x400454d9, &(0x7f0000000b80)={'bond0\x00'}) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x7fffffff}]}) r0 = signalfd4(0xffffffffffffffff, &(0x7f00000000c0), 0x8, 0x0) openat(0xffffffffffffff9c, 0x0, 0x1c2, 0x27) prctl$PR_SET_MM_MAP(0x23, 0xe, &(0x7f0000000180)={&(0x7f0000ffd000/0x1000)=nil, &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000fff000/0x1000)=nil, &(0x7f0000ffd000/0x1000)=nil, &(0x7f0000ffc000/0x2000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000ffe000/0x2000)=nil, &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000ffd000/0x2000)=nil, &(0x7f0000ffd000/0x2000)=nil, &(0x7f0000000140)="080afc03b8bae061a487765e741c1a3a5a7dea95a0b02b4dbb6944356a", 0x1d}, 0x68) r1 = creat(&(0x7f0000000080)='./file1\x00', 0x0) pwrite64(r1, &(0x7f0000000000)="a7", 0xfffffd6b, 0x0) accept$packet(r0, &(0x7f0000000080)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000100)=0x14) 00:04:10 executing program 7: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x7fffffff}]}) openat(0xffffffffffffff9c, 0x0, 0x1c2, 0x27) r0 = creat(&(0x7f0000000080)='./file1\x00', 0x0) ioctl$BTRFS_IOC_SCRUB(r0, 0xc400941b, &(0x7f0000000600)={0x0, 0x62, 0x80000001}) pwrite64(r0, &(0x7f0000000000)="a7", 0xfffffd6b, 0x0) accept$packet(0xffffffffffffffff, &(0x7f0000000080)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000100)=0x14) 00:04:10 executing program 4: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x0, &(0x7f0000000040)}) r0 = openat(0xffffffffffffff9c, 0x0, 0x1c2, 0x27) r1 = open(&(0x7f0000000040)='./file0\x00', 0x1810c1, 0x0) ioctl$BTRFS_IOC_SCRUB_PROGRESS(r0, 0xc400941d, &(0x7f0000000200)={0x0, 0x4, 0xd3, 0x1}) pwrite64(r1, &(0x7f0000000a40)="0f64800203d6484c7ddffad1", 0xc, 0x0) lseek(r1, 0x2, 0x3) fcntl$getflags(r1, 0x401) dup2(r0, r1) r2 = openat$ptmx(0xffffffffffffff9c, 0x0, 0x8100, 0x0) ioctl$TIOCSIG(r2, 0x40045436, 0x0) fsetxattr$security_evm(r2, &(0x7f0000000180), &(0x7f00000001c0)=@sha1={0x1, "ae84eaf65fb58387cbb0ab5961e4f93427949c04"}, 0x15, 0x1) pwrite64(r1, &(0x7f0000000080)="b789950a49404716b9a9f7f52eed4be79ee33b347b7f465ba9b58c13a8f9a484b02077d247b03bebabc132aec45e500061fa1a8647b872a9b2ca15319b1b940e139b9d5e4fd636aa79b4a7e0c467de193c450789d88780b087dd45db19d497e227a6c29510369eb2f6b1c38e0eb852d06e1dfc97ba09204eacb03b26fadd47b39ff8ed9359d82ad2171b7e2c413bc36746b0591d6dd08d7c3f4bde7a0d7a22982b52b84bb1f58e9838da9f2a15de294ea97d27df690358c56bd12e030df5ce58b13108b13bdef38fb7218cd8c9845a28cbf9c66d3d2004adbfa82920918025429a", 0xe1, 0x7) mprotect(&(0x7f0000ffe000/0x1000)=nil, 0x1000, 0x0) 00:04:10 executing program 6: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000040)='proc\x00', 0x0, 0x0) pivot_root(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='./file0\x00') pivot_root(&(0x7f0000000000)='./file0\x00', &(0x7f0000000240)='.\x00') 00:04:10 executing program 2: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x7fffffff}]}) signalfd4(0xffffffffffffffff, &(0x7f00000000c0)={[0x1000000000000]}, 0x8, 0x0) 00:04:10 executing program 5: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x7fffffff}]}) signalfd4(0xffffffffffffffff, &(0x7f00000000c0), 0x8, 0x300) 00:04:10 executing program 0: syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000d1f4655fd1f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b00000000020000280200000284", 0x62, 0x400}, {&(0x7f0000010400)="030000000400000005000000d4", 0xd, 0x800}, {&(0x7f0000010500)="ffffffffff070000000000000000000000000000000000000000000000000080ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff", 0x400, 0xc00}, {&(0x7f0000000000)="ed41000000040000d0f4655fd1f4655fd1f4655f13ca", 0x16, 0x1600}], 0x0, &(0x7f0000000280)=ANY=[]) setxattr$trusted_overlay_upper(&(0x7f0000000540)='./file0\x00', &(0x7f0000000580), &(0x7f00000005c0)={0x0, 0xfb, 0x139, 0x0, 0x0, "eacbf6ff0bc36f5a7bb9fe2ee7bb1e01", "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"}, 0x139, 0x0) [ 520.136578] EXT4-fs error (device loop3): ext4_fill_super:4947: inode #2: comm syz-executor.3: iget: root inode unallocated [ 520.139371] EXT4-fs (loop3): get root inode failed [ 520.140280] EXT4-fs (loop3): mount failed 00:04:10 executing program 4: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x7fffffff}]}) mprotect(&(0x7f0000ffe000/0x1000)=nil, 0x1000, 0x0) mmap$perf(&(0x7f0000ffe000/0x1000)=nil, 0x1000, 0x1000002, 0x4000010, 0xffffffffffffffff, 0x3) [ 520.148303] EXT4-fs error (device loop0): ext4_fill_super:4947: inode #2: comm syz-executor.0: iget: root inode unallocated [ 520.152634] EXT4-fs (loop0): get root inode failed [ 520.153332] EXT4-fs (loop0): mount failed 00:04:10 executing program 5: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x7fffffff}]}) signalfd4(0xffffffffffffffff, &(0x7f00000000c0), 0x8, 0x4000) 00:04:10 executing program 2: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x7fffffff}]}) signalfd4(0xffffffffffffffff, &(0x7f00000000c0)={[0x40000000000000]}, 0x8, 0x0) 00:04:10 executing program 6: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r0 = getuid() syz_mount_image$nfs(&(0x7f00000000c0), &(0x7f0000000140)='./file0\x00', 0x5, 0x3, &(0x7f00000001c0)=[{&(0x7f0000000180)="f618c63e9c6800b75a18d825", 0xc, 0x2}, {&(0x7f0000000280)="afc3fc962bc423b23534f3bed98675d5de495162ee8f82ff6ebb0dc24ab1ea2fbcb5f5820eb76d0bc3154322001c906f21cca5f0e7b96af7c177e2ecbe43e734d2bb4b22d23addbab2e2723ba0cc5fbda873c4708ab69fe71f64978406e4cbe54836a10fbbd41fac9d420c8a1ba2b3d32c236cc72e2926cb93b999cc65a27c2918761c6a47e94160cff9fb61e322c45db86e9b07bcc9a02924fe918c95d14c95416d84a5b3624ab8da8a7546a09f37a23cfbb532150c77946d71cd04fa3057f712fe7045e1ef157cd390ee2b63b8cfb9d054cd487f168e176f0d71c3319352c17e14f9ccdbc2d5dd140f05d0c2545aa46cb76431538530e218487f174bad3545cd275cf9d08c5006c7352d0b72701ce00c76c0400392db7b2f2cde1295cca5901f687bbc1c6aa97f7f987d1e4b8ea55fdc3377eb00d6ca610db842da94aedba250014b6dd29dd1d3d38a5f4d698d1c05d09871f7aa6deba1790b847c3205734f32f472816c24f3cadbe7d0bd7fe1f6eb98a8b40c405bdf75d0402b5c4c7d6b6a1d31c21c2f9d1821881604f65c77d5f17e6802ddd2d96937bebd373dcbdb0f9a0c0418423d62ec68cbcfc9459d8bc2098f3486ef0bd5d8ebbc111be44004d74add744299243e9fc8870be773845505e3e5cf2320cc09f978ec50fef4687646f87a6a9a90fa44827315cb963f015548155d83295047627217bb1ba075fd7b2a811b5be807a2499ab32f1a49d7e1864e14b9545436e9a08bd35f3d501093a7304ce49389ee2d8eb07c6b0da25d1be9f07b5221ac377094d6d2fd7166c63b9541b8164beb1cc3b28476dce1c94ed1ac74193eb90202c7eb75f75ebf20103777abcbc8cd2e9dbcce1f20d66dc95e02a8db519983576111ef236186e8a91b6f6911b3a08d2bc3c4ae67a38b13622c78dded8c37c221aad59a95d9996b03c23943aca7adc98ad418b0941b1a31f9d7092a99b80ed175a2f8dc4a0ccc6354d02a69710b3f314442c32b81752ec99b3786f3d8046d4a3c71c24a0a328121d74c16007e1d5a02396b090d69c872e8b2e1162cd3fe66157156599a6ea772a6582c114eeb8982e228dcb3911b4da130624114341d677cd18dfd141add0824fd1e4408397e6013299a3525ff1c5f634e69b4c8636101a1b1db0805bca61f8adcd0d3f06dab6f8f4bee87fa4671ebe10341291a953aae6f7a7d3ea2f4949cbe5bf914fc07f242419ab2d28f17f13c2d8bcb93805458b742890d312f97494f4cb4805f2aa838faba144074cbba6ea3f90307f5a914c9eee718782c998e10755bcdeef6da537f3e8d8230f447a76d6964f8b86c5055497c3f1ec1354203520e269fae2cdd7d7acbac8152e1c7eca725f39d20d3b2215409b3f43e859ea3a051b65925e8b5f15df5352f666b0fda6c9249861734c4ebf1fd855cdf0c4472452786a9257dbd26c7e0037f58afb946033a773becf5b7d3577bbe09d134b28b7dd75ebd15a246eb7efbdbbf6ab23cb4e265130c71a39a0d1c63303649663f1f7809b06142d12b0f5bdb6b3c42d54d872fbceb201cd229388208f3b99c35e96d5d2d0682783fa44416550958821f873ca7c4b60832db9b4b1bac9795d19c721beb517a7d9b5e3ab1a03c4bcb773bc0df13b45dee119b481b238a1c664cb108a28d6c1460c9428bebccdf3ad2343bde1d04ec56241cc0a34f6cbdf78f85f7dfbc9ecc288408efe4fc2111496ebb7d036223287ceffdb0d4b8cf134f03e263d0ea4d2d0e9db88f3dc3d4f596dfb7023306462b6518869dc5a37e95b856d93c06a4b406fd4c48507870939fc71031f7bdd98d5f597f812fa856ded5b17822518c0452d09dcc0c165f28de97ad024c955f3301aba1faf49c951ef0ec4618302dfd46e66386ea5887a3182b76656aa15373a8e8eaf1624359fefe0dc2f1dd939b70bc2ea262434c2d2114c205ea1b9550c704baff5e68c48d73c2ac93279755973a6544cbc1d54d3b1419ac2fd631cbf69b8f7b4e9fe33264c19cb242ee26d47df767ff9d912ec20208f48ab2d60aee47f77a8d6e70568ae3d7c5993c5ab710d63073bac3484f3918c79692ad58a962150fd1f8cb57f31789433cb4639b57a0eb144cb270dcfd4e27580cb289278f77ae1e3f8e4731159262a406b1bb0d0f0b5191437ba2f9530f61f145e10b17e84a21e3740d19feb5b999a6c2edd3bd884573fb0fe7b4fe07ab5eac22228b570359e93d332a456ebea0be37b332928ceb88eb390085b705c7e2aa8ef314251cac843f086ad830e99d1f1d739515b1d24577e6c6b9d06e9417df007fc5df1141498c4ce174f7a6dd4f390401788f800ebc5048db44dc19bc740a0a79f2be8852924a924b1cca57d73278e748307cdd651f970a1614982bb0e2b55d731d781e7e31fc22042723ebbead01ec3a8bfd7d6b733fd7b554a793f1e9952e28ee1ba395ddd69813d73771cc7a2ad564e34229432946d530fa227348f352523be479ff2f139360ca2801105eee9997427c97cef074408051abaca3a8fa581e4d71e5eb8d424bea6f952fd2c71514b3b15e03d89b9ce02add8140359e07a59d95c8d43742790649d61f3763a3fbb780177c35718f3a672ad48b6138e2274edd820ca9c97243edbbf2802ceacf8b65a84d0c88cd7bf6e98ae4bc70d67c32ee988e0734ddc1033d34bf541829ee154687575e9b9089639a185134449572ea65982de0103c835b52b07bdcf07e13b110a02869df04a083bf47d83280504230ba1c0073a6e24707730bb3feff898ef33bb35c81df69fc11cd6ddf33c9862e0adb2200fc90e89901c306dc6f5306fcb57709f0d581423bea7511fe58a3f84619b53fee1012185b0f20e264ac49c2577b5814efed26682604908ac8cac5923e21f0a18ccd2e6dd9debc38fade1a1cf932de2fe3e7ad40a39e197b5d29597822012edb49430c5b82fdb1effbd64c9729b591e8da492c6f8ee2641b96898f1461f223108cc9065d0107e9856962d3924e7589f2e334c8b6d87e947eff6e23253edfec56ee2f17a0b6c617cdfef1d66e8b35cc955a7bdbf26507773844a70817309a74f3aa79e9f293e34dd74c7b79b35312a89d4c5f729c270b468bb00193f545f65b9e943d8ffbb024c3c7b1b1626aee624d2eb215247927bfed3ac4836d93a06df4ba783b9221b2885eaee2d6d9a7d5680fdc9b907d9fa5e9499e4bb989107a07c0f0fcae5dd4d4857cc02dc8b07b2bbf01fe6f6bed7838f21936f6fdd7faa50cd9cb31670ca499222794b2ebb584403f0d2b2d894a9ae019b6718da2720b058f61071eff8b421d79372c53959a25f24dd692be8c6d4f85c9d3e2e91e49958a7c08cccd54485c8221432f439799ee02fa89668c2498f6d142873a3015057b8da693d663c92055f9246803142f40ea3b52929eb4f107b33d96f0f54f3e27747530d3615d2eb21d6b6c514d577b0aac13e81a8b6fdfeb782cfa0d2162adb45cdaa1ef2aa9f529e4e015c7390cdceb6381aa9fa9aa1c0a0bf29aaea7842187df9ddcfbdc35e7f2e57c64f4ad8eddad5ba9e7f54b1914cb1c854ca1afe3276b4c913b013cbcabcd00faf799c57b3b379dc18aa8e85adbb2fd5794cd55f3ae19f3abe5db0171164d357facfecc34f58766ede0bf354d11d008b6669006c87b71e48f1b620e27be71e49ca41f92e1e0a86fc17c9852dc9f42c62d928a3585f68de13fa88cc5a2d0a4c85ea5ab388e33e1a011e290f7baf3bc6e6113ac0bf9092ad80ff29c1533bb9172d48e7a81184a32ffae6bd677be1109c3f4129fc62d6ea762ec692edbe1c04d8ab0ef85eccb9cd5512a0719aeab899e41ffcf88e7d6e68f6c9e37f9a755753dec7f15807784353f02d16394d35f72ac01637594c6a72f022a426e018dd8c2bdc0d10967ac985a9013156971565711d958edf49d385497f4ddf61edaa0c502065fffd223ed2a5cdabf5e3ad84d9c2f48f50c41834ac60e317c931d293c26e9d763211a5b7e0656180756f9148e17958f75f56de6c350a18928d3e29b3871e0328291141572dda223464c9ef7fd9fa55d17cde6426b4b6af12376816d95013973174caa53b8fe3571b9a040a7fc309049ddbb78dca135662d86adeaaec25fc698569188a85ff6af8d6a171d1dc99f7e56728b8aff07248b56388e1073f4764954273d2b3ff25cc8949aafc2fbec674e10d35384d16f0b153260cd33d3e602f4e6216343fecc7e70d49266279d86cbee6c0e2e064fb08d89b1cda9653af79d7fc7a525cc78a9f5e7193d7dd50cb57fe075fa56c2feb6ebbfcf0644e9cbce850a2e44c53e42f4b45f4308c611aa4a7fb07a325a0cf4869bdeb9b4614e658243c513280ad37a8f26b272b22733c6d35930f4c9fed0c1e0a08e35b5e351d54a75097b0cdae91b75a0fdfd330fc92eb44c3cfcb8cf32c4f89949eeb5824edbb3a96ca5580e67abbea68307b2ad1e6ac870b437caab19ff466617291d9f7c4118127ec5c989b9451097bdcc1b676c1ffcd32fcf4ebc228f70da68931d857a2c45871162f216aa1de0e8cdfa17b526624f94b80f81b9c861c4e8e9a9d3433c879ebd0c176f78febc60a2edb643435d2a8edabe634734104ef8d5a948e484023dd1425d60409da88868fbbf8960387fdcf808a742bcb8c592a6179c4a05a7acb0ed76cc6a26e9dcafca52c111f90d5d977758234b2e144d2519db44cbe13fbfb800c0bc9cfa48da8378bbdbe18b18f522c4f4efc7779d9f9921be29ddb52028c19f9616f1c6d3657d5a3b30a14b1f55a82d5b4f62690077226f0c95daf352ea6af3b6539cfb8bf320ee5573084def5a9b78e2f161b29a91b171ccd7ff9bd0d65b90b2471759e50798069d7f1e7f16b30b58ada2f4ba36707c95b221e5a0fd03a590dc06b26063d2946c12feafe0bb7d77cbeae52830d85916694bd9f0719822bb638907d05c2c0d805ffa5aa34a13ea38b82e06ead2e754a0f2c6cf74632df12089547315f5cfdc6f45a763136002a2ccdd5098cfebcb9cb0adf452f71770ab7453425cce7fe8f7b7ef6eab36fac8a398183c869fbeaaba4bbbe08421de2ce044996b3e44af711319a489b0d63109dd4684ee2dcbca01988b10026da88af053edbf44bc95ec4316488f09d8675b8a2cdd407f0b104889d21c681a0a37e534ea242d37899428a7436cd7cf4f9da004fc35eaa43185f6077f79bbcd0f286a9b55dddf3df61a6c851421d8243f8a26ce96aab4c1a711162aa7e73994d33502d1ecfd806229afcea452e51d92af55f56a2cb7f2cdd8bf819327cb2eb501b3312f97312038903d36978317bdec538c9d8f02eb2c17c1d27b762c54e776237742c655024b37f4cf738b2c6537af92eadcd04dedf4b924c2d1175e4d4aad3b8199da2ee853eeb28be696e97d987aee69ac3ed2fb080c52de884849bca0d8187e79365041562553f518bd671aeea896c8653c576f1f58cf8679bfbf0bef4ed1945b3447af88e14f6d69738a0186d08bcde109cd4cf56686794db2d6bd602b53de0e073b1a540dea31f924389c6e2a2b044443cc617d5183b8a876cd5c481c9a31dd60bdfdf6a6402cced18bf83597af9a405fbd19d1ce046db80c1f36df0101f5aa4f8f3540cab26ee47ba7012269351e5457791959d0c592b046c7c1f2b26da3a7dfd41f6e4569d34a74b31620a2be4ea38cca0f14129a42d7c848f5e494ecee5c74ea929d742f1ab7820e32f16795a38ef5d1adb0ed2baf06e408c117599533e8df75decafa6b8425a4abcb60485c1c3c1651fad23817e36340ac53c9716a5f02cff936850fdcae0b", 0x1000, 0x4}, {&(0x7f0000001280)="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", 0x1000, 0x9}], 0x58006, &(0x7f0000002300)={[{'proc\x00'}, {'proc\x00'}, {'proc\x00'}, {'proc\x00'}, {'\x932Q\xf6\xe2\xaf\xe5\xf5\xf8=\xb6\xd5\xf9twroc\x00'}, {'^'}], [{@mask={'mask', 0x3d, '^MAY_APPEND'}}, {@fsname={'fsname', 0x3d, '*'}}, {@euid_lt={'euid<', r0}}, {@func={'func', 0x3d, 'BPRM_CHECK'}}]}) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000040)='proc\x00', 0x0, 0x0) pivot_root(&(0x7f0000000000)='./file0\x00', &(0x7f0000000240)='.\x00') 00:04:23 executing program 1: ioctl$TUNSETQUEUE(0xffffffffffffffff, 0x400454d9, &(0x7f0000000b80)={'bond0\x00'}) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x7fffffff}]}) r0 = signalfd4(0xffffffffffffffff, &(0x7f00000000c0), 0x8, 0x0) prctl$PR_SET_MM_MAP(0x23, 0xe, &(0x7f0000000180)={&(0x7f0000ffd000/0x1000)=nil, &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000fff000/0x1000)=nil, &(0x7f0000ffd000/0x1000)=nil, &(0x7f0000ffc000/0x2000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000ffe000/0x2000)=nil, &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000ffd000/0x2000)=nil, &(0x7f0000ffd000/0x2000)=nil, &(0x7f0000000140)="080afc03b8bae061a487765e741c1a3a5a7dea95a0b02b4dbb6944356a", 0x1d}, 0x68) r1 = creat(&(0x7f0000000080)='./file1\x00', 0x0) pwrite64(r1, &(0x7f0000000000)="a7", 0xfffffd6b, 0x0) accept$packet(r0, &(0x7f0000000080)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000100)=0x14) 00:04:23 executing program 6: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x30, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000040)='proc\x00', 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file0\x00', 0x2) pivot_root(&(0x7f0000000000)='./file0\x00', &(0x7f0000000240)='.\x00') 00:04:23 executing program 5: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x7fffffff}]}) signalfd4(0xffffffffffffffff, &(0x7f00000000c0), 0x8, 0x400000) 00:04:23 executing program 7: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, 0x0) openat(0xffffffffffffff9c, 0x0, 0x1c2, 0x27) r0 = creat(&(0x7f0000000080)='./file1\x00', 0x0) ioctl$BTRFS_IOC_SCRUB(r0, 0xc400941b, &(0x7f0000000600)={0x0, 0x62, 0x80000001}) pwrite64(r0, &(0x7f0000000000)="a7", 0xfffffd6b, 0x0) accept$packet(0xffffffffffffffff, &(0x7f0000000080)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000100)=0x14) 00:04:23 executing program 4: r0 = seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x7fffffff}]}) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r0, 0xc0502100, &(0x7f0000000080)={0x0}) ioctl$SECCOMP_IOCTL_NOTIF_ADDFD(r0, 0x40182103, &(0x7f0000000100)={r1, 0x0, r0, 0xfffffff8, 0x80000}) mprotect(&(0x7f0000ffe000/0x1000)=nil, 0x1000, 0x0) 00:04:23 executing program 0: syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000d1f4655fd1f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b00000000020000280200000284", 0x62, 0x400}, {&(0x7f0000010400)="030000000400000005000000d4", 0xd, 0x800}, {&(0x7f0000010500)="ffffffffff070000000000000000000000000000000000000000000000000080ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff", 0x400, 0xc00}, {&(0x7f0000000000)="ed41000000040000d0f4655fd1f4655fd1f4655f13ca", 0x16, 0x1600}], 0x0, &(0x7f0000000280)=ANY=[]) setxattr$trusted_overlay_upper(&(0x7f0000000540)='./file0\x00', &(0x7f0000000580), &(0x7f00000005c0)={0x0, 0xfb, 0x139, 0x0, 0x0, "eacbf6ff0bc36f5a7bb9fe2ee7bb1e01", "a49dbbc75b5fc0caa97cab3ee231b0d7cf3b9be24c0fb2c145c6f2190b4a29cc525f550d79c74a03eda157db2eae62fde8958cce2a8a4c9d0374e4d6ae09ef4ee733ce4046bee0170cff57584e0671d4f286b9691d37721b43778a4afb3c3d05fd5446d2e0bac5326f43d23126410dfb85efa26b9e1ae8d056c3ebcde0c95e1443304d7a93eb4077f76047b6e13f0e79a9631ac2bd43143854803c698a7f02933d9cbdca121cc857aacabf858f3f904c9dfedb6c03186d99490f35f09de8ab897ea7c58f07dca416e1db55c7a849a91b98d0e0c0c7bf058d86a2e997a0557800a34bb7f5806f2e15e99981cc3fe615a3ff396f7d8da30ea24626263abf0ad50a0ce2dafc55f2b0286b2204114a6754b336a913a75e66ed6a3efd132f668369692f46039d"}, 0x139, 0x0) 00:04:23 executing program 3: syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000d1f4655fd1f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b00000000020000280200000284", 0x62, 0x400}, {&(0x7f0000010400)="030000000400000005000000d4", 0xd, 0x800}, {&(0x7f0000010500)="ffffffffff070000000000000000000000000000000000000000000000000080ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff", 0x400, 0xc00}, {&(0x7f0000000000)="ed41000000040000d0f4655fd1f4655fd1f4655f13ca7302f6e9", 0x1a, 0x1600}], 0x0, &(0x7f0000000280)=ANY=[]) setxattr$trusted_overlay_upper(&(0x7f0000000540)='./file0\x00', &(0x7f0000000580), &(0x7f00000005c0)={0x0, 0xfb, 0x139, 0x0, 0x0, "eacbf6ff0bc36f5a7bb9fe2ee7bb1e01", "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"}, 0x139, 0x0) getxattr(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)=@random={'security.', ':\x00'}, &(0x7f0000000140)=""/55, 0x37) 00:04:23 executing program 2: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x7fffffff}]}) signalfd4(0xffffffffffffffff, &(0x7f00000000c0)={[0x80ffff00000000]}, 0x8, 0x0) [ 533.562942] EXT4-fs error (device loop0): ext4_fill_super:4947: inode #2: comm syz-executor.0: iget: root inode unallocated [ 533.572825] EXT4-fs (loop0): get root inode failed [ 533.573580] EXT4-fs (loop0): mount failed [ 533.581264] EXT4-fs error (device loop3): ext4_fill_super:4947: inode #2: comm syz-executor.3: iget: root inode unallocated [ 533.583278] EXT4-fs (loop3): get root inode failed [ 533.584066] EXT4-fs (loop3): mount failed 00:04:23 executing program 5: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x7fffffff}]}) signalfd4(0xffffffffffffffff, &(0x7f00000000c0), 0x8, 0x80ffff) 00:04:23 executing program 6: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000140)='cramfs\x00', 0x0, 0x0) pivot_root(&(0x7f0000000000)='./file0\x00', &(0x7f0000000240)='.\x00') openat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x2, 0x68) 00:04:23 executing program 2: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x7fffffff}]}) signalfd4(0xffffffffffffffff, &(0x7f00000000c0)={[0x300000000000000]}, 0x8, 0x0) 00:04:23 executing program 4: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x7fffffff}]}) 00:04:23 executing program 3: syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000d1f4655fd1f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b00000000020000280200000284", 0x62, 0x400}, {&(0x7f0000010400)="030000000400000005000000d4", 0xd, 0x800}, {&(0x7f0000010500)="ffffffffff070000000000000000000000000000000000000000000000000080ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff", 0x400, 0xc00}, {&(0x7f0000000000)="ed41000000040000d0f4655fd1f4655fd1f4655f13ca7302f6e9", 0x1a, 0x1600}], 0x0, &(0x7f0000000280)=ANY=[]) setxattr$trusted_overlay_upper(&(0x7f0000000540)='./file0\x00', &(0x7f0000000580), &(0x7f00000005c0)={0x0, 0xfb, 0x139, 0x0, 0x0, "eacbf6ff0bc36f5a7bb9fe2ee7bb1e01", "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"}, 0x139, 0x0) getxattr(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)=@random={'security.', ':\x00'}, &(0x7f0000000140)=""/55, 0x37) 00:04:23 executing program 0: syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000d1f4655fd1f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b00000000020000280200000284", 0x62, 0x400}, {&(0x7f0000010400)="030000000400000005000000d4", 0xd, 0x800}, {&(0x7f0000010500)="ffffffffff070000000000000000000000000000000000000000000000000080ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff", 0x400, 0xc00}, {&(0x7f0000000000)="ed41000000040000d0f4655fd1f4655fd1f4655f13ca", 0x16, 0x1600}], 0x0, &(0x7f0000000280)=ANY=[]) setxattr$trusted_overlay_upper(&(0x7f0000000540)='./file0\x00', &(0x7f0000000580), &(0x7f00000005c0)={0x0, 0xfb, 0x139, 0x0, 0x0, "eacbf6ff0bc36f5a7bb9fe2ee7bb1e01", "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"}, 0x139, 0x0) 00:04:23 executing program 2: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x7fffffff}]}) signalfd4(0xffffffffffffffff, &(0x7f00000000c0)={[0x400000000000000]}, 0x8, 0x0) 00:04:23 executing program 5: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x7fffffff}]}) signalfd4(0xffffffffffffffff, &(0x7f00000000c0), 0x8, 0x3000000) [ 533.827630] EXT4-fs error (device loop0): ext4_fill_super:4947: inode #2: comm syz-executor.0: iget: root inode unallocated [ 533.829805] EXT4-fs (loop0): get root inode failed [ 533.830561] EXT4-fs (loop0): mount failed [ 533.833819] EXT4-fs error (device loop3): ext4_fill_super:4947: inode #2: comm syz-executor.3: iget: root inode unallocated [ 533.836543] EXT4-fs (loop3): get root inode failed [ 533.837227] EXT4-fs (loop3): mount failed 00:04:37 executing program 1: ioctl$TUNSETQUEUE(0xffffffffffffffff, 0x400454d9, &(0x7f0000000b80)={'bond0\x00'}) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x7fffffff}]}) prctl$PR_SET_MM_MAP(0x23, 0xe, &(0x7f0000000180)={&(0x7f0000ffd000/0x1000)=nil, &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000fff000/0x1000)=nil, &(0x7f0000ffd000/0x1000)=nil, &(0x7f0000ffc000/0x2000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000ffe000/0x2000)=nil, &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000ffd000/0x2000)=nil, &(0x7f0000ffd000/0x2000)=nil, &(0x7f0000000140)="080afc03b8bae061a487765e741c1a3a5a7dea95a0b02b4dbb6944356a", 0x1d}, 0x68) r0 = creat(&(0x7f0000000080)='./file1\x00', 0x0) pwrite64(r0, &(0x7f0000000000)="a7", 0xfffffd6b, 0x0) accept$packet(0xffffffffffffffff, &(0x7f0000000080)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000100)=0x14) 00:04:37 executing program 7: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, 0x0) openat(0xffffffffffffff9c, 0x0, 0x1c2, 0x27) r0 = creat(&(0x7f0000000080)='./file1\x00', 0x0) ioctl$BTRFS_IOC_SCRUB(r0, 0xc400941b, &(0x7f0000000600)={0x0, 0x62, 0x80000001}) pwrite64(r0, &(0x7f0000000000)="a7", 0xfffffd6b, 0x0) accept$packet(0xffffffffffffffff, &(0x7f0000000080)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000100)=0x14) 00:04:37 executing program 6: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x400200, 0x19f) r1 = openat(0xffffffffffffff9c, 0x0, 0x1c2, 0x27) r2 = creat(&(0x7f0000000080)='./file1\x00', 0x0) ioctl$BTRFS_IOC_SCRUB_PROGRESS(r1, 0xc400941d, &(0x7f0000000200)={0x0, 0x4, 0xd3, 0x1}) ioctl$BTRFS_IOC_SCRUB(r2, 0xc400941b, &(0x7f0000000600)={r3, 0x62, 0x80000001}) pwrite64(r2, &(0x7f0000000000)="a7", 0xfffffd6b, 0x0) ioctl$TIOCSIG(0xffffffffffffffff, 0x40045436, 0x0) close(0xffffffffffffffff) ioctl$TIOCSIG(r0, 0x40045436, 0x12) r4 = openat$ptmx(0xffffffffffffff9c, 0x0, 0x8100, 0x0) ioctl$TIOCSIG(r4, 0x40045436, 0x0) copy_file_range(r2, &(0x7f0000000140)=0x539d, r4, &(0x7f0000000180)=0x9b61, 0x3278000, 0x0) ioctl$PIO_UNIMAPCLR(r2, 0x4b68, &(0x7f0000000a80)={0x80, 0x4, 0x6}) openat(r2, &(0x7f00000000c0)='./file1\x00', 0x204, 0x102) r5 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000480)='./cgroup.cpu/syz1\x00', 0x200002, 0x0) copy_file_range(r2, 0x0, r5, &(0x7f00000004c0)=0x6, 0x0, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x20002, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000040)='proc\x00', 0x0, 0x0) r6 = pidfd_getfd(r1, r2, 0x0) dup2(r2, r6) 00:04:37 executing program 4: r0 = seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x7fffffff}]}) mprotect(&(0x7f0000ffe000/0x1000)=nil, 0x1000, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r0, 0xc0502100, &(0x7f0000000200)) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x8, &(0x7f00000000c0)={0x2, &(0x7f0000000080)=[{0x101, 0x74, 0x5, 0x1be303ea}, {0xfa6, 0x5, 0x51, 0x10001}]}) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000001c0), 0x0, 0x0) prctl$PR_SET_MM_MAP(0x23, 0xe, &(0x7f0000000180)={&(0x7f0000ffd000/0x1000)=nil, &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000fff000/0x1000)=nil, &(0x7f0000ffd000/0x1000)=nil, &(0x7f0000ffc000/0x2000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000ffe000/0x2000)=nil, &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000ffd000/0x2000)=nil, &(0x7f0000ffd000/0x2000)=nil, &(0x7f0000000140)="080afc03b8bae061a487765e741c1a3a5a7dea95a0b02b4dbb6944356a", 0x1d, r1}, 0x68) sendfile(r1, r0, 0x0, 0xbe) 00:04:37 executing program 2: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x7fffffff}]}) signalfd4(0xffffffffffffffff, &(0x7f00000000c0), 0x200000c8, 0x0) 00:04:37 executing program 0: syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000d1f4655fd1f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b00000000020000280200000284", 0x62, 0x400}, {&(0x7f0000010400)="030000000400000005000000d4", 0xd, 0x800}, {&(0x7f0000010500)="ffffffffff070000000000000000000000000000000000000000000000000080ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff", 0x400, 0xc00}, {&(0x7f0000000000)="ed41000000040000d0f4655fd1f4655fd1f4655f13ca7302f6e9", 0x1a, 0x1600}], 0x0, &(0x7f0000000280)=ANY=[]) setxattr$trusted_overlay_upper(&(0x7f0000000540)='./file0\x00', &(0x7f0000000580), &(0x7f00000005c0)={0x0, 0xfb, 0x139, 0x0, 0x0, "eacbf6ff0bc36f5a7bb9fe2ee7bb1e01", "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"}, 0x139, 0x0) 00:04:37 executing program 3: syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000d1f4655fd1f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b00000000020000280200000284", 0x62, 0x400}, {&(0x7f0000010400)="030000000400000005000000d4", 0xd, 0x800}, {&(0x7f0000010500)="ffffffffff070000000000000000000000000000000000000000000000000080ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff", 0x400, 0xc00}, {&(0x7f0000000000)="ed41000000040000d0f4655fd1f4655fd1f4655f13ca7302f6e9dab9", 0x1c, 0x1600}], 0x0, &(0x7f0000000280)=ANY=[]) setxattr$trusted_overlay_upper(&(0x7f0000000540)='./file0\x00', &(0x7f0000000580), &(0x7f00000005c0)={0x0, 0xfb, 0x139, 0x0, 0x0, "eacbf6ff0bc36f5a7bb9fe2ee7bb1e01", "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"}, 0x139, 0x0) getxattr(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)=@random={'security.', ':\x00'}, &(0x7f0000000140)=""/55, 0x37) 00:04:37 executing program 5: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x7fffffff}]}) signalfd4(0xffffffffffffffff, &(0x7f00000000c0), 0x8, 0x4000000) [ 547.091738] EXT4-fs error (device loop0): ext4_fill_super:4947: inode #2: comm syz-executor.0: iget: root inode unallocated [ 547.096039] EXT4-fs (loop0): get root inode failed [ 547.096815] EXT4-fs (loop0): mount failed [ 547.130175] EXT4-fs (loop3): corrupt root inode, run e2fsck [ 547.131318] EXT4-fs (loop3): mount failed 00:04:37 executing program 5: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x7fffffff}]}) signalfd4(0xffffffffffffffff, &(0x7f00000000c0), 0x8, 0xffff8000) 00:04:37 executing program 3: syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000d1f4655fd1f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b00000000020000280200000284", 0x62, 0x400}, {&(0x7f0000010400)="030000000400000005000000d4", 0xd, 0x800}, {&(0x7f0000010500)="ffffffffff070000000000000000000000000000000000000000000000000080ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff", 0x400, 0xc00}, {&(0x7f0000000000)="ed41000000040000d0f4655fd1f4655fd1f4655f13ca7302f6e9dab9", 0x1c, 0x1600}], 0x0, &(0x7f0000000280)=ANY=[]) setxattr$trusted_overlay_upper(&(0x7f0000000540)='./file0\x00', &(0x7f0000000580), &(0x7f00000005c0)={0x0, 0xfb, 0x139, 0x0, 0x0, "eacbf6ff0bc36f5a7bb9fe2ee7bb1e01", "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"}, 0x139, 0x0) getxattr(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)=@random={'security.', ':\x00'}, &(0x7f0000000140)=""/55, 0x37) 00:04:37 executing program 2: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x7fffffff}]}) signalfd4(0xffffffffffffffff, &(0x7f00000000c0), 0x8, 0x3) 00:04:37 executing program 0: syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000d1f4655fd1f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b00000000020000280200000284", 0x62, 0x400}, {&(0x7f0000010400)="030000000400000005000000d4", 0xd, 0x800}, {&(0x7f0000010500)="ffffffffff070000000000000000000000000000000000000000000000000080ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff", 0x400, 0xc00}, {&(0x7f0000000000)="ed41000000040000d0f4655fd1f4655fd1f4655f13ca7302f6e9", 0x1a, 0x1600}], 0x0, &(0x7f0000000280)=ANY=[]) setxattr$trusted_overlay_upper(&(0x7f0000000540)='./file0\x00', &(0x7f0000000580), &(0x7f00000005c0)={0x0, 0xfb, 0x139, 0x0, 0x0, "eacbf6ff0bc36f5a7bb9fe2ee7bb1e01", "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"}, 0x139, 0x0) 00:04:37 executing program 4: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x7fffffff}]}) seccomp$SECCOMP_SET_MODE_FILTER(0x1, 0x1, &(0x7f00000000c0)={0x0, &(0x7f0000000080)}) mprotect(&(0x7f0000ffe000/0x1000)=nil, 0x1000, 0x0) r0 = openat$hpet(0xffffffffffffff9c, &(0x7f0000000080), 0x301000, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r0, 0xc0502100, &(0x7f0000000100)) 00:04:37 executing program 5: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x7fffffff}]}) signalfd4(0xffffffffffffffff, &(0x7f00000000c0), 0x8, 0x1000000000000) 00:04:37 executing program 2: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x7fffffff}]}) signalfd4(0xffffffffffffffff, &(0x7f00000000c0), 0x8, 0x4) [ 547.319735] EXT4-fs (loop3): corrupt root inode, run e2fsck [ 547.320722] EXT4-fs (loop3): mount failed [ 547.323774] EXT4-fs error (device loop0): ext4_fill_super:4947: inode #2: comm syz-executor.0: iget: root inode unallocated [ 547.330581] EXT4-fs (loop0): get root inode failed [ 547.331309] EXT4-fs (loop0): mount failed 00:04:37 executing program 3: syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000d1f4655fd1f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b00000000020000280200000284", 0x62, 0x400}, {&(0x7f0000010400)="030000000400000005000000d4", 0xd, 0x800}, {&(0x7f0000010500)="ffffffffff070000000000000000000000000000000000000000000000000080ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff", 0x400, 0xc00}, {&(0x7f0000000000)="ed41000000040000d0f4655fd1f4655fd1f4655f13ca7302f6e9dab9", 0x1c, 0x1600}], 0x0, &(0x7f0000000280)=ANY=[]) setxattr$trusted_overlay_upper(&(0x7f0000000540)='./file0\x00', &(0x7f0000000580), &(0x7f00000005c0)={0x0, 0xfb, 0x139, 0x0, 0x0, "eacbf6ff0bc36f5a7bb9fe2ee7bb1e01", "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"}, 0x139, 0x0) getxattr(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)=@random={'security.', ':\x00'}, &(0x7f0000000140)=""/55, 0x37) [ 547.470792] EXT4-fs (loop3): corrupt root inode, run e2fsck [ 547.471856] EXT4-fs (loop3): mount failed 00:04:50 executing program 4: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x6, 0x7fffffff}]}) mprotect(&(0x7f0000ffe000/0x1000)=nil, 0x1000, 0x0) 00:04:50 executing program 5: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x7fffffff}]}) signalfd4(0xffffffffffffffff, &(0x7f00000000c0), 0x8, 0x40000000000000) 00:04:50 executing program 2: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x7fffffff}]}) signalfd4(0xffffffffffffffff, &(0x7f00000000c0), 0x8, 0x300) 00:04:50 executing program 0: syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000d1f4655fd1f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b00000000020000280200000284", 0x62, 0x400}, {&(0x7f0000010400)="030000000400000005000000d4", 0xd, 0x800}, {&(0x7f0000010500)="ffffffffff070000000000000000000000000000000000000000000000000080ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff", 0x400, 0xc00}, {&(0x7f0000000000)="ed41000000040000d0f4655fd1f4655fd1f4655f13ca7302f6e9", 0x1a, 0x1600}], 0x0, &(0x7f0000000280)=ANY=[]) setxattr$trusted_overlay_upper(&(0x7f0000000540)='./file0\x00', &(0x7f0000000580), &(0x7f00000005c0)={0x0, 0xfb, 0x139, 0x0, 0x0, "eacbf6ff0bc36f5a7bb9fe2ee7bb1e01", "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"}, 0x139, 0x0) 00:04:50 executing program 3: syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000d1f4655fd1f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b00000000020000280200000284", 0x62, 0x400}, {&(0x7f0000010400)="030000000400000005000000d4", 0xd, 0x800}, {&(0x7f0000010500)="ffffffffff070000000000000000000000000000000000000000000000000080ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff", 0x400, 0xc00}, {&(0x7f0000000000)="ed41000000040000d0f4655fd1f4655fd1f4655f13ca7302f6e9dab934", 0x1d}], 0x0, &(0x7f0000000280)=ANY=[]) setxattr$trusted_overlay_upper(&(0x7f0000000540)='./file0\x00', &(0x7f0000000580), &(0x7f00000005c0)={0x0, 0xfb, 0x139, 0x0, 0x0, "eacbf6ff0bc36f5a7bb9fe2ee7bb1e01", "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"}, 0x139, 0x0) getxattr(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)=@random={'security.', ':\x00'}, &(0x7f0000000140)=""/55, 0x37) 00:04:50 executing program 6: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r0 = openat(0xffffffffffffff9c, 0x0, 0x1c2, 0x27) r1 = open(&(0x7f0000000040)='./file0\x00', 0x1810c1, 0x0) ioctl$BTRFS_IOC_SCRUB_PROGRESS(r0, 0xc400941d, &(0x7f0000000200)={0x0, 0x4, 0xd3, 0x1}) pwrite64(r1, &(0x7f0000000a40)="0f64800203d6484c7ddffad1", 0xc, 0x0) lseek(r1, 0x2, 0x3) fcntl$getflags(r1, 0x401) dup2(r0, r1) mkdirat(r1, &(0x7f0000000400)='./file0/file0\x00', 0x0) pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000680), 0x2000, 0x0) mount$9p_fd(0x0, &(0x7f0000000600)='./file1\x00', &(0x7f0000000640), 0x100800, &(0x7f0000000800)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX=r1, @ANYBLOB=',wfdno=', @ANYRESHEX=r4, @ANYBLOB="2c63616368653d667363616368652c6f626a5f757365723d706970656673002c00c5ae8c1ea2a2c9c6245ab390db5305585bc6169bdbbdfa7c0ee719fd55504e79a6a2efa03d0eb4af40fe31c915702acb9a571a39601da567c709e0baf39dab5858006800534f5689c3fadc5e0b803525e1f512f9c789d7c47b23c3cf72a52298186de55a580f844460f5064c8da3507209a0b3b932b7e16f656c69de47c4513262eda4d6dc757e1e34bc8342b9b8cb9ad8572c70b997547fe18feedfbf6613ca226baf86ccbdf3bc526bc7b8981e4c995a200a0afe26229b087bf53a59f589ee140a8e162aa5a48eb8ce3958348a00866b6606ba180e"]) openat(r2, &(0x7f0000000140)='./file0\x00', 0x4002, 0x4) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000040)='proc\x00', 0x0, 0x0) openat(r3, &(0x7f00000002c0)='./file1\x00', 0x501080, 0x10) mount$bind(&(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)='./file0/file0\x00', &(0x7f0000000200), 0x8000, 0x0) mount(&(0x7f0000000300)=@filename='./file1\x00', &(0x7f0000000340)='./file0/file0\x00', &(0x7f0000000380)='gfs2meta\x00', 0x1000000, &(0x7f00000003c0)='proc\x00') r5 = syz_open_dev$tty20(0xc, 0x4, 0x0) copy_file_range(r5, 0x0, 0xffffffffffffffff, &(0x7f0000000280)=0x6ed, 0x8, 0x0) pivot_root(&(0x7f0000000000)='./file0\x00', &(0x7f0000000240)='.\x00') 00:04:50 executing program 7: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, 0x0) openat(0xffffffffffffff9c, 0x0, 0x1c2, 0x27) r0 = creat(&(0x7f0000000080)='./file1\x00', 0x0) ioctl$BTRFS_IOC_SCRUB(r0, 0xc400941b, &(0x7f0000000600)={0x0, 0x62, 0x80000001}) pwrite64(r0, &(0x7f0000000000)="a7", 0xfffffd6b, 0x0) accept$packet(0xffffffffffffffff, &(0x7f0000000080)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000100)=0x14) 00:04:50 executing program 1: ioctl$TUNSETQUEUE(0xffffffffffffffff, 0x400454d9, &(0x7f0000000b80)={'bond0\x00'}) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x7fffffff}]}) prctl$PR_SET_MM_MAP(0x23, 0xe, &(0x7f0000000180)={&(0x7f0000ffd000/0x1000)=nil, &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000fff000/0x1000)=nil, &(0x7f0000ffd000/0x1000)=nil, &(0x7f0000ffc000/0x2000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000ffe000/0x2000)=nil, &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000ffd000/0x2000)=nil, &(0x7f0000ffd000/0x2000)=nil, &(0x7f0000000140)="080afc03b8bae061a487765e741c1a3a5a7dea95a0b02b4dbb6944356a", 0x1d}, 0x68) r0 = creat(&(0x7f0000000080)='./file1\x00', 0x0) pwrite64(r0, &(0x7f0000000000)="a7", 0xfffffd6b, 0x0) accept$packet(0xffffffffffffffff, &(0x7f0000000080)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000100)=0x14) [ 560.877107] EXT4-fs error (device loop0): ext4_fill_super:4947: inode #2: comm syz-executor.0: iget: root inode unallocated [ 560.879238] EXT4-fs (loop0): get root inode failed [ 560.880116] EXT4-fs (loop0): mount failed [ 560.891527] EXT4-fs error (device loop3): ext4_fill_super:4947: inode #2: comm syz-executor.3: iget: root inode unallocated [ 560.894962] EXT4-fs (loop3): get root inode failed [ 560.895817] EXT4-fs (loop3): mount failed 00:04:50 executing program 2: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x7fffffff}]}) signalfd4(0xffffffffffffffff, &(0x7f00000000c0), 0x8, 0x4000) 00:04:50 executing program 0: syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000d1f4655fd1f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b00000000020000280200000284", 0x62, 0x400}, {&(0x7f0000010400)="030000000400000005000000d4", 0xd, 0x800}, {&(0x7f0000010500)="ffffffffff070000000000000000000000000000000000000000000000000080ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff", 0x400, 0xc00}, {&(0x7f0000000000)="ed41000000040000d0f4655fd1f4655fd1f4655f13ca7302f6e9dab9", 0x1c, 0x1600}], 0x0, &(0x7f0000000280)=ANY=[]) setxattr$trusted_overlay_upper(&(0x7f0000000540)='./file0\x00', &(0x7f0000000580), &(0x7f00000005c0)={0x0, 0xfb, 0x139, 0x0, 0x0, "eacbf6ff0bc36f5a7bb9fe2ee7bb1e01", "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"}, 0x139, 0x0) 00:04:50 executing program 5: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x7fffffff}]}) signalfd4(0xffffffffffffffff, &(0x7f00000000c0), 0x8, 0x80ffff00000000) 00:04:51 executing program 4: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x8, &(0x7f0000000000)={0x0, &(0x7f0000000040)}) mprotect(&(0x7f0000ffe000/0x1000)=nil, 0x1000, 0x0) r0 = syz_io_uring_setup(0x1c9a, &(0x7f0000000080)={0x0, 0x1b4a, 0x2, 0x1, 0x249}, &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000fef000/0x10000)=nil, &(0x7f0000000100)=0x0, &(0x7f0000000140)) syz_io_uring_setup(0x309, &(0x7f0000000180)={0x0, 0xed49, 0x1, 0x1, 0x3e2}, &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000ffa000/0x3000)=nil, &(0x7f0000000200)=0x0, &(0x7f0000000240)) syz_io_uring_setup(0x1432, &(0x7f00000005c0)={0x0, 0x0, 0x1}, &(0x7f00000a0000)=nil, &(0x7f0000ffb000/0x2000)=nil, &(0x7f0000000000)=0x0, &(0x7f0000000140)=0x0) pwrite64(0xffffffffffffffff, &(0x7f0000000a40)="ff7f800203d6484c7ddefad1", 0xc, 0x0) lseek(0xffffffffffffffff, 0x2, 0x3) fcntl$getflags(0xffffffffffffffff, 0x401) dup2(0xffffffffffffffff, 0xffffffffffffffff) getsockopt$inet6_tcp_TCP_ZEROCOPY_RECEIVE(0xffffffffffffffff, 0x6, 0x23, &(0x7f0000000300)={&(0x7f0000ffc000/0x3000)=nil, 0x3000}, &(0x7f0000000480)=0x10) syz_io_uring_submit(r3, r4, &(0x7f00000002c0)=@IORING_OP_READ=@use_registered_buffer={0x16, 0x4, 0x0, @fd_index=0x5}, 0x0) syz_io_uring_setup(0x5980, &(0x7f0000000540)={0x0, 0x0, 0x0, 0x2}, &(0x7f0000ffe000/0x2000)=nil, &(0x7f0000ffe000/0x1000)=nil, &(0x7f00000004c0), &(0x7f0000000500)=0x0) syz_io_uring_submit(r3, r5, &(0x7f0000000340)=@IORING_OP_POLL_REMOVE, 0x0) r6 = accept$unix(0xffffffffffffffff, &(0x7f0000000380), &(0x7f0000000400)=0x6e) syz_io_uring_submit(r2, r5, &(0x7f0000000440)=@IORING_OP_RECV=@use_registered_buffer={0x1b, 0x5, 0x0, r6, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x9) mlock(&(0x7f0000ffb000/0x1000)=nil, 0x1000) syz_io_uring_setup(0x1432, &(0x7f0000000080)={0x0, 0x0, 0x11}, &(0x7f00000a0000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000000000)=0x0, &(0x7f0000000140)=0x0) syz_io_uring_submit(r7, r8, &(0x7f00000002c0)=@IORING_OP_READ=@use_registered_buffer={0x16, 0x4, 0x0, @fd_index=0x5}, 0x0) syz_io_uring_submit(r1, r8, &(0x7f0000000040)=@IORING_OP_READ_FIXED={0x4, 0x4, 0x6000, @fd=r0, 0x5, 0x200, 0x8209, 0x1c, 0x1, {0x3}}, 0x1000) mprotect(&(0x7f0000ff4000/0x3000)=nil, 0x3000, 0x3547cd9d8e8d57b2) 00:04:51 executing program 6: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000040)='proc\x00', 0x0, 0x0) pivot_root(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='.\x00') 00:04:51 executing program 3: syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000d1f4655fd1f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b00000000020000280200000284", 0x62, 0x400}, {&(0x7f0000010400)="030000000400000005000000d4", 0xd, 0x800}, {&(0x7f0000010500)="ffffffffff070000000000000000000000000000000000000000000000000080ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff", 0x400, 0xc00}, {&(0x7f0000000000)="ed41000000040000d0f4655fd1f4655fd1f4655f13ca7302f6e9dab934", 0x1d}], 0x0, &(0x7f0000000280)=ANY=[]) setxattr$trusted_overlay_upper(&(0x7f0000000540)='./file0\x00', &(0x7f0000000580), &(0x7f00000005c0)={0x0, 0xfb, 0x139, 0x0, 0x0, "eacbf6ff0bc36f5a7bb9fe2ee7bb1e01", "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"}, 0x139, 0x0) getxattr(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)=@random={'security.', ':\x00'}, &(0x7f0000000140)=""/55, 0x37) 00:04:51 executing program 5: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x7fffffff}]}) signalfd4(0xffffffffffffffff, &(0x7f00000000c0), 0x8, 0x300000000000000) 00:04:51 executing program 2: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x7fffffff}]}) signalfd4(0xffffffffffffffff, &(0x7f00000000c0), 0x8, 0x400000) [ 561.112240] EXT4-fs (loop0): corrupt root inode, run e2fsck [ 561.114711] EXT4-fs (loop0): mount failed 00:04:51 executing program 6: fsconfig$FSCONFIG_SET_BINARY(0xffffffffffffffff, 0x2, &(0x7f00000000c0)='#.@}\x00', &(0x7f0000000140)="eac042bfc9edcd", 0x7) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000040)='proc\x00', 0x0, 0x0) pivot_root(&(0x7f0000000000)='./file0\x00', &(0x7f0000000240)='.\x00') [ 561.214010] EXT4-fs error (device loop3): ext4_fill_super:4947: inode #2: comm syz-executor.3: iget: root inode unallocated [ 561.231454] EXT4-fs (loop3): get root inode failed [ 561.233148] EXT4-fs (loop3): mount failed 00:04:51 executing program 0: syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000d1f4655fd1f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b00000000020000280200000284", 0x62, 0x400}, {&(0x7f0000010400)="030000000400000005000000d4", 0xd, 0x800}, {&(0x7f0000010500)="ffffffffff070000000000000000000000000000000000000000000000000080ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff", 0x400, 0xc00}, {&(0x7f0000000000)="ed41000000040000d0f4655fd1f4655fd1f4655f13ca7302f6e9dab9", 0x1c, 0x1600}], 0x0, &(0x7f0000000280)=ANY=[]) setxattr$trusted_overlay_upper(&(0x7f0000000540)='./file0\x00', &(0x7f0000000580), &(0x7f00000005c0)={0x0, 0xfb, 0x139, 0x0, 0x0, "eacbf6ff0bc36f5a7bb9fe2ee7bb1e01", "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"}, 0x139, 0x0) 00:04:51 executing program 5: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x7fffffff}]}) signalfd4(0xffffffffffffffff, &(0x7f00000000c0), 0x8, 0x400000000000000) [ 561.346533] EXT4-fs (loop0): corrupt root inode, run e2fsck [ 561.347573] EXT4-fs (loop0): mount failed 00:05:04 executing program 1: ioctl$TUNSETQUEUE(0xffffffffffffffff, 0x400454d9, &(0x7f0000000b80)={'bond0\x00'}) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x7fffffff}]}) prctl$PR_SET_MM_MAP(0x23, 0xe, &(0x7f0000000180)={&(0x7f0000ffd000/0x1000)=nil, &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000fff000/0x1000)=nil, &(0x7f0000ffd000/0x1000)=nil, &(0x7f0000ffc000/0x2000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000ffe000/0x2000)=nil, &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000ffd000/0x2000)=nil, &(0x7f0000ffd000/0x2000)=nil, &(0x7f0000000140)="080afc03b8bae061a487765e741c1a3a5a7dea95a0b02b4dbb6944356a", 0x1d}, 0x68) r0 = creat(&(0x7f0000000080)='./file1\x00', 0x0) pwrite64(r0, &(0x7f0000000000)="a7", 0xfffffd6b, 0x0) accept$packet(0xffffffffffffffff, &(0x7f0000000080)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000100)=0x14) 00:05:04 executing program 7: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x0, 0x0}) openat(0xffffffffffffff9c, 0x0, 0x1c2, 0x27) r0 = creat(&(0x7f0000000080)='./file1\x00', 0x0) ioctl$BTRFS_IOC_SCRUB(r0, 0xc400941b, &(0x7f0000000600)={0x0, 0x62, 0x80000001}) pwrite64(r0, &(0x7f0000000000)="a7", 0xfffffd6b, 0x0) accept$packet(0xffffffffffffffff, &(0x7f0000000080)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000100)=0x14) 00:05:04 executing program 3: syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000d1f4655fd1f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b00000000020000280200000284", 0x62, 0x400}, {&(0x7f0000010400)="030000000400000005000000d4", 0xd, 0x800}, {&(0x7f0000010500)="ffffffffff070000000000000000000000000000000000000000000000000080ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff", 0x400, 0xc00}, {&(0x7f0000000000)="ed41000000040000d0f4655fd1f4655fd1f4655f13ca7302f6e9dab934", 0x1d}], 0x0, &(0x7f0000000280)=ANY=[]) setxattr$trusted_overlay_upper(&(0x7f0000000540)='./file0\x00', &(0x7f0000000580), &(0x7f00000005c0)={0x0, 0xfb, 0x139, 0x0, 0x0, "eacbf6ff0bc36f5a7bb9fe2ee7bb1e01", "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"}, 0x139, 0x0) getxattr(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)=@random={'security.', ':\x00'}, &(0x7f0000000140)=""/55, 0x37) 00:05:04 executing program 5: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x7fffffff}]}) signalfd4(0xffffffffffffffff, &(0x7f00000000c0), 0x8, 0x0) r0 = openat(0xffffffffffffff9c, 0x0, 0x1c2, 0x27) r1 = open(&(0x7f0000000040)='./file0\x00', 0x1810c1, 0x0) ioctl$BTRFS_IOC_SCRUB_PROGRESS(r0, 0xc400941d, &(0x7f0000000200)={0x0, 0x4, 0xd3, 0x1}) pwrite64(r1, &(0x7f0000000a40)="0f64800203d6484c7ddffad1", 0xc, 0x0) lseek(r1, 0x2, 0x3) fcntl$getflags(r1, 0x401) dup2(r0, r1) getdents64(r1, &(0x7f0000000100)=""/219, 0xdb) 00:05:04 executing program 2: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x7fffffff}]}) signalfd4(0xffffffffffffffff, &(0x7f00000000c0), 0x8, 0x80ffff) 00:05:04 executing program 6: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) pivot_root(&(0x7f0000000000)='./file0\x00', &(0x7f0000000240)='.\x00') lsetxattr$trusted_overlay_redirect(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080), &(0x7f00000001c0)='./file0\x00', 0x8, 0x0) mount$9p_unix(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f0000000180), 0x1000, &(0x7f0000000280)={'trans=unix,', {[{@debug={'debug', 0x3d, 0x2}}, {@noextend}, {@noextend}, {@aname={'aname', 0x3d, '{'}}, {@access_client}, {@cache_fscache}, {@cache_mmap}], [{@subj_user={'subj_user', 0x3d, 'proc\x00'}}, {@mask={'mask', 0x3d, 'MAY_APPEND'}}, {@dont_measure}, {@subj_role={'subj_role', 0x3d, 'proc\x00'}}]}}) 00:05:04 executing program 4: r0 = seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x4}]}) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r0, 0xc0502100, &(0x7f0000000100)) mprotect(&(0x7f0000ffe000/0x1000)=nil, 0x1000, 0x0) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0xa, &(0x7f00000000c0)={0x6, &(0x7f0000000000)=[{0x3, 0x3a, 0x9, 0x301e}, {0x4, 0x81, 0x6, 0x7ff}, {0xd581, 0x6, 0xcf, 0x28}, {0x3f, 0x1, 0x3f, 0xd41}, {0x8, 0x2, 0x63, 0x80000000}, {0x40, 0x5d, 0x0, 0x1}]}) 00:05:04 executing program 0: syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000d1f4655fd1f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b00000000020000280200000284", 0x62, 0x400}, {&(0x7f0000010400)="030000000400000005000000d4", 0xd, 0x800}, {&(0x7f0000010500)="ffffffffff070000000000000000000000000000000000000000000000000080ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff", 0x400, 0xc00}, {&(0x7f0000000000)="ed41000000040000d0f4655fd1f4655fd1f4655f13ca7302f6e9dab9", 0x1c, 0x1600}], 0x0, &(0x7f0000000280)=ANY=[]) setxattr$trusted_overlay_upper(&(0x7f0000000540)='./file0\x00', &(0x7f0000000580), &(0x7f00000005c0)={0x0, 0xfb, 0x139, 0x0, 0x0, "eacbf6ff0bc36f5a7bb9fe2ee7bb1e01", "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"}, 0x139, 0x0) [ 574.473226] audit: type=1326 audit(1626998704.483:34): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=6139 comm="syz-executor.4" exe="/syz-executor.4" sig=31 arch=c000003e syscall=202 compat=0 ip=0x466609 code=0x0 00:05:04 executing program 6: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000040)='proc\x00', 0x0, 0x0) pivot_root(&(0x7f0000000000)='./file0\x00', &(0x7f0000000240)='.\x00') [ 574.506448] EXT4-fs (loop0): corrupt root inode, run e2fsck [ 574.508588] EXT4-fs (loop0): mount failed [ 574.511372] EXT4-fs error (device loop3): ext4_fill_super:4947: inode #2: comm syz-executor.3: iget: root inode unallocated [ 574.517754] EXT4-fs (loop3): get root inode failed [ 574.519387] EXT4-fs (loop3): mount failed 00:05:04 executing program 2: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x7fffffff}]}) signalfd4(0xffffffffffffffff, &(0x7f00000000c0), 0x8, 0x3000000) 00:05:04 executing program 5: r0 = seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x7fffffff}]}) r1 = seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0xc, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x7fc00002}]}) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r1, 0xc0502100, &(0x7f0000000140)={0x0}) ioctl$SECCOMP_IOCTL_NOTIF_ADDFD(r1, 0xc0182101, &(0x7f00000000c0)={r2}) r3 = accept4$unix(0xffffffffffffffff, &(0x7f0000000640)=@abs, &(0x7f00000006c0)=0x6e, 0xc0000) ioctl$SECCOMP_IOCTL_NOTIF_ADDFD(r0, 0x40182103, &(0x7f0000000700)={r2, 0x0, r3, 0x5}) signalfd4(0xffffffffffffffff, &(0x7f00000000c0), 0x8, 0x0) readv(r0, &(0x7f00000005c0)=[{&(0x7f0000000100)=""/140, 0x8c}, {&(0x7f00000001c0)=""/230, 0xe6}, {&(0x7f00000002c0)=""/228, 0xe4}, {&(0x7f0000000080)=""/49, 0x31}, {&(0x7f00000003c0)=""/138, 0x8a}, {&(0x7f0000000480)=""/68, 0x44}, {&(0x7f0000000500)=""/148, 0x94}], 0x7) 00:05:04 executing program 3: syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000d1f4655fd1f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b00000000020000280200000284", 0x62, 0x400}, {&(0x7f0000010400)="030000000400000005000000d4", 0xd, 0x800}, {&(0x7f0000000000)="ed41000000040000d0f4655fd1f4655fd1f4655f13ca7302f6e9dab934", 0x1d, 0x1600}], 0x0, &(0x7f0000000280)=ANY=[]) setxattr$trusted_overlay_upper(&(0x7f0000000540)='./file0\x00', &(0x7f0000000580), &(0x7f00000005c0)={0x0, 0xfb, 0x139, 0x0, 0x0, "eacbf6ff0bc36f5a7bb9fe2ee7bb1e01", "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"}, 0x139, 0x0) getxattr(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)=@random={'security.', ':\x00'}, &(0x7f0000000140)=""/55, 0x37) 00:05:04 executing program 0: syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000d1f4655fd1f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b00000000020000280200000284", 0x62, 0x400}, {&(0x7f0000010400)="030000000400000005000000d4", 0xd, 0x800}, {&(0x7f0000010500)="ffffffffff070000000000000000000000000000000000000000000000000080ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff", 0x400, 0xc00}, {&(0x7f0000000000)="ed41000000040000d0f4655fd1f4655fd1f4655f13ca7302f6e9dab934", 0x1d}], 0x0, &(0x7f0000000280)=ANY=[]) setxattr$trusted_overlay_upper(&(0x7f0000000540)='./file0\x00', &(0x7f0000000580), &(0x7f00000005c0)={0x0, 0xfb, 0x139, 0x0, 0x0, "eacbf6ff0bc36f5a7bb9fe2ee7bb1e01", "a49dbbc75b5fc0caa97cab3ee231b0d7cf3b9be24c0fb2c145c6f2190b4a29cc525f550d79c74a03eda157db2eae62fde8958cce2a8a4c9d0374e4d6ae09ef4ee733ce4046bee0170cff57584e0671d4f286b9691d37721b43778a4afb3c3d05fd5446d2e0bac5326f43d23126410dfb85efa26b9e1ae8d056c3ebcde0c95e1443304d7a93eb4077f76047b6e13f0e79a9631ac2bd43143854803c698a7f02933d9cbdca121cc857aacabf858f3f904c9dfedb6c03186d99490f35f09de8ab897ea7c58f07dca416e1db55c7a849a91b98d0e0c0c7bf058d86a2e997a0557800a34bb7f5806f2e15e99981cc3fe615a3ff396f7d8da30ea24626263abf0ad50a0ce2dafc55f2b0286b2204114a6754b336a913a75e66ed6a3efd132f668369692f46039d"}, 0x139, 0x0) 00:05:04 executing program 2: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x7fffffff}]}) signalfd4(0xffffffffffffffff, &(0x7f00000000c0), 0x8, 0x4000000) 00:05:04 executing program 6: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x8000000003, 0x0, 0x0, 0x902002, 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000040)='proc\x00', 0x0, 0x0) pivot_root(&(0x7f0000000000)='./file0\x00', &(0x7f0000000240)='.\x00') 00:05:04 executing program 2: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x7fffffff}]}) signalfd4(0xffffffffffffffff, &(0x7f00000000c0), 0x8, 0xffff8000) [ 574.747350] EXT4-fs error (device loop0): ext4_fill_super:4947: inode #2: comm syz-executor.0: iget: root inode unallocated [ 574.754701] EXT4-fs (loop0): get root inode failed [ 574.755677] EXT4-fs (loop0): mount failed [ 574.766759] EXT4-fs (loop3): mounted filesystem without journal. Opts: ,errors=continue [ 574.777206] EXT4-fs error (device loop3): ext4_validate_block_bitmap:398: comm syz-executor.3: bg 0: block 3: invalid block bitmap [ 575.297010] audit: type=1326 audit(1626998705.307:35): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=6139 comm="syz-executor.4" exe="/syz-executor.4" sig=31 arch=c000003e syscall=202 compat=0 ip=0x466609 code=0x0 00:05:05 executing program 3: syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000d1f4655fd1f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b00000000020000280200000284", 0x62, 0x400}, {&(0x7f0000010400)="030000000400000005000000d4", 0xd, 0x800}, {&(0x7f0000000000)="ed41000000040000d0f4655fd1f4655fd1f4655f13ca7302f6e9dab934", 0x1d, 0x1600}], 0x0, &(0x7f0000000280)=ANY=[]) setxattr$trusted_overlay_upper(&(0x7f0000000540)='./file0\x00', &(0x7f0000000580), &(0x7f00000005c0)={0x0, 0xfb, 0x139, 0x0, 0x0, "eacbf6ff0bc36f5a7bb9fe2ee7bb1e01", "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"}, 0x139, 0x0) getxattr(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)=@random={'security.', ':\x00'}, &(0x7f0000000140)=""/55, 0x37) 00:05:05 executing program 0: syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000d1f4655fd1f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b00000000020000280200000284", 0x62, 0x400}, {&(0x7f0000010400)="030000000400000005000000d4", 0xd, 0x800}, {&(0x7f0000010500)="ffffffffff070000000000000000000000000000000000000000000000000080ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff", 0x400, 0xc00}, {&(0x7f0000000000)="ed41000000040000d0f4655fd1f4655fd1f4655f13ca7302f6e9dab934", 0x1d}], 0x0, &(0x7f0000000280)=ANY=[]) setxattr$trusted_overlay_upper(&(0x7f0000000540)='./file0\x00', &(0x7f0000000580), &(0x7f00000005c0)={0x0, 0xfb, 0x139, 0x0, 0x0, "eacbf6ff0bc36f5a7bb9fe2ee7bb1e01", "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"}, 0x139, 0x0) 00:05:05 executing program 6: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000040)='ntfs\x00', 0x8000, 0x0) r0 = shmget$private(0x0, 0x4000, 0x2, &(0x7f0000ffa000/0x4000)=nil) getresgid(&(0x7f0000001280)=0x0, &(0x7f00000012c0), &(0x7f0000001300)) r2 = fork() shmctl$IPC_SET(r0, 0x1, &(0x7f0000001340)={{0x1, 0xee01, r1, 0xee00, 0xee00, 0xc9, 0x800}, 0x8001, 0x1, 0x8, 0x5, 0xffffffffffffffff, r2, 0x7}) r3 = openat(0xffffffffffffff9c, 0x0, 0x1c2, 0x27) r4 = shmget(0x3, 0x4000, 0x10, &(0x7f0000ff8000/0x4000)=nil) shmctl$SHM_INFO(r4, 0xe, &(0x7f0000000640)=""/13) r5 = open(&(0x7f0000000040)='./file0\x00', 0x1810c1, 0x0) ioctl$BTRFS_IOC_SCRUB_PROGRESS(r3, 0xc400941d, &(0x7f0000000200)={0x0, 0x4, 0xd3, 0x1}) pwrite64(r5, &(0x7f0000000a40)="0f64800203d6484c7ddffad1", 0xc, 0x0) lseek(r3, 0x7, 0x3) fcntl$getflags(r5, 0x401) dup2(r3, r5) getdents(r3, &(0x7f00000013c0)=""/4096, 0x1000) openat$dir(0xffffffffffffff9c, &(0x7f0000000600)='./file0\x00', 0x2, 0x1) getresuid(&(0x7f00000001c0), &(0x7f0000000200), &(0x7f0000000340)=0x0) mount$9p_xen(&(0x7f00000000c0), &(0x7f0000000140)='./file0\x00', &(0x7f0000000180), 0x21a060, &(0x7f0000000280)={'trans=xen,', {[{@posixacl}, {@access_uid={'access', 0x3d, r6}}, {@nodevmap}, {@nodevmap}]}}) pivot_root(&(0x7f0000000000)='./file0\x00', &(0x7f0000000240)='.\x00') 00:05:05 executing program 1: ioctl$TUNSETQUEUE(0xffffffffffffffff, 0x400454d9, &(0x7f0000000b80)={'bond0\x00'}) r0 = signalfd4(0xffffffffffffffff, &(0x7f00000000c0), 0x8, 0x0) prctl$PR_SET_MM_MAP(0x23, 0xe, &(0x7f0000000180)={&(0x7f0000ffd000/0x1000)=nil, &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000fff000/0x1000)=nil, &(0x7f0000ffd000/0x1000)=nil, &(0x7f0000ffc000/0x2000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000ffe000/0x2000)=nil, &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000ffd000/0x2000)=nil, &(0x7f0000ffd000/0x2000)=nil, &(0x7f0000000140)="080afc03b8bae061a487765e741c1a3a5a7dea95a0b02b4dbb6944356a", 0x1d}, 0x68) r1 = creat(&(0x7f0000000080)='./file1\x00', 0x0) pwrite64(r1, &(0x7f0000000000)="a7", 0xfffffd6b, 0x0) accept$packet(r0, &(0x7f0000000080)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000100)=0x14) 00:05:05 executing program 2: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x7fffffff}]}) signalfd4(0xffffffffffffffff, &(0x7f00000000c0), 0x8, 0x1000000000000) 00:05:05 executing program 7: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x0, 0x0}) openat(0xffffffffffffff9c, 0x0, 0x1c2, 0x27) r0 = creat(&(0x7f0000000080)='./file1\x00', 0x0) ioctl$BTRFS_IOC_SCRUB(r0, 0xc400941b, &(0x7f0000000600)={0x0, 0x62, 0x80000001}) pwrite64(r0, &(0x7f0000000000)="a7", 0xfffffd6b, 0x0) accept$packet(0xffffffffffffffff, &(0x7f0000000080)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000100)=0x14) [ 575.389190] EXT4-fs error (device loop0): ext4_fill_super:4947: inode #2: comm syz-executor.0: iget: root inode unallocated [ 575.391069] EXT4-fs (loop0): get root inode failed [ 575.391760] EXT4-fs (loop0): mount failed 00:05:05 executing program 4: sendmsg$IPCTNL_MSG_CT_GET_UNCONFIRMED(0xffffffffffffffff, &(0x7f0000000140)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f0000000100)={&(0x7f00000000c0)={0x14, 0x7, 0x1, 0x3, 0x0, 0x0, {0x0, 0x0, 0x9}, ["", "", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x20040800}, 0x4004) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0xc, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x8, 0x20, 0x9, 0xbfb}]}) [ 575.401291] EXT4-fs (loop3): mounted filesystem without journal. Opts: ,errors=continue [ 575.430956] EXT4-fs error (device loop3): ext4_validate_block_bitmap:398: comm syz-executor.3: bg 0: block 3: invalid block bitmap 00:05:05 executing program 4: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x7fffffff}]}) mprotect(&(0x7f0000ffe000/0x1000)=nil, 0x1000, 0x0) r0 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000100), 0x300, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r0, 0xc0502100, &(0x7f0000000080)) 00:05:05 executing program 2: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x7fffffff}]}) signalfd4(0xffffffffffffffff, &(0x7f00000000c0), 0x8, 0x40000000000000) 00:05:05 executing program 3: syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000d1f4655fd1f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b00000000020000280200000284", 0x62, 0x400}, {&(0x7f0000010400)="030000000400000005000000d4", 0xd, 0x800}, {&(0x7f0000000000)="ed41000000040000d0f4655fd1f4655fd1f4655f13ca7302f6e9dab934", 0x1d, 0x1600}], 0x0, &(0x7f0000000280)=ANY=[]) setxattr$trusted_overlay_upper(&(0x7f0000000540)='./file0\x00', &(0x7f0000000580), &(0x7f00000005c0)={0x0, 0xfb, 0x139, 0x0, 0x0, "eacbf6ff0bc36f5a7bb9fe2ee7bb1e01", "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"}, 0x139, 0x0) getxattr(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)=@random={'security.', ':\x00'}, &(0x7f0000000140)=""/55, 0x37) [ 575.638290] EXT4-fs (loop3): mounted filesystem without journal. Opts: ,errors=continue [ 575.641060] EXT4-fs error (device loop3): ext4_validate_block_bitmap:398: comm syz-executor.3: bg 0: block 3: invalid block bitmap 00:05:19 executing program 5: r0 = openat(0xffffffffffffff9c, 0x0, 0x1c2, 0x27) r1 = open(&(0x7f0000000040)='./file0\x00', 0x1810c1, 0x0) ioctl$BTRFS_IOC_SCRUB_PROGRESS(r0, 0xc400941d, &(0x7f0000000200)={0x0, 0x4, 0xd3, 0x1}) pwrite64(r1, &(0x7f0000000a40)="0f64800203d6484c7ddffad1", 0xc, 0x0) lseek(r1, 0x2, 0x3) fcntl$getflags(r1, 0x401) dup2(r0, r1) setsockopt$IP_VS_SO_SET_FLUSH(r0, 0x0, 0x485, 0x0, 0x0) r2 = getpgid(0x0) ptrace$cont(0x1f, r2, 0xf8b, 0x99a5) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x7fffffff}]}) r3 = openat$hpet(0xffffffffffffff9c, &(0x7f0000000080), 0x50300, 0x0) pwrite64(r3, &(0x7f0000000100)="2b860cecd156c3045a268fc02e4b11d6af01c0da9f294cfd648df914c320abe23b8a579124b08bb85f842959ca6993ba3ef4b42ec2329bffeadf42225dc38559e4e99f48d92578c8d128aa985233190a48f51039db7b60f2010409c0a31e5339ae1ae589f4869798699ceb5f4e614665518da07411c3d6e382c3e998e258a63aa3fb319a3e2c0c22868c7e9bcc22c1f075610a0cbd4607d55074d24416523af425f808c7e767f7eab2fd890424c8279ddbe9b3218b5796feee4a74c85019abe30aec06a81ccc9ebf12881ecc0a7e", 0xce, 0x7) r4 = epoll_create(0xa4) ioctl$FS_IOC_MEASURE_VERITY(r4, 0xc0046686, &(0x7f0000000300)=ANY=[@ANYBLOB="0300df005588eefde04d9cec443d392aedd667e8c9dea82bb8c780ec83e4579e4027760234c3ede55c213f4ec15b32ad28fd113dbd5446250fb6071f6b67351893ea9600c8710b26aac00c5702e3754878938045d23f3aaf049e7a98fcd89e9ab922c31a44531ed00e898179334198925a9eb2dedfe6ae9db4f556425166afa3d9484dd331130cc0eaae83876209e838997852deb744415dfb64351b0a741b164362392700584300e8b9c12927f6688110ae51b0fd55b156f6cb82b4c770b66502302cd20bf3288a5af5a393b27d0239be11edae72dfa309a6313b57cc9426acb7e62de611aaa80a3f80010000009417"]) 00:05:19 executing program 7: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x0, 0x0}) openat(0xffffffffffffff9c, 0x0, 0x1c2, 0x27) r0 = creat(&(0x7f0000000080)='./file1\x00', 0x0) ioctl$BTRFS_IOC_SCRUB(r0, 0xc400941b, &(0x7f0000000600)={0x0, 0x62, 0x80000001}) pwrite64(r0, &(0x7f0000000000)="a7", 0xfffffd6b, 0x0) accept$packet(0xffffffffffffffff, &(0x7f0000000080)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000100)=0x14) 00:05:19 executing program 1: ioctl$TUNSETQUEUE(0xffffffffffffffff, 0x400454d9, &(0x7f0000000b80)={'bond0\x00'}) r0 = signalfd4(0xffffffffffffffff, &(0x7f00000000c0), 0x8, 0x0) prctl$PR_SET_MM_MAP(0x23, 0xe, &(0x7f0000000180)={&(0x7f0000ffd000/0x1000)=nil, &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000fff000/0x1000)=nil, &(0x7f0000ffd000/0x1000)=nil, &(0x7f0000ffc000/0x2000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000ffe000/0x2000)=nil, &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000ffd000/0x2000)=nil, &(0x7f0000ffd000/0x2000)=nil, &(0x7f0000000140)="080afc03b8bae061a487765e741c1a3a5a7dea95a0b02b4dbb6944356a", 0x1d}, 0x68) r1 = creat(&(0x7f0000000080)='./file1\x00', 0x0) pwrite64(r1, &(0x7f0000000000)="a7", 0xfffffd6b, 0x0) accept$packet(r0, &(0x7f0000000080)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000100)=0x14) 00:05:19 executing program 2: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x7fffffff}]}) signalfd4(0xffffffffffffffff, &(0x7f00000000c0), 0x8, 0x80ffff00000000) 00:05:19 executing program 0: syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000d1f4655fd1f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b00000000020000280200000284", 0x62, 0x400}, {&(0x7f0000010400)="030000000400000005000000d4", 0xd, 0x800}, {&(0x7f0000010500)="ffffffffff070000000000000000000000000000000000000000000000000080ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff", 0x400, 0xc00}, {&(0x7f0000000000)="ed41000000040000d0f4655fd1f4655fd1f4655f13ca7302f6e9dab934", 0x1d}], 0x0, &(0x7f0000000280)=ANY=[]) setxattr$trusted_overlay_upper(&(0x7f0000000540)='./file0\x00', &(0x7f0000000580), &(0x7f00000005c0)={0x0, 0xfb, 0x139, 0x0, 0x0, "eacbf6ff0bc36f5a7bb9fe2ee7bb1e01", "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"}, 0x139, 0x0) 00:05:19 executing program 4: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x3, 0x0, 0x0, 0x7fffffff}]}) mprotect(&(0x7f0000ffe000/0x1000)=nil, 0x1000, 0x0) 00:05:19 executing program 3: syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000d1f4655fd1f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b00000000020000280200000284", 0x62, 0x400}, {&(0x7f0000010400)="030000000400000005000000d4", 0xd, 0x800}, {0x0, 0x0, 0xc00}, {&(0x7f0000000000)="ed41000000040000d0f4655fd1f4655fd1f4655f13ca7302f6e9dab934", 0x1d, 0x1600}], 0x0, &(0x7f0000000280)=ANY=[]) setxattr$trusted_overlay_upper(&(0x7f0000000540)='./file0\x00', &(0x7f0000000580), &(0x7f00000005c0)={0x0, 0xfb, 0x139, 0x0, 0x0, "eacbf6ff0bc36f5a7bb9fe2ee7bb1e01", "a49dbbc75b5fc0caa97cab3ee231b0d7cf3b9be24c0fb2c145c6f2190b4a29cc525f550d79c74a03eda157db2eae62fde8958cce2a8a4c9d0374e4d6ae09ef4ee733ce4046bee0170cff57584e0671d4f286b9691d37721b43778a4afb3c3d05fd5446d2e0bac5326f43d23126410dfb85efa26b9e1ae8d056c3ebcde0c95e1443304d7a93eb4077f76047b6e13f0e79a9631ac2bd43143854803c698a7f02933d9cbdca121cc857aacabf858f3f904c9dfedb6c03186d99490f35f09de8ab897ea7c58f07dca416e1db55c7a849a91b98d0e0c0c7bf058d86a2e997a0557800a34bb7f5806f2e15e99981cc3fe615a3ff396f7d8da30ea24626263abf0ad50a0ce2dafc55f2b0286b2204114a6754b336a913a75e66ed6a3efd132f668369692f46039d"}, 0x139, 0x0) getxattr(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)=@random={'security.', ':\x00'}, &(0x7f0000000140)=""/55, 0x37) 00:05:19 executing program 6: r0 = socket$netlink(0x10, 0x3, 0x4) r1 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000180), 0xffffffffffffffff) sendmsg$TIPC_NL_LINK_GET(r0, &(0x7f0000000280)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000000240)={&(0x7f00000001c0)={0x4c, r1, 0x1, 0x70bd27, 0x25dfdbfc, {}, [@TIPC_NLA_SOCK={0x18, 0x2, 0x0, 0x1, [@TIPC_NLA_SOCK_CON={0x14, 0x3, 0x0, 0x1, [@TIPC_NLA_CON_FLAG={0x8, 0x1, 0x10000}, @TIPC_NLA_CON_NODE={0x8, 0x2, 0x459}]}]}, @TIPC_NLA_MEDIA={0x20, 0x5, 0x0, 0x1, [@TIPC_NLA_MEDIA_PROP={0x1c, 0x2, 0x0, 0x1, [@TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x17}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x1c}, @TIPC_NLA_PROP_WIN={0x8}]}]}]}, 0x4c}, 0x1, 0x0, 0x0, 0x20040000}, 0x0) sendmsg$TIPC_NL_NAME_TABLE_GET(0xffffffffffffffff, &(0x7f0000001d40)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x200}, 0xc, &(0x7f0000001d00)={&(0x7f0000001a40)={0x284, r1, 0x800, 0x70bd2a, 0x25dfdbfc, {}, [@TIPC_NLA_MEDIA={0xf8, 0x5, 0x0, 0x1, [@TIPC_NLA_MEDIA_PROP={0x2c, 0x2, 0x0, 0x1, [@TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x1e}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x8}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0xd7a7}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0xfffffff8}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x9}]}, @TIPC_NLA_MEDIA_PROP={0x34, 0x2, 0x0, 0x1, [@TIPC_NLA_PROP_TOL={0x8, 0x2, 0x4}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x1b}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x13}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x8}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0xfff}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x3}]}, @TIPC_NLA_MEDIA_PROP={0x4c, 0x2, 0x0, 0x1, [@TIPC_NLA_PROP_WIN={0x8, 0x3, 0x1}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0xe}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x4f9a}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x7}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x407}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x459}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0xfff}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x2}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x7}]}, @TIPC_NLA_MEDIA_PROP={0x24, 0x2, 0x0, 0x1, [@TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x1}, @TIPC_NLA_PROP_PRIO={0x8}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x1f}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x5}]}, @TIPC_NLA_MEDIA_PROP={0x1c, 0x2, 0x0, 0x1, [@TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x12}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x7}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x6}]}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'eth\x00'}]}, @TIPC_NLA_MEDIA={0x30, 0x5, 0x0, 0x1, [@TIPC_NLA_MEDIA_NAME={0x7, 0x1, 'ib\x00'}, @TIPC_NLA_MEDIA_PROP={0x1c, 0x2, 0x0, 0x1, [@TIPC_NLA_PROP_PRIO={0x8, 0x1, 0xb}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0xd}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x20}]}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'eth\x00'}]}, @TIPC_NLA_PUBL={0x1c, 0x3, 0x0, 0x1, [@TIPC_NLA_PUBL_LOWER={0x8, 0x2, 0x7}, @TIPC_NLA_PUBL_LOWER={0x8, 0x2, 0x7}, @TIPC_NLA_PUBL_TYPE={0x8, 0x1, 0xfffffff8}]}, @TIPC_NLA_BEARER={0x74, 0x1, 0x0, 0x1, [@TIPC_NLA_BEARER_UDP_OPTS={0x2c, 0x4, {{0x14, 0x1, @in={0x2, 0x4e20, @remote}}, {0x14, 0x2, @in={0x2, 0x4e21, @local}}}}, @TIPC_NLA_BEARER_UDP_OPTS={0x44, 0x4, {{0x20, 0x1, @in6={0xa, 0x4e23, 0x8, @loopback, 0xfffffff9}}, {0x20, 0x2, @in6={0xa, 0x4e20, 0x8, @local}}}}]}, @TIPC_NLA_BEARER={0xb8, 0x1, 0x0, 0x1, [@TIPC_NLA_BEARER_NAME={0xd, 0x1, @udp='udp:syz2\x00'}, @TIPC_NLA_BEARER_DOMAIN={0x8, 0x3, 0x5}, @TIPC_NLA_BEARER_PROP={0x3c, 0x2, 0x0, 0x1, [@TIPC_NLA_PROP_PRIO={0x8, 0x1, 0xc}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x11}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0xd56}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x80000001}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x9}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x5}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x9}]}, @TIPC_NLA_BEARER_NAME={0xd, 0x1, @udp='udp:syz0\x00'}, @TIPC_NLA_BEARER_DOMAIN={0x8, 0x3, 0xfffffbff}, @TIPC_NLA_BEARER_DOMAIN={0x8, 0x3, 0x5}, @TIPC_NLA_BEARER_UDP_OPTS={0x2c, 0x4, {{0x14, 0x1, @in={0x2, 0x4e23, @multicast1}}, {0x14, 0x2, @in={0x2, 0x4e21, @loopback}}}}, @TIPC_NLA_BEARER_PROP={0x4}, @TIPC_NLA_BEARER_NAME={0xd, 0x1, @udp='udp:syz0\x00'}]}]}, 0x284}, 0x1, 0x0, 0x0, 0x4000840}, 0x40800) r2 = syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000040)='proc\x00', 0x0, 0x0) pivot_root(&(0x7f0000000000)='./file0\x00', &(0x7f0000000240)='.\x00') fstat(r2, &(0x7f0000001880)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) syz_mount_image$tmpfs(&(0x7f00000000c0), &(0x7f0000000140)='./file0\x00', 0x6e77, 0x9, &(0x7f0000001780)=[{&(0x7f0000000280)="7dafdb5f7f8bd3796072aa34188dcf689962899937b5a024076910d1f0b3a9a2498444607f230b391e8701ef55b2609b783ff4cb3f73f485b9c99c12e6b38c64dead9ce936323bee96b03a40b9a04d4d05e7917fa179a5d0a4b2e05854aa337b4887965e2890d876b7b222809ad312880a2178d1a3980869ae2c0e045ddb01acf1743fccb09440fc738add1fc8ef50f1300c66a1c7cbef7fa0efbe469579d6719bad6386bf0468631dd8ec582254666c47187150387f299de04fe29be6e0d30046d9", 0xc2, 0x4}, {&(0x7f0000000380)="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", 0x1000, 0x80000000000000}, {&(0x7f0000000180)="01ccde4392c4019f54fce9b0902d15f158bac36ba412bf8d985fe6d75dfdb641a096caa62f7d2e1bd1561dbad1014b2cb37b081097ab69c8491afa112124e65378aec1", 0x43, 0x8000}, {&(0x7f0000001380)="bcbb6f7dd88e96c2934cf4f8aae4c52bca282f2758905dab223dc7416c9ac62393d7d18b4b5a84b5eab2c26c4b33cdb503c5aa0ba83e65d9a4008272a3a5012da49cf18facb2d8604fd35435fca47b5840b3e336239b99f1b96f43a47e072805a9240539cd9d68", 0x67, 0x1c}, {&(0x7f0000001400)="fa3e490592fdeef24e84b01024fa207bdf20c0d505584443cb5c0a347321a826e9809251e01ce8928d466f86817e4af8ce70df04dd558d340638161573fefd5442f418014e6c1c4313f2b91b75244be69ed5e6e99b2bbca0110b77733918e9b7dce54df6b803b39004848ed2bf3b6a34a60a9c1af7622df7754333a9cc15ca8f1317b7b90158d13d343a11dbf3e208ce7a3fcec225757377e45f409db21a8c819a15524e", 0xa4, 0xffffffff80000000}, {&(0x7f00000014c0)="24fb2610fc6f3bed4b5d2137e3311ea23b145180d05d5f39031fc1733f52874d638df9e926de0a95d3c8038cc0d9825d993c606c613eb00c880cd12eb3b990412ebc90e5f98f0daf2ea7082f9aa9a32d2bd525e6feac4585c1472c654ed8d7b6d098eef389164bccf7354ea09827e07f424eacfba46a00a25e8880fa43ac910083f9e48d30de2c24f8417f0fce5e18774b88cd5faf1464a9e5172141777423a4ad51ff7e7c1bd649e9069957bc6952350b984ce4b5f6e916ee5d56976f00"/204, 0xcc, 0x1ff}, {&(0x7f00000015c0)="0fa9f6600d4fadffc467581ed9ce4fa1b24959a71cf2d68b47c92ffbb8fcf082cf8e03b8063ce6fe94999ccb1daeb006ab0821da167500d58445d6a381f8dc519d0605937bdb5052b5883b5d0c159cad83d967499bca2a3b896d815f85b1df3c9f8ccb29006d9414a3c9c0c556f7d0e93acc46cf1c58c6275e9e556df9e5bf0c52206b5b51e4d07107446951bfadf7714906c9", 0x93, 0x3ff}, {&(0x7f0000001680)="2aa62a4df6ea617d0e018be5639d7a6e02c25b937fb760985575b2be7c9ebe05d2b3662f0829cacfe6943ce6fd17f764c29b51c29bfd175770abc4f85a0a18181de2f756927c6b0e25cd9916be", 0x4d, 0x7}, {&(0x7f0000001700)="523cfa39b45ef892cab91857be66dc0f6ef08b49710848c0f9b53370d1086d1b7164362a664666c272c264ac61cde651ef1e659dba0eabf1006b1515998de2d91efa4ba4c912b35a38ad8353a703fba6beafbcb2de9a04d294c0b00b498c95f7480033fc09be0ef91fca52cb70", 0x6d}], 0x48, &(0x7f0000001900)={[{@nr_blocks={'nr_blocks', 0x3d, [0x25, 0x2d, 0x31, 0x6b, 0x33, 0x37, 0x38, 0x35, 0x2d, 0x39]}}, {@gid={'gid', 0x3d, r3}}, {@huge_advise}, {@nr_inodes={'nr_inodes', 0x3d, [0x2d, 0x6b, 0x25, 0x39, 0x34, 0x70, 0x39, 0x74, 0x38, 0x38]}}, {@huge_never}, {@mode={'mode', 0x3d, 0xd848}}, {@nr_inodes={'nr_inodes', 0x3d, [0x30, 0x70, 0x30, 0x38]}}, {@gid={'gid', 0x3d, 0xffffffffffffffff}}], [{@obj_user={'obj_user', 0x3d, 'proc\x00'}}, {@dont_appraise}, {@dont_measure}, {@subj_type={'subj_type', 0x3d, '&M#{'}}, {@audit}, {@obj_type={'obj_type', 0x3d, '[!!#:/'}}, {@pcr={'pcr', 0x3d, 0x31}}, {@rootcontext={'rootcontext', 0x3d, 'unconfined_u'}}, {@rootcontext={'rootcontext', 0x3d, 'user_u'}}, {@obj_type}]}) [ 589.156994] selinux_netlink_send: 36 callbacks suppressed [ 589.157006] SELinux: unrecognized netlink message: protocol=4 nlmsg_type=0 sclass=netlink_tcpdiag_socket pid=6240 comm=syz-executor.6 [ 589.176388] EXT4-fs (loop3): mounted filesystem without journal. Opts: ,errors=continue [ 589.185357] EXT4-fs error (device loop0): ext4_fill_super:4947: inode #2: comm syz-executor.0: iget: root inode unallocated [ 589.188896] EXT4-fs error (device loop3): ext4_validate_block_bitmap:398: comm syz-executor.3: bg 0: block 3: invalid block bitmap [ 589.191216] EXT4-fs (loop0): get root inode failed [ 589.192061] EXT4-fs (loop0): mount failed [ 589.204305] SELinux: unrecognized netlink message: protocol=4 nlmsg_type=0 sclass=netlink_tcpdiag_socket pid=6253 comm=syz-executor.6 00:05:19 executing program 3: syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000d1f4655fd1f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b00000000020000280200000284", 0x62, 0x400}, {&(0x7f0000010400)="030000000400000005000000d4", 0xd, 0x800}, {0x0, 0x0, 0xc00}, {&(0x7f0000000000)="ed41000000040000d0f4655fd1f4655fd1f4655f13ca7302f6e9dab934", 0x1d, 0x1600}], 0x0, &(0x7f0000000280)=ANY=[]) setxattr$trusted_overlay_upper(&(0x7f0000000540)='./file0\x00', &(0x7f0000000580), &(0x7f00000005c0)={0x0, 0xfb, 0x139, 0x0, 0x0, "eacbf6ff0bc36f5a7bb9fe2ee7bb1e01", "a49dbbc75b5fc0caa97cab3ee231b0d7cf3b9be24c0fb2c145c6f2190b4a29cc525f550d79c74a03eda157db2eae62fde8958cce2a8a4c9d0374e4d6ae09ef4ee733ce4046bee0170cff57584e0671d4f286b9691d37721b43778a4afb3c3d05fd5446d2e0bac5326f43d23126410dfb85efa26b9e1ae8d056c3ebcde0c95e1443304d7a93eb4077f76047b6e13f0e79a9631ac2bd43143854803c698a7f02933d9cbdca121cc857aacabf858f3f904c9dfedb6c03186d99490f35f09de8ab897ea7c58f07dca416e1db55c7a849a91b98d0e0c0c7bf058d86a2e997a0557800a34bb7f5806f2e15e99981cc3fe615a3ff396f7d8da30ea24626263abf0ad50a0ce2dafc55f2b0286b2204114a6754b336a913a75e66ed6a3efd132f668369692f46039d"}, 0x139, 0x0) getxattr(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)=@random={'security.', ':\x00'}, &(0x7f0000000140)=""/55, 0x37) 00:05:19 executing program 4: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x7fffffff}]}) 00:05:19 executing program 2: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x7fffffff}]}) signalfd4(0xffffffffffffffff, &(0x7f00000000c0), 0x8, 0x300000000000000) [ 589.368940] EXT4-fs (loop3): mounted filesystem without journal. Opts: ,errors=continue [ 589.379340] EXT4-fs error (device loop3): ext4_validate_block_bitmap:398: comm syz-executor.3: bg 0: block 3: invalid block bitmap 00:05:32 executing program 5: r0 = seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x7fffffff}]}) signalfd4(0xffffffffffffffff, &(0x7f00000000c0), 0x8, 0x0) r1 = openat(0xffffffffffffff9c, 0x0, 0x1c2, 0x27) r2 = open(&(0x7f0000000040)='./file0\x00', 0x1810c1, 0x0) ioctl$BTRFS_IOC_SCRUB_PROGRESS(r1, 0xc400941d, &(0x7f0000000200)={0x0, 0x4, 0xd3, 0x1}) pwrite64(r2, &(0x7f0000000a40)="0f64800203d6484c7ddffad1", 0xc, 0x0) lseek(r2, 0x2, 0x3) fcntl$getflags(r2, 0x401) dup2(r1, r2) ioctl$BTRFS_IOC_START_SYNC(r0, 0x80089418, &(0x7f0000000080)=0x0) ioctl$BTRFS_IOC_RM_DEV_V2(r1, 0x5000943a, &(0x7f0000000100)={{r0}, r3, 0xa, @unused=[0x0, 0x2, 0x6f34, 0x9], @name="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"}) epoll_create(0x7) 00:05:32 executing program 1: ioctl$TUNSETQUEUE(0xffffffffffffffff, 0x400454d9, &(0x7f0000000b80)={'bond0\x00'}) r0 = signalfd4(0xffffffffffffffff, &(0x7f00000000c0), 0x8, 0x0) prctl$PR_SET_MM_MAP(0x23, 0xe, &(0x7f0000000180)={&(0x7f0000ffd000/0x1000)=nil, &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000fff000/0x1000)=nil, &(0x7f0000ffd000/0x1000)=nil, &(0x7f0000ffc000/0x2000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000ffe000/0x2000)=nil, &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000ffd000/0x2000)=nil, &(0x7f0000ffd000/0x2000)=nil, &(0x7f0000000140)="080afc03b8bae061a487765e741c1a3a5a7dea95a0b02b4dbb6944356a", 0x1d}, 0x68) r1 = creat(&(0x7f0000000080)='./file1\x00', 0x0) pwrite64(r1, &(0x7f0000000000)="a7", 0xfffffd6b, 0x0) accept$packet(r0, &(0x7f0000000080)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000100)=0x14) 00:05:32 executing program 7: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x0, &(0x7f0000000040)}) openat(0xffffffffffffff9c, 0x0, 0x1c2, 0x27) r0 = creat(&(0x7f0000000080)='./file1\x00', 0x0) ioctl$BTRFS_IOC_SCRUB(r0, 0xc400941b, &(0x7f0000000600)={0x0, 0x62, 0x80000001}) pwrite64(r0, &(0x7f0000000000)="a7", 0xfffffd6b, 0x0) accept$packet(0xffffffffffffffff, &(0x7f0000000080)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000100)=0x14) 00:05:32 executing program 4: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x7fffffff}]}) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = openat(0xffffffffffffff9c, 0x0, 0x1c2, 0x27) r2 = open(&(0x7f0000000040)='./file0\x00', 0x1810c1, 0x0) ioctl$BTRFS_IOC_SCRUB_PROGRESS(r1, 0xc400941d, &(0x7f0000000200)={0x0, 0x4, 0xd3, 0x1}) pwrite64(r2, &(0x7f0000000a40)="0f64800203d6484c7ddffad1", 0xc, 0x0) lseek(r2, 0x2, 0x3) fcntl$getflags(r2, 0x401) dup2(r1, r2) close_range(r0, r2, 0x2) mprotect(&(0x7f0000ffe000/0x1000)=nil, 0x1000, 0x0) 00:05:32 executing program 6: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000040)='proc\x00', 0x0, 0x0) open$dir(&(0x7f00000000c0)='./file0/file0\x00', 0x4501, 0x10c) pivot_root(&(0x7f0000000000)='./file0\x00', &(0x7f0000000240)='.\x00') 00:05:32 executing program 0: syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000d1f4655fd1f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b00000000020000280200000284", 0x62, 0x400}, {&(0x7f0000010400)="030000000400000005000000d4", 0xd, 0x800}, {&(0x7f0000000000)="ed41000000040000d0f4655fd1f4655fd1f4655f13ca7302f6e9dab934", 0x1d, 0x1600}], 0x0, &(0x7f0000000280)=ANY=[]) setxattr$trusted_overlay_upper(&(0x7f0000000540)='./file0\x00', &(0x7f0000000580), &(0x7f00000005c0)={0x0, 0xfb, 0x139, 0x0, 0x0, "eacbf6ff0bc36f5a7bb9fe2ee7bb1e01", "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"}, 0x139, 0x0) 00:05:32 executing program 2: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x7fffffff}]}) signalfd4(0xffffffffffffffff, &(0x7f00000000c0), 0x8, 0x400000000000000) 00:05:32 executing program 3: syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000d1f4655fd1f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b00000000020000280200000284", 0x62, 0x400}, {&(0x7f0000010400)="030000000400000005000000d4", 0xd, 0x800}, {0x0, 0x0, 0xc00}, {&(0x7f0000000000)="ed41000000040000d0f4655fd1f4655fd1f4655f13ca7302f6e9dab934", 0x1d, 0x1600}], 0x0, &(0x7f0000000280)=ANY=[]) setxattr$trusted_overlay_upper(&(0x7f0000000540)='./file0\x00', &(0x7f0000000580), &(0x7f00000005c0)={0x0, 0xfb, 0x139, 0x0, 0x0, "eacbf6ff0bc36f5a7bb9fe2ee7bb1e01", "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"}, 0x139, 0x0) getxattr(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)=@random={'security.', ':\x00'}, &(0x7f0000000140)=""/55, 0x37) 00:05:32 executing program 6: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000040)='proc\x00', 0x0, 0x0) utimes(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)={{}, {0x0, 0xea60}}) pivot_root(&(0x7f0000000000)='./file0\x00', &(0x7f0000000240)='.\x00') [ 602.654653] EXT4-fs (loop3): mounted filesystem without journal. Opts: ,errors=continue [ 602.660892] EXT4-fs (loop0): mounted filesystem without journal. Opts: ,errors=continue [ 602.661403] EXT4-fs error (device loop3): ext4_validate_block_bitmap:398: comm syz-executor.3: bg 0: block 3: invalid block bitmap [ 602.663878] EXT4-fs error (device loop0): ext4_validate_block_bitmap:398: comm syz-executor.0: bg 0: block 3: invalid block bitmap 00:05:32 executing program 2: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x7fffffff}]}) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0xc, &(0x7f0000000100)={0x1, &(0x7f0000000080)=[{0x8, 0xe5, 0x9, 0x74}]}) signalfd4(0xffffffffffffffff, &(0x7f00000000c0), 0x8, 0x0) 00:05:32 executing program 5: time(&(0x7f0000000240)) ioctl$SNAPSHOT_AVAIL_SWAP_SIZE(0xffffffffffffffff, 0x80083313, &(0x7f00000000c0)) r0 = seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x7fffffff}]}) time(&(0x7f0000000200)) r1 = signalfd4(r0, &(0x7f0000000080), 0x8, 0x0) r2 = openat$cgroup_subtree(r1, &(0x7f0000000100), 0x2, 0x0) r3 = openat$ptmx(0xffffffffffffff9c, 0x0, 0x8100, 0x0) r4 = openat$ptmx(0xffffffffffffff9c, 0x0, 0x8100, 0x0) ioctl$TIOCSIG(r4, 0x40045436, 0x0) ioctl$KIOCSOUND(r4, 0x4b2f, 0x0) fcntl$getown(r4, 0x9) ioctl$TIOCSIG(r3, 0x40045436, 0x0) ppoll(&(0x7f0000000140)=[{r1, 0x1002}, {r0, 0x2360}, {r2, 0x34a0}, {r3, 0x2}, {0xffffffffffffffff, 0x5000}], 0x5, &(0x7f0000000180)={0x77359400}, &(0x7f00000001c0)={[0x9]}, 0x8) 00:05:32 executing program 3: syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000d1f4655fd1f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b00000000020000280200000284", 0x62, 0x400}, {&(0x7f0000010400)="030000000400000005000000d4", 0xd, 0x800}, {&(0x7f0000010500), 0x0, 0xc00}, {&(0x7f0000000000)="ed41000000040000d0f4655fd1f4655fd1f4655f13ca7302f6e9dab934", 0x1d, 0x1600}], 0x0, &(0x7f0000000280)=ANY=[]) setxattr$trusted_overlay_upper(&(0x7f0000000540)='./file0\x00', &(0x7f0000000580), &(0x7f00000005c0)={0x0, 0xfb, 0x139, 0x0, 0x0, "eacbf6ff0bc36f5a7bb9fe2ee7bb1e01", "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"}, 0x139, 0x0) getxattr(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)=@random={'security.', ':\x00'}, &(0x7f0000000140)=""/55, 0x37) 00:05:32 executing program 4: r0 = seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x7fffffff}]}) mprotect(&(0x7f0000ffe000/0x1000)=nil, 0x1000, 0x0) shmget$private(0x0, 0x4000, 0x10, &(0x7f0000ffc000/0x4000)=nil) r1 = seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0xc, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x7fc00002}]}) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r1, 0xc0502100, &(0x7f0000000140)={0x0, 0x0}) ioctl$SECCOMP_IOCTL_NOTIF_ADDFD(r1, 0xc0182101, &(0x7f00000000c0)={r2}) r4 = openat(0xffffffffffffff9c, 0x0, 0x1c2, 0x27) r5 = open(&(0x7f0000000040)='./file0\x00', 0x1810c1, 0x0) ioctl$BTRFS_IOC_SCRUB_PROGRESS(r4, 0xc400941d, &(0x7f0000000200)={0x0, 0x4, 0xd3, 0x1}) pwrite64(r5, &(0x7f0000000a40)="0f64800203d6484c7ddffad1", 0xc, 0x0) lseek(r5, 0x2, 0x2) r6 = syz_open_dev$mouse(&(0x7f0000000100), 0x9, 0x101000) setsockopt$inet_tcp_buf(r6, 0x6, 0xb, &(0x7f0000000600)="6d392dddee56e3e2ed66ecf38e62f4ecb34b10f7ac2281e129e7ebf097a72066f1f3739e2cd54ddd5467aba8afb5ce812363bcd60287ac61911d68a61520fc687f37f229a2cee611c42100a77d3912910e99aebc06861aa1ad31e41b5c88e88ed234bfa9e32a15705a07821f8bb00eb95a07bf0ec30b5f9d93166e992c24e46f0f614e761a", 0x85) fcntl$getflags(r5, 0x401) dup2(r4, r5) ioctl$BTRFS_IOC_SCRUB(0xffffffffffffffff, 0xc400941b, &(0x7f0000000600)={0x0, 0x62, 0x80000001}) pwrite64(0xffffffffffffffff, &(0x7f0000000000)="a7", 0xfffffd6b, 0x0) ioctl$PIO_UNIMAPCLR(0xffffffffffffffff, 0x4b68, &(0x7f0000000a80)={0x80, 0x4, 0x6}) fcntl$setownex(0xffffffffffffffff, 0xf, &(0x7f00000001c0)={0x2, r3}) ioctl$SECCOMP_IOCTL_NOTIF_ADDFD(r0, 0x40182103, &(0x7f0000000080)={r2, 0x0, r4, 0x200}) [ 602.851704] EXT4-fs (loop3): mounted filesystem without journal. Opts: ,errors=continue [ 602.868759] EXT4-fs error (device loop3): ext4_validate_block_bitmap:398: comm syz-executor.3: bg 0: block 3: invalid block bitmap 00:05:46 executing program 4: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x7fffffff}]}) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f0000000080)) mprotect(&(0x7f0000ffe000/0x2000)=nil, 0x2000, 0x1000008) 00:05:46 executing program 1: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x7fffffff}]}) r0 = signalfd4(0xffffffffffffffff, &(0x7f00000000c0), 0x8, 0x0) prctl$PR_SET_MM_MAP(0x23, 0xe, &(0x7f0000000180)={&(0x7f0000ffd000/0x1000)=nil, &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000fff000/0x1000)=nil, &(0x7f0000ffd000/0x1000)=nil, &(0x7f0000ffc000/0x2000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000ffe000/0x2000)=nil, &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000ffd000/0x2000)=nil, &(0x7f0000ffd000/0x2000)=nil, &(0x7f0000000140)="080afc03b8bae061a487765e741c1a3a5a7dea95a0b02b4dbb6944356a", 0x1d}, 0x68) r1 = creat(&(0x7f0000000080)='./file1\x00', 0x0) pwrite64(r1, &(0x7f0000000000)="a7", 0xfffffd6b, 0x0) accept$packet(r0, &(0x7f0000000080)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000100)=0x14) 00:05:46 executing program 0: syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000d1f4655fd1f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b00000000020000280200000284", 0x62, 0x400}, {&(0x7f0000010400)="030000000400000005000000d4", 0xd, 0x800}, {&(0x7f0000000000)="ed41000000040000d0f4655fd1f4655fd1f4655f13ca7302f6e9dab934", 0x1d, 0x1600}], 0x0, &(0x7f0000000280)=ANY=[]) setxattr$trusted_overlay_upper(&(0x7f0000000540)='./file0\x00', &(0x7f0000000580), &(0x7f00000005c0)={0x0, 0xfb, 0x139, 0x0, 0x0, "eacbf6ff0bc36f5a7bb9fe2ee7bb1e01", "a49dbbc75b5fc0caa97cab3ee231b0d7cf3b9be24c0fb2c145c6f2190b4a29cc525f550d79c74a03eda157db2eae62fde8958cce2a8a4c9d0374e4d6ae09ef4ee733ce4046bee0170cff57584e0671d4f286b9691d37721b43778a4afb3c3d05fd5446d2e0bac5326f43d23126410dfb85efa26b9e1ae8d056c3ebcde0c95e1443304d7a93eb4077f76047b6e13f0e79a9631ac2bd43143854803c698a7f02933d9cbdca121cc857aacabf858f3f904c9dfedb6c03186d99490f35f09de8ab897ea7c58f07dca416e1db55c7a849a91b98d0e0c0c7bf058d86a2e997a0557800a34bb7f5806f2e15e99981cc3fe615a3ff396f7d8da30ea24626263abf0ad50a0ce2dafc55f2b0286b2204114a6754b336a913a75e66ed6a3efd132f668369692f46039d"}, 0x139, 0x0) 00:05:46 executing program 5: r0 = seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x7fffffff}]}) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r0, 0xc0502100, &(0x7f0000000100)) r1 = signalfd4(0xffffffffffffffff, &(0x7f00000000c0), 0x8, 0x0) r2 = openat$ptmx(0xffffffffffffff9c, 0x0, 0x8100, 0x0) ioctl$TIOCSIG(r2, 0x40045436, 0x0) r3 = openat$ptmx(0xffffffffffffff9c, 0x0, 0x8100, 0x0) ioctl$TIOCSIG(r3, 0x40045436, 0x0) sendfile(r2, r3, &(0x7f0000000080)=0x100000000, 0xf539) ioctl$PIO_UNIMAPCLR(r1, 0x4b68, &(0x7f0000000180)={0x9, 0x1, 0x1f}) 00:05:46 executing program 6: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) sendmsg$sock(0xffffffffffffffff, &(0x7f00000000c0)={&(0x7f0000000140)=@vsock={0x28, 0x0, 0xffffffff}, 0x80, &(0x7f0000001540)=[{&(0x7f0000000280)="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", 0x1000}, {&(0x7f0000001280)="becb72bb43e417346837e2b79730d1f13aea8b6eb43f98c876e9fdf4c819bf0109a0dd7dfaea809fcb53f4911a710e0dcce85e73366e681ad616b80550b2a71f47a99c120e6fc59e43ff384503eab3d916d98b82c45fe93f854eb8d75bc8a720cb726ef09871862376795ac60f9905e8e8c2f3c9e43cd1fdbc969950e087eca727fc4d2635ebe77d58e85832219bf06c5ddd396987c0642f860816a24f03b886ebea987abb9dc85af13e526969e2", 0xae}, {&(0x7f0000001340)="ed82f0cc540cd2e423194824c7bab0125f4683ab351e6d4777da3ae8316d00c427b7ab5708fb82a04658c9211b44537450d79baf025933aa66eeb808286eadeccacd27ec4b21f02c6c5c2dcd35000c708652414cd44fce2e578326cb66727b65901ec221ba575529fdf5cc125c888ee79fb320c73fd26d73aece3a3663d8d7e8c2d961619ce8cb63fd19431f454a265b6a5f02e69f0079c39666ff0de77f2c8edfdbb59dd63fcd5a5db3a06f97ce2d3b52ca2f7578b9d92edb6e916b22d51c69b0b03590056bcb1851ce96be690b04a3da5decb787513228a61ebc2d6727c0ad", 0xe0}, {&(0x7f00000001c0)="d2c5c5ffd78af1e0586d576596263974eeb2ebd2acc81d5d9e0307c4c13739146fbf281b63599cf928a22c0c0c0d714edde5ec6886d2274430dac9c12317a0e80678521143db442b6f43fd7bdea0218753cab5d2196389b3a4f08e6b03e018f57f634d564ca3dbf9b22353", 0x6b}, {&(0x7f0000001440)="11a29290417f76d50b93b95fe8a3fbdce05bb8c75220b0ea1f0a36b6c6d7556a9194f60d5e7b097009a6a41edb08b8f3fce4d373eae7834a685a730acc3743f24f49aad8fe48b9068a778139b3b87a57a902f832972035a41f93653e953ef8009b1e99b50aa7043c144bd140890818c7c17f6e0e402fc32ccf37ab2a23debd462dab2011a5371e0ce3e807cc77d7ec024e935a20a22748e1ab6f6ed5876f6a49fd0ddb986309ff10cff5ca0c466e3e22a8fed4d7f27021659f78264523d3362f27d285f6", 0xc4}], 0x5}, 0x4) lremovexattr(&(0x7f0000001600)='./file0\x00', &(0x7f0000001640)=@known='security.selinux\x00') mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000040)='proc\x00', 0x0, 0x0) open$dir(&(0x7f0000001680)='./file0\x00', 0x521880, 0x0) setsockopt$SO_BINDTODEVICE_wg(0xffffffffffffffff, 0x1, 0x19, &(0x7f00000015c0)='wg0\x00', 0x4) pivot_root(&(0x7f0000000000)='./file0\x00', &(0x7f0000000240)='.\x00') 00:05:46 executing program 2: ioctl$FS_IOC_FSSETXATTR(0xffffffffffffffff, 0x401c5820, &(0x7f0000000080)={0x1, 0x0, 0x4, 0xffff, 0x4}) r0 = openat(0xffffffffffffff9c, 0x0, 0x1c2, 0x27) r1 = open(&(0x7f0000000040)='./file0\x00', 0x1810c1, 0x0) ioctl$BTRFS_IOC_SCRUB_PROGRESS(r0, 0xc400941d, &(0x7f0000000200)={0x0, 0x4, 0xd3, 0x1}) pwrite64(r1, &(0x7f0000000740)="eab485f5b516df977c969d800fe9215e0fe38a6257aa4ad8d4bdc5ea47d452b109000000f16d7ae60d9d16688c50e1febf8962d294b8a800ae0585aaa9a092f317f4de7674c5363e7d353236ff582ae30ecd0dad2fe43163789c27734f1dcbaa0a0987e7752a650d05638f607dd9f813ddc29ccc70a038de7d6e21e521701f426a5438614c512a2a02473b5cb97d020000003da65b37d74f4ee8356ce86bc96e31342daf6913e18a10605e934240f852536faaa3a1821e567a1912f6227cf65df1d1e4ed4b5c59d90437afa5f612d7b894d68201e127b2ca060531db2f18656a8515e4120fc4", 0xe6, 0x8000000000000001) lseek(r1, 0x2, 0x3) fcntl$getflags(r1, 0x401) r2 = dup2(r0, r1) r3 = syz_open_dev$vcsa(&(0x7f0000000100), 0x5, 0x101100) ftruncate(r3, 0x9) dup2(r0, 0xffffffffffffffff) ioctl$BLKZEROOUT(r2, 0x127f, &(0x7f0000000140)={0x9}) r4 = syz_open_dev$usbmon(&(0x7f0000000640), 0x200, 0x10000) r5 = pidfd_getfd(r0, r4, 0x0) r6 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000001c0), 0x0, 0x0) prctl$PR_SET_MM_MAP(0x23, 0xe, &(0x7f0000000180)={&(0x7f0000ffd000/0x1000)=nil, &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000fff000/0x1000)=nil, &(0x7f0000ffd000/0x1000)=nil, &(0x7f0000ffc000/0x2000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000ffe000/0x2000)=nil, &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000ffd000/0x2000)=nil, &(0x7f0000ffc000/0x2000)=nil, &(0x7f0000000140)="080afc03b8bae061a487765e741c1a3a5a7dea95a0b02b4dbb6944356a", 0x1d, r6}, 0x68) ioctl$BTRFS_IOC_QGROUP_LIMIT(r6, 0x8030942b, &(0x7f0000000180)={0x7fffffff, {0x9, 0x200, 0x81, 0x7ff, 0x40}}) dup2(r5, r1) fcntl$F_SET_RW_HINT(r0, 0x40c, &(0x7f0000000000)=0x4) signalfd4(0xffffffffffffffff, &(0x7f00000000c0), 0x8, 0x0) 00:05:46 executing program 3: syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000d1f4655fd1f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b00000000020000280200000284", 0x62, 0x400}, {&(0x7f0000010400)="030000000400000005000000d4", 0xd, 0x800}, {&(0x7f0000010500), 0x0, 0xc00}, {&(0x7f0000000000)="ed41000000040000d0f4655fd1f4655fd1f4655f13ca7302f6e9dab934", 0x1d, 0x1600}], 0x0, &(0x7f0000000280)=ANY=[]) setxattr$trusted_overlay_upper(&(0x7f0000000540)='./file0\x00', &(0x7f0000000580), &(0x7f00000005c0)={0x0, 0xfb, 0x139, 0x0, 0x0, "eacbf6ff0bc36f5a7bb9fe2ee7bb1e01", "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"}, 0x139, 0x0) getxattr(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)=@random={'security.', ':\x00'}, &(0x7f0000000140)=""/55, 0x37) 00:05:46 executing program 7: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x0, &(0x7f0000000040)}) openat(0xffffffffffffff9c, 0x0, 0x1c2, 0x27) r0 = creat(&(0x7f0000000080)='./file1\x00', 0x0) ioctl$BTRFS_IOC_SCRUB(r0, 0xc400941b, &(0x7f0000000600)={0x0, 0x62, 0x80000001}) pwrite64(r0, &(0x7f0000000000)="a7", 0xfffffd6b, 0x0) accept$packet(0xffffffffffffffff, &(0x7f0000000080)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000100)=0x14) [ 616.534056] EXT4-fs (loop3): mounted filesystem without journal. Opts: ,errors=continue 00:05:46 executing program 4: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x7fffffff}]}) r0 = seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x7fffffff}]}) rt_sigpending(0x0, 0x0) mprotect(&(0x7f0000ffe000/0x1000)=nil, 0x1000, 0x0) dup(r0) [ 616.539607] EXT4-fs error (device loop3): ext4_validate_block_bitmap:398: comm syz-executor.3: bg 0: block 3: invalid block bitmap [ 616.541765] EXT4-fs (loop0): mounted filesystem without journal. Opts: ,errors=continue [ 616.550733] EXT4-fs error (device loop0): ext4_validate_block_bitmap:398: comm syz-executor.0: bg 0: block 3: invalid block bitmap 00:05:46 executing program 6: r0 = openat2(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)={0x408bc2, 0x48, 0x6}, 0x18) ioctl$CHAR_RAW_ZEROOUT(r0, 0x127f, &(0x7f0000000180)={0x2, 0x7fffffff}) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000040)='proc\x00', 0x0, 0x0) pivot_root(&(0x7f0000000000)='./file0\x00', &(0x7f0000000240)='.\x00') 00:05:46 executing program 3: syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000d1f4655fd1f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b00000000020000280200000284", 0x62, 0x400}, {&(0x7f0000010400)="030000000400000005000000d4", 0xd, 0x800}, {&(0x7f0000010500), 0x0, 0xc00}, {&(0x7f0000000000)="ed41000000040000d0f4655fd1f4655fd1f4655f13ca7302f6e9dab934", 0x1d, 0x1600}], 0x0, &(0x7f0000000280)=ANY=[]) setxattr$trusted_overlay_upper(&(0x7f0000000540)='./file0\x00', &(0x7f0000000580), &(0x7f00000005c0)={0x0, 0xfb, 0x139, 0x0, 0x0, "eacbf6ff0bc36f5a7bb9fe2ee7bb1e01", "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"}, 0x139, 0x0) getxattr(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)=@random={'security.', ':\x00'}, &(0x7f0000000140)=""/55, 0x37) 00:05:46 executing program 5: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x7fffffff}]}) signalfd4(0xffffffffffffffff, &(0x7f00000000c0), 0x8, 0x0) fcntl$getflags(0xffffffffffffffff, 0x401) dup2(0xffffffffffffffff, 0xffffffffffffffff) r0 = syz_open_dev$char_raw(&(0x7f0000000080), 0x0, 0x420400) r1 = openat(0xffffffffffffff9c, 0x0, 0x1c2, 0x27) r2 = open(&(0x7f0000000040)='./file0\x00', 0x1810c1, 0x0) ioctl$BTRFS_IOC_SCRUB_PROGRESS(r1, 0xc400941d, &(0x7f0000000200)={0x0, 0xff, 0xd3, 0x1}) pwrite64(r2, &(0x7f0000000a40)="0f64800203d6484c7ddffad1", 0xc, 0x0) lseek(r2, 0x2, 0x2) fcntl$getflags(r2, 0x401) dup2(r1, r2) r3 = openat(0xffffffffffffff9c, 0x0, 0x420c0, 0x0) r4 = open(&(0x7f0000000040)='./file0\x00', 0x1810c1, 0x0) ioctl$BTRFS_IOC_SCRUB_PROGRESS(r3, 0xc400941d, &(0x7f0000000200)={0x0, 0x4, 0xd3, 0x1}) pwrite64(r4, &(0x7f0000000a40)="0f64800203d6484c7ddffad1", 0xc, 0x0) lseek(r4, 0x2, 0x3) fcntl$getflags(r4, 0x401) dup2(r3, r4) ppoll(&(0x7f0000000100)=[{0xffffffffffffffff, 0x1100}, {r0, 0x8105}, {r2, 0x20}, {r4, 0x88}, {0xffffffffffffffff, 0x1202}], 0x5, &(0x7f0000000140), &(0x7f0000000180)={[0x100000001]}, 0x8) 00:05:46 executing program 2: write$binfmt_misc(0xffffffffffffffff, &(0x7f0000000240)=ANY=[@ANYBLOB="73797a3003809e205175d4ff6e69ab7af33a86be060000002f4b0196b80ba6df1f2b2a4d7c303c62b7583b2ea1816f25fd93b3e7d1ac0c234c2e1182666e31e4e9f74a4bec7ff31f8adf7da856ff077deab9f3d0344c99002b580c4aa82540336f8475436bf10384519c2ef80bc009cd3d47f155b3f3ac954eab42bef41e2a5986bbc2f250509084226c0c7a3cb1687e8875831819030f0bab5544beb0051989d8a44bbeae26a85c5e24789093df7a2c51f9a65d5e4fead49d0de71e2a0141ba557a807faee3c5476d0b2549b8ed04c122ef96dcc240dc1db0cef64b837883bf44752ba8f9bece3eb7d0c2b8fc77c7f0a1dd7538f2f2a467000035584f50347d6cdd4358cfef093ded0b084fc1645b4d3e91a21d9e2abef2f3d8f108fd6717b1977c110f0b5482b2011bd9ae00"/312], 0xd6) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x7fffffff}]}) signalfd4(0xffffffffffffffff, &(0x7f00000000c0), 0x8, 0x0) 00:05:46 executing program 0: syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000d1f4655fd1f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b00000000020000280200000284", 0x62, 0x400}, {&(0x7f0000010400)="030000000400000005000000d4", 0xd, 0x800}, {&(0x7f0000000000)="ed41000000040000d0f4655fd1f4655fd1f4655f13ca7302f6e9dab934", 0x1d, 0x1600}], 0x0, &(0x7f0000000280)=ANY=[]) setxattr$trusted_overlay_upper(&(0x7f0000000540)='./file0\x00', &(0x7f0000000580), &(0x7f00000005c0)={0x0, 0xfb, 0x139, 0x0, 0x0, "eacbf6ff0bc36f5a7bb9fe2ee7bb1e01", "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"}, 0x139, 0x0) 00:05:46 executing program 6: syz_mount_image$ext4(0x0, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000100)='./file1/file0\x00', &(0x7f0000000040)='proc\x00', 0x8000, 0x0) pivot_root(&(0x7f0000000000)='./file0\x00', &(0x7f0000000240)='.\x00') [ 616.759311] EXT4-fs (loop3): mounted filesystem without journal. Opts: ,errors=continue [ 616.777722] EXT4-fs error (device loop3): ext4_validate_block_bitmap:398: comm syz-executor.3: bg 0: block 3: invalid block bitmap [ 616.792246] EXT4-fs (loop0): mounted filesystem without journal. Opts: ,errors=continue [ 616.806231] EXT4-fs error (device loop0): ext4_validate_block_bitmap:398: comm syz-executor.0: bg 0: block 3: invalid block bitmap 00:06:00 executing program 1: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x7fffffff}]}) r0 = signalfd4(0xffffffffffffffff, &(0x7f00000000c0), 0x8, 0x0) prctl$PR_SET_MM_MAP(0x23, 0xe, &(0x7f0000000180)={&(0x7f0000ffd000/0x1000)=nil, &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000fff000/0x1000)=nil, &(0x7f0000ffd000/0x1000)=nil, &(0x7f0000ffc000/0x2000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000ffe000/0x2000)=nil, &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000ffd000/0x2000)=nil, &(0x7f0000ffd000/0x2000)=nil, &(0x7f0000000140)="080afc03b8bae061a487765e741c1a3a5a7dea95a0b02b4dbb6944356a", 0x1d}, 0x68) r1 = creat(&(0x7f0000000080)='./file1\x00', 0x0) pwrite64(r1, &(0x7f0000000000)="a7", 0xfffffd6b, 0x0) accept$packet(r0, &(0x7f0000000080)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000100)=0x14) 00:06:00 executing program 7: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x0, &(0x7f0000000040)}) openat(0xffffffffffffff9c, 0x0, 0x1c2, 0x27) r0 = creat(&(0x7f0000000080)='./file1\x00', 0x0) ioctl$BTRFS_IOC_SCRUB(r0, 0xc400941b, &(0x7f0000000600)={0x0, 0x62, 0x80000001}) pwrite64(r0, &(0x7f0000000000)="a7", 0xfffffd6b, 0x0) accept$packet(0xffffffffffffffff, &(0x7f0000000080)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000100)=0x14) 00:06:00 executing program 4: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x7fffffff}]}) r0 = openat(0xffffffffffffff9c, 0x0, 0x1c2, 0x27) r1 = open(&(0x7f0000000040)='./file0\x00', 0x1810c1, 0x0) ioctl$BTRFS_IOC_SCRUB_PROGRESS(r0, 0xc400941d, &(0x7f0000000200)={0x0, 0x4, 0xd3, 0x1}) pwrite64(r1, &(0x7f0000000a40)="0f64800203d6484c7ddffad1", 0xc, 0x0) lseek(r1, 0x2, 0x3) r2 = openat(0xffffffffffffff9c, 0x0, 0x1c2, 0x27) r3 = open(&(0x7f0000000040)='./file0\x00', 0x1810c1, 0x0) ioctl$BTRFS_IOC_SCRUB_PROGRESS(r2, 0xc400941d, &(0x7f0000000200)={0x0, 0x4, 0xd3, 0x1}) pwrite64(r3, &(0x7f0000000a40)="0f64800203d6484c7ddffad1", 0xc, 0x0) lseek(r3, 0x2, 0x3) fcntl$getflags(r3, 0x401) dup2(r2, r3) ioctl$TCGETS(r3, 0x5401, &(0x7f0000000100)) openat(r1, &(0x7f0000000080)='./file0\x00', 0x38b001, 0x1c3) fcntl$getflags(r1, 0x401) dup2(r0, r1) readv(r1, &(0x7f00000000c0)=[{&(0x7f0000000080)}], 0x1) mprotect(&(0x7f0000ffe000/0x1000)=nil, 0x1000, 0x0) 00:06:00 executing program 6: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000040)='proc\x00', 0x0, 0x0) pivot_root(&(0x7f0000000000)='./file0\x00', &(0x7f0000000140)='./file0\x00') getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000600)={{{@in=@dev, @in, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@loopback}, 0x0, @in=@dev}}, &(0x7f0000000700)=0xe8) syz_mount_image$iso9660(&(0x7f00000000c0), &(0x7f0000000180)='./file0\x00', 0x8, 0x7, &(0x7f0000000540)=[{&(0x7f00000001c0)="ef2cec8ddddce10c4e1ddd5170f3dd2edcbddc109b9aedcd36ec7c67d21ec54780928cf75a338ba504f88ca4dcbe", 0x2e, 0x1}, {&(0x7f0000000200)="bb642198329835e7086e6241230292c4e306e9f9cbd44e0924353312a42a6504e3e87875dcb6934a3820962b1f946ab252c3a8624a14de1b5055752f71850f0f3583f3382a6bb594d7a6e87d13b4abcbd64b3f01c0a9edb895264101202752bd2968b1b098c202a1c1af0f665faab9ca386c13a4ada0ad4583628864a4b0bcfba828fffe46ecda1067bc46fef0df5268465295", 0x93, 0x4}, {&(0x7f00000002c0)="6d2aeb4ffd66ca7cce0add", 0xb, 0x1f}, {&(0x7f0000000300)="9850eec26afa7bfd828017a1514a8288c02db7bc744d1cc7a335beda1fd3b29286c97e29e007d24c5cab8d751e303ec047ad80032aedfa8c4b26f7624778dacab7a9ffa3ecde06e14673198d0369299060cf4da4ac0ba470b2e900915768d86236c07559", 0x64, 0x401}, {&(0x7f0000000380)="6318798d41a78b050a1cd3a06b8b15f3a3507afe53fa8fe21583417df3fb9379ae35c8dc22ac8e9ed86823cb3a92caaa128a451957cd741991446f4816", 0x3d, 0x87b}, {&(0x7f00000003c0)="efcf1ff00461c790298361acb828f3c3013cd49ffea6594cad1c7c4847ab5a372d75ded86297b6d2bc18f35098e9a23d767200b870bcc720be57182b741e327107aa43185e5481054a3ac4e126456791f587d5c83e1db1e8fa10daa73e895b22666503a2a5dc50874a1d320a4700a96b9a06b422622737cb7bb57b42d990a5875e1957d57aae9f60b76b3572f3a347e5c2dacdb2e339280cb18d7775aed20ebd0a9f90456fdfac9c4e0dba4807ed806df03c03af0bae4b8d153ecd903a288270495e3398f5ca96a00d6950a6566923b4da22e76e439448baf2b08061169940c8c5cf91ea149cb842140c3a2d2310ad529396640c00895bca7b3ac355d8", 0xfd, 0x8}, {&(0x7f00000004c0)="5650844d4d7a9ec4b58e5017f6baa36efa2997faa3cdaec6b09b116b38ddf368ea37c6ef78ccb0e7fb996f0299788abcf3b3ed2c022d9e025fcd6c9575a1ddb64d4762b09dd10cc3f74b697272c85331d0f37ac3076a61169f50ae19418d4ad76affcdc14e5aba937277f56fc61405b1e7283ed8ecefceee05ef", 0x7a, 0x6}], 0x117130, &(0x7f0000000740)={[{@overriderock}], [{@uid_lt={'uid<', r0}}, {@appraise_type}]}) 00:06:00 executing program 5: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x7fffffff}]}) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x8, &(0x7f0000000080)={0x9, &(0x7f0000000100)=[{0x0, 0x81, 0x7f, 0x80000000}, {0x6, 0x3a, 0x19, 0x9}, {0x1f, 0x9a, 0xba, 0x8}, {0x8, 0x8, 0x7, 0x3ff}, {0x4, 0x81, 0x2, 0x2}, {0x0, 0x40, 0x5, 0x1f}, {0x6, 0xbb, 0x1f, 0x5}, {0x1, 0x3, 0xdc, 0x6}, {0x8, 0x4, 0x68, 0xffff}]}) signalfd4(0xffffffffffffffff, &(0x7f00000000c0), 0x8, 0x0) 00:06:00 executing program 2: r0 = seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x7fffffff}]}) signalfd4(0xffffffffffffffff, &(0x7f00000000c0), 0x8, 0x0) r1 = openat(0xffffffffffffff9c, 0x0, 0x1c2, 0x27) r2 = creat(&(0x7f0000000080)='./file1\x00', 0x0) ioctl$BTRFS_IOC_SCRUB_PROGRESS(r1, 0xc400941d, &(0x7f0000000200)={0x0, 0x4, 0xd3, 0x1}) ioctl$BTRFS_IOC_SCRUB(r2, 0xc400941b, &(0x7f0000000600)={r3, 0x62, 0x80000001}) pwrite64(r2, &(0x7f0000000000)="a7", 0xfffffd6b, 0x0) ioctl$PIO_UNIMAPCLR(r2, 0x4b68, &(0x7f0000000a80)={0x80, 0x4, 0x6}) syncfs(r0) pwritev2(r2, &(0x7f0000000280)=[{&(0x7f0000000080)="bd27735fb4f4ec48903c9d7d69317a3da98e508c61589009aad3070fbeb1ce4f52c5", 0x22}, {&(0x7f0000000100)="34d4cb5114c1d048945553730a4c5a67ed0d0333a58ab5a49fcf8d70d86cf932e9d5afa7ce602a8f1e803c7884bacde2d740be96ca2feb6b5394623cad2d48358342f510a454e9eaba7118fa6307b9c7c5ad4751198a284f4394b42807e24a57ec7aa5b6a2116f09dac3195614a7e3d969f652b97ebbfef8253798d3522e8f92c03928c0c14b1f8037f499d9", 0x8c}, {&(0x7f00000001c0)="36fbaffbef52ae2504b8c01a3bd052d2ad5fb31d3d207c5ecc478d32f5a5242e3123", 0x22}, {&(0x7f0000000200)="432547c18469f1ea8aa84e76b9dea45adc9eef8a221a8a5b22e30300de7624bde977c50ce398a6fa492d68f8c0948198184af8a6f822a84ef621a64a08c06f0642aa574a8c0516f3cf1fdd38ade63ca08fd55515f1811a762c350b9f495fb6a8366d90af5c45f809d54e8daaa31362688c7769", 0x73}], 0x4, 0x1f, 0x10000, 0x0) 00:06:00 executing program 3: syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000d1f4655fd1f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b00000000020000280200000284", 0x62, 0x400}, {&(0x7f0000010400)="030000000400000005000000d4", 0xd, 0x800}, {&(0x7f0000010500)="ffffffffff070000000000000000000000000000000000000000000000000080ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff", 0x200, 0xc00}, {&(0x7f0000000000)="ed41000000040000d0f4655fd1f4655fd1f4655f13ca7302f6e9dab934", 0x1d, 0x1600}], 0x0, &(0x7f0000000280)=ANY=[]) setxattr$trusted_overlay_upper(&(0x7f0000000540)='./file0\x00', &(0x7f0000000580), &(0x7f00000005c0)={0x0, 0xfb, 0x139, 0x0, 0x0, "eacbf6ff0bc36f5a7bb9fe2ee7bb1e01", "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"}, 0x139, 0x0) getxattr(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)=@random={'security.', ':\x00'}, &(0x7f0000000140)=""/55, 0x37) 00:06:00 executing program 0: syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000d1f4655fd1f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b00000000020000280200000284", 0x62, 0x400}, {&(0x7f0000010400)="030000000400000005000000d4", 0xd, 0x800}, {0x0, 0x0, 0xc00}, {&(0x7f0000000000)="ed41000000040000d0f4655fd1f4655fd1f4655f13ca7302f6e9dab934", 0x1d, 0x1600}], 0x0, &(0x7f0000000280)=ANY=[]) setxattr$trusted_overlay_upper(&(0x7f0000000540)='./file0\x00', &(0x7f0000000580), &(0x7f00000005c0)={0x0, 0xfb, 0x139, 0x0, 0x0, "eacbf6ff0bc36f5a7bb9fe2ee7bb1e01", "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"}, 0x139, 0x0) [ 630.117545] EXT4-fs (loop0): mounted filesystem without journal. Opts: ,errors=continue [ 630.131115] EXT4-fs error (device loop0): ext4_validate_block_bitmap:398: comm syz-executor.0: bg 0: block 3: invalid block bitmap [ 630.157451] EXT4-fs (loop3): mounted filesystem without journal. Opts: ,errors=continue [ 630.161707] EXT4-fs error (device loop3): ext4_mb_generate_buddy:802: group 0, block bitmap and bg descriptor inconsistent: 4308 vs 212 free clusters 00:06:00 executing program 5: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x8, 0x7fffffff}]}) r0 = perf_event_open$cgroup(&(0x7f0000000100)={0x5, 0x80, 0x2, 0x5, 0x7f, 0x4, 0x0, 0xfffffffffffffffc, 0x200, 0x3a4f131b18712e2d, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, @perf_config_ext={0x0, 0x9}, 0x11, 0x4, 0x8, 0x3, 0x401, 0x8, 0x8, 0x0, 0xfffffffd, 0x0, 0x7f45}, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xc) pwritev(r0, &(0x7f0000000080)=[{&(0x7f0000000180)="587bf4dd5f7d89c0416a8c32262c710f05275f2ff0ae44acf283e26fb0255ab9d26ed76beb3fa00682209c4687a421cf8be044682e777a67e7038f6e7389d875f88ef73d45bbf2aa6831871f0e262e0b9620cfbfe52142e8fc3bf44148ea71ddcc872a1774a39bbbf746d8755f09b50ba2b888f41e6cd4ead5d5b3843360f87777e9e0d3777e7d07197e148801", 0x8d}], 0x1, 0x7f, 0x7) signalfd4(0xffffffffffffffff, &(0x7f00000000c0), 0x8, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000001c0), 0x0, 0x0) prctl$PR_SET_MM_MAP(0x23, 0xe, &(0x7f0000000180)={&(0x7f0000ffd000/0x1000)=nil, &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000fff000/0x1000)=nil, &(0x7f0000ffd000/0x1000)=nil, &(0x7f0000ffc000/0x2000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000ffe000/0x2000)=nil, &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000ffd000/0x2000)=nil, &(0x7f0000ffd000/0x2000)=nil, &(0x7f0000000140)="080afc03b8bae061a487765e741c1a3a5a7dea95a0b02b4dbb6944356a", 0x1d, r1}, 0x68) write$binfmt_elf64(r1, &(0x7f0000000240)={{0x7f, 0x45, 0x4c, 0x46, 0x1, 0x1f, 0xf1, 0x6f, 0xfffffffffffffffa, 0x3, 0x6, 0x5f12, 0x122, 0x40, 0x192, 0x1, 0x3, 0x38, 0x1, 0x1, 0x0, 0x7}, [{0x70000000, 0x1000, 0x997, 0x8, 0x6, 0x3173c0000000000, 0x1ff}], "e4ab2ae38c9ad1a61344b63c08256f3a38fa4fb6b95994ac68d12c4dc1a0d77811c940aa56c35900651b1f3db2c7fbf042b8488258a11a8115cdb38b7faf1a870f90ef2f6b99e8fbffd919ed887ce319be3c249943a70cd3f4d0858455179cb861d0bcafcbfce968c9e47dd69a17c59e20139feab8d20c7d03ed47f907149d2c1bc1fb291db662d4c3e4cfe8748d6311bd7da8033f76b52b7bacb7abfe44790760e54fac7884eda4907c0bd61650a0af4adf04c08408f52c65f6aca140e46586a5b940ef636a91acfc97375a477ceeb317ea1543f2502e7050b2", ['\x00', '\x00', '\x00', '\x00', '\x00', '\x00']}, 0x752) 00:06:00 executing program 0: syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000d1f4655fd1f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b00000000020000280200000284", 0x62, 0x400}, {&(0x7f0000010400)="030000000400000005000000d4", 0xd, 0x800}, {0x0, 0x0, 0xc00}, {&(0x7f0000000000)="ed41000000040000d0f4655fd1f4655fd1f4655f13ca7302f6e9dab934", 0x1d, 0x1600}], 0x0, &(0x7f0000000280)=ANY=[]) setxattr$trusted_overlay_upper(&(0x7f0000000540)='./file0\x00', &(0x7f0000000580), &(0x7f00000005c0)={0x0, 0xfb, 0x139, 0x0, 0x0, "eacbf6ff0bc36f5a7bb9fe2ee7bb1e01", "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"}, 0x139, 0x0) 00:06:00 executing program 6: ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x8946, &(0x7f0000000140)={'batadv_slave_1\x00', &(0x7f00000000c0)=@ethtool_sfeatures={0x3b, 0x4, [{0x401, 0x1}, {0x80, 0x57f9}, {0x45f}, {0x4}]}}) sendto(0xffffffffffffffff, &(0x7f0000000180)="b332549cf9154e2eb6cfc62a56ddc96ec1b065f42c065d1a562113", 0x1b, 0x4000, 0x0, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000040)='proc\x00', 0x0, 0x0) pivot_root(&(0x7f0000000000)='./file0\x00', &(0x7f0000000240)='.\x00') r0 = openat(0xffffffffffffff9c, 0x0, 0x1c2, 0x27) r1 = creat(&(0x7f0000000080)='./file1\x00', 0x0) ioctl$BTRFS_IOC_SCRUB_PROGRESS(r0, 0xc400941d, &(0x7f0000000200)={0x0, 0x4, 0xd3, 0x1}) ioctl$BTRFS_IOC_SCRUB(r1, 0xc400941b, &(0x7f0000000600)={r2, 0x62, 0x80000001}) pwrite64(r1, &(0x7f0000000000)="a7", 0xfffffd6b, 0x0) ioctl$PIO_UNIMAPCLR(r1, 0x4b68, &(0x7f0000000a80)={0x80, 0x4, 0x6}) openat(r1, &(0x7f00000001c0)='./file0\x00', 0x10400, 0x80) 00:06:00 executing program 4: r0 = seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x7fffffff}]}) mprotect(&(0x7f0000ffe000/0x1000)=nil, 0x1000, 0x0) syz_io_uring_setup(0x1432, &(0x7f0000000080)={0x0, 0x0, 0x1}, &(0x7f00000a0000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000000000)=0x0, &(0x7f0000000140)=0x0) syz_io_uring_submit(r1, r2, &(0x7f00000002c0)=@IORING_OP_READ=@use_registered_buffer={0x16, 0x4, 0x0, @fd_index=0x5}, 0x0) r3 = syz_io_uring_setup(0x5980, &(0x7f0000001380), &(0x7f0000ffe000/0x2000)=nil, &(0x7f0000ffb000/0x3000)=nil, &(0x7f00000001c0), &(0x7f0000000280)=0x0) syz_io_uring_setup(0x1432, &(0x7f0000000080)={0x0, 0x0, 0x1}, &(0x7f00000a0000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000000000)=0x0, &(0x7f0000000140)=0x0) syz_io_uring_submit(r5, r6, &(0x7f00000002c0)=@IORING_OP_READ=@use_registered_buffer={0x16, 0x4, 0x0, @fd_index=0x5}, 0x0) syz_io_uring_setup(0x5980, &(0x7f0000001380), &(0x7f0000ffe000/0x2000)=nil, &(0x7f0000ffb000/0x3000)=nil, &(0x7f00000001c0), &(0x7f0000000280)=0x0) syz_io_uring_submit(r5, r7, &(0x7f0000000340)=@IORING_OP_POLL_REMOVE, 0x0) syz_io_uring_setup(0xe4, &(0x7f0000000200)={0x0, 0xa90b, 0x2, 0x1, 0xcd, 0x0, r3}, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ff9000/0x4000)=nil, &(0x7f0000000180), &(0x7f0000000300)=0x0) clock_gettime(0x0, &(0x7f0000000380)={0x0, 0x0}) syz_io_uring_submit(r5, r8, &(0x7f0000000400)=@IORING_OP_TIMEOUT={0xb, 0x1, 0x0, 0x0, 0x2, &(0x7f00000003c0)={r9, r10+10000000}}, 0x2) syz_io_uring_submit(r1, r4, &(0x7f0000000340)=@IORING_OP_POLL_REMOVE, 0x0) syz_io_uring_submit(r1, 0x0, &(0x7f0000000100)=@IORING_OP_WRITE_FIXED={0x5, 0x5, 0x2004, @fd_index=0x4, 0x4, 0x5, 0x401, 0x13}, 0x8000) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r0, 0xc0502100, &(0x7f0000000080)) [ 630.287637] EXT4-fs (loop0): mounted filesystem without journal. Opts: ,errors=continue [ 630.292127] EXT4-fs error (device loop0): ext4_validate_block_bitmap:398: comm syz-executor.0: bg 0: block 3: invalid block bitmap 00:06:00 executing program 3: syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000d1f4655fd1f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b00000000020000280200000284", 0x62, 0x400}, {&(0x7f0000010400)="030000000400000005000000d4", 0xd, 0x800}, {&(0x7f0000010500)="ffffffffff070000000000000000000000000000000000000000000000000080ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff", 0x200, 0xc00}, {&(0x7f0000000000)="ed41000000040000d0f4655fd1f4655fd1f4655f13ca7302f6e9dab934", 0x1d, 0x1600}], 0x0, &(0x7f0000000280)=ANY=[]) setxattr$trusted_overlay_upper(&(0x7f0000000540)='./file0\x00', &(0x7f0000000580), &(0x7f00000005c0)={0x0, 0xfb, 0x139, 0x0, 0x0, "eacbf6ff0bc36f5a7bb9fe2ee7bb1e01", "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"}, 0x139, 0x0) getxattr(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)=@random={'security.', ':\x00'}, &(0x7f0000000140)=""/55, 0x37) 00:06:00 executing program 5: r0 = seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x7fffffff}]}) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r0, 0xc0502100, &(0x7f0000000100)={0x0}) ioctl$SECCOMP_IOCTL_NOTIF_ID_VALID(r0, 0x40082102, &(0x7f0000000080)=r1) signalfd4(0xffffffffffffffff, &(0x7f00000000c0), 0x8, 0x0) [ 630.402921] EXT4-fs (loop3): mounted filesystem without journal. Opts: ,errors=continue [ 630.407225] EXT4-fs error (device loop3): ext4_mb_generate_buddy:802: group 0, block bitmap and bg descriptor inconsistent: 4308 vs 212 free clusters 00:06:13 executing program 5: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x7fffffff}]}) r0 = signalfd4(0xffffffffffffffff, &(0x7f00000000c0), 0x8, 0x0) sendmsg$AUDIT_ADD_RULE(r0, &(0x7f0000000580)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x10000}, 0xc, &(0x7f0000000540)={&(0x7f0000000100)={0x424, 0x3f3, 0x400, 0x70bd2b, 0x25dfdbfc, {0x10, 0x0, 0x30, [0xffffffff, 0x400, 0xfff00000, 0x1, 0x0, 0x2, 0xfffffffa, 0xfffffff8, 0x3, 0x401, 0x39, 0x7, 0x67a8, 0x5, 0x2, 0x8, 0x1000, 0x2, 0xfffffffe, 0x1, 0xfffffe01, 0x400, 0x6afe, 0x1, 0x81, 0x8, 0xfff, 0x4, 0x6, 0xfffffff0, 0x8001, 0x1, 0x6, 0x7, 0x2, 0x6a, 0x6, 0x1f, 0x7fffffff, 0x8001, 0x1000, 0x8001, 0x7, 0x3, 0x7, 0x3, 0x1, 0x5b0bc716, 0xff, 0x5, 0xffff, 0x3, 0x7, 0xffff, 0x9, 0x9, 0x8000, 0xd35, 0x96a, 0x6, 0x3f, 0x1, 0x7, 0x3], [0x3, 0x9, 0x0, 0xdae, 0x1, 0xffffff7f, 0x9, 0x100, 0x9, 0x8, 0x91b, 0x5, 0x2, 0xfffffffa, 0x1, 0x3, 0x4, 0xec19, 0x7, 0x5, 0x5, 0x1, 0xffff, 0x2, 0x1, 0x8, 0x2, 0x1000, 0x80, 0x8, 0x80, 0x4, 0x3, 0x9, 0x2, 0x6, 0x80000000, 0xffffffff, 0x40, 0x7, 0x1, 0x1f, 0x7, 0xff, 0x92f, 0x8000, 0x0, 0x400, 0x80000001, 0x5, 0x2, 0x400, 0x1, 0x5, 0x3ff, 0x1f, 0x5, 0x5, 0x6, 0x2, 0x2, 0x80000001, 0x3, 0x7], [0x1f, 0x0, 0xfff, 0x4, 0xfff, 0x6, 0x7f, 0x9, 0x1, 0x3, 0x1a4e, 0x4, 0x4, 0x7f, 0xff, 0xff, 0x3f, 0x101, 0x80, 0x40, 0xc0000000, 0x7f, 0x9, 0x9, 0x2, 0x101, 0x5, 0x4, 0x8, 0x9, 0x1, 0x2, 0x8, 0x5, 0x1000, 0x400, 0x1, 0xc1f, 0x1b1, 0xffffffff, 0x2, 0x432, 0x6, 0x3ff, 0x2, 0x2, 0x100, 0x5, 0xb1, 0x80000001, 0x6, 0x3, 0x2, 0x9, 0x1, 0x3, 0x3, 0xffff8000, 0x8, 0x6, 0x8, 0x3, 0x5], [0x1f, 0x80000000, 0x5f, 0x7fff, 0x97a, 0xff, 0x7fffffff, 0x401, 0x1, 0x7, 0x6, 0x0, 0x8001, 0xffffffff, 0x2fcc, 0x4, 0x1, 0x7, 0x1ff, 0x1, 0x0, 0x1, 0x1, 0x7fff, 0x7, 0x80, 0x1, 0x81, 0x2, 0xfffffffe, 0x80000001, 0x9, 0x3, 0x5, 0xcf61, 0xfb99, 0x2, 0xb3e, 0x8001, 0x4, 0xfffffffc, 0x6, 0x5, 0x7151, 0x6, 0x8, 0x7, 0x4, 0x5, 0xec, 0x10000, 0x0, 0x800, 0x4, 0x0, 0x8, 0x0, 0x3f, 0x7fd, 0x5, 0x3, 0x3, 0x0, 0x4], 0x1, ['\x00']}, ["", "", "", ""]}, 0x424}, 0x1, 0x0, 0x0, 0x4080}, 0x10) 00:06:13 executing program 6: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000180)='nilfs2\x00', 0x44080, 0x0) pivot_root(&(0x7f0000000000)='./file0\x00', &(0x7f0000000240)='.\x00') openat(0xffffffffffffff9c, &(0x7f0000000140)='./file0/file0\x00', 0x2000, 0x34) creat(&(0x7f0000000040)='./file0\x00', 0x4c) 00:06:13 executing program 2: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x7fffffff}]}) openat(0xffffffffffffff9c, &(0x7f00000001c0)='./file1\x00', 0x200000, 0xbd) signalfd4(0xffffffffffffffff, &(0x7f00000000c0)={[0xfffffffffffffffd]}, 0xffffffffffffff00, 0x80000) r0 = openat(0xffffffffffffff9c, 0x0, 0x1c2, 0x27) r1 = open(&(0x7f0000000040)='./file0\x00', 0x1810c1, 0x0) ioctl$BTRFS_IOC_SCRUB_PROGRESS(r0, 0xc400941d, &(0x7f0000000200)={0x0, 0x4, 0xd3, 0x1}) pwrite64(r1, &(0x7f0000000a40)="0f64800203d6484c7ddffad1", 0xc, 0x0) lseek(r1, 0x2, 0x3) fcntl$getflags(r1, 0x401) ioctl$BTRFS_IOC_LOGICAL_INO_V2(r1, 0xc038943b, &(0x7f0000000180)={0x928, 0x38, '\x00', 0x0, &(0x7f0000000140)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}) dup2(r0, r1) epoll_pwait(r1, &(0x7f0000000080)=[{}], 0x1, 0x8, &(0x7f0000000100)={[0x5]}, 0x8) 00:06:13 executing program 4: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000080)={0x3, &(0x7f0000000000)=[{0x25, 0x0, 0x0, 0x80000000}, {0x7e, 0x1, 0x6}, {0x9, 0x3f, 0x90, 0x8}]}) mprotect(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x3000004) 00:06:13 executing program 1: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x7fffffff}]}) r0 = signalfd4(0xffffffffffffffff, &(0x7f00000000c0), 0x8, 0x0) prctl$PR_SET_MM_MAP(0x23, 0xe, &(0x7f0000000180)={&(0x7f0000ffd000/0x1000)=nil, &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000fff000/0x1000)=nil, &(0x7f0000ffd000/0x1000)=nil, &(0x7f0000ffc000/0x2000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000ffe000/0x2000)=nil, &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000ffd000/0x2000)=nil, &(0x7f0000ffd000/0x2000)=nil, &(0x7f0000000140)="080afc03b8bae061a487765e741c1a3a5a7dea95a0b02b4dbb6944356a", 0x1d}, 0x68) r1 = creat(&(0x7f0000000080)='./file1\x00', 0x0) pwrite64(r1, &(0x7f0000000000)="a7", 0xfffffd6b, 0x0) accept$packet(r0, &(0x7f0000000080)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000100)=0x14) 00:06:13 executing program 7: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x0, 0x0, 0x0, 0x7fffffff}]}) openat(0xffffffffffffff9c, 0x0, 0x1c2, 0x27) r0 = creat(&(0x7f0000000080)='./file1\x00', 0x0) ioctl$BTRFS_IOC_SCRUB(r0, 0xc400941b, &(0x7f0000000600)={0x0, 0x62, 0x80000001}) pwrite64(r0, &(0x7f0000000000)="a7", 0xfffffd6b, 0x0) accept$packet(0xffffffffffffffff, &(0x7f0000000080)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000100)=0x14) 00:06:13 executing program 0: syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000d1f4655fd1f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b00000000020000280200000284", 0x62, 0x400}, {&(0x7f0000010400)="030000000400000005000000d4", 0xd, 0x800}, {0x0, 0x0, 0xc00}, {&(0x7f0000000000)="ed41000000040000d0f4655fd1f4655fd1f4655f13ca7302f6e9dab934", 0x1d, 0x1600}], 0x0, &(0x7f0000000280)=ANY=[]) setxattr$trusted_overlay_upper(&(0x7f0000000540)='./file0\x00', &(0x7f0000000580), &(0x7f00000005c0)={0x0, 0xfb, 0x139, 0x0, 0x0, "eacbf6ff0bc36f5a7bb9fe2ee7bb1e01", "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"}, 0x139, 0x0) 00:06:13 executing program 3: syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000d1f4655fd1f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b00000000020000280200000284", 0x62, 0x400}, {&(0x7f0000010400)="030000000400000005000000d4", 0xd, 0x800}, {&(0x7f0000010500)="ffffffffff070000000000000000000000000000000000000000000000000080ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff", 0x200, 0xc00}, {&(0x7f0000000000)="ed41000000040000d0f4655fd1f4655fd1f4655f13ca7302f6e9dab934", 0x1d, 0x1600}], 0x0, &(0x7f0000000280)=ANY=[]) setxattr$trusted_overlay_upper(&(0x7f0000000540)='./file0\x00', &(0x7f0000000580), &(0x7f00000005c0)={0x0, 0xfb, 0x139, 0x0, 0x0, "eacbf6ff0bc36f5a7bb9fe2ee7bb1e01", "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"}, 0x139, 0x0) getxattr(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)=@random={'security.', ':\x00'}, &(0x7f0000000140)=""/55, 0x37) [ 644.030684] EXT4-fs (loop3): mounted filesystem without journal. Opts: ,errors=continue [ 644.033409] EXT4-fs (loop0): mounted filesystem without journal. Opts: ,errors=continue [ 644.037066] EXT4-fs error (device loop3): ext4_mb_generate_buddy:802: group 0, block bitmap and bg descriptor inconsistent: 4308 vs 212 free clusters 00:06:14 executing program 6: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) rename(&(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)='./file0\x00') r0 = openat(0xffffffffffffff9c, 0x0, 0x1c2, 0x27) r1 = open(&(0x7f0000000040)='./file0\x00', 0x1810c1, 0x0) ioctl$BTRFS_IOC_SCRUB_PROGRESS(r0, 0xc400941d, &(0x7f0000000200)={0x0, 0x4, 0xd3, 0x1}) pwrite64(r1, &(0x7f0000000a40)="0f64800203d6484c7ddffad1", 0xc, 0x0) lseek(r1, 0x2, 0x3) fcntl$getflags(r1, 0x401) dup2(r0, r1) r2 = openat$ptmx(0xffffffffffffff9c, 0x0, 0xf1e74d48fdb985bb, 0x0) r3 = openat$ptmx(0xffffffffffffff9c, 0x0, 0x8100, 0x0) ioctl$TIOCSIG(r3, 0x40045436, 0x0) ftruncate(r3, 0xaf) ioctl$TIOCSIG(r2, 0x40045436, 0x0) fcntl$setownex(r2, 0xf, &(0x7f0000000140)) unlinkat(r1, &(0x7f00000000c0)='./file0\x00', 0x200) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000040)='proc\x00', 0x0, 0x0) pivot_root(&(0x7f0000000000)='./file0\x00', &(0x7f0000000240)='.\x00') [ 644.055947] EXT4-fs error (device loop0): ext4_validate_block_bitmap:398: comm syz-executor.0: bg 0: block 3: invalid block bitmap 00:06:14 executing program 4: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x7ffffffb}]}) 00:06:14 executing program 4: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x7fffffff}]}) mprotect(&(0x7f0000ffe000/0x1000)=nil, 0x1000, 0x0) r0 = openat$full(0xffffffffffffff9c, &(0x7f0000000080), 0x80, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r0, 0xc0502100, &(0x7f00000000c0)) mremap(&(0x7f0000ffe000/0x1000)=nil, 0x1000, 0x4000, 0x6, &(0x7f0000ffc000/0x4000)=nil) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f0000000140)) remap_file_pages(&(0x7f0000ffd000/0x1000)=nil, 0x1000, 0x1000005, 0x400, 0x0) munlock(&(0x7f0000ffe000/0x2000)=nil, 0x2000) munlock(&(0x7f0000ffb000/0x3000)=nil, 0x3000) 00:06:14 executing program 5: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x7fffffff}]}) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0xc, &(0x7f0000000100)={0x1, &(0x7f0000000080)=[{0x676, 0xa9, 0x1, 0xfdf1}]}) signalfd4(0xffffffffffffffff, &(0x7f00000000c0), 0x8, 0x0) 00:06:14 executing program 2: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x7fffffff}]}) signalfd4(0xffffffffffffffff, &(0x7f00000000c0), 0x8, 0x0) r0 = fork() ptrace(0x10, r0) syz_open_procfs(r0, &(0x7f0000000080)='numa_maps\x00') 00:06:14 executing program 0: syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000d1f4655fd1f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b00000000020000280200000284", 0x62, 0x400}, {&(0x7f0000010400)="030000000400000005000000d4", 0xd, 0x800}, {&(0x7f0000010500), 0x0, 0xc00}, {&(0x7f0000000000)="ed41000000040000d0f4655fd1f4655fd1f4655f13ca7302f6e9dab934", 0x1d, 0x1600}], 0x0, &(0x7f0000000280)=ANY=[]) setxattr$trusted_overlay_upper(&(0x7f0000000540)='./file0\x00', &(0x7f0000000580), &(0x7f00000005c0)={0x0, 0xfb, 0x139, 0x0, 0x0, "eacbf6ff0bc36f5a7bb9fe2ee7bb1e01", "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"}, 0x139, 0x0) [ 644.207851] mmap: syz-executor.4 (6501) uses deprecated remap_file_pages() syscall. See Documentation/vm/remap_file_pages.rst. 00:06:14 executing program 3: syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000d1f4655fd1f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b00000000020000280200000284", 0x62, 0x400}, {&(0x7f0000010400)="030000000400000005000000d4", 0xd, 0x800}, {&(0x7f0000010500)="ffffffffff070000000000000000000000000000000000000000000000000080ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff", 0x300, 0xc00}, {&(0x7f0000000000)="ed41000000040000d0f4655fd1f4655fd1f4655f13ca7302f6e9dab934", 0x1d, 0x1600}], 0x0, &(0x7f0000000280)=ANY=[]) setxattr$trusted_overlay_upper(&(0x7f0000000540)='./file0\x00', &(0x7f0000000580), &(0x7f00000005c0)={0x0, 0xfb, 0x139, 0x0, 0x0, "eacbf6ff0bc36f5a7bb9fe2ee7bb1e01", "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"}, 0x139, 0x0) getxattr(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)=@random={'security.', ':\x00'}, &(0x7f0000000140)=""/55, 0x37) 00:06:14 executing program 6: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x2, 0x0, 0x0, 0x80, 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000040)='proc\x00', 0x0, 0x0) pivot_root(&(0x7f0000000000)='./file0\x00', &(0x7f0000000140)='./file0\x00') 00:06:14 executing program 4: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x7fffffff}]}) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x200) mprotect(&(0x7f0000ffe000/0x1000)=nil, 0x1000, 0x0) [ 644.282511] EXT4-fs (loop0): mounted filesystem without journal. Opts: ,errors=continue [ 644.287336] EXT4-fs error (device loop0): ext4_validate_block_bitmap:398: comm syz-executor.0: bg 0: block 3: invalid block bitmap [ 644.340975] EXT4-fs (loop3): mounted filesystem without journal. Opts: ,errors=continue [ 644.345489] EXT4-fs error (device loop3): ext4_mb_generate_buddy:802: group 0, block bitmap and bg descriptor inconsistent: 2260 vs 212 free clusters 00:06:27 executing program 7: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x0, 0x0, 0x0, 0x7fffffff}]}) openat(0xffffffffffffff9c, 0x0, 0x1c2, 0x27) r0 = creat(&(0x7f0000000080)='./file1\x00', 0x0) ioctl$BTRFS_IOC_SCRUB(r0, 0xc400941b, &(0x7f0000000600)={0x0, 0x62, 0x80000001}) pwrite64(r0, &(0x7f0000000000)="a7", 0xfffffd6b, 0x0) accept$packet(0xffffffffffffffff, &(0x7f0000000080)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000100)=0x14) 00:06:27 executing program 4: r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000100), 0x800, 0x0) ioctl$BTRFS_IOC_QUOTA_RESCAN_STATUS(r0, 0x8040942d, &(0x7f0000000140)) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x7fffffff}]}) mprotect(&(0x7f0000ffe000/0x1000)=nil, 0x1000, 0x0) get_mempolicy(&(0x7f0000000080), &(0x7f00000000c0), 0x4, &(0x7f0000ffc000/0x4000)=nil, 0x0) madvise(&(0x7f0000ff5000/0xb000)=nil, 0xb000, 0x64) 00:06:27 executing program 5: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x7fffffff}]}) signalfd4(0xffffffffffffffff, &(0x7f00000000c0), 0x8, 0x0) r0 = socket$inet_icmp(0x2, 0x2, 0x1) open_by_handle_at(r0, &(0x7f0000000080)=@GFS2_LARGE_FH_SIZE={0x20, 0x8, {{0x3f, 0x21e, 0x3, 0x9}, {0xfffffffd, 0x1f, 0x8, 0x1}}}, 0x200) 00:06:27 executing program 1: ioctl$TUNSETQUEUE(0xffffffffffffffff, 0x400454d9, 0x0) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x7fffffff}]}) r0 = signalfd4(0xffffffffffffffff, &(0x7f00000000c0), 0x8, 0x0) prctl$PR_SET_MM_MAP(0x23, 0xe, &(0x7f0000000180)={&(0x7f0000ffd000/0x1000)=nil, &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000fff000/0x1000)=nil, &(0x7f0000ffd000/0x1000)=nil, &(0x7f0000ffc000/0x2000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000ffe000/0x2000)=nil, &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000ffd000/0x2000)=nil, &(0x7f0000ffd000/0x2000)=nil, &(0x7f0000000140)="080afc03b8bae061a487765e741c1a3a5a7dea95a0b02b4dbb6944356a", 0x1d}, 0x68) r1 = creat(&(0x7f0000000080)='./file1\x00', 0x0) pwrite64(r1, &(0x7f0000000000)="a7", 0xfffffd6b, 0x0) accept$packet(r0, &(0x7f0000000080)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000100)=0x14) 00:06:27 executing program 0: syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000d1f4655fd1f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b00000000020000280200000284", 0x62, 0x400}, {&(0x7f0000010400)="030000000400000005000000d4", 0xd, 0x800}, {&(0x7f0000010500), 0x0, 0xc00}, {&(0x7f0000000000)="ed41000000040000d0f4655fd1f4655fd1f4655f13ca7302f6e9dab934", 0x1d, 0x1600}], 0x0, &(0x7f0000000280)=ANY=[]) setxattr$trusted_overlay_upper(&(0x7f0000000540)='./file0\x00', &(0x7f0000000580), &(0x7f00000005c0)={0x0, 0xfb, 0x139, 0x0, 0x0, "eacbf6ff0bc36f5a7bb9fe2ee7bb1e01", "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"}, 0x139, 0x0) 00:06:27 executing program 2: r0 = openat$hpet(0xffffffffffffff9c, &(0x7f0000000140), 0x44c3, 0x0) sendmsg$DEVLINK_CMD_TRAP_GROUP_GET(r0, &(0x7f0000000240)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f0000000200)={&(0x7f00000001c0)={0x40, 0x0, 0x100, 0x70bd27, 0x25dfdbfc, {}, [{@pci={{0x8}, {0x11}}, {0xd}}]}, 0x40}, 0x1, 0x0, 0x0, 0xc004}, 0xedc0635539f0bf9) r1 = seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x7fffffff}]}) r2 = signalfd4(0xffffffffffffffff, &(0x7f00000002c0), 0x8, 0x80000) r3 = openat$hpet(0xffffffffffffff9c, &(0x7f0000000080), 0x100, 0x0) syz_genetlink_get_family_id$wireguard(&(0x7f0000000280), r2) sendfile(r3, r1, &(0x7f0000000100)=0x2, 0x959) 00:06:27 executing program 6: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000040)='proc\x00', 0x0, 0x0) listxattr(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000280)=""/248, 0xf8) pivot_root(&(0x7f0000000000)='./file0\x00', &(0x7f0000000240)='.\x00') accept$unix(0xffffffffffffffff, &(0x7f0000000140)=@abs, &(0x7f00000000c0)=0x6e) 00:06:27 executing program 3: syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000d1f4655fd1f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b00000000020000280200000284", 0x62, 0x400}, {&(0x7f0000010400)="030000000400000005000000d4", 0xd, 0x800}, {&(0x7f0000010500)="ffffffffff070000000000000000000000000000000000000000000000000080ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff", 0x300, 0xc00}, {&(0x7f0000000000)="ed41000000040000d0f4655fd1f4655fd1f4655f13ca7302f6e9dab934", 0x1d, 0x1600}], 0x0, &(0x7f0000000280)=ANY=[]) setxattr$trusted_overlay_upper(&(0x7f0000000540)='./file0\x00', &(0x7f0000000580), &(0x7f00000005c0)={0x0, 0xfb, 0x139, 0x0, 0x0, "eacbf6ff0bc36f5a7bb9fe2ee7bb1e01", "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"}, 0x139, 0x0) getxattr(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)=@random={'security.', ':\x00'}, &(0x7f0000000140)=""/55, 0x37) [ 657.699109] EXT4-fs (loop0): mounted filesystem without journal. Opts: ,errors=continue [ 657.712557] EXT4-fs error (device loop0): ext4_validate_block_bitmap:398: comm syz-executor.0: bg 0: block 3: invalid block bitmap [ 657.727607] EXT4-fs (loop3): mounted filesystem without journal. Opts: ,errors=continue 00:06:27 executing program 4: msgsnd(0xffffffffffffffff, &(0x7f0000000080)={0x1, "5aef95cbd04a54c4db66542727a43e7552341bedfcb797b8b30e4237fd6316ddaf24b88b70d3ff2a57a8e93c17962399ae868b61084bf7d58f6394dcd395ac9bfe4644d5fd564260a4ec2f090ae74f5e0a7dae80c3f77518295c39ad175f34697d18e5eab61f3bd3e3ee14c6392d4efff547aafb3764ec5c34bfc8f3f9e37eb398c1e8250fb303ebb438a31fcee2e95ad2537b4d4a16263d4ff6bb156224ae9c7d1ee7ca89c48b0778d858fca2e21e1d2ef319c630d7ebd32dc91468c47b03a36b9eecefa69ea51bf55aa4567ca95839c11f2cee33"}, 0xdd, 0x800) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x9, 0x4, 0x0, 0x7fffffff}]}) mprotect(&(0x7f0000ffe000/0x1000)=nil, 0x1000, 0x0) [ 657.741760] EXT4-fs error (device loop3): ext4_mb_generate_buddy:802: group 0, block bitmap and bg descriptor inconsistent: 2260 vs 212 free clusters 00:06:27 executing program 3: syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000d1f4655fd1f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b00000000020000280200000284", 0x62, 0x400}, {&(0x7f0000010400)="030000000400000005000000d4", 0xd, 0x800}, {&(0x7f0000010500)="ffffffffff070000000000000000000000000000000000000000000000000080ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff", 0x300, 0xc00}, {&(0x7f0000000000)="ed41000000040000d0f4655fd1f4655fd1f4655f13ca7302f6e9dab934", 0x1d, 0x1600}], 0x0, &(0x7f0000000280)=ANY=[]) setxattr$trusted_overlay_upper(&(0x7f0000000540)='./file0\x00', &(0x7f0000000580), &(0x7f00000005c0)={0x0, 0xfb, 0x139, 0x0, 0x0, "eacbf6ff0bc36f5a7bb9fe2ee7bb1e01", "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"}, 0x139, 0x0) getxattr(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)=@random={'security.', ':\x00'}, &(0x7f0000000140)=""/55, 0x37) 00:06:27 executing program 5: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x7fffffff}]}) r0 = signalfd4(0xffffffffffffffff, &(0x7f00000000c0), 0x8, 0x0) r1 = openat(0xffffffffffffff9c, 0x0, 0x1c2, 0x27) r2 = creat(&(0x7f0000000080)='./file1\x00', 0x0) ioctl$BTRFS_IOC_SCRUB_PROGRESS(r1, 0xc400941d, &(0x7f0000000200)={0x0, 0x4, 0xd3, 0x1}) ioctl$BTRFS_IOC_SCRUB(r2, 0xc400941b, &(0x7f0000000600)={r3, 0x62, 0x80000001}) pwrite64(r2, &(0x7f0000000000)="a7", 0x1, 0x44) ioctl$PIO_UNIMAPCLR(r2, 0x4b68, &(0x7f0000000a80)={0x80, 0x4, 0x6}) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r0, 0xc0502100, &(0x7f0000000100)={0x0}) ioctl$SECCOMP_IOCTL_NOTIF_ID_VALID(r2, 0x40082102, &(0x7f0000000180)=r4) r5 = openat$incfs(0xffffffffffffff9c, &(0x7f0000000bc0)='.log\x00', 0x20000, 0x120) ioctl$BTRFS_IOC_SUBVOL_CREATE(0xffffffffffffffff, 0x5000940e, &(0x7f0000000c00)={{r5}, "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"}) r6 = openat(0xffffffffffffff9c, 0x0, 0x1c2, 0x27) r7 = open(&(0x7f0000000040)='./file0\x00', 0x1810c1, 0x0) ioctl$BTRFS_IOC_SCRUB_PROGRESS(r6, 0xc400941d, &(0x7f0000000200)={0x0, 0x4, 0xd3, 0x1}) pwrite64(r7, &(0x7f0000000a40)="0f64800203d6484c7ddffad1", 0xc, 0x0) lseek(r7, 0x2, 0x3) fcntl$getflags(r7, 0x401) dup2(r6, r7) signalfd4(r7, &(0x7f0000000080)={[0x3f]}, 0x8, 0x800) 00:06:27 executing program 2: ioctl$EVIOCGSW(0xffffffffffffffff, 0x8040451b, &(0x7f0000000100)=""/4096) mq_unlink(&(0x7f0000000080)='\x00') seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x7fffffff}]}) signalfd4(0xffffffffffffffff, &(0x7f00000000c0), 0x8, 0x0) 00:06:27 executing program 6: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000040)='proc\x00', 0x0, 0x0) pivot_root(&(0x7f0000000000)='./file0\x00', &(0x7f0000000240)='.\x00') creat(&(0x7f00000000c0)='./file0\x00', 0x21) 00:06:27 executing program 0: syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000d1f4655fd1f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b00000000020000280200000284", 0x62, 0x400}, {&(0x7f0000010400)="030000000400000005000000d4", 0xd, 0x800}, {&(0x7f0000010500), 0x0, 0xc00}, {&(0x7f0000000000)="ed41000000040000d0f4655fd1f4655fd1f4655f13ca7302f6e9dab934", 0x1d, 0x1600}], 0x0, &(0x7f0000000280)=ANY=[]) setxattr$trusted_overlay_upper(&(0x7f0000000540)='./file0\x00', &(0x7f0000000580), &(0x7f00000005c0)={0x0, 0xfb, 0x139, 0x0, 0x0, "eacbf6ff0bc36f5a7bb9fe2ee7bb1e01", "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"}, 0x139, 0x0) 00:06:27 executing program 4: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x7fffffff}]}) mprotect(&(0x7f0000ffe000/0x1000)=nil, 0x1000, 0x0) r0 = syz_open_pts(0xffffffffffffffff, 0x41) write$binfmt_elf32(r0, &(0x7f0000000080)=ANY=[@ANYBLOB="7f454c46c001800215470000000000000300060029000000d202000038000000a100000001000000ffff0001010000000000000070e00000000600000002000000ffffff7f00800100030000000700000000000070ff0700001f00000003000000d509000014790000cc9900000800000071c6a9316d10a7ba7537ed781f4afe9159e6ca4e4f3393ccf7ea169857b0827eee513ed70e14f8da5e349888537e8faea93c088d1c4452f38ba8745fa4203adac4208dbb262e6ac5d3a85352fe7ea4f17defb48a18cd4c951ce92750d3c6e11de268f84c3630e160abaa9aa8a37f38585fa17fd990eb2d4e86b7adfba8cf401bb5727672e7e52542be9c734ab748a1ab6e54168b5d9a79b3e72afc25cb76e878912557cf5603e63b4c2e02c97640653178b3f0191c4c0d8c40c2682c53ad8d75c9416f63ba91dfb3ee3115c5cf00"/1070], 0x445) [ 657.927887] EXT4-fs (loop3): mounted filesystem without journal. Opts: ,errors=continue [ 658.034149] EXT4-fs (loop0): mounted filesystem without journal. Opts: ,errors=continue [ 658.039387] EXT4-fs error (device loop0): ext4_validate_block_bitmap:398: comm syz-executor.0: bg 0: block 3: invalid block bitmap 00:06:39 executing program 7: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x0, 0x0, 0x0, 0x7fffffff}]}) openat(0xffffffffffffff9c, 0x0, 0x1c2, 0x27) r0 = creat(&(0x7f0000000080)='./file1\x00', 0x0) ioctl$BTRFS_IOC_SCRUB(r0, 0xc400941b, &(0x7f0000000600)={0x0, 0x62, 0x80000001}) pwrite64(r0, &(0x7f0000000000)="a7", 0xfffffd6b, 0x0) accept$packet(0xffffffffffffffff, &(0x7f0000000080)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000100)=0x14) 00:06:39 executing program 1: ioctl$TUNSETQUEUE(0xffffffffffffffff, 0x400454d9, 0x0) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x7fffffff}]}) r0 = signalfd4(0xffffffffffffffff, &(0x7f00000000c0), 0x8, 0x0) prctl$PR_SET_MM_MAP(0x23, 0xe, &(0x7f0000000180)={&(0x7f0000ffd000/0x1000)=nil, &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000fff000/0x1000)=nil, &(0x7f0000ffd000/0x1000)=nil, &(0x7f0000ffc000/0x2000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000ffe000/0x2000)=nil, &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000ffd000/0x2000)=nil, &(0x7f0000ffd000/0x2000)=nil, &(0x7f0000000140)="080afc03b8bae061a487765e741c1a3a5a7dea95a0b02b4dbb6944356a", 0x1d}, 0x68) r1 = creat(&(0x7f0000000080)='./file1\x00', 0x0) pwrite64(r1, &(0x7f0000000000)="a7", 0xfffffd6b, 0x0) accept$packet(r0, &(0x7f0000000080)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000100)=0x14) 00:06:39 executing program 6: r0 = syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x6, 0x0, 0x0, 0x3002486, 0x0) r1 = openat(0xffffffffffffff9c, 0x0, 0x1c2, 0x27) ioctl$FS_IOC_SET_ENCRYPTION_POLICY(r0, 0x800c6613, &(0x7f0000000600)=@v2={0x2, @aes128, 0x8, '\x00', @c}) r2 = open(&(0x7f0000000040)='./file0\x00', 0x1810c1, 0x80) ioctl$BTRFS_IOC_SCRUB_PROGRESS(r1, 0xc400941d, &(0x7f0000000200)={0x0, 0x4, 0xd3, 0x1}) pwrite64(r2, &(0x7f0000000a40)="0f64800203d6484c7ddffad1", 0xc, 0x0) lseek(r2, 0x2, 0x3) fcntl$getflags(r2, 0x401) ioctl$FS_IOC_ENABLE_VERITY(r0, 0x40806685, &(0x7f0000000780)={0x1, 0x2, 0x1000, 0xca, &(0x7f0000000640)="b62410b5bfb75c97df8779ab37d7f5aa098d70073ee221d246dca9f7ad3b49af4e1de328a2b4c148d1c52ec21c060b565442274965b1581449db956457d42dd8a02a383fe3691aa08a5640d79caf7e1d38fadec85840532ba8833990ab31bcea423490e707e18a6163bf4be6b04000029edbc488c7b1d105f00afefc5496f506a2848bebc6c69ff2639a3ab179805e9f0ca12ac9860893575f87e2ff31d127c9a3234bf33cbd987cf4a789b8f60b5ba22e89c7cfcd57bbbdb6ca67ebaa6cad63436b7d5ed82e92a402b1", 0x1e, 0x0, &(0x7f0000000740)="cca7c1ca4e2d6c6aff410e4e770820fd29649c670269ed0a04306c7a0e87"}) dup2(r1, r2) open_tree(r2, &(0x7f00000001c0)='./file0\x00', 0x800) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000040)='proc\x00', 0x0, 0x0) stat(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)) pivot_root(&(0x7f0000000000)='./file0\x00', &(0x7f0000000240)='.\x00') 00:06:39 executing program 2: ioctl$SNAPSHOT_ATOMIC_RESTORE(0xffffffffffffffff, 0x3304) openat$vcs(0xffffffffffffff9c, &(0x7f0000000100), 0x80000, 0x0) r0 = openat$pidfd(0xffffffffffffff9c, &(0x7f0000000180), 0xa002, 0x0) pidfd_send_signal(0xffffffffffffffff, 0x1d, &(0x7f00000001c0)={0x6, 0x7ff, 0x401}, 0x0) copy_file_range(0xffffffffffffffff, &(0x7f0000000080)=0x1, r0, &(0x7f0000000140)=0x3f, 0x9c3d, 0x0) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x7fffffff}]}) signalfd4(0xffffffffffffffff, &(0x7f00000000c0), 0x8, 0x0) 00:06:39 executing program 3: syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000d1f4655fd1f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b00000000020000280200000284", 0x62, 0x400}, {&(0x7f0000010400)="030000000400000005000000d4", 0xd, 0x800}, {&(0x7f0000010500)="ffffffffff070000000000000000000000000000000000000000000000000080ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff", 0x380, 0xc00}, {&(0x7f0000000000)="ed41000000040000d0f4655fd1f4655fd1f4655f13ca7302f6e9dab934", 0x1d, 0x1600}], 0x0, &(0x7f0000000280)=ANY=[]) setxattr$trusted_overlay_upper(&(0x7f0000000540)='./file0\x00', &(0x7f0000000580), &(0x7f00000005c0)={0x0, 0xfb, 0x139, 0x0, 0x0, "eacbf6ff0bc36f5a7bb9fe2ee7bb1e01", "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"}, 0x139, 0x0) getxattr(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)=@random={'security.', ':\x00'}, &(0x7f0000000140)=""/55, 0x37) 00:06:39 executing program 0: syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000d1f4655fd1f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b00000000020000280200000284", 0x62, 0x400}, {&(0x7f0000010400)="030000000400000005000000d4", 0xd, 0x800}, {&(0x7f0000010500)="ffffffffff070000000000000000000000000000000000000000000000000080ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff", 0x200, 0xc00}, {&(0x7f0000000000)="ed41000000040000d0f4655fd1f4655fd1f4655f13ca7302f6e9dab934", 0x1d, 0x1600}], 0x0, &(0x7f0000000280)=ANY=[]) setxattr$trusted_overlay_upper(&(0x7f0000000540)='./file0\x00', &(0x7f0000000580), &(0x7f00000005c0)={0x0, 0xfb, 0x139, 0x0, 0x0, "eacbf6ff0bc36f5a7bb9fe2ee7bb1e01", "a49dbbc75b5fc0caa97cab3ee231b0d7cf3b9be24c0fb2c145c6f2190b4a29cc525f550d79c74a03eda157db2eae62fde8958cce2a8a4c9d0374e4d6ae09ef4ee733ce4046bee0170cff57584e0671d4f286b9691d37721b43778a4afb3c3d05fd5446d2e0bac5326f43d23126410dfb85efa26b9e1ae8d056c3ebcde0c95e1443304d7a93eb4077f76047b6e13f0e79a9631ac2bd43143854803c698a7f02933d9cbdca121cc857aacabf858f3f904c9dfedb6c03186d99490f35f09de8ab897ea7c58f07dca416e1db55c7a849a91b98d0e0c0c7bf058d86a2e997a0557800a34bb7f5806f2e15e99981cc3fe615a3ff396f7d8da30ea24626263abf0ad50a0ce2dafc55f2b0286b2204114a6754b336a913a75e66ed6a3efd132f668369692f46039d"}, 0x139, 0x0) 00:06:39 executing program 4: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x7fffffff}]}) syz_io_uring_setup(0x1432, &(0x7f0000000080)={0x0, 0x0, 0x1}, &(0x7f00000a0000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000000000)=0x0, &(0x7f0000000140)=0x0) syz_io_uring_submit(r0, r1, &(0x7f00000002c0)=@IORING_OP_READ=@use_registered_buffer={0x16, 0x4, 0x0, @fd_index=0x5}, 0x0) r2 = syz_io_uring_setup(0x5980, &(0x7f0000001380), &(0x7f0000ffe000/0x2000)=nil, &(0x7f0000ffb000/0x3000)=nil, &(0x7f00000001c0)=0x0, &(0x7f0000000280)=0x0) syz_io_uring_submit(r0, r4, &(0x7f0000000340)=@IORING_OP_POLL_REMOVE, 0x0) r5 = mmap$IORING_OFF_SQES(&(0x7f0000ffd000/0x1000)=nil, 0x1000, 0x2, 0x13, 0xffffffffffffffff, 0x10000000) syz_io_uring_submit(r3, r5, &(0x7f0000000180)=@IORING_OP_WRITE={0x17, 0xd, 0x4007, @fd_index=0xa, 0x8, &(0x7f0000000100)="fa842613", 0x4, 0x18, 0x1}, 0x1) syz_io_uring_setup(0x1432, &(0x7f0000000080)={0x0, 0x0, 0x1}, &(0x7f00000a0000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000000000)=0x0, &(0x7f0000000140)) r7 = io_uring_register$IORING_REGISTER_PERSONALITY(r2, 0x9, 0x0, 0x0) syz_io_uring_submit(0x0, 0x0, &(0x7f0000000600)=@IORING_OP_READ=@use_registered_buffer={0x16, 0x5, 0x6000, @fd, 0x3ff, 0x0, 0x0, 0xf, 0x0, {0x3, r7}}, 0x0) syz_io_uring_setup(0x5980, &(0x7f0000001380), &(0x7f0000ffe000/0x2000)=nil, &(0x7f0000ffb000/0x3000)=nil, &(0x7f00000001c0), &(0x7f0000000280)=0x0) syz_io_uring_submit(r6, r8, &(0x7f0000000340)=@IORING_OP_POLL_REMOVE, 0x0) r9 = openat(0xffffffffffffff9c, 0x0, 0x1c2, 0x27) r10 = open(&(0x7f0000000040)='./file0\x00', 0x1810c1, 0x0) ioctl$BTRFS_IOC_SCRUB_PROGRESS(r9, 0xc400941d, &(0x7f0000000200)={0x0, 0x4, 0xd3, 0x1}) pwrite64(r10, &(0x7f0000000a40)="0f64800203d6484c7ddffad1", 0xc, 0x0) lseek(r10, 0x2, 0x3) fcntl$getflags(r10, 0x401) dup2(r9, r10) syz_io_uring_submit(r0, r8, &(0x7f0000000080)=@IORING_OP_RECV=@use_registered_buffer={0x1b, 0x1, 0x0, r10, 0x0, 0x0, 0x0, 0x2002, 0x0, {0x3}}, 0xffffffff) 00:06:39 executing program 5: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x7fffffff}]}) r0 = signalfd4(0xffffffffffffffff, &(0x7f0000000180), 0x8, 0x0) r1 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x3}, 0x0, 0x0, 0xffffffffffffffff) add_key$keyring(&(0x7f0000000200), 0x0, 0x0, 0x0, 0xfffffffffffffffe) r2 = add_key$keyring(&(0x7f0000000400), &(0x7f0000000440)={'syz', 0x3}, 0x0, 0x0, r1) r3 = add_key$user(&(0x7f0000000280), &(0x7f00000002c0)={'syz', 0x3}, &(0x7f0000000300)="ef", 0x1, r2) r4 = add_key$keyring(&(0x7f0000000600), &(0x7f0000000640)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffb) add_key$keyring(&(0x7f00000000c0), &(0x7f00000001c0)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$search(0xa, r3, &(0x7f0000000580)='trusted\x00', &(0x7f00000005c0)={'syz', 0x0}, r4) r5 = add_key$keyring(&(0x7f0000000040), &(0x7f00000002c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, r5, &(0x7f0000000240)='asymmetric\x00', &(0x7f0000000200)=@secondary) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, r5, 0x0, 0x0) add_key$fscrypt_v1(&(0x7f0000000240), &(0x7f0000000340)={'fscrypt:', @auto=[0x34, 0x62, 0x37, 0x39, 0x64, 0x33, 0x61, 0x31, 0x62, 0x31, 0x62, 0x33, 0x62, 0x64, 0x65, 0x36]}, &(0x7f0000000380)={0x0, "2829cc07e809a1198c0eca9495327b24618678791fa5e861177f7b13826104c51385b27ebd83de18ded278fc74f0726791534b41cfb4dc94b486dfb9090a1852", 0x20}, 0x48, r5) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40042409, 0x1) ioctl$BTRFS_IOC_QUOTA_RESCAN_STATUS(r0, 0x8040942d, &(0x7f0000000080)) add_key(&(0x7f0000000100)='trusted\x00', &(0x7f0000000140)={'syz', 0x3}, 0x0, 0x0, r1) [ 669.679589] EXT4-fs (loop3): mounted filesystem without journal. Opts: ,errors=continue [ 669.683075] EXT4-fs error (device loop3): ext4_mb_generate_buddy:802: group 0, block bitmap and bg descriptor inconsistent: 1236 vs 212 free clusters 00:06:39 executing program 2: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x7fffffff}]}) r0 = signalfd4(0xffffffffffffffff, &(0x7f00000000c0), 0x8, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, 0x0, 0x8100, 0x0) ioctl$TIOCSIG(r1, 0x40045436, 0x0) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, r1, &(0x7f0000000200)={0x10000000}) socket$netlink(0x10, 0x3, 0x9) pwritev2(r0, &(0x7f0000000080)=[{&(0x7f0000000100)="fa1541fc63f10b79542bca2fe3e189780d13051eb1c9606ffa8d8d959111fb2c2363551c8eb476d94a5b2d0bb52ed20fec56dd52bf6c4fabd3739967a8d3cab91222bf8dd925e059e588115dfe824e7dc74ddfbb442492f41f92aa63bd087b70821f33c8312666006bf9b193baa1e46b54f3e8cb7c80013ad0edbc02cd78865db46e5457a2589bade6610c66567d585bca634c7b547fb0fea8d20a7f78cb477d899a46c7c6b9a82854523b7a27bd14433a56cdacd710f38950934d220fc788714bf95e029e6d3b404f984eec738ae2319a7066187379b89510fc673b375e9186a31649c91e1877cece70e82989cfc140a770165397", 0xf5}], 0x1, 0x4, 0x5, 0x1) 00:06:39 executing program 6: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000040)='proc\x00', 0x0, 0x0) stat(&(0x7f0000000280)='./file0\x00', &(0x7f0000000380)={0x0, 0x0, 0x0, 0x0, 0x0}) mount(&(0x7f0000000200)=@filename='./file0\x00', &(0x7f00000002c0)='./file0\x00', &(0x7f0000000400)='gfs2meta\x00', 0x208a0, &(0x7f0000000440)='\x00') setresuid(0x0, r0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='./file0\x00', &(0x7f00000001c0), 0x5006, &(0x7f0000000300)={'trans=unix,', {[{@cache_fscache}, {@msize={'msize', 0x3d, 0x4}}, {@access_uid={'access', 0x3d, r0}}]}}) mknod$loop(&(0x7f00000000c0)='./file0\x00', 0x1, 0x0) pivot_root(&(0x7f0000000000)='./file0\x00', &(0x7f0000000240)='.\x00') 00:06:39 executing program 3: syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000d1f4655fd1f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b00000000020000280200000284", 0x62, 0x400}, {&(0x7f0000010400)="030000000400000005000000d4", 0xd, 0x800}, {&(0x7f0000010500)="ffffffffff070000000000000000000000000000000000000000000000000080ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff", 0x380, 0xc00}, {&(0x7f0000000000)="ed41000000040000d0f4655fd1f4655fd1f4655f13ca7302f6e9dab934", 0x1d, 0x1600}], 0x0, &(0x7f0000000280)=ANY=[]) setxattr$trusted_overlay_upper(&(0x7f0000000540)='./file0\x00', &(0x7f0000000580), &(0x7f00000005c0)={0x0, 0xfb, 0x139, 0x0, 0x0, "eacbf6ff0bc36f5a7bb9fe2ee7bb1e01", "a49dbbc75b5fc0caa97cab3ee231b0d7cf3b9be24c0fb2c145c6f2190b4a29cc525f550d79c74a03eda157db2eae62fde8958cce2a8a4c9d0374e4d6ae09ef4ee733ce4046bee0170cff57584e0671d4f286b9691d37721b43778a4afb3c3d05fd5446d2e0bac5326f43d23126410dfb85efa26b9e1ae8d056c3ebcde0c95e1443304d7a93eb4077f76047b6e13f0e79a9631ac2bd43143854803c698a7f02933d9cbdca121cc857aacabf858f3f904c9dfedb6c03186d99490f35f09de8ab897ea7c58f07dca416e1db55c7a849a91b98d0e0c0c7bf058d86a2e997a0557800a34bb7f5806f2e15e99981cc3fe615a3ff396f7d8da30ea24626263abf0ad50a0ce2dafc55f2b0286b2204114a6754b336a913a75e66ed6a3efd132f668369692f46039d"}, 0x139, 0x0) getxattr(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)=@random={'security.', ':\x00'}, &(0x7f0000000140)=""/55, 0x37) [ 669.755129] EXT4-fs (loop0): mounted filesystem without journal. Opts: ,errors=continue [ 669.760048] EXT4-fs error (device loop0): ext4_mb_generate_buddy:802: group 0, block bitmap and bg descriptor inconsistent: 4308 vs 212 free clusters 00:06:39 executing program 0: syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000d1f4655fd1f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b00000000020000280200000284", 0x62, 0x400}, {&(0x7f0000010400)="030000000400000005000000d4", 0xd, 0x800}, {&(0x7f0000010500)="ffffffffff070000000000000000000000000000000000000000000000000080ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff", 0x200, 0xc00}, {&(0x7f0000000000)="ed41000000040000d0f4655fd1f4655fd1f4655f13ca7302f6e9dab934", 0x1d, 0x1600}], 0x0, &(0x7f0000000280)=ANY=[]) setxattr$trusted_overlay_upper(&(0x7f0000000540)='./file0\x00', &(0x7f0000000580), &(0x7f00000005c0)={0x0, 0xfb, 0x139, 0x0, 0x0, "eacbf6ff0bc36f5a7bb9fe2ee7bb1e01", "a49dbbc75b5fc0caa97cab3ee231b0d7cf3b9be24c0fb2c145c6f2190b4a29cc525f550d79c74a03eda157db2eae62fde8958cce2a8a4c9d0374e4d6ae09ef4ee733ce4046bee0170cff57584e0671d4f286b9691d37721b43778a4afb3c3d05fd5446d2e0bac5326f43d23126410dfb85efa26b9e1ae8d056c3ebcde0c95e1443304d7a93eb4077f76047b6e13f0e79a9631ac2bd43143854803c698a7f02933d9cbdca121cc857aacabf858f3f904c9dfedb6c03186d99490f35f09de8ab897ea7c58f07dca416e1db55c7a849a91b98d0e0c0c7bf058d86a2e997a0557800a34bb7f5806f2e15e99981cc3fe615a3ff396f7d8da30ea24626263abf0ad50a0ce2dafc55f2b0286b2204114a6754b336a913a75e66ed6a3efd132f668369692f46039d"}, 0x139, 0x0) 00:06:39 executing program 6: mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000040)='proc\x00', 0x0, 0x0) open$dir(&(0x7f00000000c0)='./file0\x00', 0x2a0201, 0x0) pivot_root(&(0x7f0000000000)='./file0\x00', &(0x7f0000000240)='.\x00') 00:06:39 executing program 2: r0 = seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0xc, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x7fffffff}]}) r1 = openat(0xffffffffffffff9c, 0x0, 0x1c2, 0x27) r2 = open(&(0x7f0000000040)='./file0\x00', 0x1810c1, 0x0) ioctl$BTRFS_IOC_SCRUB_PROGRESS(r1, 0xc400941d, &(0x7f0000000200)={0x0, 0x4, 0xd3, 0x1}) pwrite64(r2, &(0x7f0000000a40)="0f64800203d6484c7ddffad1", 0xc, 0x0) lseek(r2, 0x2, 0x3) fcntl$getflags(r2, 0x401) dup2(r1, r2) r3 = fork() ptrace(0x10, r3) ptrace$setregs(0xd, r3, 0x0, &(0x7f0000000000)) ptrace$cont(0x9, r3, 0x0, 0x0) pidfd_open(r3, 0x0) fcntl$setown(r1, 0x8, r3) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r0, 0xc0502100, &(0x7f0000000100)) signalfd4(0xffffffffffffffff, &(0x7f00000000c0), 0x8, 0x0) 00:06:39 executing program 5: r0 = seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x8, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x7fffffff}]}) ioctl$SECCOMP_IOCTL_NOTIF_SEND(0xffffffffffffffff, 0xc0182101, &(0x7f00000000c0)={0x0, 0x1000, 0x8}) signalfd4(r0, &(0x7f0000000040)={[0x800]}, 0x46, 0x180800) r1 = openat$urandom(0xffffffffffffff9c, &(0x7f0000000100), 0x200, 0x0) r2 = openat(0xffffffffffffff9c, 0x0, 0x1c2, 0x27) r3 = open(&(0x7f0000000040)='./file0\x00', 0x1810c1, 0x0) ioctl$BTRFS_IOC_SCRUB_PROGRESS(r2, 0xc400941d, &(0x7f0000000200)={0x0, 0x4, 0xd3, 0x1}) pwrite64(r3, &(0x7f0000000a40)="0f64800203d6484c7ddffad1", 0xc, 0x0) lseek(r3, 0x2, 0x3) fcntl$getflags(r3, 0x401) dup2(r2, r3) ioctl$RNDADDENTROPY(r2, 0x40085203, &(0x7f00000007c0)=ANY=[@ANYBLOB="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"]) ioctl$FS_IOC_RESVSP(r1, 0x40305828, &(0x7f0000000140)={0x0, 0x2, 0x0, 0xf1}) [ 669.918293] EXT4-fs (loop3): mounted filesystem without journal. Opts: ,errors=continue 00:06:39 executing program 4: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x1}]}) mprotect(&(0x7f0000ffe000/0x1000)=nil, 0x1000, 0x0) [ 670.030107] audit: type=1326 audit(1626998800.038:36): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=6658 comm="syz-executor.4" exe="/syz-executor.4" sig=31 arch=c000003e syscall=202 compat=0 ip=0x466609 code=0x0 [ 670.060940] EXT4-fs (loop0): mounted filesystem without journal. Opts: ,errors=continue [ 670.854537] audit: type=1326 audit(1626998800.864:37): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=6658 comm="syz-executor.4" exe="/syz-executor.4" sig=31 arch=c000003e syscall=202 compat=0 ip=0x466609 code=0x0 00:06:51 executing program 2: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x7fffffff}]}) r0 = signalfd4(0xffffffffffffffff, &(0x7f00000000c0), 0x8, 0x0) r1 = openat(0xffffffffffffff9c, 0x0, 0x1c2, 0x27) r2 = creat(&(0x7f0000000080)='./file1\x00', 0x0) ioctl$BTRFS_IOC_SCRUB_PROGRESS(r1, 0xc400941d, &(0x7f0000000200)={0x0, 0x4, 0xd3, 0x1}) ioctl$BTRFS_IOC_SCRUB(r2, 0xc400941b, &(0x7f0000000600)={r3, 0x62, 0x80000001}) pwrite64(r2, &(0x7f0000000000)="a7", 0xfffffd6b, 0x0) ioctl$PIO_UNIMAPCLR(r2, 0x4b68, &(0x7f0000000a80)={0x80, 0x4, 0x6}) r4 = geteuid() mount$9p_fd(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000100), 0xbba79c8b9339f74c, &(0x7f0000000140)={'trans=fd,', {'rfdno', 0x3d, r2}, 0x2c, {'wfdno', 0x3d, r0}, 0x2c, {[{@loose}], [{@smackfsroot}, {@euid_gt={'euid>', r4}}, {@smackfsroot={'smackfsroot', 0x3d, '\x00'}}, {@smackfsfloor={'smackfsfloor', 0x3d, '#\'(^'}}, {@permit_directio}, {@subj_user={'subj_user', 0x3d, '\xf4{:*+'}}, {@dont_hash}, {@fsname={'fsname', 0x3d, '+#'}}]}}) 00:06:51 executing program 4: r0 = openat(0xffffffffffffff9c, 0x0, 0x1c2, 0x27) r1 = open(&(0x7f0000000040)='./file0\x00', 0x1810c1, 0x0) ioctl$BTRFS_IOC_SCRUB_PROGRESS(r0, 0xc400941d, &(0x7f0000000200)={0x0, 0x4, 0xd3, 0x1}) pwrite64(r1, &(0x7f0000000a40)="0f64800203d6484c7ddffad1", 0xc, 0x0) lseek(r1, 0x2, 0x3) fcntl$getflags(r1, 0x401) dup2(r0, r1) sendmsg$IPVS_CMD_SET_SERVICE(r0, &(0x7f0000000180)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f0000000140)={&(0x7f00000000c0)={0x50, 0x0, 0x20, 0x70bd2a, 0x25dfdbff, {}, [@IPVS_CMD_ATTR_SERVICE={0x14, 0x1, 0x0, 0x1, [@IPVS_SVC_ATTR_FWMARK={0x8, 0x5, 0x1}, @IPVS_SVC_ATTR_FWMARK={0x8}]}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x7ff}, @IPVS_CMD_ATTR_DAEMON={0x18, 0x3, 0x0, 0x1, [@IPVS_DAEMON_ATTR_MCAST_GROUP6={0x14, 0x6, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02'}]}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0xffffffff}]}, 0x50}, 0x1, 0x0, 0x0, 0xc000010}, 0x840) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x7fffffff}]}) mprotect(&(0x7f0000ffe000/0x1000)=nil, 0x1000, 0x200000e) 00:06:51 executing program 6: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000080)='msdos\x00', 0x0, 0x0) pivot_root(&(0x7f0000000000)='./file0\x00', &(0x7f0000000240)='.\x00') 00:06:51 executing program 0: syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000d1f4655fd1f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b00000000020000280200000284", 0x62, 0x400}, {&(0x7f0000010400)="030000000400000005000000d4", 0xd, 0x800}, {&(0x7f0000010500)="ffffffffff070000000000000000000000000000000000000000000000000080ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff", 0x200, 0xc00}, {&(0x7f0000000000)="ed41000000040000d0f4655fd1f4655fd1f4655f13ca7302f6e9dab934", 0x1d, 0x1600}], 0x0, &(0x7f0000000280)=ANY=[]) setxattr$trusted_overlay_upper(&(0x7f0000000540)='./file0\x00', &(0x7f0000000580), &(0x7f00000005c0)={0x0, 0xfb, 0x139, 0x0, 0x0, "eacbf6ff0bc36f5a7bb9fe2ee7bb1e01", "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"}, 0x139, 0x0) 00:06:51 executing program 3: syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000d1f4655fd1f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b00000000020000280200000284", 0x62, 0x400}, {&(0x7f0000010400)="030000000400000005000000d4", 0xd, 0x800}, {&(0x7f0000010500)="ffffffffff070000000000000000000000000000000000000000000000000080ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff", 0x380, 0xc00}, {&(0x7f0000000000)="ed41000000040000d0f4655fd1f4655fd1f4655f13ca7302f6e9dab934", 0x1d, 0x1600}], 0x0, &(0x7f0000000280)=ANY=[]) setxattr$trusted_overlay_upper(&(0x7f0000000540)='./file0\x00', &(0x7f0000000580), &(0x7f00000005c0)={0x0, 0xfb, 0x139, 0x0, 0x0, "eacbf6ff0bc36f5a7bb9fe2ee7bb1e01", "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"}, 0x139, 0x0) getxattr(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)=@random={'security.', ':\x00'}, &(0x7f0000000140)=""/55, 0x37) 00:06:51 executing program 7: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x6}]}) openat(0xffffffffffffff9c, 0x0, 0x1c2, 0x27) r0 = creat(&(0x7f0000000080)='./file1\x00', 0x0) ioctl$BTRFS_IOC_SCRUB(r0, 0xc400941b, &(0x7f0000000600)={0x0, 0x62, 0x80000001}) pwrite64(r0, &(0x7f0000000000)="a7", 0xfffffd6b, 0x0) accept$packet(0xffffffffffffffff, &(0x7f0000000080)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000100)=0x14) 00:06:51 executing program 5: r0 = seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x7fffffff}]}) r1 = signalfd4(r0, &(0x7f00000000c0)={[0x3]}, 0x8, 0x80000) r2 = mmap$IORING_OFF_SQ_RING(&(0x7f0000ffb000/0x3000)=nil, 0x3000, 0x2, 0x10010, r1, 0x0) r3 = openat$hpet(0xffffffffffffff9c, &(0x7f0000000080), 0x40002, 0x0) r4 = syz_io_uring_setup(0x1, &(0x7f0000000080), &(0x7f0000ffd000/0x2000)=nil, &(0x7f0000ffc000/0x2000)=nil, &(0x7f0000000100)=0x0, &(0x7f0000000140)=0x0) r7 = io_uring_register$IORING_REGISTER_PERSONALITY(r4, 0x9, 0x0, 0x0) syz_io_uring_submit(r5, r6, &(0x7f0000000000)=@IORING_OP_FSYNC={0x3, 0x0, 0x0, @fd=r4, 0x0, 0x0, 0x0, 0x0, 0x0, {0x0, r7}}, 0x0) io_uring_enter(r4, 0x1, 0x0, 0x0, 0x0, 0x0) io_uring_register$IORING_UNREGISTER_PERSONALITY(r4, 0xa, 0x0, r7) syz_io_uring_submit(r2, 0x0, &(0x7f0000000100)=@IORING_OP_SYNC_FILE_RANGE={0x8, 0x0, 0x0, @fd=r3, 0x8, 0x0, 0x4, 0x6, 0x0, {0x0, r7}}, 0xec) 00:06:51 executing program 1: ioctl$TUNSETQUEUE(0xffffffffffffffff, 0x400454d9, 0x0) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x7fffffff}]}) r0 = signalfd4(0xffffffffffffffff, &(0x7f00000000c0), 0x8, 0x0) prctl$PR_SET_MM_MAP(0x23, 0xe, &(0x7f0000000180)={&(0x7f0000ffd000/0x1000)=nil, &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000fff000/0x1000)=nil, &(0x7f0000ffd000/0x1000)=nil, &(0x7f0000ffc000/0x2000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000ffe000/0x2000)=nil, &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000ffd000/0x2000)=nil, &(0x7f0000ffd000/0x2000)=nil, &(0x7f0000000140)="080afc03b8bae061a487765e741c1a3a5a7dea95a0b02b4dbb6944356a", 0x1d}, 0x68) r1 = creat(&(0x7f0000000080)='./file1\x00', 0x0) pwrite64(r1, &(0x7f0000000000)="a7", 0xfffffd6b, 0x0) accept$packet(r0, &(0x7f0000000080)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000100)=0x14) 00:06:51 executing program 6: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) stat(&(0x7f0000001cc0)='.\x00', &(0x7f0000001c00)={0x0, 0x0, 0x0, 0x0, 0x0}) setresuid(0x0, r0, 0x0) syz_mount_image$ext4(&(0x7f00000000c0)='ext2\x00', &(0x7f0000000140)='./file0\x00', 0x2, 0x8, &(0x7f00000007c0)=[{&(0x7f0000000180)="e250bd4f5df8d6a240ea57ab9569a7790b3fbb19dec848e742045eb4255f6d47b0b5c33ff939372715eefae7b037ccda226c333bd78d3ae47d641f075bea0412760e9f1b577e24c541649d7e9a7e36b430e448f8b4833dd965aae7cdd3e001165a7cacaeff7af072545b8f80aeeed92865dc4ceb082f237e607ff1ad8a70119a75a9901596a29cf413fb9ad95d1216728065bc73d0b3f69f773e9f8753184b69", 0xa0, 0x7f}, {&(0x7f0000000280)="1ed210681df4811f2b7b9958a27e4b4928d4592c95a7056d384d5e25b3b40b975d4e9af13098ade8553b0f10f4fc", 0x2e, 0x8001}, {&(0x7f00000002c0)="4f4267fcd84b0717e08c430781b59cfa48830ea118f6d1a2db815ccbd37e8fabda4eb55df8926c46eec28e11e0074ed4b96b74171bac6c52463a0f8d6df80e6c7f01dffddc8eb3623fbdeca7898a3c7e2d10cc924e40d2f57d6e1f9ac8ab019a71039b774a81e9c48c5ee94522f9dcbe7b99041c05326aa677c87493e9637221668e0405800c02c082667d08726bed08fe242138ac8e653944d757d61f67afbe", 0xa0, 0x2}, {&(0x7f0000000380)="058baf3374aa73b83adc7bdda4760ab9696a820c60905ed75c5a93c2b5c9fb9f0d2d1b761de1b45a49062341fc6cfe08cd8c90be3613bf8189a1911c804b65b2ce6ce52ee57093e11a30bb6635e64a322903cb65c25d8abe3e142d73b06693f923429ab116d1d026f2aa9d393270ea972a46bedb439f6ff5b954d8520855405c4bb4f31c7d0773493e8072d3ba351d92a9199542da7cc5a3f209696c5e41e5688119beac", 0xa4, 0x379e}, {&(0x7f0000000440)="bd072d99c80304fc88f2933fa893196889ce10d1375dfb563f54d86a8eb2ef9ab71b1946ed711b8c99bf0e38e96114dbd5aa90ce7309fc91dc7e6021a8e3cdc9f345c4e11ba268e0b39dbdc1631b72e3b57a273fbf080dec41d12b4a5ffe5f6d12226aabb78e5faf852e487c9634229ad0face0800a6dfc6130741a28b763806d405b715e84afee3cab5c5b2d141765d715d291c106c25ece7e765ee7c25b06fe4134e5e92b856812d57c3c1d0fdd7833f46259da4c2d473fc3ea4d1a143645c327162e122052f1c39b05a9b", 0xcc, 0x1c}, {&(0x7f0000000540)="446094f015e5cf71abaad48ba674894c4912af78b776ced0f86de9292a076730340a15728b4844797d533ec42572552b272bcc747092ee07ec1a9de49e9371a049b9a1f6d176a1e1c089eb0a64506c9c0bdc8b0219a38ec887445be0a5dea858cd786a60532a8350040e802d1be5a05ce1010bfe5c7f401f8572812c3202b089a52da45fe0ae8a54b15b45d932e947d987b30e87b2d4c6c1a97f49329e8053f0d9883c6d00c84c989b678c4047c2429bea0a51e7799646a80b823bc6576c341e5bb6ebebc9d9e7ea7ecfdc97b635", 0xce, 0x9}, {&(0x7f0000000640)="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", 0xfe, 0x7fff}, {&(0x7f0000000740)="bef5f489001d16a6d7496c8a201d6576df1a7a1032ecb03c048568d587e1d78bbab1c9d8ddfb34b412f95dddbf70130820757523fde6843f2af3a5dc0e46104e6fac667475ceecca83812326002df570f1561e5bc43e", 0x56, 0xfffffffffffffffb}], 0xac820, &(0x7f0000000880)={[{@dioread_lock}], [{@smackfstransmute={'smackfstransmute', 0x3d, '&-'}}, {@seclabel}, {@fowner_gt={'fowner>', r0}}, {@euid_lt={'euid<', 0xee00}}]}) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000040)='proc\x00', 0x0, 0x0) pivot_root(&(0x7f0000000000)='./file0\x00', &(0x7f0000000240)='.\x00') [ 681.591186] audit: type=1326 audit(1626998811.601:38): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=6675 comm="syz-executor.7" exe="/syz-executor.7" sig=31 arch=c000003e syscall=202 compat=0 ip=0x466609 code=0x0 [ 681.631043] EXT4-fs (loop0): mounted filesystem without journal. Opts: ,errors=continue [ 681.634026] EXT4-fs error (device loop0): ext4_mb_generate_buddy:802: group 0, block bitmap and bg descriptor inconsistent: 4308 vs 212 free clusters 00:06:51 executing program 4: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x7fffffff}]}) r0 = syz_open_dev$vcsu(&(0x7f0000000080), 0x101, 0x500) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r0, 0xc0502100, &(0x7f00000000c0)={0x0}) mprotect(&(0x7f0000ffe000/0x1000)=nil, 0x1000, 0x0) r2 = ioctl$NS_GET_PARENT(r0, 0xb702, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_ADDFD(r0, 0x40182103, &(0x7f0000000140)={r1, 0x1, r2, 0x3}) 00:06:51 executing program 0: syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000d1f4655fd1f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b00000000020000280200000284", 0x62, 0x400}, {&(0x7f0000010400)="030000000400000005000000d4", 0xd, 0x800}, {&(0x7f0000010500)="ffffffffff070000000000000000000000000000000000000000000000000080ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff", 0x300, 0xc00}, {&(0x7f0000000000)="ed41000000040000d0f4655fd1f4655fd1f4655f13ca7302f6e9dab934", 0x1d, 0x1600}], 0x0, &(0x7f0000000280)=ANY=[]) setxattr$trusted_overlay_upper(&(0x7f0000000540)='./file0\x00', &(0x7f0000000580), &(0x7f00000005c0)={0x0, 0xfb, 0x139, 0x0, 0x0, "eacbf6ff0bc36f5a7bb9fe2ee7bb1e01", "a49dbbc75b5fc0caa97cab3ee231b0d7cf3b9be24c0fb2c145c6f2190b4a29cc525f550d79c74a03eda157db2eae62fde8958cce2a8a4c9d0374e4d6ae09ef4ee733ce4046bee0170cff57584e0671d4f286b9691d37721b43778a4afb3c3d05fd5446d2e0bac5326f43d23126410dfb85efa26b9e1ae8d056c3ebcde0c95e1443304d7a93eb4077f76047b6e13f0e79a9631ac2bd43143854803c698a7f02933d9cbdca121cc857aacabf858f3f904c9dfedb6c03186d99490f35f09de8ab897ea7c58f07dca416e1db55c7a849a91b98d0e0c0c7bf058d86a2e997a0557800a34bb7f5806f2e15e99981cc3fe615a3ff396f7d8da30ea24626263abf0ad50a0ce2dafc55f2b0286b2204114a6754b336a913a75e66ed6a3efd132f668369692f46039d"}, 0x139, 0x0) 00:06:51 executing program 5: r0 = seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x7fffffff}]}) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140), 0x2102, 0x0) ioctl$EXT4_IOC_MIGRATE(r0, 0x6609) copy_file_range(r1, 0x0, r2, &(0x7f0000000080)=0xb0, 0x4, 0x0) r3 = signalfd4(0xffffffffffffffff, &(0x7f00000000c0), 0x8, 0x0) ioctl$F2FS_IOC_RELEASE_COMPRESS_BLOCKS(r3, 0x8008f512, &(0x7f0000000100)) [ 681.679769] EXT4-fs (loop3): mounted filesystem without journal. Opts: ,errors=continue [ 681.683800] EXT4-fs error (device loop3): ext4_mb_generate_buddy:802: group 0, block bitmap and bg descriptor inconsistent: 1236 vs 212 free clusters 00:06:51 executing program 0: syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000d1f4655fd1f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b00000000020000280200000284", 0x62, 0x400}, {&(0x7f0000010400)="030000000400000005000000d4", 0xd, 0x800}, {&(0x7f0000010500)="ffffffffff070000000000000000000000000000000000000000000000000080ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff", 0x300, 0xc00}, {&(0x7f0000000000)="ed41000000040000d0f4655fd1f4655fd1f4655f13ca7302f6e9dab934", 0x1d, 0x1600}], 0x0, &(0x7f0000000280)=ANY=[]) setxattr$trusted_overlay_upper(&(0x7f0000000540)='./file0\x00', &(0x7f0000000580), &(0x7f00000005c0)={0x0, 0xfb, 0x139, 0x0, 0x0, "eacbf6ff0bc36f5a7bb9fe2ee7bb1e01", "a49dbbc75b5fc0caa97cab3ee231b0d7cf3b9be24c0fb2c145c6f2190b4a29cc525f550d79c74a03eda157db2eae62fde8958cce2a8a4c9d0374e4d6ae09ef4ee733ce4046bee0170cff57584e0671d4f286b9691d37721b43778a4afb3c3d05fd5446d2e0bac5326f43d23126410dfb85efa26b9e1ae8d056c3ebcde0c95e1443304d7a93eb4077f76047b6e13f0e79a9631ac2bd43143854803c698a7f02933d9cbdca121cc857aacabf858f3f904c9dfedb6c03186d99490f35f09de8ab897ea7c58f07dca416e1db55c7a849a91b98d0e0c0c7bf058d86a2e997a0557800a34bb7f5806f2e15e99981cc3fe615a3ff396f7d8da30ea24626263abf0ad50a0ce2dafc55f2b0286b2204114a6754b336a913a75e66ed6a3efd132f668369692f46039d"}, 0x139, 0x0) 00:06:51 executing program 6: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$bind(&(0x7f00000000c0)='./file1\x00', &(0x7f0000000140)='./file1\x00', &(0x7f0000000180), 0x20000, 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000040)='proc\x00', 0x0, 0x0) pivot_root(&(0x7f0000000000)='./file0\x00', &(0x7f0000000240)='.\x00') readlink(&(0x7f00000001c0)='./file1\x00', &(0x7f0000000280)=""/102, 0x66) 00:06:51 executing program 3: syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000d1f4655fd1f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b00000000020000280200000284", 0x62, 0x400}, {&(0x7f0000010400)="030000000400000005000000d4", 0xd, 0x800}, {&(0x7f0000010500)="ffffffffff070000000000000000000000000000000000000000000000000080ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff", 0x3c0, 0xc00}, {&(0x7f0000000000)="ed41000000040000d0f4655fd1f4655fd1f4655f13ca7302f6e9dab934", 0x1d, 0x1600}], 0x0, &(0x7f0000000280)=ANY=[]) setxattr$trusted_overlay_upper(&(0x7f0000000540)='./file0\x00', &(0x7f0000000580), &(0x7f00000005c0)={0x0, 0xfb, 0x139, 0x0, 0x0, "eacbf6ff0bc36f5a7bb9fe2ee7bb1e01", "a49dbbc75b5fc0caa97cab3ee231b0d7cf3b9be24c0fb2c145c6f2190b4a29cc525f550d79c74a03eda157db2eae62fde8958cce2a8a4c9d0374e4d6ae09ef4ee733ce4046bee0170cff57584e0671d4f286b9691d37721b43778a4afb3c3d05fd5446d2e0bac5326f43d23126410dfb85efa26b9e1ae8d056c3ebcde0c95e1443304d7a93eb4077f76047b6e13f0e79a9631ac2bd43143854803c698a7f02933d9cbdca121cc857aacabf858f3f904c9dfedb6c03186d99490f35f09de8ab897ea7c58f07dca416e1db55c7a849a91b98d0e0c0c7bf058d86a2e997a0557800a34bb7f5806f2e15e99981cc3fe615a3ff396f7d8da30ea24626263abf0ad50a0ce2dafc55f2b0286b2204114a6754b336a913a75e66ed6a3efd132f668369692f46039d"}, 0x139, 0x0) getxattr(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)=@random={'security.', ':\x00'}, &(0x7f0000000140)=""/55, 0x37) [ 681.834377] EXT4-fs (loop0): mounted filesystem without journal. Opts: ,errors=continue [ 681.840315] EXT4-fs error (device loop0): ext4_mb_generate_buddy:802: group 0, block bitmap and bg descriptor inconsistent: 2260 vs 212 free clusters [ 681.904217] EXT4-fs (loop3): mounted filesystem without journal. Opts: ,errors=continue [ 681.921586] EXT4-fs error (device loop3): ext4_mb_generate_buddy:802: group 0, block bitmap and bg descriptor inconsistent: 724 vs 212 free clusters 00:07:03 executing program 5: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x7fffffff}]}) signalfd4(0xffffffffffffffff, &(0x7f00000000c0), 0x8, 0x0) 00:07:03 executing program 2: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f00000000c0)='cpuset\x00', 0x8001, 0x0) openat(0xffffffffffffffff, &(0x7f0000000180)='.\x00', 0x80, 0x0) rmdir(&(0x7f00000001c0)='./file0/file0\x00') stat(&(0x7f0000000080)='./file0/file0/file0\x00', &(0x7f0000000200)) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x7fffffff}]}) signalfd4(0xffffffffffffffff, &(0x7f00000000c0), 0x8, 0x0) 00:07:03 executing program 1: ioctl$TUNSETQUEUE(0xffffffffffffffff, 0x400454d9, &(0x7f0000000b80)={'bond0\x00'}) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, 0x0) r0 = signalfd4(0xffffffffffffffff, &(0x7f00000000c0), 0x8, 0x0) prctl$PR_SET_MM_MAP(0x23, 0xe, &(0x7f0000000180)={&(0x7f0000ffd000/0x1000)=nil, &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000fff000/0x1000)=nil, &(0x7f0000ffd000/0x1000)=nil, &(0x7f0000ffc000/0x2000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000ffe000/0x2000)=nil, &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000ffd000/0x2000)=nil, &(0x7f0000ffd000/0x2000)=nil, &(0x7f0000000140)="080afc03b8bae061a487765e741c1a3a5a7dea95a0b02b4dbb6944356a", 0x1d}, 0x68) r1 = creat(&(0x7f0000000080)='./file1\x00', 0x0) pwrite64(r1, &(0x7f0000000000)="a7", 0xfffffd6b, 0x0) accept$packet(r0, &(0x7f0000000080)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000100)=0x14) 00:07:03 executing program 0: syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000d1f4655fd1f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b00000000020000280200000284", 0x62, 0x400}, {&(0x7f0000010400)="030000000400000005000000d4", 0xd, 0x800}, {&(0x7f0000010500)="ffffffffff070000000000000000000000000000000000000000000000000080ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff", 0x300, 0xc00}, {&(0x7f0000000000)="ed41000000040000d0f4655fd1f4655fd1f4655f13ca7302f6e9dab934", 0x1d, 0x1600}], 0x0, &(0x7f0000000280)=ANY=[]) setxattr$trusted_overlay_upper(&(0x7f0000000540)='./file0\x00', &(0x7f0000000580), &(0x7f00000005c0)={0x0, 0xfb, 0x139, 0x0, 0x0, "eacbf6ff0bc36f5a7bb9fe2ee7bb1e01", "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"}, 0x139, 0x0) 00:07:03 executing program 4: r0 = seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x7fffffff}]}) fchdir(r0) mprotect(&(0x7f0000ffe000/0x1000)=nil, 0x1000, 0x0) r1 = mmap$IORING_OFF_CQ_RING(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x0, 0x30, 0xffffffffffffffff, 0x8000000) r2 = openat$vcsu(0xffffffffffffff9c, &(0x7f0000000080), 0x101000, 0x0) r3 = creat(&(0x7f0000000140)='./file0\x00', 0x58) openat2$dir(0xffffffffffffff9c, &(0x7f0000000680)='./file0\x00', &(0x7f00000006c0)={0x410000, 0x1, 0x9}, 0x18) syz_io_uring_submit(r1, 0x0, &(0x7f0000000100)=@IORING_OP_EPOLL_CTL=@add={0x1d, 0x4, 0x0, r2, &(0x7f00000000c0)={0x4}, r0}, 0x7fff) stat(&(0x7f0000001cc0)='.\x00', &(0x7f0000001c00)={0x0, 0x0, 0x0, 0x0, 0x0}) setresuid(0x0, r4, 0x0) r5 = mmap$IORING_OFF_CQ_RING(&(0x7f0000ffe000/0x2000)=nil, 0x2000, 0x8, 0x20010, 0xffffffffffffffff, 0x8000000) r6 = mmap$IORING_OFF_SQES(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x3000009, 0x110, r3, 0x10000000) syz_io_uring_submit(r5, r6, &(0x7f0000000640)=@IORING_OP_RECVMSG={0xa, 0x5, 0x0, r3, 0x0, &(0x7f0000000600)={&(0x7f00000003c0)=@isdn, 0x80, &(0x7f0000000540)=[{&(0x7f0000000440)=""/90, 0x5a}, {&(0x7f00000004c0)=""/112, 0x70}], 0x2, &(0x7f0000000580)=""/93, 0x5d}, 0x0, 0x40002101, 0x0, {0x1}}, 0x3) syz_mount_image$tmpfs(&(0x7f0000000180), &(0x7f00000001c0)='./file0\x00', 0x9, 0x2, &(0x7f00000002c0)=[{&(0x7f0000000200)="8f0187d086fab56e787406c28b67437c3670522c7fe13483f24f15a0596616c533fa95b68ba8e6405de167097c9d", 0x2e, 0x7}, {&(0x7f0000000240)="33bcd6dde9a9b88f905a9447afcc83c6df10a85e0c410f90913757757fbe875d27f72f14bb5fd48abafc0802ed6aaba5d5cb88aefcf36495cff58e0faa9b57ac826532e18f1df8ff8e56cb919450a8163e", 0x51, 0x4}], 0x8000, &(0x7f0000000700)=ANY=[@ANYBLOB='huge=never,mode=00000000000000000000056,huge=within_size,uid=', @ANYRESDEC=r4, @ANYBLOB=',audit,mask=^MAY_APPEND,euid<', @ANYRESDEC=0x0, @ANYBLOB="2c646f6e745f68a1d16f11c999f01a50359ef7530a0c6173681800"]) 00:07:03 executing program 6: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000040)='proc\x00', 0x0, 0x0) pivot_root(&(0x7f0000000000)='./file0\x00', &(0x7f0000000240)='.\x00') mount$bind(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f0000000180), 0x488, 0x0) 00:07:03 executing program 3: syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000d1f4655fd1f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b00000000020000280200000284", 0x62, 0x400}, {&(0x7f0000010400)="030000000400000005000000d4", 0xd, 0x800}, {&(0x7f0000010500)="ffffffffff070000000000000000000000000000000000000000000000000080ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff", 0x3c0, 0xc00}, {&(0x7f0000000000)="ed41000000040000d0f4655fd1f4655fd1f4655f13ca7302f6e9dab934", 0x1d, 0x1600}], 0x0, &(0x7f0000000280)=ANY=[]) setxattr$trusted_overlay_upper(&(0x7f0000000540)='./file0\x00', &(0x7f0000000580), &(0x7f00000005c0)={0x0, 0xfb, 0x139, 0x0, 0x0, "eacbf6ff0bc36f5a7bb9fe2ee7bb1e01", "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"}, 0x139, 0x0) getxattr(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)=@random={'security.', ':\x00'}, &(0x7f0000000140)=""/55, 0x37) 00:07:03 executing program 7: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x6}]}) openat(0xffffffffffffff9c, 0x0, 0x1c2, 0x27) r0 = creat(&(0x7f0000000080)='./file1\x00', 0x0) ioctl$BTRFS_IOC_SCRUB(r0, 0xc400941b, &(0x7f0000000600)={0x0, 0x62, 0x80000001}) pwrite64(r0, &(0x7f0000000000)="a7", 0xfffffd6b, 0x0) accept$packet(0xffffffffffffffff, &(0x7f0000000080)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000100)=0x14) [ 693.696413] audit: type=1326 audit(1626998823.706:39): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=6749 comm="syz-executor.7" exe="/syz-executor.7" sig=31 arch=c000003e syscall=202 compat=0 ip=0x466609 code=0x0 [ 693.704086] EXT4-fs (loop0): mounted filesystem without journal. Opts: ,errors=continue [ 693.708771] EXT4-fs error (device loop0): ext4_mb_generate_buddy:802: group 0, block bitmap and bg descriptor inconsistent: 2260 vs 212 free clusters 00:07:03 executing program 5: ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f0000000100)={'vxcan0\x00'}) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x7fffffff}]}) signalfd4(0xffffffffffffffff, &(0x7f00000000c0), 0x8, 0x0) r0 = openat(0xffffffffffffff9c, 0x0, 0x1c2, 0x27) r1 = open(&(0x7f0000000040)='./file0\x00', 0x1810c1, 0x0) ioctl$BTRFS_IOC_SCRUB_PROGRESS(r0, 0xc400941d, &(0x7f0000000200)={0x0, 0x4, 0xd3, 0x1}) pwrite64(r1, &(0x7f0000000a40)="0f64800203d6484c7ddffad1", 0xc, 0x0) lseek(r1, 0x2, 0x3) fcntl$getflags(r1, 0x401) dup2(r0, r1) ioctl$FS_IOC_SETFLAGS(r1, 0x40086602, &(0x7f0000000080)=0x80) [ 693.749733] new mount options do not match the existing superblock, will be ignored [ 693.759325] EXT4-fs (loop3): mounted filesystem without journal. Opts: ,errors=continue [ 693.772162] new mount options do not match the existing superblock, will be ignored [ 693.779685] EXT4-fs error (device loop3): ext4_mb_generate_buddy:802: group 0, block bitmap and bg descriptor inconsistent: 724 vs 212 free clusters 00:07:03 executing program 6: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000040)='proc\x00', 0x0, 0x0) pivot_root(&(0x7f0000000000)='./file0\x00', &(0x7f0000000240)='.\x00') umount2(&(0x7f00000000c0)='./file0\x00', 0x5) 00:07:03 executing program 4: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x4, &(0x7f0000000040)=[{0x4, 0x6, 0xff, 0x8}, {0x101, 0x20, 0xff, 0x4}, {0x401, 0x0, 0x20, 0x3}, {0x2, 0x2, 0x7f, 0x5}]}) mprotect(&(0x7f0000ffe000/0x1000)=nil, 0x1000, 0x0) 00:07:03 executing program 0: syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000d1f4655fd1f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b00000000020000280200000284", 0x62, 0x400}, {&(0x7f0000010400)="030000000400000005000000d4", 0xd, 0x800}, {&(0x7f0000010500)="ffffffffff070000000000000000000000000000000000000000000000000080ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff", 0x380, 0xc00}, {&(0x7f0000000000)="ed41000000040000d0f4655fd1f4655fd1f4655f13ca7302f6e9dab934", 0x1d, 0x1600}], 0x0, &(0x7f0000000280)=ANY=[]) setxattr$trusted_overlay_upper(&(0x7f0000000540)='./file0\x00', &(0x7f0000000580), &(0x7f00000005c0)={0x0, 0xfb, 0x139, 0x0, 0x0, "eacbf6ff0bc36f5a7bb9fe2ee7bb1e01", "a49dbbc75b5fc0caa97cab3ee231b0d7cf3b9be24c0fb2c145c6f2190b4a29cc525f550d79c74a03eda157db2eae62fde8958cce2a8a4c9d0374e4d6ae09ef4ee733ce4046bee0170cff57584e0671d4f286b9691d37721b43778a4afb3c3d05fd5446d2e0bac5326f43d23126410dfb85efa26b9e1ae8d056c3ebcde0c95e1443304d7a93eb4077f76047b6e13f0e79a9631ac2bd43143854803c698a7f02933d9cbdca121cc857aacabf858f3f904c9dfedb6c03186d99490f35f09de8ab897ea7c58f07dca416e1db55c7a849a91b98d0e0c0c7bf058d86a2e997a0557800a34bb7f5806f2e15e99981cc3fe615a3ff396f7d8da30ea24626263abf0ad50a0ce2dafc55f2b0286b2204114a6754b336a913a75e66ed6a3efd132f668369692f46039d"}, 0x139, 0x0) 00:07:03 executing program 3: syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000d1f4655fd1f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b00000000020000280200000284", 0x62, 0x400}, {&(0x7f0000010400)="030000000400000005000000d4", 0xd, 0x800}, {&(0x7f0000010500)="ffffffffff070000000000000000000000000000000000000000000000000080ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff", 0x3c0, 0xc00}, {&(0x7f0000000000)="ed41000000040000d0f4655fd1f4655fd1f4655f13ca7302f6e9dab934", 0x1d, 0x1600}], 0x0, &(0x7f0000000280)=ANY=[]) setxattr$trusted_overlay_upper(&(0x7f0000000540)='./file0\x00', &(0x7f0000000580), &(0x7f00000005c0)={0x0, 0xfb, 0x139, 0x0, 0x0, "eacbf6ff0bc36f5a7bb9fe2ee7bb1e01", "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"}, 0x139, 0x0) getxattr(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)=@random={'security.', ':\x00'}, &(0x7f0000000140)=""/55, 0x37) 00:07:03 executing program 2: prctl$PR_SET_THP_DISABLE(0x29, 0x0) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x7fffffff}]}) signalfd4(0xffffffffffffffff, &(0x7f00000000c0)={[0x40000000]}, 0x6, 0x800) 00:07:03 executing program 4: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x4, &(0x7f0000000080)=[{0x6, 0x0, 0x4, 0x7fffffff}, {0x46f, 0x9}, {0x3, 0x1, 0x1a, 0xfffffff7}, {0xfff, 0x3f, 0x4a, 0x5}]}) mprotect(&(0x7f0000ffe000/0x1000)=nil, 0x1000, 0x0) 00:07:04 executing program 6: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f00000000c0)='msdos\x00', 0x0, 0x0) pivot_root(&(0x7f0000000000)='./file0\x00', &(0x7f0000000240)='.\x00') 00:07:04 executing program 5: r0 = openat(0xffffffffffffff9c, 0x0, 0x1c2, 0x27) r1 = io_uring_register$IORING_REGISTER_PERSONALITY(0xffffffffffffffff, 0x9, 0x0, 0x0) syz_io_uring_submit(0x0, 0x0, &(0x7f0000000180)=@IORING_OP_TIMEOUT={0xb, 0x3, 0x0, 0x0, 0x6, &(0x7f0000000140), 0x1, 0x1, 0xf85e372e20d3c758, {0x0, r1}}, 0x6) ioctl$FITRIM(r0, 0xc0185879, &(0x7f0000000a40)={0x7fff, 0x7, 0x7ff}) r2 = creat(&(0x7f0000000080)='./file1\x00', 0x0) ioctl$BTRFS_IOC_SCRUB_PROGRESS(r0, 0xc400941d, &(0x7f0000000200)={0x0, 0x4, 0xd3, 0x1}) ioctl$BTRFS_IOC_SCRUB(r2, 0xc400941b, &(0x7f0000000600)={r3, 0x62, 0x80000001}) pwrite64(r2, &(0x7f0000000000)="a7", 0xfffffd6b, 0x0) r4 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000001c0), 0x0, 0x0) prctl$PR_SET_MM_MAP(0x23, 0xe, &(0x7f0000000180)={&(0x7f0000ffd000/0x1000)=nil, &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000fff000/0x1000)=nil, &(0x7f0000ffd000/0x1000)=nil, &(0x7f0000ffc000/0x2000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000ffe000/0x2000)=nil, &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000ffd000/0x2000)=nil, &(0x7f0000ffd000/0x2000)=nil, &(0x7f0000000140)="080afc03b8bae061a487765e741c1a3a5a7dea95a0b02b4dbb6944356a", 0x1d, r4}, 0x68) preadv2(r4, &(0x7f00000001c0)=[{&(0x7f0000000ac0)=""/198, 0xc6}, {&(0x7f0000000bc0)=""/156, 0x8d}, {&(0x7f0000000c80)=""/4096, 0x1000}, {&(0x7f0000001c80)=""/238, 0xee}], 0x4, 0x0, 0x4, 0x1c) ioctl$PIO_UNIMAPCLR(r2, 0x4b68, &(0x7f0000000a80)={0x80, 0x4, 0x6}) ioctl$TIOCL_SETVESABLANK(r2, 0x541c, &(0x7f0000000040)) getsockopt$IP_VS_SO_GET_INFO(r2, 0x0, 0x481, &(0x7f0000000080), &(0x7f0000000100)=0xc) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000a00)=[{0x6, 0x0, 0x4, 0x7fffffff}]}) signalfd4(0xffffffffffffffff, &(0x7f00000000c0), 0x8, 0x0) [ 694.029910] EXT4-fs (loop3): mounted filesystem without journal. Opts: ,errors=continue [ 694.036124] EXT4-fs (loop0): mounted filesystem without journal. Opts: ,errors=continue [ 694.041868] EXT4-fs error (device loop3): ext4_mb_generate_buddy:802: group 0, block bitmap and bg descriptor inconsistent: 724 vs 212 free clusters [ 694.053923] EXT4-fs error (device loop0): ext4_mb_generate_buddy:802: group 0, block bitmap and bg descriptor inconsistent: 1236 vs 212 free clusters 00:07:04 executing program 4: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x2, 0x7, 0x0, 0x7fffffff}]}) mprotect(&(0x7f0000ffe000/0x1000)=nil, 0x1000, 0x0) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0xa, &(0x7f00000000c0)={0x4, &(0x7f0000000080)=[{0x8001, 0xf9, 0x1, 0x7}, {0x0, 0x0, 0x0, 0x2}, {0x2, 0x3, 0x8, 0x2}, {0xad, 0x1, 0xff, 0x670}]}) 00:07:15 executing program 0: syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000d1f4655fd1f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b00000000020000280200000284", 0x62, 0x400}, {&(0x7f0000010400)="030000000400000005000000d4", 0xd, 0x800}, {&(0x7f0000010500)="ffffffffff070000000000000000000000000000000000000000000000000080ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff", 0x380, 0xc00}, {&(0x7f0000000000)="ed41000000040000d0f4655fd1f4655fd1f4655f13ca7302f6e9dab934", 0x1d, 0x1600}], 0x0, &(0x7f0000000280)=ANY=[]) setxattr$trusted_overlay_upper(&(0x7f0000000540)='./file0\x00', &(0x7f0000000580), &(0x7f00000005c0)={0x0, 0xfb, 0x139, 0x0, 0x0, "eacbf6ff0bc36f5a7bb9fe2ee7bb1e01", "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"}, 0x139, 0x0) 00:07:15 executing program 2: pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SNAPSHOT_ALLOC_SWAP_PAGE(r0, 0x80083314, &(0x7f0000000140)) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x7fffffff}]}) r1 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000080), 0x101040, 0x0) ioctl$F2FS_IOC_START_ATOMIC_WRITE(r1, 0xf501, 0x0) signalfd4(0xffffffffffffffff, &(0x7f00000000c0), 0x8, 0x0) 00:07:15 executing program 5: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x7fffffff}]}) signalfd4(0xffffffffffffffff, &(0x7f00000000c0), 0x8, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0xc0c00, 0x81) 00:07:15 executing program 7: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x6}]}) openat(0xffffffffffffff9c, 0x0, 0x1c2, 0x27) r0 = creat(&(0x7f0000000080)='./file1\x00', 0x0) ioctl$BTRFS_IOC_SCRUB(r0, 0xc400941b, &(0x7f0000000600)={0x0, 0x62, 0x80000001}) pwrite64(r0, &(0x7f0000000000)="a7", 0xfffffd6b, 0x0) accept$packet(0xffffffffffffffff, &(0x7f0000000080)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000100)=0x14) 00:07:15 executing program 4: r0 = seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x0, &(0x7f0000000040)}) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f0000000080)={0x0}) ioctl$SECCOMP_IOCTL_NOTIF_ADDFD(r0, 0x40182103, &(0x7f0000000100)={r1, 0x1, r0, 0x8}) mknodat$loop(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0x4, 0x0) mprotect(&(0x7f0000ffe000/0x1000)=nil, 0x1000, 0x0) get_mempolicy(&(0x7f0000000140), &(0x7f0000000180), 0x8, &(0x7f0000ffe000/0x1000)=nil, 0x3) madvise(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0xf) r2 = openat(0xffffffffffffff9c, 0x0, 0x1c2, 0x27) r3 = open(&(0x7f0000000040)='./file0\x00', 0x1810c1, 0x0) ioctl$BTRFS_IOC_SCRUB_PROGRESS(r2, 0xc400941d, &(0x7f0000000200)={0x0, 0x4, 0xd3, 0x1}) pwrite64(r3, &(0x7f0000000a40)="0f64800203d6484c7ddffad1", 0xc, 0x0) r4 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000001c0), 0x0, 0x0) prctl$PR_SET_MM_MAP(0x23, 0xe, &(0x7f0000000180)={&(0x7f0000ffd000/0x1000)=nil, &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000fff000/0x1000)=nil, &(0x7f0000ffd000/0x1000)=nil, &(0x7f0000ffc000/0x2000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000ffe000/0x2000)=nil, &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000ffd000/0x2000)=nil, &(0x7f0000ffd000/0x2000)=nil, &(0x7f0000000140)="080afc03b8bae061a487765e741c1a3a5a7dea95a0b02b4dbb6944356a", 0x1d, r4}, 0x68) lseek(r4, 0xfffffffffffffffc, 0x4) ioctl$TUNGETDEVNETNS(r3, 0x54e3, 0x0) openat$cgroup_freezer_state(r3, &(0x7f0000000600), 0x2, 0x0) fcntl$getflags(r3, 0xb) remap_file_pages(&(0x7f0000fff000/0x1000)=nil, 0x1000, 0x1000004, 0x5, 0x10) dup2(r2, r3) ppoll(&(0x7f00000001c0)=[{r0, 0x40}, {r2, 0x400}], 0x2, &(0x7f0000000200)={0x0, 0x3938700}, &(0x7f0000000240)={[0x4]}, 0x8) 00:07:15 executing program 6: mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000040)='f2fs\x00', 0x0, 0x0) pivot_root(&(0x7f0000000000)='./file0\x00', &(0x7f0000000240)='.\x00') umount2(&(0x7f0000000480)='./file0\x00', 0x5) r0 = shmget$private(0x0, 0x4000, 0x2, &(0x7f0000ffa000/0x4000)=nil) shmat(r0, &(0x7f0000ffd000/0x1000)=nil, 0x0) getresgid(&(0x7f0000001280)=0x0, &(0x7f00000012c0), &(0x7f0000001300)) r2 = shmget$private(0x0, 0x3000, 0x0, &(0x7f0000ffa000/0x3000)=nil) r3 = shmat(r2, &(0x7f0000ff9000/0x4000)=nil, 0x4000) shmdt(r3) shmdt(r3) r4 = fork() shmctl$IPC_SET(r0, 0x1, &(0x7f0000001340)={{0x1, 0xee01, r1, 0xee00, 0xee00, 0xc9, 0x800}, 0x8001, 0x1, 0x8, 0x5, 0xffffffffffffffff, r4, 0x7}) r5 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000001c0), 0x0, 0x0) prctl$PR_SET_MM_MAP(0x23, 0xe, &(0x7f0000000180)={&(0x7f0000ffd000/0x1000)=nil, &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000fff000/0x1000)=nil, &(0x7f0000ffd000/0x1000)=nil, &(0x7f0000ffc000/0x2000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000ffe000/0x2000)=nil, &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000ffd000/0x2000)=nil, &(0x7f0000ffd000/0x2000)=nil, &(0x7f0000000140)="080afc03b8bae061a487765e741c1a3a5a7dea95a0b02b4dbb6944356a", 0x1d, r5}, 0x68) syz_mount_image$tmpfs(&(0x7f00000000c0), &(0x7f0000000100)='./file0\x00', 0x81, 0x2, &(0x7f0000000200)=[{&(0x7f0000000140)="d92310306b45c4ee92e7f6c93ebc21c3c04f0070f75f9d69bc49391f7cb37b0d55396a838a62c5a55f4d184a878667f82d524fe2a1f38c9da351e00849d73fa21b149a8af6048adbd06a2bf79e3de5e3d0373ca7587c93a4975c5e63d0a1c0ee046ae5e4c7a1adf76004c2bda1947ce8ed134432def6c5c14ee9e224b714a645eb47123593d5602196f2e01a59410cdc04def59a92e4", 0x96, 0x7ff}, {&(0x7f0000000280)="b76192095d2683f14b5c5bd83ccd2b12a0c2361386082a693429a7344e4baeae8be5722d050a533d30a2c5b2bdca2265841cf9067a61b220bac159624485eb65a91bfe449a049ae779abfe3671a772ca15971dabc28453eb33d0597096f2307b3b730c0a05a052f8693372fc82acc37e51fcdd8fdc81ef65ab5b0f64cc73f7f21a92ffd519931fca7692e5d79c28f1ef8e125a637c8878533a51b43e308f8f9723ad7ea49e959e0cd8d4489e0cf90c965f07a16602f4924884a909e8e0fbd3258e47f9ce9f", 0xc5, 0x8}], 0x800000, &(0x7f0000000380)=ANY=[@ANYBLOB="687567653d616c772700732c87697a653d25302f7910000000000000010000000000000000008bba96226c2063543a00", @ANYRESHEX=r1, @ANYRESHEX=r5, @ANYRESDEC=0xee01, @ANYBLOB=',context=unconfined_u,euid=', @ANYRESDEC, @ANYBLOB=',euid=', @ANYRESDEC, @ANYBLOB="2c617070726169249a87fdeb5d156abc8373612c00"]) 00:07:15 executing program 1: ioctl$TUNSETQUEUE(0xffffffffffffffff, 0x400454d9, &(0x7f0000000b80)={'bond0\x00'}) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, 0x0) r0 = signalfd4(0xffffffffffffffff, &(0x7f00000000c0), 0x8, 0x0) prctl$PR_SET_MM_MAP(0x23, 0xe, &(0x7f0000000180)={&(0x7f0000ffd000/0x1000)=nil, &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000fff000/0x1000)=nil, &(0x7f0000ffd000/0x1000)=nil, &(0x7f0000ffc000/0x2000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000ffe000/0x2000)=nil, &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000ffd000/0x2000)=nil, &(0x7f0000ffd000/0x2000)=nil, &(0x7f0000000140)="080afc03b8bae061a487765e741c1a3a5a7dea95a0b02b4dbb6944356a", 0x1d}, 0x68) r1 = creat(&(0x7f0000000080)='./file1\x00', 0x0) pwrite64(r1, &(0x7f0000000000)="a7", 0xfffffd6b, 0x0) accept$packet(r0, &(0x7f0000000080)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000100)=0x14) 00:07:15 executing program 3: syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000d1f4655fd1f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b00000000020000280200000284", 0x62, 0x400}, {&(0x7f0000010400)="030000000400000005000000d4", 0xd, 0x800}, {&(0x7f0000010500)="ffffffffff070000000000000000000000000000000000000000000000000080ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff", 0x3e0, 0xc00}, {&(0x7f0000000000)="ed41000000040000d0f4655fd1f4655fd1f4655f13ca7302f6e9dab934", 0x1d, 0x1600}], 0x0, &(0x7f0000000280)=ANY=[]) setxattr$trusted_overlay_upper(&(0x7f0000000540)='./file0\x00', &(0x7f0000000580), &(0x7f00000005c0)={0x0, 0xfb, 0x139, 0x0, 0x0, "eacbf6ff0bc36f5a7bb9fe2ee7bb1e01", "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"}, 0x139, 0x0) getxattr(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)=@random={'security.', ':\x00'}, &(0x7f0000000140)=""/55, 0x37) [ 705.691575] EXT4-fs (loop3): mounted filesystem without journal. Opts: ,errors=continue [ 705.695575] EXT4-fs error (device loop3): ext4_mb_generate_buddy:802: group 0, block bitmap and bg descriptor inconsistent: 468 vs 212 free clusters [ 705.706658] EXT4-fs (loop0): mounted filesystem without journal. Opts: ,errors=continue [ 705.710529] EXT4-fs error (device loop0): ext4_mb_generate_buddy:802: group 0, block bitmap and bg descriptor inconsistent: 1236 vs 212 free clusters [ 705.712559] audit: type=1326 audit(1626998835.721:40): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=6811 comm="syz-executor.7" exe="/syz-executor.7" sig=31 arch=c000003e syscall=202 compat=0 ip=0x466609 code=0x0 00:07:15 executing program 0: syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000d1f4655fd1f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b00000000020000280200000284", 0x62, 0x400}, {&(0x7f0000010400)="030000000400000005000000d4", 0xd, 0x800}, {&(0x7f0000010500)="ffffffffff070000000000000000000000000000000000000000000000000080ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff", 0x380, 0xc00}, {&(0x7f0000000000)="ed41000000040000d0f4655fd1f4655fd1f4655f13ca7302f6e9dab934", 0x1d, 0x1600}], 0x0, &(0x7f0000000280)=ANY=[]) setxattr$trusted_overlay_upper(&(0x7f0000000540)='./file0\x00', &(0x7f0000000580), &(0x7f00000005c0)={0x0, 0xfb, 0x139, 0x0, 0x0, "eacbf6ff0bc36f5a7bb9fe2ee7bb1e01", "a49dbbc75b5fc0caa97cab3ee231b0d7cf3b9be24c0fb2c145c6f2190b4a29cc525f550d79c74a03eda157db2eae62fde8958cce2a8a4c9d0374e4d6ae09ef4ee733ce4046bee0170cff57584e0671d4f286b9691d37721b43778a4afb3c3d05fd5446d2e0bac5326f43d23126410dfb85efa26b9e1ae8d056c3ebcde0c95e1443304d7a93eb4077f76047b6e13f0e79a9631ac2bd43143854803c698a7f02933d9cbdca121cc857aacabf858f3f904c9dfedb6c03186d99490f35f09de8ab897ea7c58f07dca416e1db55c7a849a91b98d0e0c0c7bf058d86a2e997a0557800a34bb7f5806f2e15e99981cc3fe615a3ff396f7d8da30ea24626263abf0ad50a0ce2dafc55f2b0286b2204114a6754b336a913a75e66ed6a3efd132f668369692f46039d"}, 0x139, 0x0) 00:07:15 executing program 2: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0xa, &(0x7f0000000000)={0x4, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x7fffffff}, {0x6, 0x81, 0x8, 0x4}, {0x4, 0xcf, 0x9, 0x100}, {0x4, 0x81, 0x94, 0x6}]}) r0 = openat(0xffffffffffffff9c, 0x0, 0x1c2, 0x27) r1 = open(&(0x7f0000000740)='./file0\x00', 0x480283, 0x4ec90d29655e20f8) ioctl$BTRFS_IOC_SCRUB_PROGRESS(r0, 0xc400941d, &(0x7f0000000200)={0x0, 0x4, 0xd3, 0x1}) pwrite64(r1, &(0x7f0000000a40)="0f64800203d6484c7ddffad1", 0xc, 0x0) r2 = openat$ptmx(0xffffffffffffff9c, 0x0, 0x8100, 0x0) ioctl$TIOCSIG(r2, 0x40045436, 0x0) ioctl$BTRFS_IOC_SCRUB_PROGRESS(0xffffffffffffffff, 0xc400941d, &(0x7f0000000200)={0x0, 0x4, 0xd3, 0x1}) pwrite64(0xffffffffffffffff, &(0x7f0000000000)="bc", 0x1, 0x39da) ioctl$PIO_UNIMAPCLR(0xffffffffffffffff, 0x4b68, &(0x7f0000000a80)={0x80, 0x4, 0x6}) ioctl$PIO_UNIMAPCLR(0xffffffffffffffff, 0x4b68, &(0x7f00000006c0)={0x7, 0x7fff, 0x4}) pwrite64(r2, &(0x7f0000000600)="4079f041269b06868c8e80fab6f78c8a48e534f2540ec6f66854220211ac7ab5b5e383f9f4257c5449d9cd9c47ead97328d72b0560bc8cb135bebbec3fe718c1ab744c7a6e811385a98335389e64628baf4cce31505496c31b6e61eef4a77f370655ea0ca04a6fd5c1e61e515c8270ea06737436b4d3a7fe7bc44a6dac4983e2b21d57280be6d98fea4866e1175655ad17899f7b125cb540cbf6c7", 0x9b, 0x4000000000000000) lseek(r1, 0x2, 0x3) fcntl$getflags(r1, 0x401) r3 = dup2(r0, r1) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f0000000100)) creat(&(0x7f0000000700)='./file0\x00', 0x104) io_uring_enter(r3, 0x6970, 0x3857, 0x1, &(0x7f00000001c0)={[0xfffffffffffffffa]}, 0x8) creat(&(0x7f0000000180)='./file1\x00', 0x14) signalfd4(0xffffffffffffffff, &(0x7f00000000c0), 0x8, 0x0) 00:07:15 executing program 3: syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000d1f4655fd1f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b00000000020000280200000284", 0x62, 0x400}, {&(0x7f0000010400)="030000000400000005000000d4", 0xd, 0x800}, {&(0x7f0000010500)="ffffffffff070000000000000000000000000000000000000000000000000080ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff", 0x3e0, 0xc00}, {&(0x7f0000000000)="ed41000000040000d0f4655fd1f4655fd1f4655f13ca7302f6e9dab934", 0x1d, 0x1600}], 0x0, &(0x7f0000000280)=ANY=[]) setxattr$trusted_overlay_upper(&(0x7f0000000540)='./file0\x00', &(0x7f0000000580), &(0x7f00000005c0)={0x0, 0xfb, 0x139, 0x0, 0x0, "eacbf6ff0bc36f5a7bb9fe2ee7bb1e01", "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"}, 0x139, 0x0) getxattr(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)=@random={'security.', ':\x00'}, &(0x7f0000000140)=""/55, 0x37) 00:07:15 executing program 5: r0 = seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x7fffffff}]}) signalfd4(r0, &(0x7f00000000c0), 0x8, 0x0) r1 = syz_open_dev$sg(&(0x7f0000000080), 0x2c, 0x400) signalfd4(r1, &(0x7f0000000100)={[0x2]}, 0x8, 0x80800) 00:07:15 executing program 2: setsockopt$inet_tcp_TCP_CONGESTION(0xffffffffffffffff, 0x6, 0xd, &(0x7f0000000080)='cubic\x00', 0x6) r0 = seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0xa, &(0x7f0000000040)=[{0x3f, 0x0, 0x0, 0x7fffffff}]}) setsockopt$inet_tcp_TCP_FASTOPEN_KEY(0xffffffffffffffff, 0x6, 0x21, &(0x7f0000000100)="c89b0578fe9d737afeaa5a0054b2c3ea", 0x10) r1 = openat(0xffffffffffffff9c, 0x0, 0x1c2, 0x27) r2 = open(&(0x7f0000000040)='./file0\x00', 0x1810c1, 0x0) ioctl$BTRFS_IOC_SCRUB_PROGRESS(r1, 0xc400941d, &(0x7f0000000200)={0x0, 0x4, 0xd3, 0x1}) ioctl$sock_inet_tcp_SIOCATMARK(r2, 0x8905, &(0x7f0000000140)) pwrite64(r2, &(0x7f0000000a40)="0f64800203d6484c7ddffad1", 0xc, 0x0) lseek(r2, 0x2, 0x3) dup2(r1, r2) close_range(r0, r2, 0x2) signalfd4(0xffffffffffffffff, &(0x7f00000000c0), 0x8, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) 00:07:15 executing program 4: mprotect(&(0x7f0000ffe000/0x1000)=nil, 0x1000, 0x0) perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getpid() socket$inet_tcp(0x2, 0x3, 0x0) r0 = openat$hpet(0xffffffffffffff9c, &(0x7f0000000000), 0x202880, 0x0) get_mempolicy(&(0x7f00000000c0), &(0x7f0000000100), 0x411, &(0x7f0000ffc000/0x1000)=nil, 0x5) mprotect(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x2000000) getsockopt$inet6_tcp_TCP_ZEROCOPY_RECEIVE(r0, 0x6, 0x23, &(0x7f0000000040)={&(0x7f0000ffc000/0x4000)=nil, 0x4000}, &(0x7f0000000080)=0x10) 00:07:15 executing program 6: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000040)='mqueue\x00', 0x222a000, 0x0) pivot_root(&(0x7f0000000000)='./file0\x00', &(0x7f0000000140)='./file0\x00') mknod$loop(&(0x7f00000000c0)='./file0\x00', 0x4849350f1193ecc0, 0x0) 00:07:16 executing program 5: r0 = seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0xc, &(0x7f0000000000)={0x17, &(0x7f0000000040)}) r1 = signalfd4(r0, &(0x7f00000000c0), 0x8, 0x0) fcntl$notify(r0, 0x402, 0x27) getpeername(r1, &(0x7f0000000040)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, &(0x7f0000000100)=0x80) signalfd4(r2, &(0x7f0000000140)={[0x6]}, 0x8, 0x80800) fsconfig$FSCONFIG_SET_STRING(r1, 0x1, &(0x7f0000000180)='&%(:\x00', &(0x7f00000001c0)='\x00', 0x0) [ 706.085154] EXT4-fs (loop0): mounted filesystem without journal. Opts: ,errors=continue [ 706.098920] EXT4-fs (loop3): mounted filesystem without journal. Opts: ,errors=continue [ 706.099264] EXT4-fs error (device loop0): ext4_mb_generate_buddy:802: group 0, block bitmap and bg descriptor inconsistent: 1236 vs 212 free clusters 00:07:16 executing program 2: r0 = seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x7fffffff}]}) fsetxattr(r0, &(0x7f0000000080)=@known='user.incfs.size\x00', &(0x7f0000000100)='(\\\x00', 0x3, 0x3) signalfd4(0xffffffffffffffff, &(0x7f00000000c0), 0x8, 0x0) [ 706.133848] EXT4-fs error (device loop3): ext4_mb_generate_buddy:802: group 0, block bitmap and bg descriptor inconsistent: 468 vs 212 free clusters 00:07:16 executing program 6: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='./file1\x00', &(0x7f0000000180), 0x1000, &(0x7f0000000280)={'trans=unix,', {[{@mmap}], [{@subj_user={'subj_user', 0x3d, ']]+'}}, {@func={'func', 0x3d, 'CREDS_CHECK'}}, {@fowner_lt={'fowner<', 0xee01}}, {@subj_user={'subj_user', 0x3d, '/'}}, {@fsmagic}, {@smackfsdef={'smackfsdef', 0x3d, '*.'}}, {@defcontext={'defcontext', 0x3d, 'unconfined_u'}}, {@smackfstransmute={'smackfstransmute', 0x3d, '*{\x9b-(,%]{+-'}}, {@dont_appraise}, {@mask={'mask', 0x3d, 'MAY_WRITE'}}]}}) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000040)='proc\x00', 0x0, 0x0) pivot_root(&(0x7f0000000000)='./file0\x00', &(0x7f0000000240)='.\x00') 00:07:16 executing program 0: syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000d1f4655fd1f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b00000000020000280200000284", 0x62, 0x400}, {&(0x7f0000010400)="030000000400000005000000d4", 0xd, 0x800}, {&(0x7f0000010500)="ffffffffff070000000000000000000000000000000000000000000000000080ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff", 0x3c0, 0xc00}, {&(0x7f0000000000)="ed41000000040000d0f4655fd1f4655fd1f4655f13ca7302f6e9dab934", 0x1d, 0x1600}], 0x0, &(0x7f0000000280)=ANY=[]) setxattr$trusted_overlay_upper(&(0x7f0000000540)='./file0\x00', &(0x7f0000000580), &(0x7f00000005c0)={0x0, 0xfb, 0x139, 0x0, 0x0, "eacbf6ff0bc36f5a7bb9fe2ee7bb1e01", "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"}, 0x139, 0x0) [ 706.444951] EXT4-fs (loop0): mounted filesystem without journal. Opts: ,errors=continue [ 706.470834] EXT4-fs error (device loop0): ext4_mb_generate_buddy:802: group 0, block bitmap and bg descriptor inconsistent: 724 vs 212 free clusters 00:07:29 executing program 0: syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000d1f4655fd1f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b00000000020000280200000284", 0x62, 0x400}, {&(0x7f0000010400)="030000000400000005000000d4", 0xd, 0x800}, {&(0x7f0000010500)="ffffffffff070000000000000000000000000000000000000000000000000080ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff", 0x3c0, 0xc00}, {&(0x7f0000000000)="ed41000000040000d0f4655fd1f4655fd1f4655f13ca7302f6e9dab934", 0x1d, 0x1600}], 0x0, &(0x7f0000000280)=ANY=[]) setxattr$trusted_overlay_upper(&(0x7f0000000540)='./file0\x00', &(0x7f0000000580), &(0x7f00000005c0)={0x0, 0xfb, 0x139, 0x0, 0x0, "eacbf6ff0bc36f5a7bb9fe2ee7bb1e01", "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"}, 0x139, 0x0) 00:07:29 executing program 7: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x7fffffff}]}) openat(0xffffffffffffff9c, 0x0, 0x0, 0x27) r0 = creat(&(0x7f0000000080)='./file1\x00', 0x0) ioctl$BTRFS_IOC_SCRUB(r0, 0xc400941b, &(0x7f0000000600)={0x0, 0x62, 0x80000001}) pwrite64(r0, &(0x7f0000000000)="a7", 0xfffffd6b, 0x0) accept$packet(0xffffffffffffffff, &(0x7f0000000080)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000100)=0x14) 00:07:29 executing program 3: syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000d1f4655fd1f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b00000000020000280200000284", 0x62, 0x400}, {&(0x7f0000010400)="030000000400000005000000d4", 0xd, 0x800}, {&(0x7f0000010500)="ffffffffff070000000000000000000000000000000000000000000000000080ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff", 0x3e0, 0xc00}, {&(0x7f0000000000)="ed41000000040000d0f4655fd1f4655fd1f4655f13ca7302f6e9dab934", 0x1d, 0x1600}], 0x0, &(0x7f0000000280)=ANY=[]) setxattr$trusted_overlay_upper(&(0x7f0000000540)='./file0\x00', &(0x7f0000000580), &(0x7f00000005c0)={0x0, 0xfb, 0x139, 0x0, 0x0, "eacbf6ff0bc36f5a7bb9fe2ee7bb1e01", "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"}, 0x139, 0x0) getxattr(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)=@random={'security.', ':\x00'}, &(0x7f0000000140)=""/55, 0x37) 00:07:29 executing program 4: r0 = seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x7fffffff}]}) mprotect(&(0x7f0000ffe000/0x1000)=nil, 0x1000, 0x0) r1 = fsmount(0xffffffffffffffff, 0x1, 0xc) mmap$IORING_OFF_SQES(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x2000004, 0x810, r1, 0x10000000) syz_io_uring_setup(0x3986, &(0x7f00000001c0)={0x0, 0x7293, 0x8, 0x3, 0x11, 0x0, r1}, &(0x7f0000ffe000/0x1000)=nil, &(0x7f0000ffd000/0x2000)=nil, &(0x7f0000000240), &(0x7f0000000280)) r2 = mmap$IORING_OFF_SQES(&(0x7f0000ffe000/0x1000)=nil, 0x1000, 0x2000005, 0x100010, 0xffffffffffffffff, 0x10000000) syz_io_uring_submit(0x0, r2, &(0x7f0000000180)=@IORING_OP_READ=@pass_buffer={0x16, 0x9872f6d65df98842, 0x4004, @fd=r0, 0x6, &(0x7f0000000080)=""/236, 0xec, 0x8, 0x1}, 0xffff8001) 00:07:29 executing program 5: r0 = seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x9}]}) signalfd4(0xffffffffffffffff, &(0x7f00000000c0), 0x8, 0x0) signalfd4(r0, &(0x7f0000000080)={[0x7]}, 0x8, 0x80800) 00:07:29 executing program 2: r0 = seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x7fffffff}]}) signalfd4(0xffffffffffffffff, &(0x7f00000000c0), 0x8, 0x0) ioctl$EXT4_IOC_GROUP_ADD(r0, 0x40286608, &(0x7f0000000080)={0x10001, 0x792, 0x7, 0xc044, 0x4, 0x8}) 00:07:29 executing program 6: r0 = syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000380)='ext3\x00', &(0x7f00000003c0)='./file0\x00', 0x3, 0x6, &(0x7f0000001800)=[{&(0x7f0000000500)="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", 0xff}, {&(0x7f0000000600)="09ce13a305cc65ffb9a7efce4b0b310f680bcb45d9b21e0d4dea7cced7be17077c20f3cf3c1f9592f6d8cd4d5704daf9ff8b01ba469bbd00ab1d8fa731aac6be75aa7773be97fcbfca976af3cf6e8595ffb9bba41712ea6cc4bd669170c072aa37636bae3d1fce6a9392024857f32125c505e18cad031c489f6cb57a88be13ba9efd14dd127b3716", 0x88, 0x5}, {&(0x7f00000006c0)="125ea603eb8b3b7e408cf306c8290b7d785d21dfde2104f0f4dceee9f64eb4f2bd7a8501e6af5a93da0b0a6b8ffee56f035e9b6b088a3f172c711025f8e3d43ff959b8383758a18dec24657538cccc86f874ce9cacdd55e0c11b516a53a0cdafc9445c7b50f92918a9e56c82cb43c50ccec93b93891c443e6777afbc155610ee85ea5cb1f3b5cc69fe9948a3", 0x8c, 0x3}, {&(0x7f0000000780)="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", 0x1000, 0x8001}, {&(0x7f0000000400)="f2ecdde4781356d2", 0x8, 0x7f6a}, {&(0x7f0000001780)="2c0fd78045f948cee79c2de1704769b94d3aa80863ba2ad2fa93f7a5b2e4927ccd7130f113292797eba67ac5ac7097b9554a41dde607e10f89746aa25552acfb0fec7cbaf029b11bafd3a1751309a1243cd80f387b78cc0d265ebf1f09727b2ad7c6589e", 0x64}], 0xcf004, &(0x7f00000018c0)={[{@journal_ioprio={'journal_ioprio', 0x3d, 0x2}}, {@prjquota}, {@prjquota}, {@jqfmt_vfsold}, {@init_itable_val={'init_itable', 0x3d, 0x6}}, {@norecovery}], [{@smackfsroot={'smackfsroot', 0x3d, 'mpol'}}, {@smackfsroot={'smackfsroot', 0x3d, '@Q\x8e{.#)'}}, {@fowner_lt={'fowner<', 0xffffffffffffffff}}, {@dont_hash}]}) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000040)='proc\x00', 0x0, 0x0) pivot_root(&(0x7f0000000000)='./file0\x00', &(0x7f0000000240)='.\x00') stat(&(0x7f0000001cc0)='.\x00', &(0x7f0000001c00)={0x0, 0x0, 0x0, 0x0, 0x0}) setresuid(0x0, r1, 0x0) r2 = syz_mount_image$tmpfs(&(0x7f00000000c0), &(0x7f0000000140)='./file0\x00', 0x40, 0x2, &(0x7f00000001c0)=[{&(0x7f0000000180)="4c4277a2984ecca9fd7e6eacf079f9b628cb3b9354cb0fac9c48598352b0a98d9bd46e0b6e903817bc461c88fc6325758138d982e371fc", 0x37}, {&(0x7f0000000280)="e36e48542659b0c6441fb1753cda21e94c1d8018ad774247cb9d1c5715611bcaaf94d0bd6ae1e0f81a330d1e2da9e563bef9c98edb25275c71a21d6a0810d12a4781c4dd09c14e471a54e7e8fedd816eebabd5e6313561ea1e8922a00078ad81b849f2b0da14c32471f76b10a0dc79e339f3345d19fc66d42051a86742d3a31a1a667b4e56a468038b7be7774c475c046924021636ab158dace318da077bda00cedeba4172cdb580f61b06ce9e209dec38e37997417f83a210d76f3e431080668168efae991a55a2", 0xc8, 0x8}], 0x880, &(0x7f0000000440)={[{@huge_advise}, {@nr_blocks={'nr_blocks', 0x3d, [0x6b, 0x36, 0x35]}}, {@mpol={'mpol', 0x3d, {'default', '', @void}}}], [{@dont_appraise}, {@uid_eq={'uid', 0x3d, r1}}, {@fsname}, {@subj_role={'subj_role', 0x3d, '(@'}}, {@smackfshat={'smackfshat', 0x3d, 'proc\x00'}}, {@euid_gt={'euid>', 0xee01}}]}) r3 = dup2(r2, r0) fspick(r3, &(0x7f0000000200)='./file0\x00', 0x0) 00:07:29 executing program 1: ioctl$TUNSETQUEUE(0xffffffffffffffff, 0x400454d9, &(0x7f0000000b80)={'bond0\x00'}) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, 0x0) r0 = signalfd4(0xffffffffffffffff, &(0x7f00000000c0), 0x8, 0x0) prctl$PR_SET_MM_MAP(0x23, 0xe, &(0x7f0000000180)={&(0x7f0000ffd000/0x1000)=nil, &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000fff000/0x1000)=nil, &(0x7f0000ffd000/0x1000)=nil, &(0x7f0000ffc000/0x2000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000ffe000/0x2000)=nil, &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000ffd000/0x2000)=nil, &(0x7f0000ffd000/0x2000)=nil, &(0x7f0000000140)="080afc03b8bae061a487765e741c1a3a5a7dea95a0b02b4dbb6944356a", 0x1d}, 0x68) r1 = creat(&(0x7f0000000080)='./file1\x00', 0x0) pwrite64(r1, &(0x7f0000000000)="a7", 0xfffffd6b, 0x0) accept$packet(r0, &(0x7f0000000080)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000100)=0x14) [ 719.318568] audit: type=1326 audit(1626998849.328:41): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=6887 comm="syz-executor.5" exe="/syz-executor.5" sig=31 arch=c000003e syscall=202 compat=0 ip=0x466609 code=0x0 [ 719.342217] EXT4-fs (loop3): mounted filesystem without journal. Opts: ,errors=continue [ 719.358271] EXT4-fs error (device loop3): ext4_mb_generate_buddy:802: group 0, block bitmap and bg descriptor inconsistent: 468 vs 212 free clusters 00:07:29 executing program 3: syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000d1f4655fd1f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b00000000020000280200000284", 0x62, 0x400}, {&(0x7f0000010400)="030000000400000005000000d4", 0xd, 0x800}, {&(0x7f0000010500)="ffffffffff070000000000000000000000000000000000000000000000000080ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff", 0x3f0, 0xc00}, {&(0x7f0000000000)="ed41000000040000d0f4655fd1f4655fd1f4655f13ca7302f6e9dab934", 0x1d, 0x1600}], 0x0, &(0x7f0000000280)=ANY=[]) setxattr$trusted_overlay_upper(&(0x7f0000000540)='./file0\x00', &(0x7f0000000580), &(0x7f00000005c0)={0x0, 0xfb, 0x139, 0x0, 0x0, "eacbf6ff0bc36f5a7bb9fe2ee7bb1e01", "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"}, 0x139, 0x0) getxattr(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)=@random={'security.', ':\x00'}, &(0x7f0000000140)=""/55, 0x37) [ 719.402041] EXT4-fs (loop0): mounted filesystem without journal. Opts: ,errors=continue [ 719.414862] EXT4-fs error (device loop0): ext4_mb_generate_buddy:802: group 0, block bitmap and bg descriptor inconsistent: 724 vs 212 free clusters 00:07:29 executing program 2: r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000100)='/proc/vmstat\x00', 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x46e2, 0x0) ftruncate(r1, 0x1000003) r2 = socket$inet6_udp(0xa, 0x2, 0x0) r3 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000280), 0x50202, 0x0) mknodat(r3, &(0x7f0000000400)='./file0\x00', 0x1, 0x3) preadv(r2, &(0x7f0000000600)=[{&(0x7f0000002a40)=""/4106, 0xffffffffffffff6a}, {&(0x7f0000000340)=""/2, 0x6}, {&(0x7f0000000380)=""/128, 0x80}, {&(0x7f0000000880)=""/85, 0x50}, {&(0x7f0000003a80)=""/102400, 0x1}, {&(0x7f00000004c0)=""/50, 0x46}, {&(0x7f0000000540)=""/137, 0x89}, {&(0x7f0000001880)=""/188, 0xbf}], 0x8, 0x1ff, 0xbace) ioctl$FS_IOC_FSSETXATTR(r1, 0x40086602, &(0x7f0000000000)) write$binfmt_elf64(r1, &(0x7f00000001c0)=ANY=[], 0xfdef) lseek(r1, 0x0, 0x3) ioctl$sock_SIOCGIFINDEX_80211(r1, 0x8933, &(0x7f0000000680)={'wlan1\x00', 0x0}) sendmsg$NL80211_CMD_LEAVE_MESH(0xffffffffffffffff, &(0x7f0000000300)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f00000002c0)={&(0x7f00000006c0)={0xfffffffffffffee5, 0x0, 0x300, 0x70bd27, 0x25dfdbfc, {{}, {@val={0x8, 0x3, r4}, @void}}, [""]}, 0x1c}, 0x1, 0x0, 0x0, 0x2004c880}, 0x4044880) sendmsg$NL80211_CMD_SET_PMK(r1, &(0x7f0000000200)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f00000001c0)={&(0x7f0000000700)=ANY=[@ANYBLOB="a0000000", @ANYRES16=0x0, @ANYBLOB="00017300007b200000080003000000000000c201a715ed4e5713bf554c11434d32b14a0eb7ff8bbb65357901daffba043b42021d8e59185da93cc1d31a8e2230d98f7c528ef705ff0aa92956a446e143104963b64d7faf1f251810d1125caf9e5df46fd06d46bca9eb2980484ba81d46c64f945c4deb3b5dc68c9527ecce36262bca53c96f9f1543a38814fcae243a7abf1ea66d6e24fdef341f222d3300846108540b23445072d78ca5694f6629a6083a8a13ed8b9c65b3ef74b56609041011bf409ab990ba493f5410eb4bf60e0e131514ca446d0fb32d3f572f333e4fc4e35eeafe0f4933a9e4", @ANYRES32=r4, @ANYBLOB="0a000600ffffffffffff00000a000600ffffffffffff00000a00060008021100000100001400fe00bbaf8bfe981d3371ec6b85baba6f6dfb0a000600ffffffffffff00000a00060008021100000100000a00060008021100000100001400fe00750000000015000000000000000000001400fe00cf0600000000000000f05fd28e7ce85e"], 0xa0}}, 0x8000) sendmsg$NL80211_CMD_STOP_AP(r0, &(0x7f0000000200)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x10000000}, 0xc, &(0x7f0000000180)={&(0x7f0000001980)=ANY=[@ANYBLOB="28e3ff3b9268d9252bd9a41bebe6075dc0b05385791857cf3e52100b038dbdc7bb254ab4f8624554784868d9506dd15c069943c3f2bb6ab14f647555b0cee7197495ba44b0c8ffce721ab378f4b307d9beecee08", @ANYRES16=0x0, @ANYBLOB="000226bd7000fd0400251000000008000300", @ANYRES32=r4, @ANYBLOB="0c0099000500000004000000"], 0x28}, 0x1, 0x0, 0x0, 0x4040000}, 0x20008001) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x9, &(0x7f0000000040)=[{0x0, 0x0, 0x4, 0x200}, {0x1, 0x20, 0xd1, 0x7ff}, {0x1fff, 0x0, 0x4f, 0x3}, {0x9, 0x5, 0x40, 0xe1}, {0x8, 0x40, 0x6, 0x3}, {0x7, 0x6, 0x4, 0x8001}, {0x81, 0x7, 0x8f, 0x1ba5c43e}, {0x3, 0x2, 0x0, 0x8}, {0x7fff, 0x9, 0x9, 0x7}]}) signalfd4(0xffffffffffffffff, &(0x7f00000000c0), 0x8, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000240), 0x0, 0x0) 00:07:29 executing program 4: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x7fffffff}]}) mprotect(&(0x7f0000ffe000/0x1000)=nil, 0x1000, 0x0) r0 = fork() ptrace(0x10, r0) move_pages(r0, 0x2, &(0x7f0000000080)=[&(0x7f0000ffe000/0x1000)=nil, &(0x7f0000ffd000/0x2000)=nil], &(0x7f00000000c0)=[0xfff, 0x6, 0x3, 0x0], &(0x7f0000000100)=[0x0, 0x0, 0x0, 0x0], 0x0) 00:07:29 executing program 6: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f00000000c0)='bpf\x00', 0x2024, 0x0) pivot_root(&(0x7f0000000000)='./file0\x00', &(0x7f0000000240)='.\x00') getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000200)={0x0, 0x0}, &(0x7f0000000280)=0xc) mount$9p_unix(&(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='./file0\x00', &(0x7f00000001c0), 0x16081, &(0x7f00000002c0)={'trans=unix,', {[{@dfltuid={'dfltuid', 0x3d, r0}}, {@uname={'uname', 0x3d, '&{'}}, {@access_client}, {@mmap}, {@cache_mmap}], [{@fowner_lt={'fowner<', 0xee00}}]}}) stat(&(0x7f00000004c0)='./file0\x00', &(0x7f0000000500)={0x0, 0x0, 0x0, 0x0, 0x0}) syz_mount_image$ext4(&(0x7f0000000340)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x8, 0x0, &(0x7f00000003c0), 0x800000, &(0x7f0000000580)={[{@usrjquota}], [{@audit}, {@fowner_lt}, {@uid_eq={'uid', 0x3d, r0}}, {@fowner_lt={'fowner<', r0}}, {@fowner_lt={'fowner<', r1}}]}) openat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x410002, 0x0) [ 719.497448] EXT4-fs (loop3): mounted filesystem without journal. Opts: ,errors=continue 00:07:29 executing program 6: r0 = syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) removexattr(&(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)=ANY=[@ANYBLOB="757365722e70726f63de"]) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000040)='proc\x00', 0x8, 0x0) pivot_root(&(0x7f0000000000)='./file0\x00', &(0x7f0000000180)='.\x00') statx(r0, &(0x7f0000000200)='./file0/../file0\x00', 0x2000, 0x200, &(0x7f0000000240)) truncate(&(0x7f00000000c0)='./file0/../file0\x00', 0xa0) [ 719.517559] EXT4-fs error (device loop3): ext4_mb_generate_buddy:802: group 0, block bitmap and bg descriptor inconsistent: 340 vs 212 free clusters 00:07:29 executing program 0: syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000d1f4655fd1f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b00000000020000280200000284", 0x62, 0x400}, {&(0x7f0000010400)="030000000400000005000000d4", 0xd, 0x800}, {&(0x7f0000010500)="ffffffffff070000000000000000000000000000000000000000000000000080ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff", 0x3c0, 0xc00}, {&(0x7f0000000000)="ed41000000040000d0f4655fd1f4655fd1f4655f13ca7302f6e9dab934", 0x1d, 0x1600}], 0x0, &(0x7f0000000280)=ANY=[]) setxattr$trusted_overlay_upper(&(0x7f0000000540)='./file0\x00', &(0x7f0000000580), &(0x7f00000005c0)={0x0, 0xfb, 0x139, 0x0, 0x0, "eacbf6ff0bc36f5a7bb9fe2ee7bb1e01", "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"}, 0x139, 0x0) 00:07:29 executing program 3: syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000d1f4655fd1f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b00000000020000280200000284", 0x62, 0x400}, {&(0x7f0000010400)="030000000400000005000000d4", 0xd, 0x800}, {&(0x7f0000010500)="ffffffffff070000000000000000000000000000000000000000000000000080ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff", 0x3f0, 0xc00}, {&(0x7f0000000000)="ed41000000040000d0f4655fd1f4655fd1f4655f13ca7302f6e9dab934", 0x1d, 0x1600}], 0x0, &(0x7f0000000280)=ANY=[]) setxattr$trusted_overlay_upper(&(0x7f0000000540)='./file0\x00', &(0x7f0000000580), &(0x7f00000005c0)={0x0, 0xfb, 0x139, 0x0, 0x0, "eacbf6ff0bc36f5a7bb9fe2ee7bb1e01", "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"}, 0x139, 0x0) getxattr(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)=@random={'security.', ':\x00'}, &(0x7f0000000140)=""/55, 0x37) 00:07:29 executing program 2: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x6, 0x7f, 0x0, 0x7fffffff}]}) r0 = signalfd4(0xffffffffffffffff, &(0x7f00000000c0), 0x8, 0x0) r1 = dup3(r0, r0, 0x0) dup2(r0, r1) openat(r0, &(0x7f0000000080)='./file0\x00', 0x2801, 0x2) 00:07:29 executing program 6: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_802154(0xffffffffffffffff, 0x8933, &(0x7f0000000140)={'wpan0\x00', 0x0}) sendmsg$NL802154_CMD_SET_CCA_MODE(r0, &(0x7f0000000200)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f00000001c0)={&(0x7f0000000180)={0x34, 0x0, 0x300, 0x70bd2d, 0x25dfdbfc, {}, [@NL802154_ATTR_CCA_MODE={0x8, 0xc, 0x6}, @NL802154_ATTR_WPAN_PHY={0x8, 0x1, 0x2}, @NL802154_ATTR_IFINDEX={0x8, 0x3, r1}, @NL802154_ATTR_IFINDEX={0x8}]}, 0x34}}, 0x0) r2 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000280), r0) sendmsg$NL802154_CMD_SET_CCA_ED_LEVEL(r0, &(0x7f0000000380)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x10000000}, 0xc, &(0x7f0000000340)={&(0x7f00000002c0)=ANY=[@ANYBLOB='H\x00\x00\x00', @ANYRES16=r2, @ANYBLOB="020027bd7000ffdbdf250e000007081b0e000500000008000e000300000300cb12c729a800060001000000010000", @ANYRES32=r1, @ANYBLOB="08000e000900000008000e0005000000"], 0x48}, 0x1, 0x0, 0x0, 0x5040}, 0x40) sendmsg$NL802154_CMD_SET_MAX_FRAME_RETRIES(0xffffffffffffffff, &(0x7f00000001c0)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x2}, 0xc, &(0x7f0000000180)={&(0x7f0000000140)={0x1c, r2, 0x100, 0x70bd27, 0x25dfdbfe, {}, [@NL802154_ATTR_MAX_FRAME_RETRIES={0x5, 0xf, 0xff}]}, 0x1c}, 0x1, 0x0, 0x0, 0x11}, 0x8801) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000040)='proc\x00', 0x0, 0x0) pivot_root(&(0x7f0000000000)='./file0\x00', &(0x7f0000000240)='.\x00') [ 719.755288] EXT4-fs (loop0): mounted filesystem without journal. Opts: ,errors=continue [ 719.759581] EXT4-fs error (device loop0): ext4_mb_generate_buddy:802: group 0, block bitmap and bg descriptor inconsistent: 724 vs 212 free clusters [ 719.801354] EXT4-fs (loop3): mounted filesystem without journal. Opts: ,errors=continue [ 719.811591] EXT4-fs error (device loop3): ext4_mb_generate_buddy:802: group 0, block bitmap and bg descriptor inconsistent: 340 vs 212 free clusters [ 720.151027] audit: type=1326 audit(1626998850.161:42): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=6887 comm="syz-executor.5" exe="/syz-executor.5" sig=31 arch=c000003e syscall=202 compat=0 ip=0x466609 code=0x0 00:07:30 executing program 7: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x7fffffff}]}) openat(0xffffffffffffff9c, 0x0, 0x0, 0x27) r0 = creat(&(0x7f0000000080)='./file1\x00', 0x0) ioctl$BTRFS_IOC_SCRUB(r0, 0xc400941b, &(0x7f0000000600)={0x0, 0x62, 0x80000001}) pwrite64(r0, &(0x7f0000000000)="a7", 0xfffffd6b, 0x0) accept$packet(0xffffffffffffffff, &(0x7f0000000080)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000100)=0x14) 00:07:30 executing program 4: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0xc, &(0x7f0000000000)={0x2, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x7fffffff}, {0x0, 0x8, 0x7f, 0x3}]}) r0 = fork() ptrace(0x10, r0) syz_open_procfs(r0, &(0x7f0000000080)='net/raw\x00') mprotect(&(0x7f0000ffe000/0x1000)=nil, 0x1000, 0x0) prctl$PR_SET_MM(0x23, 0xa, &(0x7f0000ffe000/0x1000)=nil) 00:07:30 executing program 0: syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000d1f4655fd1f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b00000000020000280200000284", 0x62, 0x400}, {&(0x7f0000010400)="030000000400000005000000d4", 0xd, 0x800}, {&(0x7f0000010500)="ffffffffff070000000000000000000000000000000000000000000000000080ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff", 0x3e0, 0xc00}, {&(0x7f0000000000)="ed41000000040000d0f4655fd1f4655fd1f4655f13ca7302f6e9dab934", 0x1d, 0x1600}], 0x0, &(0x7f0000000280)=ANY=[]) setxattr$trusted_overlay_upper(&(0x7f0000000540)='./file0\x00', &(0x7f0000000580), &(0x7f00000005c0)={0x0, 0xfb, 0x139, 0x0, 0x0, "eacbf6ff0bc36f5a7bb9fe2ee7bb1e01", "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"}, 0x139, 0x0) [ 720.209283] EXT4-fs (loop0): mounted filesystem without journal. Opts: ,errors=continue [ 720.212392] EXT4-fs error (device loop0): ext4_mb_generate_buddy:802: group 0, block bitmap and bg descriptor inconsistent: 468 vs 212 free clusters 00:07:49 executing program 4: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0xc, &(0x7f0000000000)={0x20000000000000cc, &(0x7f0000000040)}) mprotect(&(0x7f0000ffe000/0x1000)=nil, 0x1000, 0x0) 00:07:49 executing program 7: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x7fffffff}]}) openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) r0 = creat(&(0x7f0000000080)='./file1\x00', 0x0) ioctl$BTRFS_IOC_SCRUB(r0, 0xc400941b, &(0x7f0000000600)={0x0, 0x62, 0x80000001}) pwrite64(r0, &(0x7f0000000000)="a7", 0xfffffd6b, 0x0) accept$packet(0xffffffffffffffff, &(0x7f0000000080)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000100)=0x14) 00:07:49 executing program 3: syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000d1f4655fd1f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b00000000020000280200000284", 0x62, 0x400}, {&(0x7f0000010400)="030000000400000005000000d4", 0xd, 0x800}, {&(0x7f0000010500)="ffffffffff070000000000000000000000000000000000000000000000000080ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff", 0x3f0, 0xc00}, {&(0x7f0000000000)="ed41000000040000d0f4655fd1f4655fd1f4655f13ca7302f6e9dab934", 0x1d, 0x1600}], 0x0, &(0x7f0000000280)=ANY=[]) setxattr$trusted_overlay_upper(&(0x7f0000000540)='./file0\x00', &(0x7f0000000580), &(0x7f00000005c0)={0x0, 0xfb, 0x139, 0x0, 0x0, "eacbf6ff0bc36f5a7bb9fe2ee7bb1e01", "a49dbbc75b5fc0caa97cab3ee231b0d7cf3b9be24c0fb2c145c6f2190b4a29cc525f550d79c74a03eda157db2eae62fde8958cce2a8a4c9d0374e4d6ae09ef4ee733ce4046bee0170cff57584e0671d4f286b9691d37721b43778a4afb3c3d05fd5446d2e0bac5326f43d23126410dfb85efa26b9e1ae8d056c3ebcde0c95e1443304d7a93eb4077f76047b6e13f0e79a9631ac2bd43143854803c698a7f02933d9cbdca121cc857aacabf858f3f904c9dfedb6c03186d99490f35f09de8ab897ea7c58f07dca416e1db55c7a849a91b98d0e0c0c7bf058d86a2e997a0557800a34bb7f5806f2e15e99981cc3fe615a3ff396f7d8da30ea24626263abf0ad50a0ce2dafc55f2b0286b2204114a6754b336a913a75e66ed6a3efd132f668369692f46039d"}, 0x139, 0x0) getxattr(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)=@random={'security.', ':\x00'}, &(0x7f0000000140)=""/55, 0x37) 00:07:49 executing program 1: ioctl$TUNSETQUEUE(0xffffffffffffffff, 0x400454d9, &(0x7f0000000b80)={'bond0\x00'}) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x0, 0x0}) r0 = signalfd4(0xffffffffffffffff, &(0x7f00000000c0), 0x8, 0x0) prctl$PR_SET_MM_MAP(0x23, 0xe, &(0x7f0000000180)={&(0x7f0000ffd000/0x1000)=nil, &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000fff000/0x1000)=nil, &(0x7f0000ffd000/0x1000)=nil, &(0x7f0000ffc000/0x2000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000ffe000/0x2000)=nil, &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000ffd000/0x2000)=nil, &(0x7f0000ffd000/0x2000)=nil, &(0x7f0000000140)="080afc03b8bae061a487765e741c1a3a5a7dea95a0b02b4dbb6944356a", 0x1d}, 0x68) r1 = creat(&(0x7f0000000080)='./file1\x00', 0x0) pwrite64(r1, &(0x7f0000000000)="a7", 0xfffffd6b, 0x0) accept$packet(r0, &(0x7f0000000080)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000100)=0x14) 00:07:49 executing program 2: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x7fffffff}]}) r0 = openat(0xffffffffffffff9c, 0x0, 0x1c2, 0x27) r1 = open(&(0x7f0000000040)='./file0\x00', 0x1810c1, 0x0) ioctl$BTRFS_IOC_SCRUB_PROGRESS(r0, 0xc400941d, &(0x7f0000000200)={0x0, 0x4, 0xd3, 0x1}) pwrite64(r1, &(0x7f0000000a40)="0f64800203d6484c7ddffad1", 0xc, 0x0) lseek(r1, 0x2, 0x3) ioctl$FS_IOC_GETFLAGS(r1, 0x80086601, &(0x7f0000000a00)) fcntl$getflags(r1, 0x401) dup2(r0, r1) openat(r1, 0x0, 0xd0942, 0x27) r2 = creat(&(0x7f0000000080)='./file1\x00', 0x0) ioctl$BTRFS_IOC_SCRUB(r2, 0xc400941b, &(0x7f0000000600)={0x0, 0x62, 0x80000001}) pwrite64(r2, &(0x7f0000000000)="a7", 0xfffffd6b, 0x0) pwrite64(r2, &(0x7f0000000180)="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", 0xfc, 0x582) ioctl$PIO_UNIMAPCLR(r2, 0x4b68, &(0x7f0000000a80)={0x80, 0x4, 0x6}) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r2, 0xc0502100, &(0x7f0000000100)) signalfd4(0xffffffffffffffff, &(0x7f00000000c0), 0x8, 0x0) 00:07:49 executing program 6: r0 = syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) name_to_handle_at(r0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000140)=@FILEID_INO32_GEN_PARENT={0x10, 0x2, {{0x81, 0x1000}, 0x3, 0x1}}, &(0x7f0000000180), 0x400) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='nfs4\x00', 0x1, 0x0) pivot_root(&(0x7f0000000000)='./file0\x00', &(0x7f0000000240)='.\x00') 00:07:49 executing program 0: syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000d1f4655fd1f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b00000000020000280200000284", 0x62, 0x400}, {&(0x7f0000010400)="030000000400000005000000d4", 0xd, 0x800}, {&(0x7f0000010500)="ffffffffff070000000000000000000000000000000000000000000000000080ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff", 0x3e0, 0xc00}, {&(0x7f0000000000)="ed41000000040000d0f4655fd1f4655fd1f4655f13ca7302f6e9dab934", 0x1d, 0x1600}], 0x0, &(0x7f0000000280)=ANY=[]) setxattr$trusted_overlay_upper(&(0x7f0000000540)='./file0\x00', &(0x7f0000000580), &(0x7f00000005c0)={0x0, 0xfb, 0x139, 0x0, 0x0, "eacbf6ff0bc36f5a7bb9fe2ee7bb1e01", "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"}, 0x139, 0x0) 00:07:49 executing program 5: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0xc, &(0x7f0000000000)) signalfd4(0xffffffffffffffff, &(0x7f00000000c0)={[0x4fb87fe6]}, 0x8, 0x0) 00:07:49 executing program 4: r0 = seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x7fffffff}]}) mprotect(&(0x7f0000ffe000/0x1000)=nil, 0x1000, 0x0) r1 = syz_io_uring_complete(0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f0000000080)={0x0}) ioctl$SECCOMP_IOCTL_NOTIF_ADDFD(r1, 0x40182103, &(0x7f0000000100)={r2, 0x1, r0, 0xfffffffa}) [ 739.643081] EXT4-fs (loop3): mounted filesystem without journal. Opts: ,errors=continue [ 739.647920] EXT4-fs (loop0): mounted filesystem without journal. Opts: ,errors=continue [ 739.655908] EXT4-fs error (device loop3): ext4_mb_generate_buddy:802: group 0, block bitmap and bg descriptor inconsistent: 340 vs 212 free clusters [ 739.662832] EXT4-fs error (device loop0): ext4_mb_generate_buddy:802: group 0, block bitmap and bg descriptor inconsistent: 468 vs 212 free clusters 00:07:49 executing program 5: r0 = open(&(0x7f0000000040)='./file0\x00', 0x1810c1, 0x0) ioctl$BTRFS_IOC_SCRUB_PROGRESS(0xffffffffffffffff, 0xc400941d, &(0x7f0000000200)={0x0, 0x4, 0xd3, 0x1}) pwrite64(r0, &(0x7f0000000a40)="0f64800203d6484c7ddffad1", 0xc, 0x0) lseek(r0, 0x2, 0x3) fcntl$getflags(r0, 0x401) dup2(0xffffffffffffffff, r0) r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$BATADV_CMD_SET_HARDIF(r1, &(0x7f0000000100)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x40000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000080)={0x40, 0x0, 0x200, 0x0, 0x25dfdbfb, {}, [@BATADV_ATTR_ORIG_ADDRESS={0xa}, @BATADV_ATTR_MULTICAST_FORCEFLOOD_ENABLED={0x5}, @BATADV_ATTR_NETWORK_CODING_ENABLED={0x5}, @BATADV_ATTR_NETWORK_CODING_ENABLED={0x5}, @BATADV_ATTR_MULTICAST_FANOUT={0x8}]}, 0x40}, 0x1, 0x0, 0x0, 0x4044005}, 0x0) r2 = syz_open_dev$vcsu(&(0x7f0000000180), 0x9, 0x0) ioctl$KDSKBENT(r2, 0x4b47, &(0x7f00000001c0)={0x1, 0x80, 0xfff}) r3 = syz_genetlink_get_family_id$batadv(&(0x7f0000000340), r1) sendmsg$BATADV_CMD_GET_TRANSTABLE_GLOBAL(0xffffffffffffffff, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f0000000380)={0x1c, r3, 0x800, 0x70bd2d, 0x25dfdbfc, {}, [@BATADV_ATTR_TPMETER_TEST_TIME={0x8, 0xb, 0x6}]}, 0x1c}, 0x1, 0x0, 0x0, 0x80}, 0x40048d5) ioctl$sock_ipv6_tunnel_SIOCADDPRL(r2, 0x89f5, &(0x7f0000000a80)={'ip6gre0\x00', &(0x7f0000000a00)={'syztnl1\x00', 0x0, 0x4, 0xe7, 0x2, 0xfffffffb, 0x1, @empty, @loopback, 0x1, 0x20, 0x8, 0xffff}}) sendmsg$BATADV_CMD_TP_METER(0xffffffffffffffff, &(0x7f0000000b40)={&(0x7f0000000940)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000000b00)={&(0x7f0000000ac0)={0x3c, r3, 0x400, 0x70bd25, 0x25dfdbfe, {}, [@BATADV_ATTR_ELP_INTERVAL={0x8, 0x3a, 0x8}, @BATADV_ATTR_GW_BANDWIDTH_DOWN={0x8, 0x31, 0x10001}, @BATADV_ATTR_MESH_IFINDEX={0x8, 0x3, r4}, @BATADV_ATTR_DISTRIBUTED_ARP_TABLE_ENABLED={0x5, 0x2f, 0x1}, @BATADV_ATTR_FRAGMENTATION_ENABLED={0x5}]}, 0x3c}, 0x1, 0x0, 0x0, 0xc000011}, 0x8000) sendmsg$BATADV_CMD_GET_ORIGINATORS(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000000240)={&(0x7f00000001c0)={0x54, r3, 0x10, 0x70bd2b, 0x25dfdbfc, {}, [@BATADV_ATTR_FRAGMENTATION_ENABLED={0x5, 0x30, 0x1}, @BATADV_ATTR_MULTICAST_FANOUT={0x8, 0x3c, 0x1800}, @BATADV_ATTR_GW_MODE={0x5}, @BATADV_ATTR_ISOLATION_MARK={0x8, 0x2b, 0xfffffffe}, @BATADV_ATTR_MESH_IFINDEX={0x8}, @BATADV_ATTR_BRIDGE_LOOP_AVOIDANCE_ENABLED={0x5}, @BATADV_ATTR_ORIG_INTERVAL={0x8, 0x39, 0x1000}, @BATADV_ATTR_ORIG_INTERVAL={0x8, 0x39, 0x8}]}, 0x54}, 0x1, 0x0, 0x0, 0x4820}, 0x20000000) perf_event_open(&(0x7f0000000100)={0x2, 0x80, 0x3, 0x40, 0x3f, 0x6, 0x0, 0x7fff, 0x8000, 0x8, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x8f, 0x4, @perf_bp={&(0x7f0000000000), 0x5}, 0xa00, 0x1f, 0x4, 0x3, 0xfff, 0x100, 0x497, 0x0, 0x0, 0x0, 0x7}, 0x0, 0x3, 0xffffffffffffffff, 0x2) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x7fffffff}]}) signalfd4(0xffffffffffffffff, &(0x7f00000000c0), 0x8, 0x0) r5 = timerfd_create(0x5, 0x0) dup(r5) 00:07:49 executing program 6: syz_mount_image$ext4(0x0, &(0x7f0000000180)='./file0\x00', 0x4, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000040)='proc\x00', 0x0, 0x0) mknod$loop(&(0x7f0000000140)='./file0\x00', 0x2000, 0x0) umount2(&(0x7f00000000c0)='./file0\x00', 0x5) pivot_root(&(0x7f0000000000)='./file0\x00', &(0x7f0000000240)='.\x00') 00:07:49 executing program 3: syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000d1f4655fd1f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b00000000020000280200000284", 0x62, 0x400}, {&(0x7f0000010400)="030000000400000005000000d4", 0xd, 0x800}, {&(0x7f0000010500)="ffffffffff070000000000000000000000000000000000000000000000000080ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff", 0x3f8, 0xc00}, {&(0x7f0000000000)="ed41000000040000d0f4655fd1f4655fd1f4655f13ca7302f6e9dab934", 0x1d, 0x1600}], 0x0, &(0x7f0000000280)=ANY=[]) setxattr$trusted_overlay_upper(&(0x7f0000000540)='./file0\x00', &(0x7f0000000580), &(0x7f00000005c0)={0x0, 0xfb, 0x139, 0x0, 0x0, "eacbf6ff0bc36f5a7bb9fe2ee7bb1e01", "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"}, 0x139, 0x0) getxattr(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)=@random={'security.', ':\x00'}, &(0x7f0000000140)=""/55, 0x37) 00:07:49 executing program 0: syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000d1f4655fd1f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b00000000020000280200000284", 0x62, 0x400}, {&(0x7f0000010400)="030000000400000005000000d4", 0xd, 0x800}, {&(0x7f0000010500)="ffffffffff070000000000000000000000000000000000000000000000000080ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff", 0x3e0, 0xc00}, {&(0x7f0000000000)="ed41000000040000d0f4655fd1f4655fd1f4655f13ca7302f6e9dab934", 0x1d, 0x1600}], 0x0, &(0x7f0000000280)=ANY=[]) setxattr$trusted_overlay_upper(&(0x7f0000000540)='./file0\x00', &(0x7f0000000580), &(0x7f00000005c0)={0x0, 0xfb, 0x139, 0x0, 0x0, "eacbf6ff0bc36f5a7bb9fe2ee7bb1e01", "a49dbbc75b5fc0caa97cab3ee231b0d7cf3b9be24c0fb2c145c6f2190b4a29cc525f550d79c74a03eda157db2eae62fde8958cce2a8a4c9d0374e4d6ae09ef4ee733ce4046bee0170cff57584e0671d4f286b9691d37721b43778a4afb3c3d05fd5446d2e0bac5326f43d23126410dfb85efa26b9e1ae8d056c3ebcde0c95e1443304d7a93eb4077f76047b6e13f0e79a9631ac2bd43143854803c698a7f02933d9cbdca121cc857aacabf858f3f904c9dfedb6c03186d99490f35f09de8ab897ea7c58f07dca416e1db55c7a849a91b98d0e0c0c7bf058d86a2e997a0557800a34bb7f5806f2e15e99981cc3fe615a3ff396f7d8da30ea24626263abf0ad50a0ce2dafc55f2b0286b2204114a6754b336a913a75e66ed6a3efd132f668369692f46039d"}, 0x139, 0x0) 00:07:49 executing program 6: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000040)='proc\x00', 0x0, 0x0) pivot_root(&(0x7f0000000000)='./file1\x00', &(0x7f0000000240)='./file0\x00') stat(&(0x7f0000001cc0)='.\x00', &(0x7f0000001c00)={0x0, 0x0, 0x0, 0x0, 0x0}) setresuid(0x0, r0, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000440)={{{@in6=@initdev, @in=@multicast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@private0}, 0x0, @in=@local}}, &(0x7f0000000540)=0xe8) setreuid(r0, r1) mount$9p_unix(&(0x7f00000002c0)='./file1\x00', &(0x7f0000000300)='./file0\x00', &(0x7f0000000340), 0x2050000, &(0x7f0000000380)={'trans=unix,', {[{@aname={'aname', 0x3d, 'proc\x00'}}], [{@smackfstransmute={'smackfstransmute', 0x3d, 'pipefs\x00'}}, {@uid_gt={'uid>', r0}}, {@fowner_gt={'fowner>', 0xffffffffffffffff}}, {@obj_type={'obj_type', 0x3d, 'trusted.overlay.nlink\x00'}}]}}) setxattr$trusted_overlay_nlink(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140), &(0x7f0000000180)={'U+'}, 0x16, 0x2) mount$bind(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000200)='./file0\x00', &(0x7f0000000280), 0x0, 0x0) 00:07:49 executing program 5: r0 = seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x2, &(0x7f00000001c0)=[{0x7, 0x0, 0x0, 0x7fffffff}, {0x0, 0xe1, 0xfe, 0x4000004}]}) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x5, &(0x7f0000000180)={0x2, &(0x7f0000000080)=[{0x9cfb, 0x0, 0x4, 0x9}, {0x40, 0x8, 0x81, 0x9013}]}) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r0, 0xc0502100, &(0x7f0000000100)) signalfd4(0xffffffffffffffff, &(0x7f00000000c0), 0x8, 0x0) 00:07:49 executing program 4: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x7fffffff}]}) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x8, &(0x7f00000000c0)={0x1, &(0x7f0000000080)=[{0x6, 0x3f, 0x80, 0x8001}]}) socket$inet6_udplite(0xa, 0x2, 0x88) mprotect(&(0x7f0000ffe000/0x1000)=nil, 0x1000, 0x0) [ 739.901099] EXT4-fs (loop0): mounted filesystem without journal. Opts: ,errors=continue [ 739.907615] EXT4-fs error (device loop0): ext4_mb_generate_buddy:802: group 0, block bitmap and bg descriptor inconsistent: 468 vs 212 free clusters [ 739.926578] EXT4-fs (loop3): mounted filesystem without journal. Opts: ,errors=continue [ 739.930803] EXT4-fs error (device loop3): ext4_mb_generate_buddy:802: group 0, block bitmap and bg descriptor inconsistent: 276 vs 212 free clusters [ 739.960985] audit: type=1326 audit(1626998869.971:43): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=7034 comm="syz-executor.4" exe="/syz-executor.4" sig=31 arch=c000003e syscall=202 compat=0 ip=0x466609 code=0x0 00:07:49 executing program 0: syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000d1f4655fd1f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b00000000020000280200000284", 0x62, 0x400}, {&(0x7f0000010400)="030000000400000005000000d4", 0xd, 0x800}, {&(0x7f0000010500)="ffffffffff070000000000000000000000000000000000000000000000000080ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff", 0x3f0, 0xc00}, {&(0x7f0000000000)="ed41000000040000d0f4655fd1f4655fd1f4655f13ca7302f6e9dab934", 0x1d, 0x1600}], 0x0, &(0x7f0000000280)=ANY=[]) setxattr$trusted_overlay_upper(&(0x7f0000000540)='./file0\x00', &(0x7f0000000580), &(0x7f00000005c0)={0x0, 0xfb, 0x139, 0x0, 0x0, "eacbf6ff0bc36f5a7bb9fe2ee7bb1e01", "a49dbbc75b5fc0caa97cab3ee231b0d7cf3b9be24c0fb2c145c6f2190b4a29cc525f550d79c74a03eda157db2eae62fde8958cce2a8a4c9d0374e4d6ae09ef4ee733ce4046bee0170cff57584e0671d4f286b9691d37721b43778a4afb3c3d05fd5446d2e0bac5326f43d23126410dfb85efa26b9e1ae8d056c3ebcde0c95e1443304d7a93eb4077f76047b6e13f0e79a9631ac2bd43143854803c698a7f02933d9cbdca121cc857aacabf858f3f904c9dfedb6c03186d99490f35f09de8ab897ea7c58f07dca416e1db55c7a849a91b98d0e0c0c7bf058d86a2e997a0557800a34bb7f5806f2e15e99981cc3fe615a3ff396f7d8da30ea24626263abf0ad50a0ce2dafc55f2b0286b2204114a6754b336a913a75e66ed6a3efd132f668369692f46039d"}, 0x139, 0x0) [ 740.078671] EXT4-fs (loop0): mounted filesystem without journal. Opts: ,errors=continue [ 740.086310] EXT4-fs error (device loop0): ext4_mb_generate_buddy:802: group 0, block bitmap and bg descriptor inconsistent: 340 vs 212 free clusters 00:07:50 executing program 7: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x7fffffff}]}) openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) r0 = creat(&(0x7f0000000080)='./file1\x00', 0x0) ioctl$BTRFS_IOC_SCRUB(r0, 0xc400941b, &(0x7f0000000600)={0x0, 0x62, 0x80000001}) pwrite64(r0, &(0x7f0000000000)="a7", 0xfffffd6b, 0x0) accept$packet(0xffffffffffffffff, &(0x7f0000000080)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000100)=0x14) 00:07:50 executing program 3: syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000d1f4655fd1f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b00000000020000280200000284", 0x62, 0x400}, {&(0x7f0000010400)="030000000400000005000000d4", 0xd, 0x800}, {&(0x7f0000010500)="ffffffffff070000000000000000000000000000000000000000000000000080ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff", 0x3f8, 0xc00}, {&(0x7f0000000000)="ed41000000040000d0f4655fd1f4655fd1f4655f13ca7302f6e9dab934", 0x1d, 0x1600}], 0x0, &(0x7f0000000280)=ANY=[]) setxattr$trusted_overlay_upper(&(0x7f0000000540)='./file0\x00', &(0x7f0000000580), &(0x7f00000005c0)={0x0, 0xfb, 0x139, 0x0, 0x0, "eacbf6ff0bc36f5a7bb9fe2ee7bb1e01", "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"}, 0x139, 0x0) getxattr(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)=@random={'security.', ':\x00'}, &(0x7f0000000140)=""/55, 0x37) [ 740.519118] EXT4-fs (loop3): mounted filesystem without journal. Opts: ,errors=continue [ 740.534110] EXT4-fs error (device loop3): ext4_mb_generate_buddy:802: group 0, block bitmap and bg descriptor inconsistent: 276 vs 212 free clusters [ 740.778537] audit: type=1326 audit(1626998870.788:44): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=7034 comm="syz-executor.4" exe="/syz-executor.4" sig=31 arch=c000003e syscall=202 compat=0 ip=0x466609 code=0x0 00:08:03 executing program 1: ioctl$TUNSETQUEUE(0xffffffffffffffff, 0x400454d9, &(0x7f0000000b80)={'bond0\x00'}) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x0, 0x0}) r0 = signalfd4(0xffffffffffffffff, &(0x7f00000000c0), 0x8, 0x0) prctl$PR_SET_MM_MAP(0x23, 0xe, &(0x7f0000000180)={&(0x7f0000ffd000/0x1000)=nil, &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000fff000/0x1000)=nil, &(0x7f0000ffd000/0x1000)=nil, &(0x7f0000ffc000/0x2000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000ffe000/0x2000)=nil, &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000ffd000/0x2000)=nil, &(0x7f0000ffd000/0x2000)=nil, &(0x7f0000000140)="080afc03b8bae061a487765e741c1a3a5a7dea95a0b02b4dbb6944356a", 0x1d}, 0x68) r1 = creat(&(0x7f0000000080)='./file1\x00', 0x0) pwrite64(r1, &(0x7f0000000000)="a7", 0xfffffd6b, 0x0) accept$packet(r0, &(0x7f0000000080)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000100)=0x14) 00:08:03 executing program 7: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x7fffffff}]}) openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) r0 = creat(0x0, 0x0) ioctl$BTRFS_IOC_SCRUB(r0, 0xc400941b, &(0x7f0000000600)={0x0, 0x62, 0x80000001}) pwrite64(r0, &(0x7f0000000000)="a7", 0xfffffd6b, 0x0) accept$packet(0xffffffffffffffff, &(0x7f0000000080)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000100)=0x14) 00:08:03 executing program 4: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x7fffffff}]}) mprotect(&(0x7f0000ffe000/0x1000)=nil, 0x1000, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000080)='sessionid\x00') mmap$IORING_OFF_SQES(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x80010, r0, 0x10000000) 00:08:03 executing program 5: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x7fffffff}]}) r0 = syz_io_uring_complete(0x0) r1 = signalfd4(r0, &(0x7f00000000c0), 0x8, 0x80000) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r1, 0xc0502100, &(0x7f0000000100)={0x0}) ioctl$SECCOMP_IOCTL_NOTIF_SEND(0xffffffffffffffff, 0xc0182101, &(0x7f0000000080)={r2, 0x8000, 0xffffffff}) fallocate(0xffffffffffffffff, 0x2, 0x1000, 0x0) r3 = fork() ptrace(0x10, r3) getpgid(r3) fallocate(r1, 0x2, 0x2, 0x100000001) 00:08:03 executing program 6: r0 = syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) setresuid(0x0, 0x0, 0x0) lstat(&(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) r2 = shmget$private(0x0, 0x4000, 0x2, &(0x7f0000ffa000/0x4000)=nil) getresgid(&(0x7f0000001280)=0x0, &(0x7f00000012c0), &(0x7f0000001300)) r4 = fork() shmctl$IPC_SET(r2, 0x1, &(0x7f0000001340)={{0x1, 0xee01, r3, 0xee00, 0xee00, 0xc9, 0x800}, 0x8001, 0x1, 0x8, 0x5, 0xffffffffffffffff, r4, 0x7}) r5 = shmget$private(0x0, 0x4000, 0x2, &(0x7f0000ffa000/0x4000)=nil) getresgid(&(0x7f0000001280)=0x0, &(0x7f00000012c0), &(0x7f0000001300)) r7 = fork() shmctl$IPC_SET(r5, 0x1, &(0x7f0000001340)={{0x1, 0xee01, r6, 0xee00, 0xee00, 0xc9, 0x800}, 0x8001, 0x1, 0x8, 0x5, 0xffffffffffffffff, r7, 0x7}) mlock(&(0x7f0000400000/0xc00000)=nil, 0xc00000) getresgid(&(0x7f0000000280), &(0x7f00000002c0), &(0x7f0000000300)=0x0) r9 = shmget$private(0x0, 0x4000, 0x2, &(0x7f0000ffa000/0x4000)=nil) getresgid(&(0x7f0000001280)=0x0, &(0x7f00000012c0), &(0x7f0000001300)) r11 = fork() shmctl$IPC_SET(r9, 0x1, &(0x7f0000001340)={{0x1, 0xee01, r10, 0xee00, 0xee00, 0xc9, 0x800}, 0x8001, 0x1, 0x8, 0x5, 0xffffffffffffffff, r11, 0x7}) fstat(r0, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) lsetxattr$system_posix_acl(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='system.posix_acl_default\x00', &(0x7f00000003c0)={{}, {0x1, 0x3}, [{0x2, 0x1}, {0x2, 0x2, 0xee01}], {}, [{0x8, 0x0, 0xffffffffffffffff}, {0x8, 0x6, r1}, {0x8, 0x1, r3}, {0x8, 0x2}, {0x8, 0x4, r6}, {0x8, 0x0, r8}, {0x8, 0x7, r10}, {0x8, 0x0, 0xffffffffffffffff}, {0x8, 0x1, 0xee01}, {0x8, 0x2, r12}], {}, {0x20, 0x1}}, 0x84, 0x0) pivot_root(&(0x7f0000000000)='./file0\x00', &(0x7f0000000240)='.\x00') 00:08:03 executing program 0: syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000d1f4655fd1f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b00000000020000280200000284", 0x62, 0x400}, {&(0x7f0000010400)="030000000400000005000000d4", 0xd, 0x800}, {&(0x7f0000010500)="ffffffffff070000000000000000000000000000000000000000000000000080ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff", 0x3f0, 0xc00}, {&(0x7f0000000000)="ed41000000040000d0f4655fd1f4655fd1f4655f13ca7302f6e9dab934", 0x1d, 0x1600}], 0x0, &(0x7f0000000280)=ANY=[]) setxattr$trusted_overlay_upper(&(0x7f0000000540)='./file0\x00', &(0x7f0000000580), &(0x7f00000005c0)={0x0, 0xfb, 0x139, 0x0, 0x0, "eacbf6ff0bc36f5a7bb9fe2ee7bb1e01", "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"}, 0x139, 0x0) 00:08:03 executing program 3: syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000d1f4655fd1f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b00000000020000280200000284", 0x62, 0x400}, {&(0x7f0000010400)="030000000400000005000000d4", 0xd, 0x800}, {&(0x7f0000010500)="ffffffffff070000000000000000000000000000000000000000000000000080ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff", 0x3f8, 0xc00}, {&(0x7f0000000000)="ed41000000040000d0f4655fd1f4655fd1f4655f13ca7302f6e9dab934", 0x1d, 0x1600}], 0x0, &(0x7f0000000280)=ANY=[]) setxattr$trusted_overlay_upper(&(0x7f0000000540)='./file0\x00', &(0x7f0000000580), &(0x7f00000005c0)={0x0, 0xfb, 0x139, 0x0, 0x0, "eacbf6ff0bc36f5a7bb9fe2ee7bb1e01", "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"}, 0x139, 0x0) getxattr(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)=@random={'security.', ':\x00'}, &(0x7f0000000140)=""/55, 0x37) 00:08:03 executing program 2: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x7fffffff}]}) syz_io_uring_submit(0x0, 0x0, &(0x7f0000000080)=@IORING_OP_TIMEOUT_REMOVE={0xc, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1}, 0x1ff) signalfd4(0xffffffffffffffff, &(0x7f00000000c0), 0x8, 0x0) 00:08:04 executing program 7: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x7fffffff}]}) openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) r0 = creat(0x0, 0x0) ioctl$BTRFS_IOC_SCRUB(r0, 0xc400941b, &(0x7f0000000600)={0x0, 0x62, 0x80000001}) pwrite64(r0, &(0x7f0000000000)="a7", 0xfffffd6b, 0x0) accept$packet(0xffffffffffffffff, &(0x7f0000000080)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000100)=0x14) [ 754.076753] EXT4-fs (loop0): mounted filesystem without journal. Opts: ,errors=continue [ 754.080528] EXT4-fs (loop3): mounted filesystem without journal. Opts: ,errors=continue [ 754.085668] EXT4-fs error (device loop3): ext4_mb_generate_buddy:802: group 0, block bitmap and bg descriptor inconsistent: 276 vs 212 free clusters [ 754.093001] EXT4-fs error (device loop0): ext4_mb_generate_buddy:802: group 0, block bitmap and bg descriptor inconsistent: 340 vs 212 free clusters 00:08:04 executing program 2: openat$null(0xffffffffffffff9c, &(0x7f0000000280), 0x10240, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000240)='./file0\x00', 0x900, 0x4) ioctl$sock_SIOCGIFINDEX_80211(0xffffffffffffffff, 0x8933, &(0x7f00000000c0)={'wlan1\x00', 0x0}) sendmsg$NL80211_CMD_UPDATE_FT_IES(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f00000001c0)={&(0x7f0000000180)={0x28, 0x0, 0x300, 0x70bd2c, 0x25dfdbfd, {{}, {@val={0x8, 0x3, r0}, @val={0xc, 0x99, {0x81, 0x58}}}}}, 0x28}, 0x1, 0x0, 0x0, 0x48000}, 0x80) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x7fffffff}]}) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f0000000100)) 00:08:04 executing program 4: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0xc, &(0x7f0000000040)={0x1, &(0x7f0000000000)=[{0x2, 0xff, 0xff, 0x7f}]}) prctl$PR_SET_SECCOMP(0x16, 0x0, &(0x7f0000000140)={0x5, &(0x7f0000000100)=[{0x7, 0x6, 0x20, 0x200}, {0x5, 0x5, 0x0, 0xbe}, {0x3, 0x5, 0x81, 0x68db}, {0x3, 0x2e, 0x92, 0x100}, {0xfffa, 0x1f, 0x25}]}) r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) close(r0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000200)='./file1\x00', 0x2, 0x0) write$binfmt_script(r1, &(0x7f0000000000)=ANY=[@ANYBLOB='#!\t\n'], 0xb8) close(r1) execveat(0xffffffffffffff9c, &(0x7f0000000280)='./file1\x00', 0x0, 0x0, 0x0) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0xc, &(0x7f00000000c0)={0x4, &(0x7f0000000080)=[{0x9, 0x2, 0x63, 0x2}, {0x2, 0x3, 0x5a, 0x8}, {0x6, 0x4, 0x1f, 0x65}, {0x8, 0x71, 0x1, 0x2}]}) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0xa, &(0x7f00000001c0)={0x3, &(0x7f0000000180)=[{0x1, 0x8, 0x9, 0xb4}, {0x8, 0x0, 0x8, 0x101}, {0xff, 0x7, 0x9, 0x2}]}) mprotect(&(0x7f0000ffe000/0x1000)=nil, 0x1000, 0x0) r2 = openat(0xffffffffffffff9c, 0x0, 0x1c2, 0x27) r3 = open(&(0x7f0000000040)='./file0\x00', 0x1810c1, 0x0) ioctl$BTRFS_IOC_SCRUB_PROGRESS(r2, 0xc400941d, &(0x7f0000000200)={0x0, 0x4, 0xd3, 0x1}) pwrite64(r3, &(0x7f0000000a40)="0f64800203d6484c7ddffad1", 0xc, 0x0) lseek(r3, 0x2, 0x3) fcntl$getflags(r3, 0x401) dup2(r2, r3) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r2, 0xc0502100, &(0x7f0000000200)) 00:08:04 executing program 0: syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000d1f4655fd1f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b00000000020000280200000284", 0x62, 0x400}, {&(0x7f0000010400)="030000000400000005000000d4", 0xd, 0x800}, {&(0x7f0000010500)="ffffffffff070000000000000000000000000000000000000000000000000080ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff", 0x3f0, 0xc00}, {&(0x7f0000000000)="ed41000000040000d0f4655fd1f4655fd1f4655f13ca7302f6e9dab934", 0x1d, 0x1600}], 0x0, &(0x7f0000000280)=ANY=[]) setxattr$trusted_overlay_upper(&(0x7f0000000540)='./file0\x00', &(0x7f0000000580), &(0x7f00000005c0)={0x0, 0xfb, 0x139, 0x0, 0x0, "eacbf6ff0bc36f5a7bb9fe2ee7bb1e01", "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"}, 0x139, 0x0) 00:08:04 executing program 7: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x7fffffff}]}) openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) r0 = creat(0x0, 0x0) ioctl$BTRFS_IOC_SCRUB(r0, 0xc400941b, &(0x7f0000000600)={0x0, 0x62, 0x80000001}) pwrite64(r0, &(0x7f0000000000)="a7", 0xfffffd6b, 0x0) accept$packet(0xffffffffffffffff, &(0x7f0000000080)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000100)=0x14) 00:08:04 executing program 3: syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000d1f4655fd1f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b00000000020000280200000284", 0x62, 0x400}, {&(0x7f0000010400)="030000000400000005000000d4", 0xd, 0x800}, {&(0x7f0000010500)="ffffffffff070000000000000000000000000000000000000000000000000080ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff", 0x3fc, 0xc00}, {&(0x7f0000000000)="ed41000000040000d0f4655fd1f4655fd1f4655f13ca7302f6e9dab934", 0x1d, 0x1600}], 0x0, &(0x7f0000000280)=ANY=[]) setxattr$trusted_overlay_upper(&(0x7f0000000540)='./file0\x00', &(0x7f0000000580), &(0x7f00000005c0)={0x0, 0xfb, 0x139, 0x0, 0x0, "eacbf6ff0bc36f5a7bb9fe2ee7bb1e01", "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"}, 0x139, 0x0) getxattr(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)=@random={'security.', ':\x00'}, &(0x7f0000000140)=""/55, 0x37) 00:08:04 executing program 5: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x7fffffff}]}) signalfd4(0xffffffffffffffff, &(0x7f00000000c0), 0x8, 0x0) r0 = syz_io_uring_complete(0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r0, 0xc0502100, &(0x7f0000000100)) 00:08:04 executing program 2: r0 = seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x7fffffff}]}) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r0, 0xc0502100, &(0x7f0000000100)={0x0}) r2 = openat(0xffffffffffffff9c, 0x0, 0x1c2, 0x27) r3 = open(&(0x7f0000000040)='./file0\x00', 0x1810c1, 0x0) pwrite64(r3, &(0x7f0000000a40)="0f64800203d6484c7ddffad1", 0xc, 0x0) lseek(r3, 0x2, 0x3) fcntl$getflags(r3, 0x401) dup2(r2, r3) ioctl$SECCOMP_IOCTL_NOTIF_ADDFD(r0, 0x40182103, &(0x7f0000000080)={r1, 0x1, r3, 0x6}) signalfd4(0xffffffffffffffff, &(0x7f00000000c0), 0x8, 0x0) [ 754.293109] EXT4-fs (loop0): mounted filesystem without journal. Opts: ,errors=continue [ 754.312818] EXT4-fs error (device loop0): ext4_mb_generate_buddy:802: group 0, block bitmap and bg descriptor inconsistent: 340 vs 212 free clusters [ 754.328976] EXT4-fs (loop3): mounted filesystem without journal. Opts: ,errors=continue [ 754.333122] EXT4-fs error (device loop3): ext4_mb_generate_buddy:802: group 0, block bitmap and bg descriptor inconsistent: 244 vs 212 free clusters 00:08:17 executing program 1: ioctl$TUNSETQUEUE(0xffffffffffffffff, 0x400454d9, &(0x7f0000000b80)={'bond0\x00'}) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x0, 0x0}) r0 = signalfd4(0xffffffffffffffff, &(0x7f00000000c0), 0x8, 0x0) prctl$PR_SET_MM_MAP(0x23, 0xe, &(0x7f0000000180)={&(0x7f0000ffd000/0x1000)=nil, &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000fff000/0x1000)=nil, &(0x7f0000ffd000/0x1000)=nil, &(0x7f0000ffc000/0x2000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000ffe000/0x2000)=nil, &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000ffd000/0x2000)=nil, &(0x7f0000ffd000/0x2000)=nil, &(0x7f0000000140)="080afc03b8bae061a487765e741c1a3a5a7dea95a0b02b4dbb6944356a", 0x1d}, 0x68) r1 = creat(&(0x7f0000000080)='./file1\x00', 0x0) pwrite64(r1, &(0x7f0000000000)="a7", 0xfffffd6b, 0x0) accept$packet(r0, &(0x7f0000000080)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000100)=0x14) 00:08:17 executing program 7: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x7fffffff}]}) openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) r0 = creat(&(0x7f0000000080)='./file1\x00', 0x0) ioctl$BTRFS_IOC_SCRUB(0xffffffffffffffff, 0xc400941b, &(0x7f0000000600)={0x0, 0x62, 0x80000001}) pwrite64(r0, &(0x7f0000000000)="a7", 0xfffffd6b, 0x0) accept$packet(0xffffffffffffffff, &(0x7f0000000080)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000100)=0x14) 00:08:17 executing program 4: r0 = add_key$keyring(&(0x7f0000000040), &(0x7f00000002c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, r0, &(0x7f0000000240)='asymmetric\x00', &(0x7f0000000200)=@secondary) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, r0, 0x0, 0x0) r1 = add_key(&(0x7f0000000100)='trusted\x00', &(0x7f0000000140)={'syz', 0x1}, &(0x7f0000000180)="20d651d38bcc17d2d649cb036e6e436ebae7ae5279d01829389096259ab7cd6bfdee87698699aeb7b13bc9a91e1ee298f8eb1b2a7897a6e49a4ff6f2f7519b8f17fa39d381ede76dca0be4f1310adeab86304ac5cb2ed9461268c5c00cfb225322a699ad7900c84f8f45b350c7199645f128e896b9194c3e501f403a4b0e4d49ee0bb87353f24f0d94acc16be23c77dd3b4dd333a1c5cc14abd3ad2bc580fe21e0145d62ab5e4d214645f19d62536d5244202f4a5806e327a92f7569c91329cdee591481026f5bca0580efd7a08c9d0b9cc963ca1b5f32", 0xd7, 0xfffffffffffffffa) keyctl$search(0xa, r0, &(0x7f0000000080)='.dead\x00', &(0x7f00000000c0)={'syz', 0x0}, r1) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x80, 0x7fffffff}]}) mprotect(&(0x7f0000ffe000/0x1000)=nil, 0x1000, 0x0) 00:08:17 executing program 3: syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000d1f4655fd1f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b00000000020000280200000284", 0x62, 0x400}, {&(0x7f0000010400)="030000000400000005000000d4", 0xd, 0x800}, {&(0x7f0000010500)="ffffffffff070000000000000000000000000000000000000000000000000080ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff", 0x3fc, 0xc00}, {&(0x7f0000000000)="ed41000000040000d0f4655fd1f4655fd1f4655f13ca7302f6e9dab934", 0x1d, 0x1600}], 0x0, &(0x7f0000000280)=ANY=[]) setxattr$trusted_overlay_upper(&(0x7f0000000540)='./file0\x00', &(0x7f0000000580), &(0x7f00000005c0)={0x0, 0xfb, 0x139, 0x0, 0x0, "eacbf6ff0bc36f5a7bb9fe2ee7bb1e01", "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"}, 0x139, 0x0) getxattr(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)=@random={'security.', ':\x00'}, &(0x7f0000000140)=""/55, 0x37) 00:08:17 executing program 0: syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000d1f4655fd1f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b00000000020000280200000284", 0x62, 0x400}, {&(0x7f0000010400)="030000000400000005000000d4", 0xd, 0x800}, {&(0x7f0000010500)="ffffffffff070000000000000000000000000000000000000000000000000080ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff", 0x3f8, 0xc00}, {&(0x7f0000000000)="ed41000000040000d0f4655fd1f4655fd1f4655f13ca7302f6e9dab934", 0x1d, 0x1600}], 0x0, &(0x7f0000000280)=ANY=[]) setxattr$trusted_overlay_upper(&(0x7f0000000540)='./file0\x00', &(0x7f0000000580), &(0x7f00000005c0)={0x0, 0xfb, 0x139, 0x0, 0x0, "eacbf6ff0bc36f5a7bb9fe2ee7bb1e01", "a49dbbc75b5fc0caa97cab3ee231b0d7cf3b9be24c0fb2c145c6f2190b4a29cc525f550d79c74a03eda157db2eae62fde8958cce2a8a4c9d0374e4d6ae09ef4ee733ce4046bee0170cff57584e0671d4f286b9691d37721b43778a4afb3c3d05fd5446d2e0bac5326f43d23126410dfb85efa26b9e1ae8d056c3ebcde0c95e1443304d7a93eb4077f76047b6e13f0e79a9631ac2bd43143854803c698a7f02933d9cbdca121cc857aacabf858f3f904c9dfedb6c03186d99490f35f09de8ab897ea7c58f07dca416e1db55c7a849a91b98d0e0c0c7bf058d86a2e997a0557800a34bb7f5806f2e15e99981cc3fe615a3ff396f7d8da30ea24626263abf0ad50a0ce2dafc55f2b0286b2204114a6754b336a913a75e66ed6a3efd132f668369692f46039d"}, 0x139, 0x0) 00:08:17 executing program 5: r0 = seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x7fffffff}]}) r1 = signalfd4(0xffffffffffffffff, &(0x7f0000000080), 0x8, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, r0, &(0x7f00000000c0)={0x10}) r2 = dup2(0xffffffffffffffff, r0) r3 = openat(0xffffffffffffff9c, 0x0, 0x1c2, 0x27) r4 = open(&(0x7f0000000040)='./file0\x00', 0x1810c1, 0x0) ioctl$BTRFS_IOC_SCRUB_PROGRESS(r3, 0xc400941d, &(0x7f0000000200)={0x0, 0x4, 0xd3, 0x1}) pwrite64(r4, &(0x7f0000000a40)="0f64800203d6484c7ddffad1", 0xc, 0x0) lseek(r4, 0x2, 0x3) fcntl$getflags(r4, 0x401) dup2(r3, r4) epoll_ctl$EPOLL_CTL_MOD(r2, 0x3, r4, &(0x7f0000000180)={0x4}) ioctl$TUNATTACHFILTER(r1, 0x401054d5, &(0x7f0000000140)={0x1, &(0x7f0000000100)=[{0x401, 0x8, 0x80, 0x184e}]}) 00:08:17 executing program 2: r0 = seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x7fffffff}]}) signalfd4(r0, &(0x7f00000000c0), 0x8, 0x0) r1 = openat(0xffffffffffffff9c, 0x0, 0x1c2, 0x27) r2 = open(&(0x7f0000000040)='./file0\x00', 0x1810c1, 0x0) r3 = open_tree(r2, &(0x7f0000000100)='./file0\x00', 0x100) ioctl$BTRFS_IOC_SCRUB_PROGRESS(r1, 0xc400941d, &(0x7f0000000200)={0x0, 0x4, 0xd3, 0x1}) pwrite64(r2, &(0x7f0000000a40)="0f64800203d6484c7ddffad1", 0xc, 0x0) lseek(r2, 0x2, 0x2) ioctl$BTRFS_IOC_RM_DEV_V2(r3, 0x5000943a, &(0x7f0000000a80)={{r2}, 0x0, 0xc, @inherit={0x48, &(0x7f0000000600)=ANY=[@ANYBLOB="0000000000000000000000000000000000000000000000001f000000000000002f00000000000000dd3d00000000000007000000000000007e000000000000001f000000000000009163536250737f7ef04d1df6d540220600e08186814054709121e01d151d2ce7e90666c67e5c8e9190c787434b841bd91dd84ca69273d5236bdb63affd0c6d10fe2637ffaed216ddba6429"]}, @devid=r4}) fcntl$getflags(r2, 0x401) dup2(r1, r2) ioctl$SECCOMP_IOCTL_NOTIF_ADDFD(r1, 0x40182103, &(0x7f0000000080)={0x0, 0x0, r0, 0xd7b2}) 00:08:17 executing program 6: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000040)='proc\x00', 0x0, 0x0) accept4(0xffffffffffffffff, &(0x7f0000000140)=@in6, &(0x7f00000001c0)=0x80, 0x800) llistxattr(&(0x7f0000000200)='./file0\x00', &(0x7f0000000280)=""/150, 0x96) pivot_root(&(0x7f0000000000)='./file0\x00', &(0x7f0000000240)='.\x00') openat$dir(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x2c2001, 0xa) syz_io_uring_setup(0x1432, &(0x7f0000000080)={0x0, 0x0, 0x1}, &(0x7f00000a0000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000000000)=0x0, &(0x7f0000000140)=0x0) syz_io_uring_submit(r0, r1, &(0x7f00000002c0)=@IORING_OP_READ=@use_registered_buffer={0x16, 0x4, 0x0, @fd_index=0x5}, 0x0) syz_io_uring_setup(0x5980, &(0x7f0000001380), &(0x7f0000ffe000/0x2000)=nil, &(0x7f0000ffb000/0x3000)=nil, &(0x7f00000001c0), &(0x7f0000000280)=0x0) syz_io_uring_submit(r0, r2, &(0x7f0000000340)=@IORING_OP_POLL_REMOVE, 0x0) r3 = openat(0xffffffffffffff9c, 0x0, 0x1c2, 0x27) r4 = creat(&(0x7f0000000080)='./file1\x00', 0x0) ioctl$BTRFS_IOC_SCRUB_PROGRESS(r3, 0xc400941d, &(0x7f0000000200)={0x0, 0x4, 0xd3, 0x1}) ioctl$BTRFS_IOC_SCRUB(r4, 0xc400941b, &(0x7f0000000600)={r5, 0x62, 0x80000001}) pwrite64(r4, &(0x7f0000000000)="a7", 0xfffffd6b, 0x0) ioctl$PIO_UNIMAPCLR(r4, 0x4b68, &(0x7f0000000a80)={0x80, 0x4, 0x6}) syz_io_uring_submit(0x0, r2, &(0x7f00000003c0)=@IORING_OP_CONNECT={0x10, 0x3, 0x0, r4, 0x80, &(0x7f0000000340)=@vsock={0x28, 0x0, 0x0, @my=0x0}, 0x0, 0x0, 0x1}, 0x0) 00:08:17 executing program 4: r0 = openat(0xffffffffffffff9c, 0x0, 0x1c2, 0x27) r1 = creat(&(0x7f0000000080)='./file1\x00', 0x0) ioctl$BTRFS_IOC_SCRUB_PROGRESS(r0, 0xc400941d, &(0x7f0000000200)={0x0, 0x4, 0xd3, 0x1}) ioctl$BTRFS_IOC_SCRUB(r1, 0xc400941b, &(0x7f0000000600)={r2, 0x62, 0x80000001}) pwrite64(r1, &(0x7f0000000000)="a7", 0xfffffd6b, 0x0) ioctl$PIO_UNIMAPCLR(r1, 0x4b68, &(0x7f0000000a80)={0x80, 0x4, 0x6}) r3 = openat(0xffffffffffffff9c, 0x0, 0x1c2, 0x27) r4 = open(&(0x7f0000000040)='./file0\x00', 0x1810c1, 0x0) ioctl$BTRFS_IOC_SCRUB_PROGRESS(r3, 0xc400941d, &(0x7f0000000200)={0x0, 0x4, 0xd3, 0x1}) pwrite64(r4, &(0x7f0000000a40)="0f64800203d6484c7ddffad1", 0xc, 0x0) lseek(r4, 0x2, 0x3) fcntl$getflags(r4, 0x401) getsockopt$EBT_SO_GET_ENTRIES(r0, 0x0, 0x81, &(0x7f0000000140)={'broute\x00', 0x0, 0x3, 0xd4, [0x7, 0xffffffffffffba31, 0x0, 0x2f, 0x1, 0x1], 0x1, &(0x7f0000000100)=[{}], &(0x7f0000000ac0)=""/212}, &(0x7f00000001c0)=0x78) dup2(r3, r4) r5 = openat2(r4, &(0x7f0000000a00)='./file1\x00', &(0x7f0000000bc0)={0x82000, 0x6, 0x3}, 0x18) ioctl$TUNSETSNDBUF(r5, 0x400454d4, &(0x7f0000000c00)=0x1) lseek(r3, 0x0, 0x1) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r1, 0xc0502100, &(0x7f0000000080)) mprotect(&(0x7f0000ffe000/0x1000)=nil, 0x1000, 0x0) [ 767.684743] EXT4-fs (loop3): mounted filesystem without journal. Opts: ,errors=continue [ 767.688727] EXT4-fs (loop0): mounted filesystem without journal. Opts: ,errors=continue [ 767.694481] EXT4-fs error (device loop3): ext4_mb_generate_buddy:802: group 0, block bitmap and bg descriptor inconsistent: 244 vs 212 free clusters [ 767.707919] EXT4-fs error (device loop0): ext4_mb_generate_buddy:802: group 0, block bitmap and bg descriptor inconsistent: 276 vs 212 free clusters 00:08:17 executing program 2: arch_prctl$ARCH_GET_CPUID(0x1011) arch_prctl$ARCH_GET_CPUID(0x1011) signalfd4(0xffffffffffffffff, &(0x7f0000000000)={[0x10000]}, 0x8, 0x800) r0 = openat(0xffffffffffffff9c, 0x0, 0x1c2, 0x27) r1 = open(&(0x7f0000000040)='./file0\x00', 0x1810c1, 0x0) ioctl$BTRFS_IOC_SCRUB_PROGRESS(r0, 0xc400941d, &(0x7f0000000200)={0x0, 0x4, 0xd3, 0x1}) pwrite64(r1, &(0x7f0000000a40)="0f64800203d6484c7ddffad1", 0xc, 0x0) lseek(r1, 0x2, 0x3) fcntl$getflags(r1, 0x401) dup2(r0, r1) r2 = syz_open_dev$vcsn(&(0x7f00000000c0), 0xfffffffffffffff7, 0x480000) mount$9p_fd(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000080), 0xc40400, &(0x7f0000000100)={'trans=fd,', {'rfdno', 0x3d, r1}, 0x2c, {'wfdno', 0x3d, r2}, 0x2c, {[{@loose}, {@access_any}, {@cache_none}], [{@mask={'mask', 0x3d, 'MAY_READ'}}, {@fscontext={'fscontext', 0x3d, 'root'}}, {@pcr={'pcr', 0x3d, 0x3f}}]}}) r3 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000640)='net/raw6\x00') r4 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000001c0), 0x0, 0x0) prctl$PR_SET_MM_MAP(0x23, 0xe, &(0x7f0000000180)={&(0x7f0000ffd000/0x1000)=nil, &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000fff000/0x1000)=nil, &(0x7f0000ffd000/0x1000)=nil, &(0x7f0000ffc000/0x2000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000ffe000/0x2000)=nil, &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000ffd000/0x2000)=nil, &(0x7f0000ffd000/0x2000)=nil, &(0x7f0000000140)="080afc03b8bae061a487765e741c1a3a5a7dea95a0b02b4dbb6944356a", 0x1d, r4}, 0x68) getsockopt$inet6_IPV6_IPSEC_POLICY(r1, 0x29, 0x22, &(0x7f0000000680)={{{@in=@private, @in6=@initdev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@remote}, 0x0, @in6=@mcast2}}, &(0x7f0000000780)=0xe8) mount$9p_fd(0x0, &(0x7f00000001c0)='./file0\x00', &(0x7f0000000600), 0x100001, &(0x7f00000007c0)={'trans=fd,', {'rfdno', 0x3d, r3}, 0x2c, {'wfdno', 0x3d, r4}, 0x2c, {[{@nodevmap}], [{@rootcontext={'rootcontext', 0x3d, 'system_u'}}, {@smackfsfloor={'smackfsfloor', 0x3d, 'trans=fd,'}}, {@uid_lt={'uid<', r5}}, {@permit_directio}, {@appraise}, {@fscontext={'fscontext', 0x3d, 'system_u'}}, {@hash}, {@func={'func', 0x3d, 'BPRM_CHECK'}}, {@smackfsroot={'smackfsroot', 0x3d, 'cache=none'}}]}}) 00:08:17 executing program 5: ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x7f) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x7fffffff}]}) signalfd4(0xffffffffffffffff, &(0x7f00000000c0), 0x8, 0x0) 00:08:17 executing program 3: syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000d1f4655fd1f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b00000000020000280200000284", 0x62, 0x400}, {&(0x7f0000010400)="030000000400000005000000d4", 0xd, 0x800}, {&(0x7f0000010500)="ffffffffff070000000000000000000000000000000000000000000000000080ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff", 0x3fc, 0xc00}, {&(0x7f0000000000)="ed41000000040000d0f4655fd1f4655fd1f4655f13ca7302f6e9dab934", 0x1d, 0x1600}], 0x0, &(0x7f0000000280)=ANY=[]) setxattr$trusted_overlay_upper(&(0x7f0000000540)='./file0\x00', &(0x7f0000000580), &(0x7f00000005c0)={0x0, 0xfb, 0x139, 0x0, 0x0, "eacbf6ff0bc36f5a7bb9fe2ee7bb1e01", "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"}, 0x139, 0x0) getxattr(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)=@random={'security.', ':\x00'}, &(0x7f0000000140)=""/55, 0x37) 00:08:17 executing program 0: syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000d1f4655fd1f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b00000000020000280200000284", 0x62, 0x400}, {&(0x7f0000010400)="030000000400000005000000d4", 0xd, 0x800}, {&(0x7f0000010500)="ffffffffff070000000000000000000000000000000000000000000000000080ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff", 0x3f8, 0xc00}, {&(0x7f0000000000)="ed41000000040000d0f4655fd1f4655fd1f4655f13ca7302f6e9dab934", 0x1d, 0x1600}], 0x0, &(0x7f0000000280)=ANY=[]) setxattr$trusted_overlay_upper(&(0x7f0000000540)='./file0\x00', &(0x7f0000000580), &(0x7f00000005c0)={0x0, 0xfb, 0x139, 0x0, 0x0, "eacbf6ff0bc36f5a7bb9fe2ee7bb1e01", "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"}, 0x139, 0x0) 00:08:17 executing program 2: r0 = seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0xff, 0x7fff7fff}]}) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x4, &(0x7f0000000080)=[{0x3, 0x7, 0x80, 0x34c}, {0x9, 0x20, 0x40, 0x4}, {0x7, 0xc4, 0x0, 0x6}, {0x9a, 0x1, 0x5, 0xfff}]}) r1 = seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0xc, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x7fc00002}]}) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r1, 0xc0502100, &(0x7f0000000140)={0x0}) ioctl$SECCOMP_IOCTL_NOTIF_ADDFD(r1, 0xc0182101, &(0x7f00000000c0)={r2}) r3 = openat$rfkill(0xffffffffffffff9c, &(0x7f00000001c0), 0x101000, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_ADDFD(r0, 0x40182103, &(0x7f0000000200)={r2, 0x0, r3, 0x5f0a}) seccomp$SECCOMP_SET_MODE_FILTER(0x1, 0x1, &(0x7f0000000180)={0x8, &(0x7f0000000140)=[{0x81, 0x8, 0x3f, 0x81}, {0x3, 0x7, 0x6, 0x7}, {0xad9, 0x2, 0x0, 0x3e0000}, {0x81, 0x20, 0x0, 0x80000000}, {0x0, 0x0, 0x4, 0x9}, {0x4, 0x9, 0x5, 0x6}, {0x5, 0x20, 0xc3, 0x9}, {0x1, 0x1, 0x11, 0x7fff}]}) signalfd4(0xffffffffffffffff, &(0x7f00000000c0), 0x8, 0x0) 00:08:17 executing program 5: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x7fffffff}]}) r0 = signalfd4(0xffffffffffffffff, &(0x7f00000000c0), 0x8, 0x0) prctl$PR_SET_SECCOMP(0x16, 0x1, &(0x7f0000000100)={0x6, &(0x7f0000000140)=[{0x7, 0x4c, 0xf9, 0x1c1}, {0x8, 0xc1, 0xff, 0xff7fffff}, {0x200, 0x2, 0x2a, 0x6}, {0x1, 0x7, 0x1f, 0x7}, {0x20, 0x7, 0x3, 0x7}, {0x3, 0x1, 0x0, 0x6}]}) openat(r0, &(0x7f0000000080)='./file0\x00', 0x10000, 0x10) [ 767.955189] EXT4-fs (loop3): mounted filesystem without journal. Opts: ,errors=continue [ 767.965631] EXT4-fs error (device loop3): ext4_mb_generate_buddy:802: group 0, block bitmap and bg descriptor inconsistent: 244 vs 212 free clusters [ 767.967254] EXT4-fs (loop0): mounted filesystem without journal. Opts: ,errors=continue [ 767.971248] EXT4-fs error (device loop0): ext4_mb_generate_buddy:802: group 0, block bitmap and bg descriptor inconsistent: 276 vs 212 free clusters [ 768.032925] audit: type=1326 audit(1626998898.043:45): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=7178 comm="syz-executor.5" exe="/syz-executor.5" sig=9 arch=c000003e syscall=231 compat=0 ip=0x466609 code=0x0 00:08:18 executing program 0: syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000d1f4655fd1f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b00000000020000280200000284", 0x62, 0x400}, {&(0x7f0000010400)="030000000400000005000000d4", 0xd, 0x800}, {&(0x7f0000010500)="ffffffffff070000000000000000000000000000000000000000000000000080ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff", 0x3f8, 0xc00}, {&(0x7f0000000000)="ed41000000040000d0f4655fd1f4655fd1f4655f13ca7302f6e9dab934", 0x1d, 0x1600}], 0x0, &(0x7f0000000280)=ANY=[]) setxattr$trusted_overlay_upper(&(0x7f0000000540)='./file0\x00', &(0x7f0000000580), &(0x7f00000005c0)={0x0, 0xfb, 0x139, 0x0, 0x0, "eacbf6ff0bc36f5a7bb9fe2ee7bb1e01", "a49dbbc75b5fc0caa97cab3ee231b0d7cf3b9be24c0fb2c145c6f2190b4a29cc525f550d79c74a03eda157db2eae62fde8958cce2a8a4c9d0374e4d6ae09ef4ee733ce4046bee0170cff57584e0671d4f286b9691d37721b43778a4afb3c3d05fd5446d2e0bac5326f43d23126410dfb85efa26b9e1ae8d056c3ebcde0c95e1443304d7a93eb4077f76047b6e13f0e79a9631ac2bd43143854803c698a7f02933d9cbdca121cc857aacabf858f3f904c9dfedb6c03186d99490f35f09de8ab897ea7c58f07dca416e1db55c7a849a91b98d0e0c0c7bf058d86a2e997a0557800a34bb7f5806f2e15e99981cc3fe615a3ff396f7d8da30ea24626263abf0ad50a0ce2dafc55f2b0286b2204114a6754b336a913a75e66ed6a3efd132f668369692f46039d"}, 0x139, 0x0) [ 768.174070] EXT4-fs (loop0): mounted filesystem without journal. Opts: ,errors=continue [ 768.190128] EXT4-fs error (device loop0): ext4_mb_generate_buddy:802: group 0, block bitmap and bg descriptor inconsistent: 276 vs 212 free clusters 00:08:29 executing program 4: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x7fffffff}]}) r0 = openat(0xffffffffffffff9c, 0x0, 0x1c2, 0x27) r1 = open(&(0x7f0000000040)='./file0\x00', 0x1810c1, 0x0) ioctl$BTRFS_IOC_SCRUB_PROGRESS(r0, 0xc400941d, &(0x7f0000000200)={0x0, 0x4, 0xd3, 0x1}) pwrite64(r1, &(0x7f0000000a40)="0f64800203d6484c7ddffad1", 0xc, 0x0) lseek(r1, 0x2, 0x3) fcntl$getflags(r1, 0x401) dup2(r0, r1) r2 = fork() ptrace(0x10, r2) ptrace$setregs(0xd, r2, 0x0, &(0x7f0000000000)) ptrace$cont(0x9, r2, 0x0, 0x0) pidfd_open(r2, 0x0) fcntl$lock(r0, 0x5, &(0x7f0000000080)={0x0, 0x0, 0x7793, 0xb4d, r2}) mprotect(&(0x7f0000ffe000/0x1000)=nil, 0x1000, 0x0) 00:08:29 executing program 2: openat(0xffffffffffffff9c, 0x0, 0x1c2, 0x27) ioctl$BTRFS_IOC_SCRUB_PROGRESS(0xffffffffffffffff, 0xc400941d, &(0x7f0000000ac0)={0x0, 0x8, 0xcf, 0x1}) ioctl$BTRFS_IOC_SCRUB(0xffffffffffffffff, 0xc400941b, &(0x7f0000000600)={r0, 0x62, 0x80000001}) pwrite64(0xffffffffffffffff, &(0x7f0000000100)="bbdb498753162d5f23f3a41106d49ecbd5e2e3c59788aa57048fe014547466795d4cd578e6f43a8d4a57620104d71f98ea949adb937438b0d51e207baff5b5b86f1911ae8a6c6ddb0ee0532881eceac6e8436ed4b50f37ae34487ddbaf9550f67dfb38913ed9ed25358b82552a3d3273e0ddd4afcfa71e21c959c55d975002110b89f8996a4bc95e6e2ede7b07a03f7988e1f04f4c010d30da4da20cf60eeed95ed9bd544f1b52762dc0a2b03edef1555ad2a416cd63516014c36dbe59b755add8149974469a612179534839ae2cb5c25d3a769086fc3941ba8e", 0xda, 0x7) pwrite64(0xffffffffffffffff, &(0x7f0000000000)="a7", 0xfffffd6b, 0x0) ioctl$PIO_UNIMAPCLR(0xffffffffffffffff, 0x4b68, &(0x7f0000000a80)={0x80, 0x4, 0x6}) openat(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0x101000, 0x9d) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x1c, &(0x7f0000000080)={0x2, &(0x7f0000000000)=[{0x3, 0x4, 0x0, 0x1254}, {0x3, 0xfc, 0xfe, 0x200}]}) write$binfmt_elf32(0xffffffffffffffff, &(0x7f0000001980)=ANY=[@ANYBLOB="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"/1269], 0x3c2) signalfd4(0xffffffffffffffff, &(0x7f00000000c0), 0x8, 0x80000) r1 = openat(0xffffffffffffff9c, 0x0, 0x1c2, 0x27) r2 = open(&(0x7f0000000040)='./file0\x00', 0x1810c1, 0x0) lsetxattr$security_evm(&(0x7f00000012c0)='./file1\x00', &(0x7f0000001300), &(0x7f0000001340)=@sha1={0x1, "c7c537ce8d98e192e085d711dcf71a48275328e4"}, 0x15, 0x2) mount(&(0x7f0000001380)=ANY=[@ANYBLOB="a3a95f6b36ab88a500"], &(0x7f00000013c0)='./file2\x00', &(0x7f0000001400)='bpf\x00', 0x1404000, &(0x7f0000001440)='\x00') ioctl$BTRFS_IOC_SCRUB_PROGRESS(r1, 0xc400941d, &(0x7f0000000200)={0x0, 0x4, 0xd3, 0x1}) pwrite64(r2, &(0x7f0000000a40)="0f64800203d6484c7ddffad1", 0xc, 0x0) lseek(r2, 0x2, 0x3) fcntl$getflags(r2, 0x401) dup2(r1, r2) ioctl$KDFONTOP_SET_DEF(r2, 0x4b72, &(0x7f0000000a00)={0x2, 0x0, 0x18, 0xd, 0x11, &(0x7f0000000ec0)="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"}) 00:08:29 executing program 5: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x7fffffff}]}) signalfd4(0xffffffffffffffff, &(0x7f00000000c0)={[0x100000000]}, 0x8, 0x0) r0 = openat(0xffffffffffffff9c, 0x0, 0x1c2, 0x27) r1 = creat(&(0x7f0000000080)='./file1\x00', 0x0) ioctl$BTRFS_IOC_SCRUB_PROGRESS(r0, 0xc400941d, &(0x7f0000000200)={0x0, 0x4, 0xd3, 0x1}) ioctl$BTRFS_IOC_SCRUB(r1, 0xc400941b, &(0x7f0000000600)={r2, 0x62, 0x80000001}) pwrite64(r1, &(0x7f0000000000)="a7", 0xfffffd6b, 0x0) ioctl$PIO_UNIMAPCLR(r1, 0x4b68, &(0x7f0000000a80)={0x80, 0x4, 0x6}) ioctl$SNDRV_SEQ_IOCTL_SET_PORT_INFO(r1, 0x40a85323, &(0x7f0000000100)={{0x2, 0x7f}, 'port1\x00', 0x84, 0x1000c, 0x2, 0xfffffe00, 0x5, 0x3f, 0x1000, 0x0, 0x2, 0xff}) 00:08:29 executing program 3: syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000d1f4655fd1f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b00000000020000280200000284", 0x62, 0x400}, {&(0x7f0000010400)="030000000400000005000000d4", 0xd, 0x800}, {&(0x7f0000010500)="ffffffffff070000000000000000000000000000000000000000000000000080ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff", 0x3fe, 0xc00}, {&(0x7f0000000000)="ed41000000040000d0f4655fd1f4655fd1f4655f13ca7302f6e9dab934", 0x1d, 0x1600}], 0x0, &(0x7f0000000280)=ANY=[]) setxattr$trusted_overlay_upper(&(0x7f0000000540)='./file0\x00', &(0x7f0000000580), &(0x7f00000005c0)={0x0, 0xfb, 0x139, 0x0, 0x0, "eacbf6ff0bc36f5a7bb9fe2ee7bb1e01", "a49dbbc75b5fc0caa97cab3ee231b0d7cf3b9be24c0fb2c145c6f2190b4a29cc525f550d79c74a03eda157db2eae62fde8958cce2a8a4c9d0374e4d6ae09ef4ee733ce4046bee0170cff57584e0671d4f286b9691d37721b43778a4afb3c3d05fd5446d2e0bac5326f43d23126410dfb85efa26b9e1ae8d056c3ebcde0c95e1443304d7a93eb4077f76047b6e13f0e79a9631ac2bd43143854803c698a7f02933d9cbdca121cc857aacabf858f3f904c9dfedb6c03186d99490f35f09de8ab897ea7c58f07dca416e1db55c7a849a91b98d0e0c0c7bf058d86a2e997a0557800a34bb7f5806f2e15e99981cc3fe615a3ff396f7d8da30ea24626263abf0ad50a0ce2dafc55f2b0286b2204114a6754b336a913a75e66ed6a3efd132f668369692f46039d"}, 0x139, 0x0) getxattr(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)=@random={'security.', ':\x00'}, &(0x7f0000000140)=""/55, 0x37) 00:08:29 executing program 0: syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000d1f4655fd1f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b00000000020000280200000284", 0x62, 0x400}, {&(0x7f0000010400)="030000000400000005000000d4", 0xd, 0x800}, {&(0x7f0000010500)="ffffffffff070000000000000000000000000000000000000000000000000080ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff", 0x3fc, 0xc00}, {&(0x7f0000000000)="ed41000000040000d0f4655fd1f4655fd1f4655f13ca7302f6e9dab934", 0x1d, 0x1600}], 0x0, &(0x7f0000000280)=ANY=[]) setxattr$trusted_overlay_upper(&(0x7f0000000540)='./file0\x00', &(0x7f0000000580), &(0x7f00000005c0)={0x0, 0xfb, 0x139, 0x0, 0x0, "eacbf6ff0bc36f5a7bb9fe2ee7bb1e01", "a49dbbc75b5fc0caa97cab3ee231b0d7cf3b9be24c0fb2c145c6f2190b4a29cc525f550d79c74a03eda157db2eae62fde8958cce2a8a4c9d0374e4d6ae09ef4ee733ce4046bee0170cff57584e0671d4f286b9691d37721b43778a4afb3c3d05fd5446d2e0bac5326f43d23126410dfb85efa26b9e1ae8d056c3ebcde0c95e1443304d7a93eb4077f76047b6e13f0e79a9631ac2bd43143854803c698a7f02933d9cbdca121cc857aacabf858f3f904c9dfedb6c03186d99490f35f09de8ab897ea7c58f07dca416e1db55c7a849a91b98d0e0c0c7bf058d86a2e997a0557800a34bb7f5806f2e15e99981cc3fe615a3ff396f7d8da30ea24626263abf0ad50a0ce2dafc55f2b0286b2204114a6754b336a913a75e66ed6a3efd132f668369692f46039d"}, 0x139, 0x0) 00:08:29 executing program 7: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x7fffffff}]}) openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) r0 = creat(&(0x7f0000000080)='./file1\x00', 0x0) ioctl$BTRFS_IOC_SCRUB(0xffffffffffffffff, 0xc400941b, &(0x7f0000000600)={0x0, 0x62, 0x80000001}) pwrite64(r0, &(0x7f0000000000)="a7", 0xfffffd6b, 0x0) accept$packet(0xffffffffffffffff, &(0x7f0000000080)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000100)=0x14) 00:08:29 executing program 6: syz_mount_image$ext4(0x0, &(0x7f00000001c0)='./file0\x00', 0x1d95, 0x0, 0x0, 0x2018002, 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000040)='proc\x00', 0x0, 0x0) r0 = openat2$dir(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)={0x2240, 0x9, 0x11}, 0x18) openat(r0, &(0x7f0000000200)='./file0\x00', 0x50000, 0x110) r1 = openat(0xffffffffffffff9c, 0x0, 0x1c2, 0x27) r2 = open(&(0x7f0000000040)='./file0\x00', 0x1810c1, 0x0) ioctl$BTRFS_IOC_SCRUB_PROGRESS(r1, 0xc400941d, &(0x7f0000000200)={0x0, 0x4, 0xd3, 0x1}) pwrite64(r2, &(0x7f0000000a40)="0f64800203d6484c7ddffad1", 0xc, 0x0) lseek(r2, 0x2, 0x3) fcntl$getflags(r2, 0x401) dup2(r1, r2) syncfs(r1) creat(&(0x7f0000000100)='./file0\x00', 0x4b) chroot(&(0x7f0000000280)='./file0\x00') pivot_root(&(0x7f0000000000)='./file0\x00', &(0x7f0000000240)='.\x00') inotify_add_watch(0xffffffffffffffff, &(0x7f00000000c0)='./file0\x00', 0x100) 00:08:29 executing program 1: ioctl$TUNSETQUEUE(0xffffffffffffffff, 0x400454d9, &(0x7f0000000b80)={'bond0\x00'}) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x0, &(0x7f0000000040)}) r0 = signalfd4(0xffffffffffffffff, &(0x7f00000000c0), 0x8, 0x0) prctl$PR_SET_MM_MAP(0x23, 0xe, &(0x7f0000000180)={&(0x7f0000ffd000/0x1000)=nil, &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000fff000/0x1000)=nil, &(0x7f0000ffd000/0x1000)=nil, &(0x7f0000ffc000/0x2000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000ffe000/0x2000)=nil, &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000ffd000/0x2000)=nil, &(0x7f0000ffd000/0x2000)=nil, &(0x7f0000000140)="080afc03b8bae061a487765e741c1a3a5a7dea95a0b02b4dbb6944356a", 0x1d}, 0x68) r1 = creat(&(0x7f0000000080)='./file1\x00', 0x0) pwrite64(r1, &(0x7f0000000000)="a7", 0xfffffd6b, 0x0) accept$packet(r0, &(0x7f0000000080)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000100)=0x14) [ 779.311837] EXT4-fs (loop3): mounted filesystem without journal. Opts: ,errors=continue [ 779.312000] EXT4-fs (loop0): mounted filesystem without journal. Opts: ,errors=continue [ 779.320233] EXT4-fs error (device loop3): ext4_mb_generate_buddy:802: group 0, block bitmap and bg descriptor inconsistent: 228 vs 212 free clusters [ 779.340747] EXT4-fs error (device loop0): ext4_mb_generate_buddy:802: group 0, block bitmap and bg descriptor inconsistent: 244 vs 212 free clusters 00:08:29 executing program 3: syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000d1f4655fd1f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b00000000020000280200000284", 0x62, 0x400}, {&(0x7f0000010400)="030000000400000005000000d4", 0xd, 0x800}, {&(0x7f0000010500)="ffffffffff070000000000000000000000000000000000000000000000000080ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff", 0x3fe, 0xc00}, {&(0x7f0000000000)="ed41000000040000d0f4655fd1f4655fd1f4655f13ca7302f6e9dab934", 0x1d, 0x1600}], 0x0, &(0x7f0000000280)=ANY=[]) setxattr$trusted_overlay_upper(&(0x7f0000000540)='./file0\x00', &(0x7f0000000580), &(0x7f00000005c0)={0x0, 0xfb, 0x139, 0x0, 0x0, "eacbf6ff0bc36f5a7bb9fe2ee7bb1e01", "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"}, 0x139, 0x0) getxattr(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)=@random={'security.', ':\x00'}, &(0x7f0000000140)=""/55, 0x37) 00:08:29 executing program 6: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) creat(&(0x7f0000000140)='./file0\x00', 0x2c7) mknod$loop(&(0x7f00000000c0)='./file0\x00', 0x4, 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000040)='proc\x00', 0x4400, 0x0) pivot_root(&(0x7f0000000000)='./file0\x00', &(0x7f0000000240)='.\x00') 00:08:29 executing program 0: syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000d1f4655fd1f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b00000000020000280200000284", 0x62, 0x400}, {&(0x7f0000010400)="030000000400000005000000d4", 0xd, 0x800}, {&(0x7f0000010500)="ffffffffff070000000000000000000000000000000000000000000000000080ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff", 0x3fc, 0xc00}, {&(0x7f0000000000)="ed41000000040000d0f4655fd1f4655fd1f4655f13ca7302f6e9dab934", 0x1d, 0x1600}], 0x0, &(0x7f0000000280)=ANY=[]) setxattr$trusted_overlay_upper(&(0x7f0000000540)='./file0\x00', &(0x7f0000000580), &(0x7f00000005c0)={0x0, 0xfb, 0x139, 0x0, 0x0, "eacbf6ff0bc36f5a7bb9fe2ee7bb1e01", "a49dbbc75b5fc0caa97cab3ee231b0d7cf3b9be24c0fb2c145c6f2190b4a29cc525f550d79c74a03eda157db2eae62fde8958cce2a8a4c9d0374e4d6ae09ef4ee733ce4046bee0170cff57584e0671d4f286b9691d37721b43778a4afb3c3d05fd5446d2e0bac5326f43d23126410dfb85efa26b9e1ae8d056c3ebcde0c95e1443304d7a93eb4077f76047b6e13f0e79a9631ac2bd43143854803c698a7f02933d9cbdca121cc857aacabf858f3f904c9dfedb6c03186d99490f35f09de8ab897ea7c58f07dca416e1db55c7a849a91b98d0e0c0c7bf058d86a2e997a0557800a34bb7f5806f2e15e99981cc3fe615a3ff396f7d8da30ea24626263abf0ad50a0ce2dafc55f2b0286b2204114a6754b336a913a75e66ed6a3efd132f668369692f46039d"}, 0x139, 0x0) [ 779.482945] EXT4-fs (loop3): mounted filesystem without journal. Opts: ,errors=continue [ 779.506052] EXT4-fs (loop0): mounted filesystem without journal. Opts: ,errors=continue [ 779.508388] EXT4-fs error (device loop0): ext4_mb_generate_buddy:802: group 0, block bitmap and bg descriptor inconsistent: 244 vs 212 free clusters [ 779.518653] EXT4-fs error (device loop3): ext4_mb_generate_buddy:802: group 0, block bitmap and bg descriptor inconsistent: 228 vs 212 free clusters 00:08:44 executing program 4: r0 = seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x7fffffff}]}) mprotect(&(0x7f0000ffe000/0x1000)=nil, 0x1000, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r0, 0xc0502100, &(0x7f0000000080)) r1 = dup2(r0, r0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r1, 0xc0502100, &(0x7f0000000100)) 00:08:44 executing program 5: r0 = seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x7fffffff}]}) signalfd4(r0, &(0x7f00000000c0), 0x8, 0x80000) 00:08:44 executing program 1: ioctl$TUNSETQUEUE(0xffffffffffffffff, 0x400454d9, &(0x7f0000000b80)={'bond0\x00'}) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x0, &(0x7f0000000040)}) r0 = signalfd4(0xffffffffffffffff, &(0x7f00000000c0), 0x8, 0x0) prctl$PR_SET_MM_MAP(0x23, 0xe, &(0x7f0000000180)={&(0x7f0000ffd000/0x1000)=nil, &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000fff000/0x1000)=nil, &(0x7f0000ffd000/0x1000)=nil, &(0x7f0000ffc000/0x2000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000ffe000/0x2000)=nil, &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000ffd000/0x2000)=nil, &(0x7f0000ffd000/0x2000)=nil, &(0x7f0000000140)="080afc03b8bae061a487765e741c1a3a5a7dea95a0b02b4dbb6944356a", 0x1d}, 0x68) r1 = creat(&(0x7f0000000080)='./file1\x00', 0x0) pwrite64(r1, &(0x7f0000000000)="a7", 0xfffffd6b, 0x0) accept$packet(r0, &(0x7f0000000080)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000100)=0x14) 00:08:44 executing program 3: syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000d1f4655fd1f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b00000000020000280200000284", 0x62, 0x400}, {&(0x7f0000010400)="030000000400000005000000d4", 0xd, 0x800}, {&(0x7f0000010500)="ffffffffff070000000000000000000000000000000000000000000000000080ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff", 0x3fe, 0xc00}, {&(0x7f0000000000)="ed41000000040000d0f4655fd1f4655fd1f4655f13ca7302f6e9dab934", 0x1d, 0x1600}], 0x0, &(0x7f0000000280)=ANY=[]) setxattr$trusted_overlay_upper(&(0x7f0000000540)='./file0\x00', &(0x7f0000000580), &(0x7f00000005c0)={0x0, 0xfb, 0x139, 0x0, 0x0, "eacbf6ff0bc36f5a7bb9fe2ee7bb1e01", "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"}, 0x139, 0x0) getxattr(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)=@random={'security.', ':\x00'}, &(0x7f0000000140)=""/55, 0x37) 00:08:44 executing program 0: syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000d1f4655fd1f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b00000000020000280200000284", 0x62, 0x400}, {&(0x7f0000010400)="030000000400000005000000d4", 0xd, 0x800}, {&(0x7f0000010500)="ffffffffff070000000000000000000000000000000000000000000000000080ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff", 0x3fc, 0xc00}, {&(0x7f0000000000)="ed41000000040000d0f4655fd1f4655fd1f4655f13ca7302f6e9dab934", 0x1d, 0x1600}], 0x0, &(0x7f0000000280)=ANY=[]) setxattr$trusted_overlay_upper(&(0x7f0000000540)='./file0\x00', &(0x7f0000000580), &(0x7f00000005c0)={0x0, 0xfb, 0x139, 0x0, 0x0, "eacbf6ff0bc36f5a7bb9fe2ee7bb1e01", "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"}, 0x139, 0x0) 00:08:44 executing program 2: r0 = seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x7fffffff}]}) r1 = seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0xc, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x7fc00002}]}) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r1, 0xc0502100, &(0x7f0000000140)={0x0}) ioctl$SECCOMP_IOCTL_NOTIF_ADDFD(r1, 0xc0182101, &(0x7f00000000c0)={r2}) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r0, 0xc0502100, &(0x7f0000000200)={0x0}) r4 = openat$tcp_mem(0xffffffffffffff9c, &(0x7f0000000280)='/proc/sys/net/ipv4/tcp_rmem\x00', 0x1, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_ADDFD(r1, 0x40182103, &(0x7f00000002c0)={r3, 0x1, r4, 0x2, 0x80000}) ioctl$SECCOMP_IOCTL_NOTIF_ADDFD(r0, 0x40182103, &(0x7f0000000080)={r2, 0x0, r0, 0x2}) fsetxattr$trusted_overlay_redirect(r0, &(0x7f0000000100), &(0x7f00000001c0)='./file0\x00', 0x8, 0x2) signalfd4(0xffffffffffffffff, &(0x7f00000000c0), 0x8, 0x0) 00:08:44 executing program 6: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x7, 0x0, 0x0, 0x80401, 0x0) pivot_root(&(0x7f0000000000)='./file0\x00', &(0x7f0000000240)='.\x00') 00:08:44 executing program 7: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x7fffffff}]}) openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) r0 = creat(&(0x7f0000000080)='./file1\x00', 0x0) ioctl$BTRFS_IOC_SCRUB(0xffffffffffffffff, 0xc400941b, 0x0) pwrite64(r0, &(0x7f0000000000)="a7", 0xfffffd6b, 0x0) accept$packet(0xffffffffffffffff, &(0x7f0000000080)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000100)=0x14) 00:08:44 executing program 6: syz_mount_image$ext4(0x0, &(0x7f0000000140)='./file0/file0\x00', 0x9, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000040)='proc\x00', 0x0, 0x0) umount2(&(0x7f00000000c0)='./file0\x00', 0xb) pivot_root(&(0x7f0000000000)='./file0\x00', &(0x7f0000000240)='.\x00') [ 794.152741] EXT4-fs (loop0): mounted filesystem without journal. Opts: ,errors=continue [ 794.153057] EXT4-fs (loop3): mounted filesystem without journal. Opts: ,errors=continue [ 794.161528] EXT4-fs error (device loop0): ext4_mb_generate_buddy:802: group 0, block bitmap and bg descriptor inconsistent: 244 vs 212 free clusters 00:08:44 executing program 5: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x7fffffff}]}) r0 = open(&(0x7f0000000180)='./file0\x00', 0x101800, 0x778f49cc04e79969) setsockopt$packet_fanout_data(r0, 0x107, 0x16, &(0x7f0000000200)={0x7, &(0x7f00000001c0)=[{0x1, 0x2, 0x5, 0x3ff}, {0x3ff, 0x77, 0x8, 0xc9}, {0x1, 0x9, 0x7, 0x4}, {0x7, 0x7f, 0x6, 0x9}, {0x102, 0x7f, 0x48, 0x1000}, {0x0, 0xda, 0x20, 0x9}, {0x2, 0x20, 0x7}]}, 0x10) signalfd4(0xffffffffffffffff, &(0x7f00000000c0), 0x8, 0x0) [ 794.192001] EXT4-fs error (device loop3): ext4_mb_generate_buddy:802: group 0, block bitmap and bg descriptor inconsistent: 228 vs 212 free clusters 00:08:44 executing program 0: syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000d1f4655fd1f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b00000000020000280200000284", 0x62, 0x400}, {&(0x7f0000010400)="030000000400000005000000d4", 0xd, 0x800}, {&(0x7f0000010500)="ffffffffff070000000000000000000000000000000000000000000000000080ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff", 0x3fe, 0xc00}, {&(0x7f0000000000)="ed41000000040000d0f4655fd1f4655fd1f4655f13ca7302f6e9dab934", 0x1d, 0x1600}], 0x0, &(0x7f0000000280)=ANY=[]) setxattr$trusted_overlay_upper(&(0x7f0000000540)='./file0\x00', &(0x7f0000000580), &(0x7f00000005c0)={0x0, 0xfb, 0x139, 0x0, 0x0, "eacbf6ff0bc36f5a7bb9fe2ee7bb1e01", "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"}, 0x139, 0x0) 00:08:44 executing program 4: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x7fffffff}]}) mprotect(&(0x7f0000ffe000/0x1000)=nil, 0x1000, 0x0) get_mempolicy(&(0x7f0000000080), &(0x7f00000000c0), 0x7f, &(0x7f0000ffe000/0x1000)=nil, 0x2) 00:08:44 executing program 6: syz_mount_image$ext4(0x0, &(0x7f00000000c0)='./file0\x00', 0xfffffffffffffffd, 0x0, 0x0, 0x1, 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000040)='proc\x00', 0x0, 0x0) pivot_root(&(0x7f0000000000)='./file0\x00', &(0x7f0000000100)='./file0\x00') r0 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000140), 0x4000, 0x0) fspick(r0, &(0x7f0000000180)='./file0\x00', 0x0) 00:08:44 executing program 3: syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000d1f4655fd1f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b00000000020000280200000284", 0x62, 0x400}, {&(0x7f0000010400)="030000000400000005000000d4", 0xd, 0x800}, {&(0x7f0000010500)="ffffffffff070000000000000000000000000000000000000000000000000080ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff", 0x3ff, 0xc00}, {&(0x7f0000000000)="ed41000000040000d0f4655fd1f4655fd1f4655f13ca7302f6e9dab934", 0x1d, 0x1600}], 0x0, &(0x7f0000000280)=ANY=[]) setxattr$trusted_overlay_upper(&(0x7f0000000540)='./file0\x00', &(0x7f0000000580), &(0x7f00000005c0)={0x0, 0xfb, 0x139, 0x0, 0x0, "eacbf6ff0bc36f5a7bb9fe2ee7bb1e01", "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"}, 0x139, 0x0) getxattr(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)=@random={'security.', ':\x00'}, &(0x7f0000000140)=""/55, 0x37) [ 794.323875] EXT4-fs (loop0): mounted filesystem without journal. Opts: ,errors=continue [ 794.334210] EXT4-fs error (device loop0): ext4_mb_generate_buddy:802: group 0, block bitmap and bg descriptor inconsistent: 228 vs 212 free clusters 00:08:44 executing program 5: process_vm_readv(0xffffffffffffffff, &(0x7f0000000400)=[{&(0x7f0000000140)=""/136, 0x88}, {&(0x7f0000000200)=""/4, 0x4}, {&(0x7f0000000240)=""/156, 0x9c}, {&(0x7f0000000300)=""/234, 0xea}], 0x4, &(0x7f0000000500)=[{&(0x7f0000000440)=""/170, 0xaa}], 0x1, 0x0) arch_prctl$ARCH_GET_GS(0x1004, &(0x7f0000000080)) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x8, &(0x7f0000000000)={0x7, &(0x7f0000000040)=[{0x0, 0x20, 0x63, 0x4}, {0xce2f, 0x34, 0xab, 0xffffffff}, {0x8, 0x4, 0x8, 0x8}, {0x4, 0x3, 0x87, 0x5}, {0x18a9, 0x9, 0x9, 0x3ff}, {0x40, 0x3, 0xb, 0xe8c4}, {0x2, 0x7, 0x1, 0x80000001}]}) signalfd4(0xffffffffffffffff, &(0x7f00000000c0)={[0xffffffffefffffff]}, 0x8, 0x800) arch_prctl$ARCH_GET_GS(0x1004, &(0x7f0000000100)) 00:08:44 executing program 0: syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000d1f4655fd1f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b00000000020000280200000284", 0x62, 0x400}, {&(0x7f0000010400)="030000000400000005000000d4", 0xd, 0x800}, {&(0x7f0000010500)="ffffffffff070000000000000000000000000000000000000000000000000080ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff", 0x3fe, 0xc00}, {&(0x7f0000000000)="ed41000000040000d0f4655fd1f4655fd1f4655f13ca7302f6e9dab934", 0x1d, 0x1600}], 0x0, &(0x7f0000000280)=ANY=[]) setxattr$trusted_overlay_upper(&(0x7f0000000540)='./file0\x00', &(0x7f0000000580), &(0x7f00000005c0)={0x0, 0xfb, 0x139, 0x0, 0x0, "eacbf6ff0bc36f5a7bb9fe2ee7bb1e01", "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"}, 0x139, 0x0) 00:08:44 executing program 4: r0 = seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x9, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x7fffffff}, {0x0, 0x0, 0x7f, 0x7}, {0x5, 0x1, 0x6, 0x7}, {0xdc4c, 0x20, 0x6, 0x17c}, {0x7, 0x0, 0xc0, 0x80000000}, {0x0, 0x7, 0x81, 0x6}, {0x3f, 0x3, 0x3, 0xb436}, {0x3, 0x3f, 0x21, 0x100}, {0xffff, 0x8, 0xee, 0x80000001}]}) mprotect(&(0x7f0000ffe000/0x1000)=nil, 0x1000, 0x0) r1 = mmap$IORING_OFF_SQ_RING(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x2000004, 0x11, 0xffffffffffffffff, 0x0) r2 = openat(0xffffffffffffff9c, 0x0, 0x1c2, 0x27) r3 = open(&(0x7f0000000040)='./file0\x00', 0x1810c1, 0x0) ioctl$BTRFS_IOC_SCRUB_PROGRESS(r2, 0xc400941d, &(0x7f0000000200)={0x0, 0x4, 0xd3, 0x1}) pwrite64(r3, &(0x7f0000000a40)="0f64800203d6484c7ddffad1", 0xc, 0x0) lseek(r3, 0x2, 0x3) fcntl$getflags(r3, 0x401) dup2(r2, r3) syz_io_uring_submit(r1, 0x0, &(0x7f0000000200)=@IORING_OP_FSYNC={0x3, 0x0, 0x0, @fd=r2, 0x0, 0x0, 0x0, 0x1}, 0xf1f) r4 = openat$full(0xffffffffffffff9c, &(0x7f0000000140), 0x40000, 0x0) mmap$IORING_OFF_SQES(&(0x7f0000ffe000/0x1000)=nil, 0x1000, 0x2000000, 0x111810, r4, 0x10000000) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0xa, &(0x7f0000000100)={0x6, &(0x7f0000000040)=[{0x4, 0x81, 0x9, 0x1}, {0x80, 0x0, 0x1, 0xfff}, {0xffff, 0x4, 0x7, 0x7}, {0x5, 0xf, 0x1, 0x9}, {0x5, 0x1, 0x9e, 0x8}, {0x3ff, 0x3, 0x8, 0xffff7fff}]}) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r0, 0xc0502100, &(0x7f0000000180)) 00:08:44 executing program 6: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000180)='./file0\x00', 0x8, 0x3, &(0x7f0000000380)=[{&(0x7f00000001c0)="b2239968344f81ca31763e7118d553348763f7439dcd5fa73f5e511c7e6abada6ec0d87906c150f5211a838832f9c6e7f211f238f453404e94a643e7413bb28604acb78cf63a310dbe994825e686009592cc64b15e8478441b40537f04e7bfc8c9cecc566bbbbc296938a22484deb11f43dbfd126d0e5d1cd540be51584a45f479943571d67376f5e05a646bb86568e5ed109d2e1ac44b835c96df598cf175e80a9d0e51da3c5f7d453e21d1c86e6c79183af49b49468e668c05c145c6d352236a54f864f29130e92e01c23d47bd177b3cf57e041928f0231fe9f5ea575a2b807f587ea624b39aa3e3", 0xe9, 0x8}, {&(0x7f00000002c0)="326466451c6cf62ba24e751be7c7f72aedcbd1b5470f729ab7677f0fa9cb322d83ab340f2b1029002231d1", 0x2b, 0x9}, {&(0x7f0000000300)="8ca6d4b70637bb50ab67109e0912e10c846649f6fa795db2c54cc4e3a3dbfa1d0d8e8f6e2db32976fbfcd4a24cf68d3c5e22ffe2c3af50e1e6b0d55588289a724af03e02adb3b34a56f22e6c1f221988f685efb97d03c51e22d2514b601733a7947195217faa4ab11e0d11f47a4128d4b697aab0cd", 0x75, 0x5}], 0x11040, &(0x7f0000000400)={[{@uni_xlateno}, {@fat=@errors_continue}, {@shortname_win95}, {@shortname_winnt}, {@nonumtail}, {@utf8}, {@rodir}, {@shortname_winnt}, {@numtail}, {@uni_xlateno}], [{@mask={'mask', 0x3d, 'MAY_READ'}}, {@audit}, {@smackfshat={'smackfshat', 0x3d, 'proc\x00'}}, {@uid_gt={'uid>', 0xee00}}]}) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000140)='proc\x00', 0xb89001, 0x0) pivot_root(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='./file0\x00') [ 794.460580] EXT4-fs (loop3): mounted filesystem without journal. Opts: ,errors=continue [ 794.464369] EXT4-fs error (device loop3): ext4_mb_generate_buddy:802: group 0, block bitmap and bg descriptor inconsistent: 220 vs 212 free clusters [ 794.522039] EXT4-fs (loop0): mounted filesystem without journal. Opts: ,errors=continue [ 794.527651] EXT4-fs error (device loop0): ext4_mb_generate_buddy:802: group 0, block bitmap and bg descriptor inconsistent: 228 vs 212 free clusters 00:08:56 executing program 1: ioctl$TUNSETQUEUE(0xffffffffffffffff, 0x400454d9, &(0x7f0000000b80)={'bond0\x00'}) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x0, &(0x7f0000000040)}) r0 = signalfd4(0xffffffffffffffff, &(0x7f00000000c0), 0x8, 0x0) prctl$PR_SET_MM_MAP(0x23, 0xe, &(0x7f0000000180)={&(0x7f0000ffd000/0x1000)=nil, &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000fff000/0x1000)=nil, &(0x7f0000ffd000/0x1000)=nil, &(0x7f0000ffc000/0x2000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000ffe000/0x2000)=nil, &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000ffd000/0x2000)=nil, &(0x7f0000ffd000/0x2000)=nil, &(0x7f0000000140)="080afc03b8bae061a487765e741c1a3a5a7dea95a0b02b4dbb6944356a", 0x1d}, 0x68) r1 = creat(&(0x7f0000000080)='./file1\x00', 0x0) pwrite64(r1, &(0x7f0000000000)="a7", 0xfffffd6b, 0x0) accept$packet(r0, &(0x7f0000000080)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000100)=0x14) 00:08:56 executing program 2: r0 = seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x7fffffff}]}) signalfd4(r0, &(0x7f00000000c0)={[0x5]}, 0x8, 0x0) 00:08:56 executing program 4: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0xc, &(0x7f0000000000)={0x2, &(0x7f0000000080)=[{0xd9c, 0x5, 0x4, 0x4}, {0x7ff, 0x7e, 0x40, 0x6}]}) r0 = openat(0xffffffffffffff9c, 0x0, 0x1c2, 0x27) r1 = creat(&(0x7f0000000080)='./file1\x00', 0x0) ioctl$BTRFS_IOC_SCRUB_PROGRESS(r0, 0xc400941d, &(0x7f0000000200)={0x0, 0x4, 0xd3, 0x1}) ioctl$BTRFS_IOC_SCRUB(r1, 0xc400941b, &(0x7f0000000600)={r2, 0x62, 0x80000001}) pwrite64(r1, &(0x7f0000000000)="a7", 0xfffffd6b, 0x0) ioctl$PIO_UNIMAPCLR(r1, 0x4b68, &(0x7f0000000a80)={0x80, 0x4, 0x6}) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r1, 0xc0502100, &(0x7f0000000100)) mprotect(&(0x7f0000ffe000/0x1000)=nil, 0x1000, 0x0) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0xc, &(0x7f00000000c0)={0x4, &(0x7f0000000040)=[{0x1, 0x7, 0xff}, {0x1, 0x5, 0x8}, {0x3f, 0x5, 0x1, 0x1}, {0x4, 0x3, 0x1, 0x3}]}) 00:08:56 executing program 5: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x7fffffff}]}) signalfd4(0xffffffffffffffff, &(0x7f00000000c0), 0x8, 0x0) r0 = openat(0xffffffffffffff9c, 0x0, 0x1c2, 0x27) r1 = open(&(0x7f0000000040)='./file0\x00', 0x1810c1, 0x0) ioctl$BTRFS_IOC_BALANCE_V2(r1, 0xc4009420, &(0x7f0000000600)={0x1, 0x5, {0x6, @struct={0x7fff, 0x6}, 0x0, 0x9, 0x1, 0x100000000, 0x5b74, 0x3, 0x411, @usage=0xee, 0x7ff, 0x6, [0x9, 0x4, 0x7fff, 0xffff, 0x1, 0x73e]}, {0x8, @usage=0x2, 0x0, 0x1, 0x8, 0x1, 0xfffffffffffffff7, 0x4, 0x10, @struct={0x2, 0x1}, 0x7fffffff, 0x9, [0xfffffffffffffffc, 0x6, 0x5, 0xe6d, 0xcd, 0xff]}, {0x6, @struct={0xf7bc, 0x7fff}, 0x0, 0x4, 0xf966, 0x7ff, 0x8, 0x6, 0x10, @usage=0x6506, 0x100, 0x2, [0x2, 0x9, 0x3, 0x7ff, 0x3, 0x4]}, {0x9, 0x6, 0x10000000000000}}) ioctl$BTRFS_IOC_SCRUB_PROGRESS(r0, 0xc400941d, &(0x7f0000000200)={r2, 0x4, 0xd2, 0x1}) pwrite64(r1, &(0x7f0000000a40)="0f64800203d6484c7ddffad1", 0xc, 0x0) lseek(r1, 0x2, 0x3) fcntl$getflags(r1, 0x401) dup2(r0, r1) ioctl$SECCOMP_IOCTL_NOTIF_ADDFD(0xffffffffffffffff, 0x40182103, &(0x7f0000000080)={0x0, 0x0, r1, 0x4, 0x80000}) 00:08:56 executing program 3: syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000d1f4655fd1f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b00000000020000280200000284", 0x62, 0x400}, {&(0x7f0000010400)="030000000400000005000000d4", 0xd, 0x800}, {&(0x7f0000010500)="ffffffffff070000000000000000000000000000000000000000000000000080ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff", 0x3ff, 0xc00}, {&(0x7f0000000000)="ed41000000040000d0f4655fd1f4655fd1f4655f13ca7302f6e9dab934", 0x1d, 0x1600}], 0x0, &(0x7f0000000280)=ANY=[]) setxattr$trusted_overlay_upper(&(0x7f0000000540)='./file0\x00', &(0x7f0000000580), &(0x7f00000005c0)={0x0, 0xfb, 0x139, 0x0, 0x0, "eacbf6ff0bc36f5a7bb9fe2ee7bb1e01", "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"}, 0x139, 0x0) getxattr(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)=@random={'security.', ':\x00'}, &(0x7f0000000140)=""/55, 0x37) 00:08:56 executing program 0: syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000d1f4655fd1f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b00000000020000280200000284", 0x62, 0x400}, {&(0x7f0000010400)="030000000400000005000000d4", 0xd, 0x800}, {&(0x7f0000010500)="ffffffffff070000000000000000000000000000000000000000000000000080ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff", 0x3fe, 0xc00}, {&(0x7f0000000000)="ed41000000040000d0f4655fd1f4655fd1f4655f13ca7302f6e9dab934", 0x1d, 0x1600}], 0x0, &(0x7f0000000280)=ANY=[]) setxattr$trusted_overlay_upper(&(0x7f0000000540)='./file0\x00', &(0x7f0000000580), &(0x7f00000005c0)={0x0, 0xfb, 0x139, 0x0, 0x0, "eacbf6ff0bc36f5a7bb9fe2ee7bb1e01", "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"}, 0x139, 0x0) 00:08:56 executing program 6: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x2, 0x0, 0x0, 0x824044, 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000040)='proc\x00', 0x400, 0x0) pivot_root(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='.\x00') open$dir(&(0x7f0000000140)='./file0\x00', 0x15d100, 0x20) 00:08:56 executing program 7: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x7fffffff}]}) openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) r0 = creat(&(0x7f0000000080)='./file1\x00', 0x0) ioctl$BTRFS_IOC_SCRUB(0xffffffffffffffff, 0xc400941b, 0x0) pwrite64(r0, &(0x7f0000000000)="a7", 0xfffffd6b, 0x0) accept$packet(0xffffffffffffffff, &(0x7f0000000080)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000100)=0x14) [ 806.369814] EXT4-fs (loop0): mounted filesystem without journal. Opts: ,errors=continue [ 806.373303] EXT4-fs error (device loop0): ext4_mb_generate_buddy:802: group 0, block bitmap and bg descriptor inconsistent: 228 vs 212 free clusters 00:08:56 executing program 0: syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000d1f4655fd1f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b00000000020000280200000284", 0x62, 0x400}, {&(0x7f0000010400)="030000000400000005000000d4", 0xd, 0x800}, {&(0x7f0000010500)="ffffffffff070000000000000000000000000000000000000000000000000080ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff", 0x3ff, 0xc00}, {&(0x7f0000000000)="ed41000000040000d0f4655fd1f4655fd1f4655f13ca7302f6e9dab934", 0x1d, 0x1600}], 0x0, &(0x7f0000000280)=ANY=[]) setxattr$trusted_overlay_upper(&(0x7f0000000540)='./file0\x00', &(0x7f0000000580), &(0x7f00000005c0)={0x0, 0xfb, 0x139, 0x0, 0x0, "eacbf6ff0bc36f5a7bb9fe2ee7bb1e01", "a49dbbc75b5fc0caa97cab3ee231b0d7cf3b9be24c0fb2c145c6f2190b4a29cc525f550d79c74a03eda157db2eae62fde8958cce2a8a4c9d0374e4d6ae09ef4ee733ce4046bee0170cff57584e0671d4f286b9691d37721b43778a4afb3c3d05fd5446d2e0bac5326f43d23126410dfb85efa26b9e1ae8d056c3ebcde0c95e1443304d7a93eb4077f76047b6e13f0e79a9631ac2bd43143854803c698a7f02933d9cbdca121cc857aacabf858f3f904c9dfedb6c03186d99490f35f09de8ab897ea7c58f07dca416e1db55c7a849a91b98d0e0c0c7bf058d86a2e997a0557800a34bb7f5806f2e15e99981cc3fe615a3ff396f7d8da30ea24626263abf0ad50a0ce2dafc55f2b0286b2204114a6754b336a913a75e66ed6a3efd132f668369692f46039d"}, 0x139, 0x0) [ 806.466783] EXT4-fs (loop3): mounted filesystem without journal. Opts: ,errors=continue [ 806.513256] EXT4-fs error (device loop3): ext4_mb_generate_buddy:802: group 0, block bitmap and bg descriptor inconsistent: 220 vs 212 free clusters 00:08:56 executing program 6: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) stat(&(0x7f0000001cc0)='.\x00', &(0x7f0000001c00)={0x0, 0x0, 0x0, 0x0, 0x0}) setresuid(0x0, r0, 0x0) mount$9p_virtio(&(0x7f00000000c0), &(0x7f0000000140)='./file0\x00', &(0x7f0000000180), 0x2000002, &(0x7f0000000280)={'trans=virtio,', {[{@version_u}, {@debug={'debug', 0x3d, 0x9}}, {@nodevmap}, {@fscache}, {@loose}, {@nodevmap}], [{@subj_type={'subj_type', 0x3d, 'proc\x00'}}, {@uid_lt={'uid<', r0}}, {@smackfsdef={'smackfsdef', 0x3d, 'proc\x00'}}, {@defcontext={'defcontext', 0x3d, 'unconfined_u'}}, {@seclabel}, {@obj_type={'obj_type', 0x3d, '+\\'}}]}}) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000040)='proc\x00', 0x0, 0x0) r1 = openat(0xffffffffffffff9c, 0x0, 0x1c2, 0x27) r2 = creat(&(0x7f0000000080)='./file1\x00', 0x0) ioctl$BTRFS_IOC_SCRUB_PROGRESS(r1, 0xc400941d, &(0x7f0000000200)={0x0, 0x4, 0xd3, 0x1}) ioctl$BTRFS_IOC_SCRUB(r2, 0xc400941b, &(0x7f0000000600)={r3, 0x62, 0x80000001}) pwrite64(r2, &(0x7f0000000000)="a7", 0xfffffd6b, 0x0) ioctl$PIO_UNIMAPCLR(r2, 0x4b68, &(0x7f0000000a80)={0x80, 0x4, 0x6}) name_to_handle_at(r2, &(0x7f00000001c0)='./file0\x00', &(0x7f0000000200)=@ceph_nfs_snapfh={0x1c, 0x4e, {0x7fff, 0x1, 0x7, 0x9}}, &(0x7f0000000340), 0x1000) pivot_root(&(0x7f0000000000)='./file0\x00', &(0x7f0000000240)='.\x00') stat(&(0x7f0000000a00)='./file1\x00', &(0x7f0000000ac0)) r4 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000001c0), 0x0, 0x0) prctl$PR_SET_MM_MAP(0x23, 0xe, &(0x7f0000000180)={&(0x7f0000ffd000/0x1000)=nil, &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000fff000/0x1000)=nil, &(0x7f0000ffd000/0x1000)=nil, &(0x7f0000ffc000/0x2000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000ffe000/0x2000)=nil, &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000ffd000/0x2000)=nil, &(0x7f0000ffd000/0x2000)=nil, &(0x7f0000000140)="080afc03b8bae061a487765e741c1a3a5a7dea95a0b02b4dbb6944356a", 0x1d, r4}, 0x68) dup(r4) 00:08:56 executing program 2: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x6, &(0x7f00000001c0)=[{0xd6a, 0x49, 0x3}, {0x5, 0x3f, 0x20, 0x9}, {0x400, 0x1, 0x1f, 0x51e0}, {0xcee3, 0x0, 0x80, 0x7fff}, {0x6, 0x4, 0x8, 0x7}, {0xfffc, 0xc, 0x4, 0x8}]}) r0 = signalfd4(0xffffffffffffffff, &(0x7f00000000c0), 0x8, 0x0) r1 = epoll_create(0x9) r2 = openat$ptmx(0xffffffffffffff9c, 0x0, 0x8100, 0x0) ioctl$TIOCSIG(r2, 0x40045436, 0x0) r3 = socket$netlink(0x10, 0x3, 0x4) r4 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000180), 0xffffffffffffffff) sendmsg$TIPC_NL_LINK_GET(r3, &(0x7f0000000280)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000000240)={&(0x7f00000001c0)={0x4c, r4, 0x1, 0x70bd27, 0x25dfdbfc, {}, [@TIPC_NLA_SOCK={0x18, 0x2, 0x0, 0x1, [@TIPC_NLA_SOCK_CON={0x14, 0x3, 0x0, 0x1, [@TIPC_NLA_CON_FLAG={0x8, 0x1, 0x10000}, @TIPC_NLA_CON_NODE={0x8, 0x2, 0x459}]}]}, @TIPC_NLA_MEDIA={0x20, 0x5, 0x0, 0x1, [@TIPC_NLA_MEDIA_PROP={0x1c, 0x2, 0x0, 0x1, [@TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x17}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x1c}, @TIPC_NLA_PROP_WIN={0x8}]}]}]}, 0x4c}, 0x1, 0x0, 0x0, 0x20040000}, 0x0) r5 = openat$full(0xffffffffffffff9c, &(0x7f0000000440), 0x200c0, 0x0) epoll_create(0x99a7) r6 = syz_genetlink_get_family_id$devlink(&(0x7f00000004c0), r0) sendmsg$DEVLINK_CMD_TRAP_GROUP_GET(r5, &(0x7f0000000700)={&(0x7f0000000480)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f00000006c0)={&(0x7f0000000500)={0x1a8, r6, 0x10, 0x70bd2a, 0x25dfdbff, {}, [{@nsim={{0xe}, {0xf, 0x2, {'netdevsim', 0x0}}}, {0xd}}, {@pci={{0x8}, {0x11}}, {0xd}}, {@pci={{0x8}, {0x11}}, {0xd}}, {@pci={{0x8}, {0x11}}, {0xd}}, {@pci={{0x8}, {0x11}}, {0xd}}, {@pci={{0x8}, {0x11}}, {0xd}}, {@pci={{0x8}, {0x11}}, {0xd}}, {@pci={{0x8}, {0x11}}, {0xd}}, {@nsim={{0xe}, {0xf, 0x2, {'netdevsim', 0x0}}}, {0xd}}]}, 0x1a8}, 0x1, 0x0, 0x0, 0x48850}, 0x4000000) sendmsg$TIPC_NL_LINK_GET(r0, &(0x7f0000000400)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x200}, 0xc, &(0x7f00000003c0)={&(0x7f0000000200)={0x1ac, r4, 0x2, 0x70bd28, 0x25dfdbfc, {}, [@TIPC_NLA_PUBL={0x3c, 0x3, 0x0, 0x1, [@TIPC_NLA_PUBL_UPPER={0x8, 0x3, 0x5596}, @TIPC_NLA_PUBL_UPPER={0x8, 0x3, 0x1}, @TIPC_NLA_PUBL_UPPER={0x8}, @TIPC_NLA_PUBL_UPPER={0x8, 0x3, 0x200}, @TIPC_NLA_PUBL_LOWER={0x8, 0x2, 0xffff}, @TIPC_NLA_PUBL_LOWER={0x8, 0x2, 0x7ff}, @TIPC_NLA_PUBL_UPPER={0x8}]}, @TIPC_NLA_MON={0x1c, 0x9, 0x0, 0x1, [@TIPC_NLA_MON_REF={0x8, 0x2, 0x8001}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x8000}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x4}]}, @TIPC_NLA_PUBL={0x4c, 0x3, 0x0, 0x1, [@TIPC_NLA_PUBL_LOWER={0x8, 0x2, 0x8}, @TIPC_NLA_PUBL_UPPER={0x8, 0x3, 0x9}, @TIPC_NLA_PUBL_LOWER={0x8, 0x2, 0xcaff}, @TIPC_NLA_PUBL_LOWER={0x8, 0x2, 0x7ff}, @TIPC_NLA_PUBL_TYPE={0x8, 0x1, 0x81}, @TIPC_NLA_PUBL_LOWER={0x8, 0x2, 0xa5}, @TIPC_NLA_PUBL_LOWER={0x8, 0x2, 0x1}, @TIPC_NLA_PUBL_TYPE={0x8, 0x1, 0x7ff}, @TIPC_NLA_PUBL_UPPER={0x8, 0x3, 0x3}]}, @TIPC_NLA_LINK={0x10, 0x4, 0x0, 0x1, [@TIPC_NLA_LINK_NAME={0x9, 0x1, 'syz1\x00'}]}, @TIPC_NLA_BEARER={0x48, 0x1, 0x0, 0x1, [@TIPC_NLA_BEARER_NAME={0xa, 0x1, @l2={'ib', 0x3a, 'lo\x00'}}, @TIPC_NLA_BEARER_UDP_OPTS={0x38, 0x4, {{0x14, 0x1, @in={0x2, 0x4e24, @broadcast}}, {0x20, 0x2, @in6={0xa, 0x4e20, 0xe64, @mcast1, 0x1}}}}]}, @TIPC_NLA_MON={0x4c, 0x9, 0x0, 0x1, [@TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x2}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x6}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x2}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x9}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x1}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x10001}, @TIPC_NLA_MON_REF={0x8, 0x2, 0xffffffff}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x8}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0xc0000000}]}, @TIPC_NLA_NODE={0x14, 0x6, 0x0, 0x1, [@TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x9}, @TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_UP={0x4}]}, @TIPC_NLA_PUBL={0x3c, 0x3, 0x0, 0x1, [@TIPC_NLA_PUBL_UPPER={0x8, 0x3, 0x8}, @TIPC_NLA_PUBL_LOWER={0x8, 0x2, 0x3}, @TIPC_NLA_PUBL_LOWER={0x8, 0x2, 0x3}, @TIPC_NLA_PUBL_TYPE={0x8, 0x1, 0xc7}, @TIPC_NLA_PUBL_LOWER={0x8, 0x2, 0x200}, @TIPC_NLA_PUBL_UPPER={0x8, 0x3, 0x4}, @TIPC_NLA_PUBL_TYPE={0x8}]}]}, 0x1ac}, 0x1, 0x0, 0x0, 0x4000}, 0xc480) clock_gettime(0x0, &(0x7f0000000100)={0x0, 0x0}) ppoll(&(0x7f0000000080)=[{r0, 0x8000}, {}, {r1, 0x342}, {r2, 0x2}], 0x4, &(0x7f0000000140)={r7, r8+10000000}, &(0x7f0000000180)={[0x9]}, 0x8) [ 806.556099] EXT4-fs (loop0): mounted filesystem without journal. Opts: ,errors=continue [ 806.558537] EXT4-fs error (device loop0): ext4_mb_generate_buddy:802: group 0, block bitmap and bg descriptor inconsistent: 220 vs 212 free clusters 00:08:56 executing program 0: syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000d1f4655fd1f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b00000000020000280200000284", 0x62, 0x400}, {&(0x7f0000010400)="030000000400000005000000d4", 0xd, 0x800}, {&(0x7f0000010500)="ffffffffff070000000000000000000000000000000000000000000000000080ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff", 0x3ff, 0xc00}, {&(0x7f0000000000)="ed41000000040000d0f4655fd1f4655fd1f4655f13ca7302f6e9dab934", 0x1d, 0x1600}], 0x0, &(0x7f0000000280)=ANY=[]) setxattr$trusted_overlay_upper(&(0x7f0000000540)='./file0\x00', &(0x7f0000000580), &(0x7f00000005c0)={0x0, 0xfb, 0x139, 0x0, 0x0, "eacbf6ff0bc36f5a7bb9fe2ee7bb1e01", "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"}, 0x139, 0x0) [ 806.623702] SELinux: unrecognized netlink message: protocol=4 nlmsg_type=0 sclass=netlink_tcpdiag_socket pid=7355 comm=syz-executor.2 [ 806.645699] EXT4-fs (loop0): mounted filesystem without journal. Opts: ,errors=continue [ 806.648917] EXT4-fs error (device loop0): ext4_mb_generate_buddy:802: group 0, block bitmap and bg descriptor inconsistent: 220 vs 212 free clusters [ 807.433965] SELinux: unrecognized netlink message: protocol=4 nlmsg_type=0 sclass=netlink_tcpdiag_socket pid=7371 comm=syz-executor.2 [ 820.454821] EXT4-fs (loop3): mounted filesystem without journal. Opts: ,errors=continue [ 820.458883] EXT4-fs error (device loop3): ext4_mb_generate_buddy:802: group 0, block bitmap and bg descriptor inconsistent: 220 vs 212 free clusters [ 820.478687] EXT4-fs (loop0): mounted filesystem without journal. Opts: ,errors=continue [ 820.494559] EXT4-fs error (device loop0): ext4_mb_generate_buddy:802: group 0, block bitmap and bg descriptor inconsistent: 220 vs 212 free clusters 00:09:10 executing program 5: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x7fffffff}]}) r0 = syz_open_procfs(0x0, &(0x7f0000001140)='comm\x00') pread64(r0, &(0x7f0000000000)=""/4098, 0x1002, 0x200) signalfd4(0xffffffffffffffff, &(0x7f00000000c0), 0x8, 0x0) 00:09:10 executing program 0: syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000d1f4655fd1f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b00000000020000280200000284", 0x62, 0x400}, {&(0x7f0000010400)="030000000400000005000000d4", 0xd, 0x800}, {&(0x7f0000010500)="ffffffffff070000000000000000000000000000000000000000000000000080ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff", 0x3ff, 0xc00}, {&(0x7f0000000000)="ed41000000040000d0f4655fd1f4655fd1f4655f13ca7302f6e9dab934", 0x1d, 0x1600}], 0x0, &(0x7f0000000280)=ANY=[]) setxattr$trusted_overlay_upper(&(0x7f0000000540)='./file0\x00', &(0x7f0000000580), &(0x7f00000005c0)={0x0, 0xfb, 0x139, 0x0, 0x0, "eacbf6ff0bc36f5a7bb9fe2ee7bb1e01", "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"}, 0x139, 0x0) 00:09:10 executing program 2: r0 = seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x7fffffff}]}) r1 = seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0xc, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x7fc00002}]}) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r1, 0xc0502100, &(0x7f0000000140)={0x0}) ioctl$SECCOMP_IOCTL_NOTIF_ADDFD(r1, 0xc0182101, &(0x7f00000000c0)={r2}) r3 = openat(0xffffffffffffff9c, 0x0, 0x1c2, 0x27) r4 = creat(&(0x7f0000000080)='./file1\x00', 0x0) ioctl$BTRFS_IOC_SCRUB_PROGRESS(r3, 0xc400941d, &(0x7f0000000200)={0x0, 0x4, 0xd3, 0x1}) ioctl$BTRFS_IOC_SCRUB(r4, 0xc400941b, &(0x7f0000000600)={r5, 0x62, 0x80000001}) pwrite64(r4, &(0x7f0000000000)="a7", 0xfffffd6b, 0x0) ioctl$PIO_UNIMAPCLR(r4, 0x4b68, &(0x7f0000000a80)={0x80, 0x4, 0x6}) ioctl$SECCOMP_IOCTL_NOTIF_ADDFD(r0, 0x40182103, &(0x7f0000000080)={r2, 0x1, r4, 0xffffffff, 0x80000}) signalfd4(0xffffffffffffffff, &(0x7f00000000c0), 0x8, 0x0) 00:09:10 executing program 4: getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000080)={{{@in=@dev, @in=@empty, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast2}, 0x0, @in6=@remote}}, &(0x7f0000000180)=0xe8) sendmsg$sock(0xffffffffffffffff, &(0x7f00000004c0)={&(0x7f00000001c0)=@ll={0x11, 0x11, r0, 0x1, 0x8, 0x6, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x3}}, 0x80, &(0x7f00000003c0)=[{&(0x7f0000000240)="b5cd9a417ee41cfff92c1ee01004d7da9ead21e72be841d1d4d6cc7c1ddf1f9443cf7b03ce0bce1cf7b7c02eabcf888d469d1ac3800e44d2a12a8fa0d5b68aecd340306c9c15fb0f9f40e4ebaa9aaf7e1b63665e6aee93bded2e5cd463a2162174f349cd5d946a1662", 0x69}, {&(0x7f00000002c0)="1f97cea846de9ce5c6c69c7e22d973cdc9139fdf52799abab9bcb07c8d8b1ae4d8fc1a11b4676ea7ca2820e6927b8d90fe91c22ab171ae3bb61fbd77ab855a7de267dee084597466b46780ddc7d13c318ba4d473a61f9bbd94f0e2b9a352213076cf4bd69269720c861e0f", 0x6b}, {&(0x7f0000000340)="d94138d13af01954308a8d5cb60cfecc15fc63f870bae25c74bb6e073ac40e3981b09331f821ac38fa6973031d4d53ec838e18794c14681deb726787deb9c8b1185fa534c115f1ab6e9a28083b7f6d70b9e1d417ab16d194dd96f0b55d5439bde42957b33e232900055559037c2076fd11a909de7490760654", 0x79}], 0x3, &(0x7f0000000400)=[@txtime={{0x18}}, @timestamping={{0x14, 0x1, 0x25, 0x5}}, @txtime={{0x18, 0x1, 0x3d, 0x8001}}, @mark={{0x14, 0x1, 0x24, 0xfff}}, @txtime={{0x18, 0x1, 0x3d, 0x6}}, @timestamping={{0x14, 0x1, 0x25, 0xfff}}], 0x90}, 0x8495) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x7fffffff}]}) r1 = openat(0xffffffffffffff9c, 0x0, 0x1c2, 0x27) r2 = creat(&(0x7f0000000080)='./file1\x00', 0x0) ioctl$BTRFS_IOC_SCRUB_PROGRESS(r1, 0xc400941d, &(0x7f0000000200)={0x0, 0x4, 0xd3, 0x1}) ioctl$BTRFS_IOC_SCRUB(r2, 0xc400941b, &(0x7f0000000600)={r3, 0x62, 0x80000001}) pwrite64(r2, &(0x7f0000000000)="a7", 0xfffffd6b, 0x0) ioctl$PIO_UNIMAPCLR(r2, 0x4b68, &(0x7f0000000a80)={0x80, 0x4, 0x6}) r4 = openat(0xffffffffffffff9c, 0x0, 0x1c2, 0x27) r5 = open(&(0x7f0000000040)='./file0\x00', 0x1810c1, 0x0) ioctl$BTRFS_IOC_SCRUB_PROGRESS(r4, 0xc400941d, &(0x7f0000000200)={0x0, 0x4, 0xd3, 0x1}) pwrite64(r5, &(0x7f0000000a40)="0f64800203d6484c7ddffad1", 0xc, 0x0) lseek(r5, 0x2, 0x3) fcntl$getflags(r5, 0x401) dup2(r4, r5) openat$full(0xffffffffffffff9c, &(0x7f0000000a00), 0x92080, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r4, 0xc0502100, &(0x7f0000000b40)) mprotect(&(0x7f0000ffe000/0x1000)=nil, 0x1000, 0x0) 00:09:10 executing program 6: mount(0x0, &(0x7f0000000080)='./file1\x00', &(0x7f0000000040)='proc\x00', 0x800001, 0x0) pivot_root(&(0x7f00000000c0)='./file1\x00', &(0x7f0000000100)='./file1\x00') 00:09:10 executing program 1: ioctl$TUNSETQUEUE(0xffffffffffffffff, 0x400454d9, &(0x7f0000000b80)={'bond0\x00'}) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x0, 0x0, 0x0, 0x7fffffff}]}) r0 = signalfd4(0xffffffffffffffff, &(0x7f00000000c0), 0x8, 0x0) prctl$PR_SET_MM_MAP(0x23, 0xe, &(0x7f0000000180)={&(0x7f0000ffd000/0x1000)=nil, &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000fff000/0x1000)=nil, &(0x7f0000ffd000/0x1000)=nil, &(0x7f0000ffc000/0x2000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000ffe000/0x2000)=nil, &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000ffd000/0x2000)=nil, &(0x7f0000ffd000/0x2000)=nil, &(0x7f0000000140)="080afc03b8bae061a487765e741c1a3a5a7dea95a0b02b4dbb6944356a", 0x1d}, 0x68) r1 = creat(&(0x7f0000000080)='./file1\x00', 0x0) pwrite64(r1, &(0x7f0000000000)="a7", 0xfffffd6b, 0x0) accept$packet(r0, &(0x7f0000000080)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000100)=0x14) 00:09:10 executing program 7: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x7fffffff}]}) openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) r0 = creat(&(0x7f0000000080)='./file1\x00', 0x0) ioctl$BTRFS_IOC_SCRUB(0xffffffffffffffff, 0xc400941b, 0x0) pwrite64(r0, &(0x7f0000000000)="a7", 0xfffffd6b, 0x0) accept$packet(0xffffffffffffffff, &(0x7f0000000080)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000100)=0x14) 00:09:10 executing program 3: syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000d1f4655fd1f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b00000000020000280200000284", 0x62, 0x400}, {&(0x7f0000010400)="030000000400000005000000d4", 0xd, 0x800}, {&(0x7f0000010500)="ffffffffff070000000000000000000000000000000000000000000000000080ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff", 0x3ff, 0xc00}, {&(0x7f0000000000)="ed41000000040000d0f4655fd1f4655fd1f4655f13ca7302f6e9dab934", 0x1d, 0x1600}], 0x0, &(0x7f0000000280)=ANY=[]) setxattr$trusted_overlay_upper(&(0x7f0000000540)='./file0\x00', &(0x7f0000000580), &(0x7f00000005c0)={0x0, 0xfb, 0x139, 0x0, 0x0, "eacbf6ff0bc36f5a7bb9fe2ee7bb1e01", "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"}, 0x139, 0x0) getxattr(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)=@random={'security.', ':\x00'}, &(0x7f0000000140)=""/55, 0x37) 00:09:10 executing program 6: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r0 = openat(0xffffffffffffff9c, 0x0, 0x1c2, 0x27) r1 = creat(&(0x7f0000000a00)='./file0\x00', 0x0) ioctl$BTRFS_IOC_SCRUB_PROGRESS(r0, 0xc400941d, &(0x7f0000000200)={0x0, 0x4, 0xd3, 0x1}) ioctl$BTRFS_IOC_SCRUB(r1, 0xc400941b, &(0x7f0000000600)={r2, 0x62, 0x80000001}) pwrite64(r1, &(0x7f0000000000)="a7", 0x1, 0x100000000000) ioctl$PIO_UNIMAPCLR(r1, 0x4b68, &(0x7f0000000a80)={0x80, 0x4, 0x6}) r3 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$GIO_SCRNMAP(r3, 0xc0045878, 0x0) openat(r1, &(0x7f0000000040)='./file0\x00', 0xc0040, 0x1) mount(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000080)='mqueue\x00', 0x1104025, 0x0) llistxattr(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)=""/169, 0xa9) pivot_root(&(0x7f0000000000)='./file0\x00', &(0x7f0000000240)='./file0\x00') 00:09:23 executing program 4: syz_genetlink_get_family_id$netlbl_mgmt(&(0x7f0000000040), 0xffffffffffffffff) 00:09:23 executing program 1: ioctl$TUNSETQUEUE(0xffffffffffffffff, 0x400454d9, &(0x7f0000000b80)={'bond0\x00'}) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x0, 0x0, 0x0, 0x7fffffff}]}) r0 = signalfd4(0xffffffffffffffff, &(0x7f00000000c0), 0x8, 0x0) prctl$PR_SET_MM_MAP(0x23, 0xe, &(0x7f0000000180)={&(0x7f0000ffd000/0x1000)=nil, &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000fff000/0x1000)=nil, &(0x7f0000ffd000/0x1000)=nil, &(0x7f0000ffc000/0x2000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000ffe000/0x2000)=nil, &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000ffd000/0x2000)=nil, &(0x7f0000ffd000/0x2000)=nil, &(0x7f0000000140)="080afc03b8bae061a487765e741c1a3a5a7dea95a0b02b4dbb6944356a", 0x1d}, 0x68) r1 = creat(&(0x7f0000000080)='./file1\x00', 0x0) pwrite64(r1, &(0x7f0000000000)="a7", 0xfffffd6b, 0x0) accept$packet(r0, &(0x7f0000000080)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000100)=0x14) 00:09:23 executing program 3: syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000d1f4655fd1f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b00000000020000280200000284", 0x62, 0x400}, {&(0x7f0000010400)="030000000400000005000000d4", 0xd, 0x800}, {&(0x7f0000010500)="ffffffffff070000000000000000000000000000000000000000000000000080ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff", 0x400}, {&(0x7f0000000000)="ed41000000040000d0f4655fd1f4655fd1f4655f13ca7302f6e9dab934", 0x1d, 0x1600}], 0x0, &(0x7f0000000280)=ANY=[]) setxattr$trusted_overlay_upper(&(0x7f0000000540)='./file0\x00', &(0x7f0000000580), &(0x7f00000005c0)={0x0, 0xfb, 0x139, 0x0, 0x0, "eacbf6ff0bc36f5a7bb9fe2ee7bb1e01", "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"}, 0x139, 0x0) getxattr(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)=@random={'security.', ':\x00'}, &(0x7f0000000140)=""/55, 0x37) 00:09:23 executing program 6: r0 = syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000040)='proc\x00', 0x0, 0x0) pivot_root(&(0x7f0000000000)='./file0\x00', &(0x7f0000000240)='.\x00') openat(r0, &(0x7f0000000140)='./file0\x00', 0x80000, 0x8) umount2(&(0x7f00000000c0)='./file0\x00', 0x4) 00:09:23 executing program 5: r0 = openat$incfs(0xffffffffffffff9c, &(0x7f0000000080)='.pending_reads\x00', 0x40000, 0x13) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000040), 0xffffffffffffffff) r3 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r4 = openat(0xffffffffffffff9c, 0x0, 0x1c2, 0x27) r5 = open(&(0x7f0000000040)='./file0\x00', 0x1810c1, 0x0) ioctl$BTRFS_IOC_SCRUB_PROGRESS(r4, 0xc400941d, &(0x7f0000000200)={0x0, 0x4, 0xd3, 0x1}) pwrite64(r5, &(0x7f0000000a40)="0f64800203d6484c7ddffad1", 0xc, 0x0) lseek(r5, 0x2, 0x3) fcntl$getflags(r5, 0x401) dup2(r4, r5) setsockopt$inet6_tcp_TLS_TX(r5, 0x6, 0x1, &(0x7f00000001c0)=@ccm_128={{0x303}, "439f2c011dafedea", "bf2f6f0243ed301f23fcafbc13b700", "d21296a6", "ebdf2281c2446ac3"}, 0x28) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000000140)={'lo\x00', 0x0}) sendmsg$ETHTOOL_MSG_FEATURES_SET(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000000180)={0x34, r2, 0x1, 0x0, 0x0, {}, [@ETHTOOL_A_FEATURES_HEADER={0xc, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r6}]}, @ETHTOOL_A_FEATURES_WANTED={0x14, 0x3, 0x0, 0x1, [@ETHTOOL_A_BITSET_BITS={0x10, 0x3, 0x0, 0x1, [{0xc, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_NAME={0x5, 0x2, '\x00'}]}]}]}]}, 0x34}}, 0x0) sendmsg$ETHTOOL_MSG_EEE_SET(r0, &(0x7f0000000580)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x16000802}, 0xc, &(0x7f0000000540)={&(0x7f0000000600)={0x3bc, r2, 0x100, 0x70bd28, 0x25dfdbfe, {}, [@ETHTOOL_A_EEE_TX_LPI_ENABLED={0x5}, @ETHTOOL_A_EEE_MODES_OURS={0x378, 0x2, 0x0, 0x1, [@ETHTOOL_A_BITSET_SIZE={0x8, 0x2, 0x7}, @ETHTOOL_A_BITSET_VALUE={0xf3, 0x4, "00e97dc630160636e457c40003d8269cc143133eeba97cc0a5f9a0998fbba16f5014dd7496a9786b505a4adb50701faef8d1a251ad4e84a8365cac7498b4c98a751e3891d8a3c8024c6699ef5964dd0a70e3f93a6ad7127c4aef3b331f6dc887edc425ee2206ed6b5347daf422e3655c5e3f19533e261883cc6d259004b0fb62b93941c35e9644207b3a4400287701d2da5ea57e58b20eae88845375ce0af7c577478220a68cee292f53c783a7f253de2d23909a8568b8e6a1ed9a7d67b1beb603a4583db06536dff62b28eac8e576a7b68491ad0fde6dca31499673b06b14d60a11b1f714a7e9872a331a11bfdbb6"}, @ETHTOOL_A_BITSET_BITS={0x150, 0x3, 0x0, 0x1, [{0x24, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_NAME={0xa, 0x2, '{+%+#\x00'}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x9}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}]}, {0x30, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_NAME={0x7, 0x2, '/\\\x00'}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x98}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x5}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0xdd}, @ETHTOOL_A_BITSET_BIT_NAME={0xa, 0x2, 'N^)\\#\x00'}]}, {0x8, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_VALUE={0x4}]}, {0x4}, {0xc, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_INDEX={0x8}]}, {0x44, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x2}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_NAME={0x6, 0x2, '}\x00'}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x9}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_NAME={0x6, 0x2, '-\x00'}, @ETHTOOL_A_BITSET_BIT_NAME={0x5, 0x2, '\x00'}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0xb27}]}, {0x24, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x9}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_NAME={0x6, 0x2, '#\x00'}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x8}]}, {0x58, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_NAME={0xe, 0x2, '%[&$)$\\/^\x00'}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x1}, @ETHTOOL_A_BITSET_BIT_NAME={0xe, 0x2, '%[&$)$\\/^\x00'}, @ETHTOOL_A_BITSET_BIT_NAME={0x7, 0x2, ':\\\x00'}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0xffffffff}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8}, @ETHTOOL_A_BITSET_BIT_NAME={0x9, 0x2, '{+(\xcb\x00'}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}]}, {0x20, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_NAME={0x8, 0x2, '!!{\x00'}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x5}, @ETHTOOL_A_BITSET_BIT_NAME={0x6, 0x2, 'e\x00'}]}]}, @ETHTOOL_A_BITSET_NOMASK={0x4}, @ETHTOOL_A_BITSET_VALUE={0x41, 0x4, "2f0f620aae1ce6238fb1ebbba7e44f24113e49b05cc725cd7b996f3e3d1acb6cfe77e380541ebe9088545f600f9ae43fbd39043f008fbc90120291b047"}, @ETHTOOL_A_BITSET_MASK={0x70, 0x5, "e9adddfbdda4233464a8f3cb3e445fa41ba07820364637f00849e680e9f4e6fda8a793f50ae8e41fab6fea57d713403a09f713618130303f3b842f2a5e9ab565573d4fc8d6bca0471e0e6845bac0bba930cb0ed01803a2ddf99435432c77cee1cc36e9f670e54835a7a5d620"}, @ETHTOOL_A_BITSET_VALUE={0x5, 0x4, "e1"}, @ETHTOOL_A_BITSET_SIZE={0x8, 0x2, 0x8000}, @ETHTOOL_A_BITSET_MASK={0x59, 0x5, "1d1ea294e7f46cec62c2ed1e3e18dc30d7d95fc2dff0dfd733f7286778fe8819800583ac1d0aa05ea4e38fc3b0b954d9f4326d7e1f513818dfd95cd88b4d6a99c26a2b92ed68a289326599a15a391479497554437b"}, @ETHTOOL_A_BITSET_MASK={0x4}]}, @ETHTOOL_A_EEE_TX_LPI_ENABLED={0x5}, @ETHTOOL_A_EEE_HEADER={0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'gretap0\x00'}]}, @ETHTOOL_A_EEE_TX_LPI_ENABLED={0x5, 0x6, 0x1}]}, 0x3bc}, 0x1, 0x0, 0x0, 0x20004040}, 0x80) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x7fffffff}]}) signalfd4(0xffffffffffffffff, &(0x7f00000000c0), 0x8, 0x0) r7 = socket$netlink(0x10, 0x3, 0x6) getsockopt$IP_VS_SO_GET_INFO(r7, 0x0, 0x481, &(0x7f0000001740), &(0x7f0000001780)=0xc) 00:09:23 executing program 0: syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000d1f4655fd1f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b00000000020000280200000284", 0x62, 0x400}, {&(0x7f0000010400)="030000000400000005000000d4", 0xd, 0x800}, {&(0x7f0000010500)="ffffffffff070000000000000000000000000000000000000000000000000080ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff", 0x400}, {&(0x7f0000000000)="ed41000000040000d0f4655fd1f4655fd1f4655f13ca7302f6e9dab934", 0x1d, 0x1600}], 0x0, &(0x7f0000000280)=ANY=[]) setxattr$trusted_overlay_upper(&(0x7f0000000540)='./file0\x00', &(0x7f0000000580), &(0x7f00000005c0)={0x0, 0xfb, 0x139, 0x0, 0x0, "eacbf6ff0bc36f5a7bb9fe2ee7bb1e01", "a49dbbc75b5fc0caa97cab3ee231b0d7cf3b9be24c0fb2c145c6f2190b4a29cc525f550d79c74a03eda157db2eae62fde8958cce2a8a4c9d0374e4d6ae09ef4ee733ce4046bee0170cff57584e0671d4f286b9691d37721b43778a4afb3c3d05fd5446d2e0bac5326f43d23126410dfb85efa26b9e1ae8d056c3ebcde0c95e1443304d7a93eb4077f76047b6e13f0e79a9631ac2bd43143854803c698a7f02933d9cbdca121cc857aacabf858f3f904c9dfedb6c03186d99490f35f09de8ab897ea7c58f07dca416e1db55c7a849a91b98d0e0c0c7bf058d86a2e997a0557800a34bb7f5806f2e15e99981cc3fe615a3ff396f7d8da30ea24626263abf0ad50a0ce2dafc55f2b0286b2204114a6754b336a913a75e66ed6a3efd132f668369692f46039d"}, 0x139, 0x0) 00:09:23 executing program 7: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x7fffffff}]}) openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) r0 = creat(&(0x7f0000000080)='./file1\x00', 0x0) ioctl$BTRFS_IOC_SCRUB(0xffffffffffffffff, 0xc400941b, &(0x7f0000000600)={0x0, 0x0, 0x80000001}) pwrite64(r0, &(0x7f0000000000)="a7", 0xfffffd6b, 0x0) accept$packet(0xffffffffffffffff, &(0x7f0000000080)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000100)=0x14) 00:09:23 executing program 2: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x7fffffff}]}) signalfd4(0xffffffffffffffff, &(0x7f00000000c0), 0x8, 0x0) pidfd_open(0x0, 0x0) r0 = pidfd_open(0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, r0, &(0x7f0000000080)={0x20000000}) 00:09:23 executing program 6: syz_io_uring_submit(0x0, 0x0, &(0x7f00000000c0)=@IORING_OP_POLL_REMOVE={0x7, 0x4, 0x0, 0x0, 0x0, 0x1}, 0x8000) r0 = accept(0xffffffffffffffff, &(0x7f0000000140)=@caif=@util, &(0x7f00000001c0)=0x80) r1 = syz_io_uring_setup(0x1, &(0x7f0000000080), &(0x7f0000ffd000/0x2000)=nil, &(0x7f0000ffc000/0x2000)=nil, &(0x7f0000000100)=0x0, &(0x7f0000000140)=0x0) r4 = io_uring_register$IORING_REGISTER_PERSONALITY(r1, 0x9, 0x0, 0x0) io_uring_register$IORING_UNREGISTER_PERSONALITY(r1, 0xa, 0x0, 0x0) syz_io_uring_submit(r2, r3, &(0x7f0000000000)=@IORING_OP_FSYNC={0x3, 0x0, 0x0, @fd=r1, 0x0, 0x0, 0x0, 0x0, 0x0, {0x0, r4}}, 0x0) io_uring_enter(r1, 0x1, 0x0, 0x0, 0x0, 0x0) io_uring_register$IORING_UNREGISTER_PERSONALITY(r1, 0xa, 0x0, r4) syz_io_uring_submit(0x0, 0x0, &(0x7f0000001a00)=@IORING_OP_RECVMSG={0xa, 0x3, 0x0, r0, 0x0, &(0x7f00000019c0)={&(0x7f0000000280)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @remote}}}, 0x80, &(0x7f0000000900)=[{&(0x7f0000000200)=""/13, 0xd}, {&(0x7f0000000300)=""/130, 0x82}, {&(0x7f00000003c0)=""/96, 0x60}, {&(0x7f0000000440)=""/74, 0x4a}, {&(0x7f00000004c0)=""/194, 0xc2}, {&(0x7f00000005c0)=""/199, 0xc7}, {&(0x7f00000006c0)=""/134, 0x86}, {&(0x7f0000000780)=""/209, 0xd1}, {&(0x7f0000000880)=""/108, 0x6c}], 0x9, &(0x7f00000009c0)=""/4096, 0x1000}, 0x0, 0x40, 0x1, {0x0, r4}}, 0xffff) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x800090, 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000040)='jfs\x00', 0x0, 0x0) pivot_root(&(0x7f0000000000)='./file0\x00', &(0x7f0000000240)='.\x00') [ 833.462254] EXT4-fs (loop0): mounted filesystem without journal. Opts: ,errors=continue [ 833.463991] EXT4-fs (loop3): mounted filesystem without journal. Opts: ,errors=continue [ 833.467697] EXT4-fs error (device loop3): ext4_validate_block_bitmap:398: comm syz-executor.3: bg 0: block 3: invalid block bitmap [ 833.470049] EXT4-fs error (device loop0): ext4_validate_block_bitmap:398: comm syz-executor.0: bg 0: block 3: invalid block bitmap 00:09:23 executing program 5: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x7fffffff}]}) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x2, &(0x7f0000000100)={0x3, &(0x7f0000000080)=[{0x7f, 0x80, 0xa0, 0x9}, {0x0, 0x7, 0x9, 0x2}, {0x7e, 0x7, 0x9, 0xa60}]}) signalfd4(0xffffffffffffffff, &(0x7f00000000c0), 0x8, 0x0) 00:09:23 executing program 2: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x7fffffff}]}) r0 = signalfd4(0xffffffffffffffff, &(0x7f00000000c0), 0x8, 0x0) ioctl$TUNSETPERSIST(r0, 0x400454cb, 0x0) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100), 0x24000, 0x0) ioctl$TUNSETSNDBUF(r1, 0x400454d4, &(0x7f0000000140)=0x4) r2 = openat(0xffffffffffffff9c, 0x0, 0x1c2, 0x27) r3 = openat(0xffffffffffffff9c, 0x0, 0x1c2, 0x27) r4 = open(&(0x7f0000000040)='./file0\x00', 0x1810c1, 0x0) ioctl$BTRFS_IOC_SCRUB_PROGRESS(r3, 0xc400941d, &(0x7f0000000200)={0x0, 0x4, 0xd3, 0x1}) pwrite64(r4, &(0x7f0000000a40)="0f64800203d6484c7ddffad1", 0xc, 0x0) lseek(r4, 0x2, 0x3) fcntl$getflags(r4, 0x401) dup2(r3, r4) io_submit(0x0, 0x2, &(0x7f0000001080)=[&(0x7f0000000f40)={0x0, 0x0, 0x0, 0x7, 0xff, 0xffffffffffffffff, &(0x7f0000000ac0)="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", 0x18a, 0x1}, &(0x7f0000001040)={0x0, 0x0, 0x0, 0x2, 0x4, r2, &(0x7f0000000c80)="4dda61bb63eab4ba056c58540d62c144ab9efc13962553655c5d5b347dfaddafd91cfb975c4e197ecc778393b7f24edd3068f8425690a0ed4771aed0b118cce21c414ffdcb41af9b152e83d552e6c960b0c6fdabcc5e5263eb85e6dd11ba7f5fb5cfbfca02462b29cf02aa6c04411efb6baa3a16b53385c51ab90d1ca1c1c090de076e91d444d4a37c49", 0x8a, 0x3, 0x0, 0x0, r2}]) r5 = creat(&(0x7f0000000080)='./file1\x00', 0x0) ioctl$BTRFS_IOC_SCRUB_PROGRESS(r2, 0xc400941d, &(0x7f0000000200)={0x0, 0x4, 0xd3, 0x1}) ioctl$BTRFS_IOC_SCRUB(r5, 0xc400941b, &(0x7f0000000600)={r6, 0x62, 0x80000001}) pwrite64(r5, &(0x7f0000000000)="a7", 0xfffffd6b, 0x0) ioctl$PIO_UNIMAPCLR(r5, 0x4b68, &(0x7f0000000a80)={0x80, 0x4, 0x6}) epoll_ctl$EPOLL_CTL_ADD(r5, 0x1, r0, &(0x7f0000000080)={0x10000000}) 00:09:23 executing program 0: syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000d1f4655fd1f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b00000000020000280200000284", 0x62, 0x400}, {&(0x7f0000010400)="030000000400000005000000d4", 0xd, 0x800}, {&(0x7f0000010500)="ffffffffff070000000000000000000000000000000000000000000000000080ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff", 0x400}, {&(0x7f0000000000)="ed41000000040000d0f4655fd1f4655fd1f4655f13ca7302f6e9dab934", 0x1d, 0x1600}], 0x0, &(0x7f0000000280)=ANY=[]) setxattr$trusted_overlay_upper(&(0x7f0000000540)='./file0\x00', &(0x7f0000000580), &(0x7f00000005c0)={0x0, 0xfb, 0x139, 0x0, 0x0, "eacbf6ff0bc36f5a7bb9fe2ee7bb1e01", "a49dbbc75b5fc0caa97cab3ee231b0d7cf3b9be24c0fb2c145c6f2190b4a29cc525f550d79c74a03eda157db2eae62fde8958cce2a8a4c9d0374e4d6ae09ef4ee733ce4046bee0170cff57584e0671d4f286b9691d37721b43778a4afb3c3d05fd5446d2e0bac5326f43d23126410dfb85efa26b9e1ae8d056c3ebcde0c95e1443304d7a93eb4077f76047b6e13f0e79a9631ac2bd43143854803c698a7f02933d9cbdca121cc857aacabf858f3f904c9dfedb6c03186d99490f35f09de8ab897ea7c58f07dca416e1db55c7a849a91b98d0e0c0c7bf058d86a2e997a0557800a34bb7f5806f2e15e99981cc3fe615a3ff396f7d8da30ea24626263abf0ad50a0ce2dafc55f2b0286b2204114a6754b336a913a75e66ed6a3efd132f668369692f46039d"}, 0x139, 0x0) 00:09:23 executing program 3: syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000d1f4655fd1f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b00000000020000280200000284", 0x62, 0x400}, {&(0x7f0000010400)="030000000400000005000000d4", 0xd, 0x800}, {&(0x7f0000010500)="ffffffffff070000000000000000000000000000000000000000000000000080ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff", 0x400}, {&(0x7f0000000000)="ed41000000040000d0f4655fd1f4655fd1f4655f13ca7302f6e9dab934", 0x1d, 0x1600}], 0x0, &(0x7f0000000280)=ANY=[]) setxattr$trusted_overlay_upper(&(0x7f0000000540)='./file0\x00', &(0x7f0000000580), &(0x7f00000005c0)={0x0, 0xfb, 0x139, 0x0, 0x0, "eacbf6ff0bc36f5a7bb9fe2ee7bb1e01", "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"}, 0x139, 0x0) getxattr(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)=@random={'security.', ':\x00'}, &(0x7f0000000140)=""/55, 0x37) [ 833.641353] EXT4-fs (loop0): mounted filesystem without journal. Opts: ,errors=continue [ 833.652336] EXT4-fs (loop3): mounted filesystem without journal. Opts: ,errors=continue [ 833.655846] EXT4-fs error (device loop3): ext4_validate_block_bitmap:398: comm syz-executor.3: bg 0: block 3: invalid block bitmap [ 833.676850] EXT4-fs error (device loop0): ext4_validate_block_bitmap:398: comm syz-executor.0: bg 0: block 3: invalid block bitmap 00:09:23 executing program 5: perf_event_open$cgroup(&(0x7f0000000100)={0x2, 0x80, 0x8, 0x81, 0x0, 0x6, 0x0, 0x800, 0x30ccd, 0x7, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x17f3fb2293f8ac8e, @perf_bp={&(0x7f0000000080), 0x2}, 0x10, 0x48, 0x6, 0x8, 0xffffffffffffc812, 0x0, 0x7, 0x0, 0x9, 0x0, 0x8}, 0xffffffffffffffff, 0x9, 0xffffffffffffffff, 0x7) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x7fffffff}]}) signalfd4(0xffffffffffffffff, &(0x7f00000000c0)={[0x1]}, 0x8, 0x0) 00:09:23 executing program 5: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f0000000040)=[{0x6, 0x4, 0x0, 0x7fffffff}]}) signalfd4(0xffffffffffffffff, &(0x7f00000000c0), 0x8, 0x0) 00:09:23 executing program 3: syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000d1f4655fd1f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b00000000020000280200000284", 0x62, 0x400}, {&(0x7f0000010400)="030000000400000005000000d4", 0xd, 0x800}, {&(0x7f0000010500)="ffffffffff070000000000000000000000000000000000000000000000000080ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff", 0x400}, {&(0x7f0000000000)="ed41000000040000d0f4655fd1f4655fd1f4655f13ca7302f6e9dab934", 0x1d, 0x1600}], 0x0, &(0x7f0000000280)=ANY=[]) setxattr$trusted_overlay_upper(&(0x7f0000000540)='./file0\x00', &(0x7f0000000580), &(0x7f00000005c0)={0x0, 0xfb, 0x139, 0x0, 0x0, "eacbf6ff0bc36f5a7bb9fe2ee7bb1e01", "a49dbbc75b5fc0caa97cab3ee231b0d7cf3b9be24c0fb2c145c6f2190b4a29cc525f550d79c74a03eda157db2eae62fde8958cce2a8a4c9d0374e4d6ae09ef4ee733ce4046bee0170cff57584e0671d4f286b9691d37721b43778a4afb3c3d05fd5446d2e0bac5326f43d23126410dfb85efa26b9e1ae8d056c3ebcde0c95e1443304d7a93eb4077f76047b6e13f0e79a9631ac2bd43143854803c698a7f02933d9cbdca121cc857aacabf858f3f904c9dfedb6c03186d99490f35f09de8ab897ea7c58f07dca416e1db55c7a849a91b98d0e0c0c7bf058d86a2e997a0557800a34bb7f5806f2e15e99981cc3fe615a3ff396f7d8da30ea24626263abf0ad50a0ce2dafc55f2b0286b2204114a6754b336a913a75e66ed6a3efd132f668369692f46039d"}, 0x139, 0x0) getxattr(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)=@random={'security.', ':\x00'}, &(0x7f0000000140)=""/55, 0x37) 00:09:23 executing program 0: syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000d1f4655fd1f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b00000000020000280200000284", 0x62, 0x400}, {&(0x7f0000010400)="030000000400000005000000d4", 0xd, 0x800}, {&(0x7f0000010500)="ffffffffff070000000000000000000000000000000000000000000000000080ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff", 0x400}, {&(0x7f0000000000)="ed41000000040000d0f4655fd1f4655fd1f4655f13ca7302f6e9dab934", 0x1d, 0x1600}], 0x0, &(0x7f0000000280)=ANY=[]) setxattr$trusted_overlay_upper(&(0x7f0000000540)='./file0\x00', &(0x7f0000000580), &(0x7f00000005c0)={0x0, 0xfb, 0x139, 0x0, 0x0, "eacbf6ff0bc36f5a7bb9fe2ee7bb1e01", "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"}, 0x139, 0x0) [ 833.930686] EXT4-fs (loop0): mounted filesystem without journal. Opts: ,errors=continue [ 833.939177] EXT4-fs error (device loop0): ext4_validate_block_bitmap:398: comm syz-executor.0: bg 0: block 3: invalid block bitmap [ 833.977025] EXT4-fs (loop3): mounted filesystem without journal. Opts: ,errors=continue [ 833.982969] EXT4-fs error (device loop3): ext4_validate_block_bitmap:398: comm syz-executor.3: bg 0: block 3: invalid block bitmap 00:09:36 executing program 0: syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000d1f4655fd1f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b00000000020000280200000284", 0x62, 0x400}, {&(0x7f0000010500)="ffffffffff070000000000000000000000000000000000000000000000000080ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff", 0x400, 0xc00}, {&(0x7f0000000000)="ed41000000040000d0f4655fd1f4655fd1f4655f13ca7302f6e9dab934", 0x1d, 0x1600}], 0x0, &(0x7f0000000280)=ANY=[]) setxattr$trusted_overlay_upper(&(0x7f0000000540)='./file0\x00', &(0x7f0000000580), &(0x7f00000005c0)={0x0, 0xfb, 0x139, 0x0, 0x0, "eacbf6ff0bc36f5a7bb9fe2ee7bb1e01", "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"}, 0x139, 0x0) 00:09:36 executing program 6: r0 = openat$null(0xffffffffffffff9c, &(0x7f00000001c0), 0x40400, 0x0) sendmsg$NL80211_CMD_JOIN_OCB(r0, &(0x7f0000000340)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000300)={&(0x7f0000000280)={0x44, 0x0, 0x400, 0x70bd2a, 0x25dfdbfd, {{}, {@void, @void}}, [@NL80211_ATTR_CENTER_FREQ1={0x8, 0xa0, 0x5}, @NL80211_ATTR_CHANNEL_WIDTH={0x8, 0x9f, 0x1}, @NL80211_ATTR_CENTER_FREQ1={0x8, 0xa0, 0x72d4}, @NL80211_ATTR_CENTER_FREQ2={0x8, 0xa1, 0x8003}, @NL80211_ATTR_WIPHY_EDMG_BW_CONFIG={0x5, 0x119, 0x9}, @NL80211_ATTR_WIPHY_EDMG_CHANNELS={0x5, 0x118, 0x29}]}, 0x44}, 0x1, 0x0, 0x0, 0x411}, 0x4000001) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000040)='proc\x00', 0x0, 0x0) pivot_root(&(0x7f0000000000)='./file0\x00', &(0x7f0000000240)='.\x00') mount(&(0x7f00000000c0)=@filename='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='erofs\x00', 0x20000, 0x0) mknod$loop(&(0x7f0000000380)='./file0\x00', 0x8, 0x0) 00:09:36 executing program 2: r0 = seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x7fffffff}]}) r1 = signalfd4(0xffffffffffffffff, &(0x7f00000000c0), 0x8, 0x0) fcntl$dupfd(r1, 0x0, r0) 00:09:36 executing program 4: r0 = seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x7fffffff}]}) mprotect(&(0x7f0000ffe000/0x2000)=nil, 0x2000, 0x1000000) r1 = mmap$IORING_OFF_CQ_RING(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x4000010, 0xffffffffffffffff, 0x8000000) ioctl$F2FS_IOC_ABORT_VOLATILE_WRITE(r0, 0xf505, 0x0) pkey_mprotect(&(0x7f0000ffe000/0x2000)=nil, 0x2000, 0x1000001, 0xffffffffffffffff) syz_io_uring_submit(r1, 0x0, &(0x7f00000000c0)=@IORING_OP_CONNECT={0x10, 0x1, 0x0, 0xffffffffffffffff, 0x80, &(0x7f0000000100)=@llc={0x1a, 0x17, 0x6, 0x39, 0x9, 0x7}}, 0x5) 00:09:36 executing program 3: syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000d1f4655fd1f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b00000000020000280200000284", 0x62, 0x400}, {&(0x7f0000010500)="ffffffffff070000000000000000000000000000000000000000000000000080ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff", 0x400, 0xc00}, {&(0x7f0000000000)="ed41000000040000d0f4655fd1f4655fd1f4655f13ca7302f6e9dab934", 0x1d, 0x1600}], 0x0, &(0x7f0000000280)=ANY=[]) setxattr$trusted_overlay_upper(&(0x7f0000000540)='./file0\x00', &(0x7f0000000580), &(0x7f00000005c0)={0x0, 0xfb, 0x139, 0x0, 0x0, "eacbf6ff0bc36f5a7bb9fe2ee7bb1e01", "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"}, 0x139, 0x0) getxattr(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)=@random={'security.', ':\x00'}, &(0x7f0000000140)=""/55, 0x37) 00:09:36 executing program 1: ioctl$TUNSETQUEUE(0xffffffffffffffff, 0x400454d9, &(0x7f0000000b80)={'bond0\x00'}) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x0, 0x0, 0x0, 0x7fffffff}]}) r0 = signalfd4(0xffffffffffffffff, &(0x7f00000000c0), 0x8, 0x0) prctl$PR_SET_MM_MAP(0x23, 0xe, &(0x7f0000000180)={&(0x7f0000ffd000/0x1000)=nil, &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000fff000/0x1000)=nil, &(0x7f0000ffd000/0x1000)=nil, &(0x7f0000ffc000/0x2000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000ffe000/0x2000)=nil, &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000ffd000/0x2000)=nil, &(0x7f0000ffd000/0x2000)=nil, &(0x7f0000000140)="080afc03b8bae061a487765e741c1a3a5a7dea95a0b02b4dbb6944356a", 0x1d}, 0x68) r1 = creat(&(0x7f0000000080)='./file1\x00', 0x0) pwrite64(r1, &(0x7f0000000000)="a7", 0xfffffd6b, 0x0) accept$packet(r0, &(0x7f0000000080)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000100)=0x14) 00:09:36 executing program 7: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x7fffffff}]}) openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) r0 = creat(&(0x7f0000000080)='./file1\x00', 0x0) ioctl$BTRFS_IOC_SCRUB(0xffffffffffffffff, 0xc400941b, &(0x7f0000000600)={0x0, 0x0, 0x80000001}) pwrite64(r0, &(0x7f0000000000)="a7", 0xfffffd6b, 0x0) accept$packet(0xffffffffffffffff, &(0x7f0000000080)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000100)=0x14) 00:09:36 executing program 5: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x8}]}) signalfd4(0xffffffffffffffff, &(0x7f00000000c0), 0x8, 0x0) r0 = openat(0xffffffffffffff9c, 0x0, 0x1c2, 0x27) r1 = open(&(0x7f0000000040)='./file0\x00', 0x1810c1, 0x0) ioctl$BTRFS_IOC_SCRUB_PROGRESS(r0, 0xc400941d, &(0x7f0000000200)={0x0, 0x4, 0xd3, 0x1}) pwrite64(r1, &(0x7f0000000a40)="0f64800203d6484c7ddffad1", 0xc, 0x0) lseek(r1, 0x2, 0x3) epoll_create(0x6) fcntl$getflags(r1, 0x401) dup2(r0, r1) r2 = shmget$private(0x0, 0x4000, 0x2, &(0x7f0000ffa000/0x4000)=nil) getresgid(&(0x7f0000001280)=0x0, &(0x7f00000012c0), &(0x7f0000001300)) r4 = fork() shmctl$IPC_SET(r2, 0x1, &(0x7f0000001340)={{0x2, 0xee01, r3, 0xee00, 0xee00, 0x9, 0x800}, 0x8001, 0x400001, 0xa, 0x3, 0xffffffffffffffff, r4, 0x7}) ioctl$TUNSETGROUP(r0, 0x400454ce, r3) ptrace(0x10, 0x0) ptrace$setregs(0xd, 0x0, 0x0, &(0x7f0000000000)) ptrace$cont(0x9, 0x0, 0x0, 0x0) pidfd_open(0x0, 0x0) ptrace(0x10, 0x0) [ 846.705970] EXT4-fs (loop3): ext4_check_descriptors: Block bitmap for group 0 not in group (block 0)! [ 846.709053] EXT4-fs (loop3): group descriptors corrupted! 00:09:36 executing program 6: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000040)='proc\x00', 0x0, 0x0) r0 = openat(0xffffffffffffff9c, 0x0, 0x1c2, 0x27) r1 = open(&(0x7f0000000040)='./file0\x00', 0x1810c1, 0x0) ioctl$BTRFS_IOC_SCRUB_PROGRESS(r0, 0xc400941d, &(0x7f0000000200)={0x0, 0x4, 0xd3, 0x1}) pwrite64(r1, &(0x7f0000000a40)="0f64800203d6484c7ddffad1", 0xc, 0x0) lseek(r1, 0x2, 0x3) fcntl$getflags(r1, 0x401) dup2(r0, r1) openat(r1, &(0x7f00000000c0)='./file0\x00', 0x105000, 0x1f) pivot_root(&(0x7f0000000000)='./file0\x00', &(0x7f0000000240)='.\x00') [ 846.741665] EXT4-fs (loop0): ext4_check_descriptors: Block bitmap for group 0 not in group (block 0)! [ 846.743112] EXT4-fs (loop0): group descriptors corrupted! [ 846.756213] audit: type=1326 audit(1626998976.766:46): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=7507 comm="syz-executor.5" exe="/syz-executor.5" sig=31 arch=c000003e syscall=202 compat=0 ip=0x466609 code=0x0 00:09:36 executing program 4: r0 = seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x7fffffff}]}) r1 = signalfd(r0, &(0x7f0000000080)={[0x3]}, 0x8) connect$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22, 0x6, @private0={0xfc, 0x0, '\x00', 0x1}, 0x8}, 0x1c) mprotect(&(0x7f0000ffe000/0x1000)=nil, 0x1000, 0x0) 00:09:36 executing program 0: syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000d1f4655fd1f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b00000000020000280200000284", 0x62, 0x400}, {&(0x7f0000010500)="ffffffffff070000000000000000000000000000000000000000000000000080ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff", 0x400, 0xc00}, {&(0x7f0000000000)="ed41000000040000d0f4655fd1f4655fd1f4655f13ca7302f6e9dab934", 0x1d, 0x1600}], 0x0, &(0x7f0000000280)=ANY=[]) setxattr$trusted_overlay_upper(&(0x7f0000000540)='./file0\x00', &(0x7f0000000580), &(0x7f00000005c0)={0x0, 0xfb, 0x139, 0x0, 0x0, "eacbf6ff0bc36f5a7bb9fe2ee7bb1e01", "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"}, 0x139, 0x0) 00:09:36 executing program 2: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x7fffffff}]}) r0 = signalfd4(0xffffffffffffffff, &(0x7f00000000c0), 0x8, 0x0) r1 = seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x8, &(0x7f0000000100)={0x8, &(0x7f0000000080)=[{0xffff, 0x1, 0xee, 0x9}, {0x6, 0x8d, 0x40, 0xff}, {0x9, 0x1, 0xf0, 0x4}, {0x1000, 0x5, 0x2, 0x7}, {0x8, 0xd4, 0x0, 0x2}, {0x8, 0x2, 0x9, 0x8}, {0x6, 0x0, 0x9, 0x2}, {0x5, 0x80, 0x1, 0xce}]}) fchmod(r0, 0x1ea) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r1, 0xc0502100, &(0x7f0000000140)) 00:09:36 executing program 3: syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000d1f4655fd1f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b00000000020000280200000284", 0x62, 0x400}, {&(0x7f0000010500)="ffffffffff070000000000000000000000000000000000000000000000000080ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff", 0x400, 0xc00}, {&(0x7f0000000000)="ed41000000040000d0f4655fd1f4655fd1f4655f13ca7302f6e9dab934", 0x1d, 0x1600}], 0x0, &(0x7f0000000280)=ANY=[]) setxattr$trusted_overlay_upper(&(0x7f0000000540)='./file0\x00', &(0x7f0000000580), &(0x7f00000005c0)={0x0, 0xfb, 0x139, 0x0, 0x0, "eacbf6ff0bc36f5a7bb9fe2ee7bb1e01", "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"}, 0x139, 0x0) getxattr(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)=@random={'security.', ':\x00'}, &(0x7f0000000140)=""/55, 0x37) [ 846.891322] EXT4-fs (loop0): ext4_check_descriptors: Block bitmap for group 0 not in group (block 0)! [ 846.892788] EXT4-fs (loop0): group descriptors corrupted! [ 846.895698] EXT4-fs (loop3): ext4_check_descriptors: Block bitmap for group 0 not in group (block 0)! [ 846.897127] EXT4-fs (loop3): group descriptors corrupted! 00:09:36 executing program 4: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x7fffffff}]}) mprotect(&(0x7f0000ffe000/0x2000)=nil, 0x2000, 0x200000d) r0 = openat(0xffffffffffffff9c, 0x0, 0x1c2, 0x27) r1 = open(&(0x7f0000000040)='./file0\x00', 0x1810c1, 0x0) ioctl$BTRFS_IOC_SCRUB_PROGRESS(r0, 0xc400941d, &(0x7f0000000200)={0x0, 0x4, 0xd3, 0x1}) pwrite64(r1, &(0x7f0000000a40)="0f64800203d6484c7ddffad1", 0xc, 0x0) lseek(r1, 0x2, 0x3) fcntl$getflags(r1, 0x401) dup2(r0, r1) mmap$usbmon(&(0x7f0000ffe000/0x1000)=nil, 0x1000, 0x3000000, 0x11, r1, 0x6) mbind(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x4000, &(0x7f0000000080)=0x1, 0xd2c, 0x6) mprotect(&(0x7f0000ffe000/0x2000)=nil, 0x2000, 0x2000004) mlock(&(0x7f0000ff6000/0xa000)=nil, 0xa000) 00:09:36 executing program 6: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000040)='proc\x00', 0x0, 0x0) r0 = syz_open_dev$vcsn(&(0x7f0000000140), 0x8, 0x101081) fspick(r0, &(0x7f00000001c0)='./file0\x00', 0xcffada6824f14cca) pivot_root(&(0x7f0000000180)='./file0\x00', &(0x7f0000000000)='./file0\x00') chroot(&(0x7f00000000c0)='./file0\x00') 00:09:36 executing program 3: syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000d1f4655fd1f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b00000000020000280200000284", 0x62, 0x400}, {&(0x7f0000010500)="ffffffffff070000000000000000000000000000000000000000000000000080ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff", 0x400, 0xc00}, {&(0x7f0000000000)="ed41000000040000d0f4655fd1f4655fd1f4655f13ca7302f6e9dab934", 0x1d, 0x1600}], 0x0, &(0x7f0000000280)=ANY=[]) setxattr$trusted_overlay_upper(&(0x7f0000000540)='./file0\x00', &(0x7f0000000580), &(0x7f00000005c0)={0x0, 0xfb, 0x139, 0x0, 0x0, "eacbf6ff0bc36f5a7bb9fe2ee7bb1e01", "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"}, 0x139, 0x0) getxattr(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)=@random={'security.', ':\x00'}, &(0x7f0000000140)=""/55, 0x37) 00:09:36 executing program 0: syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000d1f4655fd1f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b00000000020000280200000284", 0x62, 0x400}, {&(0x7f0000010500)="ffffffffff070000000000000000000000000000000000000000000000000080ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff", 0x400, 0xc00}, {&(0x7f0000000000)="ed41000000040000d0f4655fd1f4655fd1f4655f13ca7302f6e9dab934", 0x1d, 0x1600}], 0x0, &(0x7f0000000280)=ANY=[]) setxattr$trusted_overlay_upper(&(0x7f0000000540)='./file0\x00', &(0x7f0000000580), &(0x7f00000005c0)={0x0, 0xfb, 0x139, 0x0, 0x0, "eacbf6ff0bc36f5a7bb9fe2ee7bb1e01", "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"}, 0x139, 0x0) 00:09:36 executing program 2: ioctl$TUNGETVNETHDRSZ(0xffffffffffffffff, 0x800454d7, &(0x7f0000000080)) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x7fffffff}]}) signalfd4(0xffffffffffffffff, &(0x7f00000000c0), 0x8, 0x0) [ 847.033139] EXT4-fs (loop3): ext4_check_descriptors: Block bitmap for group 0 not in group (block 0)! [ 847.035444] EXT4-fs (loop3): group descriptors corrupted! 00:09:37 executing program 6: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000040)='proc\x00', 0x0, 0x0) pivot_root(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='./file0\x00') [ 847.085739] EXT4-fs (loop0): ext4_check_descriptors: Block bitmap for group 0 not in group (block 0)! [ 847.087183] EXT4-fs (loop0): group descriptors corrupted! 00:09:37 executing program 3: syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000d1f4655fd1f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b00000000020000280200000284", 0x62, 0x400}, {0x0, 0x0, 0x800}, {&(0x7f0000010500)="ffffffffff070000000000000000000000000000000000000000000000000080ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff", 0x400, 0xc00}, {&(0x7f0000000000)="ed41000000040000d0f4655fd1f4655fd1f4655f13ca7302f6e9dab934", 0x1d, 0x1600}], 0x0, &(0x7f0000000280)=ANY=[]) setxattr$trusted_overlay_upper(&(0x7f0000000540)='./file0\x00', &(0x7f0000000580), &(0x7f00000005c0)={0x0, 0xfb, 0x139, 0x0, 0x0, "eacbf6ff0bc36f5a7bb9fe2ee7bb1e01", "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"}, 0x139, 0x0) getxattr(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)=@random={'security.', ':\x00'}, &(0x7f0000000140)=""/55, 0x37) 00:09:37 executing program 0: syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000d1f4655fd1f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b00000000020000280200000284", 0x62, 0x400}, {0x0, 0x0, 0x800}, {&(0x7f0000010500)="ffffffffff070000000000000000000000000000000000000000000000000080ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff", 0x400, 0xc00}, {&(0x7f0000000000)="ed41000000040000d0f4655fd1f4655fd1f4655f13ca7302f6e9dab934", 0x1d, 0x1600}], 0x0, &(0x7f0000000280)=ANY=[]) setxattr$trusted_overlay_upper(&(0x7f0000000540)='./file0\x00', &(0x7f0000000580), &(0x7f00000005c0)={0x0, 0xfb, 0x139, 0x0, 0x0, "eacbf6ff0bc36f5a7bb9fe2ee7bb1e01", "a49dbbc75b5fc0caa97cab3ee231b0d7cf3b9be24c0fb2c145c6f2190b4a29cc525f550d79c74a03eda157db2eae62fde8958cce2a8a4c9d0374e4d6ae09ef4ee733ce4046bee0170cff57584e0671d4f286b9691d37721b43778a4afb3c3d05fd5446d2e0bac5326f43d23126410dfb85efa26b9e1ae8d056c3ebcde0c95e1443304d7a93eb4077f76047b6e13f0e79a9631ac2bd43143854803c698a7f02933d9cbdca121cc857aacabf858f3f904c9dfedb6c03186d99490f35f09de8ab897ea7c58f07dca416e1db55c7a849a91b98d0e0c0c7bf058d86a2e997a0557800a34bb7f5806f2e15e99981cc3fe615a3ff396f7d8da30ea24626263abf0ad50a0ce2dafc55f2b0286b2204114a6754b336a913a75e66ed6a3efd132f668369692f46039d"}, 0x139, 0x0) [ 847.173290] EXT4-fs (loop3): ext4_check_descriptors: Block bitmap for group 0 not in group (block 0)! [ 847.174811] EXT4-fs (loop3): group descriptors corrupted! [ 847.201227] EXT4-fs (loop0): ext4_check_descriptors: Block bitmap for group 0 not in group (block 0)! [ 847.202702] EXT4-fs (loop0): group descriptors corrupted! [ 847.568004] audit: type=1326 audit(1626998977.578:47): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=7507 comm="syz-executor.5" exe="/syz-executor.5" sig=31 arch=c000003e syscall=202 compat=0 ip=0x466609 code=0x0 00:09:48 executing program 6: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) lsetxattr$trusted_overlay_upper(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140), &(0x7f0000000180)={0x0, 0xfb, 0x9b, 0x6, 0x2, "d3e8ccbcd80b93208a8927c487c63980", "854e735f116f43be9898f1da56a37cceafa1f2d4d35536807872c059104989118828211b656f2ed12fa8cc8cfd23dd225f56c2cf5c1060408934a410264385f1ebc89e6fa2ffd841178c5959a7951158f72ab80fc3a8ce0379d6fa2d19645c953e7df7331b0322154f12d2cbea0134c18bbf25cdca4246c6c8844ec2f36202fdb4d951aea408"}, 0x9b, 0x3) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000040)='proc\x00', 0x1002000, 0x0) pivot_root(&(0x7f0000000000)='./file0\x00', &(0x7f0000000240)='.\x00') 00:09:48 executing program 4: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x7fffffff}]}) mprotect(&(0x7f0000ffe000/0x1000)=nil, 0x1000, 0x0) remap_file_pages(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x0, 0x7ff, 0x10000) 00:09:48 executing program 5: r0 = openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000080), 0x561000, 0x0) r1 = seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x7fffffff}]}) ioctl$TIOCGPTPEER(r0, 0x5441, 0x3) r2 = openat(0xffffffffffffff9c, 0x0, 0x1c2, 0x27) r3 = open(&(0x7f0000000040)='./file0\x00', 0x1810c1, 0x0) r4 = accept4(r2, &(0x7f0000000180)=@llc={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @dev}, &(0x7f0000000600)=0x80, 0x80000) setsockopt$SO_ATTACH_FILTER(r4, 0x1, 0x1a, &(0x7f0000000680)={0x4, &(0x7f0000000640)=[{0x7f, 0x5, 0xff, 0x89f}, {0x5, 0x6, 0xc4, 0x8}, {0x0, 0x4, 0x7, 0xfff}, {0x7, 0x73, 0x5, 0x4}]}, 0x10) r5 = openat(0xffffffffffffff9c, 0x0, 0x1c2, 0x27) r6 = creat(&(0x7f0000000080)='./file1\x00', 0x0) ioctl$BTRFS_IOC_SCRUB_PROGRESS(r5, 0xc400941d, &(0x7f0000000200)={0x0, 0x4, 0xd3, 0x1}) ioctl$BTRFS_IOC_SCRUB(r6, 0xc400941b, &(0x7f0000000600)={r7, 0x62, 0x80000001}) pwrite64(r6, &(0x7f0000000000)="a7", 0xfffffd6b, 0x0) ioctl$PIO_UNIMAPCLR(r6, 0x4b68, &(0x7f0000000a80)={0x80, 0x4, 0x6}) ioctl$BTRFS_IOC_SCRUB_PROGRESS(r1, 0xc400941d, &(0x7f0000000200)={0x0, 0x4, 0x5}) pwrite64(r3, &(0x7f0000000a40)="0f64800203d6484c7ddffad1", 0xc, 0x0) lseek(r3, 0x2, 0x3) fcntl$getflags(r3, 0x401) dup2(r2, r3) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r3, 0xc0502100, &(0x7f0000000100)) signalfd4(0xffffffffffffffff, &(0x7f00000000c0)={[0x401]}, 0x8, 0x0) 00:09:48 executing program 7: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x7fffffff}]}) openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) r0 = creat(&(0x7f0000000080)='./file1\x00', 0x0) ioctl$BTRFS_IOC_SCRUB(0xffffffffffffffff, 0xc400941b, &(0x7f0000000600)={0x0, 0x0, 0x80000001}) pwrite64(r0, &(0x7f0000000000)="a7", 0xfffffd6b, 0x0) accept$packet(0xffffffffffffffff, &(0x7f0000000080)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000100)=0x14) 00:09:48 executing program 3: syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000d1f4655fd1f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b00000000020000280200000284", 0x62, 0x400}, {0x0, 0x0, 0x800}, {&(0x7f0000010500)="ffffffffff070000000000000000000000000000000000000000000000000080ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff", 0x400, 0xc00}, {&(0x7f0000000000)="ed41000000040000d0f4655fd1f4655fd1f4655f13ca7302f6e9dab934", 0x1d, 0x1600}], 0x0, &(0x7f0000000280)=ANY=[]) setxattr$trusted_overlay_upper(&(0x7f0000000540)='./file0\x00', &(0x7f0000000580), &(0x7f00000005c0)={0x0, 0xfb, 0x139, 0x0, 0x0, "eacbf6ff0bc36f5a7bb9fe2ee7bb1e01", "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"}, 0x139, 0x0) getxattr(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)=@random={'security.', ':\x00'}, &(0x7f0000000140)=""/55, 0x37) 00:09:48 executing program 0: syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000d1f4655fd1f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b00000000020000280200000284", 0x62, 0x400}, {0x0, 0x0, 0x800}, {&(0x7f0000010500)="ffffffffff070000000000000000000000000000000000000000000000000080ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff", 0x400, 0xc00}, {&(0x7f0000000000)="ed41000000040000d0f4655fd1f4655fd1f4655f13ca7302f6e9dab934", 0x1d, 0x1600}], 0x0, &(0x7f0000000280)=ANY=[]) setxattr$trusted_overlay_upper(&(0x7f0000000540)='./file0\x00', &(0x7f0000000580), &(0x7f00000005c0)={0x0, 0xfb, 0x139, 0x0, 0x0, "eacbf6ff0bc36f5a7bb9fe2ee7bb1e01", "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"}, 0x139, 0x0) 00:09:48 executing program 1: ioctl$TUNSETQUEUE(0xffffffffffffffff, 0x400454d9, &(0x7f0000000b80)={'bond0\x00'}) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x6}]}) r0 = signalfd4(0xffffffffffffffff, &(0x7f00000000c0), 0x8, 0x0) prctl$PR_SET_MM_MAP(0x23, 0xe, &(0x7f0000000180)={&(0x7f0000ffd000/0x1000)=nil, &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000fff000/0x1000)=nil, &(0x7f0000ffd000/0x1000)=nil, &(0x7f0000ffc000/0x2000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000ffe000/0x2000)=nil, &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000ffd000/0x2000)=nil, &(0x7f0000ffd000/0x2000)=nil, &(0x7f0000000140)="080afc03b8bae061a487765e741c1a3a5a7dea95a0b02b4dbb6944356a", 0x1d}, 0x68) r1 = creat(&(0x7f0000000080)='./file1\x00', 0x0) pwrite64(r1, &(0x7f0000000000)="a7", 0xfffffd6b, 0x0) accept$packet(r0, &(0x7f0000000080)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000100)=0x14) 00:09:48 executing program 2: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x7fffffff}]}) r0 = signalfd4(0xffffffffffffffff, &(0x7f00000000c0), 0x8, 0x0) setsockopt$inet_tcp_TCP_REPAIR_QUEUE(r0, 0x6, 0x14, &(0x7f0000000140)=0x1, 0x4) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0xa, &(0x7f0000000100)={0x3, &(0x7f0000000080)=[{0x7, 0x3f, 0x28, 0x5}, {0x800, 0x1, 0x2, 0x6}, {0x2, 0x6, 0x5, 0x8}]}) 00:09:48 executing program 2: r0 = signalfd4(0xffffffffffffffff, &(0x7f00000000c0), 0x8, 0x0) r1 = fsmount(r0, 0x1, 0x0) fcntl$dupfd(r0, 0x0, r1) r2 = syz_open_dev$vcsa(&(0x7f0000000180), 0x10000000000018, 0x101800) fsetxattr$trusted_overlay_opaque(r2, &(0x7f0000000040), &(0x7f0000000140), 0x2, 0x2) ioctl$TCSBRK(r2, 0x5409, 0x0) ioctl$F2FS_IOC_START_VOLATILE_WRITE(r2, 0xf503, 0x0) fsconfig$FSCONFIG_SET_FD(r2, 0x5, &(0x7f0000000100)='\x00', 0x0, r0) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, r2, &(0x7f0000000000)) [ 858.882513] audit: type=1326 audit(1626998988.892:48): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=7566 comm="syz-executor.1" exe="/syz-executor.1" sig=31 arch=c000003e syscall=202 compat=0 ip=0x466609 code=0x0 [ 858.903362] EXT4-fs (loop0): ext4_check_descriptors: Block bitmap for group 0 not in group (block 0)! [ 858.905554] EXT4-fs (loop0): group descriptors corrupted! [ 858.913936] EXT4-fs (loop3): ext4_check_descriptors: Block bitmap for group 0 not in group (block 0)! [ 858.916023] EXT4-fs (loop3): group descriptors corrupted! 00:09:48 executing program 4: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) prctl$PR_SET_MM_MAP(0x23, 0xe, &(0x7f0000001100)={&(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000ff3000/0xd000)=nil, &(0x7f0000ff8000/0x1000)=nil, &(0x7f0000ff9000/0x3000)=nil, &(0x7f0000ff4000/0x1000)=nil, &(0x7f0000ff6000/0x3000)=nil, &(0x7f0000ff5000/0x4000)=nil, &(0x7f0000ff1000/0x4000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000000100)="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", 0x1000, r0}, 0x68) r1 = seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0xa, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x7fffffff}]}) fcntl$getflags(r1, 0x408) mprotect(&(0x7f0000ffe000/0x1000)=nil, 0x1000, 0x0) get_mempolicy(&(0x7f0000000080), &(0x7f00000000c0), 0x5b070, &(0x7f0000ffe000/0x1000)=nil, 0x4) 00:10:02 executing program 5: r0 = seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x9, 0x0, 0x0, 0x7fffffff}]}) signalfd4(r0, &(0x7f00000000c0)={[0x200000000000]}, 0x8, 0x80000) r1 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000040), 0x80040, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r1, 0xc0502100, &(0x7f0000000180)) 00:10:02 executing program 1: ioctl$TUNSETQUEUE(0xffffffffffffffff, 0x400454d9, &(0x7f0000000b80)={'bond0\x00'}) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x6}]}) r0 = signalfd4(0xffffffffffffffff, &(0x7f00000000c0), 0x8, 0x0) prctl$PR_SET_MM_MAP(0x23, 0xe, &(0x7f0000000180)={&(0x7f0000ffd000/0x1000)=nil, &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000fff000/0x1000)=nil, &(0x7f0000ffd000/0x1000)=nil, &(0x7f0000ffc000/0x2000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000ffe000/0x2000)=nil, &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000ffd000/0x2000)=nil, &(0x7f0000ffd000/0x2000)=nil, &(0x7f0000000140)="080afc03b8bae061a487765e741c1a3a5a7dea95a0b02b4dbb6944356a", 0x1d}, 0x68) r1 = creat(&(0x7f0000000080)='./file1\x00', 0x0) pwrite64(r1, &(0x7f0000000000)="a7", 0xfffffd6b, 0x0) accept$packet(r0, &(0x7f0000000080)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000100)=0x14) 00:10:02 executing program 2: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x7fffffff}]}) r0 = openat(0xffffffffffffff9c, 0x0, 0x1c2, 0x27) r1 = creat(&(0x7f0000000080)='./file1\x00', 0x0) r2 = openat(0xffffffffffffff9c, 0x0, 0x1c2, 0x27) r3 = creat(&(0x7f0000000080)='./file1\x00', 0x0) ioctl$BTRFS_IOC_SCRUB_PROGRESS(r2, 0xc400941d, &(0x7f0000000200)={0x0, 0x4, 0xd3, 0x1}) ioctl$BTRFS_IOC_SCRUB(r3, 0xc400941b, &(0x7f0000000600)={r4, 0x62, 0x80000001}) pwrite64(r3, &(0x7f0000000000)="a7", 0xfffffd6b, 0x0) r5 = openat(r3, &(0x7f0000000180)='./file1\x00', 0x200, 0xe1) ioctl$BTRFS_IOC_SCRUB_PROGRESS(r0, 0xc400941d, &(0x7f0000000200)={0x0, 0x4, 0xd3, 0x1}) ioctl$BTRFS_IOC_SCRUB(r1, 0xc400941b, &(0x7f0000000600)={r6, 0x62, 0x80000001}) pwrite64(r1, &(0x7f0000000000)="a7", 0xfffffd6b, 0x0) ioctl$PIO_UNIMAPCLR(r1, 0x4b68, &(0x7f0000000a80)={0x80, 0x4, 0x6}) pwrite64(r5, &(0x7f0000000ac0)="0ef3a03d906b1ef757d04ed4707129fb86474baee570d42a3c496920a6a157a15dcf1855be629b4b432dc20e71d566d22cb2d357cc7cc17f587893b841b294487beff642d0d17dd49d783542c84a9db03f5b5c03bc62b3f98c043657fa961844f95d1267921ec63f09e203e2a12006292e9bca61df09f1c7f0e0d44b6732f749e74ce6d07e27ba37d86c9c79320f8e9908931d471dbe0fd380490c2fc9e93a9b11c1fbf5d13976b0a74530c2ce2e944ed3a95c05709f1b1d61f8dcc7a4370bb7e1b5ef0f5fd461f6e8ec79ad6ab692e6db6c637dec0018", 0xd7, 0x8) fsync(0xffffffffffffffff) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r1, 0xc0502100, &(0x7f0000000100)) signalfd4(0xffffffffffffffff, &(0x7f00000000c0), 0x8, 0x0) 00:10:02 executing program 0: syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000d1f4655fd1f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b00000000020000280200000284", 0x62, 0x400}, {0x0, 0x0, 0x800}, {&(0x7f0000010500)="ffffffffff070000000000000000000000000000000000000000000000000080ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff", 0x400, 0xc00}, {&(0x7f0000000000)="ed41000000040000d0f4655fd1f4655fd1f4655f13ca7302f6e9dab934", 0x1d, 0x1600}], 0x0, &(0x7f0000000280)=ANY=[]) setxattr$trusted_overlay_upper(&(0x7f0000000540)='./file0\x00', &(0x7f0000000580), &(0x7f00000005c0)={0x0, 0xfb, 0x139, 0x0, 0x0, "eacbf6ff0bc36f5a7bb9fe2ee7bb1e01", "a49dbbc75b5fc0caa97cab3ee231b0d7cf3b9be24c0fb2c145c6f2190b4a29cc525f550d79c74a03eda157db2eae62fde8958cce2a8a4c9d0374e4d6ae09ef4ee733ce4046bee0170cff57584e0671d4f286b9691d37721b43778a4afb3c3d05fd5446d2e0bac5326f43d23126410dfb85efa26b9e1ae8d056c3ebcde0c95e1443304d7a93eb4077f76047b6e13f0e79a9631ac2bd43143854803c698a7f02933d9cbdca121cc857aacabf858f3f904c9dfedb6c03186d99490f35f09de8ab897ea7c58f07dca416e1db55c7a849a91b98d0e0c0c7bf058d86a2e997a0557800a34bb7f5806f2e15e99981cc3fe615a3ff396f7d8da30ea24626263abf0ad50a0ce2dafc55f2b0286b2204114a6754b336a913a75e66ed6a3efd132f668369692f46039d"}, 0x139, 0x0) 00:10:02 executing program 4: sendmsg$NL80211_CMD_GET_SCAN(0xffffffffffffffff, &(0x7f0000000140)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f0000000100)={&(0x7f0000000a00)=ANY=[@ANYBLOB="284f9437ba931d9af0dc6f2f90a1c7b490ef0c4cde2cd1ac1bd303becfd165b1e4cee3b200f08cd7b07186fd7deafab6ba54c289ef0e0c1432423153adfb544768e0d9a09b5d3b434f8e00"/88, @ANYRES16=0x0, @ANYBLOB="100027bd7000fcdbdf252000000008000300", @ANYRES32=0x0, @ANYBLOB="0c00990004d0c1dad6000000"], 0x28}}, 0x4800) r0 = openat(0xffffffffffffff9c, 0x0, 0x1c2, 0x27) r1 = creat(&(0x7f0000000080)='./file1\x00', 0x0) ioctl$BTRFS_IOC_SCRUB_PROGRESS(r0, 0xc400941d, &(0x7f0000000200)={0x0, 0x4, 0xd3, 0x1}) ioctl$BTRFS_IOC_SCRUB(r1, 0xc400941b, &(0x7f0000000600)={r2, 0x62, 0x80000001}) pwrite64(r1, &(0x7f0000000000)="a7", 0xfffffd6b, 0x0) ioctl$PIO_UNIMAPCLR(r1, 0x4b68, &(0x7f0000000a80)={0x80, 0x4, 0x6}) r3 = socket$netlink(0x10, 0x3, 0x0) r4 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000080), 0xffffffffffffffff) sendmsg$NL80211_CMD_SET_WIPHY(r3, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000001680)=ANY=[@ANYBLOB="14000000", @ANYRES16=r4, @ANYBLOB="85c3"], 0x14}}, 0x0) sendmsg$NL80211_CMD_VENDOR(r1, &(0x7f0000000300)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f0000000040)={&(0x7f0000000180)={0x150, r4, 0x4, 0x70bd2a, 0x25dfdbff, {{}, {@val={0x8, 0x1, 0x65}, @val={0x8}, @val={0xc, 0x99, {0xffffffc1, 0x27}}}}, [@NL80211_ATTR_VENDOR_DATA={0x74, 0xc5, "3f83e382201c5653d13b4b9ca0357c50b457d55aa6af096b06453515cb85bbc6ab85a9b48e3e2ec2a2b524fd72dd7a404de54226b907f8091a3c1acaf2039e7218493b9bb607269c871c9bda9946391ae3cd1c5ac1931592296596cb3644eaa54ed861f9e8946ddcfbfe69dda78931f3"}, @NL80211_ATTR_VENDOR_SUBCMD={0x8, 0xc4, 0x10001}, @NL80211_ATTR_VENDOR_ID={0x8, 0xc3, 0x4}, @NL80211_ATTR_VENDOR_ID={0x8, 0xc3, 0x3ff}, @NL80211_ATTR_VENDOR_DATA={0x92, 0xc5, "a5218047c8fcdce03e55d4d0b76643ed8c62aa9f464983fe0818978554160f01fcee1bd95a4f0907288e78be5d8f72df15766445635a2e30c8e989c0283357f98dba7af6b00a557100c8685d6064d404406156ac8bcec07d430bf91af5d88c88499de939b5158516dbf4bb424e22daf98cd9875f845166bc3eb61d6f6b07d1d44137fd7aa86a1ec69e9c10da6c67"}]}, 0x150}, 0x1, 0x0, 0x0, 0x4040000}, 0x814) mprotect(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0xfec1373eb780a5e1) 00:10:02 executing program 6: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$netlbl_unlabel(&(0x7f0000000180), r0) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_802154(0xffffffffffffffff, 0x8933, &(0x7f0000000140)={'wpan0\x00', 0x0}) sendmsg$NL802154_CMD_SET_CCA_MODE(r1, &(0x7f0000000200)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f00000001c0)={&(0x7f0000000180)={0x34, 0x0, 0x300, 0x70bd2d, 0x25dfdbfc, {}, [@NL802154_ATTR_CCA_MODE={0x8, 0xc, 0x6}, @NL802154_ATTR_WPAN_PHY={0x8, 0x1, 0x2}, @NL802154_ATTR_IFINDEX={0x8, 0x3, r2}, @NL802154_ATTR_IFINDEX={0x8}]}, 0x34}}, 0x0) r3 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000280), r1) sendmsg$NL802154_CMD_SET_CCA_ED_LEVEL(r1, &(0x7f0000000380)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x10000000}, 0xc, &(0x7f0000000340)={&(0x7f00000002c0)={0x48, r3, 0x2, 0x70bd27, 0x25dfdbff, {}, [@NL802154_ATTR_CCA_ED_LEVEL={0x8, 0xe, 0x5}, @NL802154_ATTR_CCA_ED_LEVEL={0x8, 0xe, 0x3}, @NL802154_ATTR_WPAN_DEV={0xc, 0x6, 0x100000001}, @NL802154_ATTR_IFINDEX={0x8, 0x3, r2}, @NL802154_ATTR_CCA_ED_LEVEL={0x8, 0xe, 0x9}, @NL802154_ATTR_CCA_ED_LEVEL={0x8, 0xe, 0x5}]}, 0x48}, 0x1, 0x0, 0x0, 0x5040}, 0x40) sendmsg$IEEE802154_LIST_IFACE(r0, &(0x7f0000000200)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f00000001c0)={&(0x7f0000000140)={0x64, 0x0, 0x100, 0x70bd2d, 0x25dfdbfb, {}, [@IEEE802154_ATTR_DEV_NAME={0xa, 0x1, 'wpan4\x00'}, @IEEE802154_ATTR_DEV_NAME={0xa, 0x1, 'wpan1\x00'}, @IEEE802154_ATTR_DEV_NAME={0xa, 0x1, 'wpan3\x00'}, @IEEE802154_ATTR_DEV_NAME={0xa, 0x1, 'wpan4\x00'}, @IEEE802154_ATTR_DEV_NAME={0xa, 0x1, 'wpan3\x00'}, @IEEE802154_ATTR_DEV_NAME={0xa, 0x1, 'wpan4\x00'}, @IEEE802154_ATTR_DEV_INDEX={0x8, 0x2, r2}]}, 0x64}, 0x1, 0x0, 0x0, 0x20000019}, 0x884) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='proc\x00', 0x0, 0x0) pivot_root(&(0x7f0000000000)='./file0\x00', &(0x7f0000000240)='.\x00') 00:10:02 executing program 3: syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000d1f4655fd1f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b00000000020000280200000284", 0x62, 0x400}, {0x0, 0x0, 0x800}, {&(0x7f0000010500)="ffffffffff070000000000000000000000000000000000000000000000000080ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff", 0x400, 0xc00}, {&(0x7f0000000000)="ed41000000040000d0f4655fd1f4655fd1f4655f13ca7302f6e9dab934", 0x1d, 0x1600}], 0x0, &(0x7f0000000280)=ANY=[]) setxattr$trusted_overlay_upper(&(0x7f0000000540)='./file0\x00', &(0x7f0000000580), &(0x7f00000005c0)={0x0, 0xfb, 0x139, 0x0, 0x0, "eacbf6ff0bc36f5a7bb9fe2ee7bb1e01", "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"}, 0x139, 0x0) getxattr(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)=@random={'security.', ':\x00'}, &(0x7f0000000140)=""/55, 0x37) 00:10:02 executing program 7: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x7fffffff}]}) openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) r0 = creat(&(0x7f0000000080)='./file1\x00', 0x0) ioctl$BTRFS_IOC_SCRUB(0xffffffffffffffff, 0xc400941b, &(0x7f0000000600)) pwrite64(r0, &(0x7f0000000000)="a7", 0xfffffd6b, 0x0) accept$packet(0xffffffffffffffff, &(0x7f0000000080)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000100)=0x14) [ 872.174090] audit: type=1326 audit(1626999002.184:49): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=7602 comm="syz-executor.1" exe="/syz-executor.1" sig=31 arch=c000003e syscall=202 compat=0 ip=0x466609 code=0x0 [ 872.184545] EXT4-fs (loop3): ext4_check_descriptors: Block bitmap for group 0 not in group (block 0)! [ 872.185823] EXT4-fs (loop3): group descriptors corrupted! [ 872.187726] EXT4-fs (loop0): ext4_check_descriptors: Block bitmap for group 0 not in group (block 0)! [ 872.189039] EXT4-fs (loop0): group descriptors corrupted! 00:10:02 executing program 5: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x7fffffff}]}) r0 = signalfd4(0xffffffffffffffff, &(0x7f00000000c0), 0x8, 0x0) setsockopt$packet_fanout_data(r0, 0x107, 0x16, &(0x7f0000000100)={0x2, &(0x7f0000000080)=[{0x400, 0x80, 0x1f, 0x81}, {0x4, 0x7, 0x9, 0x3ff}]}, 0x10) 00:10:02 executing program 0: syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000d1f4655fd1f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b00000000020000280200000284", 0x62, 0x400}, {&(0x7f0000010400), 0x0, 0x800}, {&(0x7f0000010500)="ffffffffff070000000000000000000000000000000000000000000000000080ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff", 0x400, 0xc00}, {&(0x7f0000000000)="ed41000000040000d0f4655fd1f4655fd1f4655f13ca7302f6e9dab934", 0x1d, 0x1600}], 0x0, &(0x7f0000000280)=ANY=[]) setxattr$trusted_overlay_upper(&(0x7f0000000540)='./file0\x00', &(0x7f0000000580), &(0x7f00000005c0)={0x0, 0xfb, 0x139, 0x0, 0x0, "eacbf6ff0bc36f5a7bb9fe2ee7bb1e01", "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"}, 0x139, 0x0) 00:10:02 executing program 3: syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000d1f4655fd1f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b00000000020000280200000284", 0x62, 0x400}, {&(0x7f0000010400), 0x0, 0x800}, {&(0x7f0000010500)="ffffffffff070000000000000000000000000000000000000000000000000080ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff", 0x400, 0xc00}, {&(0x7f0000000000)="ed41000000040000d0f4655fd1f4655fd1f4655f13ca7302f6e9dab934", 0x1d, 0x1600}], 0x0, &(0x7f0000000280)=ANY=[]) setxattr$trusted_overlay_upper(&(0x7f0000000540)='./file0\x00', &(0x7f0000000580), &(0x7f00000005c0)={0x0, 0xfb, 0x139, 0x0, 0x0, "eacbf6ff0bc36f5a7bb9fe2ee7bb1e01", "a49dbbc75b5fc0caa97cab3ee231b0d7cf3b9be24c0fb2c145c6f2190b4a29cc525f550d79c74a03eda157db2eae62fde8958cce2a8a4c9d0374e4d6ae09ef4ee733ce4046bee0170cff57584e0671d4f286b9691d37721b43778a4afb3c3d05fd5446d2e0bac5326f43d23126410dfb85efa26b9e1ae8d056c3ebcde0c95e1443304d7a93eb4077f76047b6e13f0e79a9631ac2bd43143854803c698a7f02933d9cbdca121cc857aacabf858f3f904c9dfedb6c03186d99490f35f09de8ab897ea7c58f07dca416e1db55c7a849a91b98d0e0c0c7bf058d86a2e997a0557800a34bb7f5806f2e15e99981cc3fe615a3ff396f7d8da30ea24626263abf0ad50a0ce2dafc55f2b0286b2204114a6754b336a913a75e66ed6a3efd132f668369692f46039d"}, 0x139, 0x0) getxattr(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)=@random={'security.', ':\x00'}, &(0x7f0000000140)=""/55, 0x37) 00:10:02 executing program 6: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000040)='proc\x00', 0x0, 0x0) getresuid(&(0x7f0000000400), &(0x7f0000000440)=0x0, &(0x7f0000000480)) stat(&(0x7f0000001cc0)='.\x00', &(0x7f0000001c00)={0x0, 0x0, 0x0, 0x0, 0x0}) setresuid(0x0, r1, 0x0) syz_mount_image$tmpfs(&(0x7f00000000c0), &(0x7f0000000140)='./file0\x00', 0x100000001, 0x3, &(0x7f0000000380)=[{&(0x7f0000000180)="e17c372b43a56436e4e6e1909b5c2902c382471a8eb991a2202c0db807dc1d921b8869c3fe24377b93a87d31cac8", 0x2e, 0x80000001}, {&(0x7f00000001c0)="11a60350d96bcbc4c696fc32e99de630f70505cb570e613fdcb7dda5eea771de2d60ddfdfc4e50255687c8af88d3a988f784746be1b474d660bad4d5da10dcab7fe009", 0x43, 0x81}, {&(0x7f0000000280)="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", 0xfa, 0x3}], 0x100010, &(0x7f00000004c0)={[{@nr_inodes={'nr_inodes', 0x3d, [0x74, 0x67, 0x78, 0x38, 0x0, 0x65, 0x2d, 0x39]}}, {@huge_advise}, {@size={'size', 0x3d, [0x74, 0x34, 0x74, 0x67, 0x36, 0x67, 0x33, 0x67, 0x30]}}, {@nr_inodes={'nr_inodes', 0x3d, [0x33, 0x67, 0x37, 0x74, 0x34]}}, {@nr_inodes={'nr_inodes', 0x3d, [0x30, 0x36]}}, {@huge_never}, {@size={'size', 0x3d, [0x70, 0xa159a6105b47ffa0, 0x30, 0x25, 0x32]}}, {@huge_advise}, {@nr_blocks={'nr_blocks', 0x3d, [0x2d, 0x2d, 0x67, 0x38]}}], [{@subj_type={'subj_type', 0x3d, '\xf1){m'}}, {@obj_role={'obj_role', 0x3d, '*)\xff'}}, {@euid_eq={'euid', 0x3d, r0}}, {@obj_type}, {@fowner_gt={'fowner>', r1}}]}) pivot_root(&(0x7f0000000000)='./file0\x00', &(0x7f0000000240)='.\x00') perf_event_open(&(0x7f00000000c0)={0x5, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext={0x1000000000000, 0x2}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = creat(&(0x7f00000005c0)='./file0\x00', 0x1e1) ioctl$NS_GET_OWNER_UID(r2, 0xb704, &(0x7f0000000600)=0x0) setfsuid(r3) [ 872.355263] EXT4-fs (loop0): ext4_check_descriptors: Block bitmap for group 0 not in group (block 0)! [ 872.356612] EXT4-fs (loop0): group descriptors corrupted! [ 872.384493] EXT4-fs (loop3): ext4_check_descriptors: Block bitmap for group 0 not in group (block 0)! [ 872.385872] EXT4-fs (loop3): group descriptors corrupted! 00:10:02 executing program 5: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0xd7, 0x0, 0x0, 0x7fffffff}]}) r0 = openat(0xffffffffffffff9c, 0x0, 0x1c2, 0x27) r1 = open(&(0x7f0000000040)='./file0\x00', 0x1810c1, 0x0) ioctl$BTRFS_IOC_SCRUB_PROGRESS(r0, 0xc400941d, &(0x7f0000000200)={0x0, 0x4, 0xd3, 0x1}) pwrite64(r1, &(0x7f0000000a40)="0f64800203d6484c7ddffad1", 0xc, 0x0) lseek(r1, 0x2, 0x3) r2 = openat$full(0xffffffffffffff9c, &(0x7f0000000140), 0x200000, 0x0) ioctl$KDGETKEYCODE(r2, 0x4b4c, &(0x7f0000000180)={0xfff, 0x2}) fcntl$getflags(r1, 0x401) dup2(r0, r1) setsockopt$packet_fanout_data(r1, 0x107, 0x16, &(0x7f0000000100)={0x2, &(0x7f0000000080)=[{0x8, 0x2, 0x2, 0x7ff}, {0x3, 0x7f, 0x1, 0x81000}]}, 0x10) signalfd4(0xffffffffffffffff, &(0x7f00000000c0), 0x8, 0x0) 00:10:02 executing program 0: syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000d1f4655fd1f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b00000000020000280200000284", 0x62, 0x400}, {&(0x7f0000010400), 0x0, 0x800}, {&(0x7f0000010500)="ffffffffff070000000000000000000000000000000000000000000000000080ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff", 0x400, 0xc00}, {&(0x7f0000000000)="ed41000000040000d0f4655fd1f4655fd1f4655f13ca7302f6e9dab934", 0x1d, 0x1600}], 0x0, &(0x7f0000000280)=ANY=[]) setxattr$trusted_overlay_upper(&(0x7f0000000540)='./file0\x00', &(0x7f0000000580), &(0x7f00000005c0)={0x0, 0xfb, 0x139, 0x0, 0x0, "eacbf6ff0bc36f5a7bb9fe2ee7bb1e01", "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"}, 0x139, 0x0) 00:10:02 executing program 3: syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000d1f4655fd1f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b00000000020000280200000284", 0x62, 0x400}, {&(0x7f0000010400), 0x0, 0x800}, {&(0x7f0000010500)="ffffffffff070000000000000000000000000000000000000000000000000080ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff", 0x400, 0xc00}, {&(0x7f0000000000)="ed41000000040000d0f4655fd1f4655fd1f4655f13ca7302f6e9dab934", 0x1d, 0x1600}], 0x0, &(0x7f0000000280)=ANY=[]) setxattr$trusted_overlay_upper(&(0x7f0000000540)='./file0\x00', &(0x7f0000000580), &(0x7f00000005c0)={0x0, 0xfb, 0x139, 0x0, 0x0, "eacbf6ff0bc36f5a7bb9fe2ee7bb1e01", "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"}, 0x139, 0x0) getxattr(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)=@random={'security.', ':\x00'}, &(0x7f0000000140)=""/55, 0x37) 00:10:02 executing program 6: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x140000000002, 0x0, 0x0, 0x290050, 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000040)='proc\x00', 0x0, 0x0) pivot_root(&(0x7f0000000000)='./file0\x00', &(0x7f0000000240)='.\x00') 00:10:02 executing program 5: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0xc, &(0x7f0000000100)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x9}]}) r0 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000080), 0x90042, 0x0) signalfd4(r0, &(0x7f00000000c0)={[0x2000000000000007]}, 0x8, 0x80000) r1 = io_uring_setup(0x184d, &(0x7f0000000140)={0x0, 0xe9e2, 0x4, 0x1, 0x127, 0x0, r0}) dup2(r0, r1) [ 872.575967] EXT4-fs (loop0): ext4_check_descriptors: Block bitmap for group 0 not in group (block 0)! [ 872.577584] EXT4-fs (loop0): group descriptors corrupted! [ 872.596656] EXT4-fs (loop3): ext4_check_descriptors: Block bitmap for group 0 not in group (block 0)! [ 872.598102] EXT4-fs (loop3): group descriptors corrupted! [ 872.627796] audit: type=1326 audit(1626999002.638:50): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=7657 comm="syz-executor.5" exe="/syz-executor.5" sig=31 arch=c000003e syscall=202 compat=0 ip=0x466609 code=0x0 [ 873.444947] audit: type=1326 audit(1626999003.455:51): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=7657 comm="syz-executor.5" exe="/syz-executor.5" sig=31 arch=c000003e syscall=202 compat=0 ip=0x466609 code=0x0 00:10:15 executing program 2: r0 = seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x7fffffff}]}) r1 = signalfd4(0xffffffffffffffff, &(0x7f00000000c0), 0x8, 0x0) fsetxattr(r0, &(0x7f0000000080)=@known='trusted.overlay.upper\x00', &(0x7f0000000180)='\xd3%^-\x00', 0x5, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r0, 0xc0502100, &(0x7f0000000100)) r2 = accept$packet(r1, &(0x7f00000001c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000200)=0x14) fcntl$dupfd(r1, 0x0, r2) 00:10:15 executing program 5: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x7fffffff}]}) r0 = accept$inet(0xffffffffffffffff, &(0x7f0000000080)={0x2, 0x0, @loopback}, &(0x7f0000000100)=0x10) getsockopt$EBT_SO_GET_INIT_INFO(r0, 0x0, 0x82, &(0x7f0000000140)={'broute\x00', 0x0, 0x0, 0x0, [0x7fffffff, 0x2c, 0x5, 0x6, 0x200, 0x3]}, &(0x7f00000001c0)=0x78) signalfd4(0xffffffffffffffff, &(0x7f00000000c0), 0x8, 0x0) 00:10:15 executing program 0: syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000d1f4655fd1f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b00000000020000280200000284", 0x62, 0x400}, {&(0x7f0000010400), 0x0, 0x800}, {&(0x7f0000010500)="ffffffffff070000000000000000000000000000000000000000000000000080ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff", 0x400, 0xc00}, {&(0x7f0000000000)="ed41000000040000d0f4655fd1f4655fd1f4655f13ca7302f6e9dab934", 0x1d, 0x1600}], 0x0, &(0x7f0000000280)=ANY=[]) setxattr$trusted_overlay_upper(&(0x7f0000000540)='./file0\x00', &(0x7f0000000580), &(0x7f00000005c0)={0x0, 0xfb, 0x139, 0x0, 0x0, "eacbf6ff0bc36f5a7bb9fe2ee7bb1e01", "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"}, 0x139, 0x0) 00:10:15 executing program 3: syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000d1f4655fd1f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b00000000020000280200000284", 0x62, 0x400}, {&(0x7f0000010400), 0x0, 0x800}, {&(0x7f0000010500)="ffffffffff070000000000000000000000000000000000000000000000000080ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff", 0x400, 0xc00}, {&(0x7f0000000000)="ed41000000040000d0f4655fd1f4655fd1f4655f13ca7302f6e9dab934", 0x1d, 0x1600}], 0x0, &(0x7f0000000280)=ANY=[]) setxattr$trusted_overlay_upper(&(0x7f0000000540)='./file0\x00', &(0x7f0000000580), &(0x7f00000005c0)={0x0, 0xfb, 0x139, 0x0, 0x0, "eacbf6ff0bc36f5a7bb9fe2ee7bb1e01", "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"}, 0x139, 0x0) getxattr(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)=@random={'security.', ':\x00'}, &(0x7f0000000140)=""/55, 0x37) 00:10:15 executing program 6: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) stat(&(0x7f0000001cc0)='.\x00', &(0x7f0000001c00)={0x0, 0x0, 0x0, 0x0, 0x0}) setresuid(0x0, r0, 0x0) mount$9p_unix(&(0x7f0000000280)='./file0\x00', &(0x7f00000002c0)='./file0\x00', &(0x7f0000000300), 0x1010000, &(0x7f0000000340)={'trans=unix,', {[{@access_user}, {@cachetag={'cachetag', 0x3d, '#:-[[\x8a'}}, {@loose}, {@afid={'afid', 0x3d, 0x8}}, {@cache_fscache}, {@cache_mmap}], [{@fowner_lt={'fowner<', r0}}, {@obj_type}, {@fsmagic={'fsmagic', 0x3d, 0x2}}]}}) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000040)='proc\x00', 0x0, 0x0) pivot_root(&(0x7f0000000000)='./file0\x00', &(0x7f0000000240)='.\x00') lsetxattr$security_capability(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140), &(0x7f0000000180)=@v2={0x2000000, [{0x4, 0x80000000}, {0x9, 0xff}]}, 0x14, 0x1) llistxattr(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000200)=""/21, 0x15) 00:10:15 executing program 1: ioctl$TUNSETQUEUE(0xffffffffffffffff, 0x400454d9, &(0x7f0000000b80)={'bond0\x00'}) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x6}]}) r0 = signalfd4(0xffffffffffffffff, &(0x7f00000000c0), 0x8, 0x0) prctl$PR_SET_MM_MAP(0x23, 0xe, &(0x7f0000000180)={&(0x7f0000ffd000/0x1000)=nil, &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000fff000/0x1000)=nil, &(0x7f0000ffd000/0x1000)=nil, &(0x7f0000ffc000/0x2000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000ffe000/0x2000)=nil, &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000ffd000/0x2000)=nil, &(0x7f0000ffd000/0x2000)=nil, &(0x7f0000000140)="080afc03b8bae061a487765e741c1a3a5a7dea95a0b02b4dbb6944356a", 0x1d}, 0x68) r1 = creat(&(0x7f0000000080)='./file1\x00', 0x0) pwrite64(r1, &(0x7f0000000000)="a7", 0xfffffd6b, 0x0) accept$packet(r0, &(0x7f0000000080)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000100)=0x14) 00:10:15 executing program 7: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x7fffffff}]}) openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) r0 = creat(&(0x7f0000000080)='./file1\x00', 0x0) ioctl$BTRFS_IOC_SCRUB(0xffffffffffffffff, 0xc400941b, &(0x7f0000000600)) pwrite64(r0, &(0x7f0000000000)="a7", 0xfffffd6b, 0x0) accept$packet(0xffffffffffffffff, &(0x7f0000000080)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000100)=0x14) 00:10:15 executing program 4: getsockopt$IP_VS_SO_GET_DESTS(0xffffffffffffffff, 0x0, 0x484, &(0x7f0000000080)=""/51, &(0x7f00000000c0)=0x33) r0 = seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x7fffffff}]}) r1 = openat(0xffffffffffffff9c, 0x0, 0x1c2, 0x27) r2 = open(&(0x7f0000000040)='./file0\x00', 0x1810c1, 0x0) ioctl$BTRFS_IOC_SCRUB_PROGRESS(r1, 0xc400941d, &(0x7f0000000200)={0x0, 0x4, 0xd3, 0x1}) pwrite64(r2, &(0x7f0000000a40)="0f64800203d6484c7ddffad1", 0xc, 0x0) lseek(r2, 0x2, 0x3) fcntl$getflags(r2, 0x401) dup2(r1, r2) copy_file_range(r0, &(0x7f0000000100)=0x9, r2, &(0x7f0000000140)=0x401, 0x6, 0x0) mprotect(&(0x7f0000ffe000/0x1000)=nil, 0x1000, 0x0) 00:10:15 executing program 6: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) setxattr$security_evm(&(0x7f0000000180)='./file1\x00', &(0x7f0000000140), &(0x7f0000000280)=@sha1={0x1, "b862e32f09a9435536117a74256ba42175fcba93"}, 0x15, 0x3) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000040)='proc\x00', 0x0, 0x0) pivot_root(&(0x7f0000000000)='./file0\x00', &(0x7f0000000240)='.\x00') [ 885.786623] audit: type=1326 audit(1626999015.796:52): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=7686 comm="syz-executor.1" exe="/syz-executor.1" sig=31 arch=c000003e syscall=202 compat=0 ip=0x466609 code=0x0 [ 885.799763] EXT4-fs (loop3): ext4_check_descriptors: Block bitmap for group 0 not in group (block 0)! [ 885.800815] EXT4-fs (loop3): group descriptors corrupted! 00:10:15 executing program 5: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0xa, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x6, 0x2, 0x0, 0x7ffffffd}]}) signalfd4(0xffffffffffffffff, &(0x7f00000000c0), 0x8, 0x0) 00:10:15 executing program 3: syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000d1f4655fd1f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b00000000020000280200000284", 0x62, 0x400}, {&(0x7f0000010400)="03000000040000", 0x7, 0x800}, {&(0x7f0000010500)="ffffffffff070000000000000000000000000000000000000000000000000080ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff", 0x400, 0xc00}, {&(0x7f0000000000)="ed41000000040000d0f4655fd1f4655fd1f4655f13ca7302f6e9dab934", 0x1d, 0x1600}], 0x0, &(0x7f0000000280)=ANY=[]) setxattr$trusted_overlay_upper(&(0x7f0000000540)='./file0\x00', &(0x7f0000000580), &(0x7f00000005c0)={0x0, 0xfb, 0x139, 0x0, 0x0, "eacbf6ff0bc36f5a7bb9fe2ee7bb1e01", "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"}, 0x139, 0x0) getxattr(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)=@random={'security.', ':\x00'}, &(0x7f0000000140)=""/55, 0x37) [ 885.834040] EXT4-fs (loop0): ext4_check_descriptors: Block bitmap for group 0 not in group (block 0)! [ 885.835118] EXT4-fs (loop0): group descriptors corrupted! 00:10:15 executing program 6: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(&(0x7f00000000c0)=@nbd={'/dev/nbd', 0x0}, &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='hfsplus\x00', 0x12010, &(0x7f00000001c0)=')-+\\\x00') mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000040)='proc\x00', 0x0, 0x0) pivot_root(&(0x7f0000000000)='./file0\x00', &(0x7f0000000240)='.\x00') [ 885.868037] EXT4-fs (loop3): ext4_check_descriptors: Inode table for group 0 not in group (block 0)! [ 885.870145] EXT4-fs (loop3): group descriptors corrupted! 00:10:15 executing program 4: r0 = seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x7fffffff}]}) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r0, 0xc0502100, &(0x7f0000000080)) mprotect(&(0x7f0000ffe000/0x1000)=nil, 0x1000, 0x0) 00:10:15 executing program 2: pipe2(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}, 0x82800) r1 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000200), 0xffffffffffffffff) sendmsg$NL80211_CMD_SET_NOACK_MAP(r0, &(0x7f00000002c0)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f0000000280)={&(0x7f0000000300)=ANY=[@ANYBLOB='$\x00\x00\x00', @ANYRES16=r1, @ANYBLOB="000131bd7000ffdbdf255700040008000300dd282efef6aceeb735f168d781fad6acdf1c94ac0b0e6a39ec78bb997e9f307470946c26a895735003ecf695f36df0", @ANYRES32=0x0, @ANYBLOB="0600950080000000"], 0x24}, 0x1, 0x0, 0x0, 0x814}, 0x2000c801) add_key$user(&(0x7f0000000080), &(0x7f0000000100)={'syz', 0x2}, &(0x7f0000000140)="2988d86eab6ab085c61f8a0608e66f4156c754c9f315844ac65afb458a5b49af3f2d0f0dc2e7dc578b", 0x29, 0xfffffffffffffff8) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0xc, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x4, 0x80, 0x3, 0x7fffffff}]}) signalfd4(0xffffffffffffffff, &(0x7f00000000c0), 0x8, 0x0) 00:10:29 executing program 0: syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000d1f4655fd1f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b00000000020000280200000284", 0x62, 0x400}, {&(0x7f0000010400)="03000000040000", 0x7, 0x800}, {&(0x7f0000010500)="ffffffffff070000000000000000000000000000000000000000000000000080ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff", 0x400, 0xc00}, {&(0x7f0000000000)="ed41000000040000d0f4655fd1f4655fd1f4655f13ca7302f6e9dab934", 0x1d, 0x1600}], 0x0, &(0x7f0000000280)=ANY=[]) setxattr$trusted_overlay_upper(&(0x7f0000000540)='./file0\x00', &(0x7f0000000580), &(0x7f00000005c0)={0x0, 0xfb, 0x139, 0x0, 0x0, "eacbf6ff0bc36f5a7bb9fe2ee7bb1e01", "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"}, 0x139, 0x0) 00:10:29 executing program 2: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x80, 0x800}]}) r0 = openat(0xffffffffffffff9c, 0x0, 0x1c2, 0x27) r1 = open(&(0x7f0000000040)='./file0\x00', 0x1810c1, 0x0) ioctl$BTRFS_IOC_SCRUB_PROGRESS(r0, 0xc400941d, &(0x7f0000000200)={0x0, 0x4, 0xd3, 0x1}) pwrite64(r1, &(0x7f0000000a40)="0f64800203d6484c7ddffad1", 0xc, 0x0) lseek(r1, 0x2, 0x3) fcntl$getflags(r1, 0x401) dup2(r0, r1) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r1, 0xc0502100, &(0x7f0000000100)) signalfd4(0xffffffffffffffff, &(0x7f00000000c0), 0x8, 0x0) 00:10:29 executing program 1: ioctl$TUNSETQUEUE(0xffffffffffffffff, 0x400454d9, &(0x7f0000000b80)={'bond0\x00'}) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x7fffffff}]}) r0 = signalfd4(0xffffffffffffffff, 0x0, 0x0, 0x0) prctl$PR_SET_MM_MAP(0x23, 0xe, &(0x7f0000000180)={&(0x7f0000ffd000/0x1000)=nil, &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000fff000/0x1000)=nil, &(0x7f0000ffd000/0x1000)=nil, &(0x7f0000ffc000/0x2000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000ffe000/0x2000)=nil, &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000ffd000/0x2000)=nil, &(0x7f0000ffd000/0x2000)=nil, &(0x7f0000000140)="080afc03b8bae061a487765e741c1a3a5a7dea95a0b02b4dbb6944356a", 0x1d}, 0x68) r1 = creat(&(0x7f0000000080)='./file1\x00', 0x0) pwrite64(r1, &(0x7f0000000000)="a7", 0xfffffd6b, 0x0) accept$packet(r0, &(0x7f0000000080)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000100)=0x14) 00:10:29 executing program 7: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x7fffffff}]}) openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) creat(&(0x7f0000000080)='./file1\x00', 0x0) ioctl$BTRFS_IOC_SCRUB(0xffffffffffffffff, 0xc400941b, &(0x7f0000000600)) pwrite64(0xffffffffffffffff, &(0x7f0000000000)="a7", 0xfffffd6b, 0x0) accept$packet(0xffffffffffffffff, &(0x7f0000000080)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000100)=0x14) 00:10:29 executing program 3: syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000d1f4655fd1f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b00000000020000280200000284", 0x62, 0x400}, {&(0x7f0000010400)="03000000040000", 0x7, 0x800}, {&(0x7f0000010500)="ffffffffff070000000000000000000000000000000000000000000000000080ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff", 0x400, 0xc00}, {&(0x7f0000000000)="ed41000000040000d0f4655fd1f4655fd1f4655f13ca7302f6e9dab934", 0x1d, 0x1600}], 0x0, &(0x7f0000000280)=ANY=[]) setxattr$trusted_overlay_upper(&(0x7f0000000540)='./file0\x00', &(0x7f0000000580), &(0x7f00000005c0)={0x0, 0xfb, 0x139, 0x0, 0x0, "eacbf6ff0bc36f5a7bb9fe2ee7bb1e01", "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"}, 0x139, 0x0) getxattr(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)=@random={'security.', ':\x00'}, &(0x7f0000000140)=""/55, 0x37) 00:10:29 executing program 5: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x7fffffff}]}) signalfd4(0xffffffffffffffff, &(0x7f00000000c0)={[0x2]}, 0x8, 0x80c00) 00:10:29 executing program 6: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x203000, 0x0) stat(&(0x7f0000001cc0)='.\x00', &(0x7f0000001c00)={0x0, 0x0, 0x0, 0x0, 0x0}) setresuid(0x0, r0, 0x0) mount$9p_unix(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f0000000180), 0x24000, &(0x7f0000000280)={'trans=unix,', {[{@cache_fscache}, {@nodevmap}], [{@uid_eq={'uid', 0x3d, r0}}, {@subj_role={'subj_role', 0x3d, 'proc\x00'}}, {@euid_lt}, {@dont_hash}, {@obj_type={'obj_type', 0x3d, 'proc\x00'}}, {@obj_type={'obj_type', 0x3d, '-!'}}, {@seclabel}]}}) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000040)='proc\x00', 0x810000, 0x0) setsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000001c0)={0x0, r0, 0xee00}, 0xc) syz_mount_image$ext4(&(0x7f0000000200)='ext4\x00', &(0x7f0000000340)='./file0\x00', 0x5, 0x6, &(0x7f0000000780)=[{&(0x7f0000000380)="d8ce710eea327fc0bbef7923c0c6a761fa83fe253e7f2e8872acacb1b1f2ac0f04515bf46b1f35960c6986f151464b0a5db3f4999eb38f41e2c7b462047e0e8816929450412ff7de20e62e39218d01ee6f8737f0831d2de86107f2cf834b76fb841d04a79704edd92935c1d90828c72b1bb6c8fe46051902778442464c76bff40401e66b590fb3de2e4f8a98cd46f939289dc8fe2be1e5fa4d3841d52bff91ff5d5fe1e272e2cd7615500e8ea8c244d69c9e0a8e41506ce6f54d38459133aa0b6406f4efb7be08849366fd2336c78d16043fe35043477091da6c9537c75174778dda9856afe3b49a80ec", 0xea, 0x8}, {&(0x7f0000000480), 0x0, 0x6}, {&(0x7f00000004c0)="d7ab775315f1114bbd17b46f88cd7cb496c08b5bdaa9c5660e8557ced8fb3bd922081793a8b87187e9909c9cd049ba1732a9f4d784dc89e2246d93c255f7246886070d87d6c34845f00e66dbbe8deeab1470de33e426c499d55cba5d9953269197b1f82afa665eca2a3dc231782eeae9f9e249026094cd9ae7fadd", 0x7b, 0x40}, {&(0x7f0000000540)="6bb8c8c62d5c77ed237b09bfbe9428d93d2dcc7138d05f75c6f3c69eb4bd60b3a443f88b2230873483af919a11947d908f096fa5a886fe964efecac0efcdaaadfede2b33184e6030579f2fb180ec5cfe6fe26cbd1bda5b7d54b09958495e6e3db400ffca025594514eb4b2796d3df1d7c7e25fb522a18071c41b675930d077b11c6bce4949812e155c5e4fdb0c59dbe6f6cce1cdf8d92a657a209d966905e981603930861f09557c552059e00670168f092bc90b44ca74ee7e2349cdf031028b12b940b7bc8c5e436a897219e766e7b5c6df1c3ac9", 0xd5, 0x3f}, {&(0x7f0000000640)="cafebc26109c67476aa58f1913e28110d5b8f1a2c8584e296300b1a7b65c95a694fbf50ca3d2ec43ef483a325d0b8a952ab01cb6c3257922f615a1b2bceb8672f62c584bb6e203cd20a1a5bdd1e784e3f68141a632681259200a51b098f3a2046301dc0604f3c2ad2e959a3bd8f3f5b0a7b3d6c50a46e9e04ca63571a1a735c332a8742fd671be0246b58d078fc7a7d4f73c84ad392767cb53bf3333ae00b2ae121cd759e2bc150383f25391917caa3e5f207460416ae7540f7066c9454429449f6d19a0d746d4ecc8e2", 0xca}, {&(0x7f0000000740)="1f49ed5034c5025a99c3c5b1334c9ba7dee07ea357e5dd2123d233becabaf898e29098558ea6da91ca", 0x29, 0x4}], 0x0, &(0x7f0000000840)={[{@grpquota}, {@stripe={'stripe', 0x3d, 0x7d7}}, {@stripe={'stripe', 0x3d, 0x12}}], [{@measure}, {@uid_eq={'uid', 0x3d, 0xffffffffffffffff}}, {@fsmagic={'fsmagic', 0x3d, 0x80000001}}, {@smackfstransmute}]}) pivot_root(&(0x7f0000000000)='./file0\x00', &(0x7f0000000240)='.\x00') 00:10:29 executing program 4: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x7fffffff}]}) 00:10:29 executing program 6: ioctl$SNDRV_SEQ_IOCTL_GET_CLIENT_INFO(0xffffffffffffffff, 0xc0bc5310, &(0x7f0000000140)) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000040)='proc\x00', 0x0, 0x0) pivot_root(&(0x7f0000000000)='./file0\x00', &(0x7f0000000240)='.\x00') [ 899.202361] audit: type=1326 audit(1626999029.212:53): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=7736 comm="syz-executor.2" exe="/syz-executor.2" sig=31 arch=c000003e syscall=202 compat=0 ip=0x466609 code=0x0 [ 899.216915] EXT4-fs (loop3): ext4_check_descriptors: Inode table for group 0 not in group (block 0)! [ 899.217913] EXT4-fs (loop3): group descriptors corrupted! 00:10:29 executing program 7: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x7fffffff}]}) openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) creat(&(0x7f0000000080)='./file1\x00', 0x0) ioctl$BTRFS_IOC_SCRUB(0xffffffffffffffff, 0xc400941b, &(0x7f0000000600)) pwrite64(0xffffffffffffffff, &(0x7f0000000000)="a7", 0xfffffd6b, 0x0) accept$packet(0xffffffffffffffff, &(0x7f0000000080)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000100)=0x14) [ 899.234005] EXT4-fs (loop0): ext4_check_descriptors: Inode table for group 0 not in group (block 0)! [ 899.235039] EXT4-fs (loop0): group descriptors corrupted! 00:10:29 executing program 5: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0xc, &(0x7f0000000040)={0x2, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x7fffffff}, {0x1000, 0x23, 0x7, 0x54a}]}) signalfd4(0xffffffffffffffff, &(0x7f00000000c0), 0x8, 0x0) 00:10:29 executing program 4: r0 = seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x7fffffff}]}) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r0, 0xc0502100, &(0x7f0000000080)={0x0}) ioctl$SECCOMP_IOCTL_NOTIF_ADDFD(r0, 0x40182103, &(0x7f0000000100)={r1, 0x1, 0xffffffffffffffff, 0x7f}) mprotect(&(0x7f0000ffe000/0x1000)=nil, 0x1000, 0x0) 00:10:29 executing program 3: syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000d1f4655fd1f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b00000000020000280200000284", 0x62, 0x400}, {&(0x7f0000010400)="03000000040000", 0x7, 0x800}, {&(0x7f0000010500)="ffffffffff070000000000000000000000000000000000000000000000000080ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff", 0x400, 0xc00}, {&(0x7f0000000000)="ed41000000040000d0f4655fd1f4655fd1f4655f13ca7302f6e9dab934", 0x1d, 0x1600}], 0x0, &(0x7f0000000280)=ANY=[]) setxattr$trusted_overlay_upper(&(0x7f0000000540)='./file0\x00', &(0x7f0000000580), &(0x7f00000005c0)={0x0, 0xfb, 0x139, 0x0, 0x0, "eacbf6ff0bc36f5a7bb9fe2ee7bb1e01", "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"}, 0x139, 0x0) getxattr(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)=@random={'security.', ':\x00'}, &(0x7f0000000140)=""/55, 0x37) 00:10:29 executing program 0: syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000d1f4655fd1f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b00000000020000280200000284", 0x62, 0x400}, {&(0x7f0000010400)="03000000040000", 0x7, 0x800}, {&(0x7f0000010500)="ffffffffff070000000000000000000000000000000000000000000000000080ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff", 0x400, 0xc00}, {&(0x7f0000000000)="ed41000000040000d0f4655fd1f4655fd1f4655f13ca7302f6e9dab934", 0x1d, 0x1600}], 0x0, &(0x7f0000000280)=ANY=[]) setxattr$trusted_overlay_upper(&(0x7f0000000540)='./file0\x00', &(0x7f0000000580), &(0x7f00000005c0)={0x0, 0xfb, 0x139, 0x0, 0x0, "eacbf6ff0bc36f5a7bb9fe2ee7bb1e01", "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"}, 0x139, 0x0) [ 899.350815] EXT4-fs (loop0): ext4_check_descriptors: Inode table for group 0 not in group (block 0)! [ 899.351908] EXT4-fs (loop0): group descriptors corrupted! [ 899.352363] EXT4-fs (loop3): ext4_check_descriptors: Inode table for group 0 not in group (block 0)! [ 899.354521] EXT4-fs (loop3): group descriptors corrupted! 00:10:29 executing program 4: ioctl$PIO_UNIMAP(0xffffffffffffffff, 0x4b67, &(0x7f0000000200)={0x2, &(0x7f00000001c0)=[{0xfffc, 0x8}, {0x2, 0x8}]}) ioctl$SNDRV_SEQ_IOCTL_DELETE_QUEUE(0xffffffffffffffff, 0x408c5333, &(0x7f0000000100)={0x400, 0x45f, 0x1, 'queue0\x00'}) r0 = seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x7fffffff}]}) r1 = pidfd_getfd(0xffffffffffffffff, r0, 0x0) ioctl$TUNATTACHFILTER(r1, 0x401054d5, &(0x7f00000000c0)={0x5, &(0x7f0000000080)=[{0xc95, 0x5, 0x2}, {0xfff8, 0xaf, 0x4, 0x7fffffff}, {0x8001, 0x9, 0x0, 0x6}, {0x8, 0xfb, 0x40, 0x6}, {0x83e9, 0x4, 0x0, 0x800}]}) mprotect(&(0x7f0000ffe000/0x1000)=nil, 0x1000, 0x0) 00:10:29 executing program 5: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x6, 0xf7, 0x5, 0x7fff0003}]}) signalfd4(0xffffffffffffffff, &(0x7f00000000c0), 0x8, 0x0) 00:10:29 executing program 7: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x7fffffff}]}) openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) creat(&(0x7f0000000080)='./file1\x00', 0x0) ioctl$BTRFS_IOC_SCRUB(0xffffffffffffffff, 0xc400941b, &(0x7f0000000600)) pwrite64(0xffffffffffffffff, &(0x7f0000000000)="a7", 0xfffffd6b, 0x0) accept$packet(0xffffffffffffffff, &(0x7f0000000080)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000100)=0x14) [ 900.026599] audit: type=1326 audit(1626999030.036:54): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=7736 comm="syz-executor.2" exe="/syz-executor.2" sig=31 arch=c000003e syscall=202 compat=0 ip=0x466609 code=0x0 00:10:43 executing program 1: ioctl$TUNSETQUEUE(0xffffffffffffffff, 0x400454d9, &(0x7f0000000b80)={'bond0\x00'}) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x7fffffff}]}) r0 = signalfd4(0xffffffffffffffff, 0x0, 0x0, 0x0) prctl$PR_SET_MM_MAP(0x23, 0xe, 0x0, 0x0) r1 = creat(&(0x7f0000000080)='./file1\x00', 0x0) pwrite64(r1, &(0x7f0000000000)="a7", 0xfffffd6b, 0x0) accept$packet(r0, &(0x7f0000000080)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000100)=0x14) 00:10:43 executing program 5: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x7fffffff}]}) r0 = socket$packet(0x11, 0x0, 0x300) signalfd4(r0, &(0x7f00000000c0), 0x8, 0x0) 00:10:43 executing program 2: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f0000000040)=[{0x7, 0x0, 0x0, 0x7fffffff}]}) signalfd4(0xffffffffffffffff, &(0x7f00000000c0), 0x8, 0x0) 00:10:43 executing program 0: syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000d1f4655fd1f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b00000000020000280200000284", 0x62, 0x400}, {&(0x7f0000010400)="03000000040000", 0x7, 0x800}, {&(0x7f0000010500)="ffffffffff070000000000000000000000000000000000000000000000000080ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff", 0x400, 0xc00}, {&(0x7f0000000000)="ed41000000040000d0f4655fd1f4655fd1f4655f13ca7302f6e9dab934", 0x1d, 0x1600}], 0x0, &(0x7f0000000280)=ANY=[]) setxattr$trusted_overlay_upper(&(0x7f0000000540)='./file0\x00', &(0x7f0000000580), &(0x7f00000005c0)={0x0, 0xfb, 0x139, 0x0, 0x0, "eacbf6ff0bc36f5a7bb9fe2ee7bb1e01", "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"}, 0x139, 0x0) 00:10:43 executing program 6: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000040)='proc\x00', 0x0, 0x0) r0 = shmget$private(0x0, 0x4000, 0x2, &(0x7f0000ffa000/0x4000)=nil) getresgid(&(0x7f0000001280)=0x0, &(0x7f00000012c0), &(0x7f0000001300)) r2 = fork() shmctl$IPC_SET(r0, 0x1, &(0x7f0000001340)={{0x1, 0xee01, r1, 0xee00, 0xee00, 0xc9, 0x800}, 0x8001, 0x1, 0x8, 0x5, 0xffffffffffffffff, r2, 0x7}) stat(&(0x7f0000001cc0)='.\x00', &(0x7f0000001c00)={0x0, 0x0, 0x0, 0x0, 0x0}) setresuid(0x0, r3, 0x0) mount$9p_unix(&(0x7f00000000c0)='./file0/file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f0000000180), 0x100030, &(0x7f0000000380)=ANY=[@ANYBLOB='trans=unix,cache=mmap,access=user,access=client,mmap,uname=[,dfltgid=', @ANYRESHEX=r1, @ANYBLOB=',uid>', @ANYRESDEC=r3, @ANYBLOB="2c646f6e745f6d65417334f9aad1736d61636b66736861743d29612b2c2c66494c455f4d4d41502c657569643ceaf49664b5e8f0ea96680f4a2788aa3793d65b98c7b7c9c0f322f2734d613eb3660000000000", @ANYRESDEC=0xee00, @ANYBLOB="2c6673636f6e87657869e9724534ded28d8db30c4fe1b682be46"]) pivot_root(&(0x7f0000000000)='./file0\x00', &(0x7f0000000240)='.\x00') 00:10:43 executing program 4: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x8, &(0x7f0000000000)={0x0, &(0x7f0000000040)}) mprotect(&(0x7f0000ffe000/0x1000)=nil, 0x1000, 0x0) 00:10:43 executing program 7: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x7fffffff}]}) openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) r0 = creat(&(0x7f0000000080)='./file1\x00', 0x0) ioctl$BTRFS_IOC_SCRUB(0xffffffffffffffff, 0xc400941b, &(0x7f0000000600)) pwrite64(r0, 0x0, 0x0, 0x0) accept$packet(0xffffffffffffffff, &(0x7f0000000080)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000100)=0x14) 00:10:43 executing program 3: syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000d1f4655fd1f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b00000000020000280200000284", 0x62, 0x400}, {&(0x7f0000010400)="03000000040000000500", 0xa, 0x800}, {&(0x7f0000010500)="ffffffffff070000000000000000000000000000000000000000000000000080ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff", 0x400, 0xc00}, {&(0x7f0000000000)="ed41000000040000d0f4655fd1f4655fd1f4655f13ca7302f6e9dab934", 0x1d, 0x1600}], 0x0, &(0x7f0000000280)=ANY=[]) setxattr$trusted_overlay_upper(&(0x7f0000000540)='./file0\x00', &(0x7f0000000580), &(0x7f00000005c0)={0x0, 0xfb, 0x139, 0x0, 0x0, "eacbf6ff0bc36f5a7bb9fe2ee7bb1e01", "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"}, 0x139, 0x0) getxattr(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)=@random={'security.', ':\x00'}, &(0x7f0000000140)=""/55, 0x37) 00:10:43 executing program 5: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0xc, &(0x7f0000000000)={0x0, &(0x7f0000000040)}) signalfd4(0xffffffffffffffff, &(0x7f00000000c0), 0x8, 0x0) [ 913.737192] EXT4-fs (loop0): ext4_check_descriptors: Inode table for group 0 not in group (block 0)! [ 913.740049] EXT4-fs (loop0): group descriptors corrupted! [ 913.757936] EXT4-fs (loop3): mounted filesystem without journal. Opts: ,errors=continue 00:10:43 executing program 7: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x7fffffff}]}) openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) r0 = creat(&(0x7f0000000080)='./file1\x00', 0x0) ioctl$BTRFS_IOC_SCRUB(0xffffffffffffffff, 0xc400941b, &(0x7f0000000600)) pwrite64(r0, 0x0, 0x0, 0x0) accept$packet(0xffffffffffffffff, 0x0, &(0x7f0000000100)) 00:10:43 executing program 5: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x7fffffff}]}) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0xa, &(0x7f0000000100)={0x2, &(0x7f0000000080)=[{0x1ff, 0xfa, 0x1, 0x3}, {0x1, 0x81, 0x8, 0x5}]}) r0 = openat(0xffffffffffffff9c, 0x0, 0x1c2, 0x27) r1 = open(&(0x7f0000000040)='./file0\x00', 0x1810c1, 0x0) ioctl$BTRFS_IOC_SCRUB_PROGRESS(r0, 0xc400941d, &(0x7f0000000200)={0x0, 0x4, 0xd3, 0x1}) pwrite64(r1, &(0x7f0000000a40)="0f64800203d6484c7ddffad1", 0xc, 0x0) lseek(r1, 0x2, 0x3) fcntl$getflags(r1, 0x401) dup2(r0, r1) fspick(r1, &(0x7f0000000140)='./file0\x00', 0x0) signalfd4(0xffffffffffffffff, &(0x7f00000000c0), 0x8, 0x0) 00:10:43 executing program 0: syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000d1f4655fd1f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b00000000020000280200000284", 0x62, 0x400}, {&(0x7f0000010400)="03000000040000000500", 0xa, 0x800}, {&(0x7f0000010500)="ffffffffff070000000000000000000000000000000000000000000000000080ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff", 0x400, 0xc00}, {&(0x7f0000000000)="ed41000000040000d0f4655fd1f4655fd1f4655f13ca7302f6e9dab934", 0x1d, 0x1600}], 0x0, &(0x7f0000000280)=ANY=[]) setxattr$trusted_overlay_upper(&(0x7f0000000540)='./file0\x00', &(0x7f0000000580), &(0x7f00000005c0)={0x0, 0xfb, 0x139, 0x0, 0x0, "eacbf6ff0bc36f5a7bb9fe2ee7bb1e01", "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"}, 0x139, 0x0) 00:10:43 executing program 2: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0xc, &(0x7f0000000000)={0x39, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x7fffffff}]}) r0 = signalfd4(0xffffffffffffffff, &(0x7f00000000c0), 0x8, 0x0) ioctl$EVIOCGREP(r0, 0x80084503, &(0x7f0000000100)=""/236) [ 913.863104] EXT4-fs (loop0): mounted filesystem without journal. Opts: ,errors=continue 00:10:43 executing program 4: r0 = seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x8, &(0x7f0000000000)={0x2, &(0x7f00000001c0)=[{0xffff, 0x0, 0x0, 0x7ffffffc}, {0x3, 0x5, 0x80}]}) ioctl$SECCOMP_IOCTL_NOTIF_ADDFD(r0, 0x40182103, &(0x7f0000000140)={0x0, 0x0, r0, 0x7b663db8, 0x80000}) r1 = openat$null(0xffffffffffffff9c, &(0x7f0000000080), 0x8000, 0x0) setsockopt$inet6_buf(r1, 0x29, 0x2d, &(0x7f0000000180)="0a06b4aefdfa4207c7a31b813d4ed3ec9566d226b0210148c8a015bedd9b3cce18f5ac70e8dbfe964d210d741bc8b3cc40282931ce", 0x35) syncfs(r1) r2 = socket$inet_tcp(0x2, 0x1, 0x0) getsockname$inet(r2, &(0x7f00000000c0)={0x2, 0x0, @empty}, &(0x7f0000000100)=0x10) mprotect(&(0x7f0000ffe000/0x1000)=nil, 0x1000, 0x0) 00:10:43 executing program 3: syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000d1f4655fd1f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b00000000020000280200000284", 0x62, 0x400}, {&(0x7f0000010400)="03000000040000000500", 0xa, 0x800}, {&(0x7f0000010500)="ffffffffff070000000000000000000000000000000000000000000000000080ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff", 0x400, 0xc00}, {&(0x7f0000000000)="ed41000000040000d0f4655fd1f4655fd1f4655f13ca7302f6e9dab934", 0x1d, 0x1600}], 0x0, &(0x7f0000000280)=ANY=[]) setxattr$trusted_overlay_upper(&(0x7f0000000540)='./file0\x00', &(0x7f0000000580), &(0x7f00000005c0)={0x0, 0xfb, 0x139, 0x0, 0x0, "eacbf6ff0bc36f5a7bb9fe2ee7bb1e01", "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"}, 0x139, 0x0) getxattr(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)=@random={'security.', ':\x00'}, &(0x7f0000000140)=""/55, 0x37) 00:10:43 executing program 7: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x7fffffff}]}) openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) r0 = creat(&(0x7f0000000080)='./file1\x00', 0x0) ioctl$BTRFS_IOC_SCRUB(0xffffffffffffffff, 0xc400941b, &(0x7f0000000600)) pwrite64(r0, 0x0, 0x0, 0x0) accept$packet(0xffffffffffffffff, 0x0, 0x0) [ 914.047281] EXT4-fs (loop3): mounted filesystem without journal. Opts: ,errors=continue 00:10:54 executing program 6: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x26000, 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000040)='proc\x00', 0x0, 0x0) pivot_root(&(0x7f0000000000)='./file0\x00', &(0x7f0000000240)='.\x00') 00:10:54 executing program 1: ioctl$TUNSETQUEUE(0xffffffffffffffff, 0x400454d9, &(0x7f0000000b80)={'bond0\x00'}) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x7fffffff}]}) r0 = signalfd4(0xffffffffffffffff, 0x0, 0x0, 0x0) prctl$PR_SET_MM_MAP(0x23, 0xe, 0x0, 0x0) r1 = creat(0x0, 0x0) pwrite64(r1, &(0x7f0000000000)="a7", 0xfffffd6b, 0x0) accept$packet(r0, &(0x7f0000000080)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000100)=0x14) 00:10:54 executing program 5: r0 = fork() ptrace(0xffffffffffffffff, 0x0) r1 = fork() ptrace(0x10, r1) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000000)) ptrace$cont(0x20, r1, 0x0, 0x400000000000000) pidfd_open(r1, 0x0) r2 = openat(0xffffffffffffff9c, 0x0, 0x1c2, 0x27) r3 = open(&(0x7f0000001100)='./file0\x00', 0x3830c1, 0x0) ioctl$BTRFS_IOC_SCRUB_PROGRESS(r2, 0xc400941d, &(0x7f0000000200)={0x0, 0x4, 0xd3, 0x1}) pwrite64(r3, &(0x7f0000000a40)="0f64800203d6484c7ddffad1", 0xc, 0x0) lseek(r3, 0x2, 0x3) fcntl$getflags(r3, 0x401) dup2(r2, r3) kcmp(r0, r1, 0x6, 0xffffffffffffffff, r3) r5 = seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x10, 0x7fffffff}]}) r6 = socket$nl_sock_diag(0x10, 0x3, 0x4) syz_open_procfs$namespace(r1, &(0x7f0000000080)='ns/net\x00') ioctl$BTRFS_IOC_SNAP_DESTROY_V2(r5, 0x5000943f, &(0x7f0000000100)={{r6}, 0x0, 0x16, @unused=[0x10000000, 0x2000000001, 0x20000000000000, 0x97c], @devid=r4}) signalfd4(0xffffffffffffffff, &(0x7f00000000c0), 0x8, 0x0) 00:10:54 executing program 2: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x7fffffff}]}) r0 = openat(0xffffffffffffff9c, 0x0, 0x1c2, 0x27) r1 = open(&(0x7f0000000040)='./file0\x00', 0x1810c1, 0x0) ioctl$BTRFS_IOC_SCRUB_PROGRESS(r0, 0xc400941d, &(0x7f0000000200)={0x0, 0x4, 0xd3, 0x1}) pwrite64(r1, &(0x7f0000000a40)="0f64800203d6484c7ddffad1", 0xc, 0x0) lseek(r1, 0x2, 0x3) fcntl$getflags(r1, 0x401) dup2(r0, r1) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r0, 0xc0502100, &(0x7f0000000100)) signalfd4(0xffffffffffffffff, &(0x7f00000000c0), 0x8, 0x0) 00:10:54 executing program 3: syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000d1f4655fd1f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b00000000020000280200000284", 0x62, 0x400}, {&(0x7f0000010400)="03000000040000000500", 0xa, 0x800}, {&(0x7f0000010500)="ffffffffff070000000000000000000000000000000000000000000000000080ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff", 0x400, 0xc00}, {&(0x7f0000000000)="ed41000000040000d0f4655fd1f4655fd1f4655f13ca7302f6e9dab934", 0x1d, 0x1600}], 0x0, &(0x7f0000000280)=ANY=[]) setxattr$trusted_overlay_upper(&(0x7f0000000540)='./file0\x00', &(0x7f0000000580), &(0x7f00000005c0)={0x0, 0xfb, 0x139, 0x0, 0x0, "eacbf6ff0bc36f5a7bb9fe2ee7bb1e01", "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"}, 0x139, 0x0) getxattr(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)=@random={'security.', ':\x00'}, &(0x7f0000000140)=""/55, 0x37) 00:10:54 executing program 0: syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000d1f4655fd1f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b00000000020000280200000284", 0x62, 0x400}, {&(0x7f0000010400)="03000000040000000500", 0xa, 0x800}, {&(0x7f0000010500)="ffffffffff070000000000000000000000000000000000000000000000000080ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff", 0x400, 0xc00}, {&(0x7f0000000000)="ed41000000040000d0f4655fd1f4655fd1f4655f13ca7302f6e9dab934", 0x1d, 0x1600}], 0x0, &(0x7f0000000280)=ANY=[]) setxattr$trusted_overlay_upper(&(0x7f0000000540)='./file0\x00', &(0x7f0000000580), &(0x7f00000005c0)={0x0, 0xfb, 0x139, 0x0, 0x0, "eacbf6ff0bc36f5a7bb9fe2ee7bb1e01", "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"}, 0x139, 0x0) 00:10:54 executing program 7: r0 = seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x8, &(0x7f0000000000)={0x2, &(0x7f00000001c0)=[{0xffff, 0x0, 0x0, 0x7ffffffc}, {0x3, 0x5, 0x80}]}) ioctl$SECCOMP_IOCTL_NOTIF_ADDFD(r0, 0x40182103, &(0x7f0000000140)={0x0, 0x0, r0, 0x7b663db8, 0x80000}) r1 = openat$null(0xffffffffffffff9c, &(0x7f0000000080), 0x8000, 0x0) setsockopt$inet6_buf(r1, 0x29, 0x2d, &(0x7f0000000180)="0a06b4aefdfa4207c7a31b813d4ed3ec9566d226b0210148c8a015bedd9b3cce18f5ac70e8dbfe964d210d741bc8b3cc40282931ce", 0x35) syncfs(r1) r2 = socket$inet_tcp(0x2, 0x1, 0x0) getsockname$inet(r2, &(0x7f00000000c0)={0x2, 0x0, @empty}, &(0x7f0000000100)=0x10) mprotect(&(0x7f0000ffe000/0x1000)=nil, 0x1000, 0x0) 00:10:54 executing program 4: r0 = seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x8, 0x0, 0xfe, 0x7fffffff}]}) mprotect(&(0x7f0000ffe000/0x1000)=nil, 0x1000, 0x0) pkey_mprotect(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x1000007, 0xffffffffffffffff) sendfile(0xffffffffffffffff, r0, &(0x7f0000000100)=0x80, 0x8) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r0, 0xc0502100, &(0x7f0000000080)) 00:10:54 executing program 7: syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000d1f4655fd1f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b00000000020000280200000284", 0x62, 0x400}, {&(0x7f0000010400)="03000000040000000500", 0xa, 0x800}, {&(0x7f0000010500)="ffffffffff070000000000000000000000000000000000000000000000000080ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff", 0x400, 0xc00}, {&(0x7f0000000000)="ed41000000040000d0f4655fd1f4655fd1f4655f13ca7302f6e9dab934", 0x1d, 0x1600}], 0x0, &(0x7f0000000280)=ANY=[]) setxattr$trusted_overlay_upper(&(0x7f0000000540)='./file0\x00', &(0x7f0000000580), &(0x7f00000005c0)={0x0, 0xfb, 0x139, 0x0, 0x0, "eacbf6ff0bc36f5a7bb9fe2ee7bb1e01", "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"}, 0x139, 0x0) getxattr(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)=@random={'security.', ':\x00'}, &(0x7f0000000140)=""/55, 0x37) 00:10:54 executing program 1: ioctl$TUNSETQUEUE(0xffffffffffffffff, 0x400454d9, &(0x7f0000000b80)={'bond0\x00'}) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x7fffffff}]}) r0 = signalfd4(0xffffffffffffffff, 0x0, 0x0, 0x0) prctl$PR_SET_MM_MAP(0x23, 0xe, 0x0, 0x0) r1 = creat(0x0, 0x0) pwrite64(r1, &(0x7f0000000000)="a7", 0xfffffd6b, 0x0) accept$packet(r0, &(0x7f0000000080)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000100)=0x14) 00:10:54 executing program 6: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000040)='proc\x00', 0x0, 0x0) openat$dir(0xffffffffffffff9c, &(0x7f00000002c0)='./file0/file0\x00', 0x100, 0x40) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000580)={{{@in6=@loopback, @in6=@mcast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast2}, 0x0, @in6=@remote}}, &(0x7f0000000280)=0x10d) setsockopt$IP_VS_SO_SET_DEL(0xffffffffffffffff, 0x0, 0x484, &(0x7f0000000500)={0x73, @loopback, 0x4e23, 0x0, 'dh\x00', 0x29, 0x9c, 0x6a}, 0x2c) mount$9p_unix(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f0000000180), 0x3a04084, &(0x7f00000003c0)=ANY=[@ANYBLOB='trans=unix,no`evmap,access=', @ANYRESDEC=r0, @ANYBLOB=',posixacl,version=9p2000.u,smackfsdef=proc\x00,appraise_type=imasig,smackfstransmute=proc\x00,smackfsroot=proc\x00,\x00']) mount(&(0x7f00000001c0)=ANY=[@ANYBLOB='\x00'/12], &(0x7f0000000200)='./file0\x00', &(0x7f0000000480)='qnx4\x00', 0x1000, &(0x7f00000004c0)='\x00') pivot_root(&(0x7f0000000000)='./file0\x00', &(0x7f0000000240)='.\x00') umount2(&(0x7f0000000540)='./file0/file0\x00', 0x8) 00:10:54 executing program 2: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x7fffffff}]}) r0 = openat(0xffffffffffffff9c, 0x0, 0x1c2, 0x27) r1 = open(&(0x7f0000000040)='./file0\x00', 0x1810c1, 0x0) ioctl$BTRFS_IOC_SCRUB_PROGRESS(r0, 0xc400941d, &(0x7f0000000200)={0x0, 0x4, 0xd3, 0x1}) pwrite64(r1, &(0x7f0000000a40)="0f64800203d6484c7ddffad1", 0xc, 0x0) lseek(r1, 0x2, 0x3) r2 = perf_event_open$cgroup(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x2, 0x8, 0x5, 0x0, 0x6, 0x8, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x3, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0xfffffffc, 0x2, @perf_config_ext={0x7, 0x1}, 0x8860, 0x1000, 0xfff, 0x8, 0x100000000, 0x0, 0x4, 0x0, 0x5, 0x0, 0x7}, r0, 0x6, 0xffffffffffffffff, 0x0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) sendfile(r3, r0, &(0x7f0000000600)=0x20, 0x1) ioctl$BTRFS_IOC_DEFRAG(r2, 0x50009402, 0x0) fcntl$getflags(r1, 0x401) dup2(r0, r1) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r1, 0xc0502100, &(0x7f0000000100)) signalfd4(0xffffffffffffffff, &(0x7f00000000c0), 0x8, 0x0) [ 924.585866] EXT4-fs (loop3): mounted filesystem without journal. Opts: ,errors=continue [ 924.586300] EXT4-fs (loop0): mounted filesystem without journal. Opts: ,errors=continue [ 924.614343] 9pnet: p9_fd_create_unix (7868): problem connecting socket: ./file0: -111 [ 924.615260] EXT4-fs (loop7): mounted filesystem without journal. Opts: ,errors=continue [ 924.642378] 9pnet: p9_fd_create_unix (7868): problem connecting socket: ./file0: -111 00:10:54 executing program 1: ioctl$TUNSETQUEUE(0xffffffffffffffff, 0x400454d9, &(0x7f0000000b80)={'bond0\x00'}) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x7fffffff}]}) r0 = signalfd4(0xffffffffffffffff, 0x0, 0x0, 0x0) prctl$PR_SET_MM_MAP(0x23, 0xe, 0x0, 0x0) r1 = creat(0x0, 0x0) pwrite64(r1, &(0x7f0000000000)="a7", 0xfffffd6b, 0x0) accept$packet(r0, &(0x7f0000000080)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000100)=0x14) 00:10:54 executing program 0: syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000d1f4655fd1f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b00000000020000280200000284", 0x62, 0x400}, {&(0x7f0000010400)="03000000040000000500", 0xa, 0x800}, {&(0x7f0000010500)="ffffffffff070000000000000000000000000000000000000000000000000080ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff", 0x400, 0xc00}, {&(0x7f0000000000)="ed41000000040000d0f4655fd1f4655fd1f4655f13ca7302f6e9dab934", 0x1d, 0x1600}], 0x0, &(0x7f0000000280)=ANY=[]) setxattr$trusted_overlay_upper(&(0x7f0000000540)='./file0\x00', &(0x7f0000000580), &(0x7f00000005c0)={0x0, 0xfb, 0x139, 0x0, 0x0, "eacbf6ff0bc36f5a7bb9fe2ee7bb1e01", "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"}, 0x139, 0x0) 00:10:54 executing program 6: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000040)='proc\x00', 0x0, 0x0) pivot_root(&(0x7f0000000000)='./file0\x00', &(0x7f0000000240)='.\x00') 00:10:54 executing program 7: syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000d1f4655fd1f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b00000000020000280200000284", 0x62, 0x400}, {&(0x7f0000010400)="03000000040000000500", 0xa, 0x800}, {&(0x7f0000010500)="ffffffffff070000000000000000000000000000000000000000000000000080ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff", 0x400, 0xc00}, {&(0x7f0000000000)="ed41000000040000d0f4655fd1f4655fd1f4655f13ca7302f6e9dab934", 0x1d, 0x1600}], 0x0, &(0x7f0000000280)=ANY=[]) setxattr$trusted_overlay_upper(&(0x7f0000000540)='./file0\x00', &(0x7f0000000580), &(0x7f00000005c0)={0x0, 0xfb, 0x139, 0x0, 0x0, "eacbf6ff0bc36f5a7bb9fe2ee7bb1e01", "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"}, 0x139, 0x0) 00:10:54 executing program 5: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x8, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x7, 0x0, 0x9, 0x5}]}) r0 = signalfd4(0xffffffffffffffff, &(0x7f00000000c0), 0x8, 0x0) ioctl$F2FS_IOC_DEFRAGMENT(r0, 0xc010f508, &(0x7f0000000080)={0xfffffffffffffffa, 0xf9}) 00:10:54 executing program 3: syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000d1f4655fd1f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b00000000020000280200000284", 0x62, 0x400}, {&(0x7f0000010400)="030000000400000005000000", 0xc, 0x800}, {&(0x7f0000010500)="ffffffffff070000000000000000000000000000000000000000000000000080ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff", 0x400, 0xc00}, {&(0x7f0000000000)="ed41000000040000d0f4655fd1f4655fd1f4655f13ca7302f6e9dab934", 0x1d, 0x1600}], 0x0, &(0x7f0000000280)=ANY=[]) setxattr$trusted_overlay_upper(&(0x7f0000000540)='./file0\x00', &(0x7f0000000580), &(0x7f00000005c0)={0x0, 0xfb, 0x139, 0x0, 0x0, "eacbf6ff0bc36f5a7bb9fe2ee7bb1e01", "a49dbbc75b5fc0caa97cab3ee231b0d7cf3b9be24c0fb2c145c6f2190b4a29cc525f550d79c74a03eda157db2eae62fde8958cce2a8a4c9d0374e4d6ae09ef4ee733ce4046bee0170cff57584e0671d4f286b9691d37721b43778a4afb3c3d05fd5446d2e0bac5326f43d23126410dfb85efa26b9e1ae8d056c3ebcde0c95e1443304d7a93eb4077f76047b6e13f0e79a9631ac2bd43143854803c698a7f02933d9cbdca121cc857aacabf858f3f904c9dfedb6c03186d99490f35f09de8ab897ea7c58f07dca416e1db55c7a849a91b98d0e0c0c7bf058d86a2e997a0557800a34bb7f5806f2e15e99981cc3fe615a3ff396f7d8da30ea24626263abf0ad50a0ce2dafc55f2b0286b2204114a6754b336a913a75e66ed6a3efd132f668369692f46039d"}, 0x139, 0x0) getxattr(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)=@random={'security.', ':\x00'}, &(0x7f0000000140)=""/55, 0x37) [ 924.783481] EXT4-fs (loop0): mounted filesystem without journal. Opts: ,errors=continue 00:10:54 executing program 1: ioctl$TUNSETQUEUE(0xffffffffffffffff, 0x400454d9, &(0x7f0000000b80)={'bond0\x00'}) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x7fffffff}]}) r0 = signalfd4(0xffffffffffffffff, 0x0, 0x0, 0x0) prctl$PR_SET_MM_MAP(0x23, 0xe, 0x0, 0x0) creat(&(0x7f0000000080)='./file1\x00', 0x0) pwrite64(0xffffffffffffffff, &(0x7f0000000000)="a7", 0xfffffd6b, 0x0) accept$packet(r0, &(0x7f0000000080)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000100)=0x14) 00:10:54 executing program 0: syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000d1f4655fd1f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b00000000020000280200000284", 0x62, 0x400}, {&(0x7f0000010400)="030000000400000005000000", 0xc, 0x800}, {&(0x7f0000010500)="ffffffffff070000000000000000000000000000000000000000000000000080ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff", 0x400, 0xc00}, {&(0x7f0000000000)="ed41000000040000d0f4655fd1f4655fd1f4655f13ca7302f6e9dab934", 0x1d, 0x1600}], 0x0, &(0x7f0000000280)=ANY=[]) setxattr$trusted_overlay_upper(&(0x7f0000000540)='./file0\x00', &(0x7f0000000580), &(0x7f00000005c0)={0x0, 0xfb, 0x139, 0x0, 0x0, "eacbf6ff0bc36f5a7bb9fe2ee7bb1e01", "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"}, 0x139, 0x0) [ 924.848673] EXT4-fs (loop7): mounted filesystem without journal. Opts: ,errors=continue [ 924.883011] EXT4-fs (loop3): mounted filesystem without journal. Opts: ,errors=continue 00:10:54 executing program 1: ioctl$TUNSETQUEUE(0xffffffffffffffff, 0x400454d9, &(0x7f0000000b80)={'bond0\x00'}) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x7fffffff}]}) r0 = signalfd4(0xffffffffffffffff, 0x0, 0x0, 0x0) prctl$PR_SET_MM_MAP(0x23, 0xe, 0x0, 0x0) creat(&(0x7f0000000080)='./file1\x00', 0x0) pwrite64(0xffffffffffffffff, &(0x7f0000000000)="a7", 0xfffffd6b, 0x0) accept$packet(r0, &(0x7f0000000080)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000100)=0x14) 00:10:54 executing program 7: syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000d1f4655fd1f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b00000000020000280200000284", 0x62, 0x400}, {&(0x7f0000010400)="03000000040000000500", 0xa, 0x800}, {&(0x7f0000010500)="ffffffffff070000000000000000000000000000000000000000000000000080ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff", 0x400, 0xc00}, {&(0x7f0000000000)="ed41000000040000d0f4655fd1f4655fd1f4655f13ca7302f6e9dab934", 0x1d, 0x1600}], 0x0, &(0x7f0000000280)=ANY=[]) setxattr$trusted_overlay_upper(&(0x7f0000000540)='./file0\x00', &(0x7f0000000580), &(0x7f00000005c0)={0x0, 0xfb, 0x139, 0x0, 0x0, "eacbf6ff0bc36f5a7bb9fe2ee7bb1e01", "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"}, 0x139, 0x0) getxattr(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)=@random={'security.', ':\x00'}, &(0x7f0000000140)=""/55, 0x37) 00:10:54 executing program 5: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x7fffffff}]}) signalfd4(0xffffffffffffffff, &(0x7f00000000c0), 0x8, 0x0) fallocate(0xffffffffffffffff, 0x48, 0x0, 0x7fff) [ 924.925150] EXT4-fs (loop0): mounted filesystem without journal. Opts: ,errors=continue [ 925.006578] EXT4-fs (loop7): mounted filesystem without journal. Opts: ,errors=continue 00:11:09 executing program 6: r0 = syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000040)='proc\x00', 0x0, 0x0) pivot_root(&(0x7f0000000000)='./file0\x00', &(0x7f0000000240)='.\x00') openat(r0, &(0x7f00000001c0)='./file0\x00', 0x280000, 0x8) symlink(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='./file0\x00') openat$dir(0xffffffffffffff9c, &(0x7f0000000180)='./file0\x00', 0x208800, 0x80) 00:11:09 executing program 7: r0 = fork() ptrace(0xffffffffffffffff, 0x0) r1 = fork() ptrace(0x10, r1) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000000)) ptrace$cont(0x20, r1, 0x0, 0x400000000000000) pidfd_open(r1, 0x0) r2 = openat(0xffffffffffffff9c, 0x0, 0x1c2, 0x27) r3 = open(&(0x7f0000001100)='./file0\x00', 0x3830c1, 0x0) ioctl$BTRFS_IOC_SCRUB_PROGRESS(r2, 0xc400941d, &(0x7f0000000200)={0x0, 0x4, 0xd3, 0x1}) pwrite64(r3, &(0x7f0000000a40)="0f64800203d6484c7ddffad1", 0xc, 0x0) lseek(r3, 0x2, 0x3) fcntl$getflags(r3, 0x401) dup2(r2, r3) kcmp(r0, r1, 0x6, 0xffffffffffffffff, r3) r5 = seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x10, 0x7fffffff}]}) r6 = socket$nl_sock_diag(0x10, 0x3, 0x4) syz_open_procfs$namespace(r1, &(0x7f0000000080)='ns/net\x00') ioctl$BTRFS_IOC_SNAP_DESTROY_V2(r5, 0x5000943f, &(0x7f0000000100)={{r6}, 0x0, 0x16, @unused=[0x10000000, 0x2000000001, 0x20000000000000, 0x97c], @devid=r4}) signalfd4(0xffffffffffffffff, &(0x7f00000000c0), 0x8, 0x0) 00:11:09 executing program 5: r0 = openat(0xffffffffffffff9c, 0x0, 0x1c2, 0x27) r1 = open(&(0x7f0000000040)='./file0\x00', 0x1810c1, 0x0) ioctl$BTRFS_IOC_SCRUB_PROGRESS(r0, 0xc400941d, &(0x7f0000000200)={0x0, 0x4, 0xd3, 0x1}) pwrite64(r1, &(0x7f0000000a40)="0f64800203d6484c7ddffad1", 0xc, 0x0) lseek(r1, 0x2, 0x3) fcntl$getflags(r1, 0x401) dup2(r0, r1) ioctl$RTC_WKALM_SET(r1, 0x4028700f, &(0x7f0000000080)={0x1, 0x1, {0x29, 0x27, 0x5, 0x8, 0xa, 0xb7, 0x6, 0x16b}}) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x7fffffff}]}) signalfd4(0xffffffffffffffff, &(0x7f00000000c0), 0x8, 0x0) 00:11:09 executing program 3: syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000d1f4655fd1f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b00000000020000280200000284", 0x62, 0x400}, {&(0x7f0000010400)="030000000400000005000000", 0xc, 0x800}, {&(0x7f0000010500)="ffffffffff070000000000000000000000000000000000000000000000000080ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff", 0x400, 0xc00}, {&(0x7f0000000000)="ed41000000040000d0f4655fd1f4655fd1f4655f13ca7302f6e9dab934", 0x1d, 0x1600}], 0x0, &(0x7f0000000280)=ANY=[]) setxattr$trusted_overlay_upper(&(0x7f0000000540)='./file0\x00', &(0x7f0000000580), &(0x7f00000005c0)={0x0, 0xfb, 0x139, 0x0, 0x0, "eacbf6ff0bc36f5a7bb9fe2ee7bb1e01", "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"}, 0x139, 0x0) getxattr(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)=@random={'security.', ':\x00'}, &(0x7f0000000140)=""/55, 0x37) 00:11:09 executing program 1: ioctl$TUNSETQUEUE(0xffffffffffffffff, 0x400454d9, &(0x7f0000000b80)={'bond0\x00'}) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x7fffffff}]}) r0 = signalfd4(0xffffffffffffffff, 0x0, 0x0, 0x0) prctl$PR_SET_MM_MAP(0x23, 0xe, 0x0, 0x0) creat(&(0x7f0000000080)='./file1\x00', 0x0) pwrite64(0xffffffffffffffff, &(0x7f0000000000)="a7", 0xfffffd6b, 0x0) accept$packet(r0, &(0x7f0000000080)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000100)=0x14) 00:11:09 executing program 0: syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000d1f4655fd1f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b00000000020000280200000284", 0x62, 0x400}, {&(0x7f0000010400)="030000000400000005000000", 0xc, 0x800}, {&(0x7f0000010500)="ffffffffff070000000000000000000000000000000000000000000000000080ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff", 0x400, 0xc00}, {&(0x7f0000000000)="ed41000000040000d0f4655fd1f4655fd1f4655f13ca7302f6e9dab934", 0x1d, 0x1600}], 0x0, &(0x7f0000000280)=ANY=[]) setxattr$trusted_overlay_upper(&(0x7f0000000540)='./file0\x00', &(0x7f0000000580), &(0x7f00000005c0)={0x0, 0xfb, 0x139, 0x0, 0x0, "eacbf6ff0bc36f5a7bb9fe2ee7bb1e01", "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"}, 0x139, 0x0) 00:11:09 executing program 2: r0 = pkey_alloc(0x0, 0x1) pkey_mprotect(&(0x7f0000ffe000/0x1000)=nil, 0x1000, 0x8, r0) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x7fffffff}]}) signalfd4(0xffffffffffffffff, &(0x7f00000000c0), 0x8, 0x0) [ 939.948632] EXT4-fs (loop3): mounted filesystem without journal. Opts: ,errors=continue 00:11:09 executing program 5: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x1, 0x20, 0x0, 0x7fffffff}]}) signalfd4(0xffffffffffffffff, &(0x7f0000000080), 0x8, 0x0) 00:11:10 executing program 2: r0 = openat(0xffffffffffffff9c, 0x0, 0x1c2, 0x27) r1 = open(&(0x7f0000000040)='./file0\x00', 0x1810c1, 0x0) ioctl$BTRFS_IOC_SCRUB_PROGRESS(r0, 0xc400941d, &(0x7f0000000200)={0x0, 0x4, 0xd3, 0x1}) pwrite64(r1, &(0x7f0000000a40)="0f64800203d6484c7ddffad1", 0xc, 0x0) lseek(r1, 0x2, 0x3) fcntl$getflags(r1, 0x401) dup2(r0, r1) stat(&(0x7f0000000080)='./file0\x00', &(0x7f0000000100)) ioctl$VT_ACTIVATE(r0, 0x5606, 0x1ff) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x7fffffff}]}) signalfd4(0xffffffffffffffff, &(0x7f00000000c0), 0x8, 0x0) 00:11:10 executing program 1: ioctl$TUNSETQUEUE(0xffffffffffffffff, 0x400454d9, &(0x7f0000000b80)={'bond0\x00'}) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x7fffffff}]}) r0 = signalfd4(0xffffffffffffffff, 0x0, 0x0, 0x0) prctl$PR_SET_MM_MAP(0x23, 0xe, 0x0, 0x0) r1 = creat(&(0x7f0000000080)='./file1\x00', 0x0) pwrite64(r1, 0x0, 0x0, 0x0) accept$packet(r0, &(0x7f0000000080)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000100)=0x14) [ 940.020211] EXT4-fs (loop0): mounted filesystem without journal. Opts: ,errors=continue 00:11:10 executing program 3: syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000d1f4655fd1f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b00000000020000280200000284", 0x62, 0x400}, {&(0x7f0000010400)="030000000400000005000000", 0xc, 0x800}, {&(0x7f0000010500)="ffffffffff070000000000000000000000000000000000000000000000000080ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff", 0x400, 0xc00}, {&(0x7f0000000000)="ed41000000040000d0f4655fd1f4655fd1f4655f13ca7302f6e9dab934", 0x1d, 0x1600}], 0x0, &(0x7f0000000280)=ANY=[]) setxattr$trusted_overlay_upper(&(0x7f0000000540)='./file0\x00', &(0x7f0000000580), &(0x7f00000005c0)={0x0, 0xfb, 0x139, 0x0, 0x0, "eacbf6ff0bc36f5a7bb9fe2ee7bb1e01", "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"}, 0x139, 0x0) getxattr(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)=@random={'security.', ':\x00'}, &(0x7f0000000140)=""/55, 0x37) 00:11:10 executing program 6: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) lsetxattr$security_selinux(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140), &(0x7f0000000180)='system_u:object_r:xen_device_t:s0\x00', 0x22, 0x3) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000040)='proc\x00', 0x0, 0x0) lsetxattr$trusted_overlay_nlink(&(0x7f00000003c0)='./file0\x00', &(0x7f0000000500), &(0x7f0000000540)={'L+', 0x7fff}, 0x16, 0x1) syz_mount_image$ext4(&(0x7f00000001c0)='ext3\x00', &(0x7f0000000200)='./file0\x00', 0x64, 0x3, &(0x7f0000000400)=[{&(0x7f0000000280)="25be8ec1b0ef46a235b901fbf803de6a6acd72cc8e564d4e9e691542a9fb62a3ea62cf3f3762912b843196583663ba7c66ff5dcb39aecde9ac4b8fc892552fea0a3e14b93dfa75d7d26747f47688f5db1215235c94e0065c5ec316ac0e7ae1b16341d68ebdbf0a2357f71fed16a2ee52973ccb89d56fe03a5cdd37dce1c09787f06d8c9202ab351055876806ea92b83c5a6443717806926030fb0aba29bc47f95526966f88a1eb44888aeaf157b10ac36cefefe2094e6713c1757a753f2059fa89689385bcbbc204a80fe32a4f59", 0xce, 0x72bc}, {&(0x7f0000000380)="90db9e58f4641ab9a278a48e5d904150b227e9b5f32df61269d939730babdd3591e88db353273c", 0x27, 0x5}, {&(0x7f00000003c0), 0x0, 0xc0c2}], 0x10002, &(0x7f0000000480)={[{@resuid}, {@i_version}, {@minixdf}, {@noauto_da_alloc}, {@data_writeback}, {@i_version}], [{@measure}]}) pivot_root(&(0x7f0000000000)='./file0\x00', &(0x7f0000000240)='.\x00') 00:11:10 executing program 2: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x7fffffff}]}) r0 = signalfd4(0xffffffffffffffff, &(0x7f00000000c0), 0x8, 0x0) r1 = openat(0xffffffffffffff9c, 0x0, 0x1c2, 0x27) r2 = open(&(0x7f0000000040)='./file0\x00', 0x1810c1, 0x0) ioctl$BTRFS_IOC_SCRUB_PROGRESS(r2, 0xc400941d, &(0x7f0000000200)={0x0, 0x4, 0xd3, 0x1}) pwrite64(r2, &(0x7f0000000a40)="0f64800203d6484c7ddffad1", 0xc, 0x0) creat(&(0x7f0000000600)='./file0\x00', 0x0) lseek(r2, 0x2, 0x3) fcntl$getflags(r2, 0x401) dup2(r1, r2) ioctl$EVIOCGNAME(r2, 0x80404506, &(0x7f0000000100)=""/233) ioctl$HIDIOCGPHYS(r0, 0x80404812, &(0x7f0000000080)) ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x8946, &(0x7f0000000680)={'wg0\x00', &(0x7f0000000640)=@ethtool_sfeatures={0x3b, 0x7, [{0x1, 0x3}, {0x1, 0x10001}, {0xb6, 0xfffffe01}, {0x48, 0x2}, {0x2, 0x2}, {0x1000}, {0x8, 0x9}]}}) [ 940.167278] audit: type=1400 audit(1626999070.177:55): avc: denied { relabelto } for pid=7958 comm="syz-executor.6" name="file0" dev="sda" ino=15518 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:xen_device_t:s0 tclass=dir permissive=1 [ 940.229156] EXT4-fs (loop3): mounted filesystem without journal. Opts: ,errors=continue 00:11:23 executing program 6: add_key$keyring(&(0x7f00000000c0), &(0x7f0000000140)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffff8) r0 = syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mknodat(r0, &(0x7f0000000180)='./file0\x00', 0x1000, 0x2) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000040)='proc\x00', 0x0, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000002c0)={{{@in6=@remote, @in6=@private0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@private2}, 0x0, @in=@remote}}, &(0x7f00000003c0)=0xe8) mount$9p_rdma(&(0x7f00000001c0), &(0x7f0000000200)='./file0\x00', &(0x7f0000000280), 0x188c1c, &(0x7f0000000400)={'trans=rdma,', {'port', 0x3d, 0x4e22}, 0x2c, {[{@common=@cache_loose}, {@common=@cache_mmap}, {@rq={'rq', 0x3d, 0x71}}, {@common=@afid={'afid', 0x3d, 0x7}}, {@sq={'sq', 0x3d, 0x10000}}, {@rq={'rq', 0x3d, 0x55}}], [{@defcontext={'defcontext', 0x3d, 'system_u'}}, {@fowner_lt={'fowner<', 0xee00}}, {@fowner_eq={'fowner', 0x3d, r1}}, {@fowner_eq={'fowner', 0x3d, 0xffffffffffffffff}}, {@permit_directio}]}}) pivot_root(&(0x7f0000000000)='./file0\x00', &(0x7f0000000240)='.\x00') 00:11:23 executing program 2: r0 = seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x7fffffff}]}) r1 = signalfd4(0xffffffffffffffff, &(0x7f00000000c0), 0x8, 0x0) ioctl$FS_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000100)=0x40000) ioctl$sock_SIOCGSKNS(r1, 0x894c, &(0x7f0000000080)=0x69) r2 = openat(0xffffffffffffff9c, 0x0, 0x1c2, 0x27) r3 = creat(&(0x7f0000000080)='./file1\x00', 0x0) ioctl$BTRFS_IOC_SCRUB_PROGRESS(r2, 0xc400941d, &(0x7f0000000200)={0x0, 0x4, 0xd3, 0x1}) ioctl$BTRFS_IOC_SCRUB(r3, 0xc400941b, &(0x7f0000000600)={r4, 0x62, 0x80000001}) pwrite64(r3, &(0x7f0000000000)="a7", 0xfffffd6b, 0x0) ioctl$PIO_UNIMAPCLR(r3, 0x4b68, &(0x7f0000000a80)={0x80, 0x4, 0x6}) openat(r3, &(0x7f0000000140)='./file0\x00', 0x80000, 0x104) 00:11:23 executing program 5: r0 = syz_genetlink_get_family_id$gtp(&(0x7f0000000100), 0xffffffffffffffff) sendmsg$GTP_CMD_DELPDP(0xffffffffffffffff, &(0x7f00000001c0)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x10000000}, 0xc, &(0x7f0000000180)={&(0x7f0000000140)=ANY=[@ANYBLOB="14000000", @ANYRES16=r0, @ANYBLOB="000e2cbd704000dbdf2501000000"], 0x14}, 0x1, 0x0, 0x0, 0x20000000}, 0x2004c080) r1 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000240), 0xffffffffffffffff) sendmsg$NL80211_CMD_STOP_AP(0xffffffffffffffff, &(0x7f0000000300)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f00000002c0)={&(0x7f0000000280)={0x14, r1, 0x300, 0x70bd28, 0x25dfdbfd, {{}, {@void, @void}}, ["", "", "", "", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x40880}, 0x40080) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x7fffffff}]}) signalfd4(0xffffffffffffffff, &(0x7f00000000c0), 0x8, 0x0) 00:11:23 executing program 7: syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000d1f4655fd1f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b00000000020000280200000284", 0x62, 0x400}, {&(0x7f0000010400)="030000000400000005000000", 0xc, 0x800}, {&(0x7f0000010500)="ffffffffff070000000000000000000000000000000000000000000000000080ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff", 0x400, 0xc00}, {&(0x7f0000000000)="ed41000000040000d0f4655fd1f4655fd1f4655f13ca7302f6e9dab934", 0x1d, 0x1600}], 0x0, &(0x7f0000000280)=ANY=[]) setxattr$trusted_overlay_upper(&(0x7f0000000540)='./file0\x00', &(0x7f0000000580), &(0x7f00000005c0)={0x0, 0xfb, 0x139, 0x0, 0x0, "eacbf6ff0bc36f5a7bb9fe2ee7bb1e01", "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"}, 0x139, 0x0) getxattr(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)=@random={'security.', ':\x00'}, &(0x7f0000000140)=""/55, 0x37) 00:11:23 executing program 0: syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000d1f4655fd1f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b00000000020000280200000284", 0x62, 0x400}, {&(0x7f0000010400)="030000000400000005000000", 0xc, 0x800}, {&(0x7f0000010500)="ffffffffff070000000000000000000000000000000000000000000000000080ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff", 0x400, 0xc00}, {&(0x7f0000000000)="ed41000000040000d0f4655fd1f4655fd1f4655f13ca7302f6e9dab934", 0x1d, 0x1600}], 0x0, &(0x7f0000000280)=ANY=[]) setxattr$trusted_overlay_upper(&(0x7f0000000540)='./file0\x00', &(0x7f0000000580), &(0x7f00000005c0)={0x0, 0xfb, 0x139, 0x0, 0x0, "eacbf6ff0bc36f5a7bb9fe2ee7bb1e01", "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"}, 0x139, 0x0) 00:11:23 executing program 1: ioctl$TUNSETQUEUE(0xffffffffffffffff, 0x400454d9, &(0x7f0000000b80)={'bond0\x00'}) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x7fffffff}]}) signalfd4(0xffffffffffffffff, 0x0, 0x0, 0x0) prctl$PR_SET_MM_MAP(0x23, 0xe, 0x0, 0x0) r0 = creat(&(0x7f0000000080)='./file1\x00', 0x0) pwrite64(r0, 0x0, 0x0, 0x0) accept$packet(0xffffffffffffffff, &(0x7f0000000080)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000100)=0x14) 00:11:23 executing program 3: syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000d1f4655fd1f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b00000000020000280200000284", 0x62, 0x400}, {&(0x7f0000010400)="030000000400000005000000d4", 0xd}, {&(0x7f0000010500)="ffffffffff070000000000000000000000000000000000000000000000000080ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff", 0x400, 0xc00}, {&(0x7f0000000000)="ed41000000040000d0f4655fd1f4655fd1f4655f13ca7302f6e9dab934", 0x1d, 0x1600}], 0x0, &(0x7f0000000280)=ANY=[]) setxattr$trusted_overlay_upper(&(0x7f0000000540)='./file0\x00', &(0x7f0000000580), &(0x7f00000005c0)={0x0, 0xfb, 0x139, 0x0, 0x0, "eacbf6ff0bc36f5a7bb9fe2ee7bb1e01", "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"}, 0x139, 0x0) getxattr(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)=@random={'security.', ':\x00'}, &(0x7f0000000140)=""/55, 0x37) 00:11:23 executing program 4: ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000009640)={0x0, ""/256, 0x0}) ioctl$BTRFS_IOC_INO_LOOKUP_USER(0xffffffffffffffff, 0xd000943e, &(0x7f000000aa40)={0x0, 0x0, "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", "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"}) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000001300)={0x0, ""/256, 0x0, 0x0}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f000007d440)={0x9, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, 0x0}, {}, {}, {}, {}, {}, {}, {0x0, 0x0}, {}, {}, {}, {r1}, {}, {}, {}, {}, {r2}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0}, {}, {}, {0x0}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r3}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, 0x0}, {}, {}, {}, {}, {}, {}, {}, {}, {r2}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r0}, {}, {}, {}, {}, {0x0, r4}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, 0x0}], 0x0, "46dacd8396fe92"}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000007640)={0x7, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r6}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r7}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r5}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r10}, {}, {}, {}, {}, {0x0, r11}, {}, {}, {}, {}, {r8}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r9}], 0x4, "9755154351ac9a"}) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000009640)={0x0, ""/256, 0x0}) ioctl$BTRFS_IOC_INO_LOOKUP_USER(0xffffffffffffffff, 0xd000943e, &(0x7f0000009a40)={0x0, 0x0, "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", "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"}) ioctl$BTRFS_IOC_INO_LOOKUP_USER(0xffffffffffffffff, 0xd000943e, &(0x7f000000aa40)={0x0, 0x0, "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", "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"}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f000007d440)={0x9, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r12}, {}, {}, {}, {r13}, {}, {}, {0x0, r14}, {}, {r15}], 0x0, "46dacd8396fe92"}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f000005b040)={0x2, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, 0x0}], 0x81, "d19b55cb430ef5"}) ioctl$BTRFS_IOC_TREE_SEARCH(0xffffffffffffffff, 0xd0009411, &(0x7f000005c040)={{0x0, 0x1, 0x6, 0x100, 0x1000, 0x628, 0x0, 0x2, 0x2, 0x604, 0x138, 0x400, 0x4bcf7027, 0x401, 0x5}}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f000005d040)={0x6, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, 0x0}], 0x20, "3502d5cd206348"}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000007640)={0x7, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0}], 0x4, "9755154351ac9a"}) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000009640)={0x0, ""/256, 0x0}) ioctl$BTRFS_IOC_INO_LOOKUP_USER(0xffffffffffffffff, 0xd000943e, &(0x7f0000009a40)={0x0, 0x0, "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", "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"}) ioctl$BTRFS_IOC_INO_LOOKUP_USER(0xffffffffffffffff, 0xd000943e, &(0x7f000000aa40)={0x0, 0x0, "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", "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"}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f000007d440)={0x9, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r19}, {}, {}, {}, {r20}, {}, {}, {0x0, r21}, {}, {r22}], 0x0, "46dacd8396fe92"}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f000005e040)={0x8, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r4}, {}, {}, {r13, r16}, {r17, r18}, {r20}], 0x1, "7b03224e969406"}) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x7fffffff}]}) mprotect(&(0x7f0000ffe000/0x1000)=nil, 0x1000, 0x0) [ 953.675926] EXT4-fs (loop3): ext4_check_descriptors: Block bitmap for group 0 not in group (block 0)! [ 953.678764] EXT4-fs (loop3): group descriptors corrupted! [ 953.689348] EXT4-fs (loop0): mounted filesystem without journal. Opts: ,errors=continue [ 953.692940] EXT4-fs (loop7): mounted filesystem without journal. Opts: ,errors=continue 00:11:23 executing program 6: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0) link(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='./file0\x00') mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000340)='proc\x00', 0x0, 0x0) mount$9p_unix(&(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)='./file0\x00', &(0x7f0000000200), 0x100000, &(0x7f0000000280)={'trans=unix,', {[{@access_user}], [{@fscontext={'fscontext', 0x3d, 'staff_u'}}, {@defcontext={'defcontext', 0x3d, 'sysadm_u'}}, {@measure}, {@dont_measure}, {@appraise_type}, {@dont_appraise}]}}) unlink(&(0x7f0000000300)='./file0\x00') pivot_root(&(0x7f0000000000)='./file0\x00', &(0x7f0000000240)='.\x00') 00:11:23 executing program 4: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x7fffffff}]}) mprotect(&(0x7f0000ffe000/0x1000)=nil, 0x1000, 0x0) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0xc, &(0x7f00000000c0)={0x8, &(0x7f0000000080)=[{0x7, 0x7, 0x4d, 0xffff}, {0x1, 0x3, 0x9, 0x8}, {0x7, 0x5, 0x1, 0x5}, {0x9, 0x5, 0x4a, 0xb4}, {0xfff7, 0x7, 0xff, 0x1}, {0x7, 0x1, 0x7f, 0x7}, {0x89, 0x3f, 0x1f, 0x9}, {0x4, 0x5, 0x5, 0x8}]}) 00:11:23 executing program 3: syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000d1f4655fd1f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b00000000020000280200000284", 0x62, 0x400}, {&(0x7f0000010400)="030000000400000005000000d4", 0xd}, {&(0x7f0000010500)="ffffffffff070000000000000000000000000000000000000000000000000080ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff", 0x400, 0xc00}, {&(0x7f0000000000)="ed41000000040000d0f4655fd1f4655fd1f4655f13ca7302f6e9dab934", 0x1d, 0x1600}], 0x0, &(0x7f0000000280)=ANY=[]) setxattr$trusted_overlay_upper(&(0x7f0000000540)='./file0\x00', &(0x7f0000000580), &(0x7f00000005c0)={0x0, 0xfb, 0x139, 0x0, 0x0, "eacbf6ff0bc36f5a7bb9fe2ee7bb1e01", "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"}, 0x139, 0x0) getxattr(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)=@random={'security.', ':\x00'}, &(0x7f0000000140)=""/55, 0x37) 00:11:23 executing program 1: ioctl$TUNSETQUEUE(0xffffffffffffffff, 0x400454d9, &(0x7f0000000b80)={'bond0\x00'}) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x7fffffff}]}) signalfd4(0xffffffffffffffff, 0x0, 0x0, 0x0) prctl$PR_SET_MM_MAP(0x23, 0xe, 0x0, 0x0) r0 = creat(&(0x7f0000000080)='./file1\x00', 0x0) pwrite64(r0, 0x0, 0x0, 0x0) accept$packet(0xffffffffffffffff, 0x0, &(0x7f0000000100)) 00:11:23 executing program 0: syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000d1f4655fd1f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b00000000020000280200000284", 0x62, 0x400}, {&(0x7f0000010400)="030000000400000005000000d4", 0xd}, {&(0x7f0000010500)="ffffffffff070000000000000000000000000000000000000000000000000080ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff", 0x400, 0xc00}, {&(0x7f0000000000)="ed41000000040000d0f4655fd1f4655fd1f4655f13ca7302f6e9dab934", 0x1d, 0x1600}], 0x0, &(0x7f0000000280)=ANY=[]) setxattr$trusted_overlay_upper(&(0x7f0000000540)='./file0\x00', &(0x7f0000000580), &(0x7f00000005c0)={0x0, 0xfb, 0x139, 0x0, 0x0, "eacbf6ff0bc36f5a7bb9fe2ee7bb1e01", "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"}, 0x139, 0x0) 00:11:23 executing program 7: add_key$keyring(&(0x7f00000000c0), &(0x7f0000000140)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffff8) r0 = syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mknodat(r0, &(0x7f0000000180)='./file0\x00', 0x1000, 0x2) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000040)='proc\x00', 0x0, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000002c0)={{{@in6=@remote, @in6=@private0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@private2}, 0x0, @in=@remote}}, &(0x7f00000003c0)=0xe8) mount$9p_rdma(&(0x7f00000001c0), &(0x7f0000000200)='./file0\x00', &(0x7f0000000280), 0x188c1c, &(0x7f0000000400)={'trans=rdma,', {'port', 0x3d, 0x4e22}, 0x2c, {[{@common=@cache_loose}, {@common=@cache_mmap}, {@rq={'rq', 0x3d, 0x71}}, {@common=@afid={'afid', 0x3d, 0x7}}, {@sq={'sq', 0x3d, 0x10000}}, {@rq={'rq', 0x3d, 0x55}}], [{@defcontext={'defcontext', 0x3d, 'system_u'}}, {@fowner_lt={'fowner<', 0xee00}}, {@fowner_eq={'fowner', 0x3d, r1}}, {@fowner_eq={'fowner', 0x3d, 0xffffffffffffffff}}, {@permit_directio}]}}) pivot_root(&(0x7f0000000000)='./file0\x00', &(0x7f0000000240)='.\x00') 00:11:23 executing program 1: ioctl$TUNSETQUEUE(0xffffffffffffffff, 0x400454d9, &(0x7f0000000b80)={'bond0\x00'}) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x7fffffff}]}) signalfd4(0xffffffffffffffff, 0x0, 0x0, 0x0) prctl$PR_SET_MM_MAP(0x23, 0xe, 0x0, 0x0) r0 = creat(&(0x7f0000000080)='./file1\x00', 0x0) pwrite64(r0, 0x0, 0x0, 0x0) accept$packet(0xffffffffffffffff, 0x0, 0x0) [ 953.889189] EXT4-fs (loop3): ext4_check_descriptors: Block bitmap for group 0 not in group (block 0)! [ 953.890913] EXT4-fs (loop3): group descriptors corrupted! 00:11:23 executing program 6: ioctl$EXT4_IOC_SWAP_BOOT(0xffffffffffffffff, 0x6611) syz_mount_image$ext4(0x0, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000040)='proc\x00', 0x0, 0x0) pivot_root(&(0x7f0000000000)='./file0\x00', &(0x7f0000000240)='.\x00') r0 = syz_open_dev$vcsu(&(0x7f0000000100), 0x3ff, 0x404440) io_uring_register$IORING_UNREGISTER_PERSONALITY(r0, 0xa, 0x0, 0x0) 00:11:23 executing program 5: r0 = seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x7fffffff}]}) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r0, 0xc0502100, &(0x7f0000000100)) signalfd4(0xffffffffffffffff, &(0x7f00000000c0), 0x8, 0x0) [ 953.951035] EXT4-fs (loop0): ext4_check_descriptors: Block bitmap for group 0 not in group (block 0)! [ 953.952439] EXT4-fs (loop0): group descriptors corrupted! 00:11:35 executing program 2: prctl$PR_GET_PDEATHSIG(0x2, &(0x7f0000000080)) prctl$PR_GET_PDEATHSIG(0x2, &(0x7f0000000100)) prctl$PR_GET_PDEATHSIG(0x2, &(0x7f0000000180)) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x4, &(0x7f00000001c0)=[{0x30, 0x3, 0x6, 0x2}, {0xb, 0x80, 0x6, 0x4}, {0x4, 0xf9, 0x3f, 0x3}, {0xfff, 0x2a, 0x6e, 0x7fffffff}]}) prctl$PR_GET_PDEATHSIG(0x2, &(0x7f0000000140)) signalfd4(0xffffffffffffffff, &(0x7f00000000c0), 0x8, 0x0) 00:11:35 executing program 0: syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000d1f4655fd1f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b00000000020000280200000284", 0x62, 0x400}, {&(0x7f0000010400)="030000000400000005000000d4", 0xd}, {&(0x7f0000010500)="ffffffffff070000000000000000000000000000000000000000000000000080ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff", 0x400, 0xc00}, {&(0x7f0000000000)="ed41000000040000d0f4655fd1f4655fd1f4655f13ca7302f6e9dab934", 0x1d, 0x1600}], 0x0, &(0x7f0000000280)=ANY=[]) setxattr$trusted_overlay_upper(&(0x7f0000000540)='./file0\x00', &(0x7f0000000580), &(0x7f00000005c0)={0x0, 0xfb, 0x139, 0x0, 0x0, "eacbf6ff0bc36f5a7bb9fe2ee7bb1e01", "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"}, 0x139, 0x0) 00:11:35 executing program 5: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)) r0 = signalfd4(0xffffffffffffffff, &(0x7f00000000c0), 0x8, 0x0) r1 = openat$incfs(r0, &(0x7f0000000000)='.pending_reads\x00', 0x503482, 0x40) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r0, 0xc0502100, &(0x7f0000000100)={0x0}) ioctl$SECCOMP_IOCTL_NOTIF_ID_VALID(r1, 0x40082102, &(0x7f0000000080)=r2) 00:11:35 executing program 7: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x7fffffff}]}) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0xa, &(0x7f0000000100)={0x2, &(0x7f0000000080)=[{0x1ff, 0xfa, 0x1, 0x3}, {0x1, 0x81, 0x8, 0x5}]}) r0 = openat(0xffffffffffffff9c, 0x0, 0x1c2, 0x27) r1 = open(&(0x7f0000000040)='./file0\x00', 0x1810c1, 0x0) ioctl$BTRFS_IOC_SCRUB_PROGRESS(r0, 0xc400941d, &(0x7f0000000200)={0x0, 0x4, 0xd3, 0x1}) pwrite64(r1, &(0x7f0000000a40)="0f64800203d6484c7ddffad1", 0xc, 0x0) lseek(r1, 0x2, 0x3) fcntl$getflags(r1, 0x401) dup2(r0, r1) fspick(r1, &(0x7f0000000140)='./file0\x00', 0x0) signalfd4(0xffffffffffffffff, &(0x7f00000000c0), 0x8, 0x0) 00:11:35 executing program 6: r0 = syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000040)='proc\x00', 0x0, 0x0) pivot_root(&(0x7f0000000000)='./file0\x00', &(0x7f0000000240)='.\x00') getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000480)={{{@in=@empty, @in6=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast2}, 0x0, @in=@initdev}}, &(0x7f0000000200)=0xe8) fstat(r0, &(0x7f0000000580)={0x0, 0x0, 0x0, 0x0, 0x0}) syz_mount_image$tmpfs(&(0x7f00000000c0), &(0x7f0000000140)='./file0\x00', 0x81, 0x4, &(0x7f0000000400)=[{&(0x7f0000000180)="72167d40164db20b83c2a7395ad261ba40ac3b96534ef700fdc181ca", 0x1c, 0x3}, {&(0x7f00000001c0)="6ca6aa12a51c2c7055dbc1c80cdcd7ba6a5553d269614492dbc77898a931a04ccf251b58b174bfafe71529e665f3e5d711f27b", 0x33, 0xd}, {&(0x7f0000000280)="2f601f68cb409c77ad24f6e09141138cfccacbf0a7454325ffbe4cb8130eb26dc7c7d53a19b53ba3de88530fbb22eae41c1c09a28897d438c50926f9d5996ac6234416abe96a366f844405601f552e2e6adcff0cf74204b6ec5e06a9d45a81b1100328205ead274e4b0d18e1aae687f03c428ccab30153b567634ff0e2d006b13d53802e7202230fd06cf077b4a847e43df350a6bcb488ed911b542d2f5d19d04fa28f8a3de28be637541e8debd537c8fe3550ac1949f358658093efe0f1d42f7a4bb4db3b513566f787b46f1aefe002fcf6", 0xd2, 0x1b8}, {&(0x7f0000000380)="f97b2ff8a6369d547b73f62ec7f62f75b12129c1f2e0796173ecc1157a6d6890f85edf13e195c5cd361a11709cb181dc131c08316809d23caa4960fbe95b752a927623a00a4010647643", 0x4a, 0x1}], 0x1000004, &(0x7f0000000600)={[{@mpol={'mpol', 0x3d, {'bind', '=static', @void}}}, {@nr_inodes={'nr_inodes', 0x3d, [0x74, 0x70, 0x39]}}], [{@hash}, {@smackfsroot={'smackfsroot', 0x3d, 'proc\x00'}}, {@context={'context', 0x3d, 'unconfined_u'}}, {@audit}, {@smackfsroot={'smackfsroot', 0x3d, 'proc\x00'}}, {@euid_lt={'euid<', r1}}, {@uid_lt={'uid<', r2}}]}) r3 = openat$hpet(0xffffffffffffff9c, &(0x7f00000006c0), 0x20002, 0x0) name_to_handle_at(r3, &(0x7f0000000700)='./file0\x00', &(0x7f0000000740)=@ceph_nfs_confh={0x10, 0x2, {0x4}}, &(0x7f0000000780), 0x0) 00:11:35 executing program 1: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) lsetxattr$security_selinux(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140), &(0x7f0000000180)='system_u:object_r:xen_device_t:s0\x00', 0x22, 0x3) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000040)='proc\x00', 0x0, 0x0) lsetxattr$trusted_overlay_nlink(&(0x7f00000003c0)='./file0\x00', &(0x7f0000000500), &(0x7f0000000540)={'L+', 0x7fff}, 0x16, 0x1) syz_mount_image$ext4(&(0x7f00000001c0)='ext3\x00', &(0x7f0000000200)='./file0\x00', 0x64, 0x3, &(0x7f0000000400)=[{&(0x7f0000000280)="25be8ec1b0ef46a235b901fbf803de6a6acd72cc8e564d4e9e691542a9fb62a3ea62cf3f3762912b843196583663ba7c66ff5dcb39aecde9ac4b8fc892552fea0a3e14b93dfa75d7d26747f47688f5db1215235c94e0065c5ec316ac0e7ae1b16341d68ebdbf0a2357f71fed16a2ee52973ccb89d56fe03a5cdd37dce1c09787f06d8c9202ab351055876806ea92b83c5a6443717806926030fb0aba29bc47f95526966f88a1eb44888aeaf157b10ac36cefefe2094e6713c1757a753f2059fa89689385bcbbc204a80fe32a4f59", 0xce, 0x72bc}, {&(0x7f0000000380)="90db9e58f4641ab9a278a48e5d904150b227e9b5f32df61269d939730babdd3591e88db353273c", 0x27, 0x5}, {&(0x7f00000003c0), 0x0, 0xc0c2}], 0x10002, &(0x7f0000000480)={[{@resuid}, {@i_version}, {@minixdf}, {@noauto_da_alloc}, {@data_writeback}, {@i_version}], [{@measure}]}) pivot_root(&(0x7f0000000000)='./file0\x00', &(0x7f0000000240)='.\x00') 00:11:35 executing program 3: syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000d1f4655fd1f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b00000000020000280200000284", 0x62, 0x400}, {&(0x7f0000010400)="030000000400000005000000d4", 0xd}, {&(0x7f0000010500)="ffffffffff070000000000000000000000000000000000000000000000000080ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff", 0x400, 0xc00}, {&(0x7f0000000000)="ed41000000040000d0f4655fd1f4655fd1f4655f13ca7302f6e9dab934", 0x1d, 0x1600}], 0x0, &(0x7f0000000280)=ANY=[]) setxattr$trusted_overlay_upper(&(0x7f0000000540)='./file0\x00', &(0x7f0000000580), &(0x7f00000005c0)={0x0, 0xfb, 0x139, 0x0, 0x0, "eacbf6ff0bc36f5a7bb9fe2ee7bb1e01", "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"}, 0x139, 0x0) getxattr(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)=@random={'security.', ':\x00'}, &(0x7f0000000140)=""/55, 0x37) 00:11:35 executing program 4: getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000640), &(0x7f0000000680)=0xc) r0 = shmget$private(0x0, 0x4000, 0x2, &(0x7f0000ffa000/0x4000)=nil) getresgid(&(0x7f0000001280)=0x0, &(0x7f00000012c0), &(0x7f0000001300)) r2 = fork() shmctl$IPC_SET(r0, 0x1, &(0x7f0000001340)={{0x1, 0xee01, r1, 0xee00, 0xee00, 0xc9, 0x800}, 0x8001, 0x1, 0x8, 0x5, 0xffffffffffffffff, r2, 0x7}) shmat(r0, &(0x7f0000fff000/0x1000)=nil, 0x4800) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000800), &(0x7f0000000840)=0xc) r3 = openat(0xffffffffffffff9c, 0x0, 0x1c2, 0x27) r4 = creat(&(0x7f0000000080)='./file1\x00', 0x0) ioctl$BTRFS_IOC_SCRUB_PROGRESS(r3, 0xc400941d, &(0x7f0000000200)={0x0, 0x4, 0xd3, 0x1}) ioctl$BTRFS_IOC_SCRUB(r4, 0xc400941b, &(0x7f0000000600)={r5, 0x62, 0x80000001}) pwrite64(r4, &(0x7f0000000000)="a7", 0xfffffd6b, 0x0) ioctl$PIO_UNIMAPCLR(r4, 0x4b68, &(0x7f0000000a80)={0x80, 0x4, 0x6}) r6 = openat(0xffffffffffffff9c, 0x0, 0x1c2, 0x27) r7 = open(&(0x7f0000000040)='./file0\x00', 0x1810c1, 0x0) ioctl$BTRFS_IOC_SCRUB_PROGRESS(r6, 0xc400941d, &(0x7f0000000200)={0x0, 0x4, 0xd3, 0x1}) pwrite64(r7, &(0x7f0000000a40)="0f64800203d6484c7ddffad1", 0xc, 0x0) lseek(r7, 0x2, 0x3) syz_mount_image$tmpfs(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x7, 0x6, &(0x7f0000000580)=[{&(0x7f0000000100)="02e4584b022d79f86f3020226945449646879059f44c17eadadf1dcca9890a57bea1750cb1ac53ff5ba8d42651c542415795532e7b791d512077058580b2f22a44308934be50207eee9888a0b9ebadf36bef0c6ae3cb471ca1aaa1462484ae476d12046ec145ccedc80159c4ad7770babbd645461bb38f04ee404ae170184a41bebd16871e24dc9f005bd4f458736f6ed292f4d8f558bbddd521d5e12b79017e16e79c7d94b49d97b76ffd2d27e4db76238933d9890d3039897d1b8a7559d6618d255bd625e16d48421d7f154952690bdcf30d62c5c7f20b7a8b", 0xda, 0x2000000000000009}, {&(0x7f0000000200)="068d2fe7d7ae6b61741bd716a5b6cb9e54e674820f2bf1dc201a6f15844089beedea5b9ccc4d588858ca4a7d7df8", 0x2e, 0x5}, {&(0x7f0000000240)="e13bd365dcc685ee24dd76cd105f1c08937024862af1a577394825770d0f27ea174fabfe70680dcad4334f7358ea7821", 0x30, 0xf}, {&(0x7f0000000280)="3f1dccc884e68bda2792ca7886124d428fb55946b8933d61980a981ebdca3ab2566df449ce087408b5e41584563dc82d553b8c401f1f33dfa1f3b3d2bc67057b70a0a89ee129672d8f39c55682cc7caed098d9f55e0f2422a0132214ca8d1790c0c4aa1be85b59d6b97e9897aa4ee6447583ce65e432efd12529456948fcc304b16132f41bc94865f3fd0d09245f9c9a4d80b7411f3615077afe4ad374f8503a4578b263729c3d7388950ce61ff6c782c6bbf06aa93a7041460f51d0a47d4b6afc633d535ec4", 0xc6, 0x2}, {&(0x7f0000000ac0)="282dc765d0473d84f9e1b02c1d5316e53e62ad90232a88d5ba491843650714a38d971f0289e1bfecbc1664d4c127d07e4297560c3ca7de0faa96c564fee54b41051b9cc9237618cab25f834958b3ece1cb57e4881746b23b05ab283c772864c746d59271f8e301fb7a5c73635db83cd61c7f0a85eb8fbbbb993c850018f839536f5930bfa02add5c324ae61b28c2660f6d7a6f1ac0a443d9295640c34bb568394f3b5ffed2c918dc2d28479ebad75c4422bea1ff4cc8148198c2f3bf657326d9604604c36f77ba1340a6e7664fd2016198cf0a6ce075903777f1f2dc9bd32bfeedf9cf512c142ff7263ad52bf792390e04d13ea550efcaf3", 0xf8}, {&(0x7f0000000480)="46fd54adf722be14793f32438422f4927a4b9238a459dea9024cecec2bb704432958aee5db96d25a6fac68b57ab880de2b494362be576f5641fbe80841f4db96e602822114f927027bdbf8ee4dbdc930c9befd8c2e5e8c4e6afb939b57ae347972d0ef345a5627a5cf43991c4cc2a219093f801db8e806f329e692ab1f62ce2049a0f0b359f8447933dd972bd13158a9361535994e8c68aec3e70c7278e5a049785daf092573065dd6168bee4b5b697233740292ccf31c97205136dd2bb43f2e990d5014dc8c8ce833b57863e77338308ddfdcb7a56c0d59e37b6d36", 0xdc}], 0x40, &(0x7f00000006c0)=ANY=[@ANYBLOB='mode=00000000000000000000002,uid=', @ANYRES16=r7, @ANYRESHEX=r4, @ANYRESHEX=r1, @ANYBLOB="2c687567653d77697468696e5f73697a652c6e725f626c6f636b733d37342c687567653d6e657665722c736d61636b66736465663d07215c252f5c2b5db9b85d5d5c2c232e2f402e5e3a2c7375626a5f747970653d3a4029965b2a7d235d232c657569643c", @ANYRESDEC=0xee01, @ANYBLOB=',euiD>', @ANYRESDEC=0x0, @ANYBLOB=',fsname=,!%{:,smackfsfloor=[:[%#+,subj_type=-,\x00']) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x7fffffff}]}) [ 965.857321] EXT4-fs (loop0): ext4_check_descriptors: Block bitmap for group 0 not in group (block 0)! [ 965.858459] EXT4-fs (loop0): group descriptors corrupted! 00:11:35 executing program 0: syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000d1f4655fd1f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b00000000020000280200000284", 0x62, 0x400}, {&(0x7f0000010400)="030000000400000005000000d4", 0xd}, {&(0x7f0000010500)="ffffffffff070000000000000000000000000000000000000000000000000080ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff", 0x400, 0xc00}, {&(0x7f0000000000)="ed41000000040000d0f4655fd1f4655fd1f4655f13ca7302f6e9dab934", 0x1d, 0x1600}], 0x0, &(0x7f0000000280)=ANY=[]) setxattr$trusted_overlay_upper(&(0x7f0000000540)='./file0\x00', &(0x7f0000000580), &(0x7f00000005c0)={0x0, 0xfb, 0x139, 0x0, 0x0, "eacbf6ff0bc36f5a7bb9fe2ee7bb1e01", "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"}, 0x139, 0x0) [ 965.924239] EXT4-fs (loop3): ext4_check_descriptors: Block bitmap for group 0 not in group (block 0)! [ 965.926240] EXT4-fs (loop3): group descriptors corrupted! 00:11:35 executing program 5: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x7fffffff}]}) r0 = signalfd4(0xffffffffffffffff, &(0x7f00000000c0), 0x8, 0x0) r1 = openat(0xffffffffffffff9c, 0x0, 0x1c2, 0x27) ioctl$BTRFS_IOC_SCRUB_PROGRESS(r1, 0xc400941d, &(0x7f0000000200)={0x0, 0x4, 0xd3, 0x1}) pwrite64(0xffffffffffffffff, &(0x7f0000000a40)="0f64800203d6484c7ddffad1", 0xc, 0x0) lseek(0xffffffffffffffff, 0x2, 0x3) fcntl$getflags(0xffffffffffffffff, 0x401) dup2(r1, 0xffffffffffffffff) write$binfmt_script(0xffffffffffffffff, &(0x7f0000000100)={'#! ', './file0', [{0x20, ',!\'/&&)'}, {0x20, '.,'}, {0x20, ']'}, {0x20, ',{\\-}*'}, {0x20, '^(#(\'\':\x13^,.'}, {0x20, '\x00'}, {0x20, '\x00'}], 0xa, "dff2205296938a2e855089237c51284cef6d7a5a461e76ca1918b6dc781b504083e7287c34c4752f5b9220db"}, 0x5b) close_range(0xffffffffffffffff, r0, 0x2) r2 = openat(0xffffffffffffff9c, 0x0, 0x1c2, 0x27) r3 = open(&(0x7f0000000040)='./file0\x00', 0x1810c1, 0x0) ioctl$BTRFS_IOC_SCRUB_PROGRESS(r2, 0xc400941d, &(0x7f0000000200)={0x0, 0x4, 0xd3, 0x1}) pwrite64(r3, &(0x7f0000000a40)="0f64800203d6484c7ddffad1", 0xc, 0x0) lseek(r3, 0x2, 0x3) fcntl$getflags(r3, 0x401) dup2(r2, r3) epoll_ctl$EPOLL_CTL_ADD(r2, 0x1, r0, &(0x7f0000000080)={0x4000200f}) 00:11:35 executing program 6: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000040)='proc\x00', 0x0, 0x0) pivot_root(&(0x7f0000000000)='./file0\x00', &(0x7f0000000240)='.\x00') 00:11:35 executing program 1: r0 = syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000040)='proc\x00', 0x0, 0x0) pivot_root(&(0x7f0000000000)='./file0\x00', &(0x7f0000000240)='.\x00') getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000480)={{{@in=@empty, @in6=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast2}, 0x0, @in=@initdev}}, &(0x7f0000000200)=0xe8) fstat(r0, &(0x7f0000000580)={0x0, 0x0, 0x0, 0x0, 0x0}) syz_mount_image$tmpfs(&(0x7f00000000c0), &(0x7f0000000140)='./file0\x00', 0x81, 0x4, &(0x7f0000000400)=[{&(0x7f0000000180)="72167d40164db20b83c2a7395ad261ba40ac3b96534ef700fdc181ca", 0x1c, 0x3}, {&(0x7f00000001c0)="6ca6aa12a51c2c7055dbc1c80cdcd7ba6a5553d269614492dbc77898a931a04ccf251b58b174bfafe71529e665f3e5d711f27b", 0x33, 0xd}, {&(0x7f0000000280)="2f601f68cb409c77ad24f6e09141138cfccacbf0a7454325ffbe4cb8130eb26dc7c7d53a19b53ba3de88530fbb22eae41c1c09a28897d438c50926f9d5996ac6234416abe96a366f844405601f552e2e6adcff0cf74204b6ec5e06a9d45a81b1100328205ead274e4b0d18e1aae687f03c428ccab30153b567634ff0e2d006b13d53802e7202230fd06cf077b4a847e43df350a6bcb488ed911b542d2f5d19d04fa28f8a3de28be637541e8debd537c8fe3550ac1949f358658093efe0f1d42f7a4bb4db3b513566f787b46f1aefe002fcf6", 0xd2, 0x1b8}, {&(0x7f0000000380)="f97b2ff8a6369d547b73f62ec7f62f75b12129c1f2e0796173ecc1157a6d6890f85edf13e195c5cd361a11709cb181dc131c08316809d23caa4960fbe95b752a927623a00a4010647643", 0x4a, 0x1}], 0x1000004, &(0x7f0000000600)={[{@mpol={'mpol', 0x3d, {'bind', '=static', @void}}}, {@nr_inodes={'nr_inodes', 0x3d, [0x74, 0x70, 0x39]}}], [{@hash}, {@smackfsroot={'smackfsroot', 0x3d, 'proc\x00'}}, {@context={'context', 0x3d, 'unconfined_u'}}, {@audit}, {@smackfsroot={'smackfsroot', 0x3d, 'proc\x00'}}, {@euid_lt={'euid<', r1}}, {@uid_lt={'uid<', r2}}]}) r3 = openat$hpet(0xffffffffffffff9c, &(0x7f00000006c0), 0x20002, 0x0) name_to_handle_at(r3, &(0x7f0000000700)='./file0\x00', &(0x7f0000000740)=@ceph_nfs_confh={0x10, 0x2, {0x4}}, &(0x7f0000000780), 0x0) 00:11:36 executing program 2: r0 = openat$ptmx(0xffffffffffffff9c, 0x0, 0x8100, 0x0) ioctl$TIOCSIG(r0, 0x40045436, 0x0) syncfs(r0) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x7fffffff}]}) signalfd4(0xffffffffffffffff, &(0x7f00000000c0), 0x8, 0x0) [ 965.994331] tmpfs: Bad value for 'uid' 00:11:36 executing program 3: syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010400)="030000000400000005000000d4", 0xd, 0x800}, {&(0x7f0000010500)="ffffffffff070000000000000000000000000000000000000000000000000080ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff", 0x400, 0xc00}, {&(0x7f0000000000)="ed41000000040000d0f4655fd1f4655fd1f4655f13ca7302f6e9dab934", 0x1d, 0x1600}], 0x0, &(0x7f0000000280)=ANY=[]) setxattr$trusted_overlay_upper(&(0x7f0000000540)='./file0\x00', &(0x7f0000000580), &(0x7f00000005c0)={0x0, 0xfb, 0x139, 0x0, 0x0, "eacbf6ff0bc36f5a7bb9fe2ee7bb1e01", "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"}, 0x139, 0x0) getxattr(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)=@random={'security.', ':\x00'}, &(0x7f0000000140)=""/55, 0x37) 00:11:36 executing program 7: r0 = seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x7fffffff}]}) r1 = signalfd4(0xffffffffffffffff, &(0x7f00000000c0), 0x8, 0x0) ioctl$FS_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000100)=0x40000) ioctl$sock_SIOCGSKNS(r1, 0x894c, &(0x7f0000000080)=0x69) r2 = openat(0xffffffffffffff9c, 0x0, 0x1c2, 0x27) r3 = creat(&(0x7f0000000080)='./file1\x00', 0x0) ioctl$BTRFS_IOC_SCRUB_PROGRESS(r2, 0xc400941d, &(0x7f0000000200)={0x0, 0x4, 0xd3, 0x1}) ioctl$BTRFS_IOC_SCRUB(r3, 0xc400941b, &(0x7f0000000600)={r4, 0x62, 0x80000001}) pwrite64(r3, &(0x7f0000000000)="a7", 0xfffffd6b, 0x0) ioctl$PIO_UNIMAPCLR(r3, 0x4b68, &(0x7f0000000a80)={0x80, 0x4, 0x6}) openat(r3, &(0x7f0000000140)='./file0\x00', 0x80000, 0x104) [ 966.031490] EXT4-fs (loop0): ext4_check_descriptors: Block bitmap for group 0 not in group (block 0)! [ 966.032589] EXT4-fs (loop0): group descriptors corrupted! 00:11:36 executing program 1: ioctl$EXT4_IOC_SWAP_BOOT(0xffffffffffffffff, 0x6611) syz_mount_image$ext4(0x0, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000040)='proc\x00', 0x0, 0x0) pivot_root(&(0x7f0000000000)='./file0\x00', &(0x7f0000000240)='.\x00') r0 = syz_open_dev$vcsu(&(0x7f0000000100), 0x3ff, 0x404440) io_uring_register$IORING_UNREGISTER_PERSONALITY(r0, 0xa, 0x0, 0x0) [ 966.086039] EXT4-fs (loop3): VFS: Can't find ext4 filesystem [ 966.746997] tmpfs: Bad value for 'uid' 00:11:48 executing program 3: syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010400)="030000000400000005000000d4", 0xd, 0x800}, {&(0x7f0000010500)="ffffffffff070000000000000000000000000000000000000000000000000080ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff", 0x400, 0xc00}, {&(0x7f0000000000)="ed41000000040000d0f4655fd1f4655fd1f4655f13ca7302f6e9dab934", 0x1d, 0x1600}], 0x0, &(0x7f0000000280)=ANY=[]) setxattr$trusted_overlay_upper(&(0x7f0000000540)='./file0\x00', &(0x7f0000000580), &(0x7f00000005c0)={0x0, 0xfb, 0x139, 0x0, 0x0, "eacbf6ff0bc36f5a7bb9fe2ee7bb1e01", "a49dbbc75b5fc0caa97cab3ee231b0d7cf3b9be24c0fb2c145c6f2190b4a29cc525f550d79c74a03eda157db2eae62fde8958cce2a8a4c9d0374e4d6ae09ef4ee733ce4046bee0170cff57584e0671d4f286b9691d37721b43778a4afb3c3d05fd5446d2e0bac5326f43d23126410dfb85efa26b9e1ae8d056c3ebcde0c95e1443304d7a93eb4077f76047b6e13f0e79a9631ac2bd43143854803c698a7f02933d9cbdca121cc857aacabf858f3f904c9dfedb6c03186d99490f35f09de8ab897ea7c58f07dca416e1db55c7a849a91b98d0e0c0c7bf058d86a2e997a0557800a34bb7f5806f2e15e99981cc3fe615a3ff396f7d8da30ea24626263abf0ad50a0ce2dafc55f2b0286b2204114a6754b336a913a75e66ed6a3efd132f668369692f46039d"}, 0x139, 0x0) getxattr(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)=@random={'security.', ':\x00'}, &(0x7f0000000140)=""/55, 0x37) 00:11:48 executing program 0: syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010400)="030000000400000005000000d4", 0xd, 0x800}, {&(0x7f0000010500)="ffffffffff070000000000000000000000000000000000000000000000000080ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff", 0x400, 0xc00}, {&(0x7f0000000000)="ed41000000040000d0f4655fd1f4655fd1f4655f13ca7302f6e9dab934", 0x1d, 0x1600}], 0x0, &(0x7f0000000280)=ANY=[]) setxattr$trusted_overlay_upper(&(0x7f0000000540)='./file0\x00', &(0x7f0000000580), &(0x7f00000005c0)={0x0, 0xfb, 0x139, 0x0, 0x0, "eacbf6ff0bc36f5a7bb9fe2ee7bb1e01", "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"}, 0x139, 0x0) 00:11:48 executing program 1: ioctl$EXT4_IOC_SWAP_BOOT(0xffffffffffffffff, 0x6611) syz_mount_image$ext4(0x0, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000040)='proc\x00', 0x0, 0x0) pivot_root(&(0x7f0000000000)='./file0\x00', &(0x7f0000000240)='.\x00') r0 = syz_open_dev$vcsu(&(0x7f0000000100), 0x3ff, 0x404440) io_uring_register$IORING_UNREGISTER_PERSONALITY(r0, 0xa, 0x0, 0x0) 00:11:48 executing program 2: r0 = seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x7fffffff}]}) signalfd4(0xffffffffffffffff, &(0x7f00000000c0), 0x8, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r0, 0xc0502100, &(0x7f0000000100)) 00:11:48 executing program 6: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0xe460, 0x0) mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000080)='proc\x00', 0x0, 0x0) pivot_root(&(0x7f0000000000)='./file0\x00', &(0x7f0000000240)='.\x00') 00:11:48 executing program 7: syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000d1f4655fd1f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b00000000020000280200000284", 0x62, 0x400}, {&(0x7f0000010400)="03000000040000000500", 0xa, 0x800}, {&(0x7f0000010500)="ffffffffff070000000000000000000000000000000000000000000000000080ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff", 0x400, 0xc00}, {&(0x7f0000000000)="ed41000000040000d0f4655fd1f4655fd1f4655f13ca7302f6e9dab934", 0x1d, 0x1600}], 0x0, &(0x7f0000000280)=ANY=[]) setxattr$trusted_overlay_upper(&(0x7f0000000540)='./file0\x00', &(0x7f0000000580), &(0x7f00000005c0)={0x0, 0xfb, 0x139, 0x0, 0x0, "eacbf6ff0bc36f5a7bb9fe2ee7bb1e01", "a49dbbc75b5fc0caa97cab3ee231b0d7cf3b9be24c0fb2c145c6f2190b4a29cc525f550d79c74a03eda157db2eae62fde8958cce2a8a4c9d0374e4d6ae09ef4ee733ce4046bee0170cff57584e0671d4f286b9691d37721b43778a4afb3c3d05fd5446d2e0bac5326f43d23126410dfb85efa26b9e1ae8d056c3ebcde0c95e1443304d7a93eb4077f76047b6e13f0e79a9631ac2bd43143854803c698a7f02933d9cbdca121cc857aacabf858f3f904c9dfedb6c03186d99490f35f09de8ab897ea7c58f07dca416e1db55c7a849a91b98d0e0c0c7bf058d86a2e997a0557800a34bb7f5806f2e15e99981cc3fe615a3ff396f7d8da30ea24626263abf0ad50a0ce2dafc55f2b0286b2204114a6754b336a913a75e66ed6a3efd132f668369692f46039d"}, 0x139, 0x0) 00:11:48 executing program 4: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x7fffffff}]}) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000001c0), 0x0, 0x0) prctl$PR_SET_MM_MAP(0x23, 0xe, &(0x7f0000000180)={&(0x7f0000ffd000/0x1000)=nil, &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000fff000/0x1000)=nil, &(0x7f0000ffd000/0x1000)=nil, &(0x7f0000ffc000/0x2000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000ffe000/0x2000)=nil, &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000ffd000/0x2000)=nil, &(0x7f0000ffd000/0x2000)=nil, &(0x7f0000000140)="080afc03b8bae061a487765e741c1a3a5a7dea95a0b02b4dbb6944356a", 0x1d, r1}, 0x68) ioctl$BTRFS_IOC_START_SYNC(r1, 0x80089418, &(0x7f00000000c0)) r2 = openat$ptmx(0xffffffffffffff9c, 0x0, 0x8100, 0x0) r3 = openat2(0xffffffffffffff9c, &(0x7f0000000200)='./file0\x00', &(0x7f0000000240)={0x2, 0x40}, 0x18) sendmsg$IPSET_CMD_SWAP(r3, &(0x7f0000000380)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x80}, 0xc, &(0x7f0000000340)={&(0x7f00000002c0)={0x4c, 0x6, 0x6, 0x101, 0x0, 0x0, {0x5, 0x0, 0x8}, [@IPSET_ATTR_SETNAME={0x9, 0x2, 'syz1\x00'}, @IPSET_ATTR_SETNAME2={0x9, 0x3, 'syz1\x00'}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}]}, 0x4c}, 0x1, 0x0, 0x0, 0xc8051}, 0x8094) ioctl$TIOCSIG(r2, 0x40045436, 0x0) ioctl$F2FS_IOC_MOVE_RANGE(r0, 0xc020f509, &(0x7f0000000080)={r2, 0x8001, 0x6, 0x9}) creat(&(0x7f0000000100)='./file0\x00', 0x0) mprotect(&(0x7f0000ffe000/0x1000)=nil, 0x1000, 0x0) 00:11:48 executing program 5: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x7fffffff}]}) signalfd4(0xffffffffffffffff, &(0x7f00000000c0), 0x8, 0x0) openat$procfs(0xffffffffffffff9c, &(0x7f0000000080)='/proc/mdstat\x00', 0x0, 0x0) [ 978.373797] EXT4-fs (loop0): VFS: Can't find ext4 filesystem 00:11:48 executing program 0: syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010400)="030000000400000005000000d4", 0xd, 0x800}, {&(0x7f0000010500)="ffffffffff070000000000000000000000000000000000000000000000000080ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff", 0x400, 0xc00}, {&(0x7f0000000000)="ed41000000040000d0f4655fd1f4655fd1f4655f13ca7302f6e9dab934", 0x1d, 0x1600}], 0x0, &(0x7f0000000280)=ANY=[]) setxattr$trusted_overlay_upper(&(0x7f0000000540)='./file0\x00', &(0x7f0000000580), &(0x7f00000005c0)={0x0, 0xfb, 0x139, 0x0, 0x0, "eacbf6ff0bc36f5a7bb9fe2ee7bb1e01", "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"}, 0x139, 0x0) 00:11:48 executing program 1: ioctl$PIO_UNIMAP(0xffffffffffffffff, 0x4b67, &(0x7f0000000200)={0x2, &(0x7f00000001c0)=[{0xfffc, 0x8}, {0x2, 0x8}]}) ioctl$SNDRV_SEQ_IOCTL_DELETE_QUEUE(0xffffffffffffffff, 0x408c5333, &(0x7f0000000100)={0x400, 0x45f, 0x1, 'queue0\x00'}) r0 = seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x7fffffff}]}) r1 = pidfd_getfd(0xffffffffffffffff, r0, 0x0) ioctl$TUNATTACHFILTER(r1, 0x401054d5, &(0x7f00000000c0)={0x5, &(0x7f0000000080)=[{0xc95, 0x5, 0x2}, {0xfff8, 0xaf, 0x4, 0x7fffffff}, {0x8001, 0x9, 0x0, 0x6}, {0x8, 0xfb, 0x40, 0x6}, {0x83e9, 0x4, 0x0, 0x800}]}) mprotect(&(0x7f0000ffe000/0x1000)=nil, 0x1000, 0x0) 00:11:48 executing program 2: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x7fffffff}]}) signalfd4(0xffffffffffffffff, &(0x7f00000000c0)={[0x2]}, 0x8, 0x80000) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0xc, &(0x7f0000000100)={0x3, &(0x7f0000000080)=[{0x8, 0x5, 0x8, 0xee9}, {0x7701, 0x9, 0x4, 0x6}, {0x9, 0x6}]}) [ 978.451510] EXT4-fs (loop3): VFS: Can't find ext4 filesystem 00:11:48 executing program 4: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x7fffffff}]}) r0 = openat(0xffffffffffffff9c, 0x0, 0x1c2, 0x27) r1 = open(&(0x7f0000000040)='./file0\x00', 0x1810c1, 0x0) ioctl$BTRFS_IOC_SCRUB_PROGRESS(r0, 0xc400941d, &(0x7f0000000200)={0x0, 0x4, 0xd3, 0x1}) pwrite64(r1, &(0x7f0000000a40)="0f64800203d6484c7ddffad1", 0xc, 0x0) lseek(r1, 0x2, 0x3) fcntl$getflags(r1, 0x401) dup2(r0, r1) execveat(r1, &(0x7f0000000080)='./file0\x00', &(0x7f00000001c0)=[&(0x7f00000000c0)='#\x00', &(0x7f0000000100)='(][+#/\xe1\'\x00', &(0x7f0000000140)='#\x00', &(0x7f0000000180)='\x00'], &(0x7f0000000300)=[&(0x7f0000000200)='&%^.$\x00', &(0x7f0000000240)='\x00', &(0x7f0000000280)='.\x00', &(0x7f00000002c0)='/\x18%\x00'], 0x1000) mprotect(&(0x7f0000ffe000/0x1000)=nil, 0x1000, 0x0) [ 978.497772] EXT4-fs (loop7): mounted filesystem without journal. Opts: ,errors=continue [ 978.545064] EXT4-fs (loop0): VFS: Can't find ext4 filesystem 00:12:01 executing program 1: ioctl$PIO_UNIMAP(0xffffffffffffffff, 0x4b67, &(0x7f0000000200)={0x2, &(0x7f00000001c0)=[{0xfffc, 0x8}, {0x2, 0x8}]}) ioctl$SNDRV_SEQ_IOCTL_DELETE_QUEUE(0xffffffffffffffff, 0x408c5333, &(0x7f0000000100)={0x400, 0x45f, 0x1, 'queue0\x00'}) r0 = seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x7fffffff}]}) r1 = pidfd_getfd(0xffffffffffffffff, r0, 0x0) ioctl$TUNATTACHFILTER(r1, 0x401054d5, &(0x7f00000000c0)={0x5, &(0x7f0000000080)=[{0xc95, 0x5, 0x2}, {0xfff8, 0xaf, 0x4, 0x7fffffff}, {0x8001, 0x9, 0x0, 0x6}, {0x8, 0xfb, 0x40, 0x6}, {0x83e9, 0x4, 0x0, 0x800}]}) mprotect(&(0x7f0000ffe000/0x1000)=nil, 0x1000, 0x0) 00:12:01 executing program 4: r0 = seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000100)=[{0x6, 0x0, 0x0, 0x7fffffff}]}) mprotect(&(0x7f0000ffe000/0x1000)=nil, 0x1000, 0x0) r1 = signalfd(r0, &(0x7f0000000080), 0x8) r2 = fork() fcntl$lock(r1, 0x6, &(0x7f00000000c0)={0x2, 0x1, 0x0, 0x1, r2}) 00:12:01 executing program 2: r0 = seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x7fffffff}]}) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r0, 0xc0502100, &(0x7f0000000b00)) r1 = seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0xc, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x7fc00002}]}) r2 = openat(0xffffffffffffff9c, 0x0, 0x1c2, 0x27) r3 = creat(&(0x7f0000000080)='./file1\x00', 0x0) ioctl$BTRFS_IOC_SCRUB_PROGRESS(r2, 0xc400941d, &(0x7f0000000200)={0x0, 0x4, 0xd3, 0x1}) ioctl$BTRFS_IOC_SCRUB(r3, 0xc400941b, &(0x7f0000000600)={r4, 0x62, 0x80000001}) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r0, 0xc0502100, &(0x7f0000000a80)={0x0}) ioctl$SECCOMP_IOCTL_NOTIF_ADDFD(r1, 0xc0182101, &(0x7f00000000c0)={r5}) r6 = dup2(r0, r0) ioctl$SECCOMP_IOCTL_NOTIF_ADDFD(r0, 0x40182103, &(0x7f0000000080)={r5, 0x1, r6, 0x1, 0x80000}) signalfd4(0xffffffffffffffff, &(0x7f00000000c0), 0x8, 0x0) r7 = openat(0xffffffffffffff9c, 0x0, 0x1c2, 0x27) r8 = open(&(0x7f0000000040)='./file0\x00', 0x1810c1, 0x0) ioctl$BTRFS_IOC_SCRUB_PROGRESS(r7, 0xc400941d, &(0x7f0000000200)={0x0, 0x4, 0xd3, 0x1}) pwrite64(r8, &(0x7f0000000a40)="0f64800203d6484c7ddffad1", 0xc, 0x0) lseek(r8, 0x2, 0x3) fcntl$getflags(r8, 0x401) dup2(r7, r8) sendmsg$IPCTNL_MSG_TIMEOUT_GET(r8, &(0x7f0000000280)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000000240)={&(0x7f0000000200)=ANY=[@ANYBLOB="1c00000001080147471ea5855b7f4e78"], 0x1c}}, 0x1) 00:12:01 executing program 3: syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010400)="030000000400000005000000d4", 0xd, 0x800}, {&(0x7f0000010500)="ffffffffff070000000000000000000000000000000000000000000000000080ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff", 0x400, 0xc00}, {&(0x7f0000000000)="ed41000000040000d0f4655fd1f4655fd1f4655f13ca7302f6e9dab934", 0x1d, 0x1600}], 0x0, &(0x7f0000000280)=ANY=[]) setxattr$trusted_overlay_upper(&(0x7f0000000540)='./file0\x00', &(0x7f0000000580), &(0x7f00000005c0)={0x0, 0xfb, 0x139, 0x0, 0x0, "eacbf6ff0bc36f5a7bb9fe2ee7bb1e01", "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"}, 0x139, 0x0) getxattr(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)=@random={'security.', ':\x00'}, &(0x7f0000000140)=""/55, 0x37) 00:12:01 executing program 5: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x0, &(0x7f0000000040)}) r0 = signalfd4(0xffffffffffffffff, &(0x7f00000000c0), 0x8, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r0, 0xc0502100, &(0x7f0000000200)) sendfile(r0, 0xffffffffffffffff, &(0x7f0000000080)=0x7fffffff, 0x7fff) sendmsg$NL80211_CMD_REGISTER_BEACONS(r0, &(0x7f00000002c0)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x1001}, 0xc, &(0x7f0000000280)={&(0x7f0000000140)={0x20, 0x0, 0x800, 0x70bd29, 0x25dfdbff, {{}, {@void, @void, @val={0xc, 0x99, {0xfff, 0x6d}}}}, [""]}, 0x20}}, 0x4000000) r1 = openat(r0, &(0x7f0000000040)='./file0\x00', 0x40, 0x109) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r1, 0xc0502100, &(0x7f0000000180)) 00:12:01 executing program 7: r0 = seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x7fffffff}]}) signalfd4(0xffffffffffffffff, &(0x7f00000000c0), 0x8, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r0, 0xc0502100, &(0x7f0000000100)) 00:12:01 executing program 0: syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010400)="030000000400000005000000d4", 0xd, 0x800}, {&(0x7f0000010500)="ffffffffff070000000000000000000000000000000000000000000000000080ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff", 0x400, 0xc00}, {&(0x7f0000000000)="ed41000000040000d0f4655fd1f4655fd1f4655f13ca7302f6e9dab934", 0x1d, 0x1600}], 0x0, &(0x7f0000000280)=ANY=[]) setxattr$trusted_overlay_upper(&(0x7f0000000540)='./file0\x00', &(0x7f0000000580), &(0x7f00000005c0)={0x0, 0xfb, 0x139, 0x0, 0x0, "eacbf6ff0bc36f5a7bb9fe2ee7bb1e01", "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"}, 0x139, 0x0) 00:12:01 executing program 6: r0 = syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000040)='proc\x00', 0x0, 0x0) ioctl$F2FS_IOC_MOVE_RANGE(r0, 0xc020f509, &(0x7f0000000200)={r0, 0x4, 0x7fffffff, 0x3}) mknodat(r1, &(0x7f0000000280)='./file0\x00', 0x68, 0x70000000) pivot_root(&(0x7f0000000000)='./file0\x00', &(0x7f0000000240)='.\x00') r2 = openat$ttyS3(0xffffffffffffff9c, &(0x7f00000002c0), 0x400000, 0x0) ioctl$KDMKTONE(r1, 0x4b30, 0xffffffffffffd8ee) ioctl$BTRFS_IOC_WAIT_SYNC(r2, 0x40089416, &(0x7f0000000300)) setxattr$incfs_metadata(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140), &(0x7f0000000180)="04bd0a0a891917199b2ba1c00982c2165ed6cc704634085eba77c09fcd993c14a1eacac09a548dd05c218511126d5d334c9af4235a301f3c3ee3555b051715ccca06543e307ce2fa7abaca15c1587b1622b31968c3bdbafb4b66ce527495c4ad152db060031bbc9d49dc3002", 0x6c, 0x0) ioctl$BTRFS_IOC_SCRUB_PROGRESS(0xffffffffffffffff, 0xc400941d, &(0x7f0000000200)={0x0, 0x4, 0xd3, 0x1}) pwrite64(0xffffffffffffffff, &(0x7f0000000a40)="0f64800203d6484c7ddffad1", 0xc, 0x0) lseek(0xffffffffffffffff, 0x2, 0x3) fcntl$getflags(0xffffffffffffffff, 0x401) dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$BTRFS_IOC_SET_RECEIVED_SUBVOL(0xffffffffffffffff, 0xc0c89425, &(0x7f0000000680)={"bdd9d7000002000000000000102300", 0x0, 0x0, {0xffff, 0x80}, {0x1f, 0x1000}, 0x7, [0x2, 0x228b, 0x8001, 0x7fff, 0x7fffffff, 0x1, 0xffffffff, 0x3, 0x0, 0xe9, 0x6, 0x9, 0x401, 0xffffffffffffffff, 0x7fffffff, 0x9]}) ioctl$BTRFS_IOC_SNAP_CREATE_V2(0xffffffffffffffff, 0x50009417, &(0x7f0000000a00)={{r2}, r3, 0xa, @inherit={0x88, &(0x7f0000000780)={0x1, 0x8, 0xc0, 0x8bf, {0x34, 0x2e, 0x8, 0x212, 0x8}, [0xb, 0x4, 0x7fffffff, 0x52, 0x2, 0x0, 0x203, 0x1]}}, @subvolid=0xffffffffffffffff}) stat(&(0x7f00000005c0)='./file0/file0\x00', &(0x7f0000000600)={0x0, 0x0, 0x0, 0x0, 0x0}) stat(&(0x7f0000001a00)='.\x00', &(0x7f0000001c00)={0x0, 0x0, 0x0, 0x0, 0x0}) setresuid(0x0, r5, 0x0) syz_mount_image$msdos(&(0x7f0000000340), &(0x7f0000000380)='./file0\x00', 0x7, 0x3, &(0x7f0000000540)=[{&(0x7f00000003c0)="be4ea540aa47876fb35db62fc334e1604d063fa45ccfe0ad1f14d0d76cd1f9b00980af353f0bb7b66b7d71", 0xfffffe93, 0x8}, {&(0x7f0000000400), 0x0, 0x1}, {&(0x7f0000000440)="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", 0xff, 0xfffffffffffff272}], 0x1000000, &(0x7f0000000840)=ANY=[@ANYRES32=r2, @ANYRESDEC=r4, @ANYBLOB=',context=sysadm_u,uid=', @ANYRESDEC=r5, @ANYBLOB="2c3e75693e00420fc7c663dc32384c1ab8c31e506c81c194bedd8af79e7951cd2cc3b385b937e9569b969f0b7cebefd102caf1c0ddaff5cc6b60756f1e000712f95633d4588d89fb155199a652551d39fa3dd975627705deb9eb9c10468256199683c0ca77c8814b83db0f1f382415f4747b125f7d53bbe7e085f998c4b2339fd613694853bc2b6d70dccc8c0c2d9455c7d726cc5ad8d0628383ea5e89c467453cae69a332b833a06ec3fdb67bf9b2e8a6630c3ef37a2303787f60016da71e87a54866c005e7c8714ee35fc4128b35a761ed7f4ec7cf73b45ad02f0ca5c2d6a7d9b2e4a487d0fd705021493b7d4de5", @ANYRESDEC=0xee00, @ANYBLOB=',audit,smackfsdef=user.incfs.metadata\x00,uid=', @ANYRESDEC=0xee00, @ANYBLOB=',measure,\x00']) [ 991.601618] EXT4-fs (loop0): VFS: Can't find ext4 filesystem [ 991.634270] EXT4-fs (loop3): VFS: Can't find ext4 filesystem 00:12:01 executing program 1: ioctl$PIO_UNIMAP(0xffffffffffffffff, 0x4b67, &(0x7f0000000200)={0x2, &(0x7f00000001c0)=[{0xfffc, 0x8}, {0x2, 0x8}]}) ioctl$SNDRV_SEQ_IOCTL_DELETE_QUEUE(0xffffffffffffffff, 0x408c5333, &(0x7f0000000100)={0x400, 0x45f, 0x1, 'queue0\x00'}) r0 = seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x7fffffff}]}) r1 = pidfd_getfd(0xffffffffffffffff, r0, 0x0) ioctl$TUNATTACHFILTER(r1, 0x401054d5, &(0x7f00000000c0)={0x5, &(0x7f0000000080)=[{0xc95, 0x5, 0x2}, {0xfff8, 0xaf, 0x4, 0x7fffffff}, {0x8001, 0x9, 0x0, 0x6}, {0x8, 0xfb, 0x40, 0x6}, {0x83e9, 0x4, 0x0, 0x800}]}) mprotect(&(0x7f0000ffe000/0x1000)=nil, 0x1000, 0x0) 00:12:01 executing program 0: syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{0x0, 0x0, 0x400}, {&(0x7f0000010400)="030000000400000005000000d4", 0xd, 0x800}, {&(0x7f0000010500)="ffffffffff070000000000000000000000000000000000000000000000000080ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff", 0x400, 0xc00}, {&(0x7f0000000000)="ed41000000040000d0f4655fd1f4655fd1f4655f13ca7302f6e9dab934", 0x1d, 0x1600}], 0x0, &(0x7f0000000280)=ANY=[]) setxattr$trusted_overlay_upper(&(0x7f0000000540)='./file0\x00', &(0x7f0000000580), &(0x7f00000005c0)={0x0, 0xfb, 0x139, 0x0, 0x0, "eacbf6ff0bc36f5a7bb9fe2ee7bb1e01", "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"}, 0x139, 0x0) 00:12:01 executing program 7: ioctl$TUNSETQUEUE(0xffffffffffffffff, 0x400454d9, &(0x7f0000000b80)={'bond0\x00'}) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x6}]}) r0 = signalfd4(0xffffffffffffffff, &(0x7f00000000c0), 0x8, 0x0) prctl$PR_SET_MM_MAP(0x23, 0xe, &(0x7f0000000180)={&(0x7f0000ffd000/0x1000)=nil, &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000fff000/0x1000)=nil, &(0x7f0000ffd000/0x1000)=nil, &(0x7f0000ffc000/0x2000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000ffe000/0x2000)=nil, &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000ffd000/0x2000)=nil, &(0x7f0000ffd000/0x2000)=nil, &(0x7f0000000140)="080afc03b8bae061a487765e741c1a3a5a7dea95a0b02b4dbb6944356a", 0x1d}, 0x68) r1 = creat(&(0x7f0000000080)='./file1\x00', 0x0) pwrite64(r1, &(0x7f0000000000)="a7", 0xfffffd6b, 0x0) accept$packet(r0, &(0x7f0000000080)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000100)=0x14) 00:12:01 executing program 3: syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{0x0, 0x0, 0x400}, {&(0x7f0000010400)="030000000400000005000000d4", 0xd, 0x800}, {&(0x7f0000010500)="ffffffffff070000000000000000000000000000000000000000000000000080ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff", 0x400, 0xc00}, {&(0x7f0000000000)="ed41000000040000d0f4655fd1f4655fd1f4655f13ca7302f6e9dab934", 0x1d, 0x1600}], 0x0, &(0x7f0000000280)=ANY=[]) setxattr$trusted_overlay_upper(&(0x7f0000000540)='./file0\x00', &(0x7f0000000580), &(0x7f00000005c0)={0x0, 0xfb, 0x139, 0x0, 0x0, "eacbf6ff0bc36f5a7bb9fe2ee7bb1e01", "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"}, 0x139, 0x0) getxattr(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)=@random={'security.', ':\x00'}, &(0x7f0000000140)=""/55, 0x37) 00:12:01 executing program 5: syz_io_uring_setup(0x1432, &(0x7f0000000080)={0x0, 0x0, 0x1}, &(0x7f00000a0000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000000000)=0x0, &(0x7f0000000140)=0x0) syz_io_uring_submit(r0, r1, &(0x7f00000002c0)=@IORING_OP_READ=@use_registered_buffer={0x16, 0x4, 0x0, @fd_index=0x5}, 0x0) syz_io_uring_setup(0x5980, &(0x7f0000001380), &(0x7f0000ffe000/0x2000)=nil, &(0x7f0000ffb000/0x3000)=nil, &(0x7f00000001c0), &(0x7f0000000280)=0x0) syz_io_uring_submit(r0, r2, &(0x7f0000000340)=@IORING_OP_POLL_REMOVE, 0x0) r3 = openat(0xffffffffffffff9c, 0x0, 0x1c2, 0x27) r4 = open(&(0x7f0000000040)='./file0\x00', 0x1810c1, 0x0) ioctl$BTRFS_IOC_SCRUB_PROGRESS(r3, 0xc400941d, &(0x7f0000000200)={0x0, 0x4, 0xd3, 0x1}) pwrite64(r4, &(0x7f0000000a40)="0f64800203d6484c7ddffad1", 0xc, 0x0) lseek(r4, 0x2, 0x3) fcntl$getflags(r4, 0x401) dup2(r3, r4) syz_io_uring_submit(r0, 0x0, &(0x7f0000000100)=@IORING_OP_OPENAT={0x12, 0x0, 0x0, r3, 0x0, &(0x7f0000000080)='./file0\x00', 0x120, 0x0, 0x23456}, 0xfffff4ae) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x7fffffff}]}) signalfd4(0xffffffffffffffff, &(0x7f00000000c0), 0x8, 0x0) [ 991.737938] audit: type=1326 audit(1626999121.748:56): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=8162 comm="syz-executor.7" exe="/syz-executor.7" sig=31 arch=c000003e syscall=202 compat=0 ip=0x466609 code=0x0 [ 991.752574] EXT4-fs (loop3): VFS: Can't find ext4 filesystem 00:12:01 executing program 1: ioctl$PIO_UNIMAP(0xffffffffffffffff, 0x4b67, &(0x7f0000000200)={0x2, &(0x7f00000001c0)=[{0xfffc, 0x8}, {0x2, 0x8}]}) ioctl$SNDRV_SEQ_IOCTL_DELETE_QUEUE(0xffffffffffffffff, 0x408c5333, &(0x7f0000000100)={0x400, 0x45f, 0x1, 'queue0\x00'}) r0 = seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x7fffffff}]}) r1 = pidfd_getfd(0xffffffffffffffff, r0, 0x0) ioctl$TUNATTACHFILTER(r1, 0x401054d5, &(0x7f00000000c0)={0x5, &(0x7f0000000080)=[{0xc95, 0x5, 0x2}, {0xfff8, 0xaf, 0x4, 0x7fffffff}, {0x8001, 0x9, 0x0, 0x6}, {0x8, 0xfb, 0x40, 0x6}, {0x83e9, 0x4, 0x0, 0x800}]}) [ 991.786513] EXT4-fs (loop0): VFS: Can't find ext4 filesystem 00:12:01 executing program 4: r0 = seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x40, 0x0, 0x0, 0x7fffffff}]}) mprotect(&(0x7f0000ffe000/0x1000)=nil, 0x1000, 0x0) r1 = openat(0xffffffffffffff9c, 0x0, 0x1c2, 0x27) r2 = open(&(0x7f0000000040)='./file0\x00', 0x1810c1, 0x0) ioctl$BTRFS_IOC_SCRUB_PROGRESS(r1, 0xc400941d, &(0x7f0000000200)={0x0, 0x4, 0xd3, 0x1}) pwrite64(r2, &(0x7f0000000a40)="0f64800203d6484c7ddffad1", 0xc, 0x0) lseek(r2, 0x2, 0x3) fcntl$getflags(r2, 0x401) dup2(r1, r2) copy_file_range(r0, &(0x7f0000000080)=0x8000, r2, &(0x7f00000000c0)=0x5, 0x1ffe00000000000, 0x0) [ 1003.951406] kmemleak: 1 new suspected memory leaks (see /sys/kernel/debug/kmemleak) BUG: memory leak unreferenced object 0xffff88800e76e400 (size 512): comm "syz-executor.4", pid 8147, jiffies 4295658600 (age 18.384s) hex dump (first 32 bytes): 01 00 00 00 01 00 00 00 00 00 00 00 00 00 00 00 ................ 00 6c 5b 0f 80 88 ff ff 00 50 6e 00 00 c9 ff ff .l[......Pn..... backtrace: [<00000000a6998fd0>] do_seccomp+0x2da/0x25f0 [<000000004a529c84>] do_syscall_64+0x33/0x40 [<00000000ba09bafb>] entry_SYSCALL_64_after_hwframe+0x44/0xa9 BUG: leak checking failed VM DIAGNOSIS: 00:12:20 Registers: info registers vcpu 0 RAX=ffffffff83c512c0 RBX=ffffffff84c32280 RCX=ffffffff83c392b8 RDX=0000000000000000 RSI=0000000000000000 RDI=ffffffff83c5166f RBP=fffffbfff0986450 RSP=ffffffff84c07e40 R8 =0000000000000001 R9 =ffff88806ce33feb R10=ffffed100d9c67fd R11=0000000000000001 R12=0000000000000000 R13=ffffffff8544f088 R14=0000000000000000 R15=dffffc0000000000 RIP=ffffffff83c512ce RFL=00000206 [-----P-] CPL=0 II=0 A20=1 SMM=0 HLT=1 ES =0000 0000000000000000 00000000 00000000 CS =0010 0000000000000000 ffffffff 00a09b00 DPL=0 CS64 [-RA] SS =0018 0000000000000000 ffffffff 00c09300 DPL=0 DS [-WA] DS =0000 0000000000000000 00000000 00000000 FS =0000 0000000000000000 00000000 00000000 GS =0000 ffff88806ce00000 00000000 00000000 LDT=0000 fffffe0000000000 00000000 00000000 TR =0040 fffffe0000003000 00004087 00008b00 DPL=0 TSS64-busy GDT= fffffe0000001000 0000007f IDT= fffffe0000000000 00000fff CR0=80050033 CR2=00007fff391e1080 CR3=0000000017f4c000 CR4=00350ef0 DR0=0000000000000000 DR1=0000000000000000 DR2=0000000000000000 DR3=0000000000000000 DR6=00000000ffff0ff0 DR7=0000000000000400 EFER=0000000000000d01 FCW=037f FSW=0000 [ST=0] FTW=00 MXCSR=00001fa0 FPR0=0000000000000000 0000 FPR1=0000000000000000 0000 FPR2=0000000000000000 0000 FPR3=0000000000000000 0000 FPR4=0000000000000000 0000 FPR5=cc80000000000000 4007 FPR6=cc80000000000000 4007 FPR7=cdc0000000000000 4008 XMM00=00000000000000000000000000000000 XMM01=0a64656c69616620676e696b63656863 XMM02=31636e75662e6e75522e6c697475736f XMM03=00000000000000000000000000000000 XMM04=705f746e756f6d5f69746c756d5f3474 XMM05=5f6c626c74656e222022746365746f72 XMM06=226e6f6d6d6f635f6464615f746d676d XMM07=31207375746174732074697865203a5d XMM08=00000000000000000000000000000000 XMM09=00000000000000000000020000000000 XMM10=00000000000000000000000000000000 XMM11=000000b9107b41dbba36b00000000000 XMM12=00000000000000000000000000000000 XMM13=00000000060000000000000000000000 XMM14=00000000000000000000000000000000 XMM15=00000000000000000000000000000000 info registers vcpu 1 RAX=ffffffff83c512c0 RBX=ffff88800852b280 RCX=ffffffff83c392b8 RDX=0000000000000000 RSI=0000000000000000 RDI=ffffffff83c5166f RBP=ffffed10010a5650 RSP=ffff88800856fe78 R8 =0000000000000001 R9 =ffff88806cf33feb R10=ffffed100d9e67fd R11=0000000000000001 R12=0000000000000001 R13=ffffffff8544f088 R14=0000000000000000 R15=dffffc0000000000 RIP=ffffffff83c512ce RFL=00000202 [-------] CPL=0 II=0 A20=1 SMM=0 HLT=1 ES =0000 0000000000000000 00000000 00000000 CS =0010 0000000000000000 ffffffff 00a09b00 DPL=0 CS64 [-RA] SS =0018 0000000000000000 ffffffff 00c09300 DPL=0 DS [-WA] DS =0000 0000000000000000 00000000 00000000 FS =0000 0000000000000000 00000000 00000000 GS =0000 ffff88806cf00000 00000000 00000000 LDT=0000 fffffe0000000000 00000000 00000000 TR =0040 fffffe000003e000 00004087 00008b00 DPL=0 TSS64-busy GDT= fffffe000003c000 0000007f IDT= fffffe0000000000 00000fff CR0=80050033 CR2=00007fff391ade28 CR3=0000000017f4c000 CR4=00350ee0 DR0=0000000000000000 DR1=0000000000000000 DR2=0000000000000000 DR3=0000000000000000 DR6=00000000ffff0ff0 DR7=0000000000000400 EFER=0000000000000d01 FCW=037f FSW=0000 [ST=0] FTW=00 MXCSR=00001fa0 FPR0=0000000000000000 0000 FPR1=0000000000000000 0000 FPR2=0000000000000000 0000 FPR3=0000000000000000 0000 FPR4=0000000000000000 0000 FPR5=cc80000000000000 4007 FPR6=cc80000000000000 4007 FPR7=cdc0000000000000 4008 XMM00=00000000000000000000000000000000 XMM01=00000000000000000000000000000000 XMM02=00000000000000004182d6f440000000 XMM03=0000ff00000000000000000000000000 XMM04=732f6c61636f6c2f7273752f3d485441 XMM05=622f6c61636f6c2f7273752f3a6e6962 XMM06=73752f3a6e6962732f7273752f3a6e69 XMM07=6e69622f3a6e6962732f3a6e69622f72 XMM08=00000000000000000000000000000000 XMM09=00000000000000000000000000000000 XMM10=00000000000000000000000000000000 XMM11=00000000000000000000000000000000 XMM12=00000000000000000000000000000000 XMM13=00000000000000000000000000000000 XMM14=00000000000000000000000000000000 XMM15=00000000000000000000000000000000